query_id
stringlengths
32
32
query
stringlengths
7
4.32k
positive_passages
listlengths
1
1
negative_passages
listlengths
88
101
99121b031a2e20faa722c0bf2d878b96
FindByQty find example by qty
[ { "docid": "80bcbbda926c60319ceffc4c4e3a1129", "score": "0.80560726", "text": "func (operator ExampleOperator) FindByQty(qcs []int, jobNumber int) []ExampleSchema.Example {\n\telist := OperationRunner.RunIntOperation(qcs, operator.FindByQtyOpe, jobNumber)\n\n\treturn convertToExample(elist)\n}", "title": "" } ]
[ { "docid": "26a6d44f25cc47d1cfa3428a4ef8ea6f", "score": "0.70127124", "text": "func (operator ExampleOperator) FindByQtyOpe(qcs []int) []interface{} {\n\tcursor, err := operator.collection.Find(\n\t\tcontext.Background(),\n\t\tbson.NewDocument(bson.EC.SubDocumentFromElements(\"qty\",\n\t\t\tconvertSearchInt(\"$in\", qcs)),\n\t\t),\n\t)\n\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\treturn collect(cursor)\n}", "title": "" }, { "docid": "f170bbac149484da44edc741b3b7c454", "score": "0.55093354", "text": "func FindOrderItem(ctx context.Context, exec boil.ContextExecutor, iD null.Int64, selectCols ...string) (*OrderItem, error) {\n\torderItemObj := &OrderItem{}\n\n\tsel := \"*\"\n\tif len(selectCols) > 0 {\n\t\tsel = strings.Join(strmangle.IdentQuoteSlice(dialect.LQ, dialect.RQ, selectCols), \",\")\n\t}\n\tquery := fmt.Sprintf(\n\t\t\"select %s from \\\"order_items\\\" where \\\"id\\\"=?\", sel,\n\t)\n\n\tq := queries.Raw(query, iD)\n\n\terr := q.Bind(ctx, exec, orderItemObj)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"models: unable to select from order_items\")\n\t}\n\n\treturn orderItemObj, nil\n}", "title": "" }, { "docid": "2329c4036a85386632506dbf5728ee64", "score": "0.54772526", "text": "func getInventoryBySKU(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\tparams := mux.Vars(r)\n\tsku := params[\"sku\"]\n\tfound := -1\n\n\tproductSKU, err := strconv.Atoi(sku)\n\tif productSKU < 1 {\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tw.Write([]byte(\"400 - Invalid product SKU.\"))\n\t\treturn\n\t}\n\n\ttx, err := db.Begin()\n\tif err != nil {\n\t\treturn\n\t}\n\n\tdefer func() {\n\t\tswitch err {\n\t\tcase nil:\n\t\t\terr = tx.Commit()\n\t\tdefault:\n\t\t\ttx.Rollback()\n\t\t}\n\t}()\n\n\t// former fancy join line, rows, err = tx.Query(\"SELECT * FROM Inventory INNER JOIN Product ON Inventory.ProductID = Product.ProductID WHERE SKU = ?\", sku); err != nil\n\tvar rows *sql.Rows\n\tif rows, err = tx.Query(\"SELECT I.*, P.SKU FROM Inventory I INNER JOIN Product P ON I.ProductID = P.ProductID WHERE P.SKU = ?\", sku); err != nil {\n\t\tfmt.Println(\"inventory.go - getInventoryBySKU - tx.Query error selecting inventory sku: \" + sku)\n\t\tfmt.Println(err)\n\t\tjson.NewEncoder(w).Encode(err)\n\t\treturn\n\t}\n\tdefer rows.Close()\n\n\tinv := make([]*models.Inventory, 0)\n\tfor rows.Next() {\n\t\ti := new(models.Inventory)\n\t\terr := rows.Scan(&i.InventoryID, &i.Quantity, &i.DateLastUpdated, &i.Deleted, &i.ProductID, &i.SKU)\n\t\tif err != nil {\n\t\t\t//More error handling\n\t\t\tfmt.Println(\"2\")\n\t\t\tfmt.Println(err)\n\t\t}\n\t\tif i.Deleted == 1 {\n\t\t\tinv = append(inv, i)\n\t\t\tw.WriteHeader(http.StatusNotFound)\n\t\t\tw.Write([]byte(\"404 - Product not found\"))\n\t\t\treturn\n\t\t}\n\t\tfound = productSKU\n\t\tinv = append(inv, i)\n\t}\n\tif err = rows.Err(); err != nil {\n\t\t//Error handling\n\t\tfmt.Println(\"inventory.go - getInventoryBySKU - rows.Err()\")\n\t\tfmt.Println(err)\n\t}\n\n\t//STILL NEED THIS FOR IF ITS NOT FOUND\n\tif found == -1 {\n\t\tw.WriteHeader(http.StatusNotFound)\n\t\tw.Write([]byte(\"404 - Inventory not found\"))\n\t\treturn\n\t}\n\tw.WriteHeader(http.StatusOK)\n\tjson.NewEncoder(w).Encode(inv)\n}", "title": "" }, { "docid": "2d173136030cb089f92ec63e136bfcf3", "score": "0.54117036", "text": "func dbGetSumQuantitySell() Qresult {\n\tdb := database.GormConnect()\n\tdefer db.Close()\n\tvar qresultSell Qresult\n\tdb.Table(\"b_models\").Select(\"sum(quantity) as totalquantity\").Where(\"sell_buy = ?\", \"sell\").Scan(&qresultSell) // sum of sell items\n\treturn qresultSell\n}", "title": "" }, { "docid": "e2b1ad436985bcda907d4c1e203282cf", "score": "0.53906155", "text": "func ConsumeStockEQ(v int) predicate.Item {\n\treturn predicate.Item(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldConsumeStock), v))\n\t})\n}", "title": "" }, { "docid": "edb6cd53b1644e32f3a78caab70f6e5b", "score": "0.53664905", "text": "func FindStock(exec boil.Executor, stockID int, selectCols ...string) (*Stock, error) {\n\tstockObj := &Stock{}\n\n\tsel := \"*\"\n\tif len(selectCols) > 0 {\n\t\tsel = strings.Join(strmangle.IdentQuoteSlice(dialect.LQ, dialect.RQ, selectCols), \",\")\n\t}\n\tquery := fmt.Sprintf(\n\t\t\"select %s from \\\"stock\\\" where \\\"stock_id\\\"=$1\", sel,\n\t)\n\n\tq := queries.Raw(exec, query, stockID)\n\n\terr := q.Bind(stockObj)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"chado: unable to select from stock\")\n\t}\n\n\treturn stockObj, nil\n}", "title": "" }, { "docid": "0da0dd14a10e83caf87ad558139df483", "score": "0.53566986", "text": "func TestInventoryRepo_UpdateInventoryQty(t *testing.T) {\n\trepo := InitInventoryRepo()\n\tid := setupInventoryRow(repo)\n\n\tlog.Printf(\"testing product id: %v\", id)\n\tlog.Printf(\"fetching inventory row of id %v ...\", id)\n\tinv, err := repo.FindProductInventory(id)\n\tif err != nil {\n\t\ttestFailed(t, err)\n\t}\n\n\tlog.Printf(\"success, qty of row id %v = %v\", id, inv.Quantity)\n\n\twg := sync.WaitGroup{}\n\n\tfor i := 0; i < 50; i++ {\n\t\twg.Add(1)\n\n\t\tgo func(loop int) {\n\t\t\trepo.UpdateInventoryQty(id, 1)\n\t\t\twg.Done()\n\t\t}(i)\n\t}\n\n\twg.Wait()\n\n\tinv, err = repo.FindProductInventory(id)\n\tif err != nil {\n\t\ttestFailed(t, err)\n\t}\n\n\tlog.Printf(\"test finished, qty of row id %v = %v\", id, inv.Quantity)\n\tassert.Equal(t, int64(0), inv.Quantity, \"Qty should 0\")\n}", "title": "" }, { "docid": "790e3e0b9b5a867210fd2c14ca9a6150", "score": "0.53278315", "text": "func UpdateQty(c *gin.Context) {\n\tlineid, _ := strconv.Atoi(c.Param(\"lineid\"))\n\tcartid := c.PostForm(\"cart\")\n\tnewQty, _ := strconv.Atoi(c.PostForm(\"qty\"))\n\tvar cartLine CartLine\n\n\terr := Dbmap.SelectOne(&cartLine, \"select * from cartlines where ID = :line and Cart = :cart\", map[string]interface{}{\n\t\t\"cart\": cartid,\n\t\t\"line\": lineid,\n\t})\n\n\tif err != nil { //If the line cannot be found, return an error straight away\n\t\tc.String(http.StatusServiceUnavailable, \"\")\n\t} else { //else proceed with the update\n\t\tif newQty == 0 { //If the quantity is being set to 0 then delete the line\n\t\t\t_, err := Dbmap.Delete(&cartLine)\n\t\t\tif err != nil {\n\t\t\t\tc.String(http.StatusServiceUnavailable, \"\")\n\t\t\t} else {\n\t\t\t\tc.String(http.StatusOK, \"\")\n\t\t\t}\n\t\t} else { //else adjust the quantity and update the database\n\t\t\tcartLine.Qty = newQty\n\t\t\t_, err := Dbmap.Update(&cartLine)\n\t\t\tif err != nil {\n\t\t\t\tc.String(http.StatusServiceUnavailable, \"\")\n\t\t\t} else {\n\t\t\t\tc.String(http.StatusOK, \"\")\n\t\t\t}\n\t\t}\n\t}\n\n}", "title": "" }, { "docid": "407b9fe76328b5d0f75d937bfa491a96", "score": "0.52539885", "text": "func dbGetSumQuantityBuy() Qresult {\n\tdb := database.GormConnect()\n\tdefer db.Close()\n\tvar qresultBuy Qresult\n\tdb.Table(\"b_models\").Select(\"sum(quantity) as totalquantity\").Where(\"sell_buy = ?\", \"buy\").Scan(&qresultBuy) // sum of buy items\n\tlog.Println(qresultBuy.Totalquantity)\n\treturn qresultBuy\n}", "title": "" }, { "docid": "2f983337b52aa0eddc71aa1a6a1a253b", "score": "0.52416956", "text": "func findTblRow(q cq.Quote) int {\n\tswitch q.ID {\n\tcase \"BTC/USD\":\n\t\treturn 1\n\tcase \"BTC/EUR\":\n\t\treturn 2\n\tcase \"BTC/GBP\":\n\t\treturn 3\n\tcase \"BTC/JPY\":\n\t\treturn 4\n\tcase \"BCH/USD\":\n\t\treturn 5\n\tcase \"BCH/BTC\":\n\t\treturn 6\n\tcase \"ETH/USD\":\n\t\treturn 7\n\tcase \"ETH/BTC\":\n\t\treturn 8\n\tcase \"ETH/EUR\":\n\t\treturn 9\n\tcase \"ETH/GBP\":\n\t\treturn 10\n\tcase \"ETH/JPY\":\n\t\treturn 11\n\tcase \"LTC/USD\":\n\t\treturn 12\n\tcase \"LTC/BTC\":\n\t\treturn 13\n\tcase \"ZEC/USD\":\n\t\treturn 14\n\tcase \"ZEC/BTC\":\n\t\treturn 15\n\tcase \"ZRX/USD\":\n\t\treturn 16\n\t// case \"ZRX/BTC\":\n\tdefault:\n\t\treturn 17\n\t}\n}", "title": "" }, { "docid": "832369695bf5f3d363f49f58f3e63784", "score": "0.5238853", "text": "func (t *MysqlTable) Find(terms ...interface{}) db.Item {\n\n\tvar item db.Item\n\n\tterms = append(terms, db.Limit(1))\n\n\tresult := t.invoke(\"FindAll\", terms)\n\n\tif len(result) > 0 {\n\t\tresponse := result[0].Interface().([]db.Item)\n\t\tif len(response) > 0 {\n\t\t\titem = response[0]\n\t\t}\n\t}\n\n\treturn item\n}", "title": "" }, { "docid": "dfa69f65427aeb009d10c088f8b7171f", "score": "0.5231246", "text": "func ConsumeStock(v int) predicate.Item {\n\treturn predicate.Item(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldConsumeStock), v))\n\t})\n}", "title": "" }, { "docid": "083b6378df71f4bfd0420f2b2546d910", "score": "0.519679", "text": "func (m Message) GetOrderQty(f *field.OrderQtyField) quickfix.MessageRejectError {\n\treturn m.Body.Get(f)\n}", "title": "" }, { "docid": "03f46f5c6f758ff201f376256e5e06d4", "score": "0.5167424", "text": "func (w *Wallet) SweepedQty(walletAddress string) (string, error) {\n\n\tdata, err := w.abi.Pack(\"SweepedQty\")\n\tc := tx.CallParams{\n\t\tTo: walletAddress,\n\t\tData: \"0x\" + common.Bytes2Hex(data),\n\t}\n\t//cList := make([]tx.CallParams, 1)\n\tcList := make([]interface{}, 2)\n\tcList[0] = c\n\tcList[1] = \"latest\"\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t\treturn \"\", err\n\t}\n\n\tpackedData, err := w.gateway.Call(walletAddress, 0, walletAddress, cList)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t\treturn \"\", err\n\t}\n\n\tlog.Println(string(packedData))\n\tvar v *big.Int\n\terr = w.abi.Unpack(&v, \"SweepedQty\", packedData)\n\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t\treturn \"\", err\n\t}\n\tlog.Println(string(packedData))\n\tlog.Println(\"SweepedQty is :\", v.String())\n\treturn v.String(), nil\n}", "title": "" }, { "docid": "7d3585892bf9ac376c0d0688c63ecf65", "score": "0.5165738", "text": "func FindStockP(exec boil.Executor, stockID int, selectCols ...string) *Stock {\n\tretobj, err := FindStock(exec, stockID, selectCols...)\n\tif err != nil {\n\t\tpanic(boil.WrapErr(err))\n\t}\n\n\treturn retobj\n}", "title": "" }, { "docid": "819e54a175322d03f511f3063f08dd02", "score": "0.5157687", "text": "func searchSparepart(arr sparepart, total *int, key string, merk string) DetailSparepart {\r\n\tvar i, found int\r\n\tvar status bool\r\n\tstatus = false\r\n\ti = 0\r\n\tfound = 9999\r\n\t\tfor i < *total && !status {\r\n\t\t\tif arr[i].Nama == key && arr[i].Pabrik == merk {\r\n\t\t\t\tstatus = true\r\n\t\t\t\tfound = i\r\n\t\t\t}\r\n\t\ti++\r\n\t\t}\r\n\t\t\tif status == false {\r\n\t\t\t\tfmt.Println(\"PASTIKAN BAHWA NAMA SPAREPART DAN MERKNYA BENAR!\")\r\n\t\t\t}\r\n\treturn arr[found]\r\n}", "title": "" }, { "docid": "ec26f960a3950935043e22c17f3dccd8", "score": "0.51555425", "text": "func ConsumeStockNEQ(v int) predicate.Item {\n\treturn predicate.Item(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldConsumeStock), v))\n\t})\n}", "title": "" }, { "docid": "287083a9eecc88c59bc492f3ae3f2fd5", "score": "0.5051925", "text": "func TotalStockEQ(v int) predicate.Item {\n\treturn predicate.Item(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldTotalStock), v))\n\t})\n}", "title": "" }, { "docid": "d8aeeb958bb2a5e85a42cca61a81a256", "score": "0.49775895", "text": "func setupInventoryRow(repo IInventoryRepo) int64 {\n\trand.Seed(time.Now().UnixNano())\n\tmin := 10\n\tmax := 500\n\tid := int64(rand.Intn(max-min+1) + min)\n\tqty := int64(5)\n\n\tinv := entity.Inventory{\n\t\tProductID: id,\n\t\tQuantity: qty,\n\t}\n\n\tcInv, err := repo.FindProductInventory(id)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tif cInv.ID == 0 {\n\t\terrCreate := repo.CreateProductInventory(inv)\n\t\tif errCreate != nil {\n\t\t\tpanic(errCreate)\n\t\t}\n\t} else {\n\t\terrUpdate := repo.UpdateProductQty(id, qty)\n\t\tif errUpdate != nil {\n\t\t\tpanic(errUpdate)\n\t\t}\n\t}\n\n\treturn id\n}", "title": "" }, { "docid": "4c3a27a0483e3fbf8241b9061375f1fe", "score": "0.49737668", "text": "func FindItem(o string) ([]Item, error) {\n\tvar m []Item\n\trows, err := TWSctx.Prepstmt.FindItem.Query(TWSctx.Node, o)\n\tif err != nil {\n\t\treturn m, err\n\t}\n\tdefer rows.Close()\n\tfor rows.Next() {\n\t\tvar a Item\n\t\treadTWSItems(rows, &a)\n\t\tm = append(m, a)\n\t}\n\treturn m, nil\n}", "title": "" }, { "docid": "a45a7f11e6f7da6c573235d96ca173e7", "score": "0.49427012", "text": "func (m Message) OrderQty() (*field.OrderQtyField, quickfix.MessageRejectError) {\n\tf := &field.OrderQtyField{}\n\terr := m.Body.Get(f)\n\treturn f, err\n}", "title": "" }, { "docid": "6c5de5e6d52b8de39fd12b0f5d96ead3", "score": "0.48947883", "text": "func (m Message) GetMinQty(f *field.MinQtyField) quickfix.MessageRejectError {\n\treturn m.Body.Get(f)\n}", "title": "" }, { "docid": "e4c832432800dfdeec89a520bc909c4e", "score": "0.48919907", "text": "func FindByItemID(id uint) model.Item {\n\tdb := model.DBConnect()\n\tresult, err := db.Query(\"SELECT * FROM item WHERE id = ?\", id)\n\tif err != nil {\n\t\tpanic(err.Error())\n\t}\n\titem := model.Item{}\n\tfor result.Next() {\n\t\tvar id, userID, price, stockFlg uint\n\t\tvar name string\n\t\tvar createdAt, updatedAt time.Time\n\n\t\terr = result.Scan(&id, &userID, &name, &price, &stockFlg, &createdAt, &updatedAt)\n\t\tif err != nil {\n\t\t\tpanic(err.Error())\n\t\t}\n\n\t\titem.ID = id\n\t\titem.UserID = userID\n\t\titem.Name = name\n\t\titem.Price = price\n\t\titem.StockFlg = stockFlg\n\t\titem.CreatedAt = createdAt\n\t\titem.UpdatedAt = updatedAt\n\t}\n\treturn item\n}", "title": "" }, { "docid": "9918e730d3e54f68ec53acb333210787", "score": "0.48711678", "text": "func (self *qbsWrapped) Find(id int64, pb PBundle) (interface{}, error) {\n\treturn self.applyPolicy(pb, func(tx *qbs.Qbs) (interface{}, error) {\n\t\treturn self.find.FindQbs(id, pb, tx)\n\t})\n}", "title": "" }, { "docid": "36ecea8c3c551d01c6954a20a4c89650", "score": "0.48592874", "text": "func FindOrderItemG(ctx context.Context, iD null.Int64, selectCols ...string) (*OrderItem, error) {\n\treturn FindOrderItem(ctx, boil.GetContextDB(), iD, selectCols...)\n}", "title": "" }, { "docid": "18383a7f6b224271f6047a864bd4f08c", "score": "0.48587644", "text": "func (s *catalogServiceServer) FindItems(ctx context.Context, req *v1.Specification) (*v1.Response, error) {\n // check api version\n if err := s.checkAPI(req.Api); err != nil {\n return nil, err\n }\n\n // get SQL connection\n c, err := s.connect(ctx)\n if err != nil {\n return nil, err\n }\n defer c.Close()\n\n item_id := 0\n if req.PageNum > 1 {\n item_id = 20 * int((req.PageNum - 1))\n }\n\n // add caching logic here\n\n // Query database\n rows, err := c.QueryContext(ctx, \"SELECT id, vendorid, blueessence, riotpoints, solo, flex, pricedollars, pricecents, level FROM items WHERE id > ? AND solo=? OR flex=? ORDER BY id ASC LIMIT 20\", item_id, req.Solo, req.Flex)\n if err != nil {\n return nil, status.Error(codes.Unknown, \"failed to query items: \"+err.Error())\n }\n defer rows.Close()\n\n list := []*v1.Item{}\n for rows.Next() {\n it := new(v1.Item)\n if err := rows.Scan(&it.Id, &it.VendorId, &it.BlueEssence, &it.RiotPoints, &it.Solo, &it.Flex, &it.PriceDollars, &it.PriceCents, &it.Level); err != nil {\n return nil, status.Error(codes.Unknown, \"failed to retrieve field values from item row-> \"+err.Error())\n }\n list = append(list, it)\n }\n\n if err := rows.Err(); err != nil {\n return nil, status.Error(codes.Unknown, \"failed to retrieve data from item-> \"+err.Error())\n }\n\n return &v1.Response{\n Api: apiVersion,\n Items: list,\n }, nil\n\n}", "title": "" }, { "docid": "53a3db43dba3fe078ae098ad65909acf", "score": "0.48366717", "text": "func (j *JsonQImpl) FindInt(fields ...string) (int, error) {\n\treturn j.jq.Int(fields...)\n}", "title": "" }, { "docid": "fd5853e298901de3190c27dc090a9799", "score": "0.4832472", "text": "func find(slice []product, val string) (*product, bool) {\n\tfor _, item := range slice {\n\t\tif item.Name == val {\n\t\t\treturn &item, true\n\t\t}\n\t}\n\treturn nil, false\n}", "title": "" }, { "docid": "53b7147569a425cab29d7505b64d7c69", "score": "0.482108", "text": "func getCurrentStock(id int) int {\n\tfile, _ := ioutil.ReadFile(\"data/products.json\")\n\tdata := []Product{}\n\t_ = json.Unmarshal([]byte(file), &data)\n\n\tfor _, prod := range data {\n\t\tif prod.ID == id {\n\t\t\treturn prod.Quantity\n\t\t}\n\t}\n\n\treturn 0\n\n}", "title": "" }, { "docid": "f926d45ffbe797f0d7ba81dd761df87d", "score": "0.48136982", "text": "func TotalStockNEQ(v int) predicate.Item {\n\treturn predicate.Item(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldTotalStock), v))\n\t})\n}", "title": "" }, { "docid": "55dd93b11365a8c69f1eb2ac16342632", "score": "0.48067284", "text": "func (slice *counterSlice) find(value float32) int {\n\tfor pos, v := range *slice {\n\t\tif v.price == value {\n\t\t\treturn pos\n\t\t}\n\t}\n\treturn -1\n}", "title": "" }, { "docid": "33559f3a859e93c1f9f3f3280841af11", "score": "0.47855633", "text": "func TestInventoryRepo_UpdateInventoryQtyRaceCondition(t *testing.T) {\n\trepo := InitInventoryRepo()\n\tid := setupInventoryRow(repo)\n\n\tlog.Printf(\"testing product id: %v\", id)\n\tlog.Printf(\"fetching inventory row of id %v ...\", id)\n\tinv, err := repo.FindProductInventory(id)\n\tif err != nil {\n\t\ttestFailed(t, err)\n\t}\n\n\tlog.Printf(\"success, qty of row id %v = %v\", id, inv.Quantity)\n\n\twg := sync.WaitGroup{}\n\n\tfor i := 0; i < 50; i++ {\n\t\twg.Add(1)\n\n\t\tgo func(loop int) {\n\t\t\trepo.UpdateInventoryQtyRaceCondition(id, 1)\n\t\t\twg.Done()\n\t\t}(i)\n\t}\n\n\twg.Wait()\n\n\tinv, err = repo.FindProductInventory(id)\n\tif err != nil {\n\t\ttestFailed(t, err)\n\t}\n\n\tlog.Printf(\"test finished, qty of row id %v = %v\", id, inv.Quantity)\n\n\tif inv.Quantity > 0 {\n\t\tt.Errorf(\"expected result is negative value\")\n\t}\n}", "title": "" }, { "docid": "9ee01bc0513dc08275dafef1c7fe5583", "score": "0.47739446", "text": "func DecodeFindItemRequest(_ context.Context, r *http.Request) (interface{}, error) {\n\tvar request findItemRequest\n\tif err := json.NewDecoder(r.Body).Decode(&request); err != nil {\n\t\tfmt.Printf(\"error inside transport %s\", err.Error())\n\t\treturn nil, err\n\t}\n\tfmt.Println(request.ProdID)\n\n\treturn request, nil\n}", "title": "" }, { "docid": "54fea2e70dfff5666cc97ec120e91079", "score": "0.47679332", "text": "func getItem(f finder, id int) (*ShopItem, error) {\n\tres := f.FindOne(context.Background(), bson.D{{\"id\", id}})\n\tvar item ShopItem\n\terr := res.Decode(&item)\n\treturn &item, err\n}", "title": "" }, { "docid": "b1f9e729b95e9e7ded03ff7e1f5452a2", "score": "0.47663853", "text": "func (m Message) GetQtyType(f *field.QtyTypeField) quickfix.MessageRejectError {\n\treturn m.Body.Get(f)\n}", "title": "" }, { "docid": "730dd63a9d40d83ad49e1f11d8cc2754", "score": "0.47663313", "text": "func (t *SimpleChaincode) updateQuantity(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\n\tvar poid string // Entities\n\tif len(args) != 3 {\n\t\treturn shim.Error(\"Incorrect number of arguments. Expecting 3\")\n\t}\n\tpoid = args[1]\n\t// Query the purchase order from the state in ledger\n\tbytes, err := stub.GetState(poid)\n\tif err != nil {\n\t\treturn shim.Error(\"Unable to get the purchase order\")\n\t}\n\tvar po Purchase_Order\n\terr = json.Unmarshal(bytes, &po)\n\tif err != nil {\n\t\treturn shim.Error(\"Error while unmarshalling JSON object\")\n\t}\n\ttemp,err := strconv.Atoi(args[2])\n\tif err != nil {\n\t\treturn shim.Error(\"The entered value is not an integer\")\n\t}\n\tif temp < 0 {\n\t\treturn shim.Error(\"The entered value has to be positive\")\n\t}\n\tpo.Quantity = temp\n\tresp := t.save_order(stub, po)\n\tif resp != true {\n\t\tfmt.Println(\"UPDATE_PO: Error saving changes: %s\", resp);\n\t\treturn shim.Error(\"Error saving changes\")\n\t}\n\treturn shim.Success([]byte(\"Successfully updated quantity of order\"+args[1]+\" to \"+args[2]))\n}", "title": "" }, { "docid": "1a509f34e117c628836d6ef11a73129b", "score": "0.47606695", "text": "func (m Message) MinQty() (*field.MinQtyField, quickfix.MessageRejectError) {\n\tf := &field.MinQtyField{}\n\terr := m.Body.Get(f)\n\treturn f, err\n}", "title": "" }, { "docid": "7a3d57b4297f9b9eb5cf9c1206c560df", "score": "0.471635", "text": "func GetItemWithId(w http.ResponseWriter, r *http.Request) {\n\tvars := mux.Vars(r)\n\tfind := false\n\tid, err := strconv.Atoi(vars[\"id\"])\n\tif err != nil {\n\t\tfmt.Println(err)\n\t} else {\n\t\tfmt.Println(id)\n\t}\n\n\tfor _, item := range Items {\n\t\tif item.Id == id {\n\t\t\tfind = true\n\t\t\tjson.NewEncoder(w).Encode(item)\n\t\t}\n\t}\n\tif !find {\n\t\tw.WriteHeader(http.StatusNotFound) // Изменить статус код запроса на 404\n\t\tvar erM = ErrorMessage{Message: \"Error: This item doesn't exist\"}\n\t\tjson.NewEncoder(w).Encode(erM)\n\t}\n}", "title": "" }, { "docid": "54ea00bc2b89cfbc8be1ef9fb34374ef", "score": "0.47125438", "text": "func (t *SimpleChaincode) search_product (stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\tvar name, jsonResp string\n\tvar err error\n\n\tif len(args) != 3 {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting name of the var to query\")\n\t}\n\n\tname = args[0]\n\tvar searchKey = args[1]\n\tvar searchVal = args[2]\n\n\n\tfmt.Println(\"in search -- name = \"+ name)\n\tfmt.Println(\"in search -- key = \"+ searchKey)\n\tfmt.Println(\"in search -- val = \"+ searchVal)\n\n\n\tproductsAsBytes, err := stub.GetState(name)\t\t\t\t\t\t\t\t\t//get the var from chaincode state\n\tif err != nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + name + \"\\\"}\"\n\t\treturn nil, errors.New(jsonResp)\n\t}\n\n\tfmt.Println(\"************* PRODUCT BYTES\" )\n\tfmt.Println(productsAsBytes)\n\n\tvar productIndex []string\n\tjson.Unmarshal(productsAsBytes, &productIndex)\t\t\t\t\t\t\t\t//un stringify it aka JSON.parse()\n\n\tfmt.Println(\"unmarshalled product json\" )\n\tfmt.Println(productIndex)\n\n\n\tvar productJson []string\n//\tvar readerr error\n\tvar errResp string\n\n\tfor i,val := range productIndex{\n\t\tfmt.Println(strconv.Itoa(i) + \" - looking at \" + val )\n\n\t\tprodAsBytes, err := stub.GetState(val)\n\t\tif err != nil {\n\t\t\terrResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + val + \"\\\"}\"\n\t\t\treturn nil, errors.New(errResp)\n\t\t}\n\t\t\n\t\tjson.Unmarshal(prodAsBytes, &productJson)\n\t\tfmt.Println(\"************* individual product\" )\n\t\tfmt.Println(productJson)\t\t\n\t\t\t\t\t\t\t\t\t\t//un stringify it aka JSON.parse()\t\t\n\t}\n\treturn productsAsBytes, nil\t\t\t\t\t\t\t\t\t\t\t\t\t//send it onward\n}", "title": "" }, { "docid": "7c2fa3d3131766890bf37b6af6fe1665", "score": "0.4703716", "text": "func ConsumeStockGTE(v int) predicate.Item {\n\treturn predicate.Item(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldConsumeStock), v))\n\t})\n}", "title": "" }, { "docid": "5ce40e9e819fe6314bb006d6593aa2e9", "score": "0.4699548", "text": "func (c *Contract) Find(value []byte) (util.Uint256, uint32, error) {\n\treturn c.actor.SendCall(c.hash, \"find\", value)\n}", "title": "" }, { "docid": "a425e8c5bc9473097f976d217690fb05", "score": "0.4673878", "text": "func LogItemFind(le LogItem, query map[string]string) int {\n\tmatched := 1\n\tfor k, v := range query {\n\t\t// Uppercase of filed's name first letter\n\t\tn := strings.Title(k)\n\t\t// Find field in structure by Titlized() name 'n'\n\t\tr := reflect.ValueOf(le)\n\t\tf := fmt.Sprint(reflect.Indirect(r).FieldByName(n))\n\t\tmatched, err := regexp.Match(v, []byte(f))\n\t\tif err != nil {\n\t\t\treturn -1\n\t\t}\n\t\tif matched == false {\n\t\t\treturn 0\n\t\t}\n\t}\n\treturn matched\n}", "title": "" }, { "docid": "604c3a85e373bf7c01f375e98fdbe3dd", "score": "0.4671519", "text": "func (m *LineItemMutation) Quantity() (r int, exists bool) {\n\tv := m.quantity\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "title": "" }, { "docid": "0ac37f1ec2d1858fb1d1f22d6cca456e", "score": "0.4664258", "text": "func (repository *Repository) Find(id string) interface{} {\n\tctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)\n\tdefer cancel()\n\n\tparams := &dynamodb.GetItemInput{\n\t\tKey: map[string]*dynamodb.AttributeValue{\n\t\t\t\"id\": {\n\t\t\t\tS: aws.String(id),\n\t\t\t},\n\t\t},\n\t}\n\n\tdata, _ := repository.client.GetItemWithContext(ctx, params)\n\n\tfmt.Println(\"Finding data using dynamodb database\")\n\tfmt.Printf(\"Id: %s \\n\", id)\n\n\treturn data\n}", "title": "" }, { "docid": "03c036c04c23aafcf993a581a066bc5b", "score": "0.46619597", "text": "func QbsWrapFind(finder QbsRestFind, s *QbsStore) RestFind {\n\treturn &qbsWrapped{find: finder, store: s}\n}", "title": "" }, { "docid": "99d77343ffa03f616df6aa709770d07a", "score": "0.46536425", "text": "func queryItem(key string) int {\n\t// Vernon debug\n\tfmt.Println(ItemURL+\"items/\"+key)\n\n\t// Send request\n\tresp, err := http.Get(ItemURL+\"items/\"+key)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn 1\n\t}\n\n\t// Print status\n\tfmt.Println(resp.Status, resp.StatusCode)\n\n\t// Get body\n\tdefer resp.Body.Close()\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn 1\n\t}\n\n\t// Decode body\n\tvar item Item\n\tif resp.StatusCode == http.StatusOK {\n\t\t// Decode as JSON\n\t\tif err := json.Unmarshal(body, &item); err != nil {\n\t\t\tfmt.Println(err, \"in decoding JSON\", body)\n\t\t\treturn 1\n\t\t}\n\t\tfmt.Println(item)\n\t\t// Vernon debug\n\t\tfmt.Printf(\"%s\\n\", body)\n\t} else {\n\t\t// Decode as text\n\t\tfmt.Printf(\"%s\\n\", body)\n\t\treturn 1\n\t}\n\n\treturn 0\n}", "title": "" }, { "docid": "519a0b956b6c033cacffce6579c28074", "score": "0.4636476", "text": "func FindSummation(exec boil.Executor, iD int64, selectCols ...string) (*Summation, error) {\n\tsummationObj := &Summation{}\n\n\tsel := \"*\"\n\tif len(selectCols) > 0 {\n\t\tsel = strings.Join(strmangle.IdentQuoteSlice(dialect.LQ, dialect.RQ, selectCols), \",\")\n\t}\n\tquery := fmt.Sprintf(\n\t\t\"select %s from \\\"summations\\\" where \\\"id\\\"=?\", sel,\n\t)\n\n\tq := queries.Raw(query, iD)\n\n\terr := q.Bind(nil, exec, summationObj)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"models: unable to select from summations\")\n\t}\n\n\treturn summationObj, nil\n}", "title": "" }, { "docid": "60689f514820cdba7d4845d47e57478e", "score": "0.46361423", "text": "func (_IncognitoProxy *IncognitoProxyCaller) FindComm(opts *bind.CallOpts, blkHeight *big.Int, isBeacon bool) ([]byte, *big.Int, error) {\n\tvar (\n\t\tret0 = new([]byte)\n\t\tret1 = new(*big.Int)\n\t)\n\tout := &[]interface{}{\n\t\tret0,\n\t\tret1,\n\t}\n\terr := _IncognitoProxy.contract.Call(opts, out, \"findComm\", blkHeight, isBeacon)\n\treturn *ret0, *ret1, err\n}", "title": "" }, { "docid": "48ee2e124fae11aee37bc1ef4e96f635", "score": "0.46349147", "text": "func findMemoryItemPriceId(items []datatypes.Product_Item, d dataRetriever) (datatypes.Product_Item_Price, error) {\n\tmemory := d.Get(\"memory\").(int)\n\tavailableMemories := \"\"\n\n\tfor _, item := range items {\n\t\tfor _, itemCategory := range item.Categories {\n\t\t\tif *itemCategory.CategoryCode == \"ram\" {\n\t\t\t\tavailableMemories = availableMemories + *item.KeyName + \"(\" + *item.Description + \")\" + \", \"\n\t\t\t\tif int(*item.Capacity) == memory {\n\t\t\t\t\tfor _, price := range item.Prices {\n\t\t\t\t\t\tif price.LocationGroupId == nil && !*price.BareMetalReservedCapacityFlag {\n\t\t\t\t\t\t\treturn datatypes.Product_Item_Price{Id: price.Id}, nil\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\treturn datatypes.Product_Item_Price{},\n\t\tfmt.Errorf(\"[ERROR] Could not find the price item for %d GB memory. Available items are %s\", memory, availableMemories)\n}", "title": "" }, { "docid": "346037e42cd7ec4414b63fc33943e398", "score": "0.46244717", "text": "func newCartQuery(parts []core.UberPart, multiplier int) cartQuery {\n\tcq := cartQuery{}\n\n\tfor _, part := range parts {\n\t\tcq.CartItems = append(cq.CartItems, cartQueryItem{\n\t\t\tMouserPartNumber: part.MouserPartNumber,\n\t\t\tQuantity: part.Quantity * model.APIUint(multiplier),\n\t\t})\n\t}\n\n\treturn cq\n}", "title": "" }, { "docid": "fdb61e34ad257462d63623801a69b586", "score": "0.4614896", "text": "func FindStockGP(stockID int, selectCols ...string) *Stock {\n\tretobj, err := FindStock(boil.GetDB(), stockID, selectCols...)\n\tif err != nil {\n\t\tpanic(boil.WrapErr(err))\n\t}\n\n\treturn retobj\n}", "title": "" }, { "docid": "758e5691c62ec8ade3997517969d3ef6", "score": "0.461143", "text": "func (self *qbsWrappedUdid) Find(id string, pb PBundle) (interface{}, error) {\n\treturn self.applyPolicy(pb, func(tx *qbs.Qbs) (interface{}, error) {\n\t\treturn self.find.FindQbs(id, pb, tx)\n\t})\n}", "title": "" }, { "docid": "89c30711512e6c8dd60a6e640e1b2efe", "score": "0.46066555", "text": "func findBeer(db *sql.DB, location string, beerName string) {\n\t// Check for wildcard\n\tvar request string\n\tif beerName == \"*\" {\n\t\trequest = \"SELECT * FROM beer ORDER BY brewery;\"\n\t} else {\n\t\trequest = \"SELECT * FROM beer WHERE name = '\" + beerName + \"';\"\n\t}\n\t// Query for all matching beers\n\trows, err := db.Query(request)\n\tif err != nil {\n\t\tfmt.Println(\"Internal error finding beers\")\n\t}\n\tdefer rows.Close()\n\n\t// Gets the stock of local vendors for a specific beer\n\tlocalStock, err := db.Prepare(\"SELECT v.name, IFNULL(i.quantity, 0) \" +\n\t\t\"FROM beer b CROSS JOIN vendor v \" +\n\t\t\"LEFT JOIN inventory i ON v.vid = i.vid AND b.name = i.beername AND b.brewery = i.brewery \" +\n\t\t\"WHERE v.location = ? \" +\n\t\t\"AND b.brewery = ? \" +\n\t\t\"AND b.name = ?;\")\n\tif err != nil {\n\t\tfmt.Println(\"There was a problem getting inventory information\")\n\t}\n\n\tvar name string\n\tvar brewery string\n\tvar abv float32\n\tvar ibu int\n\tvar vendorName string\n\tvar quantity int\n\tfor rows.Next() {\n\t\t// Get next beer and print\n\t\terr := rows.Scan(&name, &brewery, &abv, &ibu)\n\t\tif err != nil {\n\t\t\tcontinue\n\t\t}\n\t\tfmt.Printf(\"%s: %-35s %.1f ABV \\t %d IBU\\n\", brewery, name, abv, ibu)\n\n\t\t// Query for the local stock of this beer\n\t\tlocalVendors, err := localStock.Query(location, brewery, name)\n\t\tdefer localVendors.Close()\n\t\tif err != nil {\n\t\t\tfmt.Println(\" Could not get store information\")\n\t\t\tcontinue\n\t\t}\n\n\t\t// Print each vendor and associated stock\n\t\thasVendor := false\n\t\tfor localVendors.Next() {\n\t\t\thasVendor = true\n\t\t\terr = localVendors.Scan(&vendorName, &quantity)\n\t\t\tif err != nil {\n\t\t\t\tfmt.Println(\" Could not get store information\")\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tfmt.Printf(\" %-10s %d in stock\\n\", vendorName, quantity)\n\t\t}\n\t\tif !hasVendor {\n\t\t\tfmt.Println(\" No vendors found in \" + location)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "0b3e466e2778f658867fd224c601e5b9", "score": "0.4605392", "text": "func (d *ResultDao) SearchByGift(prizeID int) []models.Result {\n\tdataList := make([]models.Result, 0)\n\terr := d.engine.\n\t\tWhere(\"prize_id=?\", prizeID).\n\t\tAsc(\"id\").\n\t\tFind(&dataList)\n\tif err != nil {\n\t\tlog.Printf(\"Result dao SearchByUser() error: %v\\n\", err)\n\t}\n\treturn dataList\n}", "title": "" }, { "docid": "2f574050c01228b2e3222fb6abb94939", "score": "0.46012685", "text": "func findinvoice4Trade(stub shim.ChaincodeStubInterface, user string, color string, size int )(m invoice, err error){\n\tvar fail invoice;\n\tfmt.Println(\"- start find invoice 4 trade\")\n\tfmt.Println(\"looking for \" + user + \", \" + color + \", \" + strconv.Itoa(size));\n\n\t//get the invoice index\n\tinvoicesAsBytes, err := stub.GetState(invoiceIndexStr)\n\tif err != nil {\n\t\treturn fail, errors.New(\"Failed to get invoice index\")\n\t}\n\tvar invoiceIndex []string\n\tjson.Unmarshal(invoicesAsBytes, &invoiceIndex)\t\t\t\t\t\t\t\t//un stringify it aka JSON.parse()\n\t\n\tfor i:= range invoiceIndex{\t\t\t\t\t\t\t\t\t\t\t\t\t//iter through all the invoices\n\t\t//fmt.Println(\"looking @ invoice name: \" + invoiceIndex[i]);\n\n\t\tinvoiceAsBytes, err := stub.GetState(invoiceIndex[i])\t\t\t\t\t\t//grab this invoice\n\t\tif err != nil {\n\t\t\treturn fail, errors.New(\"Failed to get invoice\")\n\t\t}\n\t\tres := invoice{}\n\t\tjson.Unmarshal(invoiceAsBytes, &res)\t\t\t\t\t\t\t\t\t\t//un stringify it aka JSON.parse()\n\t\t//fmt.Println(\"looking @ \" + res.User + \", \" + res.Color + \", \" + strconv.Itoa(res.Size));\n\t\t\n\t\t//check for user && color && size\n\t\tif strings.ToLower(res.User) == strings.ToLower(user) && strings.ToLower(res.Color) == strings.ToLower(color) && res.Size == size{\n\t\t\tfmt.Println(\"found a invoice: \" + res.Name)\n\t\t\tfmt.Println(\"! end find invoice 4 trade\")\n\t\t\treturn res, nil\n\t\t}\n\t}\n\t\n\tfmt.Println(\"- end find invoice 4 trade - error\")\n\treturn fail, errors.New(\"Did not find invoice to use in this trade\")\n}", "title": "" }, { "docid": "e947e3d03452087e13647b0d5e7bfb8b", "score": "0.45941845", "text": "func IDEQ(id int) predicate.StockManager {\n\treturn predicate.StockManager(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldID), id))\n\t})\n}", "title": "" }, { "docid": "b84451dc7edcd67e13ca810c259ff849", "score": "0.4588706", "text": "func QbsWrapFindUdid(finder QbsRestFindUdid, s *QbsStore) RestFindUdid {\n\treturn &qbsWrappedUdid{find: finder, store: s}\n}", "title": "" }, { "docid": "427e1eef8849077cef44a4781cae1568", "score": "0.4573298", "text": "func (m Message) GetCashOrderQty(f *field.CashOrderQtyField) quickfix.MessageRejectError {\n\treturn m.Body.Get(f)\n}", "title": "" }, { "docid": "2120e584b39a8655e523502d3df86b1f", "score": "0.45725462", "text": "func (ids QU) Find(a int) int {\n\treturn ids.root(a)\n}", "title": "" }, { "docid": "fefafb1d82100a87c5c6dd57c730d91b", "score": "0.45585147", "text": "func (v View) find(id EntityID) (int, error) {\n\tfor i, si := range v.items {\n\t\tif si != nil {\n\t\t\tif !si.IsEmpty() {\n\t\t\t\tif si.ID() == id {\n\t\t\t\t\treturn i, nil\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn 0, ErrEntityNotFound\n}", "title": "" }, { "docid": "012a5335c5809b26b84bc2bd694ea3df", "score": "0.45526794", "text": "func (ss *ShopServer) queryItem(writer http.ResponseWriter, req *http.Request) {\n\tif exist, _ := ss.authorize(writer, req, ss.clientHub, false); !exist {\n\t\treturn\n\t}\n\t// var wg sync.WaitGroup\n\t// wg.Add(len(ss.ItemListCache) - 1)\n\t// // TODO data race\n\t// ss.ItemLock.Lock()\n\t// for i := 1; i < len(ss.ItemListCache); i++ {\n\t// \tgo func(i int) {\n\t// \t\t_, reply := ss.clientHub.Get(ItemsPriceKeyPrefix + strconv.Itoa(ss.ItemList[i].ID))\n\t// \t\tss.ItemListCache[i].Stock, _ = strconv.Atoi(reply.Value)\n\t// \t\twg.Done()\n\t// \t}(i)\n\t// }\n\t// wg.Wait()\n\t// ss.ItemsJSONCache, _ = json.Marshal(ss.ItemListCache[1:])\n\t// ss.ItemLock.Unlock()\n\n\twriter.WriteHeader(http.StatusOK)\n\twriter.Write(ss.ItemsJSONCache)\n\treturn\n}", "title": "" }, { "docid": "734dd16a4a14f450b19528d551e31b86", "score": "0.4545767", "text": "func (m *matchReader) ToQuantityString() string {\n\tif m.ord.Sell {\n\t\treturn precision8(calc.BaseToQuote(m.Rate, m.Qty))\n\t}\n\treturn precision8(m.Qty)\n}", "title": "" }, { "docid": "fbaf360b46914198dd6d94b392fc1dea", "score": "0.45439684", "text": "func Get_factor(customer string, cat string) (items []Recep, promo string, delivery string, off string, total string) {\n\n\tvar order Order\n\tvar itemsTemp []Recep\n\tvar goodTemp Good\n\tvar basketTotal float64\n\tvar userInfo User\n\tvar deliveryCost float64\n\tvar shopInfo Shop\n\tvar offSale float64\n\tvar promoTemp float64 = 0\n\tvar singleItem Recep\n\n\tsession, err := mgo.Dial(\"127.0.0.1\")\n\tif err != nil {\n\n\t\tlog.Print(\"\\n!!!!-- DB connection error:\")\n\t\tlog.Print(err)\n\t\tlog.Print(\"\\n\")\n\t\treturn nil, \"\", \"\", \"\", \"\"\n\t}\n\n\t/////////get order info\n\tdefer session.Close()\n\tsession.SetMode(mgo.Monotonic, true)\n\tc := session.DB(\"orderinfo\").C(\"order\")\n\terr = c.Find(bson.M{\"customer\": customer}).One(&order)\n\n\tif err != nil {\n\n\t\tlog.Print(\"\\n order query failed:\\n\")\n\t\tlog.Print(err)\n\t\treturn nil, \"\", \"\", \"\", \"\"\n\n\t} else {\n\n\t\tbasketTotal, _ = strconv.ParseFloat(order.Total, 64)\n\n\t\tc = session.DB(\"goods\").C(cat)\n\n\t\t///////get goods info for each element in cart\n\t\tfor _, element := range order.Cart {\n\n\t\t\tlog.Print(element)\n\t\t\tif !strings.Contains(element, \"@\") {\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tNoGood := strings.Split(element, \"@\")\n\t\t\tsingleItem.No = NoGood[0]\n\t\t\tsingleItem.ID = NoGood[1]\n\t\t\terr2 := c.FindId(bson.ObjectIdHex(singleItem.ID)).One(&goodTemp)\n\n\t\t\tif err2 != nil {\n\t\t\t\tlog.Print(\"\\n get element query failed:\\n\")\n\t\t\t\tlog.Print(err2)\n\t\t\t\treturn nil, \"\", \"\", \"\", \"\"\n\n\t\t\t} else {\n\n\t\t\t\tsingleItem.Name = goodTemp.Name\n\t\t\t\tsingleItem.Price = goodTemp.Price\n\t\t\t}\n\n\t\t\titemsTemp = append(itemsTemp, singleItem)\n\n\t\t}\n\n\t\t////////get user info\n\t\tc = session.DB(\"userinfo\").C(\"users\")\n\t\terr3 := c.Find(bson.M{\"phone\": customer}).One(&userInfo)\n\t\tif err3 != nil {\n\n\t\t\tlog.Print(\"\\n get user query failed:\\n\")\n\t\t\tlog.Print(err3)\n\t\t\treturn nil, \"\", \"\", \"\", \"\"\n\n\t\t} else {\n\n\t\t\tpromoTemp, _ = strconv.ParseFloat(userInfo.Promo, 64)\n\t\t}\n\t\t///////get shop info\n\t\tc = session.DB(\"shopinfo\").C(cat)\n\t\tlog.Print(order.Shop)\n\t\terr4 := c.Find(bson.M{\"phone\": order.Shop}).One(&shopInfo)\n\n\t\tif err4 != nil {\n\n\t\t\tlog.Print(\"\\n get shop query failed:\\n\")\n\t\t\tlog.Print(err4)\n\t\t\treturn nil, \"\", \"\", \"\", \"\"\n\n\t\t} else {\n\n\t\t\toffSale, _ = strconv.ParseFloat(shopInfo.Off, 64)\n\t\t\tdeliveryCost = calcDelivery(userInfo.X, userInfo.Y, shopInfo.X, shopInfo.Y)\n\t\t}\n\n\t\tif deliveryCost > promoTemp {\n\n\t\t\ttotal = strconv.FormatFloat(deliveryCost-promoTemp+(basketTotal*((100-offSale)/100)), 'f', 0, 64)\n\t\t\tlog.Print(\"\\ncond1:\\n\")\n\t\t\tlog.Print(total)\n\t\t\tlog.Print(basketTotal)\n\t\t\tlog.Print(offSale)\n\t\t\tlog.Print(deliveryCost - promoTemp + (basketTotal * ((100 - offSale) / 100)))\n\n\t\t} else {\n\n\t\t\ttotal = strconv.FormatFloat(basketTotal*((100-offSale)/100), 'f', 0, 64)\n\n\t\t}\n\n\t\treturn itemsTemp, userInfo.Promo, strconv.FormatFloat(deliveryCost, 'f', 0, 64), shopInfo.Off, total\n\n\t}\n\n}", "title": "" }, { "docid": "10d35951703af8b1cfce3ef28d68296b", "score": "0.4541985", "text": "func (invertedIndex *InvertedIndex) FindItem(Term string) int {\n\tfor index, item := range invertedIndex.Items {\n\t\tif item.Term == Term {\n\t\t\treturn index\n\t\t}\n\t}\n\tpanic(\"Not Found\")\n}", "title": "" }, { "docid": "02494829d967f5798ecec2dc4b32c502", "score": "0.45270133", "text": "func (i *Inventory) GetItemInfo(sku string) (*model.Stock, *errors.Error) {\n\tfoundItem, err := i.StockDatamapper.FindByID(sku)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfoundItemObj, ok := foundItem.(*model.Stock)\n\tif false == ok {\n\t\treturn nil, errors.Wrap(fmt.Errorf(\"Failed asserting returned model\"), 0)\n\t}\n\n\treturn foundItemObj, nil\n}", "title": "" }, { "docid": "fc11672f69bf1a578b0c70790298aeab", "score": "0.45219818", "text": "func (m *ItemMutation) Quantity() (r int, exists bool) {\n\tv := m.quantity\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "title": "" }, { "docid": "29782e935599dcef9b66ae5ec959dba8", "score": "0.45170122", "text": "func (m Message) CashOrderQty() (*field.CashOrderQtyField, quickfix.MessageRejectError) {\n\tf := &field.CashOrderQtyField{}\n\terr := m.Body.Get(f)\n\treturn f, err\n}", "title": "" }, { "docid": "ee868c1cc4c768bb6df14c43271bda74", "score": "0.45077172", "text": "func (m *OrderLineItemMutation) Quantity() (r int, exists bool) {\n\tv := m.quantity\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "title": "" }, { "docid": "d61ff15f3a09372aa47f9c36c36752fb", "score": "0.44924036", "text": "func (j *JSONQ) Find(path string) interface{} {\n\treturn j.From(path).Get()\n}", "title": "" }, { "docid": "d1cf082f2a01e716fb5c765628f5c174", "score": "0.44837368", "text": "func (t *Ticket) Query(str string) ([]int, error) {\n\tvar r []int\n\t_, err := t.client.Do(\"ticket.query\", &r, str)\n\treturn r, err\n}", "title": "" }, { "docid": "213d7c23aee699d0d20d948624593a41", "score": "0.44789317", "text": "func GetItemIndex(find int, a *[]int) (index int) {\n\ti := 0\n\tfor _, item := range *a {\n\t\tif find == item {\n\t\t\treturn i\n\t\t}\n\t\ti++\n\t}\n\treturn -1\n}", "title": "" }, { "docid": "1ebcccb62892dbffd0aa47279e6eb2dd", "score": "0.4468379", "text": "func (h *Expecter) Find(out interface{}, where ...interface{}) QueryExpectation {\n\t// store our call in the map\n\tvar args []interface{}\n\targs = append(args, out)\n\targs = append(args, where...)\n\th.callmap[\"Find\"] = args\n\n\treturn h.query()\n}", "title": "" }, { "docid": "da2762bb9b1aeb3188e5fa9ce80aed46", "score": "0.44640127", "text": "func updateInventory(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\tparams := mux.Vars(r)\n\tid := params[\"id\"]\n\tfound := -1\n\n\t//new stuff can easily change to work off of SKU\n\tinventoryID, err := strconv.Atoi(id)\n\tif inventoryID < 1 {\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tw.Write([]byte(\"400 - Invalid inventory ID.\"))\n\t\treturn\n\t}\n\n\tvar inventory models.Inventory\n\terr = json.NewDecoder(r.Body).Decode(&inventory)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\n\ttx, err := db.Begin()\n\tif err != nil {\n\t\treturn\n\t}\n\n\tdefer func() {\n\t\tswitch err {\n\t\tcase nil:\n\t\t\terr = tx.Commit()\n\t\tdefault:\n\t\t\ttx.Rollback()\n\t\t}\n\t}()\n\n\tvar rows *sql.Rows\n\tif rows, err = tx.Query(\"SELECT I.*, P.SKU FROM Inventory I INNER JOIN Product P ON I.ProductID = P.ProductID WHERE I.InventoryID = ?\", id); err != nil {\n\t\tw.WriteHeader(http.StatusNotFound)\n\t\tfmt.Println(\"inventory.go - getInventory - tx.Query error selecting inventory id: \" + id)\n\t\tfmt.Println(err)\n\t\tjson.NewEncoder(w).Encode(err)\n\t\treturn\n\t}\n\tdefer rows.Close()\n\n\tinv := make([]*models.Inventory, 0)\n\tfor rows.Next() {\n\t\ti := new(models.Inventory)\n\t\terr := rows.Scan(&i.InventoryID, &i.Quantity, &i.DateLastUpdated, &i.Deleted, &i.ProductID, &i.SKU)\n\t\tif err != nil {\n\t\t\t//More error handling\n\t\t\tfmt.Println(\"2\")\n\t\t\tfmt.Println(err)\n\t\t}\n\t\tif i.Deleted == 1 {\n\t\t\tinv = append(inv, i)\n\t\t\tw.WriteHeader(http.StatusNotFound)\n\t\t\tw.Write([]byte(\"404 - Product not found\"))\n\t\t\treturn\n\t\t}\n\t\tfound = inventoryID\n\t\tinv = append(inv, i)\n\t}\n\tif err = rows.Err(); err != nil {\n\t\t//Error handling\n\t\tfmt.Println(\"inventory.go - getInventory - rows.Err()\")\n\t\tfmt.Println(err)\n\t}\n\n\t//STILL NEED THIS FOR IF ITS NOT FOUND\n\tif found == -1 {\n\t\tw.WriteHeader(http.StatusNotFound)\n\t\tw.Write([]byte(\"404 - Product not found\"))\n\t\treturn\n\t}\n\n\tres, err := tx.Exec(\"UPDATE Inventory SET InventoryID = ?, Quantity = ?, DateLastUpdated = ?, Deleted = ?, ProductID = ? WHERE InventoryID = ?\", inv[0].InventoryID, params[\"quantity\"], time.Now(), inv[0].Deleted, inv[0].ProductID, id)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\tfmt.Println(\"1\")\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tw.Write([]byte(\"400\"))\n\t\treturn\n\t}\n\trowCnt, err := res.RowsAffected()\n\tif err != nil {\n\t\tfmt.Println(\"4\")\n\t\tfmt.Println(err)\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tw.Write([]byte(\"400 - Insert failed\"))\n\t\treturn\n\t}\n\tdefer rows.Close()\n\n\tfmt.Printf(\"update affected = %d\\n\", rowCnt)\n\n\tw.WriteHeader(http.StatusOK)\n}", "title": "" }, { "docid": "87ae71ac62140625da3ad47a6f3c2783", "score": "0.44585964", "text": "func ConsumeStockLTE(v int) predicate.Item {\n\treturn predicate.Item(func(s *sql.Selector) {\n\t\ts.Where(sql.LTE(s.C(FieldConsumeStock), v))\n\t})\n}", "title": "" }, { "docid": "72bc48da089d725f2a7422938a52d8b9", "score": "0.44549546", "text": "func GetProductBySku(c *gin.Context) {\n\tdb, err := gorm.Open(\"sqlite3\", dbPath)\n\tif err != nil {\n\t\tpanic(\"failed to connect database\")\n\t}\n\tdefer db.Close()\n\n\tvar product m.Product\n\tsku := c.Param(\"sku\")\n\n\tif err := db.Where(\"sku LIKE ?\", sku).Find(&product).Error; err != nil {\n\t\tc.JSON(http.StatusNotFound, gin.H{\"status\": http.StatusNotFound, \"message\": \"No product found!\"})\n\t\treturn\n\t}\n\n\tc.JSON(http.StatusOK, gin.H{\"status\": http.StatusOK, \"data\": product})\n}", "title": "" }, { "docid": "41bf79c6baed0c128c225def1e209022", "score": "0.44511324", "text": "func (m *ItemItemsItemWorkbookFunctionsFindBPostRequestBody) GetFindText()(iadcd81124412c61e647227ecfc4449d8bba17de0380ddda76f641a29edf2b242.Jsonable) {\n val, err := m.GetBackingStore().Get(\"findText\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(iadcd81124412c61e647227ecfc4449d8bba17de0380ddda76f641a29edf2b242.Jsonable)\n }\n return nil\n}", "title": "" }, { "docid": "53cc40d8fb54501c5851c4fb30ad88b6", "score": "0.44511226", "text": "func FindProcessedTransaction(exec boil.Executor, iD int, selectCols ...string) (*ProcessedTransaction, error) {\n\tprocessedTransactionObj := &ProcessedTransaction{}\n\n\tsel := \"*\"\n\tif len(selectCols) > 0 {\n\t\tsel = strings.Join(strmangle.IdentQuoteSlice(dialect.LQ, dialect.RQ, selectCols), \",\")\n\t}\n\tquery := fmt.Sprintf(\n\t\t\"select %s from \\\"processed_transaction\\\" where \\\"id\\\"=$1\", sel,\n\t)\n\n\tq := queries.Raw(query, iD)\n\n\terr := q.Bind(nil, exec, processedTransactionObj)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"models: unable to select from processed_transaction\")\n\t}\n\n\treturn processedTransactionObj, nil\n}", "title": "" }, { "docid": "24ec536787ddc67168a2d3df06a46d53", "score": "0.4451083", "text": "func (c *Splitter) GetQuantity() (quantity int) {return c.quantity}", "title": "" }, { "docid": "695ebd8a66c9bef41383985a9f12bceb", "score": "0.44506305", "text": "func (qs ProfitQuerySet) AmountEq(amount uint) ProfitQuerySet {\n\treturn qs.w(qs.db.Where(\"amount = ?\", amount))\n}", "title": "" }, { "docid": "108ee0414eca5333e6bae17b96af0c6f", "score": "0.44483113", "text": "func ConsumeStockLT(v int) predicate.Item {\n\treturn predicate.Item(func(s *sql.Selector) {\n\t\ts.Where(sql.LT(s.C(FieldConsumeStock), v))\n\t})\n}", "title": "" }, { "docid": "bdca055da6151cb5fd5c9f8264fe86b7", "score": "0.44436094", "text": "func ConsumeStockIn(vs ...int) predicate.Item {\n\tv := make([]interface{}, len(vs))\n\tfor i := range v {\n\t\tv[i] = vs[i]\n\t}\n\treturn predicate.Item(func(s *sql.Selector) {\n\t\t// if not arguments were provided, append the FALSE constants,\n\t\t// since we can't apply \"IN ()\". This will make this predicate falsy.\n\t\tif len(v) == 0 {\n\t\t\ts.Where(sql.False())\n\t\t\treturn\n\t\t}\n\t\ts.Where(sql.In(s.C(FieldConsumeStock), v...))\n\t})\n}", "title": "" }, { "docid": "ee5f49a7d38878975f93a5c6a4df1dd6", "score": "0.44396845", "text": "func findOreRequired(toProduce ingredient, rs []recipe, spare map[string]int) (int, map[string]int) {\n\tif toProduce.name == \"ORE\" {\n\t\treturn toProduce.quantity, spare\n\t}\n\n\tvar r recipe\n\tfor _, r = range rs {\n\t\tif r.produces.name == toProduce.name {\n\t\t\tbreak\n\t\t}\n\t}\n\n\tvar oreUsed, quantity int\n\n\tif s, ok := spare[toProduce.name]; ok {\n\t\tquantity += s\n\t\tspare[toProduce.name] = 0\n\t}\n\n\tnum := int(math.Ceil(float64(toProduce.quantity-quantity) / float64(r.produces.quantity)))\n\tif num > 0 {\n\t\tfor _, i := range r.requires {\n\t\t\tvar o int\n\t\t\ti.quantity *= num\n\t\t\to, spare = findOreRequired(i, rs, spare)\n\t\t\toreUsed += o\n\t\t}\n\t\tquantity += r.produces.quantity * num\n\t}\n\n\tspare[toProduce.name] = quantity - toProduce.quantity\n\n\treturn oreUsed, spare\n}", "title": "" }, { "docid": "4946d619c37b5442b297dee2042b4270", "score": "0.4435304", "text": "func TotalStock(v int) predicate.Item {\n\treturn predicate.Item(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldTotalStock), v))\n\t})\n}", "title": "" }, { "docid": "a0a8b86a3482a0c53608f96c3ccc2ee2", "score": "0.44305307", "text": "func FindItem(prefix string, args []string) string {\n\tfor _, v := range args {\n\t\tif strings.HasPrefix(v, prefix) {\n\t\t\treturn v\n\t\t}\n\t}\n\n\treturn \"\"\n}", "title": "" }, { "docid": "96f9d6b78e45b1db818bec3f47df4f67", "score": "0.4427225", "text": "func (UF *UnionQuickFind) Find(p int64) int64 {\n\treturn UF.id[p]\n}", "title": "" }, { "docid": "562b7477cc8b758355d0e75f9e33bb2c", "score": "0.44269094", "text": "func (item *SummaryItem) FindByStarter() (exist bool) {\n\tvar num uint\n\tvar err error\n\terr = engine.Model(new(SummaryItem)).Where(SummaryItem{Start: item.Start, UserID: item.UserID}).Count(&num).Error\n\tif err != nil {\n\t\treturn\n\t}\n\tif num == 0 {\n\t\treturn\n\t}\n\texist = true\n\treturn\n}", "title": "" }, { "docid": "77a9becc19ecaa4ab77ef324ebca736f", "score": "0.44162935", "text": "func EXPEQ(v string) predicate.Product {\n\treturn predicate.Product(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldEXP), v))\n\t})\n}", "title": "" }, { "docid": "ba4094fd257da6b5fa45587e5baff9e0", "score": "0.44154808", "text": "func (this *Triggers) Find(identity int64) (Item, error) {\n for _, i := range this.items {\n if i.Get(\"id\") == identity {\n return i, nil\n }\n }\n\n return nil, errors.New(fmt.Sprintf(ERR_ITEM_NOT_FOUND, identity))\n}", "title": "" }, { "docid": "f2d1e183f0c8b6759309d051da9f3ad9", "score": "0.44022238", "text": "func (m Message) GetOrderQty2(f *field.OrderQty2Field) quickfix.MessageRejectError {\n\treturn m.Body.Get(f)\n}", "title": "" }, { "docid": "f2d1e183f0c8b6759309d051da9f3ad9", "score": "0.44022238", "text": "func (m Message) GetOrderQty2(f *field.OrderQty2Field) quickfix.MessageRejectError {\n\treturn m.Body.Get(f)\n}", "title": "" }, { "docid": "8c26849308bdfa90e28ee143d0472afa", "score": "0.43853706", "text": "func (s Stock) Q() float64 {\n\treturn s.Dividend\n}", "title": "" }, { "docid": "adf894b6077df271d6754492a1fb4f9a", "score": "0.4384525", "text": "func (t *Transaction) Find(mt *ModelType, id string, model Model) {\n\tif err := mt.checkModelType(model); err != nil {\n\t\tt.setError(fmt.Errorf(\"zoom: Error in Find or Transaction.Find: %s\", err.Error()))\n\t\treturn\n\t}\n\tmodel.SetModelId(id)\n\tmr := &modelRef{\n\t\tspec: mt.spec,\n\t\tmodel: model,\n\t}\n\t// Get the fields from the main hash for this model\n\targs := redis.Args{mr.key()}\n\tfor _, fieldName := range mr.spec.fieldRedisNames() {\n\t\targs = append(args, fieldName)\n\t}\n\tt.Command(\"HMGET\", args, newScanModelHandler(mr.spec.fieldNames(), mr))\n}", "title": "" }, { "docid": "c332ca2a053e4b884f9829c7ab727c0d", "score": "0.43844748", "text": "func FindUserOrder(exec boil.Executor, iD int, selectCols ...string) (*UserOrder, error) {\n\tuserOrderObj := &UserOrder{}\n\n\tsel := \"*\"\n\tif len(selectCols) > 0 {\n\t\tsel = strings.Join(strmangle.IdentQuoteSlice(dialect.LQ, dialect.RQ, selectCols), \",\")\n\t}\n\tquery := fmt.Sprintf(\n\t\t\"select %s from \\\"user_order\\\" where \\\"id\\\"=$1\", sel,\n\t)\n\n\tq := queries.Raw(query, iD)\n\n\terr := q.Bind(nil, exec, userOrderObj)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"models: unable to select from user_order\")\n\t}\n\n\treturn userOrderObj, nil\n}", "title": "" }, { "docid": "d51f23237c33055d28703176f0612581", "score": "0.43823332", "text": "func (Mock) Find(ctx context.Context, model interface{}, modifier func(q *orm.Query) *orm.Query, values ...interface{}) error {\n\treturn nil\n}", "title": "" }, { "docid": "ca3ce2947067fcd16c2a193e1418711f", "score": "0.43801802", "text": "func beerPacksQuantity(attendees, unitsPerPack uint, temperature float64) (float64, error) {\n\tif unitsPerPack < 1 {\n\t\treturn 0, errors.New(\"min amount of bottle/cans per pack has to be a positive number\")\n\t}\n\n\tif attendees == 0 {\n\t\treturn 0, nil\n\t}\n\n\tmultiplier := getMultiplier(temperature)\n\n\tresult := math.Ceil((float64(attendees)*multiplier/float64(unitsPerPack))*100) / 100\n\n\treturn result, nil\n}", "title": "" }, { "docid": "7906f9cd28fb3b9168bdca1145c2c0fc", "score": "0.437809", "text": "func IDEQ(id uuid.UUID) predicate.GroupBudget {\n\treturn predicate.GroupBudget(sql.FieldEQ(FieldID, id))\n}", "title": "" }, { "docid": "8e25e95685679abe8ce3f2438c5235e1", "score": "0.43766746", "text": "func FindTodoWithItems(uuid string) (todo Todo) {\n\tDb.Where(\"uuid=?\", uuid).Preload(\"Items\").Find(&todo)\n\treturn todo\n}", "title": "" }, { "docid": "52c6c9a48ec76c55eb168139eb52a95d", "score": "0.4370513", "text": "func (s *ProductsService) Find(ctx context.Context, term string) (*ProductsResponse, *Response, error) {\n\treq, err := s.client.NewRequest(http.MethodGet, \"/products/find\", &ProductFindOptions{\n\t\tTerm: term,\n\t}, nil)\n\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tvar record *ProductsResponse\n\n\tresp, err := s.client.Do(ctx, req, &record)\n\n\tif err != nil {\n\t\treturn nil, resp, err\n\t}\n\n\treturn record, resp, nil\n}", "title": "" }, { "docid": "8c0ab1972249e419e9ae959e0d182f42", "score": "0.43687937", "text": "func (j *JsonQImpl) FindObject(fields ...string) (interface{}, error) {\n\treturn j.jq.Object(fields...)\n}", "title": "" }, { "docid": "52914720d38a5f3c58859145b2a6d5dd", "score": "0.43667355", "text": "func query(crit string, struc *Detail, variable string) error {\n\n\tqry := \"SELECT * From Food WHERE \" + crit + \" = ?\"\n\trow := db.QueryRow(qry, variable)\n\n\treturn row.Scan(&struc.ID, &struc.Name, &struc.Price, &struc.MakeTime)\n}", "title": "" } ]
bf1282f77ac626e630a1f21c8ab3456d
MaxResults query param limits the number of results returned.
[ { "docid": "295962b7bf1b751442a80788e2a1f81f", "score": "0.76362014", "text": "func (r ApiK8sVersionsGetRequest) MaxResults(maxResults int32) ApiK8sVersionsGetRequest {\n\tr.maxResults = &maxResults\n\treturn r\n}", "title": "" } ]
[ { "docid": "a75d573d5ceebab87e30b74b073a0931", "score": "0.8251967", "text": "func (c *ContactFeedCall) MaxResults(max int) *ContactFeedCall {\n\tc.urlParams.Set(\"max-results\", strconv.Itoa(max))\n\treturn c\n}", "title": "" }, { "docid": "019adb4e72dffdcf9b6966d42b7eaae7", "score": "0.8235636", "text": "func (c *QuestsListCall) MaxResults(maxResults int64) *QuestsListCall {\n\tc.urlParams_.Set(\"maxResults\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "3d36d627c0e1d7fdcf2e02343c75070d", "score": "0.82323", "text": "func (c *DataGaGetCall) MaxResults(maxResults int64) *DataGaGetCall {\n\tc.urlParams_.Set(\"max-results\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "68923d2db9aeb7da6ad6d1b988587cbc", "score": "0.81589764", "text": "func (c *DataRealtimeGetCall) MaxResults(maxResults int64) *DataRealtimeGetCall {\n\tc.urlParams_.Set(\"max-results\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "f8c2bd14f7e039eebc55a2837e415de3", "score": "0.8145478", "text": "func (c *DataMcfGetCall) MaxResults(maxResults int64) *DataMcfGetCall {\n\tc.urlParams_.Set(\"max-results\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "f58cf3d6b79f4bc615f9a4806d0839ed", "score": "0.8118954", "text": "func (c *TurnBasedMatchesSyncCall) MaxResults(maxResults int64) *TurnBasedMatchesSyncCall {\n\tc.urlParams_.Set(\"maxResults\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "2681e2df6d9a28b228333e2f5d9e0d85", "score": "0.8082843", "text": "func (c *RoomsListCall) MaxResults(maxResults int64) *RoomsListCall {\n\tc.urlParams_.Set(\"maxResults\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "eb0401b002eb453238859ecb03d49235", "score": "0.8045866", "text": "func (c *ManagementCustomDataSourcesListCall) MaxResults(maxResults int64) *ManagementCustomDataSourcesListCall {\n\tc.urlParams_.Set(\"max-results\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "0f87cfc4bd47905682285dc16e314112", "score": "0.8022311", "text": "func (inputs SearchInputs) MaxResults() int {\n\tif inputs.Query == nil {\n\t\treturn 0\n\t}\n\n\tif count := inputs.Query.Count(); count != nil {\n\t\treturn *count\n\t}\n\n\tif inputs.DefaultLimit != 0 {\n\t\treturn inputs.DefaultLimit\n\t}\n\n\treturn search.DefaultMaxSearchResults\n}", "title": "" }, { "docid": "fccabfabf4168b8ba7dc05a4cee75ba4", "score": "0.7961113", "text": "func (c *KernelsListCall) MaxResults(maxResults int64) *KernelsListCall {\n\tc.opt_[\"maxResults\"] = maxResults\n\treturn c\n}", "title": "" }, { "docid": "499c071db92f335be0806488059eadbf", "score": "0.79486966", "text": "func (c *ManagementUnsampledReportsListCall) MaxResults(maxResults int64) *ManagementUnsampledReportsListCall {\n\tc.urlParams_.Set(\"max-results\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "78807b88acf49ab0d424b6aecbe7df43", "score": "0.794426", "text": "func (c *ScoresListWindowCall) MaxResults(maxResults int64) *ScoresListWindowCall {\n\tc.urlParams_.Set(\"maxResults\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "eeeb60f7c91319679a86fe8a76f31269", "score": "0.7925628", "text": "func (c *ManagementExperimentsListCall) MaxResults(maxResults int64) *ManagementExperimentsListCall {\n\tc.urlParams_.Set(\"max-results\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "ec654024d44d1f3e2f2eae496af2da65", "score": "0.7924296", "text": "func (c *ApplicationsListHiddenCall) MaxResults(maxResults int64) *ApplicationsListHiddenCall {\n\tc.urlParams_.Set(\"maxResults\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "f824c3da5edd4a8b24fdb2d93c2552ed", "score": "0.7917908", "text": "func (c *CirclesListCall) MaxResults(maxResults int64) *CirclesListCall {\n\tc.urlParams_.Set(\"maxResults\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "c67f53130e90aeb466ea2de3a4ac6768", "score": "0.7908051", "text": "func (c *PeopleListCall) MaxResults(maxResults int64) *PeopleListCall {\n\tc.urlParams_.Set(\"maxResults\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "307547246603ead0a9d852019623d3ec", "score": "0.7871732", "text": "func (c *ScoresGetCall) MaxResults(maxResults int64) *ScoresGetCall {\n\tc.urlParams_.Set(\"maxResults\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "9b1c11d576f6074d3171002d48c0c270", "score": "0.7868201", "text": "func (c *EventsListByPlayerCall) MaxResults(maxResults int64) *EventsListByPlayerCall {\n\tc.urlParams_.Set(\"maxResults\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "7dfa78ba57aa25af5aa1305ca9603861", "score": "0.78392017", "text": "func (r ApiK8sGetRequest) MaxResults(maxResults int32) ApiK8sGetRequest {\n\tr.maxResults = &maxResults\n\treturn r\n}", "title": "" }, { "docid": "06d56f640ee29e0ca1643285cd66de29", "score": "0.7815119", "text": "func (e *EdgeQueryOptions) MaxResults(n int) *EdgeQueryOptions {\n\te.common = e.common.MaxResults(n)\n\treturn e\n}", "title": "" }, { "docid": "64266aff14331d3babaa75bff610e3ad", "score": "0.7728743", "text": "func (c *ManagementUploadsListCall) MaxResults(maxResults int64) *ManagementUploadsListCall {\n\tc.urlParams_.Set(\"max-results\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "49762d726eb45cda449700b7426fcc5b", "score": "0.77237976", "text": "func (c *ManagementWebpropertiesListCall) MaxResults(maxResults int64) *ManagementWebpropertiesListCall {\n\tc.urlParams_.Set(\"max-results\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "163482124b36218c555e43139b9e1f4a", "score": "0.77175856", "text": "func (c *PeopleListByActivityCall) MaxResults(maxResults int64) *PeopleListByActivityCall {\n\tc.urlParams_.Set(\"maxResults\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "ce86232aa3108a338f10a794e26eaf4a", "score": "0.7712399", "text": "func (r ApiK8sNodepoolsGetRequest) MaxResults(maxResults int32) ApiK8sNodepoolsGetRequest {\n\tr.maxResults = &maxResults\n\treturn r\n}", "title": "" }, { "docid": "f560f8f1265454f9fe1262a87291dffa", "score": "0.76985127", "text": "func (c *InstancesListCall) MaxResults(maxResults int64) *InstancesListCall {\n\tc.opt_[\"maxResults\"] = maxResults\n\treturn c\n}", "title": "" }, { "docid": "7a9cda1e35c8826455f9ebc4c713d516", "score": "0.769465", "text": "func (c *AudiencesListCall) MaxResults(maxResults int64) *AudiencesListCall {\n\tc.urlParams_.Set(\"maxResults\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "e9139bc193c5543e4e44bc89cf2ccce7", "score": "0.7677344", "text": "func (c *FirewallsListCall) MaxResults(maxResults int64) *FirewallsListCall {\n\tc.opt_[\"maxResults\"] = maxResults\n\treturn c\n}", "title": "" }, { "docid": "038ed9cfd6a4d472b8b72901ceb6fe5f", "score": "0.7668227", "text": "func (c *ManagementFiltersListCall) MaxResults(maxResults int64) *ManagementFiltersListCall {\n\tc.urlParams_.Set(\"max-results\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "877758c0b06019ec7d25996b939b22c9", "score": "0.76527035", "text": "func (c *MetagameListCategoriesByPlayerCall) MaxResults(maxResults int64) *MetagameListCategoriesByPlayerCall {\n\tc.urlParams_.Set(\"maxResults\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "797e75452326d356dfa97fe192a3b74b", "score": "0.7635855", "text": "func (c *ManagementRemarketingAudienceListCall) MaxResults(maxResults int64) *ManagementRemarketingAudienceListCall {\n\tc.urlParams_.Set(\"max-results\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "afab9f8f63b4e1598d60152ab4c59cd5", "score": "0.7631437", "text": "func (c *UsersListCall) MaxResults(maxResults int64) *UsersListCall {\n\tc.urlParams_.Set(\"maxResults\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "a1d91935c15fe99660d6b67ca58670d3", "score": "0.7615087", "text": "func (c *ManagementProfileFilterLinksListCall) MaxResults(maxResults int64) *ManagementProfileFilterLinksListCall {\n\tc.urlParams_.Set(\"max-results\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "77187a5fa73e7d2fc93b80227ae11a97", "score": "0.761281", "text": "func (c *PlayersListCall) MaxResults(maxResults int64) *PlayersListCall {\n\tc.urlParams_.Set(\"maxResults\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "350264b9d2c6dc9d5a07509df15964b9", "score": "0.76054835", "text": "func (c *ManagementAccountSummariesListCall) MaxResults(maxResults int64) *ManagementAccountSummariesListCall {\n\tc.urlParams_.Set(\"max-results\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "4d8023f8f95e5204ce9122f80b29fb66", "score": "0.75966454", "text": "func (c *ManagementAccountsListCall) MaxResults(maxResults int64) *ManagementAccountsListCall {\n\tc.urlParams_.Set(\"max-results\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "7b4fd14a95f594277ab2b32058d2da05", "score": "0.75793284", "text": "func (c *TurnBasedMatchesListCall) MaxResults(maxResults int64) *TurnBasedMatchesListCall {\n\tc.urlParams_.Set(\"maxResults\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "2a0ae2a576424feb09ef4d4c093fbfd2", "score": "0.756953", "text": "func (r ApiK8sKubeconfigGetRequest) MaxResults(maxResults int32) ApiK8sKubeconfigGetRequest {\n\tr.maxResults = &maxResults\n\treturn r\n}", "title": "" }, { "docid": "0490365af8f1129f050dc3179a46878f", "score": "0.7567252", "text": "func (r ApiK8sVersionsDefaultGetRequest) MaxResults(maxResults int32) ApiK8sVersionsDefaultGetRequest {\n\tr.maxResults = &maxResults\n\treturn r\n}", "title": "" }, { "docid": "afff58ec404b9b16429d03cabd086081", "score": "0.7564063", "text": "func (clc *CalendarListCall) MaxResults(pageSize int64) *CalendarListCall {\n\tclc.maxResults = pageSize\n\treturn clc\n}", "title": "" }, { "docid": "f8f0f514cfe5b009a3fa6d1432d160c1", "score": "0.7559699", "text": "func (c *ManagementSegmentsListCall) MaxResults(maxResults int64) *ManagementSegmentsListCall {\n\tc.urlParams_.Set(\"max-results\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "bd2f8653ae58ed02f5bce74dfe47a06c", "score": "0.7551647", "text": "func (s *ListResourceDataSyncInput) SetMaxResults(v int64) *ListResourceDataSyncInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "7779d55c63f4c84c7d2978b97349442d", "score": "0.75497097", "text": "func (c *EventsListDefinitionsCall) MaxResults(maxResults int64) *EventsListDefinitionsCall {\n\tc.urlParams_.Set(\"maxResults\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "59dfe4a81ef3603149f29515519e3e65", "score": "0.75460094", "text": "func (c *ImagesListCall) MaxResults(maxResults int64) *ImagesListCall {\n\tc.opt_[\"maxResults\"] = maxResults\n\treturn c\n}", "title": "" }, { "docid": "ffc822c4380f62877665e9544d720170", "score": "0.753991", "text": "func (r ApiUmUsersS3keysGetRequest) MaxResults(maxResults int32) ApiUmUsersS3keysGetRequest {\n\tr.maxResults = &maxResults\n\treturn r\n}", "title": "" }, { "docid": "5984d6209a14bc24413c211d4e3f5afb", "score": "0.7538851", "text": "func (c *ManagementGoalsListCall) MaxResults(maxResults int64) *ManagementGoalsListCall {\n\tc.urlParams_.Set(\"max-results\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "d0f4e771abf5b59976e8a06bf040793d", "score": "0.7517969", "text": "func (c *ManagementWebPropertyAdWordsLinksListCall) MaxResults(maxResults int64) *ManagementWebPropertyAdWordsLinksListCall {\n\tc.urlParams_.Set(\"max-results\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "96cb4d8708af0a9691e6fd6afd4fdd80", "score": "0.75139976", "text": "func (c *OperationsListCall) MaxResults(maxResults int64) *OperationsListCall {\n\tc.opt_[\"maxResults\"] = maxResults\n\treturn c\n}", "title": "" }, { "docid": "c2153584c806fb44c5adc345d6db652f", "score": "0.75084025", "text": "func (c *AchievementsListCall) MaxResults(maxResults int64) *AchievementsListCall {\n\tc.urlParams_.Set(\"maxResults\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "d2d3c73a3000dfc04f7bc523ceb074dc", "score": "0.7506068", "text": "func (o GoogleCloudDialogflowV2HumanAgentAssistantConfigSuggestionQueryConfigResponseOutput) MaxResults() pulumi.IntOutput {\n\treturn o.ApplyT(func(v GoogleCloudDialogflowV2HumanAgentAssistantConfigSuggestionQueryConfigResponse) int {\n\t\treturn v.MaxResults\n\t}).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "d6c0e6510a0c49a70116218a727129b7", "score": "0.7503696", "text": "func (r ApiUmUsersS3ssourlGetRequest) MaxResults(maxResults int32) ApiUmUsersS3ssourlGetRequest {\n\tr.maxResults = &maxResults\n\treturn r\n}", "title": "" }, { "docid": "5db451cde3e8448234f0fb7cdc840cfc", "score": "0.7502203", "text": "func (c *ManagementCustomDimensionsListCall) MaxResults(maxResults int64) *ManagementCustomDimensionsListCall {\n\tc.urlParams_.Set(\"max-results\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "8da93717a8334d490d3dea54fa39b2ba", "score": "0.7502085", "text": "func (o *StopPointSearchParams) SetMaxResults(maxResults *int32) {\n\to.MaxResults = maxResults\n}", "title": "" }, { "docid": "9facbb23910a81d8bf8506a346a9ac6f", "score": "0.7482835", "text": "func (s *ListUsersByPermissionGroupInput) SetMaxResults(v int64) *ListUsersByPermissionGroupInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "500741d31babf61af5fc797a46cbbc47", "score": "0.74808156", "text": "func (s *ListComponentBuildVersionsInput) SetMaxResults(v int64) *ListComponentBuildVersionsInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "c26f4f962576bf1ed6b0c55942caf985", "score": "0.74767107", "text": "func (c *ScoresListCall) MaxResults(maxResults int64) *ScoresListCall {\n\tc.urlParams_.Set(\"maxResults\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "0b550d55cd4a03f2213dc552a917d57e", "score": "0.7474807", "text": "func (s *ListPermissionGroupsByUserInput) SetMaxResults(v int64) *ListPermissionGroupsByUserInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "3f833086a3394d379ca163a4115932b5", "score": "0.74721473", "text": "func (s *ListInfrastructureConfigurationsInput) SetMaxResults(v int64) *ListInfrastructureConfigurationsInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "d2476987827b64b3c5d246d2e529795a", "score": "0.74599", "text": "func (s *GetEffectivePermissionsForPathInput) SetMaxResults(v int64) *GetEffectivePermissionsForPathInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "d37aec19947b07ddf2203eb47f1c98a1", "score": "0.74581355", "text": "func (s *DescribeFolderResolvedPermissionsInput) SetMaxResults(v int64) *DescribeFolderResolvedPermissionsInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "c4720dc7af102f199bafb26af560cd84", "score": "0.7454321", "text": "func (s *ListTLSInspectionConfigurationsInput) SetMaxResults(v int64) *ListTLSInspectionConfigurationsInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "41fa82d51f52a41b8984d52e09fe6309", "score": "0.7453762", "text": "func (c *LeaderboardsListCall) MaxResults(maxResults int64) *LeaderboardsListCall {\n\tc.urlParams_.Set(\"maxResults\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "2ca0ab6b2c2022c70a342c7f9f483bcf", "score": "0.74406683", "text": "func (s *ListAvailableResourceDimensionsInput) SetMaxResults(v int64) *ListAvailableResourceDimensionsInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "12658e25d57edcea8a01e41b450a0b6d", "score": "0.74336916", "text": "func (s *GetParametersByPathInput) SetMaxResults(v int64) *GetParametersByPathInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "f6aa8c4301aa208e9f9d6bbe2c28e3de", "score": "0.7432239", "text": "func (s *ListTemplateVersionsInput) SetMaxResults(v int64) *ListTemplateVersionsInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "f69285b27ad1fa2d7f58c67c536d9396", "score": "0.7427579", "text": "func (s *SearchDataSourcesInput) SetMaxResults(v int64) *SearchDataSourcesInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "02464d6c31c60778a54453666943ea92", "score": "0.74246365", "text": "func (s *ListDataSourcesInput) SetMaxResults(v int64) *ListDataSourcesInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "7d468048bbadd87cc57f37341de8dac9", "score": "0.74196255", "text": "func (s *ListPermissionsInput) SetMaxResults(v int64) *ListPermissionsInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "6d3de9e62e0b690e0af45c230dc8525a", "score": "0.7416662", "text": "func (s *ListPermissionGroupsInput) SetMaxResults(v int64) *ListPermissionGroupsInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "59e8e92d4f5a7612544515f00ff1271f", "score": "0.7413093", "text": "func (c *SnapshotsListCall) MaxResults(maxResults int64) *SnapshotsListCall {\n\tc.urlParams_.Set(\"maxResults\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "0e62733edbd039fefec92db24c48a28e", "score": "0.74106455", "text": "func (s *SearchFoldersInput) SetMaxResults(v int64) *SearchFoldersInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "17a4096687f7acc61425fee548c7b788", "score": "0.74102527", "text": "func (s *ListTemplateAliasesInput) SetMaxResults(v int64) *ListTemplateAliasesInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "a6efd6e7ce5ad6c0379a4a8a2e949b15", "score": "0.7408932", "text": "func (s *ListDistributionConfigurationsInput) SetMaxResults(v int64) *ListDistributionConfigurationsInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "52129605e135660015c3dabf8ba30ff7", "score": "0.7408632", "text": "func (s *DescribeDocumentPermissionInput) SetMaxResults(v int64) *DescribeDocumentPermissionInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "18c79662061de10c02630871213d76bc", "score": "0.7403179", "text": "func (s *ListEngineVersionsInput) SetMaxResults(v int64) *ListEngineVersionsInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "a5b188a3f7e55254b77948eb3fe6a688", "score": "0.74022865", "text": "func (c *ManagementCustomMetricsListCall) MaxResults(maxResults int64) *ManagementCustomMetricsListCall {\n\tc.urlParams_.Set(\"max-results\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "a992b48a4653bd1a8220a7f5357422e4", "score": "0.74013984", "text": "func (c *SnapshotsListCall) MaxResults(maxResults int64) *SnapshotsListCall {\n\tc.opt_[\"maxResults\"] = maxResults\n\treturn c\n}", "title": "" }, { "docid": "46610592b28726433b85c20be6dc69e4", "score": "0.7400213", "text": "func (s *DescribeFolderPermissionsInput) SetMaxResults(v int64) *DescribeFolderPermissionsInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "2b566644fea5f92169112b958974afbb", "score": "0.73964155", "text": "func (s *ListAvailableResourceMetricsInput) SetMaxResults(v int64) *ListAvailableResourceMetricsInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "808c57e5f029501fb9d10ee8ebd30626", "score": "0.7386287", "text": "func (s *ListResourceRequestsInput) SetMaxResults(v int64) *ListResourceRequestsInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "82000905ae88e5c29717864cf002a6fb", "score": "0.7383457", "text": "func (s *GetTransitGatewayRegistrationsInput) SetMaxResults(v int64) *GetTransitGatewayRegistrationsInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "acf544b8b734f451d3739ec1ad330509", "score": "0.73815286", "text": "func (s *ListQueryExecutionsInput) SetMaxResults(v int64) *ListQueryExecutionsInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "011859683f7ab8b26ef0394cfda356df", "score": "0.737925", "text": "func (s *ListNamedQueriesInput) SetMaxResults(v int64) *ListNamedQueriesInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "388e16e4e8109018b6da9e0c3ea56c8b", "score": "0.7378195", "text": "func (s *ListKeysInput) SetMaxResults(v int64) *ListKeysInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "4b2c91ceccce69bab9965b4cfa0ee1af", "score": "0.7377691", "text": "func (c *GlobalAccountsOperationsListCall) MaxResults(maxResults int64) *GlobalAccountsOperationsListCall {\n\tc.urlParams_.Set(\"maxResults\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "563377f42270247093cbd7071770bb64", "score": "0.73747635", "text": "func (c *ManagementWebpropertyUserLinksListCall) MaxResults(maxResults int64) *ManagementWebpropertyUserLinksListCall {\n\tc.urlParams_.Set(\"max-results\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "1764c5ee0507bc46779fe65f33c1cbe6", "score": "0.73684704", "text": "func (c *ActivitiesListCall) MaxResults(maxResults int64) *ActivitiesListCall {\n\tc.urlParams_.Set(\"maxResults\", fmt.Sprint(maxResults))\n\treturn c\n}", "title": "" }, { "docid": "254ec05281adac0d2fe172c65605fa2e", "score": "0.73668665", "text": "func (o GoogleCloudDialogflowV2HumanAgentAssistantConfigSuggestionQueryConfigOutput) MaxResults() pulumi.IntPtrOutput {\n\treturn o.ApplyT(func(v GoogleCloudDialogflowV2HumanAgentAssistantConfigSuggestionQueryConfig) *int {\n\t\treturn v.MaxResults\n\t}).(pulumi.IntPtrOutput)\n}", "title": "" }, { "docid": "483e2760a9f70e6bb4346b50fdf321f3", "score": "0.73613375", "text": "func (c *DisksListCall) MaxResults(maxResults int64) *DisksListCall {\n\tc.opt_[\"maxResults\"] = maxResults\n\treturn c\n}", "title": "" }, { "docid": "ebe3a9ecb13e18e7f944f0de3ffff48c", "score": "0.7361279", "text": "func (s *ListComponentsInput) SetMaxResults(v int64) *ListComponentsInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "a2276689c223c01fcbbd245871c49d3d", "score": "0.7358376", "text": "func (r ApiK8sNodepoolsNodesGetRequest) MaxResults(maxResults int32) ApiK8sNodepoolsNodesGetRequest {\n\tr.maxResults = &maxResults\n\treturn r\n}", "title": "" }, { "docid": "7f3c9b5c25fd2c09acace8c752ac6095", "score": "0.7353216", "text": "func (s *ListVPCConnectionsInput) SetMaxResults(v int64) *ListVPCConnectionsInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "d1e0d6d70cad6291a9c08a229196f16a", "score": "0.73491603", "text": "func (s *ListDocumentMetadataHistoryInput) SetMaxResults(v int64) *ListDocumentMetadataHistoryInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "28342c4c62c38eedffc88f1b1e11f92c", "score": "0.7346888", "text": "func (s *ListDocumentVersionsInput) SetMaxResults(v int64) *ListDocumentVersionsInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "554e3d0d568f9895d12f9d541bb72542", "score": "0.7346868", "text": "func (s *ListDiscoveredResourcesInput) SetMaxResults(v int64) *ListDiscoveredResourcesInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "fe0a88cc4e6426111220912913464dc8", "score": "0.73443294", "text": "func (s *ListShardsInput) SetMaxResults(v int64) *ListShardsInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "6e3a2642c5857fde8afb1e0b07ed4733", "score": "0.734225", "text": "func (s *SearchDatabasesByLFTagsInput) SetMaxResults(v int64) *SearchDatabasesByLFTagsInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "bc8d2d9d9f3ff8720a3baa0fb694e049", "score": "0.7337664", "text": "func (s *QueryAssistantInput) SetMaxResults(v int64) *QueryAssistantInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "c3815e9a407b180d0efac98fc2c8b37e", "score": "0.733516", "text": "func (s *ListChannelsInput) SetMaxResults(v int64) *ListChannelsInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "484c0b6208fc512d016895db44df07c4", "score": "0.7334763", "text": "func (s *ListThemeAliasesInput) SetMaxResults(v int64) *ListThemeAliasesInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" }, { "docid": "10b7a1c30f014d16eb959a8db7a74ea6", "score": "0.73346174", "text": "func (s *GetCustomerGatewayAssociationsInput) SetMaxResults(v int64) *GetCustomerGatewayAssociationsInput {\n\ts.MaxResults = &v\n\treturn s\n}", "title": "" } ]
371d34d1b81dc4e4c5b2a9cc7414ba46
SetEndpointAttributes sets the EndpointAttributes field's value.
[ { "docid": "47fafd420b27de312a167472668a06e5", "score": "0.79362017", "text": "func (s *RegisterAppInstanceUserEndpointInput) SetEndpointAttributes(v *EndpointAttributes) *RegisterAppInstanceUserEndpointInput {\n\ts.EndpointAttributes = v\n\treturn s\n}", "title": "" } ]
[ { "docid": "93dd9b621de20567dda706ad0bab5420", "score": "0.8044323", "text": "func (s *AppInstanceUserEndpoint) SetEndpointAttributes(v *EndpointAttributes) *AppInstanceUserEndpoint {\n\ts.EndpointAttributes = v\n\treturn s\n}", "title": "" }, { "docid": "3900e2638de9f0eb942cc9f093241f01", "score": "0.7354843", "text": "func WithEndpointAttributes(attrs ...trace.Attribute) EndpointOption {\n\treturn func(o *EndpointOptions) {\n\t\to.Attributes = attrs\n\t}\n}", "title": "" }, { "docid": "6f84ca0e0f1ea7621e1d73b8c22383a4", "score": "0.7263581", "text": "func (mr *MockSNSClientMockRecorder) SetEndpointAttributes(arg0 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"SetEndpointAttributes\", reflect.TypeOf((*MockSNSClient)(nil).SetEndpointAttributes), arg0)\n}", "title": "" }, { "docid": "85c2974e306a196c5192ce7f4eca9961", "score": "0.6620328", "text": "func (m *MockSNSClient) SetEndpointAttributes(arg0 *sns.SetEndpointAttributesInput) (*sns.SetEndpointAttributesOutput, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SetEndpointAttributes\", arg0)\n\tret0, _ := ret[0].(*sns.SetEndpointAttributesOutput)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "d9d2722d6823870221fdbcbe4b1d0415", "score": "0.5898958", "text": "func SetEndpoint(endpoint string) {\n\tif endpoint != \"\" {\n\t\tconfig.awsConf.WithEndpoint(endpoint)\n\t}\n}", "title": "" }, { "docid": "ebecffef8dfbc2f82a7611256059beb6", "score": "0.57630587", "text": "func (jbobject *AmazonWebServiceClient) SetEndpoint(a string) error {\n\tconv_a := javabind.NewGoToJavaString()\n\tif err := conv_a.Convert(a); err != nil {\n\t\tpanic(err)\n\t}\n\t_, err := jbobject.CallMethod(javabind.GetEnv(), \"setEndpoint\", javabind.Void, conv_a.Value().Cast(\"java/lang/String\"))\n\tif err != nil {\n\t\treturn err\n\t}\n\tconv_a.CleanUp()\n\treturn nil\n}", "title": "" }, { "docid": "f7e46356c3dfa93d6542920619d5d709", "score": "0.5740781", "text": "func (c *Config) SetEndpoint(endpoint string) *Config {\n\tc.endpoint = endpoint\n\treturn c\n}", "title": "" }, { "docid": "3f4ef8e1b5f2b7014ef4779a7734c08e", "score": "0.5698359", "text": "func WithSpanAttributes(fn func(ctx context.Context) []trace.Attribute) EndpointOption {\n\treturn func(o *EndpointOptions) {\n\t\to.GetAttributes = fn\n\t}\n}", "title": "" }, { "docid": "30bb202edc543d68d6cb404a65f4b384", "score": "0.5671544", "text": "func (mr *MockSNSClientMockRecorder) SetEndpointAttributesRequest(arg0 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"SetEndpointAttributesRequest\", reflect.TypeOf((*MockSNSClient)(nil).SetEndpointAttributesRequest), arg0)\n}", "title": "" }, { "docid": "a3d7f488e68911f78a367309dab40257", "score": "0.5598657", "text": "func (mr *MockSNSClientMockRecorder) SetEndpointAttributesWithContext(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\tvarargs := append([]interface{}{arg0, arg1}, arg2...)\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"SetEndpointAttributesWithContext\", reflect.TypeOf((*MockSNSClient)(nil).SetEndpointAttributesWithContext), varargs...)\n}", "title": "" }, { "docid": "08dcdbe5ccdc68f6f3dabcb4baa68c1a", "score": "0.5575306", "text": "func (o *ModelsS3Credentials) SetEndpoint(v string) {\n\to.Endpoint = &v\n}", "title": "" }, { "docid": "d43822c827479c2d469fe4a134bbab34", "score": "0.5572323", "text": "func (o *Owned) SetEndpoint(n string) {\n\to.Endpoint = n\n}", "title": "" }, { "docid": "77853d99074af0fe46554ba2783ebf98", "score": "0.54703027", "text": "func (g *gormBinding) SetBindEndpoint(v string) error {\n\tg.DBbindEndpoint = v\n\n\treturn g.save()\n}", "title": "" }, { "docid": "b991361bd662b6ed67d51fc16ea6bf88", "score": "0.5456457", "text": "func (s *WorkspaceDescription) SetEndpoint(v string) *WorkspaceDescription {\n\ts.Endpoint = &v\n\treturn s\n}", "title": "" }, { "docid": "7802dffc05fb0240588d7adcdee33178", "score": "0.5456268", "text": "func (b *BaseConstruct) SetEndpoint(endpoint string) { b.add(\"endpoint\", reader.WithEndpoint(endpoint)) }", "title": "" }, { "docid": "8dffcf6098ed8c23be6393377504d551", "score": "0.5428178", "text": "func (s *DBInstance) SetEndpoint(v *Endpoint) *DBInstance {\n\ts.Endpoint = v\n\treturn s\n}", "title": "" }, { "docid": "1bd4f02622ae44361aac7881b14fe43d", "score": "0.54249996", "text": "func (s *UpdateLayerInput) SetAttributes(v map[string]*string) *UpdateLayerInput {\n\ts.Attributes = v\n\treturn s\n}", "title": "" }, { "docid": "44a083b1c73c7eebf02df7fabefc1f5f", "score": "0.5370881", "text": "func (o *Event) SetAttributes(v map[string]interface{}) {\n\to.Attributes = v\n}", "title": "" }, { "docid": "3bf3b658fa3676c90fec204f431878ed", "score": "0.53514916", "text": "func (probe *HTTPProbe) SetEndpoint(endpoint string) {\n\tprobe.Endpoint = endpoint\n}", "title": "" }, { "docid": "821c57c2a4c8fb7dc8dc33b7b8ecf2d0", "score": "0.5347241", "text": "func (s *Layer) SetAttributes(v map[string]*string) *Layer {\n\ts.Attributes = v\n\treturn s\n}", "title": "" }, { "docid": "acd391ba3c42b9a4b5068b04260eb3d4", "score": "0.53079355", "text": "func (m *MockSNSClient) SetEndpointAttributesWithContext(arg0 context.Context, arg1 *sns.SetEndpointAttributesInput, arg2 ...request.Option) (*sns.SetEndpointAttributesOutput, error) {\n\tm.ctrl.T.Helper()\n\tvarargs := []interface{}{arg0, arg1}\n\tfor _, a := range arg2 {\n\t\tvarargs = append(varargs, a)\n\t}\n\tret := m.ctrl.Call(m, \"SetEndpointAttributesWithContext\", varargs...)\n\tret0, _ := ret[0].(*sns.SetEndpointAttributesOutput)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "840eababd18e10b906f158a037ca0667", "score": "0.52906096", "text": "func (s *StartOutboundVoiceContactInput) SetAttributes(v map[string]*string) *StartOutboundVoiceContactInput {\n\ts.Attributes = v\n\treturn s\n}", "title": "" }, { "docid": "840eababd18e10b906f158a037ca0667", "score": "0.52906096", "text": "func (s *StartOutboundVoiceContactInput) SetAttributes(v map[string]*string) *StartOutboundVoiceContactInput {\n\ts.Attributes = v\n\treturn s\n}", "title": "" }, { "docid": "38635c32890a15087d9fed9a6e6be0a7", "score": "0.52755207", "text": "func SetEndpoint(endpoint string) func(*Client) {\n\treturn func(c *Client) { c.Endpoint, _ = url.Parse(endpoint) }\n}", "title": "" }, { "docid": "7dabb8fa54e31d07734d30b05e5af70c", "score": "0.52664924", "text": "func (s *WorkspaceSummary) SetEndpoint(v string) *WorkspaceSummary {\n\ts.Endpoint = &v\n\treturn s\n}", "title": "" }, { "docid": "3de460a195ef5aa83baa431a907b94a6", "score": "0.5251716", "text": "func (ms SpanEvent) SetAttributes(v AttributeMap) {\n\tms.orig.Attributes = *v.orig\n}", "title": "" }, { "docid": "06e11d547d77568ad00c34292f9f8e25", "score": "0.5237572", "text": "func (r *RoundRobinStrategy) SetEndpoints(endpoints []url.URL) {\n\tr.endpoints = endpoints\n}", "title": "" }, { "docid": "ea87ec212cba55600b1ca56b653d0179", "score": "0.5218315", "text": "func (s *UpdateAppInput) SetAttributes(v map[string]*string) *UpdateAppInput {\n\ts.Attributes = v\n\treturn s\n}", "title": "" }, { "docid": "645024b6414564ba5b6a2dd1db1936c5", "score": "0.52128106", "text": "func (s *CreateLayerInput) SetAttributes(v map[string]*string) *CreateLayerInput {\n\ts.Attributes = v\n\treturn s\n}", "title": "" }, { "docid": "2e0e666ba00d2c77f2cdd2f83bb59a17", "score": "0.5211141", "text": "func (s *Server) SetEndpoint(v string) *Server {\n\ts.Endpoint = &v\n\treturn s\n}", "title": "" }, { "docid": "b772b4822fb78b814d27ef385241baae", "score": "0.5204399", "text": "func (v *View) SetAttributes(atts ...Attribute) {\n\ta := Attribute(0)\n\tfor _, att := range atts {\n\t\ta = a | att\n\t}\n\tv.attribute = a\n}", "title": "" }, { "docid": "1e4721e98eb58160505e4fde852e6a0f", "score": "0.5187749", "text": "func (s *ModifyDBClusterEndpointOutput) SetEndpoint(v string) *ModifyDBClusterEndpointOutput {\n\ts.Endpoint = &v\n\treturn s\n}", "title": "" }, { "docid": "736c7819afb8f937eb24b13b6674b8a2", "score": "0.5182583", "text": "func (o *VolumeModifyIterRequest) SetAttributes(newValue VolumeModifyIterRequestAttributes) *VolumeModifyIterRequest {\n\to.AttributesPtr = &newValue\n\treturn o\n}", "title": "" }, { "docid": "7b0a43609d2a483a3fd1e0264717ade7", "score": "0.51550496", "text": "func (s *DBCluster) SetEndpoint(v string) *DBCluster {\n\ts.Endpoint = &v\n\treturn s\n}", "title": "" }, { "docid": "6590bbc9a9eac95f130155373f7101a7", "score": "0.5150848", "text": "func (s *UpdateStackInput) SetAttributes(v map[string]*string) *UpdateStackInput {\n\ts.Attributes = v\n\treturn s\n}", "title": "" }, { "docid": "d647c462e7fd76a9345e7ffa6d276834", "score": "0.5126507", "text": "func (s *CreateDBClusterEndpointOutput) SetEndpoint(v string) *CreateDBClusterEndpointOutput {\n\ts.Endpoint = &v\n\treturn s\n}", "title": "" }, { "docid": "8246f589e11d6205ec5e2d0e7bea2081", "score": "0.51243883", "text": "func (s *Stack) SetAttributes(v map[string]*string) *Stack {\n\ts.Attributes = v\n\treturn s\n}", "title": "" }, { "docid": "d3518e122c2d467683b3ce9ea7b3c851", "score": "0.5121395", "text": "func (s *SourceRegion) SetEndpoint(v string) *SourceRegion {\n\ts.Endpoint = &v\n\treturn s\n}", "title": "" }, { "docid": "84ee231e6ea93f3d313e2141a0cd981e", "score": "0.51212937", "text": "func (s *ParticipantToken) SetAttributes(v map[string]*string) *ParticipantToken {\n\ts.Attributes = v\n\treturn s\n}", "title": "" }, { "docid": "f883cdb7da04e17066e2a6db58a884d7", "score": "0.51177406", "text": "func (s *ParticipantTokenConfiguration) SetAttributes(v map[string]*string) *ParticipantTokenConfiguration {\n\ts.Attributes = v\n\treturn s\n}", "title": "" }, { "docid": "d966e94654af8746159cbbea88048f88", "score": "0.5116494", "text": "func (b *OAuth2ApplyConfiguration) WithEndpointParams(entries map[string]string) *OAuth2ApplyConfiguration {\n\tif b.EndpointParams == nil && len(entries) > 0 {\n\t\tb.EndpointParams = make(map[string]string, len(entries))\n\t}\n\tfor k, v := range entries {\n\t\tb.EndpointParams[k] = v\n\t}\n\treturn b\n}", "title": "" }, { "docid": "ba84927568093e8ec38845a09d34862f", "score": "0.5096988", "text": "func (s *DBProxy) SetEndpoint(v string) *DBProxy {\n\ts.Endpoint = &v\n\treturn s\n}", "title": "" }, { "docid": "7f6655d8b5178d95667b674816610810", "score": "0.50920075", "text": "func (s *CreateParticipantTokenInput) SetAttributes(v map[string]*string) *CreateParticipantTokenInput {\n\ts.Attributes = v\n\treturn s\n}", "title": "" }, { "docid": "0b96e64d226c6b11dc628e93cac8c4e8", "score": "0.50909954", "text": "func (m *MockSNSClient) SetEndpointAttributesRequest(arg0 *sns.SetEndpointAttributesInput) (*request.Request, *sns.SetEndpointAttributesOutput) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SetEndpointAttributesRequest\", arg0)\n\tret0, _ := ret[0].(*request.Request)\n\tret1, _ := ret[1].(*sns.SetEndpointAttributesOutput)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "bfdcd0a340db2c1b1683b76e23cd2de1", "score": "0.50887275", "text": "func (in *EndpointProperties) DeepCopy() *EndpointProperties {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(EndpointProperties)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "title": "" }, { "docid": "bfdcd0a340db2c1b1683b76e23cd2de1", "score": "0.50887275", "text": "func (in *EndpointProperties) DeepCopy() *EndpointProperties {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(EndpointProperties)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "title": "" }, { "docid": "99aea675904a831879aaaf671aca15fa", "score": "0.50696856", "text": "func (o *MonitorConfigPolicyResponseData) SetAttributes(v MonitorConfigPolicyAttributeResponse) {\n\to.Attributes = &v\n}", "title": "" }, { "docid": "95f9f3d717896573717c413c125017bf", "score": "0.50647247", "text": "func (mr *MockSNSClientMockRecorder) GetEndpointAttributes(arg0 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetEndpointAttributes\", reflect.TypeOf((*MockSNSClient)(nil).GetEndpointAttributes), arg0)\n}", "title": "" }, { "docid": "ead6366aeb6970076b83d18a322c436b", "score": "0.5055872", "text": "func (s *DBProxyTarget) SetEndpoint(v string) *DBProxyTarget {\n\ts.Endpoint = &v\n\treturn s\n}", "title": "" }, { "docid": "faa85da4ae388bc7068ce5067c6dc9b1", "score": "0.5048553", "text": "func (in *Endpoint) DeepCopy() *Endpoint {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(Endpoint)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "title": "" }, { "docid": "faa85da4ae388bc7068ce5067c6dc9b1", "score": "0.5048553", "text": "func (in *Endpoint) DeepCopy() *Endpoint {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(Endpoint)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "title": "" }, { "docid": "faa85da4ae388bc7068ce5067c6dc9b1", "score": "0.5048553", "text": "func (in *Endpoint) DeepCopy() *Endpoint {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(Endpoint)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "title": "" }, { "docid": "faa85da4ae388bc7068ce5067c6dc9b1", "score": "0.5048553", "text": "func (in *Endpoint) DeepCopy() *Endpoint {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(Endpoint)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "title": "" }, { "docid": "faa85da4ae388bc7068ce5067c6dc9b1", "score": "0.5048553", "text": "func (in *Endpoint) DeepCopy() *Endpoint {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(Endpoint)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "title": "" }, { "docid": "faa85da4ae388bc7068ce5067c6dc9b1", "score": "0.5048553", "text": "func (in *Endpoint) DeepCopy() *Endpoint {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(Endpoint)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "title": "" }, { "docid": "cdd2629bf3aba6e29618c7d2f3cc8340", "score": "0.50321734", "text": "func (m *AccountMutation) SetAttributes(value map[string]interface{}) {\n\tm.attributes = &value\n}", "title": "" }, { "docid": "eed2a1ad22d0945fb8de8b112954fe08", "score": "0.50288904", "text": "func (s *DeleteDBClusterEndpointOutput) SetEndpoint(v string) *DeleteDBClusterEndpointOutput {\n\ts.Endpoint = &v\n\treturn s\n}", "title": "" }, { "docid": "3154d69bd1964e29b8cf5b1b1de6fc61", "score": "0.5024152", "text": "func (s *LicenseServiceConfiguration) SetEndpoint(v string) *LicenseServiceConfiguration {\n\ts.Endpoint = &v\n\treturn s\n}", "title": "" }, { "docid": "88fce776635f7f33b21c232d417f29e4", "score": "0.5023025", "text": "func (o *GetProductsParams) SetAttributes(attributes *string) {\n\to.Attributes = attributes\n}", "title": "" }, { "docid": "4bc89cd94e0edc903c0d04325e371d09", "score": "0.5020822", "text": "func EndpointSet(endpointIDs []portainer.EndpointID) map[portainer.EndpointID]bool {\n\tset := map[portainer.EndpointID]bool{}\n\n\tfor _, endpointID := range endpointIDs {\n\t\tset[endpointID] = true\n\t}\n\n\treturn set\n}", "title": "" }, { "docid": "7ea9e86d0c2f7e673a05bdb0d912095a", "score": "0.50061727", "text": "func (s *App) SetAttributes(v map[string]*string) *App {\n\ts.Attributes = v\n\treturn s\n}", "title": "" }, { "docid": "b7b7c3e456b10f02df2f12281e48419c", "score": "0.49888945", "text": "func (s *SharedFileSystemConfiguration) SetEndpoint(v string) *SharedFileSystemConfiguration {\n\ts.Endpoint = &v\n\treturn s\n}", "title": "" }, { "docid": "ad5145c23ebd083221b5aadd35962f36", "score": "0.4981813", "text": "func (s *CreateAppInput) SetAttributes(v map[string]*string) *CreateAppInput {\n\ts.Attributes = v\n\treturn s\n}", "title": "" }, { "docid": "ec6a7fd1ba0064b458a39da58d72dc62", "score": "0.4966299", "text": "func (s *ComputeFarmConfiguration) SetEndpoint(v string) *ComputeFarmConfiguration {\n\ts.Endpoint = &v\n\treturn s\n}", "title": "" }, { "docid": "e27404b7b6855276bac5e762a7c04cd9", "score": "0.496292", "text": "func (s *Resource) SetAttributes(v map[string]*string) *Resource {\n\ts.Attributes = v\n\treturn s\n}", "title": "" }, { "docid": "c4d1684f4ab6dcb23b2884977e894666", "score": "0.49509388", "text": "func (s *DBClusterEndpoint) SetEndpoint(v string) *DBClusterEndpoint {\n\ts.Endpoint = &v\n\treturn s\n}", "title": "" }, { "docid": "17969a5066b307cb493c7215af389e74", "score": "0.49411204", "text": "func (o *SpansAggregateData) SetAttributes(v SpansAggregateRequestAttributes) {\n\to.Attributes = &v\n}", "title": "" }, { "docid": "54e1b0168368c08e1dc44cdff6d77f0e", "score": "0.49230453", "text": "func (jbobject *AmazonWebServiceClient) SetEndpoint2(a string, b string, c string) {\n\tconv_a := javabind.NewGoToJavaString()\n\tconv_b := javabind.NewGoToJavaString()\n\tconv_c := javabind.NewGoToJavaString()\n\tif err := conv_a.Convert(a); err != nil {\n\t\tpanic(err)\n\t}\n\tif err := conv_b.Convert(b); err != nil {\n\t\tpanic(err)\n\t}\n\tif err := conv_c.Convert(c); err != nil {\n\t\tpanic(err)\n\t}\n\t_, err := jbobject.CallMethod(javabind.GetEnv(), \"setEndpoint\", javabind.Void, conv_a.Value().Cast(\"java/lang/String\"), conv_b.Value().Cast(\"java/lang/String\"), conv_c.Value().Cast(\"java/lang/String\"))\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tconv_a.CleanUp()\n\tconv_b.CleanUp()\n\tconv_c.CleanUp()\n\n}", "title": "" }, { "docid": "ab23646d48cc08ee2fed5868e7d74b39", "score": "0.49131128", "text": "func (s *Participant) SetAttributes(v map[string]*string) *Participant {\n\ts.Attributes = v\n\treturn s\n}", "title": "" }, { "docid": "e87764abd7d80efeb1d1c22cd226acb1", "score": "0.49110338", "text": "func (token Token) SetAttributes(attributes ...string) {\n\ttoken.Attributes = attributes\n}", "title": "" }, { "docid": "be865f670113d1ea9807bf04e37fcaa0", "score": "0.48979926", "text": "func (s *CreateStackInput) SetAttributes(v map[string]*string) *CreateStackInput {\n\ts.Attributes = v\n\treturn s\n}", "title": "" }, { "docid": "525a04268a65a6ab3109ead3c67ce939", "score": "0.48865616", "text": "func SetCacheableEndpoints(endpoints ...string) Options {\n\treturn func(c *Connector) error {\n\t\tfor _, endpoint := range endpoints {\n\t\t\tc.cacheableEndpointStatus[endpoint] = endpointActiveStatus\n\t\t}\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "ba25c515c3aae970f6dff691104a128a", "score": "0.488183", "text": "func (s *DBProxyEndpoint) SetEndpoint(v string) *DBProxyEndpoint {\n\ts.Endpoint = &v\n\treturn s\n}", "title": "" }, { "docid": "0d3866c6ea0eedb094704cc010ea1ae5", "score": "0.48773795", "text": "func (s *ProtocolAndNotificationEndpoint) SetEndpoint(v string) *ProtocolAndNotificationEndpoint {\n\ts.Endpoint = &v\n\treturn s\n}", "title": "" }, { "docid": "19bbc0b26d64939cfae517aa59e1d25a", "score": "0.48753506", "text": "func (s *CloneStackInput) SetAttributes(v map[string]*string) *CloneStackInput {\n\ts.Attributes = v\n\treturn s\n}", "title": "" }, { "docid": "d91cf4ee77ebbd49c84f9fadf5ededfd", "score": "0.48665097", "text": "func (m *task) SetEndpoints(val map[string]string) {\n\tm.endpointsField = val\n}", "title": "" }, { "docid": "f0c5a90ec41f78d23695a4e0524859f3", "score": "0.48494905", "text": "func (s *InputDefinition) SetAttributes(v []*Attribute) *InputDefinition {\n\ts.Attributes = v\n\treturn s\n}", "title": "" }, { "docid": "d06928948d94465ace9f1e4591a99554", "score": "0.4846134", "text": "func (s *DescribeAccountAttributesOutput) SetAttributes(v []*AccountAttribute) *DescribeAccountAttributesOutput {\n\ts.Attributes = v\n\treturn s\n}", "title": "" }, { "docid": "c588422617be24e9118138fa6a51efce", "score": "0.4846025", "text": "func (in *ProtectedEndpoint) DeepCopy() *ProtectedEndpoint {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(ProtectedEndpoint)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "title": "" }, { "docid": "93dd14f68bc50f6e78aee249f2c6ba43", "score": "0.48325938", "text": "func (s *Server) SetEngineAttributes(v []*EngineAttribute) *Server {\n\ts.EngineAttributes = v\n\treturn s\n}", "title": "" }, { "docid": "20bcfeaadc85fc566229fc148552df46", "score": "0.48032072", "text": "func (mr *MockKvdbMockRecorder) SetEndpoints(arg0 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"SetEndpoints\", reflect.TypeOf((*MockKvdb)(nil).SetEndpoints), arg0)\n}", "title": "" }, { "docid": "129749be4d97c55a54b8d4be5500d2ec", "score": "0.48028722", "text": "func ClientVpnEndpoint_FromEndpointAttributes(scope constructs.Construct, id *string, attrs *ClientVpnEndpointAttributes) IClientVpnEndpoint {\n\t_init_.Initialize()\n\n\tvar returns IClientVpnEndpoint\n\n\t_jsii_.StaticInvoke(\n\t\t\"monocdk.aws_ec2.ClientVpnEndpoint\",\n\t\t\"fromEndpointAttributes\",\n\t\t[]interface{}{scope, id, attrs},\n\t\t&returns,\n\t)\n\n\treturn returns\n}", "title": "" }, { "docid": "ae1a6f96ed1008c8e81869c6c26afc29", "score": "0.4794932", "text": "func (m *endpointSpec) SetProperties(val interface{}) {\n\tm.propertiesField = val\n}", "title": "" }, { "docid": "a613df88bbf926d554720f8f4699599c", "score": "0.477204", "text": "func (p *Plugin) SetEndpoints(fTokenEndpoint, aTokenEndpoint string) {\n\tfederatedTokenEndpoint = fTokenEndpoint\n\taccessTokenEndpoint = aTokenEndpoint\n}", "title": "" }, { "docid": "34375f9481ddd62ca81a66ff6e44a773", "score": "0.4755248", "text": "func NewEndpointSet(svc edil.Service) Set {\n\treturn Set{\n\t\tGetEndpoint: MakeGetEndpoint(svc),\n\t\tServiceStatusEndpoint: MakeServiceStatusEndpoint(svc),\n\t}\n}", "title": "" }, { "docid": "6ae52f33b0912fda384bc07689b23df4", "score": "0.4685978", "text": "func (b *PrometheusTracingConfigApplyConfiguration) WithEndpoint(value string) *PrometheusTracingConfigApplyConfiguration {\n\tb.Endpoint = &value\n\treturn b\n}", "title": "" }, { "docid": "4c3256a10aa802f241abd4d64aa710b1", "score": "0.46739015", "text": "func (s SqsAPI) SetQueueAttributes(\n\tctx context.Context,\n\tparams map[string]string,\n\tattributes map[string]string,\n) Response {\n\n\treqID := ctx.Value(ReqIDKey{}).(string)\n\n\tif _, present := params[\"QueueUrl\"]; !present {\n\t\treturn ErrMissingParamRes(\"QueueUrl is a required parameter\", reqID)\n\t}\n\n\tresC := make(chan lsqs.ReqResult)\n\ts.pushC <- lsqs.SetQueueAttributes(params, attributes, resC)\n\tres := <-resC\n\tswitch res.Err {\n\tcase nil:\n\tcase lsqs.ErrInvalidAttributeName:\n\t\treturn ErrInvalidAttributeNameRes(res.ErrData.(string), reqID)\n\tcase lsqs.ErrInvalidParameterValue:\n\t\treturn ErrInvalidParameterValueRes(res.ErrData.(string), reqID)\n\tdefault:\n\t\treturn ErrInternalErrorRes(res.Err.Error(), reqID)\n\t}\n\n\txmlData := struct {\n\t\tXMLName xml.Name `xml:\"SetQueueAttributesResponse\"`\n\t\tResponseMetadata struct {\n\t\t\tRequestID string `xml:\"RequestId\"`\n\t\t}\n\t}{}\n\txmlData.ResponseMetadata.RequestID = reqID\n\n\tbuf, err := xml.Marshal(xmlData)\n\tif err != nil {\n\t\treturn ErrInternalErrorRes(err.Error(), reqID)\n\t}\n\n\treturn SuccessRes(buf, reqID)\n}", "title": "" }, { "docid": "87da3d2dddb4051d40fdf9b681c41907", "score": "0.46607026", "text": "func SetContextEndpoint(ctx context.Context, endpoint string) context.Context {\n\treturn context.WithValue(ctx, contextEndpoint, endpoint)\n}", "title": "" }, { "docid": "fdafa0289d4237152f6cb96652bc51b1", "score": "0.46597892", "text": "func (in *EndpointParameters) DeepCopy() *EndpointParameters {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(EndpointParameters)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "title": "" }, { "docid": "fb6db6687cc048613ec3d1fca691d82d", "score": "0.46552986", "text": "func (ic *InodeCreate) SetAttributes(s []string) *InodeCreate {\n\tic.mutation.SetAttributes(s)\n\treturn ic\n}", "title": "" }, { "docid": "d76ddcf587283939fa452d6755641528", "score": "0.4642163", "text": "func (mr *MockSNSClientMockRecorder) SetTopicAttributes(arg0 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"SetTopicAttributes\", reflect.TypeOf((*MockSNSClient)(nil).SetTopicAttributes), arg0)\n}", "title": "" }, { "docid": "7b6c9fe672d731cdac0c298359b796ac", "score": "0.4637072", "text": "func SetEndpoint(path string, getHandler func() (http.Handler, error)) {\n\tendpoints[path] = getHandler\n}", "title": "" }, { "docid": "6b8c34c9ab9839c6578cb8568a04a4f8", "score": "0.46150178", "text": "func (m *Container) SetAttributes(v []*Container_Attribute) {\n\tif m != nil {\n\t\tm.Attributes = v\n\t}\n}", "title": "" }, { "docid": "27d91532bde57270382f1101ed86e12d", "score": "0.4611793", "text": "func (m *MockSNSClient) GetEndpointAttributes(arg0 *sns.GetEndpointAttributesInput) (*sns.GetEndpointAttributesOutput, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"GetEndpointAttributes\", arg0)\n\tret0, _ := ret[0].(*sns.GetEndpointAttributesOutput)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "d7bfb70c0fd2d71f3918947b01fb0c03", "score": "0.46101138", "text": "func (in *EndpointSpec) DeepCopy() *EndpointSpec {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(EndpointSpec)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "title": "" }, { "docid": "d7bfb70c0fd2d71f3918947b01fb0c03", "score": "0.46101138", "text": "func (in *EndpointSpec) DeepCopy() *EndpointSpec {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(EndpointSpec)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "title": "" }, { "docid": "a09718bd06dbeead08f04bb28ebd1b46", "score": "0.46033362", "text": "func (s *GetMLModelOutput) SetEndpointInfo(v *RealtimeEndpointInfo) *GetMLModelOutput {\n\ts.EndpointInfo = v\n\treturn s\n}", "title": "" }, { "docid": "3f64c1282cf5fbcc6e5524bd4056dcaf", "score": "0.4548546", "text": "func (c *Config) WithEndpoint(endpoint string) *Config {\n c.Endpoint = &endpoint\n return c\n}", "title": "" }, { "docid": "490f93aff4a14dda864510a3920a51d5", "score": "0.4543406", "text": "func (r *AWSApiGatewayDomainName_EndpointConfiguration) SetMetadata(metadata map[string]interface{}) {\n\tr._metadata = metadata\n}", "title": "" }, { "docid": "b64783936b52380b1d19ee4a1896c2f6", "score": "0.4530468", "text": "func WithEndpoint(endpoint string) Option {\n\treturn func(o *options) error {\n\t\tep, err := url.Parse(endpoint)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tswitch ep.Scheme {\n\t\tcase UNIX:\n\t\t\tif len(ep.Path) == 0 {\n\t\t\t\to.endpoints = append(o.endpoints, defaultUnixEndpoint)\n\t\t\t\treturn nil\n\t\t\t}\n\t\tcase TCP:\n\t\t\tif len(ep.Opaque) == 0 {\n\t\t\t\to.endpoints = append(o.endpoints, defaultTCPEndpoint)\n\t\t\t\treturn nil\n\t\t\t}\n\t\tcase SSL:\n\t\t\tif len(ep.Opaque) == 0 {\n\t\t\t\to.endpoints = append(o.endpoints, defaultSSLEndpoint)\n\t\t\t\treturn nil\n\t\t\t}\n\t\t}\n\t\to.endpoints = append(o.endpoints, endpoint)\n\t\treturn nil\n\t}\n}", "title": "" } ]
ab025caf07dfd437d17c5dbda140c8dd
Len implements the WireMessage interface.
[ { "docid": "6b30327471cc4e21724cf87a042b2ba2", "score": "0.0", "text": "func (i Insert) Len() int {\n\tpanic(\"not implemented\")\n}", "title": "" } ]
[ { "docid": "7b733b7fc296ef3efbc77f5826fbc135", "score": "0.80816", "text": "func (x *Message) WireLen() int {\n\tvar _c int\n\tif x.Compression != NoCompression {\n\t\t_c = 1\n\t}\n\treturn 4 /* length */ + 1 /* magic */ + _c /* compression */ + 4 /* checksum */ + len(x.Payload)\n}", "title": "" }, { "docid": "a721abea3c12109363d608b221c0b11b", "score": "0.7561666", "text": "func (m *SubscribeMessage) Len() int {\n\tif !m.dirty {\n\t\treturn len(m.dbuf)\n\t}\n\n\tml := m.msglen()\n\n\tif err := m.SetRemainingLength(int32(ml)); err != nil {\n\t\treturn 0\n\t}\n\n\treturn m.header.msglen() + ml\n}", "title": "" }, { "docid": "7eaccc8332d7e5c8014d23147ebb9ea8", "score": "0.7448358", "text": "func (cp *ConnectPacket) Len() int {\r\n\tml := cp.len()\r\n\treturn headerLen(ml) + ml\r\n}", "title": "" }, { "docid": "a795417bec8eddae5ca7af4eb7c256e5", "score": "0.7437013", "text": "func (m *OutMessage) Len() int {\n\treturn OutMessageHeaderSize + m.payloadOffset\n}", "title": "" }, { "docid": "af1d000e41300ea92cbf01c6892e12e6", "score": "0.7337524", "text": "func Len(msg []byte) (length int32) {\n\tr := bytes.NewReader(msg[MsgLenStart:MsgLenEnd])\n\tbinary.Read(r, binary.BigEndian, &length)\n\treturn length\n}", "title": "" }, { "docid": "ec3ba44df33e0b04dbdbec3e17a23c47", "score": "0.73204255", "text": "func (s *Subscribe) Len() int {\n\tml := s.len()\n\treturn headerLen(ml) + ml\n}", "title": "" }, { "docid": "83f0310c1e3aeb64783de2f44f88ef9a", "score": "0.7306474", "text": "func (p Packet) Len() int {\n\treturn (int(p[EapMsgLenHigh]) << 8) + int(p[EapMsgLenLow])\n}", "title": "" }, { "docid": "bd730571f3b5f0c9efe6231caed9f9a6", "score": "0.7282886", "text": "func (m Msg) Len() int {\n\t// Header + Flags + len of each section + optional checksum\n\ttotalLen := 16 + 4 // header and flag\n\n\tfor _, section := range m.Sections {\n\t\ttotalLen += section.Len()\n\t}\n\n\tif m.FlagBits&ChecksumPresent > 0 {\n\t\ttotalLen += 4\n\t}\n\n\treturn totalLen\n}", "title": "" }, { "docid": "3f9207753e2eb1913989b445efdfb0f4", "score": "0.7121215", "text": "func (cp *ConnectPacket) len() int {\r\n\ttotal := 0\r\n\r\n\tif cp.Version == Version31 {\r\n\t\t// 2 bytes protocol name length\r\n\t\t// 6 bytes protocol name\r\n\t\t// 1 byte protocol version\r\n\t\ttotal += 2 + 6 + 1\r\n\t} else {\r\n\t\t// 2 bytes protocol name length\r\n\t\t// 4 bytes protocol name\r\n\t\t// 1 byte protocol version\r\n\t\ttotal += 2 + 4 + 1\r\n\t}\r\n\r\n\t// 1 byte connect flags\r\n\t// 2 bytes keep alive timer\r\n\ttotal += 1 + 2\r\n\r\n\t// add the clientID length\r\n\ttotal += 2 + len(cp.ClientID)\r\n\r\n\t// add the will topic and will message length\r\n\tif cp.Will != nil {\r\n\t\ttotal += 2 + len(cp.Will.Topic) + 2 + len(cp.Will.Payload)\r\n\t}\r\n\r\n\t// add the username length\r\n\tif len(cp.Username) > 0 {\r\n\t\ttotal += 2 + len(cp.Username)\r\n\t}\r\n\r\n\t// add the password length\r\n\tif len(cp.Password) > 0 {\r\n\t\ttotal += 2 + len(cp.Password)\r\n\t}\r\n\r\n\treturn total\r\n}", "title": "" }, { "docid": "337677a3001a9f4a7489284170b2d40b", "score": "0.7102929", "text": "func (p *Packet) Len() int {\n\treturn len(p.b)\n}", "title": "" }, { "docid": "c22ef40ff0fa6ad4aad91df5225b57b7", "score": "0.7085185", "text": "func (p *Packet) Len() int {\n\treturn len(p.buffer)\n}", "title": "" }, { "docid": "b7ef3f90d79c2c319e144ce8b04eb3b3", "score": "0.69499165", "text": "func (a *Acknowledge) Len() int {\n\treturn 28\n}", "title": "" }, { "docid": "aaed57a3a75a1176cbb29389b91ad6d0", "score": "0.6930089", "text": "func (reader *ProtocolReader) Len() int { return len(reader.buf) - reader.off }", "title": "" }, { "docid": "570ae3530a895b904c7245a6b435859b", "score": "0.69172156", "text": "func (pp *Pingreq) Len() int {\n\treturn nakedLen()\n}", "title": "" }, { "docid": "8f1f8df3cd96b791e80fbab620efe93b", "score": "0.6878222", "text": "func Len(p uint8) int {\n\tm := int(1 << uint(p))\n\treturn hdrLen + bitbucket.Len(m, 6)\n}", "title": "" }, { "docid": "bf946fe3f5b52f2a9307de56935a2fd0", "score": "0.68556577", "text": "func Len(input []byte) int {\n\treturn len(input) * 8\n}", "title": "" }, { "docid": "403bad5e25199a4e01503a54ec3e05f9", "score": "0.68538", "text": "func (p *PCOPayload) Len() int {\r\n\tl := 1\r\n\tfor _, opt := range p.ConfigurationProtocolOptions {\r\n\t\tl += opt.Len()\r\n\t}\r\n\r\n\treturn l\r\n}", "title": "" }, { "docid": "0defd9d45a9fc0b7b228279b1c036494", "score": "0.68402696", "text": "func (f *PingFrame) Length(_ protocol.VersionNumber) protocol.ByteCount {\n\treturn 1\n}", "title": "" }, { "docid": "adc4eeeb3747ad32ab5302df5892e782", "score": "0.68228424", "text": "func (m *RawMessage) Size() int {\n\treturn len(m.bytes)\n}", "title": "" }, { "docid": "ea20135d2feb814dbf9453e3b786d301", "score": "0.67940974", "text": "func (b *Buffer) Len() int { return b.length }", "title": "" }, { "docid": "7437ce0f50817677a6fceb5d3c99dcbb", "score": "0.6785311", "text": "func (b *FixedBuffer) Len() int {\n\treturn b.w - b.r\n}", "title": "" }, { "docid": "30f31734ee1032b86361268291a8e3f1", "score": "0.67684656", "text": "func (w *ByteWriter) Len() int { return len(w.buffer) }", "title": "" }, { "docid": "9f08113c362f20707ee96bc01548088b", "score": "0.67635524", "text": "func (a *AdditionalGUTI) GetLen() (len uint16) {}", "title": "" }, { "docid": "7a3ad5880f6e74140059d7b2695de93c", "score": "0.6720193", "text": "func (h *ExtendedHeader) GetLength(_ protocol.VersionNumber) protocol.ByteCount {\n\tlength := 1 /* type byte */ + 4 /* version */ + 1 /* dest conn ID len */ + protocol.ByteCount(h.DestConnectionID.Len()) + 1 /* src conn ID len */ + protocol.ByteCount(h.SrcConnectionID.Len()) + protocol.ByteCount(h.PacketNumberLen) + 2 /* length */\n\tif h.Type == protocol.PacketTypeInitial {\n\t\tlength += quicvarint.Len(uint64(len(h.Token))) + protocol.ByteCount(len(h.Token))\n\t}\n\treturn length\n}", "title": "" }, { "docid": "5b747344edd83763e908adef23209f34", "score": "0.6700131", "text": "func (e *ExtensionField) Len() uint8 {\n\treturn uint8(len(e.Value))\n}", "title": "" }, { "docid": "20124dd31b81d146632c57bc3836d0db", "score": "0.6681483", "text": "func (b IPv4Header) Len() int {\n\treturn int(b[0]&0x0f) << 2\n}", "title": "" }, { "docid": "094acad1fda01231c4d2b108d24ad594", "score": "0.66379064", "text": "func (d *Decoder) Len() int { return d.buf.Len() }", "title": "" }, { "docid": "bb63dcba8314ce24bb89fd54437675bb", "score": "0.66227543", "text": "func (a *SMPDUDNRequestContainer) GetLen() (len uint8) {\n\treturn a.Len\n}", "title": "" }, { "docid": "0372b57796eff94432670f1f50795b96", "score": "0.66153324", "text": "func (pp *Pingresp) Len() int {\n\treturn nakedLen()\n}", "title": "" }, { "docid": "3a881ceed1a86d73f7bb5553c6949ca0", "score": "0.6600538", "text": "func (b *BitStream) Len() int {\n\treturn int(b.bitsWritten / 8)\n}", "title": "" }, { "docid": "722497618ade6248e199ffb965b1378f", "score": "0.65920246", "text": "func (m *Message) Size() uint {\n\n\tvar padFactor = 3 // a guess at the padding for each string in the attribute set\n\tsz := uint(len(m.Payload))\n\tfor _, a := range m.Attribs {\n\t\tsz += uint(len(a.Name) + len(a.Value) + (2 * padFactor))\n\t}\n\t//log.Printf( \"INFO: reporting size %d\", sz )\n\treturn sz\n}", "title": "" }, { "docid": "79ef99f900b8946e47b584b8d0c696e3", "score": "0.65912724", "text": "func (cc *ContinueCompress) MsgLen() int {\n\treturn cc.msgLen\n}", "title": "" }, { "docid": "a40a61bc3022bacffeac436483292cc8", "score": "0.65889543", "text": "func (z RawData) Msgsize() (s int) {\n\ts = msgp.BytesPrefixSize + len([]byte(z))\n\treturn\n}", "title": "" }, { "docid": "22b7e681eddb4021d5235a2930180263", "score": "0.6587112", "text": "func (s Byte) Len() int {\n\treturn len(s)\n}", "title": "" }, { "docid": "9fab6f0aa982876703a37b6a2af2e906", "score": "0.65804154", "text": "func (r *Decoder) Len() int { x := r.Uint64(); v := int(x); assert(uint64(v) == x); return v }", "title": "" }, { "docid": "0d8dc8f58d9ac330a89aa30a2e9a8b97", "score": "0.6578763", "text": "func (c *CreateSubscriptionRequest) Len() int {\n\tlength := 21\n\n\tif c.TypeID != nil {\n\t\tlength += c.TypeID.Len()\n\t}\n\n\tif c.RequestHeader != nil {\n\t\tlength += c.RequestHeader.Len()\n\t}\n\n\tif c.PublishingEnabled != nil {\n\t\tlength += c.PublishingEnabled.Len()\n\t}\n\n\treturn length\n}", "title": "" }, { "docid": "430a523c7a96f76c3c3dffaeb0cebf94", "score": "0.6571108", "text": "func Length(pkt *packet.Packet) uint8 {\n\treturn uint8(pkt[4])\n}", "title": "" }, { "docid": "397fbcbb333b2217e9889f7fc854ff6c", "score": "0.65700305", "text": "func (t *Table2dMessage) Length() int {\n\treturn t.max[0] + t.max[1] + len(t.colSep)\n}", "title": "" }, { "docid": "73026ed1a3867f6028887918e2ead2f9", "score": "0.6565621", "text": "func (b *Buf) Len() int { return len(b.b) }", "title": "" }, { "docid": "8c399d6d6a95ec70bda33a438805e4af", "score": "0.656381", "text": "func messageLength(c net.Conn) (int, error) {\n\tvar byteSize = make([]byte, 0)\n\ttmp := make([]byte, 1)\n\tfor {\n\t\t_, err := c.Read(tmp)\n\t\tif err != nil {\n\t\t\tif err != io.EOF {\n\t\t\t\treturn 0, err\n\t\t\t}\n\t\t}\n\n\t\tif string(tmp) != \":\" {\n\t\t\tbyteSize = append(byteSize, tmp...)\n\t\t\tcontinue\n\t\t}\n\n\t\t// the message length\n\t\tintSize, err := strconv.Atoi(string(byteSize))\n\t\tif err != nil {\n\t\t\treturn 0, err\n\t\t}\n\n\t\treturn intSize, err\n\t}\n}", "title": "" }, { "docid": "a2f62f2900f90cbebe8927a5f36b631b", "score": "0.65589386", "text": "func (dp *Disconnect) Len() int {\n\treturn nakedLen()\n}", "title": "" }, { "docid": "0768e7098e47e95886f3fd2a121cce92", "score": "0.6550525", "text": "func (s *SliceOfUint8) Len() int {\n\treturn len(s.items)\n}", "title": "" }, { "docid": "c9bf767624b6fa9914a508d20dd09717", "score": "0.65483165", "text": "func (cr CommandReply) Len() int {\r\n\tpanic(\"not implemented\")\r\n}", "title": "" }, { "docid": "c1a0c338570ebf2acac974b092c4aefe", "score": "0.6547258", "text": "func (record *RouteRecord) Len() int {\n\t//The protocol number and path length take up one byte each, and each router\n\t//takes up 12 bytes (4 byte IPv4 address plus an 8 byte nonce).\n\treturn 2 + 12*len(record.Path)\n}", "title": "" }, { "docid": "724d7b7978e4619aea01cd5517c6816c", "score": "0.65458494", "text": "func (m MessageHeader) Length() uint32 {\n\treturn m.length\n}", "title": "" }, { "docid": "1b299dfc4cdde20be9e6ba33b70afd73", "score": "0.6540305", "text": "func (p IPPacket) Length() (int, error) {\n\tswitch p.Version() {\n\tcase 4:\n\t\t{\n\t\t\tif len(p) < 4 {\n\t\t\t\treturn -1, ErrTooShort\n\t\t\t}\n\t\t\treturn int(p[2])<<4 + int(p[3]), nil\n\t\t}\n\tcase 6:\n\t\t{\n\t\t\tif len(p) < 6 {\n\t\t\t\treturn -1, ErrTooShort\n\t\t\t}\n\t\t\treturn int(p[4])<<4 + int(p[5]) + IPv6PacketHeadLen, nil\n\t\t}\n\tdefault:\n\t\t{\n\t\t\treturn -1, ErrIPPacketBadVersion\n\t\t}\n\t}\n\treturn -1, nil\n}", "title": "" }, { "docid": "c074d1042012a82367a5e4d5dd778128", "score": "0.6521383", "text": "func (hm HashMap) Len(ctx context.Context) (int64, error) {\n\treq := newRequest(\"*2\\r\\n$4\\r\\nHLEN\\r\\n$\")\n\treq.addString(hm.name)\n\treturn hm.c.cmdInt(ctx, req)\n}", "title": "" }, { "docid": "e19ae1d8e6771557cdbca6d0048ec439", "score": "0.65202105", "text": "func (u *UnknownPathAttribute) WireLength() uint16 {\n\tlength := uint16(len(u.Value))\n\tif length > 255 {\n\t\tlength++ // Extended length\n\t}\n\treturn length + 3\n}", "title": "" }, { "docid": "6d4be300e52d5e4aae5cc7540b972947", "score": "0.6520152", "text": "func (rcv *Buffer) Length() int64 {\n\treturn rcv._tab.GetInt64(rcv._tab.Pos + flatbuffers.UOffsetT(8))\n}", "title": "" }, { "docid": "4b8be99cfc7d7e142391a3b7aa8821bb", "score": "0.6509992", "text": "func (s *InternalSender) Len() int {\n\ts.mu.RLock()\n\tdefer s.mu.RUnlock()\n\treturn len(s.output)\n}", "title": "" }, { "docid": "9ba67b5157fb4b2b943203fc87a31562", "score": "0.64929295", "text": "func (a *BackoffTimerValue) GetLen() (len uint8) {}", "title": "" }, { "docid": "3f850c4a1914accc644e994d91ce4f34", "score": "0.6490918", "text": "func (subr *SRRecordResponse) Len() (l uint16) {\n\tencoded, _ := subr.Encode()\n\tl = uint16(len(encoded))\n\treturn l\n}", "title": "" }, { "docid": "c742bfd5e03f9225325df804f43e35e0", "score": "0.64902025", "text": "func (g *Generic) Len() int {\n\tlog.Println(\"DEPRECATED: use MarshalLen instead\")\n\treturn g.MarshalLen()\n}", "title": "" }, { "docid": "05098049c62f115c7fa1a7115b7c04db", "score": "0.6482182", "text": "func (b *Balance) Len() int { return len(b.Bytes()) }", "title": "" }, { "docid": "6960850588b916847052818000bac0f3", "score": "0.6481487", "text": "func (this *MessageSet) Len() int {\n\treturn len(this.buffer)\n}", "title": "" }, { "docid": "9af6aeeef43d9ee5ea170b7f8551e6b5", "score": "0.6477261", "text": "func (b *Bytes) Len() int {\n\tif b.p != nil {\n\t\treturn len(*b.p)\n\t}\n\n\treturn 0\n}", "title": "" }, { "docid": "877545fdcd030c40b15abc491493abd1", "score": "0.64740884", "text": "func (z *MessagePing) Msgsize() (s int) {\n\ts = 1 + 5 + msgp.BytesPrefixSize + len(z.Data)\n\treturn\n}", "title": "" }, { "docid": "c95cf0fe657c119ebfd157bcbe0f85db", "score": "0.6472595", "text": "func (s MsgFormats) Len() int {\n\treturn len(s)\n}", "title": "" }, { "docid": "7bf0e2355aa749bf61672f4a4a525c61", "score": "0.64604086", "text": "func (b *Buffer) Len() uint64 {\n\tb.mu.RLock()\n\tdefer b.mu.RUnlock()\n\treturn b.length\n}", "title": "" }, { "docid": "ea1e1abd3a5908009db4ebefd28648c1", "score": "0.64509994", "text": "func (bs endecBytes) Length() uint32 {\n\treturn uint32(len(bs))\n}", "title": "" }, { "docid": "44728c3e711e76ca5e20c0dcb22a6bfd", "score": "0.6450552", "text": "func (a *EmergencyNumberList) GetLen() (len uint8) {}", "title": "" }, { "docid": "9b6524230882dd01ba21076560d294d0", "score": "0.64371866", "text": "func (e *Encoder) Len() int { return len(e.buf) }", "title": "" }, { "docid": "2f838d27f26c54880c8867c4891d1069", "score": "0.6430693", "text": "func (b *eventBuffer) Len() int {\n\treturn int(atomic.LoadInt64(b.size))\n}", "title": "" }, { "docid": "649e691a96329505814097098a77bbb2", "score": "0.6428738", "text": "func (f *Frame) length() int {\n\t// If payload is less than the required minimum length, we zero-pad up to\n\t// the required minimum length\n\tpl := len(f.Payload)\n\tif pl < minPayload {\n\t\tpl = minPayload\n\t}\n\n\t// Add additional length if VLAN tags are needed.\n\tvar vlanLen int\n\tswitch {\n\tcase f.ServiceVLAN != nil && f.VLAN != nil:\n\t\tvlanLen = 8\n\tcase f.VLAN != nil:\n\t\tvlanLen = 4\n\t}\n\n\t// 6 bytes: destination hardware address\n\t// 6 bytes: source hardware address\n\t// N bytes: VLAN tags (if present)\n\t// 2 bytes: EtherType\n\t// N bytes: payload length (may be padded)\n\treturn 6 + 6 + vlanLen + 2 + pl\n}", "title": "" }, { "docid": "48ca7f1d6cf62c4164839817c5d622d0", "score": "0.6422342", "text": "func (f *Frame) Len() int64 {\n\treturn f.Nchars\n}", "title": "" }, { "docid": "6c65c2a3b11c982b1de785a92febeb87", "score": "0.6421255", "text": "func (connect ConnectPacket) PayloadSize() int {\n\tlength := 10 // This is the base length for variable part, without optional fields\n\n\t// TODO This is just formal / cosmetic, but it would be nice to support any protocol names\n\tlength += stringSize(connect.ClientID)\n\tif connect.WillFlag {\n\t\tlength += stringSize(connect.WillTopic)\n\t\tlength += stringSize(connect.WillMessage)\n\t}\n\tif len(connect.Username) > 0 {\n\t\tlength += stringSize(connect.Username)\n\t\tlength += stringSize(connect.Password)\n\t}\n\treturn length\n}", "title": "" }, { "docid": "9a7965ef5bdcecc1c4c062df0ad160e6", "score": "0.63906497", "text": "func (z Bytes) Msgsize() (s int) {\n\ts = msgp.BytesPrefixSize + len([]byte(z))\n\treturn\n}", "title": "" }, { "docid": "cd5bce9d1b5dbc9ce98cae34c065ed2c", "score": "0.6388797", "text": "func (bs *BitStream) Len() int {\n\treturn bs.bitBuffer.Len()\n}", "title": "" }, { "docid": "3c7ff7a19b99e5cb8d0104255a377a0b", "score": "0.63886577", "text": "func (com *hornComponent) Length() int {\n\treturn 222\n}", "title": "" }, { "docid": "e010c8d1036c0f38b43c2db22cd1d56b", "score": "0.6385347", "text": "func (a *RequestedNSSAI) GetLen() (len uint8) {}", "title": "" }, { "docid": "f45088b0869b15e3c64fa200e2ab8f9a", "score": "0.6384618", "text": "func (pp *Puback) Len() int {\n\treturn identifiedLen()\n}", "title": "" }, { "docid": "91edd88fb2b3e81bd4a81e53a0a84c05", "score": "0.6384545", "text": "func (f *Frame) length() int {\n\t// Payload length must end on a word (4 byte) boundary.\n\t// If payload is not a multiple of 4 bytes, pad it up\n\t// to the next word boundary.\n\tpl := len(f.Payload)\n\tif r := pl % 4; r != 0 {\n\t\tpl += 4 - r\n\t}\n\n\t// 4 bytes: SOF\n\t// 24 bytes: header\n\t// N bytes: payload\n\t// 4 bytes: CRC\n\t// 4 bytes: EOF\n\treturn 4 + 24 + pl + 4 + 4\n}", "title": "" }, { "docid": "a4d31c19c2c145dab07b6faedce91a9c", "score": "0.6376254", "text": "func (sp *SmartPosterPayload) Len() int {\n\treturn len(sp.Marshal())\n}", "title": "" }, { "docid": "6d401edf77db66059ca89e64df28b984", "score": "0.6371447", "text": "func (c *ConfigurationProtocolOption) Len() int {\r\n\treturn 3 + len(c.Contents)\r\n}", "title": "" }, { "docid": "e664c017289718729182fc8761354c2c", "score": "0.6367406", "text": "func (body Body) Len() int { return int(body.size) }", "title": "" }, { "docid": "d8092a9368e0e336d1ccc2d585468910", "score": "0.6361739", "text": "func (r *InterRecord) Len() int {\n\tif r.Types != 0 {\n\t\treturn len(r.Raw)\n\t}\n\n\treturn len(r.Bytes())\n}", "title": "" }, { "docid": "07224050046da25e04b9ed2921347979", "score": "0.6358886", "text": "func (a *AvroEncoder) Length() int {\n\treturn 5 + len(a.Content)\n}", "title": "" }, { "docid": "1949e6f23a528dadc4bb179821b8f0de", "score": "0.6355845", "text": "func (z HexBytes) Msgsize() (s int) {\n\ts = msgp.BytesPrefixSize + len([]byte(z))\n\treturn\n}", "title": "" }, { "docid": "845528ec78f26208745046b7e77d72fc", "score": "0.63547754", "text": "func (c *Counter) Len() int {\n\treturn hdrLen + c.bits.Len()\n}", "title": "" }, { "docid": "5acd67fbaff28fd119202f18021ab6e5", "score": "0.63420737", "text": "func (this *Queue) Len() int {\r\n\treturn this.length\r\n}", "title": "" }, { "docid": "fc03d3d1a5b1992bd8ad845408dcde48", "score": "0.6340433", "text": "func (z *BotRecord) Msgsize() (s int) {\n\ts = 1 + 2 + z.ID.Msgsize() + 2 + z.Addresses.Msgsize() + 2 + z.Names.Msgsize() + 2 + z.PublicKey.Msgsize() + 2 + z.Expiration.Msgsize()\n\treturn\n}", "title": "" }, { "docid": "ee69f1587b9f3461bb86035ab347fe18", "score": "0.63361233", "text": "func (a *MobileIdentity) GetLen() (len uint16) {\n\treturn a.Len\n}", "title": "" }, { "docid": "c9dd06a07d3f966c9b3dca4a5c77fd54", "score": "0.6326451", "text": "func (o *CloseSessionResponse) Len() int {\n\tvar l = 0\n\tif o.TypeID != nil {\n\t\tl += o.TypeID.Len()\n\t}\n\tif o.ResponseHeader != nil {\n\t\tl += (o.ResponseHeader.Len() - len(o.Payload))\n\t}\n\n\treturn l\n}", "title": "" }, { "docid": "5c0308b371eca68be39175839d1dda98", "score": "0.63241243", "text": "func (s *Conn) GetLen() (int, error) {\n\tvar l int32\n\terr := binary.Read(s, binary.LittleEndian, &l)\n\treturn int(l), err\n}", "title": "" }, { "docid": "c422b34e90aa7a2ebf8169a2e213a5a1", "score": "0.631859", "text": "func (t *TPDU) MarshalLen() int {\n\treturn t.Header.MarshalLen() - len(t.Header.Payload) + len(t.Payload)\n}", "title": "" }, { "docid": "31695a3f40370c4939aa98430686bf61", "score": "0.6312258", "text": "func (v Binary) Len(width int) int {\n\tw := dataWidth(width)\n\tl := v.size / int64(w)\n\tif v.size%int64(w) > 0 {\n\t\tl++\n\t}\n\treturn int(l)\n}", "title": "" }, { "docid": "2bc9c00727bb875224f8f5f51b769523", "score": "0.6307471", "text": "func (node *Node) Len() int {\n\treturn node.buf.Len()\n}", "title": "" }, { "docid": "f1f7b3bf1b7f06106dd79f2848cc0123", "score": "0.6306238", "text": "func (e *Encoder) Len() int {\n\treturn e.buf.Len()\n}", "title": "" }, { "docid": "badddb136356b7d20447c6a976b4f17a", "score": "0.6296495", "text": "func (c *RingBuffer) Len() int {\n\tc.mutex.Lock()\n\tdefer c.mutex.Unlock()\n\treturn c.len\n}", "title": "" }, { "docid": "ed59bb995e764b9cacef4b0b12c1429d", "score": "0.62950236", "text": "func (publishBuilderEntry *PublishBuilderEntry) Length() int {\n\tpublishBuilderEntry.ensureEncoded()\n\treturn len(publishBuilderEntry.encoded)\n}", "title": "" }, { "docid": "4b761951cc5a6e1f9fac44180e0a0f6d", "score": "0.62907124", "text": "func (pdu *pdu) plength() int { return pdu.woff - sizeProtoHdr }", "title": "" }, { "docid": "498158fb0139869d85bcd6230179afbc", "score": "0.6290624", "text": "func (up *Unsuback) Len() int {\n\treturn identifiedLen()\n}", "title": "" }, { "docid": "f0243bdb25b4287df150b9e145f91a74", "score": "0.6289998", "text": "func (i *IE) MarshalLen() int {\n\tif l, ok := tvLengthMap[i.Type]; ok {\n\t\treturn l + 1\n\t}\n\tif i.Type < 128 {\n\t\treturn 1 + len(i.Payload)\n\t}\n\treturn 3 + len(i.Payload)\n}", "title": "" }, { "docid": "10da61e3c05d9715a45abe1176e1b0f4", "score": "0.6280007", "text": "func (b *QueueBuffer) Len() int {\n\treturn len(*b)\n}", "title": "" }, { "docid": "d70e5296bc496ce207dda5c2601509b6", "score": "0.62727135", "text": "func (bits *BitArray) Len() int {\n\treturn bits.length\n}", "title": "" }, { "docid": "0deb7c2f360c1f2ae3da1485074e2134", "score": "0.6271293", "text": "func (z *MessagePong) Msgsize() (s int) {\n\ts = 1 + 5 + msgp.BytesPrefixSize + len(z.Data)\n\treturn\n}", "title": "" }, { "docid": "163522ae5115f9306cee971b153627d6", "score": "0.62685716", "text": "func (z *response) Msgsize() (s int) {\n\ts = 1 + 3 + msgp.IntSize + 3 + msgp.MapHeaderSize\n\tif z.Headers != nil {\n\t\tfor za0001, za0002 := range z.Headers {\n\t\t\t_ = za0002\n\t\t\ts += msgp.StringPrefixSize + len(za0001) + msgp.StringPrefixSize + len(za0002)\n\t\t}\n\t}\n\ts += 2 + msgp.BytesPrefixSize + len(z.Body)\n\treturn\n}", "title": "" }, { "docid": "62e63c0a5e9fdca2f973fe4fd96818df", "score": "0.6261898", "text": "func (z *MessageControl) Msgsize() (s int) {\n\ts = 1 + 5\n\tif z.Hash == nil {\n\t\ts += msgp.NilSize\n\t} else {\n\t\ts += z.Hash.Msgsize()\n\t}\n\treturn\n}", "title": "" }, { "docid": "baa883f500165f0df2205cf8d2be666f", "score": "0.6260852", "text": "func len(v Type) int32 {}", "title": "" }, { "docid": "f60d414123982f03e78f8ee1a51352de", "score": "0.6249564", "text": "func (q *Queue) GetLength() int32 {\n\treturn int32(len(q.mq.notifier[q.mq.pushIndex]))\n}", "title": "" }, { "docid": "aba879212e7441a2723e3f5f34b59822", "score": "0.6247596", "text": "func (b ByteArray) Len() int {\n\treturn b.usedBytes\n}", "title": "" } ]
d538396c2ab314462969b7cd9be9b3b0
NewMockNodeServer creates a new mock instance
[ { "docid": "308f6c4ba052404a49aaf8cdf1b41f08", "score": "0.6082522", "text": "func NewMockNodeServer(ctrl *gomock.Controller) *MockNodeServer {\n\tmock := &MockNodeServer{ctrl: ctrl}\n\tmock.recorder = &MockNodeServerMockRecorder{mock}\n\treturn mock\n}", "title": "" } ]
[ { "docid": "6072f246e695b23be1fb00b9837e8b3c", "score": "0.6950372", "text": "func NewServerMock() (*ServerMock, string) {\n\tm := ServerMock{}\n\tm.server = httptest.NewServer(&m)\n\tm.JSONComparer = assertjson.Comparer{IgnoreDiff: assertjson.IgnoreDiff}\n\n\treturn &m, m.server.URL\n}", "title": "" }, { "docid": "0aa9e74cddbd22658cd8cb1c4f8d0317", "score": "0.69041175", "text": "func NewMockServer() {\n\n\tvar srv = http.Server{\n\t\tAddr: \":6666\",\n\t\tHandler: new(httpHandler),\n\t}\n\t//http.HandleFunc(\"/\", handler)\n\tgo handleShutdown(&srv)\n\n\tif err := srv.ListenAndServe(); err != http.ErrServerClosed {\n\t\tfmt.Printf(\"Failed to shutdown server %v\", err)\n\t}\n\t<-singleConnHandler\n}", "title": "" }, { "docid": "e1e59e14a538c6a8234d75828c15329a", "score": "0.68374854", "text": "func newMockAPIServer(t *testing.T) (config.Config, map[string]func(*http.Request) jsonObject, *httptest.Server) {\n\tmockHandlers := map[string]func(*http.Request) jsonObject{}\n\n\tts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {\n\t\tkey := req.Method + \" \" + req.URL.Path\n\t\thandler, ok := mockHandlers[key]\n\t\tif !ok {\n\t\t\tt.Fatal(\"Unexpected request: \" + key)\n\t\t}\n\n\t\tdata := handler(req)\n\n\t\trespJSON, err := json.Marshal(data)\n\t\tif err != nil {\n\t\t\tt.Fatal(\"marshalling JSON failed: \", err)\n\t\t}\n\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tfmt.Fprint(w, string(respJSON))\n\t}))\n\n\troot, err := ioutil.TempDir(\"\", \"mackerel-agent-test\")\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\tconf := config.Config{\n\t\tApibase: ts.URL,\n\t\tRoot: root,\n\t}\n\n\treturn conf, mockHandlers, ts\n}", "title": "" }, { "docid": "9bc7d2fa74faf11c2016b811091faf7c", "score": "0.6790743", "text": "func NewHttpServer(t mockConstructorTestingTNewHttpServer) *HttpServer {\n\tmock := &HttpServer{}\n\tmock.Mock.Test(t)\n\n\tt.Cleanup(func() { mock.AssertExpectations(t) })\n\n\treturn mock\n}", "title": "" }, { "docid": "ea26f841b617f34c9a5495f46edab6cd", "score": "0.67833024", "text": "func NewMockServer(port int, messageChan chan interface{}) {\n\t// create a listener on passed TCP port\n\tlis, err := net.Listen(\"tcp\", fmt.Sprintf(\":%d\", port))\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to listen: %v\", err)\n\t}\n\n\t// create a server instance\n\ts := MockServer{messageChan: messageChan}\n\n\t// create a gRPC server object\n\tgrpcServer := grpc.NewServer()\n\n\t// attach the Ping service to the server\n\tRegisterPaymentsServer(grpcServer, &s)\n\n\t// start the server\n\tif err := grpcServer.Serve(lis); err != nil {\n\t\tlog.Fatalf(\"failed to serve: %s\", err)\n\t}\n}", "title": "" }, { "docid": "5c924eb1b166a505745abf02404d67a2", "score": "0.6756641", "text": "func newMockAPIServer(t *testing.T) (config.Config, map[string]func(*http.Request) (int, jsonObject), *httptest.Server) {\n\tmockHandlers := map[string]func(*http.Request) (int, jsonObject){}\n\n\tts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {\n\t\tkey := req.Method + \" \" + req.URL.Path\n\t\thandler, ok := mockHandlers[key]\n\t\tif !ok {\n\t\t\tt.Fatal(\"Unexpected request: \" + key)\n\t\t}\n\n\t\tstatusCode, data := handler(req)\n\n\t\trespJSON, err := json.Marshal(data)\n\t\tif err != nil {\n\t\t\tt.Fatal(\"marshalling JSON failed: \", err)\n\t\t}\n\n\t\tif statusCode != 0 {\n\t\t\tw.WriteHeader(statusCode)\n\t\t}\n\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tfmt.Fprint(w, string(respJSON))\n\t}))\n\n\troot, err := ioutil.TempDir(\"\", \"mackerel-agent-test\")\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\tconf := config.Config{\n\t\tApibase: ts.URL,\n\t\tRoot: root,\n\t\tConnection: config.DefaultConfig.Connection,\n\t}\n\n\treturn conf, mockHandlers, ts\n}", "title": "" }, { "docid": "3058abe04c2a2bcad3bf3895443c8496", "score": "0.6641679", "text": "func NewMockServer(status int, body []byte) (*httptest.Server, *TestReqData) {\n\trdata := &TestReqData{}\n\tsrv := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tdefer r.Body.Close()\n\t\trdata.ReqBody, rdata.Err = ioutil.ReadAll(r.Body)\n\t\trdata.Headers = r.Header\n\t\trdata.Url = r.URL\n\t\tw.WriteHeader(status)\n\t\tw.Write(body)\n\t}))\n\treturn srv, rdata\n}", "title": "" }, { "docid": "84ea82e337c9ef912fedf3d46b66616c", "score": "0.65773696", "text": "func (o *MockServerOperation) StartNewMockEDVServer() *httptest.Server {\n\trouter := mux.NewRouter()\n\trouter.UseEncodedPath()\n\n\trouter.HandleFunc(createDocumentEndpoint, o.mockCreateDocumentHandler).Methods(http.MethodPost)\n\trouter.HandleFunc(readDocumentEndpoint, o.mockReadDocumentHandler).Methods(http.MethodGet)\n\trouter.HandleFunc(queryVaultEndpoint, o.mockQueryVaultHandler).Methods(http.MethodPost)\n\trouter.HandleFunc(batchEndpoint, o.mockBatchHandler).Methods(http.MethodPost)\n\trouter.HandleFunc(deleteDocumentEndpoint, o.mockDeleteDocumentHandler).Methods(http.MethodDelete)\n\trouter.HandleFunc(updateDocumentEndpoint, o.mockUpdateDocumentHandler).Methods(http.MethodPost)\n\n\treturn httptest.NewServer(router)\n}", "title": "" }, { "docid": "bb6755bb988c152556c297e28973cda1", "score": "0.656479", "text": "func newServer() *server {\n\ts := &server{\n\t\trouter: echo.New(),\n\t}\n\n\ts.initHTTPServer()\n\ts.routes()\n\n\treturn s\n}", "title": "" }, { "docid": "af967f7ce54a51e78c23c96704d331a6", "score": "0.6518557", "text": "func NewNodeManagerServiceServerMock() *NodeManagerServiceServerMock {\n\treturn &NodeManagerServiceServerMock{validateRequests: true}\n}", "title": "" }, { "docid": "5a65eb7d62cb5082366e12c64b4ecf8e", "score": "0.6425344", "text": "func InitializeMockServer() *TestServer {\n\treturn &TestServer{}\n}", "title": "" }, { "docid": "df25f3f5650b0bac900bc16d3d4a5011", "score": "0.64125276", "text": "func newTestServer(t testing.TB, e *empire.Empire, opts server.Options) *Server {\n\tif e == nil {\n\t\te = NewEmpire(t)\n\t}\n\n\ts := server.New(e, opts)\n\th := func(w http.ResponseWriter, r *http.Request) {\n\t\t// Log reporter errors to stderr\n\t\tctx := reporter.WithReporter(r.Context(), reporter.ReporterFunc(func(ctx context.Context, err error) error {\n\t\t\tfmt.Fprintf(os.Stderr, \"reported error: %v\\n\", err)\n\t\t\treturn nil\n\t\t}))\n\t\ts.ServeHTTP(w, r.WithContext(ctx))\n\t}\n\tsvr := httptest.NewUnstartedServer(http.HandlerFunc(h))\n\tu, _ := url.Parse(svr.URL)\n\ts.URL = u\n\treturn &Server{\n\t\tEmpire: e,\n\t\tServer: s,\n\t\tsvr: svr,\n\t}\n}", "title": "" }, { "docid": "c543e1d6c37298c2c0e3ad596995fa9c", "score": "0.64067584", "text": "func NewServer(c *meta.Config, buildInfo *BuildInfo) (*Server, error) {\n\t// We need to ensure that a meta directory always exists even if\n\t// we don't start the meta store. node.json is always stored under\n\t// the meta directory.\n\n\tif err := os.MkdirAll(c.Dir, 0777); err != nil {\n\t\treturn nil, fmt.Errorf(\"mkdir all: %s\", err)\n\t}\n\n\tpath := filepath.Join(c.Dir, \"node.json\")\n\n\t// check file is existed or not\n\tif _, err := os.Stat(path); err == nil {\n\t\t// load node from node.json and check the error\n\t\tnode, err := influxcloud.LoadNode(c.Dir)\n\t\tif err != nil {\n\t\t\tif os.IsNotExist(err) {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t}\n\n\t\t//LoadNode will just pasrse node.json file and create a instance\n\t\t//node. So, node.json wiill not be changed util we trigger from program\n\t\t//Hence, we have to check path in original node.json include the newPath\n\t\t//instead of oldPath. If not, we have to save such node instance to\n\t\t//node.json file\n\t\tif buf, err := ioutil.ReadFile(filepath.Join(path)); err != nil {\n\t\t\tif !strings.Contains(string(buf), \"path\") {\n\t\t\t\tnode.Save()\n\t\t\t}\n\t\t}\n\t}\n\n\tbind := c.BindAddress\n\n\ts := &Server{\n\t\tbuildInfo: *buildInfo,\n\t\terr: make(chan error),\n\t\tclosing: make(chan struct{}),\n\n\t\tBindAddress: bind,\n\n\t\tLogger: log.New(os.Stderr, \"\", log.LstdFlags),\n\n\t\tMetaClient: meta.NewClient(c),\n\n\t\tService: meta.NewService(c),\n\n\t\thttpAPIAddr: c.HTTPBindAddress,\n\n\t\tconfig: c,\n\n\t\tlogOutput: os.Stderr,\n\t}\n\n\treturn s, nil\n}", "title": "" }, { "docid": "13bfd20d93d6424ec70ed85d8ef25b26", "score": "0.6404055", "text": "func newServer(addr string, handler http.Handler) *http.Server {\n\treturn &http.Server{\n\t\tReadTimeout: serverReadTimeout,\n\t\tWriteTimeout: serverWriteTimeout,\n\t\tHandler: handler,\n\t\tAddr: addr,\n\t}\n}", "title": "" }, { "docid": "581b899de9d0ab9cb1a935ab790d82b3", "score": "0.63524836", "text": "func (_ *HTTP) NewServer(iter *protocol.MockIterator, l logger.Logger, config interface{}) (protocol.Server, error) { //nolint:revive\n\tif iter == nil {\n\t\treturn nil, errors.New(\"mock iterator is nil\")\n\t}\n\tcfg, ok := config.(*ServerConfig)\n\tif !ok {\n\t\treturn nil, fmt.Errorf(\"invalid config %T\", config)\n\t}\n\tsrv := &server{\n\t\thandler: NewHandler(iter, l),\n\t}\n\tif cfg != nil {\n\t\tsrv.config = *cfg\n\t}\n\treturn srv, nil\n}", "title": "" }, { "docid": "a449db981dc13f7c08f753f8f764b54b", "score": "0.63516754", "text": "func NewServer() *Server {\n return &Server{\n Recoverable: true,\n LogOutput: ioutil.Discard,\n }\n}", "title": "" }, { "docid": "6a3464ba0afa971c7a8822f4e6b1fda7", "score": "0.6334112", "text": "func NewServer(t *testing.T) *httptest.Server {\n\treturn httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {\n\t\tvar response interface{}\n\t\tfmt.Printf(\"processing %s %s\\n\", req.Method, req.URL)\n\t\tswitch req.Method {\n\t\tcase \"GET\":\n\t\t\tswitch req.URL.Path {\n\t\t\tcase \"/api/v1\":\n\t\t\t\tresponse = &metav1.APIResourceList{\n\t\t\t\t\tGroupVersion: \"v1\",\n\t\t\t\t\tAPIResources: []metav1.APIResource{\n\t\t\t\t\t\t{\n\t\t\t\t\t\t\tName: \"namespaces\",\n\t\t\t\t\t\t\tShortNames: []string{\"ns\"},\n\t\t\t\t\t\t\tNamespaced: false,\n\t\t\t\t\t\t\tKind: \"Namespace\",\n\t\t\t\t\t\t},\n\t\t\t\t\t\t{\n\t\t\t\t\t\t\tName: \"pods\",\n\t\t\t\t\t\t\tSingularName: \"pod\",\n\t\t\t\t\t\t\tShortNames: []string{\"po\"},\n\t\t\t\t\t\t\tNamespaced: true,\n\t\t\t\t\t\t\tKind: \"Pod\",\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t}\n\t\t\tcase \"/api\":\n\t\t\t\tresponse = &metav1.APIVersions{\n\t\t\t\t\tVersions: []string{\n\t\t\t\t\t\t\"v1\",\n\t\t\t\t\t},\n\t\t\t\t}\n\t\t\tcase \"/apis\":\n\t\t\t\tresponse = &metav1.APIGroupList{\n\t\t\t\t\tGroups: []metav1.APIGroup{\n\t\t\t\t\t\t{\n\t\t\t\t\t\t\tName: \"customdomain\",\n\t\t\t\t\t\t\tVersions: []metav1.GroupVersionForDiscovery{\n\t\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\tGroupVersion: \"customdomain/v1beta1\",\n\t\t\t\t\t\t\t\t\tVersion: \"v1beta1\",\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t\t{\n\t\t\t\t\t\t\tName: \"apps\",\n\t\t\t\t\t\t\tVersions: []metav1.GroupVersionForDiscovery{\n\t\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\tGroupVersion: \"apps/v1\",\n\t\t\t\t\t\t\t\t\tVersion: \"v1\",\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t}\n\t\t\tcase \"/apis/customdomain/v1beta1\":\n\t\t\t\tresponse = &metav1.APIResourceList{\n\t\t\t\t\tGroupVersion: \"customdomain/v1beta1\",\n\t\t\t\t\tAPIResources: []metav1.APIResource{\n\t\t\t\t\t\t{\n\t\t\t\t\t\t\tName: \"customtypes\",\n\t\t\t\t\t\t\tSingularName: \"customtype\",\n\t\t\t\t\t\t\tShortNames: []string{\"ct\"},\n\t\t\t\t\t\t\tNamespaced: true,\n\t\t\t\t\t\t\tKind: \"CustomType\"},\n\t\t\t\t\t},\n\t\t\t\t}\n\t\t\tcase \"/apis/apps/v1\":\n\t\t\t\tresponse = &metav1.APIResourceList{\n\t\t\t\t\tGroupVersion: \"apps/v1\",\n\t\t\t\t\tAPIResources: []metav1.APIResource{\n\t\t\t\t\t\t{\n\t\t\t\t\t\t\tName: \"deployments\",\n\t\t\t\t\t\t\tSingularName: \"deployment\",\n\t\t\t\t\t\t\tShortNames: []string{\"deploy\"},\n\t\t\t\t\t\t\tNamespaced: true,\n\t\t\t\t\t\t\tKind: \"Deployment\"},\n\t\t\t\t\t},\n\t\t\t\t}\n\n\t\t\tcase \"/api/v1/namespaces/pasta\":\n\t\t\t\tresponse = corev1.Namespace{\n\t\t\t\t\tTypeMeta: metav1.TypeMeta{\n\t\t\t\t\t\tAPIVersion: \"v1\",\n\t\t\t\t\t\tKind: \"Namespace\",\n\t\t\t\t\t},\n\t\t\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\t\t\tName: \"pasta\",\n\t\t\t\t\t},\n\t\t\t\t\tSpec: corev1.NamespaceSpec{\n\t\t\t\t\t\tFinalizers: []corev1.FinalizerName{\n\t\t\t\t\t\t\tcorev1.FinalizerKubernetes,\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tStatus: corev1.NamespaceStatus{\n\t\t\t\t\t\tPhase: \"Terminating\",\n\t\t\t\t\t},\n\t\t\t\t}\n\t\t\tcase \"/api/v1/namespaces/default/pods/cookie\":\n\t\t\t\tresponse = corev1.Pod{\n\t\t\t\t\tTypeMeta: metav1.TypeMeta{\n\t\t\t\t\t\tAPIVersion: \"v1\",\n\t\t\t\t\t\tKind: \"Pod\",\n\t\t\t\t\t},\n\t\t\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\t\t\tNamespace: \"default\",\n\t\t\t\t\t\tName: \"cookie\",\n\t\t\t\t\t\tFinalizers: []string{\n\t\t\t\t\t\t\t\"cheesecake\",\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tSpec: corev1.PodSpec{},\n\t\t\t\t\tStatus: corev1.PodStatus{\n\t\t\t\t\t\tPhase: \"Terminating\",\n\t\t\t\t\t},\n\t\t\t\t}\n\t\t\tcase \"/api/v1/namespaces/default/pods/cookie2\":\n\t\t\t\tresponse = corev1.Pod{\n\t\t\t\t\tTypeMeta: metav1.TypeMeta{\n\t\t\t\t\t\tAPIVersion: \"v1\",\n\t\t\t\t\t\tKind: \"Pod\",\n\t\t\t\t\t},\n\t\t\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\t\t\tNamespace: \"default\",\n\t\t\t\t\t\tName: \"cookie2\",\n\t\t\t\t\t\tFinalizers: []string{\n\t\t\t\t\t\t\t\"cheesecake\",\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tSpec: corev1.PodSpec{},\n\t\t\t\t\tStatus: corev1.PodStatus{\n\t\t\t\t\t\tPhase: \"Terminating\",\n\t\t\t\t\t},\n\t\t\t\t}\n\t\t\tcase \"/api/v1/namespaces/dessert/pods/cookie\":\n\t\t\t\tresponse = corev1.Pod{\n\t\t\t\t\tTypeMeta: metav1.TypeMeta{\n\t\t\t\t\t\tAPIVersion: \"v1\",\n\t\t\t\t\t\tKind: \"Pod\",\n\t\t\t\t\t},\n\t\t\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\t\t\tNamespace: \"dessert\",\n\t\t\t\t\t\tName: \"cookie\",\n\t\t\t\t\t\tFinalizers: []string{\n\t\t\t\t\t\t\t\"cheesecake\",\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tSpec: corev1.PodSpec{},\n\t\t\t\t\tStatus: corev1.PodStatus{\n\t\t\t\t\t\tPhase: \"Terminating\",\n\t\t\t\t\t},\n\t\t\t\t}\n\t\t\tcase \"/api/v1/namespaces/dessert/pods/cookie2\": // no finalizer on this one\n\t\t\t\tresponse = corev1.Pod{\n\t\t\t\t\tTypeMeta: metav1.TypeMeta{\n\t\t\t\t\t\tAPIVersion: \"v1\",\n\t\t\t\t\t\tKind: \"Pod\",\n\t\t\t\t\t},\n\t\t\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\t\t\tNamespace: \"dessert\",\n\t\t\t\t\t\tName: \"cookie2\",\n\t\t\t\t\t},\n\t\t\t\t\tSpec: corev1.PodSpec{},\n\t\t\t\t\tStatus: corev1.PodStatus{\n\t\t\t\t\t\tPhase: \"Terminating\",\n\t\t\t\t\t},\n\t\t\t\t}\n\t\t\tcase \"/apis/apps/v1/namespaces/default/deployments/latte\": // no finalizer on this one\n\t\t\t\tresponse = appsv1.Deployment{\n\t\t\t\t\tTypeMeta: metav1.TypeMeta{\n\t\t\t\t\t\tAPIVersion: \"v1\",\n\t\t\t\t\t\tKind: \"Deployment\",\n\t\t\t\t\t},\n\t\t\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\t\t\tNamespace: \"default\",\n\t\t\t\t\t\tName: \"latte\",\n\t\t\t\t\t},\n\t\t\t\t\tSpec: appsv1.DeploymentSpec{},\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tfmt.Printf(\"object not found: %s %s\\n\", req.Method, req.URL)\n\t\t\t\tw.WriteHeader(http.StatusNotFound)\n\t\t\t\treturn\n\t\t\t}\n\t\tcase \"PUT\":\n\t\t\tswitch req.URL.Path {\n\t\t\tcase \"/api/v1/namespaces/cookie\",\n\t\t\t\t\"/api/v1/namespaces/default/pods/cookie\",\n\t\t\t\t\"/api/v1/namespaces/default/pods/cookie2\",\n\t\t\t\t\"/api/v1/namespaces/dessert/pods/cookie\",\n\t\t\t\t\"/api/v1/namespaces/dessert/pods/cookie2\",\n\t\t\t\t\"/apis/apps/v1/namespaces/default/deployments/latte\":\n\n\t\t\t\t// here we want to verify that the resource in the incoming request has no finalizer in its metadata\n\t\t\t\t// otherwise we return a 400 Bad Request error (unless there's something more appropriate?)\n\t\t\t\tdata, err := ioutil.ReadAll(req.Body)\n\t\t\t\tif err != nil {\n\t\t\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\t\t\tw.Write([]byte(err.Error())) // nolint: errcheck\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tmeta := metav1.ObjectMeta{}\n\t\t\t\terr = json.Unmarshal(data, &meta)\n\t\t\t\tif err != nil {\n\t\t\t\t\tfmt.Printf(\"error while unmarshaling incoming request body: %v\\n\", err)\n\t\t\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\t\t\tw.Write([]byte(err.Error())) // nolint: errcheck\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tif len(meta.GetFinalizers()) > 0 {\n\t\t\t\t\tfmt.Printf(\"unexpected finalizers: %v\\n\", meta.GetFinalizers())\n\t\t\t\t\tw.WriteHeader(http.StatusBadRequest)\n\t\t\t\t\t// let's just return the request body in the response\n\t\t\t\t\tresponse, _ := ioutil.ReadAll(req.Body)\n\t\t\t\t\tw.Write(bytes.NewBuffer(response).Bytes()) // nolint: errcheck\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tw.WriteHeader(http.StatusOK)\n\t\t\t\t// let's just return the request body in the response\n\t\t\t\tw.Write(data) // nolint: errcheck\n\t\t\t\treturn\n\t\t\t}\n\t\tcase \"DELETE\":\n\t\t\tswitch req.URL.Path {\n\t\t\tcase \"/api/v1/namespaces/cookie\",\n\t\t\t\t\"/api/v1/namespaces/default/pods/cookie\",\n\t\t\t\t\"/api/v1/namespaces/default/pods/cookie2\",\n\t\t\t\t\"/api/v1/namespaces/default/deploys/pasta\",\n\t\t\t\t\"/api/v1/namespaces/dessert/pods/cookie\":\n\t\t\t\t// just accept the request\n\t\t\t\tw.WriteHeader(http.StatusNoContent)\n\t\t\t\treturn\n\t\t\t}\n\t\tdefault:\n\t\t\tfmt.Printf(\"unexpected request: %s %s\\n\", req.Method, req.URL)\n\t\t\tw.WriteHeader(http.StatusNotFound)\n\t\t\treturn\n\t\t}\n\t\toutput, err := json.Marshal(response)\n\t\tif err != nil {\n\t\t\tt.Errorf(\"unexpected encoding error: %v\", err)\n\t\t\treturn\n\t\t}\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.WriteHeader(http.StatusOK)\n\t\tw.Write(output) // nolint: errcheck\n\t}))\n}", "title": "" }, { "docid": "f637a79f290dc066b5f5cac06e811e11", "score": "0.633113", "text": "func NewServer(tree *bstree.Tree) *server {\n s := &server{\n tree: tree,\n router: mux.NewRouter(),\n }\n s.configureRouter()\n return s\n}", "title": "" }, { "docid": "4d833c8a01419698f2b95ef74c908bcf", "score": "0.6314027", "text": "func initMockServer(t *testing.T, f *flow.Flow, a Authenticator) chan struct{} {\n\ts, err := NewServer(newServerConfig(), a)\n\tassert.NoError(t, err)\n\n\tms := &mockServer{t: t, s: s, f: f, q: make(chan struct{})}\n\tRegisterLinkServer(s, ms)\n\n\tlis, err := net.Listen(\"tcp\", testAddr)\n\tassert.NoError(t, err)\n\tassert.NotNil(t, lis)\n\tif lis == nil {\n\t\tpanic(\"listener cannot be nil\")\n\t}\n\tgo s.Serve(lis)\n\treturn ms.q\n}", "title": "" }, { "docid": "3a57041052235a6e8cf6bbb868ee6708", "score": "0.6310379", "text": "func NewServer(c *Config, buildInfo *BuildInfo) (*Server, error) {\n\n\t// We need to ensure that a meta directory always exists even if\n\t// we don't start the meta store. node.json is always stored under\n\t// the meta directory.\n\tif err := os.MkdirAll(c.Meta.Dir, 0777); err != nil {\n\t\treturn nil, fmt.Errorf(\"mkdir all: %s\", err)\n\t}\n\n\t// 0.10-rc1 and prior would sometimes put the node.json at the root\n\t// dir which breaks backup/restore and restarting nodes. This moves\n\t// the file from the root so it's always under the meta dir.\n\toldPath := filepath.Join(filepath.Dir(c.Meta.Dir), \"node.json\")\n\tnewPath := filepath.Join(c.Meta.Dir, \"node.json\")\n\n\tif _, err := os.Stat(oldPath); err == nil {\n\t\tif err := os.Rename(oldPath, newPath); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tnode, err := freetsdb.LoadNode(c.Meta.Dir)\n\tif err != nil {\n\t\tif !os.IsNotExist(err) {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tnode = freetsdb.NewNode(c.Meta.Dir)\n\t}\n\n\t// In 0.10.0 bind-address got moved to the top level. Check\n\t// The old location to keep things backwards compatible\n\tbind := c.BindAddress\n\tif c.Meta.BindAddress != \"\" {\n\t\tbind = c.Meta.BindAddress\n\t}\n\n\ts := &Server{\n\t\tbuildInfo: *buildInfo,\n\t\terr: make(chan error),\n\t\tclosing: make(chan struct{}),\n\n\t\tBindAddress: bind,\n\n\t\tLogger: logger.New(os.Stderr),\n\n\t\tNode: node,\n\n\t\tmetaUseTLS: c.Meta.HTTPSEnabled,\n\n\t\ttcpAddr: bind,\n\n\t\tconfig: c,\n\t}\n\n\ts.MetaService = meta.NewService(c.Meta)\n\ts.MetaService.Version = s.buildInfo.Version\n\ts.MetaService.Node = s.Node\n\n\treturn s, nil\n}", "title": "" }, { "docid": "f18d329c7dd91a86d57873de437a3ab7", "score": "0.6297498", "text": "func NewNodeService(t mockConstructorTestingTNewNodeService) *NodeService {\n\tmock := &NodeService{}\n\tmock.Mock.Test(t)\n\n\tt.Cleanup(func() { mock.AssertExpectations(t) })\n\n\treturn mock\n}", "title": "" }, { "docid": "8f21479360df64b933e8843cd3cad827", "score": "0.6278382", "text": "func CreateFakeServer() *httptest.Server {\n\tserver := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tw.WriteHeader(200)\n\t}))\n\treturn server\n}", "title": "" }, { "docid": "05bca216b352ea75c8ac50efad0c7fa8", "score": "0.6274797", "text": "func NewNodesServiceServerMock() *NodesServiceServerMock {\n\treturn &NodesServiceServerMock{validateRequests: true}\n}", "title": "" }, { "docid": "7ba8b7c8f685df925fd9338c7170e675", "score": "0.6271947", "text": "func NewFakeServer(tb testing.TB) *FakeServer {\n\tln, err := net.Listen(\"tcp\", \"\")\n\tif err != nil {\n\t\ttb.Fatal(err)\n\t}\n\ts := &FakeServer{ln: ln, tb: tb}\n\tgo s.serve()\n\ttb.Cleanup(func() { s.Close() })\n\treturn s\n}", "title": "" }, { "docid": "c4a23b8dd3ac485574dae2e3fc5ee87a", "score": "0.6262737", "text": "func serverForTest() *httptest.Server {\n\n\treturn httptest.NewServer(http.HandlerFunc(fileServe))\n}", "title": "" }, { "docid": "26e4dd48a40cd45f9c3dbdc96ea18039", "score": "0.6249245", "text": "func OpenAPIMockServer(generator *generator.StubGenerator, options *Options) *http.Server {\n\n\thandler := createHandler(generator)\n\thandler = cors(handler)\n\thandler = requestLogger(handler)\n\thandler = validationMiddleware(handler, generator)\n\n\tserver := &http.Server{\n\t\tAddr: fmt.Sprintf(\"%v:%v\", options.Host, options.Port),\n\t\tHandler: handler,\n\t}\n\n\treturn server\n}", "title": "" }, { "docid": "187bb34b73d273d393613e7f1ae541e7", "score": "0.6207945", "text": "func NewMockAPIServer() *httptest.Server {\n\treturn httptest.NewServer(http.HandlerFunc(\n\t\tfunc(w http.ResponseWriter, r *http.Request) {\n\t\t\tlogrus.Debug(\"Mock server has received a HTTP call on \", r.URL)\n\t\t\tvar response = \"\"\n\n\t\t\tif isRequestFor(\"filters=%7B%22status%22%3A%7B%22running%22%3Atrue%7D%7D&limit=0\", r) {\n\t\t\t\tresponse = getMockJSONFromDisk(\"./mocks/data/containers.json\")\n\t\t\t} else if isRequestFor(\"filters=%7B%22status%22%3A%7B%22created%22%3Atrue%2C%22exited%22%3Atrue%2C%22running%22%3Atrue%7D%7D&limit=0\", r) {\n\t\t\t\tresponse = getMockJSONFromDisk(\"./mocks/data/containers.json\")\n\t\t\t} else if isRequestFor(\"containers/json?limit=0\", r) {\n\t\t\t\tresponse = getMockJSONFromDisk(\"./mocks/data/containers.json\")\n\t\t\t} else if isRequestFor(\"ae8964ba86c7cd7522cf84e09781343d88e0e3543281c747d88b27e246578b65\", r) {\n\t\t\t\tresponse = getMockJSONFromDisk(\"./mocks/data/container_stopped.json\")\n\t\t\t} else if isRequestFor(\"b978af0b858aa8855cce46b628817d4ed58e58f2c4f66c9b9c5449134ed4c008\", r) {\n\t\t\t\tresponse = getMockJSONFromDisk(\"./mocks/data/container_running.json\")\n\t\t\t} else if isRequestFor(\"sha256:19d07168491a3f9e2798a9bed96544e34d57ddc4757a4ac5bb199dea896c87fd\", r) {\n\t\t\t\tresponse = getMockJSONFromDisk(\"./mocks/data/image01.json\")\n\t\t\t} else if isRequestFor(\"sha256:4dbc5f9c07028a985e14d1393e849ea07f68804c4293050d5a641b138db72daa\", r) {\n\t\t\t\tresponse = getMockJSONFromDisk(\"./mocks/data/image02.json\")\n\t\t\t}\n\t\t\tfmt.Fprintln(w, response)\n\t\t},\n\t))\n}", "title": "" }, { "docid": "ef96a436bb42b75f061ae50c8121ad2d", "score": "0.6207527", "text": "func newServer() *httpServer {\n\tclient := redis.NewClient(&redis.Options{\n\t\tAddr: \"localhost:6379\",\n\t\tPassword: \"\", // no password set\n\t\tDB: 0, // use default DB\n\t})\n\n\t_, err := client.Ping().Result()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tsrv := &httpServer{}\n\tsrv.DB = &db.DB{Redis: client}\n\tsrv.Router = mux.NewRouter()\n\treturn srv\n}", "title": "" }, { "docid": "707f854594d854ea1a6fc217cfb75a97", "score": "0.6207332", "text": "func newTestAccountServer(ctx context.Context, opts ...func(cm *v1.ConfigMap, secret *v1.Secret)) (*Server, *session.Server) {\n\treturn newTestAccountServerExt(ctx, func(claims jwt.Claims, rvals ...interface{}) bool {\n\t\treturn true\n\t}, opts...)\n}", "title": "" }, { "docid": "25314c4e3595cc2bce4348b6ad8fb9d8", "score": "0.6196591", "text": "func NewServer() *httptest.Server {\n\tmux := http.NewServeMux()\n\tserver := httptest.NewServer(mux)\n\n\t// handle requests and serve mock data\n\tmux.HandleFunc(\"/\", func(w http.ResponseWriter, r *http.Request) {\n\n\t\t// evaluate the path to serve a dummy data file\n\t\tswitch r.URL.Path {\n\t\tcase \"/user/repos\":\n\t\t\tw.Write(userReposPayload)\n\t\t\treturn\n\t\tcase \"/user/orgs\":\n\t\t\tw.Write(userOrgsPayload)\n\t\t\treturn\n\t\tcase \"/orgs/github/repos\":\n\t\t\tw.Write(userReposPayload)\n\t\t\treturn\n\t\tcase \"/repos/octocat/Hello-World/contents/.drone.yml\":\n\t\t\tw.Write(droneYamlPayload)\n\t\t\treturn\n\t\tcase \"/repos/octocat/Hello-World/hooks\":\n\t\t\tswitch r.Method {\n\t\t\tcase \"POST\":\n\t\t\t\tw.Write(createHookPayload)\n\t\t\t\treturn\n\t\t\t}\n\t\tcase \"/repos/octocat/Hola-Mundo/hooks\":\n\t\t\tswitch r.Method {\n\t\t\tcase \"POST\":\n\t\t\t\tw.Write(createHookPayload)\n\t\t\t\treturn\n\t\t\t}\n\t\tcase \"/repos/octocat/Hola-Mundo/keys\":\n\t\t\tswitch r.Method {\n\t\t\tcase \"POST\":\n\t\t\t\tw.Write(createKeyPayload)\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\n\t\t// else return a 404\n\t\thttp.NotFound(w, r)\n\t})\n\n\t// return the server to the client which\n\t// will need to know the base URL path\n\treturn server\n}", "title": "" }, { "docid": "18592a3d8652eca8b9d45eef270fb403", "score": "0.61942625", "text": "func mockServer() *httptest.Server {\n\tpl := payload{Country: \"DE\"}\n\treturn httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tw.WriteHeader(http.StatusOK)\n\t\tjson.NewEncoder(w).Encode(&pl)\n\t}))\n}", "title": "" }, { "docid": "841a1b1a91d6d351d7cb17c8d3a84806", "score": "0.61843485", "text": "func NewMockserver(ctrl *gomock.Controller) *Mockserver {\n\tmock := &Mockserver{ctrl: ctrl}\n\tmock.recorder = &MockserverMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "a1e0c986a1471bd5111e632857b6f925", "score": "0.6176244", "text": "func New(opt ...requests.Option) *Server {\n\ts := &Server{\n\t\topts: opt,\n\t\thandler: new(internal.RequestHandler),\n\t}\n\ttestServer := httptest.NewServer(http.HandlerFunc(s.handle))\n\ts.server = testServer\n\tbaseURL, err := url.Parse(s.server.URL)\n\tif err != nil {\n\t\tpanic(fmt.Sprintf(\"error parsing server url: %v\", err))\n\t}\n\ts.client = s.opts\n\ts.client = append(s.client, octo.WithHTTPClient(s.server.Client()), octo.WithBaseURL(*baseURL))\n\ts.finish = func() {\n\t\ts.server.Close()\n\t}\n\treturn s\n}", "title": "" }, { "docid": "c94ca0d876e9b17eda93fb31e1a94a3e", "score": "0.6161758", "text": "func NewMock(n int) clustering.Mock {\n\tpeers := NewNodes(n)\n\treturn clustering.NewMock(peers[0], peers[1:]...)\n}", "title": "" }, { "docid": "a8b02e1757af18d9624d2d77f62d86ce", "score": "0.6141336", "text": "func MockHttpServer(t *testing.T, requests []Request) *server {\n\ts := server{\n\t\trequestCounter: 0,\n\t\tnbExpectedRequests: len(requests),\n\t\tt: t,\n\t}\n\n\ts.server = httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tvar request Request\n\t\trequest, requests = requests[0], requests[1:]\n\n\t\tif len(request.Method) > 0 && r.Method != request.Method {\n\t\t\tt.Fatalf(\n\t\t\t\t\"Request n° %d: Expected Method '%s' but got '%s'\",\n\t\t\t\ts.requestCounter+1,\n\t\t\t\trequest.Method,\n\t\t\t\tr.Method,\n\t\t\t)\n\t\t}\n\n\t\tif len(request.Uri) > 0 && r.RequestURI != request.Uri {\n\t\t\tt.Fatalf(\n\t\t\t\t\"Request n° %d: Expected Uri '%s' but got '%s'\",\n\t\t\t\ts.requestCounter+1,\n\t\t\t\trequest.Uri,\n\t\t\t\tr.RequestURI,\n\t\t\t)\n\t\t}\n\n\t\tw.Header().Add(\"Content-Type\", \"application/json\")\n\n\t\t// Status code defaults to 200\n\t\tif request.ResponseStatusCode > 0 {\n\t\t\tw.WriteHeader(request.ResponseStatusCode)\n\t\t} else {\n\t\t\tw.WriteHeader(http.StatusOK)\n\t\t}\n\n\t\t// If the body is set, send back JSON-encoded body\n\t\tif request.ResponseBody != nil {\n\t\t\ts, ok := request.ResponseBody.(string)\n\t\t\tif !ok {\n\t\t\t\tif b, err := json.Marshal(request.ResponseBody); err != nil {\n\t\t\t\t\tt.Fatal(err)\n\t\t\t\t} else {\n\t\t\t\t\tw.Write(b)\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tw.Write([]byte(s))\n\t\t\t}\n\t\t}\n\n\t\ts.requestCounter++\n\t}))\n\n\ts.URL = s.server.URL\n\n\treturn &s\n}", "title": "" }, { "docid": "e32adb5e640752f02637eb31e6b21d5f", "score": "0.6109367", "text": "func newServer(h *hive, addr string) *server {\n\tr := mux.NewRouter()\n\ts := &server{\n\t\tServer: http.Server{\n\t\t\tAddr: addr,\n\t\t\tHandler: r,\n\t\t},\n\t\trouter: r,\n\t\thive: h,\n\t}\n\thandlerV1 := v1Handler{srv: s}\n\thandlerV1.install(r)\n\twebHandler := webHandler{h: h}\n\twebHandler.install(r)\n\treturn s\n}", "title": "" }, { "docid": "a07df000fb83b8ff4c24d5594ab7c194", "score": "0.6084515", "text": "func MockServer(b []byte) *httptest.Server {\n\treturn httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {\n\t\tdefer req.Body.Close()\n\t\tw.Write(b)\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t}))\n}", "title": "" }, { "docid": "fd81b214efeb870eee56c545d0f47bde", "score": "0.60841495", "text": "func NewNodeManagerServiceServerMockWithoutValidation() *NodeManagerServiceServerMock {\n\treturn &NodeManagerServiceServerMock{}\n}", "title": "" }, { "docid": "c65820e57e9a848e22968176f51f38b0", "score": "0.6055396", "text": "func New(t *testing.T, opts ...Option) *httptest.Server {\n\tt.Helper()\n\toptions := config{}\n\tfor _, o := range opts {\n\t\to(&options)\n\t}\n\n\tsvr := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tif options.httpStatus != 0 {\n\t\t\tw.WriteHeader(options.httpStatus)\n\t\t}\n\t\tif options.responseFile != \"\" {\n\t\t\thttp.ServeFile(w, r, options.responseFile)\n\t\t\treturn\n\t\t}\n\t\tif options.responseJSON != \"\" {\n\t\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\t}\n\t\tif _, err := w.Write([]byte(options.responseJSON)); err != nil {\n\t\t\t// Not using Fatalf because this runs in a separate Go Routine.\n\t\t\tt.Errorf(\"sending stubbed http response: %v\", err)\n\t\t}\n\t}))\n\tt.Cleanup(svr.Close)\n\n\tif options.mockURL != nil {\n\t\torigVal := *options.mockURL\n\t\tt.Cleanup(func() {\n\t\t\t*options.mockURL = origVal\n\t\t})\n\t\t*options.mockURL = svr.URL + \"?p1=%s&p2=%s&p3=%s\"\n\t}\n\treturn svr\n}", "title": "" }, { "docid": "de54ec1bcf1a0b24f5ef4ca02909a3ce", "score": "0.605475", "text": "func NewMockMetricServer() *MockMetricServer {\n\tuploadedMetricDescriptors := make(map[string]*metric.MetricDescriptor)\n\tmetricDescriptorData := &validation.MetricDescriptorData{\n\t\tUploadedMetricDescriptors: uploadedMetricDescriptors,\n\t}\n\tuploadedPoints := make(map[string]*validation.PreviousPoint)\n\ttimeSeriesData := &validation.TimeSeriesData{\n\t\tUploadedPoints: uploadedPoints,\n\t}\n\treturn &MockMetricServer{\n\t\tmetricDescriptorData: metricDescriptorData,\n\t\ttimeSeriesData: timeSeriesData,\n\t}\n}", "title": "" }, { "docid": "66258dfffd09bcc9885b332d5bab737a", "score": "0.60516155", "text": "func NewMockServer(ctrl *gomock.Controller) *MockServer {\n\tmock := &MockServer{ctrl: ctrl}\n\tmock.recorder = &MockServerMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "904df003bd7b50d664097200db087ec2", "score": "0.6025859", "text": "func newServer(t *testing.T, insecure bool) testserver.TestServer {\n\tt.Helper()\n\tvar ts testserver.TestServer\n\tvar err error\n\tif insecure {\n\t\tts, err = testserver.NewTestServer()\n\t} else {\n\t\tts, err = testserver.NewTestServer(testserver.SecureOpt())\n\t}\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\treturn ts\n}", "title": "" }, { "docid": "d0995b3be00a0d2da22f1a407f0232a0", "score": "0.6018879", "text": "func NewMockServer(authClientMockStub core_auth_sdk.AuthService) *Server {\n\tvar err error\n\n\tconfig := &Config{\n\t\tPort: 9897,\n\t\tServiceName: \"AuthenticationHandlerService\",\n\t\tRpcDeadline: 60 * 1000000,\n\t\tRpcRetries: 1,\n\t\tRpcRetryTimeout: 10,\n\t\tRpcRetryBackoff: 1,\n\t}\n\n\t// initiate tracing engine\n\ttracerEngine, closer := InitializeTracingEngine(config.ServiceName)\n\tdefer closer.Close()\n\tctx := context.Background()\n\n\t// initiate metrics engine\n\tserviceMetrics := InitializeMetricsEngine(config.ServiceName)\n\n\t// initiate logging client\n\tlogger := InitializeLoggingEngine(ctx)\n\n\tif authClientMockStub == nil {\n\t\tauthClientMockStub, err = InitializeAuthnClient(logger)\n\t\tif err != nil {\n\t\t\tlogger.Fatal(err, err.Error())\n\t\t}\n\t}\n\n\tsrv := &Server{\n\t\tconfig: config,\n\t\ttracerEngine: tracerEngine,\n\t\tmetricsEngine: serviceMetrics.Engine,\n\t\tmetrics: serviceMetrics.MicroServiceMetrics,\n\t\tlogger: logger,\n\t\tauthnClient: authClientMockStub,\n\t}\n\n\treturn srv\n}", "title": "" }, { "docid": "b183c64c91b7688e2061045f9df3701d", "score": "0.6002676", "text": "func newShardServerStub(c *gc.C, ctx context.Context) *shardServerStub {\n\tvar s = &shardServerStub{\n\t\tc: c,\n\t\ttasks: task.NewGroup(ctx),\n\t}\n\ts.loopbackServer = newLoopbackServer(s)\n\ts.loopbackServer.QueueTasks(s.tasks)\n\n\ts.tasks.Queue(\"Conn.Close\", func() error {\n\t\t<-s.tasks.Context().Done()\n\t\treturn s.loopbackServer.Conn.Close()\n\t})\n\ts.tasks.GoRun()\n\n\treturn s\n}", "title": "" }, { "docid": "8737ad3ce49bff1c073d8577f92ad1cf", "score": "0.60014606", "text": "func newServer() *server {\n\treturn &server{\n\t\tdate: 1,\n\t\tpeers: &peerDatabase{\n\t\t\tusers: make(map[int64]*tg.User),\n\t\t\tchats: make(map[int64]*tg.Chat),\n\t\t\tchannels: make(map[int64]*tg.Channel),\n\t\t},\n\t\tmessages: &messageDatabase{\n\t\t\tchannels: make(map[int64][]tg.MessageClass),\n\t\t},\n\t}\n}", "title": "" }, { "docid": "1c739c911e655b1a2a366a2a122bf78a", "score": "0.59878784", "text": "func newServer(store store.Store, sessionStore sessions.Store) *server {\n\tserv := &server{\n\t\trouter: mux.NewRouter(),\n\t\tstore: store,\n\t\tsessionStore: sessionStore,\n\t}\n\n\tserv.configureRouter()\n\n\treturn serv\n}", "title": "" }, { "docid": "4eac7dee5156ba1600230a937a8177c3", "score": "0.59869635", "text": "func NewMockMetricsServer(ctx context.Context, basePort int) (*MockMetricsServer, error) {\n\tsrv := &MockMetricsServer{}\n\tport := GetPortNumber(basePort)\n\n\tsrv.DialOpts = timber.DialCedarOptions{\n\t\tBaseAddress: \"localhost\",\n\t\tRPCPort: strconv.Itoa(port),\n\t}\n\n\tlis, err := net.Listen(\"tcp\", srv.Address())\n\tif err != nil {\n\t\treturn nil, errors.WithStack(err)\n\t}\n\n\ts := grpc.NewServer()\n\tinternal.RegisterCedarSystemMetricsServer(s, srv)\n\n\tgo func() {\n\t\t_ = s.Serve(lis)\n\t}()\n\tgo func() {\n\t\t<-ctx.Done()\n\t\ts.Stop()\n\t}()\n\treturn srv, nil\n}", "title": "" }, { "docid": "beec20da562cb071406e65d2c63dfd45", "score": "0.5965217", "text": "func newNodeServer(d *NAS) *nodeServer {\n\treturn &nodeServer{\n\t\tclientSet: GlobalConfigVar.KubeClient,\n\t\tcrdClient: GlobalConfigVar.DynamicClient,\n\t\tDefaultNodeServer: csicommon.NewDefaultNodeServer(d.driver),\n\t\tmounter: NewNasMounter(),\n\t}\n}", "title": "" }, { "docid": "d7cd619c0d963f96dfa93c1439937ce4", "score": "0.59514904", "text": "func NewServer(\n\tquit *quitInformation,\n\tlogger alog.Logger,\n\ttracer *alog.Tracer,\n\tnodeName string,\n\tmanagerConnString string,\n) *Server {\n\n\tnode := newNode(nodeName, tracer.GetTracer(), logger)\n\n\tserver := Server{\n\t\tquit: quit,\n\t\tlogger: logger,\n\n\t\tclientIDDic: make(map[string]string),\n\t\ttracer: tracer,\n\n\t\tnode: node,\n\t\tmanagerConnString: managerConnString,\n\t\tapps: make(map[string]*SApp),\n\t}\n\n\treturn &server\n}", "title": "" }, { "docid": "dc90f9c94b9ae9e190f49d9a12a2cfdc", "score": "0.5946983", "text": "func NewServer(config *Config) *Server {\n\treturn &Server{\n\t\tconfig: config,\n\t\tmgrStop: make(chan struct{}),\n\t\tsvcQueue: queue.NewQueue(),\n\t\tnodeQueue: queue.NewQueue(),\n\t}\n}", "title": "" }, { "docid": "7823bb458f046ee07a52c675999d8aa9", "score": "0.5936708", "text": "func NewServer(network *Network) *Server {\n\tserver := &Server{\n\t\trouter: httprouter.New(),\n\t\tnetwork: network,\n\t}\n\n\tserver.OPTIONS(\"/\", server.Options)\n\tserver.GET(\"/\", server.GetNetwork)\n\tserver.POST(\"/Nodess\", server.CreateNodes)\n\tsserver.GET(\"/Nodess\", server.GetNodess)\n\tsserver.GET(\"/Nodes/:Nodesid\", server.GetNodes)\n\tsserver.POST(\"/start\", server.StartNetwork)\n\tserver.POST(\"/stop\", server.StopNetwork)\n\t\n\tserver.GET(\"/snapshot\", server.CreateSnapshot)\n\tsserver.POST(\"/snapshot\", server.LoadSnapshot)\n\t\n\tserver.POST(\"/Nodes/:Nodesid/start\", server.StartNodes)\n\tserver.POST(\"/Nodes/:Nodesid/stop\", server.StopNodes)\n\tserver.POST(\"/Nodes/:Nodesid/conn/:peerid\", server.ConnectNodes)\n\tserver.GET(\"/events\", sserver.StreamNetworkEvents)\n\t\n\tserver.GET(\"/Nodes/:Nodesid/rpc\", server.NodesRPC)\n\tserver.DELETE(\"/Nodes/:Nodesid/conn/:peerid\", server.DisconnectNodes)\n\n\treturn server\n}", "title": "" }, { "docid": "e4188e987a1e6997faa1d4aefe52fce9", "score": "0.5927975", "text": "func NewServer() (*Server, error) {\n\tsrv, err := testutil.NewServer(\n\t\tgrpc.MaxRecvMsgSize(math.MaxInt32),\n\t\tgrpc.MaxSendMsgSize(math.MaxInt32))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tliteServer := newMockLiteServer()\n\tpb.RegisterAdminServiceServer(srv.Gsrv, liteServer)\n\tpb.RegisterPublisherServiceServer(srv.Gsrv, liteServer)\n\tpb.RegisterSubscriberServiceServer(srv.Gsrv, liteServer)\n\tpb.RegisterCursorServiceServer(srv.Gsrv, liteServer)\n\tpb.RegisterPartitionAssignmentServiceServer(srv.Gsrv, liteServer)\n\tlrpb.RegisterOperationsServer(srv.Gsrv, liteServer)\n\tsrv.Start()\n\treturn &Server{LiteServer: liteServer, gRPCServer: srv}, nil\n}", "title": "" }, { "docid": "3c57680de11286189e346b958ff75aa9", "score": "0.5921567", "text": "func NewServer(plugin *plugin.Manager, cache *cache.Cache) (*Server, error) {\n logger := logging.MustGetLogger(\"rpc\")\n\n return &Server{\n logger: logger,\n plugin: plugin,\n cache: cache,\n }, nil\n}", "title": "" }, { "docid": "cb3c8c8ec8e6e0254655ed9c228b4384", "score": "0.5920599", "text": "func NewNodeServer(cfg *config.Config) (*NodeServer, error) {\n\tstopper := stop.NewStopper()\n\tif stopper == nil {\n\t\treturn nil, errors.Errorf(\"create New Stopper failure\")\n\t}\n\n\tnodeCfg := parseConfig(cfg)\n\n\t// create a new Client\n\tc, err := client.Open(nodeCfg.etcdHosts)\n\tif err != nil {\n\t\treturn nil, errors.Trace(err)\n\t}\n\tadmin := c.GetAdmin()\n\n\t// create a DBEngine\n\teng, err := newDBEngine(nodeCfg.dataDir, stopper)\n\tif err != nil {\n\t\treturn nil, errors.Trace(err)\n\t}\n\n\tnodes, err := admin.GetNodes()\n\tif err != nil {\n\t\treturn nil, errors.Trace(err)\n\t}\n\n\tfs, err := disk.Usage(nodeCfg.dataDir)\n\tif err != nil {\n\t\treturn nil, errors.Trace(err)\n\t}\n\n\tnd, err := admin.Bootstrap(nodeCfg.nodeHost, int64(fs.Free))\n\tif err != nil {\n\t\treturn nil, errors.Trace(err)\n\t}\n\n\t// create NodesCache\n\tnc := cache.NewNodesCache()\n\tnc.AddNodes(nodes)\n\n\tserv := grpc.NewServer()\n\t// create a new Store\n\tstore, err := NewStore(nd.NodeID, serv, admin, eng, stopper, nc)\n\tif err != nil {\n\t\treturn nil, errors.Trace(err)\n\t}\n\n\ts := &NodeServer{\n\t\tconfig: nodeCfg,\n\t\tstopper: stopper,\n\t\tstore: store,\n\t\tclient: admin,\n\t\tNodeDescriptor: nd,\n\t}\n\n\tadmin.SetLocalServer(s.NodeID, s)\n\n\tmeta.RegisterNodeMessageServer(serv, s)\n\tlis, err := net.Listen(\"tcp\", nodeCfg.nodeHost)\n\tif err != nil {\n\t\tlog.Errorf(\"host:%v failed to listen: %v\", nodeCfg.nodeHost, err)\n\t\treturn nil, err\n\t}\n\n\tstopper.RunTask(func() {\n\t\tstopper.RunWorker(func() {\n\t\t\tif err := serv.Serve(lis); err != nil {\n\t\t\t\tlog.Errorf(\"host:%v failed to server: %v\", nodeCfg.nodeHost, err)\n\t\t\t\treturn\n\t\t\t}\n\t\t})\n\t})\n\n\treturn s, nil\n}", "title": "" }, { "docid": "6f8e43f14740f273ea843a6aacb54321", "score": "0.5917669", "text": "func New(namespaces corev1.NamespaceList, secrets map[string][]corev1.Secret, port int, kmsClient *kmspluginclient.Client, timeout time.Duration) (*Server, error) {\n\tvar err error\n\tif port == 0 {\n\t\tport, err = freeport.GetFreePort()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"failed to allocate port for fake kube-apiserver, error: %v\", err)\n\t\t}\n\t}\n\n\ts := &Server{\n\t\tnamespaces: namespaces,\n\t\tsecrets: secrets,\n\t\tkms: kmsClient,\n\t\ttimeout: timeout,\n\t}\n\n\ts.srv = httptest.NewUnstartedServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tswitch r.Method {\n\t\tcase http.MethodGet:\n\t\t\ts.processGet(r.URL.EscapedPath(), w)\n\t\tcase http.MethodPut:\n\t\t\ts.processPut(r, w)\n\t\tdefault:\n\t\t\thttp.Error(w, fmt.Sprintf(\"unexpected http method %v\", r.Method), http.StatusBadRequest)\n\t\t}\n\t}))\n\n\tl, err := net.Listen(\"tcp\", fmt.Sprintf(\"localhost:%d\", port))\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to listen on port %d, error: %v\", port, err)\n\t}\n\ts.srv.Listener = l\n\ts.srv.Start()\n\treturn s, nil\n}", "title": "" }, { "docid": "48a19e9532dba91c203ed0b197730c91", "score": "0.5901887", "text": "func newServer(miningAddrs []massutil.Address, db database.Db, pocWallet *wallet.PoCWallet) (*server, error) {\n\ts := &server{\n\t\tquit: make(chan struct{}),\n\t\tdb: db,\n\t\tpocWallet: pocWallet,\n\t}\n\n\tvar err error\n\t// Create Blockchain\n\ts.chain, err = blockchain.NewBlockchain(db, cfg.Db.DataDir, s)\n\tif err != nil {\n\t\tlogging.CPrint(logging.ERROR, \"fail on new BlockChain\", logging.LogFormat{\"err\": err})\n\t\treturn nil, err\n\t}\n\n\t// New SyncManager\n\tnewBlockCh := make(chan *wire.Hash, consensus.MaxNewBlockChSize)\n\tsyncManager, err := netsync.NewSyncManager(cfg, s.chain, s.chain.GetTxPool(), newBlockCh)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\ts.syncManager = syncManager\n\n\t// Create SpaceKeeper according to SpaceKeeperBackend\n\tswitch cfg.Miner.SpacekeeperBackend {\n\tcase \"poolmanager\":\n\t\ts.spaceKeeper, err = spacekeeper.NewSpaceKeeper(cfg.Miner.SpacekeeperBackend, cfg, s.chain)\n\tdefault:\n\t\ts.spaceKeeper, err = spacekeeper.NewSpaceKeeper(cfg.Miner.SpacekeeperBackend, cfg, pocWallet)\n\t}\n\tif err != nil {\n\t\tlogging.CPrint(logging.ERROR, \"fail on NewSpaceKeeper\", logging.LogFormat{\"err\": err, \"backend\": cfg.Miner.SpacekeeperBackend})\n\t\treturn nil, err\n\t}\n\n\t// Create PoCMiner according to MinerBackend\n\ts.pocMiner, err = pocminer.NewPoCMiner(cfg.Miner.PocminerBackend, cfg.Miner.AllowSolo, s.chain, s.syncManager, s.spaceKeeper, newBlockCh, miningAddrs)\n\tif err != nil {\n\t\tlogging.CPrint(logging.ERROR, \"fail on NewPoCMiner\", logging.LogFormat{\"err\": err, \"backend\": cfg.Miner.PocminerBackend})\n\t\treturn nil, err\n\t}\n\n\t// Create API Server\n\ts.apiServer, err = api.NewServer(s.db, s.pocMiner, mining.NewConfigurableSpaceKeeper(s.spaceKeeper), s.chain, s.chain.GetTxPool(), s.syncManager, pocWallet, func() { interruptChannel <- os.Interrupt }, cfg)\n\tif err != nil {\n\t\tlogging.CPrint(logging.ERROR, \"new server\", logging.LogFormat{\"err\": err})\n\t\treturn nil, err\n\t}\n\n\treturn s, nil\n}", "title": "" }, { "docid": "e5c9f8eb0a1233ce4e987683ce82d1a0", "score": "0.590047", "text": "func newTestServer(t *testing.T, h http.Handler) *testServer {\n\tts := httptest.NewServer(h)\n\n\t// Disable redirect-following for the client. Essentially this function\n\t// is called after a 3xx response is received by the client, and returning\n\t// the http.ErrUseLastResponse error forces it to immediately return the\n\t// received response.\n\tts.Client().CheckRedirect = func(req *http.Request, via []*http.Request) error {\n\t\treturn http.ErrUseLastResponse\n\t}\n\n\treturn &testServer{ts}\n}", "title": "" }, { "docid": "cbd864135f70eeba9b1f32e21153f5a5", "score": "0.5890653", "text": "func NewServer(key *rsa.PrivateKey) (*MockOIDC, error) {\n\tclientID, err := randomNonce(24)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tclientSecret, err := randomNonce(24)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tkeypair, err := NewKeypair(key)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &MockOIDC{\n\t\tClientID: clientID,\n\t\tClientSecret: clientSecret,\n\t\tAccessTTL: time.Duration(10) * time.Minute,\n\t\tRefreshTTL: time.Duration(60) * time.Minute,\n\t\tKeypair: keypair,\n\t\tSessionStore: NewSessionStore(),\n\t\tUserQueue: &UserQueue{},\n\t\tErrorQueue: &ErrorQueue{},\n\t}, nil\n}", "title": "" }, { "docid": "75b2d5c364f1c25d3ec0238e40b9fb7c", "score": "0.58793026", "text": "func NewServer(addr string, pollch chan<- []byte, st store.Repo) *Server {\n\tsrv := &Server{\n\t\tServer: &http.Server{\n\t\t\tAddr: addr,\n\t\t},\n\n\t\tst: st,\n\t\tpollch: pollch,\n\t}\n\n\tr := mux.NewRouter()\n\tsrv.Handler = r\n\n\tr.Handle(\"/\", chain(getRoot, setRequestID, logRequest)).\n\t\tMethods(http.MethodGet)\n\n\tr.Handle(\"/repos/git\", chain(srv.postGitRepo, setRequestID, logRequest)).\n\t\tMethods(http.MethodPost)\n\n\tr.Handle(\"/repos/git\", chain(srv.getGitRepo, setRequestID, logRequest)).\n\t\tMethods(http.MethodGet)\n\n\t// TODO: delete git repos\n\n\treturn srv\n}", "title": "" }, { "docid": "292aea0e70e611b4565d36fcff8fff03", "score": "0.5876793", "text": "func newServer(p NewServerParams) *server {\n\treturn &server{\n\t\tassetsDir: p.Config.AssetsDir,\n\t}\n}", "title": "" }, { "docid": "8c2ff009b151d96278658c35b9c03032", "score": "0.5874307", "text": "func MockAPIServer() *httptest.Server {\n\tserver := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tw.Header().Set(\"Content-type\", \"application/json\")\n\n\t\tswitch r.URL.Path {\n\n\t\tcase \"/v1/auth/login\":\n\t\t\tswitch r.Method {\n\t\t\tcase http.MethodPost:\n\t\t\t\tw.WriteHeader(200)\n\t\t\t\tfmt.Fprintf(w, mockLoginResponseData())\n\t\t\tdefault:\n\t\t\t\tlog.Fatalf(\"gomonnify.testhelpers: POST request expected in Login() method or /auth/login endpoint, Got: %v\", r.Method)\n\t\t\t}\n\n\t\tcase \"/v1/bank-transfer/reserved-accounts\":\n\t\t\tswitch r.Method {\n\t\t\tcase http.MethodPost:\n\t\t\t\tw.WriteHeader(200)\n\t\t\t\tfmt.Fprintf(w, mockReserveAccountResponseData())\n\t\t\tdefault:\n\t\t\t\tlog.Fatalf(\"gomonnify.testhelpers: POST request expected in reservedAccounts.ReserveAccount() method or /bank-transfer/reserved-accounts endpoint, Got: %v\", r.Method)\n\t\t\t}\n\n\t\tcase fmt.Sprintf(\"/v1/bank-transfer/reserved-accounts/%v\", AccountReference):\n\t\t\tswitch r.Method {\n\t\t\tcase http.MethodGet:\n\t\t\t\tw.WriteHeader(200)\n\t\t\t\tfmt.Fprintf(w, mockReserveAccountResponseData())\n\t\t\tdefault:\n\t\t\t\tlog.Fatalf(\"gomonnify.testhelpers: GET request expected in reservedAccounts.Details() method or /bank-transfer/reserved-accounts/{{accountReference}} endpoint, Got: %v\", r.Method)\n\t\t\t}\n\n\t\tcase fmt.Sprintf(\"/v1/bank-transfer/reserved-accounts/%v\", AccountNumber):\n\t\t\tswitch r.Method {\n\t\t\tcase http.MethodDelete:\n\t\t\t\tw.WriteHeader(200)\n\t\t\t\tfmt.Fprintf(w, mockReserveAccountResponseData())\n\t\t\tdefault:\n\t\t\t\tlog.Fatalf(\"gomonnify.testhelpers: DELETE request expected in reservedAccounts.Deallocate() method or /bank-transfer/reserved-accounts/{{accountNumber}} endpoint, Got: %v\", r.Method)\n\t\t\t}\n\n\t\tcase \"/v1/bank-transfer/reserved-accounts/transactions\":\n\t\t\tswitch r.Method {\n\t\t\tcase http.MethodGet:\n\t\t\t\tw.WriteHeader(200)\n\t\t\t\tfmt.Fprintf(w, mockTransactionsResponseData())\n\t\t\tdefault:\n\t\t\t\tlog.Fatalf(\"gomonnify.testhelpers: GET request expected in reservedAccounts.Transactions() method or /bank-transfer/reserved-accounts/transactions endpoint, Got: %v\", r.Method)\n\t\t\t}\n\n\t\tcase \"/v1/disbursements/single\":\n\t\t\tswitch r.Method {\n\t\t\tcase http.MethodPost:\n\t\t\t\tw.WriteHeader(200)\n\t\t\t\tfmt.Fprintf(w, mockSingleTransferResponseData())\n\t\t\tdefault:\n\t\t\t\tlog.Fatalf(\"gomonnify.testhelpers: POST request expected in disbursements.SingleTransfer() method or /disbursements/single endpoint, Got: %v\", r.Method)\n\t\t\t}\n\n\t\tcase \"/v1/disbursements/batch\":\n\t\t\tswitch r.Method {\n\t\t\tcase http.MethodPost:\n\t\t\t\tw.WriteHeader(200)\n\t\t\t\tfmt.Fprintf(w, mockBulkTransferResponseData())\n\t\t\tdefault:\n\t\t\t\tlog.Fatalf(\"gomonnify.testhelpers: POST request expected in disbursements.BulkTransfer() method or /disbursements/batch endpoint, Got: %v\", r.Method)\n\t\t\t}\n\n\t\tcase \"/v1/disbursements/single/validate-otp\":\n\t\t\tswitch r.Method {\n\t\t\tcase http.MethodPost:\n\t\t\t\tw.WriteHeader(200)\n\t\t\t\tfmt.Fprintf(w, mockSingleTransferResponseData())\n\t\t\tdefault:\n\t\t\t\tlog.Fatalf(\"gomonnify.testhelpers: POST request expected in disbursements.AuthorizeSingleTransfer() method or /disbursements/single/validate-otp endpoint, Got: %v\", r.Method)\n\t\t\t}\n\n\t\tcase \"/v1/disbursements/batch/validate-otp\":\n\t\t\tswitch r.Method {\n\t\t\tcase http.MethodPost:\n\t\t\t\tw.WriteHeader(200)\n\t\t\t\tfmt.Fprintf(w, mockBulkTransferResponseData())\n\t\t\tdefault:\n\t\t\t\tlog.Fatalf(\"gomonnify.testhelpers: POST request expected in disbursements.AuthorizeBulkTransfer() method or /disbursements/batch/validate-otp endpoint, Got: %v\", r.Method)\n\t\t\t}\n\n\t\tcase \"/v1/disbursements/single/summary\":\n\t\t\tswitch r.Method {\n\t\t\tcase http.MethodGet:\n\t\t\t\tw.WriteHeader(200)\n\t\t\t\tfmt.Fprintf(w, mockSingleTransferDetailsResponseData())\n\t\t\tdefault:\n\t\t\t\tlog.Fatalf(\"gomonnify.testhelpers: GET request expected in disbursements.SingleTransferDetails() method or /disbursements/single/summary endpoint, Got: %v\", r.Method)\n\t\t\t}\n\n\t\tcase \"/v1/disbursements/batch/summary\":\n\t\t\tswitch r.Method {\n\t\t\tcase http.MethodGet:\n\t\t\t\tw.WriteHeader(200)\n\t\t\t\tfmt.Fprintf(w, mockBulkTransferDetailsResponseData())\n\t\t\tdefault:\n\t\t\t\tlog.Fatalf(\"gomonnify.testhelpers: GET request expected in disbursements.SingleTransferDetails() method or /disbursements/single/summary endpoint, Got: %v\", r.Method)\n\t\t\t}\n\n\t\tcase fmt.Sprintf(\"/v1/disbursements/bulk/%v/transactions\", BatchReference):\n\t\t\tswitch r.Method {\n\t\t\tcase http.MethodGet:\n\t\t\t\tw.WriteHeader(200)\n\t\t\t\tfmt.Fprintf(w, mockTransferTransactionsResponseData())\n\t\t\tdefault:\n\t\t\t\tlog.Fatalf(\"gomonnify.testhelpers: GET request expected in disbursements.BulkTransferDetails() method or /disbursements/bulk/{{batchReference}}/transactions endpoint, Got: %v\", r.Method)\n\t\t\t}\n\n\t\tcase \"/v1/disbursements/single/transactions\":\n\t\t\tswitch r.Method {\n\t\t\tcase http.MethodGet:\n\t\t\t\tw.WriteHeader(200)\n\t\t\t\tfmt.Fprintf(w, mockTransferTransactionsResponseData())\n\t\t\tdefault:\n\t\t\t\tlog.Fatalf(\"gomonnify.testhelpers: GET request expected in disbursements.SingleTransferDetails() method or /disbursements/single/transactions endpoint, Got: %v\", r.Method)\n\t\t\t}\n\n\t\tcase \"/v1/disbursements/account/validate\":\n\t\t\tswitch r.Method {\n\t\t\tcase http.MethodGet:\n\t\t\t\tw.WriteHeader(200)\n\t\t\t\tfmt.Fprintf(w, mockValidateAccountNumberResponseData())\n\t\t\tdefault:\n\t\t\t\tlog.Fatalf(\"gomonnify.testhelpers: GET request expected in disbursements.ValidateAccountNumber() method or /disbursements/account/validate endpoint, Got: %v\", r.Method)\n\t\t\t}\n\n\t\tcase \"/v1/disbursements/wallet-balance\":\n\t\t\tswitch r.Method {\n\t\t\tcase http.MethodGet:\n\t\t\t\tw.WriteHeader(200)\n\t\t\t\tfmt.Fprintf(w, mockWalletBalanceResponseData())\n\t\t\tdefault:\n\t\t\t\tlog.Fatalf(\"gomonnify.testhelpers: GET request expected in disbursements.WalletBalance() method or /disbursements/wallet-balance endpoint, Got: %v\", r.Method)\n\t\t\t}\n\n\t\tcase \"/v1/disbursements/single/resend-otp\":\n\t\t\tswitch r.Method {\n\t\t\tcase http.MethodPost:\n\t\t\t\tw.WriteHeader(200)\n\t\t\t\tfmt.Fprintf(w, mockResendOTPResponseData())\n\t\t\tdefault:\n\t\t\t\tlog.Fatalf(\"gomonnify.testhelpers: POST request expected in disbursements.ResendOTP() method or /disbursements/single/resend-otp endpoint, Got: %v\", r.Method)\n\t\t\t}\n\n\t\tcase fmt.Sprintf(\"/v2/transactions/%v\", TransferReference):\n\t\t\tswitch r.Method {\n\t\t\tcase http.MethodGet:\n\t\t\t\tw.WriteHeader(200)\n\t\t\t\tfmt.Fprintf(w, mockTransactionStatusResponseData())\n\t\t\tdefault:\n\t\t\t\tlog.Fatalf(\"gomonnify.testhelpers: GET request expected in general.GetTransaction() method or /v2/transactions/{{reference}}, Got: %v\", r.Method)\n\t\t\t}\n\n\t\tcase \"/v1/banks\":\n\t\t\tswitch r.Method {\n\t\t\tcase http.MethodGet:\n\t\t\t\tw.WriteHeader(200)\n\t\t\t\tfmt.Fprintf(w, mockGetBanksResponseData())\n\t\t\tdefault:\n\t\t\t\tlog.Fatalf(\"gomonnify.testhelpers: GET request expected in general.GetBanks() method or /v1/banks, Got: %v\", r.Method)\n\t\t\t}\n\n\t\t}\n\n\t}))\n\treturn server\n}", "title": "" }, { "docid": "9cc0d3853cd36527962a00db374c2540", "score": "0.58681947", "text": "func newServer(a *Air) *server {\n\treturn &server{\n\t\ta: a,\n\t\tserver: &http.Server{},\n\t}\n}", "title": "" }, { "docid": "aa706cf1aea665d5ccfcd787e794bfed", "score": "0.5860831", "text": "func NewNodesServiceServerMockWithoutValidation() *NodesServiceServerMock {\n\treturn &NodesServiceServerMock{}\n}", "title": "" }, { "docid": "17764713b571b0e427e98a397fe40c99", "score": "0.58602536", "text": "func NewServer(cfg *Config, debug bool) (*Server, error) {\n\tcfg.check()\n\n\tlog.Infof(\"create etcd v3 client with endpoints %v\", cfg.EtcdHosts)\n\tcli, err := clientv3.New(clientv3.Config{\n\t\tEndpoints: cfg.EtcdHosts,\n\t\tDialTimeout: etcdTimeout,\n\t})\n\tif err != nil {\n\t\treturn nil, errors.Trace(err)\n\t}\n\n\tmv, err := json.Marshal(masterHost{Master: cfg.Host})\n\tif err != nil {\n\t\t// can't fail, so panic here.\n\t\tlog.Fatalf(\"marshal master err %v\", err)\n\t}\n\n\ts := &Server{\n\t\tcfg: cfg,\n\t\tetcdClient: cli,\n\t\tmasterPath: path.Join(util.ETCDRootPath, \"MasterHost\"),\n\t\tmasterValue: string(mv),\n\t\tnewIDPath: path.Join(util.ETCDRootPath, \"NewID\"),\n\t\ttimestampPath: path.Join(util.ETCDRootPath, \"Timestamp\"),\n\t\tdelayRecord: make(map[meta.RangeID]*delayRecord),\n\t\tnodeClientCache: make(map[string]*meta.NodeClient),\n\t\tdm: newDecisionMaker(),\n\t\tstopper: stop.NewStopper(),\n\t\tdebug: debug,\n\t}\n\n\tlis, err := net.Listen(\"tcp\", cfg.Host)\n\tif err != nil {\n\t\tlog.Fatalf(\"Listen host error:%s\", err.Error())\n\t\treturn nil, errors.Trace(err)\n\t}\n\tgrpcSrv := grpc.NewServer()\n\tmeta.RegisterNodeMessageServer(grpcSrv, s)\n\tgo grpcSrv.Serve(lis)\n\n\ts.cluster = newCluster(s)\n\ts.idAllocator = newIDAllocator(s)\n\ts.region = newRegion(s)\n\n\tif debug {\n\t\tstartWebAPI(s)\n\t}\n\n\treturn s, nil\n}", "title": "" }, { "docid": "a53c0be1a3c556e8de8e3507e10531cb", "score": "0.5854847", "text": "func NewServer(maildrop Maildrop) *Server {\n name, err := os.Hostname()\n if err != nil {\n name = \"localhost\"\n }\n return &Server{\n Name: name,\n ServerName: name,\n MaxSize: 131072,\n MaxCommands: 100,\n Maildrop: maildrop,\n // Extensions: make(map[string]Extension),\n Disabled: make(map[string]bool),\n }\n}", "title": "" }, { "docid": "29ce0335731196d2149e062cd59eff4e", "score": "0.5849878", "text": "func FakeServer() Server {\n\treturn Server{\n\t\ttemplateDir: \"../templates\",\n\t\treload: true,\n\t}\n}", "title": "" }, { "docid": "80d5cda04ad3ab5d8643218b1bf929af", "score": "0.5849073", "text": "func NewServer(addr string, targetURL string) *Server {\n\tr := mux.NewRouter()\n\n\t// Just use defaults\n\ts := &Server{\n\t\tid: uuid.New(),\n\t\tserver: &http.Server{\n\t\t\tAddr: addr,\n\t\t\tHandler: r,\n\t\t},\n\t\ttargetURL: targetURL,\n\t}\n\n\t// --- ROUTES ---\n\n\t// Get help\n\tr.HandleFunc(\"/help\", handleHelp).Methods(\"GET\")\n\t// Health check for LM\n\tr.HandleFunc(\"/healthz\", s.handleHealthz).Methods(\"GET\")\n\t// Internal requests\n\tr.HandleFunc(\"/internal\", s.handleInternalNode).Methods(\"POST\")\n\t// External requests\n\tr.HandleFunc(\"/{task:sleep|fail|crash|cpu|ram}\", s.handleRootNode).Methods(\"GET\")\n\tr.HandleFunc(\"/\", s.handleRootNode).Methods(\"GET\")\n\treturn s\n}", "title": "" }, { "docid": "3717da289dbc127e04d8fc2d2677c697", "score": "0.58358556", "text": "func NewServer(webget *Webget, addr string) *Server {\n\tvar ns = &Server{\n\t\twebget: webget,\n\t\tserver: &http.Server{\n\t\t\tAddr: addr,\n\t\t\tHandler: http.DefaultServeMux,\n\t\t\tReadTimeout: 10 * time.Second,\n\t\t\tWriteTimeout: 10 * time.Second,\n\t\t\tMaxHeaderBytes: 1 << 20,\n\t\t},\n\t}\n\n\treturn ns\n}", "title": "" }, { "docid": "665b418d7b35652feab4ad41d28c42df", "score": "0.58255494", "text": "func MockJSONRPCServer(requestChan chan *RequestData) (*httptest.Server, func(string)) {\n\tvar mu sync.RWMutex\n\t// needed to retrieve requests that arrived at httpServer for further investigation\n\tpresetResponse := \"\"\n\tsetNextResponse := func(s string) {\n\t\tmu.Lock()\n\t\tdefer mu.Unlock()\n\t\tpresetResponse = s\n\t}\n\n\thttpServer := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tdata, _ := ioutil.ReadAll(r.Body)\n\t\tdefer r.Body.Close()\n\t\tif requestChan != nil {\n\t\t\trequestChan <- &RequestData{r, string(data)} // store the request for inspection\n\t\t}\n\t\tmu.RLock()\n\t\tdefer mu.RUnlock()\n\t\tfmt.Fprintf(w, presetResponse) // respond with the preset response\n\t}))\n\n\treturn httpServer, setNextResponse\n}", "title": "" }, { "docid": "9c06a4ca11801a3884bca8221cd3ad0d", "score": "0.58093095", "text": "func newServer(ctx common.Context, chs *replica, list net.Listener, workers int) (net.Server, error) {\n\tctx = ctx.Sub(\"Server\")\n\n\tserver := &rpcServer{\n\t\tctx: ctx,\n\t\tlogger: ctx.Logger(),\n\t\tchs: chs,\n\t\ttimeout: 30 * time.Second,\n\t}\n\n\treturn net.NewServer(ctx, list, serverInitHandler(server), workers)\n}", "title": "" }, { "docid": "4eb1d86f25fd83d20f4ad91484a4c324", "score": "0.5803209", "text": "func mockNewManager(port int32)(manager.Manager, error){\n\tif globMgr!=nil{\n\t\treturn globMgr, nil\n\t}\n\tname, config, err := createTestNameConfig()\n\tif err!=nil{\n\t\treturn nil, err\n\t}\n\tmgr, err:= createNewManager(config, name, port)\n\tif err!=nil{\n\t\treturn nil,err\n\t}\n\tglobMgr = mgr\n\treturn mgr, err\n}", "title": "" }, { "docid": "c33b991f71fd1d36a2e669ded414ec3d", "score": "0.5799701", "text": "func NewServer(kernel *kernel.Kernel) (server *Server) {\n\tserver = new(Server)\n\tserver.err = make(chan error)\n\tserver.builtinService = &BuiltinService{kernel: kernel}\n\tserver.router = gin.Default()\n\n\tv1 := server.router.Group(protocol.V1Path)\n\t{\n\t\tv1.HEAD(protocol.HealthPath, server.builtinService.health)\n\t\tv1.GET(protocol.HealthPath, server.builtinService.health)\n\t\tv1.POST(protocol.AddJobPath, server.builtinService.addJob)\n\t\tv1.POST(protocol.AddJobWithIDPath, server.builtinService.addJobWithID)\n\t\tv1.POST(protocol.RemoveJobPath, server.builtinService.removeJob)\n\t}\n\n\treturn server\n}", "title": "" }, { "docid": "fa49e947553275eb20a0d445dc763ef5", "score": "0.5799267", "text": "func NewServer() *negroni.Negroni {\n n := negroni.Classic()\n // n := negroni.New(negroni.NewRecovery())\n mx := mux.NewRouter()\n\n initRoutes(mx)\n\n n.UseHandler(mx)\n return n\n}", "title": "" }, { "docid": "835f440a28210fd107f64287d64c7258", "score": "0.57985276", "text": "func newServer(name string, port int) (*p2p.Server, error) {\n\tpkey, err := crypto.GenerateKey()\n\tif err != nil {\n\t\tlog.Printf(\"Generate private key failed with err: %v\", err)\n\t\treturn nil, err\n\t}\n\n\tcfg := p2p.Config{\n\t\tPrivateKey: pkey,\n\t\tName: name,\n\t\tMaxPeers: 1,\n\t\tProtocols: []p2p.Protocol{proto},\n\t\tEnableMsgEvents: true,\n\t}\n\n\tif port > 0 {\n\t\tcfg.ListenAddr = fmt.Sprintf(\":%d\", port)\n\t}\n\tsrv := &p2p.Server{\n\t\tConfig: cfg,\n\t}\n\n\terr = srv.Start()\n\tif err != nil {\n\t\tlog.Printf(\"Start server failed with err: %v\", err)\n\t\treturn nil, err\n\t}\n\n\treturn srv, nil\n}", "title": "" }, { "docid": "dea45b0ea7244137e2f3a8aced301ddb", "score": "0.57931376", "text": "func New(root string) Server {\n\tfridge := filepath.Join(root, \"fridge\")\n\tfreezer := filepath.Join(root, \"freezer\")\n\treturn Server{root, fridge, freezer}\n}", "title": "" }, { "docid": "2942fdd94e29625c59c24a3f14c215ef", "score": "0.57926065", "text": "func newProxyServer(config *kubeproxyconfig.KubeProxyConfiguration, client clientset.Interface, hostname, sdnNodeIP string) (*ProxyServer, error) {\n\tvar err error\n\n\tvar iptInterface utiliptables.Interface\n\texecer := exec.New()\n\n\t// SDNMISSING: upstream implements --show-hidden-metrics-for-version here\n\n\tnodeIP := detectNodeIP(config, sdnNodeIP)\n\tklog.Infof(\"Detected node IP %s\", nodeIP.String())\n\n\t// Create event recorder\n\teventBroadcaster := events.NewBroadcaster(&events.EventSinkImpl{Interface: client.EventsV1()})\n\trecorder := eventBroadcaster.NewRecorder(scheme.Scheme, \"kube-proxy\")\n\n\tnodeRef := &v1.ObjectReference{\n\t\tKind: \"Node\",\n\t\tName: hostname,\n\t\tUID: types.UID(hostname),\n\t\tNamespace: \"\",\n\t}\n\n\tvar healthzServer healthcheck.ProxierHealthUpdater\n\tif len(config.HealthzBindAddress) > 0 {\n\t\thealthzServer = healthcheck.NewProxierHealthServer(config.HealthzBindAddress, 2*config.IPTables.SyncPeriod.Duration, recorder, nodeRef)\n\t}\n\n\tvar proxier sdnproxy.HybridizableProxy\n\tvar enableUnidling bool\n\n\tproxyMode := config.Mode\n\tif proxyMode == proxyModeUnidling {\n\t\tenableUnidling = true\n\t\tproxyMode = proxyModeIPTables\n\t}\n\n\t// SDNMISSING: upstream supports dual-stack\n\tprimaryProtocol := utiliptables.ProtocolIPv4\n\tiptInterface = utiliptables.New(execer, primaryProtocol)\n\n\tklog.V(0).Infof(\"kube-proxy running in single-stack %s mode\", iptInterface.Protocol())\n\n\tif proxyMode == proxyModeIPTables {\n\t\tklog.V(0).Info(\"Using iptables Proxier.\")\n\t\tif config.IPTables.MasqueradeBit == nil {\n\t\t\t// MasqueradeBit must be specified or defaulted.\n\t\t\treturn nil, fmt.Errorf(\"unable to read IPTables MasqueradeBit from config\")\n\t\t}\n\n\t\tlocalDetector := getLocalDetector()\n\n\t\tproxier, err = iptables.NewProxier(\n\t\t\tiptInterface,\n\t\t\tutilsysctl.New(),\n\t\t\texecer,\n\t\t\tconfig.IPTables.SyncPeriod.Duration,\n\t\t\tconfig.IPTables.MinSyncPeriod.Duration,\n\t\t\tconfig.IPTables.MasqueradeAll,\n\t\t\tint(*config.IPTables.MasqueradeBit),\n\t\t\tlocalDetector,\n\t\t\thostname,\n\t\t\tnodeIP,\n\t\t\trecorder,\n\t\t\thealthzServer,\n\t\t\tconfig.NodePortAddresses,\n\t\t)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"unable to create proxier: %v\", err)\n\t\t}\n\t\tproxymetrics.RegisterMetrics()\n\t} else if proxyMode == proxyModeIPVS {\n\t\t// SDNMISSING: NOT REACHED: We don't support IPVS mode. (CNO doesn't\n\t\t// allow you to set \"mode: ipvs\".)\n\t} else {\n\t\tklog.V(0).Info(\"Using userspace Proxier.\")\n\n\t\tproxier, err = userspace.NewProxier(\n\t\t\tuserspace.NewLoadBalancerRR(),\n\t\t\tnet.ParseIP(config.BindAddress),\n\t\t\tiptInterface,\n\t\t\texecer,\n\t\t\t*utilnet.ParsePortRangeOrDie(config.PortRange),\n\t\t\tconfig.IPTables.SyncPeriod.Duration,\n\t\t\tconfig.IPTables.MinSyncPeriod.Duration,\n\t\t\tconfig.UDPIdleTimeout.Duration,\n\t\t\tconfig.NodePortAddresses,\n\t\t)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"unable to create proxier: %v\", err)\n\t\t}\n\t}\n\n\tuseEndpointSlices := true\n\tif proxyMode == proxyModeUserspace {\n\t\t// userspace mode doesn't support endpointslice.\n\t\tuseEndpointSlices = false\n\t}\n\n\treturn &ProxyServer{\n\t\tClient: client,\n\t\tIptInterface: iptInterface,\n\t\texecer: execer,\n\t\tBroadcaster: eventBroadcaster,\n\t\tProxyMode: string(proxyMode),\n\t\tMetricsBindAddress: config.MetricsBindAddress,\n\t\tEnableProfiling: config.EnableProfiling,\n\t\tConfigSyncPeriod: config.ConfigSyncPeriod.Duration,\n\t\tHealthzServer: healthzServer,\n\t\tUseEndpointSlices: useEndpointSlices,\n\n\t\tbaseProxy: proxier,\n\t\tenableUnidling: enableUnidling,\n\t}, nil\n}", "title": "" }, { "docid": "1098aed7cd51cce4cc868d61011d2447", "score": "0.57903224", "text": "func NewServer(\n\thttpHost string,\n\thttpPort int,\n\thttpReadTimeout int,\n\thttpWriteTimeout int,\n\thttpIdleTimeout int,\n\tstatsdHost string,\n\tstatsdPort int,\n\ttlsCert string,\n\ttlsKey string,\n\tmetricPrefix string,\n\ttokenSecret string,\n\tverbose bool,\n\thttpRouterName string,\n\tstatsdClientName string,\n) *Server {\n\t// configure logging\n\tvar logOutput io.Writer\n\tif verbose == true {\n\t\tlogOutput = os.Stderr\n\t} else {\n\t\tlogOutput = ioutil.Discard\n\t}\n\n\tlog.SetOutput(logOutput)\n\n\tlogger := log.New(logOutput, \"\", log.LstdFlags)\n\n\t// create StatsD Client\n\tvar statsdClient statsdclient.StatsdClientInterface\n\tswitch statsdClientName {\n\tcase \"Cactus\":\n\t\tstatsdClient = statsdclient.NewCactusClient(statsdHost, statsdPort)\n\tcase \"GoMetric\":\n\t\tstatsdClient = statsdclient.NewGoMetricClient(statsdHost, statsdPort)\n\tdefault:\n\t\tpanic(\"Passed statsd client not supported\")\n\t}\n\n\t// build route handler\n\trouteHandler := routehandler.NewRouteHandler(\n\t\tstatsdClient,\n\t\tmetricPrefix,\n\t)\n\n\t// build router\n\tvar httpServerHandler http.Handler\n\tswitch httpRouterName {\n\tcase \"HttpRouter\":\n\t\thttpServerHandler = router.NewHTTPRouter(routeHandler, tokenSecret)\n\tcase \"GorillaMux\":\n\t\thttpServerHandler = router.NewGorillaMuxRouter(routeHandler, tokenSecret)\n\n\tdefault:\n\t\tpanic(\"Passed HTTP router not supported\")\n\t}\n\n\t// get HTTP server address to bind\n\thttpAddress := fmt.Sprintf(\"%s:%d\", httpHost, httpPort)\n\n\t// create http server\n\thttpServer := &http.Server{\n\t\tAddr: httpAddress,\n\t\tHandler: httpServerHandler,\n\t\tErrorLog: logger,\n\t\tReadTimeout: time.Duration(httpReadTimeout) * time.Second,\n\t\tWriteTimeout: time.Duration(httpWriteTimeout) * time.Second,\n\t\tIdleTimeout: time.Duration(httpIdleTimeout) * time.Second,\n\t\tMaxHeaderBytes: 1 << 11,\n\t}\n\n\tstatsdHTTPProxyServer := Server{\n\t\thttpAddress,\n\t\thttpServer,\n\t\tstatsdClient,\n\t\ttlsCert,\n\t\ttlsKey,\n\t}\n\n\treturn &statsdHTTPProxyServer\n}", "title": "" }, { "docid": "3508d0d02df1627173c8bfbf08a2e2f3", "score": "0.57893336", "text": "func TestServer(t *testing.T) {\n\n}", "title": "" }, { "docid": "c0aa95259c23810fc4194e8a31ffc9cf", "score": "0.5786262", "text": "func NewServer() (*Server, error) {\n\trouter := httprouter.New()\n\ts := &Server{\n\t\tsrv: &http.Server{\n\t\t\tHandler: router,\n\t\t},\n\t\trunning: false,\n\t\trouter: router,\n\t\ttimeStarted: time.Now().UTC(),\n\t\twatchGroup: &sync.WaitGroup{},\n\t}\n\n\t// Before we can actually bind the socket, we must lock the file\n\ts.lockPath = filepath.Join(baseDir, LockFilePath)\n\tlfile, err := NewLockFile(s.lockPath)\n\ts.lockFile = lfile\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Try to lock our lockfile now\n\tif err := s.lockFile.Lock(); err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Set up the API bits\n\trouter.GET(\"/api/v1/status\", s.GetStatus)\n\n\t// Repo management\n\trouter.GET(\"/api/v1/create/repo/:id\", s.CreateRepo)\n\trouter.GET(\"/api/v1/remove/repo/:id\", s.DeleteRepo)\n\trouter.GET(\"/api/v1/delta/repo/:id\", s.DeltaRepo)\n\trouter.GET(\"/api/v1/index/repo/:id\", s.IndexRepo)\n\n\t// Client sends us data\n\trouter.POST(\"/api/v1/import/:id\", s.ImportPackages)\n\trouter.POST(\"/api/v1/clone/:id\", s.CloneRepo)\n\trouter.POST(\"/api/v1/copy/source/:id\", s.CopySource)\n\trouter.POST(\"/api/v1/pull/:id\", s.PullRepo)\n\n\t// Removal\n\trouter.POST(\"/api/v1/remove/source/:id\", s.RemoveSource)\n\trouter.POST(\"/api/v1/trim/packages/:id\", s.TrimPackages)\n\trouter.GET(\"/api/v1/trim/obsoletes/:id\", s.TrimObsolete)\n\n\t// Reset jobs are special and go straight to the store\n\t// We can't queue them as a job because we'd be in catch 22..\n\trouter.GET(\"/api/v1/reset/completed\", s.ResetCompleted)\n\trouter.GET(\"/api/v1/reset/failed\", s.ResetFailed)\n\n\t// List commands\n\trouter.GET(\"/api/v1/list/repos\", s.GetRepos)\n\trouter.GET(\"/api/v1/list/pool\", s.GetPoolItems)\n\treturn s, nil\n}", "title": "" }, { "docid": "8ae4e28485eb1c81063ac2fc8ae28e3f", "score": "0.5784447", "text": "func newMockNeutrinoClient() *NeutrinoClient {\n\t// newRescanFunc returns a mockRescanner\n\tnewRescanFunc := func(ro ...neutrino.RescanOption) rescanner {\n\t\treturn &mockRescanner{\n\t\t\tupdateArgs: list.New(),\n\t\t}\n\t}\n\n\treturn &NeutrinoClient{\n\t\tCS: &mockChainService{},\n\t\tnewRescan: newRescanFunc,\n\t}\n}", "title": "" }, { "docid": "651e3d24524082678bba3b41c5b13c66", "score": "0.5781336", "text": "func NewServer(usecase antibruteforce.Usecase, logger *zap.Logger) *Server {\n\treturn &Server{usecase: usecase, logger: logger}\n}", "title": "" }, { "docid": "196b13568f4cb70f45309db50d212b95", "score": "0.57806945", "text": "func NewServer(logger Logger) *Server {\n\treturn &Server{\n\t\trouter: router{\n\t\t\tchiRouter: chi.NewRouter(),\n\t\t\tlogger: logger,\n\t\t},\n\t}\n}", "title": "" }, { "docid": "f92f443bcf1da0216c48794e7448ffab", "score": "0.5773636", "text": "func NewServer(manager.BuildManager, string) *Server {\n\treturn &Server{}\n}", "title": "" }, { "docid": "d008335b66519cd351e5bf738a067f7b", "score": "0.5771049", "text": "func NewServer() *negroni.Negroni {\n formatter := render.New(render.Options{\n IndentJSON: true,\n })\n\n\n n := negroni.Classic()\n api := mux.NewRouter().PathPrefix(\"/api\").Subrouter().StrictSlash(true)\n mux := mux.NewRouter()\n repo := &repoHandler{}\n initRoutes(api, formatter, repo)\n mux.PathPrefix(\"/api\").Handler(negroni.New(\n NewMiddleware(),\n negroni.Wrap(api),\n ))\n initRoutesWithoutAuth(mux, formatter)\n n.UseHandler(mux)\n return n\n}", "title": "" }, { "docid": "39404bea115adff6ea592b0ec6a2b098", "score": "0.57707775", "text": "func NewHttpServer(hs hashservice, addr string) *httpserver {\n\tsrv := &http.Server{\n\t\tAddr: addr,\n\t\tHandler: initRoutes(hs),\n\t\tReadTimeout: 5 * time.Second,\n\t\tWriteTimeout: 10 * time.Second,\n\t}\n\treturn &httpserver{srv: srv}\n}", "title": "" }, { "docid": "6814998e35409aa0fb906b8b87548bce", "score": "0.57683563", "text": "func mockServer(latestVersion int, responses map[int]string) func(http.ResponseWriter, *http.Request) {\n\treturn func(w http.ResponseWriter, req *http.Request) {\n\t\tversion := req.URL.Query().Get(\"version\")\n\t\tversionInt, err := strconv.Atoi(version)\n\t\tif err != nil {\n\t\t\tw.WriteHeader(http.StatusBadRequest)\n\t\t\tw.Write([]byte(\"Request had invalid version: \" + version))\n\t\t\treturn\n\t\t}\n\t\tif versionInt == 0 {\n\t\t\tversionInt = latestVersion\n\t\t}\n\t\tresponse, ok := responses[versionInt]\n\t\tif !ok {\n\t\t\tw.WriteHeader(http.StatusForbidden)\n\t\t\tw.Write([]byte(\"Version not found: \" + version))\n\t\t\treturn\n\t\t}\n\t\tw.Write([]byte(response))\n\t}\n}", "title": "" }, { "docid": "8ee97153ff8d4513cd1b13fe3dd6df24", "score": "0.57654107", "text": "func createServer(r http.Handler) *http.Server {\n\treturn &http.Server{\n\t\tAddr: fmt.Sprintf(\"%s:%d\", conf.Host, conf.Port),\n\t\tHandler: r,\n\t\tReadTimeout: conf.ReadTimeout * time.Second,\n\t\tWriteTimeout: conf.WriteTimeout * time.Second,\n\t\tMaxHeaderBytes: 1 << 20,\n\t}\n}", "title": "" }, { "docid": "63de11e07b05eb9ab2eaa0a2d82fab0b", "score": "0.57640845", "text": "func NewTestServer(t *testing.T, callback func(pdata.Traces)) string {\n\tt.Helper()\n\n\tsrv, listenAddr, err := NewServerWithRandomPort(callback)\n\tif err != nil {\n\t\tt.Fatalf(\"failed to create OTLP server: %s\", err)\n\t}\n\tt.Cleanup(func() {\n\t\terr := srv.Stop()\n\t\tassert.NoError(t, err)\n\t})\n\n\treturn listenAddr\n}", "title": "" }, { "docid": "f579f7dd023216f22546ae6248ce71a7", "score": "0.5758458", "text": "func newTestAppServer(t *testing.T, objects ...runtime.Object) *Server {\n\tf := func(enf *rbac.Enforcer) {\n\t\t_ = enf.SetBuiltinPolicy(assets.BuiltinPolicyCSV)\n\t\tenf.SetDefaultRole(\"role:admin\")\n\t}\n\treturn newTestAppServerWithEnforcerConfigure(f, t, objects...)\n}", "title": "" }, { "docid": "9bf55be564389eef92593cb5532bf865", "score": "0.57563764", "text": "func TestNew(t *testing.T) {\n\ttests := []struct {\n\t\tname string\n\t}{\n\t\t{\"creates a new server with all properties\"},\n\t}\n\tfor _, tt := range tests {\n\t\ttest := tt\n\t\tt.Run(test.name, func(t *testing.T) {\n\t\t\tmockCtrl := gomock.NewController(t)\n\t\t\tmockListener := mocks.NewMockListener(mockCtrl)\n\n\t\t\twant := &server{\n\t\t\t\tdataPipes: map[int]pipe.GzipWriter{},\n\t\t\t\tstreamers: map[int]storage.MessageStreamer{},\n\t\t\t\tlistener: mockListener,\n\t\t\t}\n\n\t\t\tif got := New(mockListener); !reflect.DeepEqual(got, want) {\n\t\t\t\tt.Errorf(\"NewGzipWriter() = %v, want %v\", got, want)\n\t\t\t}\n\n\t\t\tmockCtrl.Finish()\n\t\t})\n\t}\n}", "title": "" }, { "docid": "56419a05a0ad87a0a1ceb372baad1463", "score": "0.57556486", "text": "func NewMock(postHandler PostHandler, dir string, lastRequestHeader ...*map[string][]string) (*http.Client, string) {\n\trouter := urlrouter.Router{\n\t\tRoutes: []urlrouter.Route{\n\t\t\turlrouter.Route{\n\t\t\t\tPathExp: \"/v1.1/districts\",\n\t\t\t\tDest: MockResource(postHandler, fmt.Sprintf(\"%s/districts.json\", dir)),\n\t\t\t},\n\t\t\turlrouter.Route{\n\t\t\t\tPathExp: \"/v1.1/districts/:id\",\n\t\t\t\tDest: MockResourceID(fmt.Sprintf(\"%s/districts.json\", dir)),\n\t\t\t},\n\t\t\turlrouter.Route{\n\t\t\t\tPathExp: \"/v1.1/schools\",\n\t\t\t\tDest: MockResource(postHandler, fmt.Sprintf(\"%s/schools.json\", dir)),\n\t\t\t},\n\t\t\turlrouter.Route{\n\t\t\t\tPathExp: \"/v1.1/schools/:id\",\n\t\t\t\tDest: MockResourceID(fmt.Sprintf(\"%s/schools.json\", dir)),\n\t\t\t},\n\t\t\turlrouter.Route{\n\t\t\t\tPathExp: \"/v1.1/teachers\",\n\t\t\t\tDest: MockResource(postHandler, fmt.Sprintf(\"%s/teachers.json\", dir)),\n\t\t\t},\n\t\t\turlrouter.Route{\n\t\t\t\tPathExp: \"/v1.1/teachers/:id\",\n\t\t\t\tDest: MockResourceID(fmt.Sprintf(\"%s/teachers.json\", dir)),\n\t\t\t},\n\t\t\turlrouter.Route{\n\t\t\t\tPathExp: \"/v1.1/students\",\n\t\t\t\tDest: MockResource(postHandler, fmt.Sprintf(\"%s/students.json\", dir)),\n\t\t\t},\n\t\t\turlrouter.Route{\n\t\t\t\tPathExp: \"/v1.1/students/:id\",\n\t\t\t\tDest: MockResourceID(fmt.Sprintf(\"%s/students.json\", dir)),\n\t\t\t},\n\t\t\turlrouter.Route{\n\t\t\t\tPathExp: \"/v1.1/sections\",\n\t\t\t\tDest: MockResource(postHandler, fmt.Sprintf(\"%s/sections.json\", dir), fmt.Sprintf(\"%s/sections2.json\", dir)),\n\t\t\t},\n\t\t\turlrouter.Route{\n\t\t\t\tPathExp: \"/v1.1/sections/:id\",\n\t\t\t\tDest: MockResourceID(fmt.Sprintf(\"%s/sections.json\", dir)),\n\t\t\t},\n\t\t\turlrouter.Route{\n\t\t\t\tPathExp: \"/v1.1/events\",\n\t\t\t\tDest: MockResource(postHandler, fmt.Sprintf(\"%s/events.json\", dir)),\n\t\t\t},\n\t\t\turlrouter.Route{\n\t\t\t\tPathExp: \"/v1.1/events/:id\",\n\t\t\t\tDest: MockResourceID(fmt.Sprintf(\"%s/events.json\", dir)),\n\t\t\t},\n\t\t\turlrouter.Route{\n\t\t\t\tPathExp: \"/v1.1/school_admins\",\n\t\t\t\tDest: MockResource(postHandler, fmt.Sprintf(\"%s/schooladmins.json\", dir)),\n\t\t\t},\n\t\t\turlrouter.Route{\n\t\t\t\tPathExp: \"/v1.1/school_admins/:id\",\n\t\t\t\tDest: MockResourceID(fmt.Sprintf(\"%s/schooladmins.json\", dir)),\n\t\t\t},\n\t\t\turlrouter.Route{\n\t\t\t\tPathExp: \"/v1.1/district_admins\",\n\t\t\t\tDest: MockResource(postHandler, fmt.Sprintf(\"%s/districtadmins_nolinks.json\", dir), fmt.Sprintf(\"%s/districtadmins.json\", dir)),\n\t\t\t},\n\t\t\turlrouter.Route{\n\t\t\t\tPathExp: \"/v1.1/district_admins/:id\",\n\t\t\t\tDest: MockResourceID(fmt.Sprintf(\"%s/districtadmins.json\", dir)),\n\t\t\t},\n\t\t\turlrouter.Route{\n\t\t\t\tPathExp: \"/v1.1/contacts\",\n\t\t\t\tDest: MockResource(postHandler, fmt.Sprintf(\"%s/contacts.json\", dir)),\n\t\t\t},\n\t\t\turlrouter.Route{\n\t\t\t\tPathExp: \"/v1.1/contacts/:id\",\n\t\t\t\tDest: MockResourceID(fmt.Sprintf(\"%s/contacts.json\", dir)),\n\t\t\t},\n\t\t\turlrouter.Route{\n\t\t\t\tPathExp: \"/mock/rate/limiter\",\n\t\t\t\tDest: MockResourceRateLimit(),\n\t\t\t},\n\t\t\turlrouter.Route{\n\t\t\t\tPathExp: \"/mock/error\",\n\t\t\t\tDest: MockError(),\n\t\t\t},\n\t\t},\n\t}\n\n\tif err := router.Start(); err != nil {\n\t\tpanic(err)\n\t}\n\n\tts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tlog.Println(\"mock server:\", r.URL)\n\t\troute, params := router.FindRouteFromURL(r.URL)\n\t\thandler := route.Dest.(func(http.ResponseWriter, *http.Request, map[string]string))\n\t\tif len(lastRequestHeader) > 0 {\n\t\t\t*(lastRequestHeader[0]) = r.Header\n\t\t}\n\t\thandler(w, r, params)\n\t}))\n\n\tclient := &http.Client{\n\t\tTransport: &oauth2.Transport{\n\t\t\tSource: oauth2.StaticTokenSource(&oauth2.Token{AccessToken: \"doesntmatter\"}),\n\t\t},\n\t}\n\treturn client, ts.URL\n}", "title": "" }, { "docid": "81cce0e8d31f2e06f769d113d656f339", "score": "0.5753992", "text": "func NewTestServer(path string, body string, statusCode int) *httptest.Server {\n\treturn httptest.NewServer(\n\t\thttp.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t\tif strings.Contains(r.URL.Path, path) {\n\t\t\t\tw.WriteHeader(statusCode)\n\t\t\t\tw.Write([]byte(body))\n\t\t\t}\n\t\t}),\n\t)\n}", "title": "" }, { "docid": "16966021c17bae087911098e51d469ba", "score": "0.5752143", "text": "func NewServer() *Server {\n\treturn &Server{Common:Common{serviceMap: make(map[string]*service), pending:make(map[uint64]*Call)}}\n}", "title": "" }, { "docid": "06807d46320e11234226b70d31ee9ffa", "score": "0.57446665", "text": "func newServer(port int, logRequests bool) *server {\n\n\th := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tw.WriteHeader(http.StatusNotImplemented)\n\t})\n\n\tlogger := colorlog.NewResponseLoggerFunc()\n\tnotAllowed := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tlogger(http.StatusMethodNotAllowed, r)\n\t\thttp.Error(w, \"405 method Not Allowed\", http.StatusNotImplemented)\n\t})\n\n\tnotFound := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tlogger(http.StatusNotFound, r)\n\t\thttp.Error(w, \"404 Page Not Found\", http.StatusNotFound)\n\t})\n\n\treturn &server{\n\t\tServer: &http.Server{\n\t\t\tAddr: fmt.Sprintf(\":%d\", port),\n\t\t\tHandler: h,\n\t\t},\n\t\tnotAllowed: notAllowed,\n\t\tnotFound: notFound,\n\t\tlogRequests: logRequests,\n\t\tlogger: logger,\n\t}\n}", "title": "" }, { "docid": "6daf52b50211762165f53c9d3082eb29", "score": "0.57423353", "text": "func newRequestTokenServer(t *testing.T, data url.Values) *httptest.Server {\n\treturn newMockServer(func(w http.ResponseWriter, req *http.Request) {\n\t\tassert.Equal(t, \"POST\", req.Method)\n\t\tassert.NotEmpty(t, req.Header.Get(\"Authorization\"))\n\t\tw.Header().Set(contentType, formContentType)\n\t\tw.Write([]byte(data.Encode()))\n\t})\n}", "title": "" }, { "docid": "f2d88256c2f2f84161bc5c4a3da76380", "score": "0.57413614", "text": "func newMockService() *genericMockRoundTripper {\n\treturn &genericMockRoundTripper{\n\t\tmockResponses: map[*mux.Route]interface{}{\n\t\t\ttransport.NewAPIRouter().Get(\"UpdateManifests\"): job.ID(\"here-is-a-job-id\"),\n\t\t\ttransport.NewAPIRouter().Get(\"JobStatus\"): job.Status{\n\t\t\t\tStatusString: job.StatusSucceeded,\n\t\t\t},\n\t\t},\n\t\trequestHistory: make(map[string]*http.Request),\n\t}\n}", "title": "" }, { "docid": "cd1f732787967e11e6aad67220e8033e", "score": "0.5740185", "text": "func newServer(sc *ServerConfig, b backends.Backend, l log.Logger) (*server, error) {\n\tserver := &server{\n\t\tclientPool: NewPool(sc.MaxClients),\n\t\tclosedListener: make(chan (bool), 1),\n\t\tlistenInterface: sc.ListenInterface,\n\t\tstate: ServerStateNew,\n\t\tenvelopePool: mail.NewPool(sc.MaxClients),\n\t}\n\tserver.logStore.Store(l)\n\tserver.backendStore.Store(b)\n\tlogFile := sc.LogFile\n\tif logFile == \"\" {\n\t\t// none set, use the same log file as mainlog\n\t\tlogFile = server.mainlog().GetLogDest()\n\t}\n\t// set level to same level as mainlog level\n\tmainlog, logOpenError := log.GetLogger(logFile, server.mainlog().GetLevel())\n\tserver.mainlogStore.Store(mainlog)\n\tif logOpenError != nil {\n\t\tserver.log().WithError(logOpenError).Errorf(\"Failed creating a logger for server [%s]\", sc.ListenInterface)\n\t}\n\n\tserver.setConfig(sc)\n\tserver.setTimeout(sc.Timeout)\n\tif err := server.configureSSL(); err != nil {\n\t\treturn server, err\n\t}\n\treturn server, nil\n}", "title": "" }, { "docid": "c45a71017e60e7b885cafc429e2f5f36", "score": "0.5735103", "text": "func NewServer() *negroni.Negroni {\n formatter := render.New(render.Options{\n IndentJSON: true,\n })\n n := negroni.Classic()\n mx := mux.NewRouter()\n initRoutes(mx, formatter)\n allowedHeaders := handlers.AllowedHeaders([]string{\"X-Requested-With\", \"Content-Type\", \"Authorization\"})\n allowedMethods := handlers.AllowedMethods([]string{\"GET\", \"POST\", \"PUT\", \"HEAD\", \"DELETE\", \"OPTIONS\"})\n allowedOrigins := handlers.AllowedOrigins([]string{\"*\"})\n\n n.UseHandler(handlers.CORS(allowedHeaders, allowedMethods, allowedOrigins)(mx))\n return n\n}", "title": "" }, { "docid": "7de1aff664d40c632423e0fe1b1c1000", "score": "0.57327133", "text": "func createServer() *httptest.Server {\n\tservice := goa.New(\"coindrop\")\n\n\tcognitoRegion := os.Getenv(\"AWS_COINDROP_COGNITO_REGION\")\n\tcognitoUserPoolID := os.Getenv(\"AWS_COINDROP_COGNITO_USER_POOL_ID\")\n\n\tdbport, err := strconv.Atoi(os.Getenv(\"POSTGRES_PORT\"))\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tdbs := db.NewDB(&db.Config{\n\t\tHost: os.Getenv(\"POSTGRES_HOST\"),\n\t\tPort: dbport,\n\t\tUser: os.Getenv(\"POSTGRES_USER\"),\n\t\tPass: os.Getenv(\"POSTGRES_PASS\"),\n\t\tDbname: os.Getenv(\"POSTGRES_DBNAME\"),\n\t\tSSLMode: os.Getenv(\"POSTGRES_SSL_MODE\"),\n\t})\n\n\tservice.Use(middleware.RequestID())\n\tservice.Use(middleware.LogRequest(true))\n\tservice.Use(middleware.ErrorHandler(service, true))\n\tservice.Use(middleware.Recover())\n\tapp.UseJWTAuthMiddleware(service, mw.Auth(auth.NewAuth(&auth.Config{\n\t\tCognitoRegion: cognitoRegion,\n\t\tCognitoUserPoolID: cognitoUserPoolID,\n\t}), dbs))\n\n\t// Mount controllers\n\thealthcheckCtrlr := controllers.NewHealthcheckController(service, dbs)\n\tapp.MountHealthcheckController(service, healthcheckCtrlr)\n\n\tusersCtrlr := controllers.NewUsersController(service, dbs)\n\tapp.MountUsersController(service, usersCtrlr)\n\n\twalletsCtrlr := controllers.NewWalletsController(service, dbs)\n\tapp.MountWalletsController(service, walletsCtrlr)\n\n\ttasksCtrlr := controllers.NewTasksController(service, dbs)\n\tapp.MountTasksController(service, tasksCtrlr)\n\n\tresultsCtrlr := controllers.NewResultsController(service, dbs)\n\tapp.MountResultsController(service, resultsCtrlr)\n\n\tquizzesCtrlr := controllers.NewQuizzesController(service, dbs)\n\tapp.MountQuizzesController(service, quizzesCtrlr)\n\n\twebhooksCtrlr := controllers.NewWebhooksController(service, dbs)\n\tapp.MountWebhooksController(service, webhooksCtrlr)\n\n\tsvr := httptest.NewServer(service.Server.Handler)\n\treturn svr\n}", "title": "" }, { "docid": "bcf2c675b8ea39da183fcee118b7781d", "score": "0.5731801", "text": "func newMinioServer(cfgFile string) *minioServer {\n\tif cfgFile != \"\" {\n\t\tm, err := minioCfgFromFile(cfgFile)\n\t\tif err != nil {\n\t\t\tlog.WithError(err).Fatalf(\"failed read minio cfg from %s\", cfgFile)\n\t\t}\n\t\tlog.Infof(\"Minio configuration defined from %s\", cfgFile)\n\t\treturn &m\n\t}\n\n\t// If Gangplank is running in cluster, then get the IP address. Using\n\t// hostnames can be problematic.\n\thost := getHostname()\n\tac, ns, err := k8sInClusterClient()\n\tif err == nil && ac != nil {\n\t\tvar ctx ClusterContext = context.Background()\n\t\tip, err := getPodIP(ctx, ac, ns, host)\n\t\tif err == nil {\n\t\t\thost = ip\n\t\t}\n\t}\n\n\tlog.Info(\"Defining a new minio server\")\n\tminioAccessKey, _ := randomString(12)\n\tminioSecretKey, _ := randomString(12)\n\n\tm := &minioServer{\n\t\tAccessKey: minioAccessKey,\n\t\tSecretKey: minioSecretKey,\n\t\tHost: host,\n\t\tdir: cosaSrvDir,\n\t\tExternalServer: false,\n\t\tminioOptions: minio.Options{\n\t\t\tCreds: credentials.NewStaticV4(minioAccessKey, minioSecretKey, \"\"),\n\t\t\tSecure: false,\n\t\t\tRegion: fmt.Sprintf(\"cosaHost-%s\", getHostname()),\n\t\t},\n\t}\n\n\tif m.overSSH != nil {\n\t\tm.Host = \"127.0.0.1\"\n\t}\n\n\treturn m\n}", "title": "" } ]
0418afcc8a4f96e165a54e1d93f70b9a
returns the rbp0.85 score as a float64
[ { "docid": "667c85255efd9d5d0cb84c7c6e7b7114", "score": "0.59050393", "text": "func RBP85(run Ranking,depth,R uint) float64 {\n\treturn RBP(run,depth, R, 0.85)\n}", "title": "" } ]
[ { "docid": "30a99e9672d89417e89d1cc97a0d1dc1", "score": "0.60386884", "text": "func fimpactScore(impact float64) float64 {\n\tif impact == 0 {\n\t\treturn 0.0\n\t}\n\treturn 1.176\n}", "title": "" }, { "docid": "232b35d68e6a18b50c83ad56fa9f451d", "score": "0.6023247", "text": "func RBP95(run Ranking,depth,R uint) float64 {\n\treturn RBP(run,depth, R, 0.95)\n}", "title": "" }, { "docid": "c62a6eb862dc19d035f01e996e127c60", "score": "0.59822714", "text": "func (r *ChangeRecall) Score() float64 {\n\tif r.TotalRejections == 0 {\n\t\treturn math.NaN()\n\t}\n\treturn float64(r.preserved()) / float64(r.TotalRejections)\n}", "title": "" }, { "docid": "a88ee4aaa38a4aace46cb0b02579ac05", "score": "0.5953553", "text": "func (r *TestRecall) Score() float64 {\n\tif r.TotalFailures == 0 {\n\t\treturn math.NaN()\n\t}\n\treturn float64(r.preserved()) / float64(r.TotalFailures)\n}", "title": "" }, { "docid": "10d4c1dfd285c4c0776066692c7f7e90", "score": "0.5851958", "text": "func baseScore(bm *cvssv2.BaseMetrics) float64 {\n\timpact := impactScore(bm)\n\treturn roundTo1Decimal((0.6*impact + 0.4*exploitabilityScore(bm) - 1.5) * fimpactScore(impact))\n}", "title": "" }, { "docid": "493984b143a55a1574839c4533036dbc", "score": "0.5689384", "text": "func (bm *Base) Score() float64 {\n\tif err := bm.GetError(); err != nil {\n\t\treturn 0.0\n\t}\n\n\timpact := 1.0 - (1-bm.C.Value())*(1-bm.I.Value())*(1-bm.A.Value())\n\tif bm.S == ScopeUnchanged {\n\t\timpact *= 6.42\n\t} else {\n\t\timpact = 7.52*(impact-0.029) - 3.25*math.Pow(impact-0.02, 15.0)\n\t}\n\tease := 8.22 * bm.AV.Value() * bm.AC.Value() * bm.PR.Value(bm.S) * bm.UI.Value()\n\n\tvar score float64\n\tif impact <= 0 {\n\t\tscore = 0.0\n\t} else if bm.S == ScopeUnchanged {\n\t\tscore = roundUp(math.Min(impact+ease, 10))\n\t} else {\n\t\tscore = roundUp(math.Min(1.08*(impact+ease), 10))\n\t}\n\treturn score\n}", "title": "" }, { "docid": "c6e0a737b5f5d1ed2011aa57cc049c9f", "score": "0.552716", "text": "func (m *SecureScore) GetMaxScore()(*float64) {\n return m.maxScore\n}", "title": "" }, { "docid": "5366a1265f7406ad5264ec61deb1dc50", "score": "0.5448767", "text": "func (e *Efficiency) Score() float64 {\n\tif e.SampleDuration == 0 {\n\t\treturn math.NaN()\n\t}\n\tsaved := e.SampleDuration - e.ForecastDuration\n\treturn float64(saved) / float64(e.SampleDuration)\n}", "title": "" }, { "docid": "76e4f4a06e911f57e548eebbb5ad250b", "score": "0.53879756", "text": "func Score(evt Event, trkIDs []int) float64 {\n\tsum := 0.0\n\ttrks := analyzeTracks(evt.Mcs, evt.Hits, trkIDs)\n\tfor _, trk := range trks {\n\t\tvar (\n\t\t\tmajHits = float64(trk.MajHits)\n\t\t\tnhits = float64(trk.Hits)\n\t\t\tmajPHits = float64(trk.MajPHits)\n\t\t\tpurityRec = majHits / nhits\n\t\t\tpurityMaj = majHits / majPHits\n\t\t\tgoodTrk = 0.5 < purityRec && 0.5 < purityMaj\n\t\t)\n\t\tif goodTrk {\n\t\t\tsum += trk.MajWeight\n\t\t}\n\t}\n\n\treturn sum\n}", "title": "" }, { "docid": "723e95616f9afb643e03d9c1356c0222", "score": "0.5349157", "text": "func (fh *FibonacciHeap) GetScore(c interface{}) (v float64, f bool) {\n\tnode, f := fh.nodes[c]\n\tif f {\n\t\tv = node.value\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "ebc7c6fc3e2179d3deca4cca9fd6ec79", "score": "0.5346288", "text": "func getPercentile(cdf opendata.CDF, score float64) float64 {\n\tif score <= 0.0 {\n\t\treturn 0.0\n\t}\n\tscore = math.Min(score, 1.0)\n\tbinWidth := cdf.Width\n\tid := 0\n\tif score != 0.0 {\n\t\t//id = int(math.Min(float64(len(cdf.Histogram)-1), math.Floor(math.Log(math.Exp(score))+(1.0/binWidth))))\n\t\tid = int(math.Max(math.Min(float64(len(cdf.Histogram)-1), math.Floor(score/binWidth)), 0.0))\n\t}\n\tlog.Printf(\"width: %f score: %f len(cdf.Histogram): %d, i: %d\", binWidth, score, len(cdf.Histogram), id)\n\tbin := cdf.Histogram[id]\n\tpercentile := bin.Percentile\n\t//detail := (float64(bin.Count) * ((score - bin.LowerBound) / binWidth)) / float64(bin.Total)\n\t//if detail > 1.0 || percentile > 1.0 {\n\t//\tlog.Printf(\"error in percentile.\")\n\t//}\n\t//return percentile + detail\n\treturn percentile\n}", "title": "" }, { "docid": "7ce85500c1b2650b60c6376d939b2ea6", "score": "0.52805865", "text": "func (s *MonogramScoringFunc) NormalizeScore(score uint64) float64 {\n\treturn float64(score) / float64(s.qwertyScore)\n}", "title": "" }, { "docid": "db1af45a8b35a11b71bed0c36ad3d042", "score": "0.5241976", "text": "func (gbm GradientBoostedModel) Score(features map[string]string) (float64, error) {\n\tsum := gbm.Target.RescaleConstant\n\tfor _, tree := range gbm.Trees {\n\t\tscore, err := tree.TraverseTree(features)\n\t\tif err != nil {\n\t\t\treturn -1, err\n\t\t}\n\t\tsum += score\n\t}\n\treturn math.Exp(sum) / (1 + math.Exp(sum)), nil\n}", "title": "" }, { "docid": "f7275e07bd2cda0a45cf2c8d3e06e4e5", "score": "0.5205392", "text": "func (m *SecureScore) GetCurrentScore()(*float64) {\n return m.currentScore\n}", "title": "" }, { "docid": "2a2fe548adff68869a2b7247ada0e432", "score": "0.5199103", "text": "func (node *Node) Score() float32 {\n\treturn node.score\n}", "title": "" }, { "docid": "48a620788a45d24fd0f2e57446fa8a24", "score": "0.51920205", "text": "func grade(r *repoTop, rp *retentionPolicy) float32 {\n\tvar uf, pf, tf float32\n\n\tday := time.Now().Sub(rfc3339Transform(r.UpdateTime)).Hours() / 24\n\tfor _, f := range rp.UpdateTime.Factors {\n\t\tif f.Range.Low <= int(day) && int(day) < f.Range.High {\n\t\t\tuf = f.Weight\n\t\t\tbreak\n\t\t}\n\t}\n\tif uf == float32(0) {\n\t\tfmt.Printf(\"Out of range: day = %.2f, uf is 0.0\\n\", day)\n\t\tuf = float32(0)\n\t}\n\n\tfor _, f := range rp.PullCount.Factors {\n\t\tif f.Range.Low <= r.PullCount && r.PullCount < f.Range.High {\n\t\t\tpf = f.Weight\n\t\t\tbreak\n\t\t}\n\t}\n\tif pf == float32(0) {\n\t\tfmt.Printf(\"Out of range: pull_count = %d, pf is 1.0\\n\", r.PullCount)\n\t\tpf = float32(1)\n\t}\n\n\tfor _, f := range rp.TagsCount.Factors {\n\t\tif f.Range.Low <= r.TagsCount && r.TagsCount < f.Range.High {\n\t\t\ttf = f.Weight\n\t\t\tbreak\n\t\t}\n\t}\n\tif tf == float32(0) {\n\t\tfmt.Printf(\"Out of range: tags_count = %d, tf is 1.0\\n\", r.TagsCount)\n\t\ttf = float32(1)\n\t}\n\n\tscore := rp.UpdateTime.Base*uf + rp.PullCount.Base*pf + rp.TagsCount.Base*tf\n\tfmt.Printf(\"[factors] ==> score = UpdateTimeBase*uf + PullCountBase*pf + TagsCountBase*tf = %.2f * %.2f + %.2f * %.2f + %.2f * %.2f = %.2f repo_id: %d\\n\",\n\t\trp.UpdateTime.Base, uf, rp.PullCount.Base, pf, rp.TagsCount.Base, tf, score, r.ID)\n\n\treturn score\n}", "title": "" }, { "docid": "c9d3583aaf962f618bd1d9e3b9e35da6", "score": "0.51779723", "text": "func (r RelativeHumidity) Float64() float64 {\n\treturn Centi(r).Float64()\n}", "title": "" }, { "docid": "ce56d9add3a7fa6add30822ba9f393eb", "score": "0.517366", "text": "func (i *iterationStatistic) GetScore() float64 {\n\tif !(i.scoreCache == math.NaN()) {\n\t\ti.scoreCache = i.scorer()\n\t}\n\treturn i.scoreCache\n}", "title": "" }, { "docid": "9850f1ad408711dcdef7b7fd68c0cc7b", "score": "0.5173099", "text": "func (nv nodeValue) Score(x interface{}) float64 {\n\tif nv.scorer == nil {\n\t\treturn 0 // non-emitting node.\n\t}\n\to := model.NewFloatObs(x.([]float64), model.SimpleLabel(\"\"))\n\treturn nv.scorer.LogProb(o)\n}", "title": "" }, { "docid": "546c4bcfe2109f257c8f7e29b3d4334a", "score": "0.5156399", "text": "func (x *Xorshift1024star) Float64() float64 {\n\treturn float64(x.Uint64()>>11) / float64(1<<53)\n}", "title": "" }, { "docid": "0cbba231f4b1574454d04c6dc45ad5f8", "score": "0.5122076", "text": "func (m *TeleconferenceDeviceMediaQuality) GetAverageInboundPacketLossRateInPercentage()(*float64) {\n val, err := m.GetBackingStore().Get(\"averageInboundPacketLossRateInPercentage\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*float64)\n }\n return nil\n}", "title": "" }, { "docid": "68890be03d5d3e2d2b7edc1c2258878a", "score": "0.511408", "text": "func (r *Prng) Float64() float64 {\n\treturn r.rng.Float64()\n}", "title": "" }, { "docid": "6c4b9f4e4ecb28c89f5c7e30afd40e66", "score": "0.51104707", "text": "func (self *CurveFitGene) Score() float64 {\n\treturn Delta(\n\t\tself.F,\n\t\tfunc(t float64) float64 {\n\t\t\treturn 2010*t*t - 200*t - 133.\n\t\t\treturn 8100*t*t*t - 200*t*t + t - 133.\n\t\t},\n\t)\n}", "title": "" }, { "docid": "aa6f8f245cf393ea723c4340513214e2", "score": "0.5110349", "text": "func Float8RegrAvgx(ctx context.Context, db DB, p0 []float64) (float64, error) {\n\t// call pg_catalog.float8_regr_avgx\n\tconst sqlstr = `SELECT * FROM pg_catalog.float8_regr_avgx($1)`\n\t// run\n\tvar r0 float64\n\tlogf(sqlstr, p0)\n\tif err := db.QueryRowContext(ctx, sqlstr, p0).Scan(&r0); err != nil {\n\t\treturn 0.0, logerror(err)\n\t}\n\treturn r0, nil\n}", "title": "" }, { "docid": "aabedf64d9c705e33dbecaf372192507", "score": "0.5087251", "text": "func (x *Xosh) Float64() float64 {\r\n\r\n\treturn float64(x.Xoshiro256plus() >> 11) / (1<<53)\r\n}", "title": "" }, { "docid": "573eebba1bb21eccd0429beb6931635f", "score": "0.5082731", "text": "func Btfloat84cmp(ctx context.Context, db DB, p0 float64, p1 float32) (int, error) {\n\t// call pg_catalog.btfloat84cmp\n\tconst sqlstr = `SELECT * FROM pg_catalog.btfloat84cmp($1, $2)`\n\t// run\n\tvar r0 int\n\tlogf(sqlstr, p0, p1)\n\tif err := db.QueryRowContext(ctx, sqlstr, p0, p1).Scan(&r0); err != nil {\n\t\treturn 0, logerror(err)\n\t}\n\treturn r0, nil\n}", "title": "" }, { "docid": "75ce90b39089540df653f7cbfe6a6b53", "score": "0.50747097", "text": "func computeScore(nbValidations int64) int64 {\n\treturn int64(1/(float64(nbValidations)/10+1)*105 + 5)\n}", "title": "" }, { "docid": "da12b444a361cb2daad1fc2d74e3af2e", "score": "0.5074278", "text": "func (f FMeasure) Score(results *trecresults.ResultList, qrels trecresults.Qrels) float64 {\n\tprecision := Precision.Score(results, qrels)\n\trecall := Recall.Score(results, qrels)\n\tif precision == 0 || recall == 0 {\n\t\treturn 0\n\t}\n\tbetaSquared := math.Pow(f.beta, 2)\n\treturn ((1 + betaSquared) * (precision * recall)) / ((betaSquared * precision) + recall)\n}", "title": "" }, { "docid": "ea2d4872c97518badbd7e23e356aae1d", "score": "0.50727123", "text": "func Score(x, y float64) int {\n\tswitch r := math.Sqrt(x*x + y*y); {\n\tcase 1.0 >= r:\n\t\treturn 10\n\tcase 5.0 >= r:\n\t\treturn 5\n\tcase 10.0 >= r:\n\t\treturn 1\n\tdefault:\n\t\treturn 0\n\t}\n}", "title": "" }, { "docid": "d29b52bad533cbbc7d9ef234ba7ac0a2", "score": "0.5058863", "text": "func (me *NetworkQosPlugin) computeNodeScore(shortestPaths []*networkPathInfo) int64 {\n\tif len(shortestPaths) == 0 {\n\t\t// There are no incoming service links, so we return the best score.\n\t\treturn 100\n\t}\n\n\tvar highestBandwidthVarPath *networkPathInfo\n\tvar highestPacketDelayVarPath *networkPathInfo\n\tfor _, path := range shortestPaths {\n\t\tif highestBandwidthVarPath == nil || path.highestBandwidthVariance > highestBandwidthVarPath.highestBandwidthVariance {\n\t\t\thighestBandwidthVarPath = path\n\t\t}\n\t\tif highestPacketDelayVarPath == nil || path.highestPacketDelayVariance > highestPacketDelayVarPath.highestPacketDelayVariance {\n\t\t\thighestPacketDelayVarPath = path\n\t\t}\n\t}\n\n\t// To calculate the score, we compute the standard deviation of the bandwidth and divide it by the lowest bandwidth found along the path to get a sort of fluctuation percentage value.\n\t// Then we calculate the score as score = 100 (fluctuationPercentage * 100 * 10)\n\tbandwidthStdDev := math.Sqrt(float64(highestBandwidthVarPath.highestBandwidthVariance))\n\tbandwidthFluctuationPercentage := bandwidthStdDev / float64(highestBandwidthVarPath.lowestBandwithKbps)\n\tbandwidthScore := 100.0 - bandwidthFluctuationPercentage*1000\n\tbandwidthScore = math.Max(0, bandwidthScore)\n\n\t// The same for the latency, except that we use only 100 as the multiplier for the fluctuationPercentage:\n\tlatencyStdDev := math.Sqrt(float64(highestPacketDelayVarPath.highestPacketDelayVariance))\n\tlatencyFluctuationPercentage := latencyStdDev / float64(highestPacketDelayVarPath.totalPacketDelayMsec)\n\tlatencyScore := 100.0 - latencyFluctuationPercentage*100\n\tlatencyScore = math.Max(0, latencyScore)\n\n\toverallScore := int64(math.Round((bandwidthScore + latencyScore) / 2))\n\tif overallScore < 0 {\n\t\toverallScore = 0\n\t}\n\tif overallScore > 100 {\n\t\toverallScore = 100\n\t}\n\n\treturn overallScore\n}", "title": "" }, { "docid": "84a7d04f8aff64f12e87dbff02087539", "score": "0.50499856", "text": "func score(s state.State, m Message) (state.State, Message, error) {\n bs, b := s.WinningBid()\n p := points(s.Played, s.Trump)\n //fmt.Printf(\"Points => %v\\n\", p)\n scores := resolve(bs, b, p)\n //fmt.Printf(\"Scores => %v\\n\", scores)\n next := s.NextRound(scores)\n return next,\n\t Message{Deal, next.Dealer, []int{0}, 1}, nil\n}", "title": "" }, { "docid": "e87e9b995909942306c724107cdeb178", "score": "0.5048762", "text": "func (o DruckerPrager) Get_bsmp() float64 { return 0 }", "title": "" }, { "docid": "bf8b954c245fbee40f1e1124f8cd4727", "score": "0.5044736", "text": "func (a *gateioNumericalValue) Float64() float64 { return float64(*a) }", "title": "" }, { "docid": "403ca8bf7d88c666cedfac3843f51310", "score": "0.50323486", "text": "func FBetaScore(Ytrue, Ypred *mat.Dense, beta float64, average string, sampleWeight []float64) float64 {\n\t_, _, f, _ := PrecisionRecallFScoreSupport(Ytrue, Ypred, beta, nil, -1, average, []string{}, sampleWeight)\n\treturn f\n}", "title": "" }, { "docid": "4fa8885ab55aeccec398726a4f26adb3", "score": "0.5031708", "text": "func Float8RegrAvgy(ctx context.Context, db DB, p0 []float64) (float64, error) {\n\t// call pg_catalog.float8_regr_avgy\n\tconst sqlstr = `SELECT * FROM pg_catalog.float8_regr_avgy($1)`\n\t// run\n\tvar r0 float64\n\tlogf(sqlstr, p0)\n\tif err := db.QueryRowContext(ctx, sqlstr, p0).Scan(&r0); err != nil {\n\t\treturn 0.0, logerror(err)\n\t}\n\treturn r0, nil\n}", "title": "" }, { "docid": "6b8e7ca06872a0eb77db9c2aa8db3465", "score": "0.5030935", "text": "func (r *Prng) Float64_117() float64 {\n\treturn r.rng.Float64_117()\n}", "title": "" }, { "docid": "ee73a18b0b52208f1081175b1764b784", "score": "0.50307804", "text": "func Float8RegrSxx(ctx context.Context, db DB, p0 []float64) (float64, error) {\n\t// call pg_catalog.float8_regr_sxx\n\tconst sqlstr = `SELECT * FROM pg_catalog.float8_regr_sxx($1)`\n\t// run\n\tvar r0 float64\n\tlogf(sqlstr, p0)\n\tif err := db.QueryRowContext(ctx, sqlstr, p0).Scan(&r0); err != nil {\n\t\treturn 0.0, logerror(err)\n\t}\n\treturn r0, nil\n}", "title": "" }, { "docid": "169ce2772927db4e72787104dcd09ba6", "score": "0.502686", "text": "func (m *TeleconferenceDeviceMediaQuality) GetAverageOutboundPacketLossRateInPercentage()(*float64) {\n val, err := m.GetBackingStore().Get(\"averageOutboundPacketLossRateInPercentage\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*float64)\n }\n return nil\n}", "title": "" }, { "docid": "393e6b122924583a4bb2243d12a2bc0d", "score": "0.5025177", "text": "func RBP50(run Ranking,depth,R uint) float64 {\n\treturn RBP(run,depth, R, 0.50)\n}", "title": "" }, { "docid": "5481c1083c75b2f1be0a9718d31a8c8b", "score": "0.5021533", "text": "func (pc PackedCoord) Float() float32 {\n\treturn (float32(pc) * 2000 / 65535) - 1000\n}", "title": "" }, { "docid": "940687caeb2a536f6f62d7d6e9508669", "score": "0.5012718", "text": "func RsqrtesF32(a float32) float32 {\n\treturn 0\n}", "title": "" }, { "docid": "72b6f34bda2b13ce37fb69a989930bba", "score": "0.5009836", "text": "func (s RuneValue) Float64() float64 {\n\treturn float64(s)\n}", "title": "" }, { "docid": "d67cfc3a67cdfabaa084c16085fe5b2b", "score": "0.49973413", "text": "func (c *Criterion) Score() float64 {\n\treturn c.score\n}", "title": "" }, { "docid": "ed1fa597e97e8fee8e3a71762c415ab2", "score": "0.4995011", "text": "func weigh(letter string, score float64) float64 {\n letters := letters()\n rank := letters[letter]\n //if rank == 0.0 {\n // return score * 0.5 // half if not found ?\n //} else {\n return score * rank\n //}\n}", "title": "" }, { "docid": "d891441c76c3582fa4c826b0bc6309f4", "score": "0.49903342", "text": "func exploitabilityScore(bm *cvssv2.BaseMetrics) float64 {\n\treturn roundTo1Decimal(20 * weightAccessVector(bm.AccessVector) * weightAccessComplexity(bm.AccessComplexity) * weightAuthentication(bm.Authentication))\n}", "title": "" }, { "docid": "681b97fa714d803ea98c65aa8b64db5b", "score": "0.49837038", "text": "func Float64_117() float64 {\n\treturn globalPrng.rng.Float64_117()\n}", "title": "" }, { "docid": "2865681e1efa3b3b1241c46fdbb7871f", "score": "0.49715993", "text": "func Float84pl(ctx context.Context, db DB, p0 float64, p1 float32) (float64, error) {\n\t// call pg_catalog.float84pl\n\tconst sqlstr = `SELECT * FROM pg_catalog.float84pl($1, $2)`\n\t// run\n\tvar r0 float64\n\tlogf(sqlstr, p0, p1)\n\tif err := db.QueryRowContext(ctx, sqlstr, p0, p1).Scan(&r0); err != nil {\n\t\treturn 0.0, logerror(err)\n\t}\n\treturn r0, nil\n}", "title": "" }, { "docid": "60d2a960b2b38ff290d6a0ec25c6a0e8", "score": "0.4965893", "text": "func Float8RegrSyy(ctx context.Context, db DB, p0 []float64) (float64, error) {\n\t// call pg_catalog.float8_regr_syy\n\tconst sqlstr = `SELECT * FROM pg_catalog.float8_regr_syy($1)`\n\t// run\n\tvar r0 float64\n\tlogf(sqlstr, p0)\n\tif err := db.QueryRowContext(ctx, sqlstr, p0).Scan(&r0); err != nil {\n\t\treturn 0.0, logerror(err)\n\t}\n\treturn r0, nil\n}", "title": "" }, { "docid": "2aa1b75ba186d0e416f78f3e964786ac", "score": "0.49638999", "text": "func (e PitchBendEvent) Normailzed() float64 {\n\tvalue := e.Value\n\tif value > 4096 {\n\t\tvalue = value + 1\n\t}\n\treturn float64(value-4096) / 4096\n}", "title": "" }, { "docid": "0906aa2d99404ea9046f1f06851ade5d", "score": "0.4956209", "text": "func (ts *TeamState) Score() int {\n\treturn getInt(ts.Entity, \"m_scoreTotal\")\n}", "title": "" }, { "docid": "15efde944ae8eb0fa03db8400aeac23a", "score": "0.49394947", "text": "func (crgb *CasbinRuleGroupBy) Float64(ctx context.Context) (_ float64, err error) {\n\tvar v []float64\n\tif v, err = crgb.Float64s(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{casbinrule.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: CasbinRuleGroupBy.Float64s returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "a01c8f43d882e66610eec8b691e1f456", "score": "0.49361798", "text": "func (t *TimeSeriesSnapshot) P95() time.Duration {\n\treturn t.histogram.P95()\n}", "title": "" }, { "docid": "d3d43a7418ca57befa98c92a88c28e17", "score": "0.4936116", "text": "func (m *TeleconferenceDeviceVideoQuality) GetAverageInboundBitRate()(*float64) {\n return m.averageInboundBitRate\n}", "title": "" }, { "docid": "6a89d09e0755f8e4fb55fa4dbe339343", "score": "0.49144563", "text": "func Float64() float64 {\n\treturn globalPrng.rng.Float64()\n}", "title": "" }, { "docid": "67c4bc79f432f1fb5e02f17b0a7d7b7b", "score": "0.49080545", "text": "func (rv ReturnValue) Float() float64 {\n\tf, _ := strconv.ParseFloat(aws.StringValue(rv.av.N), 64)\n\treturn f\n}", "title": "" }, { "docid": "079d8255a9c2a019a543c01905e4cbb7", "score": "0.4905967", "text": "func Float84div(ctx context.Context, db DB, p0 float64, p1 float32) (float64, error) {\n\t// call pg_catalog.float84div\n\tconst sqlstr = `SELECT * FROM pg_catalog.float84div($1, $2)`\n\t// run\n\tvar r0 float64\n\tlogf(sqlstr, p0, p1)\n\tif err := db.QueryRowContext(ctx, sqlstr, p0, p1).Scan(&r0); err != nil {\n\t\treturn 0.0, logerror(err)\n\t}\n\treturn r0, nil\n}", "title": "" }, { "docid": "49cbff908b657a23dfd372ca32b462b1", "score": "0.48956537", "text": "func (m *TeleconferenceDeviceVideoQuality) GetAverageInboundFrameRate()(*float64) {\n return m.averageInboundFrameRate\n}", "title": "" }, { "docid": "e8cc4803224d29da66f8f02a883e07d5", "score": "0.48861602", "text": "func Float8Corr(ctx context.Context, db DB, p0 []float64) (float64, error) {\n\t// call pg_catalog.float8_corr\n\tconst sqlstr = `SELECT * FROM pg_catalog.float8_corr($1)`\n\t// run\n\tvar r0 float64\n\tlogf(sqlstr, p0)\n\tif err := db.QueryRowContext(ctx, sqlstr, p0).Scan(&r0); err != nil {\n\t\treturn 0.0, logerror(err)\n\t}\n\treturn r0, nil\n}", "title": "" }, { "docid": "85fd89399719ce77e9b0b995b53cc503", "score": "0.48860535", "text": "func XMRToFloat64(xmr uint64) float64 {\n\treturn float64(xmr) / 1e12\n}", "title": "" }, { "docid": "dde1e42b315a7f9290157d1a8caeb385", "score": "0.48743352", "text": "func GetConfidenceLevel(score int) pb.SuspectConfidenceLevel {\n\tswitch {\n\t// score >= 10 means at least the suspect touched a file in the failure log\n\tcase score >= 10:\n\t\treturn pb.SuspectConfidenceLevel_HIGH\n\tcase score >= 5:\n\t\treturn pb.SuspectConfidenceLevel_MEDIUM\n\tdefault:\n\t\treturn pb.SuspectConfidenceLevel_LOW\n\t}\n}", "title": "" }, { "docid": "9918ef3802921af690662f4660087a44", "score": "0.4855002", "text": "func (rttgb *RightToTreatmentGroupBy) Float64(ctx context.Context) (_ float64, err error) {\n\tvar v []float64\n\tif v, err = rttgb.Float64s(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{righttotreatment.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: RightToTreatmentGroupBy.Float64s returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "714505018a4ce2451a861f144e9f3809", "score": "0.48522562", "text": "func prbBirth(hh *DynHh)float64{\r\n\tswitch {\r\n\t\tcase len(hh.Members)>1:\r\n\t\tif hh.Members[0].RAge[len(hh.Members[0].RAge)-1]>18 && hh.Members[1].RAge[len(hh.Members[1].RAge)-1]>18 &&\r\n\t\t\thh.Members[0].Gender[len(hh.Members[0].Gender)-1]!=hh.Members[1].Gender[len(hh.Members[0].Gender)-1]{\r\n\t\t\treturn 0.8\r\n\t\t}else{\r\n\t\t\treturn 0.0}\r\n\t\tcase len(hh.Members)<=1:\r\n\t\t\treturn 0.0\r\n\t\tdefault:\r\n\t\t\treturn 0.0\r\n\t}\r\n\r\n}", "title": "" }, { "docid": "b6f8fc205bcd24fc4127ade0431e3918", "score": "0.48482397", "text": "func RsqrteF64(a arm.Float64x1) (dst arm.Float64x1) {\n\treturn arm.Float64x1{}\n}", "title": "" }, { "docid": "47025281a9b70c5fd5e16f99f1dc3841", "score": "0.48460716", "text": "func (v *BigFltVal) Float64() int64 { return v.Float64() }", "title": "" }, { "docid": "dc9b501da9348a1b0e76ba94b4b0a872", "score": "0.48434982", "text": "func (m *TeleconferenceDeviceMediaQuality) GetMaximumInboundPacketLossRateInPercentage()(*float64) {\n val, err := m.GetBackingStore().Get(\"maximumInboundPacketLossRateInPercentage\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*float64)\n }\n return nil\n}", "title": "" }, { "docid": "d4baa78cc72a2044f821bb86066cc765", "score": "0.48393393", "text": "func DBUserGetScore(nickname string) (uint64, error) {\n\tvar score uint64\n\trow := database.Database.QueryRow(sqlSelectScoreByNickname, nickname)\n\tif err := row.Scan(&score); err != nil {\n\t\tlog.Println(err)\n\t\treturn 0, err\n\t}\n\treturn score, nil\n}", "title": "" }, { "docid": "a2bf5facf76fe302e260dde4c7b26350", "score": "0.48301095", "text": "func (c *Chromosome) Fitness() float64 {\n\tif c.evaluated == 0 {\n\t\treturn 0.0\n\t}\n\treturn c.score / float64(c.evaluated)\n}", "title": "" }, { "docid": "011f6713182e71a31876ee3776facdad", "score": "0.4825846", "text": "func Float8Avg(ctx context.Context, db DB, p0 []float64) (float64, error) {\n\t// call pg_catalog.float8_avg\n\tconst sqlstr = `SELECT * FROM pg_catalog.float8_avg($1)`\n\t// run\n\tvar r0 float64\n\tlogf(sqlstr, p0)\n\tif err := db.QueryRowContext(ctx, sqlstr, p0).Scan(&r0); err != nil {\n\t\treturn 0.0, logerror(err)\n\t}\n\treturn r0, nil\n}", "title": "" }, { "docid": "ee43480a11a45e7a37c578cf79a0701b", "score": "0.4814807", "text": "func (crgb *CasbinRuleGroupBy) Float64X(ctx context.Context) float64 {\n\tv, err := crgb.Float64(ctx)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn v\n}", "title": "" }, { "docid": "339c00d884f5944052b81d1946638787", "score": "0.4804912", "text": "func PrecisionScore(Ytrue, Ypred *mat.Dense, average string, sampleWeight []float64) float64 {\n\tp, _, _, _ := PrecisionRecallFScoreSupport(Ytrue, Ypred, 1, nil, -1, average, []string{}, sampleWeight)\n\treturn p\n}", "title": "" }, { "docid": "1afc2c9605e05aaa636014314fe806b8", "score": "0.4801506", "text": "func (e *Classification) Correct() float64 {\n\te.mu.Lock()\n\tweight, correct := e.weight, e.correct\n\te.mu.Unlock()\n\n\tif weight == 0.0 {\n\t\treturn 0.0\n\t}\n\treturn correct / weight\n}", "title": "" }, { "docid": "facd043d0e0faa9791ed76c6c79e4aa9", "score": "0.47976938", "text": "func (c *Composite) rvp6Raw(value int) float32 {\n\treturn float32(value) * float32(math.Pow10(c.precision))\n}", "title": "" }, { "docid": "84b213c3aa5e5fb1b311fe62c99cb9cc", "score": "0.47929248", "text": "func (f *FFA) calculateScore() int {\n\tconst baseScore = 1000\n\tconst minimum = 100\n\timageDuration := time.Now().Sub(f.timeStartImage)\n\tscore := int(baseScore - minimum*math.Sqrt(imageDuration.Seconds()))\n\tif score < minimum {\n\t\treturn minimum\n\t}\n\treturn score\n}", "title": "" }, { "docid": "4aa01c7aef09eb5b589b05e7410e9589", "score": "0.4791593", "text": "func CalculateWorkingCarsPerHour(productionRate int, successRate float64) float64 {\n return float64(productionRate) * successRate / 100\n}", "title": "" }, { "docid": "42550787888d9f0ed4b7e467adad7960", "score": "0.4785776", "text": "func (p *Population) FittestScore() (float64, error) {\n\tfittest, err := p.Fittest()\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\tfitness, err := fittest.Fitness()\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\treturn fitness, nil\n}", "title": "" }, { "docid": "7713da97b7ae287318910d98606eb593", "score": "0.4785141", "text": "func (aln *Alignment) ComputePhredScore() (score int32) {\n\tvar error int32\n\tfor _, char := range aln.QUAL {\n\t\tpos := char << 1\n\t\tscore += int32(phredScoreTable[pos])\n\t\terror |= int32(phredScoreTable[pos+1])\n\t}\n\tif error != 0 {\n\t\tlog.Fatal(\"Invalid QUAL character in \", aln.QUAL)\n\t}\n\treturn score\n}", "title": "" }, { "docid": "6eb63979617d13687019f795b26b81ed", "score": "0.4782795", "text": "func (c *Confirmation) GetScore() int64 {\n\treturn c.Round\n}", "title": "" }, { "docid": "1c2049aded41248e0580806137753ef6", "score": "0.47812113", "text": "func (a *Average) Value() float64 { return a.value }", "title": "" }, { "docid": "b23566f8da8674aec6fdb30ab7f4ba69", "score": "0.47762108", "text": "func Float8RegrR2(ctx context.Context, db DB, p0 []float64) (float64, error) {\n\t// call pg_catalog.float8_regr_r2\n\tconst sqlstr = `SELECT * FROM pg_catalog.float8_regr_r2($1)`\n\t// run\n\tvar r0 float64\n\tlogf(sqlstr, p0)\n\tif err := db.QueryRowContext(ctx, sqlstr, p0).Scan(&r0); err != nil {\n\t\treturn 0.0, logerror(err)\n\t}\n\treturn r0, nil\n}", "title": "" }, { "docid": "0ae5b411d6c225abf839c4a9d949b5d4", "score": "0.47711706", "text": "func (ev *evaluator) evalFloat(e Expr) float64 {\n\tsc := ev.evalScalar(e)\n\treturn float64(sc.V)\n}", "title": "" }, { "docid": "6b60213382f4b806482b3fe3c03c17ff", "score": "0.47692493", "text": "func (m *CloudAppSecurityState) GetRiskScore()(*string) {\n val, err := m.GetBackingStore().Get(\"riskScore\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*string)\n }\n return nil\n}", "title": "" }, { "docid": "7faa16477d43634b01435029a98892ff", "score": "0.47619128", "text": "func calcFuel(m int64) int64 {\n return (m / 3) - 2\n}", "title": "" }, { "docid": "114a400544f4db6c793d38af0cb5e73e", "score": "0.4759493", "text": "func dB(percent float64) float64 {\n\tdb := math.Log10(percent) * 20.0\n\treturn db\n}", "title": "" }, { "docid": "114a400544f4db6c793d38af0cb5e73e", "score": "0.4759493", "text": "func dB(percent float64) float64 {\n\tdb := math.Log10(percent) * 20.0\n\treturn db\n}", "title": "" }, { "docid": "606f89f521314f8dccb5197dcd026252", "score": "0.47588605", "text": "func sndcg(run Ranking,depth,R uint) (dcg float64) {\n\tlog.Fatal(\"Unimplemented\")\n\tdcg = 0\n\tn := float64(0)\n found := 0\n\tfor i := uint(0); i < depth ; i++ {\n\t\tscore := (uint(run) >> (i*2)) & uint(3)\n\t\tif(score != 0) {\n\t\t\t// This is a relevant document\n\t\t\tdcg += (math.Pow(2,1) -1)/(math.Log2(float64(i + 2)))\n\t\t\tfound++\n\t\t}\n\t}\n for ; found > 0; found-- {\n \tn += (math.Pow(2,1)-1) / math.Log2(float64(found +1))\n\t}\n\tdcg /= n\n\treturn\n}", "title": "" }, { "docid": "46e1ea93c475fbef3b1aa18f225ffe08", "score": "0.47527754", "text": "func FairnessRatio(left, right, total *Resource) float64 {\n lshares := getShares(left, total)\n rshares := getShares(right, total)\n\n // Get the largest value from the shares\n lshare := float64(0)\n if shareLen := len(lshares); shareLen != 0 {\n lshare = lshares[shareLen - 1]\n }\n rshare := float64(0)\n if shareLen := len(rshares); shareLen != 0 {\n rshare = rshares[shareLen - 1]\n }\n // calculate the ratio\n ratio := lshare / rshare\n // divide by zero gives special NaN back change it to 1\n if math.IsNaN(ratio) {\n return 1\n }\n return ratio\n}", "title": "" }, { "docid": "e39853112d82c44d6f93af98d24c7ecd", "score": "0.47468132", "text": "func (s *Score) CalculateScoreRank() {\n\ts.ProviderScoreRank = (s.ProviderQualityScoreRank + s.ProviderPerformanceScoreRank) / 2\n}", "title": "" }, { "docid": "71c52fd6a6fef92651bd296a5fb90253", "score": "0.47463492", "text": "func Float8RegrIntercept(ctx context.Context, db DB, p0 []float64) (float64, error) {\n\t// call pg_catalog.float8_regr_intercept\n\tconst sqlstr = `SELECT * FROM pg_catalog.float8_regr_intercept($1)`\n\t// run\n\tvar r0 float64\n\tlogf(sqlstr, p0)\n\tif err := db.QueryRowContext(ctx, sqlstr, p0).Scan(&r0); err != nil {\n\t\treturn 0.0, logerror(err)\n\t}\n\treturn r0, nil\n}", "title": "" }, { "docid": "3d96da7b289745ff23f30b9443a0fe7c", "score": "0.47458878", "text": "func toRVP6(dBZ float32) float32 {\n\treturn (dBZ + 32.5) * 2\n}", "title": "" }, { "docid": "a3997cf9c345660ffbefd555705ca617", "score": "0.4740751", "text": "func main() {\n\tvar brightness float64\n\tfmt.Println(brightness)\n}", "title": "" }, { "docid": "fcd2d4412a619a8e26503811826f3450", "score": "0.47399417", "text": "func (s *Solver) Score() int {\n\treturn s.score\n}", "title": "" }, { "docid": "ace79ce31198bf181228e2c0db8a9345", "score": "0.4738758", "text": "func Test0() float64 {\n\tvar res0 float64\n\treturn res0\n}", "title": "" }, { "docid": "a5855ede1b67193ee32673f4ef147f93", "score": "0.47382417", "text": "func RndpqF64(a arm.Float64x2) (dst arm.Float64x2) {\n\treturn arm.Float64x2{}\n}", "title": "" }, { "docid": "54c8508187c3703cd339740a2062942f", "score": "0.4736163", "text": "func Avg() {\n\tscores := [8]int{100,80,75,92,70,93,88,67} //total 665\n\n\tvar sum int\n\tfor _, score := range scores{\n\t\tsum += score\n\t}\n\n\tvar sumKonversi float32 = float32(sum)\n\tvar length float32 = float32(len(scores))\n\n\t// hitungRata = 665 / 8\n\tresultAvg := sumKonversi / length\n\n\tfmt.Println(\"total nilai score : \", sum, \"Rata-rata :\", resultAvg)\n}", "title": "" }, { "docid": "f42215576ea01dbb5746ad35488c9e04", "score": "0.47342578", "text": "func (j *JobItem) GetScore() int64 {\n\treturn j.Schedule.Unix() - time.Now().UTC().Unix()\n}", "title": "" }, { "docid": "a872a98a88cfebef3ac92c46aacd2315", "score": "0.4727342", "text": "func (pgb *PhysicaltherapyroomGroupBy) Float64X(ctx context.Context) float64 {\n\tv, err := pgb.Float64(ctx)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn v\n}", "title": "" }, { "docid": "e316aaa871ae3f15afbac87cbd811c0d", "score": "0.4719536", "text": "func (rttgb *RightToTreatmentGroupBy) Float64X(ctx context.Context) float64 {\n\tv, err := rttgb.Float64(ctx)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn v\n}", "title": "" }, { "docid": "15aee21d76c3ad07fc36a7b24872e2d9", "score": "0.47174132", "text": "func (m *TeleconferenceDeviceVideoQuality) GetAverageOutboundBitRate()(*float64) {\n return m.averageOutboundBitRate\n}", "title": "" }, { "docid": "a20a16e6d06d62d8ed07b163e6bbac5d", "score": "0.4716955", "text": "func (m *SecureScore) GetAverageComparativeScores()([]AverageComparativeScoreable) {\n return m.averageComparativeScores\n}", "title": "" }, { "docid": "7ba9cb2d50f982dc25f51d5fac0d4853", "score": "0.47164336", "text": "func (q Query) Score(pathStr string, text []byte) float64 {\n\tname := path.Base(pathStr)\n\n\ttokensInName := 0\n\ttokensMatching := 0\n\ttotalMatches := 0\n\tfor _, token := range q.tokens {\n\t\tif token.pattern.MatchString(name) {\n\t\t\ttokensInName++\n\t\t}\n\t\tcount := len(token.pattern.FindAllIndex(text, maxMatchesPerDoc))\n\t\tif count > 0 {\n\t\t\ttokensMatching++\n\t\t}\n\t\ttotalMatches += count\n\t}\n\n\treturn float64(tokensInName*500) + float64(float64(tokensMatching)*50*math.Pow(4, float64(tokensMatching))) + float64(totalMatches)/float64(len(text)+1)\n}", "title": "" } ]
205566d70fc1d2bf84e6f1fd18feb2ae
reverses a slice of arrows
[ { "docid": "e024b51ab2cf56f7b4d24f814445df0a", "score": "0.81268764", "text": "func reverseArrowSlice(a []arrow) {\n\tfor i, j := 0, len(a)-1; i < j; i, j = i+1, j-1 {\n\t\ta[i], a[j] = a[j], a[i]\n\t}\n}", "title": "" } ]
[ { "docid": "d99f33a6621027b35bd3bb082d7ff422", "score": "0.69696474", "text": "func reversePolNodeSlice(a []*polNode) {\n\tfor i, j := 0, len(a)-1; i < j; i, j = i+1, j-1 {\n\t\ta[i], a[j] = a[j], a[i]\n\t}\n}", "title": "" }, { "docid": "bcca76887dc6eeac145cf5b84caa26a9", "score": "0.6554231", "text": "func (w *Waiter) reverse(s []string) []string {\n\t// Reverse slice\n\tfor i, j := 0, len(s)-1; i < j; i, j = i+1, j-1 {\n\t\ts[i], s[j] = s[j], s[i]\n\t}\n\treturn s\n}", "title": "" }, { "docid": "ce429fc92f87095414317354c5b0f0f9", "score": "0.6431474", "text": "func reverse(a []Function) []Function {\n\tfor i := len(a)/2 - 1; i >= 0; i-- {\n\t\topp := len(a) - 1 - i\n\t\ta[i], a[opp] = a[opp], a[i]\n\t}\n\treturn a\n}", "title": "" }, { "docid": "bf82aa03f7a5d49776946cbcb4942250", "score": "0.640135", "text": "func (s Steps) Reverse() {\n\tfor i, j := 0, len(s)-1; i < j; i, j = i+1, j-1 {\n\t\ts[i], s[j] = s[j], s[i]\n\t}\n}", "title": "" }, { "docid": "84abba135fd0b0018bc4ea7176de1cd7", "score": "0.6400664", "text": "func reverse(s []CamRewind) []CamRewind {\r\n\tfor i, j := 0, len(s)-1; i < j; i, j = i+1, j-1 {\r\n\t\ts[i], s[j] = s[j], s[i]\r\n\t}\r\n\r\n\treturn s\r\n}", "title": "" }, { "docid": "2398dbd99b25d4954b78caaf2d7f1eed", "score": "0.6399579", "text": "func reverse(tract [][2]int) {\n\tl := len(tract)\n\tfor i := 0; i < l/2; i++ {\n\t\ttract[i], tract[l-1-i] = tract[l-1-i], tract[i]\n\t}\n}", "title": "" }, { "docid": "a07b1a220bd3309509c86cfa721f71b9", "score": "0.6385949", "text": "func reverse(nn []Node) {\n\tfor i := len(nn)/2 - 1; i >= 0; i-- {\n\t\topp := len(nn) - 1 - i\n\t\tnn[i], nn[opp] = nn[opp], nn[i]\n\t}\n}", "title": "" }, { "docid": "a2dec742d4d46a255fd9a56c63ca7b69", "score": "0.6363441", "text": "func (p path) reverse() path {\n\tfor i, j := 0, len(p)-1; i < j; i, j = i+1, j-1 {\n\t\tp[i], p[j] = p[j], p[i]\n\t}\n\treturn p\n}", "title": "" }, { "docid": "6a9afa0dcd28856c896357961483e46b", "score": "0.63436246", "text": "func Reverse(chain []types.TipSet) {\n\t// https://github.com/golang/go/wiki/SliceTricks#reversing\n\tfor i := len(chain)/2 - 1; i >= 0; i-- {\n\t\topp := len(chain) - 1 - i\n\t\tchain[i], chain[opp] = chain[opp], chain[i]\n\t}\n}", "title": "" }, { "docid": "ebc13beb75d6e73a9f566616f81bde18", "score": "0.6259889", "text": "func reverse(slice []string) []string {\n\n\tnewSlice := []string{}\n\tfor ix := range slice {\n\t\tnewSlice = append(newSlice, slice[len(slice)-1-ix])\n\t}\n\n\treturn newSlice\n}", "title": "" }, { "docid": "fef6e25c2df633993a6d610e9415048e", "score": "0.6241106", "text": "func Reverse(aa *[]interface{}) {\n\tfor i := len(*aa)/2 - 1; i >= 0; i-- {\n\t\tj := len(*aa) - 1 - i\n\t\t(*aa)[i], (*aa)[j] = (*aa)[j], (*aa)[i]\n\t}\n}", "title": "" }, { "docid": "c94f78102e4219a9101a13b5a9534e40", "score": "0.6187366", "text": "func reverseSlice(s []string) []string {\n\tfor i, j := 0, len(s)-1; i < j; i, j = i+1, j-1 {\n\t\ts[i], s[j] = s[j], s[i]\n\t}\n\treturn s\n}", "title": "" }, { "docid": "f3c253f3cfaf355edafd6417ea88ed64", "score": "0.61857635", "text": "func ReverseSlice(source interface{}) {\n\tif source == nil {\n\t\treturn\n\t}\n\tvar j = 0\n\tswitch slice := source.(type) {\n\tcase []byte:\n\t\tvar sliceLen = len(slice)\n\t\tif sliceLen <= 1 {\n\t\t\treturn\n\t\t}\n\t\tfor i := sliceLen - 1; i >= (sliceLen / 2); i-- {\n\t\t\titem := slice[i]\n\t\t\tslice[i] = slice[j]\n\t\t\tslice[j] = item\n\t\t\tj++\n\t\t}\n\t\treturn\n\tcase []interface{}:\n\t\tvar sliceLen = len(slice)\n\t\tif sliceLen <= 1 {\n\t\t\treturn\n\t\t}\n\t\tfor i := sliceLen - 1; i >= (sliceLen / 2); i-- {\n\t\t\titem := slice[i]\n\t\t\tslice[i] = slice[j]\n\t\t\tslice[j] = item\n\t\t\tj++\n\t\t}\n\t\treturn\n\tcase []string:\n\t\tvar sliceLen = len(slice)\n\t\tif sliceLen <= 1 {\n\t\t\treturn\n\t\t}\n\t\tfor i := sliceLen - 1; i >= (sliceLen / 2); i-- {\n\t\t\titem := slice[i]\n\t\t\tslice[i] = slice[j]\n\t\t\tslice[j] = item\n\t\t\tj++\n\t\t}\n\t\treturn\n\t}\n\tsliceValue := reflect.ValueOf(source)\n\tif sliceValue.IsNil() || !sliceValue.IsValid() {\n\t\treturn\n\t}\n\tif sliceValue.Kind() == reflect.Ptr {\n\t\tsliceValue = sliceValue.Elem()\n\t}\n\tvar sliceLen = sliceValue.Len()\n\tif sliceLen <= 1 {\n\t\treturn\n\t}\n\n\tfor i := sliceLen - 1; i >= (sliceLen / 2); i-- {\n\t\tindexItem := sliceValue.Index(i)\n\t\tindexItemValue := indexItem.Elem()\n\t\tif indexItem.Kind() == reflect.Ptr {\n\t\t\tsliceValue.Index(i).Set(sliceValue.Index(j).Elem().Addr())\n\t\t\tsliceValue.Index(j).Set(indexItemValue.Addr())\n\t\t} else {\n\t\t\tsliceValue.Index(i).Set(sliceValue.Index(j).Elem())\n\t\t\tsliceValue.Index(j).Set(indexItemValue)\n\t\t}\n\t\tj++\n\t}\n}", "title": "" }, { "docid": "c01f75a68a949c271c2224dad350c00a", "score": "0.61825466", "text": "func Reverse(slice []string) {\n\tfor i, j := 0, len(slice)-1; i < j; i, j = i+1, j-1 {\n\t\tslice[i], slice[j] = slice[j], slice[i]\n\t}\n}", "title": "" }, { "docid": "a41eb10783839f3fedb5febdb199de83", "score": "0.60753745", "text": "func reverse(in []T) []T {\n\tl := len(in)\n\tout := make([]T, l)\n\tfor i, v := range in {\n\t\tout[(l-1)-i] = v\n\t}\n\treturn out\n}", "title": "" }, { "docid": "5c5af2d275dbb20f97a2366c2efc13f1", "score": "0.6059988", "text": "func Reverse[S ~[]T, T any](items S) S {\n\tif len(items) <= 1 {\n\t\treturn items\n\t}\n\tresult := make([]T, 0, len(items))\n\tfor i := len(items) - 1; i >= 0; i-- {\n\t\tresult = append(result, items[i])\n\t}\n\treturn result\n}", "title": "" }, { "docid": "71ec288acc9bcea22e8324f0c5f757f9", "score": "0.6027787", "text": "func Reverse[S ~[]E, E any](s S) {\n\tfor i, j := 0, len(s)-1; i < j; i, j = i+1, j-1 {\n\t\ts[i], s[j] = s[j], s[i]\n\t}\n}", "title": "" }, { "docid": "84fe39bed40cf1f2b4055a5257f51132", "score": "0.6011409", "text": "func rev(b []byte) {\n\tsize := len(b)\n\tfor i := 0; i < len(b)/2; i++ {\n\t\tb[i], b[size-1-i] = b[size-1-i], b[i]\n\t}\n}", "title": "" }, { "docid": "2b5eca0c8ae9322924ff4128884a8b4f", "score": "0.599971", "text": "func (v Vector) reverse() Vector {\n\tr := v.Copy().(Vector)\n\tfor i, j := 0, len(r)-1; i < j; i, j = i+1, j-1 {\n\t\tr[i], r[j] = r[j], r[i]\n\t}\n\treturn r\n}", "title": "" }, { "docid": "45182ea750b060d486fdc0b25d81360c", "score": "0.59828293", "text": "func reverseOrigin(s []int) {\n\tfor i, j := 0, len(s)-1; i < j; i, j = i+1, j-1 {\n\t\ts[i], s[j] = s[j], s[i]\n\t}\n}", "title": "" }, { "docid": "bb6ecf53c1e656f6206ccf24465c6851", "score": "0.59787923", "text": "func (w Walk) Reverse() Walk {\n\tfor i, j := 0, len(w)-1; i < j; i, j = i+1, j-1 {\n\t\tw[i], w[j] = w[j], w[i]\n\t}\n\treturn w\n}", "title": "" }, { "docid": "cc6fa31326bf49259c26390e932f9a0e", "score": "0.5971949", "text": "func reverse(triplets []Triplet) []Triplet {\n\treversedTriplets := []Triplet{}\n\tfor i := len(triplets) - 1; i >= 0; i-- {\n\t\treversedTriplets = append(reversedTriplets, triplets[i])\n\t}\n\treturn reversedTriplets\n}", "title": "" }, { "docid": "5a58b3e978461f22699c404189f42770", "score": "0.59645355", "text": "func ReversePaths(a []string) []string {\n\tres := make([]string, len(a))\n\tn := len(a)\n\tfor i, p := range a {\n\t\tres[n-i-1] = p\n\t}\n\treturn res\n}", "title": "" }, { "docid": "05fdb502975c632d714051e4b72188dc", "score": "0.5936989", "text": "func reverse(A []int, turner int){\n\tfor i, j := 0, turner; i<turner+1/2; i,j = i+1, j-1{\n\t\tA[i], A[j] = A[j], A[i]\n\t}\n}", "title": "" }, { "docid": "a827920a97c1a4bfc8a71e28416e699d", "score": "0.5841514", "text": "func reverse(b []byte) []byte {\n\tfor i, j := 0, len(b)-1; i < j; i, j = i+1, j-1 {\n\t\tb[i], b[j] = b[j], b[i]\n\t}\n\treturn b\n}", "title": "" }, { "docid": "c7b8d63f04b8e4560447c18959f00bf1", "score": "0.5835133", "text": "func reverse(input []string) {\n\tlast := len(input) - 1\n\tfor i := 0; i < len(input)/2; i++ {\n\t\tinput[i], input[last-i] = input[last-i], input[i]\n\t}\n}", "title": "" }, { "docid": "b6018b713f784f7767a749851de8f35a", "score": "0.5830219", "text": "func Reverse[T any](s []T) {\n\tfor i := 0; i < len(s)/2; i++ {\n\t\ts[i], s[len(s)-1-i] = s[len(s)-1-i], s[i]\n\t}\n}", "title": "" }, { "docid": "29b46ab62ad96ee029c023779b4fc9a9", "score": "0.5818858", "text": "func (vss *VenueSortSlice) Reverse() {\r\n\t// swap start and end, in converging indices to the mid\r\n\tfor i := 0; i < len(*vss)/2; i++ {\r\n\t\t(*vss)[i], (*vss)[len(*vss)-1-i] = (*vss)[len(*vss)-1-i], (*vss)[i]\r\n\t}\r\n}", "title": "" }, { "docid": "5631f9617c58eebbd122c1daeac70c04", "score": "0.5792025", "text": "func Reverse(s []byte) []byte {\n\tfor i, j := 0, len(s)-1; i < j; i, j = i+1, j-1 {\n\t\ts[i], s[j] = s[j], s[i]\n\t}\n\treturn s\n}", "title": "" }, { "docid": "1d86d95b23d7f813d8e5837f826c62b5", "score": "0.5776924", "text": "func Reverse(input *[]int, start, end int) {\n\tfor i, j := start, end-1; i < j; i, j = i+1, j-1 {\n\t\t(*input)[i], (*input)[j] = (*input)[j], (*input)[i]\n\t}\n}", "title": "" }, { "docid": "50306f1fa71a2fb4da4a8f628a8f5224", "score": "0.577682", "text": "func (s *Spinner) Reverse() {\n\ts.mu.Lock()\n\tfor i, j := 0, len(s.chars)-1; i < j; i, j = i+1, j-1 {\n\t\ts.chars[i], s.chars[j] = s.chars[j], s.chars[i]\n\t}\n\ts.mu.Unlock()\n}", "title": "" }, { "docid": "ca0659bed566f904a9805c4b52c26735", "score": "0.5770404", "text": "func ReverseSlice(slice []string) []string {\n\tfor i, j := 0, len(slice)-1; i < j; i, j = i+1, j-1 {\n\t\tslice[i], slice[j] = slice[j], slice[i]\n\t}\n\n\treturn slice\n}", "title": "" }, { "docid": "93bee9a085615e08e7a0a70a30883893", "score": "0.575154", "text": "func (m *Motor) Reverse() {\n\tm.Pins[0].Write(embd.Low)\n\tm.Pins[1].Write(embd.High)\n}", "title": "" }, { "docid": "cd445eed456a8b6487822e99104275a9", "score": "0.5745888", "text": "func (s Slice) Reverse() Slice {\n\treturn reverse(s).(Slice)\n}", "title": "" }, { "docid": "f9209fea40860d22d7f0caf87fe96e44", "score": "0.5738505", "text": "func flip(ss []string) {\n\tfor i, s := range ss {\n\t\tif i+1 > len(ss)/2 {\n\t\t\tbreak\n\t\t}\n\t\tss[i] = ss[len(ss)-1-i]\n\t\tss[len(ss)-1-i] = s\n\t}\n}", "title": "" }, { "docid": "752c073cfa765836abb839501a6ac5d5", "score": "0.57364374", "text": "func reverse(s []int) {\n\tfor left, right := 0, len(s) -1; left < right; left, right = left+1, right - 1{\n\t\ts[left], s[right] = s[right], s[left]\n\t}\n}", "title": "" }, { "docid": "03c8e96907f20bd5f9937b42f064808e", "score": "0.5730068", "text": "func Reverse(a []int) {\n\tlast := len(a)\n\tmid := last / 2\n\tlast--\n\tfor i := 0; i < mid; i++ {\n\t\tj := last - i\n\t\ta[i], a[j] = a[j], a[i]\n\t}\n}", "title": "" }, { "docid": "3b43791cf6df15a0584f7b2ca7c32dfa", "score": "0.57056415", "text": "func Reverse(a []string) []string {\n\tfor i, j := 0, len(a)-1; i < j; i, j = i+1, j-1 {\n\t\ta[i], a[j] = a[j], a[i]\n\t}\n\n\treturn a\n}", "title": "" }, { "docid": "11c5e27daa7d765f5b9e777d5ad3ce02", "score": "0.56611186", "text": "func reverse(l []Id) {\n\tfor i, j := 0, len(l)-1; i < j; i, j = i+1, j-1 {\n\t\tl[i], l[j] = l[j], l[i]\n\t}\n}", "title": "" }, { "docid": "9ef5ec5cc163bfe985cf551a959099fa", "score": "0.56557494", "text": "func (s *SliceInt8) Reverse() *SliceInt8 {\n\tif s == nil {\n\t\treturn nil\n\t}\n\n\tfor i := len(s.data)/2 - 1; i >= 0; i-- {\n\t\topp := len(s.data) - 1 - i\n\t\ts.Swap(i, opp)\n\t}\n\n\treturn s\n}", "title": "" }, { "docid": "267fc889e942d1c3debb337ba6a25044", "score": "0.5646024", "text": "func (o OfSlice[T]) Reverse() OfSlice[T] {\n\treturn OfSlice[T]{Reverse(o.Result)}\n}", "title": "" }, { "docid": "e11063373e2708fe6e5c76fd6c0e5280", "score": "0.56262285", "text": "func reverse(arr []byte) {\n\tn := len(arr)\n\tfor i := 0; i < n/2; i++ {\n\t\tbuffer := arr[i]\n\t\tarr[i] = arr[n-i-1]\n\t\tarr[n-i-1] = buffer\n\t}\n}", "title": "" }, { "docid": "ac1e19c39b1ddb43b5b9dcf317c2ef1b", "score": "0.56240624", "text": "func MoveBackward(slice interface{}, i, n int) interface{} {\n\tv := reflect.ValueOf(slice)\n\tl := v.Len() + n\n\tc := v.Cap()\n\tif l <= c {\n\t\tv = v.Slice(0, l)\n\t} else {\n\t\tv = v.Slice(0, c)\n\t\tv = reflect.AppendSlice(v, reflect.MakeSlice(v.Type(), l-c, l-c))\n\t}\n\n\tif i != l-n { // let it panic if i > l - n\n\t\treflect.Copy(v.Slice(i+n, l), v.Slice(i, l-n))\n\t}\n\treturn v.Interface()\n}", "title": "" }, { "docid": "9585aec10d52620310c5582bd33bf252", "score": "0.56039685", "text": "func Invert(items Iterator) Iterator {\n\treturn InvertingSlice(Unroll(items)).MakeIter()\n}", "title": "" }, { "docid": "00142f303e71b19e67c8de6b6cc83dc6", "score": "0.5586602", "text": "func Reverse /*[T algo.Any]*/ (vals []T) {\n\tfor i, j := 0, len(vals)-1; i < j; i, j = i+1, j-1 {\n\t\tvals[i], vals[j] = vals[j], vals[i]\n\t}\n}", "title": "" }, { "docid": "5870a6ad48c5b0786d3cc47dcf9563f0", "score": "0.5583473", "text": "func Reverse(s []byte) []byte {\n\tL := len(s)\n\tt := make([]byte, L)\n\tfor i, v := range s {\n\t\tt[L-1-i] = v\n\t}\n\treturn t\n}", "title": "" }, { "docid": "37ec4fb35452b21398d156f75ce19b76", "score": "0.55684346", "text": "func (r *Ring) Reverse() error {\n\tif len(r.nodes) == 0 {\n\t\treturn ErrEmptyRing\n\t}\n\n\tcurrent := r.head\n\tprev := r.nodes[current].prev\n\n\t// stupid golang has no do-while. have to hack it in with the first bool\n\tfirst := true\n\tfor first || (current != r.head && current != -1) {\n\t\tfirst = false\n\t\tr.nodes[current].prev = r.nodes[current].next\n\t\tr.nodes[current].next = prev\n\n\t\tcurrent = prev\n\t\tprev = r.nodes[current].prev\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "d576ed4a3d7242910b45f0520699c533", "score": "0.5564555", "text": "func (list WotHasSlice2List) Reverse() WotHasSlice2List {\n\tnumItems := len(list)\n\tresult := make(WotHasSlice2List, numItems)\n\tlast := numItems - 1\n\tfor i, v := range list {\n\t\tresult[last-i] = v\n\t}\n\treturn result\n}", "title": "" }, { "docid": "a6890287d067c80bc057118033916501", "score": "0.55609524", "text": "func Reverse(g gif.GIF) gif.GIF {\n var out gif.GIF\n for i := len(g.Image); i > 0; i-- {\n out.Image = append(out.Image, g.Image[i-1])\n out.Delay = append(out.Delay, g.Delay[i-1])\n }\n\n return out\n}", "title": "" }, { "docid": "e1d88e34e9f52fecc2811b55cfc8dd17", "score": "0.55547786", "text": "func reverseArray(p *[10]int) {\n\tfor i, j := 0, len(p)-1; i < j; i, j = i+1, j-1 {\n\t\tp[i], p[j] = p[j], p[i]\n\t}\n}", "title": "" }, { "docid": "67db5ae192efb52e542409ad686ed7f9", "score": "0.5552606", "text": "func main() {\n\tfmt.Println(Reverse(list))\n}", "title": "" }, { "docid": "61ca19ef7fe0f3e7574c2f69169e1ab7", "score": "0.5542916", "text": "func reverse(s []int) {\n\tfor i, j := 0, len(s)-1; i < j; i, j = i+1, j-1 {\n\t\ts[i], s[j] = s[j], s[i]\n\t}\n}", "title": "" }, { "docid": "61ca19ef7fe0f3e7574c2f69169e1ab7", "score": "0.5542916", "text": "func reverse(s []int) {\n\tfor i, j := 0, len(s)-1; i < j; i, j = i+1, j-1 {\n\t\ts[i], s[j] = s[j], s[i]\n\t}\n}", "title": "" }, { "docid": "6c55aefa196f3fb398d46bd4134783dd", "score": "0.55428857", "text": "func reverse(s *[32]int) {\n\tfor i, j := 0, len(s)-1; i < j; i, j = i+1, j-1 {\n\t\ts[i], s[j] = s[j], s[i]\n\t}\n}", "title": "" }, { "docid": "94e6e9aa5034fbb5c469f2c12a6fc474", "score": "0.5513279", "text": "func traceBackwards(size int, lengths []uint16) []uint16 {\n\tif size == 0 {\n\t\treturn nil\n\t}\n\n\tvar path []uint16\n\tindex := size\n\tfor {\n\t\tpath = append(path, lengths[index])\n\t\tif int(lengths[index]) > index {\n\t\t\tpanic(\"length is greater than index\")\n\t\t}\n\t\tif lengths[index] > MAX_MATCH {\n\t\t\tpanic(\"length is greater than MAX_MATCH\")\n\t\t}\n\t\tif lengths[index] == 0 {\n\t\t\tpanic(\"length is zero\")\n\t\t}\n\t\tindex -= int(lengths[index])\n\t\tif index == 0 {\n\t\t\tbreak\n\t\t}\n\t}\n\n\t// Mirror result.\n\tpathSize := len(path)\n\tfor index = 0; index < pathSize/2; index++ {\n\t\tpath[index], path[pathSize-index-1] = path[pathSize-index-1], path[index]\n\t}\n\n\treturn path\n}", "title": "" }, { "docid": "ba6bbc7a9ee90e118e314d196c2ffa33", "score": "0.5510497", "text": "func Flip(data sort.Interface) {\n\ta, b := 0, data.Len()-1\n\tfor b > a {\n\t\tdata.Swap(a, b)\n\t\ta++\n\t\tb--\n\t}\n}", "title": "" }, { "docid": "35ca853f05343f3c40437a47ae2185a6", "score": "0.5486284", "text": "func reverse(m Motion) Motion {\n\treturn New(func (buf *buf.Buf, rd *buf.Reader) bool {\n\t\trd.Reverse()\n\t\treturn m.Move(buf, rd)\n\t})\n}", "title": "" }, { "docid": "cb9087921fa42475bb7660e7db05a623", "score": "0.5478788", "text": "func Reverse(s []int) {\n\tfor i, j := 0, len(s)-1; i < j; i, j = i+1, j-1 {\n\t\ts[i], s[j] = s[j], s[i]\n\t}\n}", "title": "" }, { "docid": "4c2ce28d1b764330be2e30a7a937199c", "score": "0.547574", "text": "func reverseValues(in [][]byte) (out [][]byte) {\n\tout = make([][]byte, 0, len(in))\n\tfor x := len(in) - 1; x >= 0; x-- {\n\t\tout = append(out, in[x])\n\t}\n\treturn\n}", "title": "" }, { "docid": "1dfab141eb91e86cc99290806593e61f", "score": "0.5471711", "text": "func reverseInput(input [] SortableObject, range_ Range) {\n\tfor i := range_.Length()/2 - 1; i >= 0; i-- {\n\t\tswap := input[range_.start+i]\n\t\tinput[range_.start+i] = input[range_.end-i-1]\n\t\tinput[range_.end-i-1] = swap\n\t}\n}", "title": "" }, { "docid": "260b78ac928d9514b7725d66eefdc067", "score": "0.54533625", "text": "func iter2VerticalReverse() *Iter {\n\ta := newNode(hash, \"a\", empty)\n\tb := newNode(hash, \"b\", []*node{a})\n\troot := newNode(hash, \"root\", []*node{b})\n\treturn NewIter(root)\n}", "title": "" }, { "docid": "550a19e397106ccb60ea2880eff07f01", "score": "0.5452068", "text": "func reverseUint64Slice(a []uint64) {\n\tfor i, j := 0, len(a)-1; i < j; i, j = i+1, j-1 {\n\t\ta[i], a[j] = a[j], a[i]\n\t}\n}", "title": "" }, { "docid": "3a28a268f062a068dfe013657750b3d8", "score": "0.5445824", "text": "func Reversed(a []int) []int {\n\tb := Copied(a)\n\tReverse(b)\n\treturn b\n}", "title": "" }, { "docid": "f5d64aaae12937e3d9055356da44245e", "score": "0.54330033", "text": "func TestReverse(t *T) {\n\t// Normal case\n\tintl := []interface{}{3, 2, 1}\n\tl := NewList(intl...)\n\tnl := Reverse(l)\n\tassertSeqContents(l, intl, t)\n\tassertSeqContents(nl, []interface{}{1, 2, 3}, t)\n\n\t// Degenerate case\n\tl = NewList()\n\tnl = Reverse(l)\n\tassertEmpty(l, t)\n\tassertEmpty(nl, t)\n}", "title": "" }, { "docid": "736562553b246df7eb70bf9285555e68", "score": "0.5429603", "text": "func (s *SliceFloat32) Reverse() *SliceFloat32 {\n\tif s == nil {\n\t\treturn nil\n\t}\n\n\tfor i := len(s.data)/2 - 1; i >= 0; i-- {\n\t\topp := len(s.data) - 1 - i\n\t\ts.Swap(i, opp)\n\t}\n\n\treturn s\n}", "title": "" }, { "docid": "387925b72c9690d36f84f0717c2783d5", "score": "0.5425994", "text": "func ReversePointers(first **node) *node {\n\tvar result *node = nil\n\tvar current *node = *first\n\n\tfor current != nil {\n\t\tMoveNode(&result, &current)\n\t}\n\treturn result\n}", "title": "" }, { "docid": "29ac83f7dcea49598fc2e54c598391d6", "score": "0.5425922", "text": "func appendReversedInos(toS []I.Ino, fromS ...I.Ino) []I.Ino {\n\tfor i, j := 0, len(fromS)-1; i < j; i, j = i+1, j-1 {\n\t\tfromS[i], fromS[j] = fromS[j], fromS[i]\n\t}\n\treturn append(toS, fromS...)\n}", "title": "" }, { "docid": "257f79e94e709c32310d31b493662db1", "score": "0.5417552", "text": "func (p *Permutation) Reverse(n, m int) {\n for i := 0; i <= (m-n)/2; i++ {\n (*p)[n+i], (*p)[m-i] = -(*p)[m-i], -(*p)[n+i]\n }\n}", "title": "" }, { "docid": "8218b59439008c2a3a5137461b27b6dd", "score": "0.54149634", "text": "func Reverse[T any](list []T) {\n\ti := 0\n\tj := len(list)-1\n\tfor i < j {\n\t\tlist[i], list[j] = list[j], list[i]\n\t\ti++\n\t\tj--\n\t}\n}", "title": "" }, { "docid": "6a7c7ffa9c7c1c8cad42d061a68041e3", "score": "0.5392181", "text": "func Reverse(a []int) {\n\tn := len(a)\n\tfor i, j := 0, n-1; i < j; i, j = i+1, j-1 {\n\t\ta[i], a[j] = a[j], a[i]\n\t}\n}", "title": "" }, { "docid": "952d9099723f63e49a5357720f0c1d08", "score": "0.5388733", "text": "func ReverseVersion(versions []*version.Version) {\n\tfor i := len(versions)/2 - 1; i >= 0; i-- {\n\t\topp := len(versions) - 1 - i\n\t\tversions[i], versions[opp] = versions[opp], versions[i]\n\t}\n}", "title": "" }, { "docid": "172ee363b711933ce961d43f215e2527", "score": "0.5382978", "text": "func Reverse(l List) {\n\tleft := 0\n\tright := len(l) - 1\n\n\tfor left < right {\n\t\tl[left], l[right] = l[right], l[left]\n\t\tleft += 1\n\t\tright -= 1\n\t}\n}", "title": "" }, { "docid": "031ceed8d06db4c3037ccaa26c1943e1", "score": "0.5361371", "text": "func (d *DNAcompl) reverse(start, end int) {\n\t// fmt.Print(time.Now().Format(\"04:05.000000\") + \" \")\n\t// fmt.Printf(\"reverse: start = %v, end = %v\\n\", start, end)\n\tfor i := start; i < end; i++ {\n\t\td.compldna[i] = d.dna[len(d.dna)-i-1]\n\t}\n}", "title": "" }, { "docid": "596872e197b6184fc733be56a4f719f8", "score": "0.53569055", "text": "func reverse(b []byte) ([]byte, error) {\n\tb = bytes.TrimSpace(b)\n\tfor i, j := 0, len(b)-1; i < j; i, j = i+1, j-1 {\n\t\tb[i], b[j] = b[j], b[i]\n\t}\n\tb = append(b, '\\n')\n\treturn b, nil\n}", "title": "" }, { "docid": "5401bb14b01eb27142c9ce596fd17315", "score": "0.53297037", "text": "func iter2HorizontalReverse() *Iter {\n\ta := newNode(hash, \"a\", empty)\n\tb := newNode(hash, \"b\", empty)\n\troot := newNode(hash, \"root\", []*node{b, a})\n\treturn NewIter(root)\n}", "title": "" }, { "docid": "08857518cf25860139235f55b151d41c", "score": "0.5323497", "text": "func ReverseStrings(versions []string) {\n\tfor i := len(versions)/2 - 1; i >= 0; i-- {\n\t\topp := len(versions) - 1 - i\n\t\tversions[i], versions[opp] = versions[opp], versions[i]\n\t}\n}", "title": "" }, { "docid": "4ca9b01deae87ef1eb6d2ad89fbea3b9", "score": "0.5309769", "text": "func (a Iarr) ShiftRight() Iarr {\n newArr := make(Iarr, len(a))\n for i := 0; i < len(a)-1; i++ {\n newArr[i+1] = a[i]\n }\n return newArr\n}", "title": "" }, { "docid": "a17292a981b52bd4d8b1040f606bc491", "score": "0.5308783", "text": "func reverseStrings(ss []string) {\n\tlast := len(ss) - 1\n\tfor i := 0; i < len(ss)/2; i++ {\n\t\tss[i], ss[last-i] = ss[last-i], ss[i]\n\t}\n}", "title": "" }, { "docid": "55d47ec2e98c7c980e1cd931de9c0ee7", "score": "0.5253759", "text": "func remainingOneSide(iface Interface, idx int, delta Delta, diff []Diff) []Diff {\n\tfor i := 0; i < idx; i++ {\n\t\tdiff = append(diff, Diff{Delta: delta, Index: idx - 1 - i})\n\t}\n\treturn diff\n}", "title": "" }, { "docid": "0f968a065158ea2e2feab541cc1feae8", "score": "0.52474815", "text": "func ReverseCommits(commits []*Commit) []*Commit {\n\tfor i, j := 0, len(commits)-1; i < j; i, j = i+1, j-1 {\n\t\tcommits[i], commits[j] = commits[j], commits[i]\n\t}\n\treturn commits\n}", "title": "" }, { "docid": "dd4db7633447428973a37cbddfbafd85", "score": "0.52457666", "text": "func (w *Waiter) flip(s []string) []string {\n\t// Update flipCount\n\tw.flipCount++\n\n\t// Invert strings\n\tfor i, v := range s {\n\t\tif v == \"-\" {\n\t\t\ts[i] = \"+\"\n\t\t} else {\n\t\t\ts[i] = \"-\"\n\t\t}\n\t}\n\ts = w.reverse(s)\n\treturn s\n}", "title": "" }, { "docid": "09c9fb23ae9d76bdac9ebb752323b304", "score": "0.5245554", "text": "func Reverse(s string) string {\n r := []rune(s)\n\n // [0] [1] [2] [3] [4]\n // F A R T \\0\n for i, j := 0, len(r)-1; i < len(r)/2; i, j = i+1, j-1 {\n r[i], r[j] = r[j], r[i]\n }\n return string(r)\n}", "title": "" }, { "docid": "a02a34f735cbe4cca5b5e32e92b86e15", "score": "0.5235924", "text": "func (z Entries) Reverse() Entries {\n\tfor left, right := 0, len(z)-1; left < right; left, right = left+1, right-1 {\n\t\tz[left], z[right] = z[right], z[left]\n\t}\n\treturn z\n}", "title": "" }, { "docid": "cb234f3deaf7d756d402640c32d53548", "score": "0.52194", "text": "func moveToRight(input []int, pivot, from int) int {\n\ttemp := input[from]\n\tinput[from] = input[pivot-1]\n\tinput[pivot-1] = input[pivot]\n\tinput[pivot] = temp\n\treturn pivot - 1\n}", "title": "" }, { "docid": "070688bbe5dd80c746b4ae4dc2bc8bd8", "score": "0.52188313", "text": "func createReverseArcGraph(g *Graph) *Graph {\n\tng := new(Graph)\n\n\tng.VerticeMap = make(map[int]*Vertex)\n\n\tfor _, v := range g.Vertices {\n\t\tnv := new(Vertex)\n\t\tnv.Label = v.Label\n\t\tng.Vertices = append(ng.Vertices, nv)\n\n\t\tng.VerticeMap[nv.Label] = nv\n\t}\n\n\t//reversed arc\n\tfor _, edge := range g.Edges {\n\t\tne := new(Edge)\n\t\tne.Tail = ng.VerticeMap[edge.Head.Label]\n\t\tne.Head = ng.VerticeMap[edge.Tail.Label]\n\t\tng.Edges = append(ng.Edges, ne)\n\n\t\t//add this edges to v\n\t\tne.Tail.Edges = append(ne.Tail.Edges, ne)\n\t}\n\n\treturn ng\n\n}", "title": "" }, { "docid": "bd0a2c5564f6602850036c3d27c54161", "score": "0.5198777", "text": "func reverse(init string) string {\n\tvalue := strings.Split(init, \"\")\n\tfor i := 0; i < len(value) / 2; i++ {\n\t\tvalue[i], value[len(value) - i - 1] = value[len(value) - i - 1], value[i]\n\t}\n\treturn strings.Join(value, \"\")\n}", "title": "" }, { "docid": "440eafdadad470e3b5e72c55d86b7187", "score": "0.5188", "text": "func Reverse() Modifier {\n\treturn func(q *Query) {\n\t\tq.Reverse = !q.Reverse\n\t}\n}", "title": "" }, { "docid": "b9263707e459d74ee0971ab5b926ddfd", "score": "0.51799273", "text": "func (p Pitch) Down(s Step) Pitch {\n\ti := noteIndices[p]\n\tif i-int(s) < 0 {\n\t\treturn allPitches[0]\n\t}\n\treturn allPitches[i-int(s)]\n}", "title": "" }, { "docid": "ef39bf094f233ec390d43dd7bc560a1a", "score": "0.51724035", "text": "func reverseBetween(head *ListNode, m int, n int) *ListNode {\n\tm, n = m-1, n-1\n\tend := head\n\tfor i := 0; i < m; i++ {\n\t\tend = end.Next\n\t}\n\tstart := end.Next\n\tif start == nil {\n\t\treturn head\n\t}\n\tcurrent, next := start, start.Next\n\tfor i := m; i < n; i++ {\n\t\tif next != nil {\n\t\t\tnext.Next, current, next = current, next, next.Next\n\t\t} else {\n\t\t\tcurrent = next\n\t\t}\n\t}\n\tstart.Next, end.Next = next, current\n\treturn head\n}", "title": "" }, { "docid": "a705b731f73bae0a0e897f3c02352f38", "score": "0.5167759", "text": "func Reverse(c []int, first int, last int) {\n\n\tif first == last {\n\t\treturn\n\t}\n\n\tlast--\n\tfor {\n\t\tif first >= last {\n\t\t\tbreak\n\t\t}\n\t\tc[first], c[last] = c[last], c[first]\n\t\tfirst++\n\t\tlast--\n\t}\n}", "title": "" }, { "docid": "7bb82ddee0f2922b21428db48623f313", "score": "0.51666576", "text": "func flipAndInvertImage(A [][]int) [][]int {\n\tl := len(A)\n\tfor i := 0; i < l; i++ {\n\t\tcurList, s, e := A[i], 0, l-1\n\t\tfor s <= e {\n\t\t\tcurList[s], curList[e] = curList[s]^1, curList[e]^1\n\t\t\tcurList[s], curList[e] = curList[e], curList[s]\n\t\t\ts++\n\t\t\te--\n\t\t}\n\t}\n\treturn A\n}", "title": "" }, { "docid": "00e90742165bd964577bac0f0856b54d", "score": "0.51591", "text": "func reverseRunesInPlace(a []byte) {\n\t// I think we can reverse the bytes of each rune and then reverse the entire slice of bytes\n\ttotalBytes := len(a)\n\tbytesRead := 0\n\tfor ; bytesRead < totalBytes; {\n\t\t_, chSize := utf8.DecodeRune(a[bytesRead:])\n\t\t// assert chSize != 0, if chSize == 1, then we take it as-is\n\t\treverseBytesInPlace(a[bytesRead:bytesRead+chSize])\n\t\tbytesRead += chSize\n\t}\n\treverseBytesInPlace(a)\n}", "title": "" }, { "docid": "afabc11790976352eebccc20ae4fe217", "score": "0.51358455", "text": "func (m MultiPoint) Reverse() MultiPoint {\n\treturn m\n}", "title": "" }, { "docid": "da09baaa81fb9058fb43259fd27bd443", "score": "0.51312715", "text": "func Reverse(ctx context.Context, db DB, p0 string) (string, error) {\n\t// call pg_catalog.reverse\n\tconst sqlstr = `SELECT * FROM pg_catalog.reverse($1)`\n\t// run\n\tvar r0 string\n\tlogf(sqlstr, p0)\n\tif err := db.QueryRowContext(ctx, sqlstr, p0).Scan(&r0); err != nil {\n\t\treturn \"\", logerror(err)\n\t}\n\treturn r0, nil\n}", "title": "" }, { "docid": "8ca34b125b89c6a94a09e3a8f5b7d127", "score": "0.5091986", "text": "func (eli EncodedLibraryIdentifier) PartsReversed() []string {\n\tparts := eli.Parts()\n\tpartsReversed := make([]string, len(parts))\n\tfor i, part := range parts {\n\t\tpartsReversed[len(parts)-i-1] = string(part)\n\t}\n\n\treturn partsReversed\n}", "title": "" }, { "docid": "44f31d348ec91a14dbad372c982a63f5", "score": "0.50858784", "text": "func reconstructPath(start, goal Node) []Node {\n\tnode := goal\n\tpath := []Node{}\n\tfor node != start {\n\t\tpath = append(path, node)\n\t\tvar found bool\n\t\tnode, found = parent[node]\n\t\tif !found {\n\t\t\tpanic(\"Unexpected child node\")\n\t\t}\n\t}\n\tpath = append(path, start)\n\t// Reverse\n\treversed := []Node{}\n\tfor i := len(path)-1; i >= 0; i-- {\n\t\treversed = append(reversed, path[i])\n\t}\n\tif reversed[0] != start {\n\t\tpanic(\"First path node was not start\")\n\t}\n\tif reversed[len(reversed)-1] != goal {\n\t\tpanic(\"Last path node was not goal\")\n\t}\n\treturn reversed\n}", "title": "" }, { "docid": "f4519537ba3b9af07531f0806dd63d40", "score": "0.5081645", "text": "func (c *Caesar) Reverse() *Caesar {\n\tc.left = !c.left\n\treturn c\n}", "title": "" }, { "docid": "b0522daec6c03a845316954897d26dec", "score": "0.5078549", "text": "func reverse(v *vector.StringVector) (r *vector.StringVector) {\n\n r = new(vector.StringVector)\n\n for _, s := range *v {\n r.Insert(0, s)\n }\n\n\treturn\n}", "title": "" }, { "docid": "2a6d09a0d4d2356f6b7797d184a716d1", "score": "0.5076744", "text": "func DeTransposeRailFence(input string) string {\n\tderf := \"\"\n\tlength := len(input)\n\tfirst := input[:length/2]\n\tsecond := input[length/2:]\n\tif length%2 == 0 {\n\t\tfor i := range first {\n\t\t\tderf += string(first[i]) + string(second[i])\n\t\t}\n\t} else {\n\t\tfor i := range first {\n\t\t\tderf += string(first[i]) + string(second[i+1])\n\t\t}\n\t\tderf += string(second[0])\n\t}\n\treturn derf\n}", "title": "" }, { "docid": "547362bfa38672af9916fccea4683098", "score": "0.50662214", "text": "func (l *list) reverse() {\n\tfor node := l.tail; node != nil; node = node.next {\n\t\tnode.next, node.prev = node.prev, node.next\n\t}\n\tl.tail, l.head = l.head, l.tail\n}", "title": "" } ]
16cf5633e2e401811358b9af67d538db
NewSolPolicyInventory instantiates a new SolPolicyInventory object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed
[ { "docid": "842fbe8f9139df9087e8b139d5f991aa", "score": "0.69942087", "text": "func NewSolPolicyInventory(classId string, objectType string) *SolPolicyInventory {\n\tthis := SolPolicyInventory{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\treturn &this\n}", "title": "" } ]
[ { "docid": "1f7a0f4d213fd7510d036fd18170d6f4", "score": "0.65423614", "text": "func NewInventory(stockMapper, purchaseMapper, salesMapper datamapper.DataMapper, db *sql.DB) *Inventory {\n\t//TODO: the db session injected here must be the same as the db session used by injected datamappers, so database transactions used here is on the same db connection\n\t//Refactor so this validation can be performed here\n\treturn &Inventory{\n\t\tStockDatamapper: stockMapper,\n\t\tPurchaseDatamapper: purchaseMapper,\n\t\tSalesDatamapper: salesMapper,\n\t\tDB: db,\n\t}\n}", "title": "" }, { "docid": "b3c53f53a0a12f69573dd2f386453e89", "score": "0.64177585", "text": "func NewSolPolicyInventoryWithDefaults() *SolPolicyInventory {\n\tthis := SolPolicyInventory{}\n\tvar classId string = \"sol.PolicyInventory\"\n\tthis.ClassId = classId\n\tvar objectType string = \"sol.PolicyInventory\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "title": "" }, { "docid": "acbcc44600e9599767e2be05cf9e73a5", "score": "0.6345914", "text": "func NewSolPolicyInventoryAllOfWithDefaults() *SolPolicyInventoryAllOf {\n\tthis := SolPolicyInventoryAllOf{}\n\tvar classId string = \"sol.PolicyInventory\"\n\tthis.ClassId = classId\n\tvar objectType string = \"sol.PolicyInventory\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "title": "" }, { "docid": "7163ebfae5df087e75a828ef9333123e", "score": "0.6220936", "text": "func NewSolPolicyInventoryAllOf(classId string, objectType string) *SolPolicyInventoryAllOf {\n\tthis := SolPolicyInventoryAllOf{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\treturn &this\n}", "title": "" }, { "docid": "a50a59baf3d7da988dfaa7ed232b46e7", "score": "0.6087524", "text": "func NewInventory() *Inventory {\n\ti := new(Inventory)\n\ti.inv = make(map[rune]items.Item)\n\ti.shield = none\n\ti.weapon = none\n\ti.armor = none\n\n\treturn i\n}", "title": "" }, { "docid": "6c2d0ac734d3785cb1af5ac22273d995", "score": "0.60449904", "text": "func NewFakeInventory(config *viper.Viper, log *logrus.Entry) (Inventory, error) {\n\treturn &FakeInventory{config: config, log: log, total: 10}, nil\n}", "title": "" }, { "docid": "6933f9392992154660d371427bb3cd21", "score": "0.58840394", "text": "func NewInventory(bucketName, dirPath string, readFromStdin bool, refresh bool, options ...Option) (*InventoryConfig, error) {\n\tinventory := new(InventoryConfig)\n\tinventory.bucketName = bucketName\n\tinventory.dirPath = dirPath\n\tinventory.readFromStdin = readFromStdin\n\n\tfor _, option := range options {\n\t\toption(inventory)\n\t}\n\n\tLog.Debug(\"Initializing inventory\", \"target\", inventory.getParent())\n\tif refresh {\n\t\terr := inventory.Export()\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn inventory, nil\n}", "title": "" }, { "docid": "cc2166b2795f165ccfc3a92de8653bdf", "score": "0.5871939", "text": "func newInventoryClient(ctx context.Context, adminService string, authFlags *authcli.Flags) (fleet.InventoryClient, error) {\n\tauthOpts, err := authFlags.Options()\n\tif err != nil {\n\t\treturn nil, errors.Annotate(err, \"create new inventory client\").Err()\n\t}\n\n\ta := auth.NewAuthenticator(ctx, auth.SilentLogin, authOpts)\n\n\thttpClient, err := a.Client()\n\tif err != nil {\n\t\treturn nil, errors.Annotate(err, \"create new inventory client\").Err()\n\t}\n\n\tpc := prpc.Client{\n\t\tC: httpClient,\n\t\tHost: adminService,\n\t}\n\n\treturn fleet.NewInventoryPRPCClient(&pc), nil\n}", "title": "" }, { "docid": "d275aead042a3b6919ae586fd458920b", "score": "0.5835045", "text": "func newInventoryClient(proxy Proxy) *inventoryClient {\n\treturn &inventoryClient{\n\t\tproxy: proxy,\n\t}\n}", "title": "" }, { "docid": "46ae67d707c34ad4fb24b39c7d845c0c", "score": "0.5697052", "text": "func NewInventory(path string) Inventory {\n\tid := database.NewIdentity().GetID()\n\treturn Inventory{\n\t\tpath: filepath.Clean(path),\n\t\tfullPath: fmt.Sprintf(\"%s%s%s\", filepath.Clean(path), string(os.PathSeparator), id),\n\t\tgroupVarsFile: fmt.Sprintf(\"%s%s%s%sgroup_vars%sall.yml\", path, string(os.PathSeparator), id, string(os.PathSeparator), string(os.PathSeparator)),\n\t}\n}", "title": "" }, { "docid": "ebec104e957fdb14a75f3f75f98508e1", "score": "0.5645287", "text": "func NewSyslogPolicyInventory(classId string, objectType string) *SyslogPolicyInventory {\n\tthis := SyslogPolicyInventory{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\treturn &this\n}", "title": "" }, { "docid": "a0283528932a2259c24afdf749b57ca5", "score": "0.55578136", "text": "func New(opts map[string]string) (inv.Inventory, error) {\n\tconst op = \"inv/postgres.New\"\n\n\trequiredOpts := []string{\n\t\t\"dbhost\", \"dbname\", \"username\", \"password\", \"cleaning-prefix\",\n\t}\n\n\tfor _, opt := range requiredOpts {\n\t\tif _, ok := opts[opt]; !ok {\n\t\t\treturn nil, errors.E(op, errors.Strf(\"the %s option must be specified\", opt))\n\t\t}\n\t}\n\n\tdsn := fmt.Sprintf(\"host=%s dbname=%s user=%s password=%s sslmode=disable\",\n\t\topts[\"dbhost\"], opts[\"dbname\"], opts[\"username\"], opts[\"password\"],\n\t)\n\n\tdb, err := sqlx.Connect(\"postgres\", dsn)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &postgres{\n\t\tdb: db,\n\t\tprefixCleaning: opts[\"cleaning-prefix\"],\n\t}, nil\n}", "title": "" }, { "docid": "c3d8f7f34ba0de7a5495bb4badcee9ca", "score": "0.55186063", "text": "func NewInv(count *common.VarInt, inventory []*InvVect) *Inv {\n\treturn &Inv{\n\t\tCount: count,\n\t\tInventory: inventory,\n\t}\n}", "title": "" }, { "docid": "4fde453a9337de43e1024a873bd95d03", "score": "0.5485445", "text": "func NewFurnaceInventory() (inv *FurnaceInventory) {\n inv = &FurnaceInventory{\n burnTimeMax: 0,\n burnTime: 0,\n cookTime: reactionDuration,\n }\n inv.Inventory.Init(furnaceNumSlots)\n return\n}", "title": "" }, { "docid": "48efd0f85580f2f1be38fbd41b92d569", "score": "0.5363205", "text": "func AdjustInventory(token, locationID, variationID string, reqObj *AdjustInventoryReqObject) (*InventoryEntry, error) {\n\tv := new(InventoryEntry)\n\t_, err := squareRequest(\"POST\", fmt.Sprintf(\"/v1/%s/inventory/%s\", locationID, variationID), token, reqObj, v)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn v, nil\n}", "title": "" }, { "docid": "fe766be6e88a8ca16641c89ec7c139a8", "score": "0.5306813", "text": "func NewSyslogPolicyInventoryWithDefaults() *SyslogPolicyInventory {\n\tthis := SyslogPolicyInventory{}\n\tvar classId string = \"syslog.PolicyInventory\"\n\tthis.ClassId = classId\n\tvar objectType string = \"syslog.PolicyInventory\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "title": "" }, { "docid": "ad0194e849894f3037f1c8c042d9dd5c", "score": "0.5299654", "text": "func NewPolicyinventoryJobInfo(classId string, objectType string) *PolicyinventoryJobInfo {\n\tthis := PolicyinventoryJobInfo{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\treturn &this\n}", "title": "" }, { "docid": "f093fb832bcc06fd418104eddf3da97f", "score": "0.52965647", "text": "func GenerateInventory(product *models.ProductServiceInfo) {\n\n}", "title": "" }, { "docid": "356c93fb282d1675514d7ffdabec7786", "score": "0.5269377", "text": "func newBlockInventory(instance *BlockInstance, inv IInventory, ejectOnUnsubscribe bool, invTypeId InvTypeId) *blockInventory {\n\tblkInv := &blockInventory{\n\t\tinstance: *instance,\n\t\tinv: inv,\n\t\tsubscribers: make(map[EntityId]IPlayerClient),\n\t\tejectOnUnsubscribe: ejectOnUnsubscribe,\n\t\tinvTypeId: invTypeId,\n\t}\n\n\tblkInv.inv.SetSubscriber(blkInv)\n\n\treturn blkInv\n}", "title": "" }, { "docid": "92dba715db5abf1eb756e0537f669b8b", "score": "0.51954466", "text": "func (inv *Inventory) Validate() error {\n\treturn nil\n}", "title": "" }, { "docid": "5b23277d6a2fedd575b79db416236e3c", "score": "0.514988", "text": "func NewVnicFcVhbaPolicyInventoryWithDefaults() *VnicFcVhbaPolicyInventory {\n\tthis := VnicFcVhbaPolicyInventory{}\n\tvar classId string = \"vnic.FcVhbaPolicyInventory\"\n\tthis.ClassId = classId\n\tvar objectType string = \"vnic.FcVhbaPolicyInventory\"\n\tthis.ObjectType = objectType\n\tvar cos int64 = 3\n\tthis.Cos = &cos\n\tvar maxDataFieldSize int64 = 2112\n\tthis.MaxDataFieldSize = &maxDataFieldSize\n\treturn &this\n}", "title": "" }, { "docid": "ab985ef78bb79754c069f2f542df82b0", "score": "0.51269215", "text": "func NewInventoryOpsProducer(client bus.NalejClient, name string) (*InventoryOpsProducer, derrors.Error) {\n\tprod, err := client.BuildProducer(name, InventoryOpsTopic)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &InventoryOpsProducer{producer: prod}, nil\n}", "title": "" }, { "docid": "bde34750a4176c5a3fd9dc0a2d62127e", "score": "0.51124877", "text": "func (_options *CreateActionOptions) SetInventory(inventory string) *CreateActionOptions {\n\t_options.Inventory = core.StringPtr(inventory)\n\treturn _options\n}", "title": "" }, { "docid": "a78b7912adf6b1e4f3d0b63e223c8a3c", "score": "0.5105589", "text": "func NewGetLolInventoryV1SignedInventorySimpleParams() *GetLolInventoryV1SignedInventorySimpleParams {\n\tvar ()\n\treturn &GetLolInventoryV1SignedInventorySimpleParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "title": "" }, { "docid": "3ec398676773dea8153c8b878e0acc7f", "score": "0.5104199", "text": "func NewFromJSON(j string) (*Inventory, error) {\n\n\tinv := Inventory{}\n\n\t// Unmarshal into a simple map of interface{}\n\tvar v map[string]interface{}\n\terr := json.Unmarshal([]byte(j), &v)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Unable to unmarshal expected result: %s\", err)\n\t}\n\n\t// The only thing in \"_meta\" section is the hostvars bit. Use\n\t// Decode to convert the map into a real structure.\n\tmeta := map[string]HostVars{}\n\tmapstructure.Decode(v[\"_meta\"], &meta)\n\tinv.HostVars = meta[\"hostvars\"]\n\n\t// delete the _meta section, now the rest have a regular shape: Groups\n\tdelete(v, \"_meta\")\n\tmapstructure.Decode(v, &inv.Groups)\n\n\treturn &inv, nil\n}", "title": "" }, { "docid": "bd17dbd74a242812caa32410c72537b0", "score": "0.50820005", "text": "func (p *Plugin) ApplyInventoryPolicy(inventoryInput PluginInput, output iohandler.IOHandler) {\n\tlog := p.context.Log()\n\tvar optimizedInventoryItems, nonOptimizedInventoryItems []*ssm.InventoryItem\n\tvar items []model.Item\n\tvar err error\n\tvar uploadFlag bool\n\n\t//map of all valid gatherers & respective configs to run\n\tvar gatherers map[gatherers.T]model.Config\n\n\t//validate all gatherers\n\tif gatherers, err = p.ValidateInventoryInput(p.context, inventoryInput); err != nil {\n\t\tlog.Info(err.Error())\n\t\toutput.SetExitCode(1)\n\t\toutput.AppendError(err.Error())\n\t\treturn\n\t}\n\n\t//execute all eligible gatherers with their respective config\n\tif items, err = p.RunGatherers(gatherers); err != nil {\n\t\tlog.Info(err.Error())\n\t\toutput.SetExitCode(1)\n\t\toutput.AppendError(err.Error())\n\t\treturn\n\t}\n\n\t//check if there is data to send to SSM\n\tif len(items) == 0 {\n\t\t//no data to send to ssm - no need to call PutInventory API\n\t\tlog.Info(msgWhenNoDataToReturnForInventoryPlugin)\n\t\toutput.SetExitCode(0)\n\t\toutput.AppendInfo(msgWhenNoDataToReturnForInventoryPlugin)\n\t\treturn\n\t}\n\n\t//log collected data before sending\n\td, _ := json.Marshal(items)\n\tlog.Debugf(\"Collected Inventory data: %v\", string(d))\n\n\tif optimizedInventoryItems, nonOptimizedInventoryItems, err = p.uploader.ConvertToSsmInventoryItems(items); err != nil {\n\t\tlog.Infof(\"Encountered error in converting data to SSM InventoryItems - %v. Skipping upload to SSM\", err.Error())\n\t\toutput.SetExitCode(1)\n\t\toutput.AppendError(err.Error())\n\t\treturn\n\t}\n\n\tlog.Debugf(\"Optimized data - \\n%v \\n Non-optimized data - \\n%v\",\n\t\toptimizedInventoryItems,\n\t\tnonOptimizedInventoryItems)\n\n\t// uploadItemsToSSM uploads collected inventory data to SSM and returns true if the upload was successful\n\t// else returns false.\n\tif uploadFlag = p.uploadItemsToSSM(nonOptimizedInventoryItems, optimizedInventoryItems, output); uploadFlag != true {\n\t\toutput.SetExitCode(1)\n\t\treturn\n\t}\n\n\tlog.Infof(\"%v uploaded inventory data to SSM\", Name())\n\toutput.SetExitCode(0)\n\toutput.AppendInfo(successfulMsgForInventoryPlugin)\n\n\treturn\n}", "title": "" }, { "docid": "ad88027885b2b1358e9441d686768af6", "score": "0.50524324", "text": "func NewGetAPIInventoryDefault(code int) *GetAPIInventoryDefault {\n\tif code <= 0 {\n\t\tcode = 500\n\t}\n\n\treturn &GetAPIInventoryDefault{\n\t\t_statusCode: code,\n\t}\n}", "title": "" }, { "docid": "a556e248dea3d3f78cbfc5f272d40008", "score": "0.5007878", "text": "func NewSolitonWithCapacity(fields []*types.FieldType, cap int) *Soliton {\n\treturn New(fields, cap, cap) //FIXME: in following PR.\n}", "title": "" }, { "docid": "cc79f1a39a56f45046c535fefd0d86db", "score": "0.49798876", "text": "func NewVnicFcVhbaPolicyInventory(classId string, objectType string) *VnicFcVhbaPolicyInventory {\n\tthis := VnicFcVhbaPolicyInventory{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\tvar cos int64 = 3\n\tthis.Cos = &cos\n\tvar maxDataFieldSize int64 = 2112\n\tthis.MaxDataFieldSize = &maxDataFieldSize\n\treturn &this\n}", "title": "" }, { "docid": "b8b1dbb1a4d13d722749c4c2a852a534", "score": "0.49607491", "text": "func (_options *UpdateActionOptions) SetInventory(inventory string) *UpdateActionOptions {\n\t_options.Inventory = core.StringPtr(inventory)\n\treturn _options\n}", "title": "" }, { "docid": "f8864cc325cab91b975ea558b6b22a07", "score": "0.4935897", "text": "func NewInventoryStocktakingPostParams() *InventoryStocktakingPostParams {\n\tvar ()\n\treturn &InventoryStocktakingPostParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "title": "" }, { "docid": "686825d765a205bc4e8b9339348633db", "score": "0.48947766", "text": "func New(iexToken, alpacaID, alpacaKey string, options ...Option) (*Stock, error) {\n\tiexClient, _ := iex.NewClient(iexToken)\n\tstock := &Stock{\n\t\tiexToken: iexToken,\n\t\tiexClient: iexClient,\n\t\thttpClient: http.DefaultClient,\n\t\talpacaID: alpacaID,\n\t\talpacaKey: alpacaKey,\n\t}\n\n\t// apply options\n\tfor _, option := range options {\n\t\tif err := option(stock); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn stock, nil\n}", "title": "" }, { "docid": "0cd7de22ce2a8ba375fbcc04c8c46d7e", "score": "0.48839992", "text": "func BucketInventorySample() {\n\t// New client\n\tclient, err := oss.New(endpoint, accessID, accessKey)\n\tif err != nil {\n\t\tHandleError(err)\n\t}\n\n\t// Create the bucket with default parameters\n\terr = client.CreateBucket(bucketName)\n\tif err != nil {\n\t\tHandleError(err)\n\t}\n\n\t// the inventory configuration,not use any encryption\n\tbl := true\n\tinvConfig := oss.InventoryConfiguration{\n\t\tId: \"report1\",\n\t\tIsEnabled: &bl,\n\t\tPrefix: \"filterPrefix/\",\n\t\tOSSBucketDestination: oss.OSSBucketDestination{\n\t\t\tFormat: \"CSV\",\n\t\t\tAccountId: accountID,\n\t\t\tRoleArn: stsARN,\n\t\t\tBucket: \"acs:oss:::\" + bucketName,\n\t\t\tPrefix: \"prefix1\",\n\t\t},\n\t\tFrequency: \"Daily\",\n\t\tIncludedObjectVersions: \"All\",\n\t\tOptionalFields: oss.OptionalFields{\n\t\t\tField: []string{\n\t\t\t\t\"Size\", \"LastModifiedDate\", \"ETag\", \"StorageClass\", \"IsMultipartUploaded\", \"EncryptionStatus\",\n\t\t\t},\n\t\t},\n\t}\n\n\t// case 1: Set inventory\n\terr = client.SetBucketInventory(bucketName, invConfig)\n\tif err != nil {\n\t\tHandleError(err)\n\t}\n\n\t// case 2: Get Bucket inventory\n\tret, err := client.GetBucketInventory(bucketName, invConfig.Id)\n\tif err != nil {\n\t\tHandleError(err)\n\t}\n\tfmt.Println(\"Bucket inventory:\", ret)\n\n\t// case 3: List Bucket inventory\n\tinvConfig2 := oss.InventoryConfiguration{\n\t\tId: \"report2\",\n\t\tIsEnabled: &bl,\n\t\tPrefix: \"filterPrefix/\",\n\t\tOSSBucketDestination: oss.OSSBucketDestination{\n\t\t\tFormat: \"CSV\",\n\t\t\tAccountId: accountID,\n\t\t\tRoleArn: stsARN,\n\t\t\tBucket: \"acs:oss:::\" + bucketName,\n\t\t\tPrefix: \"prefix1\",\n\t\t},\n\t\tFrequency: \"Daily\",\n\t\tIncludedObjectVersions: \"All\",\n\t\tOptionalFields: oss.OptionalFields{\n\t\t\tField: []string{\n\t\t\t\t\"Size\", \"LastModifiedDate\", \"ETag\", \"StorageClass\", \"IsMultipartUploaded\", \"EncryptionStatus\",\n\t\t\t},\n\t\t},\n\t}\n\terr = client.SetBucketInventory(bucketName, invConfig2)\n\tif err != nil {\n\t\tHandleError(err)\n\t}\n\tNextContinuationToken := \"\"\n\tlistInvConf, err := client.ListBucketInventory(bucketName, NextContinuationToken)\n\tif err != nil {\n\t\tHandleError(err)\n\t}\n\tfmt.Println(\"Bucket inventory list:\", listInvConf)\n\n\t// case 4: Delete Bucket inventory\n\terr = client.DeleteBucketInventory(bucketName, invConfig.Id)\n\tif err != nil {\n\t\tHandleError(err)\n\t}\n\n\t// Delete bucket\n\terr = client.DeleteBucket(bucketName)\n\tif err != nil {\n\t\tHandleError(err)\n\t}\n\n\tfmt.Println(\"BucketInventorySample completed\")\n}", "title": "" }, { "docid": "efca43fa6fccbd628072bc05fa4d9d08", "score": "0.48277634", "text": "func NewPolicyinventoryJobInfoWithDefaults() *PolicyinventoryJobInfo {\n\tthis := PolicyinventoryJobInfo{}\n\tvar classId string = \"policyinventory.JobInfo\"\n\tthis.ClassId = classId\n\tvar objectType string = \"policyinventory.JobInfo\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "title": "" }, { "docid": "a5620cca649b6e0b307d1118ab998e88", "score": "0.48185673", "text": "func NewIosVppAppAssignedLicense()(*IosVppAppAssignedLicense) {\n m := &IosVppAppAssignedLicense{\n Entity: *NewEntity(),\n }\n return m\n}", "title": "" }, { "docid": "bb7d0bc5e935c9a5bf6b54fedb4f6e18", "score": "0.47862574", "text": "func New(client client.Client, namespace string, values Values) Interface {\n\treturn &hvpa{\n\t\tclient: client,\n\t\tnamespace: namespace,\n\t\tvalues: values,\n\t}\n}", "title": "" }, { "docid": "af05376c3ff895e3785c6cf465a04737", "score": "0.47797838", "text": "func (v *Vault) New(ns string, sl internalinformers.SecretLister, iss cmapi.GenericIssuer) (*Vault, error) {\n\t_, err := v.NewFn(ns, sl, iss)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn v, nil\n}", "title": "" }, { "docid": "9dc3be80c21a974d63a7427e7f37e2b4", "score": "0.47685602", "text": "func NewBlobInventoryPolicy(ctx *pulumi.Context,\n\tname string, args *BlobInventoryPolicyArgs, opts ...pulumi.ResourceOption) (*BlobInventoryPolicy, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.Rules == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'Rules'\")\n\t}\n\tif args.StorageAccountId == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'StorageAccountId'\")\n\t}\n\topts = internal.PkgResourceDefaultOpts(opts)\n\tvar resource BlobInventoryPolicy\n\terr := ctx.RegisterResource(\"azure:storage/blobInventoryPolicy:BlobInventoryPolicy\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "fbaf06e116516066634ecee95afac2cf", "score": "0.47351882", "text": "func newInvoice(defaultStyle, headingStyle TextStyle) *Invoice {\n\ti := &Invoice{\n\t\t// Title.\n\t\ttitle: \"INVOICE\",\n\n\t\t// Addresses.\n\t\tsellerAddress: &InvoiceAddress{},\n\t\tbuyerAddress: &InvoiceAddress{},\n\n\t\t// Styles.\n\t\tdefaultStyle: defaultStyle,\n\t\theadingStyle: headingStyle,\n\t}\n\n\t// Default colors.\n\tlightGrey := ColorRGBFrom8bit(245, 245, 245)\n\tmediumGrey := ColorRGBFrom8bit(155, 155, 155)\n\n\t// Default title style.\n\ti.titleStyle = headingStyle\n\ti.titleStyle.Color = mediumGrey\n\ti.titleStyle.FontSize = 20\n\n\t// Default address styles.\n\ti.addressStyle = defaultStyle\n\ti.addressHeadingStyle = headingStyle\n\n\t// Default note styles.\n\ti.noteStyle = defaultStyle\n\ti.noteHeadingStyle = headingStyle\n\n\t// Invoice information default properties.\n\ti.infoProps = i.NewCellProps()\n\ti.infoProps.BackgroundColor = lightGrey\n\ti.infoProps.TextStyle = headingStyle\n\n\t// Invoice line items default properties.\n\ti.colProps = i.NewCellProps()\n\ti.colProps.TextStyle = headingStyle\n\ti.colProps.BackgroundColor = lightGrey\n\ti.colProps.BorderColor = lightGrey\n\n\ti.itemProps = i.NewCellProps()\n\ti.itemProps.BorderColor = lightGrey\n\ti.itemProps.BorderSides = []CellBorderSide{CellBorderSideBottom}\n\ti.itemProps.Alignment = CellHorizontalAlignmentRight\n\n\t// Invoice totals default properties.\n\ti.totalProps = i.NewCellProps()\n\ti.totalProps.Alignment = CellHorizontalAlignmentRight\n\n\t// Invoice information fields.\n\ti.number = [2]*InvoiceCell{\n\t\ti.newCell(\"Invoice number\", i.infoProps),\n\t\ti.newCell(\"\", i.infoProps),\n\t}\n\n\ti.date = [2]*InvoiceCell{\n\t\ti.newCell(\"Date\", i.infoProps),\n\t\ti.newCell(\"\", i.infoProps),\n\t}\n\n\ti.dueDate = [2]*InvoiceCell{\n\t\ti.newCell(\"Date\", i.infoProps),\n\t\ti.newCell(\"\", i.infoProps),\n\t}\n\n\t// Invoice totals fields.\n\ti.subtotal = [2]*InvoiceCell{\n\t\ti.newCell(\"Subtotal\", i.totalProps),\n\t\ti.newCell(\"\", i.totalProps),\n\t}\n\n\ttotalProps := i.totalProps\n\ttotalProps.TextStyle = headingStyle\n\ttotalProps.BackgroundColor = lightGrey\n\ttotalProps.BorderColor = lightGrey\n\n\ti.total = [2]*InvoiceCell{\n\t\ti.newCell(\"Total\", totalProps),\n\t\ti.newCell(\"\", totalProps),\n\t}\n\n\t// Invoice notes fields.\n\ti.notes = [2]string{\"Notes\", \"\"}\n\ti.terms = [2]string{\"Terms and conditions\", \"\"}\n\n\t// Default item columns.\n\ti.columns = []*InvoiceCell{\n\t\ti.newColumn(\"Description\", CellHorizontalAlignmentLeft),\n\t\ti.newColumn(\"Quantity\", CellHorizontalAlignmentRight),\n\t\ti.newColumn(\"Unit price\", CellHorizontalAlignmentRight),\n\t\ti.newColumn(\"Amount\", CellHorizontalAlignmentRight),\n\t}\n\n\treturn i\n}", "title": "" }, { "docid": "1766ec61102201bce72d757428a97376", "score": "0.47224113", "text": "func NewGetLolInventoryV1SignedInventorySimpleParamsWithHTTPClient(client *http.Client) *GetLolInventoryV1SignedInventorySimpleParams {\n\tvar ()\n\treturn &GetLolInventoryV1SignedInventorySimpleParams{\n\t\tHTTPClient: client,\n\t}\n}", "title": "" }, { "docid": "d8aeeb958bb2a5e85a42cca61a81a256", "score": "0.47214198", "text": "func setupInventoryRow(repo IInventoryRepo) int64 {\n\trand.Seed(time.Now().UnixNano())\n\tmin := 10\n\tmax := 500\n\tid := int64(rand.Intn(max-min+1) + min)\n\tqty := int64(5)\n\n\tinv := entity.Inventory{\n\t\tProductID: id,\n\t\tQuantity: qty,\n\t}\n\n\tcInv, err := repo.FindProductInventory(id)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tif cInv.ID == 0 {\n\t\terrCreate := repo.CreateProductInventory(inv)\n\t\tif errCreate != nil {\n\t\t\tpanic(errCreate)\n\t\t}\n\t} else {\n\t\terrUpdate := repo.UpdateProductQty(id, qty)\n\t\tif errUpdate != nil {\n\t\t\tpanic(errUpdate)\n\t\t}\n\t}\n\n\treturn id\n}", "title": "" }, { "docid": "c26771623a5f4232f4ef45f05f18cd2a", "score": "0.47117868", "text": "func (m *InventoryAdjustment) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateCatalogObjectID(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateCatalogObjectType(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateCreatedAt(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateEmployeeID(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateGoodsReceiptID(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateID(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateLocationID(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateOccurredAt(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validatePurchaseOrderID(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateQuantity(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateReferenceID(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateRefundID(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateSource(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateTotalPriceMoney(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateTransactionID(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "64a92d3c56b5673c12b33e6e9649bcc2", "score": "0.46975437", "text": "func uiInventory(w http.ResponseWriter, r *http.Request) {\n\tvar (\n\t\trowArr []interface{}\n\t\tInventory inventoryType\n\t)\n\n\tdb, err := sql.Open(PDO_Prefix, GoBotDSN)\n\tcheckErrPanic(err)\n\n\tdefer db.Close()\n\n\t// query\n\trows, err := db.Query(\"SELECT * FROM Inventory\")\n\tcheckErr(err)\n\n\tfor rows.Next() {\n\t\terr = rows.Scan(\n\t\t\t&Inventory.UUID,\n\t\t\t&Inventory.Name,\n\t\t\t&Inventory.Type,\n\t\t\t&Inventory.LastUpdate,\n\t\t\t&Inventory.Permissions,\n\t\t)\n\t\trowArr = append(rowArr, Inventory)\n\t}\n\tcheckErr(err)\n\tdefer rows.Close()\n\n\tif data, err := json.MarshalIndent(rowArr, \"\", \" \"); err != nil {\n\t\tcheckErr(err)\n\t} else {\n\t\t_, err := fmt.Fprintf(w, \"%s\", data)\n\t\tcheckErr(err)\n\t}\n\t// return\n}", "title": "" }, { "docid": "d5c22f0981f3fe87f3ab8495f7d67954", "score": "0.46913964", "text": "func NewHyperflexClusterBackupPolicyInventoryWithDefaults() *HyperflexClusterBackupPolicyInventory {\n\tthis := HyperflexClusterBackupPolicyInventory{}\n\tvar classId string = \"hyperflex.ClusterBackupPolicyInventory\"\n\tthis.ClassId = classId\n\tvar objectType string = \"hyperflex.ClusterBackupPolicyInventory\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "title": "" }, { "docid": "6aa274e3e8c29676d5e44a442a9d63f2", "score": "0.46598476", "text": "func NewGetLolInventoryV1SignedInventorySimpleParamsWithTimeout(timeout time.Duration) *GetLolInventoryV1SignedInventorySimpleParams {\n\tvar ()\n\treturn &GetLolInventoryV1SignedInventorySimpleParams{\n\n\t\ttimeout: timeout,\n\t}\n}", "title": "" }, { "docid": "4ee62d6e4ec3848980895ed5ac7ff24c", "score": "0.4624754", "text": "func New(fields []*types.FieldType, cap, maxSolitonsize int) *Soliton {\n\tchk := &Soliton{\n\t\tcolumns: make([]*Column, 0, len(fields)),\n\t\tcapacity: mathutil.Min(cap, maxSolitonsize),\n\t\t// set the default value of requiredRows to maxSolitonsize to let chk.IsFull() behave\n\t\t// like how we judge whether a soliton is full now, then the statement\n\t\t// \"chk.NumRows() < maxSolitonsize\"\n\t\t// equals to \"!chk.IsFull()\".\n\t\trequiredRows: maxSolitonsize,\n\t}\n\n\tfor _, f := range fields {\n\t\tchk.columns = append(chk.columns, NewColumn(f, chk.capacity))\n\t}\n\n\treturn chk\n}", "title": "" }, { "docid": "d759f0e2a9a18ea75ab86f7046dc3385", "score": "0.46131957", "text": "func (c *InventoryClient) NewInventoryItem(typeID, locationID int) (*model.InventoryItem, error) {\n\tif c.token == \"\" {\n\t\treturn nil, ErrNotAuthenticated\n\t}\n\tconn, err := grpc.Dial(c.serverAddr, c.dialOpts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer conn.Close()\n\tservice := proto.NewInventoryServiceClient(conn)\n\tres, err := service.NewInventoryItem(\n\t\tcontext.Background(),\n\t\t&proto.NewInventoryItemRequest{\n\t\t\tToken: &proto.Token{Identifier: c.token},\n\t\t\tTypeId: int64(typeID),\n\t\t\tLocationId: int64(locationID)})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif res.Result.Status == proto.Status_FAILURE {\n\t\treturn nil, errors.New(res.Result.Description)\n\t}\n\tif res.Item == nil {\n\t\treturn nil, errors.New(\"expected grpc response to contain product, got nil\")\n\t}\n\treturn proto.ProtoToInventoryItem(res.Item), nil\n}", "title": "" }, { "docid": "2d24c1e1ba1c4aba6f9454ffe14ddb7f", "score": "0.45869225", "text": "func uiInventoryUpdate(w http.ResponseWriter, r *http.Request) {\n\tbody, err := ioutil.ReadAll(r.Body)\n checkErrPanic(err)\n\tvar inv inventoryType\n err = json.Unmarshal(body, &inv)\n checkErrPanic(err)\n\n db, err := sql.Open(PDO_Prefix, GoBotDSN)\n\tcheckErrPanicHTTP(w, http.StatusServiceUnavailable, funcName() + \": Connect failed:\", err)\n\n\tdefer db.Close()\n\n\tstmt, err := db.Prepare(\"REPLACE INTO Inventory (`UUID`, `Name`, `Type`, `LastUpdate`, `Permissions`) VALUES (?,?,?,?,?)\")\n\tcheckErrPanicHTTP(w, http.StatusServiceUnavailable, funcName() + \": Replace prepare failed:\", err)\n\n\tdefer stmt.Close()\n\n\t_, err = stmt.Exec(inv.UUID, inv.Name, inv.Type, inv.LastUpdate, inv.Permissions)\n\tcheckErrPanicHTTP(w, http.StatusServiceUnavailable, funcName() + \": Replace exec failed:\", err)\n\n\t// return\n}", "title": "" }, { "docid": "03cea9bc1eae88c7988642f79cbcd202", "score": "0.45859018", "text": "func (p *ProductController) UpdateInventory(c *gin.Context) {\n\tvar requestPayload models.ReserveProducts\n\n\tif err := c.ShouldBindJSON(&requestPayload); err != nil {\n\t\tc.JSON(http.StatusBadRequest, \"bad request\")\n\n\t\treturn\n\t}\n\n\ttx, _ := p.DB.Beginx()\n\n\tfor _, item := range requestPayload.Products {\n\t\tvar qty int\n\t\titemDto := models.ReserveDto{\n\t\t\tCheckoutID: requestPayload.CheckoutID,\n\t\t\tProductID: item.ProductID,\n\t\t\tQty: item.Qty,\n\t\t}\n\n\t\tp.DB.Get(&qty, \"SELECT SUM(quantity) FROM reserved_products WHERE productid = ? AND checkoutid = ?\", itemDto.ProductID, itemDto.CheckoutID)\n\n\t\t_, err := tx.NamedExec(\"UPDATE products SET quantity = quantity - :quantity\", &itemDto)\n\t\tif err != nil {\n\t\t\ttx.Rollback()\n\t\t\tc.JSON(500, err)\n\n\t\t\treturn\n\t\t}\n\n\t}\n\n\t_, err := tx.Exec(\"DELETE FROM reserved_products WHERE checkoutid = ?\", requestPayload.CheckoutID)\n\tif err != nil {\n\t\ttx.Rollback()\n\t\tc.JSON(500, err)\n\n\t\treturn\n\t}\n\n\ttx.Commit()\n\tc.JSON(204, nil)\n}", "title": "" }, { "docid": "318e8deb27dd0a2576aab0b61fb1c46c", "score": "0.4561245", "text": "func newLic(Season *model.TVEpSeason, conf *conf.Sync) *model.License {\n\t// one license stryct oer season\n\tvar (\n\t\tps []*model.PS\n\t\tsign = conf.Sign\n\t\tarea string\n\t\tok bool\n\t)\n\tif areaInt, _ := strconv.ParseInt(Season.Area, 10, 64); areaInt != 0 { //compatible with old version ( area was int )\n\t\tif area, ok = zones[areaInt]; !ok {\n\t\t\tarea = _zoneNotFound\n\t\t}\n\t} else { // new logic, directly transform\n\t\tarea = Season.Area\n\t}\n\tvar programS = &model.PS{\n\t\tProgramSetID: conf.AuditPrefix + fmt.Sprintf(\"%d\", Season.ID),\n\t\tProgramSetName: Season.Title,\n\t\tProgramSetClass: Season.Style,\n\t\tProgramSetType: categories[Season.Category],\n\t\tPublishDate: Season.PlayTime.Time().Format(\"2006-01-02\"),\n\t\tCopyright: Season.Copyright,\n\t\tProgramCount: int(Season.TotalNum),\n\t\tCREndData: \"1970-01-01\",\n\t\tDefinitionType: \"SD\",\n\t\tCpCode: conf.LConf.CPCode,\n\t\tPayStatus: Season.Status,\n\t\tPrimitiveName: Season.OriginName,\n\t\tAlias: Season.Alias,\n\t\tZone: area,\n\t\tLeadingRole: Season.Role,\n\t\tProgramSetDesc: Season.Desc,\n\t\tStaff: Season.Staff,\n\t\tProgramSetPoster: Season.Cover,\n\t\tProgramList: &model.ProgramList{},\n\t\tProducer: Season.Producer,\n\t\tSubGenre: Season.Version,\n\t}\n\tps = append(ps, programS)\n\treturn lic.BuildLic(sign, ps, 0)\n}", "title": "" }, { "docid": "60ddc7d2f20e30de803de145979d2102", "score": "0.45592856", "text": "func GenInventory(c *gin.Context) {\n\tconsulServer := c.Param(\"server\")\n\tinventoryName := c.Param(\"inventoryname\")\n\tif checkServers(consulServer) {\n\t\tmyconf := api.DefaultNonPooledConfig()\n\t\tmyconf.Address = fmt.Sprintf(\"%s:8500\", consulServer)\n\t\tfmt.Println(myconf)\n\t\tclient, err := api.NewClient(myconf)\n\t\tif err != nil {\n\t\t\tpanic(err)\n\t\t}\n\n\t\tcg := client.Health()\n\t\tservice, _, err := cg.Service(\"consul\", \"\", true, &api.QueryOptions{AllowStale: false})\n\t\tif err != nil {\n\t\t\tpanic(err)\n\t\t}\n\n\t\tb := Inventory{}\n\n\t\tfor _, n := range service {\n\t\t\tb.Nodes.Hosts = append(b.Nodes.Hosts, n.Node.Address)\n\t\t}\n\n\t\tm, _ := json.Marshal(b)\n\t\tvar a interface{}\n\t\tjson.Unmarshal(m, &a)\n\t\tz := a.(map[string]interface{})\n\t\tz[inventoryName] = z[\"replaceme\"]\n\t\tdelete(z, \"replaceme\")\n\t\tc.JSON(200, z)\n\t} else {\n\t\tc.JSON(403, gin.H{\n\t\t\t\"message\": \"Not allowed access\",\n\t\t})\n\t}\n}", "title": "" }, { "docid": "0c9bc0e4f016c4ca3a5f6062e65cfeed", "score": "0.45514414", "text": "func NewHyperflexClusterBackupPolicyInventory(classId string, objectType string) *HyperflexClusterBackupPolicyInventory {\n\tthis := HyperflexClusterBackupPolicyInventory{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\treturn &this\n}", "title": "" }, { "docid": "9448d44201483ab0355dcab4590ab87d", "score": "0.45462236", "text": "func (ppuo *PermissionsPolicyUpdateOne) SetInventoryPolicy(mpi *models.InventoryPolicyInput) *PermissionsPolicyUpdateOne {\n\tppuo.mutation.SetInventoryPolicy(mpi)\n\treturn ppuo\n}", "title": "" }, { "docid": "9448d44201483ab0355dcab4590ab87d", "score": "0.45462236", "text": "func (ppuo *PermissionsPolicyUpdateOne) SetInventoryPolicy(mpi *models.InventoryPolicyInput) *PermissionsPolicyUpdateOne {\n\tppuo.mutation.SetInventoryPolicy(mpi)\n\treturn ppuo\n}", "title": "" }, { "docid": "2f17cf630e765b06989e83de01a33062", "score": "0.4545881", "text": "func New(cfg ...*Configuration) Interface {\n\tvar wsm = new(impl)\n\n\twsm.from = defaultConfiguration.From\n\tif len(cfg) > 0 {\n\t\twsm.cfg = cfg[0]\n\t}\n\tif wsm.cfg == nil {\n\t\twsm.cfg = &Configuration{\n\t\t\tUsername: defaultConfiguration.Username,\n\t\t\tPassword: defaultConfiguration.Password,\n\t\t}\n\t}\n\n\treturn wsm\n}", "title": "" }, { "docid": "ce5cb7e1a94628ce70c77f561fc56d96", "score": "0.45457193", "text": "func (ppu *PermissionsPolicyUpdate) ClearInventoryPolicy() *PermissionsPolicyUpdate {\n\tppu.mutation.ClearInventoryPolicy()\n\treturn ppu\n}", "title": "" }, { "docid": "ce5cb7e1a94628ce70c77f561fc56d96", "score": "0.45457193", "text": "func (ppu *PermissionsPolicyUpdate) ClearInventoryPolicy() *PermissionsPolicyUpdate {\n\tppu.mutation.ClearInventoryPolicy()\n\treturn ppu\n}", "title": "" }, { "docid": "325b51d8cd2c0a6e10c06c58489feb26", "score": "0.45383257", "text": "func (o *GetLolInventoryV1SignedInventorySimpleParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tvaluesInventoryTypes := o.InventoryTypes\n\n\tjoinedInventoryTypes := swag.JoinByFormat(valuesInventoryTypes, \"\")\n\t// query array param inventoryTypes\n\tif err := r.SetQueryParam(\"inventoryTypes\", joinedInventoryTypes...); err != nil {\n\t\treturn err\n\t}\n\n\tif o.TimeoutInSeconds != nil {\n\n\t\t// query param timeoutInSeconds\n\t\tvar qrTimeoutInSeconds int32\n\t\tif o.TimeoutInSeconds != nil {\n\t\t\tqrTimeoutInSeconds = *o.TimeoutInSeconds\n\t\t}\n\t\tqTimeoutInSeconds := swag.FormatInt32(qrTimeoutInSeconds)\n\t\tif qTimeoutInSeconds != \"\" {\n\t\t\tif err := r.SetQueryParam(\"timeoutInSeconds\", qTimeoutInSeconds); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "65d9f1bb3fe018e61a384816b617d4db", "score": "0.45350778", "text": "func UpdateInventory(w http.ResponseWriter, param string, isBlack bool) (err error) {\n\tvar msgTemp string\n\tvar pubKey string\n\n\t// check\n\tif isBlack == true {\n\t\tmsgTemp = UpdateBlackListTemp\n\t\tpubKey = consts.API_KEY_UPDATE_BLACKLIST\n\t} else {\n\t\tmsgTemp = UpdateWhiteListTemp\n\t\tpubKey = consts.API_KEY_UPDATE_WHITELIST\n\t}\n\n\tvar imsg typedef.InvenMsg\n\terr = json.Unmarshal([]byte(param), &imsg)\n\tif err != nil {\n\t\terr = fmt.Errorf(msgTemp, err)\n\t\tlogBadRequest(w, err.Error())\n\t\treturn\n\t}\n\n\tif imsg.CampId == 0 {\n\t\terr = fmt.Errorf(msgTemp, \"campId is missing\")\n\t\tlogBadRequest(w, err.Error())\n\t\treturn\n\t}\n\n\t// can't be nil, can be empty slice\n\tif imsg.InvenNames == nil {\n\t\terr = fmt.Errorf(msgTemp, \"invenNames is missing\")\n\t\tlogBadRequest(w, err.Error())\n\t\treturn\n\t}\n\n\t// publish msg\n\terr = publishMsg(w, pubKey, param)\n\tif err != nil {\n\t\terr = fmt.Errorf(msgTemp, err)\n\t\tlogBadRequest(w, err.Error())\n\t\treturn\n\t}\n\treturn\n}", "title": "" }, { "docid": "8b320415c8c645f61c9aeea2b12b7f5e", "score": "0.45232815", "text": "func New(getter models.Getter, apiKey string) *Valve {\n\tv := &Valve{apiKey: apiKey}\n\tv.Getter = getter\n\n\treturn v\n}", "title": "" }, { "docid": "98d1637063500237cb3d28d0cbafe643", "score": "0.45156682", "text": "func (order *Order) New(priority int, quantity int, product string, customerName string) {\r\n\torder.priority = priority\r\n\torder.quantity = quantity\r\n\torder.product = product\r\n\torder.customerName = customerName\r\n}", "title": "" }, { "docid": "c1f979ac64a131e6a38145463daf86e9", "score": "0.4514554", "text": "func (ppuo *PermissionsPolicyUpdateOne) ClearInventoryPolicy() *PermissionsPolicyUpdateOne {\n\tppuo.mutation.ClearInventoryPolicy()\n\treturn ppuo\n}", "title": "" }, { "docid": "c1f979ac64a131e6a38145463daf86e9", "score": "0.4514554", "text": "func (ppuo *PermissionsPolicyUpdateOne) ClearInventoryPolicy() *PermissionsPolicyUpdateOne {\n\tppuo.mutation.ClearInventoryPolicy()\n\treturn ppuo\n}", "title": "" }, { "docid": "11ee0ca8522b93ebdf2d4e9207a6be3c", "score": "0.45089743", "text": "func newWarehouse(vres *warehouseviews.WarehouseView) *Warehouse {\n\tres := &Warehouse{}\n\tif vres.ID != nil {\n\t\tres.ID = *vres.ID\n\t}\n\tif vres.Name != nil {\n\t\tres.Name = *vres.Name\n\t}\n\tif vres.Code != nil {\n\t\tres.Code = *vres.Code\n\t}\n\tif vres.Address != nil {\n\t\tres.Address = *vres.Address\n\t}\n\tif vres.Type != nil {\n\t\tres.Type = *vres.Type\n\t}\n\tif vres.Founder != nil {\n\t\tres.Founder = newFounder(vres.Founder)\n\t}\n\treturn res\n}", "title": "" }, { "docid": "b2b3b0bbd7422bedbbd351fd28f6e040", "score": "0.45082256", "text": "func (self Sol)DeepCopy()Sol {\n sol := new(Sol)\n sol.Individual = self.Individual.DeepCopy()\n sol.Fitness = self.Fitness\n sol.Complex = self.Complex\n sol.IsEval = self.IsEval\n sol.Conf = self.Conf\n sol.Gen = self.Gen\n sol.HashUsed = self.HashUsed\n sol.JobHash = self.JobHash\n return *sol\n}", "title": "" }, { "docid": "33c353db944a3116130801a4a59ec86b", "score": "0.45051438", "text": "func newPolicy(namespace, policyName, apiVersion, kind, resourceName string, clusters []string) *policyv1alpha1.PropagationPolicy {\n\treturn &policyv1alpha1.PropagationPolicy{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tNamespace: namespace,\n\t\t\tName: policyName,\n\t\t},\n\t\tSpec: policyv1alpha1.PropagationSpec{\n\t\t\tResourceSelectors: []policyv1alpha1.ResourceSelector{\n\t\t\t\t{\n\t\t\t\t\tAPIVersion: apiVersion,\n\t\t\t\t\tKind: kind,\n\t\t\t\t\tName: resourceName,\n\t\t\t\t},\n\t\t\t},\n\t\t\tPlacement: policyv1alpha1.Placement{\n\t\t\t\tClusterAffinity: &policyv1alpha1.ClusterAffinity{\n\t\t\t\t\tClusterNames: clusters,\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "6f86ff9e25d167a1567a3452f5fbafa4", "score": "0.449055", "text": "func New(policy string) *Policy {\n\treturn &Policy{policy: policy}\n}", "title": "" }, { "docid": "48e19ae8708de073c4bbc7e5c8719b8a", "score": "0.44792598", "text": "func New(env Environment) *Client {\n\tapi := sling.New().Client(nil)\n\tapi.Add(\"User-Agent\", \"Payment/1.0\")\n\n\tclient := Client{\n\t\tApi: api.New().Base(env.Url),\n\t\tEnv: env,\n\t}\n\n\treturn &client\n}", "title": "" }, { "docid": "ed5ae5408026868a269c5381bfd3bc05", "score": "0.44756952", "text": "func (o *GetLolInventoryV1SignedInventorySimpleParams) WithHTTPClient(client *http.Client) *GetLolInventoryV1SignedInventorySimpleParams {\n\to.SetHTTPClient(client)\n\treturn o\n}", "title": "" }, { "docid": "16bbcfd1c79edf0dc2aa34cd8a30f791", "score": "0.44667068", "text": "func NewPROTECTIONSOURCES(config configuration.CONFIGURATION) *PROTECTIONSOURCES_IMPL {\r\n client := new(PROTECTIONSOURCES_IMPL)\r\n client.config = config\r\n return client\r\n}", "title": "" }, { "docid": "3ea4cb1de8a74b368cbefa3b027ddcbe", "score": "0.44640508", "text": "func New() VolAPIImplementor {\n\treturn VolAPIImplementor{}\n}", "title": "" }, { "docid": "e4bea8158648f22e7dc2e9bba74c0f2a", "score": "0.44592345", "text": "func (a *PowerApiService) GetPowerPolicyInventoryList(ctx context.Context) ApiGetPowerPolicyInventoryListRequest {\n\treturn ApiGetPowerPolicyInventoryListRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t}\n}", "title": "" }, { "docid": "97bfc1a5aea5d9bf16036f2af33c4bf2", "score": "0.44516423", "text": "func NewSolution(items []Item, value int) *Solution {\n\treturn &Solution{\n\t\titems: items,\n\t\tvalue: value,\n\t}\n}", "title": "" }, { "docid": "cdf531d2fd8d9047cabaa9360b7235c9", "score": "0.44458285", "text": "func (cs *ControllerServer) newPOSVolume(name string, size int64, params map[string]string) (*posVolume, error) {\n\tvar (\n\t\tserver string\n\t\tbaseDir string\n\t)\n\n\t// Validate parameters (case-insensitive).\n\t// TODO do more strict validation.\n\tfor k, v := range params {\n\t\tswitch strings.ToLower(k) {\n\t\tcase paramServer:\n\t\t\tserver = v\n\t\tcase paramShare:\n\t\t\tbaseDir = v\n\t\tdefault:\n\t\t\treturn nil, fmt.Errorf(\"invalid parameter %q\", k)\n\t\t}\n\t}\n\n\t// Validate required parameters\n\tif server == \"\" {\n\t\treturn nil, fmt.Errorf(\"%v is a required parameter\", paramServer)\n\t}\n\tif baseDir == \"\" {\n\t\treturn nil, fmt.Errorf(\"%v is a required parameter\", paramShare)\n\t}\n\n\tvol := &posVolume{\n\t\tserver: server,\n\t\tbaseDir: baseDir,\n\t\tsubDir: name,\n\t\tsize: size,\n\t}\n\n\tvol.id = cs.getVolumeIDFromCSIVol(vol)\n\n\tnewUUID, _ := uuid.NewUUID()\n\txrId := newUUID.String()\n\n\tfmt.Println(\" iBoFOS.IBoFOSInfo(xrId, nil)\")\n\tiBoFOS.IBoFOSInfo(xrId, nil)\n\n\treturn vol, nil\n}", "title": "" }, { "docid": "f3777291ab1bdf11b4f5c9880a31d518", "score": "0.44327888", "text": "func (m *ProdInventoryMeta) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "title": "" }, { "docid": "c9956f6e8787cec736cbbb60651ee6c7", "score": "0.44217375", "text": "func NewErrOutOfInventory(inventoryRemaining int64) ErrOutOfInventory {\n\treturn ErrOutOfInventory{\n\t\tCodedError: CodedError{\n\t\t\tReason: \"not enough inventory\",\n\t\t\tCode: \"ERR_INSUFFICIENT_INVENTORY\",\n\t\t},\n\t\tRemainingInventory: inventoryRemaining,\n\t}\n}", "title": "" }, { "docid": "cba5d23a7c30233033100d3f10fb22a9", "score": "0.44071057", "text": "func NewResourceVisualization()(*ResourceVisualization) {\n m := &ResourceVisualization{\n }\n m.backingStore = ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStoreFactoryInstance();\n m.SetAdditionalData(make(map[string]any))\n return m\n}", "title": "" }, { "docid": "da2762bb9b1aeb3188e5fa9ce80aed46", "score": "0.44055912", "text": "func updateInventory(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\tparams := mux.Vars(r)\n\tid := params[\"id\"]\n\tfound := -1\n\n\t//new stuff can easily change to work off of SKU\n\tinventoryID, err := strconv.Atoi(id)\n\tif inventoryID < 1 {\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tw.Write([]byte(\"400 - Invalid inventory ID.\"))\n\t\treturn\n\t}\n\n\tvar inventory models.Inventory\n\terr = json.NewDecoder(r.Body).Decode(&inventory)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\n\ttx, err := db.Begin()\n\tif err != nil {\n\t\treturn\n\t}\n\n\tdefer func() {\n\t\tswitch err {\n\t\tcase nil:\n\t\t\terr = tx.Commit()\n\t\tdefault:\n\t\t\ttx.Rollback()\n\t\t}\n\t}()\n\n\tvar rows *sql.Rows\n\tif rows, err = tx.Query(\"SELECT I.*, P.SKU FROM Inventory I INNER JOIN Product P ON I.ProductID = P.ProductID WHERE I.InventoryID = ?\", id); err != nil {\n\t\tw.WriteHeader(http.StatusNotFound)\n\t\tfmt.Println(\"inventory.go - getInventory - tx.Query error selecting inventory id: \" + id)\n\t\tfmt.Println(err)\n\t\tjson.NewEncoder(w).Encode(err)\n\t\treturn\n\t}\n\tdefer rows.Close()\n\n\tinv := make([]*models.Inventory, 0)\n\tfor rows.Next() {\n\t\ti := new(models.Inventory)\n\t\terr := rows.Scan(&i.InventoryID, &i.Quantity, &i.DateLastUpdated, &i.Deleted, &i.ProductID, &i.SKU)\n\t\tif err != nil {\n\t\t\t//More error handling\n\t\t\tfmt.Println(\"2\")\n\t\t\tfmt.Println(err)\n\t\t}\n\t\tif i.Deleted == 1 {\n\t\t\tinv = append(inv, i)\n\t\t\tw.WriteHeader(http.StatusNotFound)\n\t\t\tw.Write([]byte(\"404 - Product not found\"))\n\t\t\treturn\n\t\t}\n\t\tfound = inventoryID\n\t\tinv = append(inv, i)\n\t}\n\tif err = rows.Err(); err != nil {\n\t\t//Error handling\n\t\tfmt.Println(\"inventory.go - getInventory - rows.Err()\")\n\t\tfmt.Println(err)\n\t}\n\n\t//STILL NEED THIS FOR IF ITS NOT FOUND\n\tif found == -1 {\n\t\tw.WriteHeader(http.StatusNotFound)\n\t\tw.Write([]byte(\"404 - Product not found\"))\n\t\treturn\n\t}\n\n\tres, err := tx.Exec(\"UPDATE Inventory SET InventoryID = ?, Quantity = ?, DateLastUpdated = ?, Deleted = ?, ProductID = ? WHERE InventoryID = ?\", inv[0].InventoryID, params[\"quantity\"], time.Now(), inv[0].Deleted, inv[0].ProductID, id)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\tfmt.Println(\"1\")\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tw.Write([]byte(\"400\"))\n\t\treturn\n\t}\n\trowCnt, err := res.RowsAffected()\n\tif err != nil {\n\t\tfmt.Println(\"4\")\n\t\tfmt.Println(err)\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tw.Write([]byte(\"400 - Insert failed\"))\n\t\treturn\n\t}\n\tdefer rows.Close()\n\n\tfmt.Printf(\"update affected = %d\\n\", rowCnt)\n\n\tw.WriteHeader(http.StatusOK)\n}", "title": "" }, { "docid": "0bb3c42a5c9ec76e60a2698d51947149", "score": "0.44026032", "text": "func (ppu *PermissionsPolicyUpdate) SetInventoryPolicy(mpi *models.InventoryPolicyInput) *PermissionsPolicyUpdate {\n\tppu.mutation.SetInventoryPolicy(mpi)\n\treturn ppu\n}", "title": "" }, { "docid": "0bb3c42a5c9ec76e60a2698d51947149", "score": "0.44026032", "text": "func (ppu *PermissionsPolicyUpdate) SetInventoryPolicy(mpi *models.InventoryPolicyInput) *PermissionsPolicyUpdate {\n\tppu.mutation.SetInventoryPolicy(mpi)\n\treturn ppu\n}", "title": "" }, { "docid": "686fcca142657915ae78e0479c2b81d7", "score": "0.43910295", "text": "func (f *FakeProxy) WithProviderInventory(name string, providerType clusterctlv1.ProviderType, version, targetNamespace string) *FakeProxy {\n\tf.objs = append(f.objs, &clusterctlv1.Provider{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tAPIVersion: clusterctlv1.GroupVersion.String(),\n\t\t\tKind: \"Provider\",\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tResourceVersion: \"999\",\n\t\t\tNamespace: targetNamespace,\n\t\t\tName: clusterctlv1.ManifestLabel(name, providerType),\n\t\t\tLabels: map[string]string{\n\t\t\t\tclusterctlv1.ClusterctlLabel: \"\",\n\t\t\t\tclusterv1.ProviderNameLabel: clusterctlv1.ManifestLabel(name, providerType),\n\t\t\t\tclusterctlv1.ClusterctlCoreLabel: clusterctlv1.ClusterctlCoreLabelInventoryValue,\n\t\t\t},\n\t\t},\n\t\tProviderName: name,\n\t\tType: string(providerType),\n\t\tVersion: version,\n\t})\n\n\treturn f\n}", "title": "" }, { "docid": "ff1fd0aa99dc3b10356f461612bbe401", "score": "0.4388567", "text": "func init() {\n\titemFields := schema.Item{}.Fields()\n\t_ = itemFields\n\t// itemDescProductName is the schema descriptor for product_name field.\n\titemDescProductName := itemFields[0].Descriptor()\n\t// item.ProductNameValidator is a validator for the \"product_name\" field. It is called by the builders before save.\n\titem.ProductNameValidator = itemDescProductName.Validators[0].(func(string) error)\n\t// itemDescQuantity is the schema descriptor for quantity field.\n\titemDescQuantity := itemFields[1].Descriptor()\n\t// item.DefaultQuantity holds the default value on creation for the quantity field.\n\titem.DefaultQuantity = itemDescQuantity.Default.(int)\n\t// itemDescCategoryID is the schema descriptor for category_id field.\n\titemDescCategoryID := itemFields[2].Descriptor()\n\t// item.DefaultCategoryID holds the default value on creation for the category_id field.\n\titem.DefaultCategoryID = itemDescCategoryID.Default.(int)\n\t// itemDescComplete is the schema descriptor for complete field.\n\titemDescComplete := itemFields[3].Descriptor()\n\t// item.DefaultComplete holds the default value on creation for the complete field.\n\titem.DefaultComplete = itemDescComplete.Default.(bool)\n\tshopFields := schema.Shop{}.Fields()\n\t_ = shopFields\n\t// shopDescName is the schema descriptor for name field.\n\tshopDescName := shopFields[0].Descriptor()\n\t// shop.NameValidator is a validator for the \"name\" field. It is called by the builders before save.\n\tshop.NameValidator = shopDescName.Validators[0].(func(string) error)\n\tshoppingFields := schema.Shopping{}.Fields()\n\t_ = shoppingFields\n\t// shoppingDescDate is the schema descriptor for date field.\n\tshoppingDescDate := shoppingFields[0].Descriptor()\n\t// shopping.DefaultDate holds the default value on creation for the date field.\n\tshopping.DefaultDate = shoppingDescDate.Default.(func() time.Time)\n\t// shoppingDescSum is the schema descriptor for sum field.\n\tshoppingDescSum := shoppingFields[1].Descriptor()\n\t// shopping.DefaultSum holds the default value on creation for the sum field.\n\tshopping.DefaultSum = shoppingDescSum.Default.(int)\n\t// shoppingDescComplete is the schema descriptor for complete field.\n\tshoppingDescComplete := shoppingFields[2].Descriptor()\n\t// shopping.DefaultComplete holds the default value on creation for the complete field.\n\tshopping.DefaultComplete = shoppingDescComplete.Default.(bool)\n\t// shoppingDescType is the schema descriptor for type field.\n\tshoppingDescType := shoppingFields[3].Descriptor()\n\t// shopping.DefaultType holds the default value on creation for the type field.\n\tshopping.DefaultType = shoppingDescType.Default.(int)\n\tuserFields := schema.User{}.Fields()\n\t_ = userFields\n\t// userDescComunityID is the schema descriptor for comunity_id field.\n\tuserDescComunityID := userFields[2].Descriptor()\n\t// user.ComunityIDValidator is a validator for the \"comunity_id\" field. It is called by the builders before save.\n\tuser.ComunityIDValidator = userDescComunityID.Validators[0].(func(string) error)\n\t// userDescToken is the schema descriptor for token field.\n\tuserDescToken := userFields[3].Descriptor()\n\t// user.TokenValidator is a validator for the \"token\" field. It is called by the builders before save.\n\tuser.TokenValidator = userDescToken.Validators[0].(func(string) error)\n}", "title": "" }, { "docid": "7ae3c48ab1f31443694e1c60717cb208", "score": "0.43781617", "text": "func NewSKU(config configuration_pkg.CONFIGURATION) *SKU_IMPL {\n client := new(SKU_IMPL)\n client.config = config\n return client\n}", "title": "" }, { "docid": "bcdcc78fb1afd7a49bfdfb54b6106413", "score": "0.43731615", "text": "func NewInvQueue() *InvQueue {\n\treturn &InvQueue{\n\t\tobjList: list.New(),\n\t\tobjMap: make(map[wire.InvVect]struct{}),\n\t}\n}", "title": "" }, { "docid": "e81e6a45ae06d26fb95fa632b826a35f", "score": "0.4369326", "text": "func NewGetAPIInventoryOK() *GetAPIInventoryOK {\n\n\treturn &GetAPIInventoryOK{}\n}", "title": "" }, { "docid": "7d5b89fc450c5f226518013016980c78", "score": "0.4366649", "text": "func (a *ASRockRack) Inventory(ctx context.Context) (device *common.Device, err error) {\n\t// initialize device to be populated with inventory\n\tnewDevice := common.NewDevice()\n\tdevice = &newDevice\n\tdevice.Status = &common.Status{}\n\n\tdevice.Metadata = map[string]string{}\n\n\t// populate device BMC, BIOS component attributes\n\terr = a.fruAttributes(ctx, device)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// populate device System components attributes\n\terr = a.systemAttributes(ctx, device)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// populate device health based on sensor readings\n\terr = a.systemHealth(ctx, device)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn device, nil\n}", "title": "" }, { "docid": "3cfd3f14874e69203a1afe6b95ad85c4", "score": "0.43350026", "text": "func (s *Server) AddInventory(ctx context.Context, newInventory *api.AddInventoryParams) (*api.InventoryResponse, error) {\n\tlog.Printf(\"Received new inventory %s\", newInventory.Name)\n\tinventory, err := s.DB.CreateInventory(newInventory.Name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &api.InventoryResponse{Id: inventory.Id, Name: inventory.Name}, nil\n}", "title": "" }, { "docid": "6aa4bc0c17e74c2bbdecb39ccd8751e6", "score": "0.43321586", "text": "func setInventory(entity *integration.Entity, inventory map[string]string, k string, v interface{}) {\n\tif inventory[k] != \"\" {\n\t\tif inventory[k] == \"value\" {\n\t\t\tcheckError(entity.SetInventoryItem(k, \"value\", v))\n\t\t} else {\n\t\t\tcheckError(entity.SetInventoryItem(inventory[k], k, v))\n\t\t}\n\t}\n}", "title": "" }, { "docid": "9dfc84a6f0e6bc304e47c9636976ff86", "score": "0.43262485", "text": "func (o *GetLolInventoryV1SignedInventorySimpleParams) WithContext(ctx context.Context) *GetLolInventoryV1SignedInventorySimpleParams {\n\to.SetContext(ctx)\n\treturn o\n}", "title": "" }, { "docid": "ca43b521fff5ba8aa49e9b7dd6005bfb", "score": "0.43247557", "text": "func (c *osConfigZonalRESTClient) GetInventory(ctx context.Context, req *osconfigpb.GetInventoryRequest, opts ...gax.CallOption) (*osconfigpb.Inventory, error) {\n\tbaseUrl, err := url.Parse(c.endpoint)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbaseUrl.Path += fmt.Sprintf(\"/v1alpha/%v\", req.GetName())\n\n\tparams := url.Values{}\n\tparams.Add(\"$alt\", \"json;enum-encoding=int\")\n\tif req.GetView() != 0 {\n\t\tparams.Add(\"view\", fmt.Sprintf(\"%v\", req.GetView()))\n\t}\n\n\tbaseUrl.RawQuery = params.Encode()\n\n\t// Build HTTP headers from client and context metadata.\n\thds := []string{\"x-goog-request-params\", fmt.Sprintf(\"%s=%v\", \"name\", url.QueryEscape(req.GetName()))}\n\n\thds = append(c.xGoogHeaders, hds...)\n\thds = append(hds, \"Content-Type\", \"application/json\")\n\theaders := gax.BuildHeaders(ctx, hds...)\n\topts = append((*c.CallOptions).GetInventory[0:len((*c.CallOptions).GetInventory):len((*c.CallOptions).GetInventory)], opts...)\n\tunm := protojson.UnmarshalOptions{AllowPartial: true, DiscardUnknown: true}\n\tresp := &osconfigpb.Inventory{}\n\te := gax.Invoke(ctx, func(ctx context.Context, settings gax.CallSettings) error {\n\t\tif settings.Path != \"\" {\n\t\t\tbaseUrl.Path = settings.Path\n\t\t}\n\t\thttpReq, err := http.NewRequest(\"GET\", baseUrl.String(), nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\thttpReq = httpReq.WithContext(ctx)\n\t\thttpReq.Header = headers\n\n\t\thttpRsp, err := c.httpClient.Do(httpReq)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdefer httpRsp.Body.Close()\n\n\t\tif err = googleapi.CheckResponse(httpRsp); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tbuf, err := io.ReadAll(httpRsp.Body)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif err := unm.Unmarshal(buf, resp); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\treturn nil\n\t}, opts...)\n\tif e != nil {\n\t\treturn nil, e\n\t}\n\treturn resp, nil\n}", "title": "" }, { "docid": "de7fedf58a99b4bc77040e821fb652f0", "score": "0.43235683", "text": "func (schematics *SchematicsV1) CreateInventoryWithContext(ctx context.Context, createInventoryOptions *CreateInventoryOptions) (result *InventoryResourceRecord, response *core.DetailedResponse, err error) {\n\terr = core.ValidateNotNil(createInventoryOptions, \"createInventoryOptions cannot be nil\")\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.ValidateStruct(createInventoryOptions, \"createInventoryOptions\")\n\tif err != nil {\n\t\treturn\n\t}\n\n\tbuilder := core.NewRequestBuilder(core.POST)\n\tbuilder = builder.WithContext(ctx)\n\tbuilder.EnableGzipCompression = schematics.GetEnableGzipCompression()\n\t_, err = builder.ResolveRequestURL(schematics.Service.Options.URL, `/v2/inventories`, nil)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tfor headerName, headerValue := range createInventoryOptions.Headers {\n\t\tbuilder.AddHeader(headerName, headerValue)\n\t}\n\n\tsdkHeaders := common.GetSdkHeaders(\"schematics\", \"V1\", \"CreateInventory\")\n\tfor headerName, headerValue := range sdkHeaders {\n\t\tbuilder.AddHeader(headerName, headerValue)\n\t}\n\tbuilder.AddHeader(\"Accept\", \"application/json\")\n\tbuilder.AddHeader(\"Content-Type\", \"application/json\")\n\n\tbody := make(map[string]interface{})\n\tif createInventoryOptions.Name != nil {\n\t\tbody[\"name\"] = createInventoryOptions.Name\n\t}\n\tif createInventoryOptions.Description != nil {\n\t\tbody[\"description\"] = createInventoryOptions.Description\n\t}\n\tif createInventoryOptions.Location != nil {\n\t\tbody[\"location\"] = createInventoryOptions.Location\n\t}\n\tif createInventoryOptions.ResourceGroup != nil {\n\t\tbody[\"resource_group\"] = createInventoryOptions.ResourceGroup\n\t}\n\tif createInventoryOptions.InventoriesIni != nil {\n\t\tbody[\"inventories_ini\"] = createInventoryOptions.InventoriesIni\n\t}\n\tif createInventoryOptions.ResourceQueries != nil {\n\t\tbody[\"resource_queries\"] = createInventoryOptions.ResourceQueries\n\t}\n\t_, err = builder.SetBodyContentJSON(body)\n\tif err != nil {\n\t\treturn\n\t}\n\n\trequest, err := builder.Build()\n\tif err != nil {\n\t\treturn\n\t}\n\n\tvar rawResponse map[string]json.RawMessage\n\tresponse, err = schematics.Service.Request(request, &rawResponse)\n\tif err != nil {\n\t\treturn\n\t}\n\tif rawResponse != nil {\n\t\terr = core.UnmarshalModel(rawResponse, \"\", &result, UnmarshalInventoryResourceRecord)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\t\tresponse.Result = result\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "234a5b307e57cae3d657400d8e5aa498", "score": "0.43216392", "text": "func Load(filename string) (*Inventory, error) {\n\tinv := &Inventory{}\n\tcontent, err := ioutil.ReadFile(filename)\n\tif err != nil {\n\t\tlogrus.Debug(\"inventory file not found\")\n\t\treturn inv.init(), err\n\t}\n\n\tif err = yaml.Unmarshal(content, inv); err != nil {\n\t\tlogrus.Debug(\"inventory file unmarshal failed\")\n\t\treturn inv.init(), err\n\t}\n\tlogrus.Tracef(\"inventory path: %s struct: %#v, \", filename, inv)\n\treturn inv.init(), nil\n}", "title": "" }, { "docid": "18db3d0d149eefc8fc35aae6b0076d3a", "score": "0.4317095", "text": "func (*SchematicsV1) NewGetInventoryOptions(inventoryID string) *GetInventoryOptions {\n\treturn &GetInventoryOptions{\n\t\tInventoryID: core.StringPtr(inventoryID),\n\t}\n}", "title": "" }, { "docid": "4c021e76a309ef824d4b0caff6744522", "score": "0.43096408", "text": "func (inv *ActionVpsConfigIndexInvocation) NewInput() *ActionVpsConfigIndexInput {\n\tinv.Input = &ActionVpsConfigIndexInput{}\n\treturn inv.Input\n}", "title": "" }, { "docid": "04ffd65bb90e87473e27864277179549", "score": "0.43094417", "text": "func New() *invocation {\n\treturn &invocation{\n\t\tApplicationName: plugin.ApplicationName,\n\t\tApplicationId: plugin.ApplicationId,\n\t\tApplicationVersion: plugin.ApplicationVersion,\n\t\tApplicationProfile: plugin.ApplicationProfile,\n\t\tApplicationType: plugin.ApplicationType,\n\t\tRegion: plugin.Region,\n\t\tMemorySize: plugin.MemorySize,\n\t}\n}", "title": "" }, { "docid": "78db5db3932d18d33a50f60aaae852d9", "score": "0.43030268", "text": "func (ia *InventoryAPI) UpsertInventory(ctx echo.Context) error {\n\tvar err error\n\tvar newInventory api.Inventory\n\terr = ctx.Bind(&newInventory)\n\tif err != nil {\n\t\treturn echo.NewHTTPError(http.StatusBadRequest, err.Error())\n\t}\n\terr = ia.Store.UpsertInventory(&newInventory)\n\tif err != nil {\n\t\treturn echo.NewHTTPError(http.StatusBadRequest, err.Error())\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0ffe16463633184295377bbb71fe9ddc", "score": "0.43020368", "text": "func (w *InventoryWidget) Layout(g *gocui.Gui) error {\n\tif w.s.state != stateMoveFromInventory && w.s.state != stateMoveFromStructure {\n\t\treturn nil\n\t}\n\n\tmaxX, _ := g.Size()\n\n\tv, err := g.SetView(w.name, maxX-w.width, w.offsetY, maxX-1, w.offsetY+w.height)\n\tif err != nil && err != gocui.ErrUnknownView {\n\t\treturn err\n\t}\n\n\tif err == gocui.ErrUnknownView {\n\t\terr = w.initBindings(g)\n\t\tif err == nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif _, err := g.SetViewOnTop(w.name); err != nil {\n\t\treturn err\n\t}\n\n\tif w.activeState == w.s.state {\n\t\tif _, err := g.SetCurrentView(w.name); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tv.Title = w.name\n\n\tv.Clear()\n\n\tstorage := w.s.st[w.storageIndex]\n\n\tif storage.Size() == 0 {\n\t\tfmt.Fprint(v, \"Empty inventory\\n\")\n\t\treturn nil\n\t}\n\n\tif w.position >= storage.Size() {\n\t\tw.position = storage.Size() - 1\n\t}\n\n\tvar start int\n\tuniqueCount := storage.UniqueObjects()\n\tif uniqueCount-5 > w.position {\n\t\tstart = w.position\n\t} else {\n\t\tstart = uniqueCount - 5\n\t}\n\n\tindex := -1\n\tfor _, product := range GlobalProductFactory.cannonicalOrder {\n\t\tcount, present := storage.objects[product]\n\t\tif !present {\n\t\t\tcontinue\n\t\t}\n\n\t\tindex++\n\t\tif index < start {\n\t\t\tcontinue\n\t\t}\n\n\t\tvar prefix string\n\t\tif index == w.position {\n\t\t\tif w.activeState == w.s.state {\n\t\t\t\tprefix = \">\"\n\t\t\t} else {\n\t\t\t\tprefix = \" \"\n\t\t\t}\n\t\t} else {\n\t\t\tprefix = \" \"\n\t\t}\n\n\t\tfmt.Fprintf(v, \"%s %3d x %s\\n\", prefix, count, product.name)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "15699d626f7bb630c6b185375c75520c", "score": "0.4291574", "text": "func (*SchematicsV1) NewCreateInventoryOptions() *CreateInventoryOptions {\n\treturn &CreateInventoryOptions{}\n}", "title": "" }, { "docid": "5d6e7a6fa6d1c63c2f9c7af3cd07071e", "score": "0.42910907", "text": "func (r ApiGetPowerPolicyInventoryListRequest) Apply(apply string) ApiGetPowerPolicyInventoryListRequest {\n\tr.apply = &apply\n\treturn r\n}", "title": "" }, { "docid": "25604b11d855763ff7fc93dd42cbc605", "score": "0.4288597", "text": "func setInventory(inventory *inventory.Inventory, configBinaryPath string) error {\n\tcommandPath, err := getBinPath(configBinaryPath)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tcmd := exec.Command(commandPath, \"-M\")\n\toutput, err := cmd.CombinedOutput()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error fetching the inventory (modules). Message: %v\", err.Error())\n\t}\n\tr := bytes.NewReader(output)\n\terr = getModules(bufio.NewReader(r), inventory)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tcmd = exec.Command(commandPath, \"-V\")\n\toutput, err = cmd.CombinedOutput()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error fetching the inventory (version). Message: %v\", err.Error())\n\t}\n\tr = bytes.NewReader(output)\n\terr = getVersion(bufio.NewReader(r), inventory)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif len(inventory.Items()) == 0 {\n\t\treturn fmt.Errorf(\"empty result\")\n\t}\n\treturn nil\n}", "title": "" } ]
96d213e3e7113427ff2aa7a97172a582
GetAdditionalData gets the additionalData property value. Stores additional data not described in the OpenAPI description found when deserializing. Can be used for serialization as well.
[ { "docid": "5d85dd67f1ef6c36b3e97c97385b5e65", "score": "0.0", "text": "func (m *SecurityActionState) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" } ]
[ { "docid": "9e3be1dae9689d6398e4df873dc05fd7", "score": "0.78051364", "text": "func (m *AddPasswordPostRequestBody) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "f18803d9c4fb2a12dfb5c601f17fda05", "score": "0.7794108", "text": "func (m *AssignPostRequestBody) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "15f8e716ff282414bbd1252247b29bf2", "score": "0.7785334", "text": "func (m *CreatePostRequestBody) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "7e2d59f8e5a7faad180f02857412e2f0", "score": "0.7761335", "text": "func (m *EducationFeedback) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "cfa796dad1b066dc60e025011bfba9a1", "score": "0.7758926", "text": "func (m *IncomingContext) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "cb34c7a9530e0f197c1daaa680692557", "score": "0.77335554", "text": "func (m *AttachmentItem) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "fb530d36ddc0f3d86c1e3ef467cb5f01", "score": "0.7717492", "text": "func (m *ItemItemsItemWorkbookFunctionsComplexPostRequestBody) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "3c5340d33e4c6188f7a0d7cf70c629db", "score": "0.7715364", "text": "func (m *IntentsItemUpdateSettingsPostRequestBody) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "ba7f06981b7de83e8703252c300855ac", "score": "0.76881635", "text": "func (m *OnPremisesExtensionAttributes) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "b8cdb77396fae2e35624908f24b4ea97", "score": "0.7688091", "text": "func (m *SearchAlterationOptions) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "1fd37ccb8d8b1588a759dc7d17d105da", "score": "0.7678622", "text": "func (m *SharePostRequestBody) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "f9c20f786cd7833db31fffafeb950864", "score": "0.7673762", "text": "func (m *WipePostRequestBody) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "6621390f1e88f4bd8aab549e9933a0df", "score": "0.7671325", "text": "func (m *PlayPromptPostRequestBody) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "c620362920d92bfb9abd618603a7fe7b", "score": "0.7617576", "text": "func (m *KeyValue) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "910256733d453b01546516cfec9edc52", "score": "0.76145554", "text": "func (m *Malware) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "23a8a1430c762835507da8735b6ff348", "score": "0.7583265", "text": "func (m *ItemItemsItemWorkbookFunctionsRandBetweenPostRequestBody) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "6e317af980d9b29737ad9b96b0a7ea8f", "score": "0.75634193", "text": "func (m *ItemTranslateExchangeIdsPostRequestBody) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "62cce806d76dff2653be233a48d5a11a", "score": "0.7551056", "text": "func (m *PolicySetsItemUpdatePostRequestBody) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "c7eb90f8d4e342e59dd9cb80710655fb", "score": "0.7543638", "text": "func (m *PaymentTerm) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "0185a09cf24c20eb7b07ea42321b7f13", "score": "0.75413513", "text": "func (m *CopyToDefaultContentLocationPostRequestBody) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "54903a3ad969047a003b5c9217c833b6", "score": "0.7520124", "text": "func (m *ActionResultPart) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "96d726bc8ade09b12fc4edd31b68b085", "score": "0.7516789", "text": "func (m *ResponseStatus) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "30ebd87b364b8b78f84709023171314b", "score": "0.7516195", "text": "func (o *Object) GetAdditionalData(key string) (interface{}, bool) {\n\tif o.AdditionalData == nil {\n\t\treturn nil, false\n\t} else {\n\t\tval, ok := o.AdditionalData[key]\n\t\treturn val, ok\n\t}\n}", "title": "" }, { "docid": "d1039087108714d9801b22659c449171", "score": "0.7507255", "text": "func (m *ChannelIdentity) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "b2564cd423cba9e1a365100679e464c7", "score": "0.75056314", "text": "func (m *ItemItemsItemWorkbookFunctionsAverageIfPostRequestBody) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "869230a6c324d1eea9b46805db69a999", "score": "0.74960387", "text": "func (m *InformationalUrl) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "d4c086e855796cacb2c6e19fa3339e4a", "score": "0.7491753", "text": "func (m *ChatMessageAttachment) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "0b1bf5d2ff29e98ecd41dd4c6066f90b", "score": "0.7467742", "text": "func (m *RedirectPostRequestBody) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "7b364f13efae8de6bc38def4dcbbab83", "score": "0.746341", "text": "func (m *EmbeddedSIMActivationCode) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "b5a0300f5ef9deb43344f8357ac5942d", "score": "0.74471426", "text": "func (m *GetSchedulePostRequestBody) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "77bab491d774de8bb2b3b7615b8e268b", "score": "0.7444237", "text": "func (m *TermsExpiration) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "a5d8e857112427a6ecfdedb5a1368ea6", "score": "0.74399817", "text": "func (m *SharepointIds) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "975f5f1c2475fa69a7574aee678649aa", "score": "0.7433085", "text": "func (m *DiscoveredSensitiveType) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "0792e04d39dd9efdeb768cffc2627cba", "score": "0.74280775", "text": "func (m *Media) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "15458356f1414018a6bafd7c8b3267b2", "score": "0.7420071", "text": "func (m *RetentionEventStatus) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "5af369761101719f33d17dffcea4de71", "score": "0.7419405", "text": "func (m *AttachmentItem) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "498659ec00b08c72606219303a0673c6", "score": "0.7418853", "text": "func (m *RetentionLabelSettings) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "b384552751e2a217b04da54bd31ce17d", "score": "0.7418134", "text": "func (m *TeamSummary) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "b669f14a6bce52b63e8f546196d0e678", "score": "0.7414808", "text": "func (m *WebPartData) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "a0dd43a47fa2be49bfe4ebd84d79a109", "score": "0.7408263", "text": "func (m *Reminder) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "33ce38b0361a45bc5709f2795f8bd900", "score": "0.7407839", "text": "func (m *EventMessageDetail) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "b8b058352bcfd405c2b9f7605a50af1a", "score": "0.7404415", "text": "func (m *EducationFeedback) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "281990db06950dfb7306f5527f463947", "score": "0.7404096", "text": "func (m *MobileAppInstallTimeSettings) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "8bf85fa419ad7c6f320f9213a1c17271", "score": "0.74006975", "text": "func (m *UploadSession) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "2074690d7375afadab1a2301be6a55a3", "score": "0.73995394", "text": "func (m *RiskyServicePrincipalsDismissPostRequestBody) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "46641b6953323e38ed699a840c708c91", "score": "0.739831", "text": "func (m *AgedAccountsPayable) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "075508869e0458bc9427bf6f8f3eb474", "score": "0.7391573", "text": "func (m *CloudPcBulkActionSummary) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "9abfebbca8cc4e4fb29e9ea26e1a0237", "score": "0.73890996", "text": "func (m *MeetingParticipants) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "829afe252284c3f739979cfb1887aa19", "score": "0.7372479", "text": "func (m *GovernancePolicy) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "b7fc5751580b242cc51688c90ec17cfb", "score": "0.7363636", "text": "func (m *IosDeviceType) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "f81a93749ee0a036ecab1b22115f9d84", "score": "0.7362354", "text": "func (m *TeamworkSoftwareUpdateHealth) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "b970e9b01378da743992c62fddda31f1", "score": "0.7362259", "text": "func (m *SiteCollection) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "2cb484128633be03cb40fd63e87dc463", "score": "0.7357026", "text": "func (m *TeamworkActivePeripherals) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "49d9b247873e52bb751ccdf7d3c65bb2", "score": "0.7353817", "text": "func (m *SolutionsRoot) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "b446e74924bd8e2a23d348d9662a6536", "score": "0.73452663", "text": "func (m *SearchBucket) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "5e2212cbf5b38da7454e45928605e5ac", "score": "0.7342263", "text": "func (m *RecurrencePattern) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "64029435bf4a29d901bfbb8ab81bde5f", "score": "0.7317469", "text": "func (m *ConnectorStatusDetails) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "89130d8facb46c51d51da2c6f2fd6fbc", "score": "0.7312983", "text": "func (m *Headers) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "f351aef907b0263f32b0fd8dab9eb01c", "score": "0.7304594", "text": "func (m *DeviceHealth) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "9b0794a53d47c6da9489604d4f85f690", "score": "0.7298349", "text": "func (m *AppliedAuthenticationEventListener) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "cff4d56b6667a30f174b4a24bbba5f7e", "score": "0.7294046", "text": "func (m *LabelActionBase) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "f6f4975763ee0a783b1af6499d80c306", "score": "0.7289345", "text": "func (m *MeetingTimeSuggestionsResult) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "0bfc8c83102fee0586d6e1ef9cb294aa", "score": "0.7289044", "text": "func (m *RelatedContact) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "4b83d4f29140b57e7cfed938ccd77f81", "score": "0.72814703", "text": "func (m *UserSimulationEventInfo) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "4ed9b0e3fb5c575da6603bac9934d89f", "score": "0.72811425", "text": "func (m *OnlineMeetingInfo) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "c3ff0d82bb95a3d9d3c12b4858033673", "score": "0.72784925", "text": "func (m *RecurrenceRange) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "fb20fec4a369b21a21f7fabc1857add1", "score": "0.72729063", "text": "func (m *BgpConfiguration) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "30a34de7244fbbe94ee069a75482a879", "score": "0.72681725", "text": "func (m *InvitedUserMessageInfo) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "2c5ecff16fa6c5eac722784fdb17c9e9", "score": "0.72521263", "text": "func (m *AuthenticationContext) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "28bfc7b6688bc294ab17d86ef7ba7435", "score": "0.7250298", "text": "func (m *CasesEdiscoveryCasesItemSearchesItemMicrosoftGraphSecurityPurgeDataPurgeDataPostRequestBody) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "b5b0a3d48b766096fe19490e04edb038", "score": "0.72448206", "text": "func (m *PrinterLocation) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "227e6ef164dd0f7f5d00409d36207009", "score": "0.7236276", "text": "func (m *AssignmentFilterEvaluateRequest) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "96d4980aed45a186eeb921568aaf32bb", "score": "0.7232846", "text": "func (m *UpdateAllowedCombinationsResult) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "0b6cb2f32b89ab5045824db32f339ad9", "score": "0.7232614", "text": "func (m *ProfileCardAnnotation) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "80cae17dd3b3b422a9b145ebedbfbf79", "score": "0.7231358", "text": "func (m *ServicePlanInfo) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "fb696e8a953d686508f7c35463c84578", "score": "0.72041494", "text": "func (m *CloudPcRestorePointSetting) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "87fd25c1f4d15e327361e91a556c0e97", "score": "0.72029215", "text": "func (m *DeviceOperatingSystemSummary) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "9fd0f496da0dc8dcfc2de343a12710c2", "score": "0.7200078", "text": "func (m *TeamMemberSettings) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "1d8c08e21c38ef4b002de417b027dfec", "score": "0.7198174", "text": "func (m *MailboxSettings) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "c4cf9f64e9b81303599738842b2c663c", "score": "0.7197722", "text": "func (m *TeamSummary) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "940e5866c2d791398516f0603e6ddd21", "score": "0.7197572", "text": "func (m *CommsNotification) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "5fa431cdd0c96cee8407b1f9bad181da", "score": "0.7192259", "text": "func (m *DeviceHealthAttestationState) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "8c5008ca668336bb559c3b46b4f6f248", "score": "0.7191986", "text": "func (m *Malware) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "060e3d9e5ecf2dfef821c7c98039ef73", "score": "0.71909744", "text": "func (m *DeviceManagementSettingDependency) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "1b417e60890e862920faae2e25db2e8e", "score": "0.7186548", "text": "func (m *DeliveryOptimizationBandwidthBusinessHoursLimit) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "daa72af3d178d0d3255484b2579f60fe", "score": "0.71846807", "text": "func (m *SearchBucket) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "12c7f94ba7007823b737373ea8e125ba", "score": "0.71773446", "text": "func (m *AndroidEnrollmentCompanyCode) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "522beb5475f100ad3fa3b5d49c376267", "score": "0.7162885", "text": "func (m *ParentLabelDetails) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "d1dcee0c1b0ae26f98ff96c979e2f3b8", "score": "0.7157572", "text": "func (m *UserExperienceAnalyticsDeviceScopesItemTriggerDeviceScopeActionPostRequestBody) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "aa1d5f8434b29737f328fc9e69fb79f9", "score": "0.7148761", "text": "func (m *PrinterDefaults) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "cdf136c8179aceb4d02259312d702f82", "score": "0.7144674", "text": "func (m *WipePostRequestBody) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "ae2827938f255d5eb3ef0f5898ed009f", "score": "0.71424896", "text": "func (m *ImportedWindowsAutopilotDeviceIdentityState) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "d1e0b03ad236f44161ece92647acf7f5", "score": "0.71410024", "text": "func (m *OnPremisesExtensionAttributes) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "a04689f2b92cfb310893db0efebdee25", "score": "0.71368295", "text": "func (m *IosDeviceType) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "07c48647d4fe6d6b715304801ae41246", "score": "0.71327317", "text": "func (m *Setting) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "08cbaa43837d02568013602ed7e141e3", "score": "0.7117868", "text": "func (m *MailTips) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "85415ac7c05f8437251e72faf1aea6d0", "score": "0.7112165", "text": "func (m *DeviceManagementSettings) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "bf71ebb41e655d43833ed1b33d6ed22a", "score": "0.7108904", "text": "func (m *ServiceUpdateMessageViewpoint) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "cd9e703ccd1e59a21671da9bedd12a80", "score": "0.7106278", "text": "func (m *GetSchedulePostRequestBody) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "5f45162f690b9758e2927bc828c1bf64", "score": "0.7103273", "text": "func (m *MeetingParticipants) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "a32bd2364681e920460e5edc22f71d42", "score": "0.7100523", "text": "func (m *SiteCollection) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" } ]
80d41be2a2a208d17cdf49915292b4fe
unit tests ============================================================================ benchmarking. Check A path finding efficiency. Run "go test bench ." to get something like: BenchmarkAStar 200000 11593 ns/op
[ { "docid": "e111baf3ddfdc0b8fe66d996ad3236dd", "score": "0.80329686", "text": "func BenchmarkAStar(b *testing.B) {\n\tp := newPath(&emptyPlan{})\n\tfor cnt := 0; cnt < b.N; cnt++ {\n\t\tp.Find(0, 0, gridSize-1, gridSize-1)\n\t}\n}", "title": "" } ]
[ { "docid": "38199507a3758f50d7354d5fd416c593", "score": "0.66601783", "text": "func _TestBenchmarkGraph(t *testing.T) {\n\tsize := 4\n\tgraph := createBenchmarkGraph(size)\n\tpath := Route(graph)\n\tif len(path) != size*2 {\n\t\tt.Fail()\n\t}\n}", "title": "" }, { "docid": "de2d75b3d83a8bfc2fc4d16a8fc2ca40", "score": "0.5908715", "text": "func AStar(s, t graph.Node, g traverse.Graph, h Heuristic) (path Shortest, expanded int) {\n\tif g, ok := g.(graph.Graph); ok {\n\t\tif g.Node(s.ID()) == nil || g.Node(t.ID()) == nil {\n\t\t\treturn Shortest{from: s}, 0\n\t\t}\n\t}\n\tvar weight Weighting\n\tif wg, ok := g.(Weighted); ok {\n\t\tweight = wg.Weight\n\t} else {\n\t\tweight = UniformCost(g)\n\t}\n\tif h == nil {\n\t\tif g, ok := g.(HeuristicCoster); ok {\n\t\t\th = g.HeuristicCost\n\t\t} else {\n\t\t\th = NullHeuristic\n\t\t}\n\t}\n\n\tpath = newShortestFrom(s, []graph.Node{s, t})\n\ttid := t.ID()\n\n\tvisited := make(set.Int64s)\n\topen := &aStarQueue{indexOf: make(map[int64]int)}\n\theap.Push(open, aStarNode{node: s, gscore: 0, fscore: h(s, t)})\n\n\tfor open.Len() != 0 {\n\t\tu := heap.Pop(open).(aStarNode)\n\t\tuid := u.node.ID()\n\t\ti := path.indexOf[uid]\n\t\texpanded++\n\n\t\tif uid == tid {\n\t\t\tbreak\n\t\t}\n\n\t\tvisited.Add(uid)\n\t\tto := g.From(u.node.ID())\n\t\tfor to.Next() {\n\t\t\tv := to.Node()\n\t\t\tvid := v.ID()\n\t\t\tif visited.Has(vid) {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tj, ok := path.indexOf[vid]\n\t\t\tif !ok {\n\t\t\t\tj = path.add(v)\n\t\t\t}\n\n\t\t\tw, ok := weight(u.node.ID(), vid)\n\t\t\tif !ok {\n\t\t\t\tpanic(\"path: A* unexpected invalid weight\")\n\t\t\t}\n\t\t\tif w < 0 {\n\t\t\t\tpanic(\"path: A* negative edge weight\")\n\t\t\t}\n\t\t\tg := u.gscore + w\n\t\t\tif n, ok := open.node(vid); !ok {\n\t\t\t\tpath.set(j, g, i)\n\t\t\t\theap.Push(open, aStarNode{node: v, gscore: g, fscore: g + h(v, t)})\n\t\t\t} else if g < n.gscore {\n\t\t\t\tpath.set(j, g, i)\n\t\t\t\topen.update(vid, g, g+h(v, t))\n\t\t\t}\n\t\t}\n\t}\n\n\treturn path, expanded\n}", "title": "" }, { "docid": "ccc6e17fff2e0aca7a7fa2d13968f896", "score": "0.585717", "text": "func Astar(start []int, goal []int, mapArr [][]int) ([][]int, error) {\n\tstartNode := Node{\n\t\tX: start[0],\n\t\tY: start[1],\n\t\tGscore: 0,\n\t}\n\tgoalNode := Node{\n\t\tX: goal[0],\n\t\tY: goal[1],\n\t}\n\tclosedSet := []Node{}\n\topenSet := []Node{startNode}\n\tHcost(&startNode, goal)\n\tFcost(&startNode)\n\t// This is where the real action starts\n\tfor len(openSet) != 0 {\n\t\tSortNodes(openSet)\n\t\tcNode := openSet[0]\n\t\tif cNode.Eql(&goalNode) {\n\t\t\treturn buildPath(cNode), nil\n\t\t}\n\t\topenSet = openSet[1:]\n\t\tclosedSet = append(closedSet, cNode)\n\t\tfor _, neighbor := range NeighborNodes(&cNode) {\n\t\t\tif InMap(neighbor, mapArr) == false {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif Includes(&neighbor, closedSet) {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\ttentativeGscore := Gcost(&cNode, &neighbor) + cNode.Gscore\n\t\t\tif Includes(&neighbor, openSet) == false || tentativeGscore < neighbor.Gscore {\n\t\t\t\tneighbor.Parent = &cNode\n\n\t\t\t\tneighbor.Gscore = tentativeGscore\n\t\t\t\tHcost(&neighbor, goal)\n\t\t\t\tFcost(&neighbor)\n\t\t\t\topenSet = append(openSet, neighbor)\n\t\t\t}\n\t\t}\n\t}\n\treturn [][]int{}, nil\n}", "title": "" }, { "docid": "07fdcb6c66738823e483e3ff3e5d62e8", "score": "0.5853845", "text": "func main() {\n\ttesting.Init()\n\tflag.Parse()\n\tgen.TimeFormat = \"nano\"\n\n\tjsonPathGetBenchmarks()\n\tjsonPathFirstBenchmarks()\n\n\tparseBenchmarks()\n\tparseReaderBenchmarks()\n\tvalidateBenchmarks()\n\tvalidateReaderBenchmarks()\n\n\tbase := testing.Benchmark(runBase)\n\n\tjsonBenchmarks(base, false)\n\tjsonBenchmarks(base, true)\n\tjsonSortBenchmarks(base)\n\tconvBenchmarks(base)\n\n\tfmt.Println()\n}", "title": "" }, { "docid": "8a7313d3c1c4f6df4baa08114e9d17ef", "score": "0.57984835", "text": "func (a *Astar) FindPath(startLocation *Vertex, endLocation *Vertex, avaliableAp int) *Stack {\n\tstart := &Node{\n\t\tParent: nil,\n\t\tPosition: startLocation,\n\t\tDistanceToTarget: -1,\n\t\tCost: 1,\n\t\tWeight: 1,\n\t\tWalkable: true,\n\t}\n\n\tend := &Node{\n\t\tParent: nil,\n\t\tPosition: endLocation,\n\t\tDistanceToTarget: -1,\n\t\tCost: 1,\n\t\tWeight: 1,\n\t\tWalkable: true,\n\t}\n\n\tpath := &Stack{\n\t\tnodes: make([]*Node, 0),\n\t}\n\topenList := []*Node{}\n\tclosedList := []*Node{}\n\tadjacencies := []*Node{}\n\n\tcurrent := start\n\n\topenList = append(openList, start)\n\n\tfor len(openList) != 0 && Contains(closedList, end) == false {\n\t\tcurrent = openList[0]\n\t\topenList = a.RemoveIndex(openList, 0)\n\t\tclosedList = append(closedList, current)\n\t\tadjacencies = a.GetAdjacentNodes(current)\n\n\t\tfor _, n := range adjacencies {\n\t\t\tif Contains(closedList, n) == false && n.Walkable {\n\t\t\t\tif Contains(openList, n) == false {\n\t\t\t\t\tn.Parent = current\n\t\t\t\t\tn.DistanceToTarget = int(math.Abs(float64(n.Position.X-end.Position.X)) + math.Abs(float64(n.Position.Y-end.Position.Y)))\n\t\t\t\t\tn.Cost = n.Weight + n.Parent.Cost\n\t\t\t\t\topenList = append(openList, n)\n\t\t\t\t\tsort.SliceStable(openList, func(i, j int) bool { return openList[i].F() < openList[j].F() })\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\tif Contains(closedList, end) == false {\n\t\treturn nil\n\t}\n\n\ttemp := closedList[indexOf(current, closedList)]\n\n\tif temp == nil {\n\t\treturn nil\n\t}\n\n\tfor {\n\t\tif temp == nil || temp == start {\n\t\t\tbreak\n\t\t}\n\n\t\tif temp.Cost <= avaliableAp+1 {\n\t\t\tpath.Push(temp)\n\t\t\ttemp = temp.Parent\n\t\t} else {\n\t\t\treturn nil\n\t\t}\n\t}\n\n\treturn path\n}", "title": "" }, { "docid": "43988e2db78a2b338fb062e309df5421", "score": "0.5756539", "text": "func measure1(ar []int) time.Duration {\n\tfmt.Println(\"Method 1 is being measured\")\n\t//fmt.Println(\"Array to be tested: \", ar)\n\tt1 := time.Now()\n\tsolution1(ar)\n\tt2 := time.Now()\n\tdiff := t2.Sub(t1)\n\tfor i := 0; i < 8; i++ {\n\t\tt1 := time.Now()\n\t\tsolution1(ar)\n\t\tt2 := time.Now()\n\t\tdiff += t2.Sub(t1)\n\t}\n\tt1 = time.Now()\n\tfmt.Println(\"MSS found: \", solution1(ar))\n\tt2 = time.Now()\n\tdiff += t2.Sub(t1)\n\tfmt.Println(\"Elapsed time: \", diff/10)\n\treturn diff / 10\n}", "title": "" }, { "docid": "a42e3a3d77885215cbef82cf49a71de8", "score": "0.5726691", "text": "func BenchmarkAlgorithm(b *testing.B) {\n\tgraph := createBenchmarkGraph(30)\n\tb.ResetTimer()\n\tRoute(graph)\n}", "title": "" }, { "docid": "a3b71d4e5503eec68732d7f608143b5f", "score": "0.5717171", "text": "func idaStar(cube *cepo, subgroup int8, tables *tables) string {\n\tbound := heuristic(cube, subgroup, tables)\n\tvar path []cepo\n\tpath = append(path, *cube)\n\tfor {\n\t\tcost, solution := search(path, 0, bound, subgroup, 0, tables)\n\t\tif cost == 255 {\n\t\t\treturn solution\n\t\t}\n\t\tbound = cost\n\t}\n}", "title": "" }, { "docid": "83cb83faa698996dde1dabb866193db9", "score": "0.57021147", "text": "func AStar(start, goal Node, graph Graph, Cost, HeuristicCost func(Node, Node) float64) (path []Node, cost float64, nodesExpanded int) {\n\tif Cost == nil {\n\t\tif cgraph, ok := graph.(Coster); ok {\n\t\t\tCost = cgraph.Cost\n\t\t} else {\n\t\t\tCost = UniformCost\n\t\t}\n\t}\n\tif HeuristicCost == nil {\n\t\tif hgraph, ok := graph.(HeuristicCoster); ok {\n\t\t\tHeuristicCost = hgraph.HeuristicCost\n\t\t} else {\n\t\t\tHeuristicCost = NullHeuristic\n\t\t}\n\t}\n\n\tclosedSet := make(map[int]internalNode)\n\topenSet := &aStarPriorityQueue{}\n\theap.Init(openSet)\n\tnode := internalNode{start, 0, HeuristicCost(start, goal)}\n\theap.Push(openSet, node)\n\tpredecessor := make(map[int]Node)\n\n\tfor openSet.Len() != 0 {\n\t\tcurr := heap.Pop(openSet).(internalNode)\n\n\t\t// This isn't in most implementations of A*, it's a restructuring of the step \"if node not in openSet, add it\"\n\t\t// Instead of searching to check, we see if we already evaluated it. If we have we can ignore it\n\t\tif _, ok := closedSet[curr.ID()]; ok {\n\t\t\tcontinue\n\t\t}\n\n\t\tnodesExpanded += 1\n\n\t\tif curr.ID() == goal.ID() {\n\t\t\treturn rebuildPath(predecessor, goal), curr.gscore, nodesExpanded\n\t\t}\n\n\t\tclosedSet[curr.ID()] = curr\n\n\t\tfor _, neighbor := range graph.Successors(curr.Node) {\n\t\t\tg := curr.gscore + Cost(curr.Node, neighbor)\n\t\t\tif _, ok := closedSet[neighbor.ID()]; ok && g >= closedSet[neighbor.ID()].gscore {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tif _, ok := closedSet[neighbor.ID()]; !ok || g < closedSet[neighbor.ID()].gscore {\n\t\t\t\tnode = internalNode{neighbor, g, g + HeuristicCost(neighbor, goal)}\n\t\t\t\tpredecessor[node.ID()] = curr\n\t\t\t\theap.Push(openSet, node)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil, 0.0, nodesExpanded\n}", "title": "" }, { "docid": "615c7a4f7e1562ec5effdeb4a7d6ef00", "score": "0.5655955", "text": "func BenchmarkUpdatePathological(b *testing.B) {\n\texists := getZipfRowsSliceRoaring(100000, 1, 0, 400000)\n\tinc := getZipfRowsSliceRoaring(100000, 2, 400000, ShardWidth)\n\n\tb.ResetTimer()\n\tfor i := 0; i < b.N; i++ {\n\t\tb.StopTimer()\n\t\tf, idx, tx := mustOpenFragment(b, OptFieldTypeSet(DefaultCacheType, 0))\n\t\t_ = idx\n\n\t\terr := f.importRoaringT(tx, exists, false)\n\t\tif err != nil {\n\t\t\tb.Fatalf(\"importing roaring: %v\", err)\n\t\t}\n\t\tb.StartTimer()\n\t\terr = f.importRoaringT(tx, inc, false)\n\t\tif err != nil {\n\t\t\tb.Fatalf(\"importing second: %v\", err)\n\t\t}\n\n\t}\n\n}", "title": "" }, { "docid": "209ab3cdf9d8752ec75b9461a6349faa", "score": "0.56412786", "text": "func(nodes * Nodes) runShortestPath(){\n\tfor i:=0;i<100;i++{\n\t\tif(len(nodes.nodeSlice) == 0){\n\t\t\tbreak\n\t\t}\n\t\tnodes.oneIteration()\n\t}\n}", "title": "" }, { "docid": "86c50e322e524770b98ba5fe51df3a7b", "score": "0.5637475", "text": "func main() {\n\tfor i := 12; i< 22; i++ {\n\t\tfor j := 12; j< 22; j++ {\n\t\t\tvar a, b int\n\t\t\tfor k := 0; k < 1000000; k++ {\n\t\t\t\tscore1, score2 := match(i, j)\n\t\t\t\tif score1 > score2 {\n\t\t\t\t\ta += 1\n\t\t\t\t} else if score1 < score2 {\n\t\t\t\t\tb += 1\n\t\t\t\t}\n\t\t\t}\n\t\t\tfmt.Println(i, j, a, b)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "0d54ff9bf803286edb82cb6a6fe0601d", "score": "0.5523608", "text": "func findPathCost(in_perm perms)UberEstimatesResponse {\n\n\tvar ret UberEstimatesResponse \n\tret.Price = 0\n\tret.Distance = 0\n\tret.Duration = 0\n\t\n\t// it will find the cost for this path\n\tpermData := in_perm.perm\n\tfor i:=0; i < len(permData) - 1; i++{\n\t\tvar location_1 = permData[i]\t\t\n\t\tvar location_2 = permData[i+1]\n\t\t\n\t\t//get the cost estimate from the uber api here.\n\t\t//using Dynamic programming here. SO that uber is not called again and again\n\t\tuberesp := getTripEstimate(location_1, location_2)\n\t\t\n\t\tret.Price = ret.Price + uberesp.Price\n\t\tret.Distance = ret.Distance + uberesp.Distance\n\t\tret.Duration = ret.Duration + uberesp.Duration\n\t\tret.ErrorMsg += uberesp.ErrorMsg\n\t}\n\t\n//\tfmt.Println(\"cost of path: \", in_perm.perm, \" is : \", ret);\n\treturn ret\n}", "title": "" }, { "docid": "842ac1ad7d610e99a06665b4cc11d204", "score": "0.5510687", "text": "func TestTiming(t *testing.T) {\n\n\tsimstore := NewSimStore()\n\n\t// insert stuff\n\tN := 2 * 1000 // * 1000 //* 10\n\tr := rand.New(rand.NewSource(45342))\n\tfor i := 0; i < N; i++ {\n\t\tsimstore.Insert(fmt.Sprintf(\"%016x\", r.Int63()), int64(i))\n\t\tif i%1000*1000 == 0 {\n\t\t\tfmt.Printf(\"Inserted %.6f%%\\n\", 100*float64(i)/float64(N))\n\t\t}\n\t}\n\n\tfor i := 0; i < 20; i++ {\n\t\tt0 := time.Now()\n\t\tsimstore.FindClosest(fmt.Sprintf(\"%016x\", r.Int63()))\n\t\tt1 := time.Now()\n\t\tfmt.Printf(\"FindClosest in store with %d items took %v.\\n\", N, t1.Sub(t0))\n\t}\n\n}", "title": "" }, { "docid": "ea790b2bfa3b63ee22435646cf935569", "score": "0.5479256", "text": "func TestBFSHeuristic(mktcap []int64, sum int64, n int64) time.Duration {\n\tstart := time.Now()\n\tBfsHeuristic(mktcap, sum)\n\telapsed := time.Since(start)\n\t//log.Printf(\"BFS with Heuristic took %s\", elapsed)\n\treturn elapsed\n}", "title": "" }, { "docid": "d689a45e0689bfe191c88de25b4fdaf1", "score": "0.5464711", "text": "func main() {\n\taTraversed := walk(aInput)\n\tbTraversed := walk(bInput)\n\n\t//fmt.Printf(\"aTraversed: %v\\n\", aTraversed)\n\t//fmt.Printf(\"bTraversed: %v\\n\", bTraversed)\n\n\n\thitmap := make(map[point]int)\n\n\tfor _, p := range aTraversed {\n\t\thitmap[p]++\n\t}\n\n\tfor _, p := range bTraversed {\n\t\thitmap[p]++\n\t}\n\n\tintersections := []point{}\n\tdistances := []int{}\n\n\tfor p, c := range hitmap {\n\t\tif c > 1 {\n\t\t\td := int(math.Abs(float64(p.x)) + math.Abs(float64(p.y)))\n\t\t\tdistances = append(distances, d)\n\t\t\tintersections = append(intersections, p)\n\t\t}\n\t}\n\n\tsort.Ints(distances)\n\n\t//fmt.Printf(\"intersections: %v\\n\", intersections)\n\tfmt.Printf(\"distances: %v\\n\", distances)\n\n}", "title": "" }, { "docid": "fd57bbe76168c0af5471081305af0d29", "score": "0.54568166", "text": "func findShortestPath(start, finish int, algorithm string) {\n\t// resetting previous values\n\treset()\n\n\t// declaring costs\n\tvar fCost float64\n\tvar gCost float64\n\tvar hCost float64\n\n\t// declaring other variables\n\tvar currentVertex, to int\n\tvar edge Edge\n\n\t// initializing priority queue\n\tqueue := NewPriorityQueue()\n\tqueue.Push(Edge{start, 0})\n\tdist[start] = 0\n\n\t// while queue is not empty\n\tfor queue.Length() > 0 {\n\t\t// increasing visit count\n\t\tvisitCount++\n\n\t\t// getting the current edge and vertex\n\t\tedge = queue.Front().(Edge)\n\t\tqueue.Pop() // dequeue\n\t\tcurrentVertex = edge.to\n\n\t\t// terminating search when reaching goal\n\t\tif currentVertex == finish { break }\n\n\t\t// iterating through all the vertices that we can reach from current vertex\n\t\tfor i := 0; i < len(edgeGraph[currentVertex]); i++ {\n\t\t\t// getting the next connected vertex\n\t\t\tto = edgeGraph[currentVertex][i].to\n\t\t\t// calculating gCost\n\t\t\tgCost = dist[currentVertex] + edgeGraph[currentVertex][i].distance\n\n\t\t\t// relaxing the edge if needed\n\t\t\tif gCost < dist[to] {\n\t\t\t\t// updating distance if shorter path is found\n\t\t\t\tdist[to] = gCost\n\t\t\t\t// setting heuristic in case of A*\n\t\t\t\tif algorithm == \"astar\" { hCost = heuristic(to, finish) }\n\t\t\t\t// calculating fCost (hCost is zero in case of dijkstra)\n\t\t\t\tfCost = gCost + hCost\n\t\t\t\t// enqueue\n\t\t\t\tqueue.Push(Edge{to, fCost})\n\t\t\t\t// memorizing the parent vertex for building path\n\t\t\t\tparent[to] = currentVertex\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "6312d7f97c2281cce7d6a630b6ecd34a", "score": "0.5409696", "text": "func TestA(t *testing.T) {\n\tfmt.Println(\"Test A\")\n\ta := []byte(\"a\")\n\tobservations := [][]byte{a}\n\tstates := 2\n\tstart_prob := []float64{0.5, 0.5}\n\ttrans_prob := [][]float64{\n\t\t[]float64{0.5, 0.5},\n\t\t[]float64{0.5, 0.5},\n\t}\n\tprobs, paths := Run(observations, states, trans_prob, start_prob, emit_probA)\n\n\texpected := [][]float64{[]float64{0.16666, 0.08333}}\n\n\tfor i := range expected {\n\t\tfor s := range expected[i] {\n\t\t\tif math.Abs(probs[i][s]-expected[i][s]) > 0.00001 {\n\t\t\t\tt.Fail()\n\t\t\t\tfmt.Println(\"Probs[\", i, \"][\", s, \"] should be around\", expected[i][s], \"but was\", probs[i][s])\n\t\t\t}\n\t\t}\n\t}\n\tfmt.Println(paths)\n\n}", "title": "" }, { "docid": "786413b030bbd6d5c4823325054ba8d4", "score": "0.53914326", "text": "func AStarAnalyseFile(sW, eW, fL, dL string) (foundResult bool, resultPath []string) {\n\t//List of all words that can possibly be used.\n\twordDictionary := readFile(sW, eW, fL, dL)\n\t//List of words that have been assigned a partentNode and are still to be analyzed\n\topenList := make([]*aStarWordNode, 0)\n\t//List of words that have been analyzed.\n\tclosedList := make([]*aStarWordNode, 0)\n\t//The aStarWordNode that relates to the start word selected.\n\tstartNode := newAStarWordNode(sW)\n\t//The aStarWordNode that relates to the end word seletected.\n\tendNode := newAStarWordNode(eW)\n\t//List used to store the children nodes that relate to the current node being checked.\n\tchildenNodes := make([]*aStarWordNode, 0)\n\t//Boolean used to indicate if a path has been found.\n\tfoundResult = false\n\n\t//Calculate the estimated minimum cost from start to end word.\n\tstartNode.HScore = calculateNodeCost(startNode.Word, endNode.Word)\n\tstartNode.FScore = startNode.HScore\n\t//Add startWord to openList\n\topenList = append(openList, &startNode)\n\t//Add endword to the list of words to be analyzed.\n\twordDictionary = append(wordDictionary, &endNode)\n\n\t//While there are still elements in openList continue analysis\n\tfor len(openList) != 0 {\n\t\t//The current node being analyzed.\n\t\tvar currentNode *aStarWordNode\n\t\t//int used to indicate the best potential score of all nodes in the open list\n\t\tbestFScore := -1\n\t\t//int used to indicate the best potential score of all nodes in the open list\n\t\tbestGScore := -1\n\t\t//Int used to indicate the position of the best score.\n\t\tindex := 0\n\n\t\t//Find the best scored node in current openList\n\t\tfor i, node := range openList {\n\t\t\t//Special case if the bestFScore is -1 then this is first pass through analysis.\n\t\t\tif bestFScore >= node.FScore || bestFScore == -1 {\n\t\t\t\t//Special case if the bestGScore is -1 then this is first pass through analysis.\n\t\t\t\t//We check for the lowest GScore after the best Fscore to make sure that children nodes are attached at the earliest point possible.\n\t\t\t\tif bestGScore >= node.GScore || bestGScore == -1 {\n\t\t\t\t\t//Store details of the best scored node in open list.\n\t\t\t\t\tbestFScore = node.FScore\n\t\t\t\t\tbestGScore = node.GScore\n\t\t\t\t\tcurrentNode = node\n\t\t\t\t\tindex = i\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\t//remove current node from openList\n\t\topenList = append(openList[:index], openList[index+1:]...)\n\n\t\t//If true we have found the solution\n\t\tif currentNode.Word == endNode.Word {\n\t\t\tfoundResult = true\n\t\t\tbreak\n\t\t}\n\n\t\t//Get all the word nodes that are 1 step from the current node, update word dictionary so that all words found are removed from list to be analyzed.\n\t\tchildenNodes, wordDictionary = generateNodeChildren(currentNode, wordDictionary)\n\t\t//G score (cost of path to this point) will always be current gscore + 1 for children as they are 1 step from the previous node.\n\t\ttempGScore := currentNode.GScore + 1\n\n\t\t//For each child node update the scores and add the node to the open list\n\t\tfor _, cN := range childenNodes {\n\t\t\tif tempGScore < cN.GScore || cN.GScore == 0 {\n\t\t\t\tcN.GScore = tempGScore\n\t\t\t\tcN.HScore = calculateNodeCost(cN.Word, endNode.Word)\n\t\t\t\tcN.FScore = cN.GScore + cN.HScore\n\t\t\t\tcN.ParentNode = currentNode\n\t\t\t\topenList = append(openList, cN)\n\t\t\t}\n\t\t}\n\n\t\t//Append current node to closed list as it has now been analysed\n\t\tclosedList = append(closedList, currentNode)\n\t}\n\n\tif foundResult {\n\t\tresultPath = getResultPath(endNode)\n\t} else {\n\t\tresultPath = []string{}\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "82228ed78d9bd1e1ec239b8df3138eeb", "score": "0.53835064", "text": "func doPerfMeasure(fsPath string) (write, read float64, err error) {\n\tvar count int\n\tvar totalWriteElapsed time.Duration\n\tvar totalReadElapsed time.Duration\n\n\tdefer os.RemoveAll(fsPath)\n\n\trandBuf := make([]byte, randBufSize)\n\trand.Read(randBuf)\n\tbuf := bytes.Repeat(randBuf, randParts)\n\n\t// create the enclosing directory\n\terr = os.MkdirAll(fsPath, 0777)\n\tif err != nil {\n\t\treturn 0, 0, err\n\t}\n\n\tfor count = 1; count <= iterations; count++ {\n\t\tfsTempObjPath := path.Join(fsPath, strconv.Itoa(count))\n\n\t\t// Write performance calculation\n\t\twriteStart := time.Now()\n\t\tn, err := writeFile(fsTempObjPath, buf)\n\n\t\tif err != nil {\n\t\t\treturn 0, 0, err\n\t\t}\n\t\tif n != fileSize {\n\t\t\treturn 0, 0, errors.New(\"Could not write temporary data to disk\")\n\t\t}\n\n\t\twriteElapsed := time.Since(writeStart)\n\t\ttotalWriteElapsed += writeElapsed\n\n\t\t// Read performance calculation\n\t\treadStart := time.Now()\n\t\tn, err = readFile(fsTempObjPath, buf)\n\n\t\tif err != nil {\n\t\t\treturn 0, 0, err\n\t\t}\n\t\tif n != fileSize {\n\t\t\treturn 0, 0, errors.New(\"Could not read temporary data from disk\")\n\t\t}\n\n\t\treadElapsed := time.Since(readStart)\n\t\ttotalReadElapsed += readElapsed\n\t}\n\t// Average time spent = total time elapsed / number of writes\n\tavgWriteTime := totalWriteElapsed.Seconds() / float64(count)\n\t// Write perf = fileSize (in Bytes) / average time spent writing (in seconds)\n\twrite = fileSize / avgWriteTime\n\n\t// Average time spent = total time elapsed / number of writes\n\tavgReadTime := totalReadElapsed.Seconds() / float64(count)\n\t// read perf = fileSize (in Bytes) / average time spent reading (in seconds)\n\tread = fileSize / avgReadTime\n\n\treturn write, read, nil\n}", "title": "" }, { "docid": "019ba02f400bc3322cd820dacdb1d0fe", "score": "0.53741443", "text": "func BenchmarkSet(b *testing.B) {\n\truntime.GOMAXPROCS(8)\n\tvar s store.SanicBST\n\ts.Init()\n\tfor n := 1; n < b.N; n++ {\n\t\tgo s.TestTree(n)\n\t}\n}", "title": "" }, { "docid": "6db665bf1f00a8bcd7d37195437bfb2f", "score": "0.53272897", "text": "func TestFastPaths(t *testing.T) {\n\tdrs := []image.Rectangle{\n\t\timage.Rect(0, 0, 10, 10), // The dst bounds.\n\t\timage.Rect(3, 4, 8, 6), // A strict subset of the dst bounds.\n\t\timage.Rect(-3, -5, 2, 4), // Partial out-of-bounds #0.\n\t\timage.Rect(4, -2, 6, 12), // Partial out-of-bounds #1.\n\t\timage.Rect(12, 14, 23, 45), // Complete out-of-bounds.\n\t\timage.Rect(5, 5, 5, 5), // Empty.\n\t}\n\tsrs := []image.Rectangle{\n\t\timage.Rect(0, 0, 12, 9), // The src bounds.\n\t\timage.Rect(2, 2, 10, 8), // A strict subset of the src bounds.\n\t\timage.Rect(10, 5, 20, 20), // Partial out-of-bounds #0.\n\t\timage.Rect(-40, 0, 40, 8), // Partial out-of-bounds #1.\n\t\timage.Rect(-8, -8, -4, -4), // Complete out-of-bounds.\n\t\timage.Rect(5, 5, 5, 5), // Empty.\n\t}\n\tsrcfs := []func(image.Rectangle) (image.Image, error){\n\t\tsrcGray,\n\t\tsrcNRGBA,\n\t\tsrcRGBA,\n\t\tsrcUnif,\n\t\tsrcYCbCr,\n\t}\n\tvar srcs []image.Image\n\tfor _, srcf := range srcfs {\n\t\tsrc, err := srcf(srs[0])\n\t\tif err != nil {\n\t\t\tt.Fatal(err)\n\t\t}\n\t\tsrcs = append(srcs, src)\n\t}\n\tqs := []Interpolator{\n\t\tNearestNeighbor,\n\t\tApproxBiLinear,\n\t\tCatmullRom,\n\t}\n\tops := []Op{\n\t\tOver,\n\t\tSrc,\n\t}\n\tblue := image.NewUniform(color.RGBA{0x11, 0x22, 0x44, 0x7f})\n\n\tfor _, dr := range drs {\n\t\tfor _, src := range srcs {\n\t\t\tfor _, sr := range srs {\n\t\t\t\tfor _, transform := range []bool{false, true} {\n\t\t\t\t\tfor _, q := range qs {\n\t\t\t\t\t\tfor _, op := range ops {\n\t\t\t\t\t\t\tdst0 := image.NewRGBA(drs[0])\n\t\t\t\t\t\t\tdst1 := image.NewRGBA(drs[0])\n\t\t\t\t\t\t\tDraw(dst0, dst0.Bounds(), blue, image.Point{}, Src)\n\t\t\t\t\t\t\tDraw(dstWrapper{dst1}, dst1.Bounds(), srcWrapper{blue}, image.Point{}, Src)\n\n\t\t\t\t\t\t\tif transform {\n\t\t\t\t\t\t\t\tm := transformMatrix(3.75, 2, 1)\n\t\t\t\t\t\t\t\tq.Transform(dst0, m, src, sr, op, nil)\n\t\t\t\t\t\t\t\tq.Transform(dstWrapper{dst1}, m, srcWrapper{src}, sr, op, nil)\n\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\tq.Scale(dst0, dr, src, sr, op, nil)\n\t\t\t\t\t\t\t\tq.Scale(dstWrapper{dst1}, dr, srcWrapper{src}, sr, op, nil)\n\t\t\t\t\t\t\t}\n\n\t\t\t\t\t\t\tif !bytes.Equal(dst0.Pix, dst1.Pix) {\n\t\t\t\t\t\t\t\tt.Errorf(\"pix differ for dr=%v, src=%T, sr=%v, transform=%t, q=%T\",\n\t\t\t\t\t\t\t\t\tdr, src, sr, transform, q)\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "bc7dd32ea5377ca8b94739c9aa348493", "score": "0.5322458", "text": "func BenchmarkFindCaller(b *testing.B) {\n\tb.ResetTimer()\n\tb.ReportAllocs()\n\tfor i := 0; i < b.N; i++ {\n\t\tfindCaller()\n\t}\n}", "title": "" }, { "docid": "8b33b5633d070b0d2fd2f57148c365e7", "score": "0.53134936", "text": "func (m *Map) Path(start, goal Point, direction string) (string, []Point, error) {\n\tclosedList := make(map[Point]struct{})\n\topenList := map[Point]struct{}{start: {}}\n\tfScore := map[Point]float64{start: 0}\n\tgScore := map[Point]float64{start: 0}\n\tcameFrom := make(map[Point]Point)\n\n\tfor len(openList) > 0 {\n\t\tvar current Point\n\t\tvar currentScore = math.MaxFloat64\n\n\t\tfor node := range openList {\n\t\t\tscore := fScore[node]\n\t\t\tif score < currentScore {\n\t\t\t\tcurrent = node\n\t\t\t\tcurrentScore = score\n\t\t\t}\n\t\t}\n\n\t\tdelete(openList, current)\n\t\tclosedList[current] = struct{}{}\n\n\t\tif current.Equal(goal) {\n\t\t\tvar path []Point\n\n\t\t\tfor {\n\t\t\t\tpath = append(path, current)\n\t\t\t\tvar ok bool\n\t\t\t\tcurrent, ok = cameFrom[current]\n\t\t\t\tif !ok {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tvar revPath = make([]Point, len(path))\n\t\t\tfor i, node := range path {\n\t\t\t\trevPath[len(path)-1-i] = node\n\t\t\t}\n\n\t\t\treturn pathToCommand(direction, revPath), revPath, nil\n\t\t}\n\n\tNeighborsLoop:\n\t\tfor _, n := range m.Neighbours(current) {\n\t\t\tif _, ok := closedList[n]; ok {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\t//https://en.wikipedia.org/wiki/A*_search_algorithm#Pseudocode\n\t\t\tgScore[n] = gScore[current] + 1\n\t\t\tfScore[n] = gScore[n] + n.Distance(goal)\n\n\t\t\tfor on := range openList {\n\t\t\t\tif n.Equal(on) {\n\t\t\t\t\tif g, ok := gScore[on]; ok && gScore[n] > g {\n\t\t\t\t\t\tcontinue NeighborsLoop\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\topenList[n] = struct{}{}\n\t\t\tcameFrom[n] = current\n\t\t}\n\t}\n\n\treturn \"\", nil, errors.New(\"could not reach goal\")\n}", "title": "" }, { "docid": "8ea3d2cfefcba8e2ea89717f5b0c4e8a", "score": "0.53013235", "text": "func main() {\n\n\tsegments, points, err := parseArguments()\n\tif err != nil {\n\t\tfmt.Printf(\"Error: %v\\n\", err)\n\t\tos.Exit(-1)\n\t}\n\n\tfmt.Printf(\"segments: %v\\n\", segments)\n\tfmt.Printf(\"points: %v\\n\", points)\n\n\tresult := GetNumSegmentsContainsPointsNaive(segments, points)\n\tfmt.Printf(\"result (naive): %v\\n\", result)\n\n\tresult = GetNumSegmentsContainsPointsFast(segments, points)\n\tfmt.Printf(\"result (fast): %v\\n\", result)\n}", "title": "" }, { "docid": "8c9c7588a36d35ca49533a4d0370fc5e", "score": "0.52954084", "text": "func TestPerformanceCOLIBRI(t *testing.T) {\n\n\tif os.Getenv(\"COLIBRI_PERF_TESTS\") == \"\" {\n\t\tt.SkipNow()\n\t}\n\n\ttestCases := []performanceTestCase{\n\t\t{\n\t\t\tTestName: \"segmentAdmitManyRsvsSameAS\",\n\t\t\tX: delta(1, 1000, 10),\n\t\t\tXlabel: \"# ASes\",\n\t\t\tRepetitions: REPS,\n\t\t\tFunction: timeAdmitSegmentReservationManyRsvsSameAS,\n\t\t\tFilter: identity,\n\t\t\tDebugPrintProgress: true,\n\t\t\tDebugSkipExec: true,\n\t\t},\n\t\t//////////////\n\t\t// Segment\n\t\t//////////////\n\t\t{\n\t\t\tTestName: \"segmentAdmission_0_percent\",\n\t\t\tX: delta(0, 10000, 2000),\n\t\t\tXlabel: \"# Other ASes\",\n\t\t\t// YLabels: []string{\"ave. µsecs\"},\n\t\t\tRepetitions: REPS,\n\t\t\tFunction: func(t *testing.T, count int) time.Duration {\n\t\t\t\tratio := 0.0\n\t\t\t\tsameSourceASID := int(float64(count) * ratio / 100.0)\n\t\t\t\tdifferentSrcASesCount := count - sameSourceASID\n\t\t\t\treturn timeAdmitSegmentReservationTwoDimensions(t,\n\t\t\t\t\tsameSourceASID, differentSrcASesCount)\n\t\t\t},\n\t\t\tFilter: identity,\n\t\t\tDebugPrintProgress: true,\n\t\t},\n\t\t{\n\t\t\tTestName: \"segmentAdmission_10_percent\",\n\t\t\tX: delta(0, 10000, 2000),\n\t\t\tXlabel: \"# Other ASes\",\n\t\t\t// YLabels: []string{\"ave. µsecs\"},\n\t\t\tRepetitions: REPS,\n\t\t\tFunction: func(t *testing.T, count int) time.Duration {\n\t\t\t\tratio := 10.0\n\t\t\t\tsameSourceASID := int(float64(count) * ratio / 100.0)\n\t\t\t\tdifferentSrcASesCount := count - sameSourceASID\n\t\t\t\treturn timeAdmitSegmentReservationTwoDimensions(t,\n\t\t\t\t\tsameSourceASID, differentSrcASesCount)\n\t\t\t},\n\t\t\tFilter: identity,\n\t\t\tDebugPrintProgress: true,\n\t\t},\n\t\t{\n\t\t\tTestName: \"segmentAdmission_50_percent\",\n\t\t\tX: delta(0, 10000, 2000),\n\t\t\tXlabel: \"# Other ASes\",\n\t\t\t// YLabels: []string{\"ave. µsecs\"},\n\t\t\tRepetitions: REPS,\n\t\t\tFunction: func(t *testing.T, count int) time.Duration {\n\t\t\t\tratio := 50.0\n\t\t\t\tsameSourceASID := int(float64(count) * ratio / 100.0)\n\t\t\t\tdifferentSrcASesCount := count - sameSourceASID\n\t\t\t\treturn timeAdmitSegmentReservationTwoDimensions(t,\n\t\t\t\t\tsameSourceASID, differentSrcASesCount)\n\t\t\t},\n\t\t\tFilter: identity,\n\t\t\tDebugPrintProgress: true,\n\t\t},\n\t\t{\n\t\t\tTestName: \"segmentAdmission_90_percent\",\n\t\t\tX: delta(0, 10000, 2000),\n\t\t\tXlabel: \"# Other ASes\",\n\t\t\t// YLabels: []string{\"ave. µsecs\"},\n\t\t\tRepetitions: REPS,\n\t\t\tFunction: func(t *testing.T, count int) time.Duration {\n\t\t\t\tratio := 90.0\n\t\t\t\tsameSourceASID := int(float64(count) * ratio / 100.0)\n\t\t\t\tdifferentSrcASesCount := count - sameSourceASID\n\t\t\t\treturn timeAdmitSegmentReservationTwoDimensions(t,\n\t\t\t\t\tsameSourceASID, differentSrcASesCount)\n\t\t\t},\n\t\t\tFilter: identity,\n\t\t\tDebugPrintProgress: true,\n\t\t},\n\n\t\t///////////////////////\n\t\t// E2E\n\t\t///////////////////////\n\t\t{\n\t\t\tTestName: \"e2eAdmit_1\",\n\t\t\tX: []int{0, 10, 100, 1000, 10000, 100000},\n\t\t\tXlabel: \"# endhosts\",\n\t\t\t// YLabels: []string{\"ave. µsecs\"},\n\t\t\tRepetitions: REPS,\n\t\t\tFunction: func(t *testing.T, count int) time.Duration {\n\t\t\t\texistingSegments := 1\n\t\t\t\treturn timeAdmitE2EReservationTwoDimensions(t, existingSegments, count)\n\t\t\t},\n\t\t\tFilter: identity,\n\t\t\tDebugPrintProgress: true,\n\t\t},\n\t\t{\n\t\t\tTestName: \"e2eAdmit_5000\",\n\t\t\tX: []int{0, 10, 100, 1000, 10000, 100000},\n\t\t\tXlabel: \"# endhosts\",\n\t\t\t// YLabels: []string{\"ave. µsecs\"},\n\t\t\tRepetitions: REPS,\n\t\t\tFunction: func(t *testing.T, count int) time.Duration {\n\t\t\t\texistingSegments := 5000\n\t\t\t\treturn timeAdmitE2EReservationTwoDimensions(t, existingSegments, count)\n\t\t\t},\n\t\t\tFilter: identity,\n\t\t\tDebugPrintProgress: true,\n\t\t},\n\t\t{\n\t\t\tTestName: \"e2eAdmit_10000\",\n\t\t\tX: []int{0, 10, 100, 1000, 10000, 100000},\n\t\t\tXlabel: \"# endhosts\",\n\t\t\t// YLabels: []string{\"ave. µsecs\"},\n\t\t\tRepetitions: REPS,\n\t\t\tFunction: func(t *testing.T, count int) time.Duration {\n\t\t\t\texistingSegments := 10000\n\t\t\t\treturn timeAdmitE2EReservationTwoDimensions(t, existingSegments, count)\n\t\t\t},\n\t\t\tFilter: identity,\n\t\t\tDebugPrintProgress: true,\n\t\t},\n\t}\n\tfor _, tc := range testCases {\n\t\tif tc.DebugSkipExec {\n\t\t\tcontinue\n\t\t}\n\t\ttc := tc\n\t\tt.Run(tc.TestName, func(t *testing.T) {\n\t\t\tt.Parallel()\n\t\t\tdoPerformanceTest(t, tc)\n\t\t})\n\t}\n}", "title": "" }, { "docid": "134f517631e79b1b3066c79e23ce49ec", "score": "0.5276165", "text": "func TestAStarAnalyseFile(t *testing.T) {\n\tfmt.Println(\"Testing Main Analyse File method: 'AStarAnalyseFile'....\")\n\n\t//Arrange\n\n\ttestInputs := readTestFile(\"../Answers.txt\", \" -> \")\n\n\tfor _, input := range testInputs {\n\t\tinput.FileLocation = \"../WordList.txt\"\n\t\tinput.Delimiter = \"\"\n\t\tinput.PathFound = true\n\t}\n\n\tcustomInput1 := aStarAnalyseMockInput{StartWord: \"test\", EndWord: \"most\", FileLocation: \"./testInput.txt\", Delimiter: \"\", PathFound: true, ResultPathLength: 4}\n\tcustomInput2 := aStarAnalyseMockInput{StartWord: \"pest\", EndWord: \"post\", FileLocation: \"./testInput.txt\", Delimiter: \"\", PathFound: true, ResultPathLength: 2}\n\tcustomInput3 := aStarAnalyseMockInput{StartWord: \"test\", EndWord: \"fail\", FileLocation: \"./testInput.txt\", Delimiter: \"\", PathFound: false, ResultPathLength: 0}\n\tcustomInput4 := aStarAnalyseMockInput{StartWord: \"test\", EndWord: \"most\", FileLocation: \"./testInputDelimited.txt\", Delimiter: \",\", PathFound: true, ResultPathLength: 4}\n\tcustomInput5 := aStarAnalyseMockInput{StartWord: \"pest\", EndWord: \"post\", FileLocation: \"./testInputDelimited.txt\", Delimiter: \",\", PathFound: true, ResultPathLength: 2}\n\tcustomInput6 := aStarAnalyseMockInput{StartWord: \"test\", EndWord: \"fail\", FileLocation: \"./testInputDelimited.txt\", Delimiter: \",\", PathFound: false, ResultPathLength: 0}\n\n\ttestInputs = append(testInputs, &customInput1)\n\ttestInputs = append(testInputs, &customInput2)\n\ttestInputs = append(testInputs, &customInput3)\n\ttestInputs = append(testInputs, &customInput4)\n\ttestInputs = append(testInputs, &customInput5)\n\ttestInputs = append(testInputs, &customInput6)\n\n\ttotalTests := len(testInputs)\n\n\tvar waitGroup sync.WaitGroup\n\twaitGroup.Add(totalTests)\n\ttestResultOutput := make(chan string, 100)\n\n\tfor i, input := range testInputs {\n\t\tgo runAstarTestConcurrently(input, i+1, totalTests, &waitGroup, testResultOutput)\n\t}\n\tgo dealWithTestOutputConcurrelty(testResultOutput, t)\n\n\twaitGroup.Wait()\n\tclose(testResultOutput)\n\tfmt.Print(\"\\n\")\n}", "title": "" }, { "docid": "67353d663e787f7d790c737fa2376b0d", "score": "0.5266276", "text": "func (f *FastPathManager) RunSlowPath() {\n\tfor f.opQueue.Size() > 0 && f.idxQueue.Size() > 0 {\n\t\topId, _ := f.opQueue.Pop()\n\t\tidx, _ := f.idxQueue.Pop()\n\n\t\tlogger.Debugf(\"Slow-path matches opId = (%s) at idx = (%s)\", opId.(string), idx.(string))\n\n\t\topSlowRet := f.GetOpSlowRet(opId.(string))\n\n\t\tlogger.Debugf(\"Slow-path allows committing opId = (%s) at idx = (%s)\", opId.(string), idx.(string))\n\n\t\topSlowRet.SetValue(idx)\n\n\t\t//f.RemoveOpSlowRet(opId.(string)) // Any listener must have a handle to opSlowRet at this point\n\t\t//f.RemoveOpFastRet(vote.OpId) // Any listener must have a handle to opFastRet at this point\n\t}\n}", "title": "" }, { "docid": "0635b513f9b03d0ca5f0bdfc6ee10b86", "score": "0.5258874", "text": "func main() {\n\trand.Seed(0)\n\tfor numCities := 2; numCities < 10; numCities++ {\n\t\tpaths := [][]int{}\n\t\tcities := []int{}\n\t\tfor i := 0; i < numCities; i++ {\n\t\t\tpath := []int{}\n\t\t\tfor j := 0; j < numCities; j++ {\n\t\t\t\tif i == j {\n\t\t\t\t\tpath = append(path, 0)\n\t\t\t\t} else if j < i {\n\t\t\t\t\tpath = append(path, paths[j][i])\n\t\t\t\t} else {\n\t\t\t\t\tpath = append(path, rand.Intn(1000))\n\t\t\t\t}\n\t\t\t}\n\t\t\tpaths = append(paths, path)\n\t\t\tcities = append(cities, i)\n\t\t}\n\t\tdist := rand.Intn(3000)\n\t\tpathExists := tsp(cities, paths, dist)\n\t\tfmt.Println(\"Paths:\")\n\t\tprintMatrix(paths)\n\t\tfmt.Printf(\"Path shorter than %v exists: %v\\n\", dist, pathExists)\n\t\tfmt.Println(\"---\")\n\t}\n}", "title": "" }, { "docid": "0553c88c5d279893342c4b745addb12f", "score": "0.52581763", "text": "func OptAvgTime(ring bhs.Ring) (bhs.NodeID, uint64, uint64) {\n\tconst cautiousWalk = false\n\tblackHole := make(chan bhs.NodeID, 1) // channel to send the index, buffered to one\n\ttotalMoves := make(chan uint64, 2*(len(ring)-1))\n\tidealTime := make(chan uint64, 1)\n\tringSize := bhs.NodeID(len(ring)) // logically wrong, but needed for type correctness\n\n\tfor id := bhs.NodeID(1); id < ringSize; id++ {\n\t\toks := make(chan bool, 2) // results from left and right agent\n\t\tmoves := make(chan uint64, 2)\n\n\t\tdirections := [2]bhs.Direction{bhs.Left, bhs.Right}\n\t\tdestinations := [2]bhs.NodeID{id - 1, (1 + id) % ringSize}\n\t\tfor i := 0; i < len(directions); i++ {\n\t\t\tgo func(destination bhs.NodeID, oks chan<- bool, moves chan<- uint64, direction bhs.Direction) {\n\t\t\t\tagent := bhs.NewAgent(direction, ring, cautiousWalk)\n\n\t\t\t\tif ok, _ := agent.MoveUntil(agent.Direction, destination); !ok {\n\t\t\t\t\toks <- false\n\t\t\t\t\ttotalMoves <- agent.Moves\n\t\t\t\t\treturn\n\t\t\t\t}\n\n\t\t\t\tok, _ := agent.MoveUntil(bhs.GetOppositeDirection(agent.Direction), agent.HomebaseNodeID)\n\t\t\t\toks <- ok\n\t\t\t\tmoves <- agent.Moves\n\t\t\t\ttotalMoves <- agent.Moves\n\t\t\t}(destinations[i], oks, moves, directions[i])\n\t\t}\n\n\t\t// check for results from left and right agents\n\t\tgo func(id bhs.NodeID, oks <-chan bool, results <-chan uint64) {\n\t\t\tif ok := <-oks; !ok {\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tif ok := <-oks; !ok {\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\t// both agents have returned true, alert the index of the black hole\n\t\t\tblackHole <- id\n\t\t\tidealTime <- helpers.MaxUint64(<-results, <-results)\n\t\t}(id, oks, moves)\n\t}\n\n\tvar sumMoves uint64\n\tfor i := 1; i < len(ring); i++ {\n\t\tsumMoves += <-totalMoves + <-totalMoves\n\t}\n\t// wait for the black hole to be found\n\treturn <-blackHole, sumMoves, <-idealTime\n}", "title": "" }, { "docid": "4e504ff1eed2ab55099762ad7e2779e8", "score": "0.5239229", "text": "func TestDFS(mktcap []int64, sum int64, n int64) time.Duration {\n\tstart := time.Now()\n\tdp := make(map[int64]map[int64]bool)\n\n\tif SubsetSumDFS(dp, mktcap, n-1, sum) {\n\t\tPrintSubset(mktcap, dp, sum)\n\t} else {\n\t\tfmt.Printf(\"A subset summing to %v does not exist\\n\", sum)\n\t}\n\n\telapsed := time.Since(start)\n\t//log.Printf(\"DFS with memoization took %s\", elapsed)\n\treturn elapsed\n}", "title": "" }, { "docid": "24fcf4030badb5c0334728ecf6382d86", "score": "0.523238", "text": "func main() {\n\tscanner := bufio.NewScanner(os.Stdin)\n\n\tvar T int\n\n\tif scanner.Scan() {\n\t\tinput := scanner.Text()\n\t\tT = getInt(input)\n\t}\n\n\tfor t := 0; t < T; t++ {\n\t\tvar R, C int\n\t\tif scanner.Scan() {\n\t\t\tinput := scanner.Text()\n\t\t\ts := strings.Split(input, \" \")\n\t\t\tR = getInt(s[0])\n\t\t\tC = getInt(s[1])\n\t\t}\n\n\t\tvisited := make([][]bool, R)\n\n\t\tfor i := 0; i < R; i++ {\n\t\t\tvisited[i] = make([]bool, C)\n\t\t}\n\n\t\tpath, err := visitAll(visited)\n\t\tif err != nil {\n\t\t\tfmt.Printf(\"Case #%d: %s\\n\", t+1, err.Error())\n\t\t} else {\n\t\t\tfmt.Printf(\"Case #%d: POSSIBLE\\n\", t+1)\n\t\t\tfmt.Printf(\"1 1\\n\")\n\t\t\tfor i := range path {\n\t\t\t\tfmt.Println(path[i])\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "eb74cd3fcb78048ee9f74941e949bc34", "score": "0.5221136", "text": "func BenchmarkMultiLookup(b *testing.B) {\n\tdata := `{\n\t\t\"object\" : {\n\t\t\t\"array\" : [\n\t\t\t\t{\n\t\t\t\t\t\"subpath\" : \"value1\"\n\t\t\t\t},\n\t\t\t\t{\n\t\t\t\t\t\"subpath\" : { \"subobject\" : \"value2\" }\n\t\t\t\t},\n\t\t\t\t{\n\t\t\t\t\t\"subpath\" : [\"value3\"]\n\t\t\t\t}\n\t\t\t]\n\t\t}\n\t}`\n\n\tmultiPath := DataPath(\"/object/array/{pos}/subpath\")\n\n\tb.ResetTimer()\n\n\tfor i := 0; i < b.N; i++ {\n\t\t_, _ = multiPath.LookupMulti(json.RawMessage(data), \"{pos}\")\n\t}\n}", "title": "" }, { "docid": "b23537eeac9ea4d2d276d9c120ed0fc2", "score": "0.51954097", "text": "func BenchmarkQ(b *testing.B) {\n\tfai, err := faidx.New(\"test.fa\")\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tfor i := 0; i < b.N; i++ {\n\t\tg := &faidx.FaPos{Chrom: \"a\", Start: 0, End: 0}\n\t\tfor pos := 0; pos < 400000; pos += 1 {\n\t\t\tg.Start, g.End = pos, pos+500\n\t\t\tfai.Q(g)\n\t\t}\n\n\t}\n}", "title": "" }, { "docid": "78495d1f687cafdb0ada7e8bc68c0444", "score": "0.5194115", "text": "func shortestPath(grid [][]int, k int) int {\n\t// 20200424\n\t// DFS\n\t// 执行耗时:0 ms,击败了100.00% 的Go用户\n\t// 内存消耗:2.5 MB,击败了100.00% 的Go用户\n\t//const maxSize = 40\n\t//m, n := len(grid), len(grid[0])\n\t//if k >= m + n-3 { // 这里不能少了=号,否则会Time Limit Exceeded\n\t//\treturn m + n -2\n\t//}\n\t//passed := 0\n\t//visited := [maxSize][maxSize]bool{}\n\t//var dfs func(r, c, k int) int\n\t//dfs = func(r, c, k int) int {\n\t//\tif r < 0 || r >= m || c < 0 || c >= n ||\n\t//\t\tvisited[r][c] || grid[r][c] == 1 && k == 0 {\n\t//\t\treturn math.MaxInt32\n\t//\t}\n\t//\tif r == m-1 && c == n-1 {\n\t//\t\treturn passed\n\t//\t}\n\t//\tpassed ++\n\t//\tvisited[r][c] = true\n\t//\tif grid[r][c] == 1 {\n\t//\t\tk--\n\t//\t}\n\t//\tleft := dfs(r, c-1, k)\n\t//\tright := dfs(r, c+1, k)\n\t//\tup := dfs(r-1, c, k)\n\t//\tdown := dfs(r+1, c, k)\n\t//\tpassed --\n\t//\tvisited[r][c] = false\n\t//\n\t//\treturn min(min(left, right), min(up, down))\n\t//}\n\t//res := dfs(0,0,k)\n\t//if res == math.MaxInt32 {\n\t//\treturn -1\n\t//}\n\t//return res\n\n\t// 20200424\n\t// BFS\n\t// 执行耗时:0 ms,击败了100.00% 的Go用户\n\t// 内存消耗:2.7 MB,击败了100.00% 的Go用户\n\tconst maxSize = 40\n\tconst maxK = maxSize + maxSize - 3\n\tm, n := len(grid), len(grid[0])\n\tif k >= m+n-3 {\n\t\treturn m + n - 2\n\t}\n\tvisited := [maxSize][maxSize][maxK + 1]bool{}\n\tqueue := list.New()\n\tqueue.PushBack([]int{0, 0, k})\n\tvisited[0][0][k] = true\n\tdirs := [][]int{{1, 0}, {-1, 0}, {0, 1}, {0, -1}}\n\tpassed := 0\n\tfor queue.Len() > 0 {\n\t\tlevelSize := queue.Len()\n\t\tfor i := 0; i < levelSize; i++ {\n\t\t\tinfo := queue.Remove(queue.Front()).([]int)\n\t\t\tr, c, k := info[0], info[1], info[2]\n\t\t\tif r == m-1 && c == n-1 {\n\t\t\t\treturn passed\n\t\t\t}\n\t\t\tif grid[r][c] == 1 {\n\t\t\t\tk--\n\t\t\t}\n\t\t\tfor _, d := range dirs {\n\t\t\t\tnr, nc := r+d[0], c+d[1]\n\t\t\t\tif nr < 0 || nr >= m || nc < 0 || nc >= n ||\n\t\t\t\t\tvisited[nr][nc][k] || grid[nr][nc] == 1 && k == 0 {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tqueue.PushBack([]int{nr, nc, k})\n\t\t\t\tvisited[nr][nc][k] = true\n\t\t\t}\n\t\t}\n\t\tpassed++\n\t}\n\treturn -1\n}", "title": "" }, { "docid": "d27513a43d1ddfb5f083cb840ee46be9", "score": "0.5188695", "text": "func option3() {\n\tfmt.Print(\"Which method would you like to test\\n:\")\n\tvar i int\n\t_, err := fmt.Scanf(\"%d\", &i)\n\tif err != nil {\n\t\tfmt.Println(\"failed to retrieve data from scanner\")\n\t}\n\tmethodNum := i\n\t//here the method returned from the measureTaker method is stored in method, and can be called at a later time\n\tmethod := measureTaker(methodNum)\n\n\tfmt.Print(\"Enter the baseline array size\\n:\")\n\t_, err = fmt.Scanf(\"%d\", &i)\n\tif err != nil {\n\t\tfmt.Println(\"failed to retrieve data from scanner\")\n\t}\n\t//create array based on the baseline size\n\tm := i\n\tar := make([]int, m)\n\trandArray(ar, m)\n\n\tfmt.Print(\"Enter an array size to estimate\\n:\")\n\t_, err = fmt.Scanf(\"%d\", &i)\n\tif err != nil {\n\t\tfmt.Println(\"failed to retrieve data from scanner\")\n\t}\n\n\t//After we got both array sizes we can run the method we stored and pass in the array\n\t//store the runtime of the baseline in diff\n\tdiff := method(ar)\n\n\t//create array based on the experimental size\n\tn := i\n\tar = make([]int, n)\n\trandArray(ar, n)\n\n\t//create var to hold the float val of the estimated runtime\n\testimate := float64(0)\n\n\tswitch methodNum {\n\tcase 1:\n\t\testimate = calculate1(m, n, diff)\n\t\tbreak\n\tcase 2:\n\t\testimate = calculate2(m, n, diff)\n\t\tbreak\n\tcase 3:\n\t\testimate = calculate3(m, n, diff)\n\t\tbreak\n\tcase 4:\n\t\testimate = calculate4(m, n, diff)\n\t\tbreak\n\tdefault:\n\t\testimate = 0\n\t}\n\n\tfmt.Print(\"\\nThe expectied time for Method #\", methodNum, \" at array size \", n, \" \")\n\n\t//estimate is based on nanoseconds, thus simple calculations to refactor the prefix\n\tif estimate/math.Pow(10.0, 9.0) > 1 {\n\t\tfmt.Printf(\"is %.2f (s)\", estimate/math.Pow(10.0, 9.0))\n\t} else if estimate/math.Pow(10.0, 6.0) > 1 {\n\t\tfmt.Printf(\"is %.2f (ms)\", estimate/math.Pow(10.0, 6.0))\n\t} else if estimate/math.Pow(10.0, 3.0) > 1 {\n\t\tfmt.Printf(\"is %.2f (µs)\", estimate/math.Pow(10.0, 3.0))\n\t} else {\n\t\tfmt.Printf(\"is %.2f (ns)\", estimate/math.Pow(10.0, 3.0))\n\t}\n\tfmt.Print(\"\\n\\n\")\n\n\tmethod(ar)\n\n}", "title": "" }, { "docid": "48f8d5b58e87b5577fb07450c47f37c7", "score": "0.51602876", "text": "func run(input string) (interface{}, interface{}) {\n\n\tpart1, part2 := 0, 0\n\n\tm := twod.NewMapFromInput(input)\n\ttopLeft := m.FindTopLeft()\n\tfor vector, v := range m {\n\t\tm[vector] = pkg.MustAtoi(string(v.(int32)))\n\t}\n\n\t// Part 1\n\tvisibles := make(twod.Map)\n\tp := twod.NewPoint(m.FindTopLeft(), twod.DOWN)\n\tfor {\n\t\tp.TurnLeft()\n\t\tmovesInRow := 0\n\t\ttreeHeight := -1\n\t\tfor {\n\t\t\tcurrentPoint, exist := m[p.Pos]\n\t\t\tif !exist {\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tnextTreeHeight := currentPoint.(int)\n\t\t\tif nextTreeHeight > treeHeight {\n\t\t\t\tvisibles[p.Pos] = m[p.Pos]\n\t\t\t\ttreeHeight = nextTreeHeight\n\t\t\t}\n\t\t\tp.Move(1)\n\t\t\tmovesInRow++\n\t\t}\n\n\t\tp.Move(-movesInRow)\n\t\tp.TurnRight()\n\n\t\tp.Move(1)\n\t\t_, exist := m[p.Pos]\n\t\tif !exist {\n\t\t\tp.Move(-1)\n\t\t\tp.TurnLeft()\n\t\t\tif p.Pos == topLeft && p.Speed == twod.DOWN {\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\tpart1 = len(visibles)\n\n\t// Part 2\n\tscenicScores := make(twod.Map)\n\tfor pos, treeHeight := range m {\n\t\tdirScores := make(map[twod.Vector]int)\n\t\tfor _, dir := range twod.FourDirections {\n\t\t\tp := twod.NewPoint(pos, dir)\n\t\t\tfor {\n\t\t\t\tp.Move(1)\n\t\t\t\theight, exist := m[p.Pos]\n\t\t\t\tif !exist {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t\tdirScores[dir]++\n\t\t\t\tif treeHeight.(int) <= height.(int) {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tsum := 1\n\t\tif len(dirScores) != 4 {\n\t\t\tsum = 0\n\t\t}\n\t\tfor _, s := range dirScores {\n\t\t\tsum *= s\n\t\t}\n\t\tscenicScores[pos] = sum\n\t}\n\n\tfor _, score := range scenicScores {\n\t\tif score.(int) > part2 {\n\t\t\tpart2 = score.(int)\n\t\t}\n\t}\n\n\treturn part1, part2\n}", "title": "" }, { "docid": "056056762a4192ad9e2c0a00d847ed4a", "score": "0.515749", "text": "func (n *Node) Benchmark() {\n\tfor {\n\t\tDelay(1.5)\n\n\t\tn.AddTransactions(n.NewTransaction())\n\t}\n}", "title": "" }, { "docid": "08bca57fd67d959812ad39327961af4a", "score": "0.5148296", "text": "func main() {\n\tstart := time.Now()\n\tvar totalRequest = 50000\n\ttestWithWorker(totalRequest)\n\t//testSimple(totalRequest)\n\telapsed := time.Since(start)\n\tlog.Printf(\"Time taken %s for %d requests\", elapsed, totalRequest)\n}", "title": "" }, { "docid": "229cab965651ddeb11679f8996f61eb6", "score": "0.51351964", "text": "func (view *View) findPath(startViewX, startViewY, startViewZ, endViewX, endViewY, endViewZ, startWorldX, startWorldY, startWorldZ int, isFlying bool) []PathStep {\n\tview.resetPathFind()\n\tend := view.blockPos[endViewX][endViewY][endViewZ]\n\topenList := []*BlockPos{view.blockPos[startViewX][startViewY][startViewZ]}\n\tfor len(openList) > 0 {\n\t\t// Grab the lowest f(x) to process next\n\t\tlowInd := 0\n\t\tfor i := range openList {\n\t\t\tif openList[i].pathNode.f < openList[lowInd].pathNode.f {\n\t\t\t\tlowInd = i\n\t\t\t}\n\t\t}\n\n\t\tcurrentNode := openList[lowInd]\n\n\t\t// End case -- result has been found, return the traced path\n\t\tif currentNode.x == end.x && currentNode.y == end.y && currentNode.z == end.z {\n\t\t\treturn view.generatePath(currentNode)\n\t\t}\n\n\t\t// Normal case -- move currentNode from open to closed, process each of its neighbors\n\t\topenList = remove(openList, lowInd)\n\t\tcurrentNode.pathNode.closed = true\n\n\t\t// fmt.Printf(\"Processing: %d,%d,%d. List len=%d\\n\", currentNode.x, currentNode.y, currentNode.z, len(openList))\n\n\t\tneighbors := view.astarNeighbors(currentNode, startWorldX, startWorldY, startWorldZ, isFlying)\n\t\tfor _, neighbor := range neighbors {\n\t\t\t// process only valid nodes\n\t\t\tif !neighbor.pathNode.closed {\n\t\t\t\t// fmt.Printf(\"\\ttrying %d,%d,%d\\n\", neighbor.x, neighbor.y, neighbor.z)\n\t\t\t\t// g score is the shortest distance from start to current node, we need to check if\n\t\t\t\t// the path we have arrived at this neighbor is the shortest one we have seen yet\n\t\t\t\t// adding 1: 1 is the distance from a node to it's neighbor\n\t\t\t\tgScore := currentNode.pathNode.g + 1\n\t\t\t\tgScoreIsBest := false\n\n\t\t\t\tif !neighbor.pathNode.visited {\n\t\t\t\t\t// This the the first time we have arrived at this node, it must be the best\n\t\t\t\t\t// Also, we need to take the h (heuristic) score since we haven't done so yet\n\t\t\t\t\tgScoreIsBest = true\n\t\t\t\t\tneighbor.pathNode.h = heuristic(neighbor, end)\n\t\t\t\t\tneighbor.pathNode.visited = true\n\t\t\t\t\topenList = append(openList, neighbor)\n\t\t\t\t} else if gScore < neighbor.pathNode.g {\n\t\t\t\t\t// We have already seen the node, but last time it had a worse g (distance from start)\n\t\t\t\t\tgScoreIsBest = true\n\t\t\t\t}\n\n\t\t\t\tif gScoreIsBest {\n\t\t\t\t\t// Found an optimal (so far) path to this node. Store info on how we got here and\n\t\t\t\t\t// just how good it really is...\n\t\t\t\t\tneighbor.pathNode.parent = currentNode\n\t\t\t\t\tneighbor.pathNode.g = gScore\n\t\t\t\t\tneighbor.pathNode.f = neighbor.pathNode.g + neighbor.pathNode.h\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\t// No result was found -- nil signifies failure to find path\n\treturn nil\n}", "title": "" }, { "docid": "99ce82c2de66ec8e17f29bc29033ef33", "score": "0.5132517", "text": "func BenchmarkHammingDistance2x2G(b *testing.B) { bmHammingDistance(b, bytesx.HammingDistance, 1<<31) }", "title": "" }, { "docid": "fdeba43da681ca4b5f867a503439a98e", "score": "0.51311", "text": "func diskCachePerf(enabled bool) {\n\tif !enabled {\n\t\treturn\n\t}\n\ttestsSelected += 1\n\tfmt.Printf(\"Testing disk cache performance\\n\")\n\n\t// Create a small-ish temp file\n\tpath := \"temptestfile\"\n\tfh := createTestFile(path, 4*1024*1024)\n\n\t// Start by reading the entire file, just to make sure it's in the cache\n\treadfromWrapped(1024*1024, 4, fh, path)\n\n\t// Read in various chunk sizes\n\tchunkSizes := []int{1024, 4096, 16384, 65536, 4 * 65536}\n\tchunkTags := []string{\"1K\", \"4K\", \"16K\", \"64K\", \"256K\"}\n\tbytespersec := make([]int, len(chunkSizes))\n\n\tfor cs := 0; cs < len(chunkSizes); cs++ {\n\t\tbeginTime := time.Now()\n\t\tfmt.Printf(\"Doing %s reads...\", chunkTags[cs])\n\t\tchunkSize := chunkSizes[cs]\n\t\t_, err := fh.Seek(0, 0)\n\t\tif err != nil {\n\t\t\tlog.Fatalf(\"Couldn't seek to start %s: %s\\n\", path, err)\n\t\t}\n\n\t\t// Do a few reads to see how many make a second\n\t\t// (also to put data in cache)\n\t\tsmallIter := 128\n\t\tvar delta1 float64\n\t\tfor {\n\t\t\tdelta1 = readfromWrapped(chunkSize, smallIter, fh, path)\n\t\t\tif delta1 > 0.01 {\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tsmallIter = smallIter * 2\n\t\t}\n\n\t\t// Now do a bunch of reads\n\t\titer_1sec := int(float64(smallIter) / delta1)\n\t\tniter := 2 * iter_1sec\n\n\t\tdelta2 := readfromWrapped(chunkSize, niter-smallIter, fh, path)\n\n\t\tper_sec := int(float64(niter) / (delta1 + delta2))\n\t\tbytespersec[cs] = chunkSize * per_sec\n\t\tfmt.Printf(\"%d in %.2f sec\\n\", niter, elapsed(beginTime))\n\t}\n\n\tfh.Close()\n\terr := os.Remove(path)\n\tif err != nil {\n\t\tlog.Fatalf(\"Failed to delete %s: %s\\n\", path, err)\n\t}\n\n\t// Show results\n\tfor i := 0; i < len(chunkSizes); i++ {\n\t\tfmt.Printf(\"%s reads: %.2f MB/sec\\n\", chunkTags[i], float64(bytespersec[i])/(1024.0*1024.0))\n\t}\n}", "title": "" }, { "docid": "db2688265df3e6a2be42dffd1fcd67f3", "score": "0.5129977", "text": "func TestMaze(t *testing.T) {\n\ttestPath(`\nFX.X........\n.X...XXXX.X.\n.X.X.X....X.\n...X.X.XXXXX\n.XX..X.....T\n`, t, 27)\n}", "title": "" }, { "docid": "260d6e7f9ab3b761b9540f81e9829eed", "score": "0.5123044", "text": "func fastWalk(root string, walkFn func(path string, typ os.FileMode) error) error {\n\t// TODO(bradfitz): make numWorkers configurable? We used a\n\t// minimum of 4 to give the kernel more info about multiple\n\t// things we want, in hopes its I/O scheduling can take\n\t// advantage of that. Hopefully most are in cache. Maybe 4 is\n\t// even too low of a minimum. Profile more.\n\tnumWorkers := 4\n\tif n := runtime.NumCPU(); n > numWorkers {\n\t\tnumWorkers = n\n\t}\n\n\t// Make sure to wait for all workers to finish, otherwise\n\t// walkFn could still be called after returning. This Wait call\n\t// runs after close(e.donec) below.\n\tvar wg sync.WaitGroup\n\tdefer wg.Wait()\n\n\tw := &walker{\n\t\tfn: walkFn,\n\t\tenqueuec: make(chan walkItem, numWorkers), // buffered for performance\n\t\tworkc: make(chan walkItem, numWorkers), // buffered for performance\n\t\tdonec: make(chan struct{}),\n\n\t\t// buffered for correctness & not leaking goroutines:\n\t\tresc: make(chan error, numWorkers),\n\t}\n\tdefer close(w.donec)\n\n\tfor i := 0; i < numWorkers; i++ {\n\t\twg.Add(1)\n\t\tgo w.doWork(&wg)\n\t}\n\ttodo := []walkItem{{dir: root}}\n\tout := 0\n\tfor {\n\t\tworkc := w.workc\n\t\tvar workItem walkItem\n\t\tif len(todo) == 0 {\n\t\t\tworkc = nil\n\t\t} else {\n\t\t\tworkItem = todo[len(todo)-1]\n\t\t}\n\t\tselect {\n\t\tcase workc <- workItem:\n\t\t\ttodo = todo[:len(todo)-1]\n\t\t\tout++\n\t\tcase it := <-w.enqueuec:\n\t\t\ttodo = append(todo, it)\n\t\tcase err := <-w.resc:\n\t\t\tout--\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif out == 0 && len(todo) == 0 {\n\t\t\t\t// It's safe to quit here, as long as the buffered\n\t\t\t\t// enqueue channel isn't also readable, which might\n\t\t\t\t// happen if the worker sends both another unit of\n\t\t\t\t// work and its result before the other select was\n\t\t\t\t// scheduled and both w.resc and w.enqueuec were\n\t\t\t\t// readable.\n\t\t\t\tselect {\n\t\t\t\tcase it := <-w.enqueuec:\n\t\t\t\t\ttodo = append(todo, it)\n\t\t\t\tdefault:\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "fdff18d0989324af061349ab4807ea7e", "score": "0.51002485", "text": "func (proxies *proxies) adjustPaths(pc proxyChain, i int,\n ip *inefficientProxies) (int) {\n pname := pc[0]\n inDistance := len(pc) - 1\n distance := proxies.getDistance(pname)\n inefficient := -1\n if distance < inDistance {\n // inefficient\n proxy := (*proxies)[pname]\n if _, ok := proxy.children[pc[1]]; !ok {\n // it's only inefficient if it's\n // pointing to another proxy with greater\n // distance than the others it has.\n ip.proxies = append(ip.proxies, pname)\n inefficient = i\n }\n }\n if len(pc) > 1 {\n j := proxies.adjustPaths(pc[1:], i + 1, ip)\n if inefficient < 0 {\n inefficient = j\n }\n }\n return inefficient\n}", "title": "" }, { "docid": "c3d727908ea2fe5157c4f16f633f166f", "score": "0.5097052", "text": "func BenchmarkApproaches(b *testing.B) {\n\tctx := log.Testing(b)\n\n\tvar apis []*semantic.API\n\tvar mappings *semantic.Mappings\n\n\t// Time how long it takes to parse and resolve the APIs from source\n\tb.Run(\"Parse & Resolve\", func(b *testing.B) {\n\t\tfor i := 0; i < b.N; i++ {\n\t\t\tapis, mappings = resolveAPIs(ctx)\n\t\t}\n\t})\n\n\tvar data []byte\n\n\t// Time how long it takes to encode\n\tb.Run(\"Encode\", func(b *testing.B) {\n\t\tfor i := 0; i < b.N; i++ {\n\t\t\tvar err error\n\t\t\tdata, err = bapi.Encode(apis, mappings)\n\t\t\tcheck(err)\n\t\t}\n\t})\n\n\t// Time how long it takes to decode\n\tb.Run(\"Decode\", func(b *testing.B) {\n\t\tfor i := 0; i < b.N; i++ {\n\t\t\t_, _, err := bapi.Decode(data)\n\t\t\tcheck(err)\n\t\t}\n\t})\n\n\t// Compress using different compressors and measure the decompression time\n\tfor _, f := range compressors {\n\t\tb.Run(f.name, func(b *testing.B) {\n\t\t\tc := f.compress(data)\n\t\t\tb.Log(\"Compressed size: \", len(c))\n\t\t\tb.ResetTimer()\n\t\t\tfor i := 0; i < b.N; i++ {\n\t\t\t\tf.decompress(c)\n\t\t\t}\n\t\t})\n\t}\n}", "title": "" }, { "docid": "1b7336934a92f85f7d599b7a25ab5b24", "score": "0.5092489", "text": "func main() {\n\trawName := os.Args[1]\n\tbasepath := os.Args[2]\n\n\tqueue := make([]string,0)\n\tqueue = append(queue, rawName)\n\n\tseen := map[string]struct{}{\n\t\t\"stdafx\" : struct{}{},\n\t\t\"UnitTest\" : struct{}{},\n\t}\n\n\tfor len(queue) > 0 {\n\t\trawName = queue[0]\n\t\tqueue = queue[1:]\n\t\tif _, ok := seen[rawName]; !ok {\n\t\t\tseen[rawName] = struct{}{}\n\n\t\t\tfmt.Println(\"----\", rawName)\n\t\t\tpaths := getFullPath(rawName, basepath)\n\t\t\tfor _, pp := range paths {\n\t\t\t\tif (pp != \"\") {\n\t\t\t\t\tfmt.Println(\"--\", pp)\n\t\t\t\t\tscanFile(pp, &queue)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "e5eb0030cfba3cf552fef419431e0238", "score": "0.50861293", "text": "func testServiceSpeed(service gas.Service, n int, randomData [][]byte) (writeDuration, readDuration time.Duration, err error) {\n\tif n < 500 {\n\t\terr = fmt.Errorf(\"That test isn't worth running: n must be >= 500.\")\n\t\treturn\n\t}\n\n\t// s := len(randomData[0])\n\n\tb, err := service.GetBucket(\"test1\")\n\n\tif err != nil {\n\t\treturn\n\t}\n\n\tb.RemoveAllItems()\n\n\t// r = Number of items we will fetch at a time in read tests.\n\tr := n / 10\n\n\tif r > 500 {\n\t\tr = 500\n\t}\n\n\t// Number of fetch tests to run ( x2 - first and last )\n\tq := 1000\n\n\tstartWriteTime := time.Now()\n\tfor i := 0; i < n; i++ {\n\t\tb.PushItem(randomData[rand.Intn(len(randomData))])\n\t}\n\twriteDuration = time.Since(startWriteTime)\n\n\tstartReadTime := time.Now()\n\tfor i := 0; i < q; i++ {\n\t\t// Offset\n\t\to := i * (n / q)\n\t\t_, _ = b.GetFirstItems(r, o)\n\t\t_, _ = b.GetLastItems(r, o)\n\t}\n\n\treadDuration = time.Since(startReadTime)\n\n\tb.RemoveAllItems()\n\n\treturn\n}", "title": "" }, { "docid": "0f0039ccb58b3d9f9baac1ce31b8c09f", "score": "0.5085138", "text": "func main() {\n\n\tvar full string\n\tflag.StringVar(&full, \"full\", \"\", \"Whether or not to run a faster set of tests.\")\n\tflag.Parse()\n\n\tsmallByteSizes := []int{128, 256, 512}\n\tsmallByteLengths := []int{1000, 5000, 10000}\n\n\tlargeByteSizes := []int{1024}\n\tlargeByteLengths := []int{1000}\n\n\t// Temporary overrides\n\tif full == \"yes\" {\n\t\tfmt.Printf(\"Running shortened test suite ...\\n\")\n\t\tsmallByteSizes = []int{128, 256, 512}\n\t\tsmallByteLengths = []int{1000, 5000, 10000, 50000, 100000, 500000}\n\t\tlargeByteSizes = []int{1024, 2048, 4096}\n\t\tlargeByteLengths = []int{1000, 5000, 10000}\n\t} else {\n\t\tfmt.Printf(\"Running quick test suite - to run full test pass --full=yes\\n\")\n\t}\n\n\t_ = os.MkdirAll(\"gastest/file\", 0755)\n\t_ = os.MkdirAll(\"gastest/bfile\", 0755)\n\n\tbenchmarks := make([]Benchmark, 0)\n\n\tfileService, err := gas.NewService(\"file\", []string{\"gastest/file/\"}...)\n\n\tif err != nil {\n\t\tlog.Fatalf(\"Error creating file service: %s\", err)\n\t}\n\n\tbenchmarks = append(benchmarks, Benchmark{\n\t\tservice: fileService,\n\t\tdescription: \"File\",\n\t\ttests: make([]BenchmarkTest, 0),\n\t})\n\n\tbfileService, err := gas.NewService(\"bfile\", []string{\"gastest/bfile/\"}...)\n\n\tif err != nil {\n\t\tlog.Fatalf(\"Error creating bfile service: %s\", err)\n\t}\n\n\tbenchmarks = append(benchmarks, Benchmark{\n\t\tservice: bfileService,\n\t\tdescription: \"BFile\",\n\t\ttests: make([]BenchmarkTest, 0),\n\t})\n\n\tfor i, _ := range benchmarks {\n\t\t// Small byte tests up to 10,000,000 items.\n\t\tfor _, s := range smallByteSizes {\n\t\t\tfor _, l := range smallByteLengths {\n\t\t\t\tbenchmarks[i].tests = append(benchmarks[i].tests, BenchmarkTest{\n\t\t\t\t\tbytes: s,\n\t\t\t\t\tlength: l,\n\t\t\t\t})\n\t\t\t}\n\t\t}\n\n\t\t// Large byte tests up to 100,000 items.\n\t\tfor _, s := range largeByteSizes {\n\t\t\tfor _, l := range largeByteLengths {\n\t\t\t\tbenchmarks[i].tests = append(benchmarks[i].tests, BenchmarkTest{\n\t\t\t\t\tbytes: s,\n\t\t\t\t\tlength: l,\n\t\t\t\t})\n\t\t\t}\n\t\t}\n\t}\n\n\tfmt.Printf(\"Generating random data... \")\n\n\trandomData := make(map[int][][]byte)\n\n\tfor _, s := range []int{128, 256, 512, 1024, 2048, 4096} {\n\t\tfmt.Printf(\"%d ... \", s)\n\t\trandomData[s] = make([][]byte, 0)\n\t\tfor i := 0; i < 100; i++ {\n\t\t\trandomData[s] = append(randomData[s], generateBytes(s))\n\t\t}\n\t}\n\n\tfmt.Printf(\"done!\\n\")\n\n\tfmt.Printf(\"Running tests...\\n\")\n\n\tfor i, b := range benchmarks {\n\t\tfmt.Printf(\"\\nRunning Service Tests: %s\\n\", b.description)\n\n\t\tbenchmarks[i].readDuration = time.Since(time.Now())\n\t\tbenchmarks[i].writeDuration = time.Since(time.Now())\n\n\t\tfor j, t := range b.tests {\n\t\t\tfmt.Printf(\" -> %d Lines @ %d Bytes ... \", t.length, t.bytes)\n\t\t\tw, r, err := testServiceSpeed(b.service, t.length, randomData[t.bytes])\n\t\t\tif err != nil {\n\t\t\t\tlog.Fatal(err)\n\t\t\t}\n\t\t\tbenchmarks[i].tests[j].readDuration = r\n\t\t\tbenchmarks[i].tests[j].writeDuration = w\n\n\t\t\tbenchmarks[i].readDuration += r\n\t\t\tbenchmarks[i].writeDuration += w\n\n\t\t\tfmt.Printf(\"write: %s , read: %s\", benchmarks[i].tests[j].writeDuration, benchmarks[i].tests[j].readDuration)\n\n\t\t\tfmt.Printf(\"\\n\")\n\t\t}\n\t}\n\n\tfmt.Printf(\"\\n\")\n\n\tfor _, b := range benchmarks {\n\t\tfmt.Printf(\"%s Total write: %s , read: %s \\n\", b.description, b.writeDuration, b.readDuration)\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "88d7acce08e4d772b6f00bdf2b3b1e4e", "score": "0.5080941", "text": "func findTransfers(path1, path2 Path) int {\n\tfor step, planet := range path1.arr {\n\t\tif step2, ok := path2.hash[planet]; ok {\n\t\t\treturn step + step2\n\t\t}\n\t}\n\treturn 0\n}", "title": "" }, { "docid": "823267eff17521054a81ef8224be47f2", "score": "0.50808287", "text": "func CalculateCognitiveComplexity() {\n\n}", "title": "" }, { "docid": "bc9084a5703754fd8281410a086a4c10", "score": "0.5072921", "text": "func localSearch(a *Matrix, b *Matrix, p Vector, cost *int64) {\n\t// set of moves, numbered from 0 to index\n\tvar i, j, nMov int64\n\tn := p.Len()\n\tmove := make(Vector, n*(n-1)/2)\n\tnMov = 0\n\tfor i = 0; i < n-1; i++ {\n\t\tfor j = i + 1; j < n; j++ {\n\t\t\tmove[nMov] = n*i + j\n\t\t\tnMov++\n\t\t}\n\t}\n\timproved := true\n\tfor k := 0; k < 2 && improved; k++ {\n\t\timproved = false\n\t\tfor i = 0; i < nMov-1; i++ {\n\t\t\tmove.Swap(i, unif(i+1, nMov-1))\n\t\t}\n\t\tfor i = 0; i < nMov; i++ {\n\t\t\tr := move[i] / n\n\t\t\ts := move[i] % n\n\t\t\td := delta(a, b, p, r, s)\n\t\t\tif d < 0 {\n\t\t\t\t*cost += d\n\t\t\t\tp.Swap(r, s)\n\t\t\t\timproved = true\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "11e3ad45be01cccbec1a90d0d46a3cac", "score": "0.50658494", "text": "func TestCalculateNodeCost(t *testing.T) {\n\tfmt.Println(\"Testing node cost calculation method: 'calculateNodeCost'....\")\n\n\t//Arrange\n\ttestInputs := []aStarCalculateNodeCostMockInput{\n\t\t{StartWord: \"test\",\n\t\t\tEndWord: \"test\",\n\t\t\tResult: 0},\n\t\t{StartWord: \"test\",\n\t\t\tEndWord: \"best\",\n\t\t\tResult: 1},\n\t\t{StartWord: \"test\",\n\t\t\tEndWord: \"beat\",\n\t\t\tResult: 2},\n\t\t{StartWord: \"test\",\n\t\t\tEndWord: \"brat\",\n\t\t\tResult: 3},\n\t\t{StartWord: \"test\",\n\t\t\tEndWord: \"brag\",\n\t\t\tResult: 4},\n\t}\n\n\t//Loop through all test cases\n\tfor i, input := range testInputs {\n\t\tfmt.Print(\"Test \", i+1, \" of \", len(testInputs))\n\t\t//Act\n\t\tresult := calculateNodeCost(input.StartWord, input.EndWord)\n\n\t\t//Assert\n\t\tif input.Result != result {\n\t\t\tt.Error(\n\t\t\t\t\"Test number \", i+1, \"\\n\",\n\t\t\t\t\"Given the inputs:\\n\",\n\t\t\t\t\"start word = \", input.StartWord, \"\\n\",\n\t\t\t\t\"end word = \", input.EndWord, \"\\n\",\n\t\t\t\t\"Expected result to be:\\n\",\n\t\t\t\t\"Result = \", input.Result, \"\\n\",\n\t\t\t\t\"Actual result was:\\n\",\n\t\t\t\t\"Result = \", result, \"\\n\",\n\t\t\t)\n\t\t\tfmt.Println(\" - failed.\")\n\t\t} else {\n\t\t\tfmt.Println(\" - passed.\")\n\t\t}\n\t}\n\tfmt.Print(\"\\n\")\n}", "title": "" }, { "docid": "c9c626f1e0eac28389b11f84db89af3b", "score": "0.5054732", "text": "func doBenchmark(w, t uint, J, N uint) (deltaT time.Duration) {\n\t// build an array of N random-ish K-byte rawKeys\n\tK := uint(16)\n\trawKeys, bKeys := makeSomeUniqueKeys(N, K)\n\n\t// set up HAMT, ignoring any errors\n\tm, _ := gh.NewHAMT(w, t)\n\tdone := make([]chan bool, J)\n\tfor i := uint(0); i < J; i++ {\n\t\tdone[i] = make(chan bool)\n\t}\n\n\tt0 := time.Now()\n\tfor i := uint(0); i < N; i++ {\n\t\t_ = m.Insert(bKeys[i], &rawKeys[i])\n\t}\n\n\t// Verify several times that the rawKeys are present in the map.\n\tfor j := uint(0); j < J; j++ {\n\t\tgo func(j uint) {\n\t\t\tfor i := uint(0); i < N; i++ {\n\t\t\t\tvalue, err := m.Find(bKeys[i])\n\t\t\t\t// DEBUG\n\t\t\t\tif err != nil {\n\t\t\t\t\tfmt.Printf(\"error finding key %d\\n\", i, err.Error())\n\t\t\t\t}\n\t\t\t\tif value == nil {\n\t\t\t\t\tfmt.Printf(\"cannot find key %d\\n\", i)\n\t\t\t\t}\n\t\t\t\t// END\n\t\t\t\t//val := value.(*[]byte)\t// NOT USED\n\t\t\t\t_ = value\n\t\t\t}\n\t\t\tdone[j] <- true\n\t\t}(j)\n\t}\n\tfor j := uint(0); j < J; j++ {\n\t\t<-done[j]\n\t}\n\tt1 := time.Now()\n\tdeltaT = t1.Sub(t0)\n\treturn\n}", "title": "" }, { "docid": "6efca4cc222a5e3b0dd9179fac845013", "score": "0.50501704", "text": "func (grid *Grid) AStarSearch(source, dest Node) []Node {\n\tfnodeMap := map[Node]*fNode{}\n\topenList := binaryheap.NewWith(comparator)\n\n\tfnodeMap[dest] = &fNode{node: dest}\n\tfnodeMap[source] = &fNode{node: source, opened: true}\n\n\tpathlen := uint(0)\n\topenList.Push(fnodeMap[source])\n\n\tvar current *fNode\n\tfor {\n\t\tpopped, ok := openList.Pop()\n\t\tif !ok {\n\t\t\treturn nil\n\t\t}\n\t\tcurrent = popped.(*fNode)\n\n\t\tcurrent.closed = true\n\t\tif grid.Artist != nil {\n\t\t\tgrid.Artist.Paint(current.node, current.fCost, true, true)\n\t\t}\n\n\t\tif current.node == dest {\n\t\t\treturn makepath(current, pathlen)\n\t\t}\n\n\t\tpathlen = pathlen + 1\n\n\t\tneighbours := grid.nodeNeighbours(current.node)\n\t\tfor _, neighbour := range neighbours {\n\t\t\tfnode := fnodeMap[neighbour]\n\n\t\t\tif fnode == nil {\n\t\t\t\tfnode = &fNode{node: neighbour}\n\t\t\t\tfnodeMap[neighbour] = fnode\n\t\t\t}\n\n\t\t\tif fnode.closed {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\twasOpened := fnode.opened\n\t\t\tfnode.adjust(current, fnodeMap[dest])\n\t\t\tif !wasOpened {\n\t\t\t\topenList.Push(fnode)\n\t\t\t}\n\n\t\t\tif grid.Artist != nil {\n\t\t\t\tgrid.Artist.Paint(fnode.node, fnode.fCost, true, false)\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "14f644e067cf13ba0e29cc8d8554608a", "score": "0.5048058", "text": "func BenchmarkGetTestRoaring(b *testing.B) {\n\tb.StopTimer()\n\tr := rand.New(rand.NewSource(0))\n\tsz := 1000000\n\tinitsize := 50000\n\ts := roaring.NewBitmap()\n\tfor i := 0; i < initsize; i++ {\n\t\ts.Add(uint32(r.Int31n(int32(sz))))\n\t}\n\tb.StartTimer()\n\tfor i := 0; i < b.N; i++ {\n\t\ts.Contains(uint32(r.Int31n(int32(sz))))\n\t}\n}", "title": "" }, { "docid": "8c0d4f584783819deaa5bd688675cdc9", "score": "0.5043248", "text": "func Test() string {\n\tvar t int64 = 0 // the computation cost\n\tinitialize()\n\tindexEnc()\n\tqueryEnc(10000, 20000)\n\n\t// test the computation performance\n\tfor i := 0; i < 10; i++ {\n\t\tt1 := time.Now()\n\t\tsearch()\n\t\tt += time.Since(t1).Microseconds()\n\t}\n\n\treturn fmt.Sprintln(float64(t) / 10)\n}", "title": "" }, { "docid": "9832bb87665b983372319eddf5f535d8", "score": "0.50417376", "text": "func betteExhaustiveSearch(src, n int, dist [][]int) {\n\tfmt.Println(\"better exhaustive search, there are \", fac(n-1), \" paths to check\")\n\n\tvar path []int\n\tvar shortest int = math.MaxInt32\n\n\t// Fancy\n\tuiprogress.Start() // start rendering\n\tbar := uiprogress.AddBar(fac(n - 1)) // Add a new bar\n\n\t// optionally, append and prepend completion and elapsed time\n\tbar.AppendCompleted()\n\t// bar.PrependElapsed()\n\tbar.AppendElapsed()\n\n\t// Indices without/start/end\n\tleft := sliceWithoutSrc(src, n)\n\n\tfor perm := range permutations(left) {\n\t\tbar.Incr()\n\n\t\t// Make a path\n\t\ta := make([]int, n+1)\n\t\ta[0] = src\n\t\ta[n] = src\n\t\tk := 1\n\t\tfor i := 0; i < len(perm); i++ {\n\t\t\ta[k] = perm[i]\n\t\t\tk++\n\t\t}\n\n\t\t// Check it\n\t\td := calcPathDist(a, dist)\n\t\tif d < shortest {\n\t\t\tshortest = d\n\t\t\tpath = a\n\t\t}\n\n\t}\n\n\tfmt.Println(\"shortest path is \", path, \"len\", shortest)\n}", "title": "" }, { "docid": "f06bc450dd43e13ce805de0936c66540", "score": "0.50243413", "text": "func pathFinder(n, k int) int {\n\n\tif k > n {\n\t\tpanic(fmt.Sprintf(\"%v, %v\", n, k))\n\t}\n\tif k == 0 {\n\t\treturn 1\n\t}\n\tif k > n/2 {\n\t\treturn pathFinder(n, n-k)\n\t}\n\treturn n * pathFinder(n-1, k-1) / k\n}", "title": "" }, { "docid": "bea83790bbcd612d7ad9a5efbf7d4702", "score": "0.49996737", "text": "func TestAlgo(t *testing.T) {\n\tlat1, lon1 := 48.856614, 2.352222 //Paris\n\tlat2, lon2 := 43.710173, 7.261953 //Nice\n\n\tr := Distance(lat1, lon1, lat2, lon2)\n\n\tif r != 685872.0703773521 {\n\t\tt.Fail()\n\t}\n}", "title": "" }, { "docid": "b675efda30be7e4f00ebffbff9f1e681", "score": "0.4996685", "text": "func main() {\n\tt1 := time.Now()\n\truntime.GOMAXPROCS(runtime.NumCPU())\n\t// Perform the search for the specified term.\n\tsearch.Run(\"库里\")\n\telapsed := time.Since(t1)\n\tfmt.Println(\"App elapsed: \", elapsed)\n}", "title": "" }, { "docid": "a566063487fa02128d3540bca7980f05", "score": "0.49507973", "text": "func scan(roots []string, files []string) {\n\tvar hash uint64\n\tvar size int64\n\tvar s = [](*[]string){&files, &roots}\n\n\tfor _, fds := range s {\n\t\tfor k, path := range *fds {\n\t\t\tfi, err := os.Stat(path)\n\t\t\tif err != nil || fi == nil {\n\t\t\t\tfmt.Printf(\"fi=%#v, err=%v\\n\", fi, err)\n\t\t\t\tpanic(\"bad\")\n\t\t\t}\n\t\t\tprefix := \"\"\n\t\t\tidx := strings.LastIndex(path, \"/\")\n\t\t\tif idx != -1 {\n\t\t\t\tprefix = path[0:idx]\n\t\t\t}\n\t\t\tswitch {\n\t\t\tcase fi.Mode()&os.ModeDir == os.ModeDir:\n\t\t\t\tfis := []os.FileInfo{fi}\n\t\t\t\tif *dirf {\n\t\t\t\t\t//hash, size = addDir(dir, fi)\n\t\t\t\t\thash, size = descend(k, prefix, fis, nil, addDir)\n\t\t\t\t\t//add(hash, size, &kfe{prefix, size, hash})\n\t\t\t\t} else {\n\t\t\t\t\t//addDirs(path, fis)\n\t\t\t\t\thash, size = descend(k, prefix, fis, addFile, nil)\n\t\t\t\t}\n\t\t\t\t//fmt.Printf(\"scan: dir hash=0x%016x, path=%q, fi.Name()=%q\\n\\n\", hash, prefix, fi.Name())\n\t\t\tcase fi.Mode()&os.ModeType == 0:\n\t\t\t\tif *fr {\n\t\t\t\t\thash = readFullHash(prefix, fi)\n\t\t\t\t} else {\n\t\t\t\t\thash = readPartialHash(prefix, fi)\n\t\t\t\t}\n\t\t\t\tfmt.Printf(\"%016x %q\\n\", hash, path)\n\t\t\t\t//fmt.Printf(\"scan: file hash=0x%016x, path=%q, fi.Name()=%q\\n\\n\", hash, path, fi.Name())\n\t\t\t}\n\t\t\tif *dirf && *ps {\n\t\t\t\tfmt.Printf(\"# dir=%q, hash=0x%016x, files totaling %h\\n\", path, hash, hrff.Int64{size, \"B\"})\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "f6ae3367958e80d2629c5a3a9bda5c44", "score": "0.49436727", "text": "func (suite *AwardQueueSuite) Test_AwardTSPsInDifferentRateCycles() {\n\tt := suite.T()\n\tqueue := NewAwardQueue(suite.db, suite.logger)\n\n\ttwoMonths, _ := time.ParseDuration(\"2 months\")\n\ttwoMonthsLater := testdatagen.PerformancePeriodStart.Add(twoMonths)\n\n\ttdl, _ := testdatagen.MakeTDL(suite.db, testdatagen.DefaultSrcRateArea, testdatagen.DefaultDstRegion, \"2\")\n\n\t// Make Peak TSP and Shipment\n\ttspPeak, _ := testdatagen.MakeTSP(suite.db, testdatagen.RandomSCAC())\n\n\ttspPerfPeak := models.TransportationServiceProviderPerformance{\n\t\tPerformancePeriodStart: testdatagen.PerformancePeriodStart,\n\t\tPerformancePeriodEnd: testdatagen.PerformancePeriodEnd,\n\t\tRateCycleStart: testdatagen.PeakRateCycleStart,\n\t\tRateCycleEnd: testdatagen.PeakRateCycleEnd,\n\t\tTransportationServiceProviderID: tspPeak.ID,\n\t\tTrafficDistributionListID: tdl.ID,\n\t\tQualityBand: swag.Int(1),\n\t\tBestValueScore: 100,\n\t\tOfferCount: 0,\n\t}\n\t_, err := suite.db.ValidateAndSave(&tspPerfPeak)\n\tif err != nil {\n\t\tt.Error(err)\n\t}\n\n\tshipmentPeak := models.Shipment{\n\t\tTrafficDistributionListID: tdl.ID,\n\t\tPickupDate: testdatagen.DateInsidePeakRateCycle,\n\t\tRequestedPickupDate: testdatagen.DateInsidePeakRateCycle,\n\t\tDeliveryDate: twoMonthsLater,\n\t\tBookDate: testdatagen.PerformancePeriodStart,\n\t\tSourceGBLOC: testdatagen.DefaultSrcGBLOC,\n\t\tMarket: &testdatagen.DefaultMarket,\n\t}\n\t_, err = suite.db.ValidateAndSave(&shipmentPeak)\n\tif err != nil {\n\t\tt.Error(err)\n\t}\n\n\t// Make Non-Peak TSP and Shipment\n\ttspNonPeak, _ := testdatagen.MakeTSP(suite.db, \"NPEK\")\n\ttspPerfNonPeak := models.TransportationServiceProviderPerformance{\n\t\tPerformancePeriodStart: testdatagen.PerformancePeriodStart,\n\t\tPerformancePeriodEnd: testdatagen.PerformancePeriodEnd,\n\t\tRateCycleStart: testdatagen.NonPeakRateCycleStart,\n\t\tRateCycleEnd: testdatagen.NonPeakRateCycleEnd,\n\t\tTransportationServiceProviderID: tspNonPeak.ID,\n\t\tTrafficDistributionListID: tdl.ID,\n\t\tQualityBand: swag.Int(1),\n\t\tBestValueScore: 100,\n\t\tOfferCount: 0,\n\t}\n\t_, err = suite.db.ValidateAndSave(&tspPerfNonPeak)\n\tif err != nil {\n\t\tt.Error(err)\n\t}\n\n\tshipmentNonPeak := models.Shipment{\n\t\tTrafficDistributionListID: tdl.ID,\n\t\tPickupDate: testdatagen.DateInsideNonPeakRateCycle,\n\t\tRequestedPickupDate: testdatagen.DateInsideNonPeakRateCycle,\n\t\tDeliveryDate: twoMonthsLater,\n\t\tBookDate: testdatagen.PerformancePeriodStart,\n\t\tSourceGBLOC: testdatagen.DefaultSrcGBLOC,\n\t\tMarket: &testdatagen.DefaultMarket,\n\t}\n\t_, err = suite.db.ValidateAndSave(&shipmentNonPeak)\n\tif err != nil {\n\t\tt.Error(err)\n\t}\n\n\tqueue.assignShipments()\n\n\tsuite.verifyOfferCount(tspPeak, 1)\n\tsuite.verifyOfferCount(tspNonPeak, 1)\n}", "title": "" }, { "docid": "6d2ae1269524bc1ba9ada215cb603b61", "score": "0.49432105", "text": "func FindPath(start, goal types.Room) []types.Room {\n\t/*\n\t\tt1 := time.Now()\n\t\tdefer func() {\n\t\t\tlog.Println(\"Took %v to find a path from %v to %v in %s\\n\", time.Since(t1), start.GetLocation(), goal.GetLocation(), model.GetZone(start.GetZoneId()).GetName())\n\t\t}()\n\t*/\n\n\tevaluated := roomSet{}\n\n\tunevaluated := roomSet{}\n\tunevaluated[start] = true\n\n\tcameFrom := map[types.Room]types.Room{}\n\n\tg_score := map[types.Room]int{}\n\tg_score[start] = 0\n\n\tf_score := map[types.Room]int{}\n\tf_score[start] = costEstimate(start, goal)\n\n\tfor {\n\t\tif len(unevaluated) == 0 {\n\t\t\tbreak\n\t\t}\n\n\t\tcurrent := lowest(unevaluated, f_score)\n\t\tif current == goal {\n\t\t\treturn reconstruct(cameFrom, goal)\n\t\t}\n\n\t\tdelete(unevaluated, current)\n\t\tevaluated[current] = true\n\n\t\tneighbors := model.GetNeighbors(current)\n\n\t\tfor _, neighbor := range neighbors {\n\t\t\t_, found := evaluated[neighbor]\n\t\t\tif found {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\t_, found = g_score[neighbor]\n\t\t\tif !found {\n\t\t\t\tg_score[neighbor] = math.MaxInt32\n\t\t\t}\n\n\t\t\ttentative_g_score := g_score[current] + 1 // TODO - Update this when there is a travel penalty between rooms\n\n\t\t\t_, found = unevaluated[neighbor]\n\n\t\t\tif !found {\n\t\t\t\tunevaluated[neighbor] = true\n\t\t\t} else if tentative_g_score >= g_score[neighbor] {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tcameFrom[neighbor] = current\n\t\t\tg_score[neighbor] = tentative_g_score\n\t\t\tf_score[neighbor] = g_score[neighbor] + costEstimate(neighbor, goal)\n\t\t}\n\t}\n\n\treturn []types.Room{}\n}", "title": "" }, { "docid": "8700c60144c8de85d014d5b30f9f1090", "score": "0.49397704", "text": "func TestLDAHLI(t *testing.T) {\n\tcpu := MakeCore()\n\n\t// Console.WriteLine(\"Testing (0x2A) \\\"LDAHLI\\\"\")\n\tfor i := 0; i < RunCycles; i++ {\n\t\tcpu.Reset()\n\t\tcpu.Registers.Randomize()\n\t\tcpu.Memory.Randomize()\n\n\t\t// Force write to Catridge Ram Random Address (avoid writting to non writeable addresses)\n\t\tcpu.Registers.H = 0xA0\n\t\tcpu.Registers.L = uint8(rand.Intn(0xFF))\n\n\t\tvar val = uint8(rand.Intn(0xFF))\n\n\t\tcpu.Memory.WriteByte(cpu.Registers.HL(), val)\n\n\t\tRegBefore := cpu.Registers.Clone()\n\t\tGBInstructions[0x2A](cpu)\n\t\tRegAfter := cpu.Registers.Clone()\n\n\t\tif (val) != (RegAfter.A) {\n\t\t\tt.Errorf(\"Expected val to be %v but got %v\", val, RegAfter.A)\n\t\t}\n\t\tif (RegBefore.HL() + 1) != (RegAfter.HL()) {\n\t\t\tt.Errorf(\"Expected RegBefore.HL + 1 to be %v but got %v\", RegBefore.HL()+1, RegAfter.HL())\n\t\t}\n\n\t\t// region Test Cycles\n\t\tif RegAfter.LastClockT != 8 {\n\t\t\tt.Errorf(\"Expected LastClockT to be %d but got %d\", 8, RegAfter.LastClockT)\n\t\t}\n\t\tif RegAfter.LastClockM != 2 {\n\t\t\tt.Errorf(\"Expected LastClockM to be %d but got %d\", 2, RegAfter.LastClockM)\n\t\t}\n\t\t// endregion\n\n\t\t// region Test Flags\n\t\tif RegAfter.GetZero() != RegBefore.GetZero() {\n\t\t\tt.Errorf(\"Expected Flag Zero to not change\")\n\t\t}\n\t\tif RegAfter.GetSub() != RegBefore.GetSub() {\n\t\t\tt.Errorf(\"Expected Flag Sub to not change\")\n\t\t}\n\t\tif RegAfter.GetHalfCarry() != RegBefore.GetHalfCarry() {\n\t\t\tt.Errorf(\"Expected Flag Half Carry to not change\")\n\t\t}\n\t\tif RegAfter.GetCarry() != RegBefore.GetCarry() {\n\t\t\tt.Errorf(\"Expected Flag Carry to not change\")\n\t\t}\n\t\t// endregion\n\n\t}\n}", "title": "" }, { "docid": "db3db7fdf1d68a60386838cd345803eb", "score": "0.4930126", "text": "func main() {\n\tt1 := time.Now()\n\tdefer func() {\n\t\ttaken := time.Now().Sub(t1)\n\t\tfmt.Println(\"Time taken\", taken)\n\t}()\n\tsize := 100\n\tif len(os.Args) > 1 {\n\t\tsizeStr := os.Args[1]\n\t\tns, err := strconv.Atoi(sizeStr)\n\t\tif err == nil && ns > 0 {\n\t\t\tsize = ns\n\t\t}\n\t}\n\tsq := squares.New(size)\n\tch := make(chan string)\n\n\tgo sq.FindSumsOfSquares(ch)\n\tfor msg := range ch {\n\t\tfmt.Println(msg)\n\t}\n}", "title": "" }, { "docid": "4d5aa891b2d489e7b809fcce6b866630", "score": "0.4918043", "text": "func explore() {\n\t// the tree to store which points we already checked\n\ttree := trie.New()\n\t// the queue to plainify which points we want to check next\n\tqueue := make([]*point.Point, 0, 100)\n\n\tqueue = planify(tree, queue, point.New(0, 0))\n\n\tcount := 0\n\tfor len(queue) > 0 {\n\n\t\t// dequeue\n\t\tp := queue[0]\n\t\tqueue = queue[1:]\n\n\t\t// fmt.Println(\"Check \", p)\n\n\t\tif p.IsMine() {\n\t\t\tcount++\n\t\t} else {\n\t\t\tfor _, neighbour := range p.Neighbours() {\n\t\t\t\t// say hello to your neighbour\n\t\t\t\tqueue = planify(tree, queue, neighbour)\n\t\t\t}\n\t\t}\n\t}\n\n\tfmt.Println(\"Number of points Sandy can explore (including zero) :\", count)\n}", "title": "" }, { "docid": "ad51fbae35a186d5fce6fe6cb84e4dba", "score": "0.4913154", "text": "func bfs(board board, u unit, attackMap map[[2]int]uint, unitMap map[[2]int]*unit) (bool, [2]int) {\n\t_, okay := attackMap[u.pos]\n\tif okay && canAttack(u, u.pos, attackMap) {\n\t\treturn true, u.pos\n\t}\n\n\tvisited, parent := map[[2]int]bool{u.pos: true}, map[[2]int][2]int{}\n\tqueue, distance := [][2]int{u.pos}, map[[2]int]int{u.pos: 0}\n\tdecisions := [][2]int{}\n\tfor len(queue) > 0 {\n\t\ttask := queue[0]\n\t\t_, okay := attackMap[task]\n\t\tif okay && canAttack(u, task, attackMap) {\n\t\t\ttaskCopy := task\n\t\t\tfor parent[taskCopy] != u.pos {\n\t\t\t\ttaskCopy = parent[taskCopy]\n\t\t\t}\n\t\t\treturn true, taskCopy\n\t\t}\n\t\tqueue = queue[1:]\n\t\tfor i := 0; i < 4; i++ {\n\t\t\tnewPos := [2]int{task[0] + dirs[i][0], task[1] + dirs[i][1]}\n\t\t\tif (newPos[0] < 0) || (newPos[0] >= len(board)) || (newPos[1] < 0) || (newPos[1] >= len(board[0])) {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\t_, ok := unitMap[newPos]\n\t\t\tif ok || (board[newPos[0]][newPos[1]] == wall) || visited[newPos] {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tvisited[newPos], queue, parent[newPos] = true, append(queue, newPos), task\n\t\t\tdistance[newPos] = distance[task] + 1\n\t\t}\n\t}\n\tif len(decisions) > 0 {\n\t\treturn true, decisions[0]\n\t}\n\treturn false, [2]int{}\n}", "title": "" }, { "docid": "dec64673fcd179187aa493d910334085", "score": "0.49059963", "text": "func BenchmarkIntersectionPilosaInternal(b *testing.B) {\n\tb.StopTimer()\n\tr := rand.New(rand.NewSource(0))\n\ts1 := pilosaroaring.NewBitmap()\n\tsz := 150000\n\tinitsize := 65000\n\tfor i := 0; i < initsize; i++ {\n\t\ts1.Add(uint64(r.Int31n(int32(sz))))\n\t}\n\ts2 := pilosaroaring.NewBitmap()\n\tsz = 100000000\n\tinitsize = 65000\n\tfor i := 0; i < initsize; i++ {\n\t\ts2.Add(uint64(r.Int31n(int32(sz))))\n\t}\n\tb.StartTimer()\n\tcard := uint64(0)\n\tfor j := 0; j < b.N; j++ {\n\t\ts3 := s1.Intersect(s2)\n\t\tcard = card + s3.Count()\n\t}\n}", "title": "" }, { "docid": "b0b70f7e06dae6ec4dff3dd6e3a3bec3", "score": "0.4904511", "text": "func analysis(T, B, r, c int,conf *Config,wg *sync.WaitGroup, ch chan *State) {\n\n\tq := make(Queue, 0)\n\tinitial := NewState(r, c, 0, nil, conf.BoardData.Copy(),conf)\n\n\theap.Push(&q, initial)\n\tbestQ := make(Queue, 0)\n\n\tfor turn := 0; turn < T; turn++ {\n\n\t\tnq := make(Queue, 0)\n\t\tfor k := 0; k < B; k++ {\n\t\t\tif len(q) == 0 {\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tcur := q.Pop().(*State)\n\n\t\t\tcurR := cur.nowR\n\t\t\tcurC := cur.nowC\n\t\t\tcurRoute := cur.route\n\t\t\tcurG := cur.G\n\n\t\t\tfor i := 0; i < N; i++ {\n\n\t\t\t\tnr := curR + DR[i]\n\t\t\t\tnc := curC + DC[i]\n\n\t\t\t\tif nr < 0 || conf.Board.R <= nr || nc < 0 || conf.Board.C <= nc {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\tif len(curRoute) != 0 && ((curRoute[len(curRoute)-1]+N/2)%N) == i {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\tnsRoute := append(curRoute.Copy(), i)\n\t\t\t\ttG := curG.Copy()\n\t\t\t\ttG[curR][curC], tG[nr][nc] = tG[nr][nc], tG[curR][curC]\n\n\t\t\t\tns := NewState(nr, nc, turn+1, Route(nsRoute), tG,conf)\n\t\t\t\theap.Push(&nq, ns)\n\t\t\t}\n\t\t}\n\n\t\tq = nq\n\t\theap.Push(&bestQ, nq[0])\n\t}\n\n\tbest := bestQ.Pop().(*State)\n\tbest.startR = r\n\tbest.startC = c\n\n\tch <- best\n\twg.Done()\n}", "title": "" }, { "docid": "d500681b8da8b650796bcbde83777054", "score": "0.48953685", "text": "func analyzeFullBoard(board BoardB, output bool) int {\n\ttype position struct{ X, Y, Distance int }\n\tvar found []position\n\n\tfor j := maxY; j >= minY; j-- {\n\t\tfor i := maxX; i >= minX; i-- {\n\t\t\t//fmt.Printf(\" %v|%v=%b=%b=\",i,j,board[idx{i,j,0}],board[idx{i,j,1}])\n\t\t\tif i == j && j == 0 {\n\t\t\t\t// origin\n\t\t\t\tif output {\n\t\t\t\t\tfmt.Printf(\" 000 \")\n\t\t\t\t}\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif board[idx{i, j, 0}] != 0 && board[idx{i, j, 1}] != 0 {\n\t\t\t\t// crossover\n\t\t\t\tif output {\n\t\t\t\t\tfmt.Printf(\"-%3d-\", board[idx{i, j, 0}]+board[idx{i, j, 1}])\n\t\t\t\t}\n\t\t\t\t// fmt.Sprintf(\"i:%d j:%d sum:%d\\n\", i, j, board[idx{i, j, 0}]+board[idx{i, j, 1}]\n\t\t\t\tfound = append(found, position{X: i, Y: j, Distance: board[idx{i, j, 0}] + board[idx{i, j, 1}]})\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif board[idx{i, j, 0}] != 0 {\n\t\t\t\t// wire 0 is present\n\t\t\t\tif output {\n\t\t\t\t\tfmt.Printf(\"*%3d*\", board[idx{i, j, 0}])\n\t\t\t\t}\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif board[idx{i, j, 1}] != 0 {\n\t\t\t\t// wire 1 is present\n\t\t\t\tif output {\n\t\t\t\t\tfmt.Printf(\"#%3d#\", board[idx{i, j, 1}])\n\t\t\t\t}\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif output {\n\t\t\t\tfmt.Printf(\" \")\n\t\t\t}\n\t\t}\n\t\tif output {\n\t\t\tfmt.Print(\"\\n\")\n\t\t}\n\t}\n\n\t// now found is a set of intersection coordinates and the combined sum of the wires length\n\t// we need to range through the set and find the shortest length\n\n\tminDistance := 0\n\tfor _, elem := range found {\n\n\t\tif elem.Distance < minDistance || minDistance == 0 {\n\t\t\tminDistance = elem.Distance\n\t\t}\n\t}\n\n\tfmt.Printf(\"found:\\n%v\\n\", found)\n\n\treturn minDistance\n}", "title": "" }, { "docid": "cb316a1ca2dec15e354820a515b03632", "score": "0.48871642", "text": "func consistencyTest(A int, W int, n int, seed uint32, numOfKeys int, r *rand.Rand) (res bool) {\n\tres = true\n\tif W-n <= 0 || W+n > A {\n\t\tfmt.Println(\"wrong parameters entered!\")\n\t\tres = false\n\t\treturn\n\t}\n\tkeys := helpers.CreateStringSlice(\"key:\", 0, int(numOfKeys), \"\")\n\tinitialWorkingSet := helpers.CreateStringSlice(\"initialBucket:\", 0, W, \"\")\n\tcurrentWorkingSet := helpers.CreateStringSlice(\"initialBucket:\", 0, W, \"\") //TODO: not sure if i need to mange two diffrent slices or one . validate that the anchor create it's own copy\n\tactions := [2]string{\"AddResource\", \"RemoveResource\"} //TODO:find a way to make this an enum or const\n\tFirstAnchor, errFirst := anchorhash.NewHashWrapper(uint32(A), initialWorkingSet, seed)\n\tSecondAnchor, errSecond := anchorhash.NewHashWrapper(uint32(A), initialWorkingSet, seed)\n\t//error handling\n\tif errFirst != nil {\n\t\tfmt.Printf(\"error with FirstAnchor init\")\n\t\treturn\n\t}\n\tif errSecond != nil {\n\t\tfmt.Printf(\"error with SecondAnchor init\")\n\t\treturn\n\t}\n\tvar targetBucket string\n\tif !anchorIsConsistent(FirstAnchor, SecondAnchor, keys, true, \"\") {\n\t\tres = false\n\t\treturn res\n\t}\n\tfor i := 0; i < n; i++ {\n\t\tcurAction := ChooseAction(r, actions)\n\t\t//first anchor movement:\n\t\tif curAction == actions[0] { // curAction==AddResource\n\t\t\ttargetBucket = fmt.Sprintf(\"newBucketNum:%v\", i)\n\t\t\tFirstAnchor.AddResource(targetBucket)\n\t\t} else { // curAction==RemoveResource\n\t\t\ttargetBucket = ChooseBucketToRemove(r, currentWorkingSet, i)\n\t\t\tFirstAnchor.RemoveResource(targetBucket)\n\t\t}\n\t\t//fmt.Println(\"iter\", i, \"action :\", curAction, \"on FirstAnchor :\", \"targetbucket\", targetBucket)\n\t\t//anchorComparePrint(FirstAnchor, SecondAnchor, keys, targetBucket)\n\t\tif !anchorIsConsistent(FirstAnchor, SecondAnchor, keys, false, targetBucket) {\n\t\t\tres = false\n\t\t\tbreak\n\t\t}\n\t\t//second anchor movement:\n\t\tif curAction == actions[0] { // curAction==AddResource\n\t\t\tSecondAnchor.AddResource(targetBucket)\n\t\t\tcurrentWorkingSet = append(currentWorkingSet, targetBucket)\n\t\t} else { // curAction==RemoveResource\n\t\t\tSecondAnchor.RemoveResource(targetBucket)\n\t\t\tremoveBucketFromSlice(currentWorkingSet, targetBucket)\n\t\t}\n\t\t//fmt.Println(\"iter\", i, \"action :\", curAction, \"on SecondAnchor :\", \"targetbucket\", targetBucket)\n\t\t//anchorComparePrint(FirstAnchor, SecondAnchor, keys, targetBucket)\n\t\tif !anchorIsConsistent(FirstAnchor, SecondAnchor, keys, true, targetBucket) {\n\t\t\tres = false\n\t\t\tbreak\n\t\t}\n\t}\n\treturn res\n}", "title": "" }, { "docid": "3a3eee6ba09eca97daf631f10c43979a", "score": "0.48871416", "text": "func isReachable(u Unit, target Point, grid [][]rune) (bool, []PointDist) {\n\tempty := Point{-1, -1}\n\tstart := u.loc\n\tstartDist := &PointDist{start, 0, empty, nil}\n\tvisited := make(map[Point]struct{}) // set\n\tqueue := []*PointDist{startDist}\n\n\tvar paths []PointDist\n\n\tfor len(queue) != 0 {\n\t\t// dequeue\n\t\tp := queue[0]\n\t\tqueue = queue[1:]\n\n\t\tvisited[p.point] = struct{}{}\n\n\t\tnext := adj(p.point, grid)\n\t\tfor _, n := range next {\n\t\t\tif _, ok := visited[n]; !ok {\n\t\t\t\tvisited[n] = struct{}{}\n\n\t\t\t\tpd := &PointDist{n, p.dist + 1, empty, nil}\n\t\t\t\t// increment the path\n\t\t\t\tpd.path = append(p.path, p.point)\n\n\t\t\t\tqueue = append(queue, pd)\n\t\t\t}\n\t\t}\n\n\t\t// is p the target destination\n\t\tif p.point.X == target.X && p.point.Y == target.Y {\n\t\t\tp.path = append(p.path, target)\n\t\t\tp.step = p.path[1]\n\n\t\t\t// return true, *p\n\t\t\tpaths = append(paths, *p)\n\t\t}\n\t}\n\n\treturn len(paths) != 0, paths\n}", "title": "" }, { "docid": "2816193ba32239a95f3806010b38c06e", "score": "0.48823196", "text": "func benchNonComplexStore(createRuleStore ruleStoreCreator, b *testing.B) {\n\ttmpDir := testutil.TempDir()\n\tdefer os.RemoveAll(tmpDir)\n\n\t// create rule store\n\tstore := createRuleStore()\n\n\tprintMemUsage(\"before load\", b)\n\n\tlists := []*config.GudgeonList{\n\t\t{Name: \"Block1\", Type: \"block\"},\n\t\t{Name: \"Block2\", Type: \"block\"},\n\t\t{Name: \"Block3\", Type: \"block\"},\n\t\t{Name: \"Allow1\", Type: \"allow\"},\n\t\t{Name: \"Allow2\", Type: \"allow\"},\n\t\t{Name: \"Allow3\", Type: \"allow\"},\n\t}\n\tfor _, list := range lists {\n\t\tlist.VerifyAndInit()\n\t}\n\n\tstore.Init(tmpDir, nil, lists)\n\n\t// create rules\n\tqueryData := make([]string, 100)\n\tfor idx := 0; idx < benchRules; idx++ {\n\t\ttestDomain := testutil.RandomDomain()\n\t\tstore.Load(lists[idx%6], testDomain)\n\t\tif idx < len(queryData) {\n\t\t\tqueryData[idx] = testDomain\n\t\t}\n\t}\n\n\tstore.Finalize(tmpDir, lists)\n\n\truntime.GC()\n\tprintMemUsage(\"after load\", b)\n\n\t// start timer\n\tb.ResetTimer()\n\tb.ReportAllocs()\n\n\t// benchmark query\n\tfor i := 0; i < b.N; i++ {\n\t\tstore.FindMatch(lists, queryData[i%len(queryData)])\n\t}\n\n\t// after test print memory usage too\n\truntime.GC()\n\tprintMemUsage(\"after test\", b)\n}", "title": "" }, { "docid": "429a4e805658c3acfe201493db6678ba", "score": "0.4880837", "text": "func nextStarCost(inputs formData, level int) *big.Rat {\n\tequipLevel := inputs.Level\n\trCost := inputs.rCost\n\tevents := inputs.events\n\tvar costs = m[equipLevel]\n\tif events[0] == \"on\" {\n\t\tfor i := 0; i < 15; i++ {\n\t\t\ttemp := int64(float64(costs[i]) * .7)\n\t\t\tcosts[i] = temp\n\t\t}\n\t}\n\ti := level - 10\n\tvar fail = pr.Fail\n\tvar boom = pr.Destroy\n\tvar success = pr.Success\n\tif events[1] == \"on\" {\n\t\tfor i := 0; i < 5; i++ {\n\t\t\tfail[i] += boom[i]\n\t\t\tboom[i] = 0\n\t\t}\n\t}\n\tif events[2] == \"on\" {\n\t\tfor i := 0; i < 10; i += 5 {\n\t\t\tsuccess[i] = 1000\n\t\t\tfail[i] = 0\n\t\t\tboom[i] = 0\n\t\t}\n\t}\n\tfor i := 0; i < 5; i++ {\n\t\tif inputs.Safeguards[i] == \"on\" {\n\t\t\tfail[i+2] += boom[i+2]\n\t\t\tboom[i+2] = 0\n\t\t\tcosts[i+2] = 2 * costs[i+2]\n\t\t}\n\t}\n\tif val, ok := nextCosts[level]; ok {\n\t\treturn val\n\t}\n\n\tcost := costs[i]\n\tpCost := func() int64 {\n\t\tif level < 11 {\n\t\t\treturn 0\n\t\t} else {\n\t\t\treturn costs[i-1]\n\t\t}\n\t}()\n\tppCost := func() int64 {\n\t\tif level < 12 {\n\t\t\treturn 0\n\t\t} else {\n\t\t\treturn costs[i-2]\n\t\t}\n\t}()\n\texpAtmpts := big.NewRat(1000, success[i])\n\texpCost := new(big.Rat)\n\texpCost.Mul(big.NewRat(cost, 1), expAtmpts)\n\n\treplacement := new(big.Rat)\n\n\tif level == 10 {\n\t\tnextCosts[level] = expCost\n\t\treturn expCost\n\t}\n\n\tfailRatio := big.NewRat(fail[i], success[i])\n\n\tif level == 11 {\n\t\ttemp := nextStarCost(inputs, level-1)\n\t\texpCost.Add(expCost, failRatio.Mul(failRatio, temp))\n\t\tnextCosts[level] = expCost\n\t\treturn expCost\n\t}\n\n\tdblFailRatio := big.NewRat(fail[i]*fail[level-11], success[i]*1000)\n\tdblFailCost := new(big.Rat)\n\n\tif level == 12 {\n\t\ttemp := nextStarCost(inputs, level-1)\n\t\tdblFailCost.Add(big.NewRat(ppCost, 1), temp)\n\t\tdblFailCost.Mul(dblFailRatio, dblFailCost)\n\t\tfailRatio.Mul(failRatio, big.NewRat(pCost, 1))\n\t\texpCost.Add(expCost, dblFailCost)\n\t\texpCost.Add(expCost, failRatio)\n\t\treplacement.Mul(big.NewRat(boom[i], success[i]), big.NewRat(rCost, 1))\n\t\texpCost.Add(expCost, replacement)\n\t\tnextCosts[level] = expCost\n\t\treturn expCost\n\t}\n\n\texpPrevCost := new(big.Rat)\n\texpPrevCost.Set(nextStarCost(inputs, level-1))\n\tdblFailCost.Mul(dblFailRatio, big.NewRat(ppCost, 1))\n\n\tboomAtmpts := big.NewRat(boom[i], 1000)\n\tboomAtmpts.Mul(boomAtmpts, expAtmpts)\n\n\treplacement.Mul(failRatio, big.NewRat(boom[i-1], 1000))\n\treplacement.Add(replacement, big.NewRat(boom[i], success[i]))\n\treplacement.Mul(big.NewRat(rCost, 1), replacement)\n\n\tif level == 13 {\n\t\tnoSuccess := big.NewRat(1000-success[i-1], 1000)\n\t\tnoSuccess.Mul(failRatio, noSuccess)\n\t\tnoSuccess.Add(noSuccess, boomAtmpts)\n\t\texpPrevCost.Mul(expPrevCost, noSuccess)\n\t\tfailRatio.Mul(failRatio, big.NewRat(pCost, 1))\n\t\texpCost.Add(expCost, dblFailCost)\n\t\texpCost.Add(expCost, failRatio)\n\t\texpCost.Add(expCost, expPrevCost)\n\t\texpCost.Add(expCost, replacement)\n\t\tnextCosts[level] = expCost\n\t\treturn expCost\n\t}\n\n\treturnCost := big.NewRat(0, 1)\n\tfor i := 12; i < level; i++ {\n\t\treturnCost.Add(returnCost, nextStarCost(inputs, i))\n\t}\n\n\tif isGeneralCase(level) {\n\t\tdblFailCost2 := new(big.Rat)\n\t\tdblFailCost2.Mul(dblFailRatio, expPrevCost)\n\t\tfCost := new(big.Rat)\n\t\tfCost.Mul(failRatio, big.NewRat(pCost, 1))\n\t\tfailRatio.Mul(failRatio, big.NewRat(boom[i-1], 1000))\n\t\tboomAtmpts.Add(failRatio, boomAtmpts)\n\t\treturnCost.Mul(boomAtmpts, returnCost)\n\t\texpCost.Add(expCost, fCost)\n\t\tif level < 17 && inputs.Safeguards[level-12] == \"on\" {\n\t\t\tdblFailCost.Mul(dblFailCost, big.NewRat(1, 2))\n\t\t}\n\t\texpCost.Add(expCost, dblFailCost)\n\t\texpCost.Add(expCost, dblFailCost2)\n\t\texpCost.Add(expCost, returnCost)\n\t\texpCost.Add(expCost, replacement)\n\t\tnextCosts[level] = expCost\n\t\treturn expCost\n\t}\n\n\tif level == 15 || level == 20 {\n\t\treplacement.Mul(big.NewRat(boom[i], success[i]), big.NewRat(rCost, 1))\n\t\treturnCost.Mul(returnCost, big.NewRat(boom[i], 1000))\n\t\treturnCost.Mul(returnCost, big.NewRat(1000, success[i]))\n\t\texpCost.Add(returnCost, expCost)\n\t\texpCost.Add(replacement, expCost)\n\t\tnextCosts[level] = expCost\n\t\treturn expCost\n\t}\n\n\tif level == 16 || level == 21 {\n\t\treplacement.Mul(big.NewRat(boom[i], success[i]), big.NewRat(rCost, 1))\n\t\treturnCost.Mul(returnCost, boomAtmpts)\n\t\tfailRatio.Mul(failRatio, nextStarCost(inputs, level-1))\n\t\texpCost.Add(expCost, returnCost)\n\t\texpCost.Add(expCost, failRatio)\n\t\texpCost.Add(expCost, replacement)\n\t\tnextCosts[level] = expCost\n\t\treturn expCost\n\t}\n\n\treturn expCost\n}", "title": "" }, { "docid": "294f13d31e1f2c4c14f44e9d0421b830", "score": "0.48771513", "text": "func starTwo(indices []int, buses map[int]int) {\n\tt := 0\n\tn1 := buses[0]\n\n\tfor _, i := range indices {\n\t\tvar j int\n\n\t\tfor {\n\t\t\tj++\n\t\t\tjin := t + j*n1\n\n\t\t\ttest := (jin + i) % buses[i]\n\t\t\tif test != 0 {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tt = jin\n\t\t\tn1 = n1 * buses[i]\n\t\t\tbreak\n\t\t}\n\t}\n\n\tfmt.Printf(\"Star two: %d\\n\", t)\n}", "title": "" }, { "docid": "cee8ad901987bdc30c71e831383673f0", "score": "0.4866449", "text": "func TestDAA(t *testing.T) {\n\tcpu := MakeCore()\n\n\t// Console.WriteLine(\"Testing (0x27) \\\"DAA\\\"\")\n\tfor i := 0; i < RunCycles; i++ {\n\t\tcpu.Reset()\n\t\tcpu.Registers.Randomize()\n\t\tcpu.Memory.Randomize()\n\n\t\tRegBefore := cpu.Registers.Clone()\n\t\tGBInstructions[0x27](cpu)\n\t\tRegAfter := cpu.Registers.Clone()\n\n\t\tcorrection := int(0)\n\t\ta := int(RegBefore.A)\n\n\t\tif RegBefore.GetCarry() {\n\t\t\tcorrection = 0x60\n\t\t}\n\n\t\tif RegBefore.GetHalfCarry() || (!RegBefore.GetSub() && ((a & 0x0F) > 9)) {\n\t\t\tcorrection |= 0x06\n\t\t}\n\n\t\tif RegBefore.GetCarry() || (!RegBefore.GetSub() && (a > 0x99)) {\n\t\t\tcorrection |= 0x60\n\t\t}\n\n\t\tif RegBefore.GetSub() {\n\t\t\ta -= correction\n\t\t} else {\n\t\t\ta += correction\n\t\t}\n\n\t\texpectedA := uint8(a)\n\t\texpectedZero := expectedA == 0\n\t\texpectedCarry := RegBefore.GetCarry()\n\n\t\tif (correction<<2)&0x100 != 0 {\n\t\t\texpectedCarry = true\n\t\t}\n\n\t\tif (expectedCarry) != (RegAfter.GetCarry()) {\n\t\t\tt.Errorf(\"Expected carry to be %v but got %v\", expectedCarry, RegAfter.GetCarry())\n\t\t}\n\t\tif (expectedZero) != (RegAfter.GetZero()) {\n\t\t\tt.Errorf(\"Expected zero to be %v but got %v\", expectedZero, RegAfter.GetZero())\n\t\t}\n\t\tif expectedA != (RegAfter.A) {\n\t\t\tt.Errorf(\"Expected a & 0xFF to be %v but got %v\", expectedA&0xFF, RegAfter.A)\n\t\t}\n\n\t\t// region Test Cycles\n\t\tif RegAfter.LastClockT != 4 {\n\t\t\tt.Errorf(\"Expected LastClockT to be %d but got %d\", 4, RegAfter.LastClockT)\n\t\t}\n\t\tif RegAfter.LastClockM != 1 {\n\t\t\tt.Errorf(\"Expected LastClockM to be %d but got %d\", 1, RegAfter.LastClockM)\n\t\t}\n\t\t// endregion\n\n\t\t// region Test Flags\n\t\tif RegAfter.GetSub() != RegBefore.GetSub() {\n\t\t\tt.Errorf(\"Expected Flag Sub to not change\")\n\t\t}\n\t\tif RegAfter.GetHalfCarry() {\n\t\t\tt.Errorf(\"Expected Flag Half Carry to be zero\")\n\t\t}\n\t\t// endregion\n\n\t}\n}", "title": "" }, { "docid": "5c99b99c42d2187969a8377221f49254", "score": "0.4865919", "text": "func BenchmarkSGD(b *testing.B) {\n b.StopTimer()\n cd := new(sgd.ClickData)\n\n cd.LoadData(\"../resources/click/train.txt\", \"train\")\n cd.InitWeights()\n\n NCPU := runtime.GOMAXPROCS(-1)\n fmt.Println(\"Using :\", NCPU)\n\n b.N = 3 // number of iterations\n b.StartTimer()\n for i := 0; i < b.N; i++ {\n cd.Fit(ETA, NCPU)\n }\n}", "title": "" }, { "docid": "bee706a603479741d5a203da9ae61025", "score": "0.48545867", "text": "func Main() {\n\tfmt.Fprintln(os.Stdout, \"coverage\\tinsert_mean\\tinsert_sd\\tinsert_5th\\tinsert_95th\\ttemplate_mean\\ttemplate_sd\\tpct_unmapped\\tpct_bad_reads\\tpct_duplicate\\tpct_proper_pair\\tread_length\\tbam\\tsample\")\n\n\targ.MustParse(&cli)\n\tfor _, bamPath := range cli.Bams {\n\n\t\tbrdr, err := shared.NewReader(bamPath, 2, cli.Fasta)\n\t\tpcheck(err)\n\n\t\tnames := strings.Join(samplename.Names(brdr.Header()), \",\")\n\t\tif names == \"\" {\n\t\t\tnames = \"<no-read-groups>\"\n\t\t}\n\n\t\tvar idx *bam.Index\n\n\t\tif strings.HasSuffix(bamPath, \".bam\") {\n\n\t\t\tifh, ierr := os.Open(bamPath + \".bai\")\n\t\t\tif ierr != nil {\n\t\t\t\t// if .bam.bai didn't exist, check .bai\n\t\t\t\tifh, err = os.Open(bamPath[:len(bamPath)-4] + \".bai\")\n\t\t\t}\n\t\t\tpcheck(err)\n\n\t\t\tidx, err = bam.ReadIndex(ifh)\n\t\t\tpcheck(err)\n\t\t}\n\n\t\tgenomeBases := 0\n\t\tmapped := uint64(0)\n\t\tsizes := BamStats(brdr, cli.N, skipReads)\n\t\tvar notFound []string\n\t\tfor _, ref := range brdr.Header().Refs() {\n\t\t\tgenomeBases += ref.Len()\n\t\t\tif idx != nil {\n\t\t\t\tstats, ok := idx.ReferenceStats(ref.ID())\n\t\t\t\tif !ok {\n\t\t\t\t\tif !strings.Contains(ref.Name(), \"random\") && ref.Len() > 10000 {\n\t\t\t\t\t\tnotFound = append(notFound, ref.Name())\n\t\t\t\t\t}\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tmapped += stats.Mapped\n\t\t\t}\n\t\t}\n\t\tif len(notFound) > 0 {\n\t\t\tfmt.Fprintf(os.Stderr, \"chromosomes: %s not found in %s\\n\", strings.Join(notFound, \",\"), bamPath)\n\t\t}\n\t\tif cli.Regions != \"\" {\n\t\t\tgenomeBases = readCoverage(cli.Regions)\n\t\t}\n\n\t\t// TODO: check that reads are from coverage regions.\n\t\tcoverage := (1 - sizes.ProportionBad) * float64(mapped) * sizes.ReadLengthMean / float64(genomeBases)\n\n\t\tfmt.Fprintf(os.Stdout, \"%.2f\\t%s\\t%.2f\\t%.1f\\t%.1f\\t%.1f\\t%d\\t%s\\t%s\\n\", coverage, sizes.String(), 100*sizes.ProportionUnmapped,\n\t\t\t100*sizes.ProportionBad,\n\t\t\t100*sizes.ProportionDuplicate,\n\t\t\t100*sizes.ProportionProperlyPaired,\n\t\t\tsizes.MaxReadLength, bamPath, names)\n\t}\n}", "title": "" }, { "docid": "6cc1b9d0cfd3084c7e6209c95a0014d5", "score": "0.4850995", "text": "func findPath(db *leveldb.DB, roothash string, path string, storagepath []string, consumed int) (string, error) {\n\n\t//key consumed\n\tif len(path) == 0 {\n\t\treturn \"\", errors.New(\"consumed\")\n\t}\n\n\t// get node from db\n\tquerynode, err := db.Get(stringtohash(roothash).bytes(), nil)\n\tif err != nil {\n\t\treturn \"\", err;\n\t}else {\n\n\t\t// compare to storagepath\n\t\tif hex.EncodeToString(querynode) != storagepath[0] {\n\t\t\treturn \"\", errors.New(\"No exists(differ from path), in depth\" + strconv.FormatInt(int64(consumed), 10) + \", querying\"+ roothash)\n\t\t}\n\n\t\tnode := rlp.Unserialize(querynode)\n\n\t\tswitch node.Length() {\n\t\t\tcase SHORTNODE: {\n\t\t\t\tfirstvar, secondvar := node.Get(0).AsString(), node.Get(1).AsString()\n\n\t\t\t\t//end of proofpath\n\t\t\t\tif len(storagepath) == 1 {\n\t\t\t\t\tif path != firstvar[consumed:] {\n\t\t\t\t\t\treturn \"\", errors.New(\"No exists(no this branch), in depth\" + strconv.FormatInt(int64(consumed), 10) + \", querying\"+ roothash)\n\t\t\t\t\t}\n\t\t\t\t\treturn secondvar, nil\n\t\t\t\t}\n\n\t\t\t\t//compare prefix of the path with node[0]\n\t\t\t\tfirstvarlen := len(firstvar)\n\t\t\t\tif (firstvarlen > len(path)) || (firstvar != path[0:firstvarlen]) {\n\t\t\t\t\treturn \"\", errors.New(\"No exists(no this branch), in depth\" + strconv.FormatInt(int64(consumed), 10) + \", querying\"+ roothash)\n\t\t\t\t}\n\n\t\t\t\treturn findPath(db, secondvar, path[firstvarlen: ], storagepath[1 : ], consumed + firstvarlen)\n\t\t\t}\n\t\t\tcase FULLNODE: {\n\t\t\t\ttryquery := node.Get(int(hexmaps[path[0]])).AsString()\n\n\t\t\t\tif len(tryquery) == HASHSTRINGLENGTH {\n\t\t\t\t\treturn findPath(db, tryquery, path[1 : ], storagepath[1 : ], consumed + 1)\n\t\t\t\t}else {\n\t\t\t\t\treturn \"\", errors.New(\"No exists, in depth\" + strconv.FormatInt(int64(consumed), 10) + \", querying\"+ roothash)\n\t\t\t\t}\n\t\t\t}\n\t\t\tdefault: {\n\t\t\t\treturn \"\", errors.New(\"Unknown node types\")\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "9ca0b1ae9152b4697230f5506f920e63", "score": "0.4844676", "text": "func calculateNodeCost(s, e string) int {\n\t//The maximum result will be if every letter is different in the two words (steps would be length).\n\tresult := len(s)\n\t//length of the word starting from index 0\n\twordLength := result - 1\n\n\t//For each letter in the word check if they match. If they are minus 1 required step from path cost result.\n\tfor i := 0; i <= wordLength; i++ {\n\t\tif s[i] == e[i] {\n\t\t\tresult = result - 1\n\t\t}\n\t}\n\n\treturn result\n}", "title": "" }, { "docid": "855be279c7604cc9d6e394fab331bad5", "score": "0.48336503", "text": "func treeTransfersBenchmark(b *testing.B) {\r\n\tctx := test.Context\r\n\r\n\tif err := resetTest(ctx); err != nil {\r\n\t\tb.Fatalf(\"\\t%s\\tFailed to reset test : %v\", tests.Failed, err)\r\n\t}\r\n\tmockUpContract(b, ctx, \"Test Contract\", \"I\",\r\n\t\t1, \"John Bitcoin\", true, true, false, false, false)\r\n\r\n\tlevels := uint(1)\r\n\tnodes := (1 << levels) - 1\r\n\tfor nodes < b.N {\r\n\t\tlevels++\r\n\t\tnodes = (1 << levels) - 1\r\n\t}\r\n\t// fmt.Printf(\"Using %d tree levels for %d transfers\\n\", levels, nodes)\r\n\r\n\tmockUpAsset(b, ctx, true, true, true, uint64(nodes)*2, 0, &sampleAssetPayload, true, false, false)\r\n\r\n\trequests, _ := splitTransferRecurse(b, ctx, issuerKey, uint64(nodes)*2, levels)\r\n\thashes := make([]*bitcoin.Hash32, 0, nodes)\r\n\tfor _, request := range requests {\r\n\t\thash := request.Tx.TxHash()\r\n\t\thashes = append(hashes, hash)\r\n\t}\r\n\r\n\ttest.NodeConfig.PreprocessThreads = 4\r\n\r\n\ttracer := filters.NewTracer()\r\n\ttest.Scheduler = &scheduler.Scheduler{}\r\n\r\n\tserver := listeners.NewServer(test.Wallet, a, &test.NodeConfig, test.MasterDB, nil,\r\n\t\ttest.Headers, test.Scheduler, tracer, test.UTXOs, test.HoldingsChannel)\r\n\r\n\tif err := server.Load(ctx); err != nil {\r\n\t\tb.Fatalf(\"Failed to load server : %s\", err)\r\n\t}\r\n\r\n\tif err := server.SyncWallet(ctx); err != nil {\r\n\t\tb.Fatalf(\"Failed to load wallet : %s\", err)\r\n\t}\r\n\r\n\tserver.SetAlternateResponder(respondTx)\r\n\tserver.SetInSync()\r\n\r\n\tresponses = make([]*wire.MsgTx, 0, b.N)\r\n\r\n\twg := sync.WaitGroup{}\r\n\twg.Add(1)\r\n\tgo func() {\r\n\t\tdefer wg.Done()\r\n\t\tif err := server.Run(ctx); err != nil {\r\n\t\t\tb.Logf(\"Server failed : %s\", err)\r\n\t\t}\r\n\t}()\r\n\r\n\tprofFile, err := os.OpenFile(\"tree_transfer_cpu.prof\", os.O_CREATE|os.O_TRUNC|os.O_RDWR, 0644)\r\n\tif err != nil {\r\n\t\tb.Fatalf(\"\\t%s\\tFailed to create prof file : %v\", tests.Failed, err)\r\n\t}\r\n\terr = pprof.StartCPUProfile(profFile)\r\n\tif err != nil {\r\n\t\tb.Fatalf(\"\\t%s\\tFailed to start prof : %v\", tests.Failed, err)\r\n\t}\r\n\tb.ResetTimer()\r\n\r\n\twgInternal := sync.WaitGroup{}\r\n\twgInternal.Add(1)\r\n\tgo func() {\r\n\t\tdefer wgInternal.Done()\r\n\t\tfor i, request := range requests {\r\n\t\t\tserver.HandleTx(ctx, request)\r\n\r\n\t\t\tif i >= b.N {\r\n\t\t\t\tbreak\r\n\t\t\t}\r\n\t\t}\r\n\t}()\r\n\r\n\twgInternal.Add(1)\r\n\tgo func() {\r\n\t\tdefer wgInternal.Done()\r\n\t\tresponsesProcessed := 0\r\n\t\tfor responsesProcessed < b.N {\r\n\t\t\tresponse := getResponse()\r\n\t\t\tif response == nil {\r\n\t\t\t\tcontinue\r\n\t\t\t}\r\n\r\n\t\t\t// rType := responseType(response)\r\n\t\t\t// if rType != \"T2\" {\r\n\t\t\t// \tb.Fatalf(\"Invalid response type : %s\", rType)\r\n\t\t\t// }\r\n\r\n\t\t\tserver.HandleTx(ctx, &client.Tx{\r\n\t\t\t\tTx: response,\r\n\t\t\t\tOutputs: []*wire.TxOut{requests[responsesProcessed].Tx.TxOut[0]},\r\n\t\t\t\tState: client.TxState{\r\n\t\t\t\t\tSafe: true,\r\n\t\t\t\t},\r\n\t\t\t})\r\n\r\n\t\t\tresponsesProcessed++\r\n\t\t}\r\n\t}()\r\n\r\n\twgInternal.Wait()\r\n\tpprof.StopCPUProfile()\r\n\tb.StopTimer()\r\n\r\n\tserver.Stop(ctx)\r\n\twg.Wait()\r\n}", "title": "" }, { "docid": "b8dbd0cc9008fdad4d6468305301e443", "score": "0.48280922", "text": "func main() {\n\t// Crawl_solution1(\"https://golang.org/\", 4, fetcher)\n\n\t// Crawl_solution3(\"https://golang.org/\", 4, fetcher)\n\t// Crawl_solution2(\"https://golang.org/\", 4, fetcher)\n\tCrawl4(\"https://golang.org/\", 4, fetcher)\n}", "title": "" }, { "docid": "3adb6a410476267d5c857df8b9b51000", "score": "0.4827957", "text": "func BenchmarkIterateRoaring(b *testing.B) {\n\tb.StopTimer()\n\tr := rand.New(rand.NewSource(0))\n\ts := roaring.NewBitmap()\n\tsz := 150000\n\tinitsize := 65000\n\tfor i := 0; i < initsize; i++ {\n\t\ts.Add(uint32(r.Int31n(int32(sz))))\n\t}\n\tb.StartTimer()\n\tfor j := 0; j < b.N; j++ {\n\t\tc9 = uint(0)\n\t\ti := s.Iterator()\n\t\tfor i.HasNext() {\n\t\t\ti.Next()\n\t\t\tc9++\n\t\t}\n\t}\n}", "title": "" }, { "docid": "2b0424041d693a1e0dc56b2440870c3e", "score": "0.4825306", "text": "func BenchmarkIntersectionRoaring(b *testing.B) {\n\tb.StopTimer()\n\tr := rand.New(rand.NewSource(0))\n\ts1 := roaring.NewBitmap()\n\tsz := 150000\n\tinitsize := 65000\n\tfor i := 0; i < initsize; i++ {\n\t\ts1.Add(uint32(r.Int31n(int32(sz))))\n\t}\n\ts2 := roaring.NewBitmap()\n\tsz = 100000000\n\tinitsize = 65000\n\tfor i := 0; i < initsize; i++ {\n\t\ts2.Add(uint32(r.Int31n(int32(sz))))\n\t}\n\tb.StartTimer()\n\tcard := uint64(0)\n\tfor j := 0; j < b.N; j++ {\n\t\ts3 := roaring.And(s1, s2)\n\t\tcard = card + s3.GetCardinality()\n\t}\n}", "title": "" }, { "docid": "0a00fb52bb359e838ba96ed2ae883871", "score": "0.48221043", "text": "func (bfs *BFSHelper) getPathCost(path []int) int {\n\ttotalCost := 0\n\tfor _, vert := range path {\n\t\tsingleCost, err := bfs.graph.GetWeight(vert)\n\t\tif err != nil {\n\t\t\treturn -1\n\t\t}\n\t\ttotalCost += singleCost.(int)\n\t}\n\treturn totalCost\n}", "title": "" }, { "docid": "6ea263e6415fa6e63c01d33b26dbb193", "score": "0.48200083", "text": "func scanDataFolder(ctx context.Context, basePath string, cache dataUsageCache, getSize getSizeFn) (dataUsageCache, error) {\n\tt := UTCNow()\n\n\tlogPrefix := color.Green(\"data-usage: \")\n\tlogSuffix := color.Blue(\"- %v + %v\", basePath, cache.Info.Name)\n\tif intDataUpdateTracker.debug {\n\t\tdefer func() {\n\t\t\tconsole.Debugf(logPrefix+\" Scanner time: %v %s\\n\", time.Since(t), logSuffix)\n\t\t}()\n\n\t}\n\n\tswitch cache.Info.Name {\n\tcase \"\", dataUsageRoot:\n\t\treturn cache, errors.New(\"internal error: root scan attempted\")\n\t}\n\n\tskipHeal := cache.Info.SkipHealing\n\n\ts := folderScanner{\n\t\troot: basePath,\n\t\tgetSize: getSize,\n\t\toldCache: cache,\n\t\tnewCache: dataUsageCache{Info: cache.Info},\n\t\tnewFolders: nil,\n\t\texistingFolders: nil,\n\t\tdataUsageScannerDebug: intDataUpdateTracker.debug,\n\t\thealFolderInclude: 0,\n\t\thealObjectSelect: 0,\n\t}\n\n\t// Add disks for set healing.\n\tif len(cache.Disks) > 0 {\n\t\tobjAPI, ok := newObjectLayerFn().(*erasureServerPools)\n\t\tif ok {\n\t\t\ts.disks = objAPI.GetDisksID(cache.Disks...)\n\t\t\tif len(s.disks) != len(cache.Disks) {\n\t\t\t\tconsole.Debugf(logPrefix+\"Missing disks, want %d, found %d. Cannot heal. %s\\n\", len(cache.Disks), len(s.disks), logSuffix)\n\t\t\t\ts.disks = s.disks[:0]\n\t\t\t}\n\t\t}\n\t}\n\n\t// Enable healing in XL mode.\n\tif globalIsErasure {\n\t\t// Include a clean folder one in n cycles.\n\t\ts.healFolderInclude = healFolderIncludeProb\n\t\t// Do a heal check on an object once every n cycles. Must divide into healFolderInclude\n\t\ts.healObjectSelect = healObjectSelectProb\n\t}\n\tif len(cache.Info.BloomFilter) > 0 {\n\t\ts.withFilter = &bloomFilter{BloomFilter: &bloom.BloomFilter{}}\n\t\t_, err := s.withFilter.ReadFrom(bytes.NewReader(cache.Info.BloomFilter))\n\t\tif err != nil {\n\t\t\tlogger.LogIf(ctx, err, logPrefix+\"Error reading bloom filter\")\n\t\t\ts.withFilter = nil\n\t\t}\n\t}\n\tif s.dataUsageScannerDebug {\n\t\tconsole.Debugf(logPrefix+\"Start scanning. Bloom filter: %v %s\\n\", s.withFilter != nil, logSuffix)\n\t}\n\n\tdone := ctx.Done()\n\tvar flattenLevels = 2\n\n\tif s.dataUsageScannerDebug {\n\t\tconsole.Debugf(logPrefix+\"Cycle: %v, Entries: %v %s\\n\", cache.Info.NextCycle, len(cache.Cache), logSuffix)\n\t}\n\n\t// Always scan flattenLevels deep. Cache root is level 0.\n\ttodo := []cachedFolder{{name: cache.Info.Name, objectHealProbDiv: 1}}\n\tfor i := 0; i < flattenLevels; i++ {\n\t\tif s.dataUsageScannerDebug {\n\t\t\tconsole.Debugf(logPrefix+\"Level %v, scanning %v directories. %s\\n\", i, len(todo), logSuffix)\n\t\t}\n\t\tselect {\n\t\tcase <-done:\n\t\t\treturn cache, ctx.Err()\n\t\tdefault:\n\t\t}\n\t\tvar err error\n\t\ttodo, err = s.scanQueuedLevels(ctx, todo, i == flattenLevels-1, skipHeal)\n\t\tif err != nil {\n\t\t\t// No useful information...\n\t\t\treturn cache, err\n\t\t}\n\t}\n\n\tif s.dataUsageScannerDebug {\n\t\tconsole.Debugf(logPrefix+\"New folders: %v %s\\n\", s.newFolders, logSuffix)\n\t}\n\n\t// Add new folders first\n\tfor _, folder := range s.newFolders {\n\t\tselect {\n\t\tcase <-done:\n\t\t\treturn s.newCache, ctx.Err()\n\t\tdefault:\n\t\t}\n\t\tdu, err := s.deepScanFolder(ctx, folder, skipHeal)\n\t\tif err != nil {\n\t\t\tlogger.LogIf(ctx, err)\n\t\t\tcontinue\n\t\t}\n\t\tif du == nil {\n\t\t\tconsole.Debugln(logPrefix + \"no disk usage provided\" + logSuffix)\n\t\t\tcontinue\n\t\t}\n\n\t\ts.newCache.replace(folder.name, \"\", *du)\n\t\t// Add to parent manually\n\t\tif folder.parent != nil {\n\t\t\tparent := s.newCache.Cache[folder.parent.Key()]\n\t\t\tparent.addChildString(folder.name)\n\t\t}\n\t}\n\n\tif s.dataUsageScannerDebug {\n\t\tconsole.Debugf(logPrefix+\"Existing folders: %v %s\\n\", len(s.existingFolders), logSuffix)\n\t}\n\n\t// Do selective scanning of existing folders.\n\tfor _, folder := range s.existingFolders {\n\t\tselect {\n\t\tcase <-done:\n\t\t\treturn s.newCache, ctx.Err()\n\t\tdefault:\n\t\t}\n\t\th := hashPath(folder.name)\n\t\tif !h.mod(s.oldCache.Info.NextCycle, dataUsageUpdateDirCycles) {\n\t\t\tif !h.mod(s.oldCache.Info.NextCycle, s.healFolderInclude/folder.objectHealProbDiv) {\n\t\t\t\ts.newCache.replaceHashed(h, folder.parent, s.oldCache.Cache[h.Key()])\n\t\t\t\tcontinue\n\t\t\t} else {\n\t\t\t\tfolder.objectHealProbDiv = s.healFolderInclude\n\t\t\t}\n\t\t\tfolder.objectHealProbDiv = dataUsageUpdateDirCycles\n\t\t}\n\t\tif s.withFilter != nil {\n\t\t\t_, prefix := path2BucketObjectWithBasePath(basePath, folder.name)\n\t\t\tif s.oldCache.Info.lifeCycle == nil || !s.oldCache.Info.lifeCycle.HasActiveRules(prefix, true) {\n\t\t\t\t// If folder isn't in filter, skip it completely.\n\t\t\t\tif !s.withFilter.containsDir(folder.name) {\n\t\t\t\t\tif !h.mod(s.oldCache.Info.NextCycle, s.healFolderInclude/folder.objectHealProbDiv) {\n\t\t\t\t\t\tif s.dataUsageScannerDebug {\n\t\t\t\t\t\t\tconsole.Debugf(logPrefix+\"Skipping non-updated folder: %v %s\\n\", folder, logSuffix)\n\t\t\t\t\t\t}\n\t\t\t\t\t\ts.newCache.replaceHashed(h, folder.parent, s.oldCache.Cache[h.Key()])\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t} else {\n\t\t\t\t\t\tif s.dataUsageScannerDebug {\n\t\t\t\t\t\t\tconsole.Debugf(logPrefix+\"Adding non-updated folder to heal check: %v %s\\n\", folder.name, logSuffix)\n\t\t\t\t\t\t}\n\t\t\t\t\t\t// Update probability of including objects\n\t\t\t\t\t\tfolder.objectHealProbDiv = s.healFolderInclude\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\t// Update on this cycle...\n\t\tdu, err := s.deepScanFolder(ctx, folder, skipHeal)\n\t\tif err != nil {\n\t\t\tlogger.LogIf(ctx, err)\n\t\t\tcontinue\n\t\t}\n\t\tif du == nil {\n\t\t\tlogger.LogIf(ctx, errors.New(\"data-usage: no disk usage provided\"))\n\t\t\tcontinue\n\t\t}\n\t\ts.newCache.replaceHashed(h, folder.parent, *du)\n\t}\n\tif s.dataUsageScannerDebug {\n\t\tconsole.Debugf(logPrefix+\"Finished scanner, %v entries %s\\n\", len(s.newCache.Cache), logSuffix)\n\t}\n\ts.newCache.Info.LastUpdate = UTCNow()\n\ts.newCache.Info.NextCycle++\n\treturn s.newCache, nil\n}", "title": "" }, { "docid": "c83fe89e0ae31817f614ebd202cdf2b4", "score": "0.48142585", "text": "func BenchmarkSearch(b *testing.B) {\n\ttests := []struct {\n\t\tname string\n\t\tdocs []storage.Document\n\t}{\n\t\t{\n\t\t\tname: \"bst 1 document\",\n\t\t\tdocs: generateTestDocuments(1),\n\t\t},\n\t\t{\n\t\t\tname: \"bst 10 documents\",\n\t\t\tdocs: generateTestDocuments(10),\n\t\t},\n\t\t{\n\t\t\tname: \"bst 100 documents\",\n\t\t\tdocs: generateTestDocuments(100),\n\t\t},\n\t}\n\n\tfor _, tt := range tests {\n\t\tstore := New()\n\n\t\tvar id uint\n\t\tfor _, doc := range tt.docs {\n\t\t\tid = store.Insert(doc)\n\t\t}\n\n\t\tb.Run(tt.name, func(b *testing.B) {\n\t\t\tfor i := 0; i < b.N; i++ {\n\t\t\t\tdoc := store.Search(id)\n\t\t\t\t_ = doc\n\t\t\t}\n\t\t})\n\t}\n}", "title": "" }, { "docid": "0e21e1f2b923e5dd4abdd974c9369a2e", "score": "0.48051542", "text": "func main(){\n\tstarttime := time.Now();\n\t\n\t/*\n\t a = m2 - n2\n b = 2 * m * n\n c = m2 + n2\n\t because,\n a2 = m4 + n4 – 2 * m2 * n2\n b2 = 4 * m2 * n2\n c2 = m4 + n4 + 2* m2 * n2\n\t*/\n\t\n\ta := 0\n\tb := 0\n\tc := 0\n\t\n\tm := 2\n\t\n\tfor c < 1000 {\n\t\tfor n:=1; n < m; n++{\n\t\t\t\n\t\t\ta = m*m - n*n\n\t\t\tb = 2*m*n\n\t\t\tc = m*m + n*n\t\n\t\t\tif (c > 1000){\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tif (a+b+c == 1000){\n\t\t\t\tfmt.Println(a,b,c,a*b*c)\n\t\t\t}\n\t\t\t\n\t\t\t\n\t\t}\n\t\tm++\n\t}\n\t\n\tfmt.Println(time.Since(starttime));\t\n}", "title": "" }, { "docid": "0cf7396bfc149118a100478839fe8fd9", "score": "0.48048615", "text": "func BenchmarkTriangle(b *testing.B) {\n\tx, y := 3, 4\n\tans := 5\n\n\tfor i := 0; i < b.N; i++ {\n\t\tactual := calcTriangle(x, y)\n\t\tif actual != ans {\n\t\t\tb.Errorf(\"calcTriangle(%d, %d); got %d; expected %d\", x, y, ans, actual)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "177cf1f4d01e8d5781275b167c859c42", "score": "0.48032352", "text": "func BenchmarkE2E(b *testing.B) {\n\tctx := context.Background()\n\trepoDir := benchRepoDir(b)\n\n\tvar g *Graph\n\n\t// First, build the graph from scratch.\n\tb.Run(\"Build\", func(b *testing.B) {\n\t\tb.ReportAllocs()\n\t\tfor i := 0; i < b.N; i++ {\n\t\t\tg = &Graph{}\n\t\t\tif err := g.Update(ctx, repoDir, \"refs/heads/master\", UpdateOptions{}); err != nil {\n\t\t\t\tb.Fatal(err)\n\t\t\t}\n\t\t}\n\t\tb.StopTimer()\n\t\tprintStats(g, b)\n\t})\n\n\t// Serialize it.\n\tbuf := &bytes.Buffer{}\n\tb.Run(\"Write\", func(b *testing.B) {\n\t\tfor i := 0; i < b.N; i++ {\n\t\t\tbuf.Reset()\n\t\t\tif err := g.Write(buf); err != nil {\n\t\t\t\tb.Fatal(err)\n\t\t\t}\n\t\t}\n\t})\n\n\t// Deserialize it.\n\tb.Run(\"Read\", func(b *testing.B) {\n\t\tfor i := 0; i < b.N; i++ {\n\t\t\tr := bufio.NewReader(bytes.NewReader(buf.Bytes()))\n\t\t\tif err := g.Read(r); err != nil {\n\t\t\t\tb.Fatal(err)\n\t\t\t}\n\t\t}\n\t})\n\n\t// Run queries for each top-level file.\n\tfor _, n := range g.root.children {\n\t\tn := n\n\t\tif len(n.children) > 0 {\n\t\t\tcontinue\n\t\t}\n\t\tb.Run(\"Query-\"+strings.TrimPrefix(n.name, \"//\"), func(b *testing.B) {\n\t\t\tfor i := 0; i < b.N; i++ {\n\t\t\t\tq := filegraph.Query{Sources: []filegraph.Node{n}, EdgeReader: &EdgeReader{}}\n\t\t\t\tq.Run(func(*filegraph.ShortestPath) bool {\n\t\t\t\t\treturn true\n\t\t\t\t})\n\t\t\t}\n\t\t})\n\t}\n}", "title": "" }, { "docid": "26902729be7155fd2c21944c5e94f697", "score": "0.48011056", "text": "func BenchmarkGetTestPilosaInternal(b *testing.B) {\n\tb.StopTimer()\n\tr := rand.New(rand.NewSource(0))\n\tsz := 1000000\n\tinitsize := 50000\n\ts := pilosaroaring.NewBitmap()\n\tfor i := 0; i < initsize; i++ {\n\t\ts.Add(uint64(r.Int31n(int32(sz))))\n\t}\n\tb.StartTimer()\n\tfor i := 0; i < b.N; i++ {\n\t\ts.Contains(uint64(sz))\n\t}\n}", "title": "" }, { "docid": "d6a5c0532fed518cee5c6d73d26289be", "score": "0.47998342", "text": "func BenchmarkFindCallerFunc(b *testing.B) {\n\tb.ResetTimer()\n\tb.ReportAllocs()\n\tfor i := 0; i < b.N; i++ {\n\t\tfindCallerFunc()\n\t}\n}", "title": "" }, { "docid": "b3aac4ac80c3d08ed77f1ef32b23df7c", "score": "0.47988027", "text": "func TestLDrrAA(t *testing.T) {\n\tcpu := MakeCore()\n\t// Console.WriteLine(\"Testing (0x7F) \\\"LDrr_aa\\\"\")\n\tfor i := 0; i < RunCycles; i++ {\n\t\tcpu.Reset()\n\t\tcpu.Registers.Randomize()\n\t\tcpu.Memory.Randomize()\n\n\t\tRegBefore := cpu.Registers.Clone()\n\t\tGBInstructions[0x7F](cpu)\n\t\tRegAfter := cpu.Registers.Clone()\n\n\t\t// region Test Difference\n\n\t\tif (RegAfter.A) != (RegBefore.A) {\n\t\t\tt.Errorf(\"Expected RegAfter.A to be %v but got %v\", RegAfter.A, RegBefore.A)\n\t\t} // endregion\n\n\t\t// region Test Cycles\n\t\tif RegAfter.LastClockT != 4 {\n\t\t\tt.Errorf(\"Expected LastClockT to be %d but got %d\", 4, RegAfter.LastClockT)\n\t\t}\n\t\tif RegAfter.LastClockM != 1 {\n\t\t\tt.Errorf(\"Expected LastClockM to be %d but got %d\", 1, RegAfter.LastClockM)\n\t\t}\n\t\t// endregion\n\n\t\t// region Test Flags\n\t\tif RegAfter.GetZero() != RegBefore.GetZero() {\n\t\t\tt.Errorf(\"Expected Flag Zero to not change\")\n\t\t}\n\t\tif RegAfter.GetSub() != RegBefore.GetSub() {\n\t\t\tt.Errorf(\"Expected Flag Sub to not change\")\n\t\t}\n\t\tif RegAfter.GetHalfCarry() != RegBefore.GetHalfCarry() {\n\t\t\tt.Errorf(\"Expected Flag Half Carry to not change\")\n\t\t}\n\t\tif RegAfter.GetCarry() != RegBefore.GetCarry() {\n\t\t\tt.Errorf(\"Expected Flag Carry to not change\")\n\t\t}\n\t\t// endregion\n\n\t}\n}", "title": "" }, { "docid": "67281911fc1c237da4a20473f5db3f7c", "score": "0.47957188", "text": "func main() {\n\tfindRdsLeisures()\n\t//findEcsLeisures()\n}", "title": "" }, { "docid": "700e714787cf45d684936caa586d6f63", "score": "0.47925547", "text": "func check(kind string, ndirs int) {\n\t//fmt.Printf(\"check: kind=%q, ndirs=%d, len(hmap)=%d\\n\", kind, ndirs, len(hmap))\n\tfor k, v := range hmap {\n\t\t//fmt.Printf(\"check:\\t%q %d %d\\n\", v[0].path, len(v), ndirs)\n\t\tprintEntry(k, v, ndirs)\n\t}\n\tif *ps {\n\t\tif *r {\n\t\t\tfmt.Printf(\"# %d %s missing\\n\", count, kind)\n\t\t} else {\n\t\t\tfmt.Printf(\"# %d %s duplicated, totaling %h\\n\", count, kind, hrff.Int64{total, \"B\"})\n\t\t}\n\t\tfmt.Printf(\"# %d files, %d dirs scanned\\n\", stats.scannedFiles, stats.scannedDirs)\n\t}\n}", "title": "" }, { "docid": "8bea47a8c547592661123f1107ad8f9b", "score": "0.47816506", "text": "func main() {\n\tlns := lines.MustParse(\"data\", \"\\n\")\n\tstart := time.Now()\n\tfmt.Println(simulate(lns, 3, 6))\n\tfmt.Println(simulate(lns, 4, 6))\n\tstop := time.Now()\n\tfmt.Println(stop.Sub(start))\n}", "title": "" }, { "docid": "ad480724f814ac99f89bfd5adee7fcf3", "score": "0.47781473", "text": "func sakasegawaApproximation(fractionUtilised, totalCPUCapacity float64, baseServiceTime time.Duration) time.Duration {\n\tpowerTerm := math.Sqrt(2*(totalCPUCapacity+1)) - 1\n\tutilizationTerm := math.Pow(fractionUtilised, powerTerm) / (totalCPUCapacity * (1 - fractionUtilised))\n\n\texpected := time.Duration(utilizationTerm * float64(baseServiceTime))\n\n\treturn expected\n}", "title": "" }, { "docid": "098f2aa2e8844fa20b0c64e3b94c2d52", "score": "0.47770685", "text": "func main() {\n\tcountLines(getFile())\n\tMapMaker(getFile())\n\txMostUsed(5)\n}", "title": "" }, { "docid": "3291bc0c1b27fca723bd69b2e14a7d9e", "score": "0.47694615", "text": "func BenchmarkSparseIterateRoaring(b *testing.B) {\n\tb.StopTimer()\n\tr := rand.New(rand.NewSource(0))\n\ts := roaring.NewBitmap()\n\tsz := 100000000\n\tinitsize := 65000\n\tfor i := 0; i < initsize; i++ {\n\t\ts.Add(uint32(r.Int31n(int32(sz))))\n\t}\n\tb.StartTimer()\n\tfor j := 0; j < b.N; j++ {\n\t\tc9 = uint(0)\n\t\ti := s.Iterator()\n\t\tfor i.HasNext() {\n\t\t\ti.Next()\n\t\t\tc9++\n\t\t}\n\t}\n}", "title": "" } ]
6fe65ae49a6b2e09eee45aebf0f1699c
PublishScope create a `Publication` for the given agent name and topic, restricted to a given scope.
[ { "docid": "dd5fcda47b0cdf88bf3646e025041e73", "score": "0.7749347", "text": "func PublishScope(agentName string, agentScope string, topicType interface{}) (pubsub.Publication, error) {\n\tlog.Infof(\"legacy.PublishScope agentName(%s), agentScope (%s)\", agentName, agentScope)\n\treturn defaultPubsub.NewPublication(pubsub.PublicationOptions{\n\t\tAgentName: agentName,\n\t\tTopicType: topicType,\n\t\tAgentScope: agentScope,\n\t})\n}", "title": "" } ]
[ { "docid": "17ff038671a868434810acced518d82a", "score": "0.61636925", "text": "func NewPublisher(topic Topic) Publisher { return Publisher{topic} }", "title": "" }, { "docid": "acaa6db90a2016d3b9e4f3007470c8de", "score": "0.5797949", "text": "func Publish(agentName string, topicType interface{}) (pubsub.Publication, error) {\n\tlog.Debugf(\"legacy.Publish agentName(%s)\", agentName)\n\treturn defaultPubsub.NewPublication(pubsub.PublicationOptions{\n\t\tAgentName: agentName,\n\t\tTopicType: topicType,\n\t})\n}", "title": "" }, { "docid": "f8462c0c324f08187f7e2bc9e8eb0a6b", "score": "0.51787585", "text": "func NewPublisher(ctx *pulumi.Context,\n\tname string, args *PublisherArgs, opts ...pulumi.ResourceOption) (*Publisher, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.AcceptTermsAndConditions == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'AcceptTermsAndConditions'\")\n\t}\n\topts = internal.PkgResourceDefaultOpts(opts)\n\tvar resource Publisher\n\terr := ctx.RegisterResource(\"aws-native:cloudformation:Publisher\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "4f2c632e2e4ad30f747bdd0a326ae498", "score": "0.5159846", "text": "func PublishPersistent(agentName string, topicType interface{}) (pubsub.Publication, error) {\n\tlog.Infof(\"legacy.PublishPersistent agentName(%s)\", agentName)\n\treturn defaultPubsub.NewPublication(pubsub.PublicationOptions{\n\t\tAgentName: agentName,\n\t\tTopicType: topicType,\n\t\tPersistent: true,\n\t})\n}", "title": "" }, { "docid": "74abc4e95353679949c24b249c009ada", "score": "0.5027429", "text": "func SubscribeScope(agentName string, agentScope string, topicType interface{},\n\tactivate bool, ctx interface{}, options *pubsub.SubscriptionOptions) (pubsub.Subscription, error) {\n\tif options == nil {\n\t\toptions = &pubsub.SubscriptionOptions{}\n\t}\n\treturn defaultPubsub.NewSubscription(pubsub.SubscriptionOptions{\n\t\tCreateHandler: options.CreateHandler,\n\t\tModifyHandler: options.ModifyHandler,\n\t\tDeleteHandler: options.DeleteHandler,\n\t\tRestartHandler: options.RestartHandler,\n\t\tSyncHandler: options.SyncHandler,\n\t\tWarningTime: options.WarningTime,\n\t\tErrorTime: options.ErrorTime,\n\t\tAgentName: agentName,\n\t\tAgentScope: agentScope,\n\t\tTopicImpl: topicType,\n\t\tActivate: activate,\n\t\tCtx: ctx,\n\t\tPersistent: false,\n\t})\n}", "title": "" }, { "docid": "3d380aaabe3f4c2278c29479364b78b1", "score": "0.49614263", "text": "func NewPublisher(sess *session.Session, topic string, opts ...PublisherOption) (pubsub.Publisher, error) {\n\treturn newPublisher(sns.New(sess), topic, opts...)\n}", "title": "" }, { "docid": "af2b41733e6b3be5fcb575a0c4f029ec", "score": "0.49171194", "text": "func NewPublisher(ctx context.Context, producer sarama.SyncProducer, topic string) eventsourcex.PublisherFunc {\n\treturn func(event eventsource.StreamRecord) error {\n\t\t_, _, err := producer.SendMessage(&sarama.ProducerMessage{\n\t\t\tTopic: topic,\n\t\t\tKey: sarama.StringEncoder(event.AggregateID),\n\t\t\tValue: sarama.ByteEncoder(event.Data),\n\t\t})\n\t\treturn err\n\t}\n}", "title": "" }, { "docid": "35b88385c104d7b0bda464da7ec9571e", "score": "0.48250175", "text": "func NewPublisher(client *pubsub.Client, enc EncodeMessageFunc, topic string) *Publisher {\n\treturn &Publisher{\n\t\tclient: client,\n\t\tenc: enc,\n\t\ttopic: client.Topic(topic),\n\t}\n}", "title": "" }, { "docid": "e28acb0eeceb4546f75cc8dd197d66c9", "score": "0.47479892", "text": "func NewPublisher(topicName string, opts ...publisher.ManagementOption) (*publisher.Publisher, error) {\n\treturn publisher.New(topicName, opts...)\n}", "title": "" }, { "docid": "8854b64007134edecf9dae074ec4c9c1", "score": "0.46867514", "text": "func (client *DeploymentsClient) createOrUpdateAtManagementGroupScope(ctx context.Context, groupId string, deploymentName string, parameters ScopedDeployment, options *DeploymentsBeginCreateOrUpdateAtManagementGroupScopeOptions) (*azcore.Response, error) {\n\treq, err := client.createOrUpdateAtManagementGroupScopeCreateRequest(ctx, groupId, deploymentName, parameters, options)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tresp, err := client.con.Pipeline().Do(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif !resp.HasStatusCode(http.StatusOK, http.StatusCreated) {\n\t\treturn nil, client.createOrUpdateAtManagementGroupScopeHandleError(resp)\n\t}\n\treturn resp, nil\n}", "title": "" }, { "docid": "39d6da9e900f6e02e27f18ac983d1204", "score": "0.46751735", "text": "func (c *publisherRESTClient) CreateTopic(ctx context.Context, req *pubsubpb.Topic, opts ...gax.CallOption) (*pubsubpb.Topic, error) {\n\tm := protojson.MarshalOptions{AllowPartial: true, UseEnumNumbers: true}\n\tjsonReq, err := m.Marshal(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbaseUrl, err := url.Parse(c.endpoint)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbaseUrl.Path += fmt.Sprintf(\"/v1/%v\", req.GetName())\n\n\tparams := url.Values{}\n\tparams.Add(\"$alt\", \"json;enum-encoding=int\")\n\n\tbaseUrl.RawQuery = params.Encode()\n\n\t// Build HTTP headers from client and context metadata.\n\thds := []string{\"x-goog-request-params\", fmt.Sprintf(\"%s=%v\", \"name\", url.QueryEscape(req.GetName()))}\n\n\thds = append(c.xGoogHeaders, hds...)\n\thds = append(hds, \"Content-Type\", \"application/json\")\n\theaders := gax.BuildHeaders(ctx, hds...)\n\topts = append((*c.CallOptions).CreateTopic[0:len((*c.CallOptions).CreateTopic):len((*c.CallOptions).CreateTopic)], opts...)\n\tunm := protojson.UnmarshalOptions{AllowPartial: true, DiscardUnknown: true}\n\tresp := &pubsubpb.Topic{}\n\te := gax.Invoke(ctx, func(ctx context.Context, settings gax.CallSettings) error {\n\t\tif settings.Path != \"\" {\n\t\t\tbaseUrl.Path = settings.Path\n\t\t}\n\t\thttpReq, err := http.NewRequest(\"PUT\", baseUrl.String(), bytes.NewReader(jsonReq))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\thttpReq = httpReq.WithContext(ctx)\n\t\thttpReq.Header = headers\n\n\t\thttpRsp, err := c.httpClient.Do(httpReq)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdefer httpRsp.Body.Close()\n\n\t\tif err = googleapi.CheckResponse(httpRsp); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tbuf, err := io.ReadAll(httpRsp.Body)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif err := unm.Unmarshal(buf, resp); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\treturn nil\n\t}, opts...)\n\tif e != nil {\n\t\treturn nil, e\n\t}\n\treturn resp, nil\n}", "title": "" }, { "docid": "493b5b56b99fd2de2e830c4054e00fe6", "score": "0.4659544", "text": "func (client *DeploymentsClient) createOrUpdateAtManagementGroupScopeCreateRequest(ctx context.Context, groupId string, deploymentName string, parameters ScopedDeployment, options *DeploymentsBeginCreateOrUpdateAtManagementGroupScopeOptions) (*azcore.Request, error) {\n\turlPath := \"/providers/Microsoft.Management/managementGroups/{groupId}/providers/Microsoft.Resources/deployments/{deploymentName}\"\n\turlPath = strings.ReplaceAll(urlPath, \"{groupId}\", url.PathEscape(groupId))\n\turlPath = strings.ReplaceAll(urlPath, \"{deploymentName}\", url.PathEscape(deploymentName))\n\treq, err := azcore.NewRequest(ctx, http.MethodPut, azcore.JoinPaths(client.con.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.Telemetry(telemetryInfo)\n\tquery := req.URL.Query()\n\tquery.Set(\"api-version\", \"2020-06-01\")\n\treq.URL.RawQuery = query.Encode()\n\treq.Header.Set(\"Accept\", \"application/json\")\n\treturn req, req.MarshalAsJSON(parameters)\n}", "title": "" }, { "docid": "1d16d7f65f8454bfd96b7fd5f976acca", "score": "0.46553382", "text": "func Publish(topic string, body []byte) *Command {\n\tvar params = [][]byte{[]byte(topic)}\n\treturn &Command{[]byte(\"PUB\"), params, body}\n}", "title": "" }, { "docid": "aa6f0e4f6c1fadd1d5de2308ee3622f4", "score": "0.46146387", "text": "func NewPermissionScope()(*PermissionScope) {\n m := &PermissionScope{\n }\n m.SetAdditionalData(make(map[string]interface{}));\n return m\n}", "title": "" }, { "docid": "823fdcf79279251e3e98f68b38c6d7c2", "score": "0.46114814", "text": "func NewPublisher(kafkaServerHosts, schemaServerAddress, topic string, objectType interface{}) queuesgo.Publisher {\n\tif !queuesgo.ValidateType(objectType) {\n\t\treturn nil\n\t}\n\tschemaRegistryClient := NewCachedSchemaRegistryClient(strings.Split(schemaServerAddress, \",\"))\n\n\tschema := createSchema(queuesgo.GetName(objectType), queuesgo.GetFields(objectType))\n\tschemaBytes, err := json.Marshal(schema)\n\tif err != nil {\n\t\treturn nil\n\t}\n\tfmt.Println(\"Schema registered: \" + string(schemaBytes))\n\n\tproducer, err := ckafka.NewProducer(&ckafka.ConfigMap{\"bootstrap.servers\": kafkaServerHosts})\n\tif err != nil {\n\t\tlog.Printf(\"Could not create avro producer: %s\", err)\n\t\treturn nil\n\t}\n\treturn &publisher{\n\t\tproducer: producer,\n\t\tschemaRegistryClient: schemaRegistryClient,\n\t\ttopic: topic,\n\t\tschema: string(schemaBytes),\n\t\tobjectType: reflect.TypeOf(objectType),\n\t}\n}", "title": "" }, { "docid": "b9bfd9790b1b068f29a92d1ce0e12dbe", "score": "0.46001384", "text": "func (d *Kafka) PublishTo(topic string) error { return nil }", "title": "" }, { "docid": "9f3d3552611e8b544ebe77f1592b5afc", "score": "0.45992452", "text": "func NewPublicationPush(ch string, data protocol.Raw) *protocol.Push {\n\treturn &protocol.Push{\n\t\tType: protocol.PushTypePublication,\n\t\tChannel: ch,\n\t\tData: data,\n\t}\n}", "title": "" }, { "docid": "942ca62fbd9b6b930c6bc56b66c4386f", "score": "0.45780444", "text": "func (client *DeploymentsClient) createOrUpdateAtSubscriptionScope(ctx context.Context, deploymentName string, parameters Deployment, options *DeploymentsBeginCreateOrUpdateAtSubscriptionScopeOptions) (*azcore.Response, error) {\n\treq, err := client.createOrUpdateAtSubscriptionScopeCreateRequest(ctx, deploymentName, parameters, options)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tresp, err := client.con.Pipeline().Do(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif !resp.HasStatusCode(http.StatusOK, http.StatusCreated) {\n\t\treturn nil, client.createOrUpdateAtSubscriptionScopeHandleError(resp)\n\t}\n\treturn resp, nil\n}", "title": "" }, { "docid": "e7e58015bc8adc5fe97da8bcb83a4d24", "score": "0.45735744", "text": "func (env *Env) createTopic(w http.ResponseWriter, r *http.Request, ps httprouter.Params) {\n\ttopicName := ps.ByName(\"topicName\")\n\ttopic := pkg.NewTopic(topicName)\n\terr := env.broker.RegisterTopic(topic)\n\tif err == broker.ErrTopicAlreadyExists {\n\t\thttputil.SendErr(w, httputil.BadRequest)\n\t\treturn\n\t}\n\tif err != nil {\n\t\thttputil.SendErr(w, httputil.InternalServerError)\n\t\treturn\n\t}\n\tlog.Printf(\"Created new topic: %s\\n\", topicName)\n\thttputil.SendOK(w)\n}", "title": "" }, { "docid": "a517be2f1f792821067752864a1caef8", "score": "0.45668402", "text": "func NewScopePerm(scopes ...ScopeGroup) ScopePerm {\n\tp := ScopePerm(0)\n\tp.Set(scopes...)\n\treturn p\n}", "title": "" }, { "docid": "6513936a9bf0f8224c3afd0e81b80b0f", "score": "0.45571554", "text": "func NewScope(params ScopeParams) (*Scope, error) {\n\treturn &Scope{\n\t\tAzureClients: params.AzureClients,\n\t\tClusterConfig: &v1alpha1.AzureClusterProviderSpec{},\n\t\tContext: context.Background(),\n\t}, nil\n}", "title": "" }, { "docid": "8b69452f5e5eb740eaa2d8245a59de71", "score": "0.45548657", "text": "func NewCreateTopicForbidden() *CreateTopicForbidden {\n\treturn &CreateTopicForbidden{}\n}", "title": "" }, { "docid": "d2fff35d2dc29bf4426f58977c38e575", "score": "0.45394456", "text": "func NewPublisher(ctx context.Context, btConf *bt_gitstore.BTConfig, repoID int64, ts oauth2.TokenSource) (*Publisher, error) {\n\tclient, err := newClient(ctx, btConf, repoID, ts, true)\n\tif err != nil {\n\t\treturn nil, skerr.Wrapf(err, \"Failed to create GitStore PubSub publisher\")\n\t}\n\tp := &Publisher{\n\t\tclient: client,\n\t}\n\tcleanup.AtExit(func() {\n\t\tp.Wait()\n\t})\n\treturn p, nil\n}", "title": "" }, { "docid": "fb02fbf384a86e61ab12d78f25c4e18e", "score": "0.45060885", "text": "func NewPublisher(exchange string, key string, opts ...PublisherOpt) *Publisher {\n\tp := &Publisher{\n\t\texchange: exchange,\n\t\tkey: key,\n\t\tpubChan: make(chan publishMaybeErr),\n\t\tstop: make(chan struct{}),\n\t}\n\tfor _, o := range opts {\n\t\to(p)\n\t}\n\treturn p\n}", "title": "" }, { "docid": "672d210ad3eec4ff181594ecce872361", "score": "0.44969624", "text": "func (m *Client) Publish(topic string, retained bool, payload interface{}) error {\n\tm.log.TRACE.Printf(\"send %s: '%v'\", topic, payload)\n\ttoken := m.Client.Publish(topic, m.Qos, retained, payload)\n\tgo m.WaitForToken(\"send\", topic, token)\n\treturn nil\n}", "title": "" }, { "docid": "a43861c801127f965c216bae40fc0e93", "score": "0.44951364", "text": "func (mongoDB *MongoDB) AuthorizePublishing(userID string, topic string) error {\n\n\t_, err := mongoDB.VerneMQACLCollection.UpdateOne(\n\t\tnil,\n\t\tmongoBSON.NewDocument(\n\t\t\tmongoBSON.EC.String(\"client_id\", userID),\n\t\t),\n\t\tmongoBSON.NewDocument(\n\t\t\tmongoBSON.EC.SubDocumentFromElements(\"$push\",\n\t\t\t\tmongoBSON.EC.String(\"publish_acl\", topic),\n\t\t\t),\n\t\t),\n\t)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ba12d702c6708b6b242de05e6a74ddaa", "score": "0.4494267", "text": "func NewPublisher() Publisher {\n\treturn Publisher{\n\t\thandle: 0,\n\t}\n}", "title": "" }, { "docid": "8830e3809143f05671d4233f19e38fca", "score": "0.44722262", "text": "func (c *Client) Publish(topic, identity string, message proto.Message, opts ...PublishOpt) *Pub {\n\tp := &Publication{\n\t\tEntry: &Entry{\n\t\t\tTopic: topic,\n\t\t\tIdentity: identity,\n\t\t},\n\t}\n\n\tif message != nil {\n\t\tany, err := ptypes.MarshalAny(message)\n\t\tif err != nil {\n\t\t\treturn &Pub{\n\t\t\t\terr: err,\n\t\t\t}\n\t\t}\n\n\t\tp.Entry.Message = any\n\t}\n\n\tfor _, opt := range opts {\n\t\terr := opt(p)\n\t\tif err != nil {\n\t\t\treturn &Pub{\n\t\t\t\tp: p,\n\t\t\t\terr: err,\n\t\t\t}\n\t\t}\n\t}\n\n\treturn c.enqueue(p)\n}", "title": "" }, { "docid": "52fd3e5e59929d317adac96f81e97903", "score": "0.44680277", "text": "func MakePublish(dup bool, qos byte, retain bool, topicName string, packetIdentifier uint16, payload []byte) Publish {\n\tp := Publish{}\n\tremlen := p.calc(topicName, payload)\n\tif qos > QosAtMostOnce {\n\t\tremlen += p.calc(packetIdentifier)\n\t}\n\tpktLen := 1 + p.calc(uint32(remlen)) + remlen\n\n\tp.endecBytes = make([]byte, pktLen)\n\toffset := p.fill(0, (TPUBLISH<<4)|(qos<<1))\n\tp.set(0, 3, dup).set(0, 0, retain)\n\tp.topicNamePos = p.fill(offset, uint32(remlen))\n\toffset = p.fill(p.topicNamePos, topicName)\n\tif qos > QosAtMostOnce {\n\t\tp.packetIDPos = offset\n\t\toffset = p.fill(p.packetIDPos, packetIdentifier)\n\t}\n\tp.payloadPos = offset\n\tp.fill(p.payloadPos, payload)\n\treturn p\n}", "title": "" }, { "docid": "7587e5148423a814a3dcb6e412a0808b", "score": "0.44677195", "text": "func createTopic(topic string, buflen int) {\n\ttopicmx.Lock()\n\tdefer topicmx.Unlock()\n\tif _, ok := topics[topic]; !ok {\n\t\ttopics[topic] = make(chan stubs.Pair, buflen)\n\t\tfmt.Println(\"Created channel #\",topic)\n\t}\n}", "title": "" }, { "docid": "d7d23325d0b26e81e16c5793f88a70b1", "score": "0.44513404", "text": "func NewCfnPublisher_Override(c CfnPublisher, scope awscdk.Construct, id *string, props *CfnPublisherProps) {\n\t_init_.Initialize()\n\n\t_jsii_.Create(\n\t\t\"monocdk.aws_cloudformation.CfnPublisher\",\n\t\t[]interface{}{scope, id, props},\n\t\tc,\n\t)\n}", "title": "" }, { "docid": "0aed80a13a79bd395fb8ac21601d2116", "score": "0.44512612", "text": "func NewPublisher(ajc client.AsyncJournalClient, clock *Clock) *Publisher {\n\tvar autoUpdate bool\n\tif clock == nil {\n\t\tclock, autoUpdate = new(Clock), true\n\t}\n\n\tvar p = &Publisher{\n\t\tajc: ajc,\n\t\tclock: clock,\n\t\tautoUpdate: autoUpdate,\n\t\tproducer: NewProducerID(),\n\t\tintentIdx: make(map[pb.Journal]int),\n\t}\n\treturn p\n}", "title": "" }, { "docid": "c3ed625daa354d5787e68e173e1f8073", "score": "0.44426352", "text": "func (client *TagsClient) CreateOrUpdateAtScope(ctx context.Context, scope string, parameters TagsResource, options *TagsCreateOrUpdateAtScopeOptions) (TagsResourceResponse, error) {\n\treq, err := client.createOrUpdateAtScopeCreateRequest(ctx, scope, parameters, options)\n\tif err != nil {\n\t\treturn TagsResourceResponse{}, err\n\t}\n\tresp, err := client.con.Pipeline().Do(req)\n\tif err != nil {\n\t\treturn TagsResourceResponse{}, err\n\t}\n\tif !resp.HasStatusCode(http.StatusOK) {\n\t\treturn TagsResourceResponse{}, client.createOrUpdateAtScopeHandleError(resp)\n\t}\n\treturn client.createOrUpdateAtScopeHandleResponse(resp)\n}", "title": "" }, { "docid": "a85a344c1c7b0abc60a3202635d9df25", "score": "0.4441665", "text": "func createPublisher() message.Publisher {\n\tpub, err := kafka.NewPublisher(\n\t\tkafka.PublisherConfig{\n\t\t\tBrokers: []string{\"127.0.0.1:9092\"},\n\n\t\t\tMarshaler: kafka.DefaultMarshaler{},\n\t\t},\n\t\tlogger,\n\t)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\treturn pub\n}", "title": "" }, { "docid": "a387ebf04e2a14c166eebf3a31b1a21c", "score": "0.4419183", "text": "func (client *DeploymentsClient) createOrUpdateAtSubscriptionScopeCreateRequest(ctx context.Context, deploymentName string, parameters Deployment, options *DeploymentsBeginCreateOrUpdateAtSubscriptionScopeOptions) (*azcore.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/providers/Microsoft.Resources/deployments/{deploymentName}\"\n\turlPath = strings.ReplaceAll(urlPath, \"{deploymentName}\", url.PathEscape(deploymentName))\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := azcore.NewRequest(ctx, http.MethodPut, azcore.JoinPaths(client.con.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.Telemetry(telemetryInfo)\n\tquery := req.URL.Query()\n\tquery.Set(\"api-version\", \"2020-06-01\")\n\treq.URL.RawQuery = query.Encode()\n\treq.Header.Set(\"Accept\", \"application/json\")\n\treturn req, req.MarshalAsJSON(parameters)\n}", "title": "" }, { "docid": "3cd832133afdd021cae375195cd13697", "score": "0.4418573", "text": "func createPublication(tx *sql.Tx, pub *arts.Publication) (int, error) {\n\tprettyName := pub.Name\n\tif prettyName == \"\" {\n\t\tprettyName = strippedDomain(pub.Domain)\n\t}\n\tshortName := genShortName(prettyName)\n\n\t// strip leading \"the\"s for more natural sort order\n\tsortName := strings.ToLower(prettyName)\n\tsortName = stripThePat.ReplaceAllLiteralString(prettyName, \"\")\n\n\thomeURL := \"http://\" + pub.Domain\n\n\tvar pubID int\n\terr := tx.QueryRow(`INSERT INTO organisation (id,shortname,prettyname,sortname,home_url) VALUES (DEFAULT, $1,$2,$3,$4) RETURNING id`, shortName, prettyName, sortName, homeURL).Scan(&pubID)\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\n\t_, err = tx.Exec(`INSERT INTO pub_domain (pub_id,domain) VALUES ($1, $2)`, pubID, pub.Domain)\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\n\t_, err = tx.Exec(`INSERT INTO pub_alias (pub_id,alias) VALUES ($1, $2)`, pubID, prettyName)\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\n\treturn pubID, nil\n}", "title": "" }, { "docid": "5b29169edaecddd3d12ff98c0855da37", "score": "0.4411273", "text": "func (client *DeploymentsClient) createOrUpdateAtScope(ctx context.Context, scope string, deploymentName string, parameters Deployment, options *DeploymentsBeginCreateOrUpdateAtScopeOptions) (*azcore.Response, error) {\n\treq, err := client.createOrUpdateAtScopeCreateRequest(ctx, scope, deploymentName, parameters, options)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tresp, err := client.con.Pipeline().Do(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif !resp.HasStatusCode(http.StatusOK, http.StatusCreated) {\n\t\treturn nil, client.createOrUpdateAtScopeHandleError(resp)\n\t}\n\treturn resp, nil\n}", "title": "" }, { "docid": "4c34bb60887ec5e653b7b4f6e028b72b", "score": "0.4406821", "text": "func (client *DeploymentsClient) createOrUpdateAtScopeCreateRequest(ctx context.Context, scope string, deploymentName string, parameters Deployment, options *DeploymentsBeginCreateOrUpdateAtScopeOptions) (*azcore.Request, error) {\n\turlPath := \"/{scope}/providers/Microsoft.Resources/deployments/{deploymentName}\"\n\turlPath = strings.ReplaceAll(urlPath, \"{scope}\", scope)\n\turlPath = strings.ReplaceAll(urlPath, \"{deploymentName}\", url.PathEscape(deploymentName))\n\treq, err := azcore.NewRequest(ctx, http.MethodPut, azcore.JoinPaths(client.con.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.Telemetry(telemetryInfo)\n\tquery := req.URL.Query()\n\tquery.Set(\"api-version\", \"2020-06-01\")\n\treq.URL.RawQuery = query.Encode()\n\treq.Header.Set(\"Accept\", \"application/json\")\n\treturn req, req.MarshalAsJSON(parameters)\n}", "title": "" }, { "docid": "4c268e9426cf050d76f4e5c5cbbcd129", "score": "0.43935588", "text": "func newFixedPublish(base name.Repository, entries map[string]v1.Hash) publish.Interface {\n\treturn &fixedPublish{base, entries}\n}", "title": "" }, { "docid": "d758d950aedf4f71561f825bac4c3bf3", "score": "0.4388221", "text": "func CreateTopic(c *gin.Context) {\n\tvar bodyRequest struct {\n\t\tName string `form:\"name\" json:\"name\" binding:\"required\"`\n\t}\n\terr := c.ShouldBindWith(&bodyRequest, binding.JSON)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\tc.Error(errors.New(\"400|\" + err.Error()))\n\t\treturn\n\t}\n\tnewTopic := &models.Topic{\n\t\tName: bodyRequest.Name,\n\t}\n\terr = newTopic.Save()\n\tif err != nil {\n\t\tlog.Println(err)\n\t\tc.Error(errors.New(\"500|\" + err.Error()))\n\t\treturn\n\t}\n\tc.JSON(200, gin.H{\n\t\t\"body\": \"ok\",\n\t})\n}", "title": "" }, { "docid": "c604c37e04ff4298f495ac027ebe6913", "score": "0.43796787", "text": "func (c *Client) Publish(topic string, args []interface{}, kwargs map[string]interface{}) error {\n\treturn c.Send(&Publish{\n\t\tRequest: c.nextID(),\n\t\tOptions: make(map[string]interface{}),\n\t\tTopic: URI(topic),\n\t\tArguments: args,\n\t\tArgumentsKw: kwargs,\n\t})\n}", "title": "" }, { "docid": "61fe0368017fa64368a6b328ef8509f2", "score": "0.43642655", "text": "func NewPublishAction(viper *viper.Viper, smgr *dbsharding.ShardingManager, releaseCache, configsCache gcache.Cache,\n\treq *pb.PublishReleaseReq, resp *pb.PublishReleaseResp) *PublishAction {\n\taction := &PublishAction{viper: viper, smgr: smgr, releaseCache: releaseCache, configsCache: configsCache, req: req, resp: resp}\n\n\taction.resp.Seq = req.Seq\n\taction.resp.ErrCode = pbcommon.ErrCode_E_OK\n\taction.resp.ErrMsg = \"OK\"\n\n\treturn action\n}", "title": "" }, { "docid": "9b9803611e2e5e5e7ecccfcf49420c10", "score": "0.43637702", "text": "func createTopic(ctx context.Context, out io.Writer, pubsubClient *pkg.PubSubClient, topicIDs []string) error {\n\tfor _, topicID := range topicIDs {\n\t\ttopic, created, err := pubsubClient.FindOrCreateTopic(ctx, topicID)\n\t\tif err != nil {\n\t\t\treturn errors.Wrapf(err, \"find or create topic %s\", topicID)\n\t\t}\n\t\tif created {\n\t\t\t_, _ = colorstring.Fprintf(out, \"[green][success] topic '%s' created \\n\", topic.String())\n\t\t} else {\n\t\t\t_, _ = colorstring.Fprintf(out, \"[cyan][skip] topic '%s' already exists \\n\", topic.String())\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8e45fe141123d7bed7f11ef0aef7399e", "score": "0.4338398", "text": "func EnsureTopic(ctx context.Context, client *pubsub.Client, topic string) (*pubsub.Topic, error) {\n\tret := client.Topic(topic)\n\n\texists, err := ret.Exists(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif !exists {\n\t\treturn client.CreateTopic(ctx, topic)\n\t}\n\treturn ret, nil\n}", "title": "" }, { "docid": "c8f1b38b18d3699f659c90488cac6deb", "score": "0.43362045", "text": "func (c *SNSClient) Publish(message string, topicArn string, feed string) error {\n\t_, err := c.Client.Publish(&sns.PublishInput{\n\t\tMessage: aws.String(message),\n\t\tTopicArn: aws.String(topicArn),\n\t\tMessageAttributes: map[string]*sns.MessageAttributeValue{\n\t\t\t\"feed\": {\n\t\t\t\tDataType: aws.String(\"String\"),\n\t\t\t\tStringValue: aws.String(feed),\n\t\t\t},\n\t\t},\n\t})\n\treturn err\n}", "title": "" }, { "docid": "009c47bfe848e2b592174137e91657d8", "score": "0.43343452", "text": "func (client *DeploymentsClient) listAtManagementGroupScopeCreateRequest(ctx context.Context, groupId string, options *DeploymentsListAtManagementGroupScopeOptions) (*azcore.Request, error) {\n\turlPath := \"/providers/Microsoft.Management/managementGroups/{groupId}/providers/Microsoft.Resources/deployments/\"\n\turlPath = strings.ReplaceAll(urlPath, \"{groupId}\", url.PathEscape(groupId))\n\treq, err := azcore.NewRequest(ctx, http.MethodGet, azcore.JoinPaths(client.con.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.Telemetry(telemetryInfo)\n\tquery := req.URL.Query()\n\tif options != nil && options.Filter != nil {\n\t\tquery.Set(\"$filter\", *options.Filter)\n\t}\n\tif options != nil && options.Top != nil {\n\t\tquery.Set(\"$top\", strconv.FormatInt(int64(*options.Top), 10))\n\t}\n\tquery.Set(\"api-version\", \"2020-06-01\")\n\treq.URL.RawQuery = query.Encode()\n\treq.Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "title": "" }, { "docid": "6f0acd201c9f808b67b81f5f80f3c6b6", "score": "0.4328481", "text": "func (c *publisherRESTClient) Publish(ctx context.Context, req *pubsubpb.PublishRequest, opts ...gax.CallOption) (*pubsubpb.PublishResponse, error) {\n\tm := protojson.MarshalOptions{AllowPartial: true, UseEnumNumbers: true}\n\tjsonReq, err := m.Marshal(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbaseUrl, err := url.Parse(c.endpoint)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbaseUrl.Path += fmt.Sprintf(\"/v1/%v:publish\", req.GetTopic())\n\n\tparams := url.Values{}\n\tparams.Add(\"$alt\", \"json;enum-encoding=int\")\n\n\tbaseUrl.RawQuery = params.Encode()\n\n\t// Build HTTP headers from client and context metadata.\n\thds := []string{\"x-goog-request-params\", fmt.Sprintf(\"%s=%v\", \"topic\", url.QueryEscape(req.GetTopic()))}\n\n\thds = append(c.xGoogHeaders, hds...)\n\thds = append(hds, \"Content-Type\", \"application/json\")\n\theaders := gax.BuildHeaders(ctx, hds...)\n\topts = append((*c.CallOptions).Publish[0:len((*c.CallOptions).Publish):len((*c.CallOptions).Publish)], opts...)\n\tunm := protojson.UnmarshalOptions{AllowPartial: true, DiscardUnknown: true}\n\tresp := &pubsubpb.PublishResponse{}\n\te := gax.Invoke(ctx, func(ctx context.Context, settings gax.CallSettings) error {\n\t\tif settings.Path != \"\" {\n\t\t\tbaseUrl.Path = settings.Path\n\t\t}\n\t\thttpReq, err := http.NewRequest(\"POST\", baseUrl.String(), bytes.NewReader(jsonReq))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\thttpReq = httpReq.WithContext(ctx)\n\t\thttpReq.Header = headers\n\n\t\thttpRsp, err := c.httpClient.Do(httpReq)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdefer httpRsp.Body.Close()\n\n\t\tif err = googleapi.CheckResponse(httpRsp); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tbuf, err := io.ReadAll(httpRsp.Body)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif err := unm.Unmarshal(buf, resp); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\treturn nil\n\t}, opts...)\n\tif e != nil {\n\t\treturn nil, e\n\t}\n\treturn resp, nil\n}", "title": "" }, { "docid": "85db68da7996b3b48f782d20f27f08b0", "score": "0.4326221", "text": "func (store *Store) CreateTopic(name string) error {\n\treturn nil\n}", "title": "" }, { "docid": "38493aba35f033f192c8be8e75bdd5eb", "score": "0.43083546", "text": "func NewPublisher(\n\turl string, stream_key string,\n\ttest_handler *controller.AppHandler,\n\tflv_chan chan *model.FlvFrame) *Publisher {\n\tclient_id := utils.GetUUID()\n\treturn &Publisher{\n\t\tstatus: uint(0),\n\t\tserverURL: url,\n\t\tstreamID: stream_key,\n\t\tstop_chanel: make(chan bool),\n\t\ttest_handler: test_handler,\n\t\tid: client_id,\n\t\tstat: model.NewStatItem(model.ROLE_PUBLISHER, stream_key, client_id),\n\t\tstart_command_time: 0,\n\t\tstartedAt: 0,\n\t\told_frame_count: 0,\n\t\tFlvChan: flv_chan,\n\t}\n}", "title": "" }, { "docid": "eed7ada9d7752b58d124af5467855704", "score": "0.4297362", "text": "func publisher(ps PubSub, topic string, facts []string) {\n\t//fmt.Println(\"Publisher\")\n\n\ttime.Sleep(5 * time.Second)\n\n\tfor _, fact := range facts{\n\t\t//fmt.Println(\"****** \" + fact)\n\t\ttime.Sleep(time.Duration(rand.Intn(7)) * time.Second)\n\t\tps.publish(topic, fact)\n\t}\n\n\ttime.Sleep(5 * time.Second)\n\twg.Done()\n}", "title": "" }, { "docid": "ed9eae81d6d3a6f41a8b5fa202bb63a7", "score": "0.4297333", "text": "func New() (Publisher, error) {\n\n\tconfig := sarama.NewConfig()\n\tconfig.Producer.RequiredAcks = sarama.WaitForAll // Wait for all in-sync replicas to ack the message\n\tconfig.Producer.Retry.Max = 10 // Retry up to 10 times to produce the message\n\tconfig.Producer.Return.Successes = true\n\n\tproducer, err := sarama.NewSyncProducer([]string{\"localhost:9092\"}, config)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &kafkaPub{producer: producer}, nil\n}", "title": "" }, { "docid": "cd4e39e5860c4d39a584820d25b9cafc", "score": "0.42924857", "text": "func New() Publisher {\n\tregister := &registry{\n\t\ttopics: make(map[string]map[chan interface{}]bool),\n\t\tchannels: make(map[chan interface{}]map[string]bool),\n\t}\n\treturn &pubSub{register}\n}", "title": "" }, { "docid": "ee008e880e8c405ba729adf1b207bdec", "score": "0.42866635", "text": "func NewTopic(ctx *pulumi.Context,\n\tname string, args *TopicArgs, opts ...pulumi.ResourceOption) (*Topic, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.NamespaceName == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'NamespaceName'\")\n\t}\n\tif args.ResourceGroupName == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'ResourceGroupName'\")\n\t}\n\taliases := pulumi.Aliases([]pulumi.Alias{\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:servicebus:Topic\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:servicebus/v20140901:Topic\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:servicebus/v20140901:Topic\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:servicebus/v20150801:Topic\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:servicebus/v20150801:Topic\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:servicebus/v20170401:Topic\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:servicebus/v20170401:Topic\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:servicebus/v20180101preview:Topic\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:servicebus/v20180101preview:Topic\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:servicebus/v20210101preview:Topic\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:servicebus/v20210101preview:Topic\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:servicebus/v20210601preview:Topic\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:servicebus/v20210601preview:Topic\"),\n\t\t},\n\t})\n\topts = append(opts, aliases)\n\tvar resource Topic\n\terr := ctx.RegisterResource(\"azure-native:servicebus:Topic\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "8b117f5051165f6da9b8310bbad8d19b", "score": "0.42843297", "text": "func New(hostport string, id *string) *Producer {\n\n\tif nil == id {\n\t\tseed()\n\t\tidStr := fmt.Sprintf(\"%d\", rand.Uint32())\n\t\tid = &idStr\n\t}\n\n\tsocket := &protocol.Socket{\n\t\tHostPort: hostport,\n\t\tPath: protocol.PUBLISH,\n\t\tOrigin: origin(),\n\t}\n\n\treturn &Producer{id: *id, socket: socket, register: hostport}\n\n}", "title": "" }, { "docid": "e09dc46f70353b8d22327d77187ee0a1", "score": "0.42737135", "text": "func (client *TagsClient) createOrUpdateAtScopeCreateRequest(ctx context.Context, scope string, parameters TagsResource, options *TagsCreateOrUpdateAtScopeOptions) (*azcore.Request, error) {\n\turlPath := \"/{scope}/providers/Microsoft.Resources/tags/default\"\n\turlPath = strings.ReplaceAll(urlPath, \"{scope}\", scope)\n\treq, err := azcore.NewRequest(ctx, http.MethodPut, azcore.JoinPaths(client.con.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.Telemetry(telemetryInfo)\n\tquery := req.URL.Query()\n\tquery.Set(\"api-version\", \"2020-06-01\")\n\treq.URL.RawQuery = query.Encode()\n\treq.Header.Set(\"Accept\", \"application/json\")\n\treturn req, req.MarshalAsJSON(parameters)\n}", "title": "" }, { "docid": "30f9ef14023ac516d131581768cb9ce8", "score": "0.42728552", "text": "func NewTopic(ctx *pulumi.Context,\n\tname string, args *TopicArgs, opts ...pulumi.ResourceOption) (*Topic, error) {\n\tif args == nil {\n\t\targs = &TopicArgs{}\n\t}\n\n\topts = internal.PkgResourceDefaultOpts(opts)\n\tvar resource Topic\n\terr := ctx.RegisterResource(\"gcp:pubsub/topic:Topic\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "3a6513479f4e15f5b2d36759e63f7dea", "score": "0.4271888", "text": "func (c *GCPClient) Push(payload []byte, topic string) error {\n\tt := c.Instance.Topic(topic)\n\tt.PublishSettings.NumGoroutines = 1\n\n\tresult := t.Publish(c.Ctx, &pubsub.Message{Data: payload})\n\t// Block until the result is returned and a server-generated\n\t// ID is returned for the published message.\n\t_, err := result.Get(c.Ctx)\n\treturn err\n}", "title": "" }, { "docid": "e620fc100ffc039b77e6076af336157a", "score": "0.42712644", "text": "func (cm *CollectionManager) CreateScope(scopeName string, opts *CreateScopeOptions) error {\n\tif scopeName == \"\" {\n\t\treturn makeInvalidArgumentsError(\"scope name cannot be empty\")\n\t}\n\n\tif opts == nil {\n\t\topts = &CreateScopeOptions{}\n\t}\n\n\tprovider, err := cm.getProvider()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn provider.CreateScope(scopeName, opts)\n}", "title": "" }, { "docid": "e3823cfc54e5462d5bcbc13a051ec23a", "score": "0.42564878", "text": "func NewDistribution(ctx context.Context, name string, config interface{}) (\n\tdist.Params, error) {\n\treturn Default.NewDistribution(ctx, name, config)\n}", "title": "" }, { "docid": "a16db3a9650316dde955fdc36ebfc0a8", "score": "0.42443419", "text": "func PublishTopic(ctx context.Context, pubMessage []byte, topicName string) error {\n\tclient := NewClient()\n\ttopic := client.Topic(topicName)\n\n\tdefer func() {\n\t\ttopic.Stop()\n\t\t_ = client.Close()\n\t}()\n\n\tpubRes := topic.Publish(ctx, &pubsub.Message{Data: pubMessage})\n\tfmt.Println(\"Pubsub message : \" + string(pubMessage))\n\tif _, err := pubRes.Get(ctx); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "32253be7e64faac7b35f1527f943fcb4", "score": "0.42373732", "text": "func (t *Topic) NewPublisher(outboxLen int) (*Publisher, bool) {\n\tt.publisherWaitGroup.Add(1)\n\n\tif t.IsClosed() {\n\t\tt.publisherWaitGroup.Done()\n\t\treturn nil, false\n\t}\n\n\toutbox := make(chan Message, outboxLen)\n\n\t// one goroutine to pull messages out of the outbox into the queue of the subscriberWaitGroup\n\tgo func(queue chan<- Message, outbox chan Message) {\n\t\tdefer t.publisherWaitGroup.Done()\n\n\t\tfor message := range outbox {\n\t\t\tqueue <- message\n\t\t}\n\t}(t.queue, outbox)\n\n\treturn &Publisher{outbox: outbox}, true\n}", "title": "" }, { "docid": "9b1afd2f4540fc84c2bb3a5c8d19e120", "score": "0.4234276", "text": "func NewPub() *Pub {\n\tvar pub Pub\n\treturn &pub\n}", "title": "" }, { "docid": "c48879e436975f9652aa587dedc1398c", "score": "0.42323467", "text": "func (t *Topic) NewWriter(ctx context.Context) msg.MessageWriter {\n\treturn &MessageWriter{\n\t\tattributes: make(map[string][]string),\n\t\tsnsClient: t.Svc,\n\t\ttopicARN: t.TopicARN,\n\t\tctx: ctx,\n\t}\n}", "title": "" }, { "docid": "9cf71cb3f95bc7480aef92eb7e4f10b0", "score": "0.42321602", "text": "func NewSubmitter(topic *pubsub.Topic) *Submitter {\n\treturn &Submitter{topic}\n}", "title": "" }, { "docid": "8b07208fba19b39de6ab90719cb3efb6", "score": "0.42298394", "text": "func NewInvokeThingTopicRequestWithoutParam() *InvokeThingTopicRequest {\n\n return &InvokeThingTopicRequest{\n JDCloudRequest: core.JDCloudRequest{\n URL: \"/regions/{regionId}/instances/{instanceId}/products/{productKey}/devices/{identifier}/topic\",\n Method: \"POST\",\n Header: nil,\n Version: \"v2\",\n },\n }\n}", "title": "" }, { "docid": "b97bbd8a31c6020f50abb82a60bbd8e1", "score": "0.42143053", "text": "func (client *Client) CreateQosPolicyWithChan(request *CreateQosPolicyRequest) (<-chan *CreateQosPolicyResponse, <-chan error) {\n\tresponseChan := make(chan *CreateQosPolicyResponse, 1)\n\terrChan := make(chan error, 1)\n\terr := client.AddAsyncTask(func() {\n\t\tdefer close(responseChan)\n\t\tdefer close(errChan)\n\t\tresponse, err := client.CreateQosPolicy(request)\n\t\tif err != nil {\n\t\t\terrChan <- err\n\t\t} else {\n\t\t\tresponseChan <- response\n\t\t}\n\t})\n\tif err != nil {\n\t\terrChan <- err\n\t\tclose(responseChan)\n\t\tclose(errChan)\n\t}\n\treturn responseChan, errChan\n}", "title": "" }, { "docid": "3796c30cbd5e78ec66256547f6f60083", "score": "0.42064482", "text": "func NewCreateTopicUnauthorized() *CreateTopicUnauthorized {\n\treturn &CreateTopicUnauthorized{}\n}", "title": "" }, { "docid": "7022eb2951b26dbfc4307abd4d26c0fc", "score": "0.42039603", "text": "func factoryPublisher(cfg *config.PublisherCfg, logger *logrus.Entry) (eventPublisher, error) {\n\tswitch cfg.Type {\n\tcase config.PublisherTypeKafka:\n\t\tproducer, err := publisher.NewProducer(cfg)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"kafka producer: %w\", err)\n\t\t}\n\n\t\treturn publisher.NewKafkaPublisher(producer), nil\n\tcase config.PublisherTypeNats:\n\t\tnatsConn, err := nats.Connect(cfg.Address)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"nats connection: %w\", err)\n\t\t}\n\t\tdefer natsConn.Close()\n\n\t\tjs, err := natsConn.JetStream()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"jet stream: %w\", err)\n\t\t}\n\n\t\tif err := createStream(logger, js, cfg.Topic); err != nil {\n\t\t\treturn nil, fmt.Errorf(\"create Nats stream: %w\", err)\n\t\t}\n\n\t\treturn publisher.NewNatsPublisher(js), nil\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"unknown publisher type: %s\", cfg.Type)\n\t}\n}", "title": "" }, { "docid": "8f94dd9f5f923ab2e9eb9ce2e4619b8d", "score": "0.42001322", "text": "func (p Participant) CreateTopic(name, typeName string, qosLibraryName, qosProfileName string) (Topic, error) {\n\tt := Topic{p: p, name: C.CString(name), typeName: C.CString(typeName)}\n\tif len(qosLibraryName) == 0 {\n\t\tt.t = C.DDS_DomainParticipant_create_topic(\n\t\t\tt.p.p,\n\t\t\tt.name,\n\t\t\tt.typeName,\n\t\t\t&C.DDS_TOPIC_QOS_DEFAULT,\n\t\t\tnil,\n\t\t\tC.DDS_STATUS_MASK_NONE)\n\t} else {\n\t\tt.t = C.DDS_DomainParticipant_create_topic_with_profile(\n\t\t\tt.p.p,\n\t\t\tt.name,\n\t\t\tt.typeName,\n\t\t\tC.CString(qosLibraryName),\n\t\t\tC.CString(qosProfileName),\n\t\t\tnil,\n\t\t\tC.DDS_STATUS_MASK_NONE)\n\t}\n\tif t.t == nil {\n\t\treturn t, errors.New(\"Failed to create a topic\")\n\t}\n\treturn t, nil\n}", "title": "" }, { "docid": "7a0ab6f764b67ee815769fe8ca9b3b23", "score": "0.4197844", "text": "func (s *Service) Publish(topic string, payload []byte, qos packet.QOS, retain bool) GenericFuture {\n\treturn s.PublishMessage(&packet.Message{\n\t\tTopic: topic,\n\t\tPayload: payload,\n\t\tQOS: qos,\n\t\tRetain: retain,\n\t})\n}", "title": "" }, { "docid": "7ef44a873b010ab43d4da119c17bb3fd", "score": "0.4197316", "text": "func (client *DeploymentsClient) listAtSubscriptionScopeCreateRequest(ctx context.Context, options *DeploymentsListAtSubscriptionScopeOptions) (*azcore.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/providers/Microsoft.Resources/deployments/\"\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := azcore.NewRequest(ctx, http.MethodGet, azcore.JoinPaths(client.con.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.Telemetry(telemetryInfo)\n\tquery := req.URL.Query()\n\tif options != nil && options.Filter != nil {\n\t\tquery.Set(\"$filter\", *options.Filter)\n\t}\n\tif options != nil && options.Top != nil {\n\t\tquery.Set(\"$top\", strconv.FormatInt(int64(*options.Top), 10))\n\t}\n\tquery.Set(\"api-version\", \"2020-06-01\")\n\treq.URL.RawQuery = query.Encode()\n\treq.Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "title": "" }, { "docid": "748526ad0d8459a90ead384a1a534eb3", "score": "0.41970405", "text": "func (p *Publisher) Publish(pub amqp.Publishing) error {\n\treturn p.PublishWithRoutingKey(pub, p.key)\n}", "title": "" }, { "docid": "ae8f77ab0b96c7a1603dcef3ece0cada", "score": "0.4173646", "text": "func initTopic(c *config.ProgramConfig) *pubsub.Topic {\n\tctx1, c1 := context.WithTimeout(context.Background(), c.Timeout)\n\tdefer c1()\n\tp, e := pubsub.NewClient(ctx1, c.ProjectID)\n\tif e != nil {\n\t\tutil.Fatal(e)\n\t\treturn nil\n\t}\n\tt := p.Topic(c.Topic)\n\tctx2, c2 := context.WithTimeout(context.Background(), c.Timeout)\n\tdefer c2()\n\tif b, e := t.Exists(ctx2); e != nil || !b {\n\t\tutil.Fatal(errors.New(\"topic does not exist or unexpected pubsub error\"))\n\t\treturn nil\n\t}\n\treturn t\n}", "title": "" }, { "docid": "5a7a1eb60ec8c56e7847986e1d7d81b3", "score": "0.4170737", "text": "func (client *DeploymentsClient) createOrUpdateAtTenantScopeCreateRequest(ctx context.Context, deploymentName string, parameters ScopedDeployment, options *DeploymentsBeginCreateOrUpdateAtTenantScopeOptions) (*azcore.Request, error) {\n\turlPath := \"/providers/Microsoft.Resources/deployments/{deploymentName}\"\n\turlPath = strings.ReplaceAll(urlPath, \"{deploymentName}\", url.PathEscape(deploymentName))\n\treq, err := azcore.NewRequest(ctx, http.MethodPut, azcore.JoinPaths(client.con.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.Telemetry(telemetryInfo)\n\tquery := req.URL.Query()\n\tquery.Set(\"api-version\", \"2020-06-01\")\n\treq.URL.RawQuery = query.Encode()\n\treq.Header.Set(\"Accept\", \"application/json\")\n\treturn req, req.MarshalAsJSON(parameters)\n}", "title": "" }, { "docid": "1658c544506d8f3ad008a6237697388b", "score": "0.41704336", "text": "func publish(topic string, pair stubs.Pair) (err error){\n\ttopicmx.RLock()\n\tdefer topicmx.RUnlock()\n\tif ch, ok := topics[topic]; ok {\n\t\tch <- pair\n\t} else {\n\t\treturn errors.New(\"No such topic.\")\n\t}\n\treturn\n}", "title": "" }, { "docid": "8c353a10cef80696a98605100e14974a", "score": "0.41690898", "text": "func CreateCreateQosPolicyRequest() (request *CreateQosPolicyRequest) {\n\trequest = &CreateQosPolicyRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"Smartag\", \"2018-03-13\", \"CreateQosPolicy\", \"smartag\", \"openAPI\")\n\trequest.Method = requests.POST\n\treturn\n}", "title": "" }, { "docid": "091a9fd6310c1e129afdb496fa546c38", "score": "0.41558418", "text": "func (ps PubSub) publish(topic string, fact string) {\n\t//fmt.Println(\"Publish\")\n\n\tps.mu.Lock()\n\n\tfor _, channel := range ps.topics[topic] {\n\t\tgo func(c chan string) {\n\t\t\tc <- fact\n\t\t}(channel)\n\t}\n\tps.mu.Unlock()\n}", "title": "" }, { "docid": "b1591641f7ff0cee39888b82051d9f33", "score": "0.41460305", "text": "func NewPublisher(username string, password string, host string, port string, exchange string, exchangeType string) *Publisher {\n\treturn &Publisher{\n\t\trmqExchange: exchange,\n\t\trmqExchangeType: exchangeType,\n\t\trmqHost: host,\n\t\trmqPassword: password,\n\t\trmqPort: port,\n\t\trmqUsername: username,\n\t}\n}", "title": "" }, { "docid": "adf5150b1e622d4b313f0ff4d021d85d", "score": "0.414479", "text": "func ValidatePublishTopic(topic string) error {\n\tif len(topic) > 65535 {\n\t\treturn ErrInvalidTopic\n\t}\n\n\tif strings.ContainsAny(topic, \"+#\") {\n\t\treturn ErrInvalidTopic\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "eb872f4e93f88921e90a61e3302b0338", "score": "0.41446698", "text": "func (m *ProjectDB) PolicyScope(userID uuid.UUID) *ProjectDB {\n\treturn &ProjectDB{Db: m.Db.Scopes(UserPolicyScope(userID))}\n}", "title": "" }, { "docid": "a1c5bf49618a08c1c964dd5d8ecd3da2", "score": "0.41438887", "text": "func NewPubSub(network, host string) (*PubSub, error){\n client, err := NewClient(network, host)\n if err != nil {\n\treturn nil, err\n }\n ps := &PubSub{\n\tclient: client,\n }\n return ps, nil\n}", "title": "" }, { "docid": "02241a51ec6d9cbea6f878f931e4ed56", "score": "0.41271824", "text": "func (pub Publisher) Topic() Topic { return pub.t }", "title": "" }, { "docid": "4faeec1f500af0de0e157de20b0d29d1", "score": "0.41267398", "text": "func (eb *EventBus) Publish(topic string, args ...interface{}) {\n\tif topic == \"\" {\n\t\treturn\n\t}\n\n\tpassedArgs := make([]reflect.Value, 0)\n\tfor _, arg := range args {\n\t\tpassedArgs = append(passedArgs, reflect.ValueOf(arg))\n\t}\n\n\teb.queue.Append(&pubReq{\n\t\tTopic: topic,\n\t\tArgs: passedArgs,\n\t})\n}", "title": "" }, { "docid": "4ad3182624334915e2d3bcfd5ff7ba88", "score": "0.41259176", "text": "func newCreateTopicCmd(out io.Writer) *cobra.Command {\n\tcommand := &cobra.Command{\n\t\tUse: \"create_topic TOPIC_ID\",\n\t\tShort: \"create Pub/Sub topic\",\n\t\tLong: \"create Pub/Sub topic\",\n\t\tExample: \"pubsub_cli create_topic topic_1 topic_2 --host=localhost:8085 --project=test_project\",\n\t\tAliases: []string{\"ct\"},\n\t\tArgs: cobra.MinimumNArgs(1),\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tprojectID, err := cmd.Flags().GetString(projectFlagName)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\temulatorHost, err := cmd.Flags().GetString(hostFlagName)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tgcpCredentialFilePath, err := cmd.Flags().GetString(credFileFlagName)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tpubsubClient, err := pkg.NewPubSubClient(cmd.Context(), projectID, emulatorHost, gcpCredentialFilePath)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, \"initialize pubsub client\")\n\t\t\t}\n\t\t\treturn createTopic(cmd.Context(), out, pubsubClient, args)\n\t\t},\n\t}\n\tcommand.SetOut(out)\n\treturn command\n}", "title": "" }, { "docid": "e95dd6a7e6f599bcbc6ca2f77859a7d1", "score": "0.41258338", "text": "func CreatePublisher(publisherType string) (Publisher, error) {\n\tswitch publisherType {\n\tcase \"env\":\n\t\treturn new(environment.EnvironmentPublisher), nil\n\tcase \"volume\":\n\t\treturn new(volume.VolumePublisher), nil\n\tdefault:\n\t\treturn nil, NewInvalidPublisherError(publisherType)\n\t}\n}", "title": "" }, { "docid": "40424dddd3ab41e69c82fbc65ea71621", "score": "0.41232124", "text": "func (pubManager *PublisherManager) PublishRequest(host string, port int, destination string) {\n\n\tif pubManager.PubList == nil {\n\t\tpubManager.PubList = make([]Publisher, 0)\n\t}\n\n\t// Get or Create Publisher\n\tpublisher, exists := pubManager.GetPublisher(host, port)\n\n\tif !exists {\n\t\tpublisher = Publisher{Host: host, Port: port, PublishQueues: make(map[string]bool)}\n\t\tpubManager.PubList = append(pubManager.PubList, publisher)\n\t}\n\n\t// Grant publishing permission\n\tpublisher.PublishQueues[destination] = true\n}", "title": "" }, { "docid": "466052fddb529b9f81b894677a7feed2", "score": "0.41206563", "text": "func Publish(topic string, message string) {\n\tif !IsConnected() {\n\t\tconnect()\n\t}\n\ttoken := client.Publish(fmt.Sprintf(\"vehicle/%s\", topic), 0, true, message)\n\ttoken.Wait()\n}", "title": "" }, { "docid": "0c28abe44a8dd22a207f461a6fde4abb", "score": "0.41166368", "text": "func TestPublication(t *testing.T) {\n\targs, client := setupTest(t)\n\n\tstreamName := \"test-stream\"\n\tmessageText := \"test message text\"\n\n\targs = append(args,\n\t\tpublishCommand.Name,\n\t\t\"--\"+createStreamFlag.Name,\n\t\t\"--\"+streamFlag.Name, streamName,\n\t\t\"--\"+messageFlag.Name, messageText,\n\t)\n\n\terr := Run(args)\n\trequire.NoError(t, err)\n\n\t// Check that the message has been published.\n\tmsgs := make(chan *lift.Message, 1)\n\tctx, cancel := context.WithTimeout(context.Background(), time.Second*10)\n\terr = client.Subscribe(ctx, streamName, func(msg *lift.Message, err error) {\n\t\trequire.NoError(t, err)\n\t\tmsgs <- msg\n\t\tcancel()\n\t}, lift.StartAtLatestReceived())\n\trequire.NoError(t, err)\n\n\t// Wait to get the new message.\n\tselect {\n\tcase msg := <-msgs:\n\t\trequire.Equal(t, messageText, string(msg.Value()))\n\tcase <-time.After(5 * time.Second):\n\t\tt.Fatal(\"Did not receive expected message\")\n\t}\n}", "title": "" }, { "docid": "52932331df77467e12ccae8999ac0d96", "score": "0.41155255", "text": "func New(writer io.Writer) *publisher {\n\treturn &publisher{\n\t\twriter: writer,\n\t}\n}", "title": "" }, { "docid": "67d509d1d9cbdeb80e4a3eccccffc302", "score": "0.41154236", "text": "func (client *DeploymentsClient) listAtScopeCreateRequest(ctx context.Context, scope string, options *DeploymentsListAtScopeOptions) (*azcore.Request, error) {\n\turlPath := \"/{scope}/providers/Microsoft.Resources/deployments/\"\n\turlPath = strings.ReplaceAll(urlPath, \"{scope}\", scope)\n\treq, err := azcore.NewRequest(ctx, http.MethodGet, azcore.JoinPaths(client.con.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.Telemetry(telemetryInfo)\n\tquery := req.URL.Query()\n\tif options != nil && options.Filter != nil {\n\t\tquery.Set(\"$filter\", *options.Filter)\n\t}\n\tif options != nil && options.Top != nil {\n\t\tquery.Set(\"$top\", strconv.FormatInt(int64(*options.Top), 10))\n\t}\n\tquery.Set(\"api-version\", \"2020-06-01\")\n\treq.URL.RawQuery = query.Encode()\n\treq.Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "title": "" }, { "docid": "5a698d5e25434e0a810f201f9f8c8e60", "score": "0.41101098", "text": "func (h *Handler) Publish(topic string, retained bool, message string) {\n\t// fmt.Printf(\"%s %v (%v)\\n\", topic, message, retained)\n\ttoken := h.Client.Publish(topic, h.qos, retained, message)\n\tif h.Timeout > 0 && h.ErrorHandler != nil {\n\t\tgo h.handleToken(\"publish\", token)\n\t}\n}", "title": "" }, { "docid": "32070a4027e74411a451882d94321893", "score": "0.41093838", "text": "func (fld *FakeLookupd) publish(topic string, message *nsqio.Message) error {\n\t// block because we might see blocking in publishing message to channel\n\t// no point of accessing this function concurrently\n\tfld.mu.Lock()\n\tdefer fld.mu.Unlock()\n\n\tt, ok := fld.topicChannel[topic]\n\tif !ok {\n\t\treturn nil\n\t}\n\n\t// publish to all possible channel\n\t// expect this to be blocking\n\tfor _, messageChan := range t {\n\t\tmessageChan <- message\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0de7ff421c540607ef94ae4762f0b14c", "score": "0.41048226", "text": "func topicAdd(topicName string) {\n\n\tcfg := aws.Config{}\n\tcfg.Region = &awsRegion\n\tcfg.Endpoint = &endpoint\n\tcfg.Credentials = credentials.NewStaticCredentials(ak, sk, \"\")\n\n\tsess, err := session.NewSession(&cfg)\n\tif err != nil {\n\t\tfmt.Printf(\"Unable to initiate session\")\n\t\treturn\n\t}\n\tsvc := sns.New(sess)\n\n\tresp, err := svc.CreateTopic(&sns.CreateTopicInput{Name: &topicName})\n\tif err != nil {\n\t\tfmt.Println(\"Unable to create Topic: \", err)\n\t\treturn\n\t}\n\tfmt.Printf(\"Resp: \", resp)\n}", "title": "" }, { "docid": "cdb81f4ceb30afca135078f0a908e7ba", "score": "0.41030967", "text": "func (i InvestmentStream) newProducer() {\n\n\tkafkaWriterInit := &kafkawriter.WriterInit{\n\t\tEntity: &ivstream.InvestmentOpenEntity{},\n\t\tConfigurer: &i.Config,\n\t\tKafkaInit: kafkawriter.SaramaProducer,\n\t}\n\tclient, err := kafkaWriterInit.NewWriter(context.Background())\n\tif err != nil {\n\t\tlog.Printf(\"error newWriter [%v]\\n\", err)\n\t\treturn\n\t}\n\ti.writer = client\n\t//// TODO: remove when finish structure project\n\n\tgo func() {\n\t\tfor {\n\t\t\ttime.Sleep(1 * time.Second)\n\t\t\trand, _ := uuid.GenerateUUID()\n\t\t\tentity := &ivstream.InvestmentOpenEntity{\n\t\t\t\tMessage: rand,\n\t\t\t}\n\t\t\terr = client.Save(entity)\n\t\t\tif err != nil {\n\t\t\t\tlog.Printf(\"error send [%v]\\n\", err)\n\t\t\t}\n\t\t\tlog.Printf(\"success send [%v]\\n\", rand)\n\t\t}\n\t}()\n}", "title": "" }, { "docid": "2dae9461c3cb1c4cbc208616a01aa22d", "score": "0.41003495", "text": "func newPrometheusScope(\n\tlogger log.Logger,\n\tconfig *prometheus.Configuration,\n\tclientConfig *ClientConfig,\n) tally.Scope {\n\tif len(config.DefaultHistogramBuckets) == 0 {\n\t\tconfig.DefaultHistogramBuckets = histogramBoundariesToHistogramObjectives(defaultHistogramBoundaries)\n\t}\n\treporter, err := config.NewReporter(\n\t\tprometheus.ConfigurationOptions{\n\t\t\tRegistry: prom.NewRegistry(),\n\t\t\tOnError: func(err error) {\n\t\t\t\tlogger.Warn(\"error in prometheus reporter\", tag.Error(err))\n\t\t\t},\n\t\t},\n\t)\n\tif err != nil {\n\t\tlogger.Fatal(\"error creating prometheus reporter\", tag.Error(err))\n\t}\n\tscopeOpts := tally.ScopeOptions{\n\t\tTags: clientConfig.Tags,\n\t\tCachedReporter: reporter,\n\t\tSeparator: prometheus.DefaultSeparator,\n\t\tSanitizeOptions: &sanitizeOptions,\n\t\tPrefix: clientConfig.Prefix,\n\t\tDefaultBuckets: histogramBoundariesToValueBuckets(defaultHistogramBoundaries),\n\t}\n\tscope, _ := tally.NewRootScope(scopeOpts, time.Second)\n\treturn scope\n}", "title": "" }, { "docid": "738f9b7d1355d6a945fe1615e5eb4be9", "score": "0.41001073", "text": "func New(name string, factoryMethod func() pubsub.PubSub) PubSub {\n\treturn PubSub{\n\t\tName: name,\n\t\tFactoryMethod: factoryMethod,\n\t}\n}", "title": "" }, { "docid": "738f9b7d1355d6a945fe1615e5eb4be9", "score": "0.41001073", "text": "func New(name string, factoryMethod func() pubsub.PubSub) PubSub {\n\treturn PubSub{\n\t\tName: name,\n\t\tFactoryMethod: factoryMethod,\n\t}\n}", "title": "" }, { "docid": "e287390b4d6ee014640b88afaba97c57", "score": "0.4099897", "text": "func NewPUBLISH(opts *PUBLISHOptions) (Packet, error) {\n\t// Initialize the options.\n\tif opts == nil {\n\t\topts = &PUBLISHOptions{}\n\t}\n\n\t// Validate the options.\n\tif err := opts.validate(); err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Create a PUBLISH Packet.\n\tp := &PUBLISH{\n\t\tDUP: opts.DUP,\n\t\tQoS: opts.QoS,\n\t\tretain: opts.Retain,\n\t\tTopicName: opts.TopicName,\n\t\tPacketID: opts.PacketID,\n\t\tMessage: opts.Message,\n\t}\n\n\t// Set the variable header to the Packet.\n\tp.setVariableHeader()\n\n\t// Set the payload to the Packet.\n\tp.setPayload()\n\n\t// Set the Fixed header to the Packet.\n\tp.setFixedHeader()\n\n\t// Return the Packet.\n\treturn p, nil\n}", "title": "" }, { "docid": "73fb1c3b1118e788940b68ce21729148", "score": "0.4094805", "text": "func (c *Client) Publish(\n\ttopic mqtt.Topic,\n\tpayload []byte,\n\toptions ...*PublishOptions,\n) error {\n\t// Reserve packet identifier\n\tpacketID := c.aquirePacketID()\n\tpub := &packets.Publish{\n\t\tVersion: c.version,\n\n\t\tTopic: topic,\n\t\tPayload: payload,\n\t}\n\n\tfor _, opts := range options {\n\t\tif opts == nil {\n\t\t\tcontinue\n\t\t}\n\t\tif *opts.Retain {\n\t\t\tpub.Retain = *opts.Retain\n\t\t}\n\t}\n\n\tswitch topic.QoS {\n\tcase mqtt.QoS0:\n\t\t// Nothing to do here.\n\tcase mqtt.QoS2:\n\t\tc.ackChan.New(packetID)\n\t\tdefer c.ackChan.Del(packetID)\n\t\tfallthrough\n\tcase mqtt.QoS1:\n\t\tpub.PacketIdentifier = packetID\n\t\tc.pendingPackets.Add(packetID, pub)\n\tdefault:\n\t\treturn mqtt.ErrIllegalQoS\n\t}\n\n\terr := c.io.Send(pub)\n\tif err == nil && topic.QoS == mqtt.QoS2 {\n\t\tackChan, _ := c.ackChan.Get(packetID)\n\t\t<-ackChan\n\t}\n\treturn err\n}", "title": "" }, { "docid": "87d34ce90de2cb8861d861990bfe1abe", "score": "0.4090641", "text": "func (p *PubSub) Publish(topic string, message interface{}) error {\n\tif topic == \"\" {\n\t\treturn errors.New(\"topic parameter is empty\")\n\t}\n\n\tif message == nil {\n\t\treturn errors.New(\"message is nil\")\n\t}\n\n\tp.publishChan <- &payload{topic: topic, message: message}\n\treturn nil\n}", "title": "" } ]
66e996b829c247bf326070d0a7cd71d0
GetField function returns Field value.
[ { "docid": "bb5829d1ce979d811872a136b4322482", "score": "0.63571525", "text": "func (e AddressValidationError) GetField() string { return e.Field }", "title": "" } ]
[ { "docid": "cba69757649d6a6b33ed5b27a6ae17dc", "score": "0.7641529", "text": "func (f Field) Get() interface{} {\n\t//v := reflect.Indirect(reflect.Value(c.Dest))\n\treturn f.GetField().Interface()\n}", "title": "" }, { "docid": "0b3f6693d5b14264093f1f52b92dcbeb", "score": "0.7372086", "text": "func GetField(obj any, name string) any {\n\tv, err := reflections.GetField(obj, name)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\treturn v\n}", "title": "" }, { "docid": "752c1e22b1c76cfe4b5a9eecc1cbec97", "score": "0.7360049", "text": "func GetField(target interface{}, field string) (interface{}, error) {\n\n\ttargetValue, err := derefStruct(target)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfieldValue := targetValue.FieldByName(field)\n\tif !fieldValue.IsValid() {\n\t\treturn nil, fmt.Errorf(\"target does not contain field `%s`\", field)\n\t}\n\n\tmakeSettable(&fieldValue)\n\n\treturn fieldValue.Interface(), nil\n}", "title": "" }, { "docid": "40d515afeb46d957d2152744f13714ef", "score": "0.7313321", "text": "func (r *RecordAccess) Field() interface{} {\n\treturn r.field\n}", "title": "" }, { "docid": "2e0d065975df923d06c2c595acc039f3", "score": "0.7281789", "text": "func (s ModelMixinSet) FieldGet(field models.FieldName) *models.FieldInfo {\n\tres := s.Collection().Call(\"FieldGet\", field)\n\tresTyped, _ := res.(*models.FieldInfo)\n\treturn resTyped\n}", "title": "" }, { "docid": "136ce6ce015a1d3a56f9d45bdb76593a", "score": "0.72337955", "text": "func GetFieldValue(f interface{}, name string) (retVal reflect.Value, err error) {\n\tr := reflect.ValueOf(f)\n\tif !r.IsNil() && r.IsValid() {\n\t\tretVal = reflect.Indirect(r).FieldByName(name)\n\t} else {\n\t\t//log.Warn(\"invalid value\")\n\t\terr = ErrInvalidObject\n\t}\n\treturn\n}", "title": "" }, { "docid": "46a89bb8219e3233065b7a72bcbcdf00", "score": "0.7210342", "text": "func (f Field) GetField() reflect.Value {\n\tv := f.conf.destVal\n\tfor _, index := range f.path {\n\t\tif v.Kind() == reflect.Ptr {\n\t\t\tv = v.Elem()\n\t\t}\n\t\tv = v.Field(index)\n\t}\n\treturn v\n}", "title": "" }, { "docid": "f47af4191ee025b84e39a0e0d6bfdef0", "score": "0.719049", "text": "func (d *Directory) GetField(tag uint16) (Field, error) {\n\tif _, ok := d.Fields[tag]; !ok {\n\t\treturn nil, fmt.Errorf(\"Unknown field tag %d in directory %s\", tag, d.Name)\n\t}\n\n\treturn d.Fields[tag], nil\n}", "title": "" }, { "docid": "1f5bd5820cd43f03a04e94af21e844ac", "score": "0.7135876", "text": "func (c MethodsCollection) FieldGet() pFieldGet {\n\treturn pFieldGet{\n\t\tMethod: c.MustGet(\"FieldGet\"),\n\t}\n}", "title": "" }, { "docid": "53c87f9696be6618152bbdd3ca086c33", "score": "0.7125145", "text": "func (t *Interface) GetField(name string) *FieldDef {\n\treturn t.fields.get(name)\n}", "title": "" }, { "docid": "542befaac921acd6d13e9eeabcf923ab", "score": "0.71078587", "text": "func (inMsg *inboundMessage) Get(field Field) interface{} { return inMsg.fields[field] }", "title": "" }, { "docid": "11c07f65ae7dc5a17a357ba21803ab66", "score": "0.70812064", "text": "func (a *AggregatorUnit) GetField() string {\n\treturn a.field\n}", "title": "" }, { "docid": "2dd744665a00fce145cfb8d054f11f27", "score": "0.7060573", "text": "func (s *State) Getfield(index int, k string) {\n\tcs := C.CString(k)\n\tdefer C.free(unsafe.Pointer(cs))\n\tC.lua_getfield(s.l, C.int(index), cs)\n}", "title": "" }, { "docid": "61fcb2b4637968cbaae7fb8acdd659f5", "score": "0.705333", "text": "func (f Fields) Get(key string) interface{} {\n\treturn f[key]\n}", "title": "" }, { "docid": "1dfb9ae41351553da63cf30e128fa5bc", "score": "0.7020123", "text": "func (track *Track) GetField(field string) string {\n\t// Response string\n\tvar response string\n\n\t// Check if the field-parameter is valid\n\tswitch field {\n\tcase \"pilot\":\n\t\tresponse = track.Pilot\n\t\tbreak\n\tcase \"glider\":\n\t\tresponse = track.Glider\n\t\tbreak\n\tcase \"glider_id\":\n\t\tresponse = track.GliderID\n\t\tbreak\n\tcase \"track_length\":\n\t\tresponse = fmt.Sprintf(\"%f\", track.TrackLength)\n\t\tbreak\n\tcase \"H_date\":\n\t\tresponse = track.HDate\n\t\tbreak\n\tcase \"track_src_url\":\n\t\tresponse = track.TrackSrcUrl\n\t\tbreak\n\tdefault:\n\t\tresponse = \"\"\n\t\tbreak\n\t}\n\n\treturn response\n}", "title": "" }, { "docid": "a197b29422113874a8d049188eb2f42c", "score": "0.7003031", "text": "func (t *TextImpl) GetField() string { return t.Text }", "title": "" }, { "docid": "bfc5aebe08faa432c98569b1b0a61c5e", "score": "0.69966877", "text": "func (p *process) getField(field string) string {\n\tv := reflect.ValueOf(p).Elem()\n\treturn fmt.Sprintf(\"%v\", v.FieldByName(field))\n}", "title": "" }, { "docid": "6b4fb99d7bed868b0b7a935c7ecc8e68", "score": "0.69912446", "text": "func (e ReadContactRequestValidationError) GetField() string { return e.Field }", "title": "" }, { "docid": "c0fea160f4099e52bd2f1e02807b9f55", "score": "0.69740015", "text": "func GetField(sf reflect.StructField, v reflect.Value) reflect.Value {\n\tfieldPath := sf.Tag.Get(dialsFieldPathTag)\n\t// the tag should always be set after going through the flatten mangler\n\tif fieldPath == \"\" {\n\t\tpanic(fmt.Errorf(\"dialsfieldpath tag not set for field %s\", sf.Name))\n\t}\n\tfields := strings.Split(fieldPath, \",\")\n\tfor _, fname := range fields {\n\t\tv = stripPtrs(v)\n\t\t// if the struct isn't populated, return the zero value\n\t\tif !v.IsValid() {\n\t\t\t// ignore the kind and get the concrete type\n\t\t\t_, t := getUnderlyingKindType(sf.Type)\n\t\t\treturn reflect.New(t).Elem()\n\t\t}\n\t\tv = v.FieldByName(fname)\n\t}\n\n\tv = stripPtrs(v)\n\n\t// if the final value isn't populated, return the zero value\n\tif !v.IsValid() {\n\t\t// ignore the kind and get the concrete type\n\t\t_, t := getUnderlyingKindType(sf.Type)\n\t\treturn reflect.New(t).Elem()\n\t}\n\n\treturn v\n}", "title": "" }, { "docid": "7db46bd040ec78481ca33c2440061ace", "score": "0.6956642", "text": "func (e SMSRequestValidationError) GetField() string { return e.Field }", "title": "" }, { "docid": "d4562281b4e2748a75749b03b36064a6", "score": "0.695308", "text": "func getField(payload map[string]interface{}, name string) interface{} {\n\tval, found := getFieldExist(payload, name)\n\tif !found {\n\t\treturn nil\n\t}\n\treturn val\n}", "title": "" }, { "docid": "d4562281b4e2748a75749b03b36064a6", "score": "0.695308", "text": "func getField(payload map[string]interface{}, name string) interface{} {\n\tval, found := getFieldExist(payload, name)\n\tif !found {\n\t\treturn nil\n\t}\n\treturn val\n}", "title": "" }, { "docid": "19f1e70d3d5bd495fa34e897ddc8ee91", "score": "0.6950962", "text": "func (res *GdResource) GetField(name string) (*GdValue, error) {\n\tfor _, field := range res.Fields {\n\t\tif field.Key == name {\n\t\t\treturn field.Value, nil\n\t\t}\n\t}\n\treturn nil, fmt.Errorf(\"unknown field in %s: %s\", res.Pos, name)\n}", "title": "" }, { "docid": "86c5e7651d6254b4febd0ad151d81532", "score": "0.6940468", "text": "func (b *builder) getField(f *ast.Field) *proxydoc.Field {\n\tvar df proxydoc.Field\n\tif len(f.Names) == 0 {\n\t\treturn nil\n\t}\n\tdf.Name = f.Names[0].Name\n\tvar sb strings.Builder\n\tformat.Node(&sb, b.fset, f.Type)\n\tdf.Type = sb.String()\n\tdf.Doc = f.Doc.Text()\n\tif f.Tag != nil {\n\t\tdf.StructTag = f.Tag.Value\n\t}\n\n\treturn &df\n}", "title": "" }, { "docid": "cdd95ea5ce686c51f7572913f0d2d3d7", "score": "0.6926415", "text": "func (e ContactValidationError) GetField() string { return e.Field }", "title": "" }, { "docid": "26049f00506e7e6f40b484caba1d8b7d", "score": "0.68997246", "text": "func (m fieldMap) Get(field string) string {\n\tval, _ := m.get(field)\n\treturn val\n}", "title": "" }, { "docid": "ba9b02b83fdbef5b75c282bcf1b3bf7c", "score": "0.68966883", "text": "func (e ReadGroupRequestValidationError) GetField() string { return e.Field }", "title": "" }, { "docid": "48b4a552ec12658f6d3ce7f2629dc4ee", "score": "0.6885431", "text": "func (fs *Fields) Get(n string) *Field {\n\treturn fs.m[strings.ToLower(n)]\n}", "title": "" }, { "docid": "eedef66c2bc4d6f3e6a0cb8464d10d26", "score": "0.6876756", "text": "func (e ReadContactResponseValidationError) GetField() string { return e.Field }", "title": "" }, { "docid": "1a04a4b12698067bde109a38821a8d96", "score": "0.6835735", "text": "func (e SMSResponseValidationError) GetField() string { return e.Field }", "title": "" }, { "docid": "7985752728c397bef313e796257636fb", "score": "0.6834684", "text": "func (r Row2) GetField(i int) Value {\n\treturn r[i]\n}", "title": "" }, { "docid": "b0b11b84348c95a41822fc68ad86b681", "score": "0.6795889", "text": "func (hash *Hash) Field(field []byte) ([]byte, error) {\n\tdataKey := hash.EncodeDataKey(field)\n\treturn hash.store.Get(dataKey)\n}", "title": "" }, { "docid": "30e090be3f33bc714bdebd7f2e667f92", "score": "0.67944634", "text": "func (doc DocumentData) Field(id string) (*DocumentField, error) {\n return doc.Record.Field(id)\n}", "title": "" }, { "docid": "3d64f99eb05e9b50d193c2f0cba69d82", "score": "0.67781574", "text": "func (e ReadGroupResponseValidationError) GetField() string { return e.Field }", "title": "" }, { "docid": "18bdd96bbb6c369c9f5542d68fea33c1", "score": "0.6762308", "text": "func (r *FluxRecord) Field() string {\n\treturn stringValue(r.values, \"_field\")\n}", "title": "" }, { "docid": "18bdd96bbb6c369c9f5542d68fea33c1", "score": "0.6762308", "text": "func (r *FluxRecord) Field() string {\n\treturn stringValue(r.values, \"_field\")\n}", "title": "" }, { "docid": "22c4fd4bfc218d8998e9ac9c286e9c68", "score": "0.67565817", "text": "func (d *Document) GetField(name string) (IndexableField, error) {\n\tfor _, field := range d.fields {\n\t\tif field.Name() == name {\n\t\t\treturn field, nil\n\t\t}\n\t}\n\treturn nil, FrrFieldNotFound\n}", "title": "" }, { "docid": "617ef2bc1acd142bd44971686ca3c8de", "score": "0.6743176", "text": "func (h *HiddenModel) GetFieldValue(field *mapping.StructField) (interface{}, error) {\n\tswitch field.Index[0] {\n\tcase 0: // ID\n\t\treturn h.ID, nil\n\tcase 1: // Visible\n\t\treturn h.Visible, nil\n\tcase 2: // HiddenField\n\t\treturn h.HiddenField, nil\n\t}\n\treturn nil, errors.Wrapf(mapping.ErrInvalidModelField, \"provided invalid field: '%s' for given model: HiddenModel'\", field.Name())\n}", "title": "" }, { "docid": "222400c2faa0df7e84877ba9df06cc47", "score": "0.67368376", "text": "func (z *Structomancer) GetFieldValue(aStruct interface{}, fnickname string) (interface{}, error) {\n\tfv, err := z.GetFieldValueV(reflect.ValueOf(aStruct), fnickname)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn fv.Interface(), nil\n}", "title": "" }, { "docid": "cd879c789a222287b9ff7739209b1885", "score": "0.6726658", "text": "func (this *listValue) Field(field string) (Value, bool) {\n\treturn this.slice.Field(field)\n}", "title": "" }, { "docid": "a8f5f4526f220f6c767d29f01f686cfc", "score": "0.67082524", "text": "func (e GroupValidationError) GetField() string { return e.Field }", "title": "" }, { "docid": "6b70b923fc5c70fac674c37459faf2ff", "score": "0.67067397", "text": "func (f Field) Field() Field { return f }", "title": "" }, { "docid": "85b72360ea72b05845d70faa47642af0", "score": "0.66932565", "text": "func getField(in interface{}, field string) interface{} {\n\tv := reflect.ValueOf(in)\n\tparts := strings.Split(field, \".\")\n\tf := v // hold this\n\tfor i, part := range parts {\n\n\t\tif f.Kind() == reflect.Struct {\n\t\t\t// if this is a struct, grab the field by name,\n\t\t\t// and assign it to `f` (above)\n\t\t\tf = f.FieldByName(part)\n\n\t\t\t// if this field name is valid and it's the\n\t\t\t// last value in the `parts` array, return\n\t\t\t// the value\n\t\t\tif f.IsValid() && i == len(parts)-1 {\n\t\t\t\treturn f.Interface()\n\t\t\t}\n\t\t} else {\n\t\t\t// if this isn't a struct and f isn't a valid element,\n\t\t\t// continue until we get something that's valid\n\t\t\tif !f.IsValid() {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\t// it's valid, let's grab the field and\n\t\t\t// assign it to `f` (above)\n\t\t\tf = f.Elem().FieldByName(part)\n\n\t\t\t// if this field name is valid and it's\n\t\t\t// the last value in the `parts` array,\n\t\t\t// return the value\n\t\t\tif f.IsValid() && i == len(parts)-1 {\n\t\t\t\treturn f.Interface()\n\t\t\t}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "de0c104a754af53c0fc89f1112de2dd4", "score": "0.6690634", "text": "func (g *Group) Field(fid id.PropertySchemaFieldID) *Field {\n\tif g == nil {\n\t\treturn nil\n\t}\n\tfor _, f := range g.fields {\n\t\tif f.Field() == fid {\n\t\t\treturn f\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "56b63b56769aa5cdabc58a2afe94e24b", "score": "0.6679069", "text": "func (c LessThan) GetField() string {\n\treturn c.Field\n}", "title": "" }, { "docid": "69fa3e1ba26c3d6b96a33f6a14255a91", "score": "0.6667448", "text": "func (e CreateContactRequestValidationError) GetField() string { return e.Field }", "title": "" }, { "docid": "8a0ce3a7c6c73df0164340611457d35a", "score": "0.666367", "text": "func (u *UnmarshalModel) GetFieldValue(field *mapping.StructField) (interface{}, error) {\n\tswitch field.Index[0] {\n\tcase 0: // ID\n\t\treturn u.ID, nil\n\tcase 1: // PtrString\n\t\treturn u.PtrString, nil\n\tcase 2: // PtrTime\n\t\treturn u.PtrTime, nil\n\tcase 3: // StringSlice\n\t\treturn u.StringSlice, nil\n\t}\n\treturn nil, errors.Wrapf(mapping.ErrInvalidModelField, \"provided invalid field: '%s' for given model: UnmarshalModel'\", field.Name())\n}", "title": "" }, { "docid": "9850f720dc17efec6d6288aeb34b623b", "score": "0.66545635", "text": "func GetField(ø interface{}, field string) interface{} {\n\tp := reflect.ValueOf(ø).Elem().FieldByName(field)\n\treturn p.Interface()\n}", "title": "" }, { "docid": "dc939c34d04a49092fa60d88fc5bf17d", "score": "0.6648086", "text": "func (t *JiraIssueChangeLog) GetField() string {\n\treturn t.Field\n}", "title": "" }, { "docid": "ae7edd58143f9ea5eca0a230a3ead5a3", "score": "0.66470265", "text": "func (p Params) Get(field string) string {\n\treturn p[field]\n}", "title": "" }, { "docid": "2626fab7f01be16bd3adf5a533ed411e", "score": "0.66395825", "text": "func (e GetObjectRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "bad8934dfe9b27a4e291fd13e9b85566", "score": "0.66377145", "text": "func (m *ModelTime) GetFieldValue(field *mapping.StructField) (interface{}, error) {\n\tswitch field.Index[0] {\n\tcase 0: // ID\n\t\treturn m.ID, nil\n\tcase 1: // Time\n\t\treturn m.Time, nil\n\t}\n\treturn nil, errors.Wrapf(mapping.ErrInvalidModelField, \"provided invalid field: '%s' for given model: ModelTime'\", field.Name())\n}", "title": "" }, { "docid": "2d77b4b83b96683531e188152e57ea0e", "score": "0.6636589", "text": "func (sym *StructTypeSymbol) GetField(identifier string) *FieldSymbol {\n\tfor _, f := range sym.Fields {\n\t\tif f.Identifier() == identifier {\n\t\t\treturn f\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8c1e9e52bdef5712b802bfcab160944e", "score": "0.66333103", "text": "func (e ReadProfileRequestValidationError) GetField() string { return e.Field }", "title": "" }, { "docid": "221a972df8e9cc06cfdaf875ef65155d", "score": "0.66312534", "text": "func (s *Struct) Field(name string) (*Field, bool) {\n\tf, ok := s.fields[name]\n\treturn f, ok\n}", "title": "" }, { "docid": "59d8751aca78321cf1189067dab609a4", "score": "0.6623544", "text": "func (u *User) GetFieldValue(field *mapping.StructField) (interface{}, error) {\n\tswitch field.Index[0] {\n\tcase 1: // ID\n\t\treturn u.ID, nil\n\tcase 2: // Lang\n\t\treturn u.Lang, nil\n\tcase 3: // Name\n\t\treturn u.Name, nil\n\t}\n\treturn nil, errors.Wrapf(mapping.ErrInvalidModelField, \"provided invalid field: '%s' for given model: User'\", field.Name())\n}", "title": "" }, { "docid": "3d3f218a04830137afa75fa27dbf55a2", "score": "0.6612496", "text": "func (e UpdateContactRequestValidationError) GetField() string { return e.Field }", "title": "" }, { "docid": "2d5ae9aca4187be2757b91de1e900d30", "score": "0.6598389", "text": "func (e CreateContactResponseValidationError) GetField() string { return e.Field }", "title": "" }, { "docid": "fbc896c370314424dbac49150f7f9d23", "score": "0.6592922", "text": "func (e GetReleaseDetailReqValidationError) Field() string { return e.field }", "title": "" }, { "docid": "594bc7493517cbe3c0103e4cb05f8ba4", "score": "0.6589241", "text": "func (qr *QueryResult) Get(field string) interface{} {\n\treturn qr.Data[field]\n}", "title": "" }, { "docid": "6a6d41e8f66cec85822ea88ab23f4530", "score": "0.6561625", "text": "func (e ReadProfileResponseValidationError) GetField() string { return e.Field }", "title": "" }, { "docid": "1dc2139626a714a80c5a359e598c2a9c", "score": "0.65610063", "text": "func (f *Field) GetValue() interface{} {\n\treturn f.fieldValue.Interface()\n}", "title": "" }, { "docid": "2c9702c115d40d186d7dc9f727846752", "score": "0.656023", "text": "func (m *MeasurementFields) Field(name string) *Field {\n\tf := m.fields.Load().(map[string]*Field)[name]\n\treturn f\n}", "title": "" }, { "docid": "f06f1f5a87015a53503335d46f212a06", "score": "0.65550894", "text": "func (e ListContactRequestValidationError) GetField() string { return e.Field }", "title": "" }, { "docid": "7a3141727e71fad7479f6c7f9316437d", "score": "0.65467566", "text": "func (e UpdateContactResponseValidationError) GetField() string { return e.Field }", "title": "" }, { "docid": "4b3a033a123e0cfce40bd63a4f6c74d6", "score": "0.6541897", "text": "func (e GetReleaseDetailRespValidationError) Field() string { return e.field }", "title": "" }, { "docid": "9cd98d3825bfa3435843c45fb4afff9f", "score": "0.65417933", "text": "func (p *Post) GetFieldValue(field *mapping.StructField) (interface{}, error) {\n\tswitch field.Index[0] {\n\tcase 0: // ID\n\t\treturn p.ID, nil\n\tcase 1: // BlogID\n\t\treturn p.BlogID, nil\n\tcase 2: // Title\n\t\treturn p.Title, nil\n\tcase 3: // Body\n\t\treturn p.Body, nil\n\t}\n\treturn nil, errors.Wrapf(mapping.ErrInvalidModelField, \"provided invalid field: '%s' for given model: Post'\", field.Name())\n}", "title": "" }, { "docid": "561f4d64036d22e1b1c80ee696c759bc", "score": "0.65366393", "text": "func (u *User) GetFieldValue(field *mapping.StructField) (interface{}, error) {\n\tswitch field.Index[0] {\n\tcase 0: // ID\n\t\treturn u.ID, nil\n\tcase 1: // CreatedAt\n\t\treturn u.CreatedAt, nil\n\tcase 2: // DeletedAt\n\t\treturn u.DeletedAt, nil\n\tcase 3: // Name\n\t\treturn u.Name, nil\n\tcase 4: // Age\n\t\treturn u.Age, nil\n\tcase 5: // IntArray\n\t\treturn u.IntArray, nil\n\tcase 6: // Bytes\n\t\treturn u.Bytes, nil\n\tcase 7: // PtrBytes\n\t\treturn u.PtrBytes, nil\n\tcase 8: // Wrapped\n\t\treturn u.Wrapped, nil\n\tcase 9: // PtrWrapped\n\t\treturn u.PtrWrapped, nil\n\t}\n\treturn nil, errors.Wrapf(mapping.ErrInvalidModelField, \"provided invalid field: '%s' for given model: User'\", field.Name())\n}", "title": "" }, { "docid": "507e3c4ba79be05e57ea270a87ec0c9c", "score": "0.65290135", "text": "func (m *ModelPtrTime) GetFieldValue(field *mapping.StructField) (interface{}, error) {\n\tswitch field.Index[0] {\n\tcase 0: // ID\n\t\treturn m.ID, nil\n\tcase 1: // Time\n\t\treturn m.Time, nil\n\t}\n\treturn nil, errors.Wrapf(mapping.ErrInvalidModelField, \"provided invalid field: '%s' for given model: ModelPtrTime'\", field.Name())\n}", "title": "" }, { "docid": "1ebd0d19d125bbecc0be318ecd789bd2", "score": "0.65289426", "text": "func (e ListContactsResponseValidationError) GetField() string { return e.Field }", "title": "" }, { "docid": "6c95e51c3d200d9a0bf3571bcb0d6685", "score": "0.65241045", "text": "func (fg *FileGroup) Field(id FG_t) *uint {\n\tswitch id {\n\tcase FGother:\n\t\treturn &fg.FGother\n\tcase FGvideo:\n\t\treturn &fg.FGvideo\n\tcase FGaudio:\n\t\treturn &fg.FGaudio\n\tcase FGimage:\n\t\treturn &fg.FGimage\n\tcase FGbooks:\n\t\treturn &fg.FGbooks\n\tcase FGtexts:\n\t\treturn &fg.FGtexts\n\tcase FGpacks:\n\t\treturn &fg.FGpacks\n\tcase FGgroup:\n\t\treturn &fg.FGgroup\n\tdefault:\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "a5f80ec080e773e291cdeb9b3aafc674", "score": "0.65207654", "text": "func (e GetDetailRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "1df1e4ef2c3b7255809b1bf62051f801", "score": "0.64994603", "text": "func (tup Tuple) GetField(i int) []byte {\n\tcnt := tup.Count()\n\tif i >= cnt {\n\t\treturn nil\n\t}\n\n\tsz := ByteSize(len(tup))\n\tsplit := sz - uint16Size*ByteSize(cnt)\n\toffs := tup[split : sz-countSize]\n\n\tstart, stop := uint16(0), uint16(split)\n\tif i*2 < len(offs) {\n\t\tpos := i * 2\n\t\tstop = ReadUint16(offs[pos : pos+2])\n\t}\n\tif i > 0 {\n\t\tpos := (i - 1) * 2\n\t\tstart = ReadUint16(offs[pos : pos+2])\n\t}\n\n\tif start == stop {\n\t\treturn nil // NULL\n\t}\n\n\treturn tup[start:stop]\n}", "title": "" }, { "docid": "cd7402c7d2a05404d86426b8a1f855ee", "score": "0.64980865", "text": "func( this *CubeSQLCursor ) GetField( row int, column int ) string {\n var len C.int = 0\n return C.GoStringN( C.cubesql_cursor_field( this.cursor, C.int( row ), C.int( column ), &len ), len ) // Problem: NULL Pointer in return\n}", "title": "" }, { "docid": "f7947ac6c7703124e628d99352a91110", "score": "0.6477201", "text": "func (e EmailValidationError) GetField() string { return e.Field }", "title": "" }, { "docid": "e2a12651f2f7ef13802a1f1fa56b768a", "score": "0.64625233", "text": "func (b *Blog) GetFieldValue(field *mapping.StructField) (interface{}, error) {\n\tswitch field.Index[0] {\n\tcase 0: // ID\n\t\treturn b.ID, nil\n\tcase 1: // Title\n\t\treturn b.Title, nil\n\tcase 4: // CurrentPostID\n\t\treturn b.CurrentPostID, nil\n\tcase 5: // CreatedAt\n\t\treturn b.CreatedAt, nil\n\tcase 6: // ViewCount\n\t\treturn b.ViewCount, nil\n\t}\n\treturn nil, errors.Wrapf(mapping.ErrInvalidModelField, \"provided invalid field: '%s' for given model: Blog'\", field.Name())\n}", "title": "" }, { "docid": "8790e21b6d51f5726aee2f7e2f756244", "score": "0.6453569", "text": "func (e DeleteContactRequestValidationError) GetField() string { return e.Field }", "title": "" }, { "docid": "90970ce6f7595baef4c6ed664c74f52f", "score": "0.6452168", "text": "func (p *Pet) GetFieldValue(field *mapping.StructField) (interface{}, error) {\n\tswitch field.Index[0] {\n\tcase 0: // ID\n\t\treturn p.ID, nil\n\tcase 1: // Name\n\t\treturn p.Name, nil\n\t}\n\treturn nil, errors.Wrapf(mapping.ErrInvalidModelField, \"provided invalid field: '%s' for given model: Pet'\", field.Name())\n}", "title": "" }, { "docid": "c643bd0afe439bd5dc8e7ec0d3e2a6c4", "score": "0.6450436", "text": "func (e GetRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "c643bd0afe439bd5dc8e7ec0d3e2a6c4", "score": "0.6450436", "text": "func (e GetRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "c643bd0afe439bd5dc8e7ec0d3e2a6c4", "score": "0.6450436", "text": "func (e GetRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "c643bd0afe439bd5dc8e7ec0d3e2a6c4", "score": "0.6450436", "text": "func (e GetRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "82469220253dd85990b4bcc106b1f275", "score": "0.6437109", "text": "func (g *GroupNode) Field(i int) Node {\n\treturn g.fields[i]\n}", "title": "" }, { "docid": "27dcaa62720f31a868046cf9d3230ac7", "score": "0.6410687", "text": "func (e ListGroupRequestValidationError) GetField() string { return e.Field }", "title": "" }, { "docid": "974e8b3562594a592856cb9e830b4853", "score": "0.64073277", "text": "func (e GetObjectResponseValidationError) Field() string { return e.field }", "title": "" }, { "docid": "98b32e60bae465181b2e9bf0eeb2fa04", "score": "0.64038074", "text": "func (c *CustomTagModel) GetFieldValue(field *mapping.StructField) (interface{}, error) {\n\tswitch field.Index[0] {\n\tcase 0: // ID\n\t\treturn c.ID, nil\n\tcase 1: // VisibleCustomName\n\t\treturn c.VisibleCustomName, nil\n\tcase 2: // HiddenField\n\t\treturn c.HiddenField, nil\n\tcase 3: // OmitEmptyField\n\t\treturn c.OmitEmptyField, nil\n\tcase 4: // CustomOmitEmpty\n\t\treturn c.CustomOmitEmpty, nil\n\t}\n\treturn nil, errors.Wrapf(mapping.ErrInvalidModelField, \"provided invalid field: '%s' for given model: CustomTagModel'\", field.Name())\n}", "title": "" }, { "docid": "9557c5aa748f5069e8be954d33ae3e34", "score": "0.6402045", "text": "func (e CreateGroupRequestValidationError) GetField() string { return e.Field }", "title": "" }, { "docid": "e91f61e84cb7cfbb1a74862d85b09712", "score": "0.64015156", "text": "func (e UpdateGroupRequestValidationError) GetField() string { return e.Field }", "title": "" }, { "docid": "dce84e0577d41a0119f9c73d490af1b7", "score": "0.6397945", "text": "func (record DocumentRecord) Field(id string) (*DocumentField, error) {\n for _, f := range record.Fields {\n if f.Id == id {\n return &f, nil\n }\n }\n return nil, errors.New(\"Field Not Found\")\n}", "title": "" }, { "docid": "330c33f8d1486eadeb6a1ebf512bbdb4", "score": "0.63967144", "text": "func (e DeleteContactResponseValidationError) GetField() string { return e.Field }", "title": "" }, { "docid": "b10a465755e3b8786a2d35dd778492f4", "score": "0.63936335", "text": "func (e GetDetailResponseValidationError) Field() string { return e.field }", "title": "" }, { "docid": "f73036bb06f4a6159513f671cf7a55cb", "score": "0.6392161", "text": "func (e GetObjectMaterialsRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "78d99427d44ec2bee66daa722879ad4e", "score": "0.6389197", "text": "func (tq *SQuery) Field(name string) IQueryField {\n\tf := tq.findField(name)\n\tif DEBUG_SQLCHEMY && f == nil {\n\t\tlog.Debugf(\"cannot find field %s for query\", name)\n\t}\n\treturn f\n}", "title": "" }, { "docid": "1e6ab50b8b814cf8159873972f775e51", "score": "0.63774467", "text": "func (e GetMessageRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "71dcc3470f5c417018fa236ba43e6e38", "score": "0.6372085", "text": "func (e UpdateGroupResponseValidationError) GetField() string { return e.Field }", "title": "" }, { "docid": "a1d0b736846fe8ae06fef5718db56467", "score": "0.6368853", "text": "func (c GreaterThanEqual) GetField() string {\n\treturn c.Field\n}", "title": "" }, { "docid": "f79c8d8758066e54900b45d9ee567209", "score": "0.6357171", "text": "func FieldValue(path string, in interface{}) (v interface{}, found bool) {\n\tvar cur reflect.Value\n\n\tcur, found = findValue(path, in)\n\tif !found {\n\t\treturn\n\t}\n\n\tv, found = cur.Interface(), true\n\n\treturn\n}", "title": "" }, { "docid": "ff3c42d02b530ce6afbcf713e706de0e", "score": "0.63403153", "text": "func (val *Value) Field(label string) (cue.Value, error) {\n\tvar v cue.Value\n\tif isDef(label) {\n\t\tv = val.v.LookupDef(label)\n\t} else {\n\t\tv = val.v.Lookup(label)\n\t}\n\n\tif !v.Exists() {\n\t\treturn v, errors.Errorf(\"label %s not found\", label)\n\t}\n\n\tif v.IncompleteKind() == cue.BottomKind {\n\t\treturn v, errors.Errorf(\"label %s's value not computed\", label)\n\t}\n\treturn v, nil\n}", "title": "" }, { "docid": "fb4782f48d5a5a7ff1cf2529f835d4c2", "score": "0.63390106", "text": "func (e CreateGroupResponseValidationError) GetField() string { return e.Field }", "title": "" }, { "docid": "480faf9e7cd8df6cd92f8c84d90c4cf6", "score": "0.63347644", "text": "func (e GetObjectMaterialsResponseValidationError) Field() string { return e.field }", "title": "" } ]
335fe010430c91971ed16a432a0a4a92
RegisterService register service with name and protocol specified
[ { "docid": "bf74252d849a394ead2d89dc74b072b6", "score": "0.64005965", "text": "func RegisterService(name string, configs map[string]string, factory ServiceFactory) {\n\tif _, ok := _serviceFactories[name]; ok {\n\t\tglog.Errorf(\"Service '%s' is not registered\", name)\n\t}\n\tcore.RegisterConfig(name, configs)\n\t_serviceFactories[name] = factory\n}", "title": "" } ]
[ { "docid": "138c9c54d14330032af04997e18a019a", "score": "0.7312597", "text": "func (s Server) RegisterService(recv interface{}, name string) {\n\ts.RPCServer.RegisterService(recv, name)\n}", "title": "" }, { "docid": "3f4a14f0d926b6492d51c863c2c29424", "score": "0.72882843", "text": "func RegisterService(name, version string, baseURL *string, mode *string) (*Service, error) {\n\tserviceKey := getServiceKey(name, version)\n\tif service, OK := registeredServices[serviceKey]; OK {\n\t\treturn nil, fmt.Errorf(\"%v already registered\", service)\n\t}\n\tservice := &Service{serviceKey, name, version, make(map[string]*API), baseURL, mode, nil}\n\tserviceMode, err := service.validateServiceMode()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tservice.InvocationMode = serviceMode\n\tif *service.InvocationMode == \"spt\" {\n\t\tservice.ReverseProxy = proxy.NewReverseProxy(*service.BaseURL)\n\t}\n\tregisteredServices[service.ID] = service\n\treturn service, nil\n}", "title": "" }, { "docid": "d6d776f0dbba4eb12a673c1bf17e2321", "score": "0.69544744", "text": "func (c *Client) RegisterService(name, id string, tags []string, port int, check map[string]string) (serviceId, checkId string, err error) {\n\tif id == \"\" {\n\t\tid = name\n\t}\n\tbody := map[string]interface{}{\"Name\": name, \"ID\": id}\n\tif tags != nil {\n\t\tbody[\"Tags\"] = tags\n\t}\n\tif port > 0 {\n\t\tbody[\"Port\"] = port\n\t}\n\tif check != nil {\n\t\tbody[\"Check\"] = check\n\t}\n\tdata, err := json.Marshal(body)\n\tif err != nil {\n\t\treturn\n\t}\n\tresp, err := http.Post(c.address+path.Join(APIRoot, \"agent/service/register\"), \"application/json\", bytes.NewBuffer(data))\n\tif err != nil {\n\t\treturn \"\", \"\", err\n\t} else {\n\t\tdefer resp.Body.Close()\n\t}\n\tif resp.StatusCode != 200 {\n\t\treturn \"\", \"\", errors.New(resp.Status)\n\t}\n\treturn id, fmt.Sprintf(\"service:%s\", id), nil\n}", "title": "" }, { "docid": "9759ab48746b11c85e2fd3621983cf28", "score": "0.6952375", "text": "func RegisterService(srv interface{}, name, ver, desc string, isDefault bool) (\n\t*RPCService, error) {\n\n\treturn DefaultServer.RegisterService(srv, name, ver, desc, isDefault)\n}", "title": "" }, { "docid": "7e36cf094a24f0a5713bdf5373493ac3", "score": "0.6926512", "text": "func RegisterService(ip string, serviceName string) {\n\tclient.HSet(\"services\", ip, serviceName)\n}", "title": "" }, { "docid": "6c7425a32d1e0cf4f9c612fa1c1c9aff", "score": "0.6897883", "text": "func (ctx *Context) RegisterService(name string, service rpctypes.Web3Service) {\n\tctx.services[name] = service\n}", "title": "" }, { "docid": "0140729f6dd23a8f0a6c061e84485dab", "score": "0.6883161", "text": "func RegisterService(w http.ResponseWriter, r *http.Request) {\n\tvar service Service\n\tif body, err := ioutil.ReadAll(io.LimitReader(r.Body, 1048576)); err != nil {\n\t\tpanic(err)\n\t}\n\tif err := body.Close(); err != nil {\n\t\tpanic(err)\n\t}\n\tif err := json.Unmarshal(body, &service); err != nil {\n\t\tw.Header().Set(\"Content-Type\", \"application/json; charset=UTF-8\")\n\t\tw.WriteHeader(422) // unprocessable entity\n\t\tjson.NewEncoder(w).Encode(err)\n\t}\n\n\tt := services.Add(service)\n\tw.Header().Set(\"Content-Type\", \"application/json; charset=UTF-8\")\n\tw.WriteHeader(http.StatusCreated)\n\tjson.NewEncoder(w).Encode(t)\n}", "title": "" }, { "docid": "9ebd1bd2c7a0769c898a16e7422912c7", "score": "0.6859865", "text": "func (s *Server) RegisterService(srv interface{}, name, ver, desc string, isDefault bool) (*RPCService, error) {\n\treturn s.services.register(srv, name, ver, desc, isDefault, false)\n}", "title": "" }, { "docid": "1880df9ef51f6660c7f9a515d643e538", "score": "0.6829648", "text": "func RegisterService(server *grpc.Server, service Backend) {\n\tserver.RegisterService(&serviceDesc, service)\n}", "title": "" }, { "docid": "1880df9ef51f6660c7f9a515d643e538", "score": "0.6829648", "text": "func RegisterService(server *grpc.Server, service Backend) {\n\tserver.RegisterService(&serviceDesc, service)\n}", "title": "" }, { "docid": "bbc47b817d1c197bc8b27a992dad35a0", "score": "0.67615116", "text": "func (srv *Server) RegisterService(sd *grpc.ServiceDesc, ss interface{}) {\n\tfor _, desc := range sd.Methods {\n\t\tpath := fmt.Sprintf(\"/%v/%v\", sd.ServiceName, desc.MethodName)\n\t\tsrv.handlers[path] = srv.unaryHandler(ss, methodHandler(desc.Handler))\n\t}\n\tfor _, desc := range sd.Streams {\n\t\tpath := fmt.Sprintf(\"/%v/%v\", sd.ServiceName, desc.StreamName)\n\t\tsrv.handlers[path] = srv.streamHandler(ss, path, desc)\n\t}\n}", "title": "" }, { "docid": "d036d55224934e63b23464a98ab6cbbe", "score": "0.67245674", "text": "func (m *Metadata) RegisterService(id int, data string) error {\n\tpath := fmt.Sprintf(\"%s/%d\", m.servicePath, id)\n\tif err := m.zkConn.Create(path, data, zookeeper.Ephemeral); err != nil {\n\t\tif zookeeper.IsExistError(err) {\n\t\t\treturn errors.AlreadyExistsf(\"service %d\", id)\n\t\t}\n\t\treturn errors.Trace(err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "368d687e6b3628cd1d1e86eb4f41f3e1", "score": "0.6675359", "text": "func (cs *Cellaserv) registerService(req *cellaserv.Request) (interface{}, error) {\n\tvar data api.RegisterServiceRequest\n\terr := json.Unmarshal(req.Data, &data)\n\tif err != nil {\n\t\tcs.logger.Warnf(\"Could not unmarshal request data: %s, %s\", req.Data, err)\n\t\treturn nil, err\n\t}\n\n\tclient, err := cs.broker.GetRequestSender(req)\n\tif err != nil {\n\t\tcs.logger.Warnf(\"Could not find client: %s\", err)\n\t\treturn nil, err\n\t}\n\n\tregister := &cellaserv.Register{\n\t\tName: data.Name,\n\t\tIdentification: data.Identification,\n\t}\n\tcs.broker.HandleRegister(client, register)\n\n\treturn nil, nil\n}", "title": "" }, { "docid": "c234a438a7cc185278b8d3c124067322", "score": "0.6613388", "text": "func (s *Server) RegisterName(name string, rcvr interface{}) error {\n\tif s.services == nil {\n\t\ts.services = make(serviceRegistry)\n\t}\n\n\tsvc := new(service)\n\tsvc.typ = reflect.TypeOf(rcvr)\n\trcvrVal := reflect.ValueOf(rcvr)\n\n\tif name == \"\" {\n\t\treturn fmt.Errorf(\"no service name for type %s\", svc.typ.String())\n\t}\n\tif !isExported(reflect.Indirect(rcvrVal).Type().Name()) {\n\t\treturn fmt.Errorf(\"%s is not exported\", reflect.Indirect(rcvrVal).Type().Name())\n\t}\n\n\tmethods, subscriptions := suitableCallbacks(rcvrVal, svc.typ)\n\n\tif len(methods) == 0 && len(subscriptions) == 0 {\n\t\treturn fmt.Errorf(\"Service %T doesn't have any suitable methods/subscriptions to expose\", rcvr)\n\t}\n\n\t// already a previous service register under given name, merge methods/subscriptions\n\tif regsvc, present := s.services[name]; present {\n\t\tfor _, m := range methods {\n\t\t\tregsvc.callbacks[formatName(m.method.Name)] = m\n\t\t}\n\t\tfor _, s := range subscriptions {\n\t\t\tregsvc.subscriptions[formatName(s.method.Name)] = s\n\t\t}\n\t\treturn nil\n\t}\n\n\tsvc.name = name\n\tsvc.callbacks, svc.subscriptions = methods, subscriptions\n\n\ts.services[svc.name] = svc\n\treturn nil\n}", "title": "" }, { "docid": "8cc35254ec714afb2f4829b147ab10af", "score": "0.65975046", "text": "func (sd *ServiceDiscovery) RegisterService(options ...discovery.Option) error {\n\topts := new(discovery.Options)\n\tfor _, o := range options {\n\t\to(opts)\n\t}\n\n\taddr := fmt.Sprintf(\"%s%s\", sd.address, RegisterServiceURL)\n\t_, _, err := sd.sendRequest(addr, http.MethodPost, opts.Info)\n\tif err != nil {\n\t\tlogger.Log().ErrorWithFields(logger.Fields{\n\t\t\t\"error\": err,\n\t\t\t\"info\": opts.Info,\n\t\t\t\"component\": componentName,\n\t\t}, \"Cannot register service\")\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "465bb2e88cc3c196c592a4b7cff26183", "score": "0.65878415", "text": "func RegisterService(name string, binder EndpointBinder, funcs ...interface{}) *Service {\n\tsr := PreregisterService(name, funcs...)\n\treturn sr.Start(binder)\n}", "title": "" }, { "docid": "d5c1bca7a327cc6d2dd5aba7afd5fbe2", "score": "0.6555569", "text": "func (rd *RegDiscover) RegisterService(key string, data []byte) error {\n\treturn rd.rdServer.Register(key, data)\n}", "title": "" }, { "docid": "a0358a9c8805f185c93192ecad2e68a8", "score": "0.6553383", "text": "func (s *Server) RegisterService(desc *grpc.ServiceDesc, impl any) {\n\ts.mu.Lock()\n\tdefer s.mu.Unlock()\n\tif s.started {\n\t\ts.Fatal(errors.Reason(\"the server has already been started\").Err())\n\t}\n\ts.prpc.RegisterService(desc, impl)\n\tif s.grpcPort != nil {\n\t\ts.grpcPort.registerService(desc, impl)\n\t}\n}", "title": "" }, { "docid": "3db924f1474762b68c5170d16a72a35e", "score": "0.65525955", "text": "func Register(p Protocol) {\n\tm.Lock()\n\tdefer m.Unlock()\n\tregistry[strings.ToLower(p.Name())] = p\n}", "title": "" }, { "docid": "998e09b28f81994abafa544443e66c13", "score": "0.65454006", "text": "func (m *Manager) Register(name string, up, down Func) *Service {\n\tm.lock.Lock()\n\tdefer m.lock.Unlock()\n\n\tif len(m.services) == 65535 {\n\t\tpanic(panicServiceLimit)\n\t}\n\n\tref := &Service{name, 0, up, down, \"\"}\n\tm.services[name] = ref\n\treturn ref\n}", "title": "" }, { "docid": "8996d18111197577037fe0fdbfba82b2", "score": "0.6520469", "text": "func RegisterService(s grpc.ServiceRegistrar, callbacks Callbacks) {\n\tpb.RegisterRemoteFileSystemServiceServer(s, NewService(callbacks))\n}", "title": "" }, { "docid": "d44bf9da9c4e325e52e289fc16f0f7cf", "score": "0.6477471", "text": "func RegisterService(name string, driver InitServiceFunc) {\n\tserverDriversMu.Lock()\n\tdefer serverDriversMu.Unlock()\n\n\tif driver == nil {\n\t\tpanic(fmt.Sprintf(\"Register Driver %s is nil\", name))\n\t}\n\n\tif _, dup := ServerDrivers[name]; dup {\n\t\tpanic(fmt.Sprintf(\"Register Called Twice for Driver %s\", name))\n\t}\n\n\tServerDrivers[name] = driver\n}", "title": "" }, { "docid": "489036609b7bf87869ef7b06e685579b", "score": "0.6473529", "text": "func (m *Manager) RegisterService(t Type, service Interface) {\n\tm.Register(t, service)\n}", "title": "" }, { "docid": "fd85676d5b8b4002f63dedd96e05ca6e", "score": "0.64723206", "text": "func (d *DefaultServerImpl) RegisterService(sd *grpc.ServiceDesc, sf interface{}) error {\n\td.init(false) // make sure its called before lock\n\tf, err := ToServiceFactoryV2(sf)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn d.registerService(sd, f, false)\n}", "title": "" }, { "docid": "32ef2e0c88d81f5ed935b09171987ee3", "score": "0.64481276", "text": "func RegisterService(server *grpc.Server, director StreamDirector, serviceName string, methodNames ...string) {\n\tstreamer := &handler{director}\n\tfakeDesc := &grpc.ServiceDesc{\n\t\tServiceName: serviceName,\n\t\tHandlerType: (*interface{})(nil),\n\t}\n\tfor _, m := range methodNames {\n\t\tstreamDesc := grpc.StreamDesc{\n\t\t\tStreamName: m,\n\t\t\tHandler: streamer.handler,\n\t\t\tServerStreams: true,\n\t\t\tClientStreams: true,\n\t\t}\n\t\tfakeDesc.Streams = append(fakeDesc.Streams, streamDesc)\n\t}\n\tserver.RegisterService(fakeDesc, streamer)\n}", "title": "" }, { "docid": "d09f2487ce5c2e60ec05cddc25e446bd", "score": "0.6446142", "text": "func Register(name string, f NewP2PServFunc) {\n\tservMu.Lock()\n\tdefer servMu.Unlock()\n\n\tif f == nil {\n\t\tpanic(\"network: Register new func is nil\")\n\t}\n\tif _, dup := services[name]; dup {\n\t\tpanic(\"network: Register called twice for func \" + name)\n\t}\n\tservices[name] = f\n}", "title": "" }, { "docid": "bd26f5e0aa048a4840ac799cf20febb4", "score": "0.64349204", "text": "func (c *Client) RegisterService(regCmd entity.RegCmd, f func(RegResponse)) {\n\tqrpc.GoFunc(&c.wg, func() {\n\t\tc.registerService(&regCmd, f)\n\t\tfor {\n\t\t\tselect {\n\t\t\tcase <-c.conn.Done():\n\t\t\t\treturn\n\t\t\tcase <-time.After(c.regInterlval):\n\t\t\t\tc.registerService(&regCmd, f)\n\t\t\t}\n\t\t}\n\t})\n}", "title": "" }, { "docid": "3096c067de82e8b953cc8bab2e9e4172", "score": "0.6427598", "text": "func (g *Gateway) Register(w http.ResponseWriter, r *http.Request) {\n\tvar req client.RegisterRequest\n\n\tif err := json.NewDecoder(r.Body).Decode(&req); err != nil {\n\t\twriteErrResponse(w, err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tif err := req.Validate(); err != nil {\n\t\twriteErrResponse(w, err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tresp, err := g.proxy.AddService(&req)\n\tif err != nil {\n\t\twriteErrResponse(w, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\twriteValidResponse(w, resp, http.StatusCreated)\n}", "title": "" }, { "docid": "043878bf43bf422b3283d5c8cab19c08", "score": "0.64152765", "text": "func (app App) ServiceRegister(ctx context.Context, serviceName string) (string, error) {\n\n\t//Check that a user is logged\n\tloggedInUserID, err := app.userInteractor.CurrentUserID(ctx)\n\tif err != nil {\n\t\treturn \"\", errors.Wrap(err, \"retrieving current user failed\")\n\t}\n\n\t//Generate code\n\trandState := fmt.Sprintf(\"oki%d\", time.Now().UnixNano())\n\n\t//Store it\n\terr = app.repository.StoreTemporaryCode(ctx, loggedInUserID, serviceName, randState)\n\tif err != nil {\n\t\treturn \"\", errors.Wrap(err, \"saving temporary code failed\")\n\t}\n\n\t//Get the URL\n\tconfig, err := app.getServiceConfig(serviceName)\n\tif err != nil {\n\t\treturn \"\", errors.Wrap(err, \"Unable to retrieve service configuration\")\n\t}\n\tauthURL := config.AuthCodeURL(randState, oauth2.AccessTypeOffline)\n\tfmt.Println(\"AuthCodeURL\", authURL)\n\n\treturn authURL, nil\n}", "title": "" }, { "docid": "19d48afce06687a557b31244965d9cca", "score": "0.6408956", "text": "func (s *Server) RegisterService(cfg config.ServiceConfig, handler http.Handler) error {\n\tsrv := &http.Server{\n\t\tAddr: cfg.Address,\n\t\tHandler: handler,\n\t\tMaxHeaderBytes: cfg.MaxHeaderBytes,\n\t}\n\tvar err error\n\tsrv.ReadTimeout, err = cfg.ReadTimeout.Duration()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error parsing duration for server %s: %v\", cfg.Address, err)\n\t}\n\tsrv.WriteTimeout, err = cfg.WriteTimeout.Duration()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error parsing duration for server %s: %v\", cfg.Address, err)\n\t}\n\ts.httpServers = append(s.httpServers, srv)\n\treturn nil\n}", "title": "" }, { "docid": "b9b79164ea91026941f70a202f8e1dc2", "score": "0.6388882", "text": "func (updateStream *UpdateStreamImpl) RegisterService() {\n\t// publish the stats\n\tstats.Publish(\"UpdateStreamState\", stats.StringFunc(func() string {\n\t\treturn usStateNames[updateStream.state.Load()]\n\t}))\n\n\t// and register all the RPC protocols\n\tfor _, f := range RegisterUpdateStreamServices {\n\t\tf(updateStream)\n\t}\n}", "title": "" }, { "docid": "79825062570853f01de013a9452c6a0c", "score": "0.6373021", "text": "func (srvc *Service) Register(req map[string]string, _ *struct{}) (err error) {\n\tr, err := newRes(req)\n\tif err != nil {\n\t\treturn\n\t}\n\tsrvc.mu.RLock()\n\tch, ok := srvc.pen[r.id]\n\tsrvc.mu.RUnlock()\n\tif !ok {\n\t\treturn errReq\n\t}\n\tdefer func() {\n\t\tr.err = err\n\t\tch <- r\n\t}()\n\tconn, err := util.DefaultNet.Dial(\"tcp\", r.addr)\n\tif err != nil {\n\t\treturn\n\t}\n\tcli := rpc.NewClient(conn)\n\tdefer cli.Close()\n\terr = cli.Call(r.serv+\".Init\", srvc.lis.Addr().String(), &r.ver)\n\treturn\n}", "title": "" }, { "docid": "568e60d129bcf8d94ab61b6a58985a65", "score": "0.63595283", "text": "func (r *registry) RegisterService(service *Service) {\n\tr.services[service.Id] = service\n\tservice.deviceRegistry = make(map[string]*connection)\n\n}", "title": "" }, { "docid": "dfccddfffb03ce57d186af4f43be87d3", "score": "0.6346527", "text": "func (s *Service) registerProtocol(peerID peer.ID, stream network.Stream) {\n\t// don't create a new protocol if one is already ongoing\n\tif _, ongoing := s.streams[peerID]; ongoing {\n\t\treturn\n\t}\n\n\tproto := NewProtocol(peerID, stream, s.opts.sendQueueSize, s.opts.streamReadTimeout, s.opts.streamWriteTimeout, s.serverMetrics)\n\ts.streams[peerID] = proto\n\ts.Events.ProtocolStarted.Trigger(proto)\n}", "title": "" }, { "docid": "6a97ae120725ce3d8ee9349c3e13dea2", "score": "0.6313084", "text": "func (rr *RegistrationReceiver) Register(_ context.Context, req *interop.RegistrationRequest) (*interop.RegistrationResponse, error) {\n\tsn := req.GetServerName()\n\tif _, exists := rr.RegisteredServices[sn]; exists {\n\t\terr := sn + \" already registered\"\n\t\treturn &interop.RegistrationResponse{Status: &interop.CommonResponseStatus{Status: interop.Status_FAILURE, Error: err}}, nil\n\t}\n\trr.RegisteredServices[sn] = req.GetServices()\n\treturn &interop.RegistrationResponse{Status: &interop.CommonResponseStatus{Status: interop.Status_SUCCESS}}, nil\n}", "title": "" }, { "docid": "f59fd5854d0418464b33bc02144fb50e", "score": "0.6309674", "text": "func (sup *Supervisor) RegisterService(name string, s *ServiceSpec) {\n\tif sup.started {\n\t\tlog.Panic(\"Attempt to register service while supervisor started\")\n\t}\n\tif !(s.service == nil) {\n\t\tsup.serviceSpec[name] = s\n\t} else {\n\t\tlog.Panicf(\"No Service in service spec: %s\", s)\n\t}\n\t\n}", "title": "" }, { "docid": "5f57f7c952011c3dc0ce80e146af624d", "score": "0.6294066", "text": "func (s *Server) RegisterService(module, service string, instance Service) {\n\tkey := fmt.Sprintf(\"%s.%s\", module, service)\n\tworker := newWorker(key, instance)\n\ts.workers[key] = worker\n}", "title": "" }, { "docid": "334aceaa71e54af225dfc32a7bde8a5c", "score": "0.6289668", "text": "func RegisterService(serviceID string, f Handler) {\n\tregisterServiceImpl(serviceID, f)\n}", "title": "" }, { "docid": "6014766234b4a0af4f467f0fbb29ed7a", "score": "0.6266727", "text": "func RegisterService(path string, server GoalServiceServer, service GoalService, hooks *GoalHooks) {\n\tserviceServers[path] = server\n\tservicesRegistry[path] = service\n\n\tserviceType := reflect.TypeOf(service)\n\tfor i := 0; i < serviceType.NumMethod(); i++ {\n\t\tmethodType := serviceType.Method(i)\n\n\t\tif strings.HasPrefix(methodType.Name, \"Handle\") {\n\t\t\tmethod := reflect.ValueOf(service).Method(i)\n\t\t\tregisterMesssageHandler(methodType.Type, method)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "71afd49dca08ab929455435232c47b70", "score": "0.62477225", "text": "func registerSvc(data *ContainerData) {\n\n\tdata.Resource.Labels.Ports = make([]*ContainerPorts, 0)\n\t// Unmarshall the k8s ports data\n\terr = json.Unmarshal([]byte(data.Resource.Labels.PortsString), &data.Resource.Labels.Ports)\n\n\tif err != nil {\n\t\tlog.Printf(\"Failed to unmarshall exposed Ports: %v\", err)\n\t}\n\n\t// If no ports return\n\tif len(data.Resource.Labels.Ports) == 0 {\n\t\treturn\n\t}\n\n\t// For each port found register the service in consul as a separate service. Each port is reflected in the consul ID\n\tfor _, p := range data.Resource.Labels.Ports {\n\n\t\tvar checkPort int\n\t\tvar checkTCP bool\n\t\tvar scheme string\n\n\t\t// Setting defaults and checking label values\n\t\tif data.Resource.Labels.HerderServiceCheckTCP != \"\" {\n\t\t\tcheckTCP, err = strconv.ParseBool(data.Resource.Labels.HerderServiceCheckTCP)\n\n\t\t\tif err != nil {\n\t\t\t\tlog.Print(err)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t}\n\n\t\tif data.Resource.Labels.HerderServiceName == \"\" {\n\t\t\tdata.Resource.Labels.HerderServiceName = data.Resource.Labels.ContainerName\n\t\t}\n\n\t\tif data.Resource.Labels.HerderServiceCheckInterval == \"\" {\n\t\t\tdata.Resource.Labels.HerderServiceCheckInterval = \"15s\"\n\t\t}\n\n\t\tif data.Resource.Labels.HerderServiceCheckPort != \"\" {\n\t\t\tcheckPort, err = strconv.Atoi(data.Resource.Labels.HerderServiceCheckPort)\n\n\t\t\tif err != nil {\n\t\t\t\tlog.Print(err)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t}\n\n\t\tif data.Resource.Labels.HerderServiceCheckHTTPSchema == \"\" {\n\t\t\tscheme = \"http\"\n\t\t} else {\n\t\t\tscheme = data.Resource.Labels.HerderServiceCheckHTTPSchema\n\t\t}\n\n\t\t_, err := consul.SimpleServiceRegister(&consultant.SimpleServiceRegistration{\n\t\t\tName: data.Resource.Labels.HerderServiceName,\n\t\t\tAddress: data.Resource.PrimaryIPAddress,\n\t\t\tID: fmt.Sprintf(\"%s:%s:%s:%d:%s\", data.Resource.HostID,\n\t\t\t\tdata.Resource.Labels.ContainerName,\n\t\t\t\tdata.Resource.ID, p.ContainerPort, p.Protocol),\n\t\t\tPort: p.ContainerPort,\n\t\t\tTags: parseTags(data.Resource.Labels.HerderServiceTags),\n\t\t\tCheckPort: checkPort,\n\t\t\tCheckPath: data.Resource.Labels.HerderServiceCheckPath,\n\t\t\tInterval: data.Resource.Labels.HerderServiceCheckInterval,\n\t\t\tCheckTCP: checkTCP,\n\t\t\tCheckScheme: scheme},\n\t\t)\n\n\t\tif err != nil {\n\t\t\tlog.Printf(\"Failed to register service %s: %s\", data.Resource.Labels.ContainerName, err)\n\t\t\tcontinue\n\t\t}\n\n\t\tlog.Printf(\"Registered %s\", data.Resource.Name)\n\t}\n\n}", "title": "" }, { "docid": "60bf1104d7e48f0771ddec7f48b50b9b", "score": "0.6233641", "text": "func (rpc *RPC) Register(service interface{}) error {\n\treturn rpc.server.Register(service)\n}", "title": "" }, { "docid": "213591a2150a9a3a87b1c10558244e9b", "score": "0.6226726", "text": "func (s *Server) RegisterService(sd *desc.ServiceDesc, ss interface{}) {\n\ts.desc = append(s.desc, dests{sd, ss})\n}", "title": "" }, { "docid": "ad26361dbb01868681019eab5de5b96c", "score": "0.6218563", "text": "func RegisterService(service ...cchat.Service) {\n\tservices = append(services, service...)\n}", "title": "" }, { "docid": "67b38738d90eb5ddc4d171b4802007f1", "score": "0.62056184", "text": "func (s *Server) RegisterService(r *RegisterRequest) RegisterResponse {\n\ts.regLock.Lock()\n\tdefer s.regLock.Unlock()\n\n\t// Check if this service is already registered\n\tn := NewServerFromRequest(r, s)\n\te := s.regList[r.ID]\n\taddNew := true\n\tif e != nil {\n\t\tif n.ID == e.ID {\n\t\t\tif n.IsDifferentFrom(e) {\n\t\t\t\t// Remove the existing one\n\t\t\t\ts.logInfo(fmt.Sprintf(\"Deregistering existing service %s: %s\", e.ID, e.Name))\n\t\t\t\te.Stop()\n\t\t\t\tdelete(s.regList, r.ID)\n\t\t\t} else {\n\t\t\t\ts.logInfo(fmt.Sprintf(\"Confirming existing service %s: %s\", e.ID, e.Name))\n\t\t\t\te.LastContact = time.Now()\n\t\t\t\taddNew = false\n\t\t\t}\n\t\t}\n\t}\n\tif addNew {\n\t\ts.logInfo(fmt.Sprintf(\"Registering new service %s: %s\", n.ID, n.Name))\n\t\ts.regList[r.ID] = n\n\t\tn.Start()\n\t}\n\treturn r.CreateResponse()\n}", "title": "" }, { "docid": "2b05f86743ce34dd22cc4a301b559b9c", "score": "0.6193188", "text": "func RegisterProtocol(protocol string, obj Protocol, p ...string) bool {\n\t// This is for handling the common case where protocol is a \"singleton\", to\n\t// make it easier to specify.\n\tif len(p) == 0 {\n\t\tp = []string{protocol}\n\t}\n\tregistryLock.Lock()\n\tdefer registryLock.Unlock()\n\t_, present := registry[protocol]\n\tregistry[protocol] = registryEntry{obj, p}\n\treturn present\n}", "title": "" }, { "docid": "63fd7885c5e5e8ddee02074ce9924a02", "score": "0.6192376", "text": "func (w *Wrk) registerService() error {\n\tservice := &api.AgentServiceRegistration{\n\t\tID: w.id,\n\t\tName: w.name,\n\t\tPort: w.httpPort,\n\t\tAddress: fmt.Sprintf(\"%s:%d\", w.host, w.httpPort),\n\t\tTags: []string{GrpcConsulTag, fmt.Sprintf(\"%s:%d\", w.host, w.rpcPort)},\n\t\tCheck: &api.AgentServiceCheck{\n\t\t\tHTTP: fmt.Sprintf(\"http://%s:%d/health\", w.host, w.httpPort),\n\t\t\tInterval: \"1s\",\n\t\t\tTimeout: \"1s\",\n\t\t},\n\t}\n\n\tif err := w.consulClient.Agent().ServiceRegister(service); err != nil {\n\t\treturn err\n\t}\n\n\tw.l.Info(\"registered service %s in consul!\", w.name)\n\treturn nil\n}", "title": "" }, { "docid": "20bf61ea50cae271d3654a375cc0e72f", "score": "0.6173471", "text": "func (s *Server) RegisterProtocol(p protocol.Protocol, callback Callback) {\n\ts.Protocols = append(s.Protocols, &protocolStub{&p, callback})\n}", "title": "" }, { "docid": "757ceb405feabb673f556a221af92685", "score": "0.6171952", "text": "func (p *proxyServiceDirectory) RegisterService(info ServiceInfo) (uint32, error) {\n\tvar err error\n\tvar ret uint32\n\tvar buf bytes.Buffer\n\tif err = writeServiceInfo(info, &buf); err != nil {\n\t\treturn ret, fmt.Errorf(\"serialize info: %s\", err)\n\t}\n\tresponse, err := p.Call(\"registerService\", buf.Bytes())\n\tif err != nil {\n\t\treturn ret, fmt.Errorf(\"call registerService failed: %s\", err)\n\t}\n\tresp := bytes.NewBuffer(response)\n\tret, err = basic.ReadUint32(resp)\n\tif err != nil {\n\t\treturn ret, fmt.Errorf(\"parse registerService response: %s\", err)\n\t}\n\treturn ret, nil\n}", "title": "" }, { "docid": "ecaff1be952a0f8602f4ec6bf115b463", "score": "0.61548424", "text": "func Register(addr string, name string) {\n\tlog.SetFlags(log.LstdFlags | log.Lshortfile)\n\tvar err error\n\tc = &connection{\n\t\tctx: context.Background(),\n\t}\n\tc.conn, err = grpc.Dial(addr, grpc.WithInsecure())\n\tif err != nil {\n\t\tfmt.Printf(\"Unable to contact server: %v\\n\", err)\n\t\tos.Exit(1)\n\t}\n\tc.client = pb.NewChatAppServiceClient(c.conn)\n\n\tc.name = name\n\n\t// Actually register\n\tr, err := c.client.Register(c.ctx, &pb.RegisterRequest{\n\t\tName: name,\n\t})\n\tif err != nil {\n\t\tfmt.Printf(\"Cannot register with server: %v\", err)\n\t\tc.conn.Close()\n\t\tos.Exit(1)\n\t}\n\n\tif r.GetToken() == \"\" {\n\t\tfmt.Println(\"Did not get token, exiting.\")\n\t\tc.conn.Close()\n\t\tos.Exit(1)\n\t}\n\n\tc.token = r.GetToken()\n\tgo Connect()\n}", "title": "" }, { "docid": "f28a72f2f552ea79370d7eadbd049a44", "score": "0.6148647", "text": "func (c *client) Register(service Service) error {\n\tregistry := &api.AgentServiceRegistration{\n\t\tID: service.Name,\n\t\tName: service.Name,\n\t\tPort: service.Port,\n\t\tTags: []string{service.Tag},\n\t\tAddress: service.URL,\n\t\tCheck: &api.AgentServiceCheck{\n\t\t\tHTTP: fmt.Sprintf(\"%s:%d%s\", service.URL, service.Port, service.HealthCheck),\n\t\t\tInterval: \"10s\",\n\t\t\tTimeout: \"15s\",\n\t\t},\n\t\tWeights: &api.AgentWeights{\n\t\t\tPassing: 10,\n\t\t\tWarning: 1,\n\t\t},\n\t}\n\tfmt.Println(registry)\n\tfmt.Println(registry.Check)\n\treturn c.consul.Agent().ServiceRegister(registry)\n}", "title": "" }, { "docid": "6c7d7497ab9ed6db6f0c8f1ae13bddda", "score": "0.6134254", "text": "func Register(name, host string) error {\n\tconn, err := grpc.Dial(RegistryRPCHost, grpc.WithInsecure())\n\tif err != nil {\n\t\treturn fmt.Errorf(\"dial: %v\", err)\n\t}\n\tdefer conn.Close()\n\n\tclient := proto.NewRegistryServiceClient(conn)\n\tctx, cancel := context.WithTimeout(context.Background(), 1*time.Second)\n\tdefer cancel()\n\n\tdata := &proto.RegisterType{\n\t\tName: name,\n\t\tHost: host,\n\t}\n\n\t_, err = client.Register(ctx, data)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"reg: %v\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "4951a4889aa93d9d03e533d06093597c", "score": "0.6120314", "text": "func (svc Service) RegisterGRPCServices(\n\ts *grpc.Server,\n\tjwtSecret string,\n\tcaCert string,\n\tcert string,\n\tprivKey string,\n\t// EXTRA : param\n\tmysqlDSN string,\n\t// END EXTRA : param\n\t// SUB-SERVICES DEFINITION : param-address\n\t// svc{{SubServiceNamePascalCase}}Address string,\n\t// END SUB-SERVICES DEFINITION : param-address\n) {\n\tlog.WithFields(log.Fields{\n\t\t\"jwtSecret\": jwtSecret,\n\t\t\"caCert\": caCert,\n\t\t\"cert\": cert,\n\t\t\"privKey\": privKey,\n\t\t// EXTRA : log\n\t\t\"mysqlDSN\": mysqlDSN,\n\t\t// END EXTRA : log\n\t\t// SUB-SERVICES DEFINITION : log-address\n\t\t// \"svc{{SubServiceNamePascalCase}}Address\": svc{{SubServiceNamePascalCase}}Address,\n\t\t// END SUB-SERVICES DEFINITION : log-address\n\t}).Debug(\"RegisterGRPCServices\")\n\tpb.RegisterProfileServer(s, &profileServer{\n\t\tjwtSecret: jwtSecret,\n\t\tcaCertificate: caCert,\n\t\tcertificate: cert,\n\t\tprivateKey: privKey,\n\t\t// EXTRA : register server\n\t\tmysqlDataSourceName: mysqlDSN,\n\t\t// END EXTRA : register server\n\t\t// SUB-SERVICES DEFINITION : register-address-to-server\n\t\t// svc{{SubServiceNamePascalCase}}Address: svc{{SubServiceNamePascalCase}}Address,\n\t\t// END SUB-SERVICES DEFINITION : register-address-to-server\n\t})\n}", "title": "" }, { "docid": "32c46a08bf7f0b47068855d7dcce6bab", "score": "0.60727125", "text": "func (ds *DiscoveryService) Register(container *restful.Container) {\n\tws := &restful.WebService{}\n\tws.Produces(restful.MIME_JSON)\n\n\t// List all known services (informational, not invoked by Envoy)\n\tws.Route(ws.\n\t\tGET(\"/v1/registration\").\n\t\tTo(ds.ListAllEndpoints).\n\t\tDoc(\"Services in SDS\"))\n\n\tcontainer.Add(ws)\n}", "title": "" }, { "docid": "3cb7e887b1c3de86f2911db4aeef8818", "score": "0.6065261", "text": "func (c *Consul) Register(s *types.Service){\n\tagentService := &api.AgentService{\n\t\tID: s.ID,\n\t\tService: s.Name,\n\t\tTags: s.Tags,\n\t\tPort: s.Port,\n\t\tAddress: s.Address,\n\t}\n\n\tcatalogRegistration := &api.CatalogRegistration{\n\t\tNode: s.Node,\n\t\tAddress: s.Address,\n\t\tService: agentService,\n\t}\n\n\t_, err := c.Catalog.Register(catalogRegistration, nil)\n\tif err != nil {\n\t\tglog.Errorf(\"faild to register service/endpoint { %q, %q, %q }, error: %v\", s.Name, s.Node, s.Address, err)\n\t} else {\n glog.Infof(\"success to register service/endpoint { %q, %q, %q }\", s.Name, s.Node, s.Address)\n }\n}", "title": "" }, { "docid": "b2ab4e6e02ecfebbbf45ebe7dd1a2e61", "score": "0.6065202", "text": "func RegisterService(ctx context.Context, service *mRegistry.Service, logger log.Logger) error {\n\tregistry := GetRegistry()\n\tnode := service.Nodes[0]\n\n\tlogger.Info().Msgf(\"registering external service %v@%v\", node.Id, node.Address)\n\n\trOpts := []mRegistry.RegisterOption{mRegistry.RegisterTTL(time.Minute)}\n\tif err := registry.Register(service, rOpts...); err != nil {\n\t\tlogger.Fatal().Err(err).Msgf(\"Registration error for external service %v\", service.Name)\n\t}\n\n\tt := time.NewTicker(time.Second * 30)\n\n\tgo func() {\n\t\tfor {\n\t\t\tselect {\n\t\t\tcase <-t.C:\n\t\t\t\tlogger.Debug().Interface(\"service\", service).Msg(\"refreshing external service-registration\")\n\t\t\t\terr := registry.Register(service, rOpts...)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlogger.Error().Err(err).Msgf(\"registration error for external service %v\", service.Name)\n\t\t\t\t}\n\t\t\tcase <-ctx.Done():\n\t\t\t\tlogger.Debug().Interface(\"service\", service).Msg(\"unregistering\")\n\t\t\t\tt.Stop()\n\t\t\t\terr := registry.Deregister(service)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlogger.Err(err).Msgf(\"Error unregistering external service %v\", service.Name)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}()\n\n\treturn nil\n}", "title": "" }, { "docid": "452d5de219db96912d25598c1a4d8bc3", "score": "0.6056571", "text": "func handleRegister(conn net.Conn, msg *cellaserv.Register) {\n\tname := msg.GetName()\n\tident := msg.GetIdentification()\n\tservice := newService(conn, name, ident)\n\tlog.Info(\"[Services] New %s/%s\", name, ident)\n\n\tif _, ok := services[name]; !ok {\n\t\tservices[name] = make(map[string]*Service)\n\t}\n\n\t// Check for duplicate services\n\tif s, ok := services[name][ident]; ok {\n\t\tlog.Warning(\"[Services] Replace %s\", s)\n\n\t\tpub_json, _ := json.Marshal(s.JSONStruct())\n\t\tcellaservPublish(logLostService, pub_json)\n\n\t\tsc := servicesConn[s.Conn]\n\t\tfor i, ss := range sc {\n\t\t\tif ss.Name == name && ss.Identification == ident {\n\t\t\t\t// Remove from slice\n\t\t\t\tsc[i] = sc[len(sc)-1]\n\t\t\t\tservicesConn[s.Conn] = sc[:len(sc)-1]\n\n\t\t\t\t// Clear key from map if list is empty\n\t\t\t\tif len(servicesConn[s.Conn]) == 0 {\n\t\t\t\t\tdelete(servicesConn, s.Conn)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t} else {\n\t\t// Sanity checks\n\t\tif ident == \"\" {\n\t\t\tif len(services[name]) >= 1 {\n\t\t\t\tlog.Warning(\"[Service] New service have no identification but \" +\n\t\t\t\t\t\"there is already a service with an identification.\")\n\t\t\t}\n\t\t} else {\n\t\t\tif _, ok = services[name][\"\"]; ok {\n\t\t\t\tlog.Warning(\"[Service] New service have an identification but \" +\n\t\t\t\t\t\"there is already a service without an identification\")\n\t\t\t}\n\t\t}\n\t}\n\n\t// This makes all requests go to the new service\n\tservices[name][ident] = service\n\n\t// Keep track of origin connection in order to remove when the connection is closed\n\tservicesConn[conn] = append(servicesConn[conn], service)\n\n\t// Publish new service data\n\tpub_json, _ := json.Marshal(service.JSONStruct())\n\tcellaservPublish(logNewService, pub_json)\n\n\tpub_json, _ = json.Marshal(connNameJSON{conn.RemoteAddr().String(), connDescribe(conn)})\n\tcellaservPublish(logConnRename, pub_json)\n}", "title": "" }, { "docid": "43499fa28209f520f472561126029a69", "score": "0.6036741", "text": "func (m HandlerMap) RegisterService(desc *grpc.ServiceDesc, h interface{}) {\n\tht := reflect.TypeOf(desc.HandlerType).Elem()\n\tst := reflect.TypeOf(h)\n\tif !st.Implements(ht) {\n\t\tpanic(fmt.Sprintf(\"service %s: handler of type %v does not satisfy %v\", desc.ServiceName, st, ht))\n\t}\n\tif _, ok := m[desc.ServiceName]; ok {\n\t\tpanic(fmt.Sprintf(\"service %s: handler already registered\", desc.ServiceName))\n\t}\n\tm[desc.ServiceName] = service{desc: desc, handler: h}\n}", "title": "" }, { "docid": "88bfaaccdfeadd52ea8b5bc861b00820", "score": "0.60103977", "text": "func (p *provider) Register(service string, handler func(w http.ResponseWriter, r *http.Request)) {\n\tp.mu.Lock()\n\tdefer p.mu.Unlock()\n\n\tp.services[service] = handler\n}", "title": "" }, { "docid": "245987b81683779438d78a9b52987a15", "score": "0.60089356", "text": "func (a *apiGw) Register(name, path string, svc apigw.APIGatewayService) apigw.APIGatewayService {\n\tif svc == nil {\n\t\tpanic(fmt.Sprintf(\"Invalid service registration for %s\", name))\n\t}\n\tif _, ok := a.svcmap[name]; ok {\n\t\t// Detected duplicate Registration. Cannot do much, this is probably\n\t\t// happening during Init. Panic!!\n\t\tpanic(fmt.Sprintf(\"Duplicate registration for %s\", name))\n\t}\n\ta.svcmap[name] = svc\n\ta.svcname[name] = name\n\treturn a.svcmap[name]\n}", "title": "" }, { "docid": "91bd76f1f9f1ca842f9525a288160337", "score": "0.6006557", "text": "func RegisterEchoService(s grpc.ServiceRegistrar, srv *EchoService) {\n\tsrvCopy := *srv\n\tif srvCopy.UnaryEcho == nil {\n\t\tsrvCopy.UnaryEcho = func(context.Context, *EchoRequest) (*EchoResponse, error) {\n\t\t\treturn nil, status.Errorf(codes.Unimplemented, \"method UnaryEcho not implemented\")\n\t\t}\n\t}\n\tif srvCopy.ServerStreamingEcho == nil {\n\t\tsrvCopy.ServerStreamingEcho = func(*EchoRequest, Echo_ServerStreamingEchoServer) error {\n\t\t\treturn status.Errorf(codes.Unimplemented, \"method ServerStreamingEcho not implemented\")\n\t\t}\n\t}\n\tif srvCopy.ClientStreamingEcho == nil {\n\t\tsrvCopy.ClientStreamingEcho = func(Echo_ClientStreamingEchoServer) error {\n\t\t\treturn status.Errorf(codes.Unimplemented, \"method ClientStreamingEcho not implemented\")\n\t\t}\n\t}\n\tif srvCopy.BidirectionalStreamingEcho == nil {\n\t\tsrvCopy.BidirectionalStreamingEcho = func(Echo_BidirectionalStreamingEchoServer) error {\n\t\t\treturn status.Errorf(codes.Unimplemented, \"method BidirectionalStreamingEcho not implemented\")\n\t\t}\n\t}\n\tsd := grpc.ServiceDesc{\n\t\tServiceName: \"grpc.examples.echo.Echo\",\n\t\tMethods: []grpc.MethodDesc{\n\t\t\t{\n\t\t\t\tMethodName: \"UnaryEcho\",\n\t\t\t\tHandler: srvCopy.unaryEcho,\n\t\t\t},\n\t\t},\n\t\tStreams: []grpc.StreamDesc{\n\t\t\t{\n\t\t\t\tStreamName: \"ServerStreamingEcho\",\n\t\t\t\tHandler: srvCopy.serverStreamingEcho,\n\t\t\t\tServerStreams: true,\n\t\t\t},\n\t\t\t{\n\t\t\t\tStreamName: \"ClientStreamingEcho\",\n\t\t\t\tHandler: srvCopy.clientStreamingEcho,\n\t\t\t\tClientStreams: true,\n\t\t\t},\n\t\t\t{\n\t\t\t\tStreamName: \"BidirectionalStreamingEcho\",\n\t\t\t\tHandler: srvCopy.bidirectionalStreamingEcho,\n\t\t\t\tServerStreams: true,\n\t\t\t\tClientStreams: true,\n\t\t\t},\n\t\t},\n\t\tMetadata: \"examples/features/proto/echo/echo.proto\",\n\t}\n\n\ts.RegisterService(&sd, nil)\n}", "title": "" }, { "docid": "34579ca7869d5d9a1e01609456f961d8", "score": "0.5995969", "text": "func (t *Transport) RegisterProtocol(scheme string, rt RoundTripper) {\n\tif scheme == \"http\" || scheme == \"https\" {\n\t\tpanic(\"protocol \" + scheme + \" already registered\")\n\t}\n\tt.altMu.Lock()\n\tdefer t.altMu.Unlock()\n\tif t.altProto == nil {\n\t\tt.altProto = make(map[string]RoundTripper)\n\t}\n\tif _, exists := t.altProto[scheme]; exists {\n\t\tpanic(\"protocol \" + scheme + \" already registered\")\n\t}\n\tt.altProto[scheme] = rt\n}", "title": "" }, { "docid": "b5c455a0454f9fa64aca6ddd3fac6022", "score": "0.5995807", "text": "func (proxy *Proxy) AddService(service apiv1.Service) error {\n\tif service.Name == \"k8s-proxy\" {\n\t\treturn fmt.Errorf(\"'k8s-proxy' cannot be a proxy target, skipping\")\n\t}\n\n\t// Service subdomain\n\tdomain := service.Name\n\tif _, ok := service.Labels[\"k8s-proxy-domain\"]; ok {\n\t\tdomain = service.Labels[\"k8s-proxy-domain\"]\n\t}\n\n\tfor _, servicePort := range service.Spec.Ports {\n\t\t// Service port\n\t\tport := servicePort.Port\n\t\tif 0 > servicePort.TargetPort.IntVal {\n\t\t\tport = service.Spec.Ports[0].TargetPort.IntVal\n\t\t}\n\t\tif 0 > servicePort.NodePort {\n\t\t\tport = service.Spec.Ports[0].NodePort\n\t\t}\n\t\tif p, ok := service.Labels[\"k8s-proxy-port\"]; ok {\n\t\t\tptmp, err := strconv.Atoi(p)\n\t\t\tif nil != err {\n\t\t\t\tlog.Warn(errors.Wrap(err, fmt.Sprintf(\"invalid 'k8s-proxy-port' service label '%s'\", p)))\n\t\t\t}\n\t\t\tif nil == err {\n\t\t\t\tport = int32(ptmp)\n\t\t\t}\n\t\t}\n\n\t\tif port >= 80 && \"TCP\" == servicePort.Protocol {\n\t\t\t// HTTP Scheme\n\t\t\tscheme := \"http\"\n\t\t\tif 443 == servicePort.Port {\n\t\t\t\tscheme = \"https\"\n\t\t\t}\n\t\t\tif _, ok := service.Labels[\"k8s-proxy-scheme\"]; ok {\n\t\t\t\tscheme = service.Labels[\"k8s-proxy-scheme\"]\n\t\t\t}\n\n\t\t\trp, err := NewReverseProxy(scheme, service, port)\n\t\t\tif nil != err {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tlog.WithFields(log.Fields{\n\t\t\t\t\"port\": port,\n\t\t\t\t\"service\": service.Name,\n\t\t\t\t\"url\": fmt.Sprintf(\"%s://%s\", scheme, domain),\n\t\t\t}).Info(\"registering service\")\n\n\t\t\tsvc := &Service{\n\t\t\t\tName: service.Name,\n\t\t\t\tPort: port,\n\t\t\t\tScheme: scheme,\n\t\t\t\tProxy: rp,\n\t\t\t}\n\t\t\tproxy.svcMapMux.Lock()\n\t\t\tproxy.serviceMap[domain] = svc\n\t\t\tproxy.svcMapMux.Unlock()\n\n\t\t\tbreak\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "9e253e06620b710673255e8796545a7c", "score": "0.5990989", "text": "func RegisterService(dg *discordgo.Session) {\n\tdg.AddHandler(invokeCommand)\n}", "title": "" }, { "docid": "73739de1200d2a7194b656f522c5429c", "score": "0.5977995", "text": "func (d DebugService) RegisterService(server *Server) {\n\tpb.RegisterDebugServiceServer(server.GrpcServer, d)\n}", "title": "" }, { "docid": "88ac123dc3b863910bc5b61f712f6815", "score": "0.59570074", "text": "func (c *ConsulClient) Register(name string, port int) error {\n\tipAddress := GetOutboundIP()\n\tlog.Println(\"Register with IP:\" + ipAddress)\n\tcheck := &consul.AgentServiceCheck{\n\t\tHTTP: \"http://\" + ipAddress + \":8080/health\",\n\t\tInterval: \"15s\",\n\t\tTLSSkipVerify: true,\n\t\tDeregisterCriticalServiceAfter: \"15s\",\n\t}\n\n\tvar idService string\n\tidService = name + ipAddress\n\n\tvar listTags []string\n\tlistTags = append(listTags, \"traefik.backend=\"+name)\n\tlistTags = append(listTags, \"traefik.frontend.rule=Host:\"+name+\".localhost\")\n\tlistTags = append(listTags, \"metrics\")\n\n\treg := &consul.AgentServiceRegistration{\n\t\tID: idService,\n\t\tName: name,\n\t\tAddress: ipAddress,\n\t\tPort: port,\n\t\tCheck: check,\n\t\tTags: listTags,\n\t}\n\n\treturn c.consul.Agent().ServiceRegister(reg)\n}", "title": "" }, { "docid": "5e2cf12779fa6e55bf0b099a93258e8c", "score": "0.5949503", "text": "func (c *Context) RegisterService(service IService) {\n\tname := service.Name()\n\n\tif name == \"\" {\n\t\tlogFatalf(\"Error registering service %v: empty name\", service)\n\n\t\treturn\n\t}\n\n\tif _, ok := c.services[name]; ok {\n\t\tlogFatalf(\"Error registering service %v: name %s already in use\", service, name)\n\n\t\treturn\n\t}\n\n\tc.services[name] = service\n}", "title": "" }, { "docid": "a0081dc881b1186bbd24e6f6dda62c6e", "score": "0.5946148", "text": "func AddService(serviceType, host string, port int) {\n\tfegRegistry.AddService(registry.ServiceLocation{Name: serviceType, Host: host, Port: port})\n}", "title": "" }, { "docid": "381c8f394d57bc67651a02a3fa7b0e47", "score": "0.5945931", "text": "func (svc *AKBServiceHTTP) RegisterServices(e *Engine) error {\n\treturn nil\n}", "title": "" }, { "docid": "4b84234e552e923ff8eadcc16df54afe", "score": "0.5903034", "text": "func RegisterMainServiceService(s grpc.ServiceRegistrar, srv *MainServiceService) {\n\tsd := grpc.ServiceDesc{\n\t\tServiceName: \"MainService\",\n\t\tMethods: []grpc.MethodDesc{\n\t\t\t{\n\t\t\t\tMethodName: \"Hello\",\n\t\t\t\tHandler: srv.hello,\n\t\t\t},\n\t\t},\n\t\tStreams: []grpc.StreamDesc{\n\t\t\t{\n\t\t\t\tStreamName: \"Clock\",\n\t\t\t\tHandler: srv.clock,\n\t\t\t\tServerStreams: true,\n\t\t\t},\n\t\t},\n\t\tMetadata: \"hello.proto\",\n\t}\n\n\ts.RegisterService(&sd, nil)\n}", "title": "" }, { "docid": "9d236846c1d2a7d6282757a9c56b78cc", "score": "0.5902707", "text": "func (m *Manager) Register(t Type, service Interface) {\n\tutils.Logger().Info().Int(\"service\", int(t)).Msg(\"Register Service\")\n\tif m.services == nil {\n\t\tm.services = make(map[Type]Interface)\n\t}\n\tif _, ok := m.services[t]; ok {\n\t\tutils.Logger().Error().Int(\"servie\", int(t)).Msg(\"This service is already included\")\n\t\treturn\n\t}\n\tm.services[t] = service\n}", "title": "" }, { "docid": "60271103e00c2e2428b429dedaf945ef", "score": "0.58976007", "text": "func RegisterAsTransportMgr(regData *RegData, protocol string) {\n\turl := \"http://\" + GetServerIP() + \":8081/transport/reg\"\n\n\tdata := []byte(`{\"protocol\": \"` + protocol + `\"}`)\n\n\treq, err := http.NewRequest(\"POST\", url, bytes.NewBuffer(data))\n\tif err != nil {\n\t\tError.Fatal(\"registerAsTransportMgr: Error reading request. \", err)\n\t}\n\n\t// Set headers\n\treq.Header.Set(\"Access-Control-Allow-Origin\", \"*\")\n\treq.Header.Set(\"Content-Type\", \"application/json\")\n\treq.Header.Set(\"Host\", GetServerIP()+\":8081\")\n\n\t// Set client timeout\n\tclient := &http.Client{Timeout: time.Second * 10}\n\n\t// Validate headers are attached\n\tInfo.Println(req.Header)\n\n\t// Send request\n\tresp, err := client.Do(req)\n\tif err != nil {\n\t\tError.Fatal(\"registerAsTransportMgr: Error reading response. \", err)\n\t}\n\tdefer resp.Body.Close()\n\n\tInfo.Println(\"response Status:\", resp.Status)\n\tInfo.Println(\"response Headers:\", resp.Header)\n\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\tError.Fatal(\"Error reading response. \", err)\n\t}\n\tInfo.Printf(\"%s\\n\", body)\n\n\terr = json.Unmarshal(body, regData)\n\tif err != nil {\n\t\tError.Fatal(\"Error JSON decoding of response. \", err)\n\t}\n}", "title": "" }, { "docid": "f8f42e86d6e2689061f1e776f4cd705c", "score": "0.58822185", "text": "func (s *Server) RegisterService(g *grpc.Server) {\n\ttspb.RegisterTimeSeriesServer(g, s)\n}", "title": "" }, { "docid": "336e8e03d23383a96206191e0b2e458e", "score": "0.58715", "text": "func (s *Service) RegisterService() {\n\tif s.config.ServiceRegister.ConsulAddr == \"\" {\n\t\treturn\n\t}\n\t_, err := consul.ServiceRegister(s.config.BindAddr, &s.config.ServiceRegister)\n\tif err != nil {\n\t\tlog.Fatalf(\"service register failed, err: %v\", err)\n\t}\n}", "title": "" }, { "docid": "94d0bffe9fd0fbbc6b0292e74d77362e", "score": "0.5843532", "text": "func RegisterUserServiceService(s grpc.ServiceRegistrar, srv *UserServiceService) {\n\tsrvCopy := *srv\n\tif srvCopy.AddUser == nil {\n\t\tsrvCopy.AddUser = func(context.Context, *AddUserRequest) (*User, error) {\n\t\t\treturn nil, status.Errorf(codes.Unimplemented, \"method AddUser not implemented\")\n\t\t}\n\t}\n\tif srvCopy.AddUsers == nil {\n\t\tsrvCopy.AddUsers = func(UserService_AddUsersServer) error {\n\t\t\treturn status.Errorf(codes.Unimplemented, \"method AddUsers not implemented\")\n\t\t}\n\t}\n\tif srvCopy.DeleteUser == nil {\n\t\tsrvCopy.DeleteUser = func(context.Context, *DeleteUserRequest) (*User, error) {\n\t\t\treturn nil, status.Errorf(codes.Unimplemented, \"method DeleteUser not implemented\")\n\t\t}\n\t}\n\tif srvCopy.ListUsers == nil {\n\t\tsrvCopy.ListUsers = func(*ListUsersRequest, UserService_ListUsersServer) error {\n\t\t\treturn status.Errorf(codes.Unimplemented, \"method ListUsers not implemented\")\n\t\t}\n\t}\n\tsd := grpc.ServiceDesc{\n\t\tServiceName: \"users.UserService\",\n\t\tMethods: []grpc.MethodDesc{\n\t\t\t{\n\t\t\t\tMethodName: \"AddUser\",\n\t\t\t\tHandler: srvCopy.addUser,\n\t\t\t},\n\t\t\t{\n\t\t\t\tMethodName: \"DeleteUser\",\n\t\t\t\tHandler: srvCopy.deleteUser,\n\t\t\t},\n\t\t},\n\t\tStreams: []grpc.StreamDesc{\n\t\t\t{\n\t\t\t\tStreamName: \"AddUsers\",\n\t\t\t\tHandler: srvCopy.addUsers,\n\t\t\t\tClientStreams: true,\n\t\t\t},\n\t\t\t{\n\t\t\t\tStreamName: \"ListUsers\",\n\t\t\t\tHandler: srvCopy.listUsers,\n\t\t\t\tServerStreams: true,\n\t\t\t},\n\t\t},\n\t\tMetadata: \"users.proto\",\n\t}\n\n\ts.RegisterService(&sd, nil)\n}", "title": "" }, { "docid": "7b558b1e6afaea8df34b940651dba26e", "score": "0.5840042", "text": "func RegisterServiceAPI(c *gin.Context) {\n\tservice := Service{}\n\tc.Bind(&service)\n\n\t_, err := service.RegisterService()\n\n\tif err != nil {\n\t\tc.JSON(http.StatusBadRequest, err.Error())\n\t\treturn\n\t}\n\n\tc.JSON(http.StatusCreated, &service)\n}", "title": "" }, { "docid": "eb159dc5c1ee851f43a28e6f794b0f6c", "score": "0.5827693", "text": "func (cp *ConsulClient) RegisterService(serviceInfo ServiceInfo) error {\n\tkeyName := \"contiv.io/service/\" + serviceInfo.ServiceName + \"/\" +\n\t\tserviceInfo.HostAddr + \":\" + strconv.Itoa(serviceInfo.Port)\n\n\tlog.Infof(\"Registering service key: %s, value: %+v\", keyName, serviceInfo)\n\n\t// if there is a previously registered service, no need to register it again..\n\tif cp.serviceDb[keyName] != nil {\n\t\tsrvState := cp.serviceDb[keyName]\n\t\tif (srvState.ServiceName == serviceInfo.ServiceName) && (srvState.HostAddr == serviceInfo.HostAddr) &&\n\t\t\t(srvState.Port == serviceInfo.Port) {\n\t\t\treturn nil\n\t\t}\n\n\t\t// stop and release the old key\n\t\tclose(srvState.stopChan)\n\n\t\t// Delete the service instance\n\t\t_, err := cp.client.KV().Delete(keyName, nil)\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"Error deleting key %s. Err: %v\", keyName, err)\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// JSON format the object\n\tjsonVal, err := json.Marshal(serviceInfo)\n\tif err != nil {\n\t\tlog.Errorf(\"Json conversion error. Err %v\", err)\n\t\treturn err\n\t}\n\n\t// session configuration\n\tsessCfg := api.SessionEntry{\n\t\tName: keyName,\n\t\tBehavior: \"delete\",\n\t\tLockDelay: 10 * time.Millisecond,\n\t\tTTL: fmt.Sprintf(\"%ds\", serviceInfo.TTL),\n\t}\n\n\t// Create consul session\n\tsessionID, _, err := cp.client.Session().CreateNoChecks(&sessCfg, nil)\n\tif err != nil {\n\t\tlog.Errorf(\"Error Creating session for lock %s. Err: %v\", keyName, err)\n\t\treturn err\n\t}\n\n\t// check if the key already exists\n\tresp, _, err := cp.client.KV().Get(keyName, nil)\n\tif err != nil {\n\t\tlog.Errorf(\"Error getting key %s. Err: %v\", keyName, err)\n\t\treturn err\n\t}\n\n\t// Delete the old key if it exists..\n\tif resp != nil {\n\t\tlog.Infof(\"Deleting old service entry for key %s\", keyName)\n\t\t_, err = cp.client.KV().Delete(keyName, nil)\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"Error deleting key %s. Err: %v\", keyName, err)\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// Set it via consul client\n\tsucc, _, err := cp.client.KV().Acquire(&api.KVPair{Key: keyName, Value: jsonVal, Session: sessionID}, nil)\n\tif err != nil {\n\t\tlog.Errorf(\"Error setting key %s, Err: %v\", keyName, err)\n\t\treturn err\n\t}\n\n\tif !succ {\n\t\tlog.Errorf(\"Failed to acquire key %s. Already acquired\", keyName)\n\t\treturn errors.New(\"Key already acquired\")\n\t}\n\n\t// Run refresh in background\n\tstopChan := make(chan struct{})\n\tgo cp.renewService(keyName, sessCfg.TTL, sessionID, stopChan)\n\n\t// Store it in DB\n\tcp.serviceDb[keyName] = &consulServiceState{\n\t\tServiceName: serviceInfo.ServiceName,\n\t\tTTL: sessCfg.TTL,\n\t\tHostAddr: serviceInfo.HostAddr,\n\t\tPort: serviceInfo.Port,\n\t\tSessionID: sessionID,\n\t\tstopChan: stopChan,\n\t\tHostname: serviceInfo.Hostname,\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "5b668cd48380fd8a9e4a484c55455dec", "score": "0.58170205", "text": "func registerService(event *msgs.Message, i channels.Argument, r channels.ReturnType) channels.Return {\n\n\tvar me *ZeroConf\n\tvar ret *Service\n\tvar err error\n\n\tfor range only.Once {\n\t\tme, err = InterfaceToTypeZeroConf(i)\n\t\tif err != nil {\n\t\t\tbreak\n\t\t}\n\n\t\tvar ce ServiceConfig\n\t\tce, err = DeconstructMdnsMessage(event)\n\t\t//err = json.Unmarshal(event.Text.ByteArray(), &ce)\n\t\tif err != nil {\n\t\t\terr = msgs.MakeError(me.EntityId, \"cannot deconstruct MDNS message with error '%v'\", err)\n\t\t\tbreak\n\t\t}\n\n\t\tret, err = me.Register(ce)\n\t\tif err != nil {\n\t\t\tbreak\n\t\t}\n\n\t\teblog.Debug(me.EntityId, \"registered service by channel %s OK\", ret.EntityId.String())\n\t}\n\n\teblog.LogIfNil(me, err)\n\teblog.LogIfError(err)\n\n\treturn ret\n}", "title": "" }, { "docid": "829229541e5b5e06cde0f457f10516c5", "score": "0.5811344", "text": "func RegisterService() (err error) {\n\t// Open goconsul configuration file.\n\tconfig, err := os.Open(\"goconsul.json\")\n\tdefer config.Close()\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Read configuration file for storage in struct and\n\t// forward transmission to consul agent over HTTP API.\n\tdata, err := ioutil.ReadAll(config)\n\tif err != nil {\n\t\treturn err\n\t}\n\t// Marshal response into consul struct for easy\n\t// retrieval of service name for command line\n\t// confirmations.\n\terr = json.Unmarshal(data, &consul)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Register the service with local consul agent.\n\terr = doRegistration(data)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Finally, query the API to confirm this has been done.\n\tresp, err := queryService()\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif resp.StatusCode == 200 {\n\t\tresponse, _ := ioutil.ReadAll(resp.Body)\n\t\tlog.Println(\"service registration complete, please check response:\")\n\t\tlog.Println(string(response))\n\t} else {\n\t\tlog.Fatalf(\"service registration failed: %d\\n\", resp.StatusCode)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "520d6871a147793d354cd29aabdf0afe", "score": "0.57880044", "text": "func (rd *RegDiscover) RegisterAndWatchService(key string, data []byte) error {\n\treturn rd.rdServer.RegisterAndWatch(key, data)\n}", "title": "" }, { "docid": "1c33ee650d8d7d36238393b87e973f27", "score": "0.5787433", "text": "func ServerRegisterName(server *rpc.Server, name string, rcvr interface{}) error", "title": "" }, { "docid": "58dabf509e676bf0626c0af977053fd2", "score": "0.57578063", "text": "func RegisterProtocolServer(protocol string, server util.ProtocolServerModule) {\n\tprotoServers[protocol] = &server\n}", "title": "" }, { "docid": "9838abcdd4c6a1e921fceff1971d8041", "score": "0.57513654", "text": "func NewServiceRegister(ctx context.Context, cli *clientv3.Client, clusterID, serviceName, serviceAddr, serializedValue string, ttl int64) *ServiceRegister {\n\tcctx, cancel := context.WithCancel(ctx)\n\tserviceKey := RegistryPath(clusterID, serviceName, serviceAddr)\n\treturn &ServiceRegister{\n\t\tctx: cctx,\n\t\tcancel: cancel,\n\t\tcli: cli,\n\t\tkey: serviceKey,\n\t\tvalue: serializedValue,\n\t\tttl: ttl,\n\t}\n}", "title": "" }, { "docid": "8db82d1a5c1d0f3eb6abee0d9f3fe8f2", "score": "0.5751233", "text": "func RegisterV1RoomService(e *bm.Engine, svc RoomBMServer, midMap map[string]bm.HandlerFunc) {\n\tauth := midMap[\"auth\"]\n\tv1RoomSvc = svc\n\te.GET(\"/xlive/app-blink/v1/room/GetInfo\", auth, roomGetInfo)\n\te.POST(\"/xlive/app-blink/v1/room/Create\", auth, roomCreate)\n}", "title": "" }, { "docid": "a5356b176959f5cfe275773323166e3e", "score": "0.57501435", "text": "func NewService(name string, protocol string) Service {\n\t// currently trace span is same as service name.\n\treturn Service{Name: name, Protocol: protocol, TraceSpan: name}\n}", "title": "" }, { "docid": "d5992f60f716bb1a8436c6ef2179ed92", "score": "0.57484895", "text": "func (c *nullRegister) Register(id, name, ip string, s config.Service) error {\n\treturn nil\n}", "title": "" }, { "docid": "11706a142636444741e3e6a6bc82b052", "score": "0.5745908", "text": "func RegisterGRPCEndpoint(ctx context.Context, serviceID string, uuid string, addr string, logger log.Logger) error {\n\tnode := &registry.Node{\n\t\tId: serviceID + \"-\" + uuid,\n\t\tAddress: addr,\n\t\tMetadata: make(map[string]string),\n\t}\n\tnode.Metadata[\"broker\"] = broker.String()\n\tnode.Metadata[\"registry\"] = registry.String()\n\tnode.Metadata[\"server\"] = \"grpc\"\n\tnode.Metadata[\"transport\"] = \"grpc\"\n\tnode.Metadata[\"protocol\"] = \"grpc\"\n\n\tservice := &registry.Service{\n\t\tName: serviceID,\n\t\tVersion: \"\",\n\t\tNodes: []*registry.Node{node},\n\t\tEndpoints: make([]*registry.Endpoint, 0),\n\t}\n\n\trOpts := []registry.RegisterOption{registry.RegisterTTL(time.Minute)}\n\n\tlogger.Info().Msgf(\"Registering external service %v@%v\", node.Id, node.Address)\n\n\tif err := registry.Register(service, rOpts...); err != nil {\n\t\tlogger.Fatal().Err(err).Msgf(\"Registration error for external service %v\", serviceID)\n\t}\n\n\tt := time.NewTicker(time.Second * 30)\n\n\tgo func() {\n\t\tfor {\n\t\t\tselect {\n\t\t\tcase <-t.C:\n\t\t\t\tlogger.Debug().Interface(\"service\", service).Msg(\"Refreshing external service-registration\")\n\t\t\t\terr := registry.Register(service, rOpts...)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlogger.Error().Err(err).Msgf(\"Registration error for external service %v\", serviceID)\n\t\t\t\t}\n\t\t\tcase <-ctx.Done():\n\t\t\t\tlogger.Debug().Interface(\"service\", service).Msg(\"Unregistering\")\n\t\t\t\tt.Stop()\n\t\t\t\terr := registry.Deregister(service)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlogger.Err(err).Msgf(\"Error unregistering external service %v\", serviceID)\n\t\t\t\t}\n\n\t\t\t}\n\t\t}\n\t}()\n\n\treturn nil\n}", "title": "" }, { "docid": "5bb2a3b1984dc7c94e5d0a19e93e0533", "score": "0.5735247", "text": "func (r *Dispatcher) registerBrokerService() error {\n\treturn r.orchestrator.Add(&srv.Service{\n\t\tRun: func(ctx context.Context) error {\n\t\t\tr.broker = pubsub.NewBroker[Response](ctx, pubsub.BrokerOptions{WorkerPoolSize: r.conf.Workers, ParallelDispatch: true})\n\t\t\tclose(r.isRunning)\n\t\t\tr.broker.Wait(ctx)\n\t\t\treturn nil\n\t\t},\n\t\tShutdown: func() error { r.broker.Stop(); return nil },\n\t})\n}", "title": "" }, { "docid": "484d4306d23a86cb2396d56f0f812351", "score": "0.57351726", "text": "func (r ConsulRegisteror) Register(svc *SvcDef) (interface{}, error) {\n\tregurl := fmt.Sprintf(\"%s/%s\", r.addr, uriRegister)\n\n\tpayload := map[string]interface{}{\n\t\t\"name\": svc.Name,\n\t\t\"id\": svc.ID,\n\t\t\"address\": svc.Addr,\n\t\t\"port\": svc.Port,\n\t}\n\n\tif svc.HealthCheck != nil {\n\t\tcheck := map[string]interface{}{}\n\t\thasErr := false\n\t\tswitch svc.HealthCheck.Type {\n\t\tcase \"http\":\n\t\t\tcheck[\"http\"] = svc.HealthCheck.Content\n\t\tcase \"script\":\n\t\t\tcheck[\"script\"] = svc.HealthCheck.Content\n\t\tdefault:\n\t\t\tlogger.Warn(\"Unsupported health check:\", svc.HealthCheck.Type)\n\t\t\thasErr = true\n\t\t}\n\n\t\tif !hasErr {\n\t\t\tinterval := 3\n\t\t\tif svc.HealthCheck.Interval > 0 {\n\t\t\t\tinterval = svc.HealthCheck.Interval\n\t\t\t}\n\t\t\ttimeout := 1\n\t\t\tif svc.HealthCheck.Timeout > 0 {\n\t\t\t\ttimeout = svc.HealthCheck.Timeout\n\t\t\t}\n\t\t\tcheck[\"interval\"] = fmt.Sprintf(\"%ds\", interval)\n\t\t\tcheck[\"timeout\"] = fmt.Sprintf(\"%ds\", timeout)\n\n\t\t\tpayload[\"check\"] = check\n\t\t}\n\t}\n\n\t// get tags from tags & env\n\ttags := make([]string, 0)\n\tif svc.Tags != nil && len(svc.Tags) > 0 {\n\t\ttags = append(tags, svc.Tags...)\n\t}\n\tif nodeType, ok := os.LookupEnv(\"NODE_TYPE\"); ok && nodeType != \"\" {\n\t\ttags = append(tags, nodeType)\n\t}\n\tif len(tags) > 0 {\n\t\tpayload[\"tags\"] = tags\n\t}\n\n\tjsonBytes, err := json.Marshal(payload)\n\tif err != nil {\n\t\tlogger.Errorf(\"[SD] Fail to build payload from url: %s, %v\", regurl, err)\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(http.MethodPut, regurl, bytes.NewBuffer(jsonBytes))\n\tif err != nil {\n\t\tlogger.Errorf(\"[SD] Fail to build request from url: %s, %v\", regurl, err)\n\t\treturn nil, err\n\t}\n\n\tlogger.Infof(\"[SD] Payload: %s\", string(jsonBytes))\n\tresp, err := r.httpClient.Do(req)\n\tif err != nil {\n\t\tlogger.Errorf(\"[SD] Fail to PUT request url: %s, %v\", regurl, err)\n\t\treturn nil, err\n\t}\n\n\tdefer resp.Body.Close()\n\tbody, _ := ioutil.ReadAll(resp.Body)\n\n\tlogger.Infof(\"[SD] service(%s id=%s, addr=%s:%d) registerd, return:[%s]\", svc.Name, svc.ID, svc.Addr, svc.Port, string(body))\n\treturn true, nil\n}", "title": "" }, { "docid": "dd7517774c870bef7e2f3baeac5b2696", "score": "0.569899", "text": "func RegisterHandshakerServiceService(s grpc.ServiceRegistrar, srv *HandshakerServiceService) {\n\tsrvCopy := *srv\n\tif srvCopy.DoHandshake == nil {\n\t\tsrvCopy.DoHandshake = func(HandshakerService_DoHandshakeServer) error {\n\t\t\treturn status.Errorf(codes.Unimplemented, \"method DoHandshake not implemented\")\n\t\t}\n\t}\n\tsd := grpc.ServiceDesc{\n\t\tServiceName: \"grpc.gcp.HandshakerService\",\n\t\tMethods: []grpc.MethodDesc{},\n\t\tStreams: []grpc.StreamDesc{\n\t\t\t{\n\t\t\t\tStreamName: \"DoHandshake\",\n\t\t\t\tHandler: srvCopy.doHandshake,\n\t\t\t\tServerStreams: true,\n\t\t\t\tClientStreams: true,\n\t\t\t},\n\t\t},\n\t\tMetadata: \"grpc/gcp/handshaker.proto\",\n\t}\n\n\ts.RegisterService(&sd, nil)\n}", "title": "" }, { "docid": "6c8ee03d94bb36964cd5e880ddb7d652", "score": "0.5694903", "text": "func (sm *Statemgr) Register(name string, svc FeatureStateMgr) {\n\tfeaturemgrs[name] = svc\n\n}", "title": "" }, { "docid": "1fd492a623b456f8663e7af2f9efc514", "score": "0.56911504", "text": "func RegisterServiceWithDefaults(srv interface{}) (*RPCService, error) {\n\treturn DefaultServer.RegisterServiceWithDefaults(srv)\n}", "title": "" }, { "docid": "23c480334f51a3cdf39426797f454d41", "score": "0.56879807", "text": "func TestServiceRegistration(t *testing.T) {\n\n\tserver, err := zeroconf.Register(\"TestingZeroconf\", \"_healthchain._tcp\", \"local.\", 4000, nil, nil)\n\tdefer server.Shutdown()\n\tif err != nil {\n\t\tt.Errorf(\"failed to register service\")\n\t}\n\n}", "title": "" }, { "docid": "6bd2f61a2ee260267523d208e5cd9cc1", "score": "0.56868315", "text": "func (s *Server) RegisterServices(r *kite.Request) (interface{}, error) {\n\tresp, err := s.registerServices(r)\n\tif err != nil {\n\t\ts.opts.Log.Error(\"error serving RegisterServices for %q: %s\", r.Username, err)\n\n\t\treturn nil, err\n\t}\n\n\treturn resp, nil\n}", "title": "" }, { "docid": "81db5fb35de0525e6383cad673cf145b", "score": "0.5677758", "text": "func (s *swxProxy) RegisterImpl(req *protos.RegistrationRequest, serverAssignmentType uint32) (*protos.RegistrationAnswer, error) {\n\tsid := req.GetSessionId()\n\tif len(sid) == 0 {\n\t\tsid = s.genSID(req.GetUserName())\n\t}\n\tres := &protos.RegistrationAnswer{SessionId: sid}\n\terr := validateRegistrationRequest(req)\n\tif err != nil {\n\t\treturn res, status.Errorf(codes.InvalidArgument, err.Error())\n\t}\n\t_, err = s.sendSAR(req.GetUserName(), serverAssignmentType, sid)\n\treturn res, err\n}", "title": "" }, { "docid": "a1572427984ade3257c8cce55fde646c", "score": "0.5674397", "text": "func (reg *ZKRegistry) Add(name, version, endpoint string) {\n\treg.lock.Lock()\n\n\tservice, ok := reg.services[name]\n\tif !ok {\n\t\tservice = map[string][]string{}\n\t\treg.services[name] = service\n\t}\n\tservice[version] = append(service[version], endpoint)\n\n\treg.lock.Unlock()\n}", "title": "" }, { "docid": "bce26bf0554d05ce18db652b3ed62925", "score": "0.5654053", "text": "func RegisterLoadBalancerService(s grpc.ServiceRegistrar, srv *LoadBalancerService) {\n\tsd := grpc.ServiceDesc{\n\t\tServiceName: \"grpc.lb.v1.LoadBalancer\",\n\t\tMethods: []grpc.MethodDesc{},\n\t\tStreams: []grpc.StreamDesc{\n\t\t\t{\n\t\t\t\tStreamName: \"BalanceLoad\",\n\t\t\t\tHandler: srv.balanceLoad,\n\t\t\t\tServerStreams: true,\n\t\t\t\tClientStreams: true,\n\t\t\t},\n\t\t},\n\t\tMetadata: \"grpc/lb/v1/load_balancer.proto\",\n\t}\n\n\ts.RegisterService(&sd, nil)\n}", "title": "" }, { "docid": "2dfcc4f436a5ca9c06a6a5ed5c6eb6e9", "score": "0.5644724", "text": "func RegisterServiceInstance(param vo.RegisterInstanceParam) {\n\tipAddr, _ := config.Get(\"nacos-addr\")\n\tport, _ := config.Get(\"nacos-port\")\n\tnamespaceId, _ := config.Get(\"nacos-namespace-id\")\n\tintPort, _ := strconv.Atoi(port)\n\tsc := []constant.ServerConfig{\n\t\t{\n\t\t\tIpAddr: ipAddr,\n\t\t\tPort: uint64(intPort),\n\t\t},\n\t}\n\tcc := constant.ClientConfig{\n\t\tNamespaceId: namespaceId, //namespace id\n\t\tTimeoutMs: 5000, // 请求Nacos服务端的超时时间,默认是10000ms\n\t\tNotLoadCacheAtStart: true, // 在启动的时候不读取缓存在CacheDir的service信息\n\t\tLogDir: \"/tmp/nacos/log\", // 日志存储路径\n\t\t//CacheDir: \"/tmp/nacos/cache\",\n\t\tRotateTime: \"24h\", // 日志轮转周期,比如:30m, 1h, 24h, 默认是24h\n\t\tMaxAge: 3, // 日志最大文件数,默认3\n\t\tLogLevel: \"info\", // 日志默认级别,值必须是:debug,info,warn,error,默认值是info\n\t}\n\n\tclient, err := clients.CreateNamingClient(map[string]interface{}{\n\t\t\"serverConfigs\": sc,\n\t\t\"clientConfig\": cc,\n\t})\n\tif err != nil {\n\t\tpanic(err)\n\n\t}\n\tsuccess, _ := client.RegisterInstance(param)\n\tfmt.Printf(\"RegisterServiceInstance,param:%+v,result:%+v \\n\\n\", param, success)\n\n\t//初始化配置信息\n\tinitConfigs(InitConfigRequest{\n\t\tNamespaceId: namespaceId,\n\t\tServerName: param.ServiceName,\n\t\tGroupName: param.GroupName,\n\t\tIp: param.Ip,\n\t\tPort: int(param.Port),\n\t})\n}", "title": "" }, { "docid": "da9d098b8258eb2e8ff475d4a6d55c9e", "score": "0.5642879", "text": "func RegisterWebService(webService WebService, classicMartini *martini.ClassicMartini) {\n\tpath := webService.GetPath()\n\n\tclassicMartini.Get(path, webService.WebGet)\n\tclassicMartini.Get(path+\"/:id\", webService.WebGet)\n\n\tclassicMartini.Post(path, webService.WebPost)\n\tclassicMartini.Post(path+\"/:id\", webService.WebPost)\n\n\tclassicMartini.Delete(path, webService.WebDelete)\n\tclassicMartini.Delete(path+\"/:id\", webService.WebDelete)\n\n}", "title": "" }, { "docid": "2bcf83d6f5b02c5ab7e38c39227b930c", "score": "0.564017", "text": "func WithServiceName(name string) RegisterOption {\n\treturn func(cfg *registerConfig) {\n\t\tcfg.serviceName = name\n\t}\n}", "title": "" }, { "docid": "70e15483c1400de97876cf897e4bff50", "score": "0.56389755", "text": "func (m *UpdateStreamControlMock) RegisterService() {\n}", "title": "" } ]
a6c5fb7d00a2762e2c2d588fcac43caa
Add a value to the CloudFormation Resource Metadata. See: Note that this is a different set of metadata from CDK node metadata; this metadata ends up in the stack template under the resource, whereas CDK node metadata ends up in the Cloud Assembly. Experimental.
[ { "docid": "2923277053ee0d37c0d4ebe8d8168f18", "score": "0.54302055", "text": "func (c *jsiiProxy_CfnPortfolioShare) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" } ]
[ { "docid": "df3c2f04f31104585e3b6097b366b762", "score": "0.670766", "text": "func (c *jsiiProxy_CfnCloudFormationProduct) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "38933bf4281678d9203844d99e3b62b8", "score": "0.658418", "text": "func (c *jsiiProxy_CfnCloudFormationProvisionedProduct) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "64151501f244caffb9a55eb522a53334", "score": "0.64671856", "text": "func (c *jsiiProxy_CfnResourceUpdateConstraint) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "96908b3d6a62fbd7618c2b51dfb7ae3c", "score": "0.6375843", "text": "func (r *CreateRequest) AddMetadata(key, val string) {\n\tif r.Metadata == nil {\n\t\tr.Metadata = make(map[string]string)\n\t}\n\tr.Metadata[key] = val\n}", "title": "" }, { "docid": "827b708c60de564a0030a955f6ee8aeb", "score": "0.62669945", "text": "func (s *Subsegment) AddMetadata(key string, value interface{}) {\n\ts.Lock()\n\tdefer s.Unlock()\n\n\tif s.Metadata == nil {\n\t\ts.Metadata = &metadata{Default: map[string]interface{}{}}\n\t}\n\n\ts.Metadata.Default[key] = value\n}", "title": "" }, { "docid": "2dd615fa316749b2ee363a4959a8d450", "score": "0.6263228", "text": "func (c *jsiiProxy_CfnNode) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "2648ecf85422b584c1a6a06ea73aeeed", "score": "0.62623835", "text": "func (c *jsiiProxy_CfnStage) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "d87a012fba882fe9a880075a80494326", "score": "0.6238853", "text": "func addMetadata(ctx context.Context, client *Client, key string, value string, requestUri string) (Task, error) {\n\tnewMetadata := &types.MetadataValue{\n\t\tXmlns: types.XMLNamespaceVCloud,\n\t\tXsi: types.XMLNamespaceXSI,\n\t\tTypedValue: &types.TypedValue{\n\t\t\tXsiType: \"MetadataStringValue\",\n\t\t\tValue: value,\n\t\t},\n\t}\n\n\tapiEndpoint, _ := url.ParseRequestURI(requestUri)\n\tapiEndpoint.Path += \"/metadata/\" + key\n\n\t// Return the task\n\treturn client.ExecuteTaskRequest(ctx, apiEndpoint.String(), http.MethodPut,\n\t\ttypes.MimeMetaDataValue, \"error adding metadata: %s\", newMetadata)\n}", "title": "" }, { "docid": "4e22b0b35c4124f7e21eacaeb985b286", "score": "0.6148189", "text": "func (c *jsiiProxy_CfnOIDCProvider) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "257fdbc6e1b6f49b14c82df01a59df98", "score": "0.61426586", "text": "func (c *jsiiProxy_CfnApi) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "3592400b80572a8c722a1b09220a38ea", "score": "0.61209035", "text": "func (c *jsiiProxy_CfnEnvironment) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "681eefd17898230a8e70b26abb90954e", "score": "0.6101164", "text": "func (c *jsiiProxy_CfnDeployment) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "0ab044c4929ab290c4455ed38df1bb0f", "score": "0.609857", "text": "func (n *Node) AddMetadata(key string, value interface{}) error {\n\tif n.metadata == nil {\n\t\tn.metadata = make(map[string]interface{})\n\t}\n\tif found, ok := n.metadata[key]; ok && found != value {\n\t\treturn ErrMetadataNotUnique\n\t}\n\tn.metadata[key] = value\n\treturn nil\n}", "title": "" }, { "docid": "a9d41bdaa134434cea9468653e01cc12", "score": "0.608356", "text": "func (ca *CustomerBankAccount) AddMetadata(key, value string) {\n\tca.Metadata[key] = value\n}", "title": "" }, { "docid": "818464e870900077edae577157bf7d91", "score": "0.6082266", "text": "func (c *jsiiProxy_CfnStackSetConstraint) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "7611d02188cc1cfca74d707df5e289d3", "score": "0.60818094", "text": "func (c *jsiiProxy_CfnPipeline) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "d73935c0ce3cf16f1fa15874f7b13802", "score": "0.60814434", "text": "func (c *jsiiProxy_CfnAccessKey) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "9f6683823ed65b57913b4a48e3995400", "score": "0.6068956", "text": "func (c *jsiiProxy_CfnRole) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "7b8c1a08991e49d18d47f97bc1236219", "score": "0.6064884", "text": "func (p *CustomerParams) AddMetadata(key string, value string) {\n\tif p.Metadata == nil {\n\t\tp.Metadata = make(map[string]string)\n\t}\n\n\tp.Metadata[key] = value\n}", "title": "" }, { "docid": "9bdfcab6225bce369fce1f165e4d2a5e", "score": "0.6013952", "text": "func (c *jsiiProxy_CfnLaunchTemplateConstraint) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "1b940407069c1319e1c15d7381681aed", "score": "0.6011646", "text": "func (p *ChargeParams) AddMetadata(key string, value string) {\n\tif p.Metadata == nil {\n\t\tp.Metadata = make(map[string]string)\n\t}\n\n\tp.Metadata[key] = value\n}", "title": "" }, { "docid": "94b1ea2ad311e707d0e235e6bbe58b04", "score": "0.60067123", "text": "func (c *jsiiProxy_CfnInsightRule) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "acd1ab8fb65336005e01226f7f2b2a68", "score": "0.59996295", "text": "func (c *jsiiProxy_CfnCluster) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "1f665f828182ea0b5beaeb502e2523ae", "score": "0.59791917", "text": "func (c *jsiiProxy_CfnResolverEndpoint) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "cc45c3a945b2a1afef0421ed46dd39e8", "score": "0.5958686", "text": "func (c *jsiiProxy_CfnResolverDNSSECConfig) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "f8781374b1a29b3efc07d2f7bb519404", "score": "0.5942694", "text": "func (c *jsiiProxy_CfnModel) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "a3828b34907cc32395377a454821f085", "score": "0.5942534", "text": "func (c *jsiiProxy_CfnIntegrationResponse) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "8906b28f20ebe2ac1913b7d8c42c0dc7", "score": "0.5939024", "text": "func (c *jsiiProxy_CfnPolicy) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "99fc78ffe32cc192de32e08d9efcc968", "score": "0.59206885", "text": "func (c *jsiiProxy_CfnServiceAction) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "3903b7bf88f845b5f3b933059760b3a2", "score": "0.59181666", "text": "func (c *jsiiProxy_CfnManagedPolicy) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "15e4941b1d889127fa128b15562fc3ca", "score": "0.59176993", "text": "func (c *jsiiProxy_CfnVpcLink) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "9a3173616be00a6beea267176fc60fdc", "score": "0.59138703", "text": "func (c *jsiiProxy_CfnTagOption) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "d7421d2ed255571f5e0bd1333fec9190", "score": "0.5878856", "text": "func (c *jsiiProxy_CfnIntegration) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "df78d2fc4e6a528daf567ab52847d8ef", "score": "0.58754456", "text": "func (c *jsiiProxy_CfnInstanceProfile) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "3e565273ccc7a2a85f3fab79747126af", "score": "0.5864691", "text": "func (c *jsiiProxy_CfnAccelerator) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "0ba83c39c9294b736f5d6468cf984d06", "score": "0.5861374", "text": "func (c *jsiiProxy_CfnWebACL) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "0b2679df9aa424da181ec10379d76e6d", "score": "0.58599806", "text": "func (c *jsiiProxy_CfnLifecyclePolicy) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "65637bc4e892bad0dcfedf56caf70b23", "score": "0.5848248", "text": "func (c *jsiiProxy_CfnAuthorizer) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "d7e36e19b6cf9bf53e898d0e9ab7657b", "score": "0.58454865", "text": "func (c *jsiiProxy_CfnNodegroup) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "3be8937005f4e02f8c1e15e1d35ffcbe", "score": "0.5841705", "text": "func (c *jsiiProxy_CfnLaunchRoleConstraint) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "4a96086d7a8e60f67d4fa5310b2f3a3b", "score": "0.58412683", "text": "func (c *jsiiProxy_CfnRouteResponse) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "d96b3982d76f70b3a5d29bb949b62b5b", "score": "0.5831405", "text": "func (c *jsiiProxy_CfnChannel) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "5b259edb1a77b137bb3b88069e198723", "score": "0.58269167", "text": "func (p *TaxTransactionCreateReversalParams) AddMetadata(key string, value string) {\n\tif p.Metadata == nil {\n\t\tp.Metadata = make(map[string]string)\n\t}\n\n\tp.Metadata[key] = value\n}", "title": "" }, { "docid": "487a8566115ac2be3b5bf27af8413685", "score": "0.5824052", "text": "func (vAppTemplate *VAppTemplate) AddMetadata(ctx context.Context, key string, value string) (*VAppTemplate, error) {\n\ttask, err := vAppTemplate.AddMetadataAsync(ctx, key, value)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\terr = task.WaitTaskCompletion(ctx)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error completing add metadata for vApp template task: %s\", err)\n\t}\n\n\terr = vAppTemplate.Refresh(ctx)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error refreshing vApp template: %s\", err)\n\t}\n\n\treturn vAppTemplate, nil\n}", "title": "" }, { "docid": "8fa703a906aab8d4210e51ac0ae7ac1b", "score": "0.5819758", "text": "func (c *jsiiProxy_CfnRemediationConfiguration) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "a59a36eb333bea85ef28dee5b9a29085", "score": "0.5806367", "text": "func (c *jsiiProxy_CfnApiMapping) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "5b3c2c83c7f63a8ef9b7afee51c53498", "score": "0.58046925", "text": "func (c *jsiiProxy_CfnAlarm) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "5b24b84555d0e789c41f7211f53baadf", "score": "0.5802076", "text": "func (c *jsiiProxy_CfnResolverRule) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "39625c5373fa6d330a90f38eca723b47", "score": "0.5786487", "text": "func (c *jsiiProxy_CfnApiGatewayManagedOverrides) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "35d41e9f7e74861b6b3c54f657bf3afb", "score": "0.57853484", "text": "func (c *jsiiProxy_CfnDatastore) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "55d1420459687fc4bf7c2a9a4940f8f6", "score": "0.5784688", "text": "func (c *jsiiProxy_CfnVirtualMFADevice) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "9d98dc0b82332e2f97b0ff4424fb4a80", "score": "0.5784678", "text": "func (c *jsiiProxy_CfnSAMLProvider) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "768ec97c7c98ea37a20b290bb48dc7da", "score": "0.5777556", "text": "func (c *jsiiProxy_CfnConformancePack) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "6afc208332632609c23f6d44b1d74912", "score": "0.5776256", "text": "func (vdc *Vdc) AddMetadata(ctx context.Context, key string, value string) (Vdc, error) {\n\ttask, err := addMetadata(ctx, vdc.client, key, value, getAdminVdcURL(vdc.Vdc.HREF))\n\tif err != nil {\n\t\treturn Vdc{}, err\n\t}\n\n\terr = task.WaitTaskCompletion(ctx)\n\tif err != nil {\n\t\treturn Vdc{}, err\n\t}\n\n\terr = vdc.Refresh(ctx)\n\tif err != nil {\n\t\treturn Vdc{}, err\n\t}\n\n\treturn *vdc, nil\n}", "title": "" }, { "docid": "62d170433330d15f717d7403fe3bcd6a", "score": "0.57733876", "text": "func (c *jsiiProxy_CfnAddon) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "c69abcd5e5d152f201044cd026e729f3", "score": "0.5764911", "text": "func (c *jsiiProxy_CfnMetricStream) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "944d4309a4f586b362bc3d5bdac9ac60", "score": "0.57559043", "text": "func (c *jsiiProxy_CfnConfigurationRecorder) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "0e072792c24c99cbd77ac9d890136d36", "score": "0.5747864", "text": "func (p *ShippingRateParams) AddMetadata(key string, value string) {\n\tif p.Metadata == nil {\n\t\tp.Metadata = make(map[string]string)\n\t}\n\n\tp.Metadata[key] = value\n}", "title": "" }, { "docid": "3631b8f3701c0c9cbcba35342141734f", "score": "0.57452196", "text": "func (c *jsiiProxy_CfnConfigurationAggregator) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "9085cae944993927cdc392185105a004", "score": "0.57414246", "text": "func (c *jsiiProxy_CfnGroup) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "f7c0cb900c0b88f487b99fea310f4aae", "score": "0.57409775", "text": "func (p *TaxTransactionCreateReversalLineItemParams) AddMetadata(key string, value string) {\n\tif p.Metadata == nil {\n\t\tp.Metadata = make(map[string]string)\n\t}\n\n\tp.Metadata[key] = value\n}", "title": "" }, { "docid": "3715b79f991027e3109100e637028cbe", "score": "0.5740003", "text": "func (c *jsiiProxy_CfnRoute) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "e5d252a7f47bb73b72d26289b523817d", "score": "0.57286775", "text": "func (c *jsiiProxy_CfnDataset) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "519ed24e8cc510c59e1fccc38735d161", "score": "0.57211936", "text": "func (p *PriceProductDataParams) AddMetadata(key string, value string) {\n\tif p.Metadata == nil {\n\t\tp.Metadata = make(map[string]string)\n\t}\n\n\tp.Metadata[key] = value\n}", "title": "" }, { "docid": "b1db018d04c89b9f24c1f85db315b97f", "score": "0.57155305", "text": "func (c *jsiiProxy_CfnUser) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "0f190f4a508da6f300c8c06675c13c28", "score": "0.57140636", "text": "func (c *jsiiProxy_CfnConfigRule) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "46a53d5d342e681515ae7393702d3f87", "score": "0.57102317", "text": "func (j *Job) AddMetadata(name string, value interface{}) {\n\tj.Metadata[name] = value\n}", "title": "" }, { "docid": "0fb196fefac7a7eef19a14ab978d0e84", "score": "0.5702462", "text": "func (c *jsiiProxy_CfnIPSet) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "12207dc5fe526b506ba24e58be4e6e72", "score": "0.5695773", "text": "func (p *IssuingTransactionParams) AddMetadata(key string, value string) {\n\tif p.Metadata == nil {\n\t\tp.Metadata = make(map[string]string)\n\t}\n\n\tp.Metadata[key] = value\n}", "title": "" }, { "docid": "e8e483fd5cd16065904e8f2d7bebbf35", "score": "0.5688561", "text": "func (r ResourceData) AddLabel(key, value string) {\n\tmeta, ok := r[\"metadata\"].(map[string]interface{})\n\tExpect(ok).To(BeTrue())\n\tlabels, ok := meta[\"labels\"].(map[string]interface{})\n\tif !ok {\n\t\tlabels = make(map[string]interface{}, 0)\n\t\tmeta[\"labels\"] = labels\n\t}\n\tlabels[key] = value\n}", "title": "" }, { "docid": "419a318c3e46e3ff315d37a241624d3f", "score": "0.5685817", "text": "func (p *PriceParams) AddMetadata(key string, value string) {\n\tif p.Metadata == nil {\n\t\tp.Metadata = make(map[string]string)\n\t}\n\n\tp.Metadata[key] = value\n}", "title": "" }, { "docid": "bee81ef93d8ac371da2830d0efee5aa3", "score": "0.56808674", "text": "func (c *jsiiProxy_CfnMember) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "1d2e7057bef0ca9e54bdd9db70a46b2f", "score": "0.5665429", "text": "func (vapp *VApp) AddMetadata(ctx context.Context, key string, value string) (Task, error) {\n\treturn addMetadata(ctx, vapp.client, key, value, vapp.VApp.HREF)\n}", "title": "" }, { "docid": "1430b9431f001df776fbe55d57a60874", "score": "0.5664637", "text": "func (p *TaxTransactionCreateFromCalculationParams) AddMetadata(key string, value string) {\n\tif p.Metadata == nil {\n\t\tp.Metadata = make(map[string]string)\n\t}\n\n\tp.Metadata[key] = value\n}", "title": "" }, { "docid": "58710a02b60e6c7f13f49f750a4c8aad", "score": "0.563626", "text": "func (vm *VM) AddMetadata(ctx context.Context, key string, value string) (Task, error) {\n\treturn addMetadata(ctx, vm.client, key, value, vm.VM.HREF)\n}", "title": "" }, { "docid": "9ad6d7e4d3e51ff4d394ddcf93d81eba", "score": "0.56347877", "text": "func (c *jsiiProxy_CfnServerCertificate) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "a396e4087000b5bd6a9647b46239d3cc", "score": "0.56323797", "text": "func (c *jsiiProxy_CfnDashboard) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "e06dc1b0bbc69c022b817115e188a63c", "score": "0.5626576", "text": "func (p *BankAccountParams) AddMetadata(key string, value string) {\n\tif p.Metadata == nil {\n\t\tp.Metadata = make(map[string]string)\n\t}\n\n\tp.Metadata[key] = value\n}", "title": "" }, { "docid": "acac7cd697ce20674bca2c81b2523d39", "score": "0.5620995", "text": "func (c *jsiiProxy_CfnFargateProfile) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "6d261c5bc28b4bfe2c994408ff8b5eb1", "score": "0.5602544", "text": "func (c *jsiiProxy_CfnEndpointGroup) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "6f63c41f15b3662f6e34190aeb356b40", "score": "0.55661833", "text": "func (c *jsiiProxy_CfnRuleGroup) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "0d27259664351a8f88674283e308eb5a", "score": "0.55656207", "text": "func (c *jsiiProxy_CfnResolverRuleAssociation) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "b6d1c21201b9bef90377473282350925", "score": "0.554948", "text": "func (c *jsiiProxy_CfnOrganizationConformancePack) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "e964fb137c3c24cfc5c9580b0cb5c729", "score": "0.5543351", "text": "func (c *jsiiProxy_CfnServiceLinkedRole) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "77efccc2a9287ad7e9e68abd49504bfe", "score": "0.5535814", "text": "func (c *jsiiProxy_CfnDomainName) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "4af02f2a677486da294c2814b97c9904", "score": "0.5528112", "text": "func (c *jsiiProxy_CfnDomain) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "78898c04db62cd268a4cfaa20d60f656", "score": "0.5511001", "text": "func (c *jsiiProxy_CfnOrganizationConfigRule) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "c0657e11d016dccc32f84da3bee69b78", "score": "0.55059505", "text": "func (c *jsiiProxy_CfnPortfolio) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "b3167a0a4e3e32278f5b3e5181434abf", "score": "0.5505114", "text": "func (c *jsiiProxy_CfnLaunchNotificationConstraint) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "e3507fa2bf4bf698aaf535e90070d229", "score": "0.5462789", "text": "func (c *jsiiProxy_CfnAnomalyDetector) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "7efe1a4edc514670bba31ab805ae332e", "score": "0.54510546", "text": "func (c *jsiiProxy_CfnAggregationAuthorization) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "36cbf0586b702d31c44dd027c521bd56", "score": "0.5444011", "text": "func (p *TransferReversalParams) AddMetadata(key string, value string) {\n\tif p.Metadata == nil {\n\t\tp.Metadata = make(map[string]string)\n\t}\n\n\tp.Metadata[key] = value\n}", "title": "" }, { "docid": "6e550d6a92c7e979e04e4636e28bb89f", "score": "0.54350054", "text": "func (c *jsiiProxy_CfnCompositeAlarm) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "e0733400c81d9638d2ab9a1c7e5c34e3", "score": "0.5427768", "text": "func (c *jsiiProxy_CfnServiceActionAssociation) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "baa972f1ddc27be5fc621ccc42f459d0", "score": "0.5420466", "text": "func (c *jsiiProxy_CfnStoredQuery) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "a64504fd76c9d19ee45c63728d5f5eec", "score": "0.5402651", "text": "func (m *Metadata) Add(name, value string) {\n\t*m = append(*m, &MetadataField{Name: name, Value: value})\n}", "title": "" }, { "docid": "f7b46f135a2d9e51beebc2dc11e75691", "score": "0.53841734", "text": "func (c *jsiiProxy_CfnFirewallRuleGroup) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "bc5f5eb9c1f16d3e867463a0e2ef8a25", "score": "0.5369372", "text": "func (i *Instance) AddMetadata(mdi ...*computeApi.MetadataItems) error {\n\tresp, err := i.client.GetInstance(i.Project, i.Zone, i.Name)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfor _, old := range resp.Metadata.Items {\n\t\tfound := false\n\t\tfor _, new := range mdi {\n\t\t\tif old.Key == new.Key {\n\t\t\t\tfound = true\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif found {\n\t\t\tcontinue\n\t\t}\n\t\tmdi = append(mdi, old)\n\t}\n\tresp.Metadata.Items = mdi\n\treturn i.client.SetInstanceMetadata(i.Project, i.Zone, i.Name, resp.Metadata)\n}", "title": "" }, { "docid": "572faeb7a9e0661a1698063e33cdf37f", "score": "0.53519934", "text": "func (c *jsiiProxy_CfnListener) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" }, { "docid": "ce5fa9e7b136737c32551cdf7326a99c", "score": "0.5313658", "text": "func (c *jsiiProxy_CfnPortfolioProductAssociation) AddMetadata(key *string, value interface{}) {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"addMetadata\",\n\t\t[]interface{}{key, value},\n\t)\n}", "title": "" } ]
6c4cd442ab08bf8345fab0b03a73e1a1
Props is an autogenerated proxy to the current props of Todo
[ { "docid": "d4d4eaf1ba92eb6ab4759f722cca08d8", "score": "0.7359961", "text": "func (t *TodoDef) Props() TodoProps {\n\tuprops := t.ComponentDef.Props()\n\treturn uprops.(TodoProps)\n}", "title": "" } ]
[ { "docid": "63de917f1657a106bc35c6bfafc6ba99", "score": "0.54614735", "text": "func (s HTML) Props(props [][]string) HTML {\n\ts.props = props\n\treturn s\n}", "title": "" }, { "docid": "92b4d705d7d985337149df9d1a292acf", "score": "0.51598155", "text": "func Props(name string) *StepProperties {\n\treturn &StepProperties{\n\t\tName: name,\n\t}\n}", "title": "" }, { "docid": "8560bdf30c22d8ac2a3305447493e9d9", "score": "0.5040359", "text": "func (c *cn) Prop() Prop {\n\treturn c.p\n}", "title": "" }, { "docid": "0d8b757adfdea9d2cb4d51e302f42d74", "score": "0.46720153", "text": "func (ec *executionContext) _Todo(ctx context.Context, sel ast.SelectionSet, obj *Todo) graphql.Marshaler {\n\tfields := graphql.CollectFields(ctx, sel, todoImplementors)\n\n\tvar wg sync.WaitGroup\n\tout := graphql.NewOrderedMap(len(fields))\n\tinvalid := false\n\tfor i, field := range fields {\n\t\tout.Keys[i] = field.Alias\n\n\t\tswitch field.Name {\n\t\tcase \"__typename\":\n\t\t\tout.Values[i] = graphql.MarshalString(\"Todo\")\n\t\tcase \"id\":\n\t\t\tout.Values[i] = ec._Todo_id(ctx, field, obj)\n\t\t\tif out.Values[i] == graphql.Null {\n\t\t\t\tinvalid = true\n\t\t\t}\n\t\tcase \"text\":\n\t\t\tout.Values[i] = ec._Todo_text(ctx, field, obj)\n\t\t\tif out.Values[i] == graphql.Null {\n\t\t\t\tinvalid = true\n\t\t\t}\n\t\tcase \"done\":\n\t\t\tout.Values[i] = ec._Todo_done(ctx, field, obj)\n\t\t\tif out.Values[i] == graphql.Null {\n\t\t\t\tinvalid = true\n\t\t\t}\n\t\tcase \"user\":\n\t\t\twg.Add(1)\n\t\t\tgo func(i int, field graphql.CollectedField) {\n\t\t\t\tout.Values[i] = ec._Todo_user(ctx, field, obj)\n\t\t\t\tif out.Values[i] == graphql.Null {\n\t\t\t\t\tinvalid = true\n\t\t\t\t}\n\t\t\t\twg.Done()\n\t\t\t}(i, field)\n\t\tcase \"createdAt\":\n\t\t\tout.Values[i] = ec._Todo_createdAt(ctx, field, obj)\n\t\t\tif out.Values[i] == graphql.Null {\n\t\t\t\tinvalid = true\n\t\t\t}\n\t\tcase \"lastEditedBy\":\n\t\t\twg.Add(1)\n\t\t\tgo func(i int, field graphql.CollectedField) {\n\t\t\t\tout.Values[i] = ec._Todo_lastEditedBy(ctx, field, obj)\n\t\t\t\twg.Done()\n\t\t\t}(i, field)\n\t\tcase \"tags\":\n\t\t\twg.Add(1)\n\t\t\tgo func(i int, field graphql.CollectedField) {\n\t\t\t\tout.Values[i] = ec._Todo_tags(ctx, field, obj)\n\t\t\t\tif out.Values[i] == graphql.Null {\n\t\t\t\t\tinvalid = true\n\t\t\t\t}\n\t\t\t\twg.Done()\n\t\t\t}(i, field)\n\t\tdefault:\n\t\t\tpanic(\"unknown field \" + strconv.Quote(field.Name))\n\t\t}\n\t}\n\twg.Wait()\n\tif invalid {\n\t\treturn graphql.Null\n\t}\n\treturn out\n}", "title": "" }, { "docid": "63fa5c3d38c569db64a7a472302d825a", "score": "0.45351183", "text": "func (p *Properties) Add(prop *Property) {\n\tp.Count++\n\tp.Items = append(p.Items, prop)\n}", "title": "" }, { "docid": "1b0d84cac4f0252c871f64a131a26473", "score": "0.45077375", "text": "func (r *Resolver) Todo() generated.TodoResolver { return &todoResolver{r} }", "title": "" }, { "docid": "1b0d84cac4f0252c871f64a131a26473", "score": "0.45077375", "text": "func (r *Resolver) Todo() generated.TodoResolver { return &todoResolver{r} }", "title": "" }, { "docid": "b1e4cde8768ce864a370d06cec7ae93c", "score": "0.44445333", "text": "func JSONSchemaProps(\n\tjsType string,\n\tformat string,\n\trequired []string,\n\titems *extv1.JSONSchemaPropsOrArray,\n\tproperties map[string]extv1.JSONSchemaProps,\n) extv1.JSONSchemaProps {\n\treturn extv1.JSONSchemaProps{\n\t\tType: jsType,\n\t\tFormat: format,\n\t\tRequired: required,\n\t\tItems: items,\n\t\tProperties: properties,\n\t}\n}", "title": "" }, { "docid": "dac9d0649910e0772761a9f1ad42746e", "score": "0.44131887", "text": "func (edge *Edge) GetProps() map[string]interface{} {\n\treturn edge.Props\n}", "title": "" }, { "docid": "797ffd3267a757da5de85518c9c4b1cd", "score": "0.44060922", "text": "func (*Todo) Descriptor() ([]byte, []int) {\n\treturn file_model_todo_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "2b0490c96205c687e7edc83fb0c0681b", "score": "0.44057998", "text": "func (s *SetController) Prop() {\n\tjsonData := &models.WxErr{}\n\tdefer s.jsonResult(jsonData)\n\n\tif !s.isPost() {\n\t\tjsonData.ErrCode = int(pb.Failed)\n\t\tjsonData.ErrMsg = \"method error\"\n\t\treturn\n\t}\n\n\tif !s.token {\n\t\tjsonData.ErrCode = int(pb.Failed)\n\t\tjsonData.ErrMsg = \"token error\"\n\t\treturn\n\t}\n\n\tvar prop models.Prop\n\tvar err error\n\terr = json.Unmarshal(s.Ctx.Input.RequestBody, &prop)\n\tif err != nil {\n\t\tbeego.Error(\"set prop err: \", err)\n\t\tjsonData.ErrCode = int(pb.SetPropFailed)\n\t\tjsonData.ErrMsg = err.Error()\n\t\treturn\n\t}\n\n\tif !models.UpsertProp(prop) {\n\t\tbeego.Error(\"set prop err: \", err)\n\t\tjsonData.ErrCode = int(pb.SetPropFailed)\n\t\tjsonData.ErrMsg = \"set prop failed\"\n\t\treturn\n\t}\n\tbeego.Info(\"set prop success: \", prop)\n}", "title": "" }, { "docid": "29ed7cfb4771f6698a5b7740f839bd7d", "score": "0.438991", "text": "func (*ToDo) Descriptor() ([]byte, []int) {\n\treturn file_todo_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "575c954e424e3a6f3ba260440b22d36b", "score": "0.4380641", "text": "func setProps(concept Concept, id string, isSource bool) map[string]interface{} {\n\tnodeProps := map[string]interface{}{}\n\t//common props\n\tif concept.PrefLabel != \"\" {\n\t\tnodeProps[\"prefLabel\"] = concept.PrefLabel\n\t}\n\tnodeProps[\"lastModifiedEpoch\"] = time.Now().Unix()\n\tif concept.FigiCode != \"\" {\n\t\tnodeProps[\"figiCode\"] = concept.FigiCode\n\t}\n\n\tif concept.IsDeprecated {\n\t\tnodeProps[\"isDeprecated\"] = true\n\t}\n\t//source specific props\n\tif isSource {\n\t\tnodeProps[\"uuid\"] = id\n\t\tnodeProps[\"authority\"] = concept.Authority\n\t\tnodeProps[\"authorityValue\"] = concept.AuthorityValue\n\n\t\treturn nodeProps\n\t}\n\t//canonical specific props\n\tnodeProps[\"prefUUID\"] = id\n\tnodeProps[\"aggregateHash\"] = concept.Hash\n\n\tif len(concept.Aliases) > 0 {\n\t\tnodeProps[\"aliases\"] = concept.Aliases\n\t}\n\tif concept.EmailAddress != \"\" {\n\t\tnodeProps[\"emailAddress\"] = concept.EmailAddress\n\t}\n\tif concept.FacebookPage != \"\" {\n\t\tnodeProps[\"facebookPage\"] = concept.FacebookPage\n\t}\n\tif concept.TwitterHandle != \"\" {\n\t\tnodeProps[\"twitterHandle\"] = concept.TwitterHandle\n\t}\n\tif concept.ScopeNote != \"\" {\n\t\tnodeProps[\"scopeNote\"] = concept.ScopeNote\n\t}\n\tif concept.ShortLabel != \"\" {\n\t\tnodeProps[\"shortLabel\"] = concept.ShortLabel\n\t}\n\tif concept.DescriptionXML != \"\" {\n\t\tnodeProps[\"descriptionXML\"] = concept.DescriptionXML\n\t}\n\tif concept.ImageURL != \"\" {\n\t\tnodeProps[\"imageUrl\"] = concept.ImageURL\n\t}\n\tif concept.Strapline != \"\" {\n\t\tnodeProps[\"strapline\"] = concept.Strapline\n\t}\n\tif concept.FigiCode != \"\" {\n\t\tnodeProps[\"figiCode\"] = concept.FigiCode\n\t}\n\tif concept.ProperName != \"\" {\n\t\tnodeProps[\"properName\"] = concept.ProperName\n\t}\n\tif concept.ShortName != \"\" {\n\t\tnodeProps[\"shortName\"] = concept.ShortName\n\t}\n\tif len(concept.FormerNames) > 0 {\n\t\tnodeProps[\"formerNames\"] = concept.FormerNames\n\t}\n\tif len(concept.TradeNames) > 0 {\n\t\tnodeProps[\"tradeNames\"] = concept.TradeNames\n\t}\n\tif concept.CountryCode != \"\" {\n\t\tnodeProps[\"countryCode\"] = concept.CountryCode\n\t}\n\tif concept.CountryOfIncorporation != \"\" {\n\t\tnodeProps[\"countryOfIncorporation\"] = concept.CountryOfIncorporation\n\t}\n\tif concept.CountryOfRisk != \"\" {\n\t\tnodeProps[\"countryOfRisk\"] = concept.CountryOfRisk\n\t}\n\tif concept.CountryOfOperations != \"\" {\n\t\tnodeProps[\"countryOfOperations\"] = concept.CountryOfOperations\n\t}\n\tif concept.PostalCode != \"\" {\n\t\tnodeProps[\"postalCode\"] = concept.PostalCode\n\t}\n\tif concept.YearFounded > 0 {\n\t\tnodeProps[\"yearFounded\"] = concept.YearFounded\n\t}\n\tif concept.LeiCode != \"\" {\n\t\tnodeProps[\"leiCode\"] = concept.LeiCode\n\t}\n\tif concept.InceptionDate != \"\" {\n\t\tnodeProps[\"inceptionDate\"] = concept.InceptionDate\n\t}\n\tif concept.TerminationDate != \"\" {\n\t\tnodeProps[\"terminationDate\"] = concept.TerminationDate\n\t}\n\tif concept.InceptionDateEpoch > 0 {\n\t\tnodeProps[\"inceptionDateEpoch\"] = concept.InceptionDateEpoch\n\t}\n\tif concept.TerminationDateEpoch > 0 {\n\t\tnodeProps[\"terminationDateEpoch\"] = concept.TerminationDateEpoch\n\t}\n\tif concept.Salutation != \"\" {\n\t\tnodeProps[\"salutation\"] = concept.Salutation\n\t}\n\tif concept.BirthYear > 0 {\n\t\tnodeProps[\"birthYear\"] = concept.BirthYear\n\t}\n\tif concept.ISO31661 != \"\" {\n\t\tnodeProps[\"iso31661\"] = concept.ISO31661\n\t}\n\n\treturn nodeProps\n}", "title": "" }, { "docid": "4daa1304ad4b496d7cd45c93ff457dcc", "score": "0.4365655", "text": "func (j jHookDemoModel) Properties() map[string]builder.MetaProvider {\n\tret := map[string]builder.MetaProvider{}\n\n\tret[\"ID\"] = j.ID\n\n\tret[\"Name\"] = j.Name\n\n\treturn ret\n}", "title": "" }, { "docid": "06fcde998916395dd01dcc06fbbf31e8", "score": "0.43235984", "text": "func (p *Property) PropType() string { return p.propType }", "title": "" }, { "docid": "16c344ec58098239a0f33dc9b3862d47", "score": "0.42946598", "text": "func getProp(ctx *Context, s State, id string, prop string, def interface{}) (interface{}, bool, error) {\n\treturn getPropFromFact(ctx, s, genPropId(id, prop), prop, def)\n}", "title": "" }, { "docid": "afb9178f77926cb6c50167a54937828f", "score": "0.4274528", "text": "func (*TodoList) Descriptor() ([]byte, []int) {\n\treturn file_model_todo_proto_rawDescGZIP(), []int{3}\n}", "title": "" }, { "docid": "4e3fb24b390322fd80423e8a868f29a4", "score": "0.42722255", "text": "func (a *AdditionalItems) JSONProp(name string) interface{} {\n\treturn a.Schema.JSONProp(name)\n}", "title": "" }, { "docid": "64ac035998cb1154c0c55c6e354f601d", "score": "0.42593014", "text": "func (*Todo) Descriptor() ([]byte, []int) {\n\treturn file_v1_todo_proto_rawDescGZIP(), []int{1}\n}", "title": "" }, { "docid": "f08a19d9c87b9fa440ec1cac2a59ad31", "score": "0.42524865", "text": "func (*PointGetPlan) GetChildReqProps(_ int) *property.PhysicalProperty {\n\treturn nil\n}", "title": "" }, { "docid": "9d98788b551b6a58055c05be5884cacf", "score": "0.4217569", "text": "func (obj Thing) TopObjectProperty() interface{} { return GetTopObjectProperty(obj) }", "title": "" }, { "docid": "b8c1c29dd72b5e879e5a62df36ed3264", "score": "0.42045867", "text": "func (obj Thing) BottomObjectProperty() interface{} { return GetBottomObjectProperty(obj) }", "title": "" }, { "docid": "8d0cdec25399559eeb084b0e24426f7a", "score": "0.4196693", "text": "func (j jSampleViewModel) Properties() map[string]builder.MetaProvider {\n\tret := map[string]builder.MetaProvider{}\n\n\tret[\"ID\"] = j.ID\n\n\tret[\"Name\"] = j.Name\n\n\tret[\"Description\"] = j.Description\n\n\treturn ret\n}", "title": "" }, { "docid": "d2a32573216c53b00ab2f71488b73395", "score": "0.4187227", "text": "func (*TodoList) Descriptor() ([]byte, []int) {\n\treturn file_v1_todo_proto_rawDescGZIP(), []int{4}\n}", "title": "" }, { "docid": "7d79871ca2bb6afa143dab6fedbaa3fd", "score": "0.41621357", "text": "func UserProps(c *gin.Context) {\n\tfileUpload := new(FileUpload)\n\tfop := ugl.FileUploadOperations{Context: c}\n\tif err := c.ShouldBindWith(fileUpload, binding.Form); err != nil {\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"err\": err.Error(),\n\t\t}).Error(\"Problems binding form\")\n\t\treturn\n\t}\n\tjh := os.Getenv(\"JMETER_HOME\")\n\tfop.SaveFile(fmt.Sprintf(\"%s/bin/user.properties\", jh))\n}", "title": "" }, { "docid": "4c7c32c948a97cbdf05b1c41f1e95cc0", "score": "0.41432187", "text": "func (obj ObjectProperty) PropertyChainAxiom() interface{} { return GetPropertyChainAxiom(obj) }", "title": "" }, { "docid": "f45cba89e122ba8c811c237a71752eab", "score": "0.41420966", "text": "func (*TodoInput) Descriptor() ([]byte, []int) {\n\treturn file_model_todo_proto_rawDescGZIP(), []int{1}\n}", "title": "" }, { "docid": "93778d227e9e61bc446a5c787bee60f5", "score": "0.41351295", "text": "func GetProps() *goconf.ConfigFile {\n\tif err == nil {\n\t\treturn props\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "76202f597763e07384515cf8465e5b16", "score": "0.41332757", "text": "func (*BatchPointGetPlan) GetChildReqProps(_ int) *property.PhysicalProperty {\n\treturn nil\n}", "title": "" }, { "docid": "330212c13f14b31e4dd9a4edb93eeacb", "score": "0.41294324", "text": "func (n *ResourceService) GetPropsInfos(ctx context.Context, resName string, opts ...*ListOpts) ([]PropsInfo, error) {\n\tvar infos []PropsInfo\n\t_, err := n.client.doGET(ctx, \"/v1/resource-definitions/\"+resName+\"/resources/properties/info\", &infos, opts...)\n\treturn infos, err\n}", "title": "" }, { "docid": "36b8d71ad68d31048786577a4e971ea3", "score": "0.41006443", "text": "func newProps(h hash.Hash, f file, name string) *props {\n\tfname := stripRoot(name)\n\text := filepath.Ext(fname)\n\tdir := filepath.Dir(fname)\n\tident := strhash(fname, h)\n\tp := &props{\n\t\tmodtime: f.ModTime(),\n\t\tctime: time.Now(),\n\t\tfname: fname,\n\t\text: ext,\n\t\tdir: dir,\n\t\tsize: f.Size(),\n\t\tbname: filepath.Base(fname),\n\t}\n\tcopy(p.ident[:], ident)\n\treturn p\n}", "title": "" }, { "docid": "a4ad370d1b9aabd6e80f375270a152a8", "score": "0.40932173", "text": "func (todo Todo) Render() vdom.VNode {\n\tclasses := []string{}\n\thooks := []func(dom.Element){}\n\tif todo.Completed {\n\t\tclasses = append(classes, \"completed\")\n\t}\n\tif todo.Editing {\n\t\tclasses = append(classes, \"editing\")\n\t\thooks = append(hooks, todo.focusHook)\n\t}\n\treturn &vdom.VElement{\n\t\tTagName: \"li\",\n\t\tProps: map[string]interface{}{\n\t\t\t// \"key\": todo.ID,\n\t\t\t\"className\": strings.Join(classes, \" \"),\n\t\t},\n\t\tChildren: []vdom.VNode{\n\t\t\t&vdom.VElement{\n\t\t\t\tTagName: \"div\",\n\t\t\t\tProps: map[string]interface{}{\n\t\t\t\t\t\"className\": \"view\",\n\t\t\t\t},\n\t\t\t\tChildren: []vdom.VNode{\n\t\t\t\t\t&vdom.VElement{\n\t\t\t\t\t\tTagName: \"input\",\n\t\t\t\t\t\tProps: map[string]interface{}{\n\t\t\t\t\t\t\t\"className\": \"toggle\",\n\t\t\t\t\t\t\t\"type\": \"checkbox\",\n\t\t\t\t\t\t\t\"checked\": todo.Completed,\n\t\t\t\t\t\t\t\"onchange\": todo.toggleCompleted,\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\t&vdom.VElement{\n\t\t\t\t\t\tTagName: \"label\",\n\t\t\t\t\t\tProps: map[string]interface{}{\n\t\t\t\t\t\t\t\"ondblclick\": todo.startEditing,\n\t\t\t\t\t\t},\n\t\t\t\t\t\tChildren: []vdom.VNode{\n\t\t\t\t\t\t\tvdom.VText(todo.Text),\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\t&vdom.VElement{\n\t\t\t\t\t\tTagName: \"button\",\n\t\t\t\t\t\tProps: map[string]interface{}{\n\t\t\t\t\t\t\t\"className\": \"destroy\",\n\t\t\t\t\t\t\t\"onclick\": todo.destroy,\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\t&vdom.VElement{\n\t\t\t\tTagName: \"input\",\n\t\t\t\tProps: map[string]interface{}{\n\t\t\t\t\t\"className\": \"edit\",\n\t\t\t\t\t\"onkeyup\": todo.handleKeyup,\n\t\t\t\t\t\"onblur\": todo.finishEditing,\n\t\t\t\t\t\"hooks\": hooks,\n\t\t\t\t\t\"value\": todo.Text,\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "d21291f88eae12cb483a0b7c13bbfcb6", "score": "0.40906465", "text": "func (j jHasManyTextPkModel) Properties() map[string]builder.MetaProvider {\n\tret := map[string]builder.MetaProvider{}\n\n\tret[\"ID\"] = j.ID\n\n\tret[\"X\"] = j.X\n\n\tret[\"Relateds\"] = j.Relateds\n\n\treturn ret\n}", "title": "" }, { "docid": "7a9f8f105497f7923a224c5961975181", "score": "0.40889725", "text": "func newTodo(vres *todoviews.TodoView) *Todo {\n\tres := &Todo{}\n\tif vres.ID != nil {\n\t\tres.ID = *vres.ID\n\t}\n\tif vres.Task != nil {\n\t\tres.Task = *vres.Task\n\t}\n\treturn res\n}", "title": "" }, { "docid": "fb02908aa5da88d8b1bc32f7ba3af69b", "score": "0.40804824", "text": "func (d *Dandelion) GlobalProps() *prototype.DynamicProperties {\n\treturn d.TrxPool().GetProps()\n}", "title": "" }, { "docid": "c3096c889abb818451109d5c94a64922", "score": "0.40786365", "text": "func (ach *TodoHandler) PutTodo(w http.ResponseWriter, r *http.Request, ps httprouter.Params) {\n\n\tid, err := strconv.Atoi(ps.ByName(\"id\"))\n\tif err != nil {\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\thttp.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)\n\t\treturn\n\t}\n\n\tcomment, errs := ach.todoServices.Todo(uint(id))\n\n\tif len(errs) > 0 {\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\thttp.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)\n\t\treturn\n\t}\n\n\tl := r.ContentLength\n\n\tbody := make([]byte, l)\n\n\tr.Body.Read(body)\n\n\tjson.Unmarshal(body, &comment)\n\n\tcomment, errs = ach.todoServices.UpdateTodo(comment)\n\n\tif len(errs) > 0 {\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\thttp.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)\n\t\treturn\n\t}\n\n\toutput, err := json.MarshalIndent(comment, \"\", \"\\t\\t\")\n\n\tif err != nil {\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\thttp.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)\n\t\treturn\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.Write(output)\n\treturn\n}", "title": "" }, { "docid": "a8fc32b459f6006bb63428450a9d951b", "score": "0.4077609", "text": "func (*TodoUserId) Descriptor() ([]byte, []int) {\n\treturn file_model_todo_proto_rawDescGZIP(), []int{7}\n}", "title": "" }, { "docid": "a73c215ab9417eb3808851727d8ab758", "score": "0.40669492", "text": "func (obj Thing) TopDataProperty() interface{} { return GetTopDataProperty(obj) }", "title": "" }, { "docid": "dc00582ffb316cc79e46b207fd977913", "score": "0.4059392", "text": "func (t *Todo) String() string {\n\tvar builder strings.Builder\n\tbuilder.WriteString(\"Todo(\")\n\tbuilder.WriteString(fmt.Sprintf(\"id=%v\", t.ID))\n\tbuilder.WriteString(\", uid=\")\n\tbuilder.WriteString(t.UID)\n\tbuilder.WriteString(\", text=\")\n\tbuilder.WriteString(t.Text)\n\tbuilder.WriteString(\", done=\")\n\tbuilder.WriteString(fmt.Sprintf(\"%v\", t.Done))\n\tbuilder.WriteString(\", created_at=\")\n\tbuilder.WriteString(t.CreatedAt.Format(time.ANSIC))\n\tbuilder.WriteString(\", updated_at=\")\n\tbuilder.WriteString(t.UpdatedAt.Format(time.ANSIC))\n\tbuilder.WriteByte(')')\n\treturn builder.String()\n}", "title": "" }, { "docid": "665da3e684834f61b90b13285490e8e6", "score": "0.405918", "text": "func (j jHasManyCompositePkModel) Properties() map[string]builder.MetaProvider {\n\tret := map[string]builder.MetaProvider{}\n\n\tret[\"ID\"] = j.ID\n\n\tret[\"X\"] = j.X\n\n\tret[\"Relateds\"] = j.Relateds\n\n\treturn ret\n}", "title": "" }, { "docid": "ffd373938c61ac44ff8c5dd3115e9bde", "score": "0.4053289", "text": "func (mv *ModVenture) validateProps(r *strlist.StrList) {\n\tfor _, prop := range mv.SplitProps() {\n\t\tswitch prop {\n\t\tcase \"dead\", \"extra\":\n\t\tcase \"description\":\n\t\t\tif mv.Values.Description == \"\" {\n\t\t\t\tr.Add(\"Ventures must have a description.\")\n\t\t\t}\n\t\tcase \"state\":\n\t\t\tif mv.Values.State == \"\" {\n\t\t\t\tr.Add(\"Ventures must have a state.\")\n\t\t\t}\n\t\tcase \"orders\":\n\t\t\tif !cookies.IsUintCSV(mv.Values.Orders) {\n\t\t\t\tr.Add(\"The list of Order IDs within a Venture must be an integer CSV.\")\n\t\t\t}\n\t\tdefault:\n\t\t\tr.Add(fmt.Sprintf(\"Can't update unknown or immutable property '%s'.\", prop))\n\t\t}\n\t}\n}", "title": "" }, { "docid": "34fe6b00002bcf2f1b0698826dbcd259", "score": "0.40515438", "text": "func (o WorkflowTemplateJobPigJobPtrOutput) Properties() pulumi.StringMapOutput {\n\treturn o.ApplyT(func(v *WorkflowTemplateJobPigJob) map[string]string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Properties\n\t}).(pulumi.StringMapOutput)\n}", "title": "" }, { "docid": "2b9cc3e7d66738ac45428290373fe5ec", "score": "0.40461296", "text": "func (o *InlineObject94) HasTodoItem() bool {\n\tif o != nil && o.TodoItem != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "4653f0af6308403e9707f85ba3d2437d", "score": "0.40296188", "text": "func (self Property) Id() Property { return self }", "title": "" }, { "docid": "6a036cdb9cb7b749b0918e7cec3bc394", "score": "0.40280095", "text": "func (o WorkflowTemplateJobPrestoJobPtrOutput) Properties() pulumi.StringMapOutput {\n\treturn o.ApplyT(func(v *WorkflowTemplateJobPrestoJob) map[string]string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Properties\n\t}).(pulumi.StringMapOutput)\n}", "title": "" }, { "docid": "33415acb6dd9950f12d4a1e26afccd81", "score": "0.40227416", "text": "func (*TodoId) Descriptor() ([]byte, []int) {\n\treturn file_model_todo_proto_rawDescGZIP(), []int{5}\n}", "title": "" }, { "docid": "5a382b876d80a8e37195cd944379849d", "score": "0.40119034", "text": "func (m *UserItemRequestBuilder) Todo()(*i61d84fd6521641b94f790414a5b9abccf870ea66012c270c06f3ea7df770aad8.TodoRequestBuilder) {\n return i61d84fd6521641b94f790414a5b9abccf870ea66012c270c06f3ea7df770aad8.NewTodoRequestBuilderInternal(m.pathParameters, m.requestAdapter);\n}", "title": "" }, { "docid": "4e75c251f3efdf97afe0e51b6eeb88ee", "score": "0.40064645", "text": "func (o *InlineObject95) HasTodoItem() bool {\n\tif o != nil && o.TodoItem != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "004d1acc5240dad3c641369b5a29624b", "score": "0.40059954", "text": "func (c *todos) Patch(name string, pt types.PatchType, data []byte, subresources ...string) (result *v1.Todo, err error) {\n\tresult = &v1.Todo{}\n\terr = c.client.Patch(pt).\n\t\tNamespace(c.ns).\n\t\tResource(\"todos\").\n\t\tSubResource(subresources...).\n\t\tName(name).\n\t\tBody(data).\n\t\tDo().\n\t\tInto(result)\n\treturn\n}", "title": "" }, { "docid": "f0a0e32471f510701d3e736a5e7cb129", "score": "0.40057337", "text": "func GetProp(ctx *Context, s State, id string, prop string, def interface{}) (interface{}, bool, error) {\n\tLog(DEBUG, ctx, \"GetProp\", \"id\", id, \"prop\", prop)\n\treturn getProp(ctx, s, id, prop, def)\n}", "title": "" }, { "docid": "0f17e0bd291513e172cbe327aee44264", "score": "0.39911547", "text": "func (ObjectMethod) propertyDefinitionNode() {}", "title": "" }, { "docid": "424102441c816d4238eec16248347347", "score": "0.39860278", "text": "func (p *Property) Comment() string { return p.comment }", "title": "" }, { "docid": "56e629ea444174a8a366d9b3622df803", "score": "0.39837882", "text": "func (f *Features) AppendProps(dst []interface{}, properties *config.Properties) error {\n\t// featuresData is struct created in Features.Init function\n\tfeaturesData := reflect.ValueOf(f.BlueprintEmbed).Elem()\n\n\tfor _, featureKey := range properties.FeatureList {\n\t\tif properties.Features[featureKey] { // Check the feature is enabled\n\t\t\t// Features are matched like \"Feature_name\" - feature structure\n\t\t\tfeatureFieldName := featurePropertyName(featureKey)\n\t\t\tfeatureStruct := featuresData.FieldByName(featureFieldName)\n\t\t\tif !featureStruct.IsValid() {\n\t\t\t\tutils.Die(\"Field returned for property %s isn't valid\\n\", featureFieldName)\n\t\t\t}\n\t\t\t// AppendProperties expects a pointer to a struct.\n\t\t\tfeatureStructPointer := featureStruct.FieldByName(\"BlueprintEmbed\").Interface()\n\n\t\t\t// If featureProps is nil then we've determined that we can skip this,\n\t\t\t// so avoid calling AppendProperties\n\t\t\tif featureStructPointer != nil {\n\t\t\t\terr := AppendMatchingProperties(dst, featureStructPointer)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "fdfd4d9a0e1f9d0d33a8da392503b13f", "score": "0.3978641", "text": "func (o *TodoDetail) Todo(mods ...qm.QueryMod) todoQuery {\n\tqueryMods := []qm.QueryMod{\n\t\tqm.Where(\"`todo_id` = ?\", o.TodoID),\n\t}\n\n\tqueryMods = append(queryMods, mods...)\n\n\tquery := Todos(queryMods...)\n\tqueries.SetFrom(query.Query, \"`todos`\")\n\n\treturn query\n}", "title": "" }, { "docid": "b8392fa611c9401e93c0a6dcf370319f", "score": "0.3974908", "text": "func (obj Thing) BottomDataProperty() interface{} { return GetBottomDataProperty(obj) }", "title": "" }, { "docid": "451e2b689f1430bb8367e37caf2ff1cb", "score": "0.39649105", "text": "func NewPropArg(genResult *GenResult, shrinks int, value interface{}, valueFormated string, origValue interface{}, origValueFormated string) *PropArg {\n\treturn &PropArg{\n\t\tLabel: strings.Join(genResult.Labels, \", \"),\n\t\tArg: value,\n\t\tArgFormatted: valueFormated,\n\t\tOrigArg: origValue,\n\t\tOrigArgFormatted: origValueFormated,\n\t\tShrinks: shrinks,\n\t}\n}", "title": "" }, { "docid": "8801c826b770028910c499d6c79c86f6", "score": "0.39642912", "text": "func (builder *containerDTOBuilder) addPodProperties(pod *api.Pod, index int) []*proto.EntityDTO_EntityProperty {\n\tvar properties []*proto.EntityDTO_EntityProperty\n\tpodProperties := property.AddHostingPodProperties(pod.Namespace, pod.Name, index)\n\tproperties = append(properties, podProperties...)\n\n\treturn properties\n}", "title": "" }, { "docid": "ec4cd56019ed23343861fdb9f704b8eb", "score": "0.39582333", "text": "func AddTodo(c *gin.Context) {\n\n\tvar todo *models.Todo\n\tif err := c.BindJSON(&todo); err != nil {\n\t\tlog.Println(err)\n\t\tc.JSON(http.StatusBadRequest, gin.H{\"error\": err.Error()})\n\t\treturn\n\t}\n\ttodo.Creation = time.Now()\n\tif ok, errors := todo.Validator(); !ok {\n\t\tlog.Println(errors)\n\t\tc.JSON(http.StatusBadRequest, errors)\n\t\treturn\n\t}\n\tif err := engine.App.Datamapper.SaveTodo(todo); err != nil {\n\t\tlog.Println(err)\n\t\tc.JSON(http.StatusInternalServerError, gin.H{\"error\": err.Error()})\n\t\treturn\n\t}\n\tprome.Vars.PostCount.Inc()\n\tc.JSON(http.StatusCreated, todo)\n}", "title": "" }, { "docid": "d56235b15d531d88b8716b961f61fa85", "score": "0.3953093", "text": "func (j jHasOneTextPkModel) Properties() map[string]builder.MetaProvider {\n\tret := map[string]builder.MetaProvider{}\n\n\tret[\"ID\"] = j.ID\n\n\tret[\"X\"] = j.X\n\n\tret[\"RelatedName\"] = j.RelatedName\n\n\tret[\"Related\"] = j.Related\n\n\treturn ret\n}", "title": "" }, { "docid": "10b34c5a0c2bec14556f152a4a6760ca", "score": "0.39472106", "text": "func (manager *Manager) Property() *specs.Property { return manager.property }", "title": "" }, { "docid": "055033df1fcd95b96142e5ab08013fd7", "score": "0.39465803", "text": "func (r *Remember) listTodo() {\n\tif len(r.Todos) == 0 {\n\t\tfmt.Println(\"You have no todos in your list.\")\n\t\treturn\n\t}\n\tsort.Sort(TodoByTimestamp(r.Todos))\n\n\tfmt.Println(\"Your list of Todos:\")\n\t// TODO have max line length based on terminal width and break line\n\t// so long todos don't break printing\n\tw := tabwriter.NewWriter(os.Stdout, 0, 0, 2, ' ', 0)\n\tfmt.Fprintf(w, \"\\n\")\n\tfor i, todo := range r.Todos {\n\t\tfmt.Fprintf(w, \"\\t%d. %s\\n\", i+1, todo)\n\t}\n\tfmt.Fprintf(w, \"\\n\")\n\tw.Flush()\n}", "title": "" }, { "docid": "86375985e4285bf2969bfc9632fb48d6", "score": "0.39429164", "text": "func (msg *SelectMsg) WantProp(propName string) bool {\n\treturn strings.Contains(msg.Props, propName)\n}", "title": "" }, { "docid": "915916c934766754035cc16224d16eb7", "score": "0.39411512", "text": "func buildProps(props map[string]interface{}) (q string, err error) {\n\tfor k, v := range props {\n\t\tt := reflect.ValueOf(v).Kind()\n\t\tif t == reflect.String {\n\t\t\tq += fmt.Sprintf(\".property('%s', '%s')\", k, escapeStringy(v))\n\t\t} else if t == reflect.Bool || t == reflect.Int || t == reflect.Int8 || t == reflect.Int16 || t == reflect.Int32 || t == reflect.Int64 || t == reflect.Uint || t == reflect.Uint8 || t == reflect.Uint16 || t == reflect.Uint32 || t == reflect.Uint64 || t == reflect.Float32 || t == reflect.Float64 {\n\t\t\tq += fmt.Sprintf(\".property('%s', %v)\", k, v)\n\t\t} else if t == reflect.Slice {\n\t\t\ts := reflect.ValueOf(v)\n\t\t\tfor i := 0; i < s.Len(); i++ {\n\t\t\t\tq += fmt.Sprintf(\".property('%s', '%s')\", k, escapeStringy(s.Index(i).Interface()))\n\t\t\t}\n\t\t} else {\n\t\t\treturn \"\", ErrorUnsupportedPropertyType\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "18d6b9eb82202170f455c61dc3328fed", "score": "0.39360577", "text": "func (mod *modContext) getProperties(properties []*schema.Property, lang string, input, nested bool) []property {\n\tif len(properties) == 0 {\n\t\treturn nil\n\t}\n\n\tdocProperties := make([]property, 0, len(properties))\n\tfor _, prop := range properties {\n\t\tif prop == nil {\n\t\t\tcontinue\n\t\t}\n\n\t\tcharacteristics := propertyCharacteristics{\n\t\t\tinput: input,\n\t\t\toptional: !prop.IsRequired,\n\t\t}\n\n\t\tlangDocHelper := getLanguageDocHelper(lang)\n\t\tvar propLangName string\n\t\tswitch lang {\n\t\tcase \"python\":\n\t\t\tpyName := python.PyName(prop.Name)\n\t\t\t// The default casing for a Python property name is snake_case unless\n\t\t\t// it is a property of a nested object, in which case, we should check the property\n\t\t\t// case maps.\n\t\t\tpropLangName = pyName\n\n\t\t\tif nested {\n\t\t\t\tif snakeCase, ok := camelCaseToSnakeCase[prop.Name]; ok {\n\t\t\t\t\tpropLangName = snakeCase\n\t\t\t\t} else if camelCase, ok := snakeCaseToCamelCase[pyName]; ok {\n\t\t\t\t\tpropLangName = camelCase\n\t\t\t\t} else {\n\t\t\t\t\t// If neither of the property case maps have the property\n\t\t\t\t\t// then use the default name of the property.\n\t\t\t\t\tpropLangName = prop.Name\n\t\t\t\t}\n\t\t\t}\n\t\tdefault:\n\t\t\tname, err := langDocHelper.GetPropertyName(prop)\n\t\t\tif err != nil {\n\t\t\t\tpanic(err)\n\t\t\t}\n\n\t\t\tpropLangName = name\n\t\t}\n\n\t\tdocProperties = append(docProperties, property{\n\t\t\tDisplayName: wbr(propLangName),\n\t\t\tName: propLangName,\n\t\t\tComment: prop.Comment,\n\t\t\tDeprecationMessage: prop.DeprecationMessage,\n\t\t\tIsRequired: prop.IsRequired,\n\t\t\tIsInput: input,\n\t\t\tType: mod.typeString(prop.Type, lang, characteristics, true),\n\t\t})\n\t}\n\n\treturn docProperties\n}", "title": "" }, { "docid": "92014c5f7e0b71e1733346e37f6ab4e2", "score": "0.39324743", "text": "func (o WorkflowTemplateJobPrestoJobOutput) Properties() pulumi.StringMapOutput {\n\treturn o.ApplyT(func(v WorkflowTemplateJobPrestoJob) map[string]string { return v.Properties }).(pulumi.StringMapOutput)\n}", "title": "" }, { "docid": "71ded580c1ec38103c27185485a66ced", "score": "0.39299032", "text": "func isRenderedTodo(t todo.Todo) bool {\n\treturn t.Commit != \"\" || t.Command == todo.UpdateRef\n}", "title": "" }, { "docid": "2690b56e4dda6fc82272dc3b3f116d10", "score": "0.39292496", "text": "func (*TodoUpdate) Descriptor() ([]byte, []int) {\n\treturn file_model_todo_proto_rawDescGZIP(), []int{6}\n}", "title": "" }, { "docid": "916c2af88261d57c0269e70d6675e06d", "score": "0.3926338", "text": "func (b *FooJSONBuilder) Properties() []*FooPropertyInfo {\n\treturn []*FooPropertyInfo{\n\t\tb.Tmp,\n\t\tb.Bar,\n\t\tb.Buzz,\n\t\tb.Hoge,\n\t\tb.Fuga,\n\t}\n}", "title": "" }, { "docid": "f326a2c861742e8ba360319d98c2bb0f", "score": "0.39251655", "text": "func (d *Decoder) todo(xref string) *TodoRecord {\n\tif xref == \"\" {\n\t\treturn &TodoRecord{}\n\t}\n\n\tref, found := d.refs[xref].(*TodoRecord)\n\tif !found {\n\t\trec := &TodoRecord{Xref: xref}\n\t\td.refs[rec.Xref] = rec\n\t\treturn rec\n\t}\n\treturn ref\n}", "title": "" }, { "docid": "1fe1da2b3e66c7badb176b84f4f165bc", "score": "0.39207724", "text": "func GetTodo(c *gin.Context) {\n\n\ttodoKey := c.Param(\"id\")\n\tintKey, err := strconv.Atoi(todoKey)\n\tif err != nil {\n\t\tmsg := fmt.Sprintf(\"error parsing todo key: %v\", err)\n\t\tlog.Println(msg)\n\t\tc.JSON(http.StatusBadRequest, gin.H{\"error\": msg})\n\t\treturn\n\t}\n\ttodo, err := engine.App.Datamapper.GetTodo(intKey)\n\tif err != nil {\n\t\tlog.Println(\"engine.App.Datamapper.getTodo() error: \", err)\n\t\tc.JSON(http.StatusNotFound, gin.H{\"error\": err.Error()})\n\t\treturn\n\t}\n\tprome.Vars.GetCount.Inc()\n\tc.JSON(http.StatusOK, todo)\n}", "title": "" }, { "docid": "dc2d82f97703a5097b03de022b157fae", "score": "0.3912741", "text": "func JmeterProps(c *gin.Context) {\n\tfileUpload := new(FileUpload)\n\tfop := ugl.FileUploadOperations{Context: c}\n\tif err := c.ShouldBindWith(fileUpload, binding.Form); err != nil {\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"err\": err.Error(),\n\t\t}).Error(\"Problems binding form\")\n\t\treturn\n\t}\n\tjh := os.Getenv(\"JMETER_HOME\")\n\tfop.SaveFile(fmt.Sprintf(\"%s/bin/jmeter.properties\", jh))\n}", "title": "" }, { "docid": "85c98357a2d1b39ed31335baab5654a9", "score": "0.390701", "text": "func (*ToDo) Descriptor() ([]byte, []int) {\n\treturn file_go_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "11ac94b801faecb3937ac70ea23ceba3", "score": "0.39011094", "text": "func SetProp(ctx *Context, s State, id string, prop string, val interface{}) (string, error) {\n\tLog(INFO, ctx, \"SetProp\", \"id\", id, \"prop\", prop, \"val\", val)\n\tprop = idProperty(prop)\n\tfact := Map{\n\t\t\"id\": id,\n\t\tprop: val,\n\t\tKW_DeleteWith: []interface{}{id},\n\t}\n\treturn s.Add(ctx, \"\", fact)\n}", "title": "" }, { "docid": "39ac956e9a65df0ca4d5c265dc76c38e", "score": "0.3890671", "text": "func (x *fastReflection_TallyParams) Mutable(fd protoreflect.FieldDescriptor) protoreflect.Value {\n\tswitch fd.FullName() {\n\tcase \"cosmos.gov.v1.TallyParams.quorum\":\n\t\tpanic(fmt.Errorf(\"field quorum of message cosmos.gov.v1.TallyParams is not mutable\"))\n\tcase \"cosmos.gov.v1.TallyParams.threshold\":\n\t\tpanic(fmt.Errorf(\"field threshold of message cosmos.gov.v1.TallyParams is not mutable\"))\n\tcase \"cosmos.gov.v1.TallyParams.veto_threshold\":\n\t\tpanic(fmt.Errorf(\"field veto_threshold of message cosmos.gov.v1.TallyParams is not mutable\"))\n\tdefault:\n\t\tif fd.IsExtension() {\n\t\t\tpanic(fmt.Errorf(\"proto3 declared messages do not support extensions: cosmos.gov.v1.TallyParams\"))\n\t\t}\n\t\tpanic(fmt.Errorf(\"message cosmos.gov.v1.TallyParams does not contain field %s\", fd.FullName()))\n\t}\n}", "title": "" }, { "docid": "d699a6a78ce83d521de079eac2c3cc8e", "score": "0.38876286", "text": "func UpdateTodo(c *gin.Context) {\n\n\tvar todo *models.Todo\n\tif err := c.BindJSON(&todo); err != nil {\n\t\tlog.Println(err)\n\t\tc.JSON(http.StatusBadRequest, gin.H{\"error\": err.Error()})\n\t\treturn\n\t}\n\tif ok, errors := todo.Validator(); !ok {\n\t\tlog.Println(errors)\n\t\tc.JSON(http.StatusBadRequest, errors)\n\t\treturn\n\t}\n\tif err := engine.App.Datamapper.UpdateTodo(todo); err != nil {\n\t\tlog.Println(err)\n\t\tc.JSON(http.StatusInternalServerError, gin.H{\"error\": err.Error()})\n\t\treturn\n\t}\n\tprome.Vars.UpdateCount.Inc()\n\tc.JSON(http.StatusOK, todo)\n}", "title": "" }, { "docid": "996f60323aa99d44c2169f29e19c6006", "score": "0.38816968", "text": "func (c *PropertyTypeClient) Use(hooks ...Hook) {\n\tc.hooks.PropertyType = append(c.hooks.PropertyType, hooks...)\n}", "title": "" }, { "docid": "996f60323aa99d44c2169f29e19c6006", "score": "0.38816968", "text": "func (c *PropertyTypeClient) Use(hooks ...Hook) {\n\tc.hooks.PropertyType = append(c.hooks.PropertyType, hooks...)\n}", "title": "" }, { "docid": "ea06461ddd6fd80985f0495464047980", "score": "0.38784447", "text": "func (s TodoServer) ListTodo(ctx context.Context, in *pb.ListTodoRequest) (*pb.ListTodoResponse, error) {\n\tfmt.Println(\"ListTodoRequest received\")\n\tres := &pb.ListTodoResponse{TodoItems: &todos}\n\tfmt.Println(res)\n\treturn res, nil\n}", "title": "" }, { "docid": "43797b7e1fbb980cd1f111b7325250f4", "score": "0.38783076", "text": "func (d *DBusObject) Get(ctx context.Context, propName string, val interface{}) error {\n\treturn d.obj.CallWithContext(ctx, dbusGetPropsMethod, 0, d.iface, propName).Store(val)\n}", "title": "" }, { "docid": "ce60f48839b3df94ca9521fa68e84b17", "score": "0.38775885", "text": "func (o WorkflowTemplateJobPysparkJobPtrOutput) Properties() pulumi.StringMapOutput {\n\treturn o.ApplyT(func(v *WorkflowTemplateJobPysparkJob) map[string]string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Properties\n\t}).(pulumi.StringMapOutput)\n}", "title": "" }, { "docid": "6170c940345b655756797dba8d81b61e", "score": "0.387735", "text": "func (s *state) Todo() bool {\n\treturn len(s.todo) > 0\n}", "title": "" }, { "docid": "397ef6bf8af3d870db2efd765b12d93b", "score": "0.38766682", "text": "func (c *PropertyClient) Use(hooks ...Hook) {\n\tc.hooks.Property = append(c.hooks.Property, hooks...)\n}", "title": "" }, { "docid": "397ef6bf8af3d870db2efd765b12d93b", "score": "0.38766682", "text": "func (c *PropertyClient) Use(hooks ...Hook) {\n\tc.hooks.Property = append(c.hooks.Property, hooks...)\n}", "title": "" }, { "docid": "2a4d5e722ac23cc98e408fe309bee71d", "score": "0.38743153", "text": "func (self *Node) Properties() (ObjectIterator, error) {\n if err := self.should(types.V_OBJECT, \"an object\"); err != nil {\n return ObjectIterator{}, err\n }\n if err := self.skipAllKey(); err != nil {\n return ObjectIterator{}, err\n }\n return ObjectIterator{Iterator{p: self}}, nil\n}", "title": "" }, { "docid": "b1e98f5556332ae973e6a0de7e7101f7", "score": "0.38738766", "text": "func createTodo(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tvar todo Todo\n\t_ = json.NewDecoder(r.Body).Decode(&todo)\n\ttodo.Tasknumber = strconv.Itoa(rand.Intn(1000000)) // Mock ID - @todo 連番で割り振られるようにする\n\ttodos = append(todos, todo)\n\tjson.NewEncoder(w).Encode(todo)\n}", "title": "" }, { "docid": "e0cb2ea481d475037436235885129fee", "score": "0.38701633", "text": "func (o WorkflowTemplateJobPigJobOutput) Properties() pulumi.StringMapOutput {\n\treturn o.ApplyT(func(v WorkflowTemplateJobPigJob) map[string]string { return v.Properties }).(pulumi.StringMapOutput)\n}", "title": "" }, { "docid": "003de88826f8b91b8a6055c2c272c237", "score": "0.38685703", "text": "func (_Multishot *MultishotTransactor) Propose(opts *bind.TransactOpts, txOrigin common.Address, nonce *big.Int, txHash *big.Int) (*types.Transaction, error) {\n\treturn _Multishot.contract.Transact(opts, \"propose\", txOrigin, nonce, txHash)\n}", "title": "" }, { "docid": "36c65677cd6e584274545f428271ad31", "score": "0.38657764", "text": "func (p propertiesParam) Properties() Fields {\n\treturn p.properties\n}", "title": "" }, { "docid": "350e25f354e1d07791ab9d91f82f92d3", "score": "0.38633996", "text": "func NewTodo() *Todo {\n\treturn &Todo{UUID: newUUID(), Completed: false, Archived: false, IsPriority: false}\n}", "title": "" }, { "docid": "a6f927a051558b1b22e9d11a3b0cc2c8", "score": "0.38624084", "text": "func (store *Store) AppendTodo(title, description, assignee string, deadline *time.Time) {\n\ttodo := Todo{\n\t\tID: uuid.New(),\n\t\tPreviousID: store.lastTodoID,\n\t\tTitle: title,\n\t\tDescription: description,\n\t\tAssignee: assignee,\n\t\tDeadline: deadline,\n\t\tDone: false,\n\t}\n\n\tif store.lastTodoID != nil {\n\t\tlastTodo := store.todos[*store.lastTodoID]\n\t\tlastTodo.NextID = &todo.ID\n\t\tstore.todos[*store.lastTodoID] = lastTodo\n\t}\n\n\tif store.firstTodoID == nil {\n\t\tstore.firstTodoID = &todo.ID\n\t}\n\n\tstore.lastTodoID = &todo.ID\n\n\tstore.todos[todo.ID] = todo\n\tstore.publish()\n\tstore.SaveTodos()\n}", "title": "" }, { "docid": "ac9e134712c89033e7f28e34ab2da420", "score": "0.38617435", "text": "func (*TodoCreate) Descriptor() ([]byte, []int) {\n\treturn file_model_todo_proto_rawDescGZIP(), []int{2}\n}", "title": "" }, { "docid": "33e4bc0473a16a99f0ff09dc3fc5e664", "score": "0.38442257", "text": "func (*TodoResponse) Descriptor() ([]byte, []int) {\n\treturn file_rpc_todo_service_proto_rawDescGZIP(), []int{1}\n}", "title": "" }, { "docid": "cde5833aeceb283f51f63f3abeaf6195", "score": "0.38436323", "text": "func (x *fastReflection_Proposal) Mutable(fd protoreflect.FieldDescriptor) protoreflect.Value {\n\tswitch fd.FullName() {\n\tcase \"cosmos.gov.v1.Proposal.messages\":\n\t\tif x.Messages == nil {\n\t\t\tx.Messages = []*anypb.Any{}\n\t\t}\n\t\tvalue := &_Proposal_2_list{list: &x.Messages}\n\t\treturn protoreflect.ValueOfList(value)\n\tcase \"cosmos.gov.v1.Proposal.final_tally_result\":\n\t\tif x.FinalTallyResult == nil {\n\t\t\tx.FinalTallyResult = new(TallyResult)\n\t\t}\n\t\treturn protoreflect.ValueOfMessage(x.FinalTallyResult.ProtoReflect())\n\tcase \"cosmos.gov.v1.Proposal.submit_time\":\n\t\tif x.SubmitTime == nil {\n\t\t\tx.SubmitTime = new(timestamppb.Timestamp)\n\t\t}\n\t\treturn protoreflect.ValueOfMessage(x.SubmitTime.ProtoReflect())\n\tcase \"cosmos.gov.v1.Proposal.deposit_end_time\":\n\t\tif x.DepositEndTime == nil {\n\t\t\tx.DepositEndTime = new(timestamppb.Timestamp)\n\t\t}\n\t\treturn protoreflect.ValueOfMessage(x.DepositEndTime.ProtoReflect())\n\tcase \"cosmos.gov.v1.Proposal.total_deposit\":\n\t\tif x.TotalDeposit == nil {\n\t\t\tx.TotalDeposit = []*v1beta1.Coin{}\n\t\t}\n\t\tvalue := &_Proposal_7_list{list: &x.TotalDeposit}\n\t\treturn protoreflect.ValueOfList(value)\n\tcase \"cosmos.gov.v1.Proposal.voting_start_time\":\n\t\tif x.VotingStartTime == nil {\n\t\t\tx.VotingStartTime = new(timestamppb.Timestamp)\n\t\t}\n\t\treturn protoreflect.ValueOfMessage(x.VotingStartTime.ProtoReflect())\n\tcase \"cosmos.gov.v1.Proposal.voting_end_time\":\n\t\tif x.VotingEndTime == nil {\n\t\t\tx.VotingEndTime = new(timestamppb.Timestamp)\n\t\t}\n\t\treturn protoreflect.ValueOfMessage(x.VotingEndTime.ProtoReflect())\n\tcase \"cosmos.gov.v1.Proposal.id\":\n\t\tpanic(fmt.Errorf(\"field id of message cosmos.gov.v1.Proposal is not mutable\"))\n\tcase \"cosmos.gov.v1.Proposal.status\":\n\t\tpanic(fmt.Errorf(\"field status of message cosmos.gov.v1.Proposal is not mutable\"))\n\tcase \"cosmos.gov.v1.Proposal.metadata\":\n\t\tpanic(fmt.Errorf(\"field metadata of message cosmos.gov.v1.Proposal is not mutable\"))\n\tcase \"cosmos.gov.v1.Proposal.title\":\n\t\tpanic(fmt.Errorf(\"field title of message cosmos.gov.v1.Proposal is not mutable\"))\n\tcase \"cosmos.gov.v1.Proposal.summary\":\n\t\tpanic(fmt.Errorf(\"field summary of message cosmos.gov.v1.Proposal is not mutable\"))\n\tcase \"cosmos.gov.v1.Proposal.proposer\":\n\t\tpanic(fmt.Errorf(\"field proposer of message cosmos.gov.v1.Proposal is not mutable\"))\n\tcase \"cosmos.gov.v1.Proposal.expedited\":\n\t\tpanic(fmt.Errorf(\"field expedited of message cosmos.gov.v1.Proposal is not mutable\"))\n\tcase \"cosmos.gov.v1.Proposal.failed_reason\":\n\t\tpanic(fmt.Errorf(\"field failed_reason of message cosmos.gov.v1.Proposal is not mutable\"))\n\tdefault:\n\t\tif fd.IsExtension() {\n\t\t\tpanic(fmt.Errorf(\"proto3 declared messages do not support extensions: cosmos.gov.v1.Proposal\"))\n\t\t}\n\t\tpanic(fmt.Errorf(\"message cosmos.gov.v1.Proposal does not contain field %s\", fd.FullName()))\n\t}\n}", "title": "" }, { "docid": "7233850dff4c85d0e6de5a5e9d0acf31", "score": "0.38423017", "text": "func (o *InlineResponse20077) HasTodoItems() bool {\n\tif o != nil && o.TodoItems != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "7c36951ebd4adf2b49e857809818a3db", "score": "0.38356", "text": "func TodoShow(w http.ResponseWriter, r *http.Request, ps httprouter.Params) {\n\tfmt.Fprintf(w, \"Todo show: %s\", ps.ByName(\"todoId\"))\n}", "title": "" }, { "docid": "404f496ccd5904134d4342a9e4932d25", "score": "0.38337138", "text": "func (in *Types) GetProperties(props map[string]resource.Property) string {\n\tlines := []string{}\n\n\tkeys := make([]string, 0, len(props))\n\tfor k := range props {\n\t\tkeys = append(keys, k)\n\t}\n\tsort.Strings(keys)\n\n\tfor _, name := range keys {\n\t\tproperty := props[name]\n\t\toriginalname := name\n\t\tif resource.IdOrArn(originalname) && property.GetType() == \"String\" {\n\t\t\tname = resource.TrimIdOrArn(name) + \"Ref\"\n\t\t}\n\n\t\tif resource.IdsOrArns(originalname) && property.GetItemType() == \"String\" {\n\t\t\tname = resource.TrimIdsOrArns(name) + \"Refs\"\n\t\t}\n\n\t\t// TODO(christopherhein) implement tags\n\t\tif name == \"Tags\" {\n\t\t\t// fmt.Printf(\"tags resource found %+v\\n\", property)\n\t\t\tcontinue\n\t\t}\n\t\tlines = appendstrf(lines, `// %v %v`, name, property.GetDocumentation())\n\t\trequired := \"\"\n\t\tif !property.GetRequired() ||\n\t\t\toriginalname != in.Resource.Kind+\"Name\" ||\n\t\t\t!property.IsParameter() {\n\t\t\trequired = \",omitempty\"\n\t\t}\n\t\tparam := \"\"\n\t\tif property.IsParameter() {\n\t\t\tparam = \",Parameter\"\n\t\t}\n\n\t\tgoType := property.GetGoType(in.Resource.Kind)\n\t\tif resource.IdOrArn(originalname) && property.GetType() == \"String\" {\n\t\t\tgoType = \"metav1alpha1.ObjectReference\"\n\t\t}\n\n\t\tif resource.IdsOrArns(originalname) && property.GetItemType() == \"String\" {\n\t\t\tgoType = \"[]metav1alpha1.ObjectReference\"\n\t\t}\n\n\t\tlines = appendstrf(lines, `%v %v `+\"`\"+`json:\"%v%v\" cloudformation:\"%v%v\"`+\"`\", name, goType, lowerfirst(name), required, originalname, param)\n\t\tlines = appendblank(lines)\n\t}\n\treturn strings.Join(lines, \"\\n\")\n}", "title": "" }, { "docid": "51b3b7ce43b8769cd974339754d93f5e", "score": "0.38298142", "text": "func (j jHasOneCompositePkModel) Properties() map[string]builder.MetaProvider {\n\tret := map[string]builder.MetaProvider{}\n\n\tret[\"ID\"] = j.ID\n\n\tret[\"X\"] = j.X\n\n\tret[\"RelatedP\"] = j.RelatedP\n\n\tret[\"RelatedK\"] = j.RelatedK\n\n\tret[\"Related\"] = j.Related\n\n\treturn ret\n}", "title": "" }, { "docid": "ecaa72a8ed8bf577dc9977d81e5ce4f2", "score": "0.38286394", "text": "func bmodCpProps(ctx *bmdModifier, clone *bucketMD) error {\n\tvar (\n\t\tbckFrom, bckTo = ctx.bcks[0], ctx.bcks[1]\n\t\tbprops, present = clone.Get(bckFrom) // TODO: Bucket could be removed during begin.\n\t)\n\tdebug.Assert(present)\n\n\t// Skip destination bucket creation if it's already present.\n\tif _, present = clone.Get(bckTo); present {\n\t\tctx.terminate = true\n\t\treturn nil\n\t}\n\n\tdebug.Assert(bckTo.IsAIS())\n\tbckFrom.Props = bprops.Clone()\n\t// replicate bucket props - but only if the source is ais as well\n\tif bckFrom.IsAIS() || bckFrom.IsRemoteAIS() {\n\t\tbckTo.Props = bprops.Clone()\n\t} else {\n\t\tbckTo.Props = defaultBckProps(bckPropsArgs{bck: bckTo})\n\t}\n\tadded := clone.add(bckTo, bckTo.Props)\n\tdebug.Assert(added)\n\treturn nil\n}", "title": "" }, { "docid": "549cf29b05718493aa42449a2c7206c9", "score": "0.3822892", "text": "func (j jSampleModel) Properties() map[string]builder.MetaProvider {\n\tret := map[string]builder.MetaProvider{}\n\n\tret[\"ID\"] = j.ID\n\n\tret[\"Name\"] = j.Name\n\n\tret[\"Description\"] = j.Description\n\n\tret[\"UpdateDate\"] = j.UpdateDate\n\n\tret[\"RemovalDate\"] = j.RemovalDate\n\n\treturn ret\n}", "title": "" }, { "docid": "888c63d947f41d76816b78f31acdbcf5", "score": "0.38222182", "text": "func (t Todo) Create(item TodoItem, baseURL string) *TodoItem {\n\titem.ID = t.nextID()\n\titem.URL = \"http://\" + baseURL + \"/\" + item.ID\n\tt[item.ID] = &item\n\treturn &item\n}", "title": "" } ]
7401831a46c3d9686c77b90fce7896d2
Login completes the OAuth authentication process, which is required to make calls to the Fortnite API
[ { "docid": "1dbc182328b30170fe591a5e7a880b12", "score": "0.71738774", "text": "func (c *Client) Login() {\n\ttokenConfig := OauthTokenRequest{\n\t\tGrantType: \"password\",\n\t\tUsername: c.Email,\n\t\tPassword: c.Password,\n\t\tIncludePerms: true,\n\t}\n\n\tvar accessTokenResponse OauthTokenRequestResponse\n\n\t_, _, err := c.Request.Post(oauthTokenEndpoint).\n\t\tSendStruct(tokenConfig).\n\t\tType(\"form\").\n\t\tSet(\"Authorization\", fmt.Sprintf(\"basic %v\", c.FortniteClientToken)).\n\t\tEndStruct(&accessTokenResponse)\n\n\tif err != nil {\n\t\tlog.Fatal(\"Error with login request 1:\", err)\n\t}\n\n\tvar codeResponse OauthRequestCodeResponse\n\n\t_, _, err = c.Request.Get(oauthExchangeEndpoint).\n\t\tSet(\"Authorization\", fmt.Sprintf(\"bearer %v\", accessTokenResponse.AccessToken)).\n\t\tEndStruct(&codeResponse)\n\n\tif err != nil {\n\t\tlog.Fatal(\"Error with login request 2:\", err)\n\t}\n\n\texchangeRequest := OauthTokenExchangeRequest{\n\t\tGrantType: \"exchange_code\",\n\t\tExchangeCode: codeResponse.ExchangeCode,\n\t\tIncludePerms: true,\n\t\tTokenType: \"egl\",\n\t}\n\n\tvar tokenResponse OauthTokenResponse\n\n\t_, _, err = c.Request.Post(oauthTokenEndpoint).\n\t\tSendStruct(exchangeRequest).\n\t\tType(\"form\").\n\t\tSet(\"Authorization\", fmt.Sprintf(\"basic %v\", c.FortniteClientToken)).\n\t\tEndStruct(&tokenResponse)\n\n\tif err != nil {\n\t\tlog.Fatal(\"Error with login request 3:\", err)\n\t}\n\n\tc.Mutex.Lock()\n\tc.AccessTokenExpiresAt, _ = time.Parse(time.RFC3339Nano, tokenResponse.ExpiresAt)\n\tc.AccessToken = tokenResponse.AccessToken\n\tc.RefreshToken = tokenResponse.RefreshToken\n\tc.Mutex.Unlock()\n}", "title": "" } ]
[ { "docid": "eb57ca11718c4018c2aeb8441a631da8", "score": "0.6783839", "text": "func (c *Console) Login(w http.ResponseWriter, r *http.Request) {\n\tuuid := uuid.New()\n\tsession.PutString(r, ghOAuthStateKey, uuid.String())\n\n\turl := c.ghoauthConf.AuthCodeURL(uuid.String(), oauth2.AccessTypeOnline)\n\thttp.Redirect(w, r, url, http.StatusTemporaryRedirect)\n}", "title": "" }, { "docid": "3bd2f2a0b34aa1869f9ea60c9bc48b91", "score": "0.67176795", "text": "func (h *HTTPAuthHandler) Login(w http.ResponseWriter, r *http.Request) {\n\tvar creds models.Credentials\n\terr := json.NewDecoder(r.Body).Decode(&creds)\n\tif err != nil || creds.Password == \"\" {\n\t\tfmt.Println(err)\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\treturn\n\t}\n\n\ttoken, err := h.as.RequestAccessToken(creds.Password)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\treturn\n\t}\n\n\thttp.SetCookie(w, &http.Cookie{\n\t\tName: token.Name,\n\t\tValue: token.Value,\n\t\tExpires: token.Expires,\n\t})\n}", "title": "" }, { "docid": "851e84a02bbccda8d6187c1a37c6f312", "score": "0.6705156", "text": "func (t *GoConnect) loginComplete(w http.ResponseWriter, r *http.Request) {\n\t// Login is complete - check that code matches the state parameter sent earlier. States\n\t// are kept for N hours? Mismatch => error page saying \"try again\"\n\t// obtain tokens, store token and set cookie\n\tcode := r.URL.Query().Get(\"code\")\n\tstate := r.URL.Query().Get(\"state\")\n\n\t// Verify that state is sent previously\n\tif err := t.storage.CheckLoginNonce(state); err != nil {\n\t\thttp.Error(w, \"Unknown state token. Your login session might have timed out.\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\terrcode := r.URL.Query().Get(\"error\")\n\tif errcode != \"\" {\n\t\t// There's an error message. Just redirect back to the logout page.\n\t\tlog.Printf(\"Got error from OAuth server: %s - %s\", errcode, r.URL.Query().Get(\"error_description\"))\n\t\thttp.Redirect(w, r, t.Config.LogoutCompleteRedirectURI, http.StatusSeeOther)\n\t\treturn\n\t}\n\n\t// Pull the JWT from the OAuth server, then verify title\n\ttokens, err := t.getTokens(code)\n\tif err != nil {\n\t\tlog.Printf(\"Could not get tokens: %v\", err)\n\t\thttp.Error(w, \"Could not pull JWT token from server\", http.StatusServiceUnavailable)\n\t\treturn\n\t}\n\n\tjwks, err := t.jwkCache.GetJWK()\n\tif err != nil {\n\t\tlog.Printf(\"Got error retrieving JWKs: %v\", err)\n\t\thttp.Error(w, \"Error validating JWT\", http.StatusServiceUnavailable)\n\t\treturn\n\t}\n\tjwt, err := newJWT(tokens.JWT, jwks, t.Config)\n\tif err != nil {\n\t\thttp.Error(w, \"Got error converting token string into JWT\", http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\t// Invariant: JWT is valid and we have tokens for the user.\n\t// Create a new session.\n\tsession := newSession(jwt, tokens.AccessToken, tokens.RefreshToken, tokens.AccessTokenExpires)\n\tif err := t.storage.PutSession(session); err != nil {\n\t\thttp.Error(w, \"Got error storing session\", http.StatusServiceUnavailable)\n\t\treturn\n\t}\n\tcookie := &http.Cookie{\n\t\tName: connectIDCookieName,\n\t\tValue: session.id,\n\t\tExpires: time.Now().Add(48 * time.Hour),\n\t\tHttpOnly: true,\n\t\tPath: \"/\",\n\t}\n\thttp.SetCookie(w, cookie)\n\n\thttp.Redirect(w, r, t.Config.LoginCompleteRedirectURI, http.StatusSeeOther)\n}", "title": "" }, { "docid": "88b027cf91ce47aa46836f06a4fad645", "score": "0.670015", "text": "func Login(w http.ResponseWriter, r *http.Request) {\n\tr.ParseForm() // Parse form data.\n\tuser, err := server.GetUserByEmail(r.FormValue(\"email\"))\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tif user.Password != r.FormValue(\"password\") {\n\t\thttp.Error(w, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)\n\t\treturn\n\t}\n\n\ttoken, _ := CreateAccessToken(map[string]interface{}{\n\t\t\"userID\": user.ID,\n\t\t\"userEmail\": user.Email,\n\t})\n\trefreshToken := CreateRefreshToken()\n\tif _, err = server.StoreRefreshToken(refreshToken, user.ID); err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tresponse := struct {\n\t\tAccessToken string `json:\"access_token\"`\n\t\tRefreshToken string `json:\"refresh_token\"`\n\t}{\n\t\tAccessToken: token,\n\t\tRefreshToken: refreshToken,\n\t}\n\tpayload, err := json.Marshal(response)\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.Write(payload)\n}", "title": "" }, { "docid": "8cc1d3e8fd5c402ce69ac9fa7d8e1409", "score": "0.6687105", "text": "func serveLogin(w http.ResponseWriter, r *http.Request) {\n\tcallback := \"http://\" + r.Host + \"/callback\"\n\ttempCred, err := oauthClient.RequestTemporaryCredentials(http.DefaultClient, callback, nil)\n\tif err != nil {\n\t\thttp.Error(w, \"Error getting temp cred, \"+err.Error(), 500)\n\t\treturn\n\t}\n\tputCredentials(tempCred, \"\")\n\thttp.Redirect(w, r, oauthClient.AuthorizationURL(tempCred, nil), 302)\n}", "title": "" }, { "docid": "c8258152006dff40d72fc4b166dbf616", "score": "0.66688704", "text": "func Login(w http.ResponseWriter, r *http.Request) {\n\tbd, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\tlog.Println(fmt.Errorf(\"couldn't get json body\"))\n\t\treturn\n\t}\n\n\tvar login *models.Login\n\n\terr = json.Unmarshal(bd, &login)\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tlog.Println(fmt.Errorf(\"couldn't parse json body\"))\n\t\treturn\n\t}\n\n\tuserAuth := &models.UserAuth{\n\t\tEmail: login.Email,\n\t\tUsername: login.Username,\n\t}\n\n\terr = userAuth.Get()\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\tlog.Println(fmt.Errorf(\"failed to get user information %s\", err))\n\t\treturn\n\t}\n\n\tif auth.CheckPassword(login.Password, userAuth.Hash) {\n\t\thttp.SetCookie(w, auth.CreateSession(userAuth.ID))\n\t\tw.WriteHeader(http.StatusAccepted)\n\t\treturn\n\t} else {\n\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\tlog.Println(fmt.Errorf(\"password did not match stored hash\"))\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "5c1c3291e8f454ef6bf5d5607a03a49b", "score": "0.66387737", "text": "func (c *CloudController) Login() error {\n\n\tparameters := url.Values{}\n\tparameters.Set(\"username\", c.Config.Username)\n\tparameters.Set(\"password\", c.Config.Password)\n\tparameters.Set(\"scope\", \"\")\n\tparameters.Set(\"grant_type\", \"password\")\n\n\tinfo, err := c.GetV2Info()\n\tif err != nil {\n\t\treturn nil\n\t}\n\n\tauthURLRelative := &url.URL{Path: \"/oauth/token\"}\n\tauthURL, err := url.Parse(info.AuthorizationEndpoint)\n\tif err != nil {\n\t\treturn nil\n\t}\n\tauthTokenURL := authURL.ResolveReference(authURLRelative)\n\treq, err := http.NewRequest(\"POST\", authTokenURL.String(), strings.NewReader(parameters.Encode()))\n\tif err != nil {\n\t\treturn nil\n\t}\n\treq.Header.Set(\"Accept\", \"application/json\")\n\treq.Header.Set(\"Content-Type\", \"application/x-www-form-urlencoded\")\n\treq.Header.Set(\"Host\", info.AuthorizationEndpoint)\n\treq.SetBasicAuth(\"cf\", \"\")\n\n\tresp, err := c.httpClient.Do(req)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer resp.Body.Close()\n\n\tvar ati AccessTokenInfo\n\terr = json.NewDecoder(resp.Body).Decode(&ati)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tc.AccessToken = &ati\n\treturn nil\n}", "title": "" }, { "docid": "380660b364bf2a2b7a23ad532df8b699", "score": "0.6614019", "text": "func (c *LoginController) Login(ctx *app.LoginLoginContext) error {\n\t// Generate a new unique state value\n\tstate := uuid.NewV4().String()\n\n\t// Get the URL of the callback endpoint, the client will be redirected here after being redirected to the authentication provider\n\tcallbackURL := rest.AbsoluteURL(ctx.RequestData, client.CallbackLoginPath(), nil)\n\n\t// Remove this: once we remove support for offline token completely\n\tvar scopes []string\n\tif ctx.Scope != nil {\n\t\tscopes = append(scopes, *ctx.Scope)\n\t}\n\n\tredirectURL, err := c.app.AuthenticationProviderService().GenerateAuthCodeURL(ctx, ctx.Redirect, ctx.APIClient,\n\t\t&state, scopes, nil, ctx.RequestData.Header.Get(\"Referer\"), callbackURL)\n\tif err != nil {\n\t\treturn jsonapi.JSONErrorResponse(ctx, err)\n\t}\n\tctx.ResponseData.Header().Set(\"Location\", *redirectURL)\n\treturn ctx.TemporaryRedirect()\n}", "title": "" }, { "docid": "f8ffee1cd0acdd8a5be46f0db2d56c0b", "score": "0.6589624", "text": "func (a *Api) Login(res http.ResponseWriter, req *http.Request) {\n\tif usr, pw := unpackAuth(req.Header.Get(\"Authorization\")); usr != nil {\n\n\t\tif results, err := a.Store.FindUsers(usr); err != nil {\n\t\t\tlog.Printf(\"Login %s [%s]\", STATUS_ERR_FINDING_USR, err.Error())\n\t\t\tsendModelAsResWithStatus(res, status.NewStatus(http.StatusInternalServerError, STATUS_ERR_FINDING_USR), http.StatusInternalServerError)\n\t\t\treturn\n\t\t} else {\n\t\t\tif len(results) > 0 {\n\t\t\t\tfor i := range results {\n\t\t\t\t\tif results[i] != nil && results[i].PwsMatch(pw, a.Config.Salt) {\n\n\t\t\t\t\t\tif results[i].IsVerified(a.Config.VerificationSecret) {\n\n\t\t\t\t\t\t\tif sessionToken, err := a.createAndSaveToken(tokenDuration(req), results[i].Id, false); err != nil {\n\t\t\t\t\t\t\t\tlog.Printf(\"Login %s [%s]\", STATUS_ERR_UPDATING_TOKEN, err.Error())\n\t\t\t\t\t\t\t\tsendModelAsResWithStatus(res, status.NewStatus(http.StatusInternalServerError, STATUS_ERR_UPDATING_TOKEN), http.StatusInternalServerError)\n\t\t\t\t\t\t\t\treturn\n\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\ta.logMetric(\"userlogin\", sessionToken.Id, nil)\n\t\t\t\t\t\t\t\tres.Header().Set(TP_SESSION_TOKEN, sessionToken.Id)\n\t\t\t\t\t\t\t\tsendModelAsRes(res, results[i])\n\t\t\t\t\t\t\t\treturn\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t\tlog.Printf(\"Login %s for [%s]\", STATUS_NOT_VERIFIED, usr.Id)\n\t\t\t\t\t\tsendModelAsResWithStatus(res, status.NewStatus(http.StatusForbidden, STATUS_NOT_VERIFIED), http.StatusForbidden)\n\t\t\t\t\t\treturn\n\t\t\t\t\t}\n\t\t\t\t\tlog.Printf(\"Login %s [%s] from the [%d] users we found\", STATUS_NO_MATCH, usr.Name, len(results))\n\t\t\t\t\tsendModelAsResWithStatus(res, status.NewStatus(http.StatusUnauthorized, STATUS_NO_MATCH), http.StatusUnauthorized)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t}\n\t\t\tlog.Printf(\"Login %s for [%s]\", STATUS_NO_MATCH, usr.Name)\n\t\t\tsendModelAsResWithStatus(res, status.NewStatus(http.StatusUnauthorized, STATUS_NO_MATCH), http.StatusUnauthorized)\n\t\t\treturn\n\t\t}\n\t}\n\tlog.Printf(\"Login %s \", STATUS_MISSING_ID_PW)\n\tsendModelAsResWithStatus(res, status.NewStatus(http.StatusBadRequest, STATUS_MISSING_ID_PW), http.StatusBadRequest)\n\treturn\n}", "title": "" }, { "docid": "da9c2f710838da9d34659fcbffced949", "score": "0.6585081", "text": "func (api RESTApiClient) Login() {\n\tresp := api.performRequest(api.createPostRequest(\"/api/login\", nil))\n\tdefer resp.Body.Close()\n\n\tif resp.StatusCode != http.StatusOK {\n\t\tfmt.Println(\"Invalid login credentials\")\n\t\tos.Exit(1)\n\t}\n}", "title": "" }, { "docid": "983be306a85c3d2b5aca24869c21b7ed", "score": "0.6566", "text": "func (*Devops) Login(ctx context.Context, secret *pb.Secret) (*pb.Response, error) {\n\n\treturn &pb.Response{Status: pb.Response_FAILURE, Msg: []byte(\"No implement\")}, nil\n}", "title": "" }, { "docid": "11b38a13f262da2999b5f52368b23069", "score": "0.65602225", "text": "func Login(c *gin.Context) {\n\tvar request users.LoginRequest\n\tif err := c.ShouldBindJSON(&request); err != nil {\n\t\tparseErr := utils.NewBadRequestError(\"Unable to parse JSON, invalid request\")\n\t\tc.JSON(parseErr.Code, parseErr)\n\t\treturn\n\t}\n\tuser, err := services.UserService.LoginUser(request)\n\tif err != nil {\n\t\tc.JSON(err.Code, err)\n\t\treturn\n\t}\n\t//on login create a Oauth token\n\tvar tokenReq = oauth.TokenRequest{\n\t\tGrantType: \"client_credentials\",\n\t\tScope: \"USERS_API,BOOKS_API,OPENIDCONNECT\",\n\t\tUserID: user.ID,\n\t\tClientID: \"2247be5f-56c6-4ec0-bebc-b99b720ede92\",\n\t\tClientSecret: \"9fc37600-4ec0-4695-9c1f-7f91f4c892fc\",\n\t}\n\taccessToken, tokenErr := oauth.CreateToken(tokenReq)\n\tif tokenErr != nil {\n\t\tc.JSON(tokenErr.Code, tokenErr)\n\t\treturn\n\t}\n\tc.SetCookie(\"sessionToken\", accessToken.JWT, int(accessToken.Expires), \"/\", \"localhost:8079\", false, true)\n\tc.JSON(http.StatusOK, user.Marshall(c.GetHeader(\"X-Public\") == \"true\"))\n}", "title": "" }, { "docid": "8c8cf7c601cbc66043363e1f39053e1f", "score": "0.65489256", "text": "func Login(w http.ResponseWriter, r *http.Request) {\n\tif r.Method != http.MethodGet {\n\t\thttp.Error(w, fmt.Sprintf(\"The %s method is not allowed\", r.Method), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tclientID := r.URL.Query().Get(\"clientId\")\n\tif len(clientID) == 0 {\n\t\thttp.Error(w, \"The query parameter clientId is required!\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tconfigValue, err := config.ReadConfigFromEnv(clientID)\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tsecret := os.Getenv(\"SECRET\")\n\tstate := state.EncryptState(clientID, secret)\n\n\turl := github.AuthCodeURL(configValue.ClientID, configValue.ClientSecretID, state)\n\n\tlog.Printf(\"Redirect to %s\", url)\n\thttp.Redirect(w, r, url, http.StatusTemporaryRedirect)\n}", "title": "" }, { "docid": "69af618079c151ad30256cb3623b20bc", "score": "0.6546919", "text": "func (a AuthToken) Login(res http.ResponseWriter, r *http.Request) (string, []plugins.MFAConfig, error) {\n\treturn \"\", nil, plugins.ErrNoValidUserFound\n}", "title": "" }, { "docid": "aac207c05b95d0cf793ed7c6528f9556", "score": "0.6546851", "text": "func Login(w http.ResponseWriter, r *http.Request) {\n\tr.ParseForm()\n\n\tuser, err := json.Marshal(map[string]string {\n\t\t\"email\": r.FormValue(\"email\"),\n\t\t\"password\": r.FormValue(\"password\"),\n\t})\n\n\tif err != nil {\n\t\tresponses.JSON(w, http.StatusInternalServerError, responses.APIError{Error: err.Error()})\n\t\treturn\n\t}\n\n\tendpoint_URL := fmt.Sprintf(\"%s/login\", config.APIURL)\n\tresponse, err := http.Post(endpoint_URL, \"application/json\", bytes.NewBuffer(user))\n\tif err != nil {\n\t\tresponses.JSON(w, http.StatusInternalServerError, responses.APIError{Error: err.Error()})\n\t\treturn\n\t}\n\tdefer response.Body.Close()\n\n\tif response.StatusCode >= 400 {\n\t\tresponses.HandleErrorStatusCode(w, response)\n\t\treturn\n\t}\n\n\tvar authData models.AuthData\n\tif err = json.NewDecoder(response.Body).Decode(&authData); err != nil {\n\t\tresponses.JSON(w, http.StatusUnprocessableEntity, responses.APIError{Error: err.Error()})\n\t\treturn\n\t}\n\n\t// cookie creation\n\tif err = cookies.Set(w, authData.ID, authData.Token); err != nil {\n\t\tresponses.JSON(w, http.StatusUnprocessableEntity, responses.APIError{Error: err.Error()})\n\t\treturn\n\t}\n\n\tresponses.JSON(w, http.StatusOK, nil)\n\n}", "title": "" }, { "docid": "4c61d87a081a25859f01fb39460cf652", "score": "0.6540132", "text": "func (c *Console) LoginCallback(w http.ResponseWriter, r *http.Request) {\n\tlogger := c.logger.WithField(\"requestURI\", r.RequestURI)\n\t// Get and *remove* state stored in session.\n\tsessionState, err := session.PopString(r, ghOAuthStateKey)\n\tif err != nil {\n\t\tlogger.WithError(err).Errorf(\"could not get session's %v\", ghOAuthStateKey)\n\t\thttp.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tif r.FormValue(\"state\") != sessionState {\n\t\tlogger.WithError(err).Errorf(\"received state %q does not match session state %q\", r.FormValue(\"state\"), sessionState)\n\t\thttp.Error(w, http.StatusText(http.StatusBadRequest), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\ttoken, err := c.ghoauthConf.Exchange(r.Context(), r.FormValue(\"code\"))\n\tif err != nil {\n\t\tlogger.WithError(err).Errorf(\"could not exchange oauth code %q for token\", r.FormValue(\"code\"))\n\t\thttp.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\t// Create oauth client\n\tclient := c.githubClient(r.Context(), token)\n\n\t// Get GitHub ID\n\tghUser, _, err := client.Users.Get(r.Context(), \"\")\n\tif err != nil {\n\t\tlogger.WithError(err).Error(\"could not get github authenticated user details\")\n\t\thttp.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tif ghUser.GetID() == 0 {\n\t\tlogger.WithError(err).Errorf(\"github authenticated user's ID is %d\", ghUser.GetID())\n\t\thttp.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\t// Create or Update user's account with GitHub ID\n\tuserID, err := c.db.GitHubLogin(r.Context(), ghUser.GetEmail(), ghUser.GetID(), ghUser.GetLogin(), token)\n\tif err != nil {\n\t\tlogger.WithError(err).Error(\"could not user's ID\")\n\t\thttp.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tlogger.WithFields(logrus.Fields{\n\t\t\"userID\": userID,\n\t\t\"githubID\": ghUser.GetID(),\n\t\t\"githubLogin\": ghUser.GetLogin(),\n\t}).Info(\"User logged in\")\n\n\t// Set our UserID in session\n\tsession.PutInt(r, \"userID\", userID)\n\n\thttp.Redirect(w, r, \"/console\", http.StatusSeeOther)\n}", "title": "" }, { "docid": "1639fba30d2e80457b60f1e4b5f9cc3a", "score": "0.65293497", "text": "func OauthLogin(context *gin.Context) {\n\tservice := context.DefaultQuery(\"service\", \"qq\")\n\toauthService, err := oauth2.OauthService(service)\n\n\tif err != nil {\n\t\tresponse.FailWithMessage(err.Error(), context)\n\t\treturn\n\t}\n\n\tredirectUrl := oauthService.GenRedirectURL()\n\tcontext.Redirect(http.StatusMovedPermanently, redirectUrl)\n}", "title": "" }, { "docid": "e69bdfa88881725fc11b23f7f74f5f67", "score": "0.65135354", "text": "func (cl *HTTPClient) Login() {\n\tl := &Lgn{Name: cl.Name(), Password: \"a\"}\n\tenc, err := json.Marshal(l)\n\tif err != nil {\n\t\tcl.test.Errorf(\"HTTP Login() Error encoding: %v\", err)\n\t}\n\treq, err := http.NewRequest(\"POST\", fmt.Sprintf(\"http://%v/login\", net.JoinHostPort(cl.ip, cl.port)), bytes.NewReader(enc))\n\tresp, err := cl.client.Do(req)\n\tif resp == nil || resp.Header.Get(\"success\") == \"false\" {\n\t\tpanic(\"Error with login.\")\n\t}\n\tdec := json.NewDecoder(resp.Body)\n\terr = dec.Decode(&cl.token)\n\tif err != nil {\n\t\tcl.test.Errorf(\"HTTP Login() Error decoding token: %v\", err)\n\t}\n\tresp.Body.Close()\n}", "title": "" }, { "docid": "f2b59a0baf094894ade9c3a0a2b1e02c", "score": "0.6482742", "text": "func Login(w http.ResponseWriter, r *http.Request, ess *setup.Essentials, secrets *setup.Secrets) {\n\n\t// make sure the request is a post request\n\tif r.Method != \"POST\" {\n\t\tess.Log.Error(\"method not POST request\")\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tw.Write([]byte(`{\"msg\":\"failure\"}`))\n\t\treturn\n\t}\n\n\t// read request body\n\tbody, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\tess.Log.Error(\"cannot read request body \", err)\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tw.Write([]byte(`{\"msg\":\"failure\"}`))\n\t\treturn\n\t}\n\n\t// check to make sure the logged in cookie is not already present\n\t_, err = r.Cookie(\"jwt\")\n\tif err != http.ErrNoCookie {\n\t\tess.Log.Error(\"jwt cookie already present, user still logged in \")\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tw.Write([]byte(`{\"msg\":\"failure\"}`))\n\t\treturn\n\t}\n\n\t// returns the parsed request\n\tdataStruct, err := api.ParseLoginInfo(body)\n\tif err != nil {\n\t\tess.Log.Error(\"cannot parse request body \", err)\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tw.Write([]byte(`{\"msg\":\"failure\"}`))\n\t\treturn\n\t}\n\n\t// queries for the password of the specific user\n\tvar password string\n\tsql := `SELECT password FROM app.users WHERE username = $1;`\n\terr = ess.PG.QueryRow(sql, dataStruct.Username).Scan(&password)\n\tif err != nil {\n\t\tess.Log.Error(\"unable to query for username \", err)\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tw.Write([]byte(`{\"msg\":\"failure\"}`))\n\t\treturn\n\t}\n\n\t// decrypt the password\n\tpassword, err = api.Decrypt(secrets.Key, password)\n\tif err != nil {\n\t\tess.Log.Error(\"unable to decrypt password \", err)\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tw.Write([]byte(`{\"msg\":\"failure\"}`))\n\t\treturn\n\t}\n\n\t// check to see if the password matches\n\tif dataStruct.Password != password {\n\t\tess.Log.Error(\"password is incorrect \", err)\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tw.Write([]byte(`{\"msg\":\"failure\"}`))\n\t\treturn\n\t}\n\n\t// generate a valid jwt token for the user\n\ttoken, err := auth.GenerateJwt(dataStruct.Username, secrets.Jwt)\n\tif err != nil {\n\t\tess.Log.Error(\"unable to generate jwt token \", err)\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tw.Write([]byte(`{\"msg\":\"failure\"}`))\n\t\treturn\n\t}\n\n\t// gets a random 14 character authorization token that can be used to designate a session id\n\tsessionid := auth.GenerateToken(14)\n\n\t// insert login data into the database, use variables so sql driver can escape all user entered info.\n\n\t// this is used as a subtitute for refresh token, when a token is expired the database will be checked for previous\n\t// valid token before sending out a new token, if token is invalid it will log the user out user from that session.\n\n\t// this will only trigger if the refresh token has been compromised.\n\tsql = `INSERT INTO app.login (username, sessionid, jwt) VALUES ($1, $2, $3);`\n\t_, err = ess.PG.Exec(sql, dataStruct.Username, sessionid, token)\n\tif err != nil {\n\t\tess.Log.Error(\"unable to add data to jwt table \", err)\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tw.Write([]byte(`{\"msg\":\"failure\"}`))\n\t\treturn\n\t}\n\n\t// creates a jwt cookie for the user\n\thttp.SetCookie(w, &http.Cookie{\n\t\tName: \"jwt\",\n\t\tValue: token,\n\t\tPath: \"/\",\n\t\tMaxAge: 2147483647, // virtually infinite cookie\n\t\tHttpOnly: true,\n\t})\n\n\t// create a session id cookie for the user\n\thttp.SetCookie(w, &http.Cookie{\n\t\tName: \"sessionid\",\n\t\tValue: sessionid,\n\t\tPath: \"/\",\n\t\tMaxAge: 2147483647, // virtually infinite cookie\n\t})\n\n\t// create a username cookie for the user\n\thttp.SetCookie(w, &http.Cookie{\n\t\tName: \"username\",\n\t\tValue: dataStruct.Username,\n\t\tPath: \"/\",\n\t\tMaxAge: 2147483647, // virtually infinite cookie\n\t})\n\n\tw.Write([]byte(`{\"msg\":\"success\"}`))\n\treturn\n}", "title": "" }, { "docid": "d87998cc14aae83a99c060f3b8ce6743", "score": "0.646056", "text": "func Login(w http.ResponseWriter, r *http.Request) {\n\trequestBody, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\tresponses.Error(w, http.StatusUnprocessableEntity, err)\n\t\treturn\n\t}\n\n\tvar user models.User\n\tif err = json.Unmarshal(requestBody, &user); err != nil {\n\t\tresponses.Error(w, http.StatusBadRequest, err)\n\t\treturn\n\t}\n\n\tdb, err := db.Connect()\n\tif err != nil {\n\t\tresponses.Error(w, http.StatusInternalServerError, err)\n\t\treturn\n\t}\n\tdefer db.Close()\n\n\trepository := repositories.NewUsersRepository(db)\n\tretrievedUser, err := repository.GetByEmail(user.Email)\n\tif err != nil {\n\t\tresponses.Error(w, http.StatusInternalServerError, err)\n\t\treturn\n\t}\n\n\tif err = security.CheckPassword(retrievedUser.Password, user.Password); err != nil {\n\t\tresponses.Error(w, http.StatusUnauthorized, err)\n\t\treturn\n\t}\n\n\ttoken, err := auth.CreateToken(retrievedUser.ID)\n\tif err != nil {\n\t\tresponses.Error(w, http.StatusInternalServerError, err)\n\t\treturn\n\t}\n\n\tuserID := strconv.FormatUint(retrievedUser.ID, 10)\n\n\tresponses.JSON(w, http.StatusOK, models.AuthData{ID: userID, Token: token})\n\n}", "title": "" }, { "docid": "f210820b9bbf5437a4ad8114cdcb6797", "score": "0.6445842", "text": "func (fb *FritzBox) PerformLogin() error {\n\tlog.Println(\"Trying to login to Fritz.Box \" + fb.Host)\n\tclient := fb.getHTTPClient()\n\n\tsession, err := fetchSessionInfo(client, fb.Host+\"/login_sid.lua\")\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tresponse := buildAuthHash(session.Challenge, fb.Passw)\n\n\turl, err := url.Parse(fb.Host)\n\tif err != nil {\n\t\treturn err\n\t}\n\t// was valid until FritzOS 7.21\n\t//user := url.User.Username()\n\t//url.User = nil\n\n\t// From 7.25 you need a user\n\tuser := session.Users[len(session.Users)-1]\n\n\tsession, err = fetchSessionInfo(client, url.String()+\"/login_sid.lua?&username=\"+user.User+\"&response=\"+response)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif session.SID == \"0000000000000000\" {\n\t\treturn errors.New(\"Login not successful\")\n\t}\n\n\tfb.session = session\n\tlog.Println(\"Session created\")\n\treturn nil\n}", "title": "" }, { "docid": "f258e203a07462f0994d56c1c388acb3", "score": "0.64385825", "text": "func (h *auth) Login(c echo.Context) error {\n\t// Filter params\n\tvar params credentials\n\tif err := c.Bind(&params); err != nil {\n\t\tlog.Println(\"Could not get parameters:\", err)\n\t\treturn c.JSON(http.StatusUnauthorized, sferror.New(\"Could not get credentials.\"))\n\t}\n\n\tif params.Email == \"\" || params.Password == \"\" {\n\t\treturn c.JSON(http.StatusUnauthorized, sferror.New(\"No email or password provided.\"))\n\t}\n\n\t// TODO 2FA\n\t// https://github.com/standardfile/ruby-server/blob/master/app/controllers/api/auth_controller.rb#L16\n\n\t// Retrieve user\n\tuser, err := h.db.FindUserByMail(params.Email)\n\tif err != nil {\n\t\tif h.db.IsNotFound(err) {\n\t\t\treturn c.JSON(http.StatusUnauthorized, sferror.New(\"Invalid email or password.\"))\n\t\t}\n\t\treturn errors.Wrap(err, \"could not get user\")\n\t}\n\n\t// Verify password\n\tif err = argon2.CompareHashAndPasswordString(user.Password, params.Password); err != nil {\n\t\tif err == argon2.ErrMismatchedHashAndPassword {\n\t\t\treturn c.JSON(http.StatusUnauthorized, sferror.New(\"Invalid email or password.\"))\n\t\t}\n\t\treturn errors.Wrap(err, \"could not validate password\")\n\t}\n\n\treturn c.JSON(http.StatusOK, echo.Map{\n\t\t\"user\": serializer.User(user),\n\t\t\"token\": h.TokenFromUser(user),\n\t})\n}", "title": "" }, { "docid": "b899c263298915fbd29aa07ad20466de", "score": "0.6400212", "text": "func (c *Client) Login() error {\n\treq, _ := http.NewRequest(\"POST\", UrlLogin, nil)\n\treq.SetBasicAuth(c.username, c.password)\n\tres, err := c.Do(req)\n\tif err != nil {\n\t\treturn errors.New(\"ops, we couldn't process this\")\n\t}\n\n\tif res.StatusCode != http.StatusOK {\n\t\tb, _ := ioutil.ReadAll(res.Body)\n\t\treturn errors.New(string(b))\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "971a3c91e7d56f089afbfe6ad0e0e540", "score": "0.63924897", "text": "func Login(w http.ResponseWriter, r *http.Request) {\n\tvar c Credentials\n\tresponse := make(map[string]interface{})\n\n\t//read json\n\terr := json.NewDecoder(r.Body).Decode(&c)\n\tif err != nil {\n\t\tReturnStatusBadRequest(w, \"Failed to decode query json\")\n\t\treturn\n\t}\n\n\t//validate data\n\terr = validateLogin(c)\n\tif err != nil {\n\t\tReturnUnauthorized(w, err.Error())\n\t\treturn\n\t}\n\n\t//create token\n\ttoken, err := auth.CreateToken(c.Username)\n\tif err != nil {\n\t\tReturnInternalServerError(w, err.Error())\n\t\treturn\n\t}\n\n\tw.WriteHeader(http.StatusOK)\n\tresponse[\"token\"] = token\n\tresponse[\"status\"] = true\n\tjson.NewEncoder(w).Encode(response)\n}", "title": "" }, { "docid": "302510bce5800635441c068a4c2ff964", "score": "0.6390864", "text": "func login(req *web.Request) {\n\tcallback := req.URL.Scheme + \"://\" + req.URL.Host + \"/twitter-callback\"\n\ttemporaryCredentials, err := oauthClient.RequestTemporaryCredentials(callback)\n\tif err != nil {\n\t\treq.Error(web.StatusInternalServerError, err)\n\t\treturn\n\t}\n\treq.Redirect(oauthClient.AuthorizationURL(temporaryCredentials), false,\n\t\tweb.HeaderSetCookie, fmt.Sprintf(\"tmp=%s; Path=/; HttpOnly\", encodeCredentials(temporaryCredentials)))\n}", "title": "" }, { "docid": "2cfddcfeee7216d195769e0c481d7bc8", "score": "0.6376362", "text": "func (c *Client) Login() error {\n\n\tif len(c.Address) == 0 {\n\t\treturn errors.New(\"FortiADC address cannot be empty\")\n\t}\n\n\tpayload := map[string]string{\n\t\t\"username\": c.Username,\n\t\t\"password\": c.Password,\n\t}\n\n\tpayloadJSON, err := json.Marshal(payload)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tresp, err := c.Client.Post(fmt.Sprintf(\"%s/api/user/login\", c.Address), \"application/json\", bytes.NewReader(payloadJSON))\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer resp.Body.Close()\n\n\tif resp.StatusCode != 200 {\n\t\treturn fmt.Errorf(\"Login failed with http code: %d\", resp.StatusCode)\n\t}\n\n\tbody, err := io.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tvar authRes AuthRes\n\terr = json.Unmarshal(body, &authRes)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tc.Token = authRes.Token\n\n\treturn nil\n}", "title": "" }, { "docid": "d8e7983aeae97fce352d9c77e5b711b6", "score": "0.6373902", "text": "func (auth Authenticator) Login(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\tw.Header().Set(\"Access-Control-Allow-Methods\", \"POST, GET, OPTIONS, PUT, DELETE\")\n\tw.Header().Set(\"Access-Control-Allow-Headers\", \"Accept, Content-Type, Content-Length, Accept-Encoding, X-CSRF-Token, Authorization\")\n\n\tif r.Method == \"OPTIONS\" {\n\t\treturn\n\t}\n\n\tvar creds Credentials\n\t// Get the JSON body and decode into credentials\n\terr := json.NewDecoder(r.Body).Decode(&creds)\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t// Neither fields can be empty\n\tif creds.Email == \"\" || creds.Password == \"\" {\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\treturn\n\t}\n\n\temail := strings.ToLower(creds.Email)\n\tpass := creds.Password\n\n\terr = auth.handleLogin(email, pass)\n\tif err != nil {\n\t\t// For now assume all errors are client\n\t\thttp.Error(w, \"User or password is invalid\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\ttokenCookie, err := auth.issueToken(email)\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\thttp.SetCookie(w, &tokenCookie)\n\tw.WriteHeader(http.StatusOK)\n}", "title": "" }, { "docid": "8782cedcf88ecacae16dc7836ccd8a7a", "score": "0.63726425", "text": "func (ah *AuthHandler) Login(c *gin.Context) {\n\ttype RequestBody struct {\n\t\tIDToken string `json:\"id_token\"`\n\t}\n\ttype ResponseBody struct {\n\t\tAccessToken string `json:\"access_token\"`\n\t\tRefreshToken string `json:\"refresh_token\"`\n\t}\n\tvar request RequestBody\n\terr := c.BindJSON(&request)\n\tif err != nil {\n\t\tglog.Error(err)\n\t\tc.JSON(http.StatusBadRequest, err)\n\t\treturn\n\t}\n\tif request.IDToken == \"\" {\n\t\tc.JSON(http.StatusBadRequest, errors.New(\"empty token id\"))\n\t\treturn\n\t}\n\n\tuserID, isNewUser, err := ah.UserService.Login(request.IDToken)\n\tif err != nil {\n\t\tglog.Error(err)\n\t\tc.JSON(http.StatusInternalServerError, gin.H{\"error\": \"invalid token\"})\n\t\treturn\n\t}\n\n\tif isNewUser {\n\t\t// Subscibe to the initial plan\n\t\tinitialPlanID, err := ah.SubscriptionService.GetSignupPlanID()\n\t\tif err != nil {\n\t\t\tglog.Error(err)\n\t\t\tc.JSON(http.StatusInternalServerError, err)\n\t\t\treturn\n\t\t}\n\t\terr = ah.SubscriptionService.CreateSubscripton(\n\t\t\tuserID, initialPlanID, uint(0), false,\n\t\t)\n\t\tif err != nil {\n\t\t\tglog.Error(err)\n\t\t\tc.JSON(http.StatusInternalServerError, err)\n\t\t\treturn\n\t\t}\n\t\t// Create task presets\n\t\terr = ah.TaskService.CreatePresetForNewUser(userID)\n\t\tif err != nil {\n\t\t\tglog.Error(err)\n\t\t}\n\t\t// Send welcome email to the new user\n\t\tuser, err := ah.UserService.GetUserByID(userID)\n\t\tif err == nil {\n\t\t\terr = ah.EmailService.SendWelcomeEmail(\n\t\t\t\tuser.Email,\n\t\t\t\tuser.FirstName+\" \"+user.LastName,\n\t\t\t\tuser.FirstName,\n\t\t\t)\n\t\t\tif err != nil {\n\t\t\t\tlog.Println(err)\n\t\t\t}\n\t\t}\n\t}\n\tresp := ResponseBody{\n\t\tAccessToken: ah.TokenService.GetAccessToken(userID),\n\t\tRefreshToken: ah.TokenService.GetRefreshToken(userID),\n\t}\n\n\tc.JSON(http.StatusOK, resp)\n}", "title": "" }, { "docid": "486a69bafa1036fb2be09329e499e76d", "score": "0.63721204", "text": "func (controller *UserController) Login(w http.ResponseWriter, r *http.Request) {\n\t// TODO: redirect to intended link\n\tloginRequest := UserLoginRequest{}\n\tdecoder := json.NewDecoder(r.Body)\n\terr := decoder.Decode(&loginRequest)\n\n\tif err != nil {\n\t\thttp.Error(w, \"Unable to decode user\", 400)\n\t\tlog.Println(err)\n\t\treturn\n\t}\n\n\ttoken, controllerError := controller.logic.Login(loginRequest.Email, loginRequest.Password)\n\n\tif controllerError != nil {\n\t\thttp.Error(w, controllerError.Error.Error(), controllerError.StatusCode)\n\t\treturn\n\t}\n\n\trequests.Finish(token, w)\n}", "title": "" }, { "docid": "c10428ed924c98ee1039dc4bea8732a2", "score": "0.6351304", "text": "func Login(c *fiber.Ctx) error {\n\t/*\n\t * We will get the user context\n\t * We will get the auth payload to be checked\n\t * We will validate the user email and password\n\t * We will generate the token and set as auth token\n\t */\n\tctx, ok := c.UserContext().Value(config.AppContextKey{}).(*config.AppContext)\n\tif !ok {\n\t\treturn c.JSON(dto.Error(errors.New(\"context not found\"), http.StatusInternalServerError))\n\t}\n\ta := &dto.Auth{}\n\tif err := c.BodyParser(a); err != nil {\n\t\treturn c.JSON(dto.Error(err, http.StatusBadRequest))\n\t}\n\n\tuser, err := db.CheckPassword(ctx, a.Email, a.Password)\n\tif err != nil {\n\t\treturn c.JSON(dto.Error(err, http.StatusForbidden))\n\t}\n\n\ttoken, err := crypto_utils.GenerateToken(32)\n\tif err != nil {\n\t\treturn c.JSON(dto.Error(err, http.StatusInternalServerError))\n\t}\n\tc.Response().Header.Set(\"Authorization\", \"Bearer \"+token)\n\n\treturn c.JSON(dto.Success(dto.FromUserModel(user)))\n}", "title": "" }, { "docid": "b76e3514a433a11720d1a9376a2678ce", "score": "0.63496464", "text": "func (h *handler) Login(c echo.Context) (err error) {\n\tcorrID := randID()\n\n\tvar l struct {\n\t\tEmail string `json:\"email\"`\n\t\tName string `json:\"name,omitempty\"`\n\t\tType string `json:\"type\"`\n\t}\n\tif err := c.Bind(&l); err != nil {\n\t\treturn c.JSON(http.StatusBadRequest, map[string]string{\"message\": err.Error()})\n\t}\n\t_, err = authorizationFromType(l.Type)\n\tif err != nil {\n\t\treturn c.JSON(http.StatusBadRequest, map[string]string{\"message\": fmt.Sprintf(\"Unknown app type: %s\", l.Type)})\n\t}\n\n\ta, err := h.store.GetAccountByEmail(l.Email)\n\tif err != nil {\n\t\tc.Logger().Errorf(\"%v\", err)\n\t\treturn c.NoContent(http.StatusInternalServerError)\n\t}\n\tif a == nil {\n\t\treturn c.JSON(http.StatusUnauthorized, map[string]string{\"message\": \"Email not found\"})\n\t}\n\n\ttoken, err := h.newAppToken(c, l.Type, l.Name, a, corrID, true)\n\tif err != nil {\n\t\treturn c.JSON(http.StatusInternalServerError, map[string]string{\"message\": err.Error()})\n\t}\n\n\t// Session Token\n\texp := time.Now().Add(h.expAppToken)\n\tc.SetCookie(&http.Cookie{\n\t\tName: auth.CookieSessionName,\n\t\tValue: token.Token,\n\t\tExpires: exp,\n\t\tSecure: h.isHTTPS,\n\t\tHttpOnly: true,\n\t\tPath: \"/\",\n\t})\n\n\treturn c.JSON(http.StatusOK, map[string]string{\"app_token\": token.Token})\n}", "title": "" }, { "docid": "bc540ca437949502dc1b8b965ef48829", "score": "0.6349078", "text": "func Login(w http.ResponseWriter, r *http.Request) {\n\tvar loginRequest requests.LoginRequest\n\n\t//decode request body\n\terr := json.NewDecoder(r.Body).Decode(&loginRequest)\n\n\t//check if body was valid\n\tif err != nil || loginRequest.Password == \"\" || loginRequest.Username == \"\" {\n\t\thttp.Error(w, messages.BAD_REQUEST, http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t//get user from database to check password\n\tfound, user := database.GetUserByUsername(loginRequest.Username)\n\n\t//check whether a user with the given username even exists\n\tif !found {\n\t\thttp.Error(w, messages.INVALID_LOGIN, http.StatusUnauthorized)\n\t\treturn\n\t}\n\n\t//check is password is correct\n\tif !encryption.CheckPassword(loginRequest.Password, user.Password) {\n\t\thttp.Error(w, messages.INVALID_LOGIN, http.StatusUnauthorized)\n\t\treturn\n\t}\n\n\t//generate the authentication token\n\ttoken, validUntil := generateToken(user.UserID.String())\n\n\t//return result\n\tjson.NewEncoder(w).Encode(responses.LoginResponse{Token: token, ValidUntil: validUntil})\n}", "title": "" }, { "docid": "fba7e070656244e5555ac5fc44d88b4f", "score": "0.63475335", "text": "func (c *Client) Login(ctx context.Context, cred *Credential) error {\n\t// Build request\n\tloginUrl := c.loginURL(ctx)\n\tvalues := url.Values{}\n\tvalues.Add(\"grant_type\", \"password\")\n\tvalues.Add(\"client_id\", cred.ClientID)\n\tvalues.Add(\"client_secret\", cred.ClientSecret)\n\tvalues.Add(\"username\", cred.Username)\n\tvalues.Add(\"password\", cred.Password+cred.APIToken)\n\tc.Logger.Printf(\"POST %s\", loginUrl)\n\treq, err := http.NewRequest(\"POST\", loginUrl, strings.NewReader(values.Encode()))\n\tif err != nil {\n\t\tc.Logger.Printf(\"failed to create the http request: %v\", err)\n\t\treturn err\n\t}\n\treq.WithContext(ctx)\n\treq.Header.Add(\"Content-Type\", \"application/x-www-form-urlencoded\")\n\n\t// Execute POST\n\tres, err := c.HttpClient.Do(req)\n\tif err != nil {\n\t\tc.Logger.Printf(\"failed to execute the request: %v\", err)\n\t\treturn err\n\t}\n\tdefer func() {\n\t\tif err := res.Body.Close(); err != nil {\n\t\t\tc.Logger.Printf(\"failed to close body: %v\", err)\n\t\t}\n\t}()\n\n\t// Decode response\n\tvar session SessionID\n\tbody, err := readBody(res)\n\tif err != nil {\n\t\tc.Logger.Printf(\"failed to read the response: %v\", err)\n\t\treturn err\n\t}\n\tif err := decode(body, &session); err != nil {\n\t\tc.Logger.Printf(\"failed to decode the response: %v\", err)\n\t\treturn err\n\t}\n\n\t// Check response\n\tif len(session.Error) > 0 {\n\t\tmsg := fmt.Sprintf(\"failed to login: %s (%s)\", session.Error, session.ErrorDesc)\n\t\tc.Logger.Printf(msg)\n\t\treturn errors.New(msg)\n\t}\n\tc.session = &session\n\tc.Logger.Printf(\"successfully logged in: \" + cred.Username)\n\treturn nil\n}", "title": "" }, { "docid": "3c30d62bce4e2414784fa781a917b077", "score": "0.63194263", "text": "func (c *Client) Login(username string, password string) error {\n\n\tc.credentials = credentials{\n\t\tUsername: username,\n\t\tPassword: password,\n\t}\n\n\tauth := struct {\n\t\tcredentials `json:\"auth\"`\n\t}{c.credentials}\n\n\treq, err := c.newRequest(\"POST\", \"auth\", auth)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tresp, err := c.do(req, nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tc.token = resp.Cookies()[0].Value\n\treturn nil\n}", "title": "" }, { "docid": "01d6033c6bb807a8c248f05eaab62c8d", "score": "0.63067466", "text": "func (p *Provider) Login(email, password string) error {\n\tcsrf, err := p.initialize()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tvalues := url.Values{}\n\tvalues.Set(\"csrfmiddlewaretoken\", csrf)\n\tvalues.Set(\"email\", email)\n\tvalues.Set(\"password\", password)\n\n\tresp, respErr := postForm(p.client, p.getURL(\"/signin/\"), values)\n\tif respErr != nil {\n\t\treturn respErr\n\t}\n\n\tif resp.StatusCode != 200 {\n\t\treturn fmt.Errorf(\"Login failed with status code %d\", resp.StatusCode)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "9b0ae660f15ced86ac9f8f725fca4b8d", "score": "0.63007915", "text": "func (b *Builder) OAuthLogin(provider string) func(http.ResponseWriter, *http.Request) {\n\treturn func(w http.ResponseWriter, request *http.Request) {\n\t\tuserId, err := b.OAuthCallback(provider, request)\n\n\t\tif err != nil {\n\t\t\thttp.Redirect(w, request, b.URLS.SignIn, http.StatusTemporaryRedirect)\n\t\t} else {\n\t\t\tb.login(request, w, strconv.FormatInt(userId, 10))\n\t\t}\n\t}\n}", "title": "" }, { "docid": "d3185c482f29518cf6aea23ba76d9e57", "score": "0.62865686", "text": "func Login(w http.ResponseWriter, r *http.Request) {\n\trequest, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\tresponses.Error(w, http.StatusUnprocessableEntity, err)\n\t\treturn\n\t}\n\n\tvar user models.User\n\tif err := json.Unmarshal(request, &user); err != nil {\n\t\tresponses.Error(w, http.StatusBadRequest, err)\n\t\treturn\n\t}\n\n\tdb, err := database.Connect()\n\tif err != nil {\n\t\tresponses.Error(w, http.StatusInternalServerError, err)\n\t\treturn\n\t}\n\tdefer db.Close()\n\n\trepository := repositories.NewUserRepository(db)\n\tuserInDb, err := repository.GetByEmail(user.Email)\n\tif err != nil {\n\t\tresponses.Error(w, http.StatusInternalServerError, err)\n\t\treturn\n\t}\n\n\tif err := security.VerifyPassword(userInDb.Password, user.Password); err != nil {\n\t\tresponses.Error(w, http.StatusUnauthorized, err)\n\t\treturn\n\t}\n\n\ttoken, err := authentication.GenerateToken(userInDb.ID)\n\tif err != nil {\n\t\tresponses.Error(w, http.StatusInternalServerError, err)\n\t\treturn\n\t}\n\n\tuserID := strconv.FormatUint(userInDb.ID, 10)\n\n\tresponses.JSON(w, http.StatusOK, models.DataAuthentication{ID: userID, Token: token})\n\n}", "title": "" }, { "docid": "9204e668f71280a0fd405c5eac33222a", "score": "0.62842816", "text": "func Login(w http.ResponseWriter, r *http.Request) {\n\tvar body login\n\tparseBody(r, &body)\n\ttokenized, err := domain.GetTokenizedUserByEmail(body.Email)\n\n\tif err != nil {\n\t\trespondWithError(w, 401, \"invalidEmailOrPassword\")\n\t\treturn\n\t}\n\n\tnoMatch := bcrypt.CompareHashAndPassword([]byte(tokenized.Password), []byte(body.Password))\n\n\tif noMatch != nil {\n\t\trespondWithError(w, 401, \"invalidEmailOrPassword\")\n\t} else {\n\t\t_, tokenString, err := generateJWTToken(tokenized.ID.Hex(), tokenized.Role)\n\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t\trespondWithError(w, 500, \"Error while signing the token\")\n\t\t} else {\n\t\t\trespondWithJSON(w, 200, map[string]interface{}{\n\t\t\t\t\"token\": tokenString,\n\t\t\t\t\"currentUser\": tokenized,\n\t\t\t})\n\t\t}\n\t}\n}", "title": "" }, { "docid": "9578c39e0a1580a6827782cba405093a", "score": "0.62816584", "text": "func (_m *IDevelop) Login() {\n\t_m.Called()\n}", "title": "" }, { "docid": "94525b614039797e0b3bc7c4c762dcfd", "score": "0.6271479", "text": "func (i *IBMSecretsManager) Login() error {\n\treturn nil\n}", "title": "" }, { "docid": "ea018b358f29f20106896fa675030475", "score": "0.6265177", "text": "func Login(w http.ResponseWriter, r *http.Request) {\n\tbody, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\tresponses.ERROR(w, http.StatusUnprocessableEntity, err)\n\t\treturn\n\t}\n\n\tuser := models.User{}\n\terr = json.Unmarshal(body, &user)\n\tif err != nil {\n\t\tresponses.ERROR(w, http.StatusUnprocessableEntity, err)\n\t\treturn\n\t}\n\n\tif err := user.ValidateCreation(); err != nil {\n\t\tresponses.ERROR(w, http.StatusUnprocessableEntity, err)\n\t\treturn\n\t}\n\n\ttoken, err := auth.SignIn(user.UserName, user.Password)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\tresponses.ERROR(w, http.StatusUnprocessableEntity, errors.New(\"Invalid username or password\"))\n\t\treturn\n\t}\n\n\tresponses.JSON(w, http.StatusOK, token)\n}", "title": "" }, { "docid": "0fed6f4ea8431509314f72efcf5a8a23", "score": "0.6256316", "text": "func (u *Unifi) Login(ctx context.Context) error {\n\tvar err error\n\n\tdefer logFnResult(\"Login\", err)\n\n\t// POST data is in JSON format.\n\targs := struct {\n\t\tUsername string `json:\"username\"`\n\t\tPassword string `json:\"password\"`\n\t}{\n\t\tu.userName,\n\t\tu.password,\n\t}\n\n\tb, err := json.Marshal(args)\n\tif err != nil {\n\t\terr = fmt.Errorf(\"json.Marshal() error: %v\", err)\n\t\treturn err\n\t}\n\n\tbuf := bytes.NewBuffer(b)\n\n\t// Login.\n\tr, err := http.NewRequest(\"POST\", u.urls[\"login\"].String(), buf)\n\tif err != nil {\n\t\terr = fmt.Errorf(\"NewRequest error: %v\", err)\n\t\treturn err\n\t}\n\t// Get a copy of req with its context changed to ctx.\n\tr = r.WithContext(ctx)\n\tr.Header.Set(\"Accept\", \"*/*\")\n\tr.Header.Set(\"Content-Type\", \"application/json\")\n\n\t_, err = u.Do(r, false)\n\n\treturn err\n}", "title": "" }, { "docid": "454ee55603a5ffae74cc2e794968eeb3", "score": "0.62514955", "text": "func (a *Account) Login() error {\n\ta.client.Get(origin + \"/login\") // Make a first request to generate fkey\n\tlocation, _ := url.Parse(origin) // Generate a url for grabbing cookies from that domain\n\n\ta.fkey = a.jar.Cookies(location)[0].Value // Assign fkey\n\n\tformData := url.Values{\n\t\t\"continue\": {\"null\"},\n\t\t\"fkey\": {a.fkey},\n\t\t\"identifier\": {a.Username},\n\t\t\"password\": {a.Password},\n\t} // Generate form data\n\n\tresp, _ := a.client.PostForm(origin+\"/login\", formData) // Send login POST request\n\n\tif resp.StatusCode == 200 {\n\t\treturn nil\n\t}\n\treturn errors.New(\"error logging in\")\n}", "title": "" }, { "docid": "69e9aee832f74ff8df3ec3b21a40da71", "score": "0.62496954", "text": "func (e *Easee) Login(userPw Login) error {\n\tuserToken, err := e.client.GetTokens(userPw)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = e.client.SetUserToken(userToken)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f4143132a82aaed7529d173f569181d0", "score": "0.62496763", "text": "func (s *Service) Login(c context.Context, req *authpb.LoginRequest) (*authpb.LoginResponse, error) {\n\tlog.Fatal(\"Login\")\n\treturn nil, status.Error(codes.Unimplemented, \"\")\n}", "title": "" }, { "docid": "7a665bb13b7b729cf997770a2a4dfc09", "score": "0.6235746", "text": "func Login(request *events.APIGatewayProxyRequest) events.APIGatewayProxyResponse {\n\tresp := auth.Response(request)\n\n\t// unmarshal request\n\treq := &loginRequest{}\n\terr := json.Unmarshal([]byte(request.Body), req)\n\tif err != nil {\n\t\tresp.Body = err.Error()\n\t\treturn resp\n\t}\n\n\t// connect to db\n\tdb, err := dbutil.ConnectDB()\n\tdefer db.Close()\n\tif err != nil {\n\t\tresp.Body = err.Error()\n\t\treturn resp\n\t}\n\n\t// unauthorize if id doesn't exist\n\tuser := &model.User{UserID: req.Email, Password: req.PW}\n\tsavedUser := &model.User{UserID: user.UserID}\n\tif err := dbutil.FindMember(db, savedUser); err != nil {\n\t\tresp.Body = err.Error()\n\t\tresp.StatusCode = http.StatusUnauthorized\n\t\treturn resp\n\t}\n\n\t// compare pw\n\terr = bcrypt.CompareHashAndPassword([]byte(savedUser.Password), []byte(user.Password))\n\tif err != nil {\n\t\t// unauthorize if pw doesn't match\n\t\tif err == bcrypt.ErrMismatchedHashAndPassword {\n\t\t\tresp.StatusCode = http.StatusUnauthorized\n\t\t}\n\t\tresp.Body = err.Error()\n\t\treturn resp\n\t}\n\n\t// generate access token\n\taccessTokenString, err := generateAccessToken(user.UserID, accessDur)\n\tif err != nil {\n\t\tresp.Body = err.Error()\n\t\treturn resp\n\t}\n\n\t// generate refresh token\n\trefreshTokenString, err := generateRefreshToken(user.UserID, refreshDur)\n\tif err != nil {\n\t\tresp.Body = err.Error()\n\t\treturn resp\n\t}\n\n\t// set response and cookie\n\tres := &loginResponse{\n\t\tAccessToken: accessTokenString,\n\t\tExpiresIn: strconv.Itoa(int(accessDur.Seconds())),\n\t\tType: \"app\",\n\t}\n\tdata, err := json.Marshal(res)\n\n\tcookie := auth.CreateRefreshCookie(refreshTokenString, refreshDur)\n\tauth.SetCookie(resp.MultiValueHeaders, cookie)\n\n\tresp.Body = string(data)\n\tresp.StatusCode = http.StatusOK\n\n\treturn resp\n}", "title": "" }, { "docid": "69d9e13a7ad07f6c2a61d809f371b9bc", "score": "0.62297076", "text": "func (a authSupercookie) Login(res http.ResponseWriter, r *http.Request) (string, []plugins.MFAConfig, error) {\n\treturn \"\", nil, plugins.ErrNoValidUserFound\n}", "title": "" }, { "docid": "7b52381b8dcc7762fad4ce2ef84b11c7", "score": "0.6226778", "text": "func (s *Session) Login(requestBody login.RequestBody) error {\n\ts.client = &http.Client{}\n\tresponseBody := login.ResponseBody{}\n\terr := s.sendRequest(requestBody, s.LoginURL, &responseBody, true)\n\tif err != nil {\n\t\treturn err\n\t}\n\ts.User = responseBody.User\n\ts.Webservices = responseBody.Webservices\n\treturn nil\n}", "title": "" }, { "docid": "3328e1c10249004465325422cf822e04", "score": "0.62190455", "text": "func Login(u *models.User) (int, []byte) {\n\tsuppliedPassword := u.Password\n\n\tif err := u.GetUserWithEmail(database.Manager); err != nil {\n\t\terrS, _ := json.Marshal(models.Exception{Message: \"bad email or password\"})\n\t\treturn http.StatusUnauthorized, errS\n\t}\n\n\tif ok := authentication.InitJWTAuthenticationBackend().Authenticate(suppliedPassword, u.Password); !ok {\n\t\terrS, _ := json.Marshal(models.Exception{Message: \"bad email or password\"})\n\t\treturn http.StatusUnauthorized, errS\n\t}\n\n\treturn RefreshToken(u)\n}", "title": "" }, { "docid": "9bafcd4463b0791ebf24e2b1bfdfe634", "score": "0.62142533", "text": "func (as *AuthService) Login() (err error) {\n\tpayload := \"username=\" + as.username + \"&password=\" + as.password\n\n\t// Load client cert\n\tcert, err := tls.LoadX509KeyPair(as.certFile, as.keyFile)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Setup HTTPS client\n\ttlsConfig := &tls.Config{Certificates: []tls.Certificate{cert}}\n\ttlsConfig.BuildNameToCertificate()\n\ttransport := &http.Transport{MaxIdleConns: 2, IdleConnTimeout: 10 * time.Second, TLSClientConfig: tlsConfig}\n\thttpClient := http.Client{Transport: transport, Timeout: time.Second * time.Duration(as.connectionTimeout)}\n\n\treq, err := http.NewRequest(\"POST\", loginURLGlobal, bytes.NewBuffer([]byte(payload)))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treq.Header.Set(\"X-Application\", as.AppKey)\n\treq.Header.Set(\"content-type\", \"application/x-www-form-urlencoded\")\n\n\tresp, err := httpClient.Do(req)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdefer resp.Body.Close()\n\n\tif resp.StatusCode != 200 {\n\t\treturn err\n\t}\n\n\tloginResp := LoginResponse{}\n\terr = json.NewDecoder(resp.Body).Decode(&loginResp)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif loginResp.LoginStatus != \"SUCCESS\" || loginResp.SessionToken == \"\" {\n\t\treturn fmt.Errorf(\"failed login - login status: %s\", loginResp.LoginStatus)\n\t}\n\n\tas.SessionToken = loginResp.SessionToken\n\treturn nil\n}", "title": "" }, { "docid": "722c1d447aae1c62a5bcecbc7afe1171", "score": "0.6198476", "text": "func Login(w http.ResponseWriter, r *http.Request) {\n\tfmt.Println(\"in check\")\n\tusername, password, authErr := r.BasicAuth()\n\tfmt.Println(username, password)\n\tif authErr == false {\n\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\tw.Write([]byte(\"Couldn't parse login information correctly!!\"))\n\t\treturn\n\t}\n\t//var catagory string\n\tvar user User\n\terr := json.NewDecoder(r.Body).Decode(&user)\n\tfmt.Println(user.Catagory, \"-------------\")\n\tif err != nil {\n\t\tfmt.Println(err.Error())\n\t}\n\n\tfor _, user := range AllUsers {\n\t\tif user.Username == username && user.Password == password {\n\t\t\tfmt.Println(\"user found\")\n\t\t\ttoken, err := GenerateToken(username, user.Catagory)\n\t\t\tif err != nil {\n\t\t\t\tw.Write([]byte(\"Error generating token\"))\n\t\t\t} else {\n\t\t\t\tw.Write([]byte(token))\n\t\t\t}\n\t\t} else if user.Username == username && user.Password != password {\n\t\t\tw.Write([]byte(\"invalid password\"))\n\t\t}\n\t}\n}", "title": "" }, { "docid": "38ef48cb388e65a27758b3ab7bc05824", "score": "0.61968946", "text": "func (c *Controller) Login(w http.ResponseWriter, req *http.Request) {\n\t// Validate the login.\n\tuser, password, ok := req.BasicAuth()\n\tif !ok {\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tfmt.Fprint(w, \"Invalid auth settings\\n\")\n\t\treturn\n\t}\n\tif password != c.masterPassword {\n\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\tfmt.Fprint(w, \"Invalid password\\n\")\n\t\treturn\n\t}\n\n\t// Generate, store and return token.\n\ttoken := make([]byte, 16)\n\t_, err := rand.Read(token)\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tfmt.Fprint(w, \"Error generating random string for token\\n\")\n\t\treturn\n\t}\n\ttokenStr := hex.EncodeToString(token)\n\n\tc.tokens[tokenStr] = user\n\tfmt.Fprintf(w, \"%s\\n\", tokenStr)\n}", "title": "" }, { "docid": "1d1923baf0cf733c77eabe0cdb9983d2", "score": "0.618364", "text": "func Login(w http.ResponseWriter, r *http.Request) {\r\n\t//Vamos a setear en el header el contenido que devolveremos (w)\r\n\t//Será de tipo Json\r\n\tw.Header().Add(\"content-type\", \"application/json\")\r\n\tvar usu models.Usuario\r\n\terr := json.NewDecoder(r.Body).Decode(&usu)\r\n\r\n\tif err != nil {\r\n\t\thttp.Error(w, \"Usuario y/o contraseña inválidos \"+err.Error(), 400)\r\n\t\treturn\r\n\t}\r\n\tif len(usu.Email) == 0 {\r\n\t\thttp.Error(w, \"El mail de usuario es requerido \", 400)\r\n\t}\r\n\tdocumento, existe := bd.IntentoLogin(usu.Email, usu.Password)\r\n\tif existe == false {\r\n\t\thttp.Error(w, \"Usuario y/o contraseña inválidos \", 400)\r\n\t\treturn\r\n\t}\r\n\r\n\tjwtKey, err := jwt.GeneroJWT(documento)\r\n\tif err != nil {\r\n\t\thttp.Error(w, \"Ocurrio un error al intentar generar el Token correspondiente \"+err.Error(), 400)\r\n\t\treturn\r\n\t}\r\n\t//Si el token se genero:\r\n\tresp := models.RespuestaLogin{\r\n\t\tToken: jwtKey,\r\n\t}\r\n\r\n\tw.Header().Set(\"Content-Type\", \"application/json\")\r\n\tw.WriteHeader(http.StatusCreated)\r\n\tjson.NewEncoder(w).Encode(resp)\r\n\r\n\t//Tambien generaremos una cookie\r\n\t//Generamos un campo fecha para ver la expiracion de la cookie\r\n\texpirationTime := time.Now().Add(24 * time.Hour)\r\n\thttp.SetCookie(w, &http.Cookie{\r\n\t\tName: \"token\",\r\n\t\tValue: jwtKey,\r\n\t\tExpires: expirationTime,\r\n\t})\r\n}", "title": "" }, { "docid": "076ce208101af8602c2e2a2a7b9770f9", "score": "0.61690253", "text": "func Login(c *gin.Context) {\n\n\tisAuth, _, _ := authUser(c)\n\tif isAuth {\n\t\tc.JSON(http.StatusBadRequest, \"Another user already logged in\")\n\t\treturn\n\t}\n\n\tvar userCred models.Credentials\n\n\tif err := c.ShouldBindJSON(&userCred); err != nil {\n\t\tc.JSON(http.StatusBadRequest, gin.H{\"error\": err.Error()})\n\t\treturn\n\t}\n\n\tvar authCred models.Credentials\n\tif err := dbConfig.DB.Where(\"username=?\", userCred.Username).First(&authCred).Error; err != nil {\n\t\tc.JSON(http.StatusUnauthorized, gin.H{\"error\": \"Incorrect login credentials\"})\n\t\treturn\n\t}\n\n\tif authCred.Password != userCred.Password {\n\t\tc.JSON(http.StatusUnauthorized, gin.H{\"error\": \"Incorrect login credentials\"})\n\t\treturn\n\t}\n\n\texpirationTime := time.Now().Add(5 * time.Minute)\n\n\ttokenString, err := createToken(authCred, expirationTime)\n\tif err != nil {\n\t\tc.JSON(http.StatusInternalServerError, gin.H{\"error\": err.Error()})\n\t\treturn\n\t}\n\n\tc.SetCookie(\"authToken\", tokenString, 300, \"/\", \"localhost\", false, true)\n\tc.JSON(http.StatusOK, \"Logged in succesfully\")\n\n}", "title": "" }, { "docid": "dfaf99e2f57fc0bb380244fa9d0afc21", "score": "0.61546844", "text": "func (ctr *AuthController) Login(c echo.Context) error {\n\temail := c.FormValue(\"email\")\n\tpassword := utils.GetSHA256Hash(c.FormValue(\"password\"))\n\torganizationID, err := strconv.Atoi(c.FormValue(\"organization_id\"))\n\n\tif !valid.IsEmail(email) {\n\t\treturn c.JSON(http.StatusUnauthorized, cf.JsonResponse{\n\t\t\tStatus: cf.FailResponseCode,\n\t\t\tMessage: \"Invalid email\",\n\t\t})\n\t}\n\n\tif err != nil {\n\t\treturn c.JSON(http.StatusUnauthorized, cf.JsonResponse{\n\t\t\tStatus: cf.FailResponseCode,\n\t\t\tMessage: \"Invalid organization\",\n\t\t})\n\t}\n\n\t// get ID user login in DB\n\tidUserLogin, err := ctr.UserRepo.GetLoginUserID(email, password, organizationID)\n\n\tif err != nil {\n\t\tif err.Error() == pg.ErrNoRows.Error() {\n\t\t\t//select no rows in database\n\t\t\treturn c.JSON(http.StatusUnauthorized, cf.JsonResponse{\n\t\t\t\tStatus: cf.FailResponseCode,\n\t\t\t\tMessage: \"User is not exist or password wrong\",\n\t\t\t})\n\t\t}\n\n\t\treturn c.JSON(http.StatusInternalServerError, cf.JsonResponse{\n\t\t\tStatus: cf.FailResponseCode,\n\t\t\tMessage: \"System error\",\n\t\t})\n\t}\n\n\terr = ctr.UserRepo.UpdateLastLogin(idUserLogin)\n\tif err != nil {\n\t\treturn c.JSON(http.StatusInternalServerError, cf.JsonResponse{\n\t\t\tStatus: cf.FailResponseCode,\n\t\t\tMessage: \"System error \",\n\t\t})\n\t}\n\n\ttokenLogin, err := createTokenLogin(idUserLogin)\n\n\tobjToken := map[string]string{\n\t\t\"token\": tokenLogin,\n\t}\n\n\treturn c.JSON(http.StatusOK, cf.JsonResponse{\n\t\tStatus: cf.SuccessResponseCode,\n\t\tMessage: \"Success\",\n\t\tData: objToken,\n\t})\n}", "title": "" }, { "docid": "2492d049aad404a5218a39fe6f9feddc", "score": "0.6152037", "text": "func (l *LookerSDK) Login(request RequestLogin,\n options *rtl.ApiSettings) (AccessToken, error) {\n var result AccessToken\n err := l.session.Do(&result, \"POST\", \"/4.0\", \"/login\", map[string]interface{}{\"client_id\": request.ClientId, \"client_secret\": request.ClientSecret}, nil, options)\n return result, err\n\n}", "title": "" }, { "docid": "243341b5be916aa1bbb1134e9e1c1470", "score": "0.6149824", "text": "func Login(auth0Client AuthClient) (*AuthToken, error) {\n\tdeviceCodeResponse, err := auth0Client.GetDeviceCode(yakAudience)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlog.Info(fmt.Sprintf(\"Go to the following link in your browser (code: %s):\\n\", deviceCodeResponse.UserCode))\n\tlog.Info(deviceCodeResponse.VerificationURIComplete)\n\n\tlog.Info(\"\\nWaiting for authorization token to be issued...\")\n\ttoken, err := waitForToken(auth0Client, deviceCodeResponse)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &AuthToken{token.AccessToken}, nil\n}", "title": "" }, { "docid": "e5c4a860d5c05542ed96e8dcdae8c389", "score": "0.6139926", "text": "func completeAuth(ch chan *spotify.Client, auth spotify.Authenticator) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\ttok, err := auth.Token(state, r)\n\t\tif err != nil {\n\t\t\thttp.Error(w, \"Couldn't get token\", http.StatusForbidden)\n\t\t\tlog.Fatal(err)\n\t\t}\n\t\tif st := r.FormValue(\"state\"); st != state {\n\t\t\thttp.NotFound(w, r)\n\t\t\tlog.Fatalf(\"State mismatch: %s != %s\\n\", st, state)\n\t\t}\n\t\tclient := auth.NewClient(tok)\n\t\tuser, err := client.CurrentUser()\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\t\tsaveToken(user.ID, tok)\n\t\tfmt.Fprintf(w, \"Welcome %s - You are logged in as user `%s`\",\n\t\t\tuser.DisplayName, user.ID)\n\t\tch <- &client\n\t}\n}", "title": "" }, { "docid": "76785a174506288dfab994e9e91e50ed", "score": "0.61396486", "text": "func (am *AuthManager) Login(w http.ResponseWriter, r *http.Request) {\r\n\tif r.Method == \"GET\" {\r\n\t\tw.Header().Set(\"Content-Type\", \"text/html\")\r\n\t\tfmt.Fprintf(w, \"%s\", htmlLogin)\r\n\t\treturn\r\n\t}\r\n\r\n\terr := r.ParseForm()\r\n\tif err != nil {\r\n\t\tfmt.Printf(\"Error while parsing /login form: %v\\n\", err)\r\n\t\treturn\r\n\t}\r\n\r\n\tpass := r.Form.Get(\"passphrase\")\r\n\thashed := am.hashstring(pass)\r\n\r\n\tif am.checkpassphrase(hashed) {\r\n\t\tc := &http.Cookie{\r\n\t\t\tName: \"passphrase\",\r\n\t\t\tValue: am.Passphrase,\r\n\t\t}\r\n\t\thttp.SetCookie(w, c)\r\n\t\tam.logger.Printf(\"/Login: added Cookie %v\\n\", c)\r\n\t}\r\n}", "title": "" }, { "docid": "b81024616cdc3151800b369d034ffb51", "score": "0.61267644", "text": "func (c *APIClient) Login() error {\n\tlg := c.l.Lgr.With().Str(\"Mail Server\", \"Login\").Logger()\n\n\terr := c.api.Authenticate(c.apiKey, c.apiSecret)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tlg.Info().Msg(\"Successfully authenticated with the API layer\")\n\n\treturn nil\n}", "title": "" }, { "docid": "38c6f56ff410d42ccf849e8eb6e6e451", "score": "0.61239463", "text": "func (controller AuthController) Login(w http.ResponseWriter, r *http.Request) {\n\tbody, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\tresponse.Error(w, http.StatusUnprocessableEntity, err)\n\t\treturn\n\t}\n\n\tvar user model.User\n\terr = json.Unmarshal(body, &user)\n\tif err != nil {\n\t\tresponse.Error(w, http.StatusBadRequest, err)\n\t\treturn\n\t}\n\n\tstoredUser, err := controller.userRepository.FindByEmail(user.Email)\n\tif err != nil {\n\t\tresponse.Error(w, http.StatusInternalServerError, err)\n\t\treturn\n\t}\n\n\terr = security.Verify(storedUser.Password, user.Password)\n\tif err != nil {\n\t\tresponse.Error(w, http.StatusUnauthorized, err)\n\t\treturn\n\t}\n\n\ttoken, err := authentication.CreateToken(storedUser.ID)\n\tif err != nil {\n\t\tresponse.Error(w, http.StatusInternalServerError, err)\n\t\treturn\n\t}\n\n\tw.Write([]byte(token))\n\n}", "title": "" }, { "docid": "0a32e3c460e06bc3c40340414e87fd94", "score": "0.6117229", "text": "func (h *Handler) Login(w http.ResponseWriter, r *http.Request) (resp Response) {\n\tvar cred access.Credential\n\n\terr := json.NewDecoder(r.Body).Decode(&cred)\n\tif err != nil {\n\t\tresp.Error = &Error{\n\t\t\tCode: http.StatusBadRequest,\n\t\t\tMessage: \"invalid JSON data\",\n\t\t\tGoErr: err,\n\t\t}\n\t\treturn\n\t}\n\n\terr = validator.ValidateAccessCredential(cred)\n\tif err != nil {\n\t\tresp.Error = &Error{\n\t\t\tCode: http.StatusBadRequest,\n\t\t\tMessage: err.Error(),\n\t\t\tGoErr: err,\n\t\t}\n\t\treturn\n\t}\n\n\tdescr, err := h.registry.AccessService().Authenticate(cred)\n\tif err != nil {\n\t\tresp.Error = &Error{\n\t\t\tCode: http.StatusUnauthorized,\n\t\t\tMessage: \"access denied\",\n\t\t\tGoErr: err,\n\t\t}\n\t\treturn\n\t}\n\n\t// TODO: implements expiration in exp field.\n\ttoken := jwt.NewWithClaims(\n\t\tjwt.SigningMethodHS256,\n\t\tjwt.MapClaims{\n\t\t\t\"account_id\": descr.AccountID,\n\t\t\t\"account_cpf\": descr.CPF,\n\t\t\t\"account_name\": descr.Name,\n\t\t},\n\t)\n\n\tstrToken, err := token.SignedString([]byte(getTokenSecret()))\n\tif err != nil {\n\t\tresp.Error = &Error{\n\t\t\tCode: http.StatusInternalServerError,\n\t\t\tMessage: \"error on make jwt\",\n\t\t\tGoErr: err,\n\t\t}\n\t\treturn\n\t}\n\n\tresp.Value = tokenResponse{Token: strToken}\n\n\treturn\n}", "title": "" }, { "docid": "4658019b2002b3aaf8b363a2558303c6", "score": "0.6116792", "text": "func (c *LoginController) Login() {\n\tform := &models.LoginForm{}\n\thandleForm(form, &c.AuthController, func(r *APIResponse) {\n\t\tuser, err := lib.Authenticate(form.UserName, form.Password)\n\t\tif err != nil {\n\t\t\tr.Fail(\"\", err)\n\t\t\treturn\n\t\t}\n\t\tc.SetLogin(user)\n\t\tr.Success = true\n\t})\n}", "title": "" }, { "docid": "16cdfc183d0159d16759818296a62ea7", "score": "0.61111176", "text": "func (s *DefaultService) Login(ctx context.Context, user, pass string) (token string, err error) {\n\treturn s.repo.Auth(ctx, user, pass)\n}", "title": "" }, { "docid": "000e52b3c8ceebd5acc57a7d4d845d2d", "score": "0.6103231", "text": "func Login(w http.ResponseWriter, req *http.Request) {\n\tvar user models.User\n\n\treqBody, err := ioutil.ReadAll(req.Body)\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tw.Write([]byte(err.Error()))\n\t\treturn\n\t}\n\n\tjson.Unmarshal(reqBody, &user)\n\n\terr = libs.ValidateLoginForm(user.Email, user.Password, user.FirstName, user.LastName)\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tw.Write([]byte(err.Error()))\n\t\treturn\n\t}\n\n\tuserID, storedPwd, err := user.RetreiveIdAndHashedPwd(utils.GetServerFromReqContext(req).DB)\n\tif err != nil {\n\t\tif err == sql.ErrNoRows {\n\t\t\tw.WriteHeader(http.StatusNotFound)\n\t\t\tw.Write([]byte(\"User not found\"))\n\t\t\treturn\n\t\t} else {\n\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\tw.Write([]byte(err.Error()))\n\t\t\treturn\n\t\t}\n\t}\n\n\tisPwdMatch := libs.CheckHash(user.Password, storedPwd)\n\tif !isPwdMatch {\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tw.Write([]byte(\"Incorrect password\"))\n\t\treturn\n\t}\n\n\ttoken, err := utils.GenerateJWT(userID, user.Email, user.FirstName, user.LastName)\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tw.Write([]byte(err.Error()))\n\t\treturn\n\t}\n\n\tw.WriteHeader(http.StatusOK)\n\thttp.SetCookie(w, &http.Cookie{\n\t\tName: \"x-auth\",\n\t\tValue: token,\n\t\tExpires: time.Now().Add(2 * time.Hour),\n\t})\n\tw.Write([]byte(token))\n}", "title": "" }, { "docid": "d2b89ecbe9f6c6b812a1d6cd6ec60df4", "score": "0.60997343", "text": "func login(s *Services, w rest.ResponseWriter, r *rest.Request) {\n\tuser := r.Env[\"REMOTE_USER\"].(string)\n\n\t// login. generates token and stores in UserAuth.\n\tuserAuth, err := s.UserAuthService.Set(user)\n\n\tif err != nil {\n\t\tlog.Println(\"Login error: \" + err.Error())\n\t\trest.Error(w, \"Internal Server Error: \"+err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tlog.Println(\"Logged in: \" + user)\n\tw.WriteJson(userAuth)\n}", "title": "" }, { "docid": "adccd28f7ee99988498458879eed24ce", "score": "0.6071805", "text": "func (adapter HttpAdapter) login(w http.ResponseWriter, req *http.Request, _ httprouter.Params) {\n\tbody, err := ioutil.ReadAll(req.Body)\n\tdefer req.Body.Close()\n\tif err != nil {\n\t\thttp.Error(w, http.StatusText(http.StatusInternalServerError)+\" \"+err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tvar loginCredentials types.LoginCredentials\n\terr = json.Unmarshal(body, &loginCredentials)\n\tif err != nil {\n\t\thttp.Error(w, http.StatusText(http.StatusInternalServerError)+\" \"+err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tuserToken, err := Login(loginCredentials)\n\tif err != nil {\n\t\thttp.Error(w, http.StatusText(http.StatusUnauthorized)+\" \"+err.Error(), http.StatusUnauthorized)\n\t\treturn\n\t}\n\n\tresponse, err := json.Marshal(userToken)\n\tif err != nil {\n\t\thttp.Error(w, http.StatusText(http.StatusInternalServerError)+\" \"+err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\tw.Header().Set(\"content-type\", \"application/json\")\n\tw.Write(response)\n}", "title": "" }, { "docid": "98205a48fcfc35d6b4740fb2a14c5ce2", "score": "0.60701114", "text": "func (client *QbClient) Login(ctx context.Context) error {\n\n\t// Build the URL\n\turl := client.baseURL\n\turl.Path = \"/api/v2/auth/login\"\n\tquery := url.Query()\n\tquery.Add(\"username\", client.username)\n\tquery.Add(\"password\", client.password)\n\turl.RawQuery = query.Encode()\n\n\t// Create the request\n\treq, err := http.NewRequest(http.MethodGet, url.String(), nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Add needed header\n\treq.Header.Add(\"Referer\", url.String())\n\n\t// Setup a context for handling timeout\n\treq = req.WithContext(ctx)\n\n\t// Perform the request\n\tres, err := http.DefaultClient.Do(req)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Check the status code\n\tif res.StatusCode == http.StatusForbidden {\n\t\treturn ErrForbidden\n\t}\n\n\t// Get the cookies\n\tcookies := res.Cookies()\n\tif len(cookies) > 0 {\n\t\tfor _, cookie := range cookies {\n\t\t\tif cookie.Name == \"SID\" {\n\t\t\t\tclient.cookie = cookie.Value\n\t\t\t\treturn nil\n\t\t\t}\n\t\t}\n\t}\n\n\treturn ErrLogin\n}", "title": "" }, { "docid": "ce3368552a79d6e6a181be95a226b360", "score": "0.6067444", "text": "func Login(ctx *fiber.Ctx) error {\n\tloginData := new(LoginData)\n\n\t// Parse body (input data)\n\tif err := ctx.BodyParser(loginData); err != nil {\n\t\tlog.Println(err.Error())\n\t\treturn ctx.Status(400).JSON(map[string]string{\n\t\t\t\"error\": \"Cannot parse JSON\",\n\t\t})\n\t}\n\n\t// Validate email & password\n\tif len(loginData.Email) == 0 || len(loginData.Password) == 0 {\n\t\treturn ctx.Status(400).JSON(map[string]string{\n\t\t\t\"error\": \"Empty email or password\",\n\t\t})\n\t}\n\n\t// Get id, email, password from database\n\tresult, err := db.Query(\"SELECT id, username, email, password FROM users WHERE email = ?\", loginData.Email)\n\tif err != nil {\n\t\tlog.Println(err.Error())\n\t\treturn ctx.Status(500).JSON(map[string]string{\n\t\t\t\"error\": \"Internal server error\",\n\t\t})\n\t}\n\n\t// Process data from database\n\tisUserExist := false\n\tvar userID int\n\tvar username string\n\tvar userEmail string\n\tvar userPassword string\n\tfor result.Next() {\n\t\tif err = result.Scan(&userID, &username, &userEmail, &userPassword); err != nil {\n\t\t\tlog.Println(err)\n\t\t\treturn ctx.Status(500).JSON(map[string]string{\n\t\t\t\t\"error\": \"Internal server error\",\n\t\t\t})\n\t\t}\n\n\t\tisUserExist = true\n\t}\n\n\t// Authenticate email and password\n\tif !isUserExist || !compareHashAndPassword(loginData.Password, userPassword) {\n\t\treturn ctx.Status(401).JSON(map[string]string{\n\t\t\t\"error\": \"Bad credentials\",\n\t\t})\n\t}\n\n\t// Create access token\n\taccessTokenString, err := generateAccessToken(userID, username, userEmail)\n\tif err != nil {\n\t\tlog.Println(err.Error())\n\t\treturn ctx.SendStatus(500)\n\t}\n\n\t// Create refresh token\n\trefreshTokenString, err := generateRefreshToken(userID, username, userEmail)\n\tif err != nil {\n\t\tlog.Println(err.Error())\n\t\treturn ctx.SendStatus(500)\n\t}\n\n\treturn ctx.Status(200).JSON(map[string]string{\n\t\t\"accessToken\": accessTokenString,\n\t\t\"refreshToken\": refreshTokenString,\n\t\t\"username\": username,\n\t\t\"email\": userEmail,\n\t})\n}", "title": "" }, { "docid": "adf06f208dd1cbeca2ac1b8d53bdebd7", "score": "0.60655516", "text": "func Login(w http.ResponseWriter, r *http.Request) {\n\t//fmt.Println(\"login\")\n\ttools.SetHeader2(w,r)\n\tif r.Method != \"POST\" {\n\t\treturn\n\t}\n\tvar account data.Account2\n\tbody, _ := ioutil.ReadAll(r.Body)\n\terr := json.Unmarshal(body, &account)\n\tif tools.HandleError(\"unmarshal in singin \", err, 1) {\n\t\ttools.WriteJson(w, unknowerr)\n\t\treturn\n\t}\n\t//return result include othererror,disable,enable\n\tres := database.CheckLoginPassword(account)\n\tif res == enable {\n\t\tcreateVtify(account.Name,w,r)\n\t}\n\ttools.WriteJson(w, res)\n}", "title": "" }, { "docid": "a779f601448f4dac66141ab7dd0112fb", "score": "0.60638297", "text": "func Login(host, token string, doc LoginData) (*map[string]interface{}, error) {\n\tpath := variables.APIPathLogin\n\treturn easyreq.GenericRequest(host, path, token, doc)\n}", "title": "" }, { "docid": "a4d7803533399c923cbd145486ef9ed8", "score": "0.60605526", "text": "func (a *Auth) Login(request events.APIGatewayProxyRequest) (events.APIGatewayProxyResponse, error) {\n\tuser, err := LoginUser(request.Body)\n\tif err != nil {\n\t\treturn common.APIError(http.StatusBadRequest, err)\n\t}\n\treturn common.APIResponse(user, http.StatusOK)\n}", "title": "" }, { "docid": "65e5acac60bd52234b34559cb9cc720d", "score": "0.6057071", "text": "func (server *Server) Login(w http.ResponseWriter, r *http.Request) {\n\tbody, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\tresponses.ERROR(w, http.StatusUnprocessableEntity, err)\n\t\treturn\n\t}\n\tmerchant := Merchant{}\n\terr = json.Unmarshal(body, &merchant)\n\tif err != nil {\n\t\tresponses.ERROR(w, http.StatusUnprocessableEntity, err)\n\t\treturn\n\t}\n\ttoken, err := auth.CreateToken(merchant.ID)\n\tif err != nil {\n\t\tresponses.ERROR(w, http.StatusUnprocessableEntity, errors.New(constants.UnableToCreateJWTToken))\n\t\treturn\n\t}\n\tresponses.JSON(w, http.StatusOK, token)\n}", "title": "" }, { "docid": "d966d1adbfbad082a86aeff61b95d225", "score": "0.60568786", "text": "func Login(c *gin.Context) {\n\trequest := &RequestLogin{}\n\terr := c.BindJSON(request)\n\tif err != nil {\n\t\tlogging.Error(err)\n\t\tc.JSON(http.StatusOK, &CommonResponse{Ok: false, Msg: \"invalid request\"})\n\t\treturn\n\t}\n\n\tuid, b := manager.VerifyUserPassword(request.Username, request.Password)\n\n\tif !b {\n\t\tc.JSON(http.StatusOK, &CommonResponse{Ok: false, Msg: \"fail to login; invalid username and password\"})\n\t\treturn\n\t}\n\n\ttk, err := token.GenerateToken(uid)\n\tif err != nil {\n\t\tlogging.Error(err)\n\t\tc.JSON(http.StatusOK, &CommonResponse{Ok: false, Msg: \"internal error: fail to generate token\"})\n\t\treturn\n\t}\n\n\tmanager.RegisterUser(uid)\n\n\tc.JSON(http.StatusOK, &LoginResponse{Ok: true, Token: tk})\n}", "title": "" }, { "docid": "4730c5e48da0ed91fd5e3098a4458e05", "score": "0.6046744", "text": "func doLogin(\n\tw http.ResponseWriter, r *http.Request,\n\tu models.IUserModel, session session.ISession,\n) {\n\tvar name, tPassword, code string\n\terrors := make([]string, 0)\n\tif name = r.FormValue(\"name\"); name == \"\" {\n\t\terrors = append(errors, \"Name is required.\")\n\t}\n\tif tPassword = r.FormValue(\"password\"); tPassword == \"\" {\n\t\terrors = append(errors, \"Password is required.\")\n\t}\n\tif code = r.FormValue(\"code\"); code == \"\" {\n\t\terrors = append(errors, \"Code is required.\")\n\t}\n\tif len(errors) > 0 {\n\t\tmsg := url.QueryEscape(strings.Join(errors, \"|\"))\n\t\thttp.Redirect(w, r, fmt.Sprintf(\"%s?error=%s\", LOGIN_RTE, msg), 303)\n\t\treturn\n\t}\n\tuser, err := u.GetUserByName(name)\n\teMsg := url.QueryEscape(\"Could not find record for name, password, or code.\")\n\tif user == nil || err != nil {\n\t\thttp.Redirect(w, r, fmt.Sprintf(\"%s?error=%s\", LOGIN_RTE, eMsg), 303)\n\t\treturn\n\t}\n\tif !ComparePassword(user.Salt, tPassword, user.Password) {\n\t\thttp.Redirect(w, r, fmt.Sprintf(\"%s?error=%s\", LOGIN_RTE, eMsg), 303)\n\t\treturn\n\t}\n\tif verified := VerifyCode(user.QR_Secret, code); !verified {\n\t\thttp.Redirect(w, r, fmt.Sprintf(\"%s?error=%s\", LOGIN_RTE, eMsg), 303)\n\t\treturn\n\t}\n\tsession.Set(\"logged_in\", \"true\")\n\tsession.Set(\"user_id\", strconv.FormatInt(user.ID, 10))\n\tsession.Set(\"ajax_token\", generateAjaxToken())\n\thttp.SetCookie(w, session.GetCookie())\n\thttp.Redirect(w, r, PASSWORDS_RTE, 302)\n}", "title": "" }, { "docid": "01e4349caca2ca247593df870a8b74ed", "score": "0.6045083", "text": "func Login(opts *LoginOptions) (code string, verifier *PKCEVerifier, err error) {\n\tif opts == nil || opts.OAuth == nil {\n\t\treturn \"\", nil, ErrMissingOAuthConfig\n\t}\n\n\t// set redirect URL\n\topts.OAuth.RedirectURL = \"http://\" + opts.ListenAddr + \"/auth\"\n\n\t// setup handler for specified state\n\tstate := rand.Hex(common.StateLen)\n\thandler, codeChan := newLoginHandler(state)\n\n\t// start server\n\tserver := &http.Server{Addr: opts.ListenAddr, Handler: handler, ReadHeaderTimeout: 2 * time.Second}\n\tgo startServer(server)\n\tdefer func() {\n\t\tif closeErr := server.Close(); closeErr != nil && err == nil {\n\t\t\terr = fmt.Errorf(\"failed to close OAuth 2 redirect server: %w\", closeErr)\n\t\t}\n\t}()\n\n\t// default to getting a refresh token\n\toptAccessType := oauth2.AccessTypeOffline\n\tif opts.NoRefreshToken {\n\t\toptAccessType = oauth2.AccessTypeOnline\n\t}\n\n\t// construct auth code options\n\tauthCodeOpts := []oauth2.AuthCodeOption{\n\t\toptAccessType,\n\t\toauth2.SetAuthURLParam(\"prompt\", \"consent\"),\n\t}\n\n\t// setup PKCE\n\tif !opts.NoPKCE {\n\t\tverifier = NewPKCEVerifier()\n\t\tauthCodeOpts = append(authCodeOpts, verifier.AuthOpts()...)\n\t}\n\n\t// print URL and open browser for user to authorize\n\tauthURL := opts.OAuth.AuthCodeURL(state, authCodeOpts...)\n\tlog.Printf(\"Click link to authorize Indent Command Line: %s\", authURL)\n\tgo openBrowser(authURL)\n\n\t// wait to receive code\n\tcode = <-codeChan\n\treturn code, verifier, err\n}", "title": "" }, { "docid": "c7312cdf81b2f8a2a3fe3ea40c67e0c2", "score": "0.6040702", "text": "func Login(name, url, realm, clientID, secretKey, user, password string, skipVerify bool) error {\n\tsessionRepository := jsonfile.NewJSONFileSessionRepository()\n\tsessionProvider := keycloak.NewKeycloakSessionProvider()\n\tsessionService := core.NewSessionService(sessionRepository, sessionProvider)\n\n\tvar err error\n\tif secretKey != \"\" {\n\t\t_, err = sessionService.CreateWithClientSecret(name, url, realm, clientID, secretKey, skipVerify)\n\t} else {\n\t\t_, err = sessionService.CreateWithUsernamePassword(name, url, realm, clientID, user, password, skipVerify)\n\t}\n\n\tif err != nil {\n\t\treturn err\n\t}\n\tfmt.Printf(\"Created session '%s'.\\nYour session was stored unencrypted in %s\\n\"+\n\t\t\"When you are done, you can end the session by using the 'logout' command.\\n\",\n\t\tname, jsonfile.PathFromName(name))\n\n\treturn nil\n}", "title": "" }, { "docid": "9870db01363066c30bee94cd8cc59371", "score": "0.602449", "text": "func handleLogin(w http.ResponseWriter, r *http.Request) {\n\t// build authorization server endpoint url using state string\n\tlog.Println(googleOauthConfig)\n\turl := googleOauthConfig.AuthCodeURL(oauthStateString)\n\t// redirect user to authorization server endpoint\n\thttp.Redirect(w, r, url, http.StatusTemporaryRedirect)\n}", "title": "" }, { "docid": "f393810273dc29afc1310978158f05e2", "score": "0.60188955", "text": "func Login(client *http.Client, username string, password string) error {\n\tresp, err := client.PostForm(api+\"/login\",\n\t\turl.Values{\"username\": {username}, \"password\": {password}})\n\tif err != nil {\n\t\tlog.Fatal(\"Failed to login to OpenBazaar.\")\n\t\treturn err\n\t}\n\tdec := json.NewDecoder(resp.Body)\n\tvar r response\n\tdec.Decode(&r)\n\tif !r.Success {\n\t\treturn errors.New(\"Failed to login to OpenBazaar.\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "df67f26ba6c6db12ed8528d705b206ca", "score": "0.6010278", "text": "func (asp *serviceProvider) Login() (string, error) {\n\tcli := pb.NewAuthClient(asp.Conn)\n\tloginReq := &pb.LoginRequest{\n\t\tEmail: \"david@lcarrascal.com\",\n\t\tPassword: \"1\",\n\t}\n\tsvcResp, err := cli.Login(asp.Ctx, loginReq)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn svcResp.User.Email, nil\n}", "title": "" }, { "docid": "040f6d3edf0b5ec90e546fe284c02f30", "score": "0.60061413", "text": "func Login(c *gin.Context) {\n\tres := protocol.Response{}\n\tvar input LoginPersonInput\n\n\tif err := c.Bind(&input); err != nil {\n\t\tlog.Println(err)\n\t\tc.JSON(http.StatusBadRequest, res)\n\t\treturn\n\n\t}\n\n\t//傳入輸入參數檢查是否存在資料庫,並比對帳號密碼\n\tu, err := SearchLoginData(input.Account, input.Password)\n\n\tif err != nil {\n\t\tc.JSON(http.StatusInternalServerError, protocol.SomethingWrongRes(err))\n\t\treturn\n\t}\n\n\t//不吻合 則 回傳錯誤信息\n\tif u == nil {\n\n\t\tres.Result = nil\n\t\tres.Code = 2\n\t\tres.Message = \"Login Failed\"\n\t\tc.JSON(http.StatusBadRequest, res)\n\t\treturn\n\n\t}\n\n\tres.Result = nil\n\tc.JSON(http.StatusOK, res)\n\n\tfmt.Println(\"--------------------------End--------------------------\")\n\n\treturn\n}", "title": "" }, { "docid": "d4805e9384c975c7c19e267ee561b1fe", "score": "0.600246", "text": "func (service *AuthService) Login(ctx context.Context, req *pb.LoginRequest) (*pb.LoginResponse, error) {\n\n\tuser, err := service.userStorage.GetByUsername(req.GetUsername())\n\tif err != nil {\n\t\treturn nil, status.Errorf(codes.Internal, \"cannot find user: %v\", err)\n\t}\n\n\tif user == nil || !user.CheckPassword(req.GetPassword()) {\n\t\treturn nil, status.Errorf(codes.NotFound, \"incorrect username/password\")\n\t}\n\n\taccessToken, err := service.jwtManager.Generate(user.ID, service.jwtManager.accessTokenDuration)\n\tif err != nil {\n\t\treturn nil, status.Errorf(codes.Internal, \"cannot generate access token\")\n\t}\n\n\trefreshToken, err := service.jwtManager.Generate(user.ID, service.jwtManager.refreshTokenDuration)\n\tif err != nil {\n\t\treturn nil, status.Errorf(codes.Internal, \"cannot generate refresh token\")\n\t}\n\n\tres := &pb.LoginResponse{\n\t\tAccessToken: accessToken,\n\t\tRefreshToken: refreshToken,\n\t\tUserId: user.ID,\n\t}\n\treturn res, nil\n}", "title": "" }, { "docid": "57fd55d73a5265a6e3fcc3272887acba", "score": "0.59959006", "text": "func (c *Client) Login(username, password string) error {\n\ttype Response struct {\n\t\tData Authentication `json:\"data\"`\n\t\tStatus string `json:\"status\"`\n\t}\n\n\tres, err := resty.R().\n\t\tSetBody(UserCredentials{\n\t\t\tusername,\n\t\t\tpassword,\n\t\t}).\n\t\tSetResult(Response{}).\n\t\tPost(fmt.Sprintf(\"%s/api/v1/login\", c.URL))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\td, ok := res.Result().(*Response)\n\tif !ok {\n\t\tlog.Debugf(\"%v\", string(res.Body()))\n\t\treturn ErrInvalidAPIResponse\n\t}\n\n\tif d.Status != \"success\" {\n\t\treturn ErrNotSuccessful\n\t}\n\n\tc.auth = d.Data\n\treturn nil\n}", "title": "" }, { "docid": "cfa655bdad75a50b2e99abb5aa6881fd", "score": "0.59906", "text": "func (c *Client) Login() (err error) {\n\t// If we're already logged in, return an error (must logout first)\n\tif c.creds.IsLoggedIn() {\n\t\treturn ErrLoggedIn\n\t}\n\n\t// Build data request\n\tdata := &todos.LoginRequest{\n\t\tUsername: c.creds.Username,\n\t\tPassword: c.creds.Password,\n\t\tNoCookie: true,\n\t}\n\n\tif data.Username == \"\" {\n\t\tdata.Username = Prompt(\"username\", \"\")\n\t}\n\n\tif data.Password == \"\" {\n\t\tif data.Password, err = PromptPassword(\"password\", true, false); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// Execute the data request\n\tvar req *http.Request\n\tif req, err = c.NewRequest(http.MethodPost, \"/login\", false, data); err != nil {\n\t\treturn err\n\t}\n\n\tvar status int\n\tvar tokens *todos.LoginResponse\n\tif status, err = c.Do(req, &tokens); err != nil {\n\t\treturn err\n\t}\n\n\t// Handle the error if we don't get an ok or a success message\n\tif status != http.StatusOK || !tokens.Success {\n\t\treturn StatusError(status, tokens.Error)\n\t}\n\n\t// Set the tokens on the credentials and save them to disk\n\tif err = c.creds.SetTokens(tokens); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a6c0d3877f7975a700c1da0ce7927ef0", "score": "0.59806144", "text": "func (s *Server) AuthLogin(w http.ResponseWriter, r *http.Request) {\r\n\r\n\tsession, err := sess.GetSessionFromStore(s.cookieStore, r)\r\n\tif err != nil {\r\n\t\thttputil.WriteSessionError(w)\r\n\t\treturn\r\n\t}\r\n\r\n\tusername := sess.GetUserNameFromCtx(r.Context())\r\n\r\n\ts.dbStore.LoggedDB.Logout(username) // we are authorized, do forced login\r\n\tloggedu, err := s.dbStore.LoggedDB.Login(username)\r\n\tif err != nil {\r\n\t\thttputil.WriteError(w, err, http.StatusForbidden)\r\n\t\treturn\r\n\t}\r\n\r\n\tif storedU, err := s.dbStore.UserDB.Get(loggedu.UserName); err == nil {\r\n\t\tloggedu.UserStatus = storedU.UserStatus\r\n\t\ts.dbStore.LoggedDB.Update(loggedu)\r\n\t}\r\n\r\n\tsession.Values[constants.SessionUserName] = loggedu.UserName\r\n\tsession.Values[constants.SessionLoginToken] = loggedu.LoginToken\r\n\r\n\tif err := session.Save(r, w); err != nil {\r\n\t\thttputil.WriteSessionError(w)\r\n\t\treturn\r\n\t}\r\n\r\n\tuserToReturn := models.NewUserWithStatus(loggedu.User, loggedu.UserStatus)\r\n\r\n\tif err := json.NewEncoder(w).Encode(userToReturn); err != nil {\r\n\t\thttputil.WriteError(w, err, http.StatusInternalServerError)\r\n\t\treturn\r\n\t}\r\n}", "title": "" }, { "docid": "d983e07fb35dc11787ee554b1fed0e7d", "score": "0.597919", "text": "func (p *PCE) login(authToken string) (UserLogin, APIResponse, error) {\n\tvar login UserLogin\n\tvar response APIResponse\n\n\t// Check if we have either authToken or API user and key\n\tif authToken == \"\" && (p.User == \"\" || p.Key == \"\") {\n\t\treturn login, response, fmt.Errorf(\"either auth token or PCE User and Key must be provided\")\n\t}\n\n\t// Build the API URL\n\tapiURL, err := url.Parse(\"https://\" + p.cleanFQDN() + \":\" + strconv.Itoa(p.Port) + \"/api/v2/users/login\")\n\tif err != nil {\n\t\treturn login, response, fmt.Errorf(\"login error - %s\", err)\n\t}\n\n\t// Create HTTP client and request\n\tclient := &http.Client{}\n\n\t// Create the http transport obect\n\thttpTransport := &http.Transport{}\n\tif p.DisableTLSChecking {\n\t\thttpTransport.TLSClientConfig = &tls.Config{InsecureSkipVerify: true}\n\t}\n\tif p.Proxy != \"\" {\n\t\tproxyUrl, err := url.Parse(p.Proxy)\n\t\tif err != nil {\n\t\t\treturn login, response, err\n\t\t}\n\t\thttpTransport.Proxy = http.ProxyURL(proxyUrl)\n\t}\n\n\t// Add to the client\n\tclient.Transport = httpTransport\n\n\treq, err := http.NewRequest(\"GET\", apiURL.String(), nil)\n\tif err != nil {\n\t\treturn login, response, fmt.Errorf(\"login error - %s\", err)\n\t}\n\n\t// Set headers\n\treq.Header.Set(\"Content-Type\", \"application/json\")\n\n\t// If auth token is provided, set header. If auth token is empty, set user/key to receive org info\n\tif authToken != \"\" {\n\t\treq.Header.Set(\"Authorization\", \"Token token=\"+authToken)\n\t} else {\n\t\treq.SetBasicAuth(p.User, p.Key)\n\t}\n\n\t// Make HTTP Request\n\tresp, err := client.Do(req)\n\tif err != nil {\n\t\treturn login, response, fmt.Errorf(\"login error - %s\", err)\n\t}\n\n\t// Process response\n\tdata, err := io.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn login, response, fmt.Errorf(\"login error - %s\", err)\n\t}\n\n\t// Put relevant response info into struct\n\tresponse.RespBody = string(data[:])\n\tresponse.StatusCode = resp.StatusCode\n\tresponse.Header = resp.Header\n\tresponse.Request = resp.Request\n\n\t// Check for a 200 response code\n\tif strconv.Itoa(resp.StatusCode)[0:1] != \"2\" {\n\t\treturn login, response, errors.New(\"login error - http status code of \" + strconv.Itoa(response.StatusCode))\n\t}\n\n\t// Put relevant response info into struct\n\tjson.Unmarshal(data, &login)\n\n\treturn login, response, nil\n\n}", "title": "" }, { "docid": "f369d363206f13687d47cec6d91ac66f", "score": "0.5977741", "text": "func (s *Client) Login() (*Client, error) {\n\tvar (\n\t\terr error\n\t\tcontent []byte\n\t)\n\n\tif content, err = s.getToken(); err == nil {\n\n\t\tif json.Unmarshal(content, s); s.Error != \"\" {\n\t\t\terr = fmt.Errorf(\"error: %s - desc: %s\", s.Error, s.ErrorDesc)\n\t\t}\n\t}\n\treturn s, err\n}", "title": "" }, { "docid": "93b6fd7c9210c790b79fe975b6b2a283", "score": "0.59729123", "text": "func Login(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Add(\"content-type\", \"application/json\")\n\n\tvar user models.User\n\n\terr := json.NewDecoder(r.Body).Decode(&user)\n\n\tif err != nil {\n\t\thttp.Error(w, \"Email and/or password wrong \"+err.Error(), 400)\n\t\treturn\n\t}\n\n\tif len(user.Email) == 0 {\n\t\thttp.Error(w, \"Email required\", 400)\n\t\treturn\n\t}\n\n\tdocument, exist := db.TryLogin(user.Email, user.Password)\n\n\tif exist == false {\n\t\thttp.Error(w, \"Email and/or password wrong\", 400)\n\t\treturn\n\t}\n\n\tjwtKey, err := jwt.GenerateJWT(document)\n\n\tif err != nil {\n\t\thttp.Error(w, \"Can´t generate jwt \"+err.Error(), 400)\n\t\treturn\n\t}\n\n\tresp := models.LoginResponse{\n\t\tToken: jwtKey,\n\t}\n\n\tw.Header().Set(\"content-type\", \"application/json\")\n\tw.WriteHeader(http.StatusCreated)\n\n\tjson.NewEncoder(w).Encode(resp)\n\n\t//Save the jwt in a cookie\n\texpirationTime := time.Now().Add(24 * time.Hour)\n\n\thttp.SetCookie(w, &http.Cookie{\n\t\tName: \"token\",\n\t\tValue: jwtKey,\n\t\tExpires: expirationTime,\n\t})\n}", "title": "" }, { "docid": "6f40519aedcf11ec7e3b1c6df42422d1", "score": "0.5967173", "text": "func LinkedinLogin(w http.ResponseWriter, r *http.Request) {\n\tsession := context.Get(r, \"session\").(*sessions.Session)\n\tsession.Values[\"oauth_redirect\"] = r.Referer()\n\tsession.Save(r, w)\n\thttp.Redirect(w, r, inConfig().AuthCodeURL(oauthState), 303)\n}", "title": "" }, { "docid": "8d93a9e3f7da7a370df5e46dd19474ac", "score": "0.59665745", "text": "func (client *AuthClient) Login() (string, bool) {\n\tctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)\n\tdefer cancel()\n\n\treq := &fb.LoginRequest{\n\t\tUsername: client.username,\n\t\tPassword: client.password,\n\t}\n\n\tres, err := client.service.Login(ctx, req)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to login: %v\", err)\n\t}\n\n\treturn res.GetToken(), true\n}", "title": "" }, { "docid": "40f99474c3a68e220a2f293e87287be4", "score": "0.5962924", "text": "func (s *SessionClient) Login(ctx context.Context, email, passphrase string) error {\n\tlogin := apitypes.Login{\n\t\tEmail: email,\n\t\tPassphrase: passphrase,\n\t}\n\treq, _, err := s.client.NewRequest(\"POST\", \"/login\", nil, &login, false)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t_, err = s.client.Do(ctx, req, nil, nil, nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n\n}", "title": "" }, { "docid": "678ef70210e0fd2defa1d08c730f3161", "score": "0.59578556", "text": "func Login(username string, APIKey string) {\n\tCredentials.Username = username\n\tCredentials.APIKey = APIKey\n}", "title": "" }, { "docid": "8692a042aa9654b73cddafdd8987a972", "score": "0.5955746", "text": "func Login (c buffalo.Context) error {\n\treq := &loginRequest{}\n\n\tif err := c.Bind(req); err != nil {\n\t\treturn err\n\t}\n\n\ttx, ok := c.Value(\"tx\").(*pop.Connection)\n\n\tif !ok {\n\t\treturn errors.New(\"Internal Server Error\")\n\t}\n\n\tu := &models.User{}\n\n\tif err := tx.Where(\"email = ?\", req.Email).First(u); err != nil {\n\t\treturn err;\n\t}\n\n\tif err := bcrypt.CompareHashAndPassword(u.PasswordHash, []byte(req.Password)); err != nil {\n\t\tc.Render(404, r.JSON(map[string]interface{}{\n\t\t\t\"error\": map[string]interface{}{\n\t\t\t\t\"message\": \"The email and password did not match any users in our system.\",\n\t\t\t},\n\t\t}))\n\n\t\treturn nil\n\t}\n\n\tc.Set(\"user\", u)\n\n\trt, at, err := createTokens(c, req.RememberMe)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tc.Render(200 ,r.JSON(map[string]interface{}{\n\t\t\"refresh_token\": rt,\n\t\t\"access_token\": at,\n\t\t\"user\": u,\n\t}))\n\n\treturn nil\n}", "title": "" }, { "docid": "0ebc094d1bc9296f4dbcde26a15a127e", "score": "0.59555495", "text": "func handleLogin(c *gin.Context) {\n\tconsentRequestID := c.Query(\"login_challenge\")\n\n\t// Is it a POST request?\n\tif c.Request.Method == \"POST\" {\n\t\tusername := c.PostForm(\"username\")\n\t\tpass := c.PostForm(\"password\")\n\n\t\t// TODO Check the user's credentials\n\t\tif \"test\" != username || \"password\" != pass{\n\t\t\tc.JSON(http.StatusBadRequest, gin.H{\"error\": \"Provided credentials are wrong, try test:password\"})\n\t\t\treturn\n\t\t}\n\n\t\taccRequest, response, err := client.AcceptLoginRequest(consentRequestID, swagger.AcceptLoginRequest{\n\t\t\tSubject: username,\n\t\t})\n\t\tif err != nil {\n\t\t\tc.JSON(http.StatusBadRequest, gin.H{\"error\": errors.Wrap(err, \"The accept login request endpoint does not respond\").Error()})\n\t\t\treturn\n\t\t} else if response.StatusCode != http.StatusOK {\n\t\t\tc.JSON(http.StatusBadRequest, gin.H{\"error\": errors.Wrapf(err, \"Consent accept login gave status code %d but expected %d\", response.StatusCode, http.StatusOK).Error()})\n return\n\t\t}\n\t\t// Let's create a session where we store the user id. We can ignore errors from the session store\n\t\t// as it will always return a session!\n\t\tsession, _ := store.Get(c.Request, sessionName)\n\t\tsession.Values[\"user\"] = fmt.Sprintf(\"%s-%s\", username, pass)\n\n\t\t// Store the session in the cookie\n\t\tif err := store.Save(c.Request, c.Writer, session); err != nil {\n\t\t\tc.JSON(http.StatusBadRequest, gin.H{\"error\": errors.Wrap(err, \"Could not persist cookie\").Error()})\n\t\t\treturn\n\t\t}\n\n\t\t// Redirect the user back to the consent endpoint. In a normal app, you would probably\n\t\t// add some logic here that is triggered when the user actually performs authentication and is not\n\t\t// part of the consent flow.\n\t\t//http.Redirect(w, r, \"/consent?consent=\"+consentRequestID, http.StatusFound)\n\t\thttp.Redirect(c.Writer, c.Request, accRequest.RedirectTo, http.StatusFound)\n\t\treturn\n\t} // end if post\n\n\t// It's a get request, so let's render the template\n\tc.HTML(http.StatusOK, \"login.tmpl\", consentRequestID)\n}", "title": "" }, { "docid": "4a907dba7fddc06f33bb9973de7f37cf", "score": "0.59463763", "text": "func (self *BaseHandler) handleLogin(writer http.ResponseWriter, request *http.Request) {\n resp := httputil.Response{}\n loginSpec := auth.LoginSpec{}\n if err := httputil.ReadEntity(request, &loginSpec); err != nil {\n resp.Code = http.StatusBadRequest\n httputil.WriteJSONResponse(writer, resp)\n return\n }\n\n log.Debugf(\"login spec: %+v\", loginSpec)\n\n user := models.User{Username: loginSpec.Username, Password: loginSpec.Password}\n // check user exist\n exist, _ := dao.CheckUserExist(&user)\n if !exist {\n errorInfo := fmt.Sprintf(\"user: %s doesn't exist. please register first\", user.Username)\n resp.Code = http.StatusUnauthorized\n resp.Err = errorInfo\n httputil.WriteJSONResponse(writer, resp)\n return\n }\n\n // check the password\n isOk, _ := dao.CheckUserPassword(&user)\n if !isOk {\n resp.Code = http.StatusUnauthorized\n resp.Err = \"user password is incorrect\"\n httputil.WriteJSONResponse(writer, resp)\n return\n }\n\n // get the full information of the user from DAO(Data Access Object)\n currentUser, _ := dao.GetUser(&user)\n // invoke the token manager to generate the token\n loginResponse, err := self.tManager.Generate(currentUser)\n if err != nil {\n resp.Code = http.StatusInternalServerError\n resp.Err = err.Error()\n httputil.WriteJSONResponse(writer, resp)\n return\n }\n\n // all things goes well\n resp.Code = http.StatusOK\n resp.Results = loginResponse\n httputil.WriteJSONResponse(writer, resp )\n}", "title": "" }, { "docid": "33667007e9c365ed8f727114c88fce28", "score": "0.594427", "text": "func loginHandler(rw http.ResponseWriter, r *http.Request) {\n\tsession, _ := store.Get(r, \"auth\")\n log.WithFields(log.Fields{\n \"session\": session.Values,\n \"host\": r.Host,\n }).Debug(\"in loginHandler\")\n s := \"\"\n if r.Header.Get(\"X-FORWARDED-PROTO\") == \"https\" { s = \"s\" }\n\tif _, ok := session.Values[\"state\"]; ok {\n\t\tauthURL := conf.GitHub.Authurl +\n\t\t\t\"?client_id=\" + url.QueryEscape(conf.GitHub.ClientID) +\n\t\t\t\"&redirect_uri=\" + url.QueryEscape(fmt.Sprintf(\"http%s://%s/_callback\", s, conf.Server.Fqdn)) +\n\t\t\t\"&scope=\" + url.QueryEscape(conf.GitHub.Scope) +\n\t\t\t\"&state=\" + url.QueryEscape(session.Values[\"state\"].(string))\n\t\thttp.Redirect(rw, r, authURL, http.StatusFound)\n\t\treturn\n\t}\n\thttp.Error(rw, \"invalid state\", 400)\n}", "title": "" }, { "docid": "cccf2a3da117a5b9088e69b02da4149b", "score": "0.59324807", "text": "func Login(s account.Service) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tvar loginReq account.AccountCredentials\n\t\terr := json.NewDecoder(r.Body).Decode(&loginReq)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"%s: %v\", LoginErrCode, err)\n\t\t\tresp := &je.Response{\n\t\t\t\tCode: LoginErrCode,\n\t\t\t\tMessage: err.Error(),\n\t\t\t}\n\t\t\tje.Error(r, w, resp, http.StatusBadRequest)\n\t\t\treturn\n\t\t}\n\n\t\ttoken, err := s.LogIn(r.Context(), loginReq)\n\t\tif err != nil {\n\t\t\t// do not track failed log in attempts\n\t\t\tresp := &je.Response{\n\t\t\t\tCode: LoginErrCode,\n\t\t\t\tMessage: err.Error(),\n\t\t\t\tSkipTrack: true,\n\t\t\t}\n\t\t\tje.Error(r, w, resp, account.ServiceToHTTPErrorMap(err))\n\t\t\treturn\n\t\t}\n\n\t\tt := tokenResponse{\n\t\t\tToken: token,\n\t\t}\n\n\t\t// return logged in account\n\t\tw.WriteHeader(http.StatusOK)\n\t\terr = json.NewEncoder(w).Encode(t)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"%s: %v\", LoginErrCode, err)\n\t\t\tresp := &je.Response{\n\t\t\t\tCode: LoginErrCode,\n\t\t\t\tMessage: err.Error(),\n\t\t\t}\n\t\t\tje.Error(r, w, resp, http.StatusBadRequest)\n\t\t\treturn\n\t\t}\n\n\t\tlog.Printf(\"successfully logged in email %s\", loginReq.Email)\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "fe09fe89a1e84966c5ad678e912b4366", "score": "0.59251964", "text": "func (context *HTTP) HandleLogin(w http.ResponseWriter, r *http.Request) {\n\tsession, _ := context.store.Get(r, \"letmein-session\")\n\n\tif auth, ok := session.Values[\"authenticated\"].(bool); ok && auth {\n\t\tlog.Debug(\"Authenticated user visited login\")\n\t\tw.Header().Add(\"location\", \"/profile\")\n\t\tw.WriteHeader(302)\n\t\treturn\n\t} else {\n\t\tif r.Method == \"POST\" {\n\t\t\tr.ParseForm()\n\n\t\t\tif session.Values[\"csrf-token\"] != r.PostFormValue(\"csrftoken\") {\n\t\t\t\tw.Header().Add(\"location\", \"\")\n\t\t\t\tw.WriteHeader(302)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tif ok, user := context.authenticate(r.PostFormValue(\"username\"), r.PostFormValue(\"password\")); ok {\n\t\t\t\tsession.Values[\"authenticated\"] = true\n\t\t\t\tsession.Values[\"username\"] = user.Username\n\t\t\t\tsession.Values[\"user_id\"] = user.ID\n\t\t\t\tsession.Save(r, w)\n\n\t\t\t\tif r.FormValue(\"redirect_url\") != \"\" {\n\t\t\t\t\tw.Header().Add(\"location\", r.FormValue(\"redirect_url\"))\n\t\t\t\t\tw.WriteHeader(302)\n\t\t\t\t\treturn\n\t\t\t\t}\n\n\t\t\t\tw.Header().Add(\"location\", \"/profile\")\n\t\t\t\tlog.Warn(\"Missing redirect_url for login request\")\n\t\t\t\tw.WriteHeader(302)\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\n\tr.ParseForm()\n\n\ttype LoginContext struct {\n\t\tRedirectURL string\n\t\tCSRFToken string\n\t}\n\n\tauthorizeName := r.FormValue(\"redirect_url\")\n\tif len(authorizeName) >= 10 && authorizeName[:10] == \"/authorize\" {\n\t\tvar clientID string\n\t\tfor k, v := range r.URL.Query() {\n\t\t\tif k == \"redirect_url\" {\n\t\t\t\t// Parse the urlescaped string back to an URL query\n\t\t\t\t// so we can extract query variables from it\n\t\t\t\tif u, err := url.Parse(v[0]); err == nil {\n\t\t\t\t\tfor k, v := range u.Query() {\n\t\t\t\t\t\tif k == \"client_id\" {\n\t\t\t\t\t\t\tclientID = v[0]\n\t\t\t\t\t\t\tbreak\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tif clientID != \"\" {\n\t\t\tclient, err := auth.OAuthClient{}.Get(clientID)\n\t\t\tif err != nil {\n\t\t\t\tlog.Warning(\"Failed to fetch client during login\")\n\t\t\t} else {\n\t\t\t\tauthorizeName = client.Name\n\t\t\t}\n\t\t}\n\t}\n\n\tloginContext := LoginContext{\n\t\tRedirectURL: authorizeName,\n\t\tCSRFToken: auth.CreateCSRFToken(),\n\t}\n\n\tsession.Values[\"csrf-token\"] = loginContext.CSRFToken\n\tsession.Save(r, w)\n\n\tw.WriteHeader(200)\n\tcontext.loginHTMLTemplate.Execute(w, loginContext)\n}", "title": "" }, { "docid": "419f81f8ebe205f5547cd8538dc476ad", "score": "0.59225845", "text": "func (t *Townclient) Login() error {\n\tlog.Info(\"%s login process started\", TAG)\n\n\tsValue := t.getSValue()\n\n\tif sValue == \"\" {\n\t\treturn errors.New(\"couldnt find SValue for the Town login\")\n\t}\n\n\tparam := url.Values{}\n\tparam.Set(\"do\", \"login\")\n\tparam.Add(\"s\", sValue)\n\tparam.Add(\"securitytoken\", \"guest\")\n\tparam.Add(\"vb_login_username\", t.User)\n\tparam.Add(\"vb_login_password\", \"\")\n\tparam.Add(\"cookieuser\", \"1\")\n\tparam.Add(\"vb_login_md5password\", t.Password)\n\tparam.Add(\"vb_login_md5password_utf\", t.Password)\n\tparam.Add(\"url\", \"/v2/\")\n\n\tclient := &http.Client{}\n\treq, err := http.NewRequest(\"POST\", LOGIN, strings.NewReader(param.Encode()))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tlog.Info(\"%s[POST] url: %v\", TAG, LOGIN)\n\tt.addHeader(req)\n\n\tt.dumpRequest(req, \"town_login_req\")\n\n\tresp, err := client.Do(req)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdefer resp.Body.Close()\n\n\tt.dumpResponse(resp, \"town_login_resp\")\n\tt.cookies = resp.Cookies()\n\treturn nil\n}", "title": "" }, { "docid": "ad3979580ca2fdae7eedf3feb5805325", "score": "0.5922426", "text": "func (s *Session) Login() *http.Client {\n\ts.Context = context.Background()\n\n\tvar tokenChannel = make(chan string)\n\n\ttoken := new(oauth2.Token)\n\terr := util.ReadGob(\"token.db\", token)\n\tif err != nil {\n\t\ttoken = nil\n\t}\n\n\tconf := &oauth2.Config{\n\t\tClientID: os.Getenv(\"STRAVA_CLIENT_ID\"),\n\t\tClientSecret: os.Getenv(\"STRAVA_CLIENT_SECRET\"),\n\t\tScopes: []string{\"activity:read_all\"},\n\t\tRedirectURL: \"http://127.0.0.1:44444\",\n\t\tEndpoint: oauth2.Endpoint{\n\t\t\tAuthURL: \"https://www.strava.com/oauth/mobile/authorize\",\n\t\t\tTokenURL: \"https://www.strava.com/oauth/token\",\n\t\t},\n\t}\n\n\tif token == nil {\n\t\turl := conf.AuthCodeURL(\"state\", oauth2.AccessTypeOffline)\n\t\tgo exec.Command(\"rundll32\", \"url.dll,FileProtocolHandler\", url).Start()\n\n\t\thttp.HandleFunc(\"/\", func(w http.ResponseWriter, r *http.Request) {\n\t\t\ttokenCode := r.FormValue(\"code\")\n\t\t\tfmt.Fprintf(w, `You can close your Browser now`)\n\t\t\ttokenChannel <- tokenCode\n\t\t})\n\t\tgo http.ListenAndServe(\":44444\", nil)\n\n\t\ttokenCodeResult := <-tokenChannel\n\n\t\ttoken, err = conf.Exchange(s.Context, tokenCodeResult)\n\t\tif err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t}\n\tutil.WriteGob(\"token.db\", token)\n\n\treturn conf.Client(s.Context, token)\n}", "title": "" } ]
f41f62d8a516cf3986541a682ff31145
Enabled mocks base method.
[ { "docid": "e766df1c2dc76a75dcbc4aba1ddcd5f7", "score": "0.7209725", "text": "func (m *MockIndexOptions) Enabled() bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Enabled\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" } ]
[ { "docid": "aa395edb594643452a4bccb0a4e61ebd", "score": "0.7527396", "text": "func (m *MockSwitcher) Enabled() bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Enabled\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "528bdf803a9939230a09cfce2338d221", "score": "0.74121225", "text": "func (m *MockRetryState) Enabled() bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Enabled\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "9312428609de7c87055d571d0e42d4f7", "score": "0.7354728", "text": "func (m *MockDownsampler) Enabled() bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Enabled\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "784da877fcaec08e1722e76d0679cc49", "score": "0.6919835", "text": "func (m *MockSwitcher) WaitEnable() {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"WaitEnable\")\n}", "title": "" }, { "docid": "9862aa22ec6dc1d948ef417b540fbccc", "score": "0.6861049", "text": "func (m *MockLogger) IsEnabled(arg0 int) bool {\n\tret := m.ctrl.Call(m, \"IsEnabled\", arg0)\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "1d701c2819d4e8032f81ab9df6e680cb", "score": "0.6790572", "text": "func (m *MockIndexOptions) SetEnabled(value bool) IndexOptions {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SetEnabled\", value)\n\tret0, _ := ret[0].(IndexOptions)\n\treturn ret0\n}", "title": "" }, { "docid": "c8e0f7b7e186f9379d398df55159e6d9", "score": "0.67208517", "text": "func (m *MockOptions) FlushEnabled() bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"FlushEnabled\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "d6b539811b7587487f4722689389a0c5", "score": "0.66659266", "text": "func (m *MockOptions) BootstrapEnabled() bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"BootstrapEnabled\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "dffe06c8de3827ff8b899a6ba6c9a264", "score": "0.6658907", "text": "func (m *MockOptions) SnapshotEnabled() bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SnapshotEnabled\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "ec30b648fa70277e50d8388ba0344ccd", "score": "0.658931", "text": "func TestEnabled(t *testing.T) {\n\tt.Parallel()\n\n\t// setup\n\tcalledFunctions := NewLog()\n\tcalledFunctions.Disabled = false\n\tcalledFunctions.PeerName = \"unimpressed-rice-sofa\"\n\tcalledFunctions.Register(\"REST\", \"weaviate.something.or.other\")\n\n\t// test\n\tassert.Equal(t, 1, len(calledFunctions.Log))\n}", "title": "" }, { "docid": "85e6db9dbaf5736211462ea51544ff73", "score": "0.6517635", "text": "func (m *MockdatabaseFileSystemManager) Enable() fileOpStatus {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Enable\")\n\tret0, _ := ret[0].(fileOpStatus)\n\treturn ret0\n}", "title": "" }, { "docid": "e199c482d47ba8812c18233616cfb6a7", "score": "0.6509259", "text": "func (m *MockAgentPoolScope) AvailabilitySetEnabled() bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"AvailabilitySetEnabled\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "2cef4b081a7b69b5096f26967c20accc", "score": "0.64818764", "text": "func (m *MockdatabaseColdFlushManager) Enable() fileOpStatus {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Enable\")\n\tret0, _ := ret[0].(fileOpStatus)\n\treturn ret0\n}", "title": "" }, { "docid": "b87792aab10a7211dfc9c4962730c00f", "score": "0.647545", "text": "func (m *MockOptions) RepairEnabled() bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"RepairEnabled\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "b87792aab10a7211dfc9c4962730c00f", "score": "0.647545", "text": "func (m *MockOptions) RepairEnabled() bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"RepairEnabled\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "8a4846c25cec7792c686bf3d96cb851a", "score": "0.64692", "text": "func (m *MockNetworkClient) Disabled() bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Disabled\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "7a07f2955908f979a2f64d7cb165d30e", "score": "0.6413842", "text": "func (_m *Driver) Enabled(ctx context.Context, key string) (bool, error) {\n\tret := _m.Called(ctx, key)\n\n\tvar r0 bool\n\tvar r1 error\n\tif rf, ok := ret.Get(0).(func(context.Context, string) (bool, error)); ok {\n\t\treturn rf(ctx, key)\n\t}\n\tif rf, ok := ret.Get(0).(func(context.Context, string) bool); ok {\n\t\tr0 = rf(ctx, key)\n\t} else {\n\t\tr0 = ret.Get(0).(bool)\n\t}\n\n\tif rf, ok := ret.Get(1).(func(context.Context, string) error); ok {\n\t\tr1 = rf(ctx, key)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "c7770331350f2059860c53f25c86bb60", "score": "0.6358461", "text": "func (m *MockOptions) CleanupEnabled() bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"CleanupEnabled\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "9cbe91a6c62a143d94e081d26c6e6fe1", "score": "0.625462", "text": "func (m *MockOptions) ColdWritesEnabled() bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"ColdWritesEnabled\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "01c4662ea73046776feeb81bfbab4e21", "score": "0.6202562", "text": "func (m *MockProducer) IsDisable() bool {\n\tret := m.ctrl.Call(m, \"IsDisable\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "fd462e13e12ad0f70a53df34cfa6c2ae", "score": "0.616648", "text": "func (m *MockInstance) Active() bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Active\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "b43ab085f3c19c85e27e3f88b985f6cb", "score": "0.6162714", "text": "func (m *MockBalanceFinderClient) Supports() map[string]bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Supports\")\n\tret0, _ := ret[0].(map[string]bool)\n\treturn ret0\n}", "title": "" }, { "docid": "cf9ec7c29ee82604e7739ba1e4199e43", "score": "0.61467403", "text": "func (m *MockClient) ListServicesEnabled() (map[string]bool, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"ListServicesEnabled\")\n\tret0, _ := ret[0].(map[string]bool)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "94da39e9d5c02f18a75b6da1a5c52ae6", "score": "0.61292166", "text": "func (m *MockConfig) IsSecurityEnabled() bool {\n\tret := m.ctrl.Call(m, \"IsSecurityEnabled\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "f1e8e0c5792cf7edbb049ff45f1284ec", "score": "0.6115725", "text": "func (m *MockDynamicOptions) ForceColdWritesEnabled() bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"ForceColdWritesEnabled\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "b4a1944f7df1f9a70ddd7505c7239154", "score": "0.6083731", "text": "func (m *MockAPIClient) PluginEnable(arg0 context.Context, arg1 string, arg2 types.PluginEnableOptions) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"PluginEnable\", arg0, arg1, arg2)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "608332a1be68eb69f83ca0099942f240", "score": "0.6067742", "text": "func (o *MockOracle) Enable() {\n\to.Lock()\n\tdefer o.Unlock()\n\to.stop = false\n}", "title": "" }, { "docid": "a9c954222162ec4d0fa01658718d1d06", "score": "0.605831", "text": "func (m *MockReceiverClient) Supports() map[string]bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Supports\")\n\tret0, _ := ret[0].(map[string]bool)\n\treturn ret0\n}", "title": "" }, { "docid": "cb7a22b8ded01331f464e31b1116fcf2", "score": "0.6035335", "text": "func (m *MockOptions) SetBootstrapEnabled(value bool) Options {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SetBootstrapEnabled\", value)\n\tret0, _ := ret[0].(Options)\n\treturn ret0\n}", "title": "" }, { "docid": "6df1ec72cc663c02d5579b6b8d7bff81", "score": "0.60123086", "text": "func TestEnabled(t *testing.T) {\n\t// Check function result immediately\n\tenabled, err := mptcpEnabled()\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\tenabled2, err := Enabled()\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\tif enabled != enabled2 {\n\t\tt.Fatal(\"mismatch result between Enabled and underlying mptcpEnabled\")\n\t}\n}", "title": "" }, { "docid": "6fe2942d74369a76957e48c107cc9934", "score": "0.60118264", "text": "func (_m *VerificationProvider) SetEnabled(guildID string, enabled bool) error {\n\tret := _m.Called(guildID, enabled)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(string, bool) error); ok {\n\t\tr0 = rf(guildID, enabled)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "117229e2e1d32d64a39b48bee6af4555", "score": "0.6008792", "text": "func (m *MockOptions) SetRepairEnabled(value bool) Options {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SetRepairEnabled\", value)\n\tret0, _ := ret[0].(Options)\n\treturn ret0\n}", "title": "" }, { "docid": "90117d6c73f915093e158a164061cb19", "score": "0.5998477", "text": "func (m *MockSenderClient) Supports() map[string]bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Supports\")\n\tret0, _ := ret[0].(map[string]bool)\n\treturn ret0\n}", "title": "" }, { "docid": "c448bcce9678dbecaa68c3208e537934", "score": "0.59951836", "text": "func (m *MockOptions) SetFlushEnabled(value bool) Options {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SetFlushEnabled\", value)\n\tret0, _ := ret[0].(Options)\n\treturn ret0\n}", "title": "" }, { "docid": "a3874f8f52cb2eff352924a38580a050", "score": "0.5989055", "text": "func (m *MockPublicKeyFinderClient) Supports() map[string]bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Supports\")\n\tret0, _ := ret[0].(map[string]bool)\n\treturn ret0\n}", "title": "" }, { "docid": "b335d514c68e30edfd696fff1098b047", "score": "0.59804326", "text": "func (m *MockOptions) ForceColdWritesEnabled() bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"ForceColdWritesEnabled\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "38e25c481d1351e7acc62aa7b00069dd", "score": "0.5975209", "text": "func (_m *MockEntityEventsService) IsDisabled() bool {\n\tret := _m.Called()\n\n\tvar r0 bool\n\tif rf, ok := ret.Get(0).(func() bool); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tr0 = ret.Get(0).(bool)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "8e7e82f08c34caa68443c420169264d3", "score": "0.5946583", "text": "func (m *MockdatabaseMediator) EnableFileOps() {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"EnableFileOps\")\n}", "title": "" }, { "docid": "119e2b695ac6138fbbd959832a02313c", "score": "0.5938481", "text": "func (m *MockOptions) SetRepairEnabled(b bool) Options {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SetRepairEnabled\", b)\n\tret0, _ := ret[0].(Options)\n\treturn ret0\n}", "title": "" }, { "docid": "aeee9568fd88f5c90e393b00d1dff98b", "score": "0.59378564", "text": "func (m *MockNameServiceDomainClient) Supports() map[string]bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Supports\")\n\tret0, _ := ret[0].(map[string]bool)\n\treturn ret0\n}", "title": "" }, { "docid": "425f129bd56122d7408234d6bb6db0ed", "score": "0.593449", "text": "func (m *MockSupporter) Supports() map[string]bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Supports\")\n\tret0, _ := ret[0].(map[string]bool)\n\treturn ret0\n}", "title": "" }, { "docid": "e4670bc4771156f5c4f65cde8e06581d", "score": "0.59319466", "text": "func (m *MockConfigurator) IsEgressEnabled() bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"IsEgressEnabled\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "3f2fd8f9a0fcb34e45a525eae8f81e92", "score": "0.5892063", "text": "func (m *MockConfigurator) IsTracingEnabled() bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"IsTracingEnabled\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "f0f8638fdf772092b2107ff8336cec55", "score": "0.5885835", "text": "func (m *MockDebugClient) XcvrValidCheckEnable(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*Empty, error) {\n\tvarargs := []interface{}{ctx, in}\n\tfor _, a := range opts {\n\t\tvarargs = append(varargs, a)\n\t}\n\tret := m.ctrl.Call(m, \"XcvrValidCheckEnable\", varargs...)\n\tret0, _ := ret[0].(*Empty)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "4400f655e30d36349e41deead057a216", "score": "0.5851993", "text": "func (m *MockdatabaseColdFlushManager) Disable() fileOpStatus {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Disable\")\n\tret0, _ := ret[0].(fileOpStatus)\n\treturn ret0\n}", "title": "" }, { "docid": "7b1fa7f25b766b5d772d141588bab860", "score": "0.5847792", "text": "func (m *MockNameServiceAddressClient) Supports() map[string]bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Supports\")\n\tret0, _ := ret[0].(map[string]bool)\n\treturn ret0\n}", "title": "" }, { "docid": "93fe2a1fe2a5391133b866466b2343af", "score": "0.58471", "text": "func (m *MockdatabaseFileSystemManager) Disable() fileOpStatus {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Disable\")\n\tret0, _ := ret[0].(fileOpStatus)\n\treturn ret0\n}", "title": "" }, { "docid": "42802e2a2e32f35a5cec7ff154a997a6", "score": "0.5843041", "text": "func (_m *Flags) CheckEnabled(opts *bind.CallOpts) (bool, error) {\n\tret := _m.Called(opts)\n\n\tvar r0 bool\n\tvar r1 error\n\tif rf, ok := ret.Get(0).(func(*bind.CallOpts) (bool, error)); ok {\n\t\treturn rf(opts)\n\t}\n\tif rf, ok := ret.Get(0).(func(*bind.CallOpts) bool); ok {\n\t\tr0 = rf(opts)\n\t} else {\n\t\tr0 = ret.Get(0).(bool)\n\t}\n\n\tif rf, ok := ret.Get(1).(func(*bind.CallOpts) error); ok {\n\t\tr1 = rf(opts)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "9fcd7343ddf32e63071b3641b2fbe664", "score": "0.58260995", "text": "func (m *MockOptions) SetSnapshotEnabled(value bool) Options {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SetSnapshotEnabled\", value)\n\tret0, _ := ret[0].(Options)\n\treturn ret0\n}", "title": "" }, { "docid": "f3e8074808d3ecbf06d3e1f58a9d27e1", "score": "0.5814517", "text": "func (m *MockOptions) SetCleanupEnabled(value bool) Options {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SetCleanupEnabled\", value)\n\tret0, _ := ret[0].(Options)\n\treturn ret0\n}", "title": "" }, { "docid": "b8f70bd7f452eb6f96b0fdeed1c4c761", "score": "0.5807721", "text": "func (m *MockConsensus) Active() bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Active\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "8b72eb3d3e8076748f347e7da5b53294", "score": "0.5797536", "text": "func (l *LoggerMock) DebugEnabled() bool { return false }", "title": "" }, { "docid": "9e255ba459bf425344c69dbf98f42183", "score": "0.57863486", "text": "func (_m *VerificationProvider) GetEnabled(guildID string) (bool, error) {\n\tret := _m.Called(guildID)\n\n\tvar r0 bool\n\tvar r1 error\n\tif rf, ok := ret.Get(0).(func(string) (bool, error)); ok {\n\t\treturn rf(guildID)\n\t}\n\tif rf, ok := ret.Get(0).(func(string) bool); ok {\n\t\tr0 = rf(guildID)\n\t} else {\n\t\tr0 = ret.Get(0).(bool)\n\t}\n\n\tif rf, ok := ret.Get(1).(func(string) error); ok {\n\t\tr1 = rf(guildID)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "e3d74a464ee5e96af4ff2268562e5542", "score": "0.5785103", "text": "func (m *MockClientInterface) IsSSASupported() bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"IsSSASupported\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "7535c8efd359e2e4d595c05a9612dc67", "score": "0.5777069", "text": "func (m *MockOptions) SetColdWritesEnabled(value bool) Options {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SetColdWritesEnabled\", value)\n\tret0, _ := ret[0].(Options)\n\treturn ret0\n}", "title": "" }, { "docid": "133cbd097ebe83ea5b75dd57faf49173", "score": "0.57743806", "text": "func (_m *MockShardDelegator) Serviceable() bool {\n\tret := _m.Called()\n\n\tvar r0 bool\n\tif rf, ok := ret.Get(0).(func() bool); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tr0 = ret.Get(0).(bool)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "985c0e6ecefa029e567b755b006be981", "score": "0.5755221", "text": "func (m *MockModule) Indirect() bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Indirect\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "e86e5aa2f97510a749be30fd86894c70", "score": "0.5742546", "text": "func (m *MockAPI) AnyOLMOperatorEnabled(arg0 *common.Cluster) bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"AnyOLMOperatorEnabled\", arg0)\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "5feae30015d11fe8b8b976da7d6bcb8b", "score": "0.57403255", "text": "func (mock *MockScreen) EnableMouse() {}", "title": "" }, { "docid": "ffad53c01ca957fb7d223eab2d37801b", "score": "0.5740026", "text": "func (_m *ChainScopedConfig) BalanceMonitorEnabled() bool {\n\tret := _m.Called()\n\n\tvar r0 bool\n\tif rf, ok := ret.Get(0).(func() bool); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tr0 = ret.Get(0).(bool)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "61eb83185629e31f3c4256e6db5b4db8", "score": "0.57311976", "text": "func TestDisabled(t *testing.T) {\n\tt.Parallel()\n\n\t// setup\n\tcalledFunctions := NewLog()\n\tcalledFunctions.Disabled = true\n\tcalledFunctions.PeerName = \"aquatic-pineapple-home\"\n\tcalledFunctions.Register(\"REST\", \"weaviate.something.or.other\")\n\n\t// test\n\tassert.Equal(t, 0, len(calledFunctions.Log))\n}", "title": "" }, { "docid": "f24693b8f32df38e95cf4a189f90dcc5", "score": "0.57171553", "text": "func (_m *ExperimentManager) IsCacheEnabled() bool {\n\tret := _m.Called()\n\n\tvar r0 bool\n\tif rf, ok := ret.Get(0).(func() bool); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tr0 = ret.Get(0).(bool)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "57a41c757032de4e93ea836b4641bbc5", "score": "0.56972647", "text": "func (m *MockDebugServer) XcvrValidCheckEnable(arg0 context.Context, arg1 *Empty) (*Empty, error) {\n\tret := m.ctrl.Call(m, \"XcvrValidCheckEnable\", arg0, arg1)\n\tret0, _ := ret[0].(*Empty)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "ff95f5a68094dc970dbe50cb2619f619", "score": "0.56760335", "text": "func (_m *GeneratorEnabler) Enable(variantName models.VariantName, generatorParamsValidator params.Validator, tileGeneratorFunction configmodels.TileGeneratorFunction) {\n\t_m.Called(variantName, generatorParamsValidator, tileGeneratorFunction)\n}", "title": "" }, { "docid": "9fd17595efa9a4ee63de34fb3f297a41", "score": "0.5663784", "text": "func (_m *GeneralConfig) EVMRPCEnabled() bool {\n\tret := _m.Called()\n\n\tvar r0 bool\n\tif rf, ok := ret.Get(0).(func() bool); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tr0 = ret.Get(0).(bool)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "b10300230eb6d46dcd80b05433ffd7ea", "score": "0.56634504", "text": "func (m *MockRun) IsRestartable() bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"IsRestartable\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "b256fafd29bc577ae75c8a4c05efe0d3", "score": "0.5662633", "text": "func (m *MockBool) Set(v bool) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"Set\", v)\n}", "title": "" }, { "docid": "adef3e032fa65d68fae3b2b80cbcba04", "score": "0.5654832", "text": "func (_m *MockUserRepository) CheckSuperLikeMe(_param0 int, _param1 int) bool {\n\tret := _m.ctrl.Call(_m, \"CheckSuperLikeMe\", _param0, _param1)\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "822290803f662f365c65538c646944ec", "score": "0.56451255", "text": "func TestNonexistentEnable(t *testing.T) {\n\thoistLaunchable := FakeHoistLaunchableForDir(\"nonexistent_scripts_test_hoist_launchable\")\n\n\tenableOutput, err := hoistLaunchable.Enable()\n\tAssert(t).IsNil(err, \"Got an unexpected error when calling enable on the test hoist launchable\")\n\n\texpectedEnableOutput := \"\"\n\n\tAssert(t).AreEqual(enableOutput, expectedEnableOutput, \"Did not get expected output from test enable script\")\n}", "title": "" }, { "docid": "29ca4168329c91316f5558f74ebc09d8", "score": "0.5644219", "text": "func (m *MockManagerServer) mustEmbedUnimplementedManagerServer() {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"mustEmbedUnimplementedManagerServer\")\n}", "title": "" }, { "docid": "164ea154d2ac50b6741904a214bb7c44", "score": "0.5643235", "text": "func (m *Mockdatabase) IsOverloaded() bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"IsOverloaded\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "da12b85f616db1aa0ab325167e18d067", "score": "0.56427723", "text": "func (_m *MockOptions) NeedsRepair() bool {\n\tret := _m.ctrl.Call(_m, \"NeedsRepair\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "f9381aa8f932148e81ed047e991b70f6", "score": "0.56402814", "text": "func (m *MockSchemaHistory) Extends(arg0 SchemaHistory) bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Extends\", arg0)\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "24e1c7958ebd3405441296f3f48dbf35", "score": "0.56317127", "text": "func (_m *GeneralConfig) EVMEnabled() bool {\n\tret := _m.Called()\n\n\tvar r0 bool\n\tif rf, ok := ret.Get(0).(func() bool); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tr0 = ret.Get(0).(bool)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "605aa59bb6ff9a2cbbd95464e9acad04", "score": "0.5625881", "text": "func (_m *Flags) EnableAccessCheck(opts *bind.TransactOpts) (*types.Transaction, error) {\n\tret := _m.Called(opts)\n\n\tvar r0 *types.Transaction\n\tvar r1 error\n\tif rf, ok := ret.Get(0).(func(*bind.TransactOpts) (*types.Transaction, error)); ok {\n\t\treturn rf(opts)\n\t}\n\tif rf, ok := ret.Get(0).(func(*bind.TransactOpts) *types.Transaction); ok {\n\t\tr0 = rf(opts)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*types.Transaction)\n\t\t}\n\t}\n\n\tif rf, ok := ret.Get(1).(func(*bind.TransactOpts) error); ok {\n\t\tr1 = rf(opts)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "ddabf80e4701f9cc947cb328d1069941", "score": "0.56222016", "text": "func (m *MockChainedReporter) ReportOverLimit(enabled bool) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"ReportOverLimit\", enabled)\n}", "title": "" }, { "docid": "730ef018bfdde787a9ee2077bdc27a88", "score": "0.5618253", "text": "func (m *MockIngress) Ignore() bool {\n\tret := m.ctrl.Call(m, \"Ignore\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "af434ec06f84df372074d313b3758a38", "score": "0.5587709", "text": "func (m *MockDatabase) IsOverloaded() bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"IsOverloaded\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "7770b398297d0211164797f85122e1ca", "score": "0.5582545", "text": "func (_m *appSvc) Disable(namespace string, name string) error {\n\tret := _m.Called(namespace, name)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(string, string) error); ok {\n\t\tr0 = rf(namespace, name)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "61477900d010cdc5788650c29899a7b0", "score": "0.557881", "text": "func (mock *GRPCClientMock) ReflectionEnabledCalls() []struct {\n} {\n\tvar calls []struct {\n\t}\n\tlockGRPCClientMockReflectionEnabled.RLock()\n\tcalls = mock.calls.ReflectionEnabled\n\tlockGRPCClientMockReflectionEnabled.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "aab45348596589bb8a64eae38d112883", "score": "0.5577785", "text": "func (_m *GeneralConfig) SolanaEnabled() bool {\n\tret := _m.Called()\n\n\tvar r0 bool\n\tif rf, ok := ret.Get(0).(func() bool); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tr0 = ret.Get(0).(bool)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "9664cae82ace6cf781cc45abacdd1fe2", "score": "0.554946", "text": "func (_m *appSvc) Enable(namespace string, name string, services []*gqlschema.ApplicationMappingService) (*applicationconnectorv1alpha1.ApplicationMapping, error) {\n\tret := _m.Called(namespace, name, services)\n\n\tvar r0 *applicationconnectorv1alpha1.ApplicationMapping\n\tif rf, ok := ret.Get(0).(func(string, string, []*gqlschema.ApplicationMappingService) *applicationconnectorv1alpha1.ApplicationMapping); ok {\n\t\tr0 = rf(namespace, name, services)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*applicationconnectorv1alpha1.ApplicationMapping)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(string, string, []*gqlschema.ApplicationMappingService) error); ok {\n\t\tr1 = rf(namespace, name, services)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "bf325228cfb9b19461e0da29ef9470d9", "score": "0.5546808", "text": "func (_m *MockRunOptions) Incremental() bool {\n\tret := _m.ctrl.Call(_m, \"Incremental\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "28a571b23a796d8be9381d1f7cfab2c9", "score": "0.5532145", "text": "func (m *MockIBaseRepoAudit) IsActive() bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"IsActive\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "2e1bf6870c1b674a9ce0fb8e32477e89", "score": "0.55031675", "text": "func (m *MockAPIClient) PluginDisable(arg0 context.Context, arg1 string, arg2 types.PluginDisableOptions) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"PluginDisable\", arg0, arg1, arg2)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "641fbfbaddf3a6603487d64c38a037d3", "score": "0.5489908", "text": "func (m *MockEngine) Continue() {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"Continue\")\n}", "title": "" }, { "docid": "13a807c33f2e715cc11e4a6ac12685e7", "score": "0.5488567", "text": "func (m *MockProducer) IsActive() bool {\n\tret := m.ctrl.Call(m, \"IsActive\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "974e5afb9804e9c44074e209cbdc38f1", "score": "0.5478954", "text": "func (i *Interceptor) Enable() {\n\ti.disabled = false\n}", "title": "" }, { "docid": "ad372ddb33b55fc2d0a9a206aa765efb", "score": "0.5473806", "text": "func (_m *ChainScopedConfig) GlobalBalanceMonitorEnabled() (bool, bool) {\n\tret := _m.Called()\n\n\tvar r0 bool\n\tif rf, ok := ret.Get(0).(func() bool); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tr0 = ret.Get(0).(bool)\n\t}\n\n\tvar r1 bool\n\tif rf, ok := ret.Get(1).(func() bool); ok {\n\t\tr1 = rf()\n\t} else {\n\t\tr1 = ret.Get(1).(bool)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "23108a3c319d5b69cb64b2d433756bb6", "score": "0.54702055", "text": "func (m *MockDebugClient) XcvrValidCheckDisable(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*Empty, error) {\n\tvarargs := []interface{}{ctx, in}\n\tfor _, a := range opts {\n\t\tvarargs = append(varargs, a)\n\t}\n\tret := m.ctrl.Call(m, \"XcvrValidCheckDisable\", varargs...)\n\tret0, _ := ret[0].(*Empty)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "ccca30216dbe59c9fe65ed71f6495f2f", "score": "0.54680884", "text": "func (m *MockOptions) SetForceColdWritesEnabled(value bool) Options {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SetForceColdWritesEnabled\", value)\n\tret0, _ := ret[0].(Options)\n\treturn ret0\n}", "title": "" }, { "docid": "aa7a965e4d549a6b954d1bccf0400613", "score": "0.54519916", "text": "func (m *MockDynamicOptions) AllowEmptyInitialNamespaceRegistry() bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"AllowEmptyInitialNamespaceRegistry\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "072b1875a6b7852e9062b8168474f2f9", "score": "0.5451238", "text": "func TestEnableOutput(){\n\n}", "title": "" }, { "docid": "a49aa8d2b88e64dbd10a4006d7460270", "score": "0.5447456", "text": "func (m *MockUnsafeManagerServer) mustEmbedUnimplementedManagerServer() {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"mustEmbedUnimplementedManagerServer\")\n}", "title": "" }, { "docid": "d0aa6cd9ff7bcc9b4d6a26331405ed58", "score": "0.5433127", "text": "func (m *MockNamespace) ReadOnly() bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"ReadOnly\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "ea3f9adabb99035745a1964ab5940834", "score": "0.5432317", "text": "func (m *MockBool) Get() bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Get\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "6edc0715e5653008ed0b138ac36822aa", "score": "0.5423104", "text": "func (m *MockdatabaseNamespace) ReadOnly() bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"ReadOnly\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "821c9759e85ff7c525925b16801491ce", "score": "0.5403966", "text": "func (m *ExtendedIndexModifierMock) AllMocksCalled() bool {\n\n\tif !m.SetUsageForPulseFinished() {\n\t\treturn false\n\t}\n\n\tif !m.SetWithMetaFinished() {\n\t\treturn false\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "5d64d86ce46b2b79bd00fed8386b3337", "score": "0.5398139", "text": "func (m *MockMutableSegment) IsSealed() bool {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"IsSealed\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" }, { "docid": "5f76c9543a1228d57b7c285a5569ac65", "score": "0.5397275", "text": "func (_m *MockSource) Can(strategy Strategy) bool {\n\tret := _m.ctrl.Call(_m, \"Can\", strategy)\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "title": "" } ]
6d6777534da1a81edf978e8222681146
Info outputs standard out message
[ { "docid": "12a69c0ed2e44bf1a1b04de149330694", "score": "0.69581634", "text": "func (l *Logger) Info(format string, v ...interface{}) {\n\tif l.info != nil {\n\t\tl.info.Output(2, fmt.Sprintf(format, v...))\n\t}\n}", "title": "" } ]
[ { "docid": "6b1c855b658c2c62d7c0e60a5e205f5c", "score": "0.8053254", "text": "func Info(v ...interface{}) {\n\t_ = info.Output(2, fmt.Sprint(v...))\n}", "title": "" }, { "docid": "6a961ed90f85c724051b43a0c721b2d4", "score": "0.80337775", "text": "func Info(args ...interface{}) {\n\twrite(\"[I] \", \"\", args...)\n}", "title": "" }, { "docid": "bc68b92f7a8bd3f350ad4e4199ab1944", "score": "0.7804771", "text": "func Info(w io.Writer, format string, args ...any) {\n\tformat = strings.TrimRight(format, \"\\r\\n\") + \"\\n\"\n\tfmt.Fprintf(w, \"\\n\"+Wrap(Bold(\"INFO: \")+format, DefaultTextWidth)+\"\\n\", args...)\n}", "title": "" }, { "docid": "fb33d3c6dcea15bc32674e2cd1020279", "score": "0.7768296", "text": "func Info(v ...interface{}) error {\n\treturn output(os.Stdout, LevelInfo, v...)\n}", "title": "" }, { "docid": "bd0ee6506c231bcb75d8e707795b695a", "score": "0.7749635", "text": "func Info(v ...interface{}) {\r\n\tgreen := color.New(color.FgGreen).SprintFunc()\r\n\tmsg := fmt.Sprintln(v...)\r\n\tfmt.Print(fmt.Sprintf(\"%s %s\", green(\"info:\"), msg))\r\n}", "title": "" }, { "docid": "c50429cb23c26612b42c3fa4f1994f9a", "score": "0.7659533", "text": "func Info(s string) {\n\tfmt.Fprint(Writer, s)\n}", "title": "" }, { "docid": "a0bfc736666f11bc998c3984812a97b2", "score": "0.7619272", "text": "func (l *Impl) Info(format string, args ...interface{}) {\n\tl.write(\"INFO\", format, args...)\n}", "title": "" }, { "docid": "deeb023bbf4a78039da0df0165dba507", "score": "0.7600536", "text": "func Info(v ...interface{}) {\n\tvar s string\n\tjl.stdlog.SetPrefix(\"[INFO] \")\n\tif jl.flag == LstdFlags|Lshortfile {\n\t\ts = generateStdflagShortFile()\n\t}\n\n\ts = s + fmt.Sprintln(v...)\n\tjl.stdlog.Print(s)\n}", "title": "" }, { "docid": "9f6f05ab4a14bac9dad7add90d8bb294", "score": "0.75562507", "text": "func Info(ctx context.Context, args ...interface{}) {\n\tglobal.Info(ctx, args...)\n}", "title": "" }, { "docid": "0d9e3a9e24efc0c937bd152a96666d4c", "score": "0.75115025", "text": "func (w *Writer) Info(m string) error {}", "title": "" }, { "docid": "7846d48a85e23468014700c7bda1b360", "score": "0.75033224", "text": "func Info(format string, v ...interface{}) {\n\tif std.level >= InfoLevel {\n\t\tstd.Output(std.callDepth, fmt.Sprintf(format, v...), InfoLevel)\n\t}\n}", "title": "" }, { "docid": "826099814b5b66d41839e48e256dccfb", "score": "0.7474914", "text": "func Info(format string, v ...interface{}) {\n\tl.output(LInfo, format, v...)\n}", "title": "" }, { "docid": "dd52bf8af67a21a87da8c559f504a845", "score": "0.74677116", "text": "func Info(s string) string {\n\treturn au.Green(s).String()\n}", "title": "" }, { "docid": "afff53aa3a547673760fbc8fcec0f224", "score": "0.7462454", "text": "func InfoPrint(info string) {\n\tfmt.Println(\"I>\", info)\n}", "title": "" }, { "docid": "8d08f39b62d39fbf3eabd093a5fe9fd2", "score": "0.7426377", "text": "func Info(format string, args ...interface{}) {\n\tdo(INFO, format, args...)\n}", "title": "" }, { "docid": "3ea5c1490b38605225d603d93f685816", "score": "0.74182385", "text": "func Info(text string) {\n\tprintLog(\"info\", text)\n}", "title": "" }, { "docid": "95fe04b9ddacf228b0d54e64f633c04a", "score": "0.74176353", "text": "func (c ConsoleOutput) Info(msg string, a ...interface{}) {\n\tswitch {\n\tcase c.Emoji && c.Color:\n\t\tfmt.Printf(info+white+msg+reset+\"\\n\", a...)\n\tcase c.Emoji:\n\t\tfmt.Printf(info+msg+\"\\n\", a...)\n\tcase c.Color:\n\t\tfmt.Printf(\"[\"+blue+\"i\"+reset+\"] \"+white+msg+reset+\"\\n\", a...)\n\tdefault:\n\t\tfmt.Printf(\"[i] \"+msg+\"\\n\", a...)\n\t}\n}", "title": "" }, { "docid": "f412523dd4c4bc4687f48e7c6cca6bf2", "score": "0.7402854", "text": "func Info(title, message string) error {\n\treturn nil\n}", "title": "" }, { "docid": "0678314b191d2d42129c2f2dec97370a", "score": "0.73933965", "text": "func Info(v ...interface{}) {\n\toutput(LevelInfo, v)\n}", "title": "" }, { "docid": "59caca4d072ae54174ca7d83f7117df1", "score": "0.7385523", "text": "func Info(v ...interface{}) {\n\toutput(LevelInfo, v...)\n}", "title": "" }, { "docid": "b6fc4f457004c14a64bac41e9012ede1", "score": "0.73421586", "text": "func Info(msg ...interface{}) {\n\tCurrent.Info(msg...)\n}", "title": "" }, { "docid": "4784b2a89da4b5cb506090a6d0743fb2", "score": "0.733288", "text": "func Info(v ...interface{}) {\n\tprint(InfoFont)\n\tfmt.Print(v...)\n\tterminal.Reset()\n}", "title": "" }, { "docid": "73e54769895ab3d211008a926f32b5f1", "score": "0.73205", "text": "func (logger *Logger) Info(args ...interface{}) {\n\tlogger.std.Log(append([]interface{}{\"Info\"}, args...)...)\n}", "title": "" }, { "docid": "723618be868c5b85130d4bdfe374851c", "score": "0.72884226", "text": "func Info(format string, args ...interface{}) {\n\treport(color.GreenString, \"INFO\", format, args...)\n}", "title": "" }, { "docid": "319cc5f17b793d299ee9facc34e6ea42", "score": "0.7245412", "text": "func Info() string {\n\treturn fmt.Sprintf(\"(version=%s, branch=%s, revision=%s)\", version, branch, revision)\n}", "title": "" }, { "docid": "07e0a0881030e282bd674120e2eeb377", "score": "0.72412854", "text": "func Info(v ...interface{}) {\n\tInfof(\"%s\", fmt.Sprintln(v...))\n}", "title": "" }, { "docid": "149b2450c7e45bced2c7dcb70ea89ea1", "score": "0.7239061", "text": "func (srv *Server) CmdInfo(stdin io.ReadCloser, stdout io.Writer, args ...string) error {\n\timages, _ := srv.runtime.graph.All()\n\tvar imgcount int\n\tif images == nil {\n\t\timgcount = 0\n\t} else {\n\t\timgcount = len(images)\n\t}\n\tcmd := rcli.Subcmd(stdout, \"info\", \"\", \"Display system-wide information.\")\n\tif err := cmd.Parse(args); err != nil {\n\t\treturn nil\n\t}\n\tif cmd.NArg() > 0 {\n\t\tcmd.Usage()\n\t\treturn nil\n\t}\n\tfmt.Fprintf(stdout, \"containers: %d\\nversion: %s\\nimages: %d\\n\",\n\t\tlen(srv.runtime.List()),\n\t\tVERSION,\n\t\timgcount)\n\n\tif !rcli.DEBUG_FLAG {\n\t\treturn nil\n\t}\n\tfmt.Fprintln(stdout, \"debug mode enabled\")\n\tfmt.Fprintf(stdout, \"fds: %d\\ngoroutines: %d\\n\", getTotalUsedFds(), runtime.NumGoroutine())\n\treturn nil\n}", "title": "" }, { "docid": "4dfb381813a76f18c4de3cea91b1df4e", "score": "0.7235881", "text": "func Info(prefix string, info string) {\n\tfmt.Println(prefix, info)\n}", "title": "" }, { "docid": "1cc5e99784b0aa95a7fc7dc6920d0a42", "score": "0.723301", "text": "func (sl *SysLogger) Info(info, msg string) {\n\tlog.Println(\"[INFO]\", sl.tag, info, msg)\n}", "title": "" }, { "docid": "6943eea2852915ecc572fc139256ce2d", "score": "0.72121537", "text": "func Info(args ...interface{}) {\n\tNewDefaultEntry().Info(args...)\n}", "title": "" }, { "docid": "b3b31f4c82d93282cdc00132c6bca770", "score": "0.7207206", "text": "func Info(msg string, ctx ...interface{}) {\n\tmetrics.GetOrRegisterCounter(\"info\", nil).Inc(1)\n\tl.Output(msg, l.LvlInfo, CallDepth, ctx...)\n}", "title": "" }, { "docid": "c023a2a01992e51c716a338610ee50dc", "score": "0.72030526", "text": "func Info(args ...interface{}) {\n\tlogging.print(severity.InfoLog, logging.logger, logging.filter, args...)\n}", "title": "" }, { "docid": "9b923fc3bcd45f5f6216589d85608546", "score": "0.72018284", "text": "func (logger *Logger) Info(args ...interface{}) {\n\tlogger.logPrint(L_INFO, args...)\n}", "title": "" }, { "docid": "1b9d2553f667a56d4fb2f43f8c834e0e", "score": "0.7185357", "text": "func ExampleInfo() {\n\tsetup()\n\tlog.Info().Msg(\"hello world\")\n\n\t// Output: {\"level\":\"info\",\"time\":1199811905,\"message\":\"hello world\"}\n}", "title": "" }, { "docid": "b64b0ec6f0c6925870e7ecb82ec7f253", "score": "0.7156952", "text": "func PrintInfo() {\n\tPrint(GreenText(LibraryInfo()))\n}", "title": "" }, { "docid": "d6ae5891a2a0db3f8fc766e8bc65f976", "score": "0.7156404", "text": "func Info(data []byte) {\n\tlog.Print(\"INFO: \", string(data))\n}", "title": "" }, { "docid": "80b70dc1fd5506b80a4e7af1174cbba0", "score": "0.71536237", "text": "func Info() string {\n\treturn fmt.Sprintf(\"%s %s git commit %s go version %s build date %s\", Application, Version, Revision, GoVersion, BuildRFC3339)\n}", "title": "" }, { "docid": "9ded119f4380c87733d395422ed1d7bc", "score": "0.713871", "text": "func Info(ctx context.Context, args ...interface{}) {\n\tGetLogger().Log(ctx, loggers.InfoLevel, 1, args...)\n}", "title": "" }, { "docid": "6bd72f4b0c92b551022753905efde316", "score": "0.7136426", "text": "func Info(v ...interface{}) {\n\tpost(fmt.Sprint(_INFO_HEADER, fmt.Sprint(v...)), bufMap[\"InfoLocal\"])\n}", "title": "" }, { "docid": "e27431cba9ecf20fac0fe3aab88590e8", "score": "0.71070385", "text": "func (v Verbosity) Info(args ...interface{}) {\n\tif v {\n\t\tinfoLog.Output(CallDepth+1, fmt.Sprint(args...))\n\t}\n}", "title": "" }, { "docid": "5c751c96083cc9850d28b57b8400e03e", "score": "0.71062475", "text": "func Info(format string, v ...interface{}) {\n\tmsg := fmt.Sprintf(\"[I]\"+format, v...)\n\tlog.Println(msg)\n}", "title": "" }, { "docid": "1d254bf5f0efa4933e31ee3965b46300", "score": "0.71054363", "text": "func PrintInfo(message string) {\n\tfmt.Printf(cSkyyblue + message + noFormat + \"\\n\")\n}", "title": "" }, { "docid": "2b30c4a11df58cd54d465143ec3a267f", "score": "0.71028847", "text": "func (v Verbose) Info(args ...interface{}) {\n\tif v.enabled {\n\t\tlogging.print(severity.InfoLog, v.logger, logging.filter, args...)\n\t}\n}", "title": "" }, { "docid": "c938517ca9c35e5c4c9dee5920c3fa08", "score": "0.70961446", "text": "func Info() {\n\tfmt.Println(\n\t\tau.Sprintf(au.Cyan(\"aqa++ %v %v\"), au.White(\"v1.0.0\").Bold(), au.White(\"repl\")),\n\t)\n\n\tfmt.Println(\n\t\tau.Sprintf(\n\t\t\tau.White(\"Type '%v', '%v', '%v' or '%v'\"),\n\t\t\tau.BrightWhite(\"%lex\").Bold(),\n\t\t\tau.BrightWhite(\"%parse\").Bold(),\n\t\t\tau.BrightWhite(\"%eval\").Bold(),\n\t\t\tau.BrightWhite(\"%help\").Bold(),\n\t\t),\n\t)\n\n\tfmt.Println(\"\")\n}", "title": "" }, { "docid": "2f51a4d624b520711ac4e62bc73d2c80", "score": "0.70763415", "text": "func (c *Client) Info(payload string) string {\n\tvar result string\n\tif err := c.ClientRPC.Call(\"Server.Info\", payload, &result); err != nil {\n\t\tlog.Println(err)\n\t}\n\treturn result\n}", "title": "" }, { "docid": "6a6e97a6ae1317ee7f2fa9867f119302", "score": "0.70739675", "text": "func Info(args ...interface{}) {\n\tlog.Println(args...)\n}", "title": "" }, { "docid": "621e93d9ef71c31fd65e712e4c7963f4", "score": "0.7073628", "text": "func StdInfo(ctx context.Context, metadata interface{}, err error, message string) {\n\tinfoLogger.StdInfo(GetCtxRequestID(ctx), GetCtxID(ctx), err, metadata, message)\n}", "title": "" }, { "docid": "4acba7574352484ae865671ece98d2b3", "score": "0.70687795", "text": "func Info(f string, v ...interface{}) {\n\tLog.Printf(fmt.Sprintf(\"[Info] %s\", f), v...)\n}", "title": "" }, { "docid": "3031a526cfbc2e7752ab3381bb5f0c94", "score": "0.7068565", "text": "func (l *Logger) Info(format string, v ...interface{}) {\n\tfmt.Fprint(l.stderr, addColor(InfoPrefix+\" \", Green))\n\tfmt.Fprintf(l.stdout, appendNewLine(format), v...)\n}", "title": "" }, { "docid": "ebafeb029dfef1d3a8ffaaf0dccca2c5", "score": "0.70535225", "text": "func PrintInfo(version, commit, date string) {\n\tfmt.Println(\"🔥 Heamon version:\", version)\n\tfmt.Println(\"🛠️ Commit:\", commit)\n\tfmt.Println(\"📅 Release Date:\", date)\n}", "title": "" }, { "docid": "65f77fec3e70b6c54fde56facbef0887", "score": "0.7042383", "text": "func printInfo(format string, a ...interface{}) {\n\tif fetchConfig().verbosity < Info {\n\t\treturn\n\t}\n\tif fetchConfig().color {\n\t\tformat = color.FgGreen.Render(format)\n\t}\n\tfmt.Fprintf(os.Stdout, format+\"\\n\", a...)\n}", "title": "" }, { "docid": "661858a80ed6cc14e9ffa21949fdd516", "score": "0.7038134", "text": "func printInfo(message string, args ...interface{}) {\n\tif silent {\n\t\treturn\n\t}\n\tfmt.Printf(\"INFO Slack - \"+message+\"\\n\", args...)\n}", "title": "" }, { "docid": "34150ba49c9914b753e21fabb739b0fc", "score": "0.7037541", "text": "func (o Object) Info(f string, a ...interface{}) {\n\tif o.InfoEnabled {\n\t\to.PrintMsg(\"INFO\", 2, f, a...)\n\t}\n}", "title": "" }, { "docid": "a5ab92919659b42fb0fb3d1f9c5df68b", "score": "0.70243585", "text": "func (l dclLogger) Info(args ...interface{}) {\n\tlog.Print(args...)\n}", "title": "" }, { "docid": "a5ab92919659b42fb0fb3d1f9c5df68b", "score": "0.70243585", "text": "func (l dclLogger) Info(args ...interface{}) {\n\tlog.Print(args...)\n}", "title": "" }, { "docid": "c0dbbe0f21ebe0e09b3a1eb3c89fe972", "score": "0.7017347", "text": "func Info(args ...interface{}) {\n\tinfoLog.Output(CallDepth, fmt.Sprint(args...))\n}", "title": "" }, { "docid": "582ee28dc1c7a33309aa72ab545510df", "score": "0.70058495", "text": "func Info(ctx ...interface{}) {\n\tlogNormal(infoStatus, time.Now(), ctx...)\n}", "title": "" }, { "docid": "bc065c46daf5a8485e67dba30c7ce552", "score": "0.6979541", "text": "func (entry *Entry) Info(args ...interface{}) {\n\tentry.e.Info(args...)\n}", "title": "" }, { "docid": "f8384f5b7372990ef7c3d35fbadf4bf2", "score": "0.69771034", "text": "func Info(format string, a ...interface{}) {\n\tif currentLogger == nil {\n\t\treturn\n\t}\n\tcurrentLogger.output(currentPool, _InfoLevel, format, a...)\n}", "title": "" }, { "docid": "5f6642f7e0eabbe298cc66721aad060f", "score": "0.6957829", "text": "func (j DSGit) Info() string {\n\treturn fmt.Sprintf(\"%+v\", j)\n}", "title": "" }, { "docid": "adf54e159b9c94d56d7f3fb4f99a2a0a", "score": "0.6950905", "text": "func (logger *Logger) Info(a ...any) {\n\tlogger.echo(nil, level.Info, formatPrint, a...)\n}", "title": "" }, { "docid": "b37863ee39d95792c74c68786568fe73", "score": "0.69421244", "text": "func (e Employee) info() {\n\tfmt.Printf(\"name: %v\\nID: %v\\n\", e.name, e.id)\n}", "title": "" }, { "docid": "d0809d6766b8133a49a314508be6c381", "score": "0.69414747", "text": "func (z *Logger) Info(args ...interface{}) {\n\tz.SugaredLogger.Info(args...)\n}", "title": "" }, { "docid": "e3b6ce696b970b6e4cc1f5e90093cb43", "score": "0.6936312", "text": "func Info(ctx context.Context, msg string, args ...Args) {\n\tL(ctx).Log(NewEntry(LevelInfo, msg, args...))\n}", "title": "" }, { "docid": "e11d71d81828bc9b1f3dd1c382712368", "score": "0.69312066", "text": "func (p *Plog) Info(msg string) {\n\tfmt.Println(msg)\n\n\tif p.verbose {\n\t\tp.Print(msg)\n\t}\n}", "title": "" }, { "docid": "33c92009ad66787225f2477fb290eb7b", "score": "0.693088", "text": "func Info(format string, args ...interface{}) {\n\tfmt.Printf(\"\\x1b[34;1m%s\\x1b[0m\\n\", fmt.Sprintf(format, args...))\n}", "title": "" }, { "docid": "f2bd6510d09e21978e28e37777516343", "score": "0.6929342", "text": "func infohandler(w http.ResponseWriter, r *http.Request) {\n\n\t// Get the hostname using a call to os package\n\thostname, _ := os.Hostname()\n\tfmt.Fprintf(w, \"Hostname: %s \\n\", hostname)\n\tfmt.Fprintf(w, \"Version: %s\", version)\n\n}", "title": "" }, { "docid": "d9c705357216b21d0f753177626316b3", "score": "0.6928923", "text": "func (logger *Logger) Info(s string) {\n\tif INFO >= logger.level {\n\t\tlogger.info.Print(s)\n\t}\n}", "title": "" }, { "docid": "cdf94f6fcbc4e9f22a9bf6eae1f6fdaf", "score": "0.6928088", "text": "func (slog stdLogger) Info(s string) {\n\tif logger.Logger != nil {\n\t\tlogger.Write([]byte(\" INFO \" + s))\n\t} else {\n\t\tlog.Printf(\" INFO \" + s)\n\t}\n}", "title": "" }, { "docid": "a179a2e30aeeea4562193937c4bf9d56", "score": "0.69163835", "text": "func (j DSGitHub) Info() string {\n\treturn fmt.Sprintf(\"%+v\", j)\n}", "title": "" }, { "docid": "4c5cdf807873747ba50b579c99d32126", "score": "0.6913092", "text": "func Info(msg string) {\n\tif lvl <= inf {\n\t\tl.Print(\"[INFO ]: \" + msg)\n\t}\n}", "title": "" }, { "docid": "83541f74bd44f25ae05b7e2a842ec314", "score": "0.6908044", "text": "func Info(v ...interface{}) {\n\tjasonLog.output(2, levelInfo, \"\", v...)\n}", "title": "" }, { "docid": "47f51790c8130c58256281bc65f7b066", "score": "0.6900766", "text": "func (h *Handler) Info(args []string) error {\n\tvar sessions []models.Session\n\th.writeToUser(\"You are %v, logged from %v with IP of %v.\", h.CurrentUser.Name, h.Hostname, h.IP)\n\th.writeToUser(\"Your previous sessions: \")\n\terr := models.DB.Table(\"session\").Find(&sessions).Where(\"userId=?\", h.CurrentUser.ID).Error\n\tif err != nil {\n\t\treturn err\n\t}\n\tk := 0\n\tfor _, v := range sessions {\n\t\tk++\n\t\th.writeToUser(\"%v) %v(%v) since %v \\n\\r\", k, v.Hostname, v.IP, v.CreatedAt.Format(\"15:04:05\"))\n\t}\n\th.writeToUser(\"\")\n\treturn nil\n}", "title": "" }, { "docid": "fc3c36e22cce5e3b8313d6f0b90fdcbc", "score": "0.6897971", "text": "func Info(a interfaces.AssumeCredentialProcess, emoji string, prefix string, message string) {\n\ts := a.GetDestination()\n\n\tformatted := format(a, textColorInfo, emoji, prefix, message)\n\tfmt.Fprint(s, formatted)\n\n}", "title": "" }, { "docid": "37fbd951fb9bbb3e71689986ef6461f4", "score": "0.6889946", "text": "func (l *Logger) Info(format string, v ...interface{}) {\n\tif Verbosity > 1 {\n\t\treturn\n\t}\n\n\tif !l.IsEnabled() {\n\t\treturn\n\t}\n\n\tv, attrs := SplitAttrs(v...)\n\n\tl.Output(1, \"INFO\", fmt.Sprintf(format, v...), attrs)\n}", "title": "" }, { "docid": "edede46739044017a1080b109ab6bd37", "score": "0.6889867", "text": "func (a *APIGen) Info(ctx context.Context) (Info, error) {\n\tpanic(\"Should Not Be Called from Gen Pattern.\")\n}", "title": "" }, { "docid": "34a138fd0c3a836b1a5eb2249a426a23", "score": "0.6889537", "text": "func Info(msg string) {\n log.Info(msg)\n}", "title": "" }, { "docid": "fe2e2d8f7a0791235d806dba7c273536", "score": "0.68869126", "text": "func (l *Logger) Info(v ...interface{}) {\n\tif l.loglevel <= sInfo {\n\t\tl.output(sInfo, 0, fmt.Sprint(v...))\n\t} else {\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "8f4139c95c619beca20390809a29b08b", "score": "0.688477", "text": "func Info(cmdTag, format string, a ...interface{}) {\n\tfmt.Printf(format+\"\\n\", a...)\n\tif level < LevelInfo || !logging {\n\t\treturn\n\t}\n\tif _, ok := cmdMap[cmdTag]; !ok {\n\t\tcmdTag = Mixer\n\t}\n\tlogTag(\"INF\", cmdTag, format, a...)\n}", "title": "" }, { "docid": "a694f17faddb13bc260d3e261eb80ba1", "score": "0.6883452", "text": "func (sle *SystemLogWriter) Info(msg string, args ...interface{}) error {\n\treturn sle.out.WriteEvent(context.Background(), sle.gen.Info(msg, args...))\n}", "title": "" }, { "docid": "3e35b8b7c9123da06db172c6e150d339", "score": "0.68822765", "text": "func TestInfo(t *testing.T) {\n\tr, w, _ := os.Pipe()\n\tSetOutputs(Output{\n\t\tName: \"test\",\n\t\tWriter: w,\n\t\tLevels: level.Default,\n\t})\n\n\tInfo(\"Test info\")\n\toutC := make(chan string)\n\tgo ioCopy(r, outC)\n\tw.Close()\n\tout := <-outC\n\n\texpected := \"Test info\"\n\tn := level.Labels[level.Info]\n\tif !strings.Contains(out, expected) || !strings.Contains(out, n) {\n\t\tt.Errorf(\"Result `%s` doesn't contains `%s` and `%s`\",\n\t\t\tout, expected, n)\n\t}\n}", "title": "" }, { "docid": "7492d5c305b2e7f234164e9220aa16c7", "score": "0.68734163", "text": "func RunInfo(ctx CommandContext, args InfoArgs) error {\n\t// FIXME: fmt.Fprintf(ctx.Stdout, \"Servers: %s\\n\", \"quantity\")\n\t// FIXME: fmt.Fprintf(ctx.Stdout, \"Images: %s\\n\", \"quantity\")\n\tfmt.Fprintf(ctx.Stdout, \"Debug mode (client):\\t%v\\n\", ctx.Getenv(\"DEBUG\") != \"\")\n\n\tfmt.Fprintf(ctx.Stdout, \"Organization:\\t\\t%s\\n\", ctx.API.Organization)\n\t// FIXME: add partially-masked token\n\tfmt.Fprintf(ctx.Stdout, \"API Endpoint:\\t\\t%s\\n\", api.ComputeAPI)\n\tconfigPath, _ := config.GetConfigFilePath()\n\tfmt.Fprintf(ctx.Stdout, \"RC file:\\t\\t%s\\n\", configPath)\n\tfmt.Fprintf(ctx.Stdout, \"User:\\t\\t\\t%s\\n\", ctx.Getenv(\"USER\"))\n\tfmt.Fprintf(ctx.Stdout, \"CPUs:\\t\\t\\t%d\\n\", runtime.NumCPU())\n\thostname, _ := os.Hostname()\n\tfmt.Fprintf(ctx.Stdout, \"Hostname:\\t\\t%s\\n\", hostname)\n\tcliPath, _ := osext.Executable()\n\tfmt.Fprintf(ctx.Stdout, \"CLI Path:\\t\\t%s\\n\", cliPath)\n\n\tfmt.Fprintln(ctx.Stdout, \"\")\n\tfmt.Fprintf(ctx.Stdout, \"Cache:\\t\\t\\t%s\\n\", ctx.API.Cache.Path)\n\tfmt.Fprintf(ctx.Stdout, \" Servers:\\t\\t%d\\n\", ctx.API.Cache.GetNbServers())\n\tfmt.Fprintf(ctx.Stdout, \" Images:\\t\\t%d\\n\", ctx.API.Cache.GetNbImages())\n\tfmt.Fprintf(ctx.Stdout, \" Snapshots:\\t\\t%d\\n\", ctx.API.Cache.GetNbSnapshots())\n\tfmt.Fprintf(ctx.Stdout, \" Volumes:\\t\\t%d\\n\", ctx.API.Cache.GetNbVolumes())\n\tfmt.Fprintf(ctx.Stdout, \" Bootscripts:\\t\\t%d\\n\", ctx.API.Cache.GetNbBootscripts())\n\n\tuser, err := ctx.API.GetUser()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Unable to get your SSH Keys\")\n\t}\n\n\tif len(user.SSHPublicKeys) == 0 {\n\t\tfmt.Fprintln(ctx.Stdout, \"You have no ssh keys\")\n\t} else {\n\t\tfmt.Fprintln(ctx.Stdout, \"\")\n\t\tfmt.Fprintln(ctx.Stdout, \"SSH Keys:\")\n\t\tfor id, key := range user.SSHPublicKeys {\n\t\t\tfmt.Fprintf(ctx.Stdout, \" [%d] %s\\n\", id, key.Fingerprint)\n\t\t}\n\t\tfmt.Fprintf(ctx.Stdout, \"\\n\")\n\t}\n\n\tdashboard, err := ctx.API.GetDashboard()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Unable to get your dashboard\")\n\t}\n\tfmt.Fprintln(ctx.Stdout, \"Dashboard:\")\n\tfmt.Fprintf(ctx.Stdout, \" Volumes:\\t\\t%d\\n\", dashboard.VolumesCount)\n\tfmt.Fprintf(ctx.Stdout, \" Running servers:\\t%d\\n\", dashboard.RunningServersCount)\n\tfmt.Fprintf(ctx.Stdout, \" Images:\\t\\t%d\\n\", dashboard.ImagesCount)\n\tfmt.Fprintf(ctx.Stdout, \" Snapshots:\\t\\t%d\\n\", dashboard.SnapshotsCount)\n\tfmt.Fprintf(ctx.Stdout, \" Servers:\\t\\t%d\\n\", dashboard.ServersCount)\n\tfmt.Fprintf(ctx.Stdout, \" Ips:\\t\\t\\t%d\\n\", dashboard.IPsCount)\n\n\tfmt.Fprintf(ctx.Stdout, \"\\n\")\n\tpermissions, err := ctx.API.GetPermissions()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Unable to get your permisssions\")\n\t}\n\tfmt.Fprintln(ctx.Stdout, \"Permissions:\")\n\tfor _, service := range permissions.Permissions {\n\t\tfor key, serviceName := range service {\n\t\t\tfmt.Fprintf(ctx.Stdout, \" %s\\n\", key)\n\t\t\tfor _, perm := range serviceName {\n\t\t\t\tfmt.Fprintf(ctx.Stdout, \" %s\\n\", perm)\n\t\t\t}\n\t\t}\n\t}\n\tfmt.Fprintf(ctx.Stdout, \"\\n\")\n\tquotas, err := ctx.API.GetQuotas()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Unable to get your quotas\")\n\t}\n\tfmt.Fprintln(ctx.Stdout, \"Quotas:\")\n\tfor key, value := range quotas.Quotas {\n\t\tfmt.Fprintf(ctx.Stdout, \" %-20s: %d\\n\", key, value)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "451d607c7cae9f09f395f170b44e07e7", "score": "0.6871817", "text": "func (l *Logger) Info(v ...interface{}) {\n\tl.NewEntry().Print(INFO, v...)\n}", "title": "" }, { "docid": "bbf9e892cfa967a58ddae9b617c07108", "score": "0.6864165", "text": "func Info(message string) {\n\tlogger.Printf(\"INFO %s\", message)\n}", "title": "" }, { "docid": "e7f49204ca08b974a130516c59a70430", "score": "0.68487626", "text": "func (l *Logger) Info(v ...interface{}) {\n\tl.Log(fmt.Sprintln(v...), Linfo, 0)\n}", "title": "" }, { "docid": "27b8dac31e8ca92d404d290d861e8933", "score": "0.6848207", "text": "func (l *Logger) Info(message string) {\n\tl.printLogMessage(keptnLogMessage{Timestamp: time.Now(), Message: message, LogLevel: \"INFO\"})\n}", "title": "" }, { "docid": "77c47d724081e6b2935df5cb182bffc3", "score": "0.6845062", "text": "func Info(args ...interface{}) {\r\n\tLogger.Info(\"\", args)\r\n}", "title": "" }, { "docid": "40cc7b3888eab8fd29893652621932e2", "score": "0.6843702", "text": "func Info(v ...interface{}) {\n\tinfoLogger.Print(v...)\n}", "title": "" }, { "docid": "c06622e8fcf44d3f416cd2147947836f", "score": "0.6837543", "text": "func Info(a ...interface{}) {\n\tcolor.Set(color.FgHiCyan)\n\tdefer color.Unset()\n\tinfoLogger.Println(a...)\n}", "title": "" }, { "docid": "8f3f9943b8f73cef85af1c3bdc7c1d7a", "score": "0.6822807", "text": "func Info(args ...interface{}) {\n\tlog.Info(args...)\n}", "title": "" }, { "docid": "8f3f9943b8f73cef85af1c3bdc7c1d7a", "score": "0.6822807", "text": "func Info(args ...interface{}) {\n\tlog.Info(args...)\n}", "title": "" }, { "docid": "0e75a6b5ddf9553d6ae19e05147238af", "score": "0.68182665", "text": "func (l *PlexLogger) Info(msg string, kvs ...interface{}) {\n\tl.send(PlexLogInfo, msg, kvs...)\n}", "title": "" }, { "docid": "0f93a17d0fe235f3566346a1f6d70fee", "score": "0.6812388", "text": "func (h *Handler) Info(c router.Control) {\n\thost, _ := os.Hostname()\n\tm := new(runtime.MemStats)\n\truntime.ReadMemStats(m)\n\n\tc.Code(http.StatusOK)\n\tc.Body(Status{\n\t\tHost: host,\n\t\tVersion: version.RELEASE,\n\t\tCommit: version.COMMIT,\n\t\tRepo: version.REPO,\n\t\tCompiler: runtime.Version(),\n\t\tRuntime: Runtime{\n\t\t\tCPU: runtime.NumCPU(),\n\t\t\tMemory: fmt.Sprintf(\"%.2fMB\", float64(m.Sys)/(1<<(10*2))),\n\t\t\tGoroutines: runtime.NumGoroutine(),\n\t\t},\n\t\tState: State{\n\t\t\tMaintenance: h.maintenance,\n\t\t\tUptime: time.Now().Sub(h.stats.startTime).String(),\n\t\t},\n\t\tRequests: Requests{\n\t\t\tDuration: Duration{\n\t\t\t\tAverage: h.stats.requests.Duration.Average,\n\t\t\t\tMax: h.stats.requests.Duration.Max,\n\t\t\t},\n\t\t\tCodes: Codes{\n\t\t\t\tC2xx: h.stats.requests.Codes.C2xx,\n\t\t\t\tC4xx: h.stats.requests.Codes.C4xx,\n\t\t\t\tC5xx: h.stats.requests.Codes.C5xx,\n\t\t\t},\n\t\t},\n\t})\n}", "title": "" }, { "docid": "09853b0fd22c7ca7afa3df7e526599f2", "score": "0.6808926", "text": "func Info(msg string) {\r\n\tif (currentLogLevel > info_level.value) {\r\n\t\treturn;\r\n\t}\r\n\r\n\tfmt.Fprintf(os.Stdout, adjustLog(info_level.name, msg))\r\n}", "title": "" }, { "docid": "3206a5240f5d5e60623acfa28c80933a", "score": "0.67993456", "text": "func (r *GitRegistry) Info(ct *out.Container) {\n\tct.Add(out.NewValue(\"Repository\", r.Repository))\n}", "title": "" }, { "docid": "0357c2be81a9f8310d426ba62d2e929a", "score": "0.6797223", "text": "func Info(msg string, args ...interface{}) {\n\n\tif level&INFO != 0 {\n\n\t\twriteMessage(\"INF\", msg, args...)\n\n\t}\n}", "title": "" }, { "docid": "c85b33f53ee6ac050e564dd74280ebc8", "score": "0.6795099", "text": "func (dl *defaultLogger) Info(msg string) {\n\tdl.Print(msg)\n}", "title": "" }, { "docid": "bcc5c253e9139bd63437f582853cba92", "score": "0.6791768", "text": "func (l Logger) Info(text ...string) {\n\tfmt.Fprintln(l.out, info(strings.Join(text, \" \")))\n}", "title": "" }, { "docid": "8f715650e14f026fb8227ad18bbfe789", "score": "0.6789858", "text": "func DisplayInfo(projectType string) {\n\tfmt.Println(Info(\"Attention please\"))\n\tfmt.Println()\n\tif strings.Contains(projectType, \"http\") || strings.Contains(projectType, \"grpc\") {\n\t\tfmt.Println(Warn(\"port information\"))\n\t\tfmt.Println(Details(\"readyGo does not know whether the port is available or not.\"))\n\t\tfmt.Println(Details(\"User has to make sure that the port is available and not behind firewall\"))\n\t}\n\tfmt.Println()\n\tif strings.Contains(projectType, \"grpc\") {\n\t\tfmt.Println(Warn(\"grpc protocol buffer information\"))\n\t\tfmt.Println(Details(\"readyGo does not generate proto buffer go files for you.\"))\n\t\tfmt.Println(Details(\"User has to make sure that protoc , proto_gen_go and protoc_gen_go_grpc tools are installed w.r.t the OS\"))\n\t}\n\tfmt.Println()\n\tif strings.Contains(projectType, \"mongo\") {\n\t\tfmt.Println(Warn(\"mongo database information\"))\n\t\tfmt.Println(Details(\"readyGo does not start the database.\"))\n\t\tfmt.Println(Details(\"Make sure your mongodb database is started , up and running\"))\n\t}\n\tfmt.Println()\n\tif strings.Contains(projectType, \"sql\") {\n\t\tfmt.Println(Warn(\"sql database information\"))\n\t\tfmt.Println(Details(\"readyGo does not start the database.\"))\n\t\tfmt.Println(Details(\"Make sure your sql database is started , up and running\"))\n\t}\n\tfmt.Println()\n}", "title": "" }, { "docid": "1f55107b7ef2c747e4440d1621a2967b", "score": "0.6782898", "text": "func (base Base) Info() (result map[string]string) {\n\treturn\n}", "title": "" } ]
f2dda6fea15bb4acbf9467f7059f4612
EncodeEntry encodes the log entry in logstash json format
[ { "docid": "e0669a22d391229163674819199450e8", "score": "0.6751226", "text": "func (e *Encoder) EncodeEntry(ent zapcore.Entry, fields []zapcore.Field) (*buffer.Buffer, error) {\n\n\tcfield, defined := caller(ent)\n\tif defined {\n\t\tfields = append(fields, cfield)\n\t}\n\n\tfields = append(fields, level(ent))\n\treturn e.enc.EncodeEntry(ent, fields)\n}", "title": "" } ]
[ { "docid": "75bf04a05de75e5b56c7630d6532c1d2", "score": "0.69732076", "text": "func (entry *LogEntry) encode() ([]byte, error) {\n\n\tn := entry.length()\n\tbuffer := make([]byte, 0, n)\n\twriter := bytes.NewBuffer(buffer)\n\n\t// write checksum\n\terr := binary.Write(writer, binary.LittleEndian, entry.Checksum)\n\tif nil != err {\n\t\treturn nil, err\n\t}\n\n\t// write request ID\n\terr = binary.Write(writer, binary.LittleEndian, entry.RequestId)\n\tif nil != err {\n\t\treturn nil, err\n\t}\n\n\t// write payload\n\t_, err = writer.Write(entry.Payload)\n\treturn writer.Bytes()[0:n], err\n\n}", "title": "" }, { "docid": "ed4b0a3c1cfa199be33df4959aea1c72", "score": "0.6776089", "text": "func (fe FilterEncoder) EncodeEntry(ent zapcore.Entry, fields []zapcore.Field) (*buffer.Buffer, error) {\n\t// without this clone and storing it to fe.wrapped, fields\n\t// from subsequent log entries get appended to previous\n\t// ones, and I'm not 100% sure why; see end of\n\t// https://github.com/uber-go/zap/issues/750\n\tfe.wrapped = fe.wrapped.Clone()\n\tfor _, field := range fields {\n\t\tfield.AddTo(fe)\n\t}\n\treturn fe.wrapped.EncodeEntry(ent, nil)\n}", "title": "" }, { "docid": "898d23419b91f3ee30aed67fc85344d7", "score": "0.65659803", "text": "func (v LogEntry) MarshalJSON() ([]byte, error) {\n\tw := jwriter.Writer{}\n\teasyjsonFa90ddaeEncodeGithubComAsmyasnikovGoMavlinkMavlinkDialectsAutoquad80(&w, v)\n\treturn w.Buffer.BuildBytes(), w.Error\n}", "title": "" }, { "docid": "3c1b6781a3db4afb75387a00c7624b00", "score": "0.6422123", "text": "func (v LogEntry) MarshalJSON() ([]byte, error) {\n\tw := jwriter.Writer{}\n\teasyjsonFa90ddaeEncodeGithubComAsmyasnikovGoMavlinkMavlinkDialectsAll100(&w, v)\n\treturn w.Buffer.BuildBytes(), w.Error\n}", "title": "" }, { "docid": "9f8542118f48f9cf027738a0da096d19", "score": "0.6357176", "text": "func (enc *jsonEncoder) WriteEntry(sink io.Writer, msg string, lvl Level, t time.Time) error {\n\tif sink == nil {\n\t\treturn errNilSink\n\t}\n\n\tfinal := jsonPool.Get().(*jsonEncoder)\n\tfinal.truncate()\n\tfinal.bytes = append(final.bytes, '{')\n\tenc.levelF(lvl).AddTo(final)\n\tenc.timeF(t).AddTo(final)\n\tenc.messageF(msg).AddTo(final)\n\tif len(enc.bytes) > 0 {\n\t\tif len(final.bytes) > 1 {\n\t\t\t// All the formatters may have been no-ops.\n\t\t\tfinal.bytes = append(final.bytes, ',')\n\t\t}\n\t\tfinal.bytes = append(final.bytes, enc.bytes...)\n\t}\n\tfinal.bytes = append(final.bytes, '}', '\\n')\n\n\texpectedBytes := len(final.bytes)\n\tn, err := sink.Write(final.bytes)\n\tfinal.Free()\n\tif err != nil {\n\t\treturn err\n\t}\n\tif n != expectedBytes {\n\t\treturn fmt.Errorf(\"incomplete write: only wrote %v of %v bytes\", n, expectedBytes)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8df05224b0b95554561edd394abcff37", "score": "0.6284485", "text": "func (jf *JSONFormatter) LogEntry(level int, msg string, args []interface{}) map[string]interface{} {\n\tbuf := pool.Get()\n\tdefer pool.Put(buf)\n\tjf.Format(buf, level, msg, args)\n\tvar entry map[string]interface{}\n\terr := json.Unmarshal(buf.Bytes(), &entry)\n\tif err != nil {\n\t\tpanic(\"unable to unmarhsal entry from JSONFormatter: \" + err.Error() + \" \\\"\" + buf.String() + \"\\\"\")\n\t}\n\treturn entry\n}", "title": "" }, { "docid": "1b33d12edab5e17f92b4dc0054f974ea", "score": "0.6226129", "text": "func (f *JSONFormatter) Format(entry *log.Entry) ([]byte, error) {\n\tdata := make(log.Fields, len(entry.Data)+3)\n\tfor k, v := range entry.Data {\n\t\tswitch v := v.(type) {\n\t\tcase error:\n\t\t\t// Otherwise errors are ignored by `encoding/json`\n\t\t\t// https://github.com/sirupsen/logrus/issues/137\n\t\t\tdata[k] = v.Error()\n\t\tdefault:\n\t\t\tdata[k] = v\n\t\t}\n\t}\n\n\tprefixFieldClashes(data)\n\n\ttimestampFormat := f.TimestampFormat\n\tif timestampFormat == \"\" {\n\t\ttimestampFormat = defaultTimestampFormat\n\t}\n\n\tif !f.DisableTimestamp {\n\t\tdata[resolve(f.FieldMap, FieldKeyTime)] = entry.Time.Format(timestampFormat)\n\t}\n\tdata[resolve(f.FieldMap, FieldKeyMsg)] = entry.Message\n\tdata[resolve(f.FieldMap, FieldKeyLevel)] = entry.Level.String()\n\n\tvar (\n\t\tserialized []byte\n\t\terr error\n\t)\n\n\tif f.Indent {\n\t\tserialized, err = json.MarshalIndentWithOptions(data, \"\", \" \", json.MarshalOptions{SkipUnserializableFields: true})\n\t} else {\n\t\tserialized, err = json.MarshalWithOptions(data, json.MarshalOptions{SkipUnserializableFields: true})\n\t}\n\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Failed to marshal fields to JSON, %v\", err)\n\t}\n\n\treturn append(serialized, '\\n'), nil\n}", "title": "" }, { "docid": "dc96bd92e6a83cf60060ae476fd888cf", "score": "0.61701363", "text": "func (v LogEntry) MarshalEasyJSON(w *jwriter.Writer) {\n\teasyjsonFa90ddaeEncodeGithubComAsmyasnikovGoMavlinkMavlinkDialectsAutoquad80(w, v)\n}", "title": "" }, { "docid": "c2592233c20d70aae0b4678532a9819d", "score": "0.60879", "text": "func (f *Formatter) Format(entry *logrus.Entry) ([]byte, error) {\n\tdata := make(logrus.Fields, len(entry.Data)+2)\n\n\tfor k, v := range entry.Data {\n\t\tswitch v := v.(type) {\n\t\tcase error:\n\t\t\tdata[k] = v.Error()\n\t\tdefault:\n\t\t\tdata[k] = v\n\t\t}\n\t}\n\n\tdata[\"time\"] = entry.Time.Format(timestampFormat)\n\tdata[\"message\"] = entry.Message\n\n\tlogEntry := map[string]interface{}{\n\t\t\"log\": data,\n\t\t\"level\": entry.Level.String(),\n\t}\n\n\tserialized, err := json.Marshal(logEntry)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Failed to marshal fields to JSON, %v\", err)\n\t}\n\treturn append(serialized, '\\n'), nil\n}", "title": "" }, { "docid": "af6c32dd236beae8f48ea593cd6fe1d6", "score": "0.60698587", "text": "func (v LogEntry) MarshalEasyJSON(w *jwriter.Writer) {\n\teasyjsonFa90ddaeEncodeGithubComAsmyasnikovGoMavlinkMavlinkDialectsAll100(w, v)\n}", "title": "" }, { "docid": "0c5d8520f444581e0a67b94bbdd8c931", "score": "0.60302883", "text": "func Encode(s string, m map[string]interface{}) (string, error) {\n\tdocument := map[string]interface{}{\n\t\t\"message\": s,\n\t\t\"host\": os.Getenv(\"HOSTNAME\"),\n\t\t\"type\": \"logs\",\n\t}\n\n\tfor k, v := range m {\n\t\tdocument[k] = v\n\t}\n\n\tbytes, err := json.Marshal(document)\n\treturn string(bytes), err\n}", "title": "" }, { "docid": "cf660fb26fd761634013e08c904bf7ee", "score": "0.60158", "text": "func (mf *MyFormatter) Format(entry *logruslog.Entry) ([]byte, error) {\n\tvar b *bytes.Buffer\n\tif entry.Buffer != nil {\n\t\tb = entry.Buffer\n\t} else {\n\t\tb = &bytes.Buffer{}\n\t}\n\n\tvar data data\n\tfor k, v := range entry.Data {\n\t\tswitch k {\n\t\tcase \"files\":\n\t\t\tdata.File = v.(string)\n\t\tcase \"errors\":\n\t\t\tdata.Err = v.(error)\n\t\tdefault:\n\n\t\t}\n\t}\n\tdata.Time = entry.Time.Format(time.RFC3339)\n\tdata.Msg = entry.Message\n\tlevel, _ := entry.Level.MarshalText()\n\tdata.Level = string(level)\n\n\tencoder := json.NewEncoder(b)\n\tif mf.PrettyPrint{\n\t\tencoder.SetIndent(\"\", \" \")\n\t}\n\n\tif err := encoder.Encode(data); err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to marshal fields to JSON, %v\", err)\n\t}\n\n\treturn b.Bytes(), nil\n}", "title": "" }, { "docid": "1c5db3d2547c3b1aa43ded396b36eb49", "score": "0.5970515", "text": "func DumpEntry(entry *libs.Entry) []byte {\n\tvar buf = make([]byte, 0, 1024)\n\tbuf = append(buf, '{')\n\t// write fields\n\tcount := 0\n\tif entry.Fields == nil {\n\t\tentry.Fields = map[string]libs.Value{}\n\t}\n\tentry.Fields[\"@timestamp\"] = libs.\n\t\tValue{IVal: int64(entry.Timestamp),\n\t\tType: libs.ValueTypes.INT}\n\tfor key, value := range entry.Fields {\n\t\tif count > 0 {\n\t\t\tbuf = append(buf, ',')\n\t\t}\n\t\tbuf = append(buf, '\"')\n\t\tbuf = append(buf, key...)\n\t\tbuf = append(buf, '\"')\n\t\tbuf = append(buf, ':')\n\t\tbuf = appendValue(buf, value)\n\t\tcount++\n\t}\n\t// write tags\n\tbuf = append(buf, \",\\\"@tag\\\":\"...)\n\tbuf = append(buf, '[')\n\tfor i, tag := range entry.Tags {\n\t\tif i > 0 {\n\t\t\tbuf = append(buf, ',')\n\t\t}\n\t\tbuf = appendValue(buf, tag)\n\t}\n\tbuf = append(buf, ']')\n\t// write body\n\tbuf = append(buf, \",\\\"@body\\\":\\\"\"...)\n\tbuf = append(buf, entry.Body...)\n\tbuf = append(buf, \"\\\"\"...)\n\tbuf = append(buf, '}')\n\treturn buf\n}", "title": "" }, { "docid": "bcf8ab478289f6cf67fca28dd828d5ad", "score": "0.59673434", "text": "func (f *JSONFormatter) Format(entry *logrus.Entry) ([]byte, error) {\n\tdata := make(logrus.Fields, len(entry.Data)+3)\n\tlevelValue := FieldValueLevel\n\tfor k, v := range entry.Data {\n\t\tif k == FieldKeyLevel {\n\t\t\tlevelValue = v.(string)\n\t\t}\n\t\tswitch v := v.(type) {\n\t\tcase error:\n\t\t\t// Otherwise errors are ignored by `encoding/json`\n\t\t\t// https://github.com/sirupsen/logrus/issues/137\n\t\t\tdata[k] = v.Error()\n\t\tdefault:\n\t\t\tdata[k] = v\n\t\t}\n\t}\n\n\tif f.DataKey != \"\" {\n\t\tnewData := make(logrus.Fields, 4)\n\t\tnewData[f.DataKey] = data\n\t\tdata = newData\n\t}\n\n\tif f.TimestampFormat == \"\" {\n\t\tf.TimestampFormat = defaultTimestampFormat\n\t}\n\n\tif !f.DisableTimestamp {\n\t\tdata[FieldKeyTime] = entry.Time.Format(f.TimestampFormat)\n\t}\n\n\tif entry.Message != \"\" {\n\t\tdata[FieldKeyMsg] = entry.Message\n\t}\n\n\tif levelValue != FieldValueLevel {\n\t\tdata[FieldKeyLevel] = levelValue\n\t}\n\n\tvar b *bytes.Buffer\n\tif entry.Buffer != nil {\n\t\tb = entry.Buffer\n\t} else {\n\t\tb = &bytes.Buffer{}\n\t}\n\n\tencoder := json.NewEncoder(b)\n\tif f.PrettyPrint {\n\t\tencoder.SetIndent(\"\", \" \")\n\t}\n\tif err := encoder.Encode(data); err != nil {\n\t\treturn nil, fmt.Errorf(\"Failed to marshal fields to JSON, %v\", err)\n\t}\n\n\treturn b.Bytes(), nil\n}", "title": "" }, { "docid": "2e359d7dd85b8383f0625265f088a44a", "score": "0.596701", "text": "func (log *Log) writeEntry(entry *LogEntry) (int, error) {\n\tbuffer, err := entry.encode()\n\tif nil != err {\n\t\treturn 0, err\n\t}\n\treturn log.Write(buffer)\n}", "title": "" }, { "docid": "48494f508a9948f7f4c4d72fe19d949b", "score": "0.58865345", "text": "func (f *Formatter) Format(entry *logrus.Entry) ([]byte, error) {\n\tb := &bytes.Buffer{}\n\n\tnow := time.Now()\n\n\thostname, err := os.Hostname()\n\tif err == nil {\n\t\tf.Hostname = hostname\n\t}\n\n\t// Based on https://github.com/RedHatInsights/insights-ingress-go/blob/master/logger/logger.go\n\tdata := map[string]interface{}{\n\t\t\"@timestamp\": now.Format(\"2006-01-02T15:04:05.999Z\"),\n\t\t\"@version\": 1,\n\t\t\"message\": entry.Message,\n\t\t\"levelname\": entry.Level.String(),\n\t\t\"source_host\": f.Hostname,\n\t\t\"app\": \"image-builder\",\n\t\t\"caller\": entry.Caller.Func.Name(),\n\t}\n\n\tfor k, v := range entry.Data {\n\t\tswitch v := v.(type) {\n\t\tcase error:\n\t\t\tdata[k] = v.Error()\n\t\tdefault:\n\t\t\tdata[k] = v\n\t\t}\n\t}\n\n\tj, err := json.Marshal(data)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tb.Write(j)\n\tb.WriteRune('\\n')\n\n\treturn b.Bytes(), nil\n}", "title": "" }, { "docid": "414ce4b3663a8141bb3e00ccdec281c1", "score": "0.5812447", "text": "func (m MSDeployLogEntry) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"message\", m.Message)\n\tpopulateTimeRFC3339(objectMap, \"time\", m.Time)\n\tpopulate(objectMap, \"type\", m.Type)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "8f30c02b586f949b835312115c800bc1", "score": "0.57872057", "text": "func (f *GelfTimestampFormatter) Format(entry *logrus.Entry) ([]byte, error) {\n\tdata := make(fields, len(entry.Data)+6)\n\tblacklist := []string{\"_id\", \"id\", \"timestamp\", \"version\", \"level\"}\n\tvar timestamp float64\n\n\tfor k, v := range entry.Data {\n\n\t\tif contains(k, blacklist) {\n\t\t\tcontinue\n\t\t}\n\n\t\tif k == \"_timestamp\" {\n\t\t\ttimestamp = v.(float64)\n\t\t\tcontinue\n\t\t}\n\n\t\tswitch v := v.(type) {\n\t\tcase error:\n\t\t\t// Otherwise errors are ignored by `encoding/json`\n\t\t\tdata[\"_\"+k] = v.Error()\n\t\tdefault:\n\t\t\tdata[\"_\"+k] = v\n\t\t}\n\t}\n\n\tdata[\"version\"] = \"1.1\"\n\tdata[\"short_message\"] = entry.Message\n\tif timestamp != 0 {\n\t\tdata[\"timestamp\"] = timestamp\n\t} else {\n\t\tdata[\"timestamp\"] = round((float64(entry.Time.UnixNano())/float64(1000000))/float64(1000), 4)\n\t}\n\tdata[\"level\"] = entry.Level\n\tdata[\"level_name\"] = entry.Level.String()\n\tdata[\"_pid\"] = os.Getpid()\n\n\tserialized, err := json.Marshal(data)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Failed to marshal fields to JSON, %v\", err)\n\t}\n\n\treturn append(serialized, '\\n'), nil\n}", "title": "" }, { "docid": "b9d6235f3a45a04b57d15567709e01a3", "score": "0.57776606", "text": "func (f *EmbedFormatter) Format(entry *logrus.Entry) ([]byte, error) {\n\treturn json.Marshal(f.Embed(entry))\n}", "title": "" }, { "docid": "ac92d6971788b6f80953e7271e4acf74", "score": "0.57564604", "text": "func formatEntry(data []byte) []byte {\n\t// unmarshall data to Info struct and format w/o field names\n\tvar mapData *MapData\n\tif err := json.Unmarshal(data, &mapData); err != nil {\n\t\tfmt.Printf(\"JSON unmarshalling failed: %s\\n files written: %v\", err, Index)\n\t}\n\ts := fmt.Sprintf(\"%v\", mapData) // was e.Data\n\n\t// remove & replace non-alpha-numeric characters and lowercase text\n\treg, err := regexp.Compile(\"[^a-zA-Z0-9]+\") // removes all non alpha-numeric characters\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\trmNewln := strings.Replace(s, \"\\n\", \" \", -1) // replace terms joined by \\n with 4 spaces (ex: \"boy\\nThey\" -> \"boy\", \"They\")\n\trmApost := strings.Replace(rmNewln, \"'\", \"\", -1) // don't split contractions (ex: 'can't' !-> \"can\", \"t\")\n\trmComma := strings.Replace(rmApost, \",\", \"\", -1) // don't split numerical values > 999 (ex: 20,000 !-> 20 000)\n\tlwr := strings.ToLower(rmComma)\n\tformatted := []byte(reg.ReplaceAllString(lwr, \" \"))\n\n\treturn formatted\n}", "title": "" }, { "docid": "cc6b544ee0930cecb9ef770a2b078b0d", "score": "0.5689746", "text": "func (f *encoder) Encode(buf *logf.Buffer, e logf.Entry) error {\n\tf.buf = buf\n\n\t// There are messages in buffer already. Add message separator.\n\tif f.buf.Len() != 0 {\n\t\tf.buf.AppendByte('\\n')\n\t}\n\n\t// PRIORITY.\n\tif !f.DisableFieldPriority {\n\t\tf.EncodeFieldInt64(DefaultFieldKeyPriority, int64(f.levelToPriority(e.Level)))\n\t}\n\n\t// Level.\n\tif !f.DisableFieldLevel {\n\t\tf.addKey(f.FieldKeyLevel)\n\t\tf.EncodeLevel(e.Level, f)\n\t}\n\n\t// MESSAGE.\n\tf.EncodeFieldString(DefaultFieldKeyMessage, e.Text)\n\n\t// Time.\n\tif !f.DisableFieldTime {\n\t\tf.EncodeFieldTime(f.FieldKeyTime, e.Time)\n\t}\n\n\t// Logger name.\n\tif !f.DisableFieldName && e.LoggerName != \"\" {\n\t\tf.EncodeFieldString(f.FieldKeyName, e.LoggerName)\n\t}\n\n\t// Caller.\n\tif !f.DisableFieldCaller && e.Caller.Specified {\n\t\tf.addKey(f.FieldKeyCaller)\n\t\tf.EncodeCaller(e.Caller, f)\n\t}\n\n\t// Logger fields.\n\tif bytes, ok := f.cache.Get(e.LoggerID); ok {\n\t\tbuf.AppendBytes(bytes)\n\t} else {\n\t\tle := buf.Len()\n\t\tfor _, field := range e.DerivedFields {\n\t\t\tfield.Accept(f)\n\t\t}\n\n\t\tbf := make([]byte, buf.Len()-le)\n\t\tcopy(bf, buf.Data[le:])\n\t\tf.cache.Set(e.LoggerID, bf)\n\t}\n\n\t// Entry's fields.\n\tfor _, field := range e.Fields {\n\t\tfield.Accept(f)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "2597f5ee4a8cc6e0d9fac7ebd2754fef", "score": "0.563334", "text": "func (e Entry) String() string {\n\tif e.Severity == \"\" {\n\t\te.Severity = \"INFO\"\n\t}\n\tout, err := json.Marshal(e)\n\tif err != nil {\n\t\tlog.Printf(\"json.Marshal: %v\", err)\n\t}\n\treturn string(out)\n}", "title": "" }, { "docid": "1e682c6bb998a8574e30108c8beb660a", "score": "0.56299144", "text": "func (h *JSONFormatterHook) PostFormat(entry *log.Entry, formatted *bytes.Buffer) error {\n\tparsed := make(map[string]interface{})\n\terr := json.Unmarshal(formatted.Bytes(), &parsed)\n\tif err != nil {\n\t\treturn err\n\t}\n\tlogEntryDataBytes, err := convertMapToBytes(parsed)\n\tif err != nil {\n\t\treturn err\n\t}\n\tintegrity, newChain, err := h.integrityCalculator.CalculateIntegrityCheck(logEntryDataBytes)\n\tif err != nil {\n\t\treturn err\n\t}\n\tparsed[IntegrityKey] = hex.EncodeToString(integrity)\n\tif newChain {\n\t\tparsed[AuditLogChainKey] = NewAuditLogChainValue\n\t}\n\tnewFormatted, err := json.Marshal(parsed)\n\tif err != nil {\n\t\treturn err\n\t}\n\tformatted.Truncate(0)\n\tformatted.Write(newFormatted)\n\tformatted.WriteString(\"\\n\")\n\treturn nil\n}", "title": "" }, { "docid": "b8d1c115a510bb6b6ead7c08b7d43b00", "score": "0.5578629", "text": "func (entry *LogDataEntry) ToString() string {\n\n\tjson, err := json.Marshal(entry)\n\tif err != nil {\n\t\taction := fmt.Sprintf(\"Creating Entry -> %s\", entry.Action)\n\t\tlogger.Fatal(action, err)\n\t}\n\n\treturn string(json)\n}", "title": "" }, { "docid": "c45a9b7b725db72c68408abe05d2dcc5", "score": "0.5573904", "text": "func GobEncodeEntry(entry Entry, w io.Writer) error {\n\tenc := gob.NewEncoder(w)\n\terr := enc.Encode(entry)\n\treturn err\n}", "title": "" }, { "docid": "6d832c19b1bd4229d7648af4918c2246", "score": "0.5544726", "text": "func (e *PushRequestStreamEntry) MarshalJSON() ([]byte, error) {\n\treturn []byte(fmt.Sprintf(\n\t\t\"[\\\"%d\\\", %q]\",\n\t\te.Timestamp.UnixNano(),\n\t\te.Line,\n\t)), nil\n}", "title": "" }, { "docid": "eb59193d2a82aed9d0ebc3f47361d808", "score": "0.55425537", "text": "func (e *EventEntry) ToJSON() []byte {\n\tres, _ := json.Marshal(e)\n\n\treturn res\n}", "title": "" }, { "docid": "8efa102ddb2ddc9be1cef5635a5ab66d", "score": "0.5490429", "text": "func (v TimeEntry) MarshalJSON() ([]byte, error) {\n\tw := jwriter.Writer{}\n\teasyjsonE672cca2EncodeGithubComSomniSomGoRedmine3(&w, v)\n\treturn w.Buffer.BuildBytes(), w.Error\n}", "title": "" }, { "docid": "d02abcd596b0c3c9460ac77c348e86b7", "score": "0.54698354", "text": "func JsonEncode(e Event) ([]byte, error) {\n\treturn jsonEncode(e.Context, e.DataEncoded, e.DataBase64)\n}", "title": "" }, { "docid": "e1e596d23d2cca7e3385da81dae38cc1", "score": "0.5468864", "text": "func (entry *LogMessageEntry) ToString() string {\n\n\toutput, err := json.Marshal(entry)\n\tif err != nil {\n\t\taction := fmt.Sprintf(\"Creating Entry -> %s\", entry.Action)\n\t\tlogger.Fatal(action, err)\n\t}\n\n\tcompactedBuffer := new(bytes.Buffer)\n\terr = json.Compact(compactedBuffer, output)\n\tif err != nil {\n\t\taction := fmt.Sprintf(\"Compacting Entry -> %s\", entry.Action)\n\t\tlogger.Fatal(action, err)\n\t}\n\n\treturn string(output)\n}", "title": "" }, { "docid": "6df8ae3c10bf356904a9f5c68370ea41", "score": "0.5460188", "text": "func (f *CustomFormatter) Format(entry *log.Entry) ([]byte, error) {\n\treturn []byte(fmt.Sprintf(\"%s\\n\", entry.Message)), nil\n}", "title": "" }, { "docid": "865b38b58c2d83380728b87249f1b7a1", "score": "0.5459161", "text": "func (v SampleEntry) MarshalJSON() ([]byte, error) {\n\tw := jwriter.Writer{}\n\teasyjsonE453ad8fEncodeGithubComSignalfxOndiskencoding2(&w, v)\n\treturn w.Buffer.BuildBytes(), w.Error\n}", "title": "" }, { "docid": "8eeab083d1f60f31367be77ceb3a6534", "score": "0.5404765", "text": "func (x *JSONOutput) Event(event *Event) {\n\n\tvar bytes []byte\n\tvar err error\n\tbytes, err = json.Marshal(event)\n\tif err != nil {\n\t\tx.root.InternalError(WrapError(\"Could not marshal log entry\", err))\n\t\treturn\n\t}\n\n\t_, e := x.writer.Write(bytes)\n\tif e != nil {\n\t\tx.root.InternalError(WrapError(\"Could not write entry\", e))\n\t\treturn\n\t}\n\n\t_, e = x.writer.Write([]byte(\"\\n\"))\n\tif e != nil {\n\t\tx.root.InternalError(WrapError(\"Could not write entry\", e))\n\t\treturn\n\t}\n\n}", "title": "" }, { "docid": "31bf286b16198df9f1186604e849594d", "score": "0.5392782", "text": "func (c *JSONLineCodec) Encode(e *event.Event) []byte {\n\tdata := e.Data()\n\tj, _ := json.Marshal(data)\n\treturn append(j, []byte(c.config.delimiter)...)\n}", "title": "" }, { "docid": "57ca49dfc80ec9e13e047d73dda55771", "score": "0.53843147", "text": "func (e entry) String() string {\n\t// JSON serialisability already verified on creation\n\tout, _ := json.Marshal(e)\n\treturn string(out)\n}", "title": "" }, { "docid": "5562bbb1b2e4e6ae5c771114d9f887e0", "score": "0.53346086", "text": "func (v BufferEntry) MarshalJSON() ([]byte, error) {\n\tw := jwriter.Writer{}\n\teasyjsonE453ad8fEncodeGithubComSignalfxOndiskencoding4(&w, v)\n\treturn w.Buffer.BuildBytes(), w.Error\n}", "title": "" }, { "docid": "b46c03970902e5d7994b27daecdf8974", "score": "0.5330039", "text": "func (v FilterEntry) MarshalJSON() ([]byte, error) {\n\tw := jwriter.Writer{}\n\teasyjsonC5a4559bEncodeGithubComChromedpCdprotoTarget11(&w, v)\n\treturn w.Buffer.BuildBytes(), w.Error\n}", "title": "" }, { "docid": "ce98e0fbb7531a26dfdbc9fb6c471417", "score": "0.53214645", "text": "func (v BufferEntry) MarshalJSON() ([]byte, error) {\n\tw := jwriter.Writer{}\n\teasyjsonE453ad8fEncodeGithubComSignalfxOndiskencoding10(&w, v)\n\treturn w.Buffer.BuildBytes(), w.Error\n}", "title": "" }, { "docid": "7611bb29f13de83453a8a2c5bf91c26c", "score": "0.5306868", "text": "func MarshalEntry(timestamp int64, data []byte) []byte {\n\tv := make([]byte, 8+4, 8+4+len(data))\n\tbinary.BigEndian.PutUint64(v[0:8], uint64(timestamp))\n\tbinary.BigEndian.PutUint32(v[8:12], uint32(len(data)))\n\tv = append(v, data...)\n\treturn v\n}", "title": "" }, { "docid": "1512c41522c23f645350c4f4c80f7e97", "score": "0.52986985", "text": "func (e IndexEntry) MarshalJSON() ([]byte, error) {\n\n\tdata := make(map[string]interface{})\n\tfor _, p := range e.Properties {\n\t\tswitch p.Name {\n\t\tcase \"CreatorID\":\n\t\t\tdata[\"creatorId\"] = p.Value\n\t\tcase \"CreatorKey\":\n\t\t\tdata[\"creatorKey\"] = p.Value\n\t\tcase \"CreatorName\":\n\t\t\tdata[\"creatorName\"] = p.Value\n\t\tcase \"CreatorEmailHash\":\n\t\t\tdata[\"creatorEmailHash\"] = p.Value\n\t\tcase \"CreatorGravType\":\n\t\t\tdata[\"creatorGravType\"] = p.Value\n\t\tcase \"Type\":\n\t\t\tdata[\"type\"] = p.Value\n\t\tcase \"Title\":\n\t\t\tdata[\"title\"] = p.Value\n\t\tcase \"UserIDS\":\n\t\t\tdata[\"userIds\"] = p.Value\n\t\tcase \"UserNames\":\n\t\t\tdata[\"userNames\"] = p.Value\n\t\tcase \"UserEmailHashes\":\n\t\t\tdata[\"userEmailHashes\"] = p.Value\n\t\tcase \"UserGravTypes\":\n\t\t\tdata[\"userGravTypes\"] = p.Value\n\t\tcase \"UserKeys\":\n\t\t\tdata[\"userKeys\"] = p.Value\n\t\tcase \"Password\":\n\t\t\tdata[\"password\"] = p.Value\n\t\tcase \"PasswordHash\":\n\t\t\tdata[\"passwordHash\"] = p.Value\n\t\tcase \"UpdatedAt\":\n\t\t\tdata[\"updatedAt\"] = p.Value\n\t\tcase \"CPUserIndices\":\n\t\t\tdata[\"cpUserIndices\"] = p.Value\n\t\tcase \"CPIDS\":\n\t\t\tdata[\"cpids\"] = p.Value\n\t\tcase \"WinnerIDS\":\n\t\t\tdata[\"winnerIndices\"] = p.Value\n\t\tcase \"WinnerKeys\":\n\t\t\tdata[\"winnerKeys\"] = p.Value\n\t\t}\n\t}\n\n\tdata[\"key\"] = e.Key\n\tdata[\"id\"] = e.id()\n\n\tpassword, ok := data[\"password\"].(string)\n\tif ok {\n\t\tpasswordHash, ok := data[\"passwordHash\"].([]byte)\n\t\tif ok {\n\t\t\tdata[\"public\"] = (len(password) == 0) && (len(passwordHash) == 0)\n\t\t}\n\t}\n\tdelete(data, \"password\")\n\tdelete(data, \"passwordHash\")\n\n\tupdatedAt, ok := data[\"updatedAt\"].(time.Time)\n\tif ok {\n\t\tdata[\"lastUpdated\"] = LastUpdated(updatedAt)\n\t}\n\n\treturn json.Marshal(data)\n}", "title": "" }, { "docid": "471bf1d93cf3ad039899d339335f1963", "score": "0.52977854", "text": "func MarshalEntry(timestamp int64, data []byte) []byte {\n\tbuf := make([]byte, 8+len(data))\n\tbinary.BigEndian.PutUint64(buf[0:8], uint64(timestamp))\n\tcopy(buf[8:], data)\n\treturn buf\n}", "title": "" }, { "docid": "b1289d63990c84c669aa2b34452f3333", "score": "0.5294153", "text": "func (u utcJSONFormatter) Format(e *log.Entry) ([]byte, error) {\n\te.Time = e.Time.UTC()\n\treturn u.fmt.Format(e)\n}", "title": "" }, { "docid": "0ece55d24b08332837479102990c4689", "score": "0.5283437", "text": "func GobSerializeEntry(entry Entry) ([]byte, error) {\n\tw := new(bytes.Buffer)\n\terr := GobEncodeEntry(entry, w)\n\treturn w.Bytes(), err\n}", "title": "" }, { "docid": "e112cb9940f8d6f8b5d41e3574e77985", "score": "0.52749217", "text": "func (f *LogFormatter) Format(entry *logrus.Entry) ([]byte, error) {\n\twrappedEntry := entry.WithFields(logrus.Fields{\n\t\t\"application\": f.name,\n\t\t\"version\": f.version,\n\t\t\"environment\": f.environment,\n\t})\n\twrappedEntry.Time = entry.Time\n\twrappedEntry.Message = entry.Message\n\twrappedEntry.Level = entry.Level\n\treturn f.formatter.Format(wrappedEntry)\n}", "title": "" }, { "docid": "90f9ca0079ecfc7def0e7edaf42f8671", "score": "0.52574676", "text": "func (f *Formatter) Format(entry *logrus.Entry) ([]byte, error) {\n\toutput := f.LogFormat\n\tif output == \"\" {\n\t\toutput = defaultLogFormat\n\t}\n\n\ttimestampFormat := f.TimestampFormat\n\tif timestampFormat == \"\" {\n\t\ttimestampFormat = defaultTimestampFormat\n\t}\n\n\toutput = strings.Replace(output, \"%time%\", entry.Time.Format(timestampFormat), 1)\n\n\toutput = strings.Replace(output, \"%msg%\", entry.Message, 1)\n\n\tlevel := strings.ToUpper(entry.Level.String())\n\toutput = strings.Replace(output, \"%lvl%\", level, 1)\n\n\tfor k, val := range entry.Data {\n\t\tswitch v := val.(type) {\n\t\tcase string:\n\t\t\toutput = strings.Replace(output, \"%\"+k+\"%\", v, 1)\n\t\tcase int:\n\t\t\ts := strconv.Itoa(v)\n\t\t\toutput = strings.Replace(output, \"%\"+k+\"%\", s, 1)\n\t\tcase bool:\n\t\t\ts := strconv.FormatBool(v)\n\t\t\toutput = strings.Replace(output, \"%\"+k+\"%\", s, 1)\n\t\t}\n\t}\n\treturn []byte(output + \"\\n\"), nil\n}", "title": "" }, { "docid": "21df26071ebf0affbd2b0c65b63a46a3", "score": "0.5239581", "text": "func (f Formatter) Format(e Entry) []byte {\n\tb := bufferPool.Get().(*bytes.Buffer)\n\tb.Reset()\n\n\tdefer bufferPool.Put(b)\n\n\tif f.Layout != nil {\n\t\tf.Layout.Append(b, e)\n\t\treturn b.Bytes()\n\t}\n\n\tb.WriteString(timex.OrNow(e.Time()).Format(layout) + \" \")\n\n\tf.printLevel(b, e.Level())\n\n\tif !f.Simple {\n\t\tb.WriteString(fmt.Sprintf(\"%d --- \", Pid))\n\t\tb.WriteString(fmt.Sprintf(\"[%-5s] \", gid.CurGoroutineID()))\n\t\tb.WriteString(fmt.Sprintf(\"[%s] \", str.Or(e.TraceID(), \"-\")))\n\t}\n\n\tf.printCaller(b, e.Caller())\n\n\tb.WriteString(\" : \")\n\n\tif fields := e.Fields(); len(fields) > 0 {\n\t\tif v, err := json.Marshal(fields); err == nil {\n\t\t\tb.Write(v)\n\t\t\tb.WriteString(\" \")\n\t\t}\n\t}\n\n\t// indent multiple lines log\n\tmsg := strings.TrimRight(e.Message(), \"\\r\\n\")\n\tb.WriteString(strings.Replace(msg, \"\\n\", `\\n `, -1))\n\tb.WriteString(\"\\n\")\n\n\treturn b.Bytes()\n}", "title": "" }, { "docid": "a7e23b04d80d93f078c9e6255c7766d5", "score": "0.5219219", "text": "func (group *eventGroup) WriteDataEntry(buf *bytes.Buffer) *bytes.Buffer {\n\tgroup.writeJSON(buf)\n\treturn buf\n}", "title": "" }, { "docid": "f6896fe451b90bed2ed8ecd553767a58", "score": "0.52159476", "text": "func (f *LogFormatter) Format(entry *logrus.Entry) ([]byte, error) {\n\twrappedEntry := entry.WithFields(logrus.Fields{\n\t\t\"version\": f.version,\n\t})\n\twrappedEntry.Time = entry.Time\n\twrappedEntry.Message = entry.Message\n\twrappedEntry.Level = entry.Level\n\treturn f.formatter.Format(wrappedEntry)\n}", "title": "" }, { "docid": "69a889b08b793bbf4054935e11d62ecf", "score": "0.5214416", "text": "func (f *Response) Format(entry *logrus.Entry) ([]byte, error) {\n\tvar js map[string]interface{}\n\tif json.Unmarshal([]byte(entry.Message), &js) != nil && utils.IsLetter(string(entry.Message[0])) {\n\t\treturn nil, nil\n\t}\n\tresult := fmt.Sprintf(\"%s\\n\", entry.Message)\n\treturn []byte(result), nil\n}", "title": "" }, { "docid": "ae8c7031964a01d33f94517b0eb91964", "score": "0.5208995", "text": "func serializeUtxoEntry(entry *UtxoEntry) []byte {\n\t// Spent entries have no serialization.\n\tif entry.IsSpent() {\n\t\treturn nil\n\t}\n\n\t// Calculate the size needed to serialize the entry.\n\tconst hasAmount = true\n\tflags := encodeFlags(entry.IsCoinBase(), entry.HasExpiry(),\n\t\tentry.TransactionType())\n\tsize := serializeSizeVLQ(uint64(entry.blockHeight)) +\n\t\tserializeSizeVLQ(uint64(entry.blockIndex)) +\n\t\tserializeSizeVLQ(uint64(flags)) +\n\t\tcompressedTxOutSize(uint64(entry.amount), entry.scriptVersion,\n\t\t\tentry.pkScript, hasAmount)\n\n\tif entry.ticketMinOuts != nil {\n\t\tsize += len(entry.ticketMinOuts.data)\n\t}\n\n\t// Serialize the entry.\n\tserialized := make([]byte, size)\n\toffset := putVLQ(serialized, uint64(entry.blockHeight))\n\toffset += putVLQ(serialized[offset:], uint64(entry.blockIndex))\n\toffset += putVLQ(serialized[offset:], uint64(flags))\n\toffset += putCompressedTxOut(serialized[offset:], uint64(entry.amount),\n\t\tentry.scriptVersion, entry.pkScript, hasAmount)\n\n\tif entry.ticketMinOuts != nil {\n\t\tcopy(serialized[offset:], entry.ticketMinOuts.data)\n\t}\n\n\treturn serialized\n}", "title": "" }, { "docid": "801b5062851100102b3ecd15bdc65ac0", "score": "0.52045894", "text": "func (f *formatter) Format(e *logrus.Entry) ([]byte, error) {\n\t// Implode the data to string with `k=v` format.\n\n\tdataString := \"\"\n\tif len(e.Data) != 0 {\n\t\tfor k, v := range e.Data {\n\t\t\tdataString += fmt.Sprintf(\"%s=%+v \", k, v)\n\t\t}\n\t\t// Trim the trailing whitespace.\n\t\tdataString = dataString[0 : len(dataString)-1]\n\t}\n\t// Get service name.\n\tname := f.serviceName\n\t// Level like: DEBUG, INFO, WARN, ERROR, FATAL.\n\tlevel := strings.ToUpper(e.Level.String())\n\n\t// Get the time with YYYY-mm-dd H:i:s format.\n\ttime := e.Time.Format(\"2006-01-02 15:04:05\")\n\t// Get the message.\n\tmsg := e.Message\n\n\tstdLevel := \"\"\n\tswitch level {\n\tcase \"DEBUG\":\n\t\tstdLevel = color.New(color.FgWhite).Sprint(level)\n\tcase \"INFO\":\n\t\tstdLevel = color.New(color.FgCyan).Sprint(\" \" + level)\n\tcase \"WARN\":\n\t\tstdLevel = color.New(color.FgYellow).Sprint(\" \" + level)\n\tcase \"ERROR\":\n\t\tstdLevel = color.New(color.FgRed).Sprint(level)\n\tcase \"FATAL\":\n\t\tstdLevel = color.New(color.FgHiRed).Sprint(level)\n\t}\n\n\tbody := fmt.Sprintf(\"[%s] %5s %s %s %s \\n\", name, stdLevel, time, header.REQUEST_ID, msg)\n\tdata := fmt.Sprintf(\" [(%s)]\", dataString)\n\n\t// Hide the data if there's no data.\n\tif len(e.Data) == 0 {\n\t\tdata = \"\"\n\t}\n\n\t// Mix the body and the data.\n\toutput := fmt.Sprintf(\"%s%s\\n %s\\n\", body, data,\n\t\t\"--------------------------------\")\n\n\treturn []byte(output), nil\n}", "title": "" }, { "docid": "67534541546b962ecc2435d4bb17f5b8", "score": "0.51831496", "text": "func (e StringDataEntry) MarshalJSON() ([]byte, error) {\n\treturn json.Marshal(&struct {\n\t\tK string `json:\"key\"`\n\t\tT string `json:\"type\"`\n\t\tV string `json:\"value\"`\n\t}{e.Key, e.GetValueType().String(), e.Value})\n}", "title": "" }, { "docid": "33a4b1ddfa97693538e3e0ba78f615c7", "score": "0.5164618", "text": "func (le RunLogEvent) JSON() (JSON, error) {\n\treturn ParseRunLog(le.Log)\n}", "title": "" }, { "docid": "9dfd9d29fc85a3c6209c2768fbf0477a", "score": "0.51637244", "text": "func (l *logger) RawEntry(entry map[int64]string) error {\n\n\t// Validate the raw Entry\n\tfor _, code := range defaultCols {\n\t\tif _, ok := entry[code]; !ok {\n\t\t\treturn fmt.Errorf(\"RawEntry: missing column '%d'\", code)\n\t\t}\n\t}\n\n\t// Write the entry into the ledger\n\tif l.active {\n\t\tl.wg.Add(1)\n\t\tgo func() {\n\t\t\tl.ledger <- entry\n\t\t}()\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "e9a9f941ec3693cf4e453e004546f06d", "score": "0.5154583", "text": "func (s *LedgerEntry) EncodeTo(e *xdr.Encoder) error {\n\tvar err error\n\tif err = s.LastModifiedLedgerSeq.EncodeTo(e); err != nil {\n\t\treturn err\n\t}\n\tif err = s.Data.EncodeTo(e); err != nil {\n\t\treturn err\n\t}\n\tif err = s.Ext.EncodeTo(e); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f199d61aeeac16911467415f8ae18161", "score": "0.515357", "text": "func (v HistoOnDiskEntry) MarshalJSON() ([]byte, error) {\n\tw := jwriter.Writer{}\n\teasyjsonE453ad8fEncodeGithubComSignalfxOndiskencoding3(&w, v)\n\treturn w.Buffer.BuildBytes(), w.Error\n}", "title": "" }, { "docid": "0cd41641ae62b39aa020ffe58c70ae8e", "score": "0.51526004", "text": "func encodeJSON(w http.ResponseWriter, v interface{}, logger *log.Logger) {\n\tif err := json.NewEncoder(w).Encode(v); err != nil {\n\t\tError(w, err, http.StatusInternalServerError, logger)\n\t}\n}", "title": "" }, { "docid": "1f11069ed84476ceab076903430ff12d", "score": "0.51506203", "text": "func (c CTLogEntry) Serialize(w io.Writer) error {\n\tif err := WriteMerkleTreeLeaf(w, c.Leaf); err != nil {\n\t\treturn err\n\t}\n\n\tif err := writeUint(w, uint64(len(c.Chain)), 2); err != nil {\n\t\treturn err\n\t}\n\n\tfor _, certBytes := range c.Chain {\n\t\tif err := writeVarBytes(w, certBytes, 4); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "b595992fea2cc556520549b627610ac0", "score": "0.51485294", "text": "func (s *ContractDataEntry) EncodeTo(e *xdr.Encoder) error {\n\tvar err error\n\tif err = s.Contract.EncodeTo(e); err != nil {\n\t\treturn err\n\t}\n\tif err = s.Key.EncodeTo(e); err != nil {\n\t\treturn err\n\t}\n\tif err = s.Durability.EncodeTo(e); err != nil {\n\t\treturn err\n\t}\n\tif err = s.Body.EncodeTo(e); err != nil {\n\t\treturn err\n\t}\n\tif err = s.ExpirationLedgerSeq.EncodeTo(e); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "b8f33b9de0f2ef26d8c2f8dd72b9a30e", "score": "0.51436526", "text": "func (v HistoOnDiskEntry) MarshalJSON() ([]byte, error) {\n\tw := jwriter.Writer{}\n\teasyjsonE453ad8fEncodeGithubComSignalfxOndiskencoding1(&w, v)\n\treturn w.Buffer.BuildBytes(), w.Error\n}", "title": "" }, { "docid": "f66f083c5579f88af5370dda882b115e", "score": "0.5135786", "text": "func (f *ProductionFormatter) Format(entry *logrus.Entry) ([]byte, error) {\n\tfields := \"\"\n\tif len(entry.Data) > 0 {\n\t\tfs := []string{}\n\t\tfor k, v := range entry.Data {\n\t\t\tfs = append(fs, fmt.Sprintf(\"%s=%s\", k, v))\n\t\t}\n\t\tfields = fmt.Sprintf(\" (%s)\", strings.Join(fs, \", \"))\n\t}\n\n\tdata := fmt.Sprintf(\"[%s] %+5s: %s%s\\n\",\n\t\ttime.Now().Format(time.RFC1123),\n\t\tstrings.ToUpper(entry.Level.String()),\n\t\tentry.Message,\n\t\tfields,\n\t)\n\treturn []byte(data), nil\n}", "title": "" }, { "docid": "669d7566459145ba24c82b9a17722bab", "score": "0.51167613", "text": "func (rs *ResultSet) JSONEntry(ci charItem) interface{} {\n\thtml, _ := entities.HTMLEntitiesReverse[ci.unicode.Number]\n\txml, _ := entities.XMLEntitiesReverse[ci.unicode.Number]\n\n\tif ci.unicode.Number == 0 {\n\t\tif ci.unicode.Name != \"\" {\n\t\t\treturn &JInfo{Comment: ci.unicode.Name}\n\t\t}\n\t\tif ci.strseq != \"\" {\n\t\t\treturn &JCombination{Display: ci.strseq, Derived: true}\n\t\t}\n\t}\n\n\treturn &JItem{\n\t\tDisplay: S(rs.RenderCharInfoItem(ci, PRINT_RUNE)),\n\t\tDisplayText: S(rs.RenderCharInfoItem(ci, PRINT_RUNE_PRESENT_TEXT)),\n\t\tDisplayEmoji: S(rs.RenderCharInfoItem(ci, PRINT_RUNE_PRESENT_EMOJI)),\n\t\tDisplayLeft: S(rs.RenderCharInfoItem(ci, PRINT_RUNE_PRESENT_LEFT)),\n\t\tDisplayRight: S(rs.RenderCharInfoItem(ci, PRINT_RUNE_PRESENT_RIGHT)),\n\t\tName: S(rs.RenderCharInfoItem(ci, PRINT_NAME)),\n\t\tHex: S(rs.RenderCharInfoItem(ci, PRINT_RUNE_HEX)),\n\t\tDec: S(rs.RenderCharInfoItem(ci, PRINT_RUNE_DEC)),\n\t\tBlock: S(rs.RenderCharInfoItem(ci, PRINT_BLOCK)),\n\t\tVIMDigraphs: rs.sources.Vim.DigraphsSliceFor(ci.unicode.Number),\n\t\tX11Digraphs: rs.sources.X11.DigraphsSliceFor(ci.unicode.Number),\n\t\tHTMLEntities: html,\n\t\tXMLEntities: xml,\n\t\tUTF8: S(rs.RenderCharInfoItem(ci, PRINT_RUNE_UTF8ENC)),\n\t\tJSONEscape: S(rs.RenderCharInfoItem(ci, PRINT_RUNE_JSON)),\n\t\tRenderWidth: JItemWidth(rs.RenderCharInfoItem(ci, PRINT_RUNE)),\n\t\tPuny: S(rs.RenderCharInfoItem(ci, PRINT_RUNE_PUNY)),\n\t\tPartOf: S(rs.RenderCharInfoItem(ci, PRINT_PART_OF)),\n\t}\n}", "title": "" }, { "docid": "cba3b7743a9f03f1b5b76396bddaf37b", "score": "0.50891984", "text": "func writeAccessLog(accessLog map[string]interface{}, start time.Time) {\n\n\tdurationMillis := float64(time.Now().Sub(start).Nanoseconds()) / 1000000.0\n\taccessLog[\"durationMillis\"] = durationMillis\n\n\tif result, err := json.Marshal(accessLog); err == nil {\n\t\tlog.Println(string(result))\n\t} else {\n\t\tlog.Printf(\"cannot convert access log to json: %v\\n\", err)\n\t}\n}", "title": "" }, { "docid": "5095b8fa6ff433b9fc74e6f356a4dddd", "score": "0.5084359", "text": "func (m MSDeployLog) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"id\", m.ID)\n\tpopulate(objectMap, \"kind\", m.Kind)\n\tpopulate(objectMap, \"name\", m.Name)\n\tpopulate(objectMap, \"properties\", m.Properties)\n\tpopulate(objectMap, \"type\", m.Type)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "c5562a3b0ead4d088ea9b9682600666d", "score": "0.50735116", "text": "func EntityValueToEntry(ev EntityValue) (Entry, error) {\n\treturn pbv1.MarshalTagValue(ev)\n}", "title": "" }, { "docid": "992c0c3cf16d1ef240447a24c0433ef4", "score": "0.50734967", "text": "func Encode(d interface{}) ([]byte, error) {\n\n\tdata, err := json.Marshal(d)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to encode the given event data: %s\", err.Error())\n\t}\n\treturn data, nil\n}", "title": "" }, { "docid": "26d0404742ada37ed554bf1685a23d13", "score": "0.507002", "text": "func (f *TextFormatter) Format(entry *log.Entry) ([]byte, error) {\n\tvar b *bytes.Buffer\n\tkeys := make([]string, 0, len(entry.Data))\n\tfor k := range entry.Data {\n\t\t// Discard key named \"raw\" as it's for json consumption only.\n\t\tif k != \"raw\" {\n\t\t\tkeys = append(keys, k)\n\t\t}\n\t}\n\n\tif !f.DisableSorting {\n\t\tsort.Strings(keys)\n\t}\n\tif entry.Buffer != nil {\n\t\tb = entry.Buffer\n\t} else {\n\t\tb = &bytes.Buffer{}\n\t}\n\n\tprefixFieldClashes(entry.Data)\n\n\tf.Do(func() { f.init(entry) })\n\n\tisColored := (f.ForceColors || f.isTerminal) && !f.DisableColors\n\n\ttimestampFormat := f.TimestampFormat\n\tif timestampFormat == \"\" {\n\t\ttimestampFormat = defaultTimestampFormat\n\t}\n\tif isColored {\n\t\tf.printColored(b, entry, keys, timestampFormat)\n\t} else {\n\t\tif !f.DisableTimestamp {\n\t\t\tf.appendKeyValue(b, \"time\", entry.Time.Format(timestampFormat))\n\t\t}\n\t\tif entry.Message != \"\" {\n\t\t\tf.appendValue(b, entry.Message)\n\t\t}\n\t\tfor _, key := range keys {\n\t\t\tf.appendKeyValue(b, key, entry.Data[key])\n\t\t}\n\t}\n\tb.WriteByte('\\n')\n\treturn b.Bytes(), nil\n}", "title": "" }, { "docid": "b293f111d107b28c5861e1fc760aec99", "score": "0.50696194", "text": "func (s *DataEntry) EncodeTo(e *xdr.Encoder) error {\n\tvar err error\n\tif err = s.AccountId.EncodeTo(e); err != nil {\n\t\treturn err\n\t}\n\tif err = s.DataName.EncodeTo(e); err != nil {\n\t\treturn err\n\t}\n\tif err = s.DataValue.EncodeTo(e); err != nil {\n\t\treturn err\n\t}\n\tif err = s.Ext.EncodeTo(e); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "828bd44bc6ab9ec82dc8f4913a998e8b", "score": "0.50678456", "text": "func (v TimeEntry) MarshalEasyJSON(w *jwriter.Writer) {\n\teasyjsonE672cca2EncodeGithubComSomniSomGoRedmine3(w, v)\n}", "title": "" }, { "docid": "e2efb6241dbe85e18f39d8a009143295", "score": "0.50546384", "text": "func (v timeEntryRequest) MarshalJSON() ([]byte, error) {\n\tw := jwriter.Writer{}\n\teasyjsonE672cca2EncodeGithubComSomniSomGoRedmine1(&w, v)\n\treturn w.Buffer.BuildBytes(), w.Error\n}", "title": "" }, { "docid": "86de9b173d3be237e620f8431d114ff9", "score": "0.5039408", "text": "func (entry *Entry) String() (string, error) {\n\tserialized, err := entry.Logger.Formatter.Format(entry)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tstr := string(serialized)\n\treturn str, nil\n}", "title": "" }, { "docid": "4663878ff6bc6248a1d5f21d5e9c4e99", "score": "0.50238824", "text": "func (v SampleEntry) MarshalEasyJSON(w *jwriter.Writer) {\n\teasyjsonE453ad8fEncodeGithubComSignalfxOndiskencoding2(w, v)\n}", "title": "" }, { "docid": "b6620b215320dac89d67d1a70edbef6a", "score": "0.5014592", "text": "func (e BinaryDataEntry) MarshalJSON() ([]byte, error) {\n\treturn json.Marshal(&struct {\n\t\tK string `json:\"key\"`\n\t\tT string `json:\"type\"`\n\t\tV Script `json:\"value\"`\n\t}{e.Key, e.GetValueType().String(), e.Value})\n}", "title": "" }, { "docid": "abbf7f244dffe8c82912990f57bc99a7", "score": "0.50056714", "text": "func writeEvent(event gomatrixserverlib.Event) {\n\tencoder := json.NewEncoder(os.Stdout)\n\tif *format == \"InputRoomEvent\" {\n\t\tvar ire api.InputRoomEvent\n\t\tire.Kind = api.KindNew\n\t\tire.Event = event\n\t\tauthEventIDs := []string{}\n\t\tfor _, ref := range b.AuthEvents {\n\t\t\tauthEventIDs = append(authEventIDs, ref.EventID)\n\t\t}\n\t\tire.AuthEventIDs = authEventIDs\n\t\tif err := encoder.Encode(ire); err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t} else if *format == \"Event\" {\n\t\tif err := encoder.Encode(event); err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t} else {\n\t\tpanic(fmt.Errorf(\"Format %q is not valid, must be %q or %q\", format, \"InputRoomEvent\", \"Event\"))\n\t}\n}", "title": "" }, { "docid": "55e1f94056c33dc03fc663c0a58d09ae", "score": "0.5003343", "text": "func (s *AccountEntry) EncodeTo(e *xdr.Encoder) error {\n\tvar err error\n\tif err = s.AccountId.EncodeTo(e); err != nil {\n\t\treturn err\n\t}\n\tif err = s.Balance.EncodeTo(e); err != nil {\n\t\treturn err\n\t}\n\tif err = s.SeqNum.EncodeTo(e); err != nil {\n\t\treturn err\n\t}\n\tif err = s.NumSubEntries.EncodeTo(e); err != nil {\n\t\treturn err\n\t}\n\tif _, err = e.EncodeBool(s.InflationDest != nil); err != nil {\n\t\treturn err\n\t}\n\tif s.InflationDest != nil {\n\t\tif err = (*s.InflationDest).EncodeTo(e); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tif err = s.Flags.EncodeTo(e); err != nil {\n\t\treturn err\n\t}\n\tif err = s.HomeDomain.EncodeTo(e); err != nil {\n\t\treturn err\n\t}\n\tif err = s.Thresholds.EncodeTo(e); err != nil {\n\t\treturn err\n\t}\n\tif _, err = e.EncodeUint(uint32(len(s.Signers))); err != nil {\n\t\treturn err\n\t}\n\tfor i := 0; i < len(s.Signers); i++ {\n\t\tif err = s.Signers[i].EncodeTo(e); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tif err = s.Ext.EncodeTo(e); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "71b74393f155d018fd329b683fdad479", "score": "0.49828213", "text": "func (v timeEntryRequest) MarshalEasyJSON(w *jwriter.Writer) {\n\teasyjsonE672cca2EncodeGithubComSomniSomGoRedmine1(w, v)\n}", "title": "" }, { "docid": "71fbf11f42dae1911a7573e3b976a4f2", "score": "0.49673322", "text": "func (h *JSONFormatterHook) PreFormat(entry *log.Entry) error {\n\t// we add EndOfChain marker into entry in pre-format stage because it should be cryptographically bounded to the log entry\n\tif strings.EqualFold(entry.Message, EndOfAuditLogChainMessage) {\n\t\tentry.Data[AuditLogChainKey] = EndAuditLogChainValue\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "400121904aea31c0276bd8550b16d2ab", "score": "0.49562356", "text": "func (s *TransactionHistoryEntry) EncodeTo(e *xdr.Encoder) error {\n\tvar err error\n\tif err = s.LedgerSeq.EncodeTo(e); err != nil {\n\t\treturn err\n\t}\n\tif err = s.TxSet.EncodeTo(e); err != nil {\n\t\treturn err\n\t}\n\tif err = s.Ext.EncodeTo(e); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "1395d081c10ddb79b885de8d4cb9252e", "score": "0.495174", "text": "func (v CryptoOrderbookEntry) MarshalJSON() ([]byte, error) {\n\tw := jwriter.Writer{}\n\teasyjson3e8ab7adEncodeGithubComAlpacahqAlpacaTradeApiGoV3MarketdataStream12(&w, v)\n\treturn w.Buffer.BuildBytes(), w.Error\n}", "title": "" }, { "docid": "cae8e4a84396e2231603e5d8a94041f3", "score": "0.49512053", "text": "func (v timeEntryResult) MarshalJSON() ([]byte, error) {\n\tw := jwriter.Writer{}\n\teasyjsonE672cca2EncodeGithubComSomniSomGoRedmine(&w, v)\n\treturn w.Buffer.BuildBytes(), w.Error\n}", "title": "" }, { "docid": "136996ac98e94f75c0e7dbc9462d2a6b", "score": "0.4946934", "text": "func (e *Entries) ToJSON() []byte {\n\tres, _ := json.Marshal(e)\n\n\treturn res\n}", "title": "" }, { "docid": "67b74ba133f735acc28271d963fa5669", "score": "0.49415845", "text": "func (l Logs) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"content\", l.Content)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "003e2014946317038fb434ff1f8ecd78", "score": "0.49339318", "text": "func (s *TransactionHistoryResultEntry) EncodeTo(e *xdr.Encoder) error {\n\tvar err error\n\tif err = s.LedgerSeq.EncodeTo(e); err != nil {\n\t\treturn err\n\t}\n\tif err = s.TxResultSet.EncodeTo(e); err != nil {\n\t\treturn err\n\t}\n\tif err = s.Ext.EncodeTo(e); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "45523d59fdf4f7adc6d56038b5e47bf7", "score": "0.49323058", "text": "func (p *parentReq) EncodeStdout(v interface{}) {\n\tp.encode(encodeCodeJSONStdout, v)\n}", "title": "" }, { "docid": "d750713a215623060484bf5c394d983f", "score": "0.49311462", "text": "func (s *TrustLineEntry) EncodeTo(e *xdr.Encoder) error {\n\tvar err error\n\tif err = s.AccountId.EncodeTo(e); err != nil {\n\t\treturn err\n\t}\n\tif err = s.Asset.EncodeTo(e); err != nil {\n\t\treturn err\n\t}\n\tif err = s.Balance.EncodeTo(e); err != nil {\n\t\treturn err\n\t}\n\tif err = s.Limit.EncodeTo(e); err != nil {\n\t\treturn err\n\t}\n\tif err = s.Flags.EncodeTo(e); err != nil {\n\t\treturn err\n\t}\n\tif err = s.Ext.EncodeTo(e); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "aba4404dbf3a48f0b6c50a71e8722ac3", "score": "0.49306726", "text": "func jsonEnc(in T) ([]byte, error) {\n\treturn json.Marshal(in)\n}", "title": "" }, { "docid": "26f4cad98660bba7f8501352d2228048", "score": "0.49292657", "text": "func (lc *loggerCore) Write(e zapcore.Entry, ff []zapcore.Field) error {\n\tenc := newFieldEncoder()\n\tdefer func() { _ = enc.Close() }()\n\n\tenc.fields = append(enc.fields, \"msg\", e.Message)\n\n\tfor _, f := range ff {\n\t\tf.AddTo(enc)\n\t}\n\n\tswitch e.Level {\n\tcase zapcore.DebugLevel:\n\t\treturn level.Debug(lc.inner).Log(enc.fields...)\n\tcase zapcore.InfoLevel:\n\t\treturn level.Info(lc.inner).Log(enc.fields...)\n\tcase zapcore.WarnLevel:\n\t\treturn level.Warn(lc.inner).Log(enc.fields...)\n\tcase zapcore.ErrorLevel, zapcore.DPanicLevel, zapcore.PanicLevel, zapcore.FatalLevel:\n\t\t// We ignore panics/fatals here because we really don't want components to\n\t\t// be able to do that.\n\t\treturn level.Error(lc.inner).Log(enc.fields...)\n\tdefault:\n\t\treturn lc.inner.Log(enc.fields...)\n\t}\n}", "title": "" }, { "docid": "17db64bd5c4042d34c7996c5d988ee4c", "score": "0.49290654", "text": "func (evt *Event) Serialize() []byte {\n\t// the serialization process is just putting everything into a JSON array\n\t// so the order is kept\n\tarr := make([]interface{}, 6)\n\n\t// version: 0\n\tarr[0] = 0\n\n\t// pubkey\n\tarr[1] = evt.PubKey\n\n\t// created_at\n\tarr[2] = int64(evt.CreatedAt)\n\n\t// kind\n\tarr[3] = int64(evt.Kind)\n\n\t// tags\n\tif evt.Tags != nil {\n\t\tarr[4] = evt.Tags\n\t} else {\n\t\tarr[4] = make([]bool, 0)\n\t}\n\n\t// content\n\tarr[5] = evt.Content\n\n\tserialized := new(bytes.Buffer)\n\n\tenc := json.NewEncoder(serialized)\n\tenc.SetEscapeHTML(false)\n\t_ = enc.Encode(arr)\n\treturn serialized.Bytes()[:serialized.Len()-1] // Encode add new line char\n}", "title": "" }, { "docid": "8fafa472b1be76412ef968eeb7c33bba", "score": "0.49126914", "text": "func (s *LedgerHeaderHistoryEntry) EncodeTo(e *xdr.Encoder) error {\n\tvar err error\n\tif err = s.Hash.EncodeTo(e); err != nil {\n\t\treturn err\n\t}\n\tif err = s.Header.EncodeTo(e); err != nil {\n\t\treturn err\n\t}\n\tif err = s.Ext.EncodeTo(e); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d98a1c4595d0b71604c689284595737f", "score": "0.4902944", "text": "func (v FilterEntry) MarshalEasyJSON(w *jwriter.Writer) {\n\teasyjsonC5a4559bEncodeGithubComChromedpCdprotoTarget11(w, v)\n}", "title": "" }, { "docid": "21bfbfcbce486aa5b13f3f9e721d4e6e", "score": "0.48927006", "text": "func (j *EntryRequest) MarshalJSON() ([]byte, error) {\n\tvar buf fflib.Buffer\n\tif j == nil {\n\t\tbuf.WriteString(\"null\")\n\t\treturn buf.Bytes(), nil\n\t}\n\terr := j.MarshalJSONBuf(&buf)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn buf.Bytes(), nil\n}", "title": "" }, { "docid": "b80eae2eb55c9d45b51c52809a3e068e", "score": "0.48883548", "text": "func iwefJSON(sev byte, data []byte, trace []byte, log *logJSON) {\n\tswitch sev {\n\tcase 73:\n\t\tlog.Fields[levelKey] = \"INFO\"\n\tcase 87:\n\t\tlog.Fields[levelKey] = \"WARNING\"\n\tcase 69:\n\t\tlog.Fields[levelKey] = \"ERROR\"\n\tcase 70:\n\t\tlog.Fields[levelKey] = \"FATAL\"\n\t}\n\tr := &iwefreader{data, 22} // past last u\n\tr.skipAllSpace()\n\tlog.Fields[threadidKey] = r.stringUpTo(32)\n\tr.skip() // space\n\tlog.Fields[fileKey] = r.stringUpTo(58)\n\tr.skip() // :\n\tlog.Fields[lineKey], _ = strconv.Atoi(r.stringUpTo(93))\n\t// ]\n\tr.skip()\n\t// space\n\tr.skip()\n\tif trace != nil && len(trace) > 0 {\n\t\tlog.Fields[stackKey] = string(trace)\n\t}\n\t// extras?\n\tfor k, v := range ExtraFields {\n\t\tlog.Fields[k] = v\n\t}\n\t// fields\n\tlog.Message = r.stringUpToLineEnd()\n}", "title": "" }, { "docid": "d4382ef4db724ff2c33b090b26170ddc", "score": "0.48863843", "text": "func (logger *Logger) Entry() *logrus.Entry {\n\tdata := logrus.Fields{}\n\tfor _, field := range logger.fields {\n\t\tdata[field.key] = field.value\n\t}\n\tif LogInstanceAndServiceFlag.Get() {\n\t\tservice := ServiceFlag.Get()\n\t\tif service != \"\" {\n\t\t\tdata[\"__service\"] = service\n\t\t}\n\t\tinstanceID := InstanceIDFlag.Get()\n\t\tif instanceID != \"\" {\n\t\t\tdata[\"__instanceID\"] = instanceID\n\t\t}\n\t}\n\treturn logrus.WithFields(data)\n}", "title": "" }, { "docid": "4d2f3c142402fced99ddd219f74607b6", "score": "0.48850718", "text": "func (b *Backend) process(entry *Entry) error {\n\tpass, err := b.Filter.Verify(entry)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif !pass {\n\t\treturn nil\n\t}\n\n\tbuf, err := b.Serializer.Serialize(entry)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t_, err = b.Writer.Write(entry.Level, buf)\n\treturn err\n}", "title": "" }, { "docid": "af78833bd97ea464420484812231334e", "score": "0.48825887", "text": "func (v BufferEntries) MarshalJSON() ([]byte, error) {\n\tw := jwriter.Writer{}\n\teasyjsonE453ad8fEncodeGithubComSignalfxOndiskencoding11(&w, v)\n\treturn w.Buffer.BuildBytes(), w.Error\n}", "title": "" }, { "docid": "dbd1d449014488d205a8fdc42859c43e", "score": "0.4879488", "text": "func (mf *MyFormatter) Format(entry *log.Entry) ([]byte, error) {\n\tvar b *bytes.Buffer\n\tif entry.Buffer != nil {\n\t\tb = entry.Buffer\n\t} else {\n\t\tb = &bytes.Buffer{}\n\t}\n\n\tostr := fmt.Sprintf(\"%s [%v] \", time.Now().Format(\"2006/01/02 15:04:05.999\"), entry.Level.String())\n\tif lv, err := log.ParseLevel(entry.Level.String()); err == nil && lv <= log.ErrorLevel {\n\t\t//log大于等于error时,需打印文件名和行号\n\t\tif entry.Caller != nil {\n\t\t\ti := strings.LastIndexAny(entry.Caller.File, \"/\")\n\t\t\tif i >= 0 {\n\t\t\t\ti++\n\t\t\t} else {\n\t\t\t\ti = 0\n\t\t\t}\n\t\t\tostr += fmt.Sprintf(\"[%v:%d]\", entry.Caller.File[i:], entry.Caller.Line)\n\t\t}\n\t}\n\tb.WriteString(ostr + entry.Message) // entry.Message 就是需要打印的日志\n\n\treturn b.Bytes(), nil\n}", "title": "" }, { "docid": "53bd99eb381ec6af25c49bfec5659201", "score": "0.48727724", "text": "func (lw LogstashWriter) Write(p []byte) (int, error) {\n\tjson, err := lw.buildJSON(p)\n\tif err != nil {\n\t\tfmt.Fprintln(os.Stderr, err)\n\t\treturn 0, err\n\t}\n\tdata := fmt.Sprintf(\"%s\\n\", json)\n\treturn fmt.Fprint(lw.writer, data)\n}", "title": "" }, { "docid": "597c7325e2a7beff8a522de1dcbc2f05", "score": "0.48726642", "text": "func (m MSDeployLogProperties) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"entries\", m.Entries)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "3f42320e0b8391ec1e3845492150fc0d", "score": "0.48696586", "text": "func TestLogger_LogBytesValue_JSON(t *testing.T) {\n\toutput := bytes.NewBufferString(\"\")\n\tlog := New()\n\tout := SinkTo(output, AsJSON()).Start()\n\tdefer out.Close()\n\n\tlog.Log(\"k\", []byte(\"The sample string with a lot of spaces.\"))\n\n\tout.Flush()\n\tif strings.TrimSpace(output.String()) != `{\"k\":\"The sample string with a lot of spaces.\", }` {\n\t\tt.Fail()\n\t}\n}", "title": "" }, { "docid": "b9ab58abd318969f36c75ab1e61fab11", "score": "0.48693034", "text": "func (o *JSONLOutput) Format(ts time.Time, lbls loghttp.LabelSet, maxLabelsLen int, line string) string {\n\tentry := map[string]interface{}{\n\t\t\"timestamp\": ts.In(o.options.Timezone),\n\t\t\"line\": line,\n\t}\n\n\t// Labels are optional\n\tif !o.options.NoLabels {\n\t\tentry[\"labels\"] = lbls\n\t}\n\n\tout, err := json.Marshal(entry)\n\tif err != nil {\n\t\tlog.Fatalf(\"error marshalling entry: %s\", err)\n\t}\n\n\treturn string(out)\n}", "title": "" } ]
9a069254b669ff48ea29f161f4ab7905
for each new row y, from 0, find the first x in the row (from 0) where the tractor beam is affecting save that x spot, count to the right, if we are no longer affecting, repeat on next row, otherwise if we reach our limit, count down from saved spot, if we reach our limit, we found the spot, if we stop being affected, advance right and repeat from save that x
[ { "docid": "2c7f8f2096ca927caf106ee3ef19ff00", "score": "0.0", "text": "func part2() {\n\tin := make(chan string, 1)\n\tout := make(chan string, 1)\n\tquit := make(chan string, 1)\n\n\tprogram := getProgram(\"program1.txt\")\n\n\tintCodeComputer := intcode.NewIntCodeComputer(program, in, out, quit, true)\n\n\tcompute := func(x, y int) (result bool) {\n\t\tintCodeComputer.Reset()\n\t\tgo intCodeComputer.Execute()\n\t\tin <- fmt.Sprintf(\"%d\", x)\n\t\tin <- fmt.Sprintf(\"%d\", y)\n\n\t\toutput := <-out\n\t\tif output == \"1\" {\n\t\t\tresult = true\n\t\t}\n\t\tintCodeComputer.OutputProcessed()\n\t\t<-quit\n\t\treturn\n\t}\n\n\trow := 1000\n\n\tconst SHIP = 100\n\noutter:\n\tfor {\n\t\txStart := 0\n\t\tfor !compute(xStart, row) {\n\t\t\txStart++\n\t\t}\n\t\txStop := xStart + 1\n\t\tfor compute(xStop, row) {\n\t\t\txStop++\n\t\t}\n\t\tfmt.Println(\"row \", row, \" x starts at \", xStart, \" and ends at \", xStop)\n\t\tif xStop-xStart >= SHIP {\n\t\t\tfor x := xStart; xStop-x >= SHIP; x++ {\n\t\t\t\ty := row + SHIP - 1\n\t\t\t\tfmt.Println(\"row \", row, \" x starts at \", xStart, \" and ends at \", xStop, \" - checking \", x, \",\", y)\n\t\t\t\tif compute(x, y) {\n\t\t\t\t\tfmt.Println(\"answer is: \", x*10000+row)\n\t\t\t\t\tbreak outter\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\trow++\n\t}\n\n}", "title": "" } ]
[ { "docid": "00cdf821e92f5be5b742b35164b4cf9d", "score": "0.57081044", "text": "func main() {\n\n\ttarget, _ := strconv.Atoi(os.Args[1])\n\n\t// This is way overkill for the real solution, but needed it for testing initial grid size with value = i\n\tsquareSize := int(math.Ceil(math.Sqrt(float64(target)))) + 2\n\tgrid := make([][]int, squareSize)\n\n\tfor i := 0; i < squareSize; i++ {\n\t\ty := make([]int, squareSize)\n\t\tgrid[i] = y\n\t}\n\n\tdirX := 1\n\tdirY := 0\n\tstartVal := 1\n\tposX := (squareSize - 1) / 2\n\tposY := (squareSize - 1) / 2\n\tgrid[posX][posY] = 1\n\n\tfmt.Println(\"sq\", squareSize, \"xy\", posX, posY, \"dir\", dirX, dirY)\n\n\tfor i := startVal + 1; i <= target; i++ {\n\n\t\tposX += dirX\n\t\tposY += dirY\n\n\t\tadj := grid[posX-1][posY-1] + grid[posX-1][posY] + grid[posX-1][posY+1] +\n\t\t\tgrid[posX][posY-1] + grid[posX][posY+1] +\n\t\t\tgrid[posX+1][posY-1] + grid[posX+1][posY] + grid[posX+1][posY+1]\n\n\t\t//adj = i\n\n\t\tgrid[posX][posY] = adj\n\t\tif adj > target {\n\t\t\tfmt.Println(\"Result:\", adj)\n\t\t\tos.Exit(0)\n\t\t}\n\n\t\tif dirY == -1 && grid[posX+1][posY] == 0 {\n\t\t\tdirY = 0\n\t\t\tdirX = 1\n\t\t}\n\t\tif dirY == 1 && grid[posX-1][posY] == 0 {\n\t\t\tdirY = 0\n\t\t\tdirX = -1\n\t\t}\n\t\tif dirX == -1 && grid[posX][posY-1] == 0 {\n\t\t\tdirY = -1\n\t\t\tdirX = 0\n\t\t}\n\t\tif dirX == 1 && grid[posX][posY+1] == 0 {\n\t\t\tdirY = 1\n\t\t\tdirX = 0\n\t\t}\n\n\t}\n\n\t//fmt.Println(grid)\n\n}", "title": "" }, { "docid": "edf0881319d6ab454f7a1053cba7ef56", "score": "0.55858135", "text": "func numRollsToTarget(n int, k int, target int) int {\n dp := make([][]int,n)\n mod := 1000000007\n for i,_ := range(dp){\n dp[i] = make([]int, target+1)\n }\n for col := 1; col <= target; col +=1{\n if col > k {break}\n dp[0][col] = 1\n }\n for row := 1; row < n; row +=1{\n for col := 1; col <= target; col +=1 {\n for face := 1; face <= k; face += 1{\n if (0 > col - face) {continue}\n dp[row][col] = (dp[row][col] + dp[row-1][col-face]) % mod\n }\n }\n }\n return dp[n-1][target]\n}", "title": "" }, { "docid": "b51f6be0a59186a5502a65c0328ae22b", "score": "0.55805486", "text": "func walk(row int, colm int, pos int) bool {\n\tif board[row][colm] != 0 {\n\t\treturn false\n\t}\n\tlocation++\n\tboard[row][colm] = location\n\tif pos == 63{\n\t\treturn true\n\t}\n//There are possible 8 moves that a Knight can take\n\tif legalMove(row+2, colm+1) && walk(row+2, colm+1, pos+1){\n\t\treturn true\n\t}\n\tif legalMove(row+2, colm-1) && walk(row+2, colm-1, pos+1){\n\t\treturn true\n\t}\n\tif legalMove(row-2, colm+1) && walk(row-2, colm+1, pos+1){\n\t\treturn true\n\t}\n\tif legalMove(row-2, colm-1) && walk(row-2, colm-1, pos+1){\n\t\treturn true\n\t}\n\tif legalMove(row+1, colm+2) && walk(row+1, colm+2, pos+1){\n\t\treturn true\n\t}\n\tif legalMove(row+1, colm-2) && walk(row+1, colm-2, pos+1){\n\t\treturn true\n\t}\n\tif legalMove(row-1, colm+2) && walk(row-1, colm+2, pos+1){\n\t\treturn true\n\t}\n\tif legalMove(row-1, colm-2) && walk(row-1, colm-2, pos+1){\n\t\treturn true\n\t}\n// If above condition fails then\n\tboard[row][colm] = 0\n\tlocation--\n\treturn false\n}", "title": "" }, { "docid": "55aa6ad4ffb5706a3003a8c73fc886b2", "score": "0.54858184", "text": "func floodfill(x int, y int) {\n\tvar visited = make(map[Tile]bool)\nif !visited[s.carte[t.pos.x][t.pos.y]]{\n\n\t//!!! cant check south if i go north!! i just came from south!!\n\t//check north\n\tif t.pos.y >= 0 {\n\t\tfloodfill(grid,x,y-1)\n\t\t//queue = append(queue, s.carte[t.pos.x][t.pos.y-1])\n\t\tvisited[s.carte[t.pos.x][t.pos.y-1]] = true\n\t\tarea += 1\n\t}\n\t//check south\n\tif t.pos.y+1 < HEIGHT && isWalkable(s.carte[t.pos.x][t.pos.y+1]) && !visited[s.carte[t.pos.x][t.pos.y+1]] {\n\t\tqueue = append(queue, s.carte[t.pos.x][t.pos.y+1])\n\t\tvisited[s.carte[t.pos.x][t.pos.y+1]] = true\n\t\tarea += 1\n\t}\n\t//check west\n\tif t.pos.x-1 >= 0 && isWalkable(s.carte[t.pos.x-1][t.pos.y]) && !visited[s.carte[t.pos.x-1][t.pos.y]] {\n\t\tqueue = append(queue, s.carte[t.pos.x-1][t.pos.y])\n\t\tvisited[s.carte[t.pos.x-1][t.pos.y]] = true\n\t\tarea += 1\n\n\t}\n\t//check east\n\tif t.pos.x+1 < WIDTH && isWalkable(s.carte[t.pos.x+1][t.pos.y]) && !visited[s.carte[t.pos.x+1][t.pos.y]] {\n\t\tqueue = append(queue, s.carte[t.pos.x+1][t.pos.y])\n\t\tvisited[s.carte[t.pos.x+1][t.pos.y]] = true\n\t\tarea += 1\n\n\t}\n}\n", "title": "" }, { "docid": "99982ff0e2f65e992839a49fd09eb6d0", "score": "0.5485557", "text": "func flowDown(scan [][]byte, p Point) int {\n\trow := p.Y + 1\n\n\t// If the cell below us is Sand, flow a Trace into it.\n\tif scan[row][p.X] == Sand {\n\t\tscan[row][p.X] = Trace\n\t\treturn 1\n\t}\n\n\treturn 0\n}", "title": "" }, { "docid": "c138413bb4ed68dd0480480203e23871", "score": "0.5470463", "text": "func FindFirstSeenAdjacentOccupiedSeatCount(currentPos []int, seatingChart []string) int {\n\tpositionsFilled := 0\n\n\tstartingPositions := []Path{\n\t\tPath{direction: \"N\", startingPos: []int{currentPos[0] - 1, currentPos[1]}},\n\t\tPath{direction: \"NE\", startingPos: []int{currentPos[0] - 1, currentPos[1] + 1}},\n\t\tPath{direction: \"E\", startingPos: []int{currentPos[0], currentPos[1] + 1}},\n\t\tPath{direction: \"SE\", startingPos: []int{currentPos[0] + 1, currentPos[1] + 1}},\n\t\tPath{direction: \"S\", startingPos: []int{currentPos[0] + 1, currentPos[1]}},\n\t\tPath{direction: \"SW\", startingPos: []int{currentPos[0] + 1, currentPos[1] - 1}},\n\t\tPath{direction: \"W\", startingPos: []int{currentPos[0], currentPos[1] - 1}},\n\t\tPath{direction: \"NW\", startingPos: []int{currentPos[0] - 1, currentPos[1] - 1}},\n\t}\n\n\tfor _, pos := range startingPositions {\n\t\tdirection := pos.direction\n\t\tcurrent := pos.startingPos\n\n\t\t// dont go past any boundries in the seating chart\n\t\tfor current[0] >= 0 && current[0] < len(seatingChart) && current[1] >= 0 && current[1] < len(seatingChart[0]) {\n\t\t\tif string(seatingChart[current[0]][current[1]]) == \"#\" {\n\t\t\t\tpositionsFilled++\n\t\t\t\tbreak\n\t\t\t} else if string(seatingChart[current[0]][current[1]]) == \"L\" {\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\tswitch direction {\n\t\t\tcase \"N\":\n\t\t\t\tcurrent[0]--\n\t\t\tcase \"NE\":\n\t\t\t\tcurrent[0]--\n\t\t\t\tcurrent[1]++\n\t\t\tcase \"E\":\n\t\t\t\tcurrent[1]++\n\t\t\tcase \"SE\":\n\t\t\t\tcurrent[0]++\n\t\t\t\tcurrent[1]++\n\t\t\tcase \"S\":\n\t\t\t\tcurrent[0]++\n\t\t\tcase \"SW\":\n\t\t\t\tcurrent[0]++\n\t\t\t\tcurrent[1]--\n\t\t\tcase \"W\":\n\t\t\t\tcurrent[1]--\n\t\t\tcase \"NW\":\n\t\t\t\tcurrent[0]--\n\t\t\t\tcurrent[1]--\n\t\t\tdefault:\n\t\t\t\tfmt.Println(\"direction invalid\")\n\t\t\t}\n\t\t}\n\n\t}\n\treturn positionsFilled\n}", "title": "" }, { "docid": "d1fd08d3fd8c11008cfcd2651e4e542f", "score": "0.54093844", "text": "func countOccupiedAdjacent(x int, y int, maxX int, maxY int, byteData []byte) int {\n\tindex := x + (y*maxX)\n\tcount := 0\n\tswitch y {\n\tcase 0:\n\t\tswitch x {\n\t\tcase 0:\n\t\t\tadj := []int{1, maxX, maxX+1}\n\t\t\tfor _, v := range adj {\n\t\t\t\tif isOccupied(byteData[index+v]) {\n\t\t\t\t\tcount++\n\t\t\t\t}\n\t\t\t}\n\t\tcase maxX-1:\n\t\t\tadj := []int{-1, maxX-1, maxX}\n\t\t\tfor _, v := range adj {\n\t\t\t\tif isOccupied(byteData[index+v]) {\n\t\t\t\t\tcount++\n\t\t\t\t}\n\t\t\t}\n\t\tdefault:\n\t\t\tadj := []int{-1, 1, maxX-1, maxX, maxX+1}\n\t\t\tfor _, v := range adj {\n\t\t\t\tif isOccupied(byteData[index+v]) {\n\t\t\t\t\tcount++\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\tcase maxY-1:\n\t\tswitch x {\n\t\tcase 0:\n\t\t\tadj := []int{1, -maxX, -maxX+1}\n\t\t\tfor _, v := range adj {\n\t\t\t\tif isOccupied(byteData[index+v]) {\n\t\t\t\t\tcount++\n\t\t\t\t}\n\t\t\t}\n\t\tcase maxX-1:\n\t\t\tadj := []int{-1, -maxX, -maxX-1}\n\t\t\tfor _, v := range adj {\n\t\t\t\tif isOccupied(byteData[index+v]) {\n\t\t\t\t\tcount++\n\t\t\t\t}\n\t\t\t}\n\t\tdefault:\n\t\t\tadj := []int{-1, 1, -maxX+1, -maxX, -maxX-1}\n\t\t\tfor _, v := range adj {\n\t\t\t\tif isOccupied(byteData[index+v]) {\n\t\t\t\t\tcount++\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\tdefault:\n\t\tswitch x {\n\t\tcase 0:\n\t\t\tadj := []int{1, -maxX, -maxX+1, maxX, maxX+1}\n\t\t\tfor _, v := range adj {\n\t\t\t\tif isOccupied(byteData[index+v]) {\n\t\t\t\t\tcount++\n\t\t\t\t}\n\t\t\t}\n\t\tcase maxX-1:\n\t\t\tadj := []int{-1, maxX, maxX-1, -maxX, -maxX-1}\n\t\t\tfor _, v := range adj {\n\t\t\t\tif isOccupied(byteData[index+v]) {\n\t\t\t\t\tcount++\n\t\t\t\t}\n\t\t\t}\n\t\tdefault:\n\t\t\tadj := []int{-1, 1, maxX-1, maxX, maxX+1, -maxX+1, -maxX, -maxX-1}\n\t\t\tfor _, v := range adj {\n\t\t\t\tif isOccupied(byteData[index+v]) {\n\t\t\t\t\tcount++\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn count\n}", "title": "" }, { "docid": "c857ac2d39c6db9eefe801a996c320cc", "score": "0.54043263", "text": "func maxIncreaseKeepingSkyline(grid [][]int) int {\n\tif grid == nil || len(grid) == 0 {\n\t\treturn 0\n\t}\n\tvar max = func(a, b int) int {\n\t\tif a < b {\n\t\t\treturn b\n\t\t}\n\t\treturn a\n\t}\n\tvar min = func(a, b int) int {\n\t\tif a < b {\n\t\t\treturn a\n\t\t}\n\t\treturn b\n\t}\n\t// gets the row & col skyline\n\trow := make([]int, len(grid))\n\tcol := make([]int, len(grid[0]))\n\tfor i := 0; i < len(grid); i++ {\n\t\tfor j := 0; j < len(grid[0]); j++ {\n\t\t\trow[i] = max(row[i], grid[i][j])\n\t\t\tcol[j] = max(col[j], grid[i][j])\n\t\t}\n\t}\n\t//\n\tres := 0\n\tfor i := 0; i < len(grid); i++ {\n\t\tfor j := 0; j < len(grid[0]); j++ {\n\t\t\tres += max(grid[i][j], min(row[i], col[j])) - grid[i][j]\n\t\t}\n\t}\n\treturn res\n}", "title": "" }, { "docid": "bddbe1d3fc4fc7666106f1751dbbd28f", "score": "0.53687745", "text": "func shiftLine(grid [][]int, xStart int, xEnd int, rowIndex int, player int) [][]int {\n\tnewGrid := DuplicateGrid(grid)\n\tstep := 1\n\tindexBound := xStart + 1\n\tif xEnd > xStart {\n\t\tstep = -1\n\t\tindexBound = xStart - 1\n\t}\n\tvalue := player\n\tfor index := xEnd; index != indexBound; index += step {\n\t\ttmpValue := newGrid[rowIndex][index]\n\t\tnewGrid[rowIndex][index] = value\n\t\tvalue = tmpValue\n\t}\n\treturn newGrid\n}", "title": "" }, { "docid": "a7262dc543e13220af117c93ba838360", "score": "0.53392476", "text": "func countLuck(matrix []string, k int32) string {\n\tn := len(matrix)\n\tm := len(matrix[0])\n\tcount := make([][]int, n)\n\tprev := make([][]*Tuple, n)\n\tstack := NewDeque()\n\tgoalX := 0\n\tgoalY := 0\n\tfor i := 0; i < n; i++ {\n\t\tcount[i] = make([]int, m)\n\t\tprev[i] = make([]*Tuple, m)\n\t\tfor j := 0; j < m; j++ {\n\t\t\tcount[i][j] = INFINITY\n\t\t\tif matrix[i][j] == 'M' {\n\t\t\t\tcount[i][j] = 0\n\t\t\t\tprev[i][j] = &Tuple{X: i, Y: j}\n\t\t\t\tstack.AppendLast(&Tuple{X: i, Y: j})\n\t\t\t} else if matrix[i][j] == '*' {\n\t\t\t\tgoalX = i\n\t\t\t\tgoalY = j\n\t\t\t}\n\t\t}\n\t}\n\n\tdiffs := []*Tuple{\n\t\t{X: 0, Y: 1},\n\t\t{X: 0, Y: -1},\n\t\t{X: 1, Y: 0},\n\t\t{X: -1, Y: 0},\n\t}\n\tfor !stack.IsEmpty() {\n\t\tt := stack.PopLast().(*Tuple)\n\t\tfor _, d := range diffs {\n\t\t\tx := t.X + d.X\n\t\t\ty := t.Y + d.Y\n\t\t\tif 0 <= x && x < n &&\n\t\t\t\t0 <= y && y < m &&\n\t\t\t\t(matrix[x][y] == '.' || matrix[x][y] == '*') &&\n\t\t\t\tcount[t.X][t.Y]+1 < count[x][y] {\n\t\t\t\tcount[x][y] = count[t.X][t.Y] + 1\n\t\t\t\tstack.AppendLast(&Tuple{X: x, Y: y})\n\t\t\t\tprev[x][y] = t\n\t\t\t}\n\t\t}\n\t}\n\n\troute := NewDeque()\n\troute.AppendLast(&Tuple{X: goalX, Y: goalY})\n\tfor {\n\t\ta := route.PeekLast().(*Tuple)\n\t\tb := prev[a.X][a.Y]\n\t\tif a.X == b.X && a.Y == b.Y {\n\t\t\tbreak\n\t\t}\n\t\troute.AppendLast(b)\n\t}\n\troute.PopFirst()\n\n\tans := 0\n\tfor !route.IsEmpty() {\n\t\tt := route.PopLast().(*Tuple)\n\t\tu := prev[t.X][t.Y]\n\t\tc := 0\n\t\tfor _, d := range diffs {\n\t\t\tx := t.X + d.X\n\t\t\ty := t.Y + d.Y\n\t\t\tif 0 <= x && x < n &&\n\t\t\t\t0 <= y && y < m &&\n\t\t\t\t!(u.X == x && u.Y == y) &&\n\t\t\t\t(matrix[x][y] == '.' || matrix[x][y] == '*') {\n\t\t\t\tc++\n\t\t\t}\n\t\t}\n\n\t\tif c >= 2 {\n\t\t\tans++\n\t\t}\n\t}\n\n\tif ans == int(k) {\n\t\treturn \"Impressed\"\n\t} else {\n\t\treturn \"Oops!\"\n\t}\n}", "title": "" }, { "docid": "84d235d216df65d56978f51f3a788002", "score": "0.5302331", "text": "func NumCollisions(t *tracks.Data) int {\n\treset()\n\tv := Vector{Point{50, 50, 150}, tracks.DIR_STRAIGHT}\n\tclosestX, closestY, closestZ := 0, 0, 0\n\toldX, oldY, oldZ := 0, 0, 0\n\tcount := 0\n\tfor i := range t.Elements {\n\t\tts := t.Elements[i].Segment\n\t\toldX = closestX\n\t\toldY = closestY\n\t\toldZ = closestZ\n\t\tv = AdvanceVector(v, ts)\n\t\tclosestX = round(v.Point[0])\n\t\tclosestY = round(v.Point[1])\n\t\tclosestZ = round(v.Point[2])\n\n\t\t// XXX - take helixes into account\n\t\tlowX := min(oldX, closestX)\n\t\thighX := max(oldX, closestX)\n\t\tlowY := min(oldY, closestY)\n\t\thighY := max(oldY, closestY)\n\t\tlowZ := min(oldZ, closestZ)\n\t\thighZ := max(oldZ, closestZ)\n\n\t\t// Too wide of a track is a \"collision\"\n\t\tif lowX < 0 || highX >= 100 {\n\t\t\tcount++\n\t\t\tcontinue\n\t\t}\n\t\tif lowY < 0 || highY >= 100 {\n\t\t\tcount++\n\t\t\tcontinue\n\t\t}\n\t\t// XXX: Car can only go 20 pieces above the ground\n\t\tif lowZ < 0 || highZ+2 >= 300 {\n\t\t\tcount++\n\t\t\tcontinue\n\t\t}\n\n\t\t// fill in in between points. assume everything is at ending elevation\n\t\t// - not great, meh. probably need a third loop\n\t\t// Ugh, this might not fill properly based on high/low ordering. might\n\t\t// be ok since it's ok to fill space more than once\n\t\tcollision := false\n\t\tfor i := lowX; i < highX && !collision; i++ {\n\t\t\tfor j := lowY; j < highY && !collision; j++ {\n\t\t\t\tfor k := lowZ; k < highZ+2 && !collision; k++ {\n\t\t\t\t\t//fmt.Printf(\"%d %d %d\\n\", i, j, k)\n\t\t\t\t\tif matrix[i][j][k] {\n\t\t\t\t\t\tcount++\n\t\t\t\t\t\t// only count one track piece once.\n\t\t\t\t\t\tcollision = true\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t\tmatrix[i][j][k] = true\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn count\n}", "title": "" }, { "docid": "9bb60b5363d0d19e1a0550df788718be", "score": "0.5279783", "text": "func (s *slope) rideDown() []int {\n\n\tvar result []int\n\n\t// Run every tobogannism down the tracks\n\tfor i, _ := range s.tobogganists {\n\t\t// Whilst there's still a path to travel down\n\t\tfor s.tobogganists[i].y < len(s.grid)-1 {\n\t\t\tnewX := s.tobogganists[i].x + s.tobogganists[i].right\n\t\t\tnewY := s.tobogganists[i].y + s.tobogganists[i].down\n\n\t\t\t// CHeck whether our move, would exceed row length, if so dynamically re-size\n\t\t\tif newX >= len(s.grid[newY]) {\n\t\t\t\ts.resizeRowPath(newY)\n\t\t\t}\n\n\t\t\ts.tobogganists[i].x = newX\n\t\t\ts.tobogganists[i].y = newY\n\n\t\t\t// Get value from grid\n\t\t\tif s.grid[newY][newX] == \"#\" {\n\t\t\t\ts.tobogganists[i].treesCollided++\n\t\t\t}\n\t\t}\n\t\tresult = append(result, s.tobogganists[i].treesCollided)\n\t}\n\n\treturn result\n\n}", "title": "" }, { "docid": "4b388dd049946ff218c591e7fd9f9c37", "score": "0.5253041", "text": "func scheduleByNeighborCount(s [][]byte) int {\n\tcountMap := make(map[int][]rcPair)\n\tmaxCol := len(s[0])\n\tmaxRow := len(s)\n\n\tfor c := 0; c < maxCol; c = c + 1 {\n\t\tcount := 0\n\t\tfor r := 0; r < maxRow; r = r + 1 {\n\t\t\tcount = neighborCount(s, r, c)\n\t\t\trc := rcPair{r, c}\n\t\t\tif countMap[count] == nil {\n\t\t\t\tcountMap[count] = make([]rcPair, 0)\n\t\t\t}\n\t\t\tcountMap[count] = append(countMap[count], rc)\n\t\t}\n\t}\n\n\tt := 0\n\tfor count := 0; count < 7; count = count + 1 {\n\t\tif countMap[count] != nil {\n\t\t\tfor _, c := range countMap[count] {\n\t\t\t\tfor r := 0; r < maxRow; r = r + 1 {\n\t\t\t\t\tif validSeat(s, c.row, c.col) {\n\t\t\t\t\t\ts[c.row][c.col] = 'x'\n\t\t\t\t\t\tt++\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn t\n}", "title": "" }, { "docid": "9ab610f68774bda9b386506b42b0a29e", "score": "0.52444744", "text": "func (s *State) floodfill(t Tile, depth int) int {\n\tvar queue []Tile\n\tqueue = append(queue, t)\n\tvar area int\n\n\tvar visited = make(map[Tile]bool)\n\n\tfor len(queue) != 0 {\n\t\tvar t = queue[0]\n\t\tqueue = queue[1:]\n\n\t\t//!!! cant check south if i go north!! i just came from south!!\n\t\t//check north\n\t\tif t.pos.y-1 >= 0 && isWalkable(s.carte[t.pos.x][t.pos.y-1]) && !visited[s.carte[t.pos.x][t.pos.y-1]] {\n\t\t\tqueue = append(queue, s.carte[t.pos.x][t.pos.y-1])\n\t\t\tvisited[s.carte[t.pos.x][t.pos.y-1]] = true\n\t\t\tarea += 1\n\t\t}\n\t\t//check south\n\t\tif t.pos.y+1 < HEIGHT && isWalkable(s.carte[t.pos.x][t.pos.y+1]) && !visited[s.carte[t.pos.x][t.pos.y+1]] {\n\t\t\tqueue = append(queue, s.carte[t.pos.x][t.pos.y+1])\n\t\t\tvisited[s.carte[t.pos.x][t.pos.y+1]] = true\n\t\t\tarea += 1\n\t\t}\n\t\t//check west\n\t\tif t.pos.x-1 >= 0 && isWalkable(s.carte[t.pos.x-1][t.pos.y]) && !visited[s.carte[t.pos.x-1][t.pos.y]] {\n\t\t\tqueue = append(queue, s.carte[t.pos.x-1][t.pos.y])\n\t\t\tvisited[s.carte[t.pos.x-1][t.pos.y]] = true\n\t\t\tarea += 1\n\n\t\t}\n\t\t//check east\n\t\tif t.pos.x+1 < WIDTH && isWalkable(s.carte[t.pos.x+1][t.pos.y]) && !visited[s.carte[t.pos.x+1][t.pos.y]] {\n\t\t\tqueue = append(queue, s.carte[t.pos.x+1][t.pos.y])\n\t\t\tvisited[s.carte[t.pos.x+1][t.pos.y]] = true\n\t\t\tarea += 1\n\n\t\t}\n\t}\n\treturn 0\n}", "title": "" }, { "docid": "0dc8463952d8e0e1a2a1dec8fda07b08", "score": "0.52306694", "text": "func minimumMoves(grid [][]int) int {\n\tn := len(grid)\n queue := list.New()\n queue.PushBack([3]int{0,0,0}) // left-up coordinates and direction\n visited := make(map[[3]int]struct{})\n visited[[3]int{0,0,0}] = struct{}{}\n step := 0\n for queue.Len()>0 {\n \tL := queue.Len()\n \tfor k:=0; k<L; k++ { // for current layer\n \t\ttmp := queue.Remove(queue.Front()).([3]int)\n \t\ti, j, d := tmp[0], tmp[1], tmp[2]\n \t\tif d==0 { // horizontal\n \t\t\tif _, ok := visited[[3]int{i, j+1, 0}]; j+2<n && grid[i][j+2]==0 && !ok { // right\n \t\t\t\tvisited[[3]int{i, j+1, 0}] = struct{}{}\n \t\t\t\tqueue.PushBack([3]int{i, j+1, 0})\n \t\t\t\tif i==n-1 && j+1==n-2 {\n \t\t\t\t\treturn step+1\n \t\t\t\t}\n \t\t\t}\n \t\t\tif i+1<n && grid[i+1][j]==0 && grid[i+1][j+1]==0 { // clock\n \t\t\t\tif _, ok := visited[[3]int{i, j, 1}]; !ok {\n \t\t\t\t\tvisited[[3]int{i, j, 1}] = struct{}{}\n \t\t\t\t\tqueue.PushBack([3]int{i, j, 1})\n \t\t\t\t}\n \t\t\t\tif _, ok := visited[[3]int{i+1, j, 0}]; !ok { // down\n \t\t\t\t\tvisited[[3]int{i+1, j, 0}] = struct{}{}\n \t\t\t\t\tqueue.PushBack([3]int{i+1, j, 0})\n \t\t\t\t\tif i+1==n-1 && j==n-2 {\n \t\t\t\t\t\treturn step+1\n \t\t\t\t\t}\n \t\t\t\t}\n \t\t\t}\n \t\t}\n \t\tif d==1 { // vertical\n \t\t\tif _, ok := visited[[3]int{i+1, j, 1}]; i+2<n && grid[i+2][j]==0 && !ok { // down\n \t\t\t\tvisited[[3]int{i+1, j, 1}] = struct{}{}\n \t\t\t\tqueue.PushBack([3]int{i+1, j, 1})\n \t\t\t}\n \t\t\tif j+1<n && grid[i][j+1]==0 && grid[i+1][j+1]==0 { // right\n \t\t\t\tif _, ok := visited[[3]int{i, j+1, 1}]; !ok {\n \t\t\t\t\tvisited[[3]int{i, j+1, 1}] = struct{}{}\n \t\t\t\t\tqueue.PushBack([3]int{i, j+1, 1})\n \t\t\t\t}\n \t\t\t\tif _, ok := visited[[3]int{i, j, 0}]; !ok { // anti-clock\n \t\t\t\t\tvisited[[3]int{i, j, 0}] = struct{}{}\n \t\t\t\t\tqueue.PushBack([3]int{i, j, 0})\n \t\t\t\t}\n \t\t\t}\n \t\t}\n \t}\n \tstep++\n }\n return -1\n}", "title": "" }, { "docid": "fc3b7f729c422a25392271ae2f79d50a", "score": "0.5204675", "text": "func (g *GameOfLife) countAliveNeighbors(mP *Matrix, x, y int) int {\n m := *mP\n sum := 0\n for i := -1; i <= 1; i++ {\n for j := -1; j <= 1; j++ {\n col := (x + i + g.Cols) % g.Cols\n row := (y + j + g.Rows) % g.Rows\n sum += m[col][row]\n }\n }\n sum -= m[x][y]\n\n return sum\n}", "title": "" }, { "docid": "235a42ae1f9fc0359de5b3c3008c904a", "score": "0.51980793", "text": "func adjacentWalls(y, x, w int, t []Tile) int {\n\tcounter := 0\n\tif t[x+y*w].BlockMove {\n\t\tcounter += 2\n\t}\n\tif t[(x+1)+(y+1)*w].BlockMove {\n\t\tcounter++\n\t}\n\tif t[(x-1)+(y-1)*w].BlockMove {\n\t\tcounter++\n\t}\n\tif t[(x+1)+(y-1)*w].BlockMove {\n\t\tcounter++\n\t}\n\tif t[x+(y+1)*w].BlockMove {\n\t\tcounter++\n\t}\n\tif t[x+(y-1)*w].BlockMove {\n\t\tcounter++\n\t}\n\tif t[(x+1)+y*w].BlockMove {\n\t\tcounter++\n\t}\n\tif t[(x-1)+y*w].BlockMove {\n\t\tcounter++\n\t}\n\treturn counter\n}", "title": "" }, { "docid": "c4bd1fe8ef064cecc59def6efb796be9", "score": "0.5172055", "text": "func countOccupied(seatMap []string, posX int, posY int) int {\n\tvar occupied int\n\t// check above current line\n\tif posY > 0 {\n\t\tstart := posX - 1\n\t\tif start < 0 {\n\t\t\tstart = 0\n\t\t}\n\t\tend := posX + 2\n\t\tif end > len(seatMap[posY-1]) {\n\t\t\tend = len(seatMap[posY-1])\n\t\t}\n\n\t\tfor _, elem := range seatMap[posY-1][start:end] {\n\t\t\tif elem == '#' {\n\t\t\t\toccupied++\n\t\t\t}\n\t\t}\n\t}\n\n\tif posX > 0 && seatMap[posY][posX-1] == '#' {\n\t\toccupied++\n\t}\n\n\tif posX < len(seatMap[posY])-1 && seatMap[posY][posX+1] == '#' {\n\t\toccupied++\n\t}\n\n\t// check below current line\n\tif posY < len(seatMap)-1 {\n\t\tstart := posX - 1\n\t\tif start < 0 {\n\t\t\tstart = 0\n\t\t}\n\t\tend := posX + 2\n\t\tif end > len(seatMap[posY+1]) {\n\t\t\tend = len(seatMap[posY+1])\n\t\t}\n\n\t\tfor _, elem := range seatMap[posY+1][start:end] {\n\t\t\tif elem == '#' {\n\t\t\t\toccupied++\n\t\t\t}\n\t\t}\n\t}\n\n\treturn occupied\n}", "title": "" }, { "docid": "d8f4483c05153ce0f80fd5d90b7e7c7a", "score": "0.51705635", "text": "func findNearestZero(mat [][]int, y, x int) int {\n\tif mat[y][x] == 0 {\n\t\treturn 0\n\t}\n\tlenY := len(mat)\n\tlenX := len(mat[0])\n\tmin := 1<<31 - 1\n\tdirs := [][]int{{-1, 0}, {0, -1}, {1, 0}, {0, 1}}\n\tfor _, v := range dirs {\n\t\tif y+v[0] >= 0 && y+v[0] < lenY && x+v[1] >= 0 && x+v[1] < lenX {\n\t\t\tif mat[y+v[0]][x+v[1]] == 1 {\n\t\t\t\tmat[y+v[0]][x+v[1]] = 2 // marked traversal\n\t\t\t\ttemp := findNearestZero(mat, y+v[0], x+v[1]) + 1\n\t\t\t\tif min > temp {\n\t\t\t\t\tmin = temp\n\t\t\t\t}\n\t\t\t\tmat[y+v[0]][x+v[1]] = 1 // restore for next iteration\n\t\t\t} else if mat[y+v[0]][x+v[1]] == 0 {\n\t\t\t\treturn 1\n\t\t\t}\n\t\t}\n\t}\n\treturn min\n}", "title": "" }, { "docid": "2bd22e9aa4f610fcbddb82dc8cab43ae", "score": "0.51576275", "text": "func numIslands(grid [][]byte) int {\n var queue [][]int\n\n enqueue := func(x int, y int) {\n queue = append(queue, []int{x, y})\n }\n\n dequeue := func() (int, int) {\n if len(queue) == 0 {\n return -1, -1\n }\n r := queue[0]\n queue = queue[1:]\n return r[0], r[1]\n }\n\n if grid == nil || len(grid) <= 0 {\n return 0\n }\n\n used := make([][]bool, len(grid))\n for i := range used {\n used[i] = make([]bool, len(grid[0]))\n }\n islands := 0\n\n for i := range grid {\n for j := range grid[i] {\n if used[i][j] || grid[i][j] == 0 {\n continue\n }\n\n enqueue(i, j)\n used[i][j] = true\n islands++\n\n for ; len(queue) > 0; {\n x, y := dequeue()\n if x < len(grid)-1 && grid[x+1][y] > 0 && !used[x+1][y] {\n enqueue(x+1, y)\n used[x+1][y] = true\n }\n if x > 0 && grid[x-1][y] > 0 && !used[x-1][y] {\n enqueue(x-1, y)\n used[x-1][y] = true\n }\n if y < len(grid[x])-1 && grid[x][y+1] > 0 && !used[x][y+1] {\n enqueue(x, y+1)\n used[x][y+1] = true\n }\n if y > len(grid[x]) && grid[x][y-1] > 0 && !used[x][y+1] {\n enqueue(x, y-1)\n used[x][y+1] = true\n }\n }\n\n }\n }\n return islands\n}", "title": "" }, { "docid": "c978bece0d554418f6b50e4ebc449bd3", "score": "0.5142485", "text": "func (b *Board) backtrack() {\n\tlastTile := b.path[len(b.path)-1].tile\n\tx := b.path[len(b.path)-1].x\n\ty := b.path[len(b.path)-1].y\n\n\tb.path = b.path[:len(b.path)-1]\n\tlastTile.amount++\n\n\tfor i := 0; i < lastTile.width; i++ {\n\t\tfor j := 0; j < lastTile.height; j++ {\n\t\t\tb.grid[x+i][y+j] = false\n\t\t}\n\t}\n}", "title": "" }, { "docid": "4fb14a7b2314ff3271e9c9fe7ab9ab21", "score": "0.5132041", "text": "func fill(b board, x, y int) int {\n\tcount := 0\n\tstack := newStack()\n\tstack.push(node{x, y})\n\tfor !stack.empty() {\n\t\tn := stack.pop()\n\t\tif floodBoard[n.y][n.x] == marker {\n\t\t\tcontinue\n\t\t}\n\t\tfloodBoard[n.y][n.x] = marker\n\t\tcount++\n\t\tfor yy := n.y - 1; yy <= n.y+1; yy++ {\n\t\t\tif yy < 0 || yy >= BOARD_SIZE {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tfor xx := n.x - 1; xx <= n.x+1; xx++ {\n\t\t\t\tif xx < 0 || xx >= BOARD_SIZE {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tif !(xx == x && yy == y) && b[yy][xx] == 0 && floodBoard[yy][xx] != marker {\n\t\t\t\t\tstack.push(node{xx, yy})\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn count\n}", "title": "" }, { "docid": "10895f111f58d36106e1a79b74de6679", "score": "0.5123968", "text": "func checkCrosses(horizontal *[]line, vertical *[]line) (int64, int64) {\n\tvar (\n\t\tbestDistance int64 = math.MaxInt64\n\t\tbestSteps int64 = math.MaxInt64\n\t)\n\n\tfor _, h := range *horizontal {\n\t\tfor _, v := range *vertical {\n\t\t\tvar steps int64 = math.MaxInt64\n\t\t\tif h.from <= v.perp && v.perp <= h.to {\n\t\t\t\t// If the horizontal line goes left-to-right\n\t\t\t\tif v.from <= h.perp && h.perp <= v.to {\n\t\t\t\t\t// If the vertical line goes top-to-bottom\n\t\t\t\t\tsteps = (h.steps + v.perp - h.from) + (v.steps + h.perp - v.from)\n\t\t\t\t} else if v.to <= h.perp && h.perp <= v.from {\n\t\t\t\t\t// If the vertical line goes bottom-to-top\n\t\t\t\t\tsteps = (h.steps + v.perp - h.from) + (v.steps + v.from - h.perp)\n\t\t\t\t} else {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t} else if h.to <= v.perp && v.perp <= h.from {\n\t\t\t\t// If the horizontal line goes right-to-left\n\t\t\t\tif v.from <= h.perp && h.perp <= v.to {\n\t\t\t\t\t// If the vertical line goes top-to-bottom\n\t\t\t\t\tsteps = (h.steps + h.from - v.perp) + (v.steps + h.perp - v.from)\n\t\t\t\t} else if v.to <= h.perp && h.perp <= v.from {\n\t\t\t\t\t// If the vertical line goes bottom-to-top\n\t\t\t\t\tsteps = (h.steps + h.from - v.perp) + (v.steps + v.from - h.perp)\n\t\t\t\t} else {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tdistance := common.Abs(v.perp) + common.Abs(h.perp)\n\t\t\tif distance < bestDistance {\n\t\t\t\tbestDistance = distance\n\t\t\t}\n\t\t\tif steps < bestSteps {\n\t\t\t\tbestSteps = steps\n\t\t\t}\n\t\t}\n\t}\n\n\treturn bestDistance, bestSteps\n}", "title": "" }, { "docid": "b71c283343077dc4d7eb7c626f3308e3", "score": "0.5121233", "text": "func CountAlive(table [][]bool, x, y int) int {\n\th, w := len(table), len(table[0])\n\tcount := 0\n\tfor yi := y - 1; yi <= y+1; yi++ {\n\t\tif !(yi >= 0 && yi <= h-1) {\n\t\t\tcontinue\n\t\t}\n\t\tfor xi := x - 1; xi <= x+1; xi++ {\n\t\t\tif !(xi >= 0 && xi <= w-1) {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif xi == x && yi == y {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif table[yi][xi] {\n\t\t\t\tcount++\n\t\t\t}\n\t\t}\n\t}\n\treturn count\n}", "title": "" }, { "docid": "40a1f8a6be61ffcdbb6cd01360347f2c", "score": "0.51160544", "text": "func tankLimit(t *testing.T, s tankSize) {\n\n\t// Move towards the maximum coordinate.\n\ttankDirection(t, s, (math.Pi / 4.0), coord{s.x, s.y})\n\n\t// Move away from the maximum coordinate.\n\ttankDirection(t, s, (math.Pi * (-3.0 / 4.0)), coord{0, 0})\n}", "title": "" }, { "docid": "48c1d516b8a65afa4a8bf901cdead7c4", "score": "0.5112848", "text": "func (b *Board) getNeighbours(y int, x int) []rune {\n\tvar neighbours []rune\n\n\t// First we iterate the three cells above our target cell, then the three below\n\n\tabove := y - 1\n\tif above >= 0 && above < len(b.w) {\n\t\tfor tX := x - 1; tX <= x+1; tX++ {\n\t\t\tif tX >= 0 && tX < len(b.w[above]) {\n\t\t\t\tneighbours = append(neighbours, b.w[above][tX])\n\t\t\t} else {\n\t\t\t\tneighbours = append(neighbours, '0')\n\t\t\t}\n\t\t}\n\t} else {\n\t\tneighbours = append(neighbours, []rune{'0', '0', '0'}...)\n\t}\n\n\tbelow := y + 1\n\tif below >= 0 && below < len(b.w) {\n\t\tfor tX := x - 1; tX <= x+1; tX++ {\n\t\t\tif tX >= 0 && tX < len(b.w[below]) {\n\t\t\t\tneighbours = append(neighbours, b.w[below][tX])\n\t\t\t} else {\n\t\t\t\tneighbours = append(neighbours, '0')\n\t\t\t}\n\t\t}\n\t} else {\n\t\tneighbours = append(neighbours, []rune{'0', '0', '0'}...)\n\t}\n\n\t// Now we'll just get x+1 and x-1 manually\n\tprevious := x - 1\n\tif previous > 0 && previous < len(b.w[y]) {\n\t\tneighbours = append(neighbours, b.w[y][previous])\n\t} else {\n\t\tneighbours = append(neighbours, '0')\n\t}\n\n\tfollowing := x + 1\n\tif following > 0 && following < len(b.w[y]) {\n\t\tneighbours = append(neighbours, b.w[y][following])\n\t} else {\n\t\tneighbours = append(neighbours, '0')\n\t}\n\n\treturn neighbours\n}", "title": "" }, { "docid": "5db55497dccb3c0f8fbaffe6d1126ba0", "score": "0.5104697", "text": "func slidingPuzzle773(board [][]int) int {\n\tm, n := len(board), len(board[0])\n\tstart, end := make([]byte, m*n), \"123450\"\n\tfor i, _ := range start {\n\t\tstart[i] = byte(board[i/n][i%n] + '0')\n\t}\n\n\tq := []string{string(start)}\n\tgenerated := map[string]bool{\n\t\tstring(start): true,\n\t}\n\n\tdirs := [][]int{{1, 0}, {-1, 0}, {0, 1}, {0, -1}}\n\tstep := 0\n\tfor len(q) != 0 {\n\t\t// layer by layer, each layer has size = len(q)\n\t\tsize := len(q)\n\t\tfor t := 0; t < size; t++ {\n\t\t\tcurr := q[0]\n\t\t\tq = q[1:]\n\t\t\tif curr == end {\n\t\t\t\treturn step\n\t\t\t}\n\t\t\tzeroIndex := findZero(curr)\n\t\t\tfor _, dir := range dirs {\n\t\t\t\ti, j := zeroIndex/n+dir[0], zeroIndex%n+dir[1]\n\t\t\t\tif i < 0 || i >= m || j < 0 || j >= n {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tnewBoard := []byte(curr)\n\t\t\t\t// swap zero with neighbor positions\n\t\t\t\tnewBoard[zeroIndex], newBoard[i*n+j] = newBoard[i*n+j], newBoard[zeroIndex]\n\t\t\t\tif _, ok := generated[string(newBoard)]; !ok {\n\t\t\t\t\tq = append(q, string(newBoard))\n\t\t\t\t\tgenerated[string(newBoard)] = true\n\t\t\t\t}\n\t\t\t}\n\n\t\t}\n\t\tstep++\n\t}\n\treturn -1\n}", "title": "" }, { "docid": "6789005a1113ec29f1440db593c38e9c", "score": "0.5096866", "text": "func flowAcross(scan [][]byte, p Point) int {\n\t// Find the left and right bounds of this clay\n\tleftBounded, leftBounds := findBoundary(scan, p, -1)\n\trightBounded, rightBounds := findBoundary(scan, p, 1)\n\n\tfillType := byte(Trace)\n\tif leftBounded && rightBounded {\n\t\tfillType = Water\n\t}\n\n\tcount := 0\n\tfor i := leftBounds; i <= rightBounds; i++ {\n\t\tif scan[p.Y][i] != fillType {\n\t\t\tscan[p.Y][i] = fillType\n\t\t\tcount++\n\t\t}\n\t}\n\n\treturn count\n}", "title": "" }, { "docid": "ac72dc290509e61d690cff5957ba3552", "score": "0.50957006", "text": "func jumpingOnClouds(c []int32) int32 {\n\tpasses := 0\n\tcurrentCloud := 0\n\tfor currentCloud != len(c) - 1 {\n\t\tif currentCloud + 2 <= len(c) - 1 && c[currentCloud + 2] != 1 {\n\t\t\tcurrentCloud += 2\n\t\t} else {\n\t\t\tcurrentCloud++\n\t\t}\n\t\tpasses++\n\t}\n\n\treturn int32(passes)\n}", "title": "" }, { "docid": "5219aeea03bf9b684540164cdf2eecb2", "score": "0.5089669", "text": "func MaxIncreaseKeepingSkyline(grid [][]int) int {\n\torigGridSum := calcGrid(grid)\n\tgrid = reconstructGrid(grid)\n\tnewGridSum := calcGrid(grid)\n\n\treturn newGridSum - origGridSum\n}", "title": "" }, { "docid": "26f743cd2e9dc9b0b9be1c2d23c1a576", "score": "0.50891525", "text": "func x_in_a_row(slice []int, win_length int) int {\n \n \n var count int = 0\n \n // loop threw the array checking for blocks of win length\n // equality \n for i := 0; i < (len(slice) - (win_length - 1)); i++ {\n\t\n\t// No need to check empty spaces (-1)\n\tif slice[i] != -1 {\n\t \n\t for k := 1; k < win_length; k++ {\n\t \n\t\tif slice[i] == slice[i + k] {\n\t\t count++\n\t\t} else {\n\t\t count = 0\n\t\t}\n\t }\n\t\n\t if count == win_length-1 {\n\t\treturn slice[i]\n\t }\n\t}\n }\n\treturn -1\n}", "title": "" }, { "docid": "2b81dca035e35cc6639f217b92aced9f", "score": "0.5087063", "text": "func tickElim(grid []string, carts map[pos]cart) map[pos]cart {\n\tnext := make(map[pos]cart)\n\tfor y, line := range grid {\n\t\tfor x, p := range line {\n\t\t\tif c, ok := carts[pos{x: x, y: y}]; ok {\n\t\t\t\tswitch p {\n\t\t\t\tcase '-':\n\t\t\t\t\tswitch c.Direction {\n\t\t\t\t\tcase Right:\n\t\t\t\t\t\t//end of \"tick\" collision\n\t\t\t\t\t\tif _, ok = next[pos{x: x + 1, y: y}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x+1, y)\n\t\t\t\t\t\t\tdelete(next, pos{x: x + 1, y: y})\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\t\t\t\t\t\t//mid \"tick\" collision\n\t\t\t\t\t\tif _, ok = carts[pos{x: x + 1, y: y}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x+1, y)\n\t\t\t\t\t\t\tdelete(carts, pos{x: x + 1, y: y})\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\t\t\t\t\t\tnext[pos{x: x + 1, y: y}] = cart{c.Next, c.Direction}\n\t\t\t\t\t\tdelete(carts, pos{x: x, y: y}) // moved on\n\t\t\t\t\tcase Left:\n\t\t\t\t\t\tif _, ok = next[pos{x: x - 1, y: y}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x-1, y)\n\t\t\t\t\t\t\tdelete(next, pos{x: x - 1, y: y})\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\t\t\t\t\t\tif _, ok = carts[pos{x: x - 1, y: y}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x-1, y)\n\t\t\t\t\t\t\tdelete(carts, pos{x: x - 1, y: y})\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\t\t\t\t\t\tnext[pos{x: x - 1, y: y}] = cart{c.Next, c.Direction}\n\t\t\t\t\t\tdelete(carts, pos{x: x, y: y}) // moved on\n\t\t\t\t\t}\n\n\t\t\t\tcase '|':\n\t\t\t\t\tswitch c.Direction {\n\t\t\t\t\tcase Up:\n\t\t\t\t\t\tif _, ok = next[pos{x: x, y: y - 1}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x, y-1)\n\t\t\t\t\t\t\tdelete(next, pos{x: x, y: y - 1})\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\t\t\t\t\t\tif _, ok = carts[pos{x: x, y: y - 1}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x, y-1)\n\t\t\t\t\t\t\tdelete(carts, pos{x: x, y: y - 1})\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\tnext[pos{x: x, y: y - 1}] = cart{c.Next, c.Direction}\n\t\t\t\t\t\tdelete(carts, pos{x: x, y: y}) // moved on\n\t\t\t\t\tcase Down:\n\t\t\t\t\t\tif _, ok = next[pos{x: x, y: y + 1}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x, y+1)\n\t\t\t\t\t\t\tdelete(next, pos{x: x, y: y + 1})\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\t\t\t\t\t\tif _, ok = carts[pos{x: x, y: y + 1}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x, y+1)\n\t\t\t\t\t\t\tdelete(carts, pos{x: x, y: y + 1})\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\tnext[pos{x: x, y: y + 1}] = cart{c.Next, c.Direction}\n\t\t\t\t\t\tdelete(carts, pos{x: x, y: y}) // moved on\n\t\t\t\t\t}\n\n\t\t\t\tcase '\\\\':\n\t\t\t\t\tswitch c.Direction {\n\t\t\t\t\tcase Right:\n\t\t\t\t\t\tif _, ok = next[pos{x: x, y: y + 1}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x, y+1)\n\t\t\t\t\t\t\tdelete(next, pos{x: x, y: y + 1})\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\t\t\t\t\t\tif _, ok = carts[pos{x: x, y: y + 1}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x, y+1)\n\t\t\t\t\t\t\tdelete(carts, pos{x: x, y: y + 1})\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\tnext[pos{x: x, y: y + 1}] = cart{c.Next, Down}\n\t\t\t\t\t\tdelete(carts, pos{x: x, y: y}) // moved on\n\t\t\t\t\tcase Left:\n\t\t\t\t\t\tif _, ok = next[pos{x: x, y: y - 1}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x, y-1)\n\t\t\t\t\t\t\tdelete(next, pos{x: x, y: y - 1})\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\t\t\t\t\t\tif _, ok = carts[pos{x: x, y: y - 1}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x, y-1)\n\t\t\t\t\t\t\tdelete(carts, pos{x: x, y: y - 1})\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\tnext[pos{x: x, y: y - 1}] = cart{c.Next, Up}\n\t\t\t\t\t\tdelete(carts, pos{x: x, y: y}) // moved on\n\t\t\t\t\tcase Up:\n\t\t\t\t\t\tif _, ok = next[pos{x: x - 1, y: y}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x-1, y)\n\t\t\t\t\t\t\tdelete(next, pos{x: x - 1, y: y})\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\t\t\t\t\t\tif _, ok = carts[pos{x: x - 1, y: y}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x-1, y)\n\t\t\t\t\t\t\tdelete(carts, pos{x: x - 1, y: y})\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\tnext[pos{x: x - 1, y: y}] = cart{c.Next, Left}\n\t\t\t\t\t\tdelete(carts, pos{x: x, y: y}) // moved on\n\t\t\t\t\tcase Down:\n\t\t\t\t\t\tif _, ok = next[pos{x: x + 1, y: y}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x+1, y)\n\t\t\t\t\t\t\tdelete(next, pos{x: x + 1, y: y})\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\t\t\t\t\t\tif _, ok = carts[pos{x: x + 1, y: y}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x+1, y)\n\t\t\t\t\t\t\tdelete(carts, pos{x: x + 1, y: y})\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\tnext[pos{x: x + 1, y: y}] = cart{c.Next, Right}\n\t\t\t\t\t\tdelete(carts, pos{x: x, y: y}) // moved on\n\t\t\t\t\t}\n\t\t\t\tcase '/':\n\t\t\t\t\tswitch c.Direction {\n\t\t\t\t\tcase Left:\n\t\t\t\t\t\tif _, ok = next[pos{x: x, y: y + 1}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x, y+1)\n\t\t\t\t\t\t\tdelete(next, pos{x: x, y: y + 1})\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\t\t\t\t\t\tif _, ok = carts[pos{x: x, y: y + 1}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x, y+1)\n\t\t\t\t\t\t\tdelete(carts, pos{x: x, y: y + 1})\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\tnext[pos{x: x, y: y + 1}] = cart{c.Next, Down}\n\t\t\t\t\t\tdelete(carts, pos{x: x, y: y}) // moved on\n\t\t\t\t\tcase Right:\n\t\t\t\t\t\tif _, ok = next[pos{x: x, y: y - 1}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x, y-1)\n\t\t\t\t\t\t\tdelete(next, pos{x: x, y: y - 1})\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\t\t\t\t\t\tif _, ok = carts[pos{x: x, y: y - 1}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x, y-1)\n\t\t\t\t\t\t\tdelete(carts, pos{x: x, y: y - 1})\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\tnext[pos{x: x, y: y - 1}] = cart{c.Next, Up}\n\t\t\t\t\t\tdelete(carts, pos{x: x, y: y}) // moved on\n\t\t\t\t\tcase Up:\n\t\t\t\t\t\tif _, ok = next[pos{x: x + 1, y: y}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x+1, y)\n\t\t\t\t\t\t\tdelete(next, pos{x: x + 1, y: y})\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\t\t\t\t\t\tif _, ok = carts[pos{x: x + 1, y: y}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x+1, y)\n\t\t\t\t\t\t\tdelete(carts, pos{x: x + 1, y: y})\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\tnext[pos{x: x + 1, y: y}] = cart{c.Next, Right}\n\t\t\t\t\tcase Down:\n\t\t\t\t\t\tif _, ok = next[pos{x: x - 1, y: y}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x-1, y)\n\t\t\t\t\t\t\tdelete(next, pos{x: x - 1, y: y})\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\t\t\t\t\t\tif _, ok = carts[pos{x: x - 1, y: y}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x-1, y)\n\t\t\t\t\t\t\tdelete(carts, pos{x: x - 1, y: y})\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\tnext[pos{x: x - 1, y: y}] = cart{c.Next, Left}\n\t\t\t\t\t\tdelete(carts, pos{x: x, y: y}) // moved on\n\t\t\t\t\t}\n\t\t\t\tcase '+':\n\t\t\t\t\tswitch c.Next {\n\t\t\t\t\tcase LeftTurn:\n\t\t\t\t\t\tswitch c.Direction {\n\t\t\t\t\t\tcase Up:\n\t\t\t\t\t\t\tif _, ok = next[pos{x: x - 1, y: y}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x-1, y)\n\t\t\t\t\t\t\t\tdelete(next, pos{x: x - 1, y: y})\n\t\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\tif _, ok = carts[pos{x: x - 1, y: y}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x-1, y)\n\t\t\t\t\t\t\t\tdelete(carts, pos{x: x - 1, y: y})\n\t\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t\t}\n\n\t\t\t\t\t\t\tnext[pos{x: x - 1, y: y}] = cart{Straight, Left}\n\t\t\t\t\t\t\tdelete(carts, pos{x: x, y: y}) // moved on\n\t\t\t\t\t\tcase Down:\n\t\t\t\t\t\t\tif _, ok = next[pos{x: x + 1, y: y}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x+1, y)\n\t\t\t\t\t\t\t\tdelete(next, pos{x: x + 1, y: y})\n\t\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\tif _, ok = carts[pos{x: x + 1, y: y}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x+1, y)\n\t\t\t\t\t\t\t\tdelete(carts, pos{x: x + 1, y: y})\n\t\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t\t}\n\n\t\t\t\t\t\t\tnext[pos{x: x + 1, y: y}] = cart{Straight, Right}\n\t\t\t\t\t\t\tdelete(carts, pos{x: x, y: y}) // moved on\n\t\t\t\t\t\tcase Left:\n\t\t\t\t\t\t\tif _, ok = next[pos{x: x, y: y + 1}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x, y+1)\n\t\t\t\t\t\t\t\tdelete(next, pos{x: x, y: y + 1})\n\t\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\tif _, ok = carts[pos{x: x, y: y + 1}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x, y+1)\n\t\t\t\t\t\t\t\tdelete(carts, pos{x: x, y: y + 1})\n\t\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t\t}\n\n\t\t\t\t\t\t\tnext[pos{x: x, y: y + 1}] = cart{Straight, Down}\n\t\t\t\t\t\t\tdelete(carts, pos{x: x, y: y}) // moved on\n\t\t\t\t\t\tcase Right:\n\t\t\t\t\t\t\tif _, ok = next[pos{x: x, y: y - 1}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x, y-1)\n\t\t\t\t\t\t\t\tdelete(next, pos{x: x, y: y - 1})\n\t\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\tif _, ok = carts[pos{x: x, y: y - 1}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x, y-1)\n\t\t\t\t\t\t\t\tdelete(carts, pos{x: x, y: y - 1})\n\t\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t\t}\n\n\t\t\t\t\t\t\tnext[pos{x: x, y: y - 1}] = cart{Straight, Up}\n\t\t\t\t\t\t\tdelete(carts, pos{x: x, y: y}) // moved on\n\t\t\t\t\t\t}\n\t\t\t\t\tcase RightTurn:\n\t\t\t\t\t\tswitch c.Direction {\n\t\t\t\t\t\tcase Up:\n\t\t\t\t\t\t\tif _, ok = next[pos{x: x + 1, y: y}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x+1, y)\n\t\t\t\t\t\t\t\tdelete(next, pos{x: x + 1, y: y})\n\t\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\tif _, ok = carts[pos{x: x + 1, y: y}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x+1, y)\n\t\t\t\t\t\t\t\tdelete(carts, pos{x: x + 1, y: y})\n\t\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t\t}\n\n\t\t\t\t\t\t\tnext[pos{x: x + 1, y: y}] = cart{LeftTurn, Right}\n\t\t\t\t\t\t\tdelete(carts, pos{x: x, y: y}) // moved on\n\t\t\t\t\t\tcase Down:\n\t\t\t\t\t\t\tif _, ok = next[pos{x: x - 1, y: y}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x-1, y)\n\t\t\t\t\t\t\t\tdelete(next, pos{x: x - 1, y: y})\n\t\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\tif _, ok = carts[pos{x: x - 1, y: y}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x-1, y)\n\t\t\t\t\t\t\t\tdelete(carts, pos{x: x - 1, y: y})\n\t\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t\t}\n\n\t\t\t\t\t\t\tnext[pos{x: x - 1, y: y}] = cart{LeftTurn, Left}\n\t\t\t\t\t\t\tdelete(carts, pos{x: x, y: y}) // moved on\n\t\t\t\t\t\tcase Left:\n\t\t\t\t\t\t\tif _, ok = next[pos{x: x, y: y - 1}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x, y-1)\n\t\t\t\t\t\t\t\tdelete(next, pos{x: x, y: y - 1})\n\t\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\tif _, ok = carts[pos{x: x, y: y - 1}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x, y-1)\n\t\t\t\t\t\t\t\tdelete(next, pos{x: x, y: y - 1})\n\t\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t\t}\n\n\t\t\t\t\t\t\tnext[pos{x: x, y: y - 1}] = cart{LeftTurn, Up}\n\t\t\t\t\t\t\tdelete(carts, pos{x: x, y: y}) // moved on\n\t\t\t\t\t\tcase Right:\n\t\t\t\t\t\t\tif _, ok = next[pos{x: x, y: y + 1}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x, y+1)\n\t\t\t\t\t\t\t\tdelete(next, pos{x: x, y: y + 1})\n\t\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\tif _, ok = carts[pos{x: x, y: y + 1}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x, y+1)\n\t\t\t\t\t\t\t\tdelete(carts, pos{x: x, y: y + 1})\n\t\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t\t}\n\n\t\t\t\t\t\t\tnext[pos{x: x, y: y + 1}] = cart{LeftTurn, Down}\n\t\t\t\t\t\t\tdelete(carts, pos{x: x, y: y}) // moved on\n\t\t\t\t\t\t}\n\t\t\t\t\tcase Straight:\n\t\t\t\t\t\tswitch c.Direction {\n\t\t\t\t\t\tcase Up:\n\t\t\t\t\t\t\tif _, ok = next[pos{x: x, y: y - 1}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x, y-1)\n\t\t\t\t\t\t\t\tdelete(next, pos{x: x, y: y - 1})\n\t\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\tif _, ok = carts[pos{x: x, y: y - 1}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x, y-1)\n\t\t\t\t\t\t\t\tdelete(carts, pos{x: x, y: y - 1})\n\t\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t\t}\n\n\t\t\t\t\t\t\tnext[pos{x: x, y: y - 1}] = cart{RightTurn, Up}\n\t\t\t\t\t\t\tdelete(carts, pos{x: x, y: y}) // moved on\n\t\t\t\t\t\tcase Down:\n\t\t\t\t\t\t\tif _, ok = next[pos{x: x, y: y + 1}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x, y+1)\n\t\t\t\t\t\t\t\tdelete(next, pos{x: x, y: y + 1})\n\t\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\tif _, ok = carts[pos{x: x, y: y + 1}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x, y+1)\n\t\t\t\t\t\t\t\tdelete(carts, pos{x: x, y: y + 1})\n\t\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t\t}\n\n\t\t\t\t\t\t\tnext[pos{x: x, y: y + 1}] = cart{RightTurn, Down}\n\t\t\t\t\t\t\tdelete(carts, pos{x: x, y: y}) // moved on\n\t\t\t\t\t\tcase Left:\n\t\t\t\t\t\t\tif _, ok = next[pos{x: x - 1, y: y}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x-1, y)\n\t\t\t\t\t\t\t\tdelete(next, pos{x: x - 1, y: y})\n\t\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\tif _, ok = carts[pos{x: x - 1, y: y}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x-1, y)\n\t\t\t\t\t\t\t\tdelete(carts, pos{x: x - 1, y: y})\n\t\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t\t}\n\n\t\t\t\t\t\t\tnext[pos{x: x - 1, y: y}] = cart{RightTurn, Left}\n\t\t\t\t\t\t\tdelete(carts, pos{x: x, y: y}) // moved on\n\t\t\t\t\t\tcase Right:\n\t\t\t\t\t\t\tif _, ok = next[pos{x: x + 1, y: y}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x+1, y)\n\t\t\t\t\t\t\t\tdelete(next, pos{x: x + 1, y: y})\n\t\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\tif _, ok = carts[pos{x: x + 1, y: y}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x+1, y)\n\t\t\t\t\t\t\t\tdelete(carts, pos{x: x + 1, y: y})\n\t\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t\t}\n\n\t\t\t\t\t\t\tnext[pos{x: x + 1, y: y}] = cart{RightTurn, Right}\n\t\t\t\t\t\t\tdelete(carts, pos{x: x, y: y}) // moved on\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\tif len(next) <= 1 {\n\t\tfmt.Println(\"Cars Left:\", len(next))\n\t\tfor k, v := range next {\n\t\t\tdualDisplay(grid, next)\n\t\t\tfmt.Printf(\"remaining cart at x:%d y:%d --> [%#v] at %s\\n\", k.x, k.y, v, grid[k.y][k.x:k.x+1])\n\t\t}\n\n\t\tos.Exit(1)\n\t}\n\treturn next\n}", "title": "" }, { "docid": "74f89b8e33aeb234f425d54af4c1d98b", "score": "0.50836855", "text": "func (counter *Grid) count(xy int, g *Grid) *Grid {\n\tif c := g[xy]; c != Empty {\n\t\tg[xy] = Empty\n\t\tcounter[xy]++\n\t\tfor _, nxy := range neighbors(xy) {\n\t\t\tif g[nxy] == c {\n\t\t\t\tcounter.count(nxy, g)\n\t\t\t}\n\t\t}\n\t}\n\treturn counter\n}", "title": "" }, { "docid": "a8e9a32f7517dab40edfcb86e1193fac", "score": "0.5054734", "text": "func (g *grid) topple() {\n\tpasses := 0\n\tfor {\n\t\ttoppled := false\n\t\tfor i, row := range g.cells {\n\t\t\tfor j, col := range row {\n\t\t\t\tif col >= g.maxBeforeTopple {\n\t\t\t\t\tsand := g.cells[i][j]\n\t\t\t\t\tremaining := sand % g.maxBeforeTopple\n\t\t\t\t\ttoppleSand := (sand - remaining) / g.maxBeforeTopple\n\t\t\t\t\tg.cells[i][j] = remaining\n\t\t\t\t\tfor _, o := range g.offsets {\n\t\t\t\t\t\tg.cells[i+o.x][j+o.y] += toppleSand\n\t\t\t\t\t}\n\t\t\t\t\ttoppled = true\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tpasses += 1\n\t\tif passes%10 == 0 {\n\t\t\tfmt.Print(\".\")\n\t\t}\n\t\tif toppled == false {\n\t\t\t// We've reached steady state\n\t\t\tbreak\n\t\t}\n\t}\n\tfmt.Println()\n\tfmt.Printf(\"%v passes to complete\\n\", passes)\n}", "title": "" }, { "docid": "2d269b40189a02191cf38c078ecb9597", "score": "0.5039303", "text": "func calculateNextCellState(y, x int, b [][]int, u [][]int) {\n\n\tN := 0\n\n\t// Count the nearest neigbors for the given cell\n\tfor j := y - 1; j <= y+1; j++ {\n\t\tfor i := x - 1; i <= x+1; i++ {\n\t\t\tif j == -1 || i == -1 {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif j == len(b) || i == len(b[0]) {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif j == y && i == x {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif b[j][i] == 1 {\n\t\t\t\tN++\n\t\t\t}\n\t\t}\n\t}\n\n\t// Set the state of the cell based uppon the number of nearest neighbors\n\tif b[y][x] == 1 {\n\t\tif N < 2 {\n\t\t\tu[y][x] = 0\n\t\t} else if N > 3 {\n\t\t\tu[y][x] = 0\n\t\t}\n\t} else if b[y][x] == 0 {\n\t\tif N == 3 {\n\t\t\tu[y][x] = 1\n\t\t}\n\t}\n}", "title": "" }, { "docid": "00ae7f14eb12690ea4a5cbd2e4d13997", "score": "0.5029091", "text": "func (s *seatMap) countOccupiedNeighbors(row, col int) int {\n\ttotal := 0\n\trFrom := max(0, row-1)\n\trTo := min(row+2, len(s.rows))\n\tcFrom := max(0, col-1)\n\tcTo := min(col+2, len(s.rows[0]))\n\tfor r := rFrom; r < rTo; r++ {\n\t\tfor c := cFrom; c < cTo; c++ {\n\t\t\tif r == row && c == col {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif len(s.rows[r]) == 0 {\n\t\t\t\tfmt.Printf(\"r=%d, c=%d, rows[r]:%v\\n\", r, c, s.rows[r])\n\t\t\t}\n\t\t\tif s.rows[r][c] == '#' {\n\t\t\t\ttotal++\n\t\t\t}\n\t\t}\n\t}\n\treturn total\n}", "title": "" }, { "docid": "afd3be442df93ad750b1e187bbe0ffce", "score": "0.50281495", "text": "func (s *solver) FindSafeMoves() {\n\tfor y := 0; y < s.ySize; y++ {\n\t\tfor x := 0; x < s.xSize; x++ {\n\t\t\tx1, x2, y1, y2 := -1, -1, -1, -1\n\t\t\tif s.cellArray[(s.xSize*y)+x].val == 0 || s.cellArray[(s.xSize*y)+x].val == 9 {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\t/* If we have a scenario where we know val - 1 mines, we should be able to\n\t\t\tdetermine the other mines and safe moves based on neighboring hints */\n\t\t\tif s.cellArray[(s.xSize*y)+x].val-s.cellArray[(s.xSize*y)+x].nearbyMines == 1 &&\n\t\t\t\ts.cellArray[(s.xSize*y)+x].covNeighbors-s.cellArray[(s.xSize*y)+x].nearbyMines == 2 {\n\t\t\t\tfor yy := 0; yy <= y+1; yy++ {\n\t\t\t\t\tif !validateCell(yy, s.ySize) {\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tfor xx := 0; xx <= x+1; xx++ {\n\t\t\t\t\t\tif !validateCells(s.xSize, x, xx, y, yy) {\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t} else if s.cellArray[(s.xSize*yy)+xx].val == 9 &&\n\t\t\t\t\t\t\ts.cellArray[(s.xSize*yy)+xx].isMine == -1 {\n\t\t\t\t\t\t\tif x1 == -1 {\n\t\t\t\t\t\t\t\tx1, y1 = xx, yy\n\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\tx2, y2 = xx, yy\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\tif x1 == -1 || x2 == -1 {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\t// Look below and above cell\n\t\t\t\tif x1 == x2 {\n\t\t\t\t\tif y-1 >= 0 && y-1 < s.ySize {\n\t\t\t\t\t\ts.DeduceMines(y-1, x, y1, x1, y2, x2)\n\t\t\t\t\t}\n\t\t\t\t\tif y+1 >= 0 && y+1 < s.ySize {\n\t\t\t\t\t\ts.DeduceMines(y+1, x, y1, x1, y2, x2)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\t// Look left and right of cell\n\t\t\t\tif y1 == y2 {\n\t\t\t\t\tif x-1 >= 0 && x-1 < s.xSize {\n\t\t\t\t\t\ts.DeduceMines(y, x-1, y1, x1, y2, x2)\n\t\t\t\t\t}\n\t\t\t\t\tif x+1 >= 0 && x+1 < s.xSize {\n\t\t\t\t\t\ts.DeduceMines(y, x+1, y1, x1, y2, x2)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "836ef50346a80df704d94a9889d15695", "score": "0.5022995", "text": "func findBoundary(scan [][]byte, p Point, dir int) (bool, int) {\n\tvar i int\n\tbounded := false\n\tfor i = p.X; i >= 0 && i < len(scan[p.Y]); i += dir {\n\t\t// If we've reached the left side, stop here.\n\t\tif scan[p.Y][i] == Clay {\n\t\t\tbounded = true\n\t\t\ti -= dir\n\t\t\tbreak\n\t\t}\n\n\t\t// If we've fallen off an edge and we don't have water or clay below us, stop.\n\t\tif scan[p.Y+1][i] != Water && scan[p.Y+1][i] != Clay {\n\t\t\tbreak\n\t\t}\n\t}\n\n\treturn bounded, i\n}", "title": "" }, { "docid": "31eaec7d6839dcddf9b06baa23783a41", "score": "0.5016712", "text": "func slidingPuzzle(board [][]int) int {\n \n}", "title": "" }, { "docid": "ca1ae6b9922a75a471ed5fe1b1a72493", "score": "0.5003248", "text": "func Calculate(x, y float64, limit int) int {\n\ti := 0\n\tfor a, b := x, y; a*a+b*b < 4.0; a, b = a*a-b*b+x, 2*a*b+y {\n\t\tif i > limit {\n\t\t\treturn -1\n\t\t}\n\t\ti++\n\t}\n\n\treturn i\n}", "title": "" }, { "docid": "942246515739e381f0b366fbee99e35f", "score": "0.49912226", "text": "func (g *Grid) emptySpot(x int, y int) (retX int, retY int) {\n count := 0\n\n for (count < GRID_WIDTH*GRID_HEIGHT) {\n \n if (x >= GRID_WIDTH) {\n x = 0\n y += 1\n } else if(y >= GRID_HEIGHT) {\n y = 0\n x = int(math.Mod(float64(x + 1), GRID_WIDTH))\n } else {\n if ((g.trollCells[x][y] == 0 && g.funCells[x][y] == 0)) {\n return x, y\n }\n x += 1\n count += 1\n }\n }\n panic(\"No more empty spots on grid\")\n}", "title": "" }, { "docid": "815473a3e030bb2c309d8051df35341d", "score": "0.49906895", "text": "func (sm seatingMap) countAdjacentSeatsTaken(c coordinate) int {\n // Listing of all adjacent points\n toCheck := []coordinate{\n {x: c.x-1, y: c.y-1},\n {x: c.x, y: c.y-1},\n {x: c.x+1, y: c.y-1},\n {x: c.x-1, y: c.y},\n {x: c.x+1, y: c.y},\n {x: c.x-1, y: c.y+1},\n {x: c.x, y: c.y+1},\n {x: c.x+1, y: c.y+1},\n }\n\n takenSeatCount := 0\n for _, position := range toCheck {\n // It doesn't matter if there is nothing on given coordinates (over the plan edge)\n if obj, ok := sm.objects[position]; ok && obj.isTakenSeat() {\n takenSeatCount++\n }\n }\n\n return takenSeatCount\n}", "title": "" }, { "docid": "7f37a251803c632cdead2c589fbe6315", "score": "0.49896577", "text": "func search(grid [][]byte, rows, columns, y, x int) {\n\tif grid[y][x] == water {\n\t\treturn\n\t}\n\n\tgrid[y][x] = water\n\n\t// can I move up?\n\tif y != 0 {\n\t\tsearch(grid, rows, columns, y-1, x)\n\t}\n\n\t// can I move down?\n\tif y != rows-1 {\n\t\tsearch(grid, rows, columns, y+1, x)\n\t}\n\n\t// can I move to the left?\n\tif x > 0 {\n\t\tsearch(grid, rows, columns, y, x-1)\n\t}\n\n\t// can I move to the right?\n\tif x < columns-1 {\n\t\tsearch(grid, rows, columns, y, x+1)\n\t}\n}", "title": "" }, { "docid": "f2e39a8210132aadeea04426df060132", "score": "0.49817994", "text": "func nextClue(k *Puzzle, x int, y int) (int, int) {\n\tsize := k.Size()\n\tfor {\n\t\tx++\n\t\tif x == size {\n\t\t\tx = 0\n\t\t\ty++\n\t\t\tif y == size {\n\t\t\t\treturn x, y\n\t\t\t}\n\t\t}\n\t\tif !cageCorner(k, x, y) {\n\t\t\tcontinue\n\t\t}\n\t\tif y == 0 || x == size-1 || k.Vertical[y][x] {\n\t\t\tdebug(\"yes\\n\")\n\t\t\treturn x, y\n\t\t}\n\t\tif !cageTop(k, x, y) {\n\t\t\tcontinue\n\t\t}\n\t\tdebug(\"yes\\n\")\n\t\treturn x, y\n\t}\n}", "title": "" }, { "docid": "a834f770e066383dc9abe5643e1cc822", "score": "0.49545524", "text": "func neighborCount(s [][]byte, row int, col int) int {\n\n\t// if not a validseat put it in max seat map slot\n\tif s[row][col] != '.' {\n\t\treturn 7\n\t}\n\n\tmaxRow := len(s) - 1\n\tmaxCol := len(s[0]) - 1\n\tn := 0\n\n\tif col < maxCol && s[row][col+1] == '.' { // neighbor to right\n\t\tn++\n\t}\n\tif col < maxCol && row > 0 &&\n\t\ts[row-1][col+1] == '.' { // neighbor to upper right\n\t\tn++\n\t}\n\tif col < maxCol && row < maxRow &&\n\t\ts[row+1][col+1] == '.' { // neighbor to lower right\n\t\tn++\n\t}\n\tif col > 0 && row > 0 &&\n\t\ts[row-1][col-1] == '.' { // neighbor to the upper left\n\t\tn++\n\t}\n\tif col > 0 && s[row][col-1] == '.' { // neighbor to the left\n\t\tn++\n\t}\n\n\tif col > 0 && row < maxRow &&\n\t\ts[row+1][col-1] == '.' { // neighbor to the lower left\n\t\tn++\n\t}\n\n\treturn n\n}", "title": "" }, { "docid": "8c1e3f247709c466e56230b9d19ccae6", "score": "0.4954499", "text": "func distance(x, y int) int {\n\tcount := 0\n\tfor x != 0 || y != 0 {\n\t\tif x == 0 {\n\t\t\t// Just move in the y direction.\n\t\t\tif y > 0 {\n\t\t\t\ty -= 2\n\t\t\t} else {\n\t\t\t\ty += 2\n\t\t\t}\n\t\t} else {\n\t\t\t// Some of both.\n\t\t\tif x > 0 {\n\t\t\t\tx--\n\t\t\t} else {\n\t\t\t\tx++\n\t\t\t}\n\t\t\tif y > 0 {\n\t\t\t\ty--\n\t\t\t} else {\n\t\t\t\ty++\n\t\t\t}\n\t\t}\n\t\tcount++\n\t}\n\treturn count\n}", "title": "" }, { "docid": "d57284e3b8b0473b51442cc7a25d2707", "score": "0.49354193", "text": "func flowWater(scan [][]byte) int {\n\tcount := 0\n\n\t// Water flows down. We don't flow past the bottom row. For each row, we'll\n\t// look at the contents of the cell below it and decide what to do.\n\tfor y := 0; y < len(scan)-1; y++ {\n\t\tfor x := 0; x < len(scan[y]); x++ {\n\t\t\tif scan[y][x] == Spring || scan[y][x] == Trace {\n\t\t\t\tcount += flowDown(scan, Point{X: x, Y: y})\n\t\t\t}\n\t\t\tif scan[y][x] == Trace {\n\t\t\t\tcount += flowAcross(scan, Point{X: x, Y: y})\n\t\t\t}\n\t\t}\n\t}\n\n\treturn count\n}", "title": "" }, { "docid": "9bdabc3a3dc4559db589e0c76648427a", "score": "0.4927905", "text": "func ReplicatorAt(b *Board, pt image.Point) {\n\tb.cells[image.Pt(pt.X+2, pt.Y)] = true\n\tb.cells[image.Pt(pt.X+3, pt.Y)] = true\n\tb.cells[image.Pt(pt.X+4, pt.Y)] = true\n\n\tb.cells[image.Pt(pt.X+1, pt.Y+1)] = true\n\tb.cells[image.Pt(pt.X+4, pt.Y+1)] = true\n\n\tb.cells[image.Pt(pt.X, pt.Y+2)] = true\n\tb.cells[image.Pt(pt.X+4, pt.Y+2)] = true\n\n\tb.cells[image.Pt(pt.X, pt.Y+3)] = true\n\tb.cells[image.Pt(pt.X+3, pt.Y+3)] = true\n\n\tb.cells[image.Pt(pt.X, pt.Y+4)] = true\n\tb.cells[image.Pt(pt.X+1, pt.Y+4)] = true\n\tb.cells[image.Pt(pt.X+2, pt.Y+4)] = true\n}", "title": "" }, { "docid": "3f6388eea0f14d0f76296f727b7a690d", "score": "0.4913736", "text": "func (g *Game) countFlags(x, y uint16) (total uint8) {\n\tvar h, w int\n\th = int(g.height)\n\tw = int(g.width)\n\ttiles := g.history[len(g.history)-1].tiles\n\tfor j := -1; j < 2; j++ {\n\t\tfor i := -1; i < 2; i++ {\n\t\t\t// skip 0,0\n\t\t\tif 0 == i && 0 == j {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\t// get new x,y coords\n\t\t\ty2 := int(y) + j\n\t\t\tx2 := int(x) + i\n\t\t\t// skip out of bounds coords\n\t\t\tif 0 > x2 || 0 > y2 || x2 >= w || y2 >= h {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif tiles[w*y2+x2].flagged {\n\t\t\t\ttotal++\n\t\t\t}\n\t\t}\n\t}\n\treturn total\n}", "title": "" }, { "docid": "d4215254d1dc708b2b39acdab80d9ffd", "score": "0.4902802", "text": "func (m *Map) countWallsNStepsAway(n int, x int, y int) int {\n\twallCount := 0\n\n\tfor r := -n; r <= n; r++ {\n\t\tfor c := -n; c <= n; c++ {\n\t\t\tif x+r >= m.Width || x+r <= 0 || y+c >= m.Height || y+c <= 0 {\n\t\t\t\t// Check if the current coordinates would be off the map. Off map coordinates count as a wall.\n\t\t\t\twallCount++\n\t\t\t} else if m.Tiles[x+r][y+c].Blocked && m.Tiles[x+r][y+c].BlockSight {\n\t\t\t\twallCount++\n\t\t\t}\n\t\t}\n\t}\n\n\treturn wallCount\n}", "title": "" }, { "docid": "ac9aa935e9d857e9d99e5a211776acff", "score": "0.490196", "text": "func calculateNeighbours(p Params, x, y int, world [][]byte) int {\n\tneighbours := 0\n\tfor i := -1; i <= 1; i++ {\n\t\tfor j := -1; j <= 1; j++ {\n\t\t\tif i != 0 || j != 0 {\n\t\t\t\tif world[mod(y+i, p.ImageHeight)][mod(x+j, p.ImageWidth)] == alive {\n\t\t\t\t\tneighbours++\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn neighbours\n}", "title": "" }, { "docid": "c2e83b175bc5689ed5beb8ee8f194a66", "score": "0.48888758", "text": "func minMaxShipsInRow(board *Board, coord Coord) (int, int) {\n var ships, unsolveds = 0, 0\n for column := 0; column < board.NumberOfColumns(); column++ {\n square := board.SquareAt(coord.WithColumn(column))\n switch {\n case square.IsShip():\n ships++\n case square.IsUnsolved():\n unsolveds++\n }\n }\n return ships, ships + unsolveds\n}", "title": "" }, { "docid": "60e6364581f579b43fb8703f14c38611", "score": "0.48756993", "text": "func explodeTile(y, x, w int, t *[]Tile) {\n\n\tif t == nil {\n\t\tDebugLog(&G, fmt.Sprintf(\"explodeTile() --> invalid input\"))\n\t\treturn\n\t}\n\n\t// Grab the tile currently in that location.\n\toriginalTile := (*t)[x+y*w]\n\n\tfor it := 0; it < 5; it++ {\n\n\t\t// Randomly generate some small integers.\n\t\try := rand.Intn(2)\n\t\trx := rand.Intn(2)\n\n\t\t// If heads then go back 1 for y-coord.\n\t\tif TossCoin() {\n\t\t\try *= -1\n\t\t}\n\n\t\t// If heads then go back 1 for x-coord.\n\t\tif TossCoin() {\n\t\t\trx *= -1\n\t\t}\n\n\t\t// If anything happens (e.g. a panic) then go ahead and just\n\t\t// decrement the real x,y values.\n\t\tdefer func() {\n\t\t\tif r := recover(); r != nil {\n\t\t\t\try = ry * -1\n\t\t\t\trx = rx * -1\n\t\t\t}\n\t\t}()\n\n\t\t// If outside of the map borders, revert back to the original tile.\n\t\tif !mapBorders(y+ry, x+rx) || !mapBorders(y, x) {\n\t\t\t(*t)[(x+rx)+(y+ry)*w] = originalTile\n\t\t}\n\n\t\t// Adjust the coords accordingly.\n\t\ty = y + ry\n\t\tx = x + rx\n\t}\n}", "title": "" }, { "docid": "3b3949c82ae441e739ee1d1c0a68fc3f", "score": "0.48728678", "text": "func easterFlank(x1, y, x2 int, baseShift Point) (int, int, int, Point) {\n\n\tif y < 0 {\n\t\tbaseShift.x += x1 // move base to start the right flank\n\t\tx1, x2 = x2, x1\n\t}\n\treturn x1, y, x2, baseShift\n}", "title": "" }, { "docid": "471893eaaf0667549142032c7f381ae7", "score": "0.48687884", "text": "func adjacentWalls(y, x, w int, t []Tile) int {\n\n\tif t == nil {\n\t\tDebugLog(&G, fmt.Sprintf(\"adjacentWalls() --> invalid input\"))\n\t\treturn 0\n\t}\n\n\tcounter := 0\n\n\t// Nearby wall layer? Add 2 then.\n\tif t[x+y*w].BlockMove {\n\t\tcounter += 2\n\t}\n\n\t// Adjacent blocking tile in a given direction? Then increment 1...\n\tif t[(x+1)+(y+1)*w].BlockMove {\n\t\tcounter++\n\t}\n\tif t[(x-1)+(y-1)*w].BlockMove {\n\t\tcounter++\n\t}\n\tif t[(x+1)+(y-1)*w].BlockMove {\n\t\tcounter++\n\t}\n\tif t[x+(y+1)*w].BlockMove {\n\t\tcounter++\n\t}\n\tif t[x+(y-1)*w].BlockMove {\n\t\tcounter++\n\t}\n\tif t[(x+1)+y*w].BlockMove {\n\t\tcounter++\n\t}\n\tif t[(x-1)+y*w].BlockMove {\n\t\tcounter++\n\t}\n\n\treturn counter\n}", "title": "" }, { "docid": "ccbd99f12ec7fdf06302f6ae06b875af", "score": "0.48676836", "text": "func (S *Board) Topple(r, c int) {\n\tfor S.board[r][c] >= 4 {\n\t\t// move 1 coin from (r, c) to each of the 4 neighbors of \n\t\t// (r, c) (diagonal neighbors don’t count, only north, south, \n\t\t// east, and west)\n\t\tif S.Contains (r-1, c) {\n\t\t\tS.board[r-1][c] += 1\n\t\t\tS.board[r][c] -= 1 \n\t\t// for the boundary cases, throw the coin out of the checkboard\n\t\t} else if !S.Contains (r-1, c) {\n\t\t\tS.board[r][c]--\n\t\t}\n\t\tif S.Contains (r+1, c) {\n\t\t\tS.board[r+1][c]++\n\t\t\tS.board[r][c]--\n\t\t// for the boundary cases, throw the coin out of the checkboard\n\t\t} else if !S.Contains (r+1, c) {\n\t\t\tS.board[r][c]--\n\t\t}\n\t\tif S.Contains (r, c-1) {\n\t\t\tS.board[r][c-1]++\n\t\t\tS.board[r][c]--\n\t\t// for the boundary cases, throw the coin out of the checkboard\n\t\t} else if !S.Contains (r, c-1) {\n\t\t\tS.board[r][c]--\n\t\t}\n\t\tif S.Contains (r, c+1) {\n\t\t\tS.board[r][c+1]++\n\t\t\tS.board[r][c]--\n\t\t// for the boundary cases, throw the coin out of the checkboard\n\t\t} else if !S.Contains (r, c+1) {\n\t\t\tS.board[r][c]--\n\t\t}\n\t}\n}", "title": "" }, { "docid": "279a3a34fd736ff6b89f1ca624ad2bef", "score": "0.48645732", "text": "func (g *Grid) emptySpot(x int, y int) (retX int, retY int) {\n count := 0\n\n for (g.trollCells[x][y] !=0 || g.funCells[x][y] != 0) {\n if (count > (GRID_WIDTH*GRID_HEIGHT)) {\n panic(\"No more empty spots on grid\")\n }\n count += 1\n\n x += 1\n if (x >= GRID_WIDTH) {\n x = 0\n y += 1\n }\n if (y >= GRID_HEIGHT) {\n y = 0\n x = int(math.Mod(float64(x + 1), GRID_WIDTH))\n }\n }\n return x, y\n}", "title": "" }, { "docid": "d54eeb4c3b4b1a329e13942ee645e190", "score": "0.48642784", "text": "func (b *ttt_board) markX(loc_x, loc_y int) {\n\tif loc_x < b.size && loc_y < b.size && b.board[loc_x][loc_y] == 0 {\n\t\tb.board[loc_x][loc_y] = 1\n\t\tb.lastX = loc_x\n\t\tb.lastY = loc_y\n\t\tb.xcount++\n\t}\n}", "title": "" }, { "docid": "3ce7812e9d302b762439c86ae29b411d", "score": "0.48543257", "text": "func countNeighbors(grid [][]int, x, y int) int {\n\n\trows := len(grid)\n\tcols := len(grid[0])\n\n\tvar sum int\n\n\tfor i := -1; i < 2; i++ {\n\n\t\tfor j := -1; j < 2; j++ {\n\n\t\t\trow := (x + i + rows) % rows\n\t\t\tcol := (y + j + cols) % cols\n\t\t\tsum += grid[row][col]\n\t\t}\n\t}\n\n\t// dont count yourself (sum - me)\n\treturn (sum - grid[x][y])\n}", "title": "" }, { "docid": "90b597ed7f707bd676ead81988304b9f", "score": "0.48527315", "text": "func candy(ratings []int) int {\n\tres := 1 // first is skipped, keep it initially\n\n\tsumUp := 0\n\tups := 0\n\tsumDown := 0\n\tdowns := 0\n\n\tprevDir := 0\n\tcurrDir := 0\n\tfor i := 1; i < len(ratings); i++ {\n\t\tcurrDir = ratings[i] - ratings[i-1]\n\n\t\tif currDir == 0 || (currDir > 0 && prevDir < 0) {\n\t\t\t// flat surface or valley, handle previously accumulated sums\n\t\t\tres += sumUp + sumDown\n\n\t\t\t// whichever side count is larger - contributes to total sum\n\t\t\t// this excludes calculating peaks twice and moving peaks only to the longest side\n\t\t\tif ups > downs {\n\t\t\t\tres += ups\n\t\t\t} else {\n\t\t\t\tres += downs\n\t\t\t}\n\t\t\tups = 0\n\t\t\tsumUp = 0\n\t\t\tdowns = 0\n\t\t\tsumDown = 0\n\t\t}\n\n\t\tif currDir > 0 {\n\t\t\t// increasing\n\t\t\tups++\n\t\t\tsumUp += ups\n\t\t} else if currDir < 0 {\n\t\t\t// decreasing\n\t\t\tdowns++\n\t\t\tsumDown += downs\n\t\t} else {\n\t\t\t// flat\n\t\t\tres++\n\t\t}\n\t\tprevDir = currDir\n\t}\n\t// take into account sums accumulated to the end\n\tres += sumUp + sumDown\n\tif ups > downs {\n\t\tres += ups\n\t} else {\n\t\tres += downs\n\t}\n\n\treturn res\n}", "title": "" }, { "docid": "3964e1fd713d48d6c04480fc69832861", "score": "0.48500937", "text": "func ReplXY(min, max, x int) int {\n\tsx := (x - min) % (max - min)\n\tif sx < 0 {\n\t\tsx += max - min\n\t}\n\treturn sx + min\n}", "title": "" }, { "docid": "481b80d23f331c93f46fa5034a96bf6a", "score": "0.4847792", "text": "func steps(maze [][]rune, portals map[Point]Portal, start, end Point, recurse bool) int {\n\tqueue := make(chan State, 10000)\n\tseen := map[Seen]bool{Seen{start, 0}: true}\n\tqueue <- State{start, 0, 0}\nloop:\n\tfor {\n\t\tselect {\n\t\tcase s := <-queue:\n\t\t\tif s.Point == end && s.Level == 0 {\n\t\t\t\treturn s.Distance\n\t\t\t}\n\t\t\tif p := (Point{s.Point.X - 1, s.Point.Y}); p.X >= 0 && !seen[Seen{p, s.Level}] && maze[p.Y][p.X] == '.' || maze[p.Y][p.X] == portal {\n\t\t\t\tqueue <- State{Point: p, Distance: s.Distance + 1, Level: s.Level}\n\t\t\t\tseen[Seen{p, s.Level}] = true\n\t\t\t}\n\t\t\tif p := (Point{s.Point.X + 1, s.Point.Y}); p.X < len(maze[0]) && !seen[Seen{p, s.Level}] && maze[p.Y][p.X] == '.' || maze[p.Y][p.X] == portal {\n\t\t\t\tqueue <- State{Point: p, Distance: s.Distance + 1, Level: s.Level}\n\t\t\t\tseen[Seen{p, s.Level}] = true\n\t\t\t}\n\t\t\tif p := (Point{s.Point.X, s.Point.Y - 1}); p.Y >= 0 && !seen[Seen{p, s.Level}] && maze[p.Y][p.X] == '.' || maze[p.Y][p.X] == portal {\n\t\t\t\tqueue <- State{Point: p, Distance: s.Distance + 1, Level: s.Level}\n\t\t\t\tseen[Seen{p, s.Level}] = true\n\t\t\t}\n\t\t\tif p := (Point{s.Point.X, s.Point.Y + 1}); p.Y < len(maze) && !seen[Seen{p, s.Level}] && maze[p.Y][p.X] == '.' || maze[p.Y][p.X] == portal {\n\t\t\t\tqueue <- State{Point: p, Distance: s.Distance + 1, Level: s.Level}\n\t\t\t\tseen[Seen{p, s.Level}] = true\n\t\t\t}\n\t\t\tif s.Point != start && s.Point != end && maze[s.Point.Y][s.Point.X] == portal {\n\t\t\t\tportal := portals[s.Point]\n\t\t\t\tvar nextLevel int\n\t\t\t\tif !recurse {\n\t\t\t\t\tnextLevel = s.Level\n\t\t\t\t} else if portal.Inner {\n\t\t\t\t\tnextLevel = s.Level + 1\n\t\t\t\t} else {\n\t\t\t\t\tnextLevel = s.Level - 1\n\t\t\t\t}\n\t\t\t\tif (!recurse || portal.Inner || s.Level > 0) && !seen[Seen{portal.Point, nextLevel}] {\n\t\t\t\t\tqueue <- State{Point: portal.Point, Distance: s.Distance + 1, Level: nextLevel}\n\t\t\t\t\tseen[Seen{portal.Point, nextLevel}] = true\n\t\t\t\t}\n\n\t\t\t}\n\t\tdefault:\n\t\t\tbreak loop\n\t\t}\n\t}\n\n\treturn 0\n}", "title": "" }, { "docid": "8e7ac23e3d242a058b57a5a7c7299aa5", "score": "0.48373565", "text": "func main() {\n\tvar N, a, b int\n\tfmt.Scanf(\"%d%d%d\", &N, &a, &b)\n\ta--\n\tb--\n\t//points = make(map[int]bool, N)\n\txs := make([]int, N)\n\tys := make([]int, N)\n\t// dis -> xs\n\tdises0 := make(map[int][]int, N)\n\t// dis -> xs -> index\n\tindexesByDis0 := make(map[int]map[int]int, N)\n\t// whether is sorted\n\tflags0 := make(map[int]bool, N)\n\t// dis = x -y -> xs\n\tdises2 := make(map[int][]int, N)\n\tindexesByDis2 := make(map[int]map[int]int, N)\n\tflags2 := make(map[int]bool, N)\n\tfor i := 0; i < N; i++ {\n\t\tfmt.Scanf(\"%d%d\", &xs[i], &ys[i])\n\t\tdis := xs[i] + ys[i]\n\t\tif dises0[dis] == nil {\n\t\t\tdises0[dis] = make([]int, 0)\n\t\t\tindexesByDis0[dis] = make(map[int]int)\n\t\t}\n\t\tdises0[dis] = append(dises0[dis], xs[i])\n\t\tindexesByDis0[dis][xs[i]] = i\n\n\t\tdis = xs[i] - ys[i]\n\t\tif dises2[dis] == nil {\n\t\t\tdises2[dis] = make([]int, 0)\n\t\t\tindexesByDis2[dis] = make(map[int]int)\n\t\t}\n\t\tdises2[dis] = append(dises2[dis], xs[i])\n\t\tindexesByDis2[dis][xs[i]] = i\n\t}\n\n\tpace := abs(xs[a]-xs[b]) + abs(ys[a]-ys[b])\n\tcheckedPoints := make(map[int]bool)\n\tOut := 0\n\n\tvar cal func(cur, xFrom int)\n\tcal = func(cur, xFrom int) {\n\t\t//fmt.Println(\"found\", cur+1, \"from\", xFrom+1)\n\t\tif checkedPoints[cur] {\n\t\t\treturn\n\t\t}\n\t\tcheckedPoints[cur] = true\n\t\tdist := xs[cur] + ys[cur] - pace\n\t\tif len(dises0[dist]) > 0 {\n\t\t\tif !flags0[dist] {\n\t\t\t\tsort.Ints(dises0[dist])\n\t\t\t\tflags0[dist] = true\n\t\t\t}\n\t\t\tstart := sort.SearchInts(dises0[dist], xs[cur]-pace)\n\t\t\t//fmt.Println(\"1 Looking in\", dises0[dist], start)\n\t\t\tif start < len(dises0[dist]) && dises0[dist][start] == xs[cur]-pace {\n\t\t\t\tstart++\n\t\t\t}\n\t\t\tfor i := start; i < len(dises0[dist]) && dises0[dist][i] < xs[cur]; i++ {\n\t\t\t\tOut++\n\t\t\t\tcal(indexesByDis0[dist][dises0[dist][i]], cur)\n\t\t\t}\n\t\t}\n\n\t\tdist = xs[cur] + ys[cur] + pace\n\t\tif len(dises0[dist]) > 0 {\n\t\t\tif !flags0[dist] {\n\t\t\t\tsort.Ints(dises0[dist])\n\t\t\t\tflags0[dist] = true\n\t\t\t}\n\t\t\tstart := sort.SearchInts(dises0[dist], xs[cur])\n\t\t\t//fmt.Println(\"2 Looking in\", dises0[dist], start)\n\t\t\tif start < len(dises0[dist]) && dises0[dist][start] == xs[cur] {\n\t\t\t\tstart++\n\t\t\t}\n\t\t\tfor i := start; i < len(dises0[dist]) && dises0[dist][i] < xs[cur]+pace; i++ {\n\t\t\t\tOut++\n\t\t\t\tcal(indexesByDis0[dist][dises0[dist][i]], cur)\n\t\t\t}\n\t\t}\n\n\t\tdist = xs[cur] - ys[cur] - pace\n\t\tif len(dises2[dist]) > 0 {\n\t\t\tif !flags2[dist] {\n\t\t\t\tsort.Ints(dises2[dist])\n\t\t\t\tflags2[dist] = true\n\t\t\t}\n\t\t\tstart := sort.SearchInts(dises2[dist], xs[cur]-pace)\n\t\t\t//fmt.Println(\"3 Looking in\", dises2[dist], start)\n\t\t\tfor i := start; i < len(dises2[dist]) && dises2[dist][i] <= xs[cur]; i++ {\n\t\t\t\tOut++\n\t\t\t\tcal(indexesByDis2[dist][dises2[dist][i]], cur)\n\t\t\t}\n\t\t}\n\n\t\tdist = xs[cur] - ys[cur] + pace\n\t\tif len(dises2[dist]) > 0 {\n\t\t\tif !flags2[dist] {\n\t\t\t\tsort.Ints(dises2[dist])\n\t\t\t\tflags2[dist] = true\n\t\t\t}\n\t\t\tstart := sort.SearchInts(dises2[dist], xs[cur])\n\t\t\t//fmt.Println(\"4 Looking in\", dises2[dist], start)\n\t\t\tfor i := start; i < len(dises2[dist]) && dises2[dist][i] <= xs[cur]+pace; i++ {\n\t\t\t\tOut++\n\t\t\t\tcal(indexesByDis2[dist][dises2[dist][i]], cur)\n\t\t\t}\n\t\t}\n\t}\n\n\tcal(a, -2)\n\t//cal(b, 0)\n\n\tfmt.Println(Out / 2)\n}", "title": "" }, { "docid": "0f527b8c3633fdb89d500076329d850b", "score": "0.4836218", "text": "func (w *board) transfer(pth []cell) {\r\n\t//oCost := w.getCost() // Original cost\r\n\ttour := pth\r\n\tsmallestqnty := 1000\r\n\tfmt.Println(\"error here\")\r\n\tfor j := 0; j < len(tour); j++ {\r\n\t\tif (w.matrix[tour[j].row][tour[j].column].quantity > 0) && (w.matrix[tour[j].row][tour[j].column].quantity < smallestqnty) {\r\n\t\t\tsmallestqnty = w.matrix[tour[j].row][tour[j].column].quantity\r\n\t\t}\r\n\t}\r\n\tfor z := 0; z < smallestqnty; z++ {\r\n\t\tfor i := 0; i < len(tour); i++ {\r\n\t\t\tif i%2 == 0 {\r\n\t\t\t\tw.matrix[tour[i].row][tour[i].column].quantity++\r\n\t\t\t} else {\r\n\t\t\t\tw.matrix[tour[i].row][tour[i].column].quantity--\r\n\t\t\t}\r\n\t\t}\r\n\t}\r\n}", "title": "" }, { "docid": "ebfd5d22fc545ef813f3c880c5d61256", "score": "0.4830959", "text": "func (w *World) stepCell(x, y int) bool {\n\toldCell := w.findCell(x, y)\n\tnewCell := oldCell\n\tnumAlive := 0\n\n\t// Loop through neighbors, counting the living ones.\n\tfor i := (x - 1); i <= (x + 1); i++ {\n\t\tfor j := (y - 1); j <= (y + 1); j++ {\n\t\t\t// Skip the center cell.\n\t\t\tif (i == x) && (j == y) {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\talive := w.findCell(i, j)\n\t\t\t// Count living neighbors.\n\t\t\tif alive {\n\t\t\t\tnumAlive++\n\t\t\t}\n\t\t}\n\t}\n\n\t//if oldCell {\n\t//log.Printf(\"Cell %d,%d (%d neighbors)\\n\", x, y, numAlive)\n\t//}\n\n\t// Enforce the game rules.\n\tif oldCell && (numAlive < 2 || numAlive > 3) {\n\t\tnewCell = false\n\t} else if !oldCell && numAlive == 3 {\n\t\tnewCell = true\n\t}\n\n\treturn newCell\n}", "title": "" }, { "docid": "5d10e69b9b30edff463c2aa84d8aeb2d", "score": "0.48303282", "text": "func (b *ttt_board) markY(loc_x, loc_y int) {\n\tif loc_x < b.size && loc_y < b.size && b.board[loc_x][loc_y] == 0 {\n\t\tb.board[loc_x][loc_y] = 2\n\t\tb.lastX = loc_x\n\t\tb.lastY = loc_y\n\t\tb.ycount++\n\t}\n}", "title": "" }, { "docid": "e425cfd4fd8a99369934b126954a7eea", "score": "0.48192233", "text": "func burst(c int) (infections int) {\n\tfor i := 0; i < c; i++ {\n\t\tviruspos := fmt.Sprintf(\"%v %v\", virus.x, virus.y)\n\n\t\t// turn and infect or clean\n\t\tswitch grid[viruspos] {\n\t\tcase 0:\n\t\t\tvirus.facing += 3\n\n\t\t\tgrid[viruspos] = 'W'\n\t\tcase '#':\n\t\t\tvirus.facing += 1\n\n\t\t\tgrid[viruspos] = 'F'\n\t\tcase 'W':\n\t\t\tvirus.facing += 0\n\n\t\t\tgrid[viruspos] = '#'\n\t\t\tinfections++\n\t\tcase 'F':\n\t\t\tvirus.facing += 2\n\n\t\t\tdelete(grid, viruspos)\n\t\t}\n\t\tvirus.facing %= 4\n\n\t\t// move\n\t\tswitch virus.facing {\n\t\tcase 0:\n\t\t\tvirus.x--\n\t\tcase 1:\n\t\t\tvirus.y++\n\t\tcase 2:\n\t\t\tvirus.x++\n\t\tcase 3:\n\t\t\tvirus.y--\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "155e4232b0354fe12197e712c81b4dc1", "score": "0.48166636", "text": "func (g *Grid) CountAliveNeighbors(x, y int) int {\n count := 0\n for i := -1; i <= 1; i++ {\n for j := -1; j <= 1; j++ {\n // ignore (x,y) in this count, checks if is Inbound and if is alive\n if !(i == 0 && j == 0) && g.IsInbound(x + i, y + j) && g.GetCell(x + i, y + j).Alive {\n count++;\n }\n }\n }\n return count\n}", "title": "" }, { "docid": "f88e7fb4dcfbdf24469631147079ed85", "score": "0.48131254", "text": "func findWay(c []int64, remain int64, index int, cache [][]int64) int64 {\n\tif remain == 0 {\n\t\treturn 1\n\t}\n\n\tif index == 0 {\n\t\tif remain%c[0] == 0 {\n\t\t\treturn 1\n\t\t} else {\n\t\t\treturn 0\n\t\t}\n\t}\n\n\tif cache[remain][index] >= 0 {\n\t\treturn cache[remain][index]\n\t}\n\n\tresult := int64(0)\n\n\tfor i := int64(0); (i * c[index]) <= remain; i++ {\n\t\tresult += findWay(c, remain-i*c[index], index-1, cache)\n\t}\n\n\tcache[remain][index] = result\n\n\treturn result\n}", "title": "" }, { "docid": "a16558696f5d601f32950bc9c5fe0235", "score": "0.48103204", "text": "func numIslandsOld(grid [][]byte) int {\n\trow := len(grid)\n\tif row == 0 {\n\t\treturn 0\n\t}\n\n\tcol, count, si := len(grid[0]), 0, 0\n\tstore := make([]*cell, row*col)\n\n\tfor i := 0; i < row; i++ {\n\t\tfor j := 0; j < col; j++ {\n\t\t\tif grid[i][j] == '1' {\n\t\t\t\tgrid[i][j], store[0], count, si = '0', newCell(i, j), count+1, 1\n\t\t\t\tfor temp := 0; temp < si; temp++ {\n\t\t\t\t\tcur := store[temp]\n\n\t\t\t\t\tif cur.row > 0 && grid[cur.row-1][cur.col] == '1' {\n\t\t\t\t\t\tgrid[cur.row-1][cur.col], store[si], si = '0', newCell(cur.row-1, cur.col), si+1\n\t\t\t\t\t}\n\t\t\t\t\tif cur.col > 0 && grid[cur.row][cur.col-1] == '1' {\n\t\t\t\t\t\tgrid[cur.row][cur.col-1], store[si], si = '0', newCell(cur.row, cur.col-1), si+1\n\t\t\t\t\t}\n\t\t\t\t\tif cur.row+1 < row && grid[cur.row+1][cur.col] == '1' {\n\t\t\t\t\t\tgrid[cur.row+1][cur.col], store[si], si = '0', newCell(cur.row+1, cur.col), si+1\n\t\t\t\t\t}\n\t\t\t\t\tif cur.col+1 < col && grid[cur.row][cur.col+1] == '1' {\n\t\t\t\t\t\tgrid[cur.row][cur.col+1], store[si], si = '0', newCell(cur.row, cur.col+1), si+1\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\treturn count\n}", "title": "" }, { "docid": "13f6bc05dc694d6aa167ba6fc0b142d1", "score": "0.48096737", "text": "func calculateNeighbours(height, width, x, y int, bottom, top []byte, world [][]byte) int {\n\tneighbours := 0\n\tfor i := -1; i <= 1; i++ {\n\t\tfor j := -1; j <= 1; j++ {\n\t\t\tif i != 0 || j != 0 { //not [y][x]\n\t\t\t\tif y == 0 && i == -1 {\n\t\t\t\t\tif bottom[mod(x+j, width)] == alive {\n\t\t\t\t\t\tneighbours++\n\t\t\t\t\t}\n\t\t\t\t} else if y == height-1 && i == 1 {\n\t\t\t\t\tif top[mod(x+j, width)] == alive {\n\t\t\t\t\t\tneighbours++\n\t\t\t\t\t}\n\t\t\t\t} else {\n\t\t\t\t\tif world[mod(y+i, height)][mod(x+j, width)] == alive {\n\t\t\t\t\t\tneighbours++\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn neighbours\n}", "title": "" }, { "docid": "8a3ad805f9a90a4a591ddc8f7ca348dc", "score": "0.48093578", "text": "func flood1(grid [][]int, i, j int) int {\n\thit := 0\n\tq := [][]int{{i, j}}\n\tgrid[i][j] = -1\n\tfor len(q) != 0 {\n\t\thead := q[0]\n\t\tfor _, d := range [][]int{{-1, 0}, {1, 0}, {0, -1}, {0, 1}} {\n\t\t\tnext := []int{head[0] + d[0], head[1] + d[1]}\n\t\t\tif next[0] < 0 || next[0] >= len(grid) ||\n\t\t\t\tnext[1] < 0 || next[1] >= len(grid[0]) ||\n\t\t\t\tgrid[next[0]][next[1]] == -1 {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif grid[next[0]][next[1]] == 1 {\n\t\t\t\thit++\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tgrid[next[0]][next[1]] = -1\n\t\t\tq = append(q, next)\n\t\t}\n\t\tq = q[1:]\n\t}\n\treturn hit\n}", "title": "" }, { "docid": "750dac6fc70c928928b18fe431bd2b39", "score": "0.48019087", "text": "func seen(row []int) int {\n\tm := row[0]\n\tused := make([]bool, 5)\n\tused[m] = true\n\tc := 1\n\tfor i := 1; i < 4; i++ {\n\t\tif used[row[i]] {\n\t\t\treturn 7\n\t\t}\n\t\tused[row[i]] = true\n\t\tif row[i] > m {\n\t\t\tm = row[i]\n\t\t\tc++\n\t\t}\n\t}\n\treturn c\n}", "title": "" }, { "docid": "869c1ccba6fcd9ae707ae6b8b224462e", "score": "0.480071", "text": "func (area waitingArea) countSurroundingOccupied(x, y int) int {\n\tresult := 0\n\tpossible := []struct{ m, n int }{\n\t\t{x - 1, y - 1}, {x, y - 1}, {x + 1, y - 1},\n\t\t{x - 1, y}, {x + 1, y},\n\t\t{x - 1, y + 1}, {x, y + 1}, {x + 1, y + 1},\n\t}\n\tfor _, coord := range possible {\n\t\tif area.at(coord.m, coord.n) == occupied {\n\t\t\tresult++\n\t\t}\n\t}\n\treturn result\n}", "title": "" }, { "docid": "5582735bc8a836d0a702fdca4cb1de8e", "score": "0.4791196", "text": "func (l *Life) Step() {\n\tvar writeBuf []uint8\n\n\tl.Generation++\n\n\tif l.readBuf == 0 {\n\t\twriteBuf = l.data[1]\n\t} else {\n\t\twriteBuf = l.data[0]\n\t}\n\n\t// Loop through all the pixels\n\tfor y := 0; y < l.Height; y++ {\n\t\tfor x := 0; x < l.Width; x++ {\n\n\t\t\t// Compute the wraparound pixels\n\t\t\txm1 := x - 1\n\t\t\tif xm1 < 0 {\n\t\t\t\txm1 = l.Width - 1\n\t\t\t}\n\n\t\t\txp1 := x + 1\n\t\t\tif xp1 >= l.Width {\n\t\t\t\txp1 = 0\n\t\t\t}\n\n\t\t\tym1 := y - 1\n\t\t\tif ym1 < 0 {\n\t\t\t\tym1 = l.Height - 1\n\t\t\t}\n\n\t\t\typ1 := y + 1\n\t\t\tif yp1 >= l.Height {\n\t\t\t\typ1 = 0\n\t\t\t}\n\n\t\t\t// Count neighbors\n\t\t\tnCount := l.readVal(xm1, ym1) +\n\t\t\t\tl.readVal(x, ym1) +\n\t\t\t\tl.readVal(xp1, ym1) +\n\t\t\t\tl.readVal(xm1, y) +\n\t\t\t\tl.readVal(xp1, y) +\n\t\t\t\tl.readVal(xm1, yp1) +\n\t\t\t\tl.readVal(x, yp1) +\n\t\t\t\tl.readVal(xp1, yp1)\n\n\t\t\t// Rules of life and death\n\t\t\tvar newVal uint8\n\n\t\t\tif l.readVal(x, y) == 0 {\n\t\t\t\t// If dead, comes to life if n=3\n\t\t\t\tif nCount == 3 {\n\t\t\t\t\tnewVal = 1\n\t\t\t\t} else {\n\t\t\t\t\tnewVal = 0\n\t\t\t\t}\n\n\t\t\t} else {\n\t\t\t\t// If alive, dies if n<2 or n>3\n\t\t\t\tif nCount < 2 || nCount > 3 {\n\t\t\t\t\tnewVal = 0\n\t\t\t\t} else {\n\t\t\t\t\tnewVal = 1\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t// Write the new value\n\t\t\twriteBuf[y*l.Width+x] = newVal\n\t\t}\n\t}\n\n\t// Pageflip\n\tif l.readBuf == 0 {\n\t\tl.readBuf = 1\n\t} else {\n\t\tl.readBuf = 0\n\t}\n}", "title": "" }, { "docid": "d678d345389a0830c07708efb5ebb3cd", "score": "0.478736", "text": "func FindAdjacentOccupiedSeatCount(currentPos []int, seatingChart []string) int {\n\tpositionsFilled := 0\n\tpositionsToSearch := [][]int{[]int{currentPos[0] - 1, currentPos[1]},\n\t\t[]int{currentPos[0] - 1, currentPos[1] + 1},\n\t\t[]int{currentPos[0] - 1, currentPos[1] - 1},\n\t\t[]int{currentPos[0], currentPos[1] - 1},\n\t\t[]int{currentPos[0], currentPos[1] + 1},\n\t\t[]int{currentPos[0] + 1, currentPos[1]},\n\t\t[]int{currentPos[0] + 1, currentPos[1] + 1},\n\t\t[]int{currentPos[0] + 1, currentPos[1] - 1},\n\t}\n\n\tfor _, pos := range positionsToSearch {\n\t\tif pos[0] < 0 || pos[0] >= len(seatingChart) {\n\t\t\tcontinue\n\t\t}\n\n\t\tif pos[1] < 0 || pos[1] >= len(seatingChart[pos[0]]) {\n\t\t\tcontinue\n\t\t}\n\n\t\tif string(seatingChart[pos[0]][pos[1]]) == \"#\" {\n\t\t\tpositionsFilled++\n\t\t}\n\t}\n\n\treturn positionsFilled\n}", "title": "" }, { "docid": "4a1122e7fe870d04a8e8d8edff4973ab", "score": "0.47807604", "text": "func Generation(grid [][]int, y int, x int) int {\n\ty, x = BorderCells(grid, y, x)\n\tcount := 0\n\tfor i := -1; i <= 1; i++ {\n\t\tfor j := -1; j <= 1; j++ {\n\t\t\tif !(i == 0 && j == 0) {\n\t\t\t\tif grid[y+i][x+j] == 1 {\n\t\t\t\t\tcount++\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\tcell := Rules(count, grid, y, x)\n\treturn cell\n}", "title": "" }, { "docid": "e8f7ea151015ab7bf7462774e069bb70", "score": "0.47790402", "text": "func NeighborsCount(neighborhood [][]int, x, y int) int {\n\n\tvar neighbors = 0\n\n\t//fmt.Printf(\"CELL %d %d \\n\", x, y)\n\n\tfor i := -1; i <= 1; i++ {\n\t\tfor j := -1; j <= 1; j++ {\n\n\t\t\tvar row = x + i\n\t\t\tvar column = y + j\n\n\t\t\t//fmt.Printf(\"Iteration %d %d > row %d column %d \\n\", i, j, row, column)\n\n\t\t\t//fmt.Printf(\"len(neighborhood) = %d \\n\", len(neighborhood))\n\n\t\t\tif row >= 0 && row < len(neighborhood) {\n\n\t\t\t\tif column >= 0 && column < len(neighborhood[row]) {\n\n\t\t\t\t\t//fmt.Printf(\"len(neighborhood[row] = %d \\n\", len(neighborhood))\n\t\t\t\t\t//fmt.Printf(\"row %d column %d > value > %d \\n\", row, column, neighborhood[row][column])\n\n\t\t\t\t\tif x != row || y != column {\n\t\t\t\t\t\tneighbors = neighbors + neighborhood[row][column]\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t}\n\t}\n\n\t//var neighbors0 = neighborhood[x-1][y-1] + neighborhood[x-1][y] + neighborhood[x-1][y+1]\n\t//var neighbors1 = neighborhood[x][y-1] + neighborhood[x][y+1]\n\t//var neighbors2 = neighborhood[x+1][y-1] + neighborhood[x+1][y] + neighborhood[x+1][y+1]\n\n\t//fmt.Printf(\"neighbors count: %d\", neighbors)\n\treturn neighbors\n}", "title": "" }, { "docid": "7ec433a5fef3f4820b261934226e8ce7", "score": "0.4778645", "text": "func main() {\n\tx := 0\n\ty := 0\n\tmaxy := 0\n\tmaxx := 0\n\tcodes[pos{0, 0}] = 20151125\n\tfor i := 1; i < 100000000; i++ {\n\t\tgrid[pos{x, y}] = i\n\t\tlookup[i] = pos{x, y}\n\t\tif !(x == 0 && y == 0) {\n\t\t\tprevious := lookup[i-1]\n\t\t\tpreviousCode := codes[previous]\n\t\t\tnewCode := (previousCode * 252533) % 33554393\n\t\t\tcodes[pos{x, y}] = newCode\n\t\t\tif x == 3029-1 && y == 2947-1 {\n\t\t\t\tfmt.Println(\"Got you!\", newCode)\n\t\t\t\tos.Exit(0)\n\t\t\t}\n\t\t}\n\t\tif y == 0 {\n\t\t\tx = 0\n\t\t\tmaxy++\n\t\t\ty = maxy\n\t\t\tcontinue\n\t\t}\n\t\ty--\n\t\tx++\n\t\tif x > maxx {\n\t\t\tmaxx = x\n\t\t}\n\t}\n}", "title": "" }, { "docid": "f590ff2fd006387b4d6401c70075ce6e", "score": "0.4773393", "text": "func gameOfLifeTurn(matrix []byte, rows int, width int, offset int) []byte {\n\tmHeight := len(matrix) / width\n\tresult := make([]byte, rows*width)\n\tfor y := 0; y < rows; y++ {\n\t\trealY := y + offset\n\t\tfor x := 0; x < width; x++ {\n\n\t\t\tresult[(y*width)+x] = matrix[(realY*width)+x]\n\n\t\t\tvar neighboursAlive = 0\n\t\t\t//Count alive cells in 3x3 grid\n\t\t\tfor i := y - 1; i <= y+1; i++ {\n\t\t\t\trealI := i + offset\n\t\t\t\tfor j := x - 1; j <= x+1; j++ {\n\t\t\t\t\tif matrix[(customMod(realI, mHeight)*width)+customMod(j, width)] == ALIVE {\n\t\t\t\t\t\tneighboursAlive++\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t\tif result[(y*width)+x] == ALIVE {\n\t\t\t\tneighboursAlive--\n\t\t\t\tif neighboursAlive == 2 || neighboursAlive == 3 {\n\t\t\t\t\tresult[(y*width)+x] = ALIVE\n\t\t\t\t} else {\n\t\t\t\t\tresult[(y*width)+x] = DEAD\n\t\t\t\t}\n\t\t\t} else if neighboursAlive == 3 {\n\t\t\t\tresult[(y*width)+x] = ALIVE\n\t\t\t}\n\t\t}\n\t}\n\treturn result\n}", "title": "" }, { "docid": "cb6ad9cd0b79ac349e493796a3e7e0be", "score": "0.4771698", "text": "func countTrees(offsets offset, rowSize int, data treeData) int {\n\ttreeCount := 0\n\tfor y, x := 0, 0; y < len(data); y, x = y+offsets.y, (x+offsets.x)%rowSize {\n\t\tpoint := data[y][x]\n\t\tif point {\n\t\t\ttreeCount++\n\t\t}\n\t}\n\n\treturn treeCount\n}", "title": "" }, { "docid": "049679de21c9a19bf2b60aaed67afc58", "score": "0.4759615", "text": "func champagneTower(poured int, query_row int, query_glass int) float64 {\n\tglasses := make([][]float64, query_row+2)\n\tfor i := 0; i <= query_row+1; i++ {\n\t\tglasses[i] = make([]float64, query_row+2)\n\t}\n\tglasses[0][0] = float64(poured)\n\tfor row := 0; row <= query_row; row++ {\n\t\tfor column := 0; column <= row; column++ {\n\t\t\tp := (glasses[row][column] - 1.0) / 2\n\t\t\tif p > 0 {\n\t\t\t\tglasses[row+1][column], glasses[row+1][column+1] = glasses[row+1][column]+p, glasses[row+1][column+1]+p\n\t\t\t}\n\t\t}\n\t}\n\treturn math.Min(1, glasses[query_row][query_glass])\n}", "title": "" }, { "docid": "1fa029666d9917a4ca55f67528a66ce3", "score": "0.47537974", "text": "func see(pos *Position, m Move) int32 {\n\tus := pos.SideToMove\n\tsq := m.To()\n\tbb := sq.Bitboard()\n\ttarget := m.Target() // piece in position\n\tbb27 := bb &^ (BbRank1 | BbRank8)\n\tbb18 := bb & (BbRank1 | BbRank8)\n\n\t// cccupancy tables as if moves are executed\n\tvar occ [ColorArraySize]Bitboard\n\tocc[White] = pos.ByColor[White]\n\tocc[Black] = pos.ByColor[Black]\n\tall := occ[White] | occ[Black]\n\n\t// adjust score for move\n\tscore := seeScore(m)\n\ttmp := [16]int32{score}\n\tgain := tmp[:1]\n\n\tfor score >= 0 {\n\t\t// try every figure in order of value\n\t\tvar fig Figure // attacking figure\n\t\tvar att Bitboard // attackers\n\t\tvar pawn, bishop, rook Bitboard // mobilies for our figures\n\n\t\tours := occ[us]\n\t\tmt := Normal\n\n\t\t// pawn attacks\n\t\tpawn = Backward(us, West(bb27)|East(bb27))\n\t\tif att = pawn & ours & pos.ByFigure[Pawn]; att != 0 {\n\t\t\tfig = Pawn\n\t\t\tgoto makeMove\n\t\t}\n\n\t\tif att = bbKnightAttack[sq] & ours & pos.ByFigure[Knight]; att != 0 {\n\t\t\tfig = Knight\n\t\t\tgoto makeMove\n\t\t}\n\n\t\tif bbSuperAttack[sq]&ours == 0 {\n\t\t\t// no other figure can attack sq so we give up early\n\t\t\tbreak\n\t\t}\n\n\t\tbishop = BishopMobility(sq, all)\n\t\tif att = bishop & ours & pos.ByFigure[Bishop]; att != 0 {\n\t\t\tfig = Bishop\n\t\t\tgoto makeMove\n\t\t}\n\n\t\trook = RookMobility(sq, all)\n\t\tif att = rook & ours & pos.ByFigure[Rook]; att != 0 {\n\t\t\tfig = Rook\n\t\t\tgoto makeMove\n\t\t}\n\n\t\t// pawn promotions are considered queens minus the pawn\n\t\tpawn = Backward(us, West(bb18)|East(bb18))\n\t\tif att = pawn & ours & pos.ByFigure[Pawn]; att != 0 {\n\t\t\tfig, mt = Queen, Promotion\n\t\t\tgoto makeMove\n\t\t}\n\n\t\tif att = (rook | bishop) & ours & pos.ByFigure[Queen]; att != 0 {\n\t\t\tfig = Queen\n\t\t\tgoto makeMove\n\t\t}\n\n\t\tif att = bbKingAttack[sq] & ours & pos.ByFigure[King]; att != 0 {\n\t\t\tfig = King\n\t\t\tgoto makeMove\n\t\t}\n\n\t\t// no attack found\n\t\tbreak\n\n\tmakeMove:\n\t\t// make a new pseudo-legal move of the smallest attacker\n\t\tfrom := att.LSB()\n\t\tattacker := ColorFigure(us, fig)\n\t\tm := MakeMove(mt, from.AsSquare(), sq, target, attacker)\n\t\ttarget = attacker // attacker becomes the new target\n\n\t\t// update score\n\t\tscore = seeScore(m) - score\n\t\tgain = append(gain, score)\n\n\t\t// update occupancy tables for executing the move\n\t\tocc[us] = occ[us] &^ from\n\t\tall = all &^ from\n\n\t\t// switch sides\n\t\tus = us.Opposite()\n\t}\n\n\tfor i := len(gain) - 2; i >= 0; i-- {\n\t\tif -gain[i+1] < gain[i] {\n\t\t\tgain[i] = -gain[i+1]\n\t\t}\n\t}\n\treturn gain[0]\n}", "title": "" }, { "docid": "8188c5d54fd4ee2051d2d8dc9f3a00b2", "score": "0.4752183", "text": "func countNeighbors(key int) int {\n\ttotal := 0\n\tw := screenWidth * (-1)\n\n\t// Go through this counter 3 times.\n\t//\n\tfor c := 0; c < 3; c++ {\n\t\t// Go through all 3 neighbors on each of the 3 rows.\n\t\t//\n\t\tfor n := -1; n <= 1; n++ {\n\t\t\t// Check if neighbor is outside our window limits.\n\t\t\t//\n\t\t\tnkey := key + w + n\n\n\t\t\t// Check if nkey < 0 or > all_cells.\n\t\t\t//\n\t\t\tif nkey >= 0 && nkey < all_cells {\n\t\t\t\t// Check if neighbor is outside the window limits.\n\t\t\t\t//\n\t\t\t\tty := nkey / screenWidth\n\t\t\t\ttx := nkey - (ty * screenWidth)\n\t\t\t\tif tx >= 0 && tx < screenWidth && ty >= 0 && ty < screenHeight {\n\t\t\t\t\t// If neighbor cell is alive, then incremend total.\n\t\t\t\t\t//\n\t\t\t\t\tif cells[nkey*4] == 0xff {\n\t\t\t\t\t\ttotal++\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tw += screenWidth\n\t}\n\n\t// We also counted the current live cell.\n\t// If it's alive, we'll decrement that from the equation.\n\t//\n\tif cells[key*4] == 0xff {\n\t\ttotal--\n\t}\n\n\treturn total\n}", "title": "" }, { "docid": "3ac0be4f2b7b8a1409e132c46a74abd3", "score": "0.47500843", "text": "func backtrack(list []int, temp []int, results *[][]int) {\n if len(temp) > len(list) {\n return\n }\n\n if len(temp) == len(list) {\n copyTemp := make([]int, len(temp))\n copy(copyTemp, temp)\n *results = append(*results, copyTemp)\n return\n }\n\n for i := 0; i < len(list); i++ {\n if includes(temp, list[i]) { \n continue\n }\n\n temp = append(temp, list[i]) // take\n backtrack(list, temp, results) // explore\n temp = temp[:len(temp) - 1] // clean up\n }\n}", "title": "" }, { "docid": "3bb2c2ba00d90e5a1c7426f0540631eb", "score": "0.47361052", "text": "func minMaxShipsInColumn(board *Board, coord Coord) (int, int) {\n var ships, unsolveds = 0, 0\n for row := 0; row < board.NumberOfRows(); row++ {\n square := board.SquareAt(coord.WithRow(row))\n switch {\n case square.IsShip():\n ships++\n case square.IsUnsolved():\n unsolveds++\n }\n }\n return ships, ships + unsolveds\n}", "title": "" }, { "docid": "3b8b619053344189aaa383db44112206", "score": "0.47357744", "text": "func NumberofDecisiontoReachDestination(s []string) int {\n\trow := len(s)\n\tcolumn := len(s[0])\n\tstart := [2]int{}\n\tdest := [2]int{}\n\tfor i := 0; i < len(s); i++ {\n\t\tif strings.Index(s[i], \"S\") != -1 {\n\t\t\tstart[0] = i\n\t\t\tstart[1] = strings.Index(s[i], \"S\")\n\t\t}\n\t\tif strings.Index(s[i], \"D\") != -1 {\n\t\t\tdest[0] = i\n\t\t\tdest[1] = strings.Index(s[i], \"D\")\n\t\t}\n\t}\n\troute := []int{}\n\troute = append(route, start[0]*10+start[1])\n\tvisited := make([][]bool, row)\n\tfor i := range visited {\n\t\tvisited[i] = make([]bool, column)\n\t}\n\tdecisionpoint := make([][]bool, row)\n\tfor i := range decisionpoint {\n\t\tdecisionpoint[i] = make([]bool, column)\n\t}\n\tvisited[start[0]][start[1]] = true\n\tfrom := make([][]string, row)\n\tfor i := range from {\n\t\tfrom[i] = make([]string, column)\n\t}\n\tfor visited[dest[0]][dest[1]] == false {\n\t\tif len(route) == 0 {\n\t\t\treturn -1\n\t\t}\n\t\tmove(&decisionpoint, &from, &route, s, route[0]/10, route[0]%10, &visited)\n\t\troute = route[1:]\n\t}\n\treturn gothrough(&decisionpoint, &from, s, dest, start)\n}", "title": "" }, { "docid": "06bb9ef716ad36d0994c7038db379da2", "score": "0.47263035", "text": "func PuckLocation(data []int) vector.Vector {\n\tvar pointCloud []vector.Vector\n\tfor threshold := -15; threshold <= 15; threshold++ {\n\t\tfor i := 0; i < len(data); i++ {\n\t\t\tx := imod(i, 8)\n\t\t\ty := int(i / 8)\n\t\t\tif 127+threshold == data[i] { // will this work?\n\t\t\t\tpointCloud = append(pointCloud, vector.New(x, y))\n\t\t\t}\n\t\t}\n\t}\n\treturn centerOfPoints(pointCloud)\n}", "title": "" }, { "docid": "1d9dfc889808689d4f4721fb5a9bce01", "score": "0.47230452", "text": "func (cube conwayCube) surrounds(x, y, z int) int {\n\tcountTrue := func(bs ...bool) int {\n\t\tresult := 0\n\t\tfor _, bb := range bs {\n\t\t\tif bb {\n\t\t\t\tresult++\n\t\t\t}\n\t\t}\n\t\treturn result\n\t}\n\n\treturn countTrue(\n\t\tcube.at(x-1, y-1, z-1), cube.at(x, y-1, z-1), cube.at(x+1, y-1, z-1),\n\t\tcube.at(x-1, y, z-1), cube.at(x, y, z-1), cube.at(x+1, y, z-1),\n\t\tcube.at(x-1, y+1, z-1), cube.at(x, y+1, z-1), cube.at(x+1, y+1, z-1),\n\n\t\tcube.at(x-1, y-1, z), cube.at(x, y-1, z), cube.at(x+1, y-1, z),\n\t\tcube.at(x-1, y, z), false, cube.at(x+1, y, z),\n\t\tcube.at(x-1, y+1, z), cube.at(x, y+1, z), cube.at(x+1, y+1, z),\n\n\t\tcube.at(x-1, y-1, z+1), cube.at(x, y-1, z+1), cube.at(x+1, y-1, z+1),\n\t\tcube.at(x-1, y, z+1), cube.at(x, y, z+1), cube.at(x+1, y, z+1),\n\t\tcube.at(x-1, y+1, z+1), cube.at(x, y+1, z+1), cube.at(x+1, y+1, z+1),\n\t)\n}", "title": "" }, { "docid": "97bda00d44b50f43afbdc1367fc4130e", "score": "0.47203085", "text": "func Topple(board CheckerBoard, i, j int) CheckerBoard {\n\trow := len(board)\n\tcol := len(board[0])\n\tfor board[i][j] >= 4 {\n\t\tboard[i][j] -= 4\n\t\tif Infield(row, col, i-1, j) {\n\t\t\tboard[i-1][j]++\n\t\t}\n\t\tif Infield(row, col, i+1, j) {\n\t\t\tboard[i+1][j]++\n\t\t}\n\t\tif Infield(row, col, i, j-1) {\n\t\t\tboard[i][j-1]++\n\t\t}\n\t\tif Infield(row, col, i, j+1) {\n\t\t\tboard[i][j+1]++\n\t\t}\n\t}\n\treturn board\n}", "title": "" }, { "docid": "95c3f9310535637af754d2ba137984b4", "score": "0.47178456", "text": "func explodeTile(y, x, w int, t *[]Tile) {\n\toriginalTile := (*t)[x+y*w]\n\tfor it := 0; it < 5; it++ {\n\t\try := rand.Intn(2)\n\t\trx := rand.Intn(2)\n\t\tif rand.Intn(100) > 50 {\n\t\t\try *= -1\n\t\t}\n\t\tif rand.Intn(100) > 50 {\n\t\t\trx *= -1\n\t\t}\n\t\tdefer func() {\n\t\t\tif r := recover(); r != nil {\n\t\t\t\try, rx = ry*-1, rx*-1\n\t\t\t}\n\t\t}()\n\t\tif !mapBorders(y+ry, x+rx) || !mapBorders(y, x) {\n\t\t\t(*t)[(x+rx)+(y+ry)*w] = originalTile\n\t\t}\n\t\ty, x = y+ry, x+rx\n\t}\n}", "title": "" }, { "docid": "fc6ab38e5390a0b36c2029b709a736f6", "score": "0.47123232", "text": "func canPlaceFlowers(flowerbed []int, n int) bool {\n \n count := 0\n sum := 0\n \n if flowerbed[0] == 0 {\n count = 1\n }\n \n for _, v := range flowerbed {\n switch {\n case v == 0 :\n count++\n case count > 0 :\n sum += (count - 1) >> 1\n if sum >= n { return true}\n count = 0\n }\n }\n \n sum += count >> 1\n \n if sum >= n {\n return true\n } else {\n return false\n }\n}", "title": "" }, { "docid": "b5984940e868300b0fc38b3f6c1a026b", "score": "0.47054604", "text": "func findPairs(board [][]rune, x, y int, used map[int]bool) [][2]int {\n\tvar pairs [][2]int\n\tvar pair [2]int\n\n\t// x-1, y\n\tpair[0], pair[1] = x-1, y\n\tif x-1 >= 0 && !used[coded(pair, board)] {\n\t\tpairs = append(pairs, pair)\n\t}\n\n\t// x, y-1\n\tpair[0], pair[1] = x, y-1\n\tif y-1 >= 0 && !used[coded(pair, board)] {\n\t\tpairs = append(pairs, pair)\n\t}\n\n\t// x, y+1\n\tpair[0], pair[1] = x, y+1\n\tif y+1 < len(board[x]) && !used[coded(pair, board)] {\n\t\tpairs = append(pairs, pair)\n\t}\n\n\t// x+1, y\n\tpair[0], pair[1] = x+1, y\n\tif x+1 < len(board) && !used[coded(pair, board)] {\n\t\tpairs = append(pairs, pair)\n\t}\n\n\treturn pairs\n}", "title": "" }, { "docid": "fa36f7827cc7927f6ffb906d940975a4", "score": "0.4703472", "text": "func calculateNextState(p Params, StartY, EndY int, world [][]byte, c distributorChannels, t int) [][]byte {\n\tnewWorld := make([][]byte, (EndY - StartY))\n\tfor i := range newWorld {\n\t\tnewWorld[i] = make([]byte, p.ImageWidth)\n\t}\n\ti := 0\n\tfor y := StartY; y < EndY; y++ {\n\t\tfor x := 0; x < p.ImageWidth; x++ {\n\t\t\tneighbours := calculateNeighbours(p, x, y, world)\n\t\t\tif world[y][x] == alive {\n\t\t\t\tif neighbours == 2 || neighbours == 3 {\n\t\t\t\t\tnewWorld[i][x] = alive\n\t\t\t\t} else {\n\t\t\t\t\tnewWorld[i][x] = dead\n\t\t\t\t\tflippedCell := util.Cell{\n\t\t\t\t\t\tX: x,\n\t\t\t\t\t\tY: y,\n\t\t\t\t\t}\n\t\t\t\t\tflipped := CellFlipped{\n\t\t\t\t\t\tCompletedTurns: t,\n\t\t\t\t\t\tCell: flippedCell,\n\t\t\t\t\t}\n\t\t\t\t\tc.events <- flipped\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tif neighbours == 3 {\n\t\t\t\t\tnewWorld[i][x] = alive\n\t\t\t\t\tflippedCell := util.Cell{\n\t\t\t\t\t\tX: x,\n\t\t\t\t\t\tY: y,\n\t\t\t\t\t}\n\t\t\t\t\tflipped := CellFlipped{\n\t\t\t\t\t\tCompletedTurns: t,\n\t\t\t\t\t\tCell: flippedCell,\n\t\t\t\t\t}\n\t\t\t\t\tc.events <- flipped\n\n\t\t\t\t} else {\n\t\t\t\t\tnewWorld[i][x] = dead\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\ti++\n\t}\n\n\treturn newWorld\n}", "title": "" }, { "docid": "18e751c7cd4433d5dfd2ae407652c4a0", "score": "0.4703421", "text": "func inRow(board *[9][9]int8, i int8) (count int8) {\n\tvar hash [9]bool // used as a bucket structure\n\tvar j int8\n\n\tfor j, count = 0, 0; j < BOARD_SIZE; j++ {\n\t\tcurr := board[i][j]\n\n\t\tif hash[curr-1] {\n\t\t\tcount++\n\t\t} else {\n\t\t\thash[curr-1] = true\n\t\t}\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "336d5aacce6b3f67371b285061d78bd0", "score": "0.46958336", "text": "func tick(grid []string, carts map[pos]cart) map[pos]cart {\n\tnext := make(map[pos]cart)\n\tfor y, line := range grid {\n\t\tfor x, p := range line {\n\t\t\tif c, ok := carts[pos{x: x, y: y}]; ok {\n\t\t\t\tswitch p {\n\t\t\t\tcase '-':\n\t\t\t\t\tswitch c.Direction {\n\t\t\t\t\tcase Right:\n\t\t\t\t\t\tif _, ok = next[pos{x: x + 1, y: y}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x+1, y)\n\t\t\t\t\t\t\tos.Exit(1)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tnext[pos{x: x + 1, y: y}] = cart{c.Next, c.Direction}\n\t\t\t\t\tcase Left:\n\t\t\t\t\t\tif _, ok = next[pos{x: x - 1, y: y}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x-1, y)\n\t\t\t\t\t\t\tos.Exit(1)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tnext[pos{x: x - 1, y: y}] = cart{c.Next, c.Direction}\n\t\t\t\t\t}\n\n\t\t\t\tcase '|':\n\t\t\t\t\tswitch c.Direction {\n\t\t\t\t\tcase Up:\n\t\t\t\t\t\tif _, ok = next[pos{x: x, y: y - 1}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x, y-1)\n\t\t\t\t\t\t\tos.Exit(1)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tnext[pos{x: x, y: y - 1}] = cart{c.Next, c.Direction}\n\t\t\t\t\tcase Down:\n\t\t\t\t\t\tif _, ok = next[pos{x: x, y: y + 1}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x, y+1)\n\t\t\t\t\t\t\tos.Exit(1)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tnext[pos{x: x, y: y + 1}] = cart{c.Next, c.Direction}\n\t\t\t\t\t}\n\n\t\t\t\tcase '\\\\':\n\t\t\t\t\tswitch c.Direction {\n\t\t\t\t\tcase Right:\n\t\t\t\t\t\tif _, ok = next[pos{x: x, y: y + 1}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x, y+1)\n\t\t\t\t\t\t\tos.Exit(1)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tnext[pos{x: x, y: y + 1}] = cart{c.Next, Down}\n\t\t\t\t\tcase Left:\n\t\t\t\t\t\tif _, ok = next[pos{x: x, y: y - 1}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x, y-1)\n\t\t\t\t\t\t\tos.Exit(1)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tnext[pos{x: x, y: y - 1}] = cart{c.Next, Up}\n\t\t\t\t\tcase Up:\n\t\t\t\t\t\tif _, ok = next[pos{x: x - 1, y: y}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x-1, y)\n\t\t\t\t\t\t\tos.Exit(1)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tnext[pos{x: x - 1, y: y}] = cart{c.Next, Left}\n\t\t\t\t\tcase Down:\n\t\t\t\t\t\tif _, ok = next[pos{x: x + 1, y: y}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x+1, y)\n\t\t\t\t\t\t\tos.Exit(1)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tnext[pos{x: x + 1, y: y}] = cart{c.Next, Right}\n\t\t\t\t\t}\n\t\t\t\tcase '/':\n\t\t\t\t\tswitch c.Direction {\n\t\t\t\t\tcase Left:\n\t\t\t\t\t\tif _, ok = next[pos{x: x, y: y + 1}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x, y+1)\n\t\t\t\t\t\t\tos.Exit(1)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tnext[pos{x: x, y: y + 1}] = cart{c.Next, Down}\n\t\t\t\t\tcase Right:\n\t\t\t\t\t\tif _, ok = next[pos{x: x, y: y - 1}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x, y-1)\n\t\t\t\t\t\t\tos.Exit(1)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tnext[pos{x: x, y: y - 1}] = cart{c.Next, Up}\n\t\t\t\t\tcase Up:\n\t\t\t\t\t\tif _, ok = next[pos{x: x + 1, y: y}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x+1, y)\n\t\t\t\t\t\t\tos.Exit(1)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tnext[pos{x: x + 1, y: y}] = cart{c.Next, Right}\n\t\t\t\t\tcase Down:\n\t\t\t\t\t\tif _, ok = next[pos{x: x - 1, y: y}]; ok {\n\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x-1, y)\n\t\t\t\t\t\t\tos.Exit(1)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tnext[pos{x: x - 1, y: y}] = cart{c.Next, Left}\n\t\t\t\t\t}\n\t\t\t\tcase '+':\n\t\t\t\t\tswitch c.Next {\n\t\t\t\t\tcase LeftTurn:\n\t\t\t\t\t\tswitch c.Direction {\n\t\t\t\t\t\tcase Up:\n\t\t\t\t\t\t\tif _, ok = next[pos{x: x - 1, y: y}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x-1, y)\n\t\t\t\t\t\t\t\tos.Exit(1)\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\tnext[pos{x: x - 1, y: y}] = cart{Straight, Left}\n\t\t\t\t\t\tcase Down:\n\t\t\t\t\t\t\tif _, ok = next[pos{x: x + 1, y: y}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x+1, y)\n\t\t\t\t\t\t\t\tos.Exit(1)\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\tnext[pos{x: x + 1, y: y}] = cart{Straight, Right}\n\t\t\t\t\t\tcase Left:\n\t\t\t\t\t\t\tif _, ok = next[pos{x: x, y: y + 1}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x, y+1)\n\t\t\t\t\t\t\t\tos.Exit(1)\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\tnext[pos{x: x, y: y + 1}] = cart{Straight, Down}\n\t\t\t\t\t\tcase Right:\n\t\t\t\t\t\t\tif _, ok = next[pos{x: x, y: y - 1}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x, y-1)\n\t\t\t\t\t\t\t\tos.Exit(1)\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\tnext[pos{x: x, y: y - 1}] = cart{Straight, Up}\n\t\t\t\t\t\t}\n\t\t\t\t\tcase RightTurn:\n\t\t\t\t\t\tswitch c.Direction {\n\t\t\t\t\t\tcase Up:\n\t\t\t\t\t\t\tif _, ok = next[pos{x: x + 1, y: y}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x+1, y)\n\t\t\t\t\t\t\t\tos.Exit(1)\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\tnext[pos{x: x + 1, y: y}] = cart{LeftTurn, Right}\n\t\t\t\t\t\tcase Down:\n\t\t\t\t\t\t\tif _, ok = next[pos{x: x - 1, y: y}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x-1, y)\n\t\t\t\t\t\t\t\tos.Exit(1)\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\tnext[pos{x: x - 1, y: y}] = cart{LeftTurn, Left}\n\t\t\t\t\t\tcase Left:\n\t\t\t\t\t\t\tif _, ok = next[pos{x: x, y: y - 1}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x, y-1)\n\t\t\t\t\t\t\t\tos.Exit(1)\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\tnext[pos{x: x, y: y - 1}] = cart{LeftTurn, Up}\n\t\t\t\t\t\tcase Right:\n\t\t\t\t\t\t\tif _, ok = next[pos{x: x, y: y + 1}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\\n\", x, y+1)\n\t\t\t\t\t\t\t\tos.Exit(1)\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\tnext[pos{x: x, y: y + 1}] = cart{LeftTurn, Down}\n\t\t\t\t\t\t}\n\t\t\t\t\tcase Straight:\n\t\t\t\t\t\tswitch c.Direction {\n\t\t\t\t\t\tcase Up:\n\t\t\t\t\t\t\tif _, ok = next[pos{x: x, y: y - 1}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\", x, y-1)\n\t\t\t\t\t\t\t\tos.Exit(1)\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\tnext[pos{x: x, y: y - 1}] = cart{RightTurn, Up}\n\t\t\t\t\t\tcase Down:\n\t\t\t\t\t\t\tif _, ok = next[pos{x: x, y: y + 1}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\", x, y+1)\n\t\t\t\t\t\t\t\tos.Exit(1)\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\tnext[pos{x: x, y: y + 1}] = cart{RightTurn, Down}\n\t\t\t\t\t\tcase Left:\n\t\t\t\t\t\t\tif _, ok = next[pos{x: x - 1, y: y}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\", x-1, y)\n\t\t\t\t\t\t\t\tos.Exit(1)\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\tnext[pos{x: x - 1, y: y}] = cart{RightTurn, Left}\n\t\t\t\t\t\tcase Right:\n\t\t\t\t\t\t\tif _, ok = next[pos{x: x + 1, y: y}]; ok {\n\t\t\t\t\t\t\t\tfmt.Printf(\"Collision at %d, %d\", x+1, y)\n\t\t\t\t\t\t\t\tos.Exit(1)\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\tnext[pos{x: x + 1, y: y}] = cart{RightTurn, Right}\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn next\n}", "title": "" }, { "docid": "3ba8451a0fdbd305e50766e5eb63ef28", "score": "0.46918237", "text": "func FindInterestingPoint(x, y float64, limit int) (float64, float64) {\n\trand.Seed(time.Now().UnixNano())\n\tfor {\n\t\ti := Calculate(x, y, limit)\n\t\tif i > int(float64(limit)*0.95) {\n\t\t\treturn x, y\n\t\t}\n\t\tx = (rand.Float64() * 4) - 2\n\t\ty = (rand.Float64() * 4) - 2\n\t}\n}", "title": "" }, { "docid": "a1a4f63f5f4e61540ed3fcf49d28bf10", "score": "0.46874884", "text": "func dfs_maxUncrossedLines(A []int, B []int,len_a int,len_b int,pos_a int,pos_b int,memo [][]int)int{\n\tif pos_a >= len_a || pos_b >= len_b{\n\t\treturn 0\n\t}\n\tif memo[pos_a][pos_b] != -1{\n\t\treturn memo[pos_a][pos_b]\n\t}\n\tvar res int = 0\n\tif A[pos_a] == B[pos_b]{\n\t\tres = 1 + dfs_maxUncrossedLines(A,B,len_a,len_b,pos_a + 1,pos_b + 1,memo)\n\t}\n\tskip_a := dfs_maxUncrossedLines(A,B,len_a,len_b,pos_a + 1,pos_b,memo)\n\tskip_b := dfs_maxUncrossedLines(A,B,len_a,len_b,pos_a,pos_b + 1,memo)\n\tif skip_a > res{\n\t\tres = skip_a\n\t}\n\tif skip_b > res{\n\t\tres = skip_b\n\t}\n\tmemo[pos_a][pos_b] = res\n\treturn res\n}", "title": "" }, { "docid": "796be75676481762016f66c78e0ca661", "score": "0.4686761", "text": "func totalNQueens(n int) int {\n\t// 20200310:\n\t// 执行耗时:4 ms\n\t// 内存消耗:2.6 MB\n\t//res52 = [][]string{}\n\t//chessBoard := make([][]bool, n)\n\t//for i := 0; i < n; i++ {\n\t//\tchessBoard[i] = make([]bool, n)\n\t//}\n\t//trackBack52(chessBoard, [][]byte{})\n\t//return len(res52)\n\n\t// 20200422:考虑做一版优化\n\t// 执行耗时:0 ms,击败了100.00% 的Go用户\n\t// 内存消耗:2 MB,击败了100.00% 的Go用户\n\tcount := 0\n\t// 从第一行开始直到第 row 行的前一行为止,看那一行所放置的皇后是否在 col 列上,或者是不是在它的对角线上\n\tcheck := func(row, col int, columns []int) bool {\n\t\tfor r := 0; r < row; r++ {\n\t\t\tif columns[r] == col || row-r == int(math.Abs(float64(columns[r]-col))) {\n\t\t\t\treturn false\n\t\t\t}\n\t\t}\n\t\treturn true\n\t}\n\tvar backtracking func(n, row int, columns []int)\n\tbacktracking = func(n, row int, columns []int) {\n\t\t// 是否在所有n行里都摆放好了皇后?\n\t\tif row == n {\n\t\t\tcount++ // 找到了新的摆放方法\n\t\t\treturn\n\t\t}\n\t\t// 尝试着将皇后放置在当前行中的每一列\n\t\tfor col := 0; col < n; col++ {\n\t\t\tcolumns[row] = col\n\n\t\t\t// 检查是否合法,如果合法就继续到下一行\n\t\t\tif check(row, col, columns) {\n\t\t\t\tbacktracking(n, row+1, columns)\n\t\t\t}\n\t\t\t// 如果不合法,就不要把皇后放在这列中(回溯)\n\t\t\tcolumns[row] = -1\n\t\t}\n\t}\n\tcolumns := make([]int, n)\n\tbacktracking(n, 0, columns)\n\n\treturn count\n}", "title": "" }, { "docid": "d84ed2d12f3663226692801c30820150", "score": "0.46867463", "text": "func CountThreats(game State, p Piece, col, row int) int {\n\t// Empty spots don't cause threats\n\tif game.GetPiece(col, row) != None {\n\t\treturn 0\n\t}\n\ttryLine := func(col, row, cOffset, rOffset int) int {\n\t\tfor count := 0; count < WinCount-1; count++ {\n\t\t\tcol += cOffset\n\t\t\trow += rOffset\n\t\t\tif game.GetPiece(col, row) != p {\n\t\t\t\tif count == 3 {\n\t\t\t\t\tfmt.Printf(\"Threat at %d, %d\\n\", col, row)\n\t\t\t\t}\n\t\t\t\treturn 0\n\t\t\t}\n\t\t}\n\t\treturn 1\n\t}\n\treturn tryLine(col, row, 1, 1) +\n\t\ttryLine(col, row, 1, -1) +\n\t\ttryLine(col, row, -1, -1) +\n\t\ttryLine(col, row, -1, 1)\n}", "title": "" }, { "docid": "52d7856fc027a76cfcf79ea5d06f6b5d", "score": "0.4679816", "text": "func (m *sequenceMatcher) findShift() int {\n\tfor offset := 1; offset <= m.currentIndex; offset++ {\n\t\tok := true\n\t\tfor i := 0; i < m.currentIndex-offset; i++ {\n\t\t\tif m.sequence[i] != m.sequence[i+offset] {\n\t\t\t\tok = false\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif ok {\n\t\t\treturn offset\n\t\t}\n\t}\n\treturn m.currentIndex\n}", "title": "" } ]
d4c4aebbdddd4c4ff005eed4c84cafa3
write invoke function to write key/value pair
[ { "docid": "5033a2511b44a66b5c9ec0abae62025a", "score": "0.0", "text": "func (t *SimpleChaincode) pagar(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\t//var pagador, recebedor, dataEntrada, dataSaida, valor string\n\tvar err error\n\tvar recebedor string\n\n\tfmt.Println(\"running pagar()\")\n\n\tif len(args) != 5 {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting 5.\")\n\t}\n\n\trecebedor = args[1]\n\n\tvar pagamento Pagamento\n\tpagamento.Pagador = args[0]\n\tpagamento.Recebedor = recebedor\n\tpagamento.DataEntrada = args[2]\n\tpagamento.DataSaida = args[3]\n\tpagamento.Valor = args[4]\n\n\t// pagador = args[0]\n\t// recebedor = args[1]\n\t// dataEntrada = args[2]\n\t// dataSaida = args[3]\n\t// valor = args[4]\n\t\n\t// pagamento := Pagamento{ Pagador: pagador, Recebedor: recebedor, DataEntrada: dataEntrada, DataSaida: dataSaida, Valor: valor }\n\t// fmt.Println(pagamento)\n\n\tpagamentoBytes, err := json.Marshal(&pagamento)\n\tif err != nil {\n\t\tfmt.Println(\"Erro ao criar objeto pagamento \")\n\t\treturn nil, errors.New(\"Erro ao criar objeto pagamento\")\n\t}\n\n\terr = stub.PutState(recebedor, []byte(pagamentoBytes)) //write the variable into the chaincode state\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfmt.Println(\"Pagamento criado\")\n\treturn pagamentoBytes, nil\n}", "title": "" } ]
[ { "docid": "32213f2987d17bfc26ebd72371859cb3", "score": "0.70665115", "text": "func (t *SimpleChaincode) write(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\tvar key, value string\n\tvar err error\n\tfmt.Println(\"running write()\")\n\n\tif len(args) != 2 {\n\t\tstub.PutState(\"ErrorMsg\",[]byte(\"Incorrect number of arguments. Expecting 2. name of the key and value to set\"))\n\t\treturn nil, nil\n\t}\n\n\tkey = args[0] //rename for funsies\n\tvalue = args[1]\n\terr = stub.PutState(key, []byte(value)) //write the variable into the chaincode state\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn nil, nil\n}", "title": "" }, { "docid": "b0dba7900ed67b4f8257153ed11fef3b", "score": "0.69176173", "text": "func (t *SimpleChaincode) write(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\tvar key, value string\n\tvar err error\n\tfmt.Println(\"running write()\")\n\n\tif len(args) != 2 {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting 2. name of the key and value to set\")\n\t}\n\n\tkey = args[0] //rename for funsies\n\tvalue = args[1]\n\terr = stub.PutState(key, []byte(value)) //write the variable into the chaincode state\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn nil, nil\n}", "title": "" }, { "docid": "b0dba7900ed67b4f8257153ed11fef3b", "score": "0.69176173", "text": "func (t *SimpleChaincode) write(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\tvar key, value string\n\tvar err error\n\tfmt.Println(\"running write()\")\n\n\tif len(args) != 2 {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting 2. name of the key and value to set\")\n\t}\n\n\tkey = args[0] //rename for funsies\n\tvalue = args[1]\n\terr = stub.PutState(key, []byte(value)) //write the variable into the chaincode state\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn nil, nil\n}", "title": "" }, { "docid": "b0dba7900ed67b4f8257153ed11fef3b", "score": "0.69176173", "text": "func (t *SimpleChaincode) write(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\tvar key, value string\n\tvar err error\n\tfmt.Println(\"running write()\")\n\n\tif len(args) != 2 {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting 2. name of the key and value to set\")\n\t}\n\n\tkey = args[0] //rename for funsies\n\tvalue = args[1]\n\terr = stub.PutState(key, []byte(value)) //write the variable into the chaincode state\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn nil, nil\n}", "title": "" }, { "docid": "b0dba7900ed67b4f8257153ed11fef3b", "score": "0.69176173", "text": "func (t *SimpleChaincode) write(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\tvar key, value string\n\tvar err error\n\tfmt.Println(\"running write()\")\n\n\tif len(args) != 2 {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting 2. name of the key and value to set\")\n\t}\n\n\tkey = args[0] //rename for funsies\n\tvalue = args[1]\n\terr = stub.PutState(key, []byte(value)) //write the variable into the chaincode state\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn nil, nil\n}", "title": "" }, { "docid": "1cb9a81ef09638ff25aee054d098bc7e", "score": "0.68934596", "text": "func (t *SimpleChaincode) write(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\tvar key, value string\n\tvar err error\n\tfmt.Println(\"running write()\")\n\n\tif len(args) != 2 {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting 2. name of the key and value to set\")\n\t}\n\n\tkey = args[0] \t\t\t\t\t\t\t\t\t\t\t\t//rename for funsies\n\tvalue = args[1]\n\terr = stub.PutState(key, []byte(value)) \t\t\t\t\t//write the variable into the chaincode state\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn nil, nil\n}", "title": "" }, { "docid": "e63dee9771b64e6b8e579979baa01700", "score": "0.6662426", "text": "func (t *LoyaltyChaincode) write(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\tvar key, value string\n\tvar err error\n\tfmt.Println(\"(9) Running write()\")\n\n\tif len(args) != 2 {\n\t\treturn nil, errors.New(\"(10) Incorrect number of arguments. Expecting 2, name of the key and value to set\")\n\t}\n\n\tkey = args[0] \n\tvalue = args[1]\n\terr = stub.PutState(key, []byte(value)) \n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn nil, nil\n}", "title": "" }, { "docid": "1810a28073e91956240f7b05912c7b04", "score": "0.6520735", "text": "func (t *AirMilesChaincode) write(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\tvar key, value string\n\tvar err error\n\tfmt.Println(\"running write()\")\n\n\tif len(args) != 2 {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting 2. name of the key and value to set\")\n\t}\n\n\tkey = args[0] //rename for funsies\n\tvalue = args[1]\n\terr = stub.PutState(key, []byte(value)) //write the variable into the chaincode state\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn nil, nil\n}", "title": "" }, { "docid": "d0ab9f4c59997e2b8f2437a8d4b7629d", "score": "0.64741266", "text": "func (k *key) write(v interface{}) error {\n\tk.Lock()\n\tdefer k.Unlock()\n\tk.LastAccess = time.Now()\n\n\tb, err := json.Marshal(v)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn ioutil.WriteFile(k.Path, b, 0666)\n}", "title": "" }, { "docid": "47d5615c6e704fd22646fab1943b110a", "score": "0.6412532", "text": "func write(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\tvar key, value string\n\tvar err error\n\tfmt.Println(\"starting write\")\n\n\tif len(args) != 2 {\n\t\treturn shim.Error(\"Incorrect number of arguments. Expecting POO. key of the variable and value to set\")\n\t}\n\n\t// input sanitation\n\terr = sanitize_arguments(args)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\tkey = args[0] //rename for funsies\n\tvalue = args[1]\n\terr = stub.PutState(key, []byte(value)) //write the variable into the ledger\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\tfmt.Println(\"- end write\")\n\treturn shim.Success(nil)\n}", "title": "" }, { "docid": "1dd6aa5e163bc351e85fa84e6fdc2646", "score": "0.6322536", "text": "func (p *provider) Write(key string, value []byte, expiration time.Duration) error {\n\treturn p.engine.Write(p.Normalize(key), value, expiration)\n}", "title": "" }, { "docid": "ea966bc80a73438a2c940edf7cf8b616", "score": "0.63114065", "text": "func writeValue(buf *bytes.Buffer, fv *reflect.Value, key string) error {\n\tswitch fv.Kind() {\n\tcase reflect.Int:\n\t\t_, err := buf.WriteString(fmt.Sprintf(\"%s = %v\\n\", key, fv.Int()))\n\t\treturn err\n\tcase reflect.Float64:\n\t\t_, err := buf.WriteString(fmt.Sprintf(\"%s = %v\\n\", key, fv.Float()))\n\t\treturn err\n\tcase reflect.Bool:\n\t\t_, err := buf.WriteString(fmt.Sprintf(\"%s = %v\\n\", key, fv.Bool()))\n\t\treturn err\n\tcase reflect.String:\n\t\tqval := strings.Replace(fv.String(), \"\\n\", \"\\\\n\", -1)\n\t\t_, err := buf.WriteString(fmt.Sprintf(\"%s = %s\\n\", key, qval))\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "9ac97afc7203f86961367be13d79b691", "score": "0.5950387", "text": "func (r *Redis) Write(data string) {\n}", "title": "" }, { "docid": "0c65ea53ca24d1d9eaa6f724822e839d", "score": "0.5875315", "text": "func write(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\tvar key string\n\tvar err error\n\tfmt.Println(\"starting write\")\n\n\tif len(args) != 7 {\n\t\treturn shim.Error(\"Incorrect number of arguments. Expecting 2. key of the variable and value to set\")\n\t}\n\n\tkey = args[0] //rename for funsies\n\tres := PaymentInfo{}\n\n\tres.CusId = args[0]\n\tres.Year = args[1]\n\tres.Month = args[2]\n\tres.Payment_plan = args[3]\n\tres.Extra_plan = args[4]\n\tres.Amount_payment = args[5]\n\tres.Method_payment = args[6]\n\n\tjsonAsBytes, _ := json.Marshal(res)\n\n\terr = stub.PutState(key, jsonAsBytes) //write the variable into the ledger\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\tfmt.Println(\"- end write\")\n\treturn shim.Success(nil)\n}", "title": "" }, { "docid": "5698f7c282ae4f42e8f86fd6140c5f56", "score": "0.5872913", "text": "func (c CNode) Write(key, value string) error {\n\t// Check for valid characters\n\tregex, err := regexp.Compile(\"^[a-zA-Z0-9]+$\")\n\tif !regex.MatchString(key) {\n\t\treturn InvalidKeyCharError(key)\n\t}\n\tif !regex.MatchString(value) {\n\t\treturn InvalidValueCharError(value)\n\t}\n\n\toutLog.Printf(\"WRITING KEY: %s with VALUE: %s\\n\", key, value)\n\n\targs := &WriteRequest{Key: key, Value: value}\n\treply := OpReply{}\n\n\toutLog.Printf(\"Sending write to coordinator\")\n\terr = c.Coordinator.Call(\"KVNode.CoordinatorWrite\", args, &reply)\n\tif err != nil {\n\t\toutLog.Println(\"Could not connect to coordinator: \", err)\n\t\treturn err\n\t}\n\n\t// Check if write was successful\n\tif reply.Success {\n\t\toutLog.Println(\"Successfully completed write to coordinator\")\n\t} else {\n\t\toutLog.Println(\"Failed to write to coordinator...\")\n\t\treturn MajorityOpError(\"Failed to write to majority of nodes\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "1371e4e69348b1e22c87c662d669b853", "score": "0.58727115", "text": "func (ks *Service) writeValue(request *Request, response *Response) {\n\tvar err error\n\n\t// The value passed to all methods is of type interface{} but they each\n\t// check that the value is of the correct type. This is done here as it will\n\t// ensure that the specific value type is correct without this having to be\n\t// done on each end of the request and response. The receiver will only have to\n\t// assert the type when they are receiving NONE particular type\n\tswitch request.Value.Type {\n\tcase BOOL:\n\t\terr = ks.store.SetBool(request.Key, request.Value.Val)\n\tcase INT:\n\t\terr = ks.store.SetInt(request.Key, request.Value.Val)\n\tcase FLOAT:\n\t\terr = ks.store.SetFloat(request.Key, request.Value.Val)\n\tcase STRING:\n\t\terr = ks.store.SetString(request.Key, request.Value.Val)\n\tcase ARRAY:\n\t\terr = ks.store.SetArray(request.Key, request.Value.Val)\n\tcase MAP:\n\t\terr = ks.store.SetMap(request.Key, request.Value.Val)\n\tdefault:\n\t\tks.store.SetValue(request.Key, request.Value.Val)\n\t}\n\n\t// if no error occurred during this operation then the request was a success\n\tif err == nil {\n\t\tresponse.Success = true\n\t} else {\n\t\tresponse.Success = false\n\t\tresponse.Error = err.Error()\n\t}\n}", "title": "" }, { "docid": "820c7b0f5f7ef4ed89275a130c882c8a", "score": "0.5813337", "text": "func (t *SimpleChaincode) write(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\tvar name, value string\n\tvar err error\n\tfmt.Println(\"running write()\")\n\n\tif len(args) != 2 {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting 2. name of the variable and value to set\")\n\t}\n\n\tname = args[0]\n\tvalue = args[1]\n\terr = stub.PutState(name, []byte(value)) //write the variable into the chaincode state\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn nil, nil\n}", "title": "" }, { "docid": "5eb81b86b35a89048bf811b2e1ad28ea", "score": "0.57904506", "text": "func (c *redisCacher) Write(ctx context.Context, k *Key, value interface{}, ttl time.Duration) error {\n\tif c.isStopped() {\n\t\treturn ErrStopped\n\t}\n\n\tkey, err := k.Compute(c.keyFunc)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to compute key: %w\", err)\n\t}\n\n\treturn c.withConn(func(conn redigo.ConnWithContext) error {\n\t\tvar encoded bytes.Buffer\n\t\tif err := json.NewEncoder(&encoded).Encode(value); err != nil {\n\t\t\treturn fmt.Errorf(\"failed to encode value: %w\", err)\n\t\t}\n\n\t\tif _, err := redigo.String(conn.DoContext(ctx, \"PSETEX\", key, ttl.Milliseconds(), encoded.String())); err != nil {\n\t\t\treturn fmt.Errorf(\"failed to PSETEX value: %w\", err)\n\t\t}\n\t\treturn nil\n\t})\n}", "title": "" }, { "docid": "d59a3d2e676d0c4cadcb471f01a758f3", "score": "0.5769014", "text": "func (s *segment) write(key string, value []byte) error {\n\tn, err := s.fw.Write(encode(key, value))\n\tif err != nil {\n\t\treturn err\n\t}\n\tif err := s.fw.Sync(); err != nil {\n\t\treturn err\n\t}\n\ts.index[key] = s.offset\n\ts.offset += int64(n)\n\treturn nil\n}", "title": "" }, { "docid": "71f8bfcfd5992a2b6cae5a06f77ca8bc", "score": "0.57202065", "text": "func(ws *WasmService)db_put(proc *exec.Process, key, k_len, value, v_len int32)int32{\n\tk_msg := make([]byte, k_len)\n\tv_msg := make([]byte, v_len)\n\terr := proc.ReadAt(k_msg, int(key), int(k_len))\n\tif err != nil{\n\t\treturn -1\n\t}\n\terr = proc.ReadAt(v_msg, int(value), int(v_len))\n\tif err != nil{\n\t\treturn -1\n\t}\n\terr = ws.state.StoreSet(ws.action.ContractAccount,k_msg,v_msg)\n\tif err != nil{\n\t\treturn -1\n\t}\n\treturn 0\n}", "title": "" }, { "docid": "8b0c9d57027294b5ccf34122c76870b9", "score": "0.5651256", "text": "func writeProperty(buf *bytes.Buffer, key string, value interface{}) error {\n\tvar err error\n\t_, err = buf.WriteString(key)\n\tif err != nil {\n\t\treturn err\n\t}\n\t_, err = buf.WriteRune('=')\n\tif err != nil {\n\t\treturn err\n\t}\n\tswitch v := value.(type) {\n\tcase bool:\n\t\t_, err = fmt.Fprint(buf, v)\n\t\treturn err\n\tcase byte:\n\t\t_, err = fmt.Fprint(buf, v)\n\t\treturn err\n\tcase complex64:\n\t\treturn writeValueString(buf, fmt.Sprint(v))\n\tcase complex128:\n\t\treturn writeValueString(buf, fmt.Sprint(v))\n\tcase error:\n\t\treturn writeValueString(buf, v.Error())\n\tcase float32:\n\t\t_, err = fmt.Fprint(buf, v)\n\t\treturn err\n\tcase float64:\n\t\t_, err = fmt.Fprint(buf, v)\n\t\treturn err\n\tcase int:\n\t\t_, err = fmt.Fprint(buf, v)\n\t\treturn err\n\tcase int16:\n\t\t_, err = fmt.Fprint(buf, v)\n\t\treturn err\n\tcase int32:\n\t\t_, err = fmt.Fprint(buf, v)\n\t\treturn err\n\tcase int64:\n\t\t_, err = fmt.Fprint(buf, v)\n\t\treturn err\n\tcase int8:\n\t\t_, err = fmt.Fprint(buf, v)\n\t\treturn err\n\tcase string:\n\t\treturn writeValueString(buf, v)\n\tcase time.Time:\n\t\treturn writeValueString(buf, v.Format(TimeFormat))\n\tcase uint:\n\t\t_, err = fmt.Fprint(buf, v)\n\t\treturn err\n\tcase uint16:\n\t\t_, err = fmt.Fprint(buf, v)\n\t\treturn err\n\tcase uint32:\n\t\t_, err = fmt.Fprint(buf, v)\n\t\treturn err\n\tcase uint64:\n\t\t_, err = fmt.Fprint(buf, v)\n\t\treturn err\n\tcase uintptr:\n\t\t_, err = fmt.Fprint(buf, v)\n\t\treturn err\n\t}\n\n\tif v, ok := value.(fmt.Stringer); ok {\n\t\treturn writeValueString(buf, v.String())\n\t}\n\n\tif v, ok := value.(encoding.TextMarshaler); ok {\n\t\tb, err := v.MarshalText()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn writeValueString(buf, string(b))\n\t}\n\n\treturn writeValueString(buf, fmt.Sprint(value))\n}", "title": "" }, { "docid": "b8c98e7e141f288a7c4f28546a7330de", "score": "0.5600072", "text": "func writeKv(url, table, key, val string) error {\n\tvar err error\n\thostURLs := strings.Split(url, \",\")\n\tfor _, hurl := range hostURLs {\n\t\tvar resp string\n\t\trequrl := hurl + fmt.Sprintf(\"/kv/put?table=%s\", table)\n\t\treq := fmt.Sprintf(\"%s=%s\", key, val)\n\t\terr = netutils.HTTPPost(requrl, req, &resp)\n\t\tif err == nil {\n\t\t\treturn nil\n\t\t}\n\t}\n\n\treturn err\n}", "title": "" }, { "docid": "41a39ab982610d3055482c2b6ee94335", "score": "0.55842805", "text": "func writeSecret(name string, value string) error {\n\tvar urlStr = \"https://api.github.com/repos/otto-ec/\" + config.github_repo + \"/actions/secrets/\" + name\n\tvar jsonStr = []byte(`{\"key_id\":\"` + config.pubkey.Key_id + `\",\"encrypted_value\":\"` + value + `\"}`)\n\n\treq, err := http.NewRequest(\"PUT\", urlStr, bytes.NewBuffer(jsonStr))\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\tos.Exit(127)\n\t}\n\treq.SetBasicAuth(config.github_user, config.github_apikey)\n\treq.Header.Set(\"Accept\", \"application/vnd.github.v3+json\")\n\treq.Header.Set(\"Content-Type\", \"application/json\")\n\n\tresp, err := http.DefaultClient.Do(req)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\tos.Exit(127)\n\t}\n\tdefer resp.Body.Close()\n\tlog.Infof(\"Testing something.\\n\")\n\treturn err\n}", "title": "" }, { "docid": "7021009497ada0dfffb621107fdfa315", "score": "0.5577944", "text": "func write(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\tvar name, value string // Entities\n\tvar err error\n\tfmt.Println(\"starting write\")\n\n\tif len(args) != 2 {\n\t\treturn shim.Error(\"Incorrect number of arguments. Expecting 2. name of the variable and value to set\")\n\t}\n\n\t// input sanitation\n\terr = sanitize_arguments(args)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\tname = args[0] //rename for funsies\n\tvalue = args[1]\n\terr = stub.PutState(name, []byte(value)) //write the variable into the ledger\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\tfmt.Println(\"- end write\")\n\treturn shim.Success(nil)\n}", "title": "" }, { "docid": "6214ce0c4176bab7637e12528e0e32ff", "score": "0.55733496", "text": "func Write(endpoint, token string) error {\n\treturn keyring.Set(KeyringService, endpoint, token)\n}", "title": "" }, { "docid": "fece7ead5906d0837df2df194d31d94c", "score": "0.5559385", "text": "func exportKeyValue(w http.ResponseWriter, req *http.Request, L *lua.LState, userstate *permissions.UserState) {\n\tpool := userstate.Pool()\n\tdbindex := userstate.DatabaseIndex()\n\n\t// Register the KeyValue class and the methods that belongs with it.\n\tmt := L.NewTypeMetatable(lKeyValueClass)\n\tmt.RawSetH(lua.LString(\"__index\"), mt)\n\tL.SetFuncs(mt, kvMethods)\n\n\t// The constructor for new KeyValues takes a name and an optional redis db index\n\tL.SetGlobal(\"KeyValue\", L.NewFunction(func(L *lua.LState) int {\n\t\tname := L.ToString(1)\n\n\t\t// Check if the optional argument is given\n\t\tlocalDBIndex := dbindex\n\t\tif L.GetTop() == 2 {\n\t\t\tlocalDBIndex = L.ToInt(2)\n\t\t}\n\n\t\t// Create a new keyvalue in Lua\n\t\tuserdata, err := newKeyValue(L, pool, name, localDBIndex)\n\t\tif err != nil {\n\t\t\tL.Push(lua.LNil)\n\t\t\tL.Push(lua.LString(err.Error()))\n\t\t\tL.Push(lua.LNumber(1))\n\t\t\treturn 3 // Number of returned values\n\t\t}\n\n\t\t// Return the keyvalue object\n\t\tL.Push(userdata)\n\t\treturn 1 // Number of returned values\n\t}))\n}", "title": "" }, { "docid": "859eb94f552a50b32db106ede3bea3d0", "score": "0.55093014", "text": "func (w *ThreadSafeMap) Write(key string, value interface{}) interface{} {\n\tw.mutex.Lock()\n\tdefer w.mutex.Unlock()\n\tw.threadsafe[key] = value\n\treturn \"\"\n}", "title": "" }, { "docid": "020af2ad22ee94c33f4e406fccdb2e0f", "score": "0.54882014", "text": "func (b *ChaincodeActionBuilder) Write(key string, value []byte) *ChaincodeActionBuilder {\n\tb.nsRWSet.Write(key, value)\n\treturn b\n}", "title": "" }, { "docid": "150f0ede1a06a39f82ffe64f71bc5e55", "score": "0.5478865", "text": "func execNewWriterDict(_ int, p *gop.Context) {\n\targs := p.GetArgs(3)\n\tret, ret1 := flate.NewWriterDict(args[0].(io.Writer), args[1].(int), args[2].([]byte))\n\tp.Ret(3, ret, ret1)\n}", "title": "" }, { "docid": "5771a03020a5c46e5f914f910b73e7ec", "score": "0.54494035", "text": "func writeKeyLog(w io.Writer, args []api.Variable) {\n\tvar label string\n\tvar clientRandom, secret []byte\n\n\t// In delve v1.5.0, the end of the args array contains the return type and\n\t// the receiver if present. The writeKeyLog method has a receiver and returns\n\t// a single value, therefore, the argument array length is len+2.\n\tif len(args) == 4 {\n\t\tlabel = \"CLIENT_RANDOM\"\n\t} else if len(args) == 5 {\n\t\tlabel, args = args[0].Value, args[1:]\n\t} else {\n\t\tlog.Fatalf(\"unknown type signature with %d args\", len(args))\n\t}\n\n\tclientRandom = varToBytes(args[0])\n\targs = args[1:]\n\n\tsecret = varToBytes(args[0])\n\targs = args[1:]\n\n\tfmt.Fprintf(w, \"%s %x %x\\n\", label, clientRandom, secret)\n}", "title": "" }, { "docid": "5444c4d646f077693e545bdcc97dac7a", "score": "0.54390866", "text": "func writeParam(w io.Writer, key string, values []string) {\n\tfmt.Fprintf(w, \"%v=\", key)\n\tfor i, value := range values {\n\t\tif i != 0 {\n\t\t\tfmt.Fprint(w, \",\")\n\t\t}\n\t\tif strings.ContainsAny(value, \";:\") {\n\t\t\tfmt.Fprintf(w, `\"%v\"`, value)\n\t\t} else {\n\t\t\tfmt.Fprint(w, value)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "252c99011e7ceefc32e601d68faefe26", "score": "0.54251105", "text": "func (t *SimpleChaincode) write(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\n\tvar key, value string\n\tvar err error\n\tfmt.Println(\"running write()\")\n\n\t// if len(args) != 2 {\n\t// \treturn nil, errors.New(\"Incorrect number of arguments. Expecting 2. name of the key and value to set\")\n\t// }\n\n\tvar patient Patient\n\tkey = args[0] //rename for funsies\n\tvalue = args[1]\n\n\tbytes, err := stub.GetState(key)\n\n\tif err != nil {\n\n\t} else {\n\t\terr = json.Unmarshal(bytes, &patient)\n\t\tif err != nil {\n\t\t\treturn nil, errors.New(\"Corrupt Patient record\")\n\t\t}\n\t}\n\n\tpatient.FirstName = key\n\tpatient.PhoneNumber = value\n\n\tfmt.Println(\"Before Patient Marshall:\")\n\tfmt.Println(patient)\n\n\tbytes, err = json.Marshal(patient)\n\n\tfmt.Println(\"Marshalled Patient:\")\n\tfmt.Println(bytes)\n\n\tvar patient15 Patient\n\tjson.Unmarshal(bytes, &patient15)\n\n\tfmt.Println(\"Patient Unmarshalled:\")\n\tfmt.Println(patient15.FirstName)\n\tif err != nil {\n\t\treturn nil, errors.New(\"Error creating Patient record\")\n\t}\n\n\terr = stub.PutState(key, bytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbytes2, err := stub.GetState(key)\n\n\tvar patient2 Patient\n\tjson.Unmarshal(bytes2, &patient2)\n\n\tfmt.Println(\"From GetState:\")\n\tfmt.Println(patient2.FirstName)\n\n\treturn nil, nil\n}", "title": "" }, { "docid": "011d407be0d6072e575b5766ef6172f2", "score": "0.53890455", "text": "func (b *baseSession) SetValue(key fmt.Stringer, value interface{}) {}", "title": "" }, { "docid": "210fe3ecbb87c19d3f6f875c30fba3f3", "score": "0.5350036", "text": "func (l *PostgresTransactionLogger) WritePut(key, value string) {\n\tl.events <- Event{EventType: EventPut, Key: key, Value: value}\n}", "title": "" }, { "docid": "a0e3edb424158dc0f79df2b9cba136ed", "score": "0.5327893", "text": "func (this *writer) Write(value, key []byte, kafkaOffset int64) (\n\tn int, err error) {\n\n\tif value == nil {\n\t\treturn n, errors.New(\"Value can not be nil\")\n\t}\n\tbytes, err := this.encoder.Encode(nil, value, key, kafkaOffset)\n\tif err != nil {\n\t\treturn\n\t}\n\treturn this.ioWriter.Write(bytes)\n}", "title": "" }, { "docid": "567feec06aa93d9d42fcc8cfe58420f1", "score": "0.5323583", "text": "func writeVal(w io.Writer, objs *outObjs, v *Val) {\n\twriteInt(w, getValNum(objs, v))\n\twriteBool(w, v.Priv)\n\twriteString(w, v.ModPath)\n\twriteVar(w, objs, &v.Var)\n\tobjs.written[v] = true\n}", "title": "" }, { "docid": "3f7635e6eba18153119fab6e26a0ec28", "score": "0.5301243", "text": "func (t *VoatzCC) Write(stub *shim.ChaincodeStub, args []string) ([]byte, error) {\n\tvar tag, val string\n\tvar err error\n\tfmt.Println(\"Write in progress\")\n\n\tif len(args) != 2 {\n\t\treturn nil, errors.New(\"Error: # of arguments. Expecting: 2; var tag and value to set\")\n\t}\n\n\ttag = args[0]\t\t//update tag\n\tval = args[1]\n\terr = stub.PutState(tag, []byte(val))\t\t\t//write the tag into CC state\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn nil, nil\n}", "title": "" }, { "docid": "3f7635e6eba18153119fab6e26a0ec28", "score": "0.5301243", "text": "func (t *VoatzCC) Write(stub *shim.ChaincodeStub, args []string) ([]byte, error) {\n\tvar tag, val string\n\tvar err error\n\tfmt.Println(\"Write in progress\")\n\n\tif len(args) != 2 {\n\t\treturn nil, errors.New(\"Error: # of arguments. Expecting: 2; var tag and value to set\")\n\t}\n\n\ttag = args[0]\t\t//update tag\n\tval = args[1]\n\terr = stub.PutState(tag, []byte(val))\t\t\t//write the tag into CC state\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn nil, nil\n}", "title": "" }, { "docid": "41bd2adbed3bd19ab431a32c1176532d", "score": "0.5289575", "text": "func (db *DB) write(key, value []byte) (uint32, error) {\n\tif !db.current.canWrite(len(key) + len(value)) {\n\t\tif err := db.nextPage(); err != nil {\n\t\t\treturn 0, err\n\t\t}\n\t}\n\treturn db.current.write(key, value)\n}", "title": "" }, { "docid": "a8b9221089269c1507182182a7fee961", "score": "0.5274386", "text": "func (this *XesRedis) setInfo(keyName string, keyParams []interface{}, cmd string, args []interface{}) {\n\tthis.keyName = keyName\n\tthis.keyParams = keyParams\n\tthis.key = this.handler.GetKey(this)\n\tthis.instance = this.handler.GetInstance(this)\n\tthis.cmd = cmd\n\tthis.args = args\n}", "title": "" }, { "docid": "5a4f63ef1305d60126c673fc7743c3ab", "score": "0.52672064", "text": "func (w *JsonKVWriter) Write(k interface{}, v interface{}) error {\n\tif err := w.keyw.Encode(k); err != nil {\n\t\treturn err\n\t}\n\n\tif _, err := w.w.Write(tab); err != nil {\n\t\treturn err\n\t}\n\n\treturn w.valuew.Encode(v)\n}", "title": "" }, { "docid": "779837b705ce6b111740627d295f65b3", "score": "0.5265693", "text": "func cb(prefix string, opaque interface{}, kvp *kvdb.KVPair, err error) error {\n\tc, ok := opaque.(*DataToKvdb)\n\tif !ok {\n\t\treturn errors.New(\"opaque value type is incorrect\")\n\t}\n\n\twd := new(DataWrite)\n\tif kvp != nil {\n\t\twd.Key = kvp.Key\n\t\twd.Value = kvp.Value\n\t}\n\twd.Type = c.Type\n\twd.Err = err\n\tselect {\n\tcase c.wd <- wd:\n\t\treturn nil\n\tcase <-c.ctx.Done():\n\t\treturn errors.New(\"context done\")\n\t}\n}", "title": "" }, { "docid": "357c075e7cce1015fc49be75ea7366e2", "score": "0.52653307", "text": "func writeData(w http.ResponseWriter, r *http.Request) {\n\n\tfmt.Println(\"Page hit : /writeData\")\n\n\tvar keys []string\n\tvar key, value, bucket string\n\n\tkeys = r.URL.Query()[\"key\"]\n\tkey = keys[0]\n\tfmt.Println(keys)\n\n\tkeys = r.URL.Query()[\"value\"]\n\tvalue = keys[0]\n\tfmt.Println(keys)\n\n\tkeys = r.URL.Query()[\"bucket\"]\n\tbucket = keys[0]\n\tfmt.Println(keys)\n\n\tdb.Update(func(tx *bolt.Tx) error {\n\t\tb := tx.Bucket([]byte(bucket))\n\t\terr := b.Put([]byte(key), []byte(value))\n\t\treturn err\n\t})\n}", "title": "" }, { "docid": "ceee40fe309a4c156cc46aac93ea1730", "score": "0.52479047", "text": "func execWrite(_ int, p *gop.Context) {\n\targs := p.GetArgs(2)\n\tret, ret1 := syscall.Write(args[0].(int), args[1].([]byte))\n\tp.Ret(2, ret, ret1)\n}", "title": "" }, { "docid": "3d6b0ced16cdea745f893f5359df5cf1", "score": "0.52357775", "text": "func WriteBuffer(verb string, key string, value interface{}, ttl int64) {\n\ttimeStamp := time.Now().Format(time.RFC850)\n\tvar event string\n\tif strings.Compare(verb, \"flush\") == 0 {\n\t\tevent = fmt.Sprintf(`{\"Time\":\"%s\", \"Verb\":\"%s\", \"Key\":\"NA\", \"Value\":\"NA\", \"TTL\":\"-1\"}`+\"\\n\", timeStamp, verb)\n\t} else {\n\t\tevent = fmt.Sprintf(`{\"Time\":\"%s\", \"Verb\":\"%s\", \"Key\":\"%s\", \"Value\":\"%s\", \"TTL\":\"%d\"}`+\"\\n\", timeStamp, verb, key, value, ttl)\n\t}\n\tbuffer.WriteString(event)\n}", "title": "" }, { "docid": "b1fda8832aded183d7b50cfda1c5171d", "score": "0.5220411", "text": "func (TestHelpers) WriteHandler(key, value []byte, err error) weave.Handler {\n\treturn writeHandler{\n\t\tkey: key,\n\t\tvalue: value,\n\t\terr: err,\n\t}\n}", "title": "" }, { "docid": "ec1ed12bd59f7172fd5c0a85bc05fe54", "score": "0.522018", "text": "func (kvFile *KvFile) Write(key string, value []byte) (err error) {\n\tmd, _ := newMetadata(currentVsn)\n\twriteEntryType(md, KeyWritten)\n\tif err = writeKeyMetadata(md, len(key)); err != nil {\n\t\treturn\n\t}\n\tif err = writeValueMetadata(md, len(value)); err != nil {\n\t\treturn\n\t}\n\n\t// Write to the buffer\n\twriter := bufio.NewWriterSize(kvFile.file, len(md)+len(key)+len(value))\n\tif _, err = writer.Write(md); err != nil {\n\t\treturn\n\t}\n\tif _, err = writer.WriteString(key); err != nil {\n\t\treturn\n\t}\n\tif _, err = writer.Write(value); err != nil {\n\t\treturn\n\t}\n\t// Flush buffer to file\n\tlocation, err := writeToFile(kvFile.file, writer, &kvFile.fileWriteMutex)\n\tif err != nil {\n\t\treturn\n\t}\n\n\t// Note that it is dangerous to update a map that could also be being read\n\t// https://stackoverflow.com/questions/36167200/how-safe-are-golang-maps-for-concurrent-read-write-operations\n\tkvFile.fileMapMutex.Lock()\n\tkvFile.fileMap[key] = location\n\tkvFile.fileMapMutex.Unlock()\n\treturn\n}", "title": "" }, { "docid": "0acabb4ec51f7fdd7433dc95fe840dbb", "score": "0.5198515", "text": "func (s *impl) Write(key string, val []byte) error {\n\tpath := \"projects/\" + s.proj + \"/configs/\" + s.cfg\n\tencoded := base64.StdEncoding.EncodeToString(val)\n\tv := runtimeconfig.Variable{\n\t\tName: path + \"/variables/\" + key,\n\t\tValue: encoded,\n\t\t// ForceSendFields will force value to be sent, even if empty.\n\t\tForceSendFields: []string{\"value\"},\n\t}\n\n\t// Create. If error, check error type, and maybe update.\n\t_, err := s.svc.Create(path, &v).Do()\n\tif err != nil {\n\t\t// If error is 'ALREADY_EXISTS', then we call update.\n\t\tapierr, ok := err.(*googleapi.Error)\n\t\tif ok && apierr.Message == \"Requested entity already exists\" {\n\t\t\tpath += \"/variables/\" + key\n\t\t\tv.Name = \"\"\n\t\t\t_, err = s.svc.Update(path, &v).Do()\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"rtc.Write %#v : unable to update variable : %v\", v, err)\n\t\t\t}\n\t\t} else {\n\t\t\treturn fmt.Errorf(\"rtc.Write %#v : unable to create variable : %v\", v, err)\n\t\t}\n\t}\n\treturn err\n}", "title": "" }, { "docid": "2d8e743000d7b4cbf41b57af34a1d918", "score": "0.51849616", "text": "func (fn textMapWriterFn) Set(key, val string) {\n\tfn(key, val)\n}", "title": "" }, { "docid": "977f0c74bdfbb8666eef76c1e9e1683d", "score": "0.51573783", "text": "func CreateKeyAndValue(hive reg.Key, keyPath string, keyObject string, keyValue interface{}) {\n // Create our key or see if it exists\n k, _, err := reg.CreateKey(hive, keyPath, reg.ALL_ACCESS)\n if err != nil {\n fmt.Println(err)\n return\n }\n // regardless if its new or created it we set it to our value\n defer k.Close()\n // switch on keyValue type to create different key type values\n switch v := keyValue.(type) {\n case string:\n keyValueSZ := keyValue.(string)\n k.SetStringValue(keyObject, keyValueSZ)\n case uint32:\n keyValueUI32 := keyValue.(uint32)\n k.SetDWordValue(keyObject, keyValueUI32)\n default:\n vstring := fmt.Sprintf(\"Info: %v\", v)\n fmt.Println(vstring)\n }\n}", "title": "" }, { "docid": "84a36fdbe6305347b7eeffe39502a487", "score": "0.51527804", "text": "func (t Txn) Put(key, val io.Reader, flags ...int) (err error) {\r\n\r\n\tvar r IRecord\r\n\tif r, err = t.ITxn.Open(key, or(flags...)|O_WRONLY); err != nil {\r\n\t\treturn\r\n\t}\r\n\r\n\tdefer r.Close()\r\n\r\n\tif _, err = io.Copy(r, val); err != nil {\r\n\t\treturn\r\n\t}\r\n\r\n\tif err = r.Flush(); err != nil {\r\n\t\treturn\r\n\t}\r\n\r\n\treturn\r\n}", "title": "" }, { "docid": "6d46d37645fd41c2084e8a2ebad8ac9e", "score": "0.5146327", "text": "func (s *runtimeStorage) writeValue(\n\taddress common.Address,\n\tkey string,\n\tvalue interpreter.OptionalValue,\n) {\n\tfullKey := StorageKey{\n\t\tAddress: address,\n\t\tKey: key,\n\t}\n\n\t// Only write the value to the cache.\n\t// The Cache is finally written back through the runtime interface in `writeCached`\n\n\tentry := s.cache[fullKey]\n\tentry.MustWrite = true\n\n\tswitch typedValue := value.(type) {\n\tcase *interpreter.SomeValue:\n\t\tentry.Value = typedValue.Value\n\n\tcase interpreter.NilValue:\n\t\tentry.Value = nil\n\n\tdefault:\n\t\tpanic(errors.NewUnreachableError())\n\t}\n\n\ts.cache[fullKey] = entry\n}", "title": "" }, { "docid": "46d1d1c0e3a8cd3d5f31ecba5376449c", "score": "0.51264703", "text": "func (kv *ShardKV) PutAppend(args *PutAppendArgs, reply *PutAppendReply) error {\n// Your code here.\n kv.mu.Lock()\n defer kv.mu.Unlock()\n if !kv.is_initialized(){\n\t\treturn nil\n\t}\n /*\n if kv.check_duplicates(args.OpId) {\n fmt.Println(\"for key : \", args.Key)\n reply.Err = OK\n return nil\n }\n*/\n if _,ok := kv.muSeq[args.Key] ; !ok {\n \t\t\tkv.muSeq[args.Key] = &sync.Mutex{}\n }\n kv.muSeq[args.Key].Lock()\n defer kv.muSeq[args.Key].Unlock()\n\t//This op number is already included in args, \n op := Op{ PUTAPPEND, nrand(),*args}\n kv.propose(op)\n result :=kv.evaluate()\n reply.Err = result.(PutAppendReply).Err\n fmt.Println(\"PUT REPLY : \" , reply.Err)\n\treturn nil\n}", "title": "" }, { "docid": "5a38e81c1acbd06715d22d8d03a19f38", "score": "0.5126104", "text": "func (w *Writer) Write(key string, value interface{}) error {\n\tif key == \"\" {\n\t\treturn errcode.ErrWriterRequiredKey\n\t}\n\n\tif value == nil {\n\t\treturn errcode.ErrWriterRequiredValue\n\t}\n\n\tif _, ok := w.Config[key]; ok {\n\t\treturn errors.Wrapf(errcode.ErrWriterAlreadyExistsKey, \"with key %q\", key)\n\t}\n\n\tif len(strings.Split(key, \".\")) != 2 {\n\t\treturn errors.Wrapf(errcode.ErrWriterInvalidKey, \"with key %q\", key)\n\t}\n\n\tr, ok := value.(provider.Resource)\n\tif !ok {\n\t\treturn errors.Wrapf(errcode.ErrWriterInvalidTypeValue, \"expected provider.Resource, found %T\", value)\n\t}\n\n\tabsAddr := addrs.AbsResourceInstance{\n\t\tModule: nil,\n\t\tResource: addrs.ResourceInstance{\n\t\t\tResource: addrs.Resource{\n\t\t\t\tMode: addrs.ManagedResourceMode,\n\t\t\t\tType: r.Type(),\n\t\t\t\tName: strings.Split(key, \".\")[1],\n\t\t\t},\n\t\t\tKey: nil,\n\t\t},\n\t}\n\n\tabsProviderConf := addrs.AbsProviderConfig{\n\t\tModule: nil,\n\t\tProviderConfig: addrs.ProviderConfig{\n\t\t\tType: addrs.NewLegacyProvider(r.Provider().String()),\n\t\t},\n\t}\n\n\tsrc, err := r.ResourceInstanceObject().Encode(r.ImpliedType(), uint64(r.TFResource().SchemaVersion))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tw.state.SetResourceInstanceCurrent(absAddr, src, absProviderConf)\n\n\tlog.Get().Log(\"func\", \"state.Write(State)\", \"msg\", \"writing to internal config\", \"key\", key, \"content\", r)\n\tw.Config[key] = r\n\n\treturn nil\n}", "title": "" }, { "docid": "08188d9f1601289a34973c8bc44a2440", "score": "0.5121332", "text": "func (t *Template) Write(out io.Writer, v Vars) {\n func_map := CloneFuncMap()\n func_map[\"val\"] = func(var_name string) string { return v[var_name] }\n\n t_exec := template.Must( template.New(\"\").Funcs(func_map).Parse(t.Content) )\n if err := t_exec.Execute(out, v); err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "7977a44086a260344853f3e6bb1f5ba7", "score": "0.5107175", "text": "func (h *hmacsha256) Write(p []byte) {\n\th.inner.Write(p)\n}", "title": "" }, { "docid": "7e951b99df983bed2d7dc46ecf04c3c7", "score": "0.51012176", "text": "func (t *SimpleChaincode) Write(stub *shim.ChaincodeStub, args []string) ([]byte, error) {\n\tvar name, value string // Entities\n\tvar err error\n\tfmt.Println(\"running write()\")\n\n\tif len(args) != 2 {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting 2. name of the variable and value to set\")\n\t}\n\n\tname = args[0] //rename for funsies\n\tvalue = args[1]\n\terr = stub.PutState(name, []byte(value)) //write the variable into the chaincode state\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn nil, nil\n}", "title": "" }, { "docid": "6d5994aca251ea274a0b34991015ba99", "score": "0.5094533", "text": "func (t *SimpleChaincode) Write(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\tvar name, value string // Entities\n\tvar err error\n\tfmt.Println(\"running write()\")\n\n\tif len(args) != 2 {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting 2. name of the variable and value to set\")\n\t}\n\n\tname = args[0] //rename for funsies\n\tvalue = args[1]\n\terr = stub.PutState(name, []byte(value)) //write the variable into the chaincode state\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn nil, nil\n}", "title": "" }, { "docid": "8aedaac4d85fd32e0b34224cb5cd61f5", "score": "0.5093951", "text": "func (TestHelpers) WriteDecorator(key, value []byte, after bool) weave.Decorator {\n\treturn writeDecorator{\n\t\tkey: key,\n\t\tvalue: value,\n\t\tafter: after,\n\t}\n}", "title": "" }, { "docid": "e51993ed3637854f598a1f9fad4054fa", "score": "0.50855005", "text": "func (fs *FileStore) Write(key string, value []byte, d time.Duration) error {\n\te := &entry{Value: value}\n\tif d > 0 {\n\t\te.Expiration = time.Now().Add(d).UnixNano()\n\t}\n\n\treturn ioutil.WriteFile(fs.filename(key), fs.encode(e), 0644)\n}", "title": "" }, { "docid": "e125d0aaa412aa19329df9e069503e21", "score": "0.50843894", "text": "func (param *Parameters) write(fileName string) {\n\tconfDir := param.configDir()\n\tif err := os.MkdirAll(confDir, os.ModePerm); err != nil {\n\t\tpanic(err)\n\t}\n\tf, _ := os.Create(confDir + fileName)\n\tj, _ := json.MarshalIndent(param, \"\", \" \")\n\tparam.println()\n\tf.Write(j)\n}", "title": "" }, { "docid": "860fddff1d38990ae8f54ab8bec9ff13", "score": "0.5065306", "text": "func (s *EventDB) WritetoDB(k string, v string) error {\n if s.eventDB != nil{\n s.Err = nil\n s.Err = s.eventDB.Update(func (trx *db.Txn) error{\n ne := db.NewEntry([]byte(k), []byte(v))\n err := trx.SetEntry(ne)\n if err != nil {\n glog.Errorf(\"Write operation failed with err: %s\\n\", s.Err)\n }\n return err\n })\n return s.Err\n }\n return errors.New(\"Event DB does not exist\")\n}", "title": "" }, { "docid": "266dcaf84e6a2e81317a406b637cece6", "score": "0.5063107", "text": "func (ctx context) writeToBuf(buf *bytes.Buffer) {\n\tif len(ctx.keyvals) == 0 {\n\t\treturn\n\t}\n\t// kv.List.MarshalText does not return a non-nil error.\n\tb, _ := kv.List(ctx.keyvals).MarshalText()\n\tif buf.Len() > 0 {\n\t\tbuf.WriteRune(' ')\n\t}\n\tbuf.Write(b)\n}", "title": "" }, { "docid": "2ebc8e1d0e05ff004a8832ae27bd51b3", "score": "0.50489885", "text": "func Write(exp string, obj, value interface{}) error {\n\texps, err := Parse(exp)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn exps.Write(obj, value)\n}", "title": "" }, { "docid": "72808dbb9ba8f271e72d604426af32e4", "score": "0.50478244", "text": "func (t *SimpleChaincode) Write(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\tvar name, value string // Entities\n\tvar err error\n\tfmt.Println(\"running write()\")\n\n\tif len(args) != 2 {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting 2. name of the variable and value to set\")\n\t}\n\n\tname = args[0]\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t//rename for funsies\n\tvalue = args[1]\n\terr = stub.PutState(name, []byte(value))\t\t\t\t\t\t\t\t//write the variable into the chaincode state\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn nil, nil\n}", "title": "" }, { "docid": "979424700c8dc2ab4d671d952f817814", "score": "0.5043497", "text": "func (lvl UplevelLogger) DataKV(context interface{}, function string, key string, value interface{}) {\n\tif lvl.l.level() >= LevelOutput {\n\t\tlvl.up.DataKV(context, function, key, value)\n\t}\n}", "title": "" }, { "docid": "8aa2a84c2759686111cc1e6a42ffaffd", "score": "0.50380164", "text": "func (b *Buffer) Write(key, value []byte, timestamp time.Time) {\n\tif b == nil || !b.entryCloser.AddRunning() {\n\t\treturn\n\t}\n\tdefer b.entryCloser.Done()\n\tindex := b.getShardIndex(key)\n\tif b.log.Debug().Enabled() {\n\t\tb.log.Debug().Uint64(\"shard\", index).Bytes(\"key\", key).\n\t\t\tTime(\"ts\", timestamp).Msg(\"route a shard\")\n\t}\n\tb.buckets[index].writeCh <- operation{key: key, value: value, epoch: uint64(timestamp.UnixNano())}\n}", "title": "" }, { "docid": "cba00d1648745ba2a7f70a56d026f0e7", "score": "0.5034918", "text": "func tcJSONPutString(eng *Engine, index int64, args []uint64) (uint64, error) {\n\tapp, _ := eng.RunningAppFrame()\n\tvmem := app.VM.VMemory()\n\n\troot := int(args[0])\n\tkey, err := vmem.GetString(args[1])\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\tval, err := vmem.GetString(args[2])\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\n\tobj := eng.jsonCache[root]\n\tobj[string(key)], err = json.Marshal(string(val))\n\tif err != nil {\n\t\teng.logger.Error(\" TC_JSONPutString\", \"key\", string(key), \"val\", string(val), \"err\", err)\n\t\treturn 0, err\n\t}\n\treturn 0, nil\n}", "title": "" }, { "docid": "cbdf30a8b4447c95362202ac4d4336e9", "score": "0.5020457", "text": "func (ck *Clerk) Put(key string, value string) {\n ck.PutAppend(key, value, \"Put\")\n}", "title": "" }, { "docid": "9a0550c6c1bffa83e7588f203a5d64a4", "score": "0.5014662", "text": "func (a Archive) Write(key string, value []byte) bool {\n\tcstr := C.CString(key)\n\tdefer C.free(unsafe.Pointer(cstr))\n\tcsize := C.size_t(len(value))\n\treturn C.archive_write(a, cstr, unsafe.Pointer(&value[0]), csize) != 0\n}", "title": "" }, { "docid": "7bc4f53ead7850a42dbf99f374a5858f", "score": "0.49830756", "text": "func setSomethingNew(content string, key string, newValue string) {\n\tnewContent := content + \"\\n\" + key + \"=\" + newValue\n\twriteFile(newContent)\n\n\tfmt.Println(\"A new\", key, \"has been inserted with value:\", newValue)\n}", "title": "" }, { "docid": "c8335dfccd2299c5bfa1b04cc93f280d", "score": "0.49732718", "text": "func (writer *DefaultWriter) write(level LevelType, args ...interface{}) {}", "title": "" }, { "docid": "d6282e2dabe8a8989be63f7f21ae9f88", "score": "0.49634337", "text": "func writeConfigurationData(sdk SDKProperties, key string, value string) error {\n\targs := []string{\"config\", \"set\", \"--level\", \"global\", key, value}\n\tif output, err := sdk.RunFFX(args, false); err != nil {\n\t\treturn fmt.Errorf(\"Error writing %v = %v: %v %v\", key, value, err, output)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "10b73ea696a660ba117cee40d8eb1088", "score": "0.49532148", "text": "func (service Service) Write(key string, data []byte) error {\n\tif key == \"\" {\n\t\treturn fmt.Errorf(\"key must be a nonempty string\")\n\t}\n\n\tparams := &s3.PutObjectInput{\n\t\tBucket: aws.String(service.bucketSource), // Required\n\t\tKey: aws.String(key), // Required\n\t\tACL: aws.String(s3.ObjectCannedACLPublicRead),\n\t\tContentType: aws.String(mime.TypeByExtension(path.Ext(key))),\n\t\tBody: bytes.NewReader(data),\n\t}\n\n\t_, err := service.instance.PutObject(params)\n\treturn err\n}", "title": "" }, { "docid": "23d94c329f42bc9f98255aa3eff535ee", "score": "0.49451926", "text": "func (f *Plain) write(writer io.Writer, value interface{}) {\n\tv, err := sprint(value)\n\tif err != nil {\n\t\tmultilog.Log(logging.ErrorNoStacktrace, rollbar.Error)(\"Could not sprint value: %v, error: %v, stack: %s\", value, err, stacktrace.Get().String())\n\t\tf.writeNow(f.cfg.ErrWriter, fmt.Sprintf(\"[ERROR]%s[/RESET]\", locale.Tr(\"err_sprint\", err.Error())))\n\t\treturn\n\t}\n\tf.writeNow(writer, v)\n}", "title": "" }, { "docid": "c100e9a226f05df1a80c2856dd397b65", "score": "0.4937754", "text": "func write(store, key string, m packets.ControlPacket) {\n\ttemppath := tmppath(store, key)\n\tf, err := os.Create(temppath)\n\tchkerr(err)\n\twerr := m.Write(f)\n\tchkerr(werr)\n\tcerr := f.Close()\n\tchkerr(cerr)\n\trerr := os.Rename(temppath, fullpath(store, key))\n\tchkerr(rerr)\n}", "title": "" }, { "docid": "adcd5335511b810e8721486989b3a625", "score": "0.4922604", "text": "func (v *Vault) Write(path string, data map[string]interface{}) error {\n\tbody := make(map[string]interface{})\n\n\t// Decode the base64 values\n\tfor k, v := range data {\n\t\tstringv, ok := v.(string)\n\t\tif ok {\n\t\t\tb, err := base64.StdEncoding.DecodeString(stringv)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tbody[k] = string(b)\n\t\t} else {\n\t\t\tbody[k] = v\n\t\t}\n\t}\n\n\tsecret, err := v.c.Logical().Write(path, body)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif secret == nil {\n\t\treturn nil\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "90b88b60d91428af163b104a61033b5e", "score": "0.49212578", "text": "func writeHeader(w io.Writer, k string, v string) (n int64, err error) {\n\tnThis, err := w.Write([]byte(k))\n\tn += int64(nThis)\n\tif err != nil {\n\t\treturn\n\t}\n\tnThis, err = w.Write([]byte{':'})\n\tn += int64(nThis)\n\tif err != nil {\n\t\treturn\n\t}\n\tnThis64, err := writeHeaderValue(len(k)+1, w, v)\n\tn += nThis64\n\treturn\n}", "title": "" }, { "docid": "a25178f3381dc5b7ac2835039a84a7c4", "score": "0.49134964", "text": "func writeData(w http.ResponseWriter, r *http.Request) {\n\n\tfmt.Println(\"Page hit : /writeData\")\n\tvar key, value string\n\n\t// open the specified DB\n\tif dbPath := r.URL.Query()[\"db\"]; len(dbPath) > 1 {\n\t\tdb, err = buntdb.Open(dbPath[0])\n\t\t// log error\n\t\tif err != nil {\n\t\t\tlog.Println(err)\n\t\t}\n\t\tdefer db.Close()\n\t}\n\n\t// get key\n\tif keys := r.URL.Query()[\"key\"]; len(keys) > 1 {\n\t\tkey = keys[0]\n\t}\n\n\t// get value\n\tif values := r.URL.Query()[\"value\"]; len(values) > 1 {\n\t\tvalue = values[0]\n\t}\n\n\t// Write data\n\terr = db.Update(func(tx *buntdb.Tx) error {\n\t\t_, done, err := tx.Set(key, value, nil)\n\n\t\tif err != nil {\n\t\t\tlog.Println(err)\n\t\t\treturn err\n\t\t}\n\n\t\tif done {\n\n\t\t\tif _, err = w.Write([]byte(\"Successfully set new value to DB\")); err != nil {\n\t\t\t\tlog.Println(err)\n\t\t\t}\n\t\t} else {\n\n\t\t\tif _, err = w.Write([]byte(\"write failed\")); err != nil {\n\t\t\t\tlog.Println(err)\n\t\t\t}\n\t\t}\n\t\treturn err\n\t})\n\t// Variable to check save success\n\twriteSuccess := false\n\tbody, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\t// Unmarshal\n\tvar data Data\n\terr = json.Unmarshal(body, &data)\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n\tfmt.Println(data.Key, data.Value)\n\tif data.Key != \"\" {\n\t\t// Write data\n\t\terr = db.Update(func(tx *buntdb.Tx) error {\n\t\t\t_, _, err := tx.Set(data.Key, data.Value, nil)\n\t\t\treturn err\n\t\t})\n\t\tif err != nil {\n\t\t\tfmt.Println(err)\n\t\t} else {\n\t\t\twriteSuccess = true\n\t\t}\n\t}\n\t// Response\n\tif writeSuccess {\n\t\tresponse.Body = \"SUCCESSFUL\"\n\t} else {\n\t\tresponse.Body = \"FAILED\"\n\t}\n\t// Marshal response\n\tjsonResponse, err := json.Marshal(response)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\t// Sending response\n\tw.Write(jsonResponse)\n}", "title": "" }, { "docid": "1392154d2c455b5a887bba724be7094e", "score": "0.49017915", "text": "func (f JSONWriterFunc) Write(v interface{}, status int) {\n\tf(v, status)\n}", "title": "" }, { "docid": "11b5db97f3fe0b3df31c3cde76c4bdb9", "score": "0.48998424", "text": "func (s *Secret) Write(path string, data map[string]interface{}) (*vault.Secret, error) {\n\treturn s.v.Write(pathPrefix+path, data)\n}", "title": "" }, { "docid": "2a3e62b2a509df11d6c581853bd2561f", "score": "0.48950022", "text": "func writeKeyToFile(keyBytes []byte, saveFileTo string) error {\n err := ioutil.WriteFile(saveFileTo, keyBytes, 0600)\n if err != nil {\n return err\n }\n\n log.Printf(\"Key saved to: %s\", saveFileTo)\n return nil\n}", "title": "" }, { "docid": "1403fbff03904f6b40d5b5132af98dfb", "score": "0.48937106", "text": "func execmWriterWrite(_ int, p *gop.Context) {\n\targs := p.GetArgs(2)\n\tret, ret1 := args[0].(*flate.Writer).Write(args[1].([]byte))\n\tp.Ret(2, ret, ret1)\n}", "title": "" }, { "docid": "23b8a0052b9d3814ada28bb4da7529c6", "score": "0.48870966", "text": "func (ck *Clerk) Put(key string, value string) {\n\n // Your code here.\n args := &PutArgs{}\n args.Key, args.Value = key, value\n var reply PutReply\n// var i uint\n for {\n //fmt.Println(\"ck:get call vs.pri and pb.put\")\n prisrv := ck.vs.Primary();\n if prisrv == \"\" {\n //i++\n //if( i== 4000) {\n //fmt.Println(\"ck:put pri is NULL\")\n //i=0\n //}\n continue\n }\n if call(prisrv, \"PBServer.Put\", args, &reply){\n if reply.Err==OK {\n //fmt.Printf(\"ck.put %t OK\\n\",args) \n return\n } else {\n //fmt.Printf(\"ERR: ck.put %t \\n\",reply) \n }\n }\n }\n}", "title": "" }, { "docid": "f78769ba69eb36d6b41817dd55bc5559", "score": "0.4866261", "text": "func (p Params) Write(w io.Writer) error {\n\tfor key, value := range p {\n\t\tkeyLen := len(key)\n\t\tvalueLen := len(value)\n\n\t\tif keyLen > 255 || valueLen > 255 {\n\t\t\tcontinue\n\t\t}\n\n\t\terr := binary.Write(w, binary.BigEndian, byte(keyLen))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\terr = binary.Write(w, binary.BigEndian, byte(valueLen))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t_, err = w.Write([]byte(key))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t_, err = w.Write([]byte(value))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "372e5ded9698f529dacdffbccf466e2f", "score": "0.48638985", "text": "func (*dryRunDB) Set(bucket, key, value []byte) error { return nil }", "title": "" }, { "docid": "bbb7ea6a9c5a8d10afc0c55ddec2f06e", "score": "0.48579633", "text": "func (c cassandra) Write(rec Record) error {\n\tif rec.Type == INTERMEDIATE {\n\t\treturn c.writeIntermediate(rec.Key, rec.Value, rec.ExpTime)\n\t}\n\tquery := fmt.Sprintf(writeQuery, rec.Type, rec.Key, string(rec.Value), rec.ExpTime)\n\terr := c.session.Query(query).Exec()\n\treturn err\n}", "title": "" }, { "docid": "600b0526c2b4884434fc3f5f65ed19ea", "score": "0.48573455", "text": "func (kv *DisKV) ExecutePutAppend(pxOp Op) {\n\top, key, value, reqID := pxOp.Operation, pxOp.Key, pxOp.Value, pxOp.ReqID\n\tswitch op {\n\tcase Put:\n\t\tkv.database[key] = value\n\tcase Append:\n\t\tkv.database[key] += value\n\t}\n\tkv.filePut(key2shard(key), key, kv.database[key])\n\tDPrintf(\"%d KV execute %s for reqID: %s, opID: %s, key: %s, value: %s, database: %v\\n\", kv.me, op, reqID, pxOp.OpID, key, value, kv.database)\n}", "title": "" }, { "docid": "7f9dd5e33d684c5916f008f254c5aab2", "score": "0.48532668", "text": "func user_add() {\n\tclient := pb.NewKVClient(conn)\n\tvar k string\n\tvar v string\n\n\tfmt.Printf(\"Write The key : \")\n\tfmt.Scanf(\"%s\", &k)\n\n\tfmt.Printf(\"Write The value : \")\n\tfmt.Scanf(\"%s\", &v)\n\t\n\tin := &pb.KeyValue{Key: k, Value: v}\n\tstream, err := client.Add(context.Background(), in)\n\tif err != nil {\n\t\tlog.Fatalf(\"openn stream error %v\", err)\n\t}\n\n\t//ctx := stream.Context()\n\tfunc() {\n\t\tfor {\n\t\t\tresp, err := stream.Recv()\n\t\t\tif err == io.EOF {\n\t\t\t\treturn\n\t\t\t}\n\t\t\tif err != nil {\n\t\t\t\tlog.Fatalf(\"can not receive %v\", err)\t\t\t\n\t\t\t} \n\t\t\tlog.Printf(\"Resp received: %s\", resp.Value)\n\t\t\tbreak\n\t\t}\n\t\tlog.Printf(\"finished\")\n\t}()\t\n}", "title": "" }, { "docid": "84f65d2b406bfc1f888d5353a9eed707", "score": "0.4850907", "text": "func (w *StdWriter) write(i []byte) {\n\tw.fn(i)\n}", "title": "" }, { "docid": "f5b592df8ba32b98fb87d7b9fc28fbb1", "score": "0.48434064", "text": "func (s *Store) set(table kvdb.KeyValueStore, key []byte, val interface{}) {\n\tbuf, err := rlp.EncodeToBytes(val)\n\tif err != nil {\n\t\ts.Log.Crit(\"Failed to encode rlp\", \"err\", err)\n\t}\n\n\tif err := table.Put(key, buf); err != nil {\n\t\ts.Log.Crit(\"Failed to put key-value\", \"err\", err)\n\t}\n}", "title": "" }, { "docid": "68e7df8a4b049c9a8aaf830c0310508c", "score": "0.48290715", "text": "func Data(key string, value interface{}) string {\n\treturn fmt.Sprintf(\"%s|%s\", key, value)\n}", "title": "" }, { "docid": "8fe31ca9753d7ce2b846810c64853b78", "score": "0.4827358", "text": "func WriteParams(client *redis.Client, DefaultParams UserInput) error {\n\tjson, err := json.Marshal(DefaultParams)\n\tcheck(err)\n\terr = client.Set(\"PARAMS\", json, 0).Err()\n\tcheck(err)\n\treturn err\n}", "title": "" }, { "docid": "04c68e66ccefc33a7a80b4c062d4ff50", "score": "0.48270234", "text": "func (t Txn) Post(key io.ReadWriter, val io.Reader, flags ...int) (err error) {\r\n\tif _, err = io.Copy(key, rand.Reader); err != nil {\r\n\t\treturn\r\n\t}\r\n\r\n\tvar r IRecord\r\n\tif r, err = t.ITxn.Open(key, or(flags...)|O_WRONLY); err != nil {\r\n\t\treturn\r\n\t}\r\n\r\n\tdefer r.Close()\r\n\r\n\tif _, err = io.Copy(r, val); err != nil {\r\n\t\treturn\r\n\t}\r\n\r\n\tif err = r.Flush(); err != nil {\r\n\t\treturn\r\n\t}\r\n\r\n\treturn\r\n}", "title": "" }, { "docid": "3f9a89f09f98645c8f7d88d1386de62a", "score": "0.48269546", "text": "func writeFunSig(w io.Writer, objs *outObjs, s *FunSig) {\n\twriteString(w, s.Sel)\n\twriteInt(w, len(s.Parms))\n\tfor i := range s.Parms {\n\t\twriteVar(w, objs, &s.Parms[i])\n\t}\n\twriteBool(w, s.Ret != nil)\n\tif s.Ret != nil {\n\t\twriteInt(w, getTypeNum(objs, s.Ret.Type))\n\t}\n\twriteBool(w, s.typ != nil)\n\tif s.typ != nil {\n\t\twriteInt(w, getTypeNum(objs, s.typ))\n\t}\n}", "title": "" }, { "docid": "37783d4a5297d7babc9f3041d2c8469e", "score": "0.48262608", "text": "func (kv *ShardKV) PutAppend(args *PutAppendArgs, reply *PutAppendReply) error {\n\t// Your code here.\n\tkv.mu.Lock()\n\tdefer kv.mu.Unlock()\n\n\top := Op{\n\t\tType: args.Op,\n\t\tKey: args.Key,\n\t\tClient: args.Me,\n\t\tValue: args.Value,\n\t\tSeq: args.Seq,\n\t}\n\n\treply.Err = kv.process(op)\n\n\tDPrintf(\"%d %s %s:%s %s\", kv.me, args.Op, args.Key, args.Value, reply.Err)\n\treturn nil\n}", "title": "" }, { "docid": "db40e331f096124483369bc87103a264", "score": "0.48255205", "text": "func (ctx *RpcContext) Write(v interface{}) error {\n\tdata, err := DefaultCodec.Marshal(v)\n\tif err != nil {\n\t\treturn err\n\t}\n\tmsg := NewRpcMessage(ctx.message.Cmd(), ctx.message.Ext(), data)\n\tdata = msg.Encrypt(ctx.client.SendSeq(), ctx.client.SendKey(), ctx.client.cipher)\n\treturn ctx.client.pushDataSync(data)\n}", "title": "" }, { "docid": "ee79e4244baa367bda76a3815906a3f6", "score": "0.4825406", "text": "func (c *Client) Write(cmd, param string) {\n\tdata := fmt.Sprintf(\"%v%v\\r\", cmd, param)\n\tc.conn.Write([]byte(data))\n}", "title": "" }, { "docid": "f6191d4a5c7d9b196337cda370265a56", "score": "0.4825383", "text": "func kvToString(L *lua.LState) int {\n\tL.Push(lua.LString(\"keyvalue\"))\n\treturn 1 // Number of returned values\n}", "title": "" }, { "docid": "7240347bc67a220b49a940ba9ec8c035", "score": "0.48232082", "text": "func (w *SSTFileWriter) Put(key, value []byte) (err error) {\n\tcKey := byteToChar(key)\n\tcValue := byteToChar(value)\n\tvar cErr *C.char\n\tC.rocksdb_sstfilewriter_put(w.c, cKey, C.size_t(len(key)), cValue, C.size_t(len(value)), &cErr)\n\terr = fromCError(cErr)\n\treturn\n}", "title": "" }, { "docid": "e18d6857c8f15fc656ab24c4abc970b6", "score": "0.4821912", "text": "func SET(args [][]byte, txn *mdb.Txn) ([]byte, error) {\n\tif err := checkExactArgs(args, 2, \"set\"); err != nil {\n\t\treturn redis.WrapStatus(err.Error()), nil\n\t}\n\n\tkey := args[0]\n\tval := args[1]\n\tdbi, err := dbwrap.GetDBI(txn, mdb.CREATE)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\terr = txn.Put(dbi, key, dbwrap.BuildString(0, val), 0)\n\tif err != nil {\n\t\treturn redis.WrapStatus(err.Error()), nil\n\t}\n\treturn redis.WrapStatus(\"OK\"), txn.Commit()\n}", "title": "" } ]
ebb2a1f2bfd055df1a4e6f2b9ba143d9
NewDefaultService will create a new NLP instance with default arguments
[ { "docid": "6a3374aa906417361ac40fb9d14d4876", "score": "0.7812978", "text": "func NewDefaultService() *NLP {\n\treturn &NLP{\n\t\tLanguage: \"en-US\",\n\t\tURL: \"https://api.languagetool.org/v2/\",\n\t}\n}", "title": "" } ]
[ { "docid": "4a34b450dd08356e83cfa2d5c31c76f7", "score": "0.6598436", "text": "func NewService(url, language string) *NLP {\n\treturn &NLP{\n\t\tLanguage: language,\n\t\tURL: url + \"/v2/\",\n\t}\n}", "title": "" }, { "docid": "1aa01bf503b0bdf4cfb31125ccbd7f48", "score": "0.621271", "text": "func NewDefaultService(r Repository, v Validator) *DefaultService {\n\treturn &DefaultService{\n\t\trepo: r,\n\t\tvalid: v,\n\t}\n}", "title": "" }, { "docid": "79464a412b8e07294fdf914417a18331", "score": "0.60482436", "text": "func NewDefaultService(repo Repository) *DefaultService {\n\treturn &DefaultService{repo: repo}\n}", "title": "" }, { "docid": "f52e2417db516391b802e08d1c30c50c", "score": "0.6006163", "text": "func DefaultService(repo documents.Repository, processor coredocumentprocessor.Processor, anchorRepository anchors.AnchorRepository) Service {\n\treturn service{repo: repo, coreDocProcessor: processor, notifier: &notification.WebhookSender{}, anchorRepository: anchorRepository}\n}", "title": "" }, { "docid": "870a85c3528009dc591b64713dead125", "score": "0.6001069", "text": "func DefaultService(\n\tsrv documents.Service,\n\trepo repository,\n\tqueueSrv queue.TaskQueuer,\n\tjobManager jobs.Manager,\n\tfactory identity.Factory,\n\tanchorSrv anchors.Service,\n) Service {\n\treturn service{\n\t\trepo: repo,\n\t\tqueueSrv: queueSrv,\n\t\tjobManager: jobManager,\n\t\tService: srv,\n\t\tfactory: factory,\n\t\tanchorSrv: anchorSrv,\n\t}\n}", "title": "" }, { "docid": "a4e10261bc8ee9d5d64dda4658a15af0", "score": "0.59520274", "text": "func DefaultService(config config.Configuration, repo documents.Repository, processor coredocument.Processor, anchorRepository anchors.AnchorRepository, identityService identity.Service) Service {\n\treturn service{config: config, repo: repo, coreDocProcessor: processor, notifier: notification.NewWebhookSender(config), anchorRepository: anchorRepository, identityService: identityService}\n}", "title": "" }, { "docid": "74c6f20718c31835e016c44f79fd0a3c", "score": "0.5867303", "text": "func New(guid string) *Service {\n\tif guid == \"\" {\n\t\tguid = defGuid\n\t}\n\treturn &Service{Guid: guid, Lang: \"en\"}\n}", "title": "" }, { "docid": "fa9b17f9b47a2966e1283bb02dc915e3", "score": "0.5811168", "text": "func DefaultService() Service {\n\treturn NewService(DefaultData())\n}", "title": "" }, { "docid": "fa9b17f9b47a2966e1283bb02dc915e3", "score": "0.5811168", "text": "func DefaultService() Service {\n\treturn NewService(DefaultData())\n}", "title": "" }, { "docid": "c1ef60360015164fa8edb8e3383267fc", "score": "0.57431704", "text": "func NewDefault(m map[string]interface{}, _ *grpc.Server) (rgrpc.Service, error) {\n\tc := &config{}\n\tif err := mapstructure.Decode(m, c); err != nil {\n\t\terr = errors.Wrap(err, \"error decoding conf\")\n\t\treturn nil, err\n\t}\n\n\tgatewaySelector, err := pool.GatewaySelector(sharedconf.GetGatewaySVC(c.GatewayAddr))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tsharingCollaborationSelector, err := pool.SharingCollaborationSelector(sharedconf.GetGatewaySVC(c.UserShareProviderEndpoint))\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"sharesstorageprovider: error getting UserShareProvider client\")\n\t}\n\n\treturn New(gatewaySelector, sharingCollaborationSelector)\n}", "title": "" }, { "docid": "efeb4aff0d579f4e785f32e2271d053e", "score": "0.57326806", "text": "func newDefaultBackendService() *BackendService {\n\treturn &BackendService{\n\t\tService: Service{\n\t\t\tType: aws.String(BackendServiceType),\n\t\t},\n\t\tBackendServiceConfig: BackendServiceConfig{\n\t\t\tTaskConfig: TaskConfig{\n\t\t\t\tCPU: aws.Int(256),\n\t\t\t\tMemory: aws.Int(512),\n\t\t\t\tCount: aws.Int(1),\n\t\t\t},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "dc96c97f300c0e6da186f37971ed9c2f", "score": "0.570175", "text": "func NewDefault() (srv *Server, err error) {\n\tcfg := config.DefaultConfig()\n\tcl, err := client.New(cfg)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tsrv = New(cfg, cl)\n\n\treturn\n}", "title": "" }, { "docid": "e8e56f5602f7a10cdd4583221d5653f6", "score": "0.5681708", "text": "func NewDefault(base string, options ...Option) (Interface, error) {\n\tdo := &defaultOpener{\n\t\tbase: base,\n\t\tt: http.DefaultTransport,\n\t\tauth: authn.Anonymous,\n\t\tnamer: identity,\n\t}\n\n\tfor _, option := range options {\n\t\tif err := option(do); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn do.Open()\n}", "title": "" }, { "docid": "9508f4be42564a052051c6f05b076d5d", "score": "0.55820894", "text": "func NewDefault() *Engine {\n\tc := sql.NewCatalog()\n\ta := analyzer.NewDefault(c)\n\n\treturn New(c, a, nil)\n}", "title": "" }, { "docid": "d7da54c82e3f34a384078d09337ea739", "score": "0.5569899", "text": "func newDefaultConf() (*wordsConf, error) {\n\tif defaultConfErr != nil {\n\t\treturn nil, defaultConfErr\n\t}\n\treturn newConf(defaultConf)\n}", "title": "" }, { "docid": "a55885429cd51d239a1c108fdbb8e496", "score": "0.5555085", "text": "func DefaultNew() (*Workspace, error) {\n\treturn New(nil, nil)\n}", "title": "" }, { "docid": "643165f99f025b5d86c26fbf4e61ba36", "score": "0.5516307", "text": "func New(keys KeyRepository, idp IdentityProvider, tokenizer Tokenizer) Service {\n\treturn &service{\n\t\ttokenizer: tokenizer,\n\t\tkeys: keys,\n\t\tidp: idp,\n\t}\n}", "title": "" }, { "docid": "7a091cd79a5a53f45481aac1066a6716", "score": "0.54948264", "text": "func New(lg newlog.Logger, repo Repo.Repository, opt ...Option) (Service, error) {\n\ts := sampleService{\n\t\tLogger: lg,\n\t\tRepository: repo,\n\t\tconWrkrs: 1,\n\t}\n\n\tfor _, op := range opt {\n\t\top(&s)\n\t}\n\n\t/* Create Async Workers for Create operation */\n\ts.createCh = make(chan (CreateRequest), s.conWrkrs)\n\tfor i := 0; i < s.conWrkrs; i++ {\n\t\tgo s.crWorkers()\n\t}\n\n\t//Setup Middleware\n\tsvc := ErrorMiddleware(lg, s.er)(&s)\n\tsvc = InstrumentingMiddleware(s.createCnt, s.listCnt)(svc)\n\n\ts.Infow(context.Background(), \"Action\", \"NewService\", \"msg\", \"created new service type\")\n\treturn svc, nil\n}", "title": "" }, { "docid": "1ff7d3649e4f129a00c2c22275e0f041", "score": "0.54757315", "text": "func New() Service {\n\treturn Service{}\n}", "title": "" }, { "docid": "9ad1e386155d23022eec93cc54fe1d57", "score": "0.54577476", "text": "func newOPMLService(sling *sling.Sling) *OPMLService {\n\treturn &OPMLService{\n\t\tsling: sling,\n\t}\n}", "title": "" }, { "docid": "d4af749131d15cec24536131740adba2", "score": "0.54511935", "text": "func New() *Service {\n\treturn &Service{\n\t\tProfile: \"default\",\n\t}\n}", "title": "" }, { "docid": "a556d98b2806e2beea4b0ee7c13b98ce", "score": "0.5446607", "text": "func NewNewService(name string) Gen {\n\tgs := &NewService{\n\t\tname: name,\n\t\tinterfaceName: utils.ToCamelCase(name + \"Service\"),\n\t\tdestPath: fmt.Sprintf(viper.GetString(\"gk_service_path_format\"), utils.ToLowerSnakeCase(name)),\n\t}\n\tgs.filePath = path.Join(gs.destPath, viper.GetString(\"gk_service_file_name\"))\n\tgs.srcFile = jen.NewFilePath(strings.Replace(gs.destPath, \"\\\\\", \"/\", -1))\n\tgs.InitPg()\n\tgs.fs = fs.Get()\n\treturn gs\n}", "title": "" }, { "docid": "863620e5a8269a6276e07f478cdee0d7", "score": "0.5425411", "text": "func GenDefaultCreateServiceRequest(platform string, region string, azs []string, cluster string,\n\tservice string, res *common.Resources, opts *catalog.CatalogCouchDBOptions) *manage.CreateServiceRequest {\n\t// generate service configs\n\tserviceCfgs := genServiceConfigs(platform, cluster, service, azs, opts)\n\n\t// generate service ReplicaConfigs\n\treplicaCfgs := genReplicaConfigs(platform, cluster, service, azs, opts)\n\n\tportMappings := []common.PortMapping{\n\t\t{ContainerPort: httpPort, HostPort: httpPort, IsServicePort: true},\n\t\t{ContainerPort: sslPort, HostPort: sslPort, IsServicePort: true},\n\t}\n\tif opts.Replicas != int64(1) {\n\t\tm := common.PortMapping{ContainerPort: localPort, HostPort: localPort}\n\t\tportMappings = append(portMappings, m)\n\t\tm = common.PortMapping{ContainerPort: erlangClusterPort, HostPort: erlangClusterPort}\n\t\tportMappings = append(portMappings, m)\n\n\t\tfor i := int64(erlangClusterListenPortMin); i <= int64(erlangClusterListenPortMax); i++ {\n\t\t\tm = common.PortMapping{ContainerPort: i, HostPort: i}\n\t\t\tportMappings = append(portMappings, m)\n\t\t}\n\t}\n\n\treq := &manage.CreateServiceRequest{\n\t\tService: &manage.ServiceCommonRequest{\n\t\t\tRegion: region,\n\t\t\tCluster: cluster,\n\t\t\tServiceName: service,\n\t\t\tCatalogServiceType: common.CatalogService_CouchDB,\n\t\t},\n\n\t\tResource: res,\n\n\t\tServiceType: common.ServiceTypeStateful,\n\n\t\tContainerImage: ContainerImage,\n\t\tReplicas: opts.Replicas,\n\t\tPortMappings: portMappings,\n\t\tRegisterDNS: true,\n\n\t\tServiceConfigs: serviceCfgs,\n\n\t\tVolume: opts.Volume,\n\t\tContainerPath: common.DefaultContainerMountPath,\n\n\t\tReplicaConfigs: replicaCfgs,\n\t}\n\treturn req\n}", "title": "" }, { "docid": "10415e4b290412362566dc229c7f484d", "score": "0.54007226", "text": "func New(service *texttospeech.Client) *Service {\n\tplayerCtx, err := oto.NewContext(24000, 1, 2, 8192)\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n\n\tplayer := playerCtx.NewPlayer()\n\n\treturn &Service{\n\t\tservice: service,\n\t\tconfig: &config{\n\t\t\taudioConfig: &texttospeechpb.AudioConfig{\n\t\t\t\tAudioEncoding: texttospeechpb.AudioEncoding_LINEAR16,\n\t\t\t},\n\t\t\tvoice: &texttospeechpb.VoiceSelectionParams{\n\t\t\t\tName: \"en-US-Wavenet-D\",\n\t\t\t\tLanguageCode: \"en-US\",\n\t\t\t},\n\t\t},\n\t\tplayer: player,\n\t}\n}", "title": "" }, { "docid": "4232bb412dc7908ebf1082c014d8aac3", "score": "0.53807205", "text": "func NewService(label string) Service {\n\treturn Service{\n\t\tlabel: label,\n\t\tlog: emptyLog{},\n\t}\n}", "title": "" }, { "docid": "7ff01e146a4351cd446af7bcd43b5490", "score": "0.5348746", "text": "func NewDefaultApiService() DefaultApiServicer {\n\treturn &DefaultApiService{}\n}", "title": "" }, { "docid": "7ff01e146a4351cd446af7bcd43b5490", "score": "0.5348746", "text": "func NewDefaultApiService() DefaultApiServicer {\n\treturn &DefaultApiService{}\n}", "title": "" }, { "docid": "923cd8f52eeb5e0940864146f5ed149c", "score": "0.5314397", "text": "func NewDefault(text string, handleSigs ...os.Signal) *Handler {\n\tif len(handleSigs) == 0 {\n\t\thandleSigs = DefaultSignals\n\t}\n\tarray := strings.Split(os.Args[0], \"/\")\n\tvar name = array[len(array)-1]\n\tvar gs = &Handler{\n\t\tWatch: make(chan os.Signal, 1),\n\t\tMessage: fmt.Sprintf(\"%s: %s\\n\", name, text),\n\t\tHandler: nil,\n\t\tName: name,\n\t}\n\n\tsignal.Notify(gs.Watch, handleSigs...)\n\treturn gs\n}", "title": "" }, { "docid": "0c99ad21adcfc1d01b91078812a65911", "score": "0.5295186", "text": "func NewService(options ServiceOptions) *DefaultService {\n\treturn &DefaultService{\n\t\tconfig: newServiceConfig(options),\n\t}\n}", "title": "" }, { "docid": "8fa11f36aa283d0a1bc6863c7435102d", "score": "0.52919096", "text": "func (d *datagen) NewService() {\n\td.Services = append(d.Services, service.Service{\n\t\tID: d.UUID(),\n\t\tName: d.ids.Gen(idName(d.Faker, \"Service\")),\n\t\tDescription: d.LoremIpsumSentence(d.Intn(10) + 3),\n\t\tEscalationPolicyID: d.EscalationPolicies[d.Intn(len(d.EscalationPolicies))].ID,\n\t})\n}", "title": "" }, { "docid": "9e3cf0160d836b9e97d3d67ed85b2a82", "score": "0.52851766", "text": "func buildNewDefaultModel(config Config, path string) *sequencelabeler.Model {\n\tCharLanguageModelConfig := charlm.Config{\n\t\tVocabularySize: config.ContextualStringEmbeddings.VocabularySize,\n\t\tEmbeddingSize: config.ContextualStringEmbeddings.EmbeddingSize,\n\t\tHiddenSize: config.ContextualStringEmbeddings.HiddenSize,\n\t\tOutputSize: config.ContextualStringEmbeddings.VocabularySize,\n\t\tSequenceSeparator: config.ContextualStringEmbeddings.SequenceSeparator,\n\t\tUnknownToken: config.ContextualStringEmbeddings.UnknownToken,\n\t}\n\tm := &sequencelabeler.Model{\n\t\tEmbeddingsLayer: &stackedembeddings.Model{\n\t\t\tWordsEncoders: []nn.Model{\n\t\t\t\tembeddings.New(embeddings.Config{\n\t\t\t\t\tSize: config.WordEmbeddings.WordEmbeddingsSize,\n\t\t\t\t\tUseZeroEmbedding: true,\n\t\t\t\t\tDBPath: filepath.Join(path, config.WordEmbeddings.WordEmbeddingsFilename),\n\t\t\t\t\tReadOnly: true,\n\t\t\t\t\tForceNewDB: false,\n\t\t\t\t}),\n\t\t\t\tcontextualstringembeddings.New(\n\t\t\t\t\tcharlm.New(CharLanguageModelConfig),\n\t\t\t\t\tcharlm.New(CharLanguageModelConfig),\n\t\t\t\t\tcontextualstringembeddings.Concat,\n\t\t\t\t\t'\\n',\n\t\t\t\t\t' ',\n\t\t\t\t),\n\t\t\t},\n\t\t\tProjectionLayer: linear.New(config.EmbeddingsProjectionInputSize, config.EmbeddingsProjectionOutputSize),\n\t\t},\n\t\tTaggerLayer: &birnncrf.Model{\n\t\t\tBiRNN: birnn.New(\n\t\t\t\tlstm.New(config.RecurrentInputSize, config.RecurrentOutputSize),\n\t\t\t\tlstm.New(config.RecurrentInputSize, config.RecurrentOutputSize),\n\t\t\t\tbirnn.Concat,\n\t\t\t),\n\t\t\tScorer: linear.New(config.ScorerInputSize, config.ScorerOutputSize),\n\t\t\tCRF: crf.New(len(config.Labels)),\n\t\t},\n\t\tLabels: config.Labels,\n\t}\n\n\tvocab := loadVocabulary(filepath.Join(path, config.ContextualStringEmbeddings.VocabularyFilename))\n\tl2rCharLM := m.EmbeddingsLayer.WordsEncoders[1].(*contextualstringembeddings.Model).LeftToRight\n\tr2lCharLM := m.EmbeddingsLayer.WordsEncoders[1].(*contextualstringembeddings.Model).RightToLeft\n\tl2rCharLM.Vocabulary, r2lCharLM.Vocabulary = vocab, vocab\n\treturn m\n}", "title": "" }, { "docid": "32fb88e1ef71048a99a42b1f706f2cd3", "score": "0.5284296", "text": "func New() Service {\n\treturn Service{\n\t\tNode1: repository.InitNode1(),\n\t\tNode2: repository.InitNode2(),\n\t\tNode3: repository.InitNode3(),\n\t\tPool: repository.InitPool(),\n\t}\n}", "title": "" }, { "docid": "058ec2dc6fccb35e9f975090ac79c4de", "score": "0.52727926", "text": "func (n *Narcissus) NewServices() (s *Services, err error) {\n\ts = &Services{}\n\terr = n.Parse(s)\n\treturn\n}", "title": "" }, { "docid": "f2b959c2632da0cfd72844c5d3fbbd32", "score": "0.5268434", "text": "func NewService() Service {\n\tlogr := logger.LocLogger(logger.LogServiceBasic(LogkeyTrainingDataService))\n\tdlogr := makeDebugLogger(logr.Logger, TdsDebugMode)\n\n\tdlogr.Debugf(\"function entry\")\n\n\tconfig.FatalOnAbsentKey(elasticSearchAddressKey)\n\n\telasticSearchAddress := viper.GetString(elasticSearchAddressKey)\n\telasticSearchUserName := viper.GetString(elasticSearchUserKey)\n\telasticSearchPassworde := viper.GetString(elasticSearchPwKey)\n\n\tdlogr.Debugf(\"elasticSearchAddress: %s\", elasticSearchAddress)\n\tdlogr.Debugf(\"elasticSearchUserName: %s\", elasticSearchUserName)\n\tdlogr.Debugf(\"elasticSearchPassworde: %s\", elasticSearchPassworde)\n\n\ttransport := http.Transport{\n\t\tTLSClientConfig: &tls.Config{\n\t\t\tInsecureSkipVerify:true,\n\t\t},\n\t}\n\tclient := http.Client{\n\t\tTransport: &transport,\n\t}\n\n\telasticSearchAddresses := strings.Split(elasticSearchAddress, \",\")\n\tfor i, v := range elasticSearchAddresses {\n\t\tlogr.Debugf(\"es address #%d: %v\", i, v)\n\t}\n\n\tesClient, err := es.NewClient(\n\t\tes.SetURL(elasticSearchAddresses...),\n\t\tes.SetBasicAuth(elasticSearchUserName, elasticSearchPassworde),\n\t\tes.SetScheme(viper.GetString(\"elasticsearch.scheme\")),\n\t\tes.SetHttpClient(&client),\n\t\tes.SetSniff(false),\n\t\tes.SetHealthcheck(false),\n\t)\n\tif err != nil {\n\t\tlogr.WithError(err).Errorf(\"Cannot create elasticsearch client!\")\n\t\treturn nil\n\t}\n\n\tctx := context.Background() // ?? is ok or no?\n\terr = createIndexWithLogsIfDoesNotExist(ctx, esClient)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\ts := &TrainingDataService{\n\t\tes: esClient,\n\t}\n\ts.RegisterService = func() {\n\t\ttds.RegisterTrainingDataServer(s.Server, s)\n\t}\n\n\tdlogr.Debugf(\"function exit\")\n\treturn s\n}", "title": "" }, { "docid": "250c0326f61e1d4759b4ef896b5d601a", "score": "0.526082", "text": "func NewDefaultStandaloneTOML() string {\n\treturn fmt.Sprintf(`%s\n\n%s\n\n%s\n\n%s\n\n%s\n\n%s\n\n%s`,\n\n\t\tNewDefaultETCD().TOML(),\n\t\tNewDefaultCoordinator().TOML(),\n\t\tNewDefaultQuery().TOML(),\n\t\tNewDefaultBrokerBase().TOML(),\n\t\tNewDefaultStorageBase().TOML(),\n\t\tNewDefaultLogging().TOML(),\n\t\tNewDefaultMonitor().TOML(),\n\t)\n}", "title": "" }, { "docid": "1f066c15e6899f97be885939252c6b68", "score": "0.52186996", "text": "func newDefaultLoadBalancedWebService() *LoadBalancedWebService {\n\treturn &LoadBalancedWebService{\n\t\tService: Service{},\n\t\tImage: ServiceImageWithPort{},\n\t\tRoutingRule: RoutingRule{\n\t\t\tHealthCheckPath: \"/\",\n\t\t},\n\t\tTaskConfig: TaskConfig{\n\t\t\tCPU: 256,\n\t\t\tMemory: 512,\n\t\t\tCount: intp(1),\n\t\t},\n\t\tLogsConfig: LogsConfig{\n\t\t\tLogRetention: LogRetentionInDays,\n\t\t},\n\t}\n}", "title": "" }, { "docid": "1351b8425ee3949d3da1175ac1bc375a", "score": "0.52124614", "text": "func NewService(config configs.Config, dbConn database.Connection) Service {\n\treturn &defaultService{\n\t\tconfig: config,\n\t\trepository: newRepository(dbConn),\n\t}\n}", "title": "" }, { "docid": "8af90e89f9f9de19d5f4df0a67a81f23", "score": "0.52037424", "text": "func DefaultMinerService() MinerService {\n\treturn NewMinerService(DefaultMinerData())\n}", "title": "" }, { "docid": "e3b1c353ad95072d26b6215d5fd90566", "score": "0.52023405", "text": "func NewService(repo Repository, logger log.Logger) Service {\n return service{repo, logger}\n}", "title": "" }, { "docid": "c121cf998e60bf1753e3d376600cc6bc", "score": "0.5169474", "text": "func NewService(netType, address string, k, w, r int) *Service {\n\n\tglog.Info(\"Starting OneHop K/V service\")\n\tlistener, err := newListener(netType, address)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tglog.Infof(\"Listening on:%s %s\", netType, address)\n\tglog.Infof(\"Config Write:%d, Read:%d\", k, r)\n\troute = NewRoute(k)\n\tvid := make([]byte, 16)\n\trand.Read(vid)\n\tid := hex.EncodeToString(vid)\n\n\tslice := route.slices[route.GetIndex(id)]\n\tglog.Infof(\"Node ID:%s\", id)\n\n\tservice = &Service{\n\t\tlistener, route,\n\t\tid,\n\t\tmake([]*Event, 0),\n\t\t&sync.RWMutex{},\n\t\tmake([]*Event, 0),\n\t\t&sync.RWMutex{},\n\t\tslice,\n\t\tw, r,\n\t\tNewLeakyBuffer(1024, MSG_MAX_SIZE),\n\t\tNewRPCPool(),\n\t\tNewStorage(),\n\t\tmake(chan bool),\n\t}\n\n\tif err = rpc.Register(service.DB); err != nil {\n\t\tglog.Fatal(err)\n\t}\n\tif rpc_listener, err := net.Listen(\"tcp\", listener.LocalAddr().String()); err != nil {\n\t\tglog.Fatal(err)\n\t} else {\n\t\tgo rpc.Accept(rpc_listener)\n\t}\n\n\tglog.V(3).Infof(\"RPC ..... [on]\")\n\n\tALIVE_EVENT = &Event{id, JOIN, listener.LocalAddr().(*net.UDPAddr)}\n\treturn service\n}", "title": "" }, { "docid": "e0a4f5e03f06bd556df09cfe71562fea", "score": "0.5163747", "text": "func New() Service {\n\treturn &service{}\n}", "title": "" }, { "docid": "d7b1c0b1d332840cded6e2be34863bbe", "score": "0.516196", "text": "func New(client *http.Client) (*Service, error) {\n\tif client == nil {\n\t\treturn nil, errors.New(\"client is nil\")\n\t}\n\ts := &Service{client: client, BasePath: basePath}\n\ts.Documents = NewDocumentsService(s)\n\treturn s, nil\n}", "title": "" }, { "docid": "145578c3d02e564ffa08adefcaa44419", "score": "0.51490116", "text": "func New(client client.ConfigProvider) *Service {\n\treturn &Service{\n\t\tTopic: topic.New(client),\n\t}\n}", "title": "" }, { "docid": "bcd387dad8df7aeab3765300467bf721", "score": "0.5134553", "text": "func New(m map[string]interface{}, log *zerolog.Logger) (global.Service, error) {\n\tconf := &config{}\n\tif err := mapstructure.Decode(m, conf); err != nil {\n\t\treturn nil, err\n\t}\n\n\tconf.init()\n\n\ts := &svc{\n\t\tconf: conf,\n\t}\n\ts.setHandler()\n\treturn s, nil\n}", "title": "" }, { "docid": "1db48d23439de260cf21c87870174234", "score": "0.51193064", "text": "func newDefaultUpserter(ac ApplyConfig, oi ObjectInfo, co Clients, rfc resourceClientFactoryFn) (*defaultUpserter, error) {\n\tdescriber, err := newDefaultObjectDescriber(co, oi)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"creating object describer\")\n\t}\n\n\treturn &defaultUpserter{\n\t\tApplyConfig: ac,\n\t\tobjectInfo: oi,\n\t\tclientOpts: co,\n\t\tresourceClientFactory: rfc,\n\t\tobjectDescriber: describer,\n\t}, nil\n}", "title": "" }, { "docid": "54a8a43e7a65334a8c55d6f662f54cf5", "score": "0.51141936", "text": "func NewService(model model.Core) serviceImpl {\n\treturn serviceImpl{model}\n}", "title": "" }, { "docid": "cad5b1125894d38b76860ab35254b34d", "score": "0.5106723", "text": "func NewService(ctx context.Context, opts ...option.ClientOption) (*Service, error) {\n\tscopesOption := internaloption.WithDefaultScopes(\n\t\t\"https://www.googleapis.com/auth/cloud-language\",\n\t\t\"https://www.googleapis.com/auth/cloud-platform\",\n\t)\n\t// NOTE: prepend, so we don't override user-specified scopes.\n\topts = append([]option.ClientOption{scopesOption}, opts...)\n\topts = append(opts, internaloption.WithDefaultEndpoint(basePath))\n\topts = append(opts, internaloption.WithDefaultMTLSEndpoint(mtlsBasePath))\n\tclient, endpoint, err := htransport.NewClient(ctx, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\ts, err := New(client)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif endpoint != \"\" {\n\t\ts.BasePath = endpoint\n\t}\n\treturn s, nil\n}", "title": "" }, { "docid": "9d13cf554e2206829b27e6d008df5384", "score": "0.5104566", "text": "func New(productData Data, mpData mpData, outletData outletData, doData doData) Service {\n\t// Assign variable dari parameter ke object\n\treturn Service{\n\t\tproductData: productData,\n\t\tmpData: mpData,\n\t\toutletData: outletData,\n\t\tdoData: doData,\n\t}\n}", "title": "" }, { "docid": "b35b3b38dfb06a2b896ac5c56662c3c9", "score": "0.5095124", "text": "func NewDefaultRandomNumberService() *DefaultRandomNumberService {\n\treturn &DefaultRandomNumberService{}\n}", "title": "" }, { "docid": "865552dad0a4bf3418418f57b4f04120", "score": "0.50929093", "text": "func New(store model.SecretStore) model.SecretService {\n\treturn &builtin{store}\n}", "title": "" }, { "docid": "69ed6205eb0f638742c5a36dfaf476e8", "score": "0.509196", "text": "func NewDefaultGroupService(\n\tdb db.TxQuerier,\n\tuserRepository UserRepository,\n\tgroupRepository GroupRepository,\n) *DefaultGroupService {\n\treturn &DefaultGroupService{db: db, userRepository: userRepository, groupRepository: groupRepository}\n}", "title": "" }, { "docid": "82b5537f329e39917bc8c72dbd41d157", "score": "0.5084902", "text": "func Default() *Engine {\n\tengine := New()\n\tengine.Use(Recovery())\n\tengine.Use(Logger())\n\treturn engine\n}", "title": "" }, { "docid": "fadc96253758e5bf6a7d4703228bfd60", "score": "0.5080786", "text": "func New() *Service {\n\ts := new(Service)\n\ts.GoRoutines = sdk.NewGoRoutines(context.Background())\n\treturn s\n}", "title": "" }, { "docid": "7c840f2edf351fe646bffa5ae9efd51e", "score": "0.5075278", "text": "func New(topicPrefix, address, exchange, contentType string) *Service {\n\treturn &Service{\n\t\tTopicPrefix: topicPrefix,\n\t\tAddress: address,\n\t\tExchange: exchange,\n\t\tContentType: contentType,\n\t}\n}", "title": "" }, { "docid": "b6d585b7dafb0f0b5bd79e34ed3da21c", "score": "0.5072221", "text": "func NewService(ctx *pulumi.Context,\n\tname string, args *ServiceArgs, opts ...pulumi.ResourceOption) (*Service, error) {\n\tif args == nil {\n\t\targs = &ServiceArgs{}\n\t}\n\n\topts = internal.PkgResourceDefaultOpts(opts)\n\tvar resource Service\n\terr := ctx.RegisterResource(\"google-native:servicemanagement/v1:Service\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "a0c4a8462aefb0e1f018de368446759f", "score": "0.5071561", "text": "func NewDefaultProtocol(n *onet.TreeNodeInstance) (onet.ProtocolInstance, error) {\n\tvf := func(a, b []byte) bool { return true }\n\treturn NewBlsCosi(n, vf, pairing.NewSuiteBn256())\n}", "title": "" }, { "docid": "d5d5b16cf434247b58cb9b2fa1651afb", "score": "0.5071241", "text": "func (v *CreateTopicsResponse) Default() {\n}", "title": "" }, { "docid": "2bfd5898d70b193af1516a2e43d94940", "score": "0.50707525", "text": "func (v *CreateTopicsRequestTopic) Default() {\n}", "title": "" }, { "docid": "8121f1df0b6288785cd04ad3b4c32532", "score": "0.50657094", "text": "func New(store models.SecretStore) models.SecretService {\n\treturn &builtin{store}\n}", "title": "" }, { "docid": "15142cd32a961c200e885a1e70e9f48a", "score": "0.5064076", "text": "func (n *Narcissus) NewService(name string, protocol string) (s *Service, err error) {\n\ts = &Service{\n\t\taugeasPath: \"/files/etc/services/service-name[.='\" + name + \"' and protocol='\" + protocol + \"']\",\n\t}\n\terr = n.Parse(s)\n\treturn\n}", "title": "" }, { "docid": "1fba821b12949e77f2e853848679b347", "score": "0.5064065", "text": "func newServiceInput(ctx *service.Context, req proto.Message) (interface{}, error) {\n\tmpb := &jsonpb.Marshaler{\n\t\tOrigName: true,\n\t}\n\n\treqjs, err := mpb.MarshalToString(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tinput := map[string]interface{}{\n\t\t\"service\": map[string]interface{}{\n\t\t\t\"name\": ctx.ServiceName,\n\t\t\t\"version\": ctx.ServiceVersion,\n\t\t},\n\t\t\"principal\": map[string]interface{}{\n\t\t\t\"id\": ctx.PrincipalId,\n\t\t\t\"role\": ctx.PrincipalRole,\n\t\t\t\"name\": ctx.PrincipalName,\n\t\t\t\"email\": ctx.PrincipalEmail,\n\t\t\t\"type\": ctx.PrincipalType,\n\t\t},\n\t\t\"operation\": map[string]interface{}{\n\t\t\t\"id\": proto.MessageName(req),\n\t\t\t\"input\": json.RawMessage(reqjs),\n\t\t},\n\t}\n\n\treturn input, nil\n}", "title": "" }, { "docid": "087850dbae929a8963f0cb8d4be2c370", "score": "0.50610876", "text": "func New(m map[string]interface{}, log *zerolog.Logger) (global.Service, error) {\n\n\tconf := &Config{}\n\tif err := mapstructure.Decode(m, conf); err != nil {\n\t\treturn nil, err\n\t}\n\tconf.init()\n\n\tr := chi.NewRouter()\n\ts := &svc{\n\t\tconf: conf,\n\t\trouter: r,\n\t}\n\n\tif err := s.routerInit(log); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn s, nil\n}", "title": "" }, { "docid": "34a7502b555c2d5b17c692b927720523", "score": "0.5055933", "text": "func (s *Service) New(sid int, params *NewParams) (*Workout, error) {\n\t// Create a new ParamErrors.\n\tpes := errors.NewParamErrors()\n\n\t// Check\n\n}", "title": "" }, { "docid": "8cfe81e0e703ebc1d4082b0a4c938a56", "score": "0.50532556", "text": "func NewService(repo Repository, collector Collector) Service {\n\treturn newsService{repo, collector}\n}", "title": "" }, { "docid": "617929b2a7cd140774f8332c984f94d3", "score": "0.5052719", "text": "func NewDefaultServices() Client {\n\tconsulConfig := api.DefaultConfig()\n\tconsulConfig.Transport = &http.Transport{\n\t\tProxy: http.ProxyFromEnvironment,\n\t\tDialContext: (&net.Dialer{\n\t\t\tTimeout: httpConsulRequestTimeout,\n\t\t\tDualStack: true,\n\t\t}).DialContext,\n\t}\n\tconsulClient, err := NewClientWrapper(consulConfig, httpClient)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn NewServices(consulClient, DefaultCacheInvalidationTimeout)\n}", "title": "" }, { "docid": "671168f91cd38e1a009952ac1096da6c", "score": "0.50518733", "text": "func createService() (*kubeops.Service, error) {\n\t// if the user has supplied a kubeConfig file location then\n\tif kubeConfig != \"\" {\n\t\treturn kubeops.NewServiceFromKubeConfigFile(kubeConfig, lg)\n\t}\n\n\treturn kubeops.NewDefaultService(lg)\n}", "title": "" }, { "docid": "907e5b509b314a2081ef418b65ffddd3", "score": "0.50517696", "text": "func NewDefault(t *chrome.TestConn) *Context {\n\treturn New(t, serverKeyType.Value(), serverKey.Value(), serverKeyAddr.Value())\n}", "title": "" }, { "docid": "780425f017cfb99da71b24fbc356423d", "score": "0.5049651", "text": "func GenDefaultCreateServiceRequest(platform string, region string, azs []string, cluster string,\n\tservice string, res *common.Resources, opts *catalog.CatalogRedisOptions) *manage.CreateServiceRequest {\n\t// generate service configs\n\tserviceCfgs := genServiceConfigs(platform, opts)\n\n\t// generate service ReplicaConfigs\n\treplicaCfgs := genReplicaConfigs(platform, cluster, service, azs, opts)\n\n\tportMappings := []common.PortMapping{\n\t\t{ContainerPort: listenPort, HostPort: listenPort, IsServicePort: true},\n\t}\n\tif opts.Shards >= minClusterShards {\n\t\tm := common.PortMapping{ContainerPort: clusterPort, HostPort: clusterPort}\n\t\tportMappings = append(portMappings, m)\n\t}\n\n\treq := &manage.CreateServiceRequest{\n\t\tService: &manage.ServiceCommonRequest{\n\t\t\tRegion: region,\n\t\t\tCluster: cluster,\n\t\t\tServiceName: service,\n\t\t\tCatalogServiceType: common.CatalogService_Redis,\n\t\t},\n\n\t\tResource: &common.Resources{\n\t\t\tMaxCPUUnits: res.MaxCPUUnits,\n\t\t\tReserveCPUUnits: res.ReserveCPUUnits,\n\t\t\tMaxMemMB: res.MaxMemMB,\n\t\t\tReserveMemMB: opts.MemoryCacheSizeMB,\n\t\t},\n\n\t\tServiceType: common.ServiceTypeStateful,\n\n\t\tContainerImage: ContainerImage,\n\t\tReplicas: opts.ReplicasPerShard * opts.Shards,\n\t\tPortMappings: portMappings,\n\t\tRegisterDNS: true,\n\t\t// require to assign a static ip for each member\n\t\tRequireStaticIP: true,\n\n\t\tServiceConfigs: serviceCfgs,\n\n\t\tVolume: opts.Volume,\n\t\tContainerPath: common.DefaultContainerMountPath,\n\n\t\tReplicaConfigs: replicaCfgs,\n\t}\n\treturn req\n}", "title": "" }, { "docid": "39a51275c7f770d3d9d0702c34b90d4b", "score": "0.5047144", "text": "func NewDefaultClient() *Client {\n\topt, err := Parse(URLFromEnv())\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n\treturn NewClient(opt)\n}", "title": "" }, { "docid": "38b83d4703e1cd3cbe4047140ba3f60a", "score": "0.50465065", "text": "func NewDefaultClient(name string, machines []string) {\n\tc = NewClient(name, machines)\n}", "title": "" }, { "docid": "23189cb92f73b23931dc0255c6afec1d", "score": "0.5041047", "text": "func newDefault(m *Message) mondrian.Message {\n\treturn Wrap(&Default{Raw: m.Raw, ToA: m.ToA})\n}", "title": "" }, { "docid": "bcb50f0fe19662524c2bc076064d8a02", "score": "0.5040596", "text": "func NewDefaultPSP() *PSP {\n\tp := &PSP{}\n\tp.k = kubernetes.GetKubeInstance()\n\n\t//standard security providers\n\tp.securityPolicyProviders = &[]SecurityPolicyProvider{\n\t\tNewKubePodSecurityPolicyProvider(p.k),\n\t\tNewAzK8sConstraintTemplate(p.k)}\n\n\tp.setenv()\n\treturn p\n\n}", "title": "" }, { "docid": "9a0f3265c5220d99f0697ceb1e6897df", "score": "0.5036468", "text": "func (r *registry) newService() *core.Service {\n\treturn new(ServiceBuilder).\n\t\tWithMeta(r.csc.GetName(), r.csc.GetNamespace()).\n\t\tWithOwnerLabel(r.csc.CatalogSourceConfig).\n\t\tWithSpec(r.newServiceSpec()).\n\t\tService()\n}", "title": "" }, { "docid": "c1825673828131c5faaa0354875a3fab", "score": "0.5025631", "text": "func NewDefaultGost(description string, files []*File, user user.User) *Gost {\n\tgost := &Gost{\n\t\tID: utils.Uuid(),\n\t\tPublic: true,\n\t\tDescription: description,\n\t\tVersion: 1,\n\t\tFiles: files,\n\t\tCreatedAt: time.Now().Format(time.RFC3339),\n\t\tUser: user,\n\t\tStatus: STATUSWELL,\n\t}\n\tgost.injectFileUuid()\n\treturn gost\n}", "title": "" }, { "docid": "267a990e20a1f6815dca676ad327d881", "score": "0.50113", "text": "func (r *Provider) Default() {\n\tproviderlog.Info(\"default\", \"name\", r.Name)\n\tif r.Labels == nil {\n\t\tr.Labels = make(map[string]string)\n\t}\n\tr.Labels[meta.LabelUndistro] = \"\"\n\tr.Labels[meta.LabelUndistroClusterName] = \"\"\n\tr.Labels[meta.LabelUndistroClusterType] = \"management\"\n\tif r.Spec.Repository.URL == \"\" {\n\t\tr.Spec.Repository.URL = defaultRepo\n\t}\n\tif r.Spec.ProviderName == \"undistro\" && r.Spec.Repository.URL == defaultRepo {\n\t\tr.Labels[meta.LabelProviderType] = \"core\"\n\t}\n}", "title": "" }, { "docid": "bb0d04bab8b77cc478d08047731d9327", "score": "0.50092244", "text": "func NewFromDefaultProject() (Compute, error) {\n\tout, err := exec.Command(\"gcloud\", \"config\", \"get-value\", \"core/project\").Output()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"could not obtain default project from gcloud: %v\", err)\n\t}\n\tproject := strings.TrimSpace(string(out))\n\treturn New(project)\n}", "title": "" }, { "docid": "7445a9462dc76fd11e65e1f2de29d410", "score": "0.5009077", "text": "func NewDefaultParser(cmd string) *Parser {\n\tp := new(Parser)\n\tp.expr = fmt.Sprintf(\"%s %s\", DefaultExpr, cmd)\n\treturn p\n}", "title": "" }, { "docid": "0f89c85f0b04a17c525d3f6936ecb870", "score": "0.5007397", "text": "func Default() *Engine {\n\tengine := New()\n\tengine.Use(Recovery(), Logger())\n\treturn engine\n}", "title": "" }, { "docid": "ff392890864fe36b2efb06dacbdf2a6d", "score": "0.49974906", "text": "func NewDefaultProvider() defaultProvider {\n\treturn defaultProvider{}\n}", "title": "" }, { "docid": "246a6fa74a9644bc6a1fd565e2b30cf4", "score": "0.49960646", "text": "func New() endly.Service {\n\tvar result = &service{\n\t\tAbstractService: endly.NewAbstractService(ServiceID),\n\t}\n\tresult.AbstractService.Service = result\n\tresult.registerRoutes()\n\treturn result\n}", "title": "" }, { "docid": "246a6fa74a9644bc6a1fd565e2b30cf4", "score": "0.49960646", "text": "func New() endly.Service {\n\tvar result = &service{\n\t\tAbstractService: endly.NewAbstractService(ServiceID),\n\t}\n\tresult.AbstractService.Service = result\n\tresult.registerRoutes()\n\treturn result\n}", "title": "" }, { "docid": "246a6fa74a9644bc6a1fd565e2b30cf4", "score": "0.49960646", "text": "func New() endly.Service {\n\tvar result = &service{\n\t\tAbstractService: endly.NewAbstractService(ServiceID),\n\t}\n\tresult.AbstractService.Service = result\n\tresult.registerRoutes()\n\treturn result\n}", "title": "" }, { "docid": "246a6fa74a9644bc6a1fd565e2b30cf4", "score": "0.49960646", "text": "func New() endly.Service {\n\tvar result = &service{\n\t\tAbstractService: endly.NewAbstractService(ServiceID),\n\t}\n\tresult.AbstractService.Service = result\n\tresult.registerRoutes()\n\treturn result\n}", "title": "" }, { "docid": "246a6fa74a9644bc6a1fd565e2b30cf4", "score": "0.49960646", "text": "func New() endly.Service {\n\tvar result = &service{\n\t\tAbstractService: endly.NewAbstractService(ServiceID),\n\t}\n\tresult.AbstractService.Service = result\n\tresult.registerRoutes()\n\treturn result\n}", "title": "" }, { "docid": "16a39591de2cf131a4caa65ccc250655", "score": "0.49898365", "text": "func NewService(uri string) *Svc {\n\tneo4jdb, err := neoism.Connect(uri)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\ts := &Svc{neo4jdb}\n\ts.databaseInit()\n\treturn s\n}", "title": "" }, { "docid": "5fd1634c8eb5e4f1759a8bfb4d4776a0", "score": "0.49897423", "text": "func newService(m *v1alpha1.PerconaServerMongoDB, replset *v1alpha1.ReplsetSpec) *corev1.Service {\n\tls := util.LabelsForPerconaServerMongoDBReplset(m, replset)\n\tservice := &corev1.Service{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tAPIVersion: \"v1\",\n\t\t\tKind: \"Service\",\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: m.Name + \"-\" + replset.Name,\n\t\t\tNamespace: m.Namespace,\n\t\t},\n\t\tSpec: corev1.ServiceSpec{\n\t\t\tPorts: []corev1.ServicePort{\n\t\t\t\t{\n\t\t\t\t\tName: mongod.MongodPortName,\n\t\t\t\t\tPort: m.Spec.Mongod.Net.Port,\n\t\t\t\t\tTargetPort: intstr.FromInt(int(m.Spec.Mongod.Net.Port)),\n\t\t\t\t},\n\t\t\t},\n\t\t\tClusterIP: \"None\",\n\t\t\tSelector: ls,\n\t\t},\n\t}\n\tutil.AddOwnerRefToObject(service, util.AsOwner(m))\n\treturn service\n}", "title": "" }, { "docid": "b30c2f1e87f3f8d3ae79bf640f4c961b", "score": "0.49817356", "text": "func (v *LeaderAndISRRequestLiveLeader) Default() {\n}", "title": "" }, { "docid": "37a3586084a5418036c5b7a4f7b7b9a1", "score": "0.49725464", "text": "func New() *Service {\n\tret := &Service{\n\t\tsqlBuilder: NewBuilder(),\n\t\tResource: view.EmptyResource(),\n\t}\n\tret.Resource.TypeRegistry().SetParent(config.Config.Types)\n\treturn ret\n}", "title": "" }, { "docid": "c9850589bf6bb373ef6095089d965c6a", "score": "0.496534", "text": "func newFakeInstanceDefault(config group.Spec, logicalID *instance.LogicalID) instance.Spec {\n\treturn newFakeInstance(config, logicalID, provisionTagsDefault(config, logicalID))\n}", "title": "" }, { "docid": "1821739490cf2671e7868136fcfe87c2", "score": "0.49635792", "text": "func NewService(service string) (Service, error) {\n\tswitch service {\n\tcase Twitter.ID():\n\t\treturn Twitter, nil\n\tcase Github.ID():\n\t\treturn Github, nil\n\tcase Reddit.ID():\n\t\treturn Reddit, nil\n\tcase HTTPS.ID():\n\t\treturn HTTPS, nil\n\tdefault:\n\t\treturn nil, errors.Errorf(\"invalid service %s\", service)\n\t}\n}", "title": "" }, { "docid": "550d1075db0fae4ebce808a43982fc35", "score": "0.4963546", "text": "func newService(name, binary string) *Service {\n\treturn &Service{\n\t\tname: name,\n\t\tbinary: binary,\n\t\targs: make([]string, 0),\n\t\tdependencies: make(map[string]*Service),\n\t\tdependents: make(map[string]*Service),\n\n\t\tdone: make(chan bool),\n\t\tshutdown: make(chan bool, 1),\n\t\tstarted: make(chan bool, 1),\n\t\tstopped: make(chan bool, 1),\n\n\t\ttermTimeout: 5 * time.Second,\n\t}\n}", "title": "" }, { "docid": "550d1075db0fae4ebce808a43982fc35", "score": "0.4963546", "text": "func newService(name, binary string) *Service {\n\treturn &Service{\n\t\tname: name,\n\t\tbinary: binary,\n\t\targs: make([]string, 0),\n\t\tdependencies: make(map[string]*Service),\n\t\tdependents: make(map[string]*Service),\n\n\t\tdone: make(chan bool),\n\t\tshutdown: make(chan bool, 1),\n\t\tstarted: make(chan bool, 1),\n\t\tstopped: make(chan bool, 1),\n\n\t\ttermTimeout: 5 * time.Second,\n\t}\n}", "title": "" }, { "docid": "311e4bd01e4884058fcef8735c259a4f", "score": "0.49546283", "text": "func New() Service {\n\treturn Service{\n\t\tsmartmeiService: NewStartMeiService(),\n\t\texchangeService: NewExchangeService(),\n\t}\n}", "title": "" }, { "docid": "3e7f2e2749b73ba63c399fece2f40bf5", "score": "0.495424", "text": "func NewDefaultParser() Parser {\n\treturn DefaultParser{}\n}", "title": "" }, { "docid": "a2a1d7541c4d6d55c8c6d25d477da60c", "score": "0.49541333", "text": "func Default() *Agent {\n\treturn New()\n}", "title": "" }, { "docid": "d27043f3376f9d0fb9b422deacc15b70", "score": "0.49523756", "text": "func NewService(ctx context.Context, databaseName string) *Service{\r\n\treturn &Service{strg: storage.NewStorage(ctx, databaseName)}\r\n}", "title": "" }, { "docid": "17b7cee3cac17d4e3498fc22f085f5b2", "score": "0.49499935", "text": "func (m *NotifyServiceFactory) New(protocol string, c core.Config, ch chan core.ServiceCommand) (core.Service, error) {\n\t// kafka\n\tkhosts, err := c.String(\"iothub\", \"kafka\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tconsumer, err := sarama.NewConsumer(strings.Split(khosts, \",\"), nil)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Connecting with kafka:%s failed\", khosts)\n\t}\n\n\treturn &NotifyService{\n\t\tconfig: c,\n\t\twg: sync.WaitGroup{},\n\t\tchn: ch,\n\t\tconsumer: consumer,\n\t}, nil\n}", "title": "" }, { "docid": "0c6f1afb5fa52413fcdd925ef958ada7", "score": "0.49469388", "text": "func NewAPIServiceGenesisDefault(code int) *APIServiceGenesisDefault {\n\treturn &APIServiceGenesisDefault{\n\t\t_statusCode: code,\n\t}\n}", "title": "" }, { "docid": "4675826347dc154f353d860e795d4bca", "score": "0.4945117", "text": "func createDefaultContext(id uint64) {\n\tcreateContext(id, TypeUnknown, StatusUnknown)\n}", "title": "" }, { "docid": "99d728d8adbd360dc41c0b91d086b8eb", "score": "0.4944427", "text": "func New(c *conf.Config) (s *Service, cancel context.CancelFunc) {\n\ts = &Service{\n\t\tc: c,\n\t\tclient: bm.NewClient(c.HTTPClient),\n\t\tregistry: dao.NewRegistry(),\n\t\tnodes: dao.NewNodes(c),\n\t\ttree: make(map[int64]string),\n\t}\n\ts.getEnv()\n\ts.syncUp()\n\tcancel = s.regSelf()\n\tgo s.nodesproc()\n\treturn\n}", "title": "" } ]
78e9a933af929d8f8b665e486b26ae91
If set, access is controlled only by bucketlevel or above IAM policies.
[ { "docid": "ab58afebdf428b6a776eb40cb46c147d", "score": "0.46185267", "text": "func (o BucketIamConfigurationUniformBucketLevelAccessOutput) Enabled() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v BucketIamConfigurationUniformBucketLevelAccess) *bool { return v.Enabled }).(pulumi.BoolPtrOutput)\n}", "title": "" } ]
[ { "docid": "c68bcc3e3b848f43046e69314512e5cc", "score": "0.64536357", "text": "func BucketPolicy(bucketName string, roleName string) (json.RawMessage, error) {\n\tswitch roleName {\n\tcase \"admin\":\n\t\treturn []byte(fmt.Sprintf(`{\n\t\t\t\"Version\": \"2012-10-17\",\n\t\t\t\"Statement\": [{\n\t\t\t\t\"Effect\": \"Allow\",\n\t\t\t\t\"Action\": [\n\t\t\t\t\t\"s3:*\"\n\t\t\t\t],\n\t\t\t\t\"Resource\": [\n\t\t\t\t\t\"arn:aws:s3:::%s/*\"\n\t\t\t\t]\n\t\t\t}]\n\t\t}`, bucketName)), nil\n\tcase \"read-only\":\n\t\treturn []byte(fmt.Sprintf(`{\n\t\t\t\"Version\": \"2012-10-17\",\n\t\t\t\"Statement\": [{\n\t\t\t\t\"Effect\": \"Allow\",\n\t\t\t\t\"Action\": [\n\t\t\t\t\t\"s3:ListBucket\",\n\t\t\t\t\t\"s3:GetBucketLocation\",\n\t\t\t\t\t\"s3:GetObject\",\n\t\t\t\t\t\"s3:GetObjectVersion\"\n\t\t\t\t],\n\t\t\t\t\"Resource\": [\n\t\t\t\t\t\"arn:aws:s3:::%s/*\"\n\t\t\t\t]\n\t\t\t}]\n\t\t}`, bucketName)), nil\n\t}\n\n\treturn nil, fmt.Errorf(\"Invalid key role\")\n}", "title": "" }, { "docid": "a3098b9a03580060d66745d5719b893e", "score": "0.60995734", "text": "func Test_BucketPolicySample_1(t *testing.T) {\n\tsc := NewS3()\n\terr := sc.PutObject(TEST_BUCKET, TEST_KEY, TEST_VALUE)\n\tif err != nil {\n\t\tt.Fatal(\"PutObject err:\", err)\n\t}\n\n\t//Anonymous to get\n\turl := \"http://\" + *sc.Client.Config.Endpoint + string(os.PathSeparator) + TEST_BUCKET + string(os.PathSeparator) + TEST_KEY\n\tstatusCode, _, err := HTTPRequestToGetObject(url)\n\tif err != nil {\n\t\tt.Fatal(\"GetObject err:\", err)\n\t}\n\t//StatusCode should be AccessDenied\n\tif statusCode != http.StatusForbidden {\n\t\tt.Fatal(\"StatusCode should be AccessDenied(403), but the code is:\", statusCode)\n\t}\n\n\terr = sc.PutBucketPolicy(TEST_BUCKET, GetObjectPolicy_1)\n\tif err != nil {\n\t\tt.Fatal(\"PutBucketPolicy err:\", err)\n\t}\n\n\tpolicy, err := sc.GetBucketPolicy(TEST_BUCKET)\n\tif err != nil {\n\t\tt.Fatal(\"GetBucketPolicy err:\", err)\n\t}\n\tt.Log(\"Bucket policy:\", Format(policy))\n\n\t// After set policy\n\tstatusCode, data, err := HTTPRequestToGetObject(url)\n\tif err != nil {\n\t\tt.Fatal(\"GetObject err:\", err)\n\t}\n\t//StatusCode should be STATUS_OK\n\tif statusCode != http.StatusOK {\n\t\tt.Fatal(\"StatusCode should be STATUS_OK(200), but the code is:\", statusCode)\n\t}\n\tt.Log(\"Get object value:\", string(data))\n\n\terr = sc.DeleteBucketPolicy(TEST_BUCKET)\n\tif err != nil {\n\t\tt.Fatal(\"DeleteBucketPolicy err:\", err)\n\t}\n\n\t//After delete policy\n\tstatusCode, _, err = HTTPRequestToGetObject(url)\n\tif err != nil {\n\t\tt.Fatal(\"GetObject err:\", err)\n\t}\n\t//StatusCode should be AccessDenied\n\tif statusCode != http.StatusForbidden {\n\t\tt.Fatal(\"StatusCode should be AccessDenied(403), but the code is:\", statusCode)\n\t}\n\n\terr = sc.DeleteObject(TEST_BUCKET, TEST_KEY)\n\tif err != nil {\n\t\tt.Fatal(\"DeleteObject err:\", err)\n\t}\n}", "title": "" }, { "docid": "6b774f561aacd5defa3cca2d750138af", "score": "0.57112885", "text": "func AWSS3BucketPolicyAccessBlockBP() {\n\tcolor.Green(\"\\nresource \\\"aws_s3_bucket\\\" \\\"example\\\" {\\n bucket = \\\"example\\\"\\n}\\n\\nresource \\\"aws_s3_bucket_public_access_block\\\" \\\"example\\\" {\\n bucket = aws_s3_bucket.example.id\\n\\n block_public_acls = true\\n block_public_policy = true\\n}\")\n\tcolor.Yellow(\"\\nCheckout https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket_public_access_block\\n\\n\")\n}", "title": "" }, { "docid": "baabb4c26c99146180b096b154895a0e", "score": "0.56632996", "text": "func CheckPublicAccessBlockingEnabled() error {\n\tbuckets, err := getAllS3Buckets()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfor _, bucket := range buckets {\n\t\tout, err := client.GetPublicAccessBlock(context.TODO(), &s3.GetPublicAccessBlockInput{\n\t\t\tBucket: bucket.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\t// attempt to interpret AWS-specific errors\n\t\t\tvar apiErr smithy.APIError\n\t\t\tif errors.As(err, &apiErr) {\n\t\t\t\tcode := apiErr.ErrorCode()\n\t\t\t\tmessage := apiErr.ErrorMessage()\n\n\t\t\t\tif code == \"NoSuchPublicAccessBlockConfiguration\" {\n\t\t\t\t\tfmt.Println(*bucket.Name, \"- does not have public access block configuration\")\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\tfmt.Printf(\"%s got %s error: %s\", *bucket.Name, code, message)\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\t// generic error\n\t\t\tfmt.Println(*bucket.Name, err)\n\t\t\tcontinue\n\t\t}\n\t\tif out == nil {\n\t\t\tfmt.Println(*bucket.Name, \"- does not have public access block configuration\")\n\t\t\tcontinue\n\t\t}\n\n\t\tconf := out.PublicAccessBlockConfiguration\n\t\tif !conf.BlockPublicAcls {\n\t\t\tfmt.Println(*bucket.Name, \"- does not block public ACLs\")\n\t\t}\n\t\tif !conf.BlockPublicPolicy {\n\t\t\tfmt.Println(*bucket.Name, \"- does not block public policy\")\n\t\t}\n\t\tif !conf.IgnorePublicAcls {\n\t\t\tfmt.Println(*bucket.Name, \"- does not ignore public ACLs\")\n\t\t}\n\t\tif !conf.RestrictPublicBuckets {\n\t\t\tfmt.Println(*bucket.Name, \"- does not restrict public buckets\")\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "195049071e174166cb24a3c42e3afbae", "score": "0.5631312", "text": "func (c *s3Client) SetBucketAccess(acl string) *probe.Error {\n\tbucket, object := c.url2BucketAndObject()\n\tif object != \"\" {\n\t\treturn probe.NewError(client.InvalidBucketName{Bucket: filepath.Join(bucket, object)})\n\t}\n\tif bucket == \"\" {\n\t\treturn probe.NewError(client.BucketNameEmpty{})\n\t}\n\te := c.api.SetBucketACL(bucket, minio.BucketACL(acl))\n\tif e != nil {\n\t\treturn probe.NewError(e)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "506d71912d9fa8533fe8f7bf8d39641b", "score": "0.56248933", "text": "func Test_GetObjectByAnonymousWithPolicyCondition(t *testing.T) {\n\tsc := NewS3()\n\tsc.CleanEnv()\n\terr := sc.MakeBucket(TEST_BUCKET)\n\tif err != nil {\n\t\tt.Fatal(\"MakeBucket err:\", err)\n\t\tpanic(err)\n\t}\n\terr = sc.PutObject(TEST_BUCKET, TEST_KEY, TEST_VALUE)\n\tif err != nil {\n\t\tt.Fatal(\"PutObject err:\", err)\n\t\tpanic(err)\n\t}\n\n\tillegalRefererUrl := TEST_ILLEGALREFERER + \"ImThief/\"\n\tlegalRefererUrl := TEST_LEGALREFERER + \"ImGentlemen/\"\n\tcommonRefererUrl := TEST_COMMONREFERER + \"ImCommon/\"\n\n\tillegalIP := \"10.0.11.1\"\n\tlegalIP := \"10.0.12.12\"\n\tcommonIP := \"10.0.13.13\"\n\n\t// Situation 1:BucketPolicy Allow Gentlemen; BucketACL Private;\tObjectACL Private; legalRefererUrl GetObject should be OK; commonRefererUrl GetObject should be Failed;\n\tPolicyWithRefererGroup1 := AccessPolicyGroup{BucketPolicy: SetBucketPolicyAllowStringLike, BucketACL: BucketCannedACLPrivate, ObjectACL: ObjectCannedACLPrivate}\n\terr = sc.TestAnonymousAccessResultWithPolicyCondition(PolicyWithRefererGroup1, http.StatusOK, legalRefererUrl, HTTPRequestToGetObjectWithReferer)\n\tif err != nil {\n\t\tt.Log(\"Anonymous access situation 1: SetBucketPolicyAllowStringLike, BucketCannedACLPrivate, ObjectCannedACLPrivate Failed.\")\n\t\tt.Fatal(err)\n\t}\n\terr = sc.TestAnonymousAccessResultWithPolicyCondition(PolicyWithRefererGroup1, http.StatusForbidden, commonRefererUrl, HTTPRequestToGetObjectWithReferer)\n\tif err != nil {\n\t\tt.Log(\"Anonymous access situation 1: SetBucketPolicyAllowStringLike, BucketCannedACLPrivate, ObjectCannedACLPrivate Failed.\")\n\t\tt.Fatal(err)\n\t}\n\n\t// Situation 2:BucketPolicy Allow NotLike Thief; BucketACL Private;\tObjectACL Private; commonRefererUrl GetObject should be OK; illegalRefererUrl GetObject should be Failed;\n\tPolicyWithRefererGroup2 := AccessPolicyGroup{BucketPolicy: SetBucketPolicyAllowStringNotLike, BucketACL: BucketCannedACLPrivate, ObjectACL: ObjectCannedACLPrivate}\n\terr = sc.TestAnonymousAccessResultWithPolicyCondition(PolicyWithRefererGroup2, http.StatusOK, commonRefererUrl, HTTPRequestToGetObjectWithReferer)\n\tif err != nil {\n\t\tt.Log(\"Anonymous access situation 2: SetBucketPolicyAllowStringNotLike, BucketCannedACLPrivate, ObjectCannedACLPrivate Failed.\")\n\t\tt.Fatal(err)\n\t}\n\terr = sc.TestAnonymousAccessResultWithPolicyCondition(PolicyWithRefererGroup2, http.StatusForbidden, illegalRefererUrl, HTTPRequestToGetObjectWithReferer)\n\tif err != nil {\n\t\tt.Log(\"Anonymous access situation 2: SetBucketPolicyAllowStringNotLike, BucketCannedACLPrivate, ObjectCannedACLPrivate Failed.\")\n\t\tt.Fatal(err)\n\t}\n\n\t// Situation 3:BucketPolicy Deny Thief; BucketACL PublicRead; ObjectACL PublicRead; commonRefererUrl GetObject should be OK; illegalRefererUrl GetObject should be Failed;\n\tPolicyWithRefererGroup3 := AccessPolicyGroup{BucketPolicy: SetBucketPolicyDenyStringLike, BucketACL: BucketCannedACLPublicRead, ObjectACL: ObjectCannedACLPublicRead}\n\terr = sc.TestAnonymousAccessResultWithPolicyCondition(PolicyWithRefererGroup3, http.StatusOK, commonRefererUrl, HTTPRequestToGetObjectWithReferer)\n\tif err != nil {\n\t\tt.Log(\"Anonymous access situation 3: SetBucketPolicyDenyStringLike, BucketCannedACLPublicRead, ObjectCannedACLPublicRead Failed.\")\n\t\tt.Fatal(err)\n\t}\n\terr = sc.TestAnonymousAccessResultWithPolicyCondition(PolicyWithRefererGroup3, http.StatusForbidden, illegalRefererUrl, HTTPRequestToGetObjectWithReferer)\n\tif err != nil {\n\t\tt.Log(\"Anonymous access situation 3: SetBucketPolicyDenyStringLike, BucketCannedACLPublicRead, ObjectCannedACLPublicRead Failed.\")\n\t\tt.Fatal(err)\n\t}\n\n\t// Situation 4:BucketPolicy Deny NotLike Gentlemen; BucketACL PublicRead; ObjectACL PublicRead; legalRefererUrl GetObject should be OK; commonRefererUrl GetObject should be Failed;\n\tPolicyWithRefererGroup4 := AccessPolicyGroup{BucketPolicy: SetBucketPolicyDenyStringNotLike, BucketACL: BucketCannedACLPublicRead, ObjectACL: ObjectCannedACLPublicRead}\n\terr = sc.TestAnonymousAccessResultWithPolicyCondition(PolicyWithRefererGroup4, http.StatusOK, legalRefererUrl, HTTPRequestToGetObjectWithReferer)\n\tif err != nil {\n\t\tt.Log(\"Anonymous access situation 4: SetBucketPolicyDenyStringNotLike, BucketCannedACLPublicRead, ObjectCannedACLPublicRead Failed.\")\n\t\tt.Fatal(err)\n\t}\n\terr = sc.TestAnonymousAccessResultWithPolicyCondition(PolicyWithRefererGroup4, http.StatusForbidden, commonRefererUrl, HTTPRequestToGetObjectWithReferer)\n\tif err != nil {\n\t\tt.Log(\"Anonymous access situation 4: SetBucketPolicyDenyStringNotLike, BucketCannedACLPublicRead, ObjectCannedACLPublicRead Failed.\")\n\t\tt.Fatal(err)\n\t}\n\n\t// Situation 5:BucketPolicy Allow IPAddress; BucketACL Private; ObjectACL Private; legalIP GetObject should be OK; commonIP GetObject should be Failed;\n\tPolicyWithRefererGroup5 := AccessPolicyGroup{BucketPolicy: SetBucketPolicyAllowIPAddress, BucketACL: BucketCannedACLPrivate, ObjectACL: ObjectCannedACLPrivate}\n\terr = sc.TestAnonymousAccessResultWithPolicyCondition(PolicyWithRefererGroup5, http.StatusOK, legalIP, HTTPRequestToGetObjectWithSpecialIP)\n\tif err != nil {\n\t\tt.Log(\"Anonymous access situation 5: SetBucketPolicyAllowIPAddress, BucketCannedACLPrivate, ObjectCannedACLPrivate Failed.\")\n\t\tt.Fatal(err)\n\t}\n\terr = sc.TestAnonymousAccessResultWithPolicyCondition(PolicyWithRefererGroup5, http.StatusForbidden, commonIP, HTTPRequestToGetObjectWithSpecialIP)\n\tif err != nil {\n\t\tt.Log(\"Anonymous access situation 5: SetBucketPolicyAllowIPAddress, BucketCannedACLPrivate, ObjectCannedACLPrivate Failed.\")\n\t\tt.Fatal(err)\n\t}\n\n\t// Situation 6:BucketPolicy Allow NotIPAddress; BucketACL Private; ObjectACL Private; commonIP GetObject should be OK; illegalIP GetObject should be Failed;\n\tPolicyWithRefererGroup6 := AccessPolicyGroup{BucketPolicy: SetBucketPolicyAllowNotIPAddress, BucketACL: BucketCannedACLPrivate, ObjectACL: ObjectCannedACLPrivate}\n\terr = sc.TestAnonymousAccessResultWithPolicyCondition(PolicyWithRefererGroup6, http.StatusOK, commonIP, HTTPRequestToGetObjectWithSpecialIP)\n\tif err != nil {\n\t\tt.Log(\"Anonymous access situation 6: SetBucketPolicyAllowNotIPAddress, BucketCannedACLPrivate, ObjectCannedACLPrivate Failed.\")\n\t\tt.Fatal(err)\n\t}\n\terr = sc.TestAnonymousAccessResultWithPolicyCondition(PolicyWithRefererGroup6, http.StatusForbidden, illegalIP, HTTPRequestToGetObjectWithSpecialIP)\n\tif err != nil {\n\t\tt.Log(\"Anonymous access situation 6: SetBucketPolicyAllowNotIPAddress, BucketCannedACLPrivate, ObjectCannedACLPrivate Failed.\")\n\t\tt.Fatal(err)\n\t}\n\n\t// Situation 7:BucketPolicy Deny IPAddress; BucketACL PublicRead; ObjectACL PublicRead; commonIP GetObject should be OK; illegalIP GetObject should be Failed;\n\tPolicyWithRefererGroup7 := AccessPolicyGroup{BucketPolicy: SetBucketPolicyDenyIPAddress, BucketACL: BucketCannedACLPublicRead, ObjectACL: ObjectCannedACLPublicRead}\n\terr = sc.TestAnonymousAccessResultWithPolicyCondition(PolicyWithRefererGroup7, http.StatusOK, commonIP, HTTPRequestToGetObjectWithSpecialIP)\n\tif err != nil {\n\t\tt.Log(\"Anonymous access situation 7: SetBucketPolicyDenyIPAddress, BucketCannedACLPrivate, ObjectCannedACLPrivate Failed.\")\n\t\tt.Fatal(err)\n\t}\n\terr = sc.TestAnonymousAccessResultWithPolicyCondition(PolicyWithRefererGroup7, http.StatusForbidden, illegalIP, HTTPRequestToGetObjectWithSpecialIP)\n\tif err != nil {\n\t\tt.Log(\"Anonymous access situation 7: SetBucketPolicyDenyIPAddress, BucketCannedACLPrivate, ObjectCannedACLPrivate Failed.\")\n\t\tt.Fatal(err)\n\t}\n\n\t// Situation 8:BucketPolicy Deny NotIPAddress; BucketACL PublicRead; ObjectACL PublicRead; legalIP GetObject should be OK; commonIP GetObject should be Failed;\n\tPolicyWithRefererGroup8 := AccessPolicyGroup{BucketPolicy: SetBucketPolicyDenyNotIPAddress, BucketACL: BucketCannedACLPublicRead, ObjectACL: ObjectCannedACLPublicRead}\n\terr = sc.TestAnonymousAccessResultWithPolicyCondition(PolicyWithRefererGroup8, http.StatusOK, legalIP, HTTPRequestToGetObjectWithSpecialIP)\n\tif err != nil {\n\t\tt.Log(\"Anonymous access situation 8: SetBucketPolicyDenyNotIPAddress, BucketCannedACLPrivate, ObjectCannedACLPrivate Failed.\")\n\t\tt.Fatal(err)\n\t}\n\terr = sc.TestAnonymousAccessResultWithPolicyCondition(PolicyWithRefererGroup8, http.StatusForbidden, commonIP, HTTPRequestToGetObjectWithSpecialIP)\n\tif err != nil {\n\t\tt.Log(\"Anonymous access situation 8: SetBucketPolicyDenyNotIPAddress, BucketCannedACLPrivate, ObjectCannedACLPrivate Failed.\")\n\t\tt.Fatal(err)\n\t}\n\n\tsc.CleanEnv()\n}", "title": "" }, { "docid": "4e5f089cff67c0ea9a83e9a884e3ef53", "score": "0.56202054", "text": "func (p *DefaultPolicy) AllowAccess() bool {\n\treturn p.Effect == AllowAccess\n}", "title": "" }, { "docid": "a3bf246cc845c419895c1ea3e3fd7c34", "score": "0.5572981", "text": "func Execute(ctx context.Context, values *Values, services *Services) error {\n\tif values.DryRun {\n\t\tservices.Logger.Info(\"dry_run on, would have enabled Bucket only policy on bucket %q in project %q.\", values.BucketName, values.ProjectID)\n\t\treturn nil\n\t}\n\tif err := services.Resource.EnableBucketOnlyPolicy(ctx, values.BucketName); err != nil {\n\t\treturn err\n\t}\n\tservices.Logger.Info(\"Bucket only policy enabled on bucket %q in project %q.\", values.BucketName, values.ProjectID)\n\treturn nil\n}", "title": "" }, { "docid": "5ca1e3cbad9c8e6d85a7d7fa8fcac039", "score": "0.5540859", "text": "func (c Client) getBucketPolicy(bucketName string, objectPrefix string) (BucketAccessPolicy, error) {\n\t// Get resources properly escaped and lined up before\n\t// using them in http request.\n\turlValues := make(url.Values)\n\turlValues.Set(\"policy\", \"\")\n\n\t// Execute GET on bucket to list objects.\n\tresp, err := c.executeMethod(\"GET\", requestMetadata{\n\t\tbucketName: bucketName,\n\t\tqueryValues: urlValues,\n\t})\n\n\tdefer closeResponse(resp)\n\tif err != nil {\n\t\treturn BucketAccessPolicy{}, err\n\t}\n\treturn processBucketPolicyResponse(bucketName, resp)\n\n}", "title": "" }, { "docid": "5f24ed76e5bb52b22b14901d8c98f793", "score": "0.5454453", "text": "func (tb *TokenBucket) Allow() bool {\n\ttb.mx.Lock()\n\tdefer tb.mx.Unlock()\n\n\ttb.lastAccessTime = time.Now()\n\n\tif tb.currentAmount > 0 { // Bucket is not empty\n\t\ttb.currentAmount-- // decrease the number of tokens in the bucket\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "370e36b25abce1505cf5f0e09a3f1464", "score": "0.54479176", "text": "func putBucket(w http.ResponseWriter, r *http.Request) {\n\n\tpathParams := mux.Vars(r)\n\tsageBucketID := pathParams[\"bucket\"]\n\t//objectKey := pathParams[\"key\"]\n\n\tvars := mux.Vars(r)\n\tusername := vars[\"username\"]\n\n\trawQuery := r.URL.RawQuery\n\n\tif strings.Contains(rawQuery, \"permission\") {\n\t\tallowed, err := userHasBucketPermission(username, sageBucketID, \"WRITE_ACP\")\n\t\tif err != nil {\n\t\t\trespondJSONError(w, http.StatusBadRequest, err.Error())\n\t\t\treturn\n\t\t}\n\t\tif !allowed {\n\t\t\trespondJSONError(w, http.StatusUnauthorized, \"Write access to bucket permissions denied (%s, %s)\", username, sageBucketID)\n\t\t\treturn\n\t\t}\n\n\t\tbucketObject, err := GetSageBucket(sageBucketID)\n\t\tif err != nil {\n\t\t\trespondJSONError(w, http.StatusBadRequest, err.Error())\n\t\t\treturn\n\t\t}\n\n\t\tvar newPerm SAGEBucketPermission\n\n\t\terr = json.NewDecoder(r.Body).Decode(&newPerm)\n\t\tif err != nil {\n\t\t\terr = fmt.Errorf(\"Could not parse json: %s\", err.Error())\n\t\t\trespondJSONError(w, http.StatusBadRequest, err.Error())\n\t\t\treturn\n\t\t}\n\n\t\tif bucketObject.Owner == newPerm.Grantee {\n\t\t\trespondJSONError(w, http.StatusBadRequest, \"You cannot change your own permissons.\")\n\t\t\treturn\n\t\t}\n\n\t\tif newPerm.GranteeType == \"\" {\n\t\t\trespondJSONError(w, http.StatusBadRequest, \"GranteeType missing\")\n\t\t\treturn\n\t\t}\n\n\t\tif newPerm.GranteeType == \"GROUP\" && newPerm.Grantee == \"AllUsers\" && newPerm.Permission != \"READ\" {\n\t\t\trespondJSONError(w, http.StatusBadRequest, \"Buckets can be made public only for READ access.\")\n\t\t\treturn\n\t\t}\n\n\t\t//do something\n\t\tdb, err := sql.Open(\"mysql\", mysqlDSN)\n\t\tif err != nil {\n\t\t\terr = fmt.Errorf(\"Unable to connect to database: %v\", err)\n\t\t\treturn\n\t\t}\n\t\tdefer db.Close()\n\n\t\tinsertQueryStr := \"INSERT INTO BucketPermissions (id, granteeType, grantee, permission) VALUES ( UUID_TO_BIN(?), ? , ?, ?) ;\"\n\t\t_, err = db.Exec(insertQueryStr, sageBucketID, newPerm.GranteeType, newPerm.Grantee, newPerm.Permission)\n\t\tif err != nil {\n\t\t\tme, ok := err.(*mysql.MySQLError)\n\t\t\tif ok {\n\t\t\t\tif me.Number == 1062 {\n\t\t\t\t\t// entry already exists, quietly respond OK\n\t\t\t\t\trespondJSON(w, http.StatusOK, newPerm)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t}\n\t\t\terr = fmt.Errorf(\"Adding bucket permissions failed: %s\", err.Error())\n\t\t\trespondJSONError(w, http.StatusUnauthorized, err.Error())\n\t\t\treturn\n\t\t}\n\n\t\trespondJSON(w, http.StatusOK, newPerm)\n\t\treturn\n\t}\n\n\trespondJSONError(w, http.StatusUnauthorized, \"Only query ?permissions supported\")\n\treturn\n\t//respondJSON(w, http.StatusOK, newBucket)\n\t//bucket fields:\n\t//metadata , name , type, (owner, change requires permission change)\n\n\t//permission\n\n}", "title": "" }, { "docid": "ce33c7aa298f6836d5f9bb5a68927ef3", "score": "0.5358648", "text": "func storageBucketIAMPolicy(ctx context.Context, g *google, resourceType string, filters *filter.Filter) ([]provider.Resource, error) {\n\tbuckets, err := g.gcpr.ListBuckets(ctx)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"unable to list bucket policies custom roles from reader\")\n\t}\n\tresources := make([]provider.Resource, 0, len(buckets))\n\tfor _, bucket := range buckets {\n\t\tr := provider.NewResource(bucket.Name, resourceType, g)\n\t\tresources = append(resources, r)\n\t}\n\treturn resources, nil\n}", "title": "" }, { "docid": "090c898e55bdabc5b32d0b83b6a963f4", "score": "0.53178173", "text": "func (m *ConditionalAccessRequestBuilder) Policies()(*i27d3a1bae6f4577a4de2876ba58fad41be78be972958441916bfc0b15d805933.PoliciesRequestBuilder) {\n return i27d3a1bae6f4577a4de2876ba58fad41be78be972958441916bfc0b15d805933.NewPoliciesRequestBuilderInternal(m.pathParameters, m.requestAdapter);\n}", "title": "" }, { "docid": "0719be675ca46b7a9eb65604b3bc88f5", "score": "0.5315965", "text": "func (o BucketOutput) PublicAccessBlockEnabled() pulumi.BoolOutput {\n\treturn o.ApplyT(func(v *Bucket) pulumi.BoolOutput { return v.PublicAccessBlockEnabled }).(pulumi.BoolOutput)\n}", "title": "" }, { "docid": "27ef49aa25ae3503c990d0ab52eb0e83", "score": "0.52901596", "text": "func testPutBucketPolicyHandler(obj ObjectLayer, instanceType, bucketName string, apiRouter http.Handler,\n\tcredentials auth.Credentials, t *testing.T) {\n\n\tbucketName1 := fmt.Sprintf(\"%s-1\", bucketName)\n\tif err := obj.MakeBucketWithLocation(context.Background(), bucketName1, \"\"); err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\t// template for constructing HTTP request body for PUT bucket policy.\n\tbucketPolicyTemplate := `{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":[\"*\"]},\"Action\":[\"s3:GetBucketLocation\",\"s3:ListBucket\"],\"Resource\":[\"arn:aws:s3:::%s\"]},{\"Sid\":\"\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":[\"*\"]},\"Action\":[\"s3:GetObject\"],\"Resource\":[\"arn:aws:s3:::%s/this*\"]}]}`\n\n\t// test cases with sample input and expected output.\n\ttestCases := []struct {\n\t\tbucketName string\n\t\t// bucket policy to be set,\n\t\t// set as request body.\n\t\tbucketPolicyReader io.ReadSeeker\n\t\t// length in bytes of the bucket policy being set.\n\t\tpolicyLen int\n\t\taccessKey string\n\t\tsecretKey string\n\t\t// expected Response.\n\t\texpectedRespStatus int\n\t}{\n\t\t// Test case - 1.\n\t\t{\n\t\t\tbucketName: bucketName,\n\t\t\tbucketPolicyReader: bytes.NewReader([]byte(fmt.Sprintf(bucketPolicyTemplate, bucketName, bucketName))),\n\n\t\t\tpolicyLen: len(fmt.Sprintf(bucketPolicyTemplate, bucketName, bucketName)),\n\t\t\taccessKey: credentials.AccessKey,\n\t\t\tsecretKey: credentials.SecretKey,\n\t\t\texpectedRespStatus: http.StatusNoContent,\n\t\t},\n\t\t// Test case - 2.\n\t\t// Setting the content length to be more than max allowed size.\n\t\t// Expecting StatusBadRequest (400).\n\t\t{\n\t\t\tbucketName: bucketName,\n\t\t\tbucketPolicyReader: bytes.NewReader([]byte(fmt.Sprintf(bucketPolicyTemplate, bucketName, bucketName))),\n\n\t\t\tpolicyLen: maxAccessPolicySize + 1,\n\t\t\taccessKey: credentials.AccessKey,\n\t\t\tsecretKey: credentials.SecretKey,\n\t\t\texpectedRespStatus: http.StatusBadRequest,\n\t\t},\n\t\t// Test case - 3.\n\t\t// Case with content-length of the HTTP request set to 0.\n\t\t// Expecting the HTTP response status to be StatusLengthRequired (411).\n\t\t{\n\t\t\tbucketName: bucketName,\n\t\t\tbucketPolicyReader: bytes.NewReader([]byte(fmt.Sprintf(bucketPolicyTemplate, bucketName, bucketName))),\n\n\t\t\tpolicyLen: 0,\n\t\t\taccessKey: credentials.AccessKey,\n\t\t\tsecretKey: credentials.SecretKey,\n\t\t\texpectedRespStatus: http.StatusLengthRequired,\n\t\t},\n\t\t// Test case - 4.\n\t\t// setting the readSeeker to `nil`, bucket policy parser will fail.\n\t\t{\n\t\t\tbucketName: bucketName,\n\t\t\tbucketPolicyReader: nil,\n\n\t\t\tpolicyLen: 10,\n\t\t\taccessKey: credentials.AccessKey,\n\t\t\tsecretKey: credentials.SecretKey,\n\t\t\texpectedRespStatus: http.StatusBadRequest,\n\t\t},\n\t\t// Test case - 5.\n\t\t// setting the keys to be empty.\n\t\t// Expecting statusForbidden.\n\t\t{\n\t\t\tbucketName: bucketName,\n\t\t\tbucketPolicyReader: nil,\n\n\t\t\tpolicyLen: 10,\n\t\t\taccessKey: \"\",\n\t\t\tsecretKey: \"\",\n\t\t\texpectedRespStatus: http.StatusForbidden,\n\t\t},\n\t\t// Test case - 6.\n\t\t// setting an invalid bucket policy.\n\t\t// the bucket policy parser will fail.\n\t\t{\n\t\t\tbucketName: bucketName,\n\t\t\tbucketPolicyReader: bytes.NewReader([]byte(\"dummy-policy\")),\n\n\t\t\tpolicyLen: len([]byte(\"dummy-policy\")),\n\t\t\taccessKey: credentials.AccessKey,\n\t\t\tsecretKey: credentials.SecretKey,\n\t\t\texpectedRespStatus: http.StatusBadRequest,\n\t\t},\n\t\t// Test case - 7.\n\t\t// Different bucket name used in the HTTP request and the policy string.\n\t\t// checkBucketPolicyResources should fail.\n\t\t{\n\t\t\tbucketName: bucketName1,\n\t\t\tbucketPolicyReader: bytes.NewReader([]byte(fmt.Sprintf(bucketPolicyTemplate, bucketName, bucketName))),\n\n\t\t\tpolicyLen: len(fmt.Sprintf(bucketPolicyTemplate, bucketName, bucketName)),\n\t\t\taccessKey: credentials.AccessKey,\n\t\t\tsecretKey: credentials.SecretKey,\n\t\t\texpectedRespStatus: http.StatusBadRequest,\n\t\t},\n\t\t// Test case - 8.\n\t\t// non-existent bucket is used.\n\t\t// writing BucketPolicy should fail.\n\t\t// should result is 500 InternalServerError.\n\t\t{\n\t\t\tbucketName: \"non-existent-bucket\",\n\t\t\tbucketPolicyReader: bytes.NewReader([]byte(fmt.Sprintf(bucketPolicyTemplate, \"non-existent-bucket\", \"non-existent-bucket\"))),\n\n\t\t\tpolicyLen: len(fmt.Sprintf(bucketPolicyTemplate, bucketName, bucketName)),\n\t\t\taccessKey: credentials.AccessKey,\n\t\t\tsecretKey: credentials.SecretKey,\n\t\t\texpectedRespStatus: http.StatusNotFound,\n\t\t},\n\t\t// Test case - 9.\n\t\t// invalid bucket name is used.\n\t\t// writing BucketPolicy should fail.\n\t\t// should result is 400 StatusBadRequest.\n\t\t{\n\t\t\tbucketName: \".invalid-bucket\",\n\t\t\tbucketPolicyReader: bytes.NewReader([]byte(fmt.Sprintf(bucketPolicyTemplate, \".invalid-bucket\", \".invalid-bucket\"))),\n\n\t\t\tpolicyLen: len(fmt.Sprintf(bucketPolicyTemplate, bucketName, bucketName)),\n\t\t\taccessKey: credentials.AccessKey,\n\t\t\tsecretKey: credentials.SecretKey,\n\t\t\texpectedRespStatus: http.StatusBadRequest,\n\t\t},\n\t}\n\n\t// Iterating over the test cases, calling the function under test and asserting the response.\n\tfor i, testCase := range testCases {\n\t\t// obtain the put bucket policy request body.\n\t\t// initialize HTTP NewRecorder, this records any mutations to response writer inside the handler.\n\t\trecV4 := httptest.NewRecorder()\n\t\t// construct HTTP request for PUT bucket policy endpoint.\n\t\treqV4, err := newTestSignedRequestV4(\"PUT\", getPutPolicyURL(\"\", testCase.bucketName),\n\t\t\tint64(testCase.policyLen), testCase.bucketPolicyReader, testCase.accessKey, testCase.secretKey)\n\t\tif err != nil {\n\t\t\tt.Fatalf(\"Test %d: %s: Failed to create HTTP request for PutBucketPolicyHandler: <ERROR> %v\", i+1, instanceType, err)\n\t\t}\n\t\t// Since `apiRouter` satisfies `http.Handler` it has a ServeHTTP to execute the logic ofthe handler.\n\t\t// Call the ServeHTTP to execute the handler.\n\t\tapiRouter.ServeHTTP(recV4, reqV4)\n\t\tif recV4.Code != testCase.expectedRespStatus {\n\t\t\tt.Errorf(\"Test %d: %s: Expected the response status to be `%d`, but instead found `%d`\", i+1, instanceType, testCase.expectedRespStatus, recV4.Code)\n\t\t}\n\t\t// initialize HTTP NewRecorder, this records any mutations to response writer inside the handler.\n\t\trecV2 := httptest.NewRecorder()\n\t\t// construct HTTP request for PUT bucket policy endpoint.\n\t\treqV2, err := newTestSignedRequestV2(\"PUT\", getPutPolicyURL(\"\", testCase.bucketName),\n\t\t\tint64(testCase.policyLen), testCase.bucketPolicyReader, testCase.accessKey, testCase.secretKey)\n\t\tif err != nil {\n\t\t\tt.Fatalf(\"Test %d: %s: Failed to create HTTP request for PutBucketPolicyHandler: <ERROR> %v\", i+1, instanceType, err)\n\t\t}\n\t\t// Since `apiRouter` satisfies `http.Handler` it has a ServeHTTP to execute the logic ofthe handler.\n\t\t// Call the ServeHTTP to execute the handler.\n\t\tapiRouter.ServeHTTP(recV2, reqV2)\n\t\tif recV2.Code != testCase.expectedRespStatus {\n\t\t\tt.Errorf(\"Test %d: %s: Expected the response status to be `%d`, but instead found `%d`\", i+1, instanceType, testCase.expectedRespStatus, recV2.Code)\n\t\t}\n\t}\n\n\t// Test for Anonymous/unsigned http request.\n\t// Bucket policy related functions doesn't support anonymous requests, setting policies shouldn't make a difference.\n\tbucketPolicyStr := fmt.Sprintf(bucketPolicyTemplate, bucketName, bucketName)\n\t// create unsigned HTTP request for PutBucketPolicyHandler.\n\tanonReq, err := newTestRequest(\"PUT\", getPutPolicyURL(\"\", bucketName),\n\t\tint64(len(bucketPolicyStr)), bytes.NewReader([]byte(bucketPolicyStr)))\n\n\tif err != nil {\n\t\tt.Fatalf(\"Minio %s: Failed to create an anonymous request for bucket \\\"%s\\\": <ERROR> %v\",\n\t\t\tinstanceType, bucketName, err)\n\t}\n\n\t// ExecObjectLayerAPIAnonTest - Calls the HTTP API handler using the anonymous request, validates the ErrAccessDeniedResponse,\n\t// sets the bucket policy using the policy statement generated from `getWriteOnlyObjectStatement` so that the\n\t// unsigned request goes through and its validated again.\n\tExecObjectLayerAPIAnonTest(t, obj, \"PutBucketPolicyHandler\", bucketName, \"\", instanceType, apiRouter, anonReq, getWriteOnlyObjectStatement)\n\n\t// HTTP request for testing when `objectLayer` is set to `nil`.\n\t// There is no need to use an existing bucket and valid input for creating the request\n\t// since the `objectLayer==nil` check is performed before any other checks inside the handlers.\n\t// The only aim is to generate an HTTP request in a way that the relevant/registered end point is evoked/called.\n\tnilBucket := \"dummy-bucket\"\n\n\tnilReq, err := newTestSignedRequestV4(\"PUT\", getPutPolicyURL(\"\", nilBucket),\n\t\t0, nil, \"\", \"\")\n\n\tif err != nil {\n\t\tt.Errorf(\"Minio %s: Failed to create HTTP request for testing the response when object Layer is set to `nil`.\", instanceType)\n\t}\n\t// execute the object layer set to `nil` test.\n\t// `ExecObjectLayerAPINilTest` manages the operation.\n\tExecObjectLayerAPINilTest(t, nilBucket, \"\", instanceType, apiRouter, nilReq)\n\n}", "title": "" }, { "docid": "2d51c4facf21fcf5dbd4e91990ff762f", "score": "0.52833503", "text": "func AuthoriserAllowAll(id, key string) bool {\n\treturn true\n}", "title": "" }, { "docid": "74cfea9776aca91c71f6880e9913412c", "score": "0.52122045", "text": "func processBucketPolicyResponse(bucketName string, resp *http.Response) (BucketAccessPolicy, error) {\n\tif resp != nil {\n\t\tif resp.StatusCode != http.StatusOK {\n\t\t\terrResponse := httpRespToErrorResponse(resp, bucketName, \"\")\n\t\t\tif ToErrorResponse(errResponse).Code == \"NoSuchBucketPolicy\" {\n\t\t\t\treturn BucketAccessPolicy{Version: \"2012-10-17\"}, nil\n\t\t\t}\n\t\t\treturn BucketAccessPolicy{}, errResponse\n\t\t}\n\t}\n\t// Read access policy up to maxAccessPolicySize.\n\t// http://docs.aws.amazon.com/AmazonS3/latest/dev/access-policy-language-overview.html\n\t// bucket policies are limited to 20KB in size, using a limit reader.\n\tbucketPolicyBuf, err := ioutil.ReadAll(io.LimitReader(resp.Body, maxAccessPolicySize))\n\tif err != nil {\n\t\treturn BucketAccessPolicy{}, err\n\t}\n\tpolicy, err := unMarshalBucketPolicy(bucketPolicyBuf)\n\tif err != nil {\n\t\treturn BucketAccessPolicy{}, err\n\t}\n\t// Sort the policy actions and resources for convenience.\n\tfor _, statement := range policy.Statements {\n\t\tsort.Strings(statement.Actions)\n\t\tsort.Strings(statement.Resources)\n\t}\n\treturn policy, nil\n}", "title": "" }, { "docid": "4ee933f304b5fc26d20559a8a5cc8b62", "score": "0.520804", "text": "func (s *Service) IsAccessAllowed(r *AccessRequest)(bool) {\n\t// TODO: Sort on importance of policy\n\tsort.SliceStable(s.Policies, func(i, j int) bool {return s.Policies[i].Id < s.Policies[j].Id})\n\n\tlog.Printf(\"Checking policy for user=%s, groups=%s, access=%s, location=%s\\n\",\n\t\tr.User, r.UserGroups, r.AccessType, r.Resource.Location)\n\n\tallowed := false\n\tresourceMatch := false\n\n\tfor _, p := range s.Policies {\n\t\t// match resource\n\t\tfor _, v := range p.Resources {\n\t\t\tfor _, bucketName := range v.Values {\n\t\t\t\tif v.IsRecursive {\n\t\t\t\t\tbucketName += \"*\"\n\t\t\t\t}\n\t\t\t\tif glob.Glob(bucketName, r.Resource.Location) {\n\t\t\t\t\tresourceMatch = true\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tlog.Printf(\"Policy id=%d, name=%s, resource_match=%s\\n\", p.Id, p.Name, resourceMatch)\n\n\t\tif !resourceMatch {\n\t\t\tcontinue\n\t\t}\n\n\t\t// We have a resource match\n\n\t\tlog.Printf(\"Checking allow policy items=%d\\n\", len(p.PolicyItems))\n\t\tfor _, item := range p.PolicyItems {\n\t\t\t// user first\n\t\t\tallowed = hasAccess([]string{r.User}, item.Users, item.Accesses, r.AccessType, r.User == r.Resource.Owner)\n\n\t\t\t// groups\n\t\t\tif !allowed {\n\t\t\t\tallowed = hasAccess(r.UserGroups, item.Groups, item.Accesses, r.AccessType, false)\n\t\t\t}\n\n\t\t\t// conditions\n\t\t\tif allowed {\n\t\t\t\tlog.Printf(\"Checking allow policy conditions\\n\")\n\t\t\t\tfound := false\n\t\t\t\tfor _, condition := range item.Conditions {\n\t\t\t\t\tvar err error\n\t\t\t\t\terr, found = condition.isInCondition(r)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tlog.Printf(\"Error checking condition=%s err=%s\\n\", condition, err)\n\t\t\t\t\t}\n\t\t\t\t\tif found {\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tif !found && len(item.Conditions) > 0 {\n\t\t\t\t\tlog.Printf(\"policyItem=%s conditions not met\\n\", item)\n\t\t\t\t\tallowed = false\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t// TODO: check exceptions\n\t\t}\n\n\t\tlog.Printf(\"Checking deny policy items=%d\\n\", len(p.DenyPolicyItems))\n\n\t\tfor _, item := range p.DenyPolicyItems {\n\t\t\t// allowed signals denial\n\t\t\tallowed = !hasAccess([]string{r.User}, item.Users, item.Accesses, r.AccessType, r.User == r.Resource.Owner)\n\n\t\t\t// groups\n\t\t\tif allowed {\n\t\t\t\tallowed = !hasAccess(r.UserGroups, item.Groups, item.Accesses, r.AccessType, false)\n\t\t\t}\n\n\t\t\t// conditions\n\t\t\tif !allowed {\n\t\t\t\tlog.Printf(\"Checking deny policy conditions\\n\")\n\t\t\t\tfound := false\n\t\t\t\tfor _, condition := range item.Conditions {\n\t\t\t\t\t_, found = condition.isInCondition(r)\n\t\t\t\t\tif found {\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tif !found && len(item.Conditions) > 0 {\n\t\t\t\t\tallowed = true\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t// TODO: check exceptions\n\t\t}\n\n\t\t// if we got here we had a resource match\n\t\tbreak\n\t}\n\n\treturn allowed\n}", "title": "" }, { "docid": "39dccd79d032c9a2596be3aa20810197", "score": "0.51886916", "text": "func (bal *bucketAccessListener) Add(ctx context.Context, obj *v1alpha1.BucketAccess) error {\n\tklog.V(1).Infof(\"bucketAccessListener: add called for bucket access %s\", obj.Name)\n\n\t// Verify this bucket access is for this provisioner\n\tif !strings.EqualFold(obj.Spec.Provisioner, bal.provisionerName) {\n\t\treturn nil\n\t}\n\n\tbucketInstanceName := obj.Spec.BucketInstanceName\n\tbucket, err := bal.bucketAccessClient.ObjectstorageV1alpha1().Buckets().Get(ctx, bucketInstanceName, metav1.GetOptions{})\n\tif err != nil {\n\t\treturn fmt.Errorf(\"unable to get bucket instance %s: %+v\", bucketInstanceName, err)\n\t}\n\n\treq := osspec.ProvisionerGrantBucketAccessRequest{\n\t\tPrincipal: obj.Spec.Principal,\n\t\tAccessPolicy: obj.Spec.PolicyActionsConfigMapData,\n\t\tBucketContext: map[string]string{},\n\t}\n\n\tswitch bucket.Spec.Protocol.Name {\n\tcase v1alpha1.ProtocolNameS3:\n\t\treq.BucketName = bucket.Spec.Protocol.S3.BucketName\n\t\treq.Region = bucket.Spec.Protocol.S3.Region\n\t\treq.BucketContext[\"Version\"] = bucket.Spec.Protocol.S3.Version\n\t\treq.BucketContext[\"SignatureVersion\"] = string(bucket.Spec.Protocol.S3.SignatureVersion)\n\t\treq.BucketContext[\"Endpoint\"] = bucket.Spec.Protocol.S3.Endpoint\n\tcase v1alpha1.ProtocolNameAzure:\n\t\treq.BucketName = bucket.Spec.Protocol.AzureBlob.ContainerName\n\t\treq.BucketContext[\"StorageAccount\"] = bucket.Spec.Protocol.AzureBlob.StorageAccount\n\tcase v1alpha1.ProtocolNameGCS:\n\t\treq.BucketName = bucket.Spec.Protocol.GCS.BucketName\n\t\treq.BucketContext[\"ServiceAccount\"] = bucket.Spec.Protocol.GCS.ServiceAccount\n\t\treq.BucketContext[\"PrivateKeyName\"] = bucket.Spec.Protocol.GCS.PrivateKeyName\n\t\treq.BucketContext[\"ProjectID\"] = bucket.Spec.Protocol.GCS.ProjectID\n\tdefault:\n\t\treturn fmt.Errorf(\"unknown protocol: %s\", bucket.Spec.Protocol.Name)\n\t}\n\n\t// TODO set grpc timeout\n\trsp, err := bal.provisionerClient.ProvisionerGrantBucketAccess(ctx, &req)\n\tif err != nil {\n\t\tklog.Errorf(\"error calling ProvisionerGrantBucketAccess: %v\", err)\n\t\treturn err\n\t}\n\tklog.V(1).Infof(\"provisioner returned grant bucket access response %v\", rsp)\n\n\t// Only update the principal in the BucketAccess if it wasn't set because\n\t// that means that the provisioner created one\n\tif len(obj.Spec.Principal) == 0 {\n\t\terr = bal.updatePrincipal(ctx, obj.Name, *rsp)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// Only create the secret with credentials if serviveAccount isn't set.\n\t// If serviceAccount is set then authorization happens out of band in the\n\t// cloud provider\n\tif len(obj.Spec.ServiceAccount) == 0 {\n\t\tsecret := v1.Secret{\n\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\tName: generateSecretName(obj.UID),\n\t\t\t},\n\t\t\tStringData: map[string]string{\n\t\t\t\t\"CredentialsFilePath\": rsp.CredentialsFilePath,\n\t\t\t\t\"CredentialsFileContents\": rsp.CredentialsFileContents,\n\t\t\t},\n\t\t\tType: v1.SecretTypeOpaque,\n\t\t}\n\t\t// It's unlikely but should probably handle retries on rare case of collision\n\t\t_, err = bal.kubeClient.CoreV1().Secrets(\"objectstorage-system\").Create(ctx, &secret, metav1.CreateOptions{})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// update bucket access status to granted\n\treturn bal.updateStatus(ctx, obj.Name, \"Permissions Granted\", true)\n}", "title": "" }, { "docid": "7380e6ed1b7727d8b70bcb2a94f88f4c", "score": "0.5182873", "text": "func TestBucketPolicyActionMatch(t *testing.T) {\n\tbucketName := getRandomBucketName()\n\tobjectPrefix := \"test-object\"\n\n\ttestCases := []struct {\n\t\taction string\n\t\tstatement policy.Statement\n\t\texpectedResult bool\n\t}{\n\t\t// s3:GetBucketLocation is the action necessary to be present in the bucket policy to allow\n\t\t// fetching of bucket location on an Anonymous/unsigned request.\n\n\t\t//r ead-write bucket policy is expected to allow GetBucketLocation operation on an anonymous request (Test case - 1).\n\t\t{\"s3:GetBucketLocation\", getReadWriteBucketStatement(bucketName, objectPrefix), true},\n\t\t//\twrite-only bucket policy is expected to allow GetBucketLocation operation on an anonymous request (Test case - 2).\n\t\t{\"s3:GetBucketLocation\", getWriteOnlyBucketStatement(bucketName, objectPrefix), true},\n\t\t//\tread-only bucket policy is expected to allow GetBucketLocation operation on an anonymous request (Test case - 3).\n\t\t{\"s3:GetBucketLocation\", getReadOnlyBucketStatement(bucketName, objectPrefix), true},\n\n\t\t// Any of the Object level access permissions shouldn't allow for GetBucketLocation operation on an Anonymous/unsigned request (Test cases 4-6).\n\t\t{\"s3:GetBucketLocation\", getReadWriteObjectStatement(bucketName, objectPrefix), false},\n\t\t{\"s3:GetBucketLocation\", getWriteOnlyObjectStatement(bucketName, objectPrefix), false},\n\t\t{\"s3:GetBucketLocation\", getReadOnlyObjectStatement(bucketName, objectPrefix), false},\n\n\t\t// s3:ListBucketMultipartUploads is the action necessary to be present in the bucket policy to allow\n\t\t// Listing of multipart uploads in a given bucket for an Anonymous/unsigned request.\n\n\t\t//read-write bucket policy is expected to allow ListBucketMultipartUploads operation on an anonymous request (Test case 7).\n\t\t{\"s3:ListBucketMultipartUploads\", getReadWriteBucketStatement(bucketName, objectPrefix), true},\n\t\t//\twrite-only bucket policy is expected to allow ListBucketMultipartUploads operation on an anonymous request (Test case 8).\n\t\t{\"s3:ListBucketMultipartUploads\", getWriteOnlyBucketStatement(bucketName, objectPrefix), true},\n\t\t// read-only bucket policy is expected to not allow ListBucketMultipartUploads operation on an anonymous request (Test case 9).\n\t\t// the allowed actions in read-only bucket statement are \"s3:GetBucketLocation\",\"s3:ListBucket\",\n\t\t// this should not allow for ListBucketMultipartUploads operations.\n\t\t{\"s3:ListBucketMultipartUploads\", getReadOnlyBucketStatement(bucketName, objectPrefix), false},\n\n\t\t// Any of the object level policy will not allow for s3:ListBucketMultipartUploads (Test cases 10-12).\n\t\t{\"s3:ListBucketMultipartUploads\", getReadWriteObjectStatement(bucketName, objectPrefix), false},\n\t\t{\"s3:ListBucketMultipartUploads\", getWriteOnlyObjectStatement(bucketName, objectPrefix), false},\n\t\t{\"s3:ListBucketMultipartUploads\", getReadOnlyObjectStatement(bucketName, objectPrefix), false},\n\n\t\t// s3:ListBucket is the action necessary to be present in the bucket policy to allow\n\t\t// listing of all objects inside a given bucket on an Anonymous/unsigned request.\n\n\t\t// Cases for testing ListBucket access for different Bucket level access permissions.\n\t\t// read-only bucket policy is expected to allow ListBucket operation on an anonymous request (Test case 13).\n\t\t{\"s3:ListBucket\", getReadOnlyBucketStatement(bucketName, objectPrefix), true},\n\t\t// read-write bucket policy is expected to allow ListBucket operation on an anonymous request (Test case 14).\n\t\t{\"s3:ListBucket\", getReadWriteBucketStatement(bucketName, objectPrefix), true},\n\t\t// write-only bucket policy is expected to not allow ListBucket operation on an anonymous request (Test case 15).\n\t\t// the allowed actions in write-only bucket statement are \"s3:GetBucketLocation\",\t\"s3:ListBucketMultipartUploads\",\n\t\t// this should not allow for ListBucket operations.\n\t\t{\"s3:ListBucket\", getWriteOnlyBucketStatement(bucketName, objectPrefix), false},\n\n\t\t// Cases for testing ListBucket access for different Object level access permissions (Test cases 16-18).\n\t\t// Any of the Object level access permissions shouldn't allow for ListBucket operation on an Anonymous/unsigned request.\n\t\t{\"s3:ListBucket\", getReadOnlyObjectStatement(bucketName, objectPrefix), false},\n\t\t{\"s3:ListBucket\", getReadWriteObjectStatement(bucketName, objectPrefix), false},\n\t\t{\"s3:ListBucket\", getWriteOnlyObjectStatement(bucketName, objectPrefix), false},\n\n\t\t// s3:DeleteObject is the action necessary to be present in the bucket policy to allow\n\t\t// deleting/removal of objects inside a given bucket for an Anonymous/unsigned request.\n\n\t\t// Cases for testing DeleteObject access for different Bucket level access permissions (Test cases 19-21).\n\t\t// Any of the Bucket level access permissions shouldn't allow for DeleteObject operation on an Anonymous/unsigned request.\n\t\t{\"s3:DeleteObject\", getReadOnlyBucketStatement(bucketName, objectPrefix), false},\n\t\t{\"s3:DeleteObject\", getReadWriteBucketStatement(bucketName, objectPrefix), false},\n\t\t{\"s3:DeleteObject\", getWriteOnlyBucketStatement(bucketName, objectPrefix), false},\n\n\t\t// Cases for testing DeleteObject access for different Object level access permissions (Test cases 22).\n\t\t// read-only bucket policy is expected to not allow Delete Object operation on an anonymous request.\n\t\t{\"s3:DeleteObject\", getReadOnlyObjectStatement(bucketName, objectPrefix), false},\n\t\t// read-write bucket policy is expected to allow Delete Bucket operation on an anonymous request (Test cases 23).\n\t\t{\"s3:DeleteObject\", getReadWriteObjectStatement(bucketName, objectPrefix), true},\n\t\t// write-only bucket policy is expected to allow Delete Object operation on an anonymous request (Test cases 24).\n\t\t{\"s3:DeleteObject\", getWriteOnlyObjectStatement(bucketName, objectPrefix), true},\n\n\t\t// s3:AbortMultipartUpload is the action necessary to be present in the bucket policy to allow\n\t\t// cancelling or abortion of an already initiated multipart upload operation for an Anonymous/unsigned request.\n\n\t\t// Cases for testing AbortMultipartUpload access for different Bucket level access permissions (Test cases 25-27).\n\t\t// Any of the Bucket level access permissions shouldn't allow for AbortMultipartUpload operation on an Anonymous/unsigned request.\n\t\t{\"s3:AbortMultipartUpload\", getReadOnlyBucketStatement(bucketName, objectPrefix), false},\n\t\t{\"s3:AbortMultipartUpload\", getReadWriteBucketStatement(bucketName, objectPrefix), false},\n\t\t{\"s3:AbortMultipartUpload\", getWriteOnlyBucketStatement(bucketName, objectPrefix), false},\n\n\t\t// Cases for testing AbortMultipartUpload access for different Object level access permissions.\n\t\t// read-only object policy is expected to not allow AbortMultipartUpload operation on an anonymous request (Test case 28).\n\t\t{\"s3:AbortMultipartUpload\", getReadOnlyObjectStatement(bucketName, objectPrefix), false},\n\t\t// read-write object policy is expected to allow AbortMultipartUpload operation on an anonymous request (Test case 29).\n\t\t{\"s3:AbortMultipartUpload\", getReadWriteObjectStatement(bucketName, objectPrefix), true},\n\t\t// write-only object policy is expected to allow AbortMultipartUpload operation on an anonymous request (Test case 30).\n\t\t{\"s3:AbortMultipartUpload\", getWriteOnlyObjectStatement(bucketName, objectPrefix), true},\n\n\t\t// s3:PutObject is the action necessary to be present in the bucket policy to allow\n\t\t// uploading of an object for an Anonymous/unsigned request.\n\n\t\t// Cases for testing PutObject access for different Bucket level access permissions (Test cases 31-33).\n\t\t// Any of the Bucket level access permissions shouldn't allow for PutObject operation on an Anonymous/unsigned request.\n\t\t{\"s3:PutObject\", getReadOnlyBucketStatement(bucketName, objectPrefix), false},\n\t\t{\"s3:PutObject\", getReadWriteBucketStatement(bucketName, objectPrefix), false},\n\t\t{\"s3:PutObject\", getWriteOnlyBucketStatement(bucketName, objectPrefix), false},\n\n\t\t// Cases for testing PutObject access for different Object level access permissions.\n\t\t// read-only object policy is expected to not allow PutObject operation on an anonymous request (Test case 34).\n\t\t{\"s3:PutObject\", getReadOnlyObjectStatement(bucketName, objectPrefix), false},\n\t\t// read-write object policy is expected to allow PutObject operation on an anonymous request (Test case 35).\n\t\t{\"s3:PutObject\", getReadWriteObjectStatement(bucketName, objectPrefix), true},\n\t\t// write-only object policy is expected to allow PutObject operation on an anonymous request (Test case 36).\n\t\t{\"s3:PutObject\", getWriteOnlyObjectStatement(bucketName, objectPrefix), true},\n\n\t\t// s3:GetObject is the action necessary to be present in the bucket policy to allow\n\t\t// downloading of an object for an Anonymous/unsigned request.\n\n\t\t// Cases for testing GetObject access for different Bucket level access permissions (Test cases 37-39).\n\t\t// Any of the Bucket level access permissions shouldn't allow for GetObject operation on an Anonymous/unsigned request.\n\t\t{\"s3:GetObject\", getReadOnlyBucketStatement(bucketName, objectPrefix), false},\n\t\t{\"s3:GetObject\", getReadWriteBucketStatement(bucketName, objectPrefix), false},\n\t\t{\"s3:GetObject\", getWriteOnlyBucketStatement(bucketName, objectPrefix), false},\n\n\t\t// Cases for testing GetObject access for different Object level access permissions.\n\t\t// read-only bucket policy is expected to allow downloading of an Object on an anonymous request (Test case 40).\n\t\t{\"s3:GetObject\", getReadOnlyObjectStatement(bucketName, objectPrefix), true},\n\t\t// read-write bucket policy is expected to allow downloading of an Object on an anonymous request (Test case 41).\n\t\t{\"s3:GetObject\", getReadWriteObjectStatement(bucketName, objectPrefix), true},\n\t\t// write-only bucket policy is expected to not allow downloading of an Object on an anonymous request (Test case 42).\n\t\t{\"s3:GetObject\", getWriteOnlyObjectStatement(bucketName, objectPrefix), false},\n\n\t\t// s3:ListMultipartUploadParts is the action necessary to be present in the bucket policy to allow\n\t\t// Listing of uploaded parts for an Anonymous/unsigned request.\n\n\t\t// Any of the Bucket level access permissions shouldn't allow for ListMultipartUploadParts operation on an Anonymous/unsigned request.\n\t\t// read-only bucket policy is expected to not allow ListMultipartUploadParts operation on an anonymous request (Test cases 43-45).\n\t\t{\"s3:ListMultipartUploadParts\", getReadOnlyBucketStatement(bucketName, objectPrefix), false},\n\t\t{\"s3:ListMultipartUploadParts\", getReadWriteBucketStatement(bucketName, objectPrefix), false},\n\t\t{\"s3:ListMultipartUploadParts\", getWriteOnlyBucketStatement(bucketName, objectPrefix), false},\n\n\t\t// read-only object policy is expected to not allow ListMultipartUploadParts operation on an anonymous request (Test case 46).\n\t\t{\"s3:ListMultipartUploadParts\", getReadOnlyObjectStatement(bucketName, objectPrefix), false},\n\t\t// read-write object policy is expected to allow ListMultipartUploadParts operation on an anonymous request (Test case 47).\n\t\t{\"s3:ListMultipartUploadParts\", getReadWriteObjectStatement(bucketName, objectPrefix), true},\n\t\t// write-only object policy is expected to allow ListMultipartUploadParts operation on an anonymous request (Test case 48).\n\t\t{\"s3:ListMultipartUploadParts\", getWriteOnlyObjectStatement(bucketName, objectPrefix), true},\n\t}\n\tfor i, testCase := range testCases {\n\t\tactualResult := bucketPolicyActionMatch(testCase.action, testCase.statement)\n\t\tif testCase.expectedResult != actualResult {\n\t\t\tt.Errorf(\"Test %d: Expected the result to be `%v`, but instead found it to be `%v`\", i+1, testCase.expectedResult, actualResult)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "08ec2570aa14eaf27eaf2358a34ffb21", "score": "0.5181106", "text": "func TestGetBucketPolicyHandler(t *testing.T) {\n\tExecObjectLayerAPITest(t, testGetBucketPolicyHandler, []string{\"PutBucketPolicy\", \"GetBucketPolicy\"})\n}", "title": "" }, { "docid": "8f442a6d4f98a9884f5b54b9fd329d23", "score": "0.5109055", "text": "func testDeleteBucketPolicyHandler(obj ObjectLayer, instanceType, bucketName string, apiRouter http.Handler,\n\tcredentials auth.Credentials, t *testing.T) {\n\n\t// template for constructing HTTP request body for PUT bucket policy.\n\tbucketPolicyTemplate := `{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:ListBucket\"\n ],\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"AWS\": [\n \"*\"\n ]\n },\n \"Resource\": [\n \"arn:aws:s3:::%s\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetObject\"\n ],\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"AWS\": [\n \"*\"\n ]\n },\n \"Resource\": [\n \"arn:aws:s3:::%s/this*\"\n ]\n }\n ]\n}`\n\n\t// Writing bucket policy before running test on DeleteBucketPolicy.\n\tputTestPolicies := []struct {\n\t\tbucketName string\n\t\taccessKey string\n\t\tsecretKey string\n\t\t// expected Response.\n\t\texpectedRespStatus int\n\t}{\n\t\t{\n\t\t\tbucketName: bucketName,\n\t\t\taccessKey: credentials.AccessKey,\n\t\t\tsecretKey: credentials.SecretKey,\n\t\t\texpectedRespStatus: http.StatusNoContent,\n\t\t},\n\t}\n\n\t// Iterating over the cases and writing the bucket policy.\n\t// its required to write the policies first before running tests on GetBucketPolicy.\n\tfor i, testPolicy := range putTestPolicies {\n\t\t// obtain the put bucket policy request body.\n\t\tbucketPolicyStr := fmt.Sprintf(bucketPolicyTemplate, testPolicy.bucketName, testPolicy.bucketName)\n\t\t// initialize HTTP NewRecorder, this records any mutations to response writer inside the handler.\n\t\trecV4 := httptest.NewRecorder()\n\t\t// construct HTTP request for PUT bucket policy endpoint.\n\t\treqV4, err := newTestSignedRequestV4(\"PUT\", getPutPolicyURL(\"\", testPolicy.bucketName),\n\t\t\tint64(len(bucketPolicyStr)), bytes.NewReader([]byte(bucketPolicyStr)), testPolicy.accessKey, testPolicy.secretKey)\n\t\tif err != nil {\n\t\t\tt.Fatalf(\"Test %d: Failed to create HTTP request for PutBucketPolicyHandler: <ERROR> %v\", i+1, err)\n\t\t}\n\t\t// Since `apiRouter` satisfies `http.Handler` it has a ServeHTTP to execute the logic of the handler.\n\t\t// Call the ServeHTTP to execute the handler.\n\t\tapiRouter.ServeHTTP(recV4, reqV4)\n\t\tif recV4.Code != testPolicy.expectedRespStatus {\n\t\t\tt.Fatalf(\"Case %d: Expected the response status to be `%d`, but instead found `%d`\", i+1, testPolicy.expectedRespStatus, recV4.Code)\n\t\t}\n\t}\n\n\t// testcases with input and expected output for DeleteBucketPolicyHandler.\n\ttestCases := []struct {\n\t\tbucketName string\n\t\taccessKey string\n\t\tsecretKey string\n\t\t// expected response.\n\t\texpectedRespStatus int\n\t}{\n\t\t// Test case - 1.\n\t\t{\n\t\t\tbucketName: bucketName,\n\t\t\taccessKey: credentials.AccessKey,\n\t\t\tsecretKey: credentials.SecretKey,\n\t\t\texpectedRespStatus: http.StatusNoContent,\n\t\t},\n\t\t// Test case - 2.\n\t\t// Case with non-existent-bucket.\n\t\t{\n\t\t\tbucketName: \"non-existent-bucket\",\n\t\t\taccessKey: credentials.AccessKey,\n\t\t\tsecretKey: credentials.SecretKey,\n\t\t\texpectedRespStatus: http.StatusNotFound,\n\t\t},\n\t\t// Test case - 3.\n\t\t// Case with invalid bucket name.\n\t\t{\n\t\t\tbucketName: \".invalid-bucket-name\",\n\t\t\taccessKey: credentials.AccessKey,\n\t\t\tsecretKey: credentials.SecretKey,\n\t\t\texpectedRespStatus: http.StatusBadRequest,\n\t\t},\n\t}\n\t// Iterating over the cases and deleting the bucket policy and then asserting response.\n\tfor i, testCase := range testCases {\n\t\t// initialize HTTP NewRecorder, this records any mutations to response writer inside the handler.\n\t\trecV4 := httptest.NewRecorder()\n\t\t// construct HTTP request for Delete bucket policy endpoint.\n\t\treqV4, err := newTestSignedRequestV4(\"DELETE\", getDeletePolicyURL(\"\", testCase.bucketName),\n\t\t\t0, nil, testCase.accessKey, testCase.secretKey)\n\t\tif err != nil {\n\t\t\tt.Fatalf(\"Test %d: Failed to create HTTP request for GetBucketPolicyHandler: <ERROR> %v\", i+1, err)\n\t\t}\n\t\t// Since `apiRouter` satisfies `http.Handler` it has a ServeHTTP to execute the logic of the handler.\n\t\t// Call the ServeHTTP to execute the handler, DeleteBucketPolicyHandler handles the request.\n\t\tapiRouter.ServeHTTP(recV4, reqV4)\n\t\t// Assert the response code with the expected status.\n\t\tif recV4.Code != testCase.expectedRespStatus {\n\t\t\tt.Fatalf(\"Case %d: Expected the response status to be `%d`, but instead found `%d`\", i+1, testCase.expectedRespStatus, recV4.Code)\n\t\t}\n\t}\n\n\t// Iterating over the cases and writing the bucket policy.\n\t// its required to write the policies first before running tests on GetBucketPolicy.\n\tfor i, testPolicy := range putTestPolicies {\n\t\t// obtain the put bucket policy request body.\n\t\tbucketPolicyStr := fmt.Sprintf(bucketPolicyTemplate, testPolicy.bucketName, testPolicy.bucketName)\n\t\t// initialize HTTP NewRecorder, this records any mutations to response writer inside the handler.\n\t\trecV2 := httptest.NewRecorder()\n\t\t// construct HTTP request for PUT bucket policy endpoint.\n\t\treqV2, err := newTestSignedRequestV2(\"PUT\", getPutPolicyURL(\"\", testPolicy.bucketName),\n\t\t\tint64(len(bucketPolicyStr)), bytes.NewReader([]byte(bucketPolicyStr)), testPolicy.accessKey, testPolicy.secretKey)\n\t\tif err != nil {\n\t\t\tt.Fatalf(\"Test %d: Failed to create HTTP request for PutBucketPolicyHandler: <ERROR> %v\", i+1, err)\n\t\t}\n\t\t// Since `apiRouter` satisfies `http.Handler` it has a ServeHTTP to execute the logic of the handler.\n\t\t// Call the ServeHTTP to execute the handler.\n\t\tapiRouter.ServeHTTP(recV2, reqV2)\n\t\tif recV2.Code != testPolicy.expectedRespStatus {\n\t\t\tt.Fatalf(\"Case %d: Expected the response status to be `%d`, but instead found `%d`\", i+1, testPolicy.expectedRespStatus, recV2.Code)\n\t\t}\n\t}\n\n\tfor i, testCase := range testCases {\n\t\t// initialize HTTP NewRecorder, this records any mutations to response writer inside the handler.\n\t\trecV2 := httptest.NewRecorder()\n\t\t// construct HTTP request for Delete bucket policy endpoint.\n\t\treqV2, err := newTestSignedRequestV2(\"DELETE\", getDeletePolicyURL(\"\", testCase.bucketName),\n\t\t\t0, nil, testCase.accessKey, testCase.secretKey)\n\t\tif err != nil {\n\t\t\tt.Fatalf(\"Test %d: Failed to create HTTP request for GetBucketPolicyHandler: <ERROR> %v\", i+1, err)\n\t\t}\n\t\t// Since `apiRouter` satisfies `http.Handler` it has a ServeHTTP to execute the logic of the handler.\n\t\t// Call the ServeHTTP to execute the handler, DeleteBucketPolicyHandler handles the request.\n\t\tapiRouter.ServeHTTP(recV2, reqV2)\n\t\t// Assert the response code with the expected status.\n\t\tif recV2.Code != testCase.expectedRespStatus {\n\t\t\tt.Fatalf(\"Case %d: Expected the response status to be `%d`, but instead found `%d`\", i+1, testCase.expectedRespStatus, recV2.Code)\n\t\t}\n\t}\n\t// Test for Anonymous/unsigned http request.\n\t// Bucket policy related functions doesn't support anonymous requests, setting policies shouldn't make a difference.\n\t// create unsigned HTTP request for PutBucketPolicyHandler.\n\tanonReq, err := newTestRequest(\"DELETE\", getPutPolicyURL(\"\", bucketName), 0, nil)\n\n\tif err != nil {\n\t\tt.Fatalf(\"Minio %s: Failed to create an anonymous request for bucket \\\"%s\\\": <ERROR> %v\",\n\t\t\tinstanceType, bucketName, err)\n\t}\n\n\t// ExecObjectLayerAPIAnonTest - Calls the HTTP API handler using the anonymous request, validates the ErrAccessDeniedResponse,\n\t// sets the bucket policy using the policy statement generated from `getWriteOnlyObjectStatement` so that the\n\t// unsigned request goes through and its validated again.\n\tExecObjectLayerAPIAnonTest(t, obj, \"DeleteBucketPolicyHandler\", bucketName, \"\", instanceType, apiRouter, anonReq, getReadOnlyObjectStatement)\n\n\t// HTTP request for testing when `objectLayer` is set to `nil`.\n\t// There is no need to use an existing bucket and valid input for creating the request\n\t// since the `objectLayer==nil` check is performed before any other checks inside the handlers.\n\t// The only aim is to generate an HTTP request in a way that the relevant/registered end point is evoked/called.\n\tnilBucket := \"dummy-bucket\"\n\n\tnilReq, err := newTestSignedRequestV4(\"DELETE\", getDeletePolicyURL(\"\", nilBucket),\n\t\t0, nil, \"\", \"\")\n\n\tif err != nil {\n\t\tt.Errorf(\"Minio %s: Failed to create HTTP request for testing the response when object Layer is set to `nil`.\", instanceType)\n\t}\n\t// execute the object layer set to `nil` test.\n\t// `ExecObjectLayerAPINilTest` manages the operation.\n\tExecObjectLayerAPINilTest(t, nilBucket, \"\", instanceType, apiRouter, nilReq)\n}", "title": "" }, { "docid": "7ee7063b6e0c77b84620abddc688dcfc", "score": "0.5105944", "text": "func (s defaultStore) Get(bucketName string) authz.ACLList {\n\treturn s.policies[bucketName]\n}", "title": "" }, { "docid": "e61a69e4feffe1f31855cec2fb41a98e", "score": "0.5105475", "text": "func Authorize(policies []*policy.Policy, action string, object orn.ORN, _context map[string]string) error {\n\tfinalEffect := denyAction // By default deny\n\n\tfor _, policy := range policies {\n\t\tfor _, statement := range policy.Statements {\n\n\t\t\t// TODO: @gearnode Add context support when policy object support condition\n\t\t\t// The context should be evaluate at the last check to avoid\n\t\t\t// long evaluation on not matching statement.\n\t\t\tcurrentEffect := evalStatement(statement, object, action)\n\n\t\t\t// Explicit deny (stop the evaluation)\n\t\t\t// No allow can override an deny action.\n\t\t\tif currentEffect == denyAction {\n\t\t\t\treturn ErrAccessDenied\n\t\t\t}\n\n\t\t\t// Explicit allow (modify the result effect and don't break the evaluation).\n\t\t\t// Next statement can deny this statement allow.\n\t\t\tif currentEffect == allowAction {\n\t\t\t\tfinalEffect = allowAction\n\t\t\t}\n\t\t}\n\t}\n\n\tif finalEffect == allowAction {\n\t\treturn nil\n\t}\n\n\treturn ErrAccessDenied\n}", "title": "" }, { "docid": "beb15a47f602d6965605fc518e27674a", "score": "0.50958294", "text": "func (bal *bucketAccessListener) Delete(ctx context.Context, obj *v1alpha1.BucketAccess) error {\n\tklog.V(1).Infof(\"bucketAccessListener: delete called for bucket access %s\", obj.Name)\n\n\t// Verify this bucket access is for this provisioner\n\tif !strings.EqualFold(obj.Spec.Provisioner, bal.provisionerName) {\n\t\treturn nil\n\t}\n\n\tbucketInstanceName := obj.Spec.BucketInstanceName\n\tbucket, err := bal.bucketAccessClient.ObjectstorageV1alpha1().Buckets().Get(ctx, bucketInstanceName, metav1.GetOptions{})\n\tif err != nil {\n\t\treturn fmt.Errorf(\"unable to get bucket instance %s: %+v\", bucketInstanceName, err)\n\t}\n\n\treq := osspec.ProvisionerRevokeBucketAccessRequest{\n\t\tPrincipal: obj.Spec.Principal,\n\t\tBucketContext: map[string]string{},\n\t}\n\n\tswitch bucket.Spec.Protocol.Name {\n\tcase v1alpha1.ProtocolNameS3:\n\t\treq.BucketName = bucket.Spec.Protocol.S3.BucketName\n\t\treq.Region = bucket.Spec.Protocol.S3.Region\n\t\treq.BucketContext[\"Version\"] = bucket.Spec.Protocol.S3.Version\n\t\treq.BucketContext[\"SignatureVersion\"] = string(bucket.Spec.Protocol.S3.SignatureVersion)\n\t\treq.BucketContext[\"Endpoint\"] = bucket.Spec.Protocol.S3.Endpoint\n\tcase v1alpha1.ProtocolNameAzure:\n\t\treq.BucketName = bucket.Spec.Protocol.AzureBlob.ContainerName\n\t\treq.BucketContext[\"StorageAccount\"] = bucket.Spec.Protocol.AzureBlob.StorageAccount\n\tcase v1alpha1.ProtocolNameGCS:\n\t\treq.BucketName = bucket.Spec.Protocol.GCS.BucketName\n\t\treq.BucketContext[\"ServiceAccount\"] = bucket.Spec.Protocol.GCS.ServiceAccount\n\t\treq.BucketContext[\"PrivateKeyName\"] = bucket.Spec.Protocol.GCS.PrivateKeyName\n\t\treq.BucketContext[\"ProjectID\"] = bucket.Spec.Protocol.GCS.ProjectID\n\tdefault:\n\t\treturn fmt.Errorf(\"unknown protocol: %s\", bucket.Spec.Protocol.Name)\n\t}\n\n\t// TODO set grpc timeout\n\trsp, err := bal.provisionerClient.ProvisionerRevokeBucketAccess(ctx, &req)\n\tif err != nil {\n\t\tklog.Errorf(\"error calling ProvisionerRevokeBucketAccess: %v\", err)\n\t\treturn err\n\t}\n\tklog.V(1).Infof(\"provisioner returned revoke bucket access response %v\", rsp)\n\n\t// Delete the secret\n\tif len(obj.Spec.ServiceAccount) == 0 {\n\t\t// It's unlikely but should probably handle retries on rare case of collision\n\t\terr = bal.kubeClient.CoreV1().Secrets(\"objectstorage-system\").Delete(ctx, generateSecretName(obj.UID), metav1.DeleteOptions{})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// Update bucket access status to revoked\n\treturn bal.updateStatus(ctx, obj.Name, \"Permissions Revoked\", false)\n}", "title": "" }, { "docid": "77006eecbda92017c6def38b3ce69fc3", "score": "0.5073551", "text": "func allowUnauthenticated(project, name, region string) error {\n\tclient, err := runapi.NewService(context.TODO())\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to initialize Run API client: %w\", err)\n\t}\n\n\tres := fmt.Sprintf(\"projects/%s/locations/%s/services/%s\", project, region, name)\n\tpolicy, err := client.Projects.Locations.Services.GetIamPolicy(res).Do()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to get IAM policy for Cloud Run Service: %w\", err)\n\t}\n\n\tpolicy.Bindings = append(policy.Bindings, &runapi.Binding{\n\t\tMembers: []string{\"allUsers\"},\n\t\tRole: \"roles/run.invoker\",\n\t})\n\n\t_, err = client.Projects.Locations.Services.SetIamPolicy(res, &runapi.SetIamPolicyRequest{Policy: policy}).Do()\n\tif err != nil {\n\t\tvar extra string\n\t\te, ok := err.(*googleapi.Error)\n\t\tif ok {\n\t\t\textra = fmt.Sprintf(\"code=%d, message=%s -- %s\", e.Code, e.Message, e.Body)\n\t\t}\n\t\treturn fmt.Errorf(\"failed to set IAM policy for Cloud Run Service: %w %s\", err, extra)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "70a7622342d446f0040d2603cb9faca7", "score": "0.5051467", "text": "func (b *bucketAccessRequestListener) provisionBucketAccess(ctx context.Context, bucketAccessRequest *v1alpha1.BucketAccessRequest) error {\n\tbaClient := b.bucketClient.ObjectstorageV1alpha1().BucketAccesses()\n\tbacClient := b.bucketClient.ObjectstorageV1alpha1().BucketAccessClasses()\n\tbrClient := b.bucketClient.ObjectstorageV1alpha1().BucketRequests\n\tbarClient := b.bucketClient.ObjectstorageV1alpha1().BucketAccessRequests\n\tcoreClient := b.kubeClient.CoreV1()\n\n\tname := string(bucketAccessRequest.GetUID())\n\n\tif bucketAccessRequest.Status.BucketAccessName != \"\" {\n\t\treturn util.ErrBucketAccessAlreadyExists\n\t}\n\n\tbucketAccessClassName := bucketAccessRequest.Spec.BucketAccessClassName\n\tbucketAccessClass, err := bacClient.Get(ctx, bucketAccessClassName, metav1.GetOptions{})\n\tif err != nil {\n\t\t// bucket access class is invalid or not specified, cannot continue with provisioning.\n\t\tklog.Errorf(\"error fetching bucketaccessclass [%v]: %v\", bucketAccessClassName, err)\n\t\treturn util.ErrInvalidBucketAccessClass\n\t}\n\n\tbrName := bucketAccessRequest.Spec.BucketRequestName\n\t// TODO: catch this in a admission controller\n\tif brName == \"\" {\n\t\treturn util.ErrInvalidBucketAccessRequest\n\t}\n\tbucketRequest, err := brClient(bucketAccessRequest.Namespace).Get(ctx, brName, metav1.GetOptions{})\n\tif err != nil {\n\t\tklog.Errorf(\"error fetching bucket request [%v]: %v\", brName, err)\n\t\treturn err\n\t}\n\n\tif bucketRequest.Status.BucketName == \"\" || !bucketRequest.Status.BucketAvailable {\n\t\treturn util.ErrWaitForBucketProvisioning\n\t}\n\n\tsaName := bucketAccessRequest.Spec.ServiceAccountName\n\tsa := &v1.ServiceAccount{}\n\tif saName != \"\" {\n\t\tsa, err = coreClient.ServiceAccounts(bucketAccessRequest.Namespace).Get(ctx, saName, metav1.GetOptions{})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tbucketaccess := &v1alpha1.BucketAccess{}\n\tbucketaccess.Name = name\n\n\tbucketaccess.Spec.BucketName = bucketRequest.Status.BucketName\n\n\tbucketaccess.Spec.BucketAccessRequest = &v1.ObjectReference{\n\t\tName: bucketAccessRequest.Name,\n\t\tNamespace: bucketAccessRequest.Namespace,\n\t\tUID: bucketAccessRequest.ObjectMeta.UID,\n\t}\n\tbucketaccess.Spec.ServiceAccount = &v1.ObjectReference{\n\t\tName: sa.Name,\n\t\tNamespace: sa.Namespace,\n\t\tUID: sa.ObjectMeta.UID,\n\t}\n\t// bucketaccess.Spec.MintedSecretName - set by the driver\n\tbucketaccess.Spec.PolicyActionsConfigMapData, err = util.ReadConfigData(b.kubeClient, bucketAccessClass.PolicyActionsConfigMap)\n\tif err != nil {\n\t\treturn err\n\t}\n\t// bucketaccess.Spec.Principal - set by the driver\n\n\tbucketaccess.Spec.Parameters = util.CopySS(bucketAccessClass.Parameters)\n\n\tbucketaccess, err = baClient.Create(context.Background(), bucketaccess, metav1.CreateOptions{})\n\tif err != nil && !errors.IsAlreadyExists(err) {\n\t\treturn err\n\t}\n\n\tcontrollerutil.AddFinalizer(bucketAccessRequest, finalizer)\n\n\tbucketAccessRequest.Status.BucketAccessName = bucketaccess.Name\n\tbucketAccessRequest.Status.AccessGranted = true\n\t_, err = barClient(bucketAccessRequest.Namespace).UpdateStatus(ctx, bucketAccessRequest, metav1.UpdateOptions{})\n\tif err != nil {\n\t\treturn err\n\t}\n\tklog.Infof(\"Finished creating BucketAccess %v\", bucketaccess.Name)\n\treturn nil\n}", "title": "" }, { "docid": "157760418fdc740ae34bd0dd0981b964", "score": "0.5041634", "text": "func setDefaultCannedPolicies(policies map[string]iampolicy.Policy) {\n\t_, ok := policies[\"writeonly\"]\n\tif !ok {\n\t\tpolicies[\"writeonly\"] = iampolicy.WriteOnly\n\t}\n\t_, ok = policies[\"readonly\"]\n\tif !ok {\n\t\tpolicies[\"readonly\"] = iampolicy.ReadOnly\n\t}\n\t_, ok = policies[\"readwrite\"]\n\tif !ok {\n\t\tpolicies[\"readwrite\"] = iampolicy.ReadWrite\n\t}\n}", "title": "" }, { "docid": "7182acdb06a446028cc74ac8e4efbb73", "score": "0.5027454", "text": "func (n *notificationJobAPI) requirePolicyAccess(ctx context.Context, projectNameIrID interface{}, policy *policyModel.Policy) error {\n\tp, err := n.projectMgr.Get(ctx, projectNameIrID)\n\tif err != nil {\n\t\treturn err\n\t}\n\t// check the projectID whether match with the projectID in policy\n\tif p.ProjectID != policy.ProjectID {\n\t\treturn errors.NotFoundError(errors.Errorf(\"project id %d does not match\", p.ProjectID))\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "7a40f53c7e7f97092c551d24e140b3c1", "score": "0.49801818", "text": "func (s *MockSupport) Policy(channelID, ns, coll string) (privdata.CollectionAccessPolicy, error) {\n\treturn s.CollPolicy, s.Err\n}", "title": "" }, { "docid": "5bd40fcd633b589ab1ca46d131b66c2d", "score": "0.49781024", "text": "func testGetBucketPolicyHandler(obj ObjectLayer, instanceType, bucketName string, apiRouter http.Handler,\n\tcredentials auth.Credentials, t *testing.T) {\n\t// template for constructing HTTP request body for PUT bucket policy.\n\tbucketPolicyTemplate := `{\"Version\":\"2012-10-17\",\"Statement\":[{\"Action\":[\"s3:GetBucketLocation\",\"s3:ListBucket\"],\"Effect\":\"Allow\",\"Principal\":{\"AWS\":[\"*\"]},\"Resource\":[\"arn:aws:s3:::%s\"],\"Sid\":\"\"},{\"Action\":[\"s3:GetObject\"],\"Effect\":\"Allow\",\"Principal\":{\"AWS\":[\"*\"]},\"Resource\":[\"arn:aws:s3:::%s/this*\"],\"Sid\":\"\"}]}`\n\n\t// Writing bucket policy before running test on GetBucketPolicy.\n\tputTestPolicies := []struct {\n\t\tbucketName string\n\t\taccessKey string\n\t\tsecretKey string\n\t\t// expected Response.\n\t\texpectedRespStatus int\n\t}{\n\t\t{bucketName, credentials.AccessKey, credentials.SecretKey, http.StatusNoContent},\n\t}\n\n\t// Iterating over the cases and writing the bucket policy.\n\t// its required to write the policies first before running tests on GetBucketPolicy.\n\tfor i, testPolicy := range putTestPolicies {\n\t\t// obtain the put bucket policy request body.\n\t\tbucketPolicyStr := fmt.Sprintf(bucketPolicyTemplate, testPolicy.bucketName, testPolicy.bucketName)\n\t\t// initialize HTTP NewRecorder, this records any mutations to response writer inside the handler.\n\t\trecV4 := httptest.NewRecorder()\n\t\t// construct HTTP request for PUT bucket policy endpoint.\n\t\treqV4, err := newTestSignedRequestV4(\"PUT\", getPutPolicyURL(\"\", testPolicy.bucketName),\n\t\t\tint64(len(bucketPolicyStr)), bytes.NewReader([]byte(bucketPolicyStr)), testPolicy.accessKey, testPolicy.secretKey)\n\t\tif err != nil {\n\t\t\tt.Fatalf(\"Test %d: Failed to create HTTP request for PutBucketPolicyHandler: <ERROR> %v\", i+1, err)\n\t\t}\n\t\t// Since `apiRouter` satisfies `http.Handler` it has a ServeHTTP to execute the logic ofthe handler.\n\t\t// Call the ServeHTTP to execute the handler.\n\t\tapiRouter.ServeHTTP(recV4, reqV4)\n\t\tif recV4.Code != testPolicy.expectedRespStatus {\n\t\t\tt.Fatalf(\"Case %d: Expected the response status to be `%d`, but instead found `%d`\", i+1, testPolicy.expectedRespStatus, recV4.Code)\n\t\t}\n\t\t// initialize HTTP NewRecorder, this records any mutations to response writer inside the handler.\n\t\trecV2 := httptest.NewRecorder()\n\t\t// construct HTTP request for PUT bucket policy endpoint.\n\t\treqV2, err := newTestSignedRequestV2(\"PUT\", getPutPolicyURL(\"\", testPolicy.bucketName),\n\t\t\tint64(len(bucketPolicyStr)), bytes.NewReader([]byte(bucketPolicyStr)), testPolicy.accessKey, testPolicy.secretKey)\n\t\tif err != nil {\n\t\t\tt.Fatalf(\"Test %d: Failed to create HTTP request for PutBucketPolicyHandler: <ERROR> %v\", i+1, err)\n\t\t}\n\t\t// Since `apiRouter` satisfies `http.Handler` it has a ServeHTTP to execute the logic ofthe handler.\n\t\t// Call the ServeHTTP to execute the handler.\n\t\tapiRouter.ServeHTTP(recV2, reqV2)\n\t\tif recV2.Code != testPolicy.expectedRespStatus {\n\t\t\tt.Fatalf(\"Case %d: Expected the response status to be `%d`, but instead found `%d`\", i+1, testPolicy.expectedRespStatus, recV2.Code)\n\t\t}\n\t}\n\n\t// test cases with inputs and expected result for GetBucketPolicyHandler.\n\ttestCases := []struct {\n\t\tbucketName string\n\t\taccessKey string\n\t\tsecretKey string\n\t\t// expected output.\n\t\texpectedBucketPolicy string\n\t\texpectedRespStatus int\n\t}{\n\t\t// Test case - 1.\n\t\t// Case which valid inputs, expected to return success status of 200OK.\n\t\t{\n\t\t\tbucketName: bucketName,\n\t\t\taccessKey: credentials.AccessKey,\n\t\t\tsecretKey: credentials.SecretKey,\n\t\t\texpectedBucketPolicy: bucketPolicyTemplate,\n\t\t\texpectedRespStatus: http.StatusOK,\n\t\t},\n\t\t// Test case - 2.\n\t\t// Case with non-existent bucket name.\n\t\t{\n\t\t\tbucketName: \"non-existent-bucket\",\n\t\t\taccessKey: credentials.AccessKey,\n\t\t\tsecretKey: credentials.SecretKey,\n\t\t\texpectedBucketPolicy: bucketPolicyTemplate,\n\t\t\texpectedRespStatus: http.StatusNotFound,\n\t\t},\n\t\t// Test case - 3.\n\t\t// Case with invalid bucket name.\n\t\t{\n\t\t\tbucketName: \".invalid-bucket-name\",\n\t\t\taccessKey: credentials.AccessKey,\n\t\t\tsecretKey: credentials.SecretKey,\n\t\t\texpectedBucketPolicy: \"\",\n\t\t\texpectedRespStatus: http.StatusBadRequest,\n\t\t},\n\t}\n\t// Iterating over the cases, fetching the policy and validating the response.\n\tfor i, testCase := range testCases {\n\t\t// expected bucket policy json string.\n\t\texpectedBucketPolicyStr := fmt.Sprintf(testCase.expectedBucketPolicy, testCase.bucketName, testCase.bucketName)\n\t\t// initialize HTTP NewRecorder, this records any mutations to response writer inside the handler.\n\t\trecV4 := httptest.NewRecorder()\n\t\t// construct HTTP request for PUT bucket policy endpoint.\n\t\treqV4, err := newTestSignedRequestV4(\"GET\", getGetPolicyURL(\"\", testCase.bucketName),\n\t\t\t0, nil, testCase.accessKey, testCase.secretKey)\n\n\t\tif err != nil {\n\t\t\tt.Fatalf(\"Test %d: Failed to create HTTP request for GetBucketPolicyHandler: <ERROR> %v\", i+1, err)\n\t\t}\n\t\t// Since `apiRouter` satisfies `http.Handler` it has a ServeHTTP to execute the logic of the handler.\n\t\t// Call the ServeHTTP to execute the handler, GetBucketPolicyHandler handles the request.\n\t\tapiRouter.ServeHTTP(recV4, reqV4)\n\t\t// Assert the response code with the expected status.\n\t\tif recV4.Code != testCase.expectedRespStatus {\n\t\t\tt.Fatalf(\"Case %d: Expected the response status to be `%d`, but instead found `%d`\", i+1, testCase.expectedRespStatus, recV4.Code)\n\t\t}\n\t\t// read the response body.\n\t\tbucketPolicyReadBuf, err := ioutil.ReadAll(recV4.Body)\n\t\tif err != nil {\n\t\t\tt.Fatalf(\"Test %d: %s: Failed parsing response body: <ERROR> %v\", i+1, instanceType, err)\n\t\t}\n\n\t\tif recV4.Code != testCase.expectedRespStatus {\n\t\t\t// Verify whether the bucket policy fetched is same as the one inserted.\n\t\t\tif expectedBucketPolicyStr != string(bucketPolicyReadBuf) {\n\t\t\t\tt.Errorf(\"Test %d: %s: Bucket policy differs from expected value.\", i+1, instanceType)\n\t\t\t}\n\t\t}\n\t\t// initialize HTTP NewRecorder, this records any mutations to response writer inside the handler.\n\t\trecV2 := httptest.NewRecorder()\n\t\t// construct HTTP request for PUT bucket policy endpoint.\n\t\treqV2, err := newTestSignedRequestV2(\"GET\", getGetPolicyURL(\"\", testCase.bucketName),\n\t\t\t0, nil, testCase.accessKey, testCase.secretKey)\n\t\tif err != nil {\n\t\t\tt.Fatalf(\"Test %d: Failed to create HTTP request for GetBucketPolicyHandler: <ERROR> %v\", i+1, err)\n\t\t}\n\t\t// Since `apiRouter` satisfies `http.Handler` it has a ServeHTTP to execute the logic of the handler.\n\t\t// Call the ServeHTTP to execute the handler, GetBucketPolicyHandler handles the request.\n\t\tapiRouter.ServeHTTP(recV2, reqV2)\n\t\t// Assert the response code with the expected status.\n\t\tif recV2.Code != testCase.expectedRespStatus {\n\t\t\tt.Fatalf(\"Case %d: Expected the response status to be `%d`, but instead found `%d`\", i+1, testCase.expectedRespStatus, recV2.Code)\n\t\t}\n\t\t// read the response body.\n\t\tbucketPolicyReadBuf, err = ioutil.ReadAll(recV2.Body)\n\t\tif err != nil {\n\t\t\tt.Fatalf(\"Test %d: %s: Failed parsing response body: <ERROR> %v\", i+1, instanceType, err)\n\t\t}\n\t\tif recV2.Code == http.StatusOK {\n\t\t\t// Verify whether the bucket policy fetched is same as the one inserted.\n\t\t\tif expectedBucketPolicyStr != string(bucketPolicyReadBuf) {\n\t\t\t\tt.Errorf(\"Test %d: %s: Bucket policy differs from expected value.\", i+1, instanceType)\n\t\t\t}\n\t\t}\n\t}\n\n\t// Test for Anonymous/unsigned http request.\n\t// Bucket policy related functions doesn't support anonymous requests, setting policies shouldn't make a difference.\n\t// create unsigned HTTP request for PutBucketPolicyHandler.\n\tanonReq, err := newTestRequest(\"GET\", getPutPolicyURL(\"\", bucketName), 0, nil)\n\n\tif err != nil {\n\t\tt.Fatalf(\"Minio %s: Failed to create an anonymous request for bucket \\\"%s\\\": <ERROR> %v\",\n\t\t\tinstanceType, bucketName, err)\n\t}\n\n\t// ExecObjectLayerAPIAnonTest - Calls the HTTP API handler using the anonymous request, validates the ErrAccessDeniedResponse,\n\t// sets the bucket policy using the policy statement generated from `getWriteOnlyObjectStatement` so that the\n\t// unsigned request goes through and its validated again.\n\tExecObjectLayerAPIAnonTest(t, obj, \"GetBucketPolicyHandler\", bucketName, \"\", instanceType, apiRouter, anonReq, getReadOnlyObjectStatement)\n\n\t// HTTP request for testing when `objectLayer` is set to `nil`.\n\t// There is no need to use an existing bucket and valid input for creating the request\n\t// since the `objectLayer==nil` check is performed before any other checks inside the handlers.\n\t// The only aim is to generate an HTTP request in a way that the relevant/registered end point is evoked/called.\n\tnilBucket := \"dummy-bucket\"\n\n\tnilReq, err := newTestSignedRequestV4(\"GET\", getGetPolicyURL(\"\", nilBucket),\n\t\t0, nil, \"\", \"\")\n\n\tif err != nil {\n\t\tt.Errorf(\"Minio %s: Failed to create HTTP request for testing the response when object Layer is set to `nil`.\", instanceType)\n\t}\n\t// execute the object layer set to `nil` test.\n\t// `ExecObjectLayerAPINilTest` manages the operation.\n\tExecObjectLayerAPINilTest(t, nilBucket, \"\", instanceType, apiRouter, nilReq)\n}", "title": "" }, { "docid": "4d2c6da36d175db0d84431d8d51c1160", "score": "0.4976067", "text": "func (cache *SiaCacheLayer) SetBucketPolicies(bucket string, policyInfo policy.BucketAccessPolicy) *SiaServiceError {\n\tcache.debugmsg(\"SiaCacheLayer.SetBucketPolicies\")\n\tres, _ := json.Marshal(&policyInfo)\n\treturn cache.dbUpdateBucketPolicies(bucket, string(res))\n}", "title": "" }, { "docid": "13af98711df7d482d7637e92a46a6e90", "score": "0.49688178", "text": "func TestPutBucketPolicyHandler(t *testing.T) {\n\tExecObjectLayerAPITest(t, testPutBucketPolicyHandler, []string{\"PutBucketPolicy\"})\n}", "title": "" }, { "docid": "b139073184bbb20e30a9a001b9b3bcde", "score": "0.49659768", "text": "func (m *ConditionalAccessRequestBuilder) Policies()(*ConditionalAccessPoliciesRequestBuilder) {\n return NewConditionalAccessPoliciesRequestBuilderInternal(m.BaseRequestBuilder.PathParameters, m.BaseRequestBuilder.RequestAdapter)\n}", "title": "" }, { "docid": "711e31c969f664ca1be0db982f45fd3f", "score": "0.4953428", "text": "func Authorized(table string, minRole Role) acl.ACL {\n\t// If table ACL is disabled, return nil\n\tif tableAcl == nil {\n\t\treturn nil\n\t}\n\tfor re, accessMap := range tableAcl {\n\t\tif !re.MatchString(table) {\n\t\t\tcontinue\n\t\t}\n\t\treturn accessMap[minRole]\n\t}\n\t// No matching patterns for table, allow all access\n\treturn all()\n}", "title": "" }, { "docid": "241fe1d01cd9c10451f21e095c00eb70", "score": "0.4950611", "text": "func checkS3BucketPolicy(input PredictionInput) Forecast {\n\n\tforecast := makeForecast(input.typeName, input.logicalId)\n\n\tspin(input.typeName, input.logicalId, \"bucket policy\")\n\n\tif input.stackExists {\n\t\t_, err := cfn.GetStackResource(input.stackName, input.logicalId)\n\n\t\t// Do we need this?\n\n\t\tif err != nil {\n\t\t\t// Likely the resource has been added after the stack was created\n\t\t\tconfig.Debugf(\"Unable to get stack resource %v: %v\", input.logicalId, err)\n\t\t}\n\t}\n\n\t// Go back to the template to get the referenced bucket\n\n\t// Check the policy for invalid principals\n\t_, props := s11n.GetMapValue(input.resource, \"Properties\")\n\tif props != nil {\n\t\t_, policyDocument := s11n.GetMapValue(props, \"PolicyDocument\")\n\t\tif policyDocument != nil {\n\t\t\tres, err := iam.CheckPolicyDocument(policyDocument)\n\n\t\t\tif err != nil {\n\t\t\t\tforecast.Add(false, fmt.Sprintf(\"Unable to check policy document: %v\", err))\n\t\t\t}\n\n\t\t\tif !res {\n\t\t\t\tLineNumber = policyDocument.Line\n\t\t\t\tforecast.Add(false, \"Invalid principal in policy document\")\n\t\t\t} else {\n\t\t\t\tforecast.Add(true, \"Principal is valid\")\n\t\t\t}\n\t\t}\n\t}\n\n\tspinner.Pop()\n\n\treturn forecast\n}", "title": "" }, { "docid": "f8d21173f57711bb1286f0c6f1be3ced", "score": "0.49360752", "text": "func (s defaultStore) Set(bucketName string, acls authz.ACLList) error {\n\ts.policies[bucketName] = acls\n\treturn nil\n}", "title": "" }, { "docid": "aa1a48b0c0fb0aa99132ec88c3e19d3d", "score": "0.49097788", "text": "func (b *Bucket) Bucket(name string) *Bucket { panic(\"n/i\") }", "title": "" }, { "docid": "287bff4edb8d550c781b69197312090c", "score": "0.4905589", "text": "func (ctx *AppContext) AccessControl(h http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(writer http.ResponseWriter, request *http.Request) {\n\t\twriter.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\t\twriter.Header().Set(\"Access-Control-Allow-Methods\", \"POST, GET, OPTIONS, PUT, DELETE, HEAD\")\n\t\twriter.Header().Set(\"Access-Control-Allow-Headers\", \"Content-Type, Content-Length, Accept-Encoding, X-CRSF-Token, Authorization, If-None-Match\")\n\n\t\th.ServeHTTP(writer, request)\n\t})\n}", "title": "" }, { "docid": "e4709b8fee00d8db0caf027e637dfac0", "score": "0.48950118", "text": "func BucketACLSample() {\n\t// New client\n\tclient, err := oss.New(endpoint, accessID, accessKey)\n\tif err != nil {\n\t\tHandleError(err)\n\t}\n\n\t// Create a bucket with default parameters\n\terr = client.CreateBucket(bucketName)\n\tif err != nil {\n\t\tHandleError(err)\n\t}\n\n\t// Set bucket ACL. The valid ACLs are ACLPrivate、ACLPublicRead、ACLPublicReadWrite\n\terr = client.SetBucketACL(bucketName, oss.ACLPublicRead)\n\tif err != nil {\n\t\tHandleError(err)\n\t}\n\n\t// Get bucket ACL\n\tgbar, err := client.GetBucketACL(bucketName)\n\tif err != nil {\n\t\tHandleError(err)\n\t}\n\tfmt.Println(\"Bucket ACL:\", gbar.ACL)\n\n\t// Delete the bucket\n\terr = client.DeleteBucket(bucketName)\n\tif err != nil {\n\t\tHandleError(err)\n\t}\n\n\tfmt.Println(\"BucketACLSample completed\")\n}", "title": "" }, { "docid": "f42eac2b66eb015550b8848857b8b693", "score": "0.48818856", "text": "func (m *ConditionalAccessRequestBuilder) Policies()(*ConditionalAccessPoliciesRequestBuilder) {\n return NewConditionalAccessPoliciesRequestBuilderInternal(m.pathParameters, m.requestAdapter)\n}", "title": "" }, { "docid": "9c0887f422d882098b4c1c1972ca5279", "score": "0.48737544", "text": "func (c *s3Client) GetBucketAccess() (acl string, err *probe.Error) {\n\tbucket, object := c.url2BucketAndObject()\n\tif object != \"\" {\n\t\treturn \"\", probe.NewError(client.InvalidBucketName{Bucket: filepath.Join(bucket, object)})\n\t}\n\tif bucket == \"\" {\n\t\treturn \"\", probe.NewError(client.BucketNameEmpty{})\n\t}\n\tbucketACL, e := c.api.GetBucketACL(bucket)\n\tif e != nil {\n\t\treturn \"\", probe.NewError(e)\n\t}\n\treturn bucketACL.String(), nil\n}", "title": "" }, { "docid": "969366fb72d5a2c07732244ea44d88fb", "score": "0.48719823", "text": "func BucketACLSample() {\n\t// New Client\n\tclient, err := oss.New(endpoint, accessID, accessKey)\n\tif err != nil {\n\t\tHandleError(err)\n\t}\n\n\t// creates a bucket with default parameters\n\terr = client.CreateBucket(bucketName)\n\tif err != nil {\n\t\tHandleError(err)\n\t}\n\n\t// sets Bucket ACL. valid ACLs are ACLPrivate、ACLPublicRead、ACLPublicReadWrite\n\terr = client.SetBucketACL(bucketName, oss.ACLPublicRead)\n\tif err != nil {\n\t\tHandleError(err)\n\t}\n\n\t// gets Bucket ACL\n\tgbar, err := client.GetBucketACL(bucketName)\n\tif err != nil {\n\t\tHandleError(err)\n\t}\n\tfmt.Println(\"Bucket ACL:\", gbar.ACL)\n\n\t// deletes the bucket\n\terr = client.DeleteBucket(bucketName)\n\tif err != nil {\n\t\tHandleError(err)\n\t}\n\n\tfmt.Println(\"BucketACLSample completed\")\n}", "title": "" }, { "docid": "52c5faf3c5af1d1b1c102d05c0649bc6", "score": "0.48640776", "text": "func NewBucketAccessController(provisionerName string, client osspec.ProvisionerClient) (*controller.ObjectStorageController, error) {\n\trateLimit := workqueue.NewMaxOfRateLimiter(\n\t\tworkqueue.NewItemExponentialFailureRateLimiter(5*time.Second, 60*time.Minute),\n\t\t&workqueue.BucketRateLimiter{Limiter: rate.NewLimiter(rate.Limit(10), 100)},\n\t)\n\n\tidentity := fmt.Sprintf(\"object-storage-sidecar-%s\", provisionerName)\n\tbc, err := controller.NewObjectStorageController(identity, \"bucket-access-controller\", 5, rateLimit)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbal := bucketAccessListener{\n\t\tprovisionerName: provisionerName,\n\t\tprovisionerClient: client,\n\t}\n\tbc.AddBucketAccessListener(&bal)\n\n\treturn bc, nil\n}", "title": "" }, { "docid": "088ce4c68b27787f2538c5a47895575a", "score": "0.48564044", "text": "func (cache *SiaCacheLayer) GetBucketPolicies(bucket string) (bal policy.BucketAccessPolicy, e *SiaServiceError) {\n\tcache.debugmsg(\"SiaCacheLayer.GetBucketPolicies\")\n\n\treturn cache.dbGetBucketPolicies(bucket)\n}", "title": "" }, { "docid": "1d53c39b298450fb27810d764a55e12e", "score": "0.48560855", "text": "func (o BucketIamConfigurationResponseOutput) UniformBucketLevelAccess() BucketIamConfigurationUniformBucketLevelAccessResponseOutput {\n\treturn o.ApplyT(func(v BucketIamConfigurationResponse) BucketIamConfigurationUniformBucketLevelAccessResponse {\n\t\treturn v.UniformBucketLevelAccess\n\t}).(BucketIamConfigurationUniformBucketLevelAccessResponseOutput)\n}", "title": "" }, { "docid": "8bc9ec0424263200f45cb38ee0824cd9", "score": "0.48497772", "text": "func hideAWSSecretAccessKeys(report *userdb.Report) {\n\tfor _, bucket := range report.Buckets {\n\t\tbucket.AWSSecretAccessKey = \"\"\n\t}\n}", "title": "" }, { "docid": "61ab7abefc1a32c113f18acac0a96226", "score": "0.48493344", "text": "func TestProcessBucketPolicyResopnse(t *testing.T) {\n\tbucketAccesPolicies := []BucketAccessPolicy{\n\t\t{Version: \"1.0\"},\n\t\t{Version: \"1.0\", Statements: setReadOnlyStatement(\"minio-bucket\", \"\")},\n\t\t{Version: \"1.0\", Statements: setReadWriteStatement(\"minio-bucket\", \"Asia/\")},\n\t\t{Version: \"1.0\", Statements: setWriteOnlyStatement(\"minio-bucket\", \"Asia/India/\")},\n\t}\n\n\tAPIErrors := []APIError{\n\t\t{\n\t\t\tCode: \"NoSuchBucketPolicy\",\n\t\t\tDescription: \"The specified bucket does not have a bucket policy.\",\n\t\t\tHTTPStatusCode: http.StatusNotFound,\n\t\t},\n\t}\n\ttestCases := []struct {\n\t\tbucketName string\n\t\tisAPIError bool\n\t\tapiErr APIError\n\t\t// expected results.\n\t\texpectedResult BucketAccessPolicy\n\t\terr error\n\t\t// flag indicating whether tests should pass.\n\t\tshouldPass bool\n\t}{\n\t\t{\"my-bucket\", true, APIErrors[0], BucketAccessPolicy{Version: \"2012-10-17\"}, nil, true},\n\t\t{\"my-bucket\", false, APIError{}, bucketAccesPolicies[0], nil, true},\n\t\t{\"my-bucket\", false, APIError{}, bucketAccesPolicies[1], nil, true},\n\t\t{\"my-bucket\", false, APIError{}, bucketAccesPolicies[2], nil, true},\n\t\t{\"my-bucket\", false, APIError{}, bucketAccesPolicies[3], nil, true},\n\t}\n\n\tfor i, testCase := range testCases {\n\t\tinputResponse := &http.Response{}\n\t\tvar err error\n\t\tif testCase.isAPIError {\n\t\t\tinputResponse = generateErrorResponse(inputResponse, testCase.apiErr, testCase.bucketName)\n\t\t} else {\n\t\t\tinputResponse, err = generatePolicyResponse(inputResponse, testCase.expectedResult)\n\t\t\tif err != nil {\n\t\t\t\tt.Fatalf(\"Test %d: Creation of valid response failed\", i+1)\n\t\t\t}\n\t\t}\n\t\tactualResult, err := processBucketPolicyResponse(\"my-bucket\", inputResponse)\n\t\tif err != nil && testCase.shouldPass {\n\t\t\tt.Errorf(\"Test %d: Expected to pass, but failed with: <ERROR> %s\", i+1, err.Error())\n\t\t}\n\t\tif err == nil && !testCase.shouldPass {\n\t\t\tt.Errorf(\"Test %d: Expected to fail with <ERROR> \\\"%s\\\", but passed instead\", i+1, testCase.err.Error())\n\t\t}\n\t\t// Failed as expected, but does it fail for the expected reason.\n\t\tif err != nil && !testCase.shouldPass {\n\t\t\tif err.Error() != testCase.err.Error() {\n\t\t\t\tt.Errorf(\"Test %d: Expected to fail with error \\\"%s\\\", but instead failed with error \\\"%s\\\" instead\", i+1, testCase.err.Error(), err.Error())\n\t\t\t}\n\t\t}\n\t\tif err == nil && testCase.shouldPass {\n\t\t\tif !reflect.DeepEqual(testCase.expectedResult, actualResult) {\n\t\t\t\tt.Errorf(\"Test %d: The expected BucketPolicy doesnt match the actual BucketPolicy\", i+1)\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "bc19cc20509de64640cdf72aee62f160", "score": "0.48486283", "text": "func (h *HandleHelper) NotPermitted() {\n\terrResponse(http.StatusForbidden,\n\t\t\"your user account doesn't have the necessary permissions to access this resource\",\n\t)(h.w, h.r)\n}", "title": "" }, { "docid": "504a5951be7c7975577199c1ec272440", "score": "0.4815062", "text": "func (m *PoliciesRequestBuilder) ConditionalAccessPolicies()(*ConditionalAccessPoliciesRequestBuilder) {\n return NewConditionalAccessPoliciesRequestBuilderInternal(m.pathParameters, m.requestAdapter)\n}", "title": "" }, { "docid": "741ff97fc1c6fa3e71bfff3c70077ea5", "score": "0.48037806", "text": "func (r Virtual_Guest) AllowAccessToNetworkStorage(networkStorageTemplateObject *datatypes.Network_Storage) (resp bool, err error) {\n\tparams := []interface{}{\n\t\tnetworkStorageTemplateObject,\n\t}\n\terr = r.Session.DoRequest(\"SoftLayer_Virtual_Guest\", \"allowAccessToNetworkStorage\", params, &r.Options, &resp)\n\treturn\n}", "title": "" }, { "docid": "ba77c9e9df3a16e8c8fdbf2f1017cc8b", "score": "0.47977686", "text": "func (m *GraphBaseServiceClient) Policies()(*i4ac7f0a844871066493521918f268cafe2a25c71c28a98221ea3f22d5153090f.PoliciesRequestBuilder) {\n return i4ac7f0a844871066493521918f268cafe2a25c71c28a98221ea3f22d5153090f.NewPoliciesRequestBuilderInternal(m.pathParameters, m.requestAdapter);\n}", "title": "" }, { "docid": "ba77c9e9df3a16e8c8fdbf2f1017cc8b", "score": "0.47977686", "text": "func (m *GraphBaseServiceClient) Policies()(*i4ac7f0a844871066493521918f268cafe2a25c71c28a98221ea3f22d5153090f.PoliciesRequestBuilder) {\n return i4ac7f0a844871066493521918f268cafe2a25c71c28a98221ea3f22d5153090f.NewPoliciesRequestBuilderInternal(m.pathParameters, m.requestAdapter);\n}", "title": "" }, { "docid": "bd9bfc6f4e3ff5418ec5bc75669bcdf7", "score": "0.4796432", "text": "func Example_container_ClientSetAccessPolicy() {\n\taccountName, ok := os.LookupEnv(\"AZURE_STORAGE_ACCOUNT_NAME\")\n\tif !ok {\n\t\tpanic(\"AZURE_STORAGE_ACCOUNT_NAME could not be found\")\n\t}\n\tcontainerName := \"testcontainer\"\n\tcontainerURL := fmt.Sprintf(\"https://%s.blob.core.windows.net/%s\", accountName, containerName)\n\n\tcred, err := azidentity.NewDefaultAzureCredential(nil)\n\thandleError(err)\n\n\tcontainerClient, err := container.NewClient(containerURL, cred, nil)\n\thandleError(err)\n\n\t// Create the container\n\t_, err = containerClient.Create(context.TODO(), nil)\n\thandleError(err)\n\n\t// Upload a simple blob.\n\tblockBlobClient := containerClient.NewBlockBlobClient(\"HelloWorld.txt\")\n\thandleError(err)\n\n\t_, err = blockBlobClient.Upload(context.TODO(), streaming.NopCloser(strings.NewReader(\"Hello World!\")), nil)\n\thandleError(err)\n\n\t// Attempt to read the blob\n\tget, err := http.Get(blockBlobClient.URL())\n\thandleError(err)\n\tif get.StatusCode == http.StatusNotFound {\n\t\t// ChangeLease the blob to be public access blob\n\t\t_, err := containerClient.SetAccessPolicy(\n\t\t\tcontext.TODO(),\n\t\t\t&container.SetAccessPolicyOptions{\n\t\t\t\tAccess: to.Ptr(container.PublicAccessTypeBlob),\n\t\t\t},\n\t\t)\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\n\t\t// Now, this works\n\t\tget, err = http.Get(blockBlobClient.URL())\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\t\tvar text bytes.Buffer\n\t\t_, err = text.ReadFrom(get.Body)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\t\tdefer func(Body io.ReadCloser) {\n\t\t\t_ = Body.Close()\n\t\t}(get.Body)\n\n\t\tfmt.Println(\"Public access blob data: \", text.String())\n\t}\n}", "title": "" }, { "docid": "0424f6b05c7f8c3223dbcb090f76a4dc", "score": "0.47929993", "text": "func (o BucketIamConfigurationResponseOutput) BucketPolicyOnly() BucketIamConfigurationBucketPolicyOnlyResponseOutput {\n\treturn o.ApplyT(func(v BucketIamConfigurationResponse) BucketIamConfigurationBucketPolicyOnlyResponse {\n\t\treturn v.BucketPolicyOnly\n\t}).(BucketIamConfigurationBucketPolicyOnlyResponseOutput)\n}", "title": "" }, { "docid": "e6d09d69d2f21d83c650f3593f8c5726", "score": "0.4785183", "text": "func (b *bucketAccessRequestListener) provisionBucketAccess(ctx context.Context, bucketAccessRequest *v1alpha1.BucketAccessRequest) (string, error) {\n\t// Most code here is identical to that found in controller.go of kube's controller...\n\tbucketAccessClassName := b.GetBucketAccessClass(bucketAccessRequest)\n\n\t// A previous doProvisionBucketAccessRequest may just have finished while we were waiting for\n\t// the locks. Check that bucket (with deterministic name) hasn't been provisioned\n\t// yet.\n\tbucketAccessName := bucketAccessRequest.Name\n\n\tbucketaccess, err := b.bucketClient.ObjectstorageV1alpha1().BucketAccesses().Get(ctx, bucketAccessName, metav1.GetOptions{})\n\tif err == nil && bucketaccess != nil {\n\t\t// bucketaccess has been already provisioned, nothing to do.\n\t\treturn \"Finished\", util.ErrStopProvision\n\t}\n\n\t// Prepare a bucketAccessRequestRef to the bucketAccessRequest early (to fail before a bucket is\n\t// provisioned)\n\t/*bucketAccessRequestRef, err := ref.GetReference(scheme.Scheme, bucketAccessRequest)\n\t if err != nil {\n\t glog.Error(logOperation(operation, \"unexpected error getting bucketAccessRequest reference: %v\", err))\n\t return ProvisioningNoChange, err\n\t }\n\t*/\n\n\tbucketAccessClass, err := b.bucketClient.ObjectstorageV1alpha1().BucketAccessClasses().Get(ctx, bucketAccessClassName, metav1.GetOptions{})\n\tif bucketAccessClass == nil {\n\t\t// bucket has been already provisioned, nothing to do.\n\t\treturn \"InvalidBucketAccessClass\", util.ErrBCUnavailable\n\t}\n\n\tbucketRequest, err := b.bucketClient.ObjectstorageV1alpha1().BucketRequests(bucketAccessRequest.Namespace).Get(ctx, bucketAccessRequest.Spec.BucketRequestName, metav1.GetOptions{})\n\tif bucketRequest == nil {\n\t\t// bucket has been already provisioned, nothing to do.\n\t\treturn \"InvalidBucketRequest\", util.ErrStopProvision\n\t}\n\tif err != nil {\n\t\treturn \"InvalidBucketRequest\", err\n\t}\n\n\t//ctrl.eventRecorder.Event(bucketAccessRequest, v1.EventTypeNormal, \"Provisioning\", fmt.Sprintf(\"External provisioner is provisioning bucket for bucketAccessRequest %q\", bucketAccessRequestToBucketAccessRequestKey(bucketAccessRequest)))\n\n\tglog.Info(logOperation(\"create bucketaccess %q\", bucketaccess.Name))\n\n\t// Set bucketAccessRequestRef and the bucket controller will bind and set annBoundByController for us\n\t// bucket.Spec.bucketAccessRequestRef = bucketAccessRequestRef\n\n\tbucketaccess = &v1alpha1.BucketAccess{}\n\tbucketaccess.Name = util.GetUUID()\n\n\tbucketaccess.Spec.BucketInstanceName = bucketRequest.Spec.BucketInstanceName\n\tbucketaccess.Spec.BucketAccessRequest = bucketAccessRequest.Name\n\tbucketaccess.Spec.ServiceAccount = bucketAccessRequest.Spec.ServiceAccountName\n\t//bucketaccess.Spec.MintedSecretName - set by the driver\n\tbucketaccess.Spec.PolicyActionsConfigMapData = util.ReadObject(bucketAccessClass.PolicyActionsConfigMap)\n\tbucketaccess.Spec.Principal = bucketAccessRequest.Namespace\n\n\tbucketaccess.Spec.Provisioner = bucketAccessClass.Provisioner\n\tbucketaccess.Spec.Parameters = util.CopySS(bucketAccessClass.Parameters) //could use k8s util/maps\n\n\tbucketaccess, err = b.bucketClient.ObjectstorageV1alpha1().BucketAccesses().Create(context.Background(), bucketaccess, metav1.CreateOptions{})\n\tif err == nil || apierrs.IsAlreadyExists(err) {\n\t\tglog.V(5).Infof(\"BucketAccess %s saved\", bucketaccess.Name)\n\t\treturn \"exists\", nil\n\t}\n\n\tglog.Info(logOperation(\"Finished\", \"succeeded\"))\n\treturn \"Finished\", nil\n}", "title": "" }, { "docid": "2fa3263c4313bc811bb218d655504f2d", "score": "0.47791427", "text": "func (pm *PolicyMap) Allow(id uint32, dport uint16, proto u8proto.U8proto, trafficDirection trafficdirection.TrafficDirection, authType uint8, proxyPort uint16) error {\n\tkey := newKey(id, dport, proto, trafficDirection)\n\treturn pm.AllowKey(key, authType, proxyPort)\n}", "title": "" }, { "docid": "5aed70914b098167a512a058b27f06bd", "score": "0.4769359", "text": "func (ace *ActiveContainerError) Forbidden() {}", "title": "" }, { "docid": "ea8e6d8312b43451dfe8bdba0f1c7ef5", "score": "0.47538048", "text": "func (a authorizer) Authorize(ctx context.Context, id bakery.Identity, ops []bakery.Op) (allowed []bool, caveats []checkers.Caveat, err error) {\n\tallowed = make([]bool, len(ops))\n\tfor i := range allowed {\n\t\tallowed[i] = true\n\t}\n\tcaveats = []checkers.Caveat{{\n\t\tLocation: a.thirdPartyLocation,\n\t\tCondition: \"access-allowed\",\n\t}}\n\treturn\n}", "title": "" }, { "docid": "edf939aff15e66352edee3ba8e44b5f3", "score": "0.47518712", "text": "func (c *Client) IsScopeAllowed(_ string) bool {\n\treturn false\n}", "title": "" }, { "docid": "e09b50748d74b48b94ae7e6864f64ae0", "score": "0.47498098", "text": "func (v *version) BucketAccesses() BucketAccessInformer {\n\treturn &bucketAccessInformer{factory: v.factory, tweakListOptions: v.tweakListOptions}\n}", "title": "" }, { "docid": "69114afac01571b05be72d005fe38cb9", "score": "0.47477528", "text": "func CreateReaderPolicy(bucket string) (*iampolicy.Policy, string, error) {\n\tpolicyString := fmt.Sprintf(`{\n\t\t\"Version\": \"2012-10-17\",\n\t\t\"Statement\": [{\n\t\t\t\"Action\": [\n\t\t\t\t\"s3:GetBucketLocation\",\n\t\t\t\t\"s3:GetObject\",\n\t\t\t\t\"s3:ListBucket\",\n\t\t\t\t\"s3:GetBucketTagging\",\n\t\t\t\t\"s3:GetObjectTagging\"\n\t\t\t],\n\t\t\t\"Effect\": \"Allow\",\n\t\t\t\"Principal\": {\"AWS\": [\"*\"]},\n\t\t\t\"Resource\": [\"arn:aws:s3:::%s/*\"],\n\t\t\t\"Sid\": \"\"\n\t\t}]\n\t}`, bucket)\n\n\tpolicy, err := iampolicy.ParseConfig(strings.NewReader(policyString))\n\tif err != nil {\n\t\treturn nil, policyString, errors.Wrap(err, \"Unable to parse policy\")\n\t}\n\n\treturn policy, policyString, nil\n}", "title": "" }, { "docid": "2916cd513dcb9600fc29350c0c34def9", "score": "0.47341874", "text": "func (s *peerRESTServer) SetBucketPolicyHandler(w http.ResponseWriter, r *http.Request) {\n\tif !s.IsValid(w, r) {\n\t\ts.writeErrorResponse(w, errors.New(\"Invalid request\"))\n\t\treturn\n\t}\n\n\tvars := mux.Vars(r)\n\tbucketName := vars[peerRESTBucket]\n\tif bucketName == \"\" {\n\t\ts.writeErrorResponse(w, errors.New(\"Bucket name is missing\"))\n\t\treturn\n\t}\n\tvar policyData policy.Policy\n\tif r.ContentLength < 0 {\n\t\ts.writeErrorResponse(w, errInvalidArgument)\n\t\treturn\n\t}\n\n\terr := gob.NewDecoder(r.Body).Decode(&policyData)\n\tif err != nil {\n\t\ts.writeErrorResponse(w, err)\n\t\treturn\n\t}\n\tglobalPolicySys.Set(bucketName, policyData)\n\tw.(http.Flusher).Flush()\n}", "title": "" }, { "docid": "71a9c3dc6b67477a3206ed1411cf084b", "score": "0.47216195", "text": "func hasPolicyAttached(bucket *aws.AwsS3Bucket, resourcesFromState *[]resource.Resource) bool {\n\tfor _, res := range *resourcesFromState {\n\t\tif res.TerraformType() == aws.AwsS3BucketPolicyResourceType &&\n\t\t\tres.TerraformId() == bucket.Id {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "e5f321221d6c521e8f2d6105a1440873", "score": "0.4714845", "text": "func (o AccessPointPublicAccessBlockConfigurationOutput) RestrictPublicBuckets() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v AccessPointPublicAccessBlockConfiguration) *bool { return v.RestrictPublicBuckets }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "1022d3d15da2b172ac7e3849e3935acb", "score": "0.47116244", "text": "func ChangePermissions(w http.ResponseWriter, r *http.Request) {\n\t// Identify who the user is\n\tusername := r.Context().Value(\"username\")\n\tif username == nil {\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\t// Get userid for user\n\tuserID, err := GetUserGUID(username.(string))\n\tif err != nil {\n\t\tw.Write([]byte(err.Error()))\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\t// Retrieve PhotoID and IsPublic from JSON request body\n\tvar requestedPhoto Photo\n\terr = json.NewDecoder(r.Body).Decode(&requestedPhoto)\n\tif err != nil {\n\t\tw.Write([]byte(\"Missing PhotoID or IsPublic attribute\"))\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tif requestedPhoto.ID == \"\" {\n\t\tw.Write([]byte(\"PhotoID not provided in request body\"))\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t// make sure photo exists\n\tvar photos []Photo\n\tDB.Where(&Photo{ID: requestedPhoto.ID}).Find(&photos)\n\n\tif len(photos) > 1 {\n\t\tw.Write([]byte(\"Multiple photos returned\"))\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\n\t}\n\n\tif len(photos) == 0 {\n\t\tw.Write([]byte(\"No photos returned\"))\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tphoto := photos[0]\n\n\t// Make sure photo belongs to user\n\tif photo.UserID != *userID {\n\t\tw.Write([]byte(\"photo does not belong to user\"))\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t// If permission has changed photo needs to be updated in photos tabe and object needs to be moved between buckets\n\tif photo.IsPublic != requestedPhoto.IsPublic {\n\t\t// If permission has gone from public to private\n\t\tif photo.IsPublic == true && requestedPhoto.IsPublic == false {\n\t\t\terr = moveBuckets(r.Context(), PUBLIC_BUCKET_NAME, *userID, photo.ID)\n\t\t\tif err != nil {\n\t\t\t\tw.Write([]byte(err.Error()))\n\t\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\n\t\t// If permission has gone from private to public\n\t\tif photo.IsPublic == false && requestedPhoto.IsPublic == true {\n\t\t\terr = moveBuckets(r.Context(), *userID, PUBLIC_BUCKET_NAME, photo.ID)\n\t\t\tif err != nil {\n\t\t\t\tw.Write([]byte(err.Error()))\n\t\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\n\t\t// change permission for photo in photos table\n\t\tphoto.IsPublic = requestedPhoto.IsPublic\n\t\tDB.Save(&photo)\n\t}\n\n\tw.Write([]byte(\"photo visibility has been changed\"))\n\tw.WriteHeader(http.StatusOK)\n\treturn\n}", "title": "" }, { "docid": "7c0f927fd72be0edfc912abd623863b0", "score": "0.4711404", "text": "func (o BucketOutput) Policy() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *Bucket) pulumi.StringPtrOutput { return v.Policy }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "c283b9eafd29dea1b82627ce43812bea", "score": "0.47004783", "text": "func (me *Prometheus) denyAccess(w http.ResponseWriter, r *http.Request) {\n\n\tme.Logger.Debug().Msgf(\"(httpd) denied request [%s] (%s)\", r.RequestURI, r.RemoteAddr)\n\tw.WriteHeader(403)\n\tw.Header().Set(\"content-type\", \"text/plain\")\n\t_, err := w.Write([]byte(\"403 Forbidden\"))\n\tif err != nil {\n\t\tme.Logger.Error().Stack().Err(err).Msg(\"error\")\n\t}\n}", "title": "" }, { "docid": "5f7553d4ee5a9fb4354eb8da061cf3a2", "score": "0.46821797", "text": "func (s *TestSuite) TestBucketACLFails(c *C) {\n\troot, e := ioutil.TempDir(os.TempDir(), \"fs-\")\n\tc.Assert(e, IsNil)\n\tdefer os.RemoveAll(root)\n\n\tbucketPath := filepath.Join(root, \"bucket\")\n\tfsClient, err := fsNew(bucketPath)\n\tc.Assert(err, IsNil)\n\terr = fsClient.MakeBucket(\"us-east-1\", true, false)\n\tc.Assert(err, IsNil)\n\n\t// On windows setting permissions is not supported.\n\tif runtime.GOOS != \"windows\" {\n\t\terr = fsClient.SetAccess(\"readonly\", false)\n\t\tc.Assert(err, IsNil)\n\n\t\t_, _, err = fsClient.GetAccess()\n\t\tc.Assert(err, IsNil)\n\t}\n}", "title": "" }, { "docid": "13cf7f243fecee0a56d21e2802942a81", "score": "0.46801373", "text": "func (r *REST) isAllowed(user user.Info, sar *authorizationapi.SubjectAccessReview) error {\n\tvar localSARAttributes kauthorizer.AttributesRecord\n\t// if they are running a personalSAR, create synthentic check for selfSAR\n\tif authorizer.IsPersonalAccessReviewFromSAR(sar) {\n\t\tlocalSARAttributes = kauthorizer.AttributesRecord{\n\t\t\tUser: user,\n\t\t\tVerb: \"create\",\n\t\t\tNamespace: sar.Action.Namespace,\n\t\t\tAPIGroup: \"authorization.k8s.io\",\n\t\t\tResource: \"selfsubjectaccessreviews\",\n\t\t\tResourceRequest: true,\n\t\t}\n\t} else {\n\t\tlocalSARAttributes = kauthorizer.AttributesRecord{\n\t\t\tUser: user,\n\t\t\tVerb: \"create\",\n\t\t\tNamespace: sar.Action.Namespace,\n\t\t\tResource: \"localsubjectaccessreviews\",\n\t\t\tResourceRequest: true,\n\t\t}\n\t}\n\n\tauthorized, reason, err := r.authorizer.Authorize(localSARAttributes)\n\n\tif err != nil {\n\t\treturn kapierrors.NewForbidden(authorization.Resource(localSARAttributes.GetResource()), localSARAttributes.GetName(), err)\n\t}\n\tif authorized != kauthorizer.DecisionAllow {\n\t\tforbiddenError := kapierrors.NewForbidden(authorization.Resource(localSARAttributes.GetResource()), localSARAttributes.GetName(), errors.New(\"\") /*discarded*/)\n\t\tforbiddenError.ErrStatus.Message = reason\n\t\treturn forbiddenError\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "3a6f887d4bb675a1926286aeeab144bf", "score": "0.46784526", "text": "func Authorize(req *http.Request, r render.Render, db *sql.DB) {\n\tapikey := req.URL.Query().Get(PARAM_API_KEY)\n\n\tif apikey == \"\" {\n\t\tSendErrorAsJSON(403, \"Not Authorized - Missing API Key\", r)\n\t} else {\n\t\tif CheckAPIKeyValid(apikey, db) {\n\t\t\treturn\n\t\t} else {\n\t\t\tSendErrorAsJSON(403, \"Not Authorized - Invalid API Key\", r)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "f6726e7710794520a5ed89062374b5b3", "score": "0.4665542", "text": "func accessControl(h http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\t\tw.Header().Set(\"Access-Control-Allow-Methods\", \"GET, POST, OPTIONS, PUT, DELETE, UPDATE, PATCH\")\n\t\tw.Header().Set(\"Access-Control-Allow-Headers\", \"Origin, Content-Type, Authorization\")\n\n\t\tif r.Method == \"OPTIONS\" {\n\t\t\treturn\n\t\t}\n\n\t\th.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "f94d3a86966ff7536fd75229b366c146", "score": "0.4656864", "text": "func IsAllowedAccess(a, b int8) bool {\n\treturn a >= b\n}", "title": "" }, { "docid": "b0c9d45de2988f03e4b4bbbbaf96f3ee", "score": "0.4647135", "text": "func (aee *ActiveEndpointsError) Forbidden() {}", "title": "" }, { "docid": "05810ace6ce3964fc808fe714a919bd7", "score": "0.46357897", "text": "func AWSS3BucketOwnershipControlsBP() {\n\tcolor.Green(\"\\nresource \\\"aws_s3_bucket\\\" \\\"example\\\" {\\n bucket = \\\"example\\\"\\n}\\n\\nresource \\\"aws_s3_bucket_ownership_controls\\\" \\\"example\\\" {\\n bucket = aws_s3_bucket.example.id\\n\\n rule {\\n object_ownership = \\\"BucketOwnerPreferred\\\"\\n }\\n}\\n\\n\")\n\tcolor.Yellow(\"\\nCheckout https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket_ownership_controls\\n\\n\")\n}", "title": "" }, { "docid": "ca950524662922cf9e577747aba5c81b", "score": "0.46324614", "text": "func (t *targetrunner) bucketHandler(w http.ResponseWriter, r *http.Request) {\n\tswitch r.Method {\n\tcase http.MethodGet:\n\t\tt.httpbckget(w, r)\n\tcase http.MethodDelete:\n\t\tt.httpbckdelete(w, r)\n\tcase http.MethodPost:\n\t\tt.httpbckpost(w, r)\n\tcase http.MethodHead:\n\t\tt.httpbckhead(w, r)\n\tdefault:\n\t\tinvalhdlr(w, r)\n\t}\n}", "title": "" }, { "docid": "9cd9a9de35242a747970c1c168f686c5", "score": "0.46096382", "text": "func checkBucketWritePermissions(auth influxdb.Authorizer, orgID, bucketID influxdb.ID) error {\n\tp, err := influxdb.NewPermissionAtID(bucketID, influxdb.WriteAction, influxdb.BucketsResourceType, orgID)\n\tif err != nil {\n\t\treturn &influxdb.Error{\n\t\t\tCode: influxdb.EInternal,\n\t\t\tOp: opWriteHandler,\n\t\t\tMsg: fmt.Sprintf(\"unable to create permission for bucket: %v\", err),\n\t\t\tErr: err,\n\t\t}\n\t}\n\tif pset, err := auth.PermissionSet(); err != nil || !pset.Allowed(*p) {\n\t\treturn &influxdb.Error{\n\t\t\tCode: influxdb.EForbidden,\n\t\t\tOp: opWriteHandler,\n\t\t\tMsg: \"insufficient permissions for write\",\n\t\t\tErr: err,\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "115d95e28fe04dbfa9dc6746d6452766", "score": "0.46060798", "text": "func (t *targetrunner) bucketHandler(w http.ResponseWriter, r *http.Request) {\n\tswitch r.Method {\n\tcase http.MethodGet:\n\t\tt.httpbckget(w, r)\n\tcase http.MethodDelete:\n\t\tt.httpbckdelete(w, r)\n\tcase http.MethodPost:\n\t\tt.httpbckpost(w, r)\n\tcase http.MethodHead:\n\t\tt.httpbckhead(w, r)\n\tdefault:\n\t\tcmn.InvalidHandlerWithMsg(w, r, \"invalid method for /buckets path\")\n\t}\n}", "title": "" }, { "docid": "115d95e28fe04dbfa9dc6746d6452766", "score": "0.46060798", "text": "func (t *targetrunner) bucketHandler(w http.ResponseWriter, r *http.Request) {\n\tswitch r.Method {\n\tcase http.MethodGet:\n\t\tt.httpbckget(w, r)\n\tcase http.MethodDelete:\n\t\tt.httpbckdelete(w, r)\n\tcase http.MethodPost:\n\t\tt.httpbckpost(w, r)\n\tcase http.MethodHead:\n\t\tt.httpbckhead(w, r)\n\tdefault:\n\t\tcmn.InvalidHandlerWithMsg(w, r, \"invalid method for /buckets path\")\n\t}\n}", "title": "" }, { "docid": "57ae8489d99834072b4e53f2cc6b41c6", "score": "0.4602964", "text": "func (si SignedIdentifiers) BlobPublicAccess() PublicAccessType {\n\treturn PublicAccessType(si.rawResponse.Header.Get(\"x-ms-blob-public-access\"))\n}", "title": "" }, { "docid": "f730d44e2df796cde557b0fc6923e4eb", "score": "0.45962963", "text": "func setPolicy(crmService *cloudresourcemanager.Service, projectID string, policy *cloudresourcemanager.Policy) {\n\n\tctx := context.Background()\n\n\tctx, cancel := context.WithTimeout(ctx, time.Second*10)\n\tdefer cancel()\n\trequest := new(cloudresourcemanager.SetIamPolicyRequest)\n\trequest.Policy = policy\n\tpolicy, err := crmService.Projects.SetIamPolicy(projectID, request).Do()\n\tif err != nil {\n\t\tlog.Fatalf(\"Projects.SetIamPolicy: %v\", err)\n\t}\n}", "title": "" }, { "docid": "fd96dd46257ada1e2c5a02605120c907", "score": "0.45884928", "text": "func (c *Client) Create(ctx context.Context, bucket string) error {\n\t// Check if the bucket already exists.\n\texists, err := c.bucketExists(ctx, bucket)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif exists {\n\t\treturn fmt.Errorf(\"expected bucket %q to not be created yet)\", bucket)\n\t}\n\n\t// Create the bucket.\n\tbkt := c.gcsClient.Bucket(bucket)\n\tif err := bkt.Create(ctx, c.projectID, nil); err != nil {\n\t\treturn fmt.Errorf(\"failed to create bucket %q in project %s: %w\", bucket, c.projectID, err)\n\t}\n\tbkt.ACL().Set(ctx, gcs.AllUsers, gcs.RoleReader)\n\n\tc.bucket = bucket\n\tc.nextSeq = 0\n\treturn nil\n}", "title": "" }, { "docid": "a306daaa8eef08a95ec48f3eb8206dbc", "score": "0.4588396", "text": "func getSageBucketGeneric(w http.ResponseWriter, r *http.Request) {\n\n\tvars := mux.Vars(r)\n\n\tsageBucketID := vars[\"bucket\"]\n\tif len(sageBucketID) != 36 {\n\t\trespondJSONError(w, http.StatusInternalServerError, \"bucket id (%s) invalid (%d)\", sageBucketID, len(sageBucketID))\n\t\treturn\n\t}\n\n\tusername := vars[\"username\"]\n\n\t// r.URL.Path example: /api/v1/objects/6dd46856-c871-4089-b1bc-a12b44e92c81\n\n\t//pathArray := strings.SplitN(r.URL.Path, \"/\", 6)\n\n\t//keyPath := pathArray[5]\n\n\t_, sagePath, err := getSagePath(r.URL.Path)\n\tif err != nil {\n\t\trespondJSONError(w, http.StatusBadRequest, err.Error())\n\t\treturn\n\n\t}\n\n\t// bucket permission\n\trawQuery := strings.ToLower(r.URL.RawQuery) // this is ugle, .Values() does not handle ?permissions as it has no value\n\n\t//log.Printf(\"rawQuery: %s\", rawQuery)\n\tif sagePath == \"\" && strings.Contains(rawQuery, \"permissions\") {\n\n\t\tallowed, err := userHasBucketPermission(username, sageBucketID, \"READ_ACP\")\n\t\tif err != nil {\n\t\t\trespondJSONError(w, http.StatusBadRequest, err.Error())\n\t\t\treturn\n\t\t}\n\t\tif !allowed {\n\t\t\trespondJSONError(w, http.StatusUnauthorized, \"Access to bucket permissions denied (%s, %s)\", username, sageBucketID)\n\t\t\treturn\n\t\t}\n\n\t\tpermissions, err := ListBucketPermissions(sageBucketID)\n\t\tif err != nil {\n\t\t\trespondJSONError(w, http.StatusBadRequest, err.Error())\n\t\t\treturn\n\t\t}\n\n\t\trespondJSON(w, http.StatusOK, permissions)\n\t\treturn\n\n\t}\n\n\t// bucket of directory listing\n\n\tallowed, err := userHasBucketPermission(username, sageBucketID, \"READ\")\n\tif err != nil {\n\t\trespondJSONError(w, http.StatusBadRequest, err.Error())\n\t\treturn\n\t}\n\tif !allowed {\n\t\trespondJSONError(w, http.StatusUnauthorized, \"Read access to bucket denied (username: \\\"%s\\\", sageBucketID: \\\"%s\\\")\", username, sageBucketID)\n\t\treturn\n\t}\n\n\tif sagePath == \"\" {\n\t\t// bucket listing\n\t\tbucket, err := GetSageBucket(sageBucketID)\n\t\tif err != nil {\n\t\t\trespondJSONError(w, http.StatusBadRequest, err.Error())\n\t\t\treturn\n\t\t}\n\n\t\trespondJSON(w, http.StatusOK, bucket)\n\t\treturn\n\t}\n\n\t// directory listing\n\tif strings.HasSuffix(sagePath, \"/\") {\n\n\t\t// _, sagePath, err := getSagePath(r.URL.Path)\n\t\t// if err != nil {\n\t\t// \trespondJSONError(w, http.StatusBadRequest, err.Error())\n\t\t// \treturn\n\n\t\t// }\n\n\t\trecursive := false\n\t\tif strings.Contains(rawQuery, \"recursive\") {\n\t\t\tif !strings.Contains(rawQuery, \"recursive=false\") {\n\t\t\t\trecursive = true\n\t\t\t}\n\n\t\t}\n\t\tcontinuationToken, err := getQueryField(r, \"ContinuationToken\")\n\t\tif err != nil {\n\t\t\tcontinuationToken = \"\"\n\t\t}\n\n\t\tlimit, err := getQueryFieldInt64(r, \"limit\", 0)\n\t\tif err != nil {\n\t\t\trespondJSONError(w, http.StatusInternalServerError, \"error parsing query field limit: %s\", err.Error())\n\t\t\treturn\n\t\t}\n\n\t\tif false {\n\t\t\tfiles, directories, newContinuationToken, err := listSageBucketContentDepreccated(sageBucketID, sagePath, recursive, 0, \"\", continuationToken)\n\n\t\t\tif err != nil {\n\t\t\t\trespondJSONError(w, http.StatusInternalServerError, \"error listing bucket contents (sageBucketID: %s, sagePath: %s): %s\", sageBucketID, sagePath, err.Error())\n\t\t\t\treturn\n\t\t\t}\n\t\t\tfiles = append(files, directories...)\n\n\t\t\t// Repsonse has some similiarity to https://docs.aws.amazon.com/AmazonS3/latest/API/API_ListObjectsV2.html#API_ListObjectsV2_ResponseSyntax\n\n\t\t\tdata := make(map[string]interface{})\n\t\t\tdata[\"Contents\"] = files\n\n\t\t\tif newContinuationToken != \"\" {\n\t\t\t\tdata[\"NextContinuationToken\"] = newContinuationToken\n\t\t\t\tdata[\"IsTruncated\"] = true\n\t\t\t} else {\n\t\t\t\tdata[\"IsTruncated\"] = false\n\t\t\t}\n\n\t\t\trespondJSON(w, http.StatusOK, data)\n\t\t}\n\n\t\tlistObject, err := listSageBucketContent(sageBucketID, sagePath, recursive, limit, \"\", continuationToken)\n\t\tif err != nil {\n\t\t\trespondJSONError(w, http.StatusInternalServerError, \"error listing bucket contents (sageBucketID: %s, sagePath: %s): %s\", sageBucketID, sagePath, err.Error())\n\t\t\treturn\n\t\t}\n\t\trespondJSON(w, http.StatusOK, listObject)\n\n\t\treturn\n\t}\n\n\t// a file download\n\n\t//uuidStr := vars[\"bucket\"]\n\t//sageKey := vars[\"key\"]\n\n\t// convert SAGE specifiers to S3 specifiers\n\t//sageBucketID := s3BucketPrefix + sageBucketID[0:2]\n\n\ts3BucketID := getS3BucketID(sageBucketID) //s3BucketPrefix + sageBucketID[0:2]\n\n\ts3key := path.Join(sageBucketID, sagePath)\n\n\tsageFilename := path.Base(sagePath)\n\tif sageFilename == \".\" || sageFilename == \"/\" {\n\t\trespondJSONError(w, http.StatusInternalServerError, \"Invalid filename (%s)\", sageFilename)\n\t\treturn\n\t}\n\n\tobjectInput := s3.GetObjectInput{\n\t\tBucket: &s3BucketID,\n\t\tKey: &s3key,\n\t}\n\n\tout, err := svc.GetObject(&objectInput)\n\tif err != nil {\n\t\trespondJSONError(w, http.StatusInternalServerError, \"Error getting data, svc.GetObject returned: %s\", err.Error())\n\t\treturn\n\t}\n\tdefer out.Body.Close()\n\n\tw.Header().Set(\"Content-Disposition\", \"attachment; filename=\"+sageFilename)\n\t//w.Header().Set(\"Content-Length\", FileSize)\n\n\tbuffer := make([]byte, 1024*1024)\n\tw.WriteHeader(http.StatusOK)\n\tfor {\n\t\tn, err := out.Body.Read(buffer)\n\t\tif err != nil {\n\n\t\t\tif err == io.EOF {\n\t\t\t\tw.Write(buffer[:n]) //should handle any remainding bytes.\n\t\t\t\tfileDownloadByteSize.Add(float64(n))\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\trespondJSONError(w, http.StatusInternalServerError, \"Error getting data: %s\", err.Error())\n\t\t\treturn\n\t\t}\n\t\tw.Write(buffer[0:n])\n\t\tfileDownloadByteSize.Add(float64(n))\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "7cba7ed5f87b09e082bfa75d2b0f019b", "score": "0.45827267", "text": "func (o BucketIamConfigurationOutput) UniformBucketLevelAccess() BucketIamConfigurationUniformBucketLevelAccessPtrOutput {\n\treturn o.ApplyT(func(v BucketIamConfiguration) *BucketIamConfigurationUniformBucketLevelAccess {\n\t\treturn v.UniformBucketLevelAccess\n\t}).(BucketIamConfigurationUniformBucketLevelAccessPtrOutput)\n}", "title": "" }, { "docid": "f5f61be6e035d3bcca1ca7b8fb0fcf65", "score": "0.4579157", "text": "func (cgpr ContainersGetPropertiesResponse) BlobPublicAccess() PublicAccessType {\n\treturn PublicAccessType(cgpr.rawResponse.Header.Get(\"x-ms-blob-public-access\"))\n}", "title": "" }, { "docid": "31224dfc27115592523f7edb3376b0fd", "score": "0.45790344", "text": "func AWSS3BucketPolicyBP() {\n\tcolor.Green(\"\\nresource \\\"aws_s3_bucket\\\" \\\"b\\\" {\\n bucket = \\\"my_tf_test_bucket\\\"\\n}\\n\\nresource \\\"aws_s3_bucket_policy\\\" \\\"b\\\" {\\n bucket = aws_s3_bucket.b.id\\n\\n policy = <<POLICY\\n{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Id\\\": \\\"MYBUCKETPOLICY\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"IPAllow\\\",\\n \\\"Effect\\\": \\\"Deny\\\",\\n \\\"Principal\\\": \\\"*\\\",\\n \\\"Action\\\": \\\"s3:*\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::my_tf_test_bucket/*\\\",\\n \\\"Condition\\\": {\\n \\\"IpAddress\\\": {\\\"aws:SourceIp\\\": \\\"8.8.8.8/32\\\"}\\n }\\n }\\n ]\\n}\\nPOLICY\\n}\")\n\tcolor.Yellow(\"\\nCheckout https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket_policy\\n\\n\")\n}", "title": "" }, { "docid": "79c0435040e4c458ec5b113d4b30ea5d", "score": "0.45762542", "text": "func (statement Statement) IsAllowed(args Args) bool {\n\tcheck := func() bool {\n\t\tif !statement.Principal.Match(args.AccountName) {\n\t\t\treturn false\n\t\t}\n\n\t\tif !statement.Actions.Contains(args.Action) {\n\t\t\treturn false\n\t\t}\n\n\t\tresource := args.BucketName\n\t\tif args.ObjectName != \"\" {\n\t\t\tif !strings.HasPrefix(args.ObjectName, \"/\") {\n\t\t\t\tresource += \"/\"\n\t\t\t}\n\n\t\t\tresource += args.ObjectName\n\t\t}\n\n\t\tif !statement.Resources.Match(resource, args.ConditionValues) {\n\t\t\treturn false\n\t\t}\n\n\t\treturn statement.Conditions.Evaluate(args.ConditionValues)\n\t}\n\n\treturn statement.Effect.IsAllowed(check())\n}", "title": "" }, { "docid": "c57883f772ee8c02df677e9d9b4f63ea", "score": "0.4569742", "text": "func (b *backend) clientIAM(s logical.Storage, region string, stsRole string) (*iam.IAM, error) {\n\tb.configMutex.RLock()\n\tif b.IAMClientsMap[region] != nil && b.IAMClientsMap[region][stsRole] != nil {\n\t\tdefer b.configMutex.RUnlock()\n\t\t// If the client object was already created, return it\n\t\treturn b.IAMClientsMap[region][stsRole], nil\n\t}\n\n\t// Release the read lock and acquire the write lock\n\tb.configMutex.RUnlock()\n\tb.configMutex.Lock()\n\tdefer b.configMutex.Unlock()\n\n\t// If the client gets created while switching the locks, return it\n\tif b.IAMClientsMap[region] != nil && b.IAMClientsMap[region][stsRole] != nil {\n\t\treturn b.IAMClientsMap[region][stsRole], nil\n\t}\n\n\t// Create an AWS config object using a chain of providers\n\tvar awsConfig *aws.Config\n\tvar err error\n\tawsConfig, err = b.getClientConfig(s, region, stsRole, \"iam\")\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif awsConfig == nil {\n\t\treturn nil, fmt.Errorf(\"could not retrieve valid assumed credentials\")\n\t}\n\n\t// Create a new IAM client object, cache it and return the same\n\tclient := iam.New(session.New(awsConfig))\n\tif client == nil {\n\t\treturn nil, fmt.Errorf(\"could not obtain iam client\")\n\t}\n\tif _, ok := b.IAMClientsMap[region]; !ok {\n\t\tb.IAMClientsMap[region] = map[string]*iam.IAM{stsRole: client}\n\t} else {\n\t\tb.IAMClientsMap[region][stsRole] = client\n\t}\n\treturn b.IAMClientsMap[region][stsRole], nil\n}", "title": "" }, { "docid": "0f906055f7cccb15863e845cd19fa3ff", "score": "0.45596242", "text": "func (b Bucket) PutACL(args ...Params) error {\n\theader, query := getHeaderQuery(args)\n\tquery.Set(\"acl\", \"\")\n\tif b.ACL != \"\" {\n\t\theader.Set(\"x-oss-acl\", b.ACL)\n\t}\n\treturn b.Do(\"PUT\", \"\", nil, nil, header, query)\n}", "title": "" }, { "docid": "da8fae9d3b28c4269057e1b6c6058242", "score": "0.4559225", "text": "func BucketDanger(m dsl.Matcher) {\n\tm.Import(\"github.com/CS-SI/SafeScale/v22/lib/backend/resources\")\n\tm.Match(`$x.Alter($*_)`, `$x.BrowseFolder($*_)`, `$x.Deserialize($*_)`, `$x.Service($*_)`, `$x.Inspect($*_)`, `$x.Review($*_)`, `$x.Read($*_)`, `$x.ReadByID($*_)`, `$x.Reload($*_)`, `$x.Serialize($*_)`).Where(m[\"x\"].Type.Is(\"resources.bucket\")).Report(`panic danger`)\n}", "title": "" }, { "docid": "6f6cbe41111df745e6654aaab1f08130", "score": "0.45583233", "text": "func (ep *Endpoint_DEPRECATED) IsS3() bool {\n\treturn ep.AWSAccessKeyID != \"\"\n}", "title": "" }, { "docid": "8a92d940f71a6e9c06e7785f35bfc94a", "score": "0.4543512", "text": "func (material *Material) Authorize(ctx *aero.Context, action string) error {\n\tuser := GetUserFromContext(ctx)\n\n\tif user == nil {\n\t\treturn errors.New(\"Not logged in\")\n\t}\n\n\tif action == \"edit\" && user.ID != material.CreatedBy {\n\t\treturn errors.New(\"Can't edit data from other users\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "4afd50571431839d45bac8494873aac2", "score": "0.45298445", "text": "func (b Bucket) Put(args ...Params) error {\n\theader, query := getHeaderQuery(args)\n\tif b.ACL != \"\" {\n\t\theader.Set(\"x-oss-acl\", b.ACL)\n\t}\n\tvar body interface{}\n\tif b.Location != \"\" {\n\t\tbody = CreateBucketConfiguration{b.Location}\n\t}\n\treturn b.Do(\"PUT\", \"\", body, nil, header, query)\n}", "title": "" }, { "docid": "e62d6048ac2406b46f298419ca43691a", "score": "0.4525491", "text": "func checkBQTableWritePermissions(table *bigquery.Table) error {\n\t// Ref: https://cloud.google.com/bigquery/docs/access-control\n\trequiredPerms := []string{\n\t\t\"bigquery.tables.get\",\n\t\t\"bigquery.tables.getData\",\n\t\t\"bigquery.tables.update\",\n\t}\n\tperms, err := table.IAM().TestPermissions(context.Background(), requiredPerms)\n\tif err != nil {\n\t\treturn errors.Newf(errors.BadConfig,\n\t\t\t\"Error checking IAM permissions on the BQ table: %s\", err.Error())\n\t}\n\tif len(perms) < len(requiredPerms) {\n\t\treturn errors.Newf(errors.BadConfig,\n\t\t\t\"Insufficient permissions. Got: %s; Want: %s\",\n\t\t\tstrings.Join(perms, \",\"),\n\t\t\tstrings.Join(requiredPerms, \",\"),\n\t\t)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d65e2cd854b93dda8ab415d1da083f78", "score": "0.45219815", "text": "func (c *Client) Allow(request *quotaservice.AllowRequest) (*quotaservice.AllowResponse, error) {\n\treturn c.qsClient.Allow(context.Background(), request)\n}", "title": "" }, { "docid": "f2d23b8304aa9d01cab8004d718164de", "score": "0.4515295", "text": "func NewConditionalAccessPolicy()(*ConditionalAccessPolicy) {\n m := &ConditionalAccessPolicy{\n Entity: *ie233ee762e29b4ba6970aa2a2efce4b7fde11697ca9ea81099d0f8269309c1be.NewEntity(),\n }\n return m\n}", "title": "" }, { "docid": "70214173591bb13e1a56dd830a1dc10c", "score": "0.45092052", "text": "func (m *Application) SetRequiredResourceAccess(value []RequiredResourceAccessable)() {\n m.requiredResourceAccess = value\n}", "title": "" }, { "docid": "2e8386b08a341a489cefd483f898f22c", "score": "0.4507765", "text": "func runPolicyCmd(args cli.Args) {\n\tvar operation, policyStr string\n\tvar probeErr *probe.Error\n\tperms := accessPerms(args.Get(1))\n\ttargetURL := args.Get(2)\n\tif perms.isValidAccessPERM() {\n\t\tprobeErr = doSetAccess(targetURL, perms)\n\t\toperation = \"set\"\n\t} else if perms.isValidAccessFile() {\n\t\tprobeErr = doSetAccessJSON(targetURL, perms)\n\t\toperation = \"set-json\"\n\t} else {\n\t\ttargetURL = args.Get(1)\n\t\toperation = \"get\"\n\t\tif args.First() == \"get-json\" {\n\t\t\toperation = \"get-json\"\n\t\t}\n\t\tperms, policyStr, probeErr = doGetAccess(targetURL)\n\n\t}\n\t// Upon error exit.\n\tif probeErr != nil {\n\t\tswitch probeErr.ToGoError().(type) {\n\t\tcase APINotImplemented:\n\t\t\tfatalIf(probeErr.Trace(), \"Unable to \"+operation+\" policy of a non S3 url `\"+targetURL+\"`.\")\n\t\tdefault:\n\t\t\tfatalIf(probeErr.Trace(targetURL, string(perms)),\n\t\t\t\t\"Unable to \"+operation+\" policy `\"+string(perms)+\"` for `\"+targetURL+\"`.\")\n\t\t}\n\t}\n\tpolicyJSON := map[string]interface{}{}\n\tif policyStr != \"\" {\n\t\te := json.Unmarshal([]byte(policyStr), &policyJSON)\n\t\tfatalIf(probe.NewError(e), \"Cannot unmarshal custom policy file.\")\n\t}\n\tprintMsg(policyMessage{\n\t\tStatus: \"success\",\n\t\tOperation: operation,\n\t\tBucket: targetURL,\n\t\tPerms: perms,\n\t\tPolicy: policyJSON,\n\t})\n}", "title": "" }, { "docid": "dde29f42f0c57a60df31ecb77e1f1b61", "score": "0.44996956", "text": "func (_Bucket *BucketCaller) HasWriteAccess(opts *bind.CallOpts, _fileId *big.Int, _entity common.Address) (bool, error) {\n\tvar (\n\t\tret0 = new(bool)\n\t)\n\tout := ret0\n\terr := _Bucket.contract.Call(opts, out, \"hasWriteAccess\", _fileId, _entity)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "b23f8a17d0600ee7f0bb7d811513b70b", "score": "0.4496566", "text": "func (h *Handler) AddAccessControlAllowOrigin(origins ...string) {\n\tfor _, origin := range origins {\n\t\th.AccessControlAllowOrigins[origin] = true\n\t}\n}", "title": "" } ]
fb5fd32db8bc7bb82eac6ce3ee4201b7
DeleteForwardingRule handles the gRPC request by passing it to the underlying ForwardingRule Delete() method.
[ { "docid": "1769eca8dfc133613d904e9c30d27e57", "score": "0.5880443", "text": "func (s *ForwardingRuleServer) DeleteComputeForwardingRule(ctx context.Context, request *computepb.DeleteComputeForwardingRuleRequest) (*emptypb.Empty, error) {\n\n\tcl, err := createConfigForwardingRule(ctx, request.GetServiceAccountFile())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &emptypb.Empty{}, cl.DeleteForwardingRule(ctx, ProtoToForwardingRule(request.GetResource()))\n\n}", "title": "" } ]
[ { "docid": "3392a23314f3e0c44bbb56bc062007ab", "score": "0.607879", "text": "func deleteForward(hd *HandlerData, res Resource, cmds []string) {\n\tif len(cmds) != 1 {\n\t\trespond(hd, http.StatusNotFound, \"Not Found\")\n\t\treturn\n\t}\n\terr := res.DeleteForward()\n\tif err != nil {\n\t\trespond(hd, http.StatusNotFound, \"Not Found\")\n\t\treturn\n\t}\n\trespond(hd, http.StatusOK, \"Forward Deleted\")\n}", "title": "" }, { "docid": "658cf5f6f331dac8e25216b271b0307f", "score": "0.60416776", "text": "func (f *FakeLoadBalancers) DeleteGlobalForwardingRule(name string) error {\n\tf.calls = append(f.calls, \"DeleteGlobalForwardingRule\")\n\tfw := []*compute.ForwardingRule{}\n\tfor i := range f.Fw {\n\t\tif f.Fw[i].Name != name {\n\t\t\tfw = append(fw, f.Fw[i])\n\t\t}\n\t}\n\tif len(f.Fw) == len(fw) {\n\t\t// Nothing was deleted.\n\t\treturn utils.FakeGoogleAPINotFoundErr()\n\t}\n\tf.Fw = fw\n\treturn nil\n}", "title": "" }, { "docid": "bea9e3410cfedb24894e967b1c428ddb", "score": "0.6041082", "text": "func (a *NetworkLoadBalancersApiService) DatacentersNetworkloadbalancersForwardingrulesDelete(ctx _context.Context, datacenterId string, networkLoadBalancerId string, forwardingRuleId string) ApiDatacentersNetworkloadbalancersForwardingrulesDeleteRequest {\n\treturn ApiDatacentersNetworkloadbalancersForwardingrulesDeleteRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tdatacenterId: datacenterId,\n\t\tnetworkLoadBalancerId: networkLoadBalancerId,\n\t\tforwardingRuleId: forwardingRuleId,\n\t}\n}", "title": "" }, { "docid": "37bbd574adac202f88550bfe6268e6a5", "score": "0.5895811", "text": "func (a *NetworkLoadBalancersApiService) DatacentersNetworkloadbalancersForwardingrulesDeleteExecute(r ApiDatacentersNetworkloadbalancersForwardingrulesDeleteRequest) (*APIResponse, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodDelete\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"NetworkLoadBalancersApiService.DatacentersNetworkloadbalancersForwardingrulesDelete\")\n\tif err != nil {\n\t\treturn nil, GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/datacenters/{datacenterId}/networkloadbalancers/{networkLoadBalancerId}/forwardingrules/{forwardingRuleId}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"datacenterId\"+\"}\", _neturl.PathEscape(parameterToString(r.datacenterId, \"\")), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"networkLoadBalancerId\"+\"}\", _neturl.PathEscape(parameterToString(r.networkLoadBalancerId, \"\")), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"forwardingRuleId\"+\"}\", _neturl.PathEscape(parameterToString(r.forwardingRuleId, \"\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tif r.pretty != nil {\n\t\tlocalVarQueryParams.Add(\"pretty\", parameterToString(*r.pretty, \"\"))\n\t} else {\n\t\tdefaultQueryParam := a.client.cfg.DefaultQueryParams.Get(\"pretty\")\n\t\tif defaultQueryParam == \"\" {\n\t\t\tlocalVarQueryParams.Add(\"pretty\", parameterToString(true, \"\"))\n\t\t}\n\t}\n\tif r.depth != nil {\n\t\tlocalVarQueryParams.Add(\"depth\", parameterToString(*r.depth, \"\"))\n\t} else {\n\t\tdefaultQueryParam := a.client.cfg.DefaultQueryParams.Get(\"depth\")\n\t\tif defaultQueryParam == \"\" {\n\t\t\tlocalVarQueryParams.Add(\"depth\", parameterToString(0, \"\"))\n\t\t}\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.xContractNumber != nil {\n\t\tlocalVarHeaderParams[\"X-Contract-Number\"] = parameterToString(*r.xContractNumber, \"\")\n\t}\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif apiKey, ok := auth[\"Token Authentication\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif apiKey.Prefix != \"\" {\n\t\t\t\t\tkey = apiKey.Prefix + \" \" + apiKey.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = apiKey.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"Authorization\"] = key\n\t\t\t}\n\t\t}\n\t}\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlocalVarHTTPResponse, httpRequestTime, err := a.client.callAPI(req)\n\n\tlocalVarAPIResponse := &APIResponse{\n\t\tResponse: localVarHTTPResponse,\n\t\tMethod: localVarHTTPMethod,\n\t\tRequestURL: localVarPath,\n\t\tRequestTime: httpRequestTime,\n\t\tOperation: \"DatacentersNetworkloadbalancersForwardingrulesDelete\",\n\t}\n\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarAPIResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarAPIResponse.Payload = localVarBody\n\tif err != nil {\n\t\treturn localVarAPIResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tstatusCode: localVarHTTPResponse.StatusCode,\n\t\t\tbody: localVarBody,\n\t\t\terror: fmt.Sprintf(FormatStringErr, localVarHTTPResponse.Status, string(localVarBody)),\n\t\t}\n\t\tvar v Error\n\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\tnewErr.error = fmt.Sprintf(FormatStringErr, localVarHTTPResponse.Status, err.Error())\n\t\t\treturn localVarAPIResponse, newErr\n\t\t}\n\t\tnewErr.model = v\n\t\treturn localVarAPIResponse, newErr\n\t}\n\n\treturn localVarAPIResponse, nil\n}", "title": "" }, { "docid": "9a6b41157d9f7642934fcff88e98a974", "score": "0.5873709", "text": "func (a *SecurityApiService) SecurityLogForwardingDelete(ctx context.Context, address string, port int32) (*http.Response, error) {\n\tvar (\n\t\tlocalVarHttpMethod = strings.ToUpper(\"Delete\")\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\t\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/security/audit/destinations/{address}/{port}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"address\"+\"}\", fmt.Sprintf(\"%v\", address), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"port\"+\"}\", fmt.Sprintf(\"%v\", port), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{\"application/json\", \"application/hal+json\"}\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := selectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\"application/json\", \"application/hal+json\"}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := selectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlocalVarHttpResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHttpResponse == nil {\n\t\treturn localVarHttpResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHttpResponse.Body)\n\tlocalVarHttpResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarHttpResponse, err\n\t}\n\n\n\tif localVarHttpResponse.StatusCode >= 300 {\n\t\tnewErr := GenericSwaggerError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHttpResponse.Status,\n\t\t}\n\t\t\n\t\tif localVarHttpResponse.StatusCode == 0 {\n\t\t\tvar v ErrorResponse\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"));\n\t\t\t\tif err != nil {\n\t\t\t\t\tnewErr.error = err.Error()\n\t\t\t\t\treturn localVarHttpResponse, newErr\n\t\t\t\t}\n\t\t\t\tnewErr.model = v\n\t\t\t\treturn localVarHttpResponse, newErr\n\t\t}\n\t\t\n\t\treturn localVarHttpResponse, newErr\n\t}\n\n\treturn localVarHttpResponse, nil\n}", "title": "" }, { "docid": "d3a389e3cfb35dc1fdda33150dd4a2c3", "score": "0.58545643", "text": "func DeleteMatchRule(url string , headerValue string , routeSpec *IngressRouteSpec) error {\n\tdeleteIndex := -1\n\tfor i,route := range routeSpec.Routes {\n\t\tif ValidateMatchRule(url,headerValue,route) {\n\t\t\tdeleteIndex = i\n\t\t}\n\t}\n\tif deleteIndex == -1 {\n\t\treturn errors.New(\"Index not found in the Match rule\")\n\t}\n\trouteSpec.Routes = append(routeSpec.Routes[:deleteIndex], routeSpec.Routes[deleteIndex+1:]...)\n\treturn nil\n}", "title": "" }, { "docid": "91ca99584245a2cb8f894270324cec94", "score": "0.584662", "text": "func (a *Client) DeleteHTTPRequestRule(params *DeleteHTTPRequestRuleParams, authInfo runtime.ClientAuthInfoWriter) (*DeleteHTTPRequestRuleAccepted, *DeleteHTTPRequestRuleNoContent, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewDeleteHTTPRequestRuleParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"deleteHTTPRequestRule\",\n\t\tMethod: \"DELETE\",\n\t\tPathPattern: \"/services/haproxy/configuration/http_request_rules/{index}\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"http\"},\n\t\tParams: params,\n\t\tReader: &DeleteHTTPRequestRuleReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tswitch value := result.(type) {\n\tcase *DeleteHTTPRequestRuleAccepted:\n\t\treturn value, nil, nil\n\tcase *DeleteHTTPRequestRuleNoContent:\n\t\treturn nil, value, nil\n\t}\n\t// unexpected success response\n\tunexpectedSuccess := result.(*DeleteHTTPRequestRuleDefault)\n\treturn nil, nil, runtime.NewAPIError(\"unexpected success response: content available as default response in error\", unexpectedSuccess, unexpectedSuccess.Code())\n}", "title": "" }, { "docid": "91ca99584245a2cb8f894270324cec94", "score": "0.584662", "text": "func (a *Client) DeleteHTTPRequestRule(params *DeleteHTTPRequestRuleParams, authInfo runtime.ClientAuthInfoWriter) (*DeleteHTTPRequestRuleAccepted, *DeleteHTTPRequestRuleNoContent, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewDeleteHTTPRequestRuleParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"deleteHTTPRequestRule\",\n\t\tMethod: \"DELETE\",\n\t\tPathPattern: \"/services/haproxy/configuration/http_request_rules/{index}\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"http\"},\n\t\tParams: params,\n\t\tReader: &DeleteHTTPRequestRuleReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tswitch value := result.(type) {\n\tcase *DeleteHTTPRequestRuleAccepted:\n\t\treturn value, nil, nil\n\tcase *DeleteHTTPRequestRuleNoContent:\n\t\treturn nil, value, nil\n\t}\n\t// unexpected success response\n\tunexpectedSuccess := result.(*DeleteHTTPRequestRuleDefault)\n\treturn nil, nil, runtime.NewAPIError(\"unexpected success response: content available as default response in error\", unexpectedSuccess, unexpectedSuccess.Code())\n}", "title": "" }, { "docid": "1d571947c5c8889e60b8834f59bab171", "score": "0.5791252", "text": "func (client *HybridConnectionsClient) deleteAuthorizationRuleCreateRequest(ctx context.Context, resourceGroupName string, namespaceName string, hybridConnectionName string, authorizationRuleName string, options *HybridConnectionsClientDeleteAuthorizationRuleOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Relay/namespaces/{namespaceName}/hybridConnections/{hybridConnectionName}/authorizationRules/{authorizationRuleName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif namespaceName == \"\" {\n\t\treturn nil, errors.New(\"parameter namespaceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{namespaceName}\", url.PathEscape(namespaceName))\n\tif hybridConnectionName == \"\" {\n\t\treturn nil, errors.New(\"parameter hybridConnectionName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{hybridConnectionName}\", url.PathEscape(hybridConnectionName))\n\tif authorizationRuleName == \"\" {\n\t\treturn nil, errors.New(\"parameter authorizationRuleName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{authorizationRuleName}\", url.PathEscape(authorizationRuleName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-11-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "title": "" }, { "docid": "9bfc5c6c71f5bf206c2dae4046c3a338", "score": "0.57711804", "text": "func (a *ConditionalNamingApiService) DeleteNamingRule(ctx _context.Context, type_ string, id string) ApiDeleteNamingRuleRequest {\n\treturn ApiDeleteNamingRuleRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\ttype_: type_,\n\t\tid: id,\n\t}\n}", "title": "" }, { "docid": "39216aaa73f5a92911e916ca23ecbeb1", "score": "0.57462174", "text": "func DeleteRule(t *testing.T, client *gophercloud.ServiceClient, ruleID string) {\n\tt.Logf(\"Attempting to delete rule: %s\", ruleID)\n\n\terr := rules.Delete(client, ruleID).ExtractErr()\n\tif err != nil {\n\t\tt.Fatalf(\"Unable to delete rule %s: %v\", ruleID, err)\n\t}\n\n\tt.Logf(\"Deleted rule: %s\", ruleID)\n}", "title": "" }, { "docid": "39216aaa73f5a92911e916ca23ecbeb1", "score": "0.57462174", "text": "func DeleteRule(t *testing.T, client *gophercloud.ServiceClient, ruleID string) {\n\tt.Logf(\"Attempting to delete rule: %s\", ruleID)\n\n\terr := rules.Delete(client, ruleID).ExtractErr()\n\tif err != nil {\n\t\tt.Fatalf(\"Unable to delete rule %s: %v\", ruleID, err)\n\t}\n\n\tt.Logf(\"Deleted rule: %s\", ruleID)\n}", "title": "" }, { "docid": "edcfe3a662bfde4814b58264b1910c2d", "score": "0.5720632", "text": "func (h *Connection) DeleteRule(rule int) error {\n\t// Error checking\n\tif !h.doesRuleExist(rule) {\n\t\treturn fmt.Errorf(\"Rule %d not found\", rule)\n\t}\n\n\treq, err := http.NewRequest(\"DELETE\", fmt.Sprintf(\"%s/rules/%d\", h.baseURL, rule), nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = h.execute(req)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "476605b436c3e68713156540dc9929a3", "score": "0.5696364", "text": "func Delete(c *golangsdk.ServiceClient, policyID, ruleID string) (r DeleteResult) {\n\treqOpt := &golangsdk.RequestOpts{\n\t\tMoreHeaders: RequestOpts.MoreHeaders,\n\t}\n\n\t_, r.Err = c.Delete(resourceURL(c, policyID, ruleID), reqOpt)\n\treturn\n}", "title": "" }, { "docid": "d1602f9e2b8418e57fbb249902898f74", "score": "0.56902415", "text": "func Delete(c *golangsdk.ServiceClient, policyID, ruleID string) (r DeleteResult) {\n\treqOpt := &golangsdk.RequestOpts{\n\t\tMoreHeaders: RequestOpts.MoreHeaders,\n\t}\n\t_, r.Err = c.Delete(resourceURL(c, policyID, ruleID), reqOpt)\n\treturn\n}", "title": "" }, { "docid": "b95a7139a5767ac57be71e8d562a587c", "score": "0.5631597", "text": "func DeleteRule(os *OpenStack, uuid string) error {\n\treturn rules.Delete(os.Network, uuid).Err\n}", "title": "" }, { "docid": "3624658bf9be382e0c8f077f78d5bc44", "score": "0.5629451", "text": "func (app *application) delRule(chain string, ipv4 string) error {\n\truleString := createRuleString(ipv4)\n\terr := app.ipt.Delete(app.iptTbl, chain, ruleString...)\n\tapp.debLog.Printf(\"Returning from delRule with chain=%s, ipv4=%s\", chain, ipv4)\n\treturn err\n}", "title": "" }, { "docid": "5db0106971362697078d0e8dc3419e27", "score": "0.56187725", "text": "func (s *ForwardingServiceOp) Delete(portForwardingConfig *PortForwardingConfig) error {\n\t_, err := s.client.Post(\"/cloudapi/portforwarding/deleteByPort\", *portForwardingConfig, OperationalActionTimeout)\n\treturn err\n}", "title": "" }, { "docid": "974a05763222b9a620fa4f796e8a19a9", "score": "0.55860126", "text": "func (c *Operator) handleRuleDelete(obj interface{}) {\n\to, ok := c.getObject(obj)\n\tif ok {\n\t\tlevel.Debug(c.logger).Log(\"msg\", \"PrometheusRule deleted\")\n\t\tc.triggerByCounter.WithLabelValues(monitoringv1.PrometheusRuleKind, \"delete\").Inc()\n\n\t\tc.enqueueForNamespace(o.GetNamespace())\n\t}\n}", "title": "" }, { "docid": "ed000138ed1808c9cb804e7ded8946ff", "score": "0.5487947", "text": "func (c *ThreeScaleClient) DeleteMappingRule(svcId string, id string) error {\n\tep := genMrUpdateEp(svcId, id)\n\n\tbody := strings.NewReader(\"\")\n\treq, err := c.buildDeleteReq(ep, body)\n\tif err != nil {\n\t\treturn httpReqError\n\t}\n\n\tresp, err := c.httpClient.Do(req)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer resp.Body.Close()\n\n\treturn handleXMLResp(resp, http.StatusOK, nil)\n}", "title": "" }, { "docid": "653a6bc01794d2abdaab05a8b60fb4ab", "score": "0.54581124", "text": "func (client *NatRulesClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, gatewayName string, natRuleName string, options *NatRulesClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/vpnGateways/{gatewayName}/natRules/{natRuleName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif gatewayName == \"\" {\n\t\treturn nil, errors.New(\"parameter gatewayName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{gatewayName}\", url.PathEscape(gatewayName))\n\tif natRuleName == \"\" {\n\t\treturn nil, errors.New(\"parameter natRuleName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{natRuleName}\", url.PathEscape(natRuleName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "title": "" }, { "docid": "ba9357b9028ad1dd87ad1de679642668", "score": "0.5438993", "text": "func (client *NatRulesClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, gatewayName string, natRuleName string, options *NatRulesBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/vpnGateways/{gatewayName}/natRules/{natRuleName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif gatewayName == \"\" {\n\t\treturn nil, errors.New(\"parameter gatewayName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{gatewayName}\", url.PathEscape(gatewayName))\n\tif natRuleName == \"\" {\n\t\treturn nil, errors.New(\"parameter natRuleName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{natRuleName}\", url.PathEscape(natRuleName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "title": "" }, { "docid": "de8b08fc50ee58485b8679dcd1e74467", "score": "0.54194087", "text": "func (a *ApiAccessRuleApiService) DeleteApiAccessRule(ctx _context.Context) ApiDeleteApiAccessRuleRequest {\n\treturn ApiDeleteApiAccessRuleRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t}\n}", "title": "" }, { "docid": "24ff3338990e355433e5e7d6f5b9a642", "score": "0.54048866", "text": "func HandleDeleteEventingTriggerRule(adminMan *admin.Manager, syncMan *syncman.Manager) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\n\t\t// Get the JWT token from header\n\t\ttoken := utils.GetTokenFromHeader(r)\n\t\tdefer r.Body.Close()\n\n\t\t// Check if the request is authorised\n\t\tif err := adminMan.IsTokenValid(token); err != nil {\n\t\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\t\tjson.NewEncoder(w).Encode(map[string]string{\"error\": err.Error()})\n\t\t\treturn\n\t\t}\n\t\tctx, cancel := context.WithTimeout(r.Context(), 10*time.Second)\n\t\tdefer cancel()\n\n\t\tvars := mux.Vars(r)\n\t\truleName := vars[\"triggerName\"]\n\t\tprojectID := vars[\"project\"]\n\n\t\tif err := syncMan.SetDeleteEventingRule(ctx, projectID, ruleName); err != nil {\n\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\tjson.NewEncoder(w).Encode(map[string]string{\"error\": err.Error()})\n\t\t\treturn\n\t\t}\n\n\t\tw.WriteHeader(http.StatusOK) //http status codee\n\t\tjson.NewEncoder(w).Encode(map[string]interface{}{})\n\t\treturn\n\n\t}\n}", "title": "" }, { "docid": "83c6a5ff8fe92692ace37887b73d636f", "score": "0.5394356", "text": "func (ah *AdmissionHook) handleAdmissionRequestToDelete(requestName string, req *admissionv1beta1.AdmissionRequest, resp *admissionv1beta1.AdmissionResponse) {\n\t// Read current spec of the to-be-removed Pod\n\tpod, err := ah.client.CoreV1().Pods(req.Namespace).Get(req.Name, metav1.GetOptions{})\n\tif err != nil {\n\t\tsetResponseError(resp, requestName, \"Failed to obtain Pod: %v\", err)\n\t\treturn\n\t}\n\n\t// Read Pod's networksSpec annotation, if not found, don't process the request, just allow it\n\tannotations := pod.ObjectMeta.GetAnnotations()\n\tnetworksSpecAnnotation, networksSpecAnnotationFound := annotations[networksSpecAnnotationName]\n\tif !networksSpecAnnotationFound {\n\t\tglog.V(2).Infof(\"[%s] Skipping: Required annotation not present.\", req.Operation, requestName)\n\t\tresp.Allowed = true\n\t\treturn\n\t}\n\n\t// Parse networksSpec in order to obtain ports' IDs\n\tnetworksSpec := spec.NetworksSpec{}\n\terr = json.Unmarshal([]byte(networksSpecAnnotation), &networksSpec)\n\tif err != nil {\n\t\tsetResponseError(resp, requestName, \"Failed to read networksSpec: %v\", err)\n\t\treturn\n\t}\n\tglog.V(4).Infof(\"[%s] Network spec: %s\", requestName, networksSpecAnnotation)\n\n\t// No need to delete ports if the spec is already empty\n\tif len(networksSpec) == 0 {\n\t\tglog.V(2).Infof(\"[%s] Skipping: Nothing to delete.\", requestName)\n\t\tresp.Allowed = true\n\t\treturn\n\t}\n\t// Remove assigned Pod's LSPs from OVN\n\tfor network, spec := range networksSpec {\n\t\terr := ah.providerClient.DeleteNetworkPort(spec.PortID)\n\t\tif err != nil {\n\t\t\tsetResponseError(resp, requestName, \"Error removing port: %v\", err)\n\t\t\treturn\n\t\t}\n\t\tdelete(networksSpec, network)\n\t}\n\tglog.V(2).Infof(\"[%s] Successfully removed all ports\", requestName)\n\n\t// Remove deleted ports from Pod annotations\n\tjsonNetworkSpecs, err := json.Marshal(networksSpec)\n\tif err != nil {\n\t\tsetResponseError(resp, requestName, \"Failed to marshal networksSpec: %v\", err)\n\t\treturn\n\t}\n\n\tpod.ObjectMeta.Annotations[networksSpecAnnotationName] = string(jsonNetworkSpecs)\n\t_, err = ah.client.CoreV1().Pods(req.Namespace).Update(pod)\n\tif err != nil {\n\t\tsetResponseError(resp, requestName, \"Cannot update pod: %v\", err)\n\t\treturn\n\t}\n\n\n\tresp.Allowed = true\n}", "title": "" }, { "docid": "becfa125dc00e4d8a85f4cde49426268", "score": "0.53893894", "text": "func (a *ApiAccessRuleApiService) DeleteApiAccessRuleExecute(r ApiDeleteApiAccessRuleRequest) (DeleteApiAccessRuleResponse, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue DeleteApiAccessRuleResponse\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"ApiAccessRuleApiService.DeleteApiAccessRule\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/DeleteApiAccessRule\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = r.deleteApiAccessRuleRequest\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif apiKey, ok := auth[\"ApiKeyAuthSec\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif apiKey.Prefix != \"\" {\n\t\t\t\t\tkey = apiKey.Prefix + \" \" + apiKey.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = apiKey.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"Authorization\"] = key\n\t\t\t}\n\t\t}\n\t}\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = _ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "4c79b25b3feaba65244779efa114d665", "score": "0.53646994", "text": "func (c *networkFirewallPoliciesRESTClient) Delete(ctx context.Context, req *computepb.DeleteNetworkFirewallPolicyRequest, opts ...gax.CallOption) (*Operation, error) {\n\tbaseUrl, err := url.Parse(c.endpoint)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbaseUrl.Path += fmt.Sprintf(\"/compute/v1/projects/%v/global/firewallPolicies/%v\", req.GetProject(), req.GetFirewallPolicy())\n\n\tparams := url.Values{}\n\tif req != nil && req.RequestId != nil {\n\t\tparams.Add(\"requestId\", fmt.Sprintf(\"%v\", req.GetRequestId()))\n\t}\n\n\tbaseUrl.RawQuery = params.Encode()\n\n\t// Build HTTP headers from client and context metadata.\n\thds := []string{\"x-goog-request-params\", fmt.Sprintf(\"%s=%v&%s=%v\", \"project\", url.QueryEscape(req.GetProject()), \"firewall_policy\", url.QueryEscape(req.GetFirewallPolicy()))}\n\n\thds = append(c.xGoogHeaders, hds...)\n\thds = append(hds, \"Content-Type\", \"application/json\")\n\theaders := gax.BuildHeaders(ctx, hds...)\n\topts = append((*c.CallOptions).Delete[0:len((*c.CallOptions).Delete):len((*c.CallOptions).Delete)], opts...)\n\tunm := protojson.UnmarshalOptions{AllowPartial: true, DiscardUnknown: true}\n\tresp := &computepb.Operation{}\n\te := gax.Invoke(ctx, func(ctx context.Context, settings gax.CallSettings) error {\n\t\tif settings.Path != \"\" {\n\t\t\tbaseUrl.Path = settings.Path\n\t\t}\n\t\thttpReq, err := http.NewRequest(\"DELETE\", baseUrl.String(), nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\thttpReq = httpReq.WithContext(ctx)\n\t\thttpReq.Header = headers\n\n\t\thttpRsp, err := c.httpClient.Do(httpReq)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdefer httpRsp.Body.Close()\n\n\t\tif err = googleapi.CheckResponse(httpRsp); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tbuf, err := io.ReadAll(httpRsp.Body)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif err := unm.Unmarshal(buf, resp); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\treturn nil\n\t}, opts...)\n\tif e != nil {\n\t\treturn nil, e\n\t}\n\top := &Operation{\n\t\t&globalOperationsHandle{\n\t\t\tc: c.operationClient,\n\t\t\tproto: resp,\n\t\t\tproject: req.GetProject(),\n\t\t},\n\t}\n\treturn op, nil\n}", "title": "" }, { "docid": "b505ac410bc3bfb01da89f0a48405525", "score": "0.5362698", "text": "func (a *Client) DeleteHTTPResponseRule(params *DeleteHTTPResponseRuleParams, authInfo runtime.ClientAuthInfoWriter) (*DeleteHTTPResponseRuleAccepted, *DeleteHTTPResponseRuleNoContent, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewDeleteHTTPResponseRuleParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"deleteHTTPResponseRule\",\n\t\tMethod: \"DELETE\",\n\t\tPathPattern: \"/services/haproxy/configuration/http_response_rules/{index}\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"http\"},\n\t\tParams: params,\n\t\tReader: &DeleteHTTPResponseRuleReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tswitch value := result.(type) {\n\tcase *DeleteHTTPResponseRuleAccepted:\n\t\treturn value, nil, nil\n\tcase *DeleteHTTPResponseRuleNoContent:\n\t\treturn nil, value, nil\n\t}\n\t// unexpected success response\n\tunexpectedSuccess := result.(*DeleteHTTPResponseRuleDefault)\n\treturn nil, nil, runtime.NewAPIError(\"unexpected success response: content available as default response in error\", unexpectedSuccess, unexpectedSuccess.Code())\n}", "title": "" }, { "docid": "098097f997911317e48be3e55be0e600", "score": "0.53370756", "text": "func DeleteRule(ipt *iptables.IPTables, table, chain string, rulespec ...string) error {\n\tif ipt == nil {\n\t\treturn errors.New(\"failed to ensure iptable chain: IPTables was nil\")\n\t}\n\tif err := ipt.Delete(table, chain, rulespec...); err != nil {\n\t\teerr, eok := err.(*iptables.Error)\n\t\tswitch {\n\t\tcase eok && eerr.IsNotExist():\n\t\t\t// swallow here, the chain was already deleted\n\t\t\treturn nil\n\t\tcase eok && eerr.ExitStatus() == 2:\n\t\t\t// swallow here, invalid command line parameter because the referring rule is missing\n\t\t\treturn nil\n\t\tdefault:\n\t\t\treturn fmt.Errorf(\"Failed to delete referring rule %s %s: %v\", table, chain, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "6663cad941cba4c7fad5029780c8a450", "score": "0.53343856", "text": "func (s *ruleService) Delete(ctx context.Context, rule models.Rule) error {\n\t_, span := trace.StartSpan(ctx, \"RuleService.Delete\")\n\tdefer span.End()\n\n\tif result := s.gorm().Delete(rule); result.Error != nil {\n\t\treturn result.Error\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "0c075c2a1d85d435e495b49989ccfeb5", "score": "0.5309325", "text": "func (h *Handle) RuleDel(rule *Rule) error {\n\treq := h.newNetlinkRequest(unix.RTM_DELRULE, unix.NLM_F_ACK)\n\treturn ruleHandle(rule, req)\n}", "title": "" }, { "docid": "ad7f9d581c4da4ac11081c35aa7cde8c", "score": "0.53083026", "text": "func (c *ThreeScaleClient) DeleteBackendapiMappingRule(backendapiID, mrID int64) error {\n\tendpoint := fmt.Sprintf(backendMRResourceEndpoint, backendapiID, mrID)\n\n\treq, err := c.buildDeleteReq(endpoint, nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tresp, err := c.httpClient.Do(req)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer resp.Body.Close()\n\n\treturn handleJsonResp(resp, http.StatusOK, nil)\n}", "title": "" }, { "docid": "4c26a00f6be72fedf597452c44cf1897", "score": "0.53058475", "text": "func ruleHandler(w http.ResponseWriter, r *http.Request) {\n\tdefer r.Body.Close()\n\tvars := mux.Vars(r)\n\tname := vars[\"name\"]\n\n\tswitch r.Method {\n\tcase http.MethodGet:\n\t\trule, err := ruleProcessor.GetRuleByName(name)\n\t\tif err != nil {\n\t\t\thandleError(w, fmt.Errorf(\"describe stream error: %s\", err), http.StatusBadRequest, logger)\n\t\t\treturn\n\t\t}\n\t\tjsonResponse(rule, w, logger)\n\tcase http.MethodDelete:\n\t\tstopRule(name)\n\t\tcontent, err := ruleProcessor.ExecDrop(name)\n\t\tif err != nil {\n\t\t\thandleError(w, fmt.Errorf(\"drop rule error: %s\", err), http.StatusBadRequest, logger)\n\t\t\treturn\n\t\t}\n\t\tw.WriteHeader(http.StatusOK)\n\t\tw.Write([]byte(content))\n\t}\n}", "title": "" }, { "docid": "fe011102d7685566f455605e9117639b", "score": "0.5293049", "text": "func (c *networkFirewallPoliciesRESTClient) RemoveRule(ctx context.Context, req *computepb.RemoveRuleNetworkFirewallPolicyRequest, opts ...gax.CallOption) (*Operation, error) {\n\tbaseUrl, err := url.Parse(c.endpoint)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbaseUrl.Path += fmt.Sprintf(\"/compute/v1/projects/%v/global/firewallPolicies/%v/removeRule\", req.GetProject(), req.GetFirewallPolicy())\n\n\tparams := url.Values{}\n\tif req != nil && req.Priority != nil {\n\t\tparams.Add(\"priority\", fmt.Sprintf(\"%v\", req.GetPriority()))\n\t}\n\tif req != nil && req.RequestId != nil {\n\t\tparams.Add(\"requestId\", fmt.Sprintf(\"%v\", req.GetRequestId()))\n\t}\n\n\tbaseUrl.RawQuery = params.Encode()\n\n\t// Build HTTP headers from client and context metadata.\n\thds := []string{\"x-goog-request-params\", fmt.Sprintf(\"%s=%v&%s=%v\", \"project\", url.QueryEscape(req.GetProject()), \"firewall_policy\", url.QueryEscape(req.GetFirewallPolicy()))}\n\n\thds = append(c.xGoogHeaders, hds...)\n\thds = append(hds, \"Content-Type\", \"application/json\")\n\theaders := gax.BuildHeaders(ctx, hds...)\n\topts = append((*c.CallOptions).RemoveRule[0:len((*c.CallOptions).RemoveRule):len((*c.CallOptions).RemoveRule)], opts...)\n\tunm := protojson.UnmarshalOptions{AllowPartial: true, DiscardUnknown: true}\n\tresp := &computepb.Operation{}\n\te := gax.Invoke(ctx, func(ctx context.Context, settings gax.CallSettings) error {\n\t\tif settings.Path != \"\" {\n\t\t\tbaseUrl.Path = settings.Path\n\t\t}\n\t\thttpReq, err := http.NewRequest(\"POST\", baseUrl.String(), nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\thttpReq = httpReq.WithContext(ctx)\n\t\thttpReq.Header = headers\n\n\t\thttpRsp, err := c.httpClient.Do(httpReq)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdefer httpRsp.Body.Close()\n\n\t\tif err = googleapi.CheckResponse(httpRsp); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tbuf, err := io.ReadAll(httpRsp.Body)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif err := unm.Unmarshal(buf, resp); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\treturn nil\n\t}, opts...)\n\tif e != nil {\n\t\treturn nil, e\n\t}\n\top := &Operation{\n\t\t&globalOperationsHandle{\n\t\t\tc: c.operationClient,\n\t\t\tproto: resp,\n\t\t\tproject: req.GetProject(),\n\t\t},\n\t}\n\treturn op, nil\n}", "title": "" }, { "docid": "5e88b7b4ab5fd951a41324f03127750b", "score": "0.52848643", "text": "func (runner *runner) DeletePortProxyRule(args []string) error {\n\tout, err := runner.exec.Command(cmdNetsh, args...).CombinedOutput()\n\n\tif err == nil {\n\t\treturn nil\n\t}\n\tif ee, ok := err.(utilexec.ExitError); ok {\n\t\t// netsh uses exit(0) to indicate a success of the operation,\n\t\t// as compared to a malformed commandline, for example.\n\t\tif ee.Exited() && ee.ExitStatus() == 0 {\n\t\t\treturn nil\n\t\t}\n\t}\n\treturn fmt.Errorf(\"error deleting portproxy rule: %v: %s\", err, out)\n}", "title": "" }, { "docid": "038d6743a8c99c44e01df6cc76f5a64d", "score": "0.52826387", "text": "func (spv *Validator) HandleDelete(ctx context.Context, req *admission.Request) admission.Response {\n\tshadowpod, err := spv.DecodeShadowPod(req.OldObject)\n\tif err != nil {\n\t\treturn admission.Errored(http.StatusInternalServerError, fmt.Errorf(\"failed decoding of ShadowPod: %w\", err))\n\t}\n\n\t// Check existence and get shadow pod origin Cluster ID label\n\tclusterID, found := shadowpod.Labels[forge.LiqoOriginClusterIDKey]\n\tif !found {\n\t\tklog.Warningf(\"Missing origin Cluster ID label on ShadowPod %q\", shadowpod.Name)\n\t\treturn admission.Allowed(\"missing origin Cluster ID label\")\n\t}\n\n\tklog.V(5).Infof(\"ShadowPod %s decoded: UID: %s - clusterID %s\", shadowpod.Name, shadowpod.GetUID(), clusterID)\n\tif !spv.enableResourceValidation {\n\t\treturn admission.Allowed(\"\")\n\t}\n\n\tclusterName := retrieveClusterName(ctx, spv.client, clusterID)\n\n\tpeeringInfo, found := spv.PeeringCache.getPeeringInfo(discoveryv1alpha1.ClusterIdentity{\n\t\tClusterID: clusterID,\n\t\tClusterName: clusterName,\n\t})\n\tif !found {\n\t\t// If the PeeringInfo is not present in the Cache it means there are some cache consistency issues.\n\t\t// The next refreshing process will align this issue.\n\t\t// Anyway, the deletion process of shadowpods is always allowed.\n\t\tklog.Warningf(\"PeeringInfo not found in cache for cluster %q\", clusterName)\n\t\treturn admission.Allowed(fmt.Sprintf(\"Peering not found in cache for cluster %q\", clusterName))\n\t}\n\n\terr = peeringInfo.updateDeletion(shadowpod, *req.DryRun)\n\tif err != nil {\n\t\t// The error could be generated by the absence of the ShadodPod Description in cache.\n\t\t// or for a UID mismatch. In both cases, the deletion is always allowed.\n\t\t// The next refreshing process will align this issue.\n\t\tklog.Warning(err)\n\t\treturn admission.Allowed(err.Error())\n\t}\n\n\treturn admission.Allowed(\"\")\n}", "title": "" }, { "docid": "262df8dccbc4d6bf74ba24c64da05363", "score": "0.5279761", "text": "func (srv RulerSrv) RouteDeleteAlertRules(c *contextmodel.ReqContext, namespaceTitle string, group string) response.Response {\n\tnamespace, err := srv.store.GetNamespaceByTitle(c.Req.Context(), namespaceTitle, c.SignedInUser.OrgID, c.SignedInUser)\n\tif err != nil {\n\t\treturn toNamespaceErrorResponse(err)\n\t}\n\tvar loggerCtx = []interface{}{\n\t\t\"namespace\",\n\t\tnamespace.Title,\n\t}\n\tvar ruleGroup string\n\tif group != \"\" {\n\t\truleGroup = group\n\t\tloggerCtx = append(loggerCtx, \"group\", group)\n\t}\n\tlogger := srv.log.New(loggerCtx...)\n\n\thasAccess := func(evaluator accesscontrol.Evaluator) bool {\n\t\treturn accesscontrol.HasAccess(srv.ac, c)(evaluator)\n\t}\n\n\tprovenances, err := srv.provenanceStore.GetProvenances(c.Req.Context(), c.SignedInUser.OrgID, (&ngmodels.AlertRule{}).ResourceType())\n\tif err != nil {\n\t\treturn ErrResp(http.StatusInternalServerError, err, \"failed to fetch provenances of alert rules\")\n\t}\n\n\tdeletedGroups := make(map[ngmodels.AlertRuleGroupKey][]ngmodels.AlertRuleKey)\n\terr = srv.xactManager.InTransaction(c.Req.Context(), func(ctx context.Context) error {\n\t\tunauthz, provisioned := false, false\n\t\tq := ngmodels.ListAlertRulesQuery{\n\t\t\tOrgID: c.SignedInUser.OrgID,\n\t\t\tNamespaceUIDs: []string{namespace.UID},\n\t\t\tRuleGroup: ruleGroup,\n\t\t}\n\t\truleList, err := srv.store.ListAlertRules(ctx, &q)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif len(ruleList) == 0 {\n\t\t\tlogger.Debug(\"no alert rules to delete from namespace/group\")\n\t\t\treturn nil\n\t\t}\n\n\t\tvar deletionCandidates = make(map[ngmodels.AlertRuleGroupKey][]*ngmodels.AlertRule)\n\t\tfor _, rule := range ruleList {\n\t\t\tkey := rule.GetGroupKey()\n\t\t\tdeletionCandidates[key] = append(deletionCandidates[key], rule)\n\t\t}\n\t\trulesToDelete := make([]string, 0, len(ruleList))\n\t\tfor groupKey, rules := range deletionCandidates {\n\t\t\tif !authorizeAccessToRuleGroup(rules, hasAccess) {\n\t\t\t\tunauthz = true\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif containsProvisionedAlerts(provenances, rules) {\n\t\t\t\tprovisioned = true\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tuid := make([]string, 0, len(rules))\n\t\t\tkeys := make([]ngmodels.AlertRuleKey, 0, len(rules))\n\t\t\tfor _, rule := range rules {\n\t\t\t\tuid = append(uid, rule.UID)\n\t\t\t\tkeys = append(keys, rule.GetKey())\n\t\t\t}\n\t\t\trulesToDelete = append(rulesToDelete, uid...)\n\t\t\tdeletedGroups[groupKey] = keys\n\t\t}\n\t\tif len(rulesToDelete) > 0 {\n\t\t\treturn srv.store.DeleteAlertRulesByUID(ctx, c.SignedInUser.OrgID, rulesToDelete...)\n\t\t}\n\t\t// if none rules were deleted return an error.\n\t\t// Check whether provisioned check failed first because if it is true, then all rules that the user can access (actually read via GET API) are provisioned.\n\t\tif provisioned {\n\t\t\treturn errProvisionedResource\n\t\t}\n\t\tif unauthz {\n\t\t\tif group == \"\" {\n\t\t\t\treturn fmt.Errorf(\"%w to delete any existing rules in the namespace\", ErrAuthorization)\n\t\t\t}\n\t\t\treturn fmt.Errorf(\"%w to delete group of the rules\", ErrAuthorization)\n\t\t}\n\t\treturn nil\n\t})\n\n\tif err != nil {\n\t\tif errors.Is(err, ErrAuthorization) {\n\t\t\treturn ErrResp(http.StatusUnauthorized, err, \"failed to delete rule group\")\n\t\t}\n\t\tif errors.Is(err, errProvisionedResource) {\n\t\t\treturn ErrResp(http.StatusBadRequest, err, \"failed to delete rule group\")\n\t\t}\n\t\treturn ErrResp(http.StatusInternalServerError, err, \"failed to delete rule group\")\n\t}\n\treturn response.JSON(http.StatusAccepted, util.DynMap{\"message\": \"rules deleted\"})\n}", "title": "" }, { "docid": "98d0cdbfe144024a3d8399065e93ef33", "score": "0.5279009", "text": "func (client *DataCollectionRulesClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, dataCollectionRuleName string, options *DataCollectionRulesClientDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Insights/dataCollectionRules/{dataCollectionRuleName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif dataCollectionRuleName == \"\" {\n\t\treturn nil, errors.New(\"parameter dataCollectionRuleName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{dataCollectionRuleName}\", url.PathEscape(dataCollectionRuleName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-06-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "title": "" }, { "docid": "0a2f8d968aad95e7f3ee7fadae99c3e3", "score": "0.5272859", "text": "func (*DeleteRuleRequest) Descriptor() ([]byte, []int) {\n\treturn file_api_proto_v1_rules_proto_rawDescGZIP(), []int{6}\n}", "title": "" }, { "docid": "243ccd1a1d65f9984898f98653726d04", "score": "0.526088", "text": "func (r *DeviceComplianceScheduledActionForRuleRequest) Delete(ctx context.Context) error {\n\treturn r.JSONRequest(ctx, \"DELETE\", \"\", nil, nil)\n}", "title": "" }, { "docid": "7f3d76ab8556865c501f875fe2b96f42", "score": "0.5260117", "text": "func (a *Client) DeleteTCPRequestRule(params *DeleteTCPRequestRuleParams, authInfo runtime.ClientAuthInfoWriter) (*DeleteTCPRequestRuleAccepted, *DeleteTCPRequestRuleNoContent, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewDeleteTCPRequestRuleParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"deleteTCPRequestRule\",\n\t\tMethod: \"DELETE\",\n\t\tPathPattern: \"/services/haproxy/configuration/tcp_request_rules/{index}\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"http\"},\n\t\tParams: params,\n\t\tReader: &DeleteTCPRequestRuleReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tswitch value := result.(type) {\n\tcase *DeleteTCPRequestRuleAccepted:\n\t\treturn value, nil, nil\n\tcase *DeleteTCPRequestRuleNoContent:\n\t\treturn nil, value, nil\n\t}\n\t// unexpected success response\n\tunexpectedSuccess := result.(*DeleteTCPRequestRuleDefault)\n\treturn nil, nil, runtime.NewAPIError(\"unexpected success response: content available as default response in error\", unexpectedSuccess, unexpectedSuccess.Code())\n}", "title": "" }, { "docid": "d3218fdd095045089945300ce0c37dc9", "score": "0.52586246", "text": "func DeleteRule(c *gophercloud.ServiceClient, policyID string, ruleID string) (r DeleteRuleResult) {\n\tresp, err := c.Delete(ruleResourceURL(c, policyID, ruleID), nil)\n\t_, r.Header, r.Err = gophercloud.ParseResponse(resp, err)\n\treturn\n}", "title": "" }, { "docid": "6da26c665c9a1f2c831a1666ef18a042", "score": "0.52461845", "text": "func (client *NetworkTapRulesClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, networkTapRuleName string, options *NetworkTapRulesClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedNetworkFabric/networkTapRules/{networkTapRuleName}\"\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif networkTapRuleName == \"\" {\n\t\treturn nil, errors.New(\"parameter networkTapRuleName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{networkTapRuleName}\", url.PathEscape(networkTapRuleName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-06-15\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "title": "" }, { "docid": "8e3231eebd67f0f8372b220bdf633a47", "score": "0.5240946", "text": "func RuleDel(rule *Rule) error {\n\treturn pkgHandle.RuleDel(rule)\n}", "title": "" }, { "docid": "c701ac27531ee2317f483f174f71a719", "score": "0.52353597", "text": "func (api *firewallprofileAPI) Delete(obj *security.FirewallProfile) error {\n\tif api.ct.resolver != nil {\n\t\tapicl, err := api.ct.apiClient()\n\t\tif err != nil {\n\t\t\tapi.ct.logger.Errorf(\"Error creating API server clent. Err: %v\", err)\n\t\t\treturn err\n\t\t}\n\n\t\t_, err = apicl.SecurityV1().FirewallProfile().Delete(context.Background(), &obj.ObjectMeta)\n\t\treturn err\n\t}\n\n\tapi.ct.handleFirewallProfileEvent(&kvstore.WatchEvent{Object: obj, Type: kvstore.Deleted})\n\treturn nil\n}", "title": "" }, { "docid": "bd525a8bc3c35a7baa22885a8738c68d", "score": "0.52273864", "text": "func (a *BackendSwitchingRuleApiService) DeleteBackendSwitchingRule(ctx _context.Context, id int32, frontend string, localVarOptionals *DeleteBackendSwitchingRuleOpts) (*_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodDelete\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/services/haproxy/configuration/backend_switching_rules/{id}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", id)), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tlocalVarQueryParams.Add(\"frontend\", parameterToString(frontend, \"\"))\n\tif localVarOptionals != nil && localVarOptionals.TransactionId.IsSet() {\n\t\tlocalVarQueryParams.Add(\"transaction_id\", parameterToString(localVarOptionals.TransactionId.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Version.IsSet() {\n\t\tlocalVarQueryParams.Add(\"version\", parameterToString(localVarOptionals.Version.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.ForceReload.IsSet() {\n\t\tlocalVarQueryParams.Add(\"force_reload\", parameterToString(localVarOptionals.ForceReload.Value(), \"\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v ModelError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarHTTPResponse, newErr\n\t\t}\n\t\tvar v ModelError\n\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\tnewErr.error = err.Error()\n\t\t\treturn localVarHTTPResponse, newErr\n\t\t}\n\t\tnewErr.model = v\n\t\treturn localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "e9e550edc2dc31cc3598eee92b21df48", "score": "0.5221645", "text": "func (rm *Controller) Delete(rule netlink.Rule) error {\n\trm.mu.Lock()\n\tdefer rm.mu.Unlock()\n\tvar reconcileNeeded bool\n\tfor i, r := range rm.rules {\n\t\tif areNetlinkRulesEqual(r.rule, &rule) {\n\t\t\trm.rules[i].delete = true\n\t\t\treconcileNeeded = true\n\t\t\tbreak\n\t\t}\n\t}\n\tif reconcileNeeded {\n\t\treturn rm.reconcile()\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "81f8619272e6d1c7083aacecee9d19f2", "score": "0.5219504", "text": "func (plugin *Plugin) deleteTproxyRouterRule(proto iptables.Protocol,\n\thandle *netlink.Handle) error {\n\texistingRules, _ := handle.RuleList(plugin.getRuleFamily(proto))\n\tfor _, r := range existingRules {\n\t\tif r.Table == tproxyRouteTable &&\n\t\t\tr.Mark == tproxyRouteMarker {\n\t\t\truleToBeDeleted := r\n\t\t\tif err := handle.RuleDel(&ruleToBeDeleted); err != nil {\n\t\t\t\tlog.Errorf(\"Delete IP rule %v failed : %v\", ruleToBeDeleted, err)\n\t\t\t}\n\t\t\tbreak\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "612f9c7cec0aa790cadd644b631c8683", "score": "0.5198146", "text": "func XDeleteRuleFromSecurityGroup(paramId string, paramRuleId string, params *viper.Viper) (*gentleman.Response, map[string]interface{}, error) {\n\thandlerPath := \"delete-rule-from-security-group\"\n\tif xSubcommand {\n\t\thandlerPath = \"x \" + handlerPath\n\t}\n\n\tserver := viper.GetString(\"server\")\n\tif server == \"\" {\n\t\tserver = xServers()[viper.GetInt(\"server-index\")][\"url\"]\n\t}\n\n\turl := server + \"/security-group/{id}/rules/{rule-id}\"\n\turl = strings.Replace(url, \"{id}\", paramId, 1)\n\turl = strings.Replace(url, \"{rule-id}\", paramRuleId, 1)\n\n\treq := cli.Client.Delete().URL(url)\n\n\tcli.HandleBefore(handlerPath, params, req)\n\n\tresp, err := req.Do()\n\tif err != nil {\n\t\treturn nil, nil, errors.Wrap(err, \"Request failed\")\n\t}\n\n\tvar decoded map[string]interface{}\n\n\tif resp.StatusCode < 400 {\n\t\tif err := cli.UnmarshalResponse(resp, &decoded); err != nil {\n\t\t\treturn nil, nil, errors.Wrap(err, \"Unmarshalling response failed\")\n\t\t}\n\t} else {\n\t\treturn nil, nil, errors.Errorf(\"HTTP %d: %s\", resp.StatusCode, resp.String())\n\t}\n\n\tafter := cli.HandleAfter(handlerPath, params, resp, decoded)\n\tif after != nil {\n\t\tdecoded = after.(map[string]interface{})\n\t}\n\n\treturn resp, decoded, nil\n}", "title": "" }, { "docid": "2ae3f3482939d3b30e2451737099a07e", "score": "0.5186892", "text": "func (c *MockPostgreSQLVirtualNetworkRulesClient) Delete(ctx context.Context, resourceGroupName string, serverName string, virtualNetworkRuleName string) (result postgresql.VirtualNetworkRulesDeleteFuture, err error) {\n\treturn c.MockDelete(ctx, resourceGroupName, serverName, virtualNetworkRuleName)\n}", "title": "" }, { "docid": "86245cccfa8fffe8a404240ce2b606fe", "score": "0.51846623", "text": "func DeletePortFwdSession(cmd string) {\n\tcmdSplit := strings.Fields(cmd)\n\tif len(cmdSplit) != 2 {\n\t\tCliPrintError(\"delete_port_fwd <mapping id>\")\n\t\treturn\n\t}\n\tsessionID := cmdSplit[1]\n\tPortFwdsMutex.Lock()\n\tdefer PortFwdsMutex.Unlock()\n\tfor id, session := range PortFwds {\n\t\tif id == sessionID {\n\t\t\terr := SendCmd(fmt.Sprintf(\"%s %s\", emp3r0r_data.C2CmdDeletePortFwd, id), \"\", session.Agent)\n\t\t\tif err != nil {\n\t\t\t\tCliPrintWarning(\"Tell agent %s to delete port mapping %s: %v\", session.Agent.Tag, sessionID, err)\n\t\t\t}\n\t\t\tsession.Cancel()\n\t\t\tdelete(PortFwds, id)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "aa9c93dfba4effcc68be47c23f313c66", "score": "0.51843095", "text": "func (r *RuleResource) Delete(id string) error {\n\tif err := r.c.ModQuery(\"DELETE\", BasePath+RuleEndpoint+\"/\"+id, nil); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8f0e920bcc4272e6e544f9f18b8bf7d4", "score": "0.51758575", "text": "func (a *ConditionalNamingApiService) DeleteNamingRuleExecute(r ApiDeleteNamingRuleRequest) (*_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodDelete\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"ConditionalNamingApiService.DeleteNamingRule\")\n\tif err != nil {\n\t\treturn nil, GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/conditionalNaming/{type}/{id}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"type\"+\"}\", _neturl.PathEscape(parameterToString(r.type_, \"\")), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"id\"+\"}\", _neturl.PathEscape(parameterToString(r.id, \"\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif apiKey, ok := auth[\"Api-Token\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif apiKey.Prefix != \"\" {\n\t\t\t\t\tkey = apiKey.Prefix + \" \" + apiKey.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = apiKey.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"Authorization\"] = key\n\t\t\t}\n\t\t}\n\t}\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\treturn localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "76413b8e80a6a3a74d4ba5cf0073e0ad", "score": "0.51624167", "text": "func (client *Client) deleteAuthorizationRuleCreateRequest(ctx context.Context, resourceGroupName string, namespaceName string, notificationHubName string, authorizationRuleName string, options *ClientDeleteAuthorizationRuleOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.NotificationHubs/namespaces/{namespaceName}/notificationHubs/{notificationHubName}/AuthorizationRules/{authorizationRuleName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif namespaceName == \"\" {\n\t\treturn nil, errors.New(\"parameter namespaceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{namespaceName}\", url.PathEscape(namespaceName))\n\tif notificationHubName == \"\" {\n\t\treturn nil, errors.New(\"parameter notificationHubName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{notificationHubName}\", url.PathEscape(notificationHubName))\n\tif authorizationRuleName == \"\" {\n\t\treturn nil, errors.New(\"parameter authorizationRuleName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{authorizationRuleName}\", url.PathEscape(authorizationRuleName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2017-04-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treturn req, nil\n}", "title": "" }, { "docid": "d7e422936ec8dc364b5478c656e6dc34", "score": "0.51589906", "text": "func DeleteJumpRule(v, tableName, srcChainName, dstChainName string) error {\n\tr, err := GetJumpRule(v, tableName, srcChainName, dstChainName)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif r == nil {\n\t\treturn nil\n\t}\n\n\tconn, err := initNftConn()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ttb := &nftables.Table{\n\t\tName: tableName,\n\t}\n\tif v == \"4\" {\n\t\ttb.Family = nftables.TableFamilyIPv4\n\t} else {\n\t\ttb.Family = nftables.TableFamilyIPv6\n\t}\n\n\tch := &nftables.Chain{\n\t\tName: srcChainName,\n\t\tTable: tb,\n\t}\n\n\tconn.DelRule(&nftables.Rule{\n\t\tTable: tb,\n\t\tChain: ch,\n\t\t//&nftables.Chain{Name: r.Chain.Name, Type: r.Chain.Type},\n\t\tHandle: r.Handle,\n\t})\n\n\tif err := conn.Flush(); err != nil {\n\t\treturn fmt.Errorf(\n\t\t\t\"error deleting jump rule to %s chain found in chain %s in %s table: %s\",\n\t\t\tdstChainName, r.Chain.Name, r.Table.Name, err,\n\t\t)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "e456427e32527a1278038f2c65a9af97", "score": "0.51579136", "text": "func (c *analyticsAdminRESTClient) DeleteEventCreateRule(ctx context.Context, req *adminpb.DeleteEventCreateRuleRequest, opts ...gax.CallOption) error {\n\tbaseUrl, err := url.Parse(c.endpoint)\n\tif err != nil {\n\t\treturn err\n\t}\n\tbaseUrl.Path += fmt.Sprintf(\"/v1alpha/%v\", req.GetName())\n\n\tparams := url.Values{}\n\tparams.Add(\"$alt\", \"json;enum-encoding=int\")\n\n\tbaseUrl.RawQuery = params.Encode()\n\n\t// Build HTTP headers from client and context metadata.\n\thds := []string{\"x-goog-request-params\", fmt.Sprintf(\"%s=%v\", \"name\", url.QueryEscape(req.GetName()))}\n\n\thds = append(c.xGoogHeaders, hds...)\n\thds = append(hds, \"Content-Type\", \"application/json\")\n\theaders := gax.BuildHeaders(ctx, hds...)\n\treturn gax.Invoke(ctx, func(ctx context.Context, settings gax.CallSettings) error {\n\t\tif settings.Path != \"\" {\n\t\t\tbaseUrl.Path = settings.Path\n\t\t}\n\t\thttpReq, err := http.NewRequest(\"DELETE\", baseUrl.String(), nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\thttpReq = httpReq.WithContext(ctx)\n\t\thttpReq.Header = headers\n\n\t\thttpRsp, err := c.httpClient.Do(httpReq)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdefer httpRsp.Body.Close()\n\n\t\t// Returns nil if there is no error, otherwise wraps\n\t\t// the response code and body into a non-nil error\n\t\treturn googleapi.CheckResponse(httpRsp)\n\t}, opts...)\n}", "title": "" }, { "docid": "9a8dde9e78e73b454f0b4cf94a0fa5bb", "score": "0.5146085", "text": "func (a *CloudCostAutoStoppingRulesApiService) DeleteAutoStoppingRule(ctx context.Context, ruleId float64, accountId string, accountIdentifier string) (*http.Response, error) {\n\tvar (\n\t\tlocalVarHttpMethod = strings.ToUpper(\"Delete\")\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/lw/api/accounts/{account_id}/autostopping/rules/{rule_id}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"rule_id\"+\"}\", fmt.Sprintf(\"%v\", ruleId), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"account_id\"+\"}\", fmt.Sprintf(\"%v\", accountId), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\tlocalVarQueryParams.Add(\"accountIdentifier\", parameterToString(accountIdentifier, \"\"))\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := selectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := selectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\tif ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := ctx.Value(ContextAPIKey).(APIKey); ok {\n\t\t\tvar key string\n\t\t\tif auth.Prefix != \"\" {\n\t\t\t\tkey = auth.Prefix + \" \" + auth.Key\n\t\t\t} else {\n\t\t\t\tkey = auth.Key\n\t\t\t}\n\t\t\tlocalVarHeaderParams[\"x-api-key\"] = key\n\n\t\t}\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlocalVarHttpResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHttpResponse == nil {\n\t\treturn localVarHttpResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHttpResponse.Body)\n\tlocalVarHttpResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarHttpResponse, err\n\t}\n\n\tif localVarHttpResponse.StatusCode >= 300 {\n\t\tnewErr := GenericSwaggerError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHttpResponse.Status,\n\t\t}\n\t\treturn localVarHttpResponse, newErr\n\t}\n\n\treturn localVarHttpResponse, nil\n}", "title": "" }, { "docid": "ba3b494841d5cf88c2ff321b488cccba", "score": "0.5142875", "text": "func (client *DataCollectionRuleAssociationsClient) deleteCreateRequest(ctx context.Context, resourceURI string, associationName string, options *DataCollectionRuleAssociationsDeleteOptions) (*azcore.Request, error) {\n\turlPath := \"/{resourceUri}/providers/Microsoft.Insights/dataCollectionRuleAssociations/{associationName}\"\n\tif resourceURI == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceURI cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceUri}\", resourceURI)\n\tif associationName == \"\" {\n\t\treturn nil, errors.New(\"parameter associationName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{associationName}\", url.PathEscape(associationName))\n\treq, err := azcore.NewRequest(ctx, http.MethodDelete, azcore.JoinPaths(client.con.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.Telemetry(telemetryInfo)\n\treqQP := req.URL.Query()\n\treqQP.Set(\"api-version\", \"2021-04-01\")\n\treq.URL.RawQuery = reqQP.Encode()\n\treq.Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "title": "" }, { "docid": "8b03893f1c7e1013322e26d60312f101", "score": "0.5131193", "text": "func (c *Config) DeleteRule(rule *schema.Rule) {\n\tnftable := schema.Nftable{Delete: &schema.Objects{Rule: rule}}\n\tc.Nftables = append(c.Nftables, nftable)\n}", "title": "" }, { "docid": "282d9deb03ddc38f70e458b5ad64e00b", "score": "0.51304406", "text": "func ExampleClient_DeleteAuthorizationRule() {\n\tcred, err := azidentity.NewDefaultAzureCredential(nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to obtain a credential: %v\", err)\n\t}\n\tctx := context.Background()\n\tclient, err := armnotificationhubs.NewClient(\"29cfa613-cbbc-4512-b1d6-1b3a92c7fa40\", cred, nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to create client: %v\", err)\n\t}\n\t_, err = client.DeleteAuthorizationRule(ctx,\n\t\t\"5ktrial\",\n\t\t\"nh-sdk-ns\",\n\t\t\"nh-sdk-hub\",\n\t\t\"DefaultListenSharedAccessSignature\",\n\t\tnil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to finish the request: %v\", err)\n\t}\n}", "title": "" }, { "docid": "179b5bbdf26a438ac4d7312075259d4c", "score": "0.51194733", "text": "func (ctx *ContextInjector) DeleteTunnelEndpoint(w http.ResponseWriter, req *http.Request) {\n\tdecoder := json.NewDecoder(req.Body)\n\ttunnel := PortParam{-1}\n\terr := decoder.Decode(&tunnel)\n\tif err != nil || tunnel.Port < 0 {\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t} else {\n\t\tlog.Printf(\"Request to delete listener on Port %d\", tunnel.Port)\n\t\tok := GlobalPool.Delete(tunnel.Port)\n\t\tif ok {\n\t\t\t_, err := ctx.db.DeleteTunnel(&models.Tunnel{Port: tunnel.Port})\n\t\t\tif err != nil {\n\t\t\t\tlog.Print(err)\n\t\t\t}\n\t\t\tw.WriteHeader(http.StatusAccepted)\n\t\t} else {\n\t\t\tw.WriteHeader(http.StatusNotFound)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "2d4e41a70bb6036ac65eb751cfde6279", "score": "0.5111473", "text": "func (itr *ImmutableTagRuleAPI) Delete() {\n\tif itr.ID <= 0 {\n\t\titr.SendBadRequestError(fmt.Errorf(\"invalid immutable rule id %d\", itr.ID))\n\t\treturn\n\t}\n\terr := itr.ctr.DeleteImmutableRule(itr.ID)\n\tif err != nil {\n\t\titr.SendInternalServerError(err)\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "98fed8e8cabe31f8872030660d4034b6", "score": "0.50850546", "text": "func (client *NamespacesClient) deleteAuthorizationRuleCreateRequest(ctx context.Context, resourceGroupName string, namespaceName string, authorizationRuleName string, options *NamespacesDeleteAuthorizationRuleOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ServiceBus/namespaces/{namespaceName}/AuthorizationRules/{authorizationRuleName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif namespaceName == \"\" {\n\t\treturn nil, errors.New(\"parameter namespaceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{namespaceName}\", url.PathEscape(namespaceName))\n\tif authorizationRuleName == \"\" {\n\t\treturn nil, errors.New(\"parameter authorizationRuleName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{authorizationRuleName}\", url.PathEscape(authorizationRuleName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-06-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "title": "" }, { "docid": "06ab9ea33f227ff3fdcceb7247cf4f41", "score": "0.50847703", "text": "func (srv *FegToGwRelayServer) DeleteBearerRequest(\n\tctx context.Context,\n\treq *fegprotos.DeleteBearerRequestPgw,\n) (*orc8r_protos.Void, error) {\n\tif req == nil {\n\t\terr := fmt.Errorf(\"unable to send DeleteBearerPGW, request is nil: \")\n\t\tglog.Error(err)\n\t\treturn nil, err\n\t}\n\tteid := fmt.Sprint(req.CAgwTeid)\n\tclient, ctx, err := getS8ProxyResponderClient(ctx, teid)\n\tif err != nil {\n\t\terr = fmt.Errorf(\"unable to get S8ProxyResponderClient: %s\", err)\n\t\tglog.Error(err)\n\t\treturn nil, err\n\t}\n\treturn client.DeleteBearerRequest(ctx, req)\n}", "title": "" }, { "docid": "87aab183b672aa748c16150ca644c6fe", "score": "0.50828797", "text": "func (a *Client) ExportRuleDelete(params *ExportRuleDeleteParams, authInfo runtime.ClientAuthInfoWriter, opts ...ClientOption) (*ExportRuleDeleteOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewExportRuleDeleteParams()\n\t}\n\top := &runtime.ClientOperation{\n\t\tID: \"export_rule_delete\",\n\t\tMethod: \"DELETE\",\n\t\tPathPattern: \"/protocols/nfs/export-policies/{policy.id}/rules/{index}\",\n\t\tProducesMediaTypes: []string{\"application/hal+json\", \"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/hal+json\", \"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &ExportRuleDeleteReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t}\n\tfor _, opt := range opts {\n\t\topt(op)\n\t}\n\n\tresult, err := a.transport.Submit(op)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsuccess, ok := result.(*ExportRuleDeleteOK)\n\tif ok {\n\t\treturn success, nil\n\t}\n\t// unexpected success response\n\tunexpectedSuccess := result.(*ExportRuleDeleteDefault)\n\treturn nil, runtime.NewAPIError(\"unexpected success response: content available as default response in error\", unexpectedSuccess, unexpectedSuccess.Code())\n}", "title": "" }, { "docid": "6288e0c0a866e6ad096e735d45ca8b5f", "score": "0.5060863", "text": "func (ctrler CtrlDefReactor) OnFirewallProfileDelete(obj *FirewallProfile) error {\n\tlog.Info(\"OnFirewallProfileDelete is not implemented\")\n\treturn nil\n}", "title": "" }, { "docid": "24b125f8f395d390d8d3341605bd259c", "score": "0.5051778", "text": "func (rc *RuleController) handlePrometheusRuleDelete(obj interface{}) {\n\tvar pr *monv1.PrometheusRule\n\n\tif d, ok := obj.(cache.DeletedFinalStateUnknown); ok {\n\t\tpr, ok = d.Obj.(*monv1.PrometheusRule)\n\t\tif !ok {\n\t\t\treturn\n\t\t}\n\t} else {\n\t\tpr, ok = obj.(*monv1.PrometheusRule)\n\t\tif !ok {\n\t\t\treturn\n\t\t}\n\t}\n\n\towner := firstAlertingRuleOwner(pr.GetOwnerReferences())\n\n\tif owner == \"\" {\n\t\tklog.V(4).Infof(\"Ignoring PrometheusRule %q deletion with no AlertingRule owner\")\n\t\treturn\n\t}\n\n\tkey := fmt.Sprintf(\"%s/%s\", pr.Namespace, owner)\n\n\tklog.V(4).Infof(\"PrometheusRule %q deleted, queuing sync of AlertingRule: %s\",\n\t\tpr.Name, key)\n\n\trc.enqueue(key)\n}", "title": "" }, { "docid": "08ae0cc2622aa6b727e2efce4a5760ac", "score": "0.5046416", "text": "func (client *NamespacesClient) deleteAuthorizationRuleCreateRequest(ctx context.Context, resourceGroupName string, namespaceName string, authorizationRuleName string, options *NamespacesClientDeleteAuthorizationRuleOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.EventHub/namespaces/{namespaceName}/authorizationRules/{authorizationRuleName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif namespaceName == \"\" {\n\t\treturn nil, errors.New(\"parameter namespaceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{namespaceName}\", url.PathEscape(namespaceName))\n\tif authorizationRuleName == \"\" {\n\t\treturn nil, errors.New(\"parameter authorizationRuleName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{authorizationRuleName}\", url.PathEscape(authorizationRuleName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2017-04-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "title": "" }, { "docid": "29c7085f90f16c7f18f4c8d41a76e3a9", "score": "0.5020459", "text": "func (p *Proxy) Delete(req ResourceRequest) error {\n\tp.mu.RLock()\n\tdefer p.mu.RUnlock()\n\treturn p.impl.Delete(req)\n}", "title": "" }, { "docid": "7357d84680308df9fcd6a6dbb94dc786", "score": "0.5000554", "text": "func (cc *EVMForwardersController) Delete(c *gin.Context) {\n\tid, err := stringutils.ToInt32(c.Param(\"fwdID\"))\n\tif err != nil {\n\t\tjsonAPIError(c, http.StatusUnprocessableEntity, err)\n\t\treturn\n\t}\n\n\torm := forwarders.NewORM(cc.App.GetSqlxDB(), cc.App.GetLogger(), cc.App.GetConfig())\n\terr = orm.DeleteForwarder(id)\n\n\tif err != nil {\n\t\tjsonAPIError(c, http.StatusInternalServerError, err)\n\t\treturn\n\t}\n\n\tjsonAPIResponseWithStatus(c, nil, \"forwarder\", http.StatusNoContent)\n}", "title": "" }, { "docid": "32e5f5a9c8d4070a03647e019457906f", "score": "0.49906912", "text": "func (client *AlertRulesClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, ruleName string, options *AlertRulesDeleteOptions) (*azcore.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourcegroups/{resourceGroupName}/providers/Microsoft.Insights/alertrules/{ruleName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif ruleName == \"\" {\n\t\treturn nil, errors.New(\"parameter ruleName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{ruleName}\", url.PathEscape(ruleName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := azcore.NewRequest(ctx, http.MethodDelete, azcore.JoinPaths(client.con.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.Telemetry(telemetryInfo)\n\treqQP := req.URL.Query()\n\treqQP.Set(\"api-version\", \"2016-03-01\")\n\treq.URL.RawQuery = reqQP.Encode()\n\treq.Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "title": "" }, { "docid": "c9a8e054c2a0c8e7664d3f6aac69e957", "score": "0.4976057", "text": "func (m *MockTcpProxyClient) TcpProxyRuleDelete(ctx context.Context, in *TcpProxyRuleDeleteRequestMsg, opts ...grpc.CallOption) (*TcpProxyRuleDeleteResponseMsg, error) {\n\tvarargs := []interface{}{ctx, in}\n\tfor _, a := range opts {\n\t\tvarargs = append(varargs, a)\n\t}\n\tret := m.ctrl.Call(m, \"TcpProxyRuleDelete\", varargs...)\n\tret0, _ := ret[0].(*TcpProxyRuleDeleteResponseMsg)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "67504c75067d5daa1e130ecde5022637", "score": "0.49629456", "text": "func HandleDeleteEventingSecurityRule(adminMan *admin.Manager, syncMan *syncman.Manager) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\t// Get the JWT token from header\n\t\ttoken := utils.GetTokenFromHeader(r)\n\t\tdefer r.Body.Close()\n\n\t\t// Check if the request is authorised\n\t\tif err := adminMan.IsTokenValid(token); err != nil {\n\t\t\tlogrus.Errorf(\"Failed to validate token for delete eventing rules - %s\", err.Error())\n\t\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\t\tjson.NewEncoder(w).Encode(map[string]string{\"error\": err.Error()})\n\t\t\treturn\n\t\t}\n\t\tctx, cancel := context.WithTimeout(r.Context(), 10*time.Second)\n\t\tdefer cancel()\n\n\t\tvars := mux.Vars(r)\n\t\tprojectID := vars[\"project\"]\n\t\tevType := vars[\"type\"]\n\n\t\tif err := syncMan.SetDeleteEventingSecurityRules(ctx, projectID, evType); err != nil {\n\t\t\tlogrus.Errorf(\"Failed to delete eventing rules - %s\", err.Error())\n\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\tjson.NewEncoder(w).Encode(map[string]string{\"error\": err.Error()})\n\t\t\treturn\n\t\t}\n\n\t\tw.WriteHeader(http.StatusOK) //http status codee\n\t\tjson.NewEncoder(w).Encode(map[string]interface{}{})\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "c5287a1a3eefe850c37be99d5deeb214", "score": "0.49564764", "text": "func (tiflash *MockTiFlash) HandleDeletePlacementRule(group string, ruleID string) {\n\ttiflash.Lock()\n\tdefer tiflash.Unlock()\n\tdelete(tiflash.GlobalTiFlashPlacementRules, ruleID)\n}", "title": "" }, { "docid": "4c0f256200e2c1a62b5852cc9a65adfe", "score": "0.4951882", "text": "func (g *Group) DELETE(route string, fn http.HandlerFunc, middlewares ...MiddlewareFunc) {\n\tg.addRoute(\"DELETE\", route, fn, middlewares)\n}", "title": "" }, { "docid": "9b79c96f1b409a7328fe116b5cbc8d62", "score": "0.4943785", "text": "func (client *QueuesClient) deleteAuthorizationRuleCreateRequest(ctx context.Context, resourceGroupName string, namespaceName string, queueName string, authorizationRuleName string, options *QueuesClientDeleteAuthorizationRuleOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ServiceBus/namespaces/{namespaceName}/queues/{queueName}/authorizationRules/{authorizationRuleName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif namespaceName == \"\" {\n\t\treturn nil, errors.New(\"parameter namespaceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{namespaceName}\", url.PathEscape(namespaceName))\n\tif queueName == \"\" {\n\t\treturn nil, errors.New(\"parameter queueName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{queueName}\", url.PathEscape(queueName))\n\tif authorizationRuleName == \"\" {\n\t\treturn nil, errors.New(\"parameter authorizationRuleName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{authorizationRuleName}\", url.PathEscape(authorizationRuleName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-11-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "title": "" }, { "docid": "ed42b14905cb51062292f684096684d0", "score": "0.49376658", "text": "func (configHandler *ConfigHandlers) DeleteHostRulesHandler(\n\tparams config.DeleteHostRulesParams,\n\t_principal interface{},\n) middleware.Responder {\n\terr := configHandler.store.DeleteHostRules(params.Host)\n\tswitch err {\n\tcase nil:\n\t\treturn config.NewDeleteHostRulesNoContent()\n\tcase store.ErrNotFound:\n\t\treturn config.NewDeleteHostRulesNotFound()\n\tdefault:\n\t\treturn config.\n\t\t\tNewDeleteHostRulesInternalServerError().\n\t\t\tWithPayload(&models.ServerError{\n\t\t\t\tMessage: err.Error(),\n\t\t\t})\n\n\t}\n}", "title": "" }, { "docid": "7e5263c075726d6b7e2bf19c7a88e06e", "score": "0.49259204", "text": "func (ps *ProxyServer) DelForward(list string) error {\n\tcfg := NewListConfig(list, nil, nil)\n\treturn ps.DelForwardMap(cfg.Forwards)\n}", "title": "" }, { "docid": "857e7af99c9b2daeb18daec252dc7658", "score": "0.49097335", "text": "func (k *KubernetesBackend) HandleRequestDELETE(sc ot.SpanContext, newRequest services.LessonScheduleRequest) error {\n\tspan := ot.StartSpan(\"kubernetes_lsr_delete\", ot.ChildOf(sc))\n\tdefer span.Finish()\n\n\tnsName := services.NewUULLID(k.Config.InstanceID, newRequest.LiveLessonID).ToString()\n\terr := k.deleteNamespace(span.Context(), nsName)\n\tif err != nil {\n\t\tspan.LogFields(log.Error(err))\n\t\text.Error.Set(span, true)\n\t\treturn err\n\t}\n\n\t// Make sure to not return earlier than this, so we make sure the state is cleaned up\n\t// no matter what\n\t_ = k.Db.DeleteLiveLesson(span.Context(), newRequest.LiveLessonID)\n\n\treturn nil\n}", "title": "" }, { "docid": "91c3e64a67456f2d8fb6e05e6bde67d2", "score": "0.49032843", "text": "func (validator *Validator) DeleteNetwork(responseWriter http.ResponseWriter, request *http.Request) {\n admissionReview, err := DecodeAdmissionReview(request)\n if err != nil {\n SendErroneousAdmissionResponse(responseWriter, admissionReview.Request, err)\n return\n }\n oldManifest, err := getNetworkManifest(admissionReview.Request.OldObject.Raw)\n if err != nil {\n SendErroneousAdmissionResponse(responseWriter, admissionReview.Request, err)\n return\n }\n isAnyPodConnectedToNetwork, connectedEp, err := danmep.ArePodsConnectedToNetwork(validator.Client, oldManifest)\n if err != nil {\n SendErroneousAdmissionResponse(responseWriter, admissionReview.Request,\n errors.New(\"Network cannot be deleted because there is no way to tell if Pods are still using it due to:\" + err.Error()))\n return \n }\n if isAnyPodConnectedToNetwork {\n SendErroneousAdmissionResponse(responseWriter, admissionReview.Request,\n errors.New(\"Network cannot be deleted because there are Pods still connected to it e.g. Pod:\" + connectedEp.Spec.Pod + \" in namespace:\" + connectedEp.ObjectMeta.Namespace))\n return \n }\n if oldManifest.TypeMeta.Kind == \"TenantNetwork\" && IsTypeDynamic(oldManifest.Spec.NetworkType) {\n tconf, err := confman.GetTenantConfig(validator.Client)\n if err != nil {\n SendErroneousAdmissionResponse(responseWriter, admissionReview.Request,\n errors.New(\"The network's VNI could not be freed, because:\" + err.Error()))\n return\n }\n err = confman.Free(validator.Client, tconf, oldManifest)\n if err != nil {\n SendErroneousAdmissionResponse(responseWriter, admissionReview.Request,\n errors.New(\"The network's VNI could not be freed, because:\" + err.Error()))\n return\n }\n }\n responseAdmissionReview := v1beta1.AdmissionReview {\n Response: CreateReviewResponseFromPatches(nil),\n }\n responseAdmissionReview.Response.UID = admissionReview.Request.UID\n SendAdmissionResponse(responseWriter, responseAdmissionReview)\n}", "title": "" }, { "docid": "a74aaab775aa85f319e22d72a3c025a0", "score": "0.49020118", "text": "func (c *Client) DeleteTCPResponseRule(id int64, backend string, transactionID string, version int64) error {\n\tp, t, err := c.loadDataForChange(transactionID, version)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif err := p.Delete(parser.Backends, backend, \"tcp-response\", int(id)); err != nil {\n\t\treturn c.handleError(strconv.FormatInt(id, 10), \"backend\", backend, t, transactionID == \"\", err)\n\t}\n\n\tif err := c.saveData(p, t, transactionID == \"\"); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e7ab1c6836e7c3e27493351d5d7e515a", "score": "0.48955017", "text": "func (s *APIServer) deleteReverseTunnel(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {\n\tdomainName := p.ByName(\"domain\")\n\terr := auth.DeleteReverseTunnel(domainName)\n\tif err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\treturn message(fmt.Sprintf(\"reverse tunnel %v deleted\", domainName)), nil\n}", "title": "" }, { "docid": "034a60687b3b5c8cca3daad664cc1abb", "score": "0.48912388", "text": "func (plugin *Plugin) Del(args *cniSkel.CmdArgs) error {\n\t// Parse network configuration.\n\tnetConfig, err := config.New(args)\n\tif err != nil {\n\t\tlog.Errorf(\"Failed to parse netconfig from args: %v.\", err)\n\t\treturn err\n\t}\n\n\tlog.Infof(\"Executing DEL with netconfig: %+v.\", netConfig)\n\n\t// Search for the target network namespace.\n\tns, err := netns.GetNetNS(args.Netns)\n\tif err != nil {\n\t\tlog.Errorf(\"Failed to find netns %s: %v.\", args.Netns, err)\n\t\treturn err\n\t}\n\n\t// Delete IP rules in the target network namespace.\n\terr = ns.Run(func() error {\n\t\tfor _, proto := range netConfig.IPProtocols {\n\t\t\tif err = plugin.deleteNetfilterRules(proto, netConfig); err != nil {\n\t\t\t\tlog.Errorf(\"Failed to delete netfilter rules: %v.\", err)\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t\treturn nil\n\t})\n\treturn err\n}", "title": "" }, { "docid": "c069f1688dc0f0758c431c10c9d84708", "score": "0.48861733", "text": "func (a *Client) DeleteServerSwitchingRule(params *DeleteServerSwitchingRuleParams, authInfo runtime.ClientAuthInfoWriter) (*DeleteServerSwitchingRuleAccepted, *DeleteServerSwitchingRuleNoContent, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewDeleteServerSwitchingRuleParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"deleteServerSwitchingRule\",\n\t\tMethod: \"DELETE\",\n\t\tPathPattern: \"/services/haproxy/configuration/server_switching_rules/{index}\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"http\"},\n\t\tParams: params,\n\t\tReader: &DeleteServerSwitchingRuleReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tswitch value := result.(type) {\n\tcase *DeleteServerSwitchingRuleAccepted:\n\t\treturn value, nil, nil\n\tcase *DeleteServerSwitchingRuleNoContent:\n\t\treturn nil, value, nil\n\t}\n\t// unexpected success response\n\tunexpectedSuccess := result.(*DeleteServerSwitchingRuleDefault)\n\treturn nil, nil, runtime.NewAPIError(\"unexpected success response: content available as default response in error\", unexpectedSuccess, unexpectedSuccess.Code())\n}", "title": "" }, { "docid": "a9854839bafe906d76f47471cd5913e9", "score": "0.4870358", "text": "func (o *DeleteRoutingRuleParams) WithHTTPClient(client *http.Client) *DeleteRoutingRuleParams {\n\to.SetHTTPClient(client)\n\treturn o\n}", "title": "" }, { "docid": "5d51655e47bee23a49a0aef4dedde7ac", "score": "0.48697853", "text": "func (a *Client) DeletePacketAnalyzer(params *DeletePacketAnalyzerParams, opts ...ClientOption) (*DeletePacketAnalyzerNoContent, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewDeletePacketAnalyzerParams()\n\t}\n\top := &runtime.ClientOperation{\n\t\tID: \"DeletePacketAnalyzer\",\n\t\tMethod: \"DELETE\",\n\t\tPathPattern: \"/packet/analyzers/{id}\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"http\", \"https\"},\n\t\tParams: params,\n\t\tReader: &DeletePacketAnalyzerReader{formats: a.formats},\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t}\n\tfor _, opt := range opts {\n\t\topt(op)\n\t}\n\n\tresult, err := a.transport.Submit(op)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsuccess, ok := result.(*DeletePacketAnalyzerNoContent)\n\tif ok {\n\t\treturn success, nil\n\t}\n\t// unexpected success response\n\t// safeguard: normally, absent a default response, unknown success responses return an error above: so this is a codegen issue\n\tmsg := fmt.Sprintf(\"unexpected success response for DeletePacketAnalyzer: API contract not enforced by server. Client expected to get an error, but got: %T\", result)\n\tpanic(msg)\n}", "title": "" }, { "docid": "46c0da0db534af327598ad14d1a0878f", "score": "0.4858338", "text": "func ProtoToForwardingRule(p *computepb.ComputeForwardingRule) *compute.ForwardingRule {\n\tobj := &compute.ForwardingRule{\n\t\tAllPorts: dcl.Bool(p.GetAllPorts()),\n\t\tAllowGlobalAccess: dcl.Bool(p.GetAllowGlobalAccess()),\n\t\tLabelFingerprint: dcl.StringOrNil(p.GetLabelFingerprint()),\n\t\tBackendService: dcl.StringOrNil(p.GetBackendService()),\n\t\tCreationTimestamp: dcl.StringOrNil(p.GetCreationTimestamp()),\n\t\tDescription: dcl.StringOrNil(p.GetDescription()),\n\t\tIPAddress: dcl.StringOrNil(p.GetIpAddress()),\n\t\tIPProtocol: ProtoToComputeForwardingRuleIPProtocolEnum(p.GetIpProtocol()),\n\t\tIPVersion: ProtoToComputeForwardingRuleIPVersionEnum(p.GetIpVersion()),\n\t\tIsMirroringCollector: dcl.Bool(p.GetIsMirroringCollector()),\n\t\tLoadBalancingScheme: ProtoToComputeForwardingRuleLoadBalancingSchemeEnum(p.GetLoadBalancingScheme()),\n\t\tName: dcl.StringOrNil(p.GetName()),\n\t\tNetwork: dcl.StringOrNil(p.GetNetwork()),\n\t\tNetworkTier: ProtoToComputeForwardingRuleNetworkTierEnum(p.GetNetworkTier()),\n\t\tPortRange: dcl.StringOrNil(p.GetPortRange()),\n\t\tRegion: dcl.StringOrNil(p.GetRegion()),\n\t\tSelfLink: dcl.StringOrNil(p.GetSelfLink()),\n\t\tServiceLabel: dcl.StringOrNil(p.GetServiceLabel()),\n\t\tServiceName: dcl.StringOrNil(p.GetServiceName()),\n\t\tSubnetwork: dcl.StringOrNil(p.GetSubnetwork()),\n\t\tTarget: dcl.StringOrNil(p.GetTarget()),\n\t\tProject: dcl.StringOrNil(p.GetProject()),\n\t\tLocation: dcl.StringOrNil(p.GetLocation()),\n\t\tPscConnectionId: dcl.StringOrNil(p.GetPscConnectionId()),\n\t\tPscConnectionStatus: ProtoToComputeForwardingRulePscConnectionStatusEnum(p.GetPscConnectionStatus()),\n\t\tBaseForwardingRule: dcl.StringOrNil(p.GetBaseForwardingRule()),\n\t}\n\tfor _, r := range p.GetMetadataFilter() {\n\t\tobj.MetadataFilter = append(obj.MetadataFilter, *ProtoToComputeForwardingRuleMetadataFilter(r))\n\t}\n\tfor _, r := range p.GetPorts() {\n\t\tobj.Ports = append(obj.Ports, r)\n\t}\n\tfor _, r := range p.GetServiceDirectoryRegistrations() {\n\t\tobj.ServiceDirectoryRegistrations = append(obj.ServiceDirectoryRegistrations, *ProtoToComputeForwardingRuleServiceDirectoryRegistrations(r))\n\t}\n\tfor _, r := range p.GetSourceIpRanges() {\n\t\tobj.SourceIPRanges = append(obj.SourceIPRanges, r)\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "ac24294ae506c19a40ac0e3d66cecb48", "score": "0.48464265", "text": "func (client *SmartDetectorAlertRulesClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, alertRuleName string, options *SmartDetectorAlertRulesDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/microsoft.alertsManagement/smartDetectorAlertRules/{alertRuleName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif alertRuleName == \"\" {\n\t\treturn nil, errors.New(\"parameter alertRuleName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{alertRuleName}\", url.PathEscape(alertRuleName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2019-06-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "title": "" }, { "docid": "9450e2fb3178f3bf9f66e4e7b210c4e8", "score": "0.48396227", "text": "func (g *Goal) delete(rType reflect.Type, request *http.Request) (int, interface{}, error) {\n\t// Get assumes url requests always has \"id\" parameters\n\tvars := mux.Vars(request)\n\n\t// Retrieve id parameter, if error return 400 HTTP error code\n\tid, exists := vars[\"id\"]\n\tif !exists {\n\t\terr := errors.New(\"id is required\")\n\t\treturn 400, nil, err\n\t}\n\n\tresource := newObjectWithType(rType)\n\n\t// Retrieve from database\n\terr := g.db.Where(\"id = ?\", id).First(resource).Error\n\tif err != nil {\n\t\treturn 500, nil, err\n\t}\n\n\t// Check permission\n\terr = g.CanPerform(resource, request, false)\n\tif err != nil {\n\t\treturn 403, nil, err\n\t}\n\n\t// Delete record, if failed show 500 error code\n\terr = g.db.Delete(resource).Error\n\tif err != nil {\n\t\treturn 500, nil, err\n\t}\n\n\treturn 200, nil, nil\n}", "title": "" }, { "docid": "f68f48135e784ae19a5b171864d3c7e8", "score": "0.4828795", "text": "func (c *Client) DeleteRuleGroup(namespace string, groupName string) error {\n\t// Create HTTP request\n\treq, err := http.NewRequest(\"DELETE\", fmt.Sprintf(\"http://%s/api/prom/rules/%s/%s\", c.rulerAddress, url.PathEscape(namespace), url.PathEscape(groupName)), nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treq.Header.Set(\"Content-Type\", \"application/yaml\")\n\treq.Header.Set(\"X-Scope-OrgID\", c.orgID)\n\n\tctx, cancel := context.WithTimeout(context.Background(), c.timeout)\n\tdefer cancel()\n\n\t// Execute HTTP request\n\tres, err := c.httpClient.Do(req.WithContext(ctx))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdefer res.Body.Close()\n\treturn nil\n}", "title": "" }, { "docid": "bf51c19579ef3c7f9492c76064a75b90", "score": "0.4827432", "text": "func (c *regionNetworkFirewallPoliciesRESTClient) RemoveRule(ctx context.Context, req *computepb.RemoveRuleRegionNetworkFirewallPolicyRequest, opts ...gax.CallOption) (*Operation, error) {\n\tbaseUrl, err := url.Parse(c.endpoint)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbaseUrl.Path += fmt.Sprintf(\"/compute/v1/projects/%v/regions/%v/firewallPolicies/%v/removeRule\", req.GetProject(), req.GetRegion(), req.GetFirewallPolicy())\n\n\tparams := url.Values{}\n\tif req != nil && req.Priority != nil {\n\t\tparams.Add(\"priority\", fmt.Sprintf(\"%v\", req.GetPriority()))\n\t}\n\tif req != nil && req.RequestId != nil {\n\t\tparams.Add(\"requestId\", fmt.Sprintf(\"%v\", req.GetRequestId()))\n\t}\n\n\tbaseUrl.RawQuery = params.Encode()\n\n\t// Build HTTP headers from client and context metadata.\n\thds := []string{\"x-goog-request-params\", fmt.Sprintf(\"%s=%v&%s=%v&%s=%v\", \"project\", url.QueryEscape(req.GetProject()), \"region\", url.QueryEscape(req.GetRegion()), \"firewall_policy\", url.QueryEscape(req.GetFirewallPolicy()))}\n\n\thds = append(c.xGoogHeaders, hds...)\n\thds = append(hds, \"Content-Type\", \"application/json\")\n\theaders := gax.BuildHeaders(ctx, hds...)\n\topts = append((*c.CallOptions).RemoveRule[0:len((*c.CallOptions).RemoveRule):len((*c.CallOptions).RemoveRule)], opts...)\n\tunm := protojson.UnmarshalOptions{AllowPartial: true, DiscardUnknown: true}\n\tresp := &computepb.Operation{}\n\te := gax.Invoke(ctx, func(ctx context.Context, settings gax.CallSettings) error {\n\t\tif settings.Path != \"\" {\n\t\t\tbaseUrl.Path = settings.Path\n\t\t}\n\t\thttpReq, err := http.NewRequest(\"POST\", baseUrl.String(), nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\thttpReq = httpReq.WithContext(ctx)\n\t\thttpReq.Header = headers\n\n\t\thttpRsp, err := c.httpClient.Do(httpReq)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdefer httpRsp.Body.Close()\n\n\t\tif err = googleapi.CheckResponse(httpRsp); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tbuf, err := io.ReadAll(httpRsp.Body)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif err := unm.Unmarshal(buf, resp); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\treturn nil\n\t}, opts...)\n\tif e != nil {\n\t\treturn nil, e\n\t}\n\top := &Operation{\n\t\t&regionOperationsHandle{\n\t\t\tc: c.operationClient,\n\t\t\tproto: resp,\n\t\t\tproject: req.GetProject(),\n\t\t\tregion: req.GetRegion(),\n\t\t},\n\t}\n\treturn op, nil\n}", "title": "" }, { "docid": "7ff2baae5ea7ec093a905ead827db65e", "score": "0.48256546", "text": "func (ac *Client) DeleteFlow(flowTemplateID, flowID string) error {\n\n\treq, err := http.NewRequest(\"DELETE\", fmt.Sprintf(\"%s/api/v1/flow-templates/%s/flows/%s\", ac.APIHost, flowTemplateID, flowID), nil)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"[DeleteFlow] Failed to create DELETE request\")\n\t}\n\treq.Header.Add(\"predix-zone-id\", ac.TenantID)\n\treq.Header.Add(\"authorization\", ac.Token)\n\treq.Header.Add(\"content-type\", \"application/json\")\n\tac.dumpRequest(req)\n\n\t// Execute request\n\tres, err := http.DefaultClient.Do(req)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"[DeleteFlow] Failed to execute DELETE request\")\n\t}\n\tdefer res.Body.Close()\n\tac.dumpResponse(res)\n\n\tif res.StatusCode != 204 {\n\t\tbody, err := ioutil.ReadAll(res.Body)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, fmt.Sprintf(\"[DeleteFlow] Delete failed, and the response body could not be read. Status code: %d\", res.StatusCode))\n\t\t}\n\t\treturn fmt.Errorf(\"[DeleteFlow] Delete returned %d. Body: %s\", res.StatusCode, string(body))\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "b735bca74f1b7ae18d4cfe6f9824439d", "score": "0.48253945", "text": "func (a *Client) DeleteTCPResponseRule(params *DeleteTCPResponseRuleParams, authInfo runtime.ClientAuthInfoWriter) (*DeleteTCPResponseRuleAccepted, *DeleteTCPResponseRuleNoContent, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewDeleteTCPResponseRuleParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"deleteTCPResponseRule\",\n\t\tMethod: \"DELETE\",\n\t\tPathPattern: \"/services/haproxy/configuration/tcp_response_rules/{index}\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"http\"},\n\t\tParams: params,\n\t\tReader: &DeleteTCPResponseRuleReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tswitch value := result.(type) {\n\tcase *DeleteTCPResponseRuleAccepted:\n\t\treturn value, nil, nil\n\tcase *DeleteTCPResponseRuleNoContent:\n\t\treturn nil, value, nil\n\t}\n\t// unexpected success response\n\tunexpectedSuccess := result.(*DeleteTCPResponseRuleDefault)\n\treturn nil, nil, runtime.NewAPIError(\"unexpected success response: content available as default response in error\", unexpectedSuccess, unexpectedSuccess.Code())\n}", "title": "" }, { "docid": "a9b71cd1c545cbf522291b858f9a0a29", "score": "0.480528", "text": "func (gp *EpgPolicy) DelRule(rule *contivModel.Rule) error {\n\t// check if the rule exists\n\truleMap := gp.RuleMaps[rule.Key]\n\tif ruleMap == nil {\n\t\treturn core.Errorf(\"Rule does not exists\")\n\t}\n\n\t// Delete each ofnet rule under this policy rule\n\tfor _, ofnetRule := range ruleMap.OfnetRules {\n\t\tlog.Infof(\"Deleting rule {%+v} from policyDB\", ofnetRule)\n\n\t\t// Delete the rule from policyDB\n\t\terr := ofnetMaster.DelRule(ofnetRule)\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"Error deleting the ofnet rule {%+v}. Err: %v\", ofnetRule, err)\n\t\t}\n\t}\n\n\t// delete the cache\n\tdelete(gp.RuleMaps, rule.Key)\n\n\treturn nil\n}", "title": "" }, { "docid": "d8022c36867ce38b1ee74fab0ef1cd33", "score": "0.48034874", "text": "func (r *RuleRepository) DeleteFlagRule(ctx context.Context, flagIDHex, idHex string) error {\n\tspan, ctx := opentracing.StartSpanFromContext(ctx, \"MongoRuleRepository.DeleteFlagRule\")\n\tdefer span.Finish()\n\n\tflagID, err := primitive.ObjectIDFromHex(flagIDHex)\n\tif err != nil {\n\t\treturn err\n\t}\n\tid, err := primitive.ObjectIDFromHex(idHex)\n\tif err != nil {\n\t\treturn err\n\t}\n\tres, err := r.flagRepo.col.UpdateOne(ctx, bson.M{\"_id\": flagID}, bson.M{\n\t\t\"$pull\": bson.M{\"rules\": bson.M{\"_id\": id}},\n\t\t\"$set\": bson.M{\"updatedAt\": time.Now()},\n\t\t\"$inc\": bson.M{\"version\": 1},\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\tif res.ModifiedCount == 0 {\n\t\treturn errors.NotFound(\"flag rule\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "22a8bca09253b406ee275c41bd29753d", "score": "0.47948688", "text": "func (ah *AdmissionHook) admitDelete(req *admissionv1beta1.AdmissionRequest) *admissionv1beta1.AdmissionResponse {\n\tresp := &admissionv1beta1.AdmissionResponse{}\n\tresp.UID = req.UID\n\trequestName := fmt.Sprintf(\"%s %s/%s\", req.Kind, req.Namespace, req.Name)\n\n\tpod, err := ah.client.CoreV1().Pods(req.Namespace).Get(req.Name, metav1.GetOptions{})\n\tif err != nil {\n\t\treturn errorResponse(resp, \"Failed to obtain Pod: %v\", err)\n\t}\n\n\tglog.V(2).Infof(\"Processing %s request for %s\", req.Operation, requestName)\n\n\tglog.V(6).Infof(\"Input for %s: %s\", requestName, string(req.Object.Raw))\n\n\tannotations := pod.ObjectMeta.GetAnnotations()\n\tnetworksSpecAnnotation, networksSpecAnnotationFound := annotations[networksSpecAnnotationName]\n\tif !networksSpecAnnotationFound {\n\t\tglog.V(2).Infof(\"Skipping %s request for %s: Required annotation not present.\", req.Operation, requestName)\n\t\tresp.Allowed = true\n\t\treturn resp\n\t}\n\n\tnetworksSpec := spec.NetworksSpec{}\n\terr = json.Unmarshal([]byte(networksSpecAnnotation), &networksSpec)\n\tif err != nil {\n\t\treturn errorResponse(resp, \"Failed to read networksSpec: %v\", err)\n\t}\n\tglog.V(2).Infof(\"Network spec for request %s: %s\", requestName, networksSpecAnnotation)\n\n\tfor _, spec := range networksSpec {\n\t\terr := ah.providerClient.DeleteNetworkPort(spec.PortID)\n\t\tif err != nil {\n\t\t\treturn errorResponse(resp, \"Error creating port: %v\", err)\n\t\t}\n\t}\n\tglog.V(2).Infof(\"Successfully created ports for request %s\", requestName)\n\n\tresp.Allowed = true\n\treturn resp\n}", "title": "" }, { "docid": "10f9e27b82264cd4b1213d65d217f11e", "score": "0.47883737", "text": "func (a *DefaultApiService) DeleteAnalysisArchiveRule(ctx _context.Context, ruleId string) (AnalysisArchiveTransitionRule, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodDelete\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue AnalysisArchiveTransitionRule\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/archives/rules/{ruleId}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"ruleId\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", ruleId)), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 200 {\n\t\t\tvar v AnalysisArchiveTransitionRule\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 500 {\n\t\t\tvar v ApiErrorResponse\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "8c27525ffeaf2e6248e9572ab08c73f9", "score": "0.47863293", "text": "func (a *RouteApiService) DeleteRoute(ctx _context.Context, localVarOptionals *DeleteRouteOpts) (DeleteRouteResponse, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue DeleteRouteResponse\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/DeleteRoute\"\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\t// body params\n\tif localVarOptionals != nil && localVarOptionals.DeleteRouteRequest.IsSet() {\n\t\tlocalVarOptionalDeleteRouteRequest, localVarOptionalDeleteRouteRequestok := localVarOptionals.DeleteRouteRequest.Value().(DeleteRouteRequest)\n\t\tif !localVarOptionalDeleteRouteRequestok {\n\t\t\treturn localVarReturnValue, nil, reportError(\"deleteRouteRequest should be DeleteRouteRequest\")\n\t\t}\n\t\tlocalVarPostBody = &localVarOptionalDeleteRouteRequest\n\t}\n\n\tif ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := ctx.Value(ContextAPIKey).(APIKey); ok {\n\t\t\tvar key string\n\t\t\tif auth.Prefix != \"\" {\n\t\t\t\tkey = auth.Prefix + \" \" + auth.Key\n\t\t\t} else {\n\t\t\t\tkey = auth.Key\n\t\t\t}\n\t\t\tlocalVarHeaderParams[\"Authorization\"] = key\n\t\t}\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 200 {\n\t\t\tvar v DeleteRouteResponse\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v ErrorResponse\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v ErrorResponse\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 500 {\n\t\t\tvar v ErrorResponse\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "fa52d820630ff6175bc3c2022f4c3f9f", "score": "0.47768587", "text": "func (c *Client) DeleteRuleNamespace(namespace string) error {\n\t// Create HTTP request\n\treq, err := http.NewRequest(\"DELETE\", fmt.Sprintf(\"http://%s/api/prom/rules/%s\", c.rulerAddress, url.PathEscape(namespace)), nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treq.Header.Set(\"X-Scope-OrgID\", c.orgID)\n\n\tctx, cancel := context.WithTimeout(context.Background(), c.timeout)\n\tdefer cancel()\n\n\t// Execute HTTP request\n\t_, err = c.httpClient.Do(req.WithContext(ctx))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "b15d1f88e5c81b6bc0bb60f75edb29b2", "score": "0.47767904", "text": "func (e *Etcd) DeleteNotifFormatRule(name string) error {\n\terr := e.del(fmt.Sprintf(\"/kwet/notifier/rules/%s\", name))\n\tif err != nil {\n\t\treturn fmt.Errorf(\"%s\", err)\n\t}\n\treturn nil\n}", "title": "" } ]
9b22cb09f0ad8dbaad95dbb200b48b56
The &39;capability.FexManufacturingDef&39; resource to update.
[ { "docid": "600b039714361e66c83cf686135fc76d", "score": "0.7376157", "text": "func (r ApiPatchCapabilityFexManufacturingDefRequest) CapabilityFexManufacturingDef(capabilityFexManufacturingDef CapabilityFexManufacturingDef) ApiPatchCapabilityFexManufacturingDefRequest {\n\tr.capabilityFexManufacturingDef = &capabilityFexManufacturingDef\n\treturn r\n}", "title": "" } ]
[ { "docid": "be97513028ca433b218387a626e7c131", "score": "0.78846544", "text": "func (a *CapabilityApiService) UpdateCapabilityFexManufacturingDef(ctx context.Context, moid string) ApiUpdateCapabilityFexManufacturingDefRequest {\n\treturn ApiUpdateCapabilityFexManufacturingDefRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "3b392eae8b685e0a21a5d73033684ea4", "score": "0.76996696", "text": "func (r ApiUpdateCapabilityFexManufacturingDefRequest) CapabilityFexManufacturingDef(capabilityFexManufacturingDef CapabilityFexManufacturingDef) ApiUpdateCapabilityFexManufacturingDefRequest {\n\tr.capabilityFexManufacturingDef = &capabilityFexManufacturingDef\n\treturn r\n}", "title": "" }, { "docid": "b344a3f447ba114e5ba3de9b185f50bf", "score": "0.732391", "text": "func (a *CapabilityApiService) PatchCapabilityFexManufacturingDef(ctx context.Context, moid string) ApiPatchCapabilityFexManufacturingDefRequest {\n\treturn ApiPatchCapabilityFexManufacturingDefRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "4556747db99af3d6685aac4aef959fd4", "score": "0.73129016", "text": "func (r ApiCreateCapabilityFexManufacturingDefRequest) CapabilityFexManufacturingDef(capabilityFexManufacturingDef CapabilityFexManufacturingDef) ApiCreateCapabilityFexManufacturingDefRequest {\n\tr.capabilityFexManufacturingDef = &capabilityFexManufacturingDef\n\treturn r\n}", "title": "" }, { "docid": "52d7d66484f425958cdaf4d10623a650", "score": "0.6813753", "text": "func (a *CapabilityApiService) GetCapabilityFexManufacturingDefList(ctx context.Context) ApiGetCapabilityFexManufacturingDefListRequest {\n\treturn ApiGetCapabilityFexManufacturingDefListRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t}\n}", "title": "" }, { "docid": "ab613e0bde860969667a374ef154622b", "score": "0.6725104", "text": "func (a *CapabilityApiService) UpdateCapabilityFexManufacturingDefExecute(r ApiUpdateCapabilityFexManufacturingDefRequest) (*CapabilityFexManufacturingDef, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tformFiles []formFile\n\t\tlocalVarReturnValue *CapabilityFexManufacturingDef\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"CapabilityApiService.UpdateCapabilityFexManufacturingDef\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, &GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/api/v1/capability/FexManufacturingDefs/{Moid}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"Moid\"+\"}\", url.PathEscape(parameterToString(r.moid, \"\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\tif r.capabilityFexManufacturingDef == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"capabilityFexManufacturingDef is required and must be specified\")\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\", \"application/json-patch+json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.ifMatch != nil {\n\t\tlocalVarHeaderParams[\"If-Match\"] = parameterToString(*r.ifMatch, \"\")\n\t}\n\t// body params\n\tlocalVarPostBody = r.capabilityFexManufacturingDef\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, formFiles)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 403 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tvar v Error\n\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\tnewErr.error = err.Error()\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tnewErr.model = v\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "6945e4c5a12e293f3e1b1f8efd0147d1", "score": "0.6683555", "text": "func (a *CapabilityApiService) GetCapabilityFexManufacturingDefByMoid(ctx context.Context, moid string) ApiGetCapabilityFexManufacturingDefByMoidRequest {\n\treturn ApiGetCapabilityFexManufacturingDefByMoidRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "758cb5a0f2077fed091ff8fbf7d2c6b9", "score": "0.6560749", "text": "func (a *CapabilityApiService) PatchCapabilityFexManufacturingDefExecute(r ApiPatchCapabilityFexManufacturingDefRequest) (*CapabilityFexManufacturingDef, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodPatch\n\t\tlocalVarPostBody interface{}\n\t\tformFiles []formFile\n\t\tlocalVarReturnValue *CapabilityFexManufacturingDef\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"CapabilityApiService.PatchCapabilityFexManufacturingDef\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, &GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/api/v1/capability/FexManufacturingDefs/{Moid}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"Moid\"+\"}\", url.PathEscape(parameterToString(r.moid, \"\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\tif r.capabilityFexManufacturingDef == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"capabilityFexManufacturingDef is required and must be specified\")\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\", \"application/json-patch+json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.ifMatch != nil {\n\t\tlocalVarHeaderParams[\"If-Match\"] = parameterToString(*r.ifMatch, \"\")\n\t}\n\t// body params\n\tlocalVarPostBody = r.capabilityFexManufacturingDef\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, formFiles)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 403 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tvar v Error\n\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\tnewErr.error = err.Error()\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tnewErr.model = v\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "6de0471ed4e024eb44e2e34100ddc5b7", "score": "0.65399617", "text": "func (a *CapabilityApiService) UpdateCapabilityFanModuleManufacturingDef(ctx context.Context, moid string) ApiUpdateCapabilityFanModuleManufacturingDefRequest {\n\treturn ApiUpdateCapabilityFanModuleManufacturingDefRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "c127b20a7ad6079dad174c43b0d0557f", "score": "0.64277375", "text": "func (a *CapabilityApiService) CreateCapabilityFexManufacturingDef(ctx context.Context) ApiCreateCapabilityFexManufacturingDefRequest {\n\treturn ApiCreateCapabilityFexManufacturingDefRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t}\n}", "title": "" }, { "docid": "b902fab05b2e71cfd0ed03ac4c80f48a", "score": "0.64014333", "text": "func (r ApiUpdateCapabilitySiocModuleManufacturingDefRequest) CapabilitySiocModuleManufacturingDef(capabilitySiocModuleManufacturingDef CapabilitySiocModuleManufacturingDef) ApiUpdateCapabilitySiocModuleManufacturingDefRequest {\n\tr.capabilitySiocModuleManufacturingDef = &capabilitySiocModuleManufacturingDef\n\treturn r\n}", "title": "" }, { "docid": "981ac0332bdf899cffde9a87b34d1f30", "score": "0.63574135", "text": "func (a *CapabilityApiService) UpdateCapabilityIoCardManufacturingDef(ctx context.Context, moid string) ApiUpdateCapabilityIoCardManufacturingDefRequest {\n\treturn ApiUpdateCapabilityIoCardManufacturingDefRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "bfb7332ec54d186befe161b2d2992f6b", "score": "0.6336734", "text": "func (a *CapabilityApiService) UpdateCapabilitySiocModuleManufacturingDef(ctx context.Context, moid string) ApiUpdateCapabilitySiocModuleManufacturingDefRequest {\n\treturn ApiUpdateCapabilitySiocModuleManufacturingDefRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "b8f179ea19c14a4b5104f1ab8b446e3d", "score": "0.6262683", "text": "func (a *CapabilityApiService) UpdateCapabilityChassisManufacturingDef(ctx context.Context, moid string) ApiUpdateCapabilityChassisManufacturingDefRequest {\n\treturn ApiUpdateCapabilityChassisManufacturingDefRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "f4971b308845b004e808ce00c6bce93e", "score": "0.62160546", "text": "func (a *CapabilityApiService) UpdateCapabilityPsuManufacturingDef(ctx context.Context, moid string) ApiUpdateCapabilityPsuManufacturingDefRequest {\n\treturn ApiUpdateCapabilityPsuManufacturingDefRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "c16220631c448f5187ba317f4b167f74", "score": "0.6184317", "text": "func (r ApiPatchCapabilitySiocModuleManufacturingDefRequest) CapabilitySiocModuleManufacturingDef(capabilitySiocModuleManufacturingDef CapabilitySiocModuleManufacturingDef) ApiPatchCapabilitySiocModuleManufacturingDefRequest {\n\tr.capabilitySiocModuleManufacturingDef = &capabilitySiocModuleManufacturingDef\n\treturn r\n}", "title": "" }, { "docid": "260ddd0a171e4977018546b22ba9521d", "score": "0.61494565", "text": "func (r ApiUpdateCapabilityPsuManufacturingDefRequest) CapabilityPsuManufacturingDef(capabilityPsuManufacturingDef CapabilityPsuManufacturingDef) ApiUpdateCapabilityPsuManufacturingDefRequest {\n\tr.capabilityPsuManufacturingDef = &capabilityPsuManufacturingDef\n\treturn r\n}", "title": "" }, { "docid": "a1a8ef2052241f0dc92b94842ff6f298", "score": "0.6143202", "text": "func (a *CapabilityApiService) PatchCapabilityFanModuleManufacturingDef(ctx context.Context, moid string) ApiPatchCapabilityFanModuleManufacturingDefRequest {\n\treturn ApiPatchCapabilityFanModuleManufacturingDefRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "bcc6b19dd123f34ca60426ddd5fe1fa4", "score": "0.60931164", "text": "func (r ApiUpdateCapabilityIoCardManufacturingDefRequest) CapabilityIoCardManufacturingDef(capabilityIoCardManufacturingDef CapabilityIoCardManufacturingDef) ApiUpdateCapabilityIoCardManufacturingDefRequest {\n\tr.capabilityIoCardManufacturingDef = &capabilityIoCardManufacturingDef\n\treturn r\n}", "title": "" }, { "docid": "834339f66675dfee59256ec1e2809d61", "score": "0.6021587", "text": "func (a *CapabilityApiService) UpdateCapabilityFexCapabilityDef(ctx context.Context, moid string) ApiUpdateCapabilityFexCapabilityDefRequest {\n\treturn ApiUpdateCapabilityFexCapabilityDefRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "6fa0b79f83ff68768459c4e965461285", "score": "0.601481", "text": "func (a *CapabilityApiService) CreateCapabilityFexManufacturingDefExecute(r ApiCreateCapabilityFexManufacturingDefRequest) (*CapabilityFexManufacturingDef, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tformFiles []formFile\n\t\tlocalVarReturnValue *CapabilityFexManufacturingDef\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"CapabilityApiService.CreateCapabilityFexManufacturingDef\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, &GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/api/v1/capability/FexManufacturingDefs\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\tif r.capabilityFexManufacturingDef == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"capabilityFexManufacturingDef is required and must be specified\")\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.ifMatch != nil {\n\t\tlocalVarHeaderParams[\"If-Match\"] = parameterToString(*r.ifMatch, \"\")\n\t}\n\tif r.ifNoneMatch != nil {\n\t\tlocalVarHeaderParams[\"If-None-Match\"] = parameterToString(*r.ifNoneMatch, \"\")\n\t}\n\t// body params\n\tlocalVarPostBody = r.capabilityFexManufacturingDef\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, formFiles)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 403 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tvar v Error\n\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\tnewErr.error = err.Error()\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tnewErr.model = v\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "f91326d175b5cb2bafa43a9528f15950", "score": "0.601377", "text": "func (a *CapabilityApiService) DeleteCapabilityFexManufacturingDef(ctx context.Context, moid string) ApiDeleteCapabilityFexManufacturingDefRequest {\n\treturn ApiDeleteCapabilityFexManufacturingDefRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "7dbd68bbe855eebb1c9a558420aaea55", "score": "0.59899473", "text": "func (r ApiUpdateCapabilityFanModuleManufacturingDefRequest) CapabilityFanModuleManufacturingDef(capabilityFanModuleManufacturingDef CapabilityFanModuleManufacturingDef) ApiUpdateCapabilityFanModuleManufacturingDefRequest {\n\tr.capabilityFanModuleManufacturingDef = &capabilityFanModuleManufacturingDef\n\treturn r\n}", "title": "" }, { "docid": "d941146e3f74d8eaa6a113faa8b76b2d", "score": "0.5977579", "text": "func (a *CapabilityApiService) UpdateCapabilitySwitchManufacturingDef(ctx context.Context, moid string) ApiUpdateCapabilitySwitchManufacturingDefRequest {\n\treturn ApiUpdateCapabilitySwitchManufacturingDefRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "38216513c923ebeb34f03295697bd072", "score": "0.5939502", "text": "func (a *CapabilityApiService) UpdateCapabilityFanModuleManufacturingDefExecute(r ApiUpdateCapabilityFanModuleManufacturingDefRequest) (*CapabilityFanModuleManufacturingDef, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tformFiles []formFile\n\t\tlocalVarReturnValue *CapabilityFanModuleManufacturingDef\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"CapabilityApiService.UpdateCapabilityFanModuleManufacturingDef\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, &GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/api/v1/capability/FanModuleManufacturingDefs/{Moid}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"Moid\"+\"}\", url.PathEscape(parameterToString(r.moid, \"\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\tif r.capabilityFanModuleManufacturingDef == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"capabilityFanModuleManufacturingDef is required and must be specified\")\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\", \"application/json-patch+json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.ifMatch != nil {\n\t\tlocalVarHeaderParams[\"If-Match\"] = parameterToString(*r.ifMatch, \"\")\n\t}\n\t// body params\n\tlocalVarPostBody = r.capabilityFanModuleManufacturingDef\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, formFiles)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 403 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tvar v Error\n\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\tnewErr.error = err.Error()\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tnewErr.model = v\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "5fee6ea1f3c8a97ac188e568c28b3afc", "score": "0.59225607", "text": "func (a *CapabilityApiService) PatchCapabilityChassisManufacturingDef(ctx context.Context, moid string) ApiPatchCapabilityChassisManufacturingDefRequest {\n\treturn ApiPatchCapabilityChassisManufacturingDefRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "708aa84cb623e88da7186b11b38d7057", "score": "0.59024304", "text": "func (r ApiUpdateCapabilityFexCapabilityDefRequest) CapabilityFexCapabilityDef(capabilityFexCapabilityDef CapabilityFexCapabilityDef) ApiUpdateCapabilityFexCapabilityDefRequest {\n\tr.capabilityFexCapabilityDef = &capabilityFexCapabilityDef\n\treturn r\n}", "title": "" }, { "docid": "40831bb30d275d0c2a3a864ca1ed2658", "score": "0.5886512", "text": "func (a *CapabilityApiService) UpdateCapabilityIoCardManufacturingDefExecute(r ApiUpdateCapabilityIoCardManufacturingDefRequest) (*CapabilityIoCardManufacturingDef, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tformFiles []formFile\n\t\tlocalVarReturnValue *CapabilityIoCardManufacturingDef\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"CapabilityApiService.UpdateCapabilityIoCardManufacturingDef\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, &GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/api/v1/capability/IoCardManufacturingDefs/{Moid}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"Moid\"+\"}\", url.PathEscape(parameterToString(r.moid, \"\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\tif r.capabilityIoCardManufacturingDef == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"capabilityIoCardManufacturingDef is required and must be specified\")\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\", \"application/json-patch+json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.ifMatch != nil {\n\t\tlocalVarHeaderParams[\"If-Match\"] = parameterToString(*r.ifMatch, \"\")\n\t}\n\t// body params\n\tlocalVarPostBody = r.capabilityIoCardManufacturingDef\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, formFiles)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 403 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tvar v Error\n\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\tnewErr.error = err.Error()\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tnewErr.model = v\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "1da72c1830f6477ac737fa1b34be885b", "score": "0.5861299", "text": "func (r ApiUpdateCapabilityChassisManufacturingDefRequest) CapabilityChassisManufacturingDef(capabilityChassisManufacturingDef CapabilityChassisManufacturingDef) ApiUpdateCapabilityChassisManufacturingDefRequest {\n\tr.capabilityChassisManufacturingDef = &capabilityChassisManufacturingDef\n\treturn r\n}", "title": "" }, { "docid": "7e2194776944bf64b6cdbe21797b35e8", "score": "0.58525616", "text": "func (r ApiCreateCapabilitySiocModuleManufacturingDefRequest) CapabilitySiocModuleManufacturingDef(capabilitySiocModuleManufacturingDef CapabilitySiocModuleManufacturingDef) ApiCreateCapabilitySiocModuleManufacturingDefRequest {\n\tr.capabilitySiocModuleManufacturingDef = &capabilitySiocModuleManufacturingDef\n\treturn r\n}", "title": "" }, { "docid": "8a4df4a9de571341a6b8b75a635cd03d", "score": "0.58501726", "text": "func (a *CapabilityApiService) PatchCapabilityIoCardManufacturingDef(ctx context.Context, moid string) ApiPatchCapabilityIoCardManufacturingDefRequest {\n\treturn ApiPatchCapabilityIoCardManufacturingDefRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "eb813f8ffe11258dcdd0e79860b32614", "score": "0.5818587", "text": "func (a *CapabilityApiService) PatchCapabilityFanModuleManufacturingDefExecute(r ApiPatchCapabilityFanModuleManufacturingDefRequest) (*CapabilityFanModuleManufacturingDef, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodPatch\n\t\tlocalVarPostBody interface{}\n\t\tformFiles []formFile\n\t\tlocalVarReturnValue *CapabilityFanModuleManufacturingDef\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"CapabilityApiService.PatchCapabilityFanModuleManufacturingDef\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, &GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/api/v1/capability/FanModuleManufacturingDefs/{Moid}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"Moid\"+\"}\", url.PathEscape(parameterToString(r.moid, \"\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\tif r.capabilityFanModuleManufacturingDef == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"capabilityFanModuleManufacturingDef is required and must be specified\")\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\", \"application/json-patch+json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.ifMatch != nil {\n\t\tlocalVarHeaderParams[\"If-Match\"] = parameterToString(*r.ifMatch, \"\")\n\t}\n\t// body params\n\tlocalVarPostBody = r.capabilityFanModuleManufacturingDef\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, formFiles)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 403 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tvar v Error\n\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\tnewErr.error = err.Error()\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tnewErr.model = v\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "0738aedd7a4d73f4c16aab599b09459b", "score": "0.58133197", "text": "func (r ApiPatchCapabilityPsuManufacturingDefRequest) CapabilityPsuManufacturingDef(capabilityPsuManufacturingDef CapabilityPsuManufacturingDef) ApiPatchCapabilityPsuManufacturingDefRequest {\n\tr.capabilityPsuManufacturingDef = &capabilityPsuManufacturingDef\n\treturn r\n}", "title": "" }, { "docid": "3bc4f7527800a845621a79ef37af4c51", "score": "0.58024645", "text": "func (r ApiPatchCapabilityIoCardManufacturingDefRequest) CapabilityIoCardManufacturingDef(capabilityIoCardManufacturingDef CapabilityIoCardManufacturingDef) ApiPatchCapabilityIoCardManufacturingDefRequest {\n\tr.capabilityIoCardManufacturingDef = &capabilityIoCardManufacturingDef\n\treturn r\n}", "title": "" }, { "docid": "03e61fd5b6c1ee0efd8bf18792d2e155", "score": "0.57997245", "text": "func (r ApiUpdateCapabilitySwitchManufacturingDefRequest) CapabilitySwitchManufacturingDef(capabilitySwitchManufacturingDef CapabilitySwitchManufacturingDef) ApiUpdateCapabilitySwitchManufacturingDefRequest {\n\tr.capabilitySwitchManufacturingDef = &capabilitySwitchManufacturingDef\n\treturn r\n}", "title": "" }, { "docid": "c552a253a08026c049fcae2ee46908f7", "score": "0.57971704", "text": "func (a *CapabilityApiService) PatchCapabilitySiocModuleManufacturingDef(ctx context.Context, moid string) ApiPatchCapabilitySiocModuleManufacturingDefRequest {\n\treturn ApiPatchCapabilitySiocModuleManufacturingDefRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "28dc99f2237f83df8e6df2be40b9b9a7", "score": "0.5741171", "text": "func (r ApiPatchCapabilityFanModuleManufacturingDefRequest) CapabilityFanModuleManufacturingDef(capabilityFanModuleManufacturingDef CapabilityFanModuleManufacturingDef) ApiPatchCapabilityFanModuleManufacturingDefRequest {\n\tr.capabilityFanModuleManufacturingDef = &capabilityFanModuleManufacturingDef\n\treturn r\n}", "title": "" }, { "docid": "fee9828e5a8a36c63e816c06e7642110", "score": "0.57409465", "text": "func (a *CapabilityApiService) GetCapabilityIoCardManufacturingDefList(ctx context.Context) ApiGetCapabilityIoCardManufacturingDefListRequest {\n\treturn ApiGetCapabilityIoCardManufacturingDefListRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t}\n}", "title": "" }, { "docid": "71371c9afe3e053aeddf216feb43f9ed", "score": "0.5740566", "text": "func (a *CapabilityApiService) GetCapabilityFexManufacturingDefListExecute(r ApiGetCapabilityFexManufacturingDefListRequest) (*CapabilityFexManufacturingDefResponse, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tformFiles []formFile\n\t\tlocalVarReturnValue *CapabilityFexManufacturingDefResponse\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"CapabilityApiService.GetCapabilityFexManufacturingDefList\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, &GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/api/v1/capability/FexManufacturingDefs\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\tif r.filter != nil {\n\t\tlocalVarQueryParams.Add(\"$filter\", parameterToString(*r.filter, \"\"))\n\t}\n\tif r.orderby != nil {\n\t\tlocalVarQueryParams.Add(\"$orderby\", parameterToString(*r.orderby, \"\"))\n\t}\n\tif r.top != nil {\n\t\tlocalVarQueryParams.Add(\"$top\", parameterToString(*r.top, \"\"))\n\t}\n\tif r.skip != nil {\n\t\tlocalVarQueryParams.Add(\"$skip\", parameterToString(*r.skip, \"\"))\n\t}\n\tif r.select_ != nil {\n\t\tlocalVarQueryParams.Add(\"$select\", parameterToString(*r.select_, \"\"))\n\t}\n\tif r.expand != nil {\n\t\tlocalVarQueryParams.Add(\"$expand\", parameterToString(*r.expand, \"\"))\n\t}\n\tif r.apply != nil {\n\t\tlocalVarQueryParams.Add(\"$apply\", parameterToString(*r.apply, \"\"))\n\t}\n\tif r.count != nil {\n\t\tlocalVarQueryParams.Add(\"$count\", parameterToString(*r.count, \"\"))\n\t}\n\tif r.inlinecount != nil {\n\t\tlocalVarQueryParams.Add(\"$inlinecount\", parameterToString(*r.inlinecount, \"\"))\n\t}\n\tif r.at != nil {\n\t\tlocalVarQueryParams.Add(\"at\", parameterToString(*r.at, \"\"))\n\t}\n\tif r.tags != nil {\n\t\tlocalVarQueryParams.Add(\"tags\", parameterToString(*r.tags, \"\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\", \"text/csv\", \"application/vnd.openxmlformats-officedocument.spreadsheetml.sheet\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, formFiles)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 403 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tvar v Error\n\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\tnewErr.error = err.Error()\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tnewErr.model = v\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "3bdd656806504ef9493e824a26eaa2cb", "score": "0.5736386", "text": "func (a *CapabilityApiService) PatchCapabilityIoCardManufacturingDefExecute(r ApiPatchCapabilityIoCardManufacturingDefRequest) (*CapabilityIoCardManufacturingDef, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodPatch\n\t\tlocalVarPostBody interface{}\n\t\tformFiles []formFile\n\t\tlocalVarReturnValue *CapabilityIoCardManufacturingDef\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"CapabilityApiService.PatchCapabilityIoCardManufacturingDef\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, &GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/api/v1/capability/IoCardManufacturingDefs/{Moid}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"Moid\"+\"}\", url.PathEscape(parameterToString(r.moid, \"\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\tif r.capabilityIoCardManufacturingDef == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"capabilityIoCardManufacturingDef is required and must be specified\")\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\", \"application/json-patch+json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.ifMatch != nil {\n\t\tlocalVarHeaderParams[\"If-Match\"] = parameterToString(*r.ifMatch, \"\")\n\t}\n\t// body params\n\tlocalVarPostBody = r.capabilityIoCardManufacturingDef\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, formFiles)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 403 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tvar v Error\n\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\tnewErr.error = err.Error()\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tnewErr.model = v\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "ffdf5af0315ff868f006f4c7cd1c0e30", "score": "0.5720582", "text": "func (a *CapabilityApiService) UpdateCapabilityPsuManufacturingDefExecute(r ApiUpdateCapabilityPsuManufacturingDefRequest) (*CapabilityPsuManufacturingDef, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tformFiles []formFile\n\t\tlocalVarReturnValue *CapabilityPsuManufacturingDef\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"CapabilityApiService.UpdateCapabilityPsuManufacturingDef\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, &GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/api/v1/capability/PsuManufacturingDefs/{Moid}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"Moid\"+\"}\", url.PathEscape(parameterToString(r.moid, \"\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\tif r.capabilityPsuManufacturingDef == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"capabilityPsuManufacturingDef is required and must be specified\")\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\", \"application/json-patch+json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.ifMatch != nil {\n\t\tlocalVarHeaderParams[\"If-Match\"] = parameterToString(*r.ifMatch, \"\")\n\t}\n\t// body params\n\tlocalVarPostBody = r.capabilityPsuManufacturingDef\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, formFiles)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 403 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tvar v Error\n\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\tnewErr.error = err.Error()\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tnewErr.model = v\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "6d78b470043b29607b386a034e667662", "score": "0.57163525", "text": "func (r ApiCreateCapabilityIoCardManufacturingDefRequest) CapabilityIoCardManufacturingDef(capabilityIoCardManufacturingDef CapabilityIoCardManufacturingDef) ApiCreateCapabilityIoCardManufacturingDefRequest {\n\tr.capabilityIoCardManufacturingDef = &capabilityIoCardManufacturingDef\n\treturn r\n}", "title": "" }, { "docid": "33862e14fcd4bcd31a688f2fb10d0161", "score": "0.5677869", "text": "func (a *CapabilityApiService) UpdateCapabilityChassisManufacturingDefExecute(r ApiUpdateCapabilityChassisManufacturingDefRequest) (*CapabilityChassisManufacturingDef, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tformFiles []formFile\n\t\tlocalVarReturnValue *CapabilityChassisManufacturingDef\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"CapabilityApiService.UpdateCapabilityChassisManufacturingDef\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, &GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/api/v1/capability/ChassisManufacturingDefs/{Moid}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"Moid\"+\"}\", url.PathEscape(parameterToString(r.moid, \"\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\tif r.capabilityChassisManufacturingDef == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"capabilityChassisManufacturingDef is required and must be specified\")\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\", \"application/json-patch+json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.ifMatch != nil {\n\t\tlocalVarHeaderParams[\"If-Match\"] = parameterToString(*r.ifMatch, \"\")\n\t}\n\t// body params\n\tlocalVarPostBody = r.capabilityChassisManufacturingDef\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, formFiles)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 403 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tvar v Error\n\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\tnewErr.error = err.Error()\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tnewErr.model = v\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "5446c9e3354f8505e2449853103ebe39", "score": "0.56772506", "text": "func (a *CapabilityApiService) PatchCapabilityPsuManufacturingDef(ctx context.Context, moid string) ApiPatchCapabilityPsuManufacturingDefRequest {\n\treturn ApiPatchCapabilityPsuManufacturingDefRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "30ff3b4f790fc47406015ff66d3b8909", "score": "0.5650727", "text": "func (a *CapabilityApiService) GetCapabilityFexManufacturingDefByMoidExecute(r ApiGetCapabilityFexManufacturingDefByMoidRequest) (*CapabilityFexManufacturingDef, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tformFiles []formFile\n\t\tlocalVarReturnValue *CapabilityFexManufacturingDef\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"CapabilityApiService.GetCapabilityFexManufacturingDefByMoid\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, &GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/api/v1/capability/FexManufacturingDefs/{Moid}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"Moid\"+\"}\", url.PathEscape(parameterToString(r.moid, \"\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\", \"text/csv\", \"application/vnd.openxmlformats-officedocument.spreadsheetml.sheet\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, formFiles)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 403 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tvar v Error\n\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\tnewErr.error = err.Error()\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tnewErr.model = v\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "af2c4a2cd9560c2b057f5cc1a9f23ca4", "score": "0.56486595", "text": "func (a *CapabilityApiService) UpdateCapabilitySwitchManufacturingDefExecute(r ApiUpdateCapabilitySwitchManufacturingDefRequest) (*CapabilitySwitchManufacturingDef, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tformFiles []formFile\n\t\tlocalVarReturnValue *CapabilitySwitchManufacturingDef\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"CapabilityApiService.UpdateCapabilitySwitchManufacturingDef\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, &GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/api/v1/capability/SwitchManufacturingDefs/{Moid}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"Moid\"+\"}\", url.PathEscape(parameterToString(r.moid, \"\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\tif r.capabilitySwitchManufacturingDef == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"capabilitySwitchManufacturingDef is required and must be specified\")\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\", \"application/json-patch+json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.ifMatch != nil {\n\t\tlocalVarHeaderParams[\"If-Match\"] = parameterToString(*r.ifMatch, \"\")\n\t}\n\t// body params\n\tlocalVarPostBody = r.capabilitySwitchManufacturingDef\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, formFiles)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 403 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tvar v Error\n\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\tnewErr.error = err.Error()\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tnewErr.model = v\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "0458b21a1bad1ae5de7f29677bc0628c", "score": "0.5648533", "text": "func (a *CapabilityApiService) GetCapabilityFanModuleManufacturingDefList(ctx context.Context) ApiGetCapabilityFanModuleManufacturingDefListRequest {\n\treturn ApiGetCapabilityFanModuleManufacturingDefListRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t}\n}", "title": "" }, { "docid": "0db26e31f9c86bfaa53078a2dcbbb19a", "score": "0.56398654", "text": "func (a *CapabilityApiService) PatchCapabilityChassisManufacturingDefExecute(r ApiPatchCapabilityChassisManufacturingDefRequest) (*CapabilityChassisManufacturingDef, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodPatch\n\t\tlocalVarPostBody interface{}\n\t\tformFiles []formFile\n\t\tlocalVarReturnValue *CapabilityChassisManufacturingDef\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"CapabilityApiService.PatchCapabilityChassisManufacturingDef\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, &GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/api/v1/capability/ChassisManufacturingDefs/{Moid}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"Moid\"+\"}\", url.PathEscape(parameterToString(r.moid, \"\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\tif r.capabilityChassisManufacturingDef == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"capabilityChassisManufacturingDef is required and must be specified\")\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\", \"application/json-patch+json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.ifMatch != nil {\n\t\tlocalVarHeaderParams[\"If-Match\"] = parameterToString(*r.ifMatch, \"\")\n\t}\n\t// body params\n\tlocalVarPostBody = r.capabilityChassisManufacturingDef\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, formFiles)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 403 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tvar v Error\n\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\tnewErr.error = err.Error()\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tnewErr.model = v\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "487dd862dfeca08d13a362cffbe81f9f", "score": "0.56387454", "text": "func (r ApiPatchCapabilityChassisManufacturingDefRequest) CapabilityChassisManufacturingDef(capabilityChassisManufacturingDef CapabilityChassisManufacturingDef) ApiPatchCapabilityChassisManufacturingDefRequest {\n\tr.capabilityChassisManufacturingDef = &capabilityChassisManufacturingDef\n\treturn r\n}", "title": "" }, { "docid": "e4ae751aa1dd42092412b9fb6cec9160", "score": "0.56026584", "text": "func (a *CapabilityApiService) PatchCapabilityPsuManufacturingDefExecute(r ApiPatchCapabilityPsuManufacturingDefRequest) (*CapabilityPsuManufacturingDef, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodPatch\n\t\tlocalVarPostBody interface{}\n\t\tformFiles []formFile\n\t\tlocalVarReturnValue *CapabilityPsuManufacturingDef\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"CapabilityApiService.PatchCapabilityPsuManufacturingDef\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, &GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/api/v1/capability/PsuManufacturingDefs/{Moid}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"Moid\"+\"}\", url.PathEscape(parameterToString(r.moid, \"\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\tif r.capabilityPsuManufacturingDef == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"capabilityPsuManufacturingDef is required and must be specified\")\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\", \"application/json-patch+json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.ifMatch != nil {\n\t\tlocalVarHeaderParams[\"If-Match\"] = parameterToString(*r.ifMatch, \"\")\n\t}\n\t// body params\n\tlocalVarPostBody = r.capabilityPsuManufacturingDef\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, formFiles)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 403 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tvar v Error\n\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\tnewErr.error = err.Error()\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tnewErr.model = v\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "01a00fa366d3bc5858e719885bc33718", "score": "0.5590918", "text": "func (a *CapabilityApiService) DeleteCapabilityFexManufacturingDefExecute(r ApiDeleteCapabilityFexManufacturingDefRequest) (*http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodDelete\n\t\tlocalVarPostBody interface{}\n\t\tformFiles []formFile\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"CapabilityApiService.DeleteCapabilityFexManufacturingDef\")\n\tif err != nil {\n\t\treturn nil, &GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/api/v1/capability/FexManufacturingDefs/{Moid}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"Moid\"+\"}\", url.PathEscape(parameterToString(r.moid, \"\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, formFiles)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 403 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarHTTPResponse, newErr\n\t\t}\n\t\tvar v Error\n\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\tnewErr.error = err.Error()\n\t\t\treturn localVarHTTPResponse, newErr\n\t\t}\n\t\tnewErr.model = v\n\t\treturn localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "c66bc49269df3e6c4accefebb86edf05", "score": "0.55884534", "text": "func (r ApiPatchCapabilityFexCapabilityDefRequest) CapabilityFexCapabilityDef(capabilityFexCapabilityDef CapabilityFexCapabilityDef) ApiPatchCapabilityFexCapabilityDefRequest {\n\tr.capabilityFexCapabilityDef = &capabilityFexCapabilityDef\n\treturn r\n}", "title": "" }, { "docid": "bb25f8620ba7c958d9265d6f12df499b", "score": "0.55760616", "text": "func (a *CapabilityApiService) UpdateCapabilitySiocModuleManufacturingDefExecute(r ApiUpdateCapabilitySiocModuleManufacturingDefRequest) (*CapabilitySiocModuleManufacturingDef, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tformFiles []formFile\n\t\tlocalVarReturnValue *CapabilitySiocModuleManufacturingDef\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"CapabilityApiService.UpdateCapabilitySiocModuleManufacturingDef\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, &GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/api/v1/capability/SiocModuleManufacturingDefs/{Moid}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"Moid\"+\"}\", url.PathEscape(parameterToString(r.moid, \"\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\tif r.capabilitySiocModuleManufacturingDef == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"capabilitySiocModuleManufacturingDef is required and must be specified\")\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\", \"application/json-patch+json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.ifMatch != nil {\n\t\tlocalVarHeaderParams[\"If-Match\"] = parameterToString(*r.ifMatch, \"\")\n\t}\n\t// body params\n\tlocalVarPostBody = r.capabilitySiocModuleManufacturingDef\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, formFiles)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 403 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tvar v Error\n\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\tnewErr.error = err.Error()\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tnewErr.model = v\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "1e5738dd0991717d6abdaf758e1ae925", "score": "0.55757856", "text": "func (r ApiCreateCapabilityFexCapabilityDefRequest) CapabilityFexCapabilityDef(capabilityFexCapabilityDef CapabilityFexCapabilityDef) ApiCreateCapabilityFexCapabilityDefRequest {\n\tr.capabilityFexCapabilityDef = &capabilityFexCapabilityDef\n\treturn r\n}", "title": "" }, { "docid": "92ccff5d8fb451a6e5774dded20df6da", "score": "0.5570938", "text": "func (r ApiCreateCapabilityPsuManufacturingDefRequest) CapabilityPsuManufacturingDef(capabilityPsuManufacturingDef CapabilityPsuManufacturingDef) ApiCreateCapabilityPsuManufacturingDefRequest {\n\tr.capabilityPsuManufacturingDef = &capabilityPsuManufacturingDef\n\treturn r\n}", "title": "" }, { "docid": "5a7e9ba1aaa8fc8f3bd0dc433962150e", "score": "0.5567327", "text": "func (a *CapabilityApiService) GetCapabilitySiocModuleManufacturingDefList(ctx context.Context) ApiGetCapabilitySiocModuleManufacturingDefListRequest {\n\treturn ApiGetCapabilitySiocModuleManufacturingDefListRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t}\n}", "title": "" }, { "docid": "25f85b6b7f2be0d3ad6df9025460efeb", "score": "0.5555527", "text": "func (a *CapabilityApiService) PatchCapabilitySwitchManufacturingDef(ctx context.Context, moid string) ApiPatchCapabilitySwitchManufacturingDefRequest {\n\treturn ApiPatchCapabilitySwitchManufacturingDefRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "fddf3fb9d8adfd05ae092b5bbcf92486", "score": "0.55438215", "text": "func (r ApiCreateCapabilityFanModuleManufacturingDefRequest) CapabilityFanModuleManufacturingDef(capabilityFanModuleManufacturingDef CapabilityFanModuleManufacturingDef) ApiCreateCapabilityFanModuleManufacturingDefRequest {\n\tr.capabilityFanModuleManufacturingDef = &capabilityFanModuleManufacturingDef\n\treturn r\n}", "title": "" }, { "docid": "1d1fd116b42e6d022889296d2d45b899", "score": "0.5541966", "text": "func (a *CapabilityApiService) GetCapabilityChassisManufacturingDefList(ctx context.Context) ApiGetCapabilityChassisManufacturingDefListRequest {\n\treturn ApiGetCapabilityChassisManufacturingDefListRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t}\n}", "title": "" }, { "docid": "606d3748c50cad362a02601db0e316a1", "score": "0.5529359", "text": "func (a *CapabilityApiService) GetCapabilityFanModuleManufacturingDefByMoid(ctx context.Context, moid string) ApiGetCapabilityFanModuleManufacturingDefByMoidRequest {\n\treturn ApiGetCapabilityFanModuleManufacturingDefByMoidRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "dc526dbb3b3033c7fb77f602e8ad8dd4", "score": "0.5528975", "text": "func (a *CapabilityApiService) UpdateCapabilityFexCapabilityDefExecute(r ApiUpdateCapabilityFexCapabilityDefRequest) (*CapabilityFexCapabilityDef, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tformFiles []formFile\n\t\tlocalVarReturnValue *CapabilityFexCapabilityDef\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"CapabilityApiService.UpdateCapabilityFexCapabilityDef\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, &GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/api/v1/capability/FexCapabilityDefs/{Moid}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"Moid\"+\"}\", url.PathEscape(parameterToString(r.moid, \"\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\tif r.capabilityFexCapabilityDef == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"capabilityFexCapabilityDef is required and must be specified\")\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\", \"application/json-patch+json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.ifMatch != nil {\n\t\tlocalVarHeaderParams[\"If-Match\"] = parameterToString(*r.ifMatch, \"\")\n\t}\n\t// body params\n\tlocalVarPostBody = r.capabilityFexCapabilityDef\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, formFiles)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 403 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tvar v Error\n\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\tnewErr.error = err.Error()\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tnewErr.model = v\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "370aac9f38dd0825432a85996bf5bab4", "score": "0.5518499", "text": "func (a *CapabilityApiService) PatchCapabilitySwitchManufacturingDefExecute(r ApiPatchCapabilitySwitchManufacturingDefRequest) (*CapabilitySwitchManufacturingDef, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodPatch\n\t\tlocalVarPostBody interface{}\n\t\tformFiles []formFile\n\t\tlocalVarReturnValue *CapabilitySwitchManufacturingDef\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"CapabilityApiService.PatchCapabilitySwitchManufacturingDef\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, &GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/api/v1/capability/SwitchManufacturingDefs/{Moid}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"Moid\"+\"}\", url.PathEscape(parameterToString(r.moid, \"\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\tif r.capabilitySwitchManufacturingDef == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"capabilitySwitchManufacturingDef is required and must be specified\")\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\", \"application/json-patch+json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.ifMatch != nil {\n\t\tlocalVarHeaderParams[\"If-Match\"] = parameterToString(*r.ifMatch, \"\")\n\t}\n\t// body params\n\tlocalVarPostBody = r.capabilitySwitchManufacturingDef\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, formFiles)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 403 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tvar v Error\n\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\tnewErr.error = err.Error()\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tnewErr.model = v\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "cd2df5bcfa672369cefe523679be69ff", "score": "0.5497937", "text": "func (a *CapabilityApiService) PatchCapabilityFexCapabilityDef(ctx context.Context, moid string) ApiPatchCapabilityFexCapabilityDefRequest {\n\treturn ApiPatchCapabilityFexCapabilityDefRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "7af4677ec959bf35430ea1c37dbc1fc1", "score": "0.5480364", "text": "func (a *CapabilityApiService) GetCapabilityPsuManufacturingDefList(ctx context.Context) ApiGetCapabilityPsuManufacturingDefListRequest {\n\treturn ApiGetCapabilityPsuManufacturingDefListRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t}\n}", "title": "" }, { "docid": "5fc9d93838a8e582c41235b61c97918f", "score": "0.54763705", "text": "func (r ApiPatchCapabilitySwitchManufacturingDefRequest) CapabilitySwitchManufacturingDef(capabilitySwitchManufacturingDef CapabilitySwitchManufacturingDef) ApiPatchCapabilitySwitchManufacturingDefRequest {\n\tr.capabilitySwitchManufacturingDef = &capabilitySwitchManufacturingDef\n\treturn r\n}", "title": "" }, { "docid": "31e5b5c767c284a49b6bf00cbe1d9c5b", "score": "0.5453446", "text": "func (a *CapabilityApiService) PatchCapabilitySiocModuleManufacturingDefExecute(r ApiPatchCapabilitySiocModuleManufacturingDefRequest) (*CapabilitySiocModuleManufacturingDef, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodPatch\n\t\tlocalVarPostBody interface{}\n\t\tformFiles []formFile\n\t\tlocalVarReturnValue *CapabilitySiocModuleManufacturingDef\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"CapabilityApiService.PatchCapabilitySiocModuleManufacturingDef\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, &GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/api/v1/capability/SiocModuleManufacturingDefs/{Moid}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"Moid\"+\"}\", url.PathEscape(parameterToString(r.moid, \"\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\tif r.capabilitySiocModuleManufacturingDef == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"capabilitySiocModuleManufacturingDef is required and must be specified\")\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\", \"application/json-patch+json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.ifMatch != nil {\n\t\tlocalVarHeaderParams[\"If-Match\"] = parameterToString(*r.ifMatch, \"\")\n\t}\n\t// body params\n\tlocalVarPostBody = r.capabilitySiocModuleManufacturingDef\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, formFiles)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 403 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tvar v Error\n\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\tnewErr.error = err.Error()\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tnewErr.model = v\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "5cf25bdad63ee91326c80152b0eb6d5d", "score": "0.5440988", "text": "func (a *CapabilityApiService) GetCapabilityChassisManufacturingDefByMoid(ctx context.Context, moid string) ApiGetCapabilityChassisManufacturingDefByMoidRequest {\n\treturn ApiGetCapabilityChassisManufacturingDefByMoidRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "59e135e8d5c6ad9084c9cea32d07394c", "score": "0.54305273", "text": "func (a *EquipmentApiService) UpdateEquipmentFex(ctx context.Context, moid string) ApiUpdateEquipmentFexRequest {\n\treturn ApiUpdateEquipmentFexRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "3d42e9a8b0fcd84118c2696d5449d993", "score": "0.54274505", "text": "func (r ApiUpdateEquipmentFexRequest) EquipmentFex(equipmentFex EquipmentFex) ApiUpdateEquipmentFexRequest {\n\tr.equipmentFex = &equipmentFex\n\treturn r\n}", "title": "" }, { "docid": "4f398793a8c7f74a88a0918d14b39629", "score": "0.54234993", "text": "func (a *CapabilityApiService) UpdateCapabilityEquipmentPhysicalDef(ctx context.Context, moid string) ApiUpdateCapabilityEquipmentPhysicalDefRequest {\n\treturn ApiUpdateCapabilityEquipmentPhysicalDefRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "6fc45053b1cad3f3118af8564c714d2d", "score": "0.54154855", "text": "func (a *CapabilityApiService) GetCapabilitySwitchManufacturingDefList(ctx context.Context) ApiGetCapabilitySwitchManufacturingDefListRequest {\n\treturn ApiGetCapabilitySwitchManufacturingDefListRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t}\n}", "title": "" }, { "docid": "a97691b7f47fc4a86d5fde0c7c92a6a0", "score": "0.5406315", "text": "func (r ApiGetCapabilityFexManufacturingDefListRequest) Apply(apply string) ApiGetCapabilityFexManufacturingDefListRequest {\n\tr.apply = &apply\n\treturn r\n}", "title": "" }, { "docid": "dde57c1d40374b6f5cd23cfa56a41b7a", "score": "0.53966516", "text": "func (r ApiCreateCapabilityChassisManufacturingDefRequest) CapabilityChassisManufacturingDef(capabilityChassisManufacturingDef CapabilityChassisManufacturingDef) ApiCreateCapabilityChassisManufacturingDefRequest {\n\tr.capabilityChassisManufacturingDef = &capabilityChassisManufacturingDef\n\treturn r\n}", "title": "" }, { "docid": "cd42e3690d7cf18bd9b8b5ec73175e0e", "score": "0.5380784", "text": "func (a *CapabilityApiService) GetCapabilityPsuManufacturingDefByMoid(ctx context.Context, moid string) ApiGetCapabilityPsuManufacturingDefByMoidRequest {\n\treturn ApiGetCapabilityPsuManufacturingDefByMoidRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "948426d5ce8b39d57e12ec15e57a1ed7", "score": "0.53800493", "text": "func (a *CapabilityApiService) GetCapabilityIoCardManufacturingDefByMoid(ctx context.Context, moid string) ApiGetCapabilityIoCardManufacturingDefByMoidRequest {\n\treturn ApiGetCapabilityIoCardManufacturingDefByMoidRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "03762c48e4fac47cf9b55319242b303b", "score": "0.53702134", "text": "func (r ApiCreateCapabilitySwitchManufacturingDefRequest) CapabilitySwitchManufacturingDef(capabilitySwitchManufacturingDef CapabilitySwitchManufacturingDef) ApiCreateCapabilitySwitchManufacturingDefRequest {\n\tr.capabilitySwitchManufacturingDef = &capabilitySwitchManufacturingDef\n\treturn r\n}", "title": "" }, { "docid": "d66514faacd372a78c3cde07e2e2c438", "score": "0.5338747", "text": "func (a *CapabilityApiService) UpdateCapabilityFexDescriptor(ctx context.Context, moid string) ApiUpdateCapabilityFexDescriptorRequest {\n\treturn ApiUpdateCapabilityFexDescriptorRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "895b49eb4c7ef2ec67cdeee333a94a8f", "score": "0.53378737", "text": "func (a *CapabilityApiService) GetCapabilitySiocModuleManufacturingDefByMoid(ctx context.Context, moid string) ApiGetCapabilitySiocModuleManufacturingDefByMoidRequest {\n\treturn ApiGetCapabilitySiocModuleManufacturingDefByMoidRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "c54ab77ae4316f64e4a5a3b7231c8130", "score": "0.53272915", "text": "func (r ApiPatchEquipmentFexRequest) EquipmentFex(equipmentFex EquipmentFex) ApiPatchEquipmentFexRequest {\n\tr.equipmentFex = &equipmentFex\n\treturn r\n}", "title": "" }, { "docid": "71fb7a22963d926182965f56ff8f8caf", "score": "0.5301816", "text": "func (a *CapabilityApiService) UpdateCapabilityFexDescriptorExecute(r ApiUpdateCapabilityFexDescriptorRequest) (*CapabilityFexDescriptor, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tformFiles []formFile\n\t\tlocalVarReturnValue *CapabilityFexDescriptor\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"CapabilityApiService.UpdateCapabilityFexDescriptor\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, &GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/api/v1/capability/FexDescriptors/{Moid}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"Moid\"+\"}\", url.PathEscape(parameterToString(r.moid, \"\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\tif r.capabilityFexDescriptor == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"capabilityFexDescriptor is required and must be specified\")\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\", \"application/json-patch+json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.ifMatch != nil {\n\t\tlocalVarHeaderParams[\"If-Match\"] = parameterToString(*r.ifMatch, \"\")\n\t}\n\t// body params\n\tlocalVarPostBody = r.capabilityFexDescriptor\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, formFiles)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 403 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tvar v Error\n\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\tnewErr.error = err.Error()\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tnewErr.model = v\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "d8702de7cdea4ae2c47db61196c51736", "score": "0.5283772", "text": "func (r ApiUpdateCapabilityFexManufacturingDefRequest) IfMatch(ifMatch string) ApiUpdateCapabilityFexManufacturingDefRequest {\n\tr.ifMatch = &ifMatch\n\treturn r\n}", "title": "" }, { "docid": "f5168adb75ac7ea5cf21e6970e88746d", "score": "0.52638876", "text": "func (a *CapabilityApiService) PatchCapabilityFexCapabilityDefExecute(r ApiPatchCapabilityFexCapabilityDefRequest) (*CapabilityFexCapabilityDef, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodPatch\n\t\tlocalVarPostBody interface{}\n\t\tformFiles []formFile\n\t\tlocalVarReturnValue *CapabilityFexCapabilityDef\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"CapabilityApiService.PatchCapabilityFexCapabilityDef\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, &GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/api/v1/capability/FexCapabilityDefs/{Moid}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"Moid\"+\"}\", url.PathEscape(parameterToString(r.moid, \"\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\tif r.capabilityFexCapabilityDef == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"capabilityFexCapabilityDef is required and must be specified\")\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\", \"application/json-patch+json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.ifMatch != nil {\n\t\tlocalVarHeaderParams[\"If-Match\"] = parameterToString(*r.ifMatch, \"\")\n\t}\n\t// body params\n\tlocalVarPostBody = r.capabilityFexCapabilityDef\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, formFiles)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 403 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tvar v Error\n\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\tnewErr.error = err.Error()\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tnewErr.model = v\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "3c737de56112107492504722495de272", "score": "0.5187729", "text": "func (a *CapabilityApiService) CreateCapabilityFanModuleManufacturingDefExecute(r ApiCreateCapabilityFanModuleManufacturingDefRequest) (*CapabilityFanModuleManufacturingDef, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tformFiles []formFile\n\t\tlocalVarReturnValue *CapabilityFanModuleManufacturingDef\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"CapabilityApiService.CreateCapabilityFanModuleManufacturingDef\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, &GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/api/v1/capability/FanModuleManufacturingDefs\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\tif r.capabilityFanModuleManufacturingDef == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"capabilityFanModuleManufacturingDef is required and must be specified\")\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.ifMatch != nil {\n\t\tlocalVarHeaderParams[\"If-Match\"] = parameterToString(*r.ifMatch, \"\")\n\t}\n\tif r.ifNoneMatch != nil {\n\t\tlocalVarHeaderParams[\"If-None-Match\"] = parameterToString(*r.ifNoneMatch, \"\")\n\t}\n\t// body params\n\tlocalVarPostBody = r.capabilityFanModuleManufacturingDef\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, formFiles)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 403 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tvar v Error\n\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\tnewErr.error = err.Error()\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tnewErr.model = v\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "ac354aae5e3c3cf363df6ee8955f6425", "score": "0.51418686", "text": "func (a *EquipmentApiService) UpdateEquipmentFexOperation(ctx context.Context, moid string) ApiUpdateEquipmentFexOperationRequest {\n\treturn ApiUpdateEquipmentFexOperationRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "135cec929ba4840a66d511747b7f0255", "score": "0.51387155", "text": "func (a *CapabilityApiService) UpdateCapabilityEquipmentPhysicalDefExecute(r ApiUpdateCapabilityEquipmentPhysicalDefRequest) (*CapabilityEquipmentPhysicalDef, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tformFiles []formFile\n\t\tlocalVarReturnValue *CapabilityEquipmentPhysicalDef\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"CapabilityApiService.UpdateCapabilityEquipmentPhysicalDef\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, &GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/api/v1/capability/EquipmentPhysicalDefs/{Moid}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"Moid\"+\"}\", url.PathEscape(parameterToString(r.moid, \"\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\tif r.capabilityEquipmentPhysicalDef == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"capabilityEquipmentPhysicalDef is required and must be specified\")\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\", \"application/json-patch+json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.ifMatch != nil {\n\t\tlocalVarHeaderParams[\"If-Match\"] = parameterToString(*r.ifMatch, \"\")\n\t}\n\t// body params\n\tlocalVarPostBody = r.capabilityEquipmentPhysicalDef\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, formFiles)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 403 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tvar v Error\n\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\tnewErr.error = err.Error()\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tnewErr.model = v\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "fc1b5be32ab26bca5de7a1adb7703952", "score": "0.5134814", "text": "func (r ApiGetCapabilityFexManufacturingDefListRequest) At(at string) ApiGetCapabilityFexManufacturingDefListRequest {\n\tr.at = &at\n\treturn r\n}", "title": "" }, { "docid": "5e97acce5d8c04a72bf69e47fa293d7b", "score": "0.51322544", "text": "func (a *CapabilityApiService) CreateCapabilityFanModuleManufacturingDef(ctx context.Context) ApiCreateCapabilityFanModuleManufacturingDefRequest {\n\treturn ApiCreateCapabilityFanModuleManufacturingDefRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t}\n}", "title": "" }, { "docid": "92f15dcbd9d8f2baacc97f71f73693ed", "score": "0.5110622", "text": "func (a *CapabilityApiService) CreateCapabilityIoCardManufacturingDefExecute(r ApiCreateCapabilityIoCardManufacturingDefRequest) (*CapabilityIoCardManufacturingDef, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tformFiles []formFile\n\t\tlocalVarReturnValue *CapabilityIoCardManufacturingDef\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"CapabilityApiService.CreateCapabilityIoCardManufacturingDef\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, &GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/api/v1/capability/IoCardManufacturingDefs\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\tif r.capabilityIoCardManufacturingDef == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"capabilityIoCardManufacturingDef is required and must be specified\")\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.ifMatch != nil {\n\t\tlocalVarHeaderParams[\"If-Match\"] = parameterToString(*r.ifMatch, \"\")\n\t}\n\tif r.ifNoneMatch != nil {\n\t\tlocalVarHeaderParams[\"If-None-Match\"] = parameterToString(*r.ifNoneMatch, \"\")\n\t}\n\t// body params\n\tlocalVarPostBody = r.capabilityIoCardManufacturingDef\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, formFiles)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 403 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tvar v Error\n\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\tnewErr.error = err.Error()\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tnewErr.model = v\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "856e5409aac8642eed7dd8226adb503e", "score": "0.5098399", "text": "func (a *EquipmentApiService) PatchEquipmentFex(ctx context.Context, moid string) ApiPatchEquipmentFexRequest {\n\treturn ApiPatchEquipmentFexRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "3537bd0f73d28f0c7ad00dc43fe030c5", "score": "0.50917685", "text": "func (a *CapabilityApiService) GetCapabilitySwitchManufacturingDefByMoid(ctx context.Context, moid string) ApiGetCapabilitySwitchManufacturingDefByMoidRequest {\n\treturn ApiGetCapabilitySwitchManufacturingDefByMoidRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "f64705cb5e494149c802c9067731ae53", "score": "0.50758696", "text": "func (a *CapabilityApiService) DeleteCapabilitySiocModuleManufacturingDef(ctx context.Context, moid string) ApiDeleteCapabilitySiocModuleManufacturingDefRequest {\n\treturn ApiDeleteCapabilitySiocModuleManufacturingDefRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "9bde4384d2cc973c6a3c5a80593db22c", "score": "0.5062743", "text": "func (r ApiPatchCapabilityFexManufacturingDefRequest) IfMatch(ifMatch string) ApiPatchCapabilityFexManufacturingDefRequest {\n\tr.ifMatch = &ifMatch\n\treturn r\n}", "title": "" }, { "docid": "a30df76e4966c23d8972ccaa81718d8a", "score": "0.5062326", "text": "func (r ApiUpdateCapabilityEquipmentPhysicalDefRequest) CapabilityEquipmentPhysicalDef(capabilityEquipmentPhysicalDef CapabilityEquipmentPhysicalDef) ApiUpdateCapabilityEquipmentPhysicalDefRequest {\n\tr.capabilityEquipmentPhysicalDef = &capabilityEquipmentPhysicalDef\n\treturn r\n}", "title": "" }, { "docid": "4a2936e8db04fde5e96d69be723853c4", "score": "0.50478464", "text": "func (a *CapabilityApiService) DeleteCapabilityChassisManufacturingDef(ctx context.Context, moid string) ApiDeleteCapabilityChassisManufacturingDefRequest {\n\treturn ApiDeleteCapabilityChassisManufacturingDefRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "c37f3f7a2f1759ac3facc85dd111dd1a", "score": "0.5021148", "text": "func (a *CapabilityApiService) DeleteCapabilityFanModuleManufacturingDef(ctx context.Context, moid string) ApiDeleteCapabilityFanModuleManufacturingDefRequest {\n\treturn ApiDeleteCapabilityFanModuleManufacturingDefRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "7824de4d08f3bc54059df5de3cb4e505", "score": "0.50183547", "text": "func (a *CapabilityApiService) GetCapabilityFexCapabilityDefByMoid(ctx context.Context, moid string) ApiGetCapabilityFexCapabilityDefByMoidRequest {\n\treturn ApiGetCapabilityFexCapabilityDefByMoidRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "7ff1ecce15b0f00ae5fd17008522ccf3", "score": "0.5015734", "text": "func (r ApiUpdateCapabilityFexDescriptorRequest) CapabilityFexDescriptor(capabilityFexDescriptor CapabilityFexDescriptor) ApiUpdateCapabilityFexDescriptorRequest {\n\tr.capabilityFexDescriptor = &capabilityFexDescriptor\n\treturn r\n}", "title": "" }, { "docid": "1bd2678a654f9d337573b1c972672ec9", "score": "0.49991313", "text": "func (a *CapabilityApiService) PatchCapabilityEquipmentPhysicalDef(ctx context.Context, moid string) ApiPatchCapabilityEquipmentPhysicalDefRequest {\n\treturn ApiPatchCapabilityEquipmentPhysicalDefRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "890af1b1794cb0ff233f1b9ec4bd67af", "score": "0.49953282", "text": "func (a *CapabilityApiService) DeleteCapabilityIoCardManufacturingDef(ctx context.Context, moid string) ApiDeleteCapabilityIoCardManufacturingDefRequest {\n\treturn ApiDeleteCapabilityIoCardManufacturingDefRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "e39a3e1363911e0b16d4f4e4b7a762d1", "score": "0.4987668", "text": "func (r ApiGetCapabilityFexManufacturingDefListRequest) Filter(filter string) ApiGetCapabilityFexManufacturingDefListRequest {\n\tr.filter = &filter\n\treturn r\n}", "title": "" } ]
8d6bc675701ae67ae3267aba88c54a86
ConfirmedEQ applies the EQ predicate on the "confirmed" field.
[ { "docid": "68533cd27a0081c54a41d25f5e0f86a8", "score": "0.8130841", "text": "func ConfirmedEQ(v bool) predicate.Account {\n\treturn predicate.Account(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldConfirmed), v))\n\t})\n}", "title": "" } ]
[ { "docid": "271de760c6c0cf7f131e737bdd5ff4b4", "score": "0.7068857", "text": "func Confirmed(v bool) predicate.Account {\n\treturn predicate.Account(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldConfirmed), v))\n\t})\n}", "title": "" }, { "docid": "2b89cceb6c2aabcbe7dba40de4b38d84", "score": "0.67143375", "text": "func ConfirmedNEQ(v bool) predicate.Account {\n\treturn predicate.Account(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldConfirmed), v))\n\t})\n}", "title": "" }, { "docid": "4ec494f6eaad80923327971c9a57a9f8", "score": "0.64165306", "text": "func ConfirmationTokenEQ(v string) predicate.Account {\n\treturn predicate.Account(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldConfirmationToken), v))\n\t})\n}", "title": "" }, { "docid": "18e53044febc1b800bf68edfaea0ae48", "score": "0.5787542", "text": "func (f *NextTurnDPOSInfoFilter) MatchConfirmed(tx *types.Transaction) bool {\n\treturn f.TxFilter.MatchConfirmed(tx) || tx.IsNextTurnDPOSInfoTx()\n}", "title": "" }, { "docid": "b8d5ef78787acc313a08057b140e350a", "score": "0.57243884", "text": "func (f *UpgradeFilter) MatchConfirmed(tx interfaces.Transaction) bool {\n\treturn f.TxFilter.MatchConfirmed(tx) || tx.IsNextTurnDPOSInfoTx() ||\n\t\ttx.IsCustomIDRelatedTx() || tx.IsRevertToPOW() || tx.IsRevertToDPOS() ||\n\t\ttx.IsSideChainUpgradeTx()\n}", "title": "" }, { "docid": "9c81bf9f25a95d6e2bb1fefe29b9c0b0", "score": "0.57103324", "text": "func ProvinceEQ(v string) predicate.QccEnterpriseData {\n\treturn predicate.QccEnterpriseData(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldProvince), v))\n\t})\n}", "title": "" }, { "docid": "a323c98f7e8a23babdad33f89438b08c", "score": "0.5675424", "text": "func ConfirmationSentAtEQ(v time.Time) predicate.Account {\n\treturn predicate.Account(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldConfirmationSentAt), v))\n\t})\n}", "title": "" }, { "docid": "3dbe40d16c142572331cf1948f02819e", "score": "0.5620996", "text": "func (o *Options) SubtypeConfirmed(val string) *Options {\n\to.Query.Set(api.ParamSubtypeConfirmed, val)\n\treturn o\n}", "title": "" }, { "docid": "97b23f264cf697ad8a664196fa25e634", "score": "0.56115913", "text": "func AddressEQ(v string) predicate.QccEnterpriseData {\n\treturn predicate.QccEnterpriseData(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldAddress), v))\n\t})\n}", "title": "" }, { "docid": "78533ff2875bd8d21f0dfaf14e5c2a47", "score": "0.55093217", "text": "func (s *Subscriber) Confirmed() bool {\n\treturn s.ConfirmedAt.Time().After(s.CreatedAt.Time())\n}", "title": "" }, { "docid": "45964c77859537dce7155f8f228a98fc", "score": "0.5402154", "text": "func AddressEQ(v string) predicate.Account {\n\treturn predicate.Account(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldAddress), v))\n\t})\n}", "title": "" }, { "docid": "74c89d5d6f15331b9a9c5ef7b7dd18bd", "score": "0.5389157", "text": "func ConfirmedTxFilter(isConfirmed bool) TxFilter {\n\treturn baseFilter{func(tx *Transaction) bool {\n\t\treturn tx.Status.Confirmed == isConfirmed\n\t}}\n}", "title": "" }, { "docid": "67f948ca57232082982adc290cac7516", "score": "0.535456", "text": "func (r *Email) IsConfirmed() bool {\n\treturn r.email.IsConfirmed\n}", "title": "" }, { "docid": "b6a7a69c485cf9084e1c8f9adf905a88", "score": "0.53004724", "text": "func (w *spvwallet) TransactionConfirmed(tx *util.Tx) {\n\t// TODO\n}", "title": "" }, { "docid": "32e40604ce8d6e99c6d8dbdc2c9f02bf", "score": "0.52963614", "text": "func EmailChangeTokenEQ(v string) predicate.Account {\n\treturn predicate.Account(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldEmailChangeToken), v))\n\t})\n}", "title": "" }, { "docid": "0d3bc9af25a449bb4a7625819185d366", "score": "0.52404916", "text": "func ConfirmationTokenNEQ(v string) predicate.Account {\n\treturn predicate.Account(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldConfirmationToken), v))\n\t})\n}", "title": "" }, { "docid": "8064277050369c0d1b2b3d116010dd32", "score": "0.52083385", "text": "func OtherEmailsEQ(v string) predicate.QccEnterpriseData {\n\treturn predicate.QccEnterpriseData(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldOtherEmails), v))\n\t})\n}", "title": "" }, { "docid": "98c99687d08e388c552cbbf411e3c19d", "score": "0.51734656", "text": "func CcvEQ(v string) predicate.Card {\n\treturn predicate.Card(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldCcv), v))\n\t})\n}", "title": "" }, { "docid": "c08dae46d9a9f4e247f7dd06269c81ad", "score": "0.51636714", "text": "func EmailEQ(v string) predicate.QccEnterpriseData {\n\treturn predicate.QccEnterpriseData(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldEmail), v))\n\t})\n}", "title": "" }, { "docid": "3019dcc7b78ce950df4f95e64e92399c", "score": "0.5156221", "text": "func EmailChangeEQ(v string) predicate.Account {\n\treturn predicate.Account(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldEmailChange), v))\n\t})\n}", "title": "" }, { "docid": "fb6e0dc728bab0710073167f0cf4ad79", "score": "0.51526153", "text": "func ConfirmedNotNil() predicate.Account {\n\treturn predicate.Account(func(s *sql.Selector) {\n\t\ts.Where(sql.NotNull(s.C(FieldConfirmed)))\n\t})\n}", "title": "" }, { "docid": "cb840e11820cf3f0e8ddc4fd58f0ab99", "score": "0.5145222", "text": "func ConfirmationTokenEqualFold(v string) predicate.Account {\n\treturn predicate.Account(func(s *sql.Selector) {\n\t\ts.Where(sql.EqualFold(s.C(FieldConfirmationToken), v))\n\t})\n}", "title": "" }, { "docid": "9ad6d841618c57d50bcec649990eeb0d", "score": "0.5143045", "text": "func ReviewedEQ(v bool) predicate.CardSchedule {\n\treturn predicate.CardSchedule(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldReviewed), v))\n\t})\n}", "title": "" }, { "docid": "c10f27c1cc83ae6487fdda30911bf93a", "score": "0.51162666", "text": "func OpinionEQ(v string) predicate.StatusOpinion {\n\treturn predicate.StatusOpinion(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldOpinion), v))\n\t})\n}", "title": "" }, { "docid": "36ea498a6d89cf833fb7e6770f8ac249", "score": "0.50968367", "text": "func EmailEQ(v string) predicate.Account {\n\treturn predicate.Account(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldEmail), v))\n\t})\n}", "title": "" }, { "docid": "30d7a818fc31952a5d5755fd02881217", "score": "0.5068095", "text": "func EQ(col string, value interface{}) *Predicate {\n\treturn (&Predicate{}).EQ(col, value)\n}", "title": "" }, { "docid": "a3ccb5d0d2d0840f4e8e85ec860e0f81", "score": "0.5063424", "text": "func (g *Guest) Confirm() {\n\tg.ConfirmationStatus = Confirmed\n}", "title": "" }, { "docid": "b5f9ef6089ef83e97621a2d4481704c4", "score": "0.50412405", "text": "func ActiviteEQ(v string) predicate.StockManager {\n\treturn predicate.StockManager(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldActivite), v))\n\t})\n}", "title": "" }, { "docid": "ef402f31c5d5931d8b8ed57eebe5dc5e", "score": "0.5036496", "text": "func (f StringField) Eq(field StringField) Predicate {\n\treturn CustomPredicate{\n\t\tFormat: \"? = ?\",\n\t\tValues: []interface{}{f, field},\n\t}\n}", "title": "" }, { "docid": "3237ff23b0a4b30b5b41f854951c2a79", "score": "0.5035865", "text": "func (mr *MockRepositoryMockRecorder) Confirmed(ctx, code interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"Confirmed\", reflect.TypeOf((*MockRepository)(nil).Confirmed), ctx, code)\n}", "title": "" }, { "docid": "c20c63106515116b83dc077c68fe32b4", "score": "0.50305057", "text": "func NoteEQ(v string) predicate.CarInspection {\n\treturn predicate.CarInspection(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldNote), v))\n\t})\n}", "title": "" }, { "docid": "48b96e9b8df928fac2e6ed2d9a6a756f", "score": "0.5025372", "text": "func ConfirmedIsNil() predicate.Account {\n\treturn predicate.Account(func(s *sql.Selector) {\n\t\ts.Where(sql.IsNull(s.C(FieldConfirmed)))\n\t})\n}", "title": "" }, { "docid": "798f1087d9b7f8c780b5ddba46bbcd98", "score": "0.5016216", "text": "func StatusEQ(v Status) predicate.Account {\n\treturn predicate.Account(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldStatus), v))\n\t})\n}", "title": "" }, { "docid": "38811ad216c461e098830eb5a01ff43d", "score": "0.50040066", "text": "func (h *BroadcastStorageHandler) TransactionConfirmed(\n\tctx context.Context,\n\tdbTx database.Transaction,\n\tidentifier string,\n\tblockIdentifier *types.BlockIdentifier,\n\ttransaction *types.Transaction,\n\tintent []*types.Operation,\n) error {\n\tif err := h.parser.ExpectedOperations(intent, transaction.Operations, false, true); err != nil {\n\t\treturn fmt.Errorf(\"%w: confirmed transaction did not match intent\", err)\n\t}\n\n\t_, _ = h.counterStorage.UpdateTransactional(\n\t\tctx,\n\t\tdbTx,\n\t\tmodules.TransactionsConfirmedCounter,\n\t\tbig.NewInt(1),\n\t)\n\n\tif err := h.coordinator.BroadcastComplete(\n\t\tctx,\n\t\tdbTx,\n\t\tidentifier,\n\t\ttransaction,\n\t); err != nil {\n\t\treturn fmt.Errorf(\"%w: coordinator could not handle transaction\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "1eaf28015ec9159aa290b6bfe4524343", "score": "0.4987766", "text": "func NoteEQ(v string) predicate.Dentalappointment {\n\treturn predicate.Dentalappointment(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldNote), v))\n\t})\n}", "title": "" }, { "docid": "63a07338935ce3de44b8d6db2d9ebc15", "score": "0.49788392", "text": "func (service *IYOAddressValidationService) IsConfirmed(request *http.Request, key string) (confirmed bool, err error) {\n\tinfo, err := service.getAddressValidationInformation(request, key)\n\tif err != nil {\n\t\treturn\n\t}\n\tif info == nil {\n\t\terr = ErrInvalidOrExpiredKey\n\t\treturn\n\t}\n\tconfirmed = info.Confirmed\n\treturn\n}", "title": "" }, { "docid": "d76306d058169b99b684caa4cb8b584f", "score": "0.49756584", "text": "func (p *Predicate) EQ(col string, arg interface{}) *Predicate {\n\tp.b.Append(col).WriteString(\" = \")\n\tp.b.Arg(arg)\n\treturn p\n}", "title": "" }, { "docid": "dba04444465d826c97bfd387e65d754d", "score": "0.49518102", "text": "func InterestReportingEQ(v bool) predicate.Account {\n\treturn predicate.Account(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldInterestReporting), v))\n\t})\n}", "title": "" }, { "docid": "a5a50b98c5b89617e57b600de2626688", "score": "0.49340618", "text": "func CurrentBalanceEQ(v float32) predicate.Account {\n\treturn predicate.Account(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldCurrentBalance), v))\n\t})\n}", "title": "" }, { "docid": "c3feb69a0fe0cdd4d6ec6b4b63dd3c91", "score": "0.49228895", "text": "func DateClosedEQ(v time.Time) predicate.Account {\n\treturn predicate.Account(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldDateClosed), v))\n\t})\n}", "title": "" }, { "docid": "9ca47cf82c30c26835f72e10dbf71cab", "score": "0.49161544", "text": "func WorkEQ(v bool) predicate.Account {\n\treturn predicate.Account(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldWork), v))\n\t})\n}", "title": "" }, { "docid": "773e553dfafeb46df8d9953e71be7b40", "score": "0.4886894", "text": "func Confirm(msg string, args ...interface{}) (bool, error) {\n\tvar confirmation bool\n\treturn confirmation, survey.AskOne(&survey.Confirm{\n\t\tMessage: fmt.Sprintf(msg, args...),\n\t\tDefault: true,\n\t}, &confirmation)\n}", "title": "" }, { "docid": "ee4e7cba147c67ab486fb8070bdb03a3", "score": "0.4873952", "text": "func BusinessScopeEQ(v string) predicate.QccEnterpriseData {\n\treturn predicate.QccEnterpriseData(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldBusinessScope), v))\n\t})\n}", "title": "" }, { "docid": "e08264c036fd96428348da494de3af53", "score": "0.485409", "text": "func (_RollupAdminFacet *RollupAdminFacetFilterer) FilterNodeConfirmed(opts *bind.FilterOpts, nodeNum []*big.Int) (*RollupAdminFacetNodeConfirmedIterator, error) {\n\n\tvar nodeNumRule []interface{}\n\tfor _, nodeNumItem := range nodeNum {\n\t\tnodeNumRule = append(nodeNumRule, nodeNumItem)\n\t}\n\n\tlogs, sub, err := _RollupAdminFacet.contract.FilterLogs(opts, \"NodeConfirmed\", nodeNumRule)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &RollupAdminFacetNodeConfirmedIterator{contract: _RollupAdminFacet.contract, event: \"NodeConfirmed\", logs: logs, sub: sub}, nil\n}", "title": "" }, { "docid": "5cabd8b8df6206d529449f25834280db", "score": "0.4847711", "text": "func (recorder *Recorder) Confirm(id uint) error {\n\treturn recorder.updateStatus(id, Confirmed)\n}", "title": "" }, { "docid": "a2a836445b08eda1888346c03b937167", "score": "0.48253068", "text": "func CountyEQ(v string) predicate.QccEnterpriseData {\n\treturn predicate.QccEnterpriseData(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldCounty), v))\n\t})\n}", "title": "" }, { "docid": "02a53548e019994cdfae3abea71f06cd", "score": "0.48210666", "text": "func RegisteredCapitalEQ(v string) predicate.QccEnterpriseData {\n\treturn predicate.QccEnterpriseData(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldRegisteredCapital), v))\n\t})\n}", "title": "" }, { "docid": "de990e5356494e4569b8fd69803eba89", "score": "0.4811181", "text": "func (f ArrayField) Eq(field ArrayField) Predicate {\n\treturn CustomPredicate{\n\t\tFormat: \"? = ?\",\n\t\tValues: []interface{}{f, field},\n\t}\n}", "title": "" }, { "docid": "bb74af8cab16feb5e0e0ef72eb6df34b", "score": "0.48083252", "text": "func SerializedEQ(v string) predicate.Event {\n\treturn predicate.Event(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldSerialized), v))\n\t})\n}", "title": "" }, { "docid": "70a78e69c2a4b87a1d7f929cd678b9c4", "score": "0.48068827", "text": "func (db *DB) Confirm(ctx context.Context, channel, user, key string, expiry time.Duration) (bool, error) {\n\tctx, span := trace.StartSpan(ctx, \"Confirm\")\n\tdefer span.End()\n\n\trkey := buildKey(\n\t\tkeyChannel.is(channel),\n\t\tkeyConfirm.is(user),\n\t\tkeyKey.is(key),\n\t)\n\n\treturn markOrDelete(ctx, db.client, rkey, expiry)\n}", "title": "" }, { "docid": "d3d64c6f4f65cf676a7309760e68701f", "score": "0.47938567", "text": "func ConfirmationToken(v string) predicate.Account {\n\treturn predicate.Account(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldConfirmationToken), v))\n\t})\n}", "title": "" }, { "docid": "fe119db01d8d7d4d4111ba5ae51cec94", "score": "0.47782832", "text": "func IndustryInvolvedEQ(v string) predicate.QccEnterpriseData {\n\treturn predicate.QccEnterpriseData(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldIndustryInvolved), v))\n\t})\n}", "title": "" }, { "docid": "0dd06bc59ce455fe04f822c382e535ae", "score": "0.47702706", "text": "func (_RollupAdminFacet *RollupAdminFacetSession) LatestConfirmed() (*big.Int, error) {\n\treturn _RollupAdminFacet.Contract.LatestConfirmed(&_RollupAdminFacet.CallOpts)\n}", "title": "" }, { "docid": "1b3ffe806ab97bf3df41abd62700299d", "score": "0.4744612", "text": "func RecordinsuranceAddressEQ(v string) predicate.Recordinsurance {\n\treturn predicate.Recordinsurance(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldRecordinsuranceAddress), v))\n\t})\n}", "title": "" }, { "docid": "26d897c3c1b5ae1f17c4d31d7d860570", "score": "0.4735114", "text": "func ValueEQ(column string, arg interface{}, opts ...Option) *sql.Predicate {\n\treturn sql.P(func(b *sql.Builder) {\n\t\topts, arg = normalizePG(b, arg, opts)\n\t\tValuePath(b, column, opts...)\n\t\tb.WriteOp(sql.OpEQ).Arg(arg)\n\t})\n}", "title": "" }, { "docid": "0209bbf2efc262eb4b237d042356b486", "score": "0.4725769", "text": "func AvailableBalanceEQ(v float32) predicate.Account {\n\treturn predicate.Account(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldAvailableBalance), v))\n\t})\n}", "title": "" }, { "docid": "e431d3b1dc3317844009fd9dab29213c", "score": "0.47118184", "text": "func (a Assertion) EQ(t *testing.T, expected, actual interface{}) Assertion {\n\tMark(t)\n\n\treturn a.Equal(t, expected, actual)\n}", "title": "" }, { "docid": "caf6fae5881b57dd61afd2f592ff2f4a", "score": "0.47111863", "text": "func (u *User) IsConfirmed() bool {\n\treturn u.ConfirmedAt != nil\n}", "title": "" }, { "docid": "caf6fae5881b57dd61afd2f592ff2f4a", "score": "0.47111863", "text": "func (u *User) IsConfirmed() bool {\n\treturn u.ConfirmedAt != nil\n}", "title": "" }, { "docid": "91443dae83e378889b9653930e43a1a2", "score": "0.47074127", "text": "func BankAccountEQ(v string) predicate.BankingData {\n\treturn predicate.BankingData(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldBankAccount), v))\n\t})\n}", "title": "" }, { "docid": "1f7fda11fd6f53a08b8346b35fd0cc84", "score": "0.47042185", "text": "func RecoveryTokenEQ(v string) predicate.Account {\n\treturn predicate.Account(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldRecoveryToken), v))\n\t})\n}", "title": "" }, { "docid": "905d8a8529f2d23bc07441f4a335333d", "score": "0.470054", "text": "func RegisterStatusEQ(v string) predicate.QccEnterpriseData {\n\treturn predicate.QccEnterpriseData(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldRegisterStatus), v))\n\t})\n}", "title": "" }, { "docid": "26ce44c9de5adbfa9a47569e54049017", "score": "0.46964934", "text": "func (u *User) Confirm(tx *storage.Connection) error {\n\tu.ConfirmationToken = \"\"\n\tnow := time.Now()\n\tu.ConfirmedAt = &now\n\treturn tx.UpdateOnly(u, \"confirmation_token\", \"confirmed_at\")\n}", "title": "" }, { "docid": "0051cbf3a3319df70854fb9bd13fc376", "score": "0.46925637", "text": "func StateEQ(v State) predicate.Sprint {\n\treturn predicate.Sprint(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldState), v))\n\t},\n\t)\n}", "title": "" }, { "docid": "54ceb5ae5f9e772b89732f809485e02a", "score": "0.46824005", "text": "func NEQ(col string, value interface{}) *Predicate {\n\treturn (&Predicate{}).NEQ(col, value)\n}", "title": "" }, { "docid": "6f9d65588b358275157f574f0ebc7e67", "score": "0.46788666", "text": "func (m *MockRepository) Confirmed(ctx context.Context, code uuid.UUID) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Confirmed\", ctx, code)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "80c3cefa48a9bd15b92956c186d76902", "score": "0.46750286", "text": "func AnonymousEQ(v bool) predicate.Question {\n\treturn predicate.Question(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldAnonymous), v))\n\t})\n}", "title": "" }, { "docid": "b26de44f03686fa33694dd42790b3877", "score": "0.46692777", "text": "func StatusEQ(v int8) predicate.User {\n\treturn predicate.User(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldStatus), v))\n\t})\n}", "title": "" }, { "docid": "88d6560d5e3ea45d184ac88889eef9dc", "score": "0.4667194", "text": "func EmailChangeSentAtEQ(v time.Time) predicate.Account {\n\treturn predicate.Account(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldEmailChangeSentAt), v))\n\t})\n}", "title": "" }, { "docid": "e245fab9e2bf762032a30e38d1fa953a", "score": "0.46626854", "text": "func DoctoridcardEQ(v string) predicate.Training {\n\treturn predicate.Training(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldDoctoridcard), v))\n\t})\n}", "title": "" }, { "docid": "a0ea3e7adee361e04e5df0015f53e61b", "score": "0.46526974", "text": "func (_RollupAdminFacet *RollupAdminFacetCallerSession) LatestConfirmed() (*big.Int, error) {\n\treturn _RollupAdminFacet.Contract.LatestConfirmed(&_RollupAdminFacet.CallOpts)\n}", "title": "" }, { "docid": "cb6d5688d28da1a288edbb35ca9e30c6", "score": "0.46526113", "text": "func (s *channel) TxConfirmed(id txID, inclusionBlock eth.BlockID) (bool, []*types.Block) {\n\ts.metr.RecordBatchTxSubmitted()\n\ts.log.Debug(\"marked transaction as confirmed\", \"id\", id, \"block\", inclusionBlock)\n\tif _, ok := s.pendingTransactions[id]; !ok {\n\t\ts.log.Warn(\"unknown transaction marked as confirmed\", \"id\", id, \"block\", inclusionBlock)\n\t\t// TODO: This can occur if we clear the channel while there are still pending transactions\n\t\t// We need to keep track of stale transactions instead\n\t\treturn false, nil\n\t}\n\tdelete(s.pendingTransactions, id)\n\ts.confirmedTransactions[id] = inclusionBlock\n\ts.channelBuilder.FramePublished(inclusionBlock.Number)\n\n\t// If this channel timed out, put the pending blocks back into the local saved blocks\n\t// and then reset this state so it can try to build a new channel.\n\tif s.isTimedOut() {\n\t\ts.metr.RecordChannelTimedOut(s.ID())\n\t\ts.log.Warn(\"Channel timed out\", \"id\", s.ID())\n\t\treturn true, s.channelBuilder.Blocks()\n\t}\n\t// If we are done with this channel, record that.\n\tif s.isFullySubmitted() {\n\t\ts.metr.RecordChannelFullySubmitted(s.ID())\n\t\ts.log.Info(\"Channel is fully submitted\", \"id\", s.ID())\n\t\treturn true, nil\n\t}\n\n\treturn false, nil\n}", "title": "" }, { "docid": "2f174f48854586d84f6256b1875856e2", "score": "0.46521896", "text": "func DrugAllergyEQ(v string) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldDrugAllergy), v))\n\t})\n}", "title": "" }, { "docid": "b43c1df7e990b7ef40acf3e272737c0c", "score": "0.46445715", "text": "func OtherPhonesEQ(v string) predicate.QccEnterpriseData {\n\treturn predicate.QccEnterpriseData(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldOtherPhones), v))\n\t})\n}", "title": "" }, { "docid": "e56ac8863d020385ef7e43397337efb4", "score": "0.46439552", "text": "func EmailEQ(v string) predicate.User {\n\treturn predicate.User(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldEmail), v))\n\t})\n}", "title": "" }, { "docid": "e56ac8863d020385ef7e43397337efb4", "score": "0.46439552", "text": "func EmailEQ(v string) predicate.User {\n\treturn predicate.User(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldEmail), v))\n\t})\n}", "title": "" }, { "docid": "8ade75cd18356e21d0d98a0ea55eee6f", "score": "0.46417558", "text": "func LegalPersonEQ(v string) predicate.QccEnterpriseData {\n\treturn predicate.QccEnterpriseData(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldLegalPerson), v))\n\t})\n}", "title": "" }, { "docid": "dde7e19602e36da7f8a1488ec06f0266", "score": "0.46249232", "text": "func ConfirmationTokenContains(v string) predicate.Account {\n\treturn predicate.Account(func(s *sql.Selector) {\n\t\ts.Where(sql.Contains(s.C(FieldConfirmationToken), v))\n\t})\n}", "title": "" }, { "docid": "34a557d0d355e7043214e9e146fca5a3", "score": "0.4621051", "text": "func (u *User) Confirm() {\n\tnow := time.Now()\n\tu.ConfirmedAt = &now\n}", "title": "" }, { "docid": "4fac061684fd81b5ac6b636ec1e24e1c", "score": "0.46200076", "text": "func Eq(column string) Cmp {\n\treturn qb.Eq(column)\n}", "title": "" }, { "docid": "2f54435218c95ff197a58ce68621a807", "score": "0.4619622", "text": "func StatusEQ(v Status) predicate.User {\n\treturn predicate.User(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldStatus), v))\n\t})\n}", "title": "" }, { "docid": "ec042d8f0431e2486ed1d4a4126bd2d3", "score": "0.4616033", "text": "func BoolEQ(v bool) BoolP {\n\tfield := &Field{}\n\tvalue := &Value{V: v}\n\tdone := func(name string) { field.Name = name }\n\treturn &boolP{P: EQ(field, value), done: done}\n}", "title": "" }, { "docid": "c9f0e1b2492c0548c34502fb4efff1ce", "score": "0.4614969", "text": "func (txp *TransactionPool) CheckConfirmedPool(tx Transaction) bool {\n\ttxp.mux.Lock()\n\tdefer txp.mux.Unlock()\n\tif(tx.EventId ==\"\"){\n\t\tfmt.Println(\"Tx ID is NULL. Returning false for CheckConfirmedPool,TX:\",tx.EventId)\n\t\treturn false\n\t}\n\tif _, ok := txp.Confirmed[tx.EventId]; ok {\n\t\tfmt.Println(\"Tx is in ConfirmedPool,TX:\",tx.EventId)\n\t\treturn true\n\t}else{\n\t\tfmt.Println(\"Tx is NOT in ConfirmedPool,TX:\",tx.EventId)\n\t\treturn false\n\t}\n}", "title": "" }, { "docid": "9dc9dce1a3189d6177b3cef6907dc9ba", "score": "0.46130982", "text": "func (service *IYOPhonenumberValidationService) IsConfirmed(request *http.Request, key string) (confirmed bool, err error) {\n\tinfo, err := service.getPhonenumberValidationInformation(request, key)\n\tif err != nil {\n\t\treturn\n\t}\n\tif info == nil {\n\t\terr = ErrInvalidOrExpiredKey\n\t\treturn\n\t}\n\tconfirmed = info.Confirmed\n\treturn\n}", "title": "" }, { "docid": "9d62ab033870850e00efccdb6e465801", "score": "0.46096617", "text": "func HashEQ(v string) predicate.Question {\n\treturn predicate.Question(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldHash), v))\n\t})\n}", "title": "" }, { "docid": "0d9fb34f5d431cfe5a24391b8a964199", "score": "0.45951596", "text": "func OtherEmailsEqualFold(v string) predicate.QccEnterpriseData {\n\treturn predicate.QccEnterpriseData(func(s *sql.Selector) {\n\t\ts.Where(sql.EqualFold(s.C(FieldOtherEmails), v))\n\t})\n}", "title": "" }, { "docid": "ad46d5154dc238e001e8bef7195d9ecd", "score": "0.4580651", "text": "func OtpEQ(v string) predicate.Account {\n\treturn predicate.Account(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldOtp), v))\n\t})\n}", "title": "" }, { "docid": "4fda27ff0204a001f310bd1c3495b444", "score": "0.4579445", "text": "func (service *serviceImpl) ConfirmSignup(c echo.Context) error {\n\tvar request struct {\n\t\tToken string `json:\"token\"`\n\t}\n\tc.Bind(&request)\n\n\tif request.Token == \"\" {\n\t\treturn c.JSON(http.StatusBadRequest, util.CreateErrResponse(errors.New(\"Missing parameter 'token'\")))\n\t}\n\n\ttoken, err := tokens.ParseConfirmationToken(service.jwtKey, request.Token)\n\tif err != nil || token.Key == \"\" {\n\t\treturn c.JSON(http.StatusForbidden, util.CreateErrResponse(err))\n\t}\n\n\terr = service.userCollection.Update(\n\t\tbson.M{\"confirmationKey\": token.Key},\n\t\tbson.M{\n\t\t\t\"$set\": bson.M{\n\t\t\t\t\"isConfirmed\": true,\n\t\t\t},\n\t\t},\n\t)\n\n\tif err != nil {\n\t\treturn c.JSON(http.StatusInternalServerError, util.CreateErrResponse(err))\n\t}\n\n\treturn c.JSON(http.StatusOK, util.CreateOkResponse(nil))\n}", "title": "" }, { "docid": "0ce822d1e4e29e364b97b952c03e04ae", "score": "0.45744646", "text": "func (e *Blank) GetConfirmation(coin *coin.Coin) int { // deposit confirmations\n\treturn 0\n}", "title": "" }, { "docid": "b3c853371a5cd232a6ef880899047b3d", "score": "0.4570505", "text": "func MainBranchEQ(v string) predicate.Pendingloanbinding {\n\treturn predicate.Pendingloanbinding(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldMainBranch), v))\n\t})\n}", "title": "" }, { "docid": "1c8595334c8985109c61f11aec252ba5", "score": "0.45644724", "text": "func (f TimeField) Eq(field TimeField) Predicate {\n\treturn CustomPredicate{\n\t\tFormat: \"? = ?\",\n\t\tValues: []interface{}{f, field},\n\t}\n}", "title": "" }, { "docid": "9f409db8f730d4d404a15a1cbf5c84e8", "score": "0.45629385", "text": "func CurrencyCodeEQ(v string) predicate.Account {\n\treturn predicate.Account(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldCurrencyCode), v))\n\t})\n}", "title": "" }, { "docid": "fcd426968f1eeaf328a908c33b190aa0", "score": "0.4561667", "text": "func (f BoolField) Eq(x bool) *EqMatcher {\n\treturn EqBool(f.FieldSelector, x)\n}", "title": "" }, { "docid": "a338e8afec2233c30ee05d2c0edcc54b", "score": "0.4560534", "text": "func (c *Confirm) Post(w http.ResponseWriter, r *http.Request) error {\n\tlogger := c.RequestLogger(r)\n\n\tvalidator, err := c.Authboss.Config.Core.BodyReader.Read(PageConfirm, r)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif errs := validator.Validate(); errs != nil {\n\t\tlogger.Infof(\"validation failed in Confirm.Get, this typically means a bad token: %+v\", errs)\n\t\treturn c.invalidToken(w, r)\n\t}\n\n\tvalues := authboss.MustHaveConfirmValues(validator)\n\n\trawToken, err := base64.URLEncoding.DecodeString(values.GetToken())\n\tif err != nil {\n\t\tlogger.Infof(\"error decoding token in Confirm.Get, this typically means a bad token: %s %+v\", values.GetToken(), err)\n\t\treturn c.invalidToken(w, r)\n\t}\n\n\tif len(rawToken) != confirmTokenSize {\n\t\tlogger.Infof(\"invalid confirm token submitted, size was wrong: %d\", len(rawToken))\n\t\treturn c.invalidToken(w, r)\n\t}\n\n\tselectorBytes := sha512.Sum512(rawToken[:confirmTokenSplit])\n\tverifierBytes := sha512.Sum512(rawToken[confirmTokenSplit:])\n\tselector := base64.StdEncoding.EncodeToString(selectorBytes[:])\n\n\tstorer := authboss.EnsureCanConfirm(c.Authboss.Config.Storage.Server)\n\tuser, err := storer.LoadByConfirmSelector(r.Context(), selector)\n\tif err == authboss.ErrUserNotFound {\n\t\tlogger.Infof(\"confirm selector was not found in database: %s\", selector)\n\t\treturn c.invalidToken(w, r)\n\t} else if err != nil {\n\t\treturn err\n\t}\n\n\tdbVerifierBytes, err := base64.StdEncoding.DecodeString(user.GetConfirmVerifier())\n\tif err != nil {\n\t\tlogger.Infof(\"invalid confirm verifier stored in database: %s\", user.GetConfirmVerifier())\n\t\treturn c.invalidToken(w, r)\n\t}\n\n\tif subtle.ConstantTimeEq(int32(len(verifierBytes)), int32(len(dbVerifierBytes))) != 1 ||\n\t\tsubtle.ConstantTimeCompare(verifierBytes[:], dbVerifierBytes) != 1 {\n\t\tlogger.Info(\"stored confirm verifier does not match provided one\")\n\t\treturn c.invalidToken(w, r)\n\t}\n\n\tuser.PutConfirmSelector(\"\")\n\tuser.PutConfirmVerifier(\"\")\n\tuser.PutConfirmed(true)\n\n\tlogger.Infof(\"user %s confirmed their account\", user.GetPID())\n\tif err = c.Authboss.Config.Storage.Server.Save(r.Context(), user); err != nil {\n\t\treturn err\n\t}\n\n\tro := authboss.RedirectOptions{\n\t\tCode: http.StatusTemporaryRedirect,\n\t\tSuccess: \"You have successfully confirmed your account.\",\n\t\tRedirectPath: c.Authboss.Config.Paths.ConfirmOK,\n\t}\n\treturn c.Authboss.Config.Core.Redirector.Redirect(w, r, ro)\n}", "title": "" }, { "docid": "29cee449a897cd8cef229e23bdc65513", "score": "0.45596254", "text": "func (c *Connector) ConfirmedBalance() (decimal.Decimal, error) {\n\tbalance, err := c.client.GetBalanceByLabel(allAccounts, c.cfg.MinConfirmations)\n\tif err != nil {\n\t\treturn decimal.Zero, err\n\t}\n\n\treturn decimal.NewFromFloat(balance.ToBTC()).Round(8), nil\n}", "title": "" }, { "docid": "029e526f5884e61088ad9950a229b3d4", "score": "0.455751", "text": "func ProviderEQ(v string) predicate.Account {\n\treturn predicate.Account(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldProvider), v))\n\t})\n}", "title": "" }, { "docid": "6a095e70fa9ad37820cc2743839261a6", "score": "0.45386398", "text": "func VerifyDateEQ(v string) predicate.QccEnterpriseData {\n\treturn predicate.QccEnterpriseData(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldVerifyDate), v))\n\t})\n}", "title": "" }, { "docid": "7c994b6525dbc3e84180dbd7a672eb96", "score": "0.4538079", "text": "func EligibilityCriteriaEQ(v string) predicate.StudyEligibility {\n\treturn predicate.StudyEligibility(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldEligibilityCriteria), v))\n\t})\n}", "title": "" }, { "docid": "18060397f7a18736200e1d47ade51154", "score": "0.4536323", "text": "func MsgFeatureEQ(v int8) predicate.Message {\n\treturn predicate.Message(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldMsgFeature), v))\n\t})\n}", "title": "" }, { "docid": "650a24effd562a61a4eb1d358e8af09d", "score": "0.45098832", "text": "func ArchivedEQ(v bool) predicate.GithubRepository {\n\treturn predicate.GithubRepository(sql.FieldEQ(FieldArchived, v))\n}", "title": "" } ]
579f1038696d639c4380fc8c606fe126
newNumeric creates a Numeric vindex.
[ { "docid": "987ce0078f9fb5d48e937b64f2b886c4", "score": "0.8588692", "text": "func newNumeric(name string, m map[string]string) (Vindex, error) {\n\treturn &Numeric{\n\t\tname: name,\n\t\tunknownParams: FindUnknownParams(m, nil),\n\t}, nil\n}", "title": "" } ]
[ { "docid": "aed9c703fc6573c2f387dbc5e2c59530", "score": "0.7162552", "text": "func New(num, den numint) *Numeric {\n\tif den < 0 {\n\t\tnum, den = -num, -den\n\t}\n\treturn &Numeric{num: num, den: den}\n}", "title": "" }, { "docid": "da45181cb67d4b10611529408fbce615", "score": "0.6565974", "text": "func NewNumericField(name string) Field {\n\treturn Field{\n\t\tName: name,\n\t\tType: NumericField,\n\t}\n}", "title": "" }, { "docid": "46f922135f759f871c2a414b6fb00551", "score": "0.6507748", "text": "func newNumber(p int, text string) (*NumberNode, error) {\n\tn := &NumberNode{\n\t\tpos: pos(p),\n\t}\n\ti, err := strconv.ParseInt(text, 10, 64)\n\tif err == nil {\n\t\tn.IsInt = true\n\t\tn.Int64 = i\n\t\tif n.Int64 < 0 {\n\t\t\tpanic(\"parser should not allow for negative number nodes\")\n\t\t}\n\t} else {\n\t\tf, err := strconv.ParseFloat(text, 64)\n\t\tif err == nil {\n\t\t\tn.IsFloat = true\n\t\t\tn.Float64 = f\n\t\t\tif n.Float64 < 0 {\n\t\t\t\tpanic(\"parser should not allow for negative number nodes\")\n\t\t\t}\n\t\t}\n\t}\n\tif !n.IsInt && !n.IsFloat {\n\t\treturn nil, fmt.Errorf(\"illegal number syntax: %q\", text)\n\t}\n\treturn n, nil\n}", "title": "" }, { "docid": "3ea5dbac2ed80fabb7e64708d896e143", "score": "0.65068024", "text": "func NewNumber(v string) Node {\n return Node{\n v: int64(len(v) & _LEN_MASK),\n p: rt.StrPtr(v),\n t: _V_NUMBER,\n }\n}", "title": "" }, { "docid": "78400ba0ae312d366004a142085808bf", "score": "0.61438537", "text": "func createNumericNode(stringValue string) Node {\n\tn, err := strconv.Atoi(stringValue)\n\tif err != nil {\n\t\tfmt.Fprintf(os.Stderr, \"creating tree.Numeric node from %q: %v\\n\",\n\t\t\tstringValue, err)\n\t\treturn nil\n\t}\n\treturn &NumericNode{Data: n}\n}", "title": "" }, { "docid": "6cc9984cb4d27bff6a01edbe5f19cc53", "score": "0.6076488", "text": "func NewNumericNodeID(ns uint16, id uint32) *NodeID {\n\treturn &NodeID{\n\t\tmask: TypeNumeric,\n\t\tns: ns,\n\t\tnid: id,\n\t}\n}", "title": "" }, { "docid": "8c7e80ecc2dccabdf056fde311e96cc0", "score": "0.59520155", "text": "func CreateNumeric(numberRepr []string) (root *NumericNode) {\n\n\tfor _, str := range numberRepr {\n\t\tval, err := strconv.Atoi(str)\n\n\t\tif err == nil {\n\t\t\troot = Insert(root, val)\n\t\t} else {\n\t\t\tfmt.Fprintf(os.Stderr, \"Problem with %q: %s\\n\", str, err)\n\t\t}\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "c436bfcf9e2ceffd59636b3b815646e6", "score": "0.58928466", "text": "func NewNodeIDNumeric(ns uint16, id uint32) NodeIDNumeric {\n\treturn NodeIDNumeric{ns, id}\n}", "title": "" }, { "docid": "2aa0581b044d25b0374ed86ce1e03f09", "score": "0.586634", "text": "func NumericNode(key string, value float64) (current *Node) {\n\tcurrent = &Node{\n\t\t_type: Numeric,\n\t\tkey: &key,\n\t\tdirty: true,\n\t}\n\tcurrent.value.Store(value)\n\treturn\n}", "title": "" }, { "docid": "1b56d1ddba5e3a86b06177840b96bc90", "score": "0.58066493", "text": "func NewNumericDate(t time.Time) *NumericDate {\n\treturn jwt.NewNumericDate(t)\n}", "title": "" }, { "docid": "8b5a580bbe2d865c806ab27fad858263", "score": "0.5778915", "text": "func NewNumber(i *debug.Information) Number {\n\treturn Number{i}\n}", "title": "" }, { "docid": "42cb5cfce87e325e4296875b65ba6358", "score": "0.5740472", "text": "func New(hi int64, lo uint64) Num {\n\treturn Num{lo: lo, hi: hi}\n}", "title": "" }, { "docid": "73a30eddb457fe20190b00739da9d22f", "score": "0.5678617", "text": "func New(t token.Token, nu, de expr.Expr) expr.Expr {\n\treturn arithmetic{\n\t\tt: t,\n\t\tnu: nu,\n\t\tde: de,\n\t}\n}", "title": "" }, { "docid": "e3423bbf25b4413207687deadd4796b2", "score": "0.5623539", "text": "func CreateNumericFromString(stringrep string) (root *NumericNode) {\n\tgeneric := GeneralCreateFromString(stringrep, createNumericNode)\n\tvar ok bool\n\tif root, ok = generic.(*NumericNode); ok {\n\t\treturn\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "22c6e131b28446bfb70f080172a8cb05", "score": "0.5570536", "text": "func newNumericNotEqualsFunc(key Key, values ValueSet, qualifier string) (Function, error) {\n\treturn newNumericFunc(numericNotEquals, key, values, notEquals)\n}", "title": "" }, { "docid": "f8fda84080e459ab0ca163b282c32a21", "score": "0.5552461", "text": "func NewNumeral(v interface{}) (Numeral, error) {\n\tvar n Numeral\n\tswitch t := v.(type) {\n\tcase string:\n\t\tif !pattern().Match([]byte(t)) {\n\t\t\treturn n, ErrInvalidNumeral\n\t\t}\n\t\tn.value = t\n\tcase uint:\n\t\tn.value = itoa(t)\n\tcase int:\n\t\tif t < 0 {\n\t\t\treturn n, ErrNegativeValue\n\t\t}\n\t\tn.value = itoa(uint(t))\n\t}\n\n\treturn n, nil\n}", "title": "" }, { "docid": "f802352f23de6b2e8a0521ace48158c4", "score": "0.5534573", "text": "func newNumericEqualsFunc(key Key, values ValueSet, qualifier string) (Function, error) {\n\treturn newNumericFunc(numericEquals, key, values, equals)\n}", "title": "" }, { "docid": "7725c7a024ff4767059a545116426416", "score": "0.5362805", "text": "func NewNumericEqualsFunc(key Key, value int) (Function, error) {\n\treturn &numericFunc{n: name{name: numericEquals}, k: key, value: value, c: equals}, nil\n}", "title": "" }, { "docid": "9fd4a6e5803e8ecd7929c36409db2b90", "score": "0.53470075", "text": "func newMetric(vl api.ValueList, index int, md metadata) (prometheus.Metric, error) {\n\tvar value float64\n\tvar valueType prometheus.ValueType\n\n\tswitch v := vl.Values[index].(type) {\n\tcase api.Gauge:\n\t\tvalue = float64(v)\n\t\tvalueType = prometheus.GaugeValue\n\tcase api.Derive:\n\t\tvalue = float64(v)\n\t\tvalueType = prometheus.CounterValue\n\tcase api.Counter:\n\t\tvalue = float64(v)\n\t\tvalueType = prometheus.CounterValue\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"unknown value type: %T\", v)\n\t}\n\n\treturn prometheus.NewConstMetric(newDesc(vl, index, md), valueType, value)\n}", "title": "" }, { "docid": "f11f1a88ea16bdea3a9762199ee7e428", "score": "0.532829", "text": "func newNumericLessThanFunc(key Key, values ValueSet, qualifier string) (Function, error) {\n\treturn newNumericFunc(numericLessThan, key, values, lessThan)\n}", "title": "" }, { "docid": "dc9f31febd1aee4fe9a7d4c874af0374", "score": "0.53108853", "text": "func (s Calculator_add_Params) NewNumbers(n int32) (capnp.Int32List, error) {\n\tl, err := capnp.NewInt32List(s.Struct.Segment(), n)\n\tif err != nil {\n\t\treturn capnp.Int32List{}, err\n\t}\n\terr = s.Struct.SetPtr(0, l.List.ToPtr())\n\treturn l, err\n}", "title": "" }, { "docid": "3f262343dd62b37736f50cf5ebdd9ff4", "score": "0.5280399", "text": "func NewNumericNotEqualsFunc(key Key, value int) (Function, error) {\n\treturn &numericFunc{n: name{name: numericNotEquals}, k: key, value: value, c: notEquals}, nil\n}", "title": "" }, { "docid": "2be85c3572d4ecb836dfd6a1b9e8f00b", "score": "0.5270489", "text": "func NewNumericalField(storage *Storage, datasetName string, datasetStorageName string, key string, label string, typ string, count string) *NumericalField {\n\tcount = getCountSQL(count)\n\n\tfield := &NumericalField{\n\t\tBasicField: BasicField{\n\t\t\tStorage: storage,\n\t\t\tDatasetName: datasetName,\n\t\t\tDatasetStorageName: datasetStorageName,\n\t\t\tKey: key,\n\t\t\tLabel: label,\n\t\t\tType: typ,\n\t\t\tCount: count,\n\t\t},\n\t}\n\n\treturn field\n}", "title": "" }, { "docid": "5667a8d57e002bb223f83d292c1eea17", "score": "0.52536565", "text": "func newNumericLessThanEqualsFunc(key Key, values ValueSet, qualifier string) (Function, error) {\n\treturn newNumericFunc(numericLessThanEquals, key, values, lessThanEquals)\n}", "title": "" }, { "docid": "56af41949add5beef91952106a8e688d", "score": "0.5248028", "text": "func newRoutingNumberMutation(c config, op Op, opts ...routingnumberOption) *RoutingNumberMutation {\n\tm := &RoutingNumberMutation{\n\t\tconfig: c,\n\t\top: op,\n\t\ttyp: TypeRoutingNumber,\n\t\tclearedFields: make(map[string]struct{}),\n\t}\n\tfor _, opt := range opts {\n\t\topt(m)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "0aed686d5fb1dd96f8401d760aa9a68d", "score": "0.52330124", "text": "func Number(name string) Field {\n\treturn Field{\n\t\ttyp: OpaqueNumberField,\n\t\tname: name,\n\t}\n}", "title": "" }, { "docid": "d2cb6901a6cd338fc355badc7459be13", "score": "0.5223617", "text": "func Numeric(lenght int) string {\n\treturn randFromRunes(numbers, lenght)\n}", "title": "" }, { "docid": "a158033019811e6eeb2c6c6b0973532c", "score": "0.5208683", "text": "func NewIndex(i int) Index {\n\treturn Index{i}\n}", "title": "" }, { "docid": "bb49880f51a308c594e0fb8b37a997c4", "score": "0.5187064", "text": "func newIndex() *Index {\n\tix := &Index{arr: make(map[string]int)}\n\treturn ix\n}", "title": "" }, { "docid": "0d488fcc47da87567c4b6ea5f00ecd12", "score": "0.5138316", "text": "func NewSortableNumericField(name string) Field {\n\tf := NewNumericField(name)\n\tf.Options = NumericFieldOptions{\n\t\tSortable: true,\n\t}\n\treturn f\n}", "title": "" }, { "docid": "a57f278be11a94207bcb7b78fa0463f3", "score": "0.5125621", "text": "func NewNode(i int) V {\n\treturn V(i)\n}", "title": "" }, { "docid": "682ea1ededd82370b3f1a98887e4aba6", "score": "0.5117934", "text": "func CreateNumber(slots uint, period time.Duration) Number {\n return &rollingNumber{\n buckets: createCircularArray(slots, period),\n }\n}", "title": "" }, { "docid": "08b7ee11ea827e1c1d0b78af00f93b63", "score": "0.5108848", "text": "func NewInt(name string) Int {\n\treturn expvar.NewInt(name)\n}", "title": "" }, { "docid": "5443c436fe555036d3b08f68f3c276c3", "score": "0.5096449", "text": "func NewNumberOnly() *NumberOnly {\n this := NumberOnly{}\n return &this\n}", "title": "" }, { "docid": "6536acba0431460ba8e7172ba04ffa90", "score": "0.50924253", "text": "func newNumericGreaterThanFunc(key Key, values ValueSet, qualifier string) (Function, error) {\n\treturn newNumericFunc(numericGreaterThan, key, values, greaterThan)\n}", "title": "" }, { "docid": "c1d2666959fc3ce2cdd3cbcc26ce145b", "score": "0.50883555", "text": "func (bNum BigIntNum) New() BigIntNum {\n\tb := BigIntNum{}\n\tb.Empty()\n\treturn b\n}", "title": "" }, { "docid": "92f3b83d23dacaf6befe743a80684752", "score": "0.5078793", "text": "func NewIndex() (newIndex string) {\n\tlst := GetAllValidators()\n\tif lst == nil {\n\t\tnewIndex = \"1\"\n\t} else {\n\t\tlastValidator := lst[len(lst)-1]\n\t\ti, _ := strconv.Atoi(lastValidator.Index)\n\t\ti = i + 1\n\t\tnewIndex = strconv.Itoa(i)\n\t}\n\treturn newIndex\n}", "title": "" }, { "docid": "71fd7667d64b1de8f8e0911a84e0546e", "score": "0.50690174", "text": "func (findingsApi *FindingsApiV1) NewNumericCardElement(kind string, text string, valueType interface{}) (model *NumericCardElement, err error) {\n\tmodel = &NumericCardElement{\n\t\tKind: core.StringPtr(kind),\n\t\tText: core.StringPtr(text),\n\t\tValueType: valueType,\n\t}\n\terr = core.ValidateStruct(model, \"required parameters\")\n\treturn\n}", "title": "" }, { "docid": "40a2d218721d43d81e520f9baebb993a", "score": "0.50407755", "text": "func Copy(x *Numeric) *Numeric {\n\treturn &Numeric{x.num, x.den}\n}", "title": "" }, { "docid": "a6dc6ce25b76e1011ae8ea6936738c27", "score": "0.5038958", "text": "func newNumericGreaterThanEqualsFunc(key Key, values ValueSet, qualifier string) (Function, error) {\n\treturn newNumericFunc(numericGreaterThanEquals, key, values, greaterThanEquals)\n}", "title": "" }, { "docid": "2c8327e548f06dbdc4a42d6c4c99faea", "score": "0.50272995", "text": "func FromString(v string) (*Numeric, error) {\n\tvar n Numeric\n\n\tidx := strings.IndexByte(v, '/')\n\tif idx < 0 {\n\t\tnum1, err := atoi(v)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tn.num = num1\n\t\tn.den = 1\n\t} else {\n\t\tnum1, err := atoi(v[0:idx])\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tden1, err := atoi(v[idx+1:])\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif den1 < 0 {\n\t\t\tnum1, den1 = -num1, -den1\n\t\t}\n\t\tn.num = num1\n\t\tn.den = den1\n\t}\n\treturn &n, nil\n}", "title": "" }, { "docid": "66ecc3f33710f1a2d9b1499c1949a255", "score": "0.50072426", "text": "func NewIndex(t reflect.Type, l ...Less) *Index {\n\treturn &Index{\n\t\tkeys: []IndexElement{},\n\t\tt: t,\n\t\tless: l,\n\t}\n}", "title": "" }, { "docid": "327627f0b4438545cf294148b4835847", "score": "0.5006483", "text": "func NewNumericLessThanFunc(key Key, value int) (Function, error) {\n\treturn &numericFunc{n: name{name: numericLessThan}, k: key, value: value, c: lessThan}, nil\n}", "title": "" }, { "docid": "b7a7bda3a99aecff45974f40ff40fbbe", "score": "0.4996486", "text": "func newInternalVariable(pcs *compiled.SparseR1CS, t ...compiled.Term) compiled.Term {\n\n\tif len(t) == 0 {\n\t\tcID := coeffID(pcs, bOne)\n\t\tvID := pcs.NbInternalVariables\n\t\tres := compiled.Pack(vID, cID, compiled.Internal)\n\t\tpcs.NbInternalVariables++\n\t\treturn res\n\t}\n\tres := t[0]\n\tcID := coeffID(pcs, &pcs.Coeffs[res.CoeffID()])\n\tvID := pcs.NbInternalVariables\n\tres.SetCoeffID(cID)\n\tres.SetVariableID(vID)\n\tpcs.NbInternalVariables++\n\treturn res\n\n}", "title": "" }, { "docid": "9a303cfd3b2ea42eb54d4461626a9abe", "score": "0.495637", "text": "func newColumn(t T, n int) vector {\n\tswitch t {\n\tcase Int64Type:\n\t\treturn &column{t: t, col: make([]int64, n)}\n\tcase Float64Type:\n\t\treturn &column{t: t, col: make([]float64, n)}\n\tdefault:\n\t\tpanic(fmt.Sprintf(\"unhandled type\",))\n\t}\n}", "title": "" }, { "docid": "52282ae2d88992acc6c1f87f41e8d970", "score": "0.49550688", "text": "func FromNumeric(numeric string) (Currency, error) {\n\tif c, ok := fromNumeric[numeric]; ok {\n\t\treturn c, nil\n\t}\n\treturn Currency(0), Error(\"no currency exists with numeric code \" + numeric)\n}", "title": "" }, { "docid": "f520b995846259c204b86bfed753aa89", "score": "0.49408087", "text": "func New(data []byte) *Index {\n\treturn &Index{data, qsufsort(data)}\n}", "title": "" }, { "docid": "d2954417da6b1d902350519e473f9d2c", "score": "0.49380141", "text": "func newgeneric(fields [][]byte, chromCol int, startCol int, endCol int, zeroBased bool) (*parsers.Interval, error) {\n\ts, err := strconv.Atoi(unsafeString(fields[startCol]))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif !zeroBased {\n\t\ts -= 1\n\t}\n\te, err := strconv.Atoi(unsafeString(fields[endCol]))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn parsers.NewInterval(string(fields[chromCol]), uint32(s), uint32(e), fields, uint32(0), nil), nil\n}", "title": "" }, { "docid": "db70d38704a39d784d42a311fa651095", "score": "0.4937719", "text": "func (c Currency) Numeric() string { return currencies[c].numeric }", "title": "" }, { "docid": "e0f2945b9d10ef021e363c7c989a9736", "score": "0.49337363", "text": "func NewIndex(val int64) Index {\n\treturn Index{\n\t\tHasVal: true,\n\t\tVal: val,\n\t}\n}", "title": "" }, { "docid": "e6b5e758bf06dac869eb216ee6f29fe8", "score": "0.486612", "text": "func NewIndex(root string) Index {\n\treturn Index{root}\n}", "title": "" }, { "docid": "00aa2b4ee91d1abe654153c07247059c", "score": "0.48557487", "text": "func newCounter(name string) *counter {\r\n\treturn &counter{Name: name}\r\n}", "title": "" }, { "docid": "9ff3012c22e97d0783f4b4a8e9bd411d", "score": "0.48500827", "text": "func VecNew(m float64, u []float64) []float64 {\n\treturn []float64{m * u[0], m * u[1], m * u[2]}\n}", "title": "" }, { "docid": "39c910b424a9aba5abe3c02cbf393fb4", "score": "0.4845134", "text": "func newFloat(prec2 uint32) *Float {\n\tz := new(Float)\n\t// nat.make ensures the slice length is > 0\n\tz.mant = z.mant.make(int(prec2/_W) * 2)\n\treturn z\n}", "title": "" }, { "docid": "e8d8c49308c58b791bdfd507c466adde", "score": "0.48299706", "text": "func newHeaderIndex(tx walletdb.ReadWriteTx, indexType string) (*headerIndex, er.R) {\n\t// Drop the old bucket if it happens to exist\n\tif err := tx.DeleteTopLevelBucket(oldIndexBucket); err != nil && !walletdb.ErrBucketNotFound.Is(err) {\n\t\treturn nil, err\n\t}\n\n\thi := &headerIndex{\n\t\tindexType: []byte(indexType),\n\t}\n\n\tif err := hi.createBuckets(tx); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn hi, nil\n}", "title": "" }, { "docid": "6e02c67d90ad7d28a3c16ff1d7aebd56", "score": "0.48282614", "text": "func newDur(p int, text string) (*DurationNode, error) {\n\tn := &DurationNode{\n\t\tpos: pos(p),\n\t}\n\td, err := influxql.ParseDuration(text)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tn.Dur = d\n\treturn n, nil\n}", "title": "" }, { "docid": "0c332b4324cd6aa279a48148a15ab4be", "score": "0.4814469", "text": "func NewNumericLessThanEqualsFunc(key Key, value int) (Function, error) {\n\treturn &numericFunc{n: name{name: numericLessThanEquals}, k: key, value: value, c: lessThanEquals}, nil\n}", "title": "" }, { "docid": "24f561255ca79ed07ca093bb351a6c61", "score": "0.4811306", "text": "func newVersion(s *session) *version {\n\tid := atomic.AddInt64(&s.ntVersionId, 1)\n\tnv := &version{s: s, id: id - 1}\n\treturn nv\n}", "title": "" }, { "docid": "d1d1440e0d45de36b080c0d5dcadfb79", "score": "0.47977725", "text": "func New() *T {\n\treturn &T{\n\t\tCosts: element.Count{},\n\t}\n}", "title": "" }, { "docid": "70c1e96fa5d73bde761d0413daffd90e", "score": "0.477513", "text": "func mkNumber(num *big.Int) *SExpr {\n\treturn &SExpr{atom: &token{typ: tokenNumber, num: num}}\n}", "title": "" }, { "docid": "a640cb833cc1ca568623f770b9f4e216", "score": "0.47731286", "text": "func NewNumberClient() NumberClient {\n return NewNumberClientWithBaseURI(DefaultBaseURI, )\n}", "title": "" }, { "docid": "81fb36ff2241289b34f2d905cd5faab1", "score": "0.4772022", "text": "func newIndexedDictionary(min, max int32) *IndexedDictionary {\n\tid := &IndexedDictionary{\n\t\tPorts: make(map[int32]bool, max-min+1),\n\t\tGameServerPorts: make(map[string]string, max-min+1),\n\t\tIndexes: make([]int32, max-min+1),\n\t\tMin: min,\n\t\tMax: max,\n\t}\n\treturn id\n}", "title": "" }, { "docid": "86aae75ac2e4612d0215593b854fc1cf", "score": "0.47709024", "text": "func NewInt(name string) *Int {\n newObj := &Int {\n name : name,\n }\n\n return newObj\n}", "title": "" }, { "docid": "e7e67bf9fa16a628ed2ae68675cc72c9", "score": "0.47642547", "text": "func NewInt(v Int) *Int { return &v }", "title": "" }, { "docid": "e7e67bf9fa16a628ed2ae68675cc72c9", "score": "0.47642547", "text": "func NewInt(v Int) *Int { return &v }", "title": "" }, { "docid": "d8f605ad57a8d9818338b5d77d8fccfc", "score": "0.47508007", "text": "func (l *Lexer) nextNumericToken() {\n\tstart := l.lastPos\n\tl.nextNumber()\n\tl.CurrentNumeral = l.source.Content[start:l.lastPos]\n\n\tif startsIdentifier(l.ch, l.peek(0), l.peek(1)) {\n\t\tdimenStart := l.lastPos\n\t\tl.nextName()\n\t\tl.CurrentString = l.source.Content[dimenStart:l.lastPos]\n\t\tl.Current = Dimension\n\t} else if l.ch == '%' {\n\t\tl.Current = Percentage\n\t\tl.step()\n\t} else {\n\t\tl.Current = Number\n\t}\n}", "title": "" }, { "docid": "3644eed30ba118342e49dba5d207d100", "score": "0.47356516", "text": "func (birO BigIntNumReadOnly) NewNumStr(numStr string) (BigIntNumReadOnly, error) {\n\n\tePrefix := \"BigIntNumReadOnly.NewNumStr() \"\n\n\treadOnly, err := BigIntNum{}.NewNumStr(numStr)\n\n\n\tif err != nil {\n\t\treturn BigIntNumReadOnly{},\n\t\t\tfmt.Errorf(ePrefix + \"Error returned by BigIntNum{}.NewNumStr(numStr). \" +\n\t\t\t\t\"Error='%v' \", err.Error())\n\t}\n\n\tbiRo := BigIntNumReadOnly{}\n\n\tbiRo.bigIntNum = BigIntNum{}.NewZero(0)\n\tbiRo.bigIntNum.CopyIn(readOnly)\n\n\treturn biRo, nil\n}", "title": "" }, { "docid": "90170d6d6e769b852bd01ad32f43d361", "score": "0.47274035", "text": "func NewFromInt(i int64) Decimal {\n\treturn Decimal(i) * scaleFactor\n}", "title": "" }, { "docid": "9912d90fb334ac3ac8b1e4ab0dcd519f", "score": "0.47190523", "text": "func NewNumericGreaterThanFunc(key Key, value int) (Function, error) {\n\treturn &numericFunc{n: name{name: numericGreaterThan}, k: key, value: value, c: greaterThan}, nil\n}", "title": "" }, { "docid": "93b4c9b1cdc1684ccd0184fbe650af53", "score": "0.46962887", "text": "func newVBox(colors []QuantizedColor, histogram []uint32, lowerIndex uint32, upperIndex uint32) *vBox {\n\tvbox := &vBox{\n\t\tcolors: colors,\n\t\thistogram: histogram,\n\t\tlowerIndex: lowerIndex,\n\t\tupperIndex: upperIndex,\n\t}\n\tvbox.fit()\n\treturn vbox\n}", "title": "" }, { "docid": "73bad4ade38feed6f02cb4652ee89843", "score": "0.4690953", "text": "func NewNumericalFieldSubSelect(storage *Storage, datasetName string, datasetStorageName string, key string, label string, typ string, count string, fieldSubSelect func() string) *NumericalField {\n\tcount = getCountSQL(count)\n\n\tfield := &NumericalField{\n\t\tBasicField: BasicField{\n\t\t\tStorage: storage,\n\t\t\tDatasetName: datasetName,\n\t\t\tDatasetStorageName: datasetStorageName,\n\t\t\tKey: key,\n\t\t\tLabel: label,\n\t\t\tType: typ,\n\t\t\tCount: count,\n\t\t},\n\t\tsubSelect: fieldSubSelect,\n\t}\n\n\treturn field\n}", "title": "" }, { "docid": "9d72f8aab956522eaf67b4b33550c3e6", "score": "0.46880656", "text": "func newAttrRange(low, high, attrIdx int) *AttrRange {\n\treturn &AttrRange{\n\t\tLow: low,\n\t\tHigh: high,\n\t\tAttrIdx: attrIdx,\n\t}\n}", "title": "" }, { "docid": "ed9a1fd185ce73a5192fed0ce03713f8", "score": "0.46874282", "text": "func newResult(t string, l int, v string) Result {\n\treturn Result{t, l, v}\n}", "title": "" }, { "docid": "2457750e3be79242cfaeb6ebe3b49ddd", "score": "0.4681687", "text": "func (t *TermNode) NumericLiteral() float32 {\n\treturn t.numericLiteral\n}", "title": "" }, { "docid": "69bf9694bfaf41d986c6f8d7c3da4e51", "score": "0.46658197", "text": "func (s *BaseJPAListener) EnterNumeric_literal(ctx *Numeric_literalContext) {}", "title": "" }, { "docid": "f0bc2e5387441f4ff1a46a343207625b", "score": "0.46621177", "text": "func (self *Lexer) number() *Token {\n\tret := \"\"\n\tfor self.currChar != 0 && unicode.IsDigit(self.currChar) {\n\t\tret += string(self.currChar)\n\t\tself.advance()\n\t}\n\tif self.currChar == '.' {\n\t\tret += string(self.currChar)\n\t\tself.advance()\n\t\tfor self.currChar != 0 && unicode.IsDigit(self.currChar) {\n\t\t\tret += string(self.currChar)\n\t\t\tself.advance()\n\t\t}\n\t\treturn newToken(cTokenTypeOfRealConst, sysutils.StrToDouble(ret))\n\t}\n\treturn newToken(cTokenTypeOfIntegerConst, sysutils.StrToInt(ret))\n}", "title": "" }, { "docid": "bb7b292e8b80804592d9bbd127ab484b", "score": "0.46473193", "text": "func NewNumericGreaterThanEqualsFunc(key Key, value int) (Function, error) {\n\treturn &numericFunc{n: name{name: numericGreaterThanEquals}, k: key, value: value, c: greaterThanEquals}, nil\n}", "title": "" }, { "docid": "2fd11df8698f60d01ea1b303aa937eab", "score": "0.46463373", "text": "func newFieldZero() *fieldElt { return (*fieldElt)(big.NewInt(0)) }", "title": "" }, { "docid": "b8264c43ac4df2aa6240c86339addd2b", "score": "0.4645683", "text": "func (q *Quad) FromNumber(source *Number, ctx *Context) *Quad {\n\tC.decimal128FromNumber((*C.decimal128)(unsafe.Pointer(q)), source.DecNumber(), ctx.DecContext())\n\treturn q\n}", "title": "" }, { "docid": "c61c485bce9c8b9820c3bacab9d2dc70", "score": "0.4639247", "text": "func New(i int) Fixed {\n\treturn Fixed{fixed(i)}\n}", "title": "" }, { "docid": "400437b846ad957bed03a17efcf5bd6b", "score": "0.46340856", "text": "func New(sign int8, coef uint64, exp int) Dnum {\n\tif sign == 0 || coef == 0 || exp < expMin {\n\t\treturn Zero\n\t} else if sign == signPosInf {\n\t\treturn PosInf\n\t} else if sign == signNegInf {\n\t\treturn NegInf\n\t} else {\n\t\tatmax := false\n\t\tfor coef > coefMax {\n\t\t\tcoef = (coef + 5) / 10 // drop/round least significant digit\n\t\t\texp++\n\t\t\tatmax = true\n\t\t}\n\t\tif !atmax {\n\t\t\tp := maxShift(coef)\n\t\t\tcoef *= pow10[p]\n\t\t\texp -= p\n\t\t}\n\t\tif exp > expMax {\n\t\t\treturn Inf(sign)\n\t\t}\n\t\treturn Dnum{coef, sign, int8(exp)}\n\t}\n}", "title": "" }, { "docid": "5020249110f805a2cb8de1ee4d8c5431", "score": "0.4633543", "text": "func NewInt64(x int64) *Numeric {\n\tvar r Numeric\n\treturn r.SetInt64(x)\n}", "title": "" }, { "docid": "ce91ecf2328891a549106541ab2bb843", "score": "0.46303535", "text": "func newGV() *gateValue {\n\treturn &gateValue{\n\t\tbroadcast: make(chan struct{}),\n\t}\n}", "title": "" }, { "docid": "6b5595b6588c5d64f29f24a511fe99c8", "score": "0.46286854", "text": "func fnNew() *int {\n\treturn new(int)\n}", "title": "" }, { "docid": "26b6818c135bd637c116ab7d5d0e28f9", "score": "0.46220008", "text": "func newDHGroup(g, p *big.Int) *dhGroup {\n\treturn &dhGroup{\n\t\tg: g,\n\t\tp: p,\n\t\tpMinus1: new(big.Int).Sub(p, bigOne),\n\t}\n}", "title": "" }, { "docid": "22c36d686119d2a5df1965886bf11bbd", "score": "0.46164054", "text": "func NewIndex(index map[Asset]decimal.Decimal) (Index, error) {\n\tif len(index) == 0 {\n\t\treturn nil, ErrEmptyIndex\n\t}\n\tindexTotal := decimal.Zero\n\tfor asset, percentage := range index {\n\t\tif string(asset) != strings.ToUpper(string(asset)) {\n\t\t\treturn nil, ErrInvalidAsset\n\t\t}\n\t\tif _, ok := globalPricelist[asset]; !ok {\n\t\t\treturn nil, ErrAssetMissingFromPricelist\n\t\t}\n\t\tif percentage.LessThan(decimal.Zero) || percentage.Equal(decimal.Zero) {\n\t\t\treturn nil, ErrInvalidAssetAmount{Asset: asset, Amount: percentage}\n\t\t}\n\t\tindexTotal = indexTotal.Add(percentage)\n\t}\n\tif !indexTotal.Equal(decimal.NewFromFloat(1)) {\n\t\treturn nil, ErrIndexSumIncorrect\n\t}\n\treturn index, nil\n}", "title": "" }, { "docid": "1b186c8028c4aa8eb3012f1e8ab80c45", "score": "0.45953062", "text": "func (bNum BigIntNum) NewTen(precision uint) BigIntNum {\n\n\tb := BigIntNum{}.NewZero(0)\n\n\tif precision == 0 {\n\t\tb.SetBigInt(big.NewInt(10), 0)\n\t\treturn b\n\t}\n\n\tscaleVal := big.NewInt(0).Exp(big.NewInt(10), big.NewInt(int64(precision)), nil)\n\tnewVal := big.NewInt(0).Mul(big.NewInt(10), scaleVal)\n\tb.SetBigInt(newVal, precision)\n\n\treturn b\n\n}", "title": "" }, { "docid": "0139c13cbd587e956a4d14a676d79e66", "score": "0.45952004", "text": "func NewVector(g *ExprGraph, t Dtype, opts ...NodeConsOpt) *Node {\n\ttt := newTensorType(1, t)\n\tcurOpts := []NodeConsOpt{withType(tt), withGraph(g)}\n\tcurOpts = append(curOpts, opts...)\n\n\treturn newUniqueNode(curOpts...)\n}", "title": "" }, { "docid": "f848557879d460d2b14be361f31e2fd7", "score": "0.45854893", "text": "func New(value *big.Int) *BigInt {\n\tb := BigInt(*value)\n\treturn &b\n}", "title": "" }, { "docid": "4d7cfd1158afb294ba522e34e775c787", "score": "0.45851654", "text": "func NewInt(v int) *int { return &v }", "title": "" }, { "docid": "c86724741bd430e66a12523849afd215", "score": "0.45828924", "text": "func (birO BigIntNumReadOnly) NewBigIntNum(biNum BigIntNum) BigIntNumReadOnly {\n\n\tbirO2 := BigIntNumReadOnly{}\n\tbirO2.bigIntNum = BigIntNum{}.NewZero(0)\n\tbirO2.bigIntNum.CopyIn(biNum)\n\treturn birO2\n}", "title": "" }, { "docid": "8c594fcd1c439baf8ad9575090313b61", "score": "0.45822737", "text": "func NewBigNumber[T IBigNumber]() IBigNumber {\n\ta := *new(T)\n\treturn a.initValue()\n}", "title": "" }, { "docid": "680ba06f3e0d9ab8a936d90cdce3c727", "score": "0.45769352", "text": "func (*Numeric) Cost() int {\n\treturn 0\n}", "title": "" }, { "docid": "f36cf25b51fbef6717a75aeebe5485b4", "score": "0.4572664", "text": "func (c *funcScope) newLocal(name string) int {\n\treturn c.newVariable(varLocal, name)\n}", "title": "" }, { "docid": "c2c8523ed10f87ecf2db7f19af5f8f1c", "score": "0.45699835", "text": "func (c *funcScope) newVariable(t varType, name string) int {\n\treturn c.vars.newVariable(t, name)\n}", "title": "" }, { "docid": "533fc5a2fefd482c84d4176b76a1a3c3", "score": "0.45676905", "text": "func NewIndexableBlockNumber(bigint *big.Int, hash common.Hash) *IndexableBlockNumber {\n\tif bigint == nil {\n\t\treturn nil\n\t}\n\tnumber := hexutil.Big(*bigint)\n\treturn &IndexableBlockNumber{\n\t\tNumber: number,\n\t\tDigits: len(number.String()) - 2,\n\t\tHash: hash,\n\t}\n}", "title": "" }, { "docid": "b1499dc7251c5eae682c29553c6bc925", "score": "0.45676503", "text": "func newIndex(logger logger.Logger, items []*model.Item, name string, indexValueFunc indexValueProvider) *FullTextIndex {\n\n\tindex := &FullTextIndex{\n\t\tlogger: logger,\n\t\tfilesystem: &afero.MemMapFs{},\n\t\tindexValueFunc: indexValueFunc,\n\t}\n\n\tindex.initialize(items)\n\n\treturn index\n}", "title": "" }, { "docid": "a760ed5930d50f627f723d542434a7b1", "score": "0.4563503", "text": "func newNull(name string, m map[string]string) (Vindex, error) {\n\treturn &Null{\n\t\tname: name,\n\t\tunknownParams: FindUnknownParams(m, nil),\n\t}, nil\n}", "title": "" }, { "docid": "10578395ccd0615c8847645ece92c397", "score": "0.4558675", "text": "func buildNumTree(count int, random bool) (Tree, []int) {\n\ttr := New()\n\tindexes := make([]int, count)\n\n\tif random {\n\t\tr := newRand()\n\t\tfor i := range indexes {\n\t\t\t// v := r.Int()\n\t\t\tv := int(r.Int31n(999))\n\t\t\ttr.Add(v, v)\n\t\t\tindexes[i] = v\n\t\t}\n\t} else {\n\t\tindexes = nil\n\t\tfor i := 0; i < count; i++ {\n\t\t\ttr.Add(i, i)\n\t\t}\n\t}\n\n\treturn tr, indexes\n}", "title": "" }, { "docid": "df6975755338ae1f800469da37f8875e", "score": "0.45575202", "text": "func newVertex(x, y float64, parent *Vertex) *Vertex {\n\treturn &Vertex{Point{x, y}, parent}\n}", "title": "" } ]
91b721979ddcdb9ec6ecd5e6d8c688a9
Cells are also formatted (physical) line by line where each physical line is the result of processing cell (irow, jcol) and should be given in the receiver of this method. Each invocation returns a string where each (physical) line is forrmatted according to the horizontal format specification of the jth column.
[ { "docid": "e02d8e5c0d47d1009d3ab160f9be03cf", "score": "0.618659", "text": "func (m multicell) Format(t *Table, irow, jcol int) string {\n\n\t// Formatting a multicell consists of simply returning its output string\n\t// but, in case this multicell spans until the right margin of the table,\n\t// then a separator has to be added in case this multicell has any\n\tif m.jinit+m.nbcolumns < len(t.columns) {\n\t\treturn m.output\n\t}\n\treturn m.output + m.clastsep\n}", "title": "" } ]
[ { "docid": "ac236c9279a43b4fff4aa9016552f7a9", "score": "0.607126", "text": "func (t *Grid) prepare() {\n\tif t.prepared {\n\t\treturn\n\t}\n\n\tg := [][]string{} //Grid\n\ti := 0\n\tww := make([]int, t.Columns())\n\tix := make([]int, 0)\n\tfor y, r := range t.rows {\n\t\th := r.Height()\n\t\tfor j := 0; j < h; j++ {\n\t\t\t// set up R x H new cells in the grid\n\t\t\tg = append(g, make([]string, len(r)))\n\t\t\tix = append(ix, 0)\n\t\t}\n\n\t\tfor x, c := range r {\n\t\t\tif w := c.Width(); w > ww[x] {\n\t\t\t\tww[x] = w\n\t\t\t}\n\n\t\t\tif y >= 2 {\n\t\t\t\tix[i] = y - 1 // from 1 ... n\n\t\t\t}\n\t\t\tfor j := 0; j < h; j++ {\n\t\t\t\tg[i+j][x] = c.Line(j)\n\t\t\t}\n\t\t}\n\t\ti += h\n\t}\n\n\tfml := make([]string, len(g)) //Format string for each line\n\t//Determine the format string for each cell. Start with the expected width of\n\t// a column, and alter if non-printing characters are found\n\tvar rowLineNum int\n\tfor _, row := range t.rows {\n\t\tffml := make([][]string, row.Height()) //Array of format strings for this row\n\t\t//Initialize inner slices to default column width values.\n\t\t// This corrects cases for multiple line cells, because it will fill in values for\n\t\t// the cells of the grid that don't actually have a cell line associated with it\n\t\tfor i := range ffml {\n\t\t\tffml[i] = make([]string, len(row))\n\t\t\tfor j := range ffml[i] {\n\t\t\t\tffml[i][j] = fmt.Sprintf(\"%%-%ds\", ww[j])\n\t\t\t}\n\t\t}\n\t\tfor cellNum, cell := range row {\n\t\t\tfor lineNum, cellLine := range cell {\n\t\t\t\toffset := len(cellLine) - visibleLen(cellLine)\n\t\t\t\tffml[lineNum][cellNum] = fmt.Sprintf(\"%%-%ds\", ww[cellNum]+offset)\n\t\t\t}\n\t\t}\n\t\tfor lineNum, lineFormat := range ffml { //Put each format line into fml\n\t\t\tfml[rowLineNum+lineNum] = strings.Join(lineFormat, \" \") //Format string for an entire line\n\t\t}\n\t\trowLineNum += row.Height()\n\t}\n\n\tt.index = ix\n\tt.data = make([]string, len(g))\n\tfor i, ss := range g {\n\t\tii := make([]interface{}, len(ss))\n\t\tfor n, s := range ss {\n\t\t\tii[n] = s\n\t\t}\n\t\tt.data[i] = strings.TrimRight(fmt.Sprintf(fml[i], ii...), \" \") + \"\\n\"\n\t}\n\n\tt.prepared = true\n}", "title": "" }, { "docid": "3cab5b78a466faf0ab81466bf8227b61", "score": "0.6049984", "text": "func renderLine(row []Cell) (string, int) {\n\twidth := len(row)\n\tif width == 0 {\n\t\treturn \"\", 0\n\t}\n\n\tlastCell := row[len(row)-1]\n\n\t// How many trailing whitespace characters are there matching lastCell?\n\ttrailerLength := 0\n\tif lastCell.Style.attrs.has(AttrBlink) {\n\t\t// This block intentionally left blank.\n\t\t//\n\t\t// Trailer is rendered by clearing to EOL, and AttrBlink will most\n\t\t// likely not survive that. Don't bother with any trailer in this case.\n\t} else if lastCell.Style.attrs.has(AttrReverse) {\n\t\t// This block intentionally left blank.\n\t\t//\n\t\t// Trailer is rendered by clearing to EOL, and AttrReverse didn't\n\t\t// survive that when I tried it using iTerm2 3.4.4 on my MacBook. Don't\n\t\t// bother with any trailer in this case.\n\t} else if lastCell.Rune == ' ' {\n\t\t// Line has a number of trailing spaces\n\t\tfor i := len(row) - 1; i >= 0; i-- {\n\t\t\tcurrentCell := row[i]\n\t\t\tif currentCell != lastCell {\n\t\t\t\tbreak\n\t\t\t}\n\t\t\ttrailerLength++\n\t\t}\n\t}\n\n\t// How many information carrying cells are there before the trailer?\n\theaderLength := len(row) - trailerLength\n\n\tvar builder strings.Builder\n\n\t// Set initial line style to normal\n\tbuilder.WriteString(\"\\x1b[m\")\n\tlastStyle := StyleDefault\n\n\tfor column := 0; column < headerLength; column++ {\n\t\tcell := row[column]\n\n\t\tstyle := cell.Style\n\t\truneToWrite := cell.Rune\n\t\tif !Printable(runeToWrite) {\n\t\t\t// Highlight unprintable runes\n\t\t\tstyle = Style{\n\t\t\t\tfg: NewColor16(7), // White\n\t\t\t\tbg: NewColor16(1), // Red\n\t\t\t\tattrs: AttrBold,\n\t\t\t}\n\t\t\truneToWrite = '?'\n\t\t}\n\n\t\tif style != lastStyle {\n\t\t\tbuilder.WriteString(style.RenderUpdateFrom(lastStyle))\n\t\t\tlastStyle = style\n\t\t}\n\n\t\tbuilder.WriteRune(runeToWrite)\n\t}\n\n\t// Set trailer attributes\n\ttrailerStyle := lastStyle.WithHyperlink(nil)\n\tbuilder.WriteString(trailerStyle.RenderUpdateFrom(lastStyle))\n\n\t// Clear to end of line\n\t// https://en.wikipedia.org/wiki/ANSI_escape_code#CSI_(Control_Sequence_Introducer)_sequences\n\tbuilder.WriteString(\"\\x1b[K\")\n\n\tif trailerStyle != StyleDefault {\n\t\t// Reset style after each line\n\t\tbuilder.WriteString(\"\\x1b[m\")\n\t}\n\n\treturn builder.String(), headerLength\n}", "title": "" }, { "docid": "4993467b7ef3a7a31fdd8e678af38839", "score": "0.6019491", "text": "func (m multicell) Process(t *Table, irow, jcol int) []formatter {\n\n\t// Processing a multicell is truly easy. It just suffices to add all\n\t// arguments given and to return a new multicell for each physical line.\n\t// There is only one caveat to consider and it is to modify the table in\n\t// case another multicell precedes this one\n\n\t// -- initialization\n\tvar result []formatter\n\n\t// if this multicell starts with no separator in the first column, and is\n\t// preceded by another multicell which in turn provides a separator in a\n\t// last column with no body, then use that separator. This involves\n\t// modifying the table which is stored within this multicell. The reasoning\n\t// is simple:\n\t//\n\t// 1. Multicells are allowed to overwrite the separators given in the\n\t// column specification of the table\n\t//\n\t// 2. Also, Multicells are allowed to affect the separator to be used in\n\t// the cell coming immediately after\n\t//\n\t// So, if a multicell starts with no separator, then the separator given in\n\t// the column specification of the table is not used at all and the only\n\t// chance to create a separator is to use the one given by the preceding\n\t// Multicell, in case there is any. Note that the following verification is\n\t// performed only in case the current row has been written to the table\n\t// (this is not the case when adding rows, but it is when printing the\n\t// contents of tables)\n\tif m.table.columns[0].sep == \"\" && irow < len(t.rows) {\n\t\tif mprev := getPreviousHorizontalMerger(t, irow, jcol); mprev != nil && mprev.getLastVerticalSep() != \"\" {\n\n\t\t\t// redo the table using as first separator the one provided in the\n\t\t\t// previous multicell. In case of error (which is unlikely as we are\n\t\t\t// only adding the separator found in the previous multicell) a\n\t\t\t// panic is generated, there's not much we could do at this stage\n\t\t\tif tm, err := NewTable(mprev.getLastVerticalSep() + m.cspec); err != nil {\n\t\t\t\tpanic(err)\n\t\t\t} else {\n\n\t\t\t\t// the following is ugly ... I know :( and it is a little bit of\n\t\t\t\t// hacking. Multicells are processed after distributing some\n\t\t\t\t// space among its columns. Thus, if we are re-creating the\n\t\t\t\t// inner table of a multicell, it is more than a good idea to\n\t\t\t\t// preserve the widths of all its columns\n\t\t\t\tfor idx := range tm.columns {\n\t\t\t\t\ttm.columns[idx].width = m.table.columns[idx].width\n\t\t\t\t}\n\t\t\t\ttm.columns[0].width -= countPrintableRuneInString(mprev.getLastVerticalSep())\n\t\t\t\tm.table = *tm\n\t\t\t}\n\t\t}\n\t}\n\n\t// store all lines as different multicells where only the output of each\n\t// line is stored separately\n\tfor _, line := range strings.Split(fmt.Sprintf(\"%v\", m.table), \"\\n\") {\n\n\t\t// note that only each line is computed separately. In addition,\n\t\t// other information is passed to the multicell to be formatted\n\t\tresult = append(result, formatter(multicell{\n\t\t\tjinit: m.jinit,\n\t\t\tnbcolumns: m.nbcolumns,\n\t\t\tiinit: m.iinit,\n\t\t\tnbrows: m.nbrows,\n\t\t\tclastsep: m.clastsep,\n\t\t\trlastsep: m.rlastsep,\n\t\t\ttable: m.table,\n\t\t\toutput: line}))\n\t}\n\n\t// and return the result computed so far\n\treturn result\n}", "title": "" }, { "docid": "f4fc4537dd21b490f459095e30b580fd", "score": "0.5750104", "text": "func (g Grid) String() string {\n\tvar buf bytes.Buffer\n\tfor y := 0; y < g.h; y++ {\n\t\tfor x := 0; x < g.w; x++ {\n\t\t\tbuf.WriteString(g.c[x][y].what)\n\t\t}\n\t\tbuf.WriteString(\"\\n\")\n\t}\n\t//fmt.Println()\n\treturn buf.String()\n}", "title": "" }, { "docid": "3e4e619499dfda4e88a94c85cfc66463", "score": "0.5745219", "text": "func (t *Table) FormatText() []string {\n\tvar buffer strings.Builder\n\n\tvar rowLimit = t.rowLimit\n\n\tif (t.terminalHeight > 0) || (t.terminalWidth > 0) {\n\t\treturn t.paginateText()\n\t}\n\n\tui.Log(ui.AppLogger, \"Print column order: %v\", t.columnOrder)\n\n\toutput := make([]string, 0)\n\n\tif rowLimit < 0 {\n\t\trowLimit = len(t.rows)\n\t}\n\n\tvar e *expressions.Expression\n\n\tif t.where != \"\" {\n\t\te = expressions.New().WithNormalization(true).WithText(t.where)\n\t}\n\n\tif t.showHeadings {\n\t\tbuffer.WriteString(t.indent)\n\n\t\trowString := i18n.L(\"Row\")\n\n\t\tif t.showRowNumbers {\n\t\t\tbuffer.WriteString(rowString)\n\t\t\tbuffer.WriteString(t.spacing)\n\t\t}\n\n\t\tfor _, n := range t.columnOrder {\n\t\t\tbuffer.WriteString(AlignText(t.names[n], t.maxWidth[n], t.alignment[n]))\n\t\t\tbuffer.WriteString(t.spacing)\n\t\t}\n\n\t\toutput = append(output, buffer.String())\n\n\t\tif t.showUnderlines {\n\t\t\tbuffer.Reset()\n\t\t\tbuffer.WriteString(t.indent)\n\n\t\t\tif t.showRowNumbers {\n\t\t\t\tbuffer.WriteString(strings.Repeat(\"=\", len(rowString)))\n\t\t\t\tbuffer.WriteString(t.spacing)\n\t\t\t}\n\n\t\t\tfor _, n := range t.columnOrder {\n\t\t\t\tfor pad := 0; pad < t.maxWidth[n]; pad++ {\n\t\t\t\t\tbuffer.WriteRune('=')\n\t\t\t\t}\n\n\t\t\t\tbuffer.WriteString(t.spacing)\n\t\t\t}\n\n\t\t\toutput = append(output, buffer.String())\n\t\t}\n\t}\n\n\tfor i, r := range t.rows {\n\t\tif i < t.startingRow {\n\t\t\tcontinue\n\t\t}\n\n\t\tif i >= t.startingRow+rowLimit {\n\t\t\tbreak\n\t\t}\n\n\t\tif e != nil {\n\t\t\t// Load up the symbol tables with column values and the row number\n\t\t\tsyms := symbols.NewSymbolTable(\"rowset\")\n\t\t\tsyms.SetAlways(\"_row_\", i+1)\n\t\t\tfor i, n := range t.names {\n\t\t\t\tsyms.SetAlways(strings.ToLower(n), r[i])\n\t\t\t}\n\n\t\t\tv, err := e.Eval(syms)\n\t\t\tif err != nil {\n\t\t\t\toutput = append(output, fmt.Sprintf(\"*** where clause error: %s\", err.Error()))\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tif !util.GetBool(v) {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t}\n\n\t\tbuffer.Reset()\n\t\tbuffer.WriteString(t.indent)\n\n\t\tif t.showRowNumbers {\n\t\t\tbuffer.WriteString(fmt.Sprintf(\"%3d\", i+1))\n\t\t\tbuffer.WriteString(t.spacing)\n\t\t}\n\n\t\t// Loop over the elements of the row. Generate pre- or post-spacing as\n\t\t// appropriate for the requested alignment, and any intra-column spacing.\n\t\tfor _, n := range t.columnOrder {\n\t\t\tbuffer.WriteString(AlignText(r[n], t.maxWidth[n], t.alignment[n]))\n\t\t\tbuffer.WriteString(t.spacing)\n\t\t}\n\n\t\toutput = append(output, buffer.String())\n\t}\n\n\treturn output\n}", "title": "" }, { "docid": "4bb9e4283f8a1d033a32a06bded10beb", "score": "0.5654047", "text": "func (g *Grid) String() string {\n\tvar b strings.Builder\n\tfor _, row := range g.Grid {\n\t\tfor _, x := range row {\n\t\t\tfmt.Fprintf(&b, \"%c\", x)\n\t\t}\n\t\tfmt.Fprintf(&b, \"\\n\")\n\t}\n\treturn b.String()\n}", "title": "" }, { "docid": "122d6ac38396e0d5f1d6eca21b8f3577", "score": "0.5639788", "text": "func (r QRow) String() string { return fmt.Sprintf(\"%-s\", r) }", "title": "" }, { "docid": "b82d87cf08b05ace72f525aa0f2ed421", "score": "0.55829835", "text": "func (b *Board) String() string {\n\tvar output string\n\n\tfor row, y := range b.Cells {\n\t\tfor col, x := range y {\n\t\t\toutput += strconv.Itoa(x)\n\t\t\toutput += \" \"\n\t\t\tif col == 2 || col == 5 {\n\t\t\t\toutput += \"| \"\n\t\t\t}\n\t\t}\n\t\toutput += \"\\n\"\n\t\tif (row+1)%3 == 0 {\n\t\t\toutput += \"\\n\"\n\t\t}\n\t}\n\n\treturn output\n}", "title": "" }, { "docid": "45bc09694abf5d9425c7e78164e002e8", "score": "0.5575274", "text": "func (g WhiteSpaceGrid) Render(currentcell *Cell) string {\n\treturn \" \"\n}", "title": "" }, { "docid": "83468c585d1bbc99a8a296caef9f0dd3", "score": "0.5556637", "text": "func GetFormat(rows int) (format string) {\n\tif rows == 0 {\n\t\treturn\n\t}\n\tfor i := 0; i < rows; i++ {\n\t\tif len(format) > 0 {\n\t\t\tformat += \"\\n\"\n\t\t}\n\t\tformat += \"%s\"\n\t}\n\treturn\n}", "title": "" }, { "docid": "25fb05d390047648ae0e4283ded57c80", "score": "0.5423958", "text": "func (g Grid) String() string {\n\tw := bytes.Index(g, []byte(\"\\n\"))\n\th := len(g) / w\n\n\tvar b strings.Builder\n\tfor y := 0; y < h; y++ {\n\t\tfor x := 0; x < w; x++ {\n\t\t\tv, _ := g.at(x, y, w)\n\t\t\tb.WriteByte(v)\n\t\t}\n\t\tb.WriteByte('\\n')\n\t}\n\treturn b.String()\n}", "title": "" }, { "docid": "5533680d2d256f9a7ca88442beba3b82", "score": "0.53969526", "text": "func (c *cell) String() string {\n\tstate := \":\"\n\tif c.covered {\n\t\tstate = \"|\"\n\t}\n\treturn fmt.Sprintf(\"%s%d%s%d\", getColumnName(c.column), c.row, state, c.value)\n}", "title": "" }, { "docid": "510b7e77212bb89a1e95ce05d3695064", "score": "0.5366097", "text": "func (grid *Grid) String() string {\n\tstr := fmt.Sprintf(\"ncols\\t\\t\\t%d\\n\", grid.Ncols)\n\tstr += fmt.Sprintf(\"nrows\\t\\t\\t%d\\n\", grid.Nrows)\n\tstr += fmt.Sprintf(\"xllcorner\\t\\t%f\\n\", grid.Xllcorner)\n\tstr += fmt.Sprintf(\"yllcorner\\t\\t%f\\n\", grid.Yllcorner)\n\tstr += fmt.Sprintf(\"cellsize\\t\\t%f\\n\", grid.Cellsize)\n\tstr += fmt.Sprintf(\"NODATA_value\\t%d\\n\", grid.Nodata)\n\n\tvar sb strings.Builder\n\tfor i, row := range grid.Buffer {\n\t\tfor j, col := range row {\n\t\t\tsb.WriteString(strconv.Itoa(col))\n\t\t\tif j != grid.Ncols-1 {\n\t\t\t\tsb.WriteString(\" \")\n\t\t\t}\n\t\t}\n\t\tif i != int(grid.Nrows-1) {\n\t\t\tsb.WriteString(\"\\n\")\n\t\t}\n\t}\n\n\tstr += sb.String()\n\n\treturn str\n}", "title": "" }, { "docid": "66352dfa3287174931a1b67f647bf8ad", "score": "0.5328655", "text": "func (o *Cell) String() string {\n\tl := io.Sf(\"{\\\"id\\\":%d, \\\"tag\\\":%d, \\\"type\\\":%q, \\\"part\\\":%d, \\\"verts\\\":[\", o.Id, o.Tag, o.Type, o.Part)\n\tfor i, x := range o.Verts {\n\t\tif i > 0 {\n\t\t\tl += \", \"\n\t\t}\n\t\tl += io.Sf(\"%d\", x)\n\t}\n\tl += \"], \\\"ftags\\\":[\"\n\tfor i, x := range o.FTags {\n\t\tif i > 0 {\n\t\t\tl += \", \"\n\t\t}\n\t\tl += io.Sf(\"%d\", x)\n\t}\n\tl += \"] }\"\n\treturn l\n}", "title": "" }, { "docid": "3d297b0d35063a5ff397c593fd168f5d", "score": "0.5285971", "text": "func (t *TableRender) renderCell(row TableRowInterface, columnIndex int, cellFormat string) string {\n\tvar cell TableCellInterface\n\n\tcolumn := row.GetColumn(columnIndex)\n\tif column == nil {\n\t\tcell = NewTableCell(\"\")\n\t} else {\n\t\tcell = column.GetCell()\n\t}\n\n\twidth := t.getEffectiveColumnWidth(columnIndex)\n\n\tif cell.GetColspan() > 1 {\n\t\tnextColumns := helper.RangeInt(columnIndex+1, columnIndex+cell.GetColspan()-1)\n\n\t\tfor _, nextColumn := range nextColumns {\n\t\t\twidth += t.getColumnSeparatorWidth() + t.getEffectiveColumnWidth(nextColumn)\n\t\t}\n\t}\n\n\tstyle := t.GetColumnStyle(columnIndex)\n\n\tif _, ok := cell.(TableSeparatorInterface); ok {\n\t\treturn fmt.Sprintf(style.GetBorderFormat(), strings.Repeat(style.GetHorizontalInsideBorderChar(), width))\n\t}\n\n\tcellPad := cell.GetPadType()\n\n\tif cellPad == PadDefault {\n\t\tcellPad = t.content.GetColumnPadding(columnIndex)\n\t}\n\n\tif cellPad == PadDefault {\n\t\tcellPad = style.GetPadType()\n\t}\n\n\twidth += helper.Strlen(cell.GetValue()) - helper.StrlenWithoutDecoration(t.output.Formatter(), cell.GetValue())\n\tcontent := fmt.Sprintf(style.GetCellRowContentFormat(), cell.GetValue())\n\n\thasResetOpeningTag := false\n\tif strings.Index(content, \"<fg=default;bg=default>\") != -1 {\n\t\tcontent = strings.Replace(content, \"<fg=default;bg=default>\", \"\", -1)\n\t\twidth -= len(\"<fg=default;bg=default>\")\n\t\thasResetOpeningTag = true\n\t}\n\n\thasResetClosingTag := false\n\tif strings.Index(content, \"</>\") != -1 {\n\t\tcontent = strings.Replace(content, \"</>\", \"\", -1)\n\t\twidth -= len(\"</>\")\n\t\thasResetClosingTag = true\n\t}\n\n\tresult := fmt.Sprintf(cellFormat, style.Pad(content, width, style.GetPaddingChar(), cellPad))\n\n\tif hasResetOpeningTag {\n\t\tresult = \"<fg=default;bg=default>\" + result\n\t}\n\n\tif hasResetClosingTag {\n\t\tresult = result + \"</>\"\n\t}\n\n\treturn result\n}", "title": "" }, { "docid": "adec411f2ae8c200e197268bd0d21f38", "score": "0.52517974", "text": "func (c *Cell) String() string {\n\treturn c.FormattedValue()\n}", "title": "" }, { "docid": "1ae779216bee8dd284e05c526c1cabfd", "score": "0.5243032", "text": "func (e Matrix) String() string {\n\tout := []rune{}\n\t_, b := e.Size()\n\n\taddBar := func() {\n\t\tfor i := -2; i < b; i++ {\n\t\t\tout = append(out, '-')\n\t\t}\n\t\tout = append(out, '\\n')\n\t}\n\n\taddBar()\n\tfor _, row := range e {\n\t\tout = append(out, []rune(row.String())...)\n\t}\n\taddBar()\n\n\treturn string(out)\n}", "title": "" }, { "docid": "3c9892f9fb7319813c4e97a6c8a0b962", "score": "0.5239007", "text": "func (s *Sudoku) String() string {\n\tvar sb strings.Builder\n\n\tfor rowIndex, rowCells := range s.Cells {\n\t\tfor columnIndex, cell := range rowCells {\n\t\t\tif cell.value == 0 {\n\t\t\t\tsb.WriteRune('_')\n\t\t\t} else {\n\t\t\t\tsb.WriteString(fmt.Sprintf(\"%d\", cell.value))\n\t\t\t}\n\n\t\t\tif (columnIndex+1)%BlockSize == 0 {\n\t\t\t\t// Is block end\n\t\t\t\tif columnIndex+1 < SudokuSize {\n\t\t\t\t\t// Is not last block\n\t\t\t\t\tsb.WriteString(\" \")\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tsb.WriteRune(' ')\n\t\t\t}\n\t\t}\n\n\t\tif rowIndex+1 < SudokuSize {\n\t\t\t// Is not last row\n\t\t\tsb.WriteRune('\\n')\n\n\t\t\tif (rowIndex+1)%BlockSize == 0 && rowIndex+1 < SudokuSize {\n\t\t\t\t// Is block end\n\t\t\t\tsb.WriteRune('\\n')\n\t\t\t}\n\t\t}\n\t}\n\n\treturn sb.String()\n}", "title": "" }, { "docid": "2b78d529a4da15a9239644d164e426cd", "score": "0.5226074", "text": "func (this* PercolationGrid) Repr() (repr string) {\n for _, row := range this.site_open {\n for _, is_open := range row {\n if is_open {\n repr += \"X \"\n } else {\n repr += \" \"\n }\n }\n repr += \"\\n\"\n }\n return repr\n}", "title": "" }, { "docid": "3f370c6abac893c85cb7a3631bd21245", "score": "0.52105755", "text": "func (E *Editor) rowsToString() []byte {\n\tvar p []byte\n\tfor i := 0; i < E.numrows; i++ {\n\t\tr := &E.row[i]\n\t\tp = append(p, r.chars[:r.size]...)\n\t\tp = append(p, '\\n')\n\t}\n\treturn p\n}", "title": "" }, { "docid": "a4dd881d4c79cb5441d53cd15d3c6852", "score": "0.5185065", "text": "func ReturnTextTable(header []string, rows [][]string) string {\n\tvar buffer bytes.Buffer\n\n\t// Storage for column widths and line.\n\tvar column_width []int\n\tvar line_columns []string\n\n\t// Init column width header columns.\n\tif header != nil {\n\t\tcolumn_width = make([]int, len(header))\n\t\tline_columns = make([]string, len(header))\n\n\t\tfor idx, column := range header {\n\t\t\tcolumn_width[idx] = len(column)\n\t\t}\n\t}\n\n\t// Determine column widths.\n\tfor _, row := range rows {\n\t\tif len(column_width) == 0 {\n\t\t\tcolumn_width = make([]int, len(row))\n\t\t\tline_columns = make([]string, len(row))\n\t\t}\n\n\t\tfor idx, column := range row {\n\t\t\tif len(column) > column_width[idx] {\n\t\t\t\tcolumn_width[idx] = len(column)\n\t\t\t}\n\t\t}\n\t}\n\n\tif header != nil {\n\t\t// Fill line columns.\n\t\tfor idx, _ := range header {\n\t\t\tline_columns[idx] = strings.Repeat(\"-\", column_width[idx])\n\t\t}\n\n\t\t// Inserts header and lines into rows.\n\t\trows = append(rows, header, header)\n\t\tcopy(rows[2:], rows[0:len(rows)-1])\n\t\trows[0] = header\n\t\trows[1] = line_columns\n\t}\n\n\t// Write actual columns.\n\tno_of_columns := len(column_width)\n\tfor _, row := range rows {\n\t\tfor idx, column := range row {\n\t\t\tif idx > 0 {\n\t\t\t\tbuffer.WriteString(\" \")\n\t\t\t}\n\n\t\t\tbuffer.WriteString(column)\n\n\t\t\tif idx < (no_of_columns-1) && len(column) < column_width[idx] {\n\t\t\t\tbuffer.WriteString(strings.Repeat(\" \", column_width[idx]-len(column)))\n\t\t\t}\n\t\t}\n\n\t\tbuffer.WriteString(\"\\n\")\n\t}\n\n\treturn buffer.String()\n}", "title": "" }, { "docid": "7069f78a411861c1ac2df9b33fcb0b09", "score": "0.5180262", "text": "func (*Stylish) Format(failures <-chan lint.Failure, config lint.Config) (string, error) {\n\tvar result [][]string\n\ttotalErrors := 0\n\ttotal := 0\n\n\tfor f := range failures {\n\t\ttotal++\n\t\tcurrentType := severity(config, f)\n\t\tif currentType == lint.SeverityError {\n\t\t\ttotalErrors++\n\t\t}\n\t\tresult = append(result, formatFailure(f, lint.Severity(currentType)))\n\t}\n\tps := \"problems\"\n\tif total == 1 {\n\t\tps = \"problem\"\n\t}\n\n\tfileReport := make(map[string][][]string)\n\n\tfor _, row := range result {\n\t\tif _, ok := fileReport[row[0]]; !ok {\n\t\t\tfileReport[row[0]] = [][]string{}\n\t\t}\n\n\t\tfileReport[row[0]] = append(fileReport[row[0]], []string{row[1], row[2], row[3]})\n\t}\n\n\toutput := \"\"\n\tfor filename, val := range fileReport {\n\t\tbuf := new(bytes.Buffer)\n\t\ttable := tablewriter.NewWriter(buf)\n\t\ttable.SetBorder(false)\n\t\ttable.SetColumnSeparator(\"\")\n\t\ttable.SetRowSeparator(\"\")\n\t\ttable.SetAutoWrapText(false)\n\t\ttable.AppendBulk(val)\n\t\ttable.Render()\n\t\tc := color.New(color.Underline)\n\t\toutput += c.SprintfFunc()(filename + \"\\n\")\n\t\toutput += buf.String() + \"\\n\"\n\t}\n\n\tsuffix := fmt.Sprintf(\" %d %s (%d errors) (%d warnings)\", total, ps, totalErrors, total-totalErrors)\n\n\tif total > 0 && totalErrors > 0 {\n\t\tsuffix = color.RedString(\"\\n ✖\" + suffix)\n\t} else if total > 0 && totalErrors == 0 {\n\t\tsuffix = color.YellowString(\"\\n ✖\" + suffix)\n\t} else {\n\t\tsuffix, output = \"\", \"\"\n\t}\n\n\treturn output + suffix, nil\n}", "title": "" }, { "docid": "939c8c788ef7c69e771109a1af762132", "score": "0.51538926", "text": "func (t *TableRender) getRowSeparator(direction rowType) string {\n\n\tvar horizontalBorderChar string\n\tif direction == rowTop || direction == rowBottom || direction == rowDouble {\n\t\thorizontalBorderChar = t.style.GetHorizontalOutsideBorderChar()\n\t} else if direction == rowSimple {\n\t\thorizontalBorderChar = t.style.GetHorizontalInsideBorderChar()\n\t}\n\n\tcount := t.numberOfColumns\n\n\tif count == 0 {\n\t\treturn \"\"\n\t}\n\n\tif utf8.RuneCountInString(horizontalBorderChar) == 0 && utf8.RuneCountInString(t.style.GetCrossingChar()) == 0 {\n\t\treturn \"\"\n\t}\n\n\tvar markup string\n\tif direction == rowTop {\n\t\tmarkup = t.style.GetCrossingTopLeftChar()\n\t} else if direction == rowBottom {\n\t\tmarkup = t.style.GetCrossingBottomLeftChar()\n\t} else if direction == rowSimple {\n\t\tmarkup = t.style.GetCrossingMidLeftChar()\n\t} else if direction == rowDouble {\n\t\tmarkup = t.style.GetCrossingTopLeftBottomChar()\n\t}\n\n\tfor column := 0; column < count; column++ {\n\t\tmarkup += strings.Repeat(horizontalBorderChar, t.getEffectiveColumnWidth(column))\n\n\t\tif column == count-1 {\n\t\t\tif direction == rowTop {\n\t\t\t\tmarkup += t.style.GetCrossingTopRightChar()\n\t\t\t} else if direction == rowBottom {\n\t\t\t\tmarkup += t.style.GetCrossingBottomRightChar()\n\t\t\t} else if direction == rowSimple {\n\t\t\t\tmarkup += t.style.GetCrossingMidRightChar()\n\t\t\t} else if direction == rowDouble {\n\t\t\t\tmarkup += t.style.GetCrossingTopRightBottomChar()\n\t\t\t}\n\t\t} else {\n\t\t\tif direction == rowTop {\n\t\t\t\tmarkup += t.style.GetCrossingTopMidChar()\n\t\t\t} else if direction == rowBottom {\n\t\t\t\tmarkup += t.style.GetCrossingBottomMidChar()\n\t\t\t} else if direction == rowSimple {\n\t\t\t\tmarkup += t.style.GetCrossingChar()\n\t\t\t} else if direction == rowDouble {\n\t\t\t\tmarkup += t.style.GetCrossingTopMidBottomChar()\n\t\t\t}\n\t\t}\n\t}\n\n\treturn fmt.Sprintf(t.style.GetBorderFormat(), markup)\n}", "title": "" }, { "docid": "fe6a46ff0aa30223ff8e68c89c763606", "score": "0.5153752", "text": "func Output(g Grid) {\n\tfor r := 0; r < 9; r++ {\n\t\tfor c := 0; c < 9; c++ {\n\t\t\tfmt.Printf(\"%v \", g[r][c])\n\t\t}\n\t\tfmt.Printf(\"\\n\")\n\t}\n}", "title": "" }, { "docid": "c2e37e302f85c6455ec7a3487b76c088", "score": "0.5141283", "text": "func printGrid(title, s string) {\n\tfmt.Println(title)\n\tfor r, i := 0, 0; r < 9; r, i = r+1, i+9 {\n\t\tfmt.Printf(\"%c %c %c | %c %c %c | %c %c %c\\n\", s[i], s[i+1], s[i+2],\n\t\t\ts[i+3], s[i+4], s[i+5], s[i+6], s[i+7], s[i+8])\n\t\tif r == 2 || r == 5 {\n\t\t\tfmt.Println(\"------+-------+------\")\n\t\t}\n\t}\n}", "title": "" }, { "docid": "779f9358110af42db5a757e49f4549b4", "score": "0.5111987", "text": "func Formatting()", "title": "" }, { "docid": "265a86f812b03de900f5286cdc1a6e94", "score": "0.5110157", "text": "func (s State) printBoard() {\n\tvar row string\n\tfor y, _ := range s.grid {\n\t\tfor _, it := range s.grid[y] {\n\t\t\t//row += fmt.Sprintf(row, it.what)\n\t\t\trow += it.what\n\t\t}\n\t\trow += \"\\n\"\n\t}\n\tlog.Println(row)\n}", "title": "" }, { "docid": "73b254cea34b45df5139cb05e5ce12de", "score": "0.5100878", "text": "func (tp *FixedWidthTable) String() string {\n\n\tt := *tp\n\tvar buffer bytes.Buffer\n\tvar pat = make(map[int]string)\n\n\tfor col, c := range t {\n\t\tpat[col] = fmt.Sprint(\"%-\", c.FieldInfo.Width, \"s\")\n\t\tbuffer.WriteString(fmt.Sprintf(pat[col], c.FieldInfo.Header))\n\t}\n\tbuffer.WriteString(\"\\n\")\n\n\tfor r := 0; r < t.Height(); r++ {\n\n\t\tfor c, col := range t {\n\t\t\tbuffer.WriteString(fmt.Sprintf(pat[c], col.Data[r]))\n\t\t}\n\t\tif r < t.Height()-1 {\n\t\t\tbuffer.WriteString(\"\\n\")\n\t\t}\n\t}\n\n\treturn buffer.String()\n}", "title": "" }, { "docid": "310c80d44534961959ea5d8075e27734", "score": "0.50942993", "text": "func (s Sudoku) String() string {\n\tb := &strings.Builder{}\n\tfor i, line := range s {\n\t\tif i%3 == 0 {\n\t\t\tfmt.Fprintln(b, \"+---------+---------+---------+\")\n\t\t}\n\t\tfor j, num := range line {\n\t\t\tif j%3 == 0 {\n\t\t\t\tfmt.Fprint(b, \"|\")\n\t\t\t}\n\t\t\tif num == 0 {\n\t\t\t\tfmt.Fprint(b, \" . \")\n\t\t\t} else {\n\t\t\t\tfmt.Fprintf(b, \" %d \", num)\n\t\t\t}\n\t\t\tif j == 8 {\n\t\t\t\tfmt.Fprint(b, \"|\")\n\t\t\t}\n\t\t}\n\t\tif i == 8 {\n\t\t\tfmt.Fprint(b, \"\\n+---------+---------+---------+\")\n\t\t}\n\t\tfmt.Fprintln(b)\n\t}\n\n\treturn b.String()\n}", "title": "" }, { "docid": "2c1d3e39d7faa3d267c1f839db8d8682", "score": "0.50801235", "text": "func (b *Board) String() string {\n\tgrid := makeGrid(b.w, b.h)\n\tfor _, p := range b.ps {\n\t\tp.drawInto(grid)\n\t}\n\n\tvar sb strings.Builder\n\tsb.WriteString(\" \")\n\tsb.WriteString(strings.Repeat(\"_\", b.w))\n\tsb.WriteString(\"\\n\")\n\n\tfor i := 0; i < b.h; i++ {\n\t\tsb.WriteString(\"|\")\n\t\tsb.WriteString(grid.row(i))\n\t\tsb.WriteString(\"|\\n\")\n\t}\n\n\tsb.WriteString(\" \")\n\tsb.WriteString(strings.Repeat(\"~\", b.w))\n\tsb.WriteString(\"\\n\")\n\n\treturn sb.String()\n}", "title": "" }, { "docid": "1629a737fe0db2df9bef0d880d2ea740", "score": "0.50796646", "text": "func (c *Columnizer) Format(o interface{}) []string {\n\t// Build meta-format string\n\theaders := strings.Builder{}\n\tmeta := strings.Builder{}\n\n\tcolumnWidths := make([]interface{}, len(c.columns))\n\tcolumnNames := make([]interface{}, len(c.columns))\n\n\trv := reflect.ValueOf(o)\n\tlength := rv.Len()\n\n\t// Loop over each column\n\tfor i, col := range c.columns {\n\t\tcolumnNames[i] = col.name\n\t\tcolumnWidths[i] = len(col.name)\n\n\t\theaders.WriteString(\"%%-%ds\")\n\n\t\tswitch f := col.f.(type) {\n\t\tcase IntFunc:\n\t\t\tmeta.WriteString(\"%%-%dd\")\n\t\t\tfor j := 0; j < length; j++ {\n\t\t\t\tw := len(fmt.Sprintf(\"%d\", f(j)))\n\t\t\t\tif w > columnWidths[i].(int) {\n\t\t\t\t\tcolumnWidths[i] = w\n\t\t\t\t}\n\t\t\t}\n\n\t\tcase StringFunc:\n\t\t\tmeta.WriteString(\"%%-%ds\")\n\t\t\tfor j := 0; j < length; j++ {\n\t\t\t\tw := len(f(j))\n\t\t\t\tif w > columnWidths[i].(int) {\n\t\t\t\t\tcolumnWidths[i] = w\n\t\t\t\t}\n\t\t\t}\n\n\t\tdefault:\n\t\t\tpanic(fmt.Sprintf(\"unknown type: %T\", f))\n\t\t}\n\t}\n\n\tfor i := range columnWidths {\n\t\tw := columnWidths[i].(int)\n\t\tcolumnWidths[i] = w + 3\n\t}\n\n\theaderFormat := fmt.Sprintf(headers.String(), columnWidths...)\n\tmetaFormat := fmt.Sprintf(meta.String(), columnWidths...)\n\n\tlines := []string{}\n\tlines = append(lines, fmt.Sprintf(headerFormat, columnNames...))\n\n\tfor row := 0; row < length; row++ {\n\t\tvalues := make([]interface{}, len(c.columns))\n\n\t\tfor i, col := range c.columns {\n\t\t\tswitch f := col.f.(type) {\n\t\t\tcase IntFunc:\n\t\t\t\tvalues[i] = f(row)\n\n\t\t\tcase StringFunc:\n\t\t\t\tvalues[i] = f(row)\n\n\t\t\tdefault:\n\t\t\t\tpanic(fmt.Sprintf(\"unknown type: %T\", f))\n\t\t\t}\n\t\t}\n\n\t\tlines = append(lines, fmt.Sprintf(metaFormat, values...))\n\t}\n\n\treturn lines\n}", "title": "" }, { "docid": "7ceb87de2a3767ced3e64a0f351eb4c4", "score": "0.50427955", "text": "func Render(board *Board) {\n\tfmt.Println(\" 1 2 3\")\n\tfor i := 0; i < 3; i++ {\n\t\tfmt.Printf(\"%c\", rune(i+65))\n\n\t\tfor j := 0; j < 3; j++ {\n\t\t\tfmt.Printf(\" %s\", board[i][j].String())\n\t\t}\n\n\t\tfmt.Print(\"\\n\")\n\t}\n}", "title": "" }, { "docid": "eba5d44b4218ffc3f09b98637d897703", "score": "0.5039546", "text": "func (m *M) String() string {\n\tb := &strings.Builder{}\n\tfmt.Fprintln(b)\n\tfor i := 1; i <= m.rows; i++ {\n\t\tfor j := 1; j <= m.cols; j++ {\n\t\t\tfmt.Fprintf(b, \"%.4g\\t\", m.Get(i, j))\n\t\t}\n\t\tfmt.Fprintln(b)\n\t}\n\tfmt.Fprintln(b)\n\treturn b.String()\n}", "title": "" }, { "docid": "60274aa467331dfa3e9493bba8a22a48", "score": "0.50391537", "text": "func formatCellsAsHTML(cells []types.Cell) template.HTML {\n\t// Sort by the metric name, then by field values.\n\tsort.Slice(cells, func(i, j int) bool {\n\t\tswitch l, r := cells[i], cells[j]; {\n\t\tcase l.Name != r.Name:\n\t\t\treturn l.Name < r.Name\n\t\tcase len(l.FieldVals) != len(r.FieldVals): // this should not be happening\n\t\t\treturn len(l.FieldVals) < len(r.FieldVals)\n\t\tdefault:\n\t\t\tfor idx := range l.FieldVals {\n\t\t\t\tlstr := fmt.Sprintf(\"%v\", l.FieldVals[idx])\n\t\t\t\trstr := fmt.Sprintf(\"%v\", r.FieldVals[idx])\n\t\t\t\tif lstr != rstr {\n\t\t\t\t\treturn lstr < rstr\n\t\t\t\t}\n\t\t\t}\n\t\t\treturn false\n\t\t}\n\t})\n\n\tbuf := htmlBuilder{}\n\tbuf.styles()\n\n\t// Shorter aliases to unclutter the code.\n\ttable := buf.table\n\ttr := buf.tr\n\ttd := buf.td\n\tbold := buf.bold\n\tmetric := buf.metric\n\tvalue := buf.value\n\n\t// First render a table with \"singleton\" metrics: ones without any fields at\n\t// all (usually something global to the process).\n\ttable(func() {\n\t\tfor _, c := range cells {\n\t\t\tif len(c.Fields) == 0 {\n\t\t\t\ttr(func() {\n\t\t\t\t\ttd(func() { metric(\"b\", c.Name, c.ValueType) })\n\t\t\t\t\ttd(func() { value(c.Value) })\n\t\t\t\t})\n\t\t\t}\n\t\t}\n\t})\n\tbuf.WriteString(\"<hr>\")\n\n\t// For each metric that uses fields, render a separate table. Note that this\n\t// loop relies on cells being sorted by the metric name.\n\tfor idx := 0; idx < len(cells); idx++ {\n\t\tif len(cells[idx].Fields) == 0 {\n\t\t\tcontinue\n\t\t}\n\n\t\t// Scan until we hit the cell from another metric.\n\t\tstart := idx\n\t\tfor idx < len(cells) && cells[idx].Name == cells[start].Name {\n\t\t\tidx++\n\t\t}\n\t\tdisplay := cells[start:idx]\n\t\tidx-- // will be incremented again by the for loop\n\n\t\tmetric(\"h4\", display[0].Name, display[0].ValueType)\n\t\ttable(func() {\n\t\t\t// A row with names of the fields.\n\t\t\ttr(func() {\n\t\t\t\tfor _, f := range display[0].Fields {\n\t\t\t\t\ttd(func() { bold(f.Name) })\n\t\t\t\t}\n\t\t\t\ttd(func() { bold(\"value\") })\n\t\t\t})\n\t\t\t// A row per combination of metrics.\n\t\t\tfor _, c := range display {\n\t\t\t\ttr(func() {\n\t\t\t\t\tfor _, v := range c.FieldVals {\n\t\t\t\t\t\ttd(func() { value(v) })\n\t\t\t\t\t}\n\t\t\t\t\ttd(func() { value(c.Value) })\n\t\t\t\t})\n\t\t\t}\n\t\t})\n\t}\n\n\treturn template.HTML(buf.String())\n}", "title": "" }, { "docid": "ea9d0cd1cfe2617558798c1ce3369aa8", "score": "0.5033065", "text": "func (b *Board) String() (repr string) {\n repr += \"\\n \"\n for i := 0; i < b.size; i++ {\n repr += fmt.Sprintf(\" %c\", notationLetters[i])\n }\n for i, r := range b.grid {\n repr += fmt.Sprintf(\"\\n%-2d\", i + 1)\n for _, v := range r {\n repr += \" \"\n switch v {\n case Empty:\n repr += \".\"\n case Black:\n repr += \"X\"\n case White:\n repr += \"O\"\n }\n }\n }\n return\n}", "title": "" }, { "docid": "2c813b0cf328bddcdddf29731462eb32", "score": "0.5011044", "text": "func (m *Matrix) String() string {\n\tb := &bytes.Buffer{}\n\tfor i := 0; i < m.rows; i++ {\n\t\tfor j := 0; j < m.cols; j++ {\n\t\t\tfmt.Fprintf(b, \"%-15.3f\", m.get(i, j))\n\t\t}\n\t\tfmt.Fprintf(b, \"\\n\")\n\t}\n\treturn b.String()\n}", "title": "" }, { "docid": "df9137da78facfa2e4e9cefa1099baf4", "score": "0.50080967", "text": "func (t *MarkdownTable) renderRow(row []string, buffer *strings.Builder) {\n\tbuffer.WriteRune('|')\n\tfor i, c := range row {\n\t\tbuffer.WriteString(fmt.Sprintf(\" %*s |\", -t.widths[i], c))\n\t}\n\n\tbuffer.WriteString(\"\\n\")\n}", "title": "" }, { "docid": "b57872c3bb9d53766b196196f061e44b", "score": "0.4994326", "text": "func (b *Board) RoughRender() string {\n\tz := \"\"\n\tfor ix := 0; ix < hei; ix++ {\n\t\tfor iy := 0; iy < wid; iy++ {\n\t\t\tz += fmt.Sprint(b.body[ix][iy].getRendered(), \"\\t\")\n\t\t}\n\t\tz += \"\\n\"\n\t}\n\treturn z\n}", "title": "" }, { "docid": "a90838939c31938cbe70241924690a2e", "score": "0.4971092", "text": "func (t *TableRender) renderRow(row TableRowInterface, cellFormat string) {\n\tif len(row.GetColumns()) == 0 {\n\t\treturn\n\t}\n\n\trowContent := t.renderColumnSeparator(columnOutside)\n\n\tfor index := 0; index < t.numberOfColumns; {\n\t\t//for _, index := range row.GetColumnsSortedKeys() {\n\t\tcolumn := row.GetColumn(index)\n\n\t\tif column == nil {\n\t\t\trowContent += t.renderCell(row, index, cellFormat)\n\n\t\t\tif index == t.numberOfColumns-1 {\n\t\t\t\trowContent += t.renderColumnSeparator(columnOutside)\n\t\t\t} else {\n\t\t\t\trowContent += t.renderColumnSeparator(columnInside)\n\t\t\t}\n\n\t\t\tindex++\n\t\t\tcontinue\n\t\t}\n\n\t\tcell := column.GetCell()\n\n\t\tif separator, ok := cell.(TableSeparatorInterface); ok {\n\t\t\tif separator.IsDouble() {\n\t\t\t\trowContent = t.getRowSeparator(rowDouble)\n\t\t\t} else {\n\t\t\t\trowContent = t.getRowSeparator(rowSimple)\n\t\t\t}\n\t\t\tbreak\n\t\t}\n\n\t\trowContent += t.renderCell(row, index, cellFormat)\n\n\t\tif index+(cell.GetColspan()-1) == t.numberOfColumns-1 {\n\t\t\trowContent += t.renderColumnSeparator(columnOutside)\n\t\t} else {\n\t\t\trowContent += t.renderColumnSeparator(columnInside)\n\t\t}\n\n\t\tindex += cell.GetColspan()\n\t}\n\n\tt.output.Println(rowContent)\n}", "title": "" }, { "docid": "d74fd9a44d23bf0d96c2fc57b2f127c6", "score": "0.4951812", "text": "func (g Grid) Print() {\n\toutput := [][]string{}\n\th, w := g.maxY-g.minY, g.maxX-g.minX\n\n\tfor i := 0; i <= h; i++ {\n\t\trow := []string{}\n\t\tfor j := 0; j <= w; j++ {\n\t\t\trow = append(row, \" \")\n\t\t}\n\t\toutput = append(output, row)\n\t}\n\n\tfor l, c := range g.Points {\n\t\toutput[l.Y+Abs(g.minY)][l.X+Abs(g.minX)] = c.String()\n\t}\n\n\tfor i := range output {\n\t\tfor j := range output[i] {\n\t\t\tfmt.Print(output[i][j])\n\t\t}\n\t\tfmt.Print(\"\\n\")\n\t}\n}", "title": "" }, { "docid": "e12cc14a633862e561080203c50485eb", "score": "0.4921042", "text": "func (sg StringGrid) String() string {\n\tminRows, minColumns, minDepth := sg.MinDimensions()\n\trows, columns, depth := sg.Dimensions()\n\n\tgrid := \"\"\n\tfor z := minDepth; z < depth; z++ {\n\t\tgrid += fmt.Sprintf(\"z: %d\\n\", z)\n\t\tfor i := minRows; i < 0; i++ {\n\t\t\tgrid += \" \"\n\t\t}\n\t\tgrid += \" |\\n\"\n\t\tfor y := minRows; y < rows; y++ {\n\t\t\tif y == 0 {\n\t\t\t\tgrid += \"-\"\n\t\t\t} else {\n\t\t\t\tgrid += \" \"\n\t\t\t}\n\n\t\t\tfor x := minColumns; x < columns; x++ {\n\t\t\t\tgrid = grid + sg.GetAt(x, y, z)\n\t\t\t}\n\t\t\tgrid += \"\\n\"\n\t\t}\n\t\tgrid += \"\\n\"\n\t}\n\n\treturn grid\n}", "title": "" }, { "docid": "22a4757923ba6f10e10f1cfe4e59a06d", "score": "0.49161023", "text": "func (c Cell) String() string {\n\treturn string(c)\n}", "title": "" }, { "docid": "7f171144b6a5ba982372674707e5f09b", "score": "0.489782", "text": "func (matrix Matrix) String() string {\n\toutput := \"\\n\"\n\tfor i := 0; i < int(matrix[0]); i++ {\n\t\toutput += \"{\\t\\t\"\n\t\tfor j := 0; j < int(matrix[1]); j++ {\n\t\t\toutput = fmt.Sprintf(\"%v%v\", output, matrix.At(i, j))\n\t\t\tif j < int(matrix[1])-1 {\n\t\t\t\toutput += \"\\t\\t\"\n\t\t\t}\n\t\t}\n\t\toutput += \"\\t\\t}\\n\"\n\t}\n\n\treturn output\n}", "title": "" }, { "docid": "119dcdaf6ab0f2d6011538c309cc02be", "score": "0.48941898", "text": "func (b *Board) String() string {\n\tret := \"\"\n\tfor i := 0; i < 9; i++ {\n\t\tline := \"\"\n\t\tfor j := 0; j < 9; j++ {\n\t\t\tnum := (*b)[i][j]\n\t\t\tif num == 0 {\n\t\t\t\tline += \"_\"\n\t\t\t} else {\n\t\t\t\tline += strconv.Itoa(num)\n\t\t\t}\n\t\t}\n\t\tret += line + \"\\n\"\n\t}\n\treturn ret\n}", "title": "" }, { "docid": "8731189d2d1d8b157b9a33ff2c4e4fb0", "score": "0.48785818", "text": "func EmitStr(x, y int, style tcell.Style, str string, clip *ClippingRegion) int {\n\tcellX := x\n\n\tfor _, c := range str {\n\t\tvar comb []rune\n\t\tw := runewidth.RuneWidth(c)\n\t\tif w == 0 {\n\t\t\tcomb = []rune{c}\n\t\t\tc = ' '\n\t\t\tw = 1\n }\n \n if w == 1 {\n if clip.inClipRecion(cellX, y) {\n Screen.SetContent(cellX, y, c, comb, style)\n }\n cellX += w \n } else { // w == 2\n inClip1 := clip.inClipRecion(cellX, y) // Is 1st half of the rune visible?\n inClip2 := clip.inClipRecion(cellX+1, y) // Is 2nd half of the rune visible?\n\n if inClip1 && inClip2 { // Both rune parts are visible\n Screen.SetContent(cellX, y, c, comb, style)\n cellX += w \n } else if inClip1 && !inClip2 { // 1st part is visible, 2nd is not\n // Just print ' ' instead of the entire double-width rune\n comb = []rune{c}\n c = ' '\n w = 1\n Screen.SetContent(cellX, y, c, comb, style)\n cellX += w \n } else if !inClip1 && inClip2 { // 1st part isn't visible, 2nd is visible\n // Just print ' ' instead of the entire double-width rune\n comb = []rune{c}\n c = ' '\n w = 1\n Screen.SetContent(cellX+1, y, c, comb, style)\n cellX += w \n } else { // Neither rune part is visible\n cellX += w\n }\n }\n\t}\n\n\treturn cellX - x\n}", "title": "" }, { "docid": "11712023a420b29b6f984a61bb53a324", "score": "0.48658565", "text": "func (b Board) String() string {\n\tvar buf bytes.Buffer\n\tfor i, row := range b.Rows {\n\t\tbuf.Write(row)\n\t\tif i != b.Size-1 {\n\t\t\tbuf.WriteByte('\\n')\n\t\t}\n\t}\n\treturn buf.String()\n}", "title": "" }, { "docid": "c9c65b97e77b79c0e4f0bd95e9dfd15c", "score": "0.48612803", "text": "func cell2string( e2 interface{} ) string{\n\tresult := \"\";\n\tif( e2 != nil ){\n\t\t\tswitch e2.(type){\n\t\t\t\tcase []uint8 : \n\t\t\t\t\tresult = \" \" + string(e2.([]uint8))\n\t\t\t\tcase float64 : \n\t\t\t\t\tresult = \" \" + strconv.FormatFloat(e2.(float64), 'f', 6, 64)\n\t\t\t\tcase int64 :\n\t\t\t\t\tresult = \" \" + strconv.FormatInt( e2.(int64), 10 )\n\t\t\t\tdefault :\n\t\t\t\t\tresult = \" \" + \"ERR: unhandled type \"+ reflect.TypeOf(e2).String()\n\t\t\t\t}\n\t\t}\n\treturn result\n}", "title": "" }, { "docid": "154aeeb9c7f4e64d16404bfe26ef178c", "score": "0.4858279", "text": "func (r *Row) rowContent(totals Row) string {\n\n\t// assume the data is empty so hide it.\n\tname := r.name\n\tif r.totalMemoryOps == 0 && name != \"Totals\" {\n\t\tname = \"\"\n\t}\n\n\treturn fmt.Sprintf(\"%10s %6s %10s|%10s %6s|%8s %6s %8s|%s\",\n\t\tlib.SignedFormatAmount(r.currentBytesUsed),\n\t\tlib.FormatPct(lib.SignedMyDivide(r.currentBytesUsed, totals.currentBytesUsed)),\n\t\tlib.SignedFormatAmount(r.highBytesUsed),\n\t\tlib.SignedFormatAmount(r.totalMemoryOps),\n\t\tlib.FormatPct(lib.SignedMyDivide(r.totalMemoryOps, totals.totalMemoryOps)),\n\t\tlib.SignedFormatAmount(r.currentCountUsed),\n\t\tlib.FormatPct(lib.SignedMyDivide(r.currentCountUsed, totals.currentCountUsed)),\n\t\tlib.SignedFormatAmount(r.highCountUsed),\n\t\tname)\n}", "title": "" }, { "docid": "39f9ec2d35405756d7b17b401939c7b3", "score": "0.48435423", "text": "func (mat matrixMN) String() string {\n var buffer bytes.Buffer\n buffer.WriteString(fmt.Sprintf(\"\\n%v x %v Matrix\\n\", len(mat), len(mat[0])))\n for _, rowArr := range mat {\n buffer.WriteString(\" \")\n buffer.WriteString(fmt.Sprintf(\"%v\", rowArr))\n buffer.WriteString(\"\\n\")\n }\n\n return buffer.String()\n}", "title": "" }, { "docid": "3b45458154843aaa9080754a3803b369", "score": "0.48329124", "text": "func (b *World) String() {\n\tfor _, row := range b.w {\n\t\tfor _, cell := range row {\n\t\t\tfmt.Printf(\"%c\", cell)\n\t\t}\n\t\tfmt.Printf(\"\\n\")\n\t}\n}", "title": "" }, { "docid": "7bebbefa9627cb3f1334b1f3d9eff30c", "score": "0.48303276", "text": "func (o OutRow) String() string {\n\treturn fmt.Sprintf(\"%s,%s,%s\", // comma separated\n\t\to.Datetime,\n\t\to.Center,\n\t\tstrings.Join(func() (ss []string) {\n\t\t\tfor _, f := range o.Fields { // convert []float64=>[]string\n\t\t\t\ts := strconv.FormatFloat(f, 'f', -1, 64)\n\t\t\t\tss = append(ss, s)\n\t\t\t}\n\t\t\treturn\n\t\t}(), \",\"), // comma separated\n\t)\n}", "title": "" }, { "docid": "7ce720355fad650613167346e3d550ea", "score": "0.48223275", "text": "func CreateMarkdownRow(row int, panelRow int, grid Todo) string {\n\tif row < 0 || row > 2 {\n\t\tfmt.Fprintln(os.Stderr, \"Error: row should be 0, 1, or 2\")\n\t\treturn \"\"\n\t}\n\toffset := row * 3\n\tpanelOffset := panelRow * 3\n\tcenterid := panelOffset\n\n\tpanel := grid.Panel\n\tcenter := panel[4]\n\tleft := panel[0+panelRow*3]\n\tmiddle := panel[1+panelRow*3]\n\tright := panel[2+panelRow*3]\n\n\tgoal := Escape(grid.Goal)\n\tl := left.EscapeCell()\n\tm := middle.EscapeCell()\n\tr := right.EscapeCell()\n\tc := center.EscapeCell()\n\n\tb := make([]byte, 0, 128)\n\tfor i := 0; i < 3; i++ {\n\t\tb = append(b, \"|\"...)\n\t\tif row == 1 && i == 1 {\n\t\t\tb = append(b, c[centerid]...)\n\t\t\tcenterid++\n\t\t} else {\n\t\t\tb = append(b, l[i+offset]...)\n\t\t}\n\t}\n\tfor i := 0; i < 3; i++ {\n\t\tb = append(b, \"|\"...)\n\t\tif row == 1 && i == 1 {\n\t\t\tif panelRow == 1 {\n\t\t\t\tb = append(b, []byte(goal)...)\n\t\t\t} else {\n\t\t\t\tb = append(b, c[centerid]...)\n\t\t\t}\n\t\t\tcenterid++\n\t\t} else {\n\t\t\tb = append(b, m[i+offset]...)\n\t\t}\n\t}\n\tfor i := 0; i < 3; i++ {\n\t\tb = append(b, \"|\"...)\n\t\tif row == 1 && i == 1 {\n\t\t\tb = append(b, c[centerid]...)\n\t\t\tcenterid++\n\t\t} else {\n\t\t\tb = append(b, r[i+offset]...)\n\t\t}\n\t}\n\tb = append(b, \"|\"...)\n\n\treturn string(b)\n}", "title": "" }, { "docid": "1ba7299bc5cc25b22e2a0ef962dc2e84", "score": "0.48151687", "text": "func rewriteGrid(grid [][]string, ll int, ww int) [][]string {\n\tnewGrid := makeBlankGrid(ll, ww)\n\tfor r, row := range grid {\n\t\tfor c, seat := range row {\n\t\t\tif seat == \".\" {\n\t\t\t\tnewGrid[r][c] = \".\"\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tst := seat\n\t\t\tif c+1 < ww {\n\t\t\t\tst += grid[r][c+1] // E\n\t\t\t} else {\n\t\t\t\tst += \"x\"\n\t\t\t}\n\t\t\tif r+1 < ll && c+1 < ww {\n\t\t\t\tst += grid[r+1][c+1] // SE\n\t\t\t} else {\n\t\t\t\tst += \"x\"\n\t\t\t}\n\t\t\tif r+1 < ll {\n\t\t\t\tst += grid[r+1][c] // S\n\t\t\t} else {\n\t\t\t\tst += \"x\"\n\t\t\t}\n\t\t\tif r+1 < ll && c > 0 {\n\t\t\t\tst += grid[r+1][c-1] // SW\n\t\t\t} else {\n\t\t\t\tst += \"x\"\n\t\t\t}\n\t\t\tif c > 0 {\n\t\t\t\tst += grid[r][c-1] // W\n\t\t\t} else {\n\t\t\t\tst += \"x\"\n\t\t\t}\n\t\t\tif r > 0 && c > 0 {\n\t\t\t\tst += grid[r-1][c-1] // NW\n\t\t\t} else {\n\t\t\t\tst += \"x\"\n\t\t\t}\n\t\t\tif r > 0 {\n\t\t\t\tst += grid[r-1][c] // N\n\t\t\t} else {\n\t\t\t\tst += \"x\"\n\t\t\t}\n\t\t\tif r > 0 && c+1 < ww {\n\t\t\t\tst += grid[r-1][c+1] // NE\n\t\t\t} else {\n\t\t\t\tst += \"x\"\n\t\t\t}\n\t\t\tnewGrid[r][c] = st\n\t\t}\n\t}\n\treturn newGrid\n}", "title": "" }, { "docid": "4340f23adf4635373301515ba2109154", "score": "0.48116344", "text": "func (v *View) writeCells(x, y int, cells []cell) {\n\tvar newLen int\n\t// use maximum len available\n\tline := v.lines[y][:cap(v.lines[y])]\n\tmaxCopy := len(line) - x\n\tif maxCopy < len(cells) {\n\t\tcopy(line[x:], cells[:maxCopy])\n\t\tline = append(line, cells[maxCopy:]...)\n\t\tnewLen = len(line)\n\t} else { // maxCopy >= len(cells)\n\t\tcopy(line[x:], cells)\n\t\tnewLen = x + len(cells)\n\t\tif newLen < len(v.lines[y]) {\n\t\t\tnewLen = len(v.lines[y])\n\t\t}\n\t}\n\tv.lines[y] = line[:newLen]\n}", "title": "" }, { "docid": "63d785785121b34c501958a4b4dc303a", "score": "0.48071975", "text": "func decorateCell(value string) string {\n\tswitch strings.ToLower(value) {\n\tcase \"green\":\n\t\treturn \"<span class=\\\"label label-pill label-success\\\">green</span>\"\n\tcase \"yellow\":\n\t\treturn \"<span class=\\\"label label-pill label-warning\\\">yellow</span>\"\n\tcase \"red\":\n\t\treturn \"<span class=\\\"label label-pill label-danger\\\">red</span>\"\n\tcase \"poweredon\":\n\t\treturn \"<span class=\\\"label label-pill label-success\\\">poweredOn</span>\"\n\tcase \"poweredoff\":\n\t\treturn \"<span class=\\\"label label-pill label-danger\\\">poweredOff</span>\"\n\tcase \"yes\", \"true\", \"guesttoolsrunning\":\n\t\treturn \"<span class=\\\"label label-pill label-success\\\">Yes</span>\"\n\tcase \"no\", \"false\", \"guesttoolsnotrunning\":\n\t\treturn \"<span class=\\\"label label-pill label-danger\\\">No</span>\"\n\tcase \"ok\":\n\t\treturn \"<span class=\\\"label label-pill label-success\\\">OK</span>\"\n\tdefault:\n\t\treturn value\n\t}\n}", "title": "" }, { "docid": "470220ba82c46f38cd9af1ab56f85c00", "score": "0.48038158", "text": "func (c *CommandLine) formatResults(result client.Result, separator string, suppressHeaders bool) []string {\n\trows := []string{}\n\t// Create a tabbed writer for each result as they won't always line up\n\tfor i, row := range result.Series {\n\t\t// gather tags\n\t\ttags := []string{}\n\t\tfor k, v := range row.Tags {\n\t\t\ttags = append(tags, fmt.Sprintf(\"%s=%s\", k, v))\n\t\t\tsort.Strings(tags)\n\t\t}\n\n\t\tcolumnNames := []string{}\n\n\t\t// Only put name/tags in a column if format is csv\n\t\tif c.Format == \"csv\" {\n\t\t\tif len(tags) > 0 {\n\t\t\t\tcolumnNames = append([]string{\"tags\"}, columnNames...)\n\t\t\t}\n\n\t\t\tif row.Name != \"\" {\n\t\t\t\tcolumnNames = append([]string{\"name\"}, columnNames...)\n\t\t\t}\n\t\t}\n\n\t\tcolumnNames = append(columnNames, row.Columns...)\n\n\t\t// Output a line separator if we have more than one set or results and format is column\n\t\tif i > 0 && c.Format == \"column\" && !suppressHeaders {\n\t\t\trows = append(rows, \"\")\n\t\t}\n\n\t\t// If we are column format, we break out the name/tag to separate lines\n\t\tif c.Format == \"column\" && !suppressHeaders {\n\t\t\tif row.Name != \"\" {\n\t\t\t\tn := fmt.Sprintf(\"name: %s\", row.Name)\n\t\t\t\trows = append(rows, n)\n\t\t\t}\n\t\t\tif len(tags) > 0 {\n\t\t\t\tt := fmt.Sprintf(\"tags: %s\", (strings.Join(tags, \", \")))\n\t\t\t\trows = append(rows, t)\n\t\t\t}\n\t\t}\n\n\t\tif !suppressHeaders {\n\t\t\trows = append(rows, strings.Join(columnNames, separator))\n\t\t}\n\n\t\t// if format is column, write dashes under each column\n\t\tif c.Format == \"column\" && !suppressHeaders {\n\t\t\tlines := []string{}\n\t\t\tfor _, columnName := range columnNames {\n\t\t\t\tlines = append(lines, strings.Repeat(\"-\", len(columnName)))\n\t\t\t}\n\t\t\trows = append(rows, strings.Join(lines, separator))\n\t\t}\n\n\t\tfor _, v := range row.Values {\n\t\t\tvar values []string\n\t\t\tif c.Format == \"csv\" {\n\t\t\t\tif row.Name != \"\" {\n\t\t\t\t\tvalues = append(values, row.Name)\n\t\t\t\t}\n\t\t\t\tif len(tags) > 0 {\n\t\t\t\t\tvalues = append(values, strings.Join(tags, \",\"))\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tfor _, vv := range v {\n\t\t\t\tvalues = append(values, interfaceToString(vv))\n\t\t\t}\n\t\t\trows = append(rows, strings.Join(values, separator))\n\t\t}\n\t}\n\treturn rows\n}", "title": "" }, { "docid": "aea866c96a4c2299d7ae0f32dca33288", "score": "0.4799848", "text": "func (cell Cell) String() string {\n\treturn fmt.Sprintf(\"%2d\", cell.value)\n}", "title": "" }, { "docid": "b64878f860b9d3ee47860b5d054bc2e0", "score": "0.47911796", "text": "func (c *Canvas) String(separator string, fillEmptyWith string) string {\n\ttp := c.Size * c.Size\n\t// Total number of characters considering:\n\tstrLen := c.Size - 1 // Line Breaks\n\tstrLen += (tp - c.Size) * len(separator) // Separators\n\tstrLen += c.FilledPoints // Points\n\tstrLen += (tp - c.FilledPoints) * len(fillEmptyWith) // Fill Empty\n\n\t// Concatenating strings with the `+` is slow and uses a lot of memory,\n\t// using `copy` in a slice of bytes has been proved to be a better approach.\n\tbs := make([]byte, strLen)\n\t// Keep track of the length of the bytes array, concatenations will occur\n\t// using `bl` as the right-most index.\n\tbl := 0\n\n\tfor y := 0; y < c.Size; y++ {\n\t\tif mapY, exists := c.PointsMap[y]; exists {\n\t\t\tfor x := 0; x < c.Size; x++ {\n\t\t\t\tif value, exists := mapY[x]; exists {\n\t\t\t\t\tif value > 9 {\n\t\t\t\t\t\tvalue = 9\n\t\t\t\t\t}\n\t\t\t\t\tbl += copy(bs[bl:], []byte(strconv.Itoa(value)))\n\t\t\t\t} else {\n\t\t\t\t\tbl += copy(bs[bl:], []byte(fillEmptyWith))\n\t\t\t\t}\n\t\t\t\tif x < c.Size-1 {\n\t\t\t\t\tbl += copy(bs[bl:], []byte(separator))\n\t\t\t\t}\n\t\t\t}\n\t\t} else {\n\t\t\t// There aren't any values in this row, fill it the row anyway.\n\t\t\tfor x := 0; x < c.Size; x++ {\n\t\t\t\tbl += copy(bs[bl:], []byte(fillEmptyWith))\n\t\t\t\tif x < c.Size-1 {\n\t\t\t\t\tbl += copy(bs[bl:], []byte(separator))\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tif y < c.Size-1 {\n\t\t\t// Append a line break except when it's the last line.\n\t\t\tbl += copy(bs[bl:], \"\\n\")\n\t\t}\n\t}\n\n\treturn string(bs)\n}", "title": "" }, { "docid": "a56265b7cb3e9a9ca9dc436323f3b0b3", "score": "0.47763896", "text": "func (slice indexedLines) String() string {\n\tsort.Sort(slice)\n\t// nolint: prealloc\n\tvar lines []string\n\tfor _, line := range slice {\n\t\tlines = append(lines, line.line)\n\t}\n\treturn strings.Join(lines, \"\\n\")\n}", "title": "" }, { "docid": "d4f34bd2b59767634b36f0373f409207", "score": "0.47558022", "text": "func (cell Cell) String() string {\n\tout, err := json.MarshalIndent(cell, \"\", \" \")\n\tif err != nil {\n\t\tcell.logger.Panic(err)\n\t}\n\n\treturn string(out)\n}", "title": "" }, { "docid": "99104a2386a87570f34f72f722347c1b", "score": "0.4750066", "text": "func (enc TableEncoder) rowStyle(r [4]rune) rowStyle {\n\tvar left, right, middle, spacer, filler string\n\tspacer = strings.Repeat(string(r[1]), runewidth.RuneWidth(enc.lineStyle.Row[1]))\n\tfiller = string(r[1])\n\n\t// compact output, r[1] is set to \\0\n\tif r[1] == 0 {\n\t\tfiller = \" \"\n\t}\n\n\t// outside borders\n\tif enc.border > 1 {\n\t\tleft = string(r[0])\n\t\tright = string(r[3])\n\t}\n\n\t// initial spacer when borders are set\n\tif enc.border > 0 {\n\t\tleft += spacer\n\t}\n\n\tmiddle = \" \"\n\tif enc.border >= 1 { // inside border\n\t\tmiddle = string(r[2]) + spacer\n\t}\n\n\treturn rowStyle{\n\t\tleft: []byte(left),\n\t\twrapper: []byte(string(enc.lineStyle.Wrap[1])),\n\t\tmiddle: []byte(middle),\n\t\tright: []byte(right + string(enc.newline)),\n\t\tfiller: []byte(filler),\n\t\thasWrapping: runewidth.RuneWidth(enc.lineStyle.Row[1]) > 0,\n\t}\n}", "title": "" }, { "docid": "6eb65d36c6b8a03996d8c0c374ded10b", "score": "0.4746961", "text": "func (s *Sheet) print(startingCel string, slice *[]string, format int, bold bool) error {\n\tvar err error\n\tvar style int\n\n\t// Set styles\n\tjson, err := jsonStyle(10, format, bold)\n\tif err != nil {\n\t\treturn err\n\t}\n\tstyle, err = s.xlsx.NewStyle(string(json))\n\tif style > 0 && err == nil {\n\t\tcol, row := cell2axis(startingCel)\n\t\tcol += len(*slice)\n\t\ts.xlsx.SetCellStyle(s.name, startingCel, axis(col, row), style)\n\t}\n\n\t// Print row\n\ts.xlsx.SetSheetRow(s.name, startingCel, slice)\n\n\treturn nil\n}", "title": "" }, { "docid": "fa80e674b4c0436c57f04f1ef0c2aed4", "score": "0.47425568", "text": "func GridString(grid string, cols, rows int) string {\n\tif len(grid) != cols*rows {\n\t\tpanic(\"number of letters in grid must equal cols * rows\")\n\t}\n\tgrid = strings.ToUpper(grid)\n\tgridChars := []byte(grid)\n\n\tline := make([]string, 0, cols+2)\n\tline = append(line, \"\")\n\tfor i := 0; i < cols; i++ {\n\t\tline = append(line, \"---\")\n\t}\n\tline = append(line, \"\\n\")\n\thline := strings.Join(line, \"+\")\n\n\tgridLines := make([]string, 0, 2*rows+1)\n\tgridLines = append(gridLines, \"\")\n\tvar yi int\n\tfor y := 0; y < rows; y++ {\n\t\tyi = y * cols\n\t\tvar cell byte\n\t\tfor x := 0; x < cols; x++ {\n\t\t\tcell = gridChars[yi+x]\n\t\t\tif cell == 'Q' {\n\t\t\t\tline[1+x] = \" Qu\"\n\t\t\t} else {\n\t\t\t\tline[1+x] = fmt.Sprintf(\" %c \", cell)\n\t\t\t}\n\t\t}\n\t\tgridLines = append(gridLines, strings.Join(line, \"|\"))\n\t}\n\treturn strings.Join(append(gridLines, \"\"), hline)\n}", "title": "" }, { "docid": "4175c395349b9db19938c5d410060bfb", "score": "0.47362038", "text": "func (c Cell) String() string {\n\tif c.Alive {\n\t\treturn \"*\"\n\t} else {\n\t\treturn \" \"\n\t}\n}", "title": "" }, { "docid": "f26d0be17991ba794867a75a99443267", "score": "0.47355852", "text": "func (rows Rows) String() (s string) {\n\tfor x := range rows {\n\t\ts += fmt.Sprint(rows[x])\n\t}\n\treturn\n}", "title": "" }, { "docid": "739ec397261096865ff2c766f9c50b93", "score": "0.4733535", "text": "func formatRow(position int, month time.Time, projectName string, projectID string, contactPerson string, usedMargin float64, amount float64, currency string, locale string) []string {\n\n\t// format parameters as strings where necessary\n\tposString := strconv.Itoa(position)\n\tmonthFormat := \"2006-Jan\"\n\tmonthString := month.Format(monthFormat)\n\tname := trim(projectName)\n\tlocalisedMargin := formatFloatWithLocale(usedMargin, locale)\n\tlocalisedAmount := formatFloatWithLocale(amount, locale)\n\n\treturn []string{\n\t\tposString,\n\t\tmonthString,\n\t\tname,\n\t\tprojectID,\n\t\tcontactPerson,\n\t\tlocalisedMargin,\n\t\tlocalisedAmount,\n\t\tcurrency,\n\t}\n}", "title": "" }, { "docid": "dcae8f54477ccce59a8dd5eddde9d5ab", "score": "0.47297123", "text": "func (row row) ToString() string {\n\tvar resSb strings.Builder\n\tstrBuf := make([]string, len(row))\n\n\tfor k, el := range row {\n\t\tstrBuf[k] = fmt.Sprintf(\"%.4f\", el)\n\t}\n\tresSb.WriteString(strings.Join(strBuf, \" \"))\n\n\treturn resSb.String()\n}", "title": "" }, { "docid": "5d4190a021d216b34713248c5004f1a8", "score": "0.47289056", "text": "func (row *NetworkRow) Buffer() termui.Buffer {\n\tbuf := termui.NewBuffer()\n\t//This set the background of the whole row\n\tbuf.Area.Min = image.Point{row.X, row.Y}\n\tbuf.Area.Max = image.Point{row.X + row.Width, row.Y + row.Height}\n\tbuf.Fill(' ', row.ID.TextFgColor, row.ID.TextBgColor)\n\n\tfor _, col := range row.Columns {\n\t\tbuf.Merge(col.Buffer())\n\t}\n\treturn buf\n}", "title": "" }, { "docid": "073022b968ca3f406cf8fb0820645330", "score": "0.47285774", "text": "func (row *Line) String() string {\n\treturn fmt.Sprintf(\"%s\\t%s\\t%s\\t%d\",\n\t\tencodeTextToPrivate(row.Text),\n\t\trow.Dir,\n\t\trow.Stamp.Format(\"2006-01-02 15:04:05\"),\n\t\trow.Pid)\n}", "title": "" }, { "docid": "561b57d883ce0bbabea6f5731b2bf112", "score": "0.4721931", "text": "func (r *Row) rowContent(totals Row) string {\n\n\t// assume the data is empty so hide it.\n\tname := r.name\n\tif r.sumTimerWait == 0 && name != \"Totals\" {\n\t\tname = \"\"\n\t}\n\n\treturn fmt.Sprintf(\"%10s %6s|%6s %6s|%6s %6s %6s %6s %6s|%6s %6s %6s %6s %6s|%s\",\n\t\tlib.FormatTime(r.sumTimerWait),\n\t\tlib.FormatPct(lib.MyDivide(r.sumTimerWait, totals.sumTimerWait)),\n\n\t\tlib.FormatPct(lib.MyDivide(r.sumTimerRead, r.sumTimerWait)),\n\t\tlib.FormatPct(lib.MyDivide(r.sumTimerWrite, r.sumTimerWait)),\n\n\t\tlib.FormatPct(lib.MyDivide(r.sumTimerReadWithSharedLocks, r.sumTimerWait)),\n\t\tlib.FormatPct(lib.MyDivide(r.sumTimerReadHighPriority, r.sumTimerWait)),\n\t\tlib.FormatPct(lib.MyDivide(r.sumTimerReadNoInsert, r.sumTimerWait)),\n\t\tlib.FormatPct(lib.MyDivide(r.sumTimerReadNormal, r.sumTimerWait)),\n\t\tlib.FormatPct(lib.MyDivide(r.sumTimerReadExternal, r.sumTimerWait)),\n\n\t\tlib.FormatPct(lib.MyDivide(r.sumTimerWriteAllowWrite, r.sumTimerWait)),\n\t\tlib.FormatPct(lib.MyDivide(r.sumTimerWriteConcurrentInsert, r.sumTimerWait)),\n\t\tlib.FormatPct(lib.MyDivide(r.sumTimerWriteLowPriority, r.sumTimerWait)),\n\t\tlib.FormatPct(lib.MyDivide(r.sumTimerWriteNormal, r.sumTimerWait)),\n\t\tlib.FormatPct(lib.MyDivide(r.sumTimerWriteExternal, r.sumTimerWait)),\n\t\tname)\n}", "title": "" }, { "docid": "2089504c3091e3940c4112502f971d2a", "score": "0.47201717", "text": "func (enc *TableEncoder) row(vals []*Value, rs rowStyle) {\n\tvar l int\n\tfor {\n\t\t// left\n\t\tenc.w.Write(rs.left)\n\n\t\tvar remaining bool\n\t\tfor i, v := range vals {\n\t\t\tif v == nil {\n\t\t\t\tv = enc.empty\n\t\t\t}\n\n\t\t\t// write value\n\t\t\tif l <= len(v.Newlines) {\n\t\t\t\t// determine start, end, width\n\t\t\t\tstart, end, width := 0, len(v.Buf), 0\n\t\t\t\tif l > 0 {\n\t\t\t\t\tstart = v.Newlines[l-1][0] + 1\n\t\t\t\t}\n\t\t\t\tif l < len(v.Newlines) {\n\t\t\t\t\tend = v.Newlines[l][0]\n\t\t\t\t\twidth += v.Newlines[l][1]\n\t\t\t\t}\n\t\t\t\tif len(v.Tabs) != 0 && len(v.Tabs[l]) != 0 {\n\t\t\t\t\twidth += tabwidth(v.Tabs[l], enc.offsets[i], enc.tab)\n\t\t\t\t}\n\t\t\t\tif l == len(v.Newlines) {\n\t\t\t\t\twidth += v.Width\n\t\t\t\t}\n\n\t\t\t\t// calc padding\n\t\t\t\tpadding := enc.maxWidths[i] - width\n\n\t\t\t\t// add padding left\n\t\t\t\tif v.Align == AlignRight && padding > 0 {\n\t\t\t\t\tenc.w.Write(bytes.Repeat(rs.filler, padding))\n\t\t\t\t}\n\n\t\t\t\t// write\n\t\t\t\tenc.w.Write(v.Buf[start:end])\n\n\t\t\t\t// add padding right\n\t\t\t\tif v.Align == AlignLeft && padding > 0 {\n\t\t\t\t\tenc.w.Write(bytes.Repeat(rs.filler, padding))\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tenc.w.Write(bytes.Repeat(rs.filler, enc.maxWidths[i]))\n\t\t\t}\n\n\t\t\t// write newline wrap value\n\t\t\tif rs.hasWrapping {\n\t\t\t\tif l < len(v.Newlines) {\n\t\t\t\t\tenc.w.Write(rs.wrapper)\n\t\t\t\t} else {\n\t\t\t\t\tenc.w.Write(rs.filler)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tremaining = remaining || l < len(v.Newlines)\n\n\t\t\t// middle separator. If border == 0, the new line indicator\n\t\t\t// acts as the middle separator\n\t\t\tif i != len(enc.maxWidths)-1 && enc.border >= 1 {\n\t\t\t\tenc.w.Write(rs.middle)\n\t\t\t}\n\t\t}\n\n\t\t// right\n\t\tenc.w.Write(rs.right)\n\n\t\tif !remaining {\n\t\t\tbreak\n\t\t}\n\n\t\tl++\n\t}\n}", "title": "" }, { "docid": "c92a395036b3d3287c18a6fbeec8ae32", "score": "0.46969485", "text": "func (m Matrix) String() (s string) {\n\ts += fmt.Sprintf(\"%d-by-%d matrix\\n\", m.Nrow, m.Ncol)\n\tfor i, row := range m.Elem {\n\t\tif i == 0 {\n\t\t\ts += fmt.Sprint(row)\n\t\t} else {\n\t\t\ts += \"\\n\" + fmt.Sprint(row)\n\t\t}\n\t}\n\treturn s\n}", "title": "" }, { "docid": "0459b7cb8fcaf61bab07663550b4f09c", "score": "0.46910653", "text": "func (r *PGresult) Print() {\n\t/* print header */\n\tfor _, name := range r.Cols {\n\t\tfmt.Printf(\"\\033[%d;%dm%-*s \\033[0m\", 37, 1, len(name)+2, name)\n\t}\n\tfmt.Printf(\"\\n\")\n\n\t/* print data to buffer */\n\tfor colnum, rownum := 0, 0; rownum < r.Nrows; rownum, colnum = rownum+1, 0 {\n\t\tfor range r.Cols {\n\t\t\t/* m[row][column] */\n\t\t\tfmt.Printf(\"%-*s \", len(r.Result[rownum][colnum].String)+2, r.Result[rownum][colnum].String)\n\t\t\tcolnum++\n\t\t}\n\t\tfmt.Printf(\"\\n\")\n\t}\n}", "title": "" }, { "docid": "f4bbb9380c0b96d44943f0af3327dbf7", "score": "0.4690383", "text": "func PriParAt(x, y, width, height int, fg termbox.Attribute, format string,\n\targs ...interface{}) {\n\n\tfor i := x; i <= x+width; i++ {\n\t\tfor j := y; j <= y+height; j++ {\n\t\t\t// termbox.SetCell(i, j, ' ', fg, termbox.ColorGreen)\n\t\t\ttermbox.SetCell(i, j, ' ', fg, brushBG)\n\t\t}\n\t}\n\n\txInit := x + 1\n\tindent := 1\n\ts := fmt.Sprintf(format, args...)\n\tfor _, rne := range s {\n\t\tif rne != '\\n' {\n\t\t\ttermbox.SetCell(x, y, rne, fg, brushBG)\n\t\t}\n\t\tx++\n\t\tif x > xInit+width-1 || rne == '\\n' {\n\t\t\ty++\n\t\t\tx = xInit + indent - 1\n\t\t}\n\t}\n\n}", "title": "" }, { "docid": "427aaee1a0c9a9973d1a5b8088dfadba", "score": "0.46853325", "text": "func drawTable[V any](d *ScreenDrawer, style tcell.Style, configs []*columnConfig[V], data []V, highlightRowIdx int) {\n\tconst colBuffer = \" \" // extra buffer between columns\n\tcols := make([]*column[V], len(configs))\n\tfor i, cfg := range configs {\n\t\tcols[i] = &column[V]{cfg, runewidth.StringWidth(cfg.name)}\n\t}\n\t// adjust the column width to accommodate the widest value.\n\tfor _, v := range data {\n\t\tfor _, col := range cols {\n\t\t\tif w := runewidth.StringWidth(col.displayFn(v)); col.width < w {\n\t\t\t\tcol.width = w\n\t\t\t}\n\t\t}\n\t}\n\t// print header\n\theaderStyle := style.Background(tcell.ColorDimGray).Foreground(tcell.ColorWhite)\n\tfor _, col := range cols {\n\t\tif col.alignment == alignLeft {\n\t\t\td.Print(rpad(col.name, col.width)+colBuffer, headerStyle)\n\t\t} else {\n\t\t\td.Print(lpad(col.name, col.width)+colBuffer, headerStyle)\n\t\t}\n\t}\n\td.FillLine(' ', headerStyle)\n\t// print body\n\tfor i, v := range data {\n\t\trowStyle := style\n\t\tif highlightRowIdx == i {\n\t\t\trowStyle = style.Background(tcell.ColorDarkOliveGreen)\n\t\t}\n\t\tfor _, col := range cols {\n\t\t\tif col.alignment == alignLeft {\n\t\t\t\td.Print(rpad(col.displayFn(v), col.width)+colBuffer, rowStyle)\n\t\t\t} else {\n\t\t\t\td.Print(lpad(col.displayFn(v), col.width)+colBuffer, rowStyle)\n\t\t\t}\n\t\t}\n\t\td.FillLine(' ', rowStyle)\n\t}\n}", "title": "" }, { "docid": "ffe28d565ef00f17a4af892a2d0de992", "score": "0.4682939", "text": "func (this *Table) String() string {\n\tbuf := new(bytes.Buffer)\n\ttable := tablewriter.NewWriter(buf)\n\ttable.SetHeader(this.Columns)\n\ttable.SetAlignment(tablewriter.ALIGN_LEFT)\n\n\tfor i := range this.Rows {\n\t\tif row, err := this.StringRow(i, \"<nil>\"); err != nil {\n\t\t\tbuf.WriteString(fmt.Sprintf(\"%v\\n\", err))\n\t\t} else {\n\t\t\ttable.Append(row)\n\t\t}\n\t}\n\ttable.Render()\n\treturn buf.String()\n}", "title": "" }, { "docid": "10dd0f2e45354a2bdc48d47515456161", "score": "0.46696636", "text": "func (grid *SSGrid) DisplayRect(rect *SSRect) string {\r\n var buffer bytes.Buffer\r\n for r := rect.L; r <= rect.R; r++ {\r\n for c := rect.T; c <= rect.B; c++ {\r\n num := grid.Read(r, c)\r\n if num < 100 {\r\n buffer.WriteString(\" \")\r\n if num < 10 {\r\n buffer.WriteString(\" \")\r\n }\r\n }\r\n buffer.WriteString(strconv.Itoa(num))\r\n }\r\n buffer.WriteString(\"\\n\")\r\n }\r\n return buffer.String()\r\n}", "title": "" }, { "docid": "b53aebae6cf2cf0c73748389dddbd301", "score": "0.46677217", "text": "func (r *Line) String() string {\n\ts := make([]string, 4)\n\ts[0] = \"Start:\"\n\ts[1] = fmt.Sprintf(\"[%.2f, %.2f]\", r.start[0], r.start[1])\n\ts[2] = fmt.Sprint(\"End:\")\n\ts[3] = fmt.Sprintf(\"[%.2f, %.2f]\", r.finish[0], r.finish[1])\n\n\treturn strings.Join(s, \" \")\n}", "title": "" }, { "docid": "116878fb1000ea5a6d381a7828eae520", "score": "0.46649754", "text": "func setCell(sheet *xlsx.Sheet, cell *xlsx.Cell, value string, colNr int, colname string, coltype string, linecnt int) {\n\n\n\tvar myType int\n\n\tvar colPar *Col = myParam.confjson.Colskey[colname]\n\n\tif myParam.debug>0 {\n\t\tfmt.Println(\"----------------colPar:\")\n\t\tspew.Dump(colPar)\n\t\tfmt.Println(\"-----------------------\")\n\t}\n\n\tif colPar != nil {\n\t\t\tif linecnt == 1 && myParam.headerlines>0 { // headerline \n\t\t\t\tcoltype=\"text\" // headerline always text\n\t\t\t}\n\t\t\tif coltype == \"\" && colPar.Fldtype != \"\" { coltype=colPar.Fldtype }\n\t}\n\n\n\t// set value 1st\n\tmyType=setCellValue(cell,value,coltype )\n\n\t// then setup style\n\n\tvar cStyle *xlsx.Style\n\tvar cNumFmt string\n\tvar cValue string\n\tvar intVal int\n\tvar floatVal float64\n\tvar err error\n\tvar defStyle = xlsx.NewStyle()\n\tvar defFont *xlsx.Font\n\tvar date time.Time\n\n\tcStyle = cell.GetStyle()\n\tcNumFmt= cell.NumFmt\n\tcValue= cell.Value\n\n\tif colPar == nil { // use default type formats\n\t\tif myParam.debug>0 { fmt.Println(\" use default types:\", myType, coltype ) }\n\t\tswitch myType { // automatic type of value\n\t\t\tcase 3:\t\tcell.SetFormat(myParam.formatfloat)\n\t\t}\n\t\tswitch coltype {\n\t\t\tcase \"int\":\tcell.SetFormat(\"0\")\n\t\t\tcase \"date\":\n\t\t\t\t\t//cell.SetFormat(myParam.formatdate) // cell.SetFormat(\"d\\\\.m\\\\.yyyy;@\")\n\t\t\t\t\t//cell.SetFormat(myParam.formatdate) // cell.SetFormat(\"d.m.yyyy\")\n\t\t\t\t\tdate, err = time.Parse(\"2006-01-02\",value)\n\t\t\t\t\tif err == nil { // it's time\n\t\t\t\t\t\tdateFormat := myParam.formatdate\n\t\t\t\t\t\tdateFormat=ConvertTimeFormat(dateFormat)\n\t\t\t\t\t\tvalue=date.Format(dateFormat)\n\t\t\t\t\t\tsetCellValue(cell, value,\"\")\n\t\t\t\t\t\t//cell.SetFormat(myParam.formatdate)\n\t\t\t\t\t\tif myParam.debug>0 { fmt.Println(\"Date:\",date,value,dateFormat) }\n\t\t\t\t\t} else {\n\t\t\t\t\t\tsetCellValue(cell, value,\"\")\n\t\t\t\t\t\tcell.SetFormat(myParam.formatdate)\n\t\t\t\t\t\tif myParam.debug>0 { fmt.Println(\"Ei Date:\",value,myParam.formatdate) }\n\t\t\t\t\t\t//cell.Value=FormatTime(date)\n\t\t\t\t\t}\n\t\t\tcase \"float\":\tcell.SetFormat(myParam.formatfloat) // cell.SetFormat(\"#,##0.00\") // 2 decimals\n\t\t}\n\t\t// default style\n\t\tdefFont = xlsx.NewFont(myParam.fontsize, myParam.font)\n\t\tdefStyle = xlsx.NewStyle()\n\t\tdefStyle.Font = *defFont\n\t\tcell.SetStyle( defStyle )\n\t}\n\n\n\t// default has done if not used json config\n\tif myParam.defstyle == nil { return }\n\n\t// use config setup\n\t*defStyle = *myParam.defstyle\n\tif myParam.debug>0 {\n\t\tfmt.Println(\" Default Style\")\n\t\tspew.Dump(myParam.defstyle)\n\t\tfmt.Println(\"\")\n\t\tfmt.Println(\" Col:(\",colNr,\") \",colname)\n\t\tfmt.Println(\" Type:(\",colNr,\") \",coltype)\n\t\tfmt.Println(\" Cell Style: %# v\", pretty.Formatter(cStyle))\n\t\tfmt.Println(\" Cell Value:\", cValue, \" Format:\",cNumFmt)\n\t\tfmt.Println(\" MyType Value:\", myType)\n\t\tfmt.Println(\" defStyle:\", defStyle)\n\t\t}\n\tcell.SetStyle( defStyle )\n\tcStyle = cell.GetStyle()\n\tif myParam.debug>0 {\n\t\tfmt.Println(\" After CelleStyle: %# v\", pretty.Formatter(cStyle))\n\t\t}\n\n\tif colPar != nil { // we have json config for this field\n\t\t\tvar fontsize = myParam.fontsize\n\t\t\tif myParam.debug>0 { fmt.Println(\" Check json config:\",colname) }\n\n\t\t\tif linecnt == 1 && myParam.headerlines>0 { // headerline \n\t\t\t\tcoltype=\"text\" // headerline always text\n\t\t\t}\n\t\t\tif coltype == \"\" && colPar.Fldtype != \"\" { coltype=colPar.Fldtype }\n\n\t\t\tif myParam.debug>0 { fmt.Println(\" Set type:\",coltype) }\n\t\t\tswitch coltype {\n\t\t\t\tcase \"text\":\n\t\t\t\t\tcell.SetString(value)\n\t\t\t\tcase \"int\":\n\t\t\t\t\tintVal, err = strconv.Atoi(value)\n\t\t\t\t\tif err == nil { // it's Int\n\t\t\t\t\t\tif intVal < 100000000000 { // Long numbers are displayed incorrectly in Excel\n\t\t\t\t\t\t\tif myParam.debug>0 { fmt.Println(\" - Int:\",value, intVal) }\n\t\t\t\t\t\t\tcell.SetInt(intVal)\n\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\tif myParam.debug>0 { fmt.Println(\" - Int iso:\",value) }\n\t\t\t\t\t\t\tcell.SetValue(value)\n\t\t\t\t\t\t}\n\t\t\t\t\t} else {\n\t\t\t\t\t\t//cell.Value = v\n\t\t\t\t\t\tif myParam.debug>0 { fmt.Println(\" - Int str:\",value) }\n\t\t\t\t\t\tcell.SetValue(value)\n\t\t\t\t\t}\n\t\t\t\tcase \"float\":\n\t\t\t\t\tfloatVal, err = strconv.ParseFloat(value, 64)\n\t\t\t\t\tif err == nil { // It's float\n\t\t\t\t\t\tif myParam.debug>0 { fmt.Println(\" - Float:\",value, floatVal) }\n\t\t\t\t\t\tcell.SetFloat(floatVal)\n\t\t\t\t\t} else {\n\t\t\t\t\t\tif myParam.debug>0 { fmt.Println(\" - Float Str:\",value) }\n\t\t\t\t\t\tcell.SetValue(value)\n\t\t\t\t\t}\n\t\t\t\tcase \"date\":\n\t\t\t\t\t//cell.SetString(value)\n\t\t\t\t\t//cell.SetFormat(\"d\\\\.m\\\\.yyyy;@\")\n\t\t\t\t\t//cell.SetFormat(\"d.m.yyyy\")\n\t\t\t\t\tdate, err = time.Parse(\"2006-01-02\",value)\n\t\t\t\t\tif err == nil { // it's time\n\t\t\t\t\t\tdateFormat := myParam.formatdate\n\t\t\t\t\t\tif colPar.Format != \"\" { dateFormat=colPar.Format }\n\t\t\t\t\t\tdateFormat=ConvertTimeFormat(dateFormat)\n\t\t\t\t\t\tvalue=date.Format(dateFormat)\n\t\t\t\t\t\tsetCellValue(cell, value,\"\")\n\t\t\t\t\t\tif myParam.debug>0 { fmt.Println(\"parDate:\",date,value,dateFormat) }\n\t\t\t\t\t} else {\n\t\t\t\t\t\tsetCellValue(cell, value,\"\")\n\t\t\t\t\t\tif myParam.debug>0 { fmt.Println(\"parNoDate:\",value,myParam.formatdate) }\n\t\t\t\t\t}\n\n\t\t\t} // set type\n\n\t\t\tif colPar.Format != \"\" && coltype != \"date\" {\n\t\t\t\tif myParam.debug>0 { fmt.Println(\" Col-\",colname,\" format current:\",cell.GetNumberFormat,\" new format:\",colPar.Format) }\n\t\t\t\tcell.SetFormat(colPar.Format)\n\t\t\t}\n\n\t\t\tif colPar.Fontsize != \"\" {\n\t\t\t\tif myParam.debug>0 { fmt.Println(\" Col-\",colname,\" fontsize current:\",cStyle.Font.Size,\" new fontsize:\",colPar.Fontsize) }\n\t\t\t\t// overwrite fontsize default\n\t\t\t\tfontsize,_ = strconv.Atoi(colPar.Fontsize)\n\t\t\t\tcStyle.Font.Size=fontsize\n\t\t\t}\n\n\t\t\tif colPar.Width != \"\" {\n\t\t\t\tfloatVal, err = strconv.ParseFloat(colPar.Width, 64)\n\t\t\t\tif err == nil {\n\t\t\t\t\tcolsWidth[colNr]= (floatVal-2)\n\t\t\t\t\tsheet.SetColWidth(colNr+1,colNr+1,floatVal)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif colPar.Font != \"\" {\n\t\t\t\tif myParam.debug>0 { fmt.Println(\" Col-\",colname,\" font current:\",cStyle.Font.Name,\" new font:\",colPar.Font ) }\n\t\t\t\tcStyle.Font.Name=colPar.Font\n\t\t\t}\n\n\t\t\tif colPar.Align != \"\" {\n\t\t\t\tif myParam.debug>0 { fmt.Println(\" Col-\",colname,\" align current:\",cStyle.Alignment.Horizontal,\" new align:\",colPar.Align) }\n\t\t\t\tcStyle.Alignment.Horizontal=colPar.Align\n\t\t\t}\n\n\t\t\tif colPar.Bold != \"\" {\n\t\t\t\tif myParam.debug>0 { fmt.Println(\" Col-\",colname,\" bold current:\",cStyle.Font.Bold,\" new bold:\",colPar.Bold) }\n\t\t\t\tif colPar.Bold == \"true\" { cStyle.Font.Bold=true }\n\t\t\t\tif colPar.Bold == \"falsde\" { cStyle.Font.Bold=false }\n\t\t\t}\n\n\t\t\tif colPar.Underline != \"\" {\n\t\t\t\tif myParam.debug>0 { fmt.Println(\" Col-\",colname,\" Underline current:\",cStyle.Font.Underline,\" new Underline:\",colPar.Underline) }\n\t\t\t\tif colPar.Underline == \"true\" { cStyle.Font.Underline=true }\n\t\t\t\tif colPar.Underline == \"falsde\" { cStyle.Font.Underline=false }\n\t\t\t}\n\n\t\t\tif colPar.Italic != \"\" {\n\t\t\t\tif myParam.debug>0 { fmt.Println(\" Col-\",colname,\" Italic current:\",cStyle.Font.Underline,\" new Italic:\",colPar.Italic) }\n\t\t\t\tif colPar.Italic == \"true\" { cStyle.Font.Italic=true }\n\t\t\t\tif colPar.Italic == \"falsde\" { cStyle.Font.Italic=false }\n\t\t\t}\n\n\t\t\tcell.SetStyle(cStyle)\n\t\t\tcStyle = cell.GetStyle()\n\t\t\tif myParam.debug>0 {\n\t\t\t\tfmt.Println(\" After JSON CelleStyle: %# v\", pretty.Formatter(cStyle))\n\t\t\t}\n\t}\n}", "title": "" }, { "docid": "64bcd5ec83ce12a8ebd37bf08812b5cf", "score": "0.46636063", "text": "func main() {\n scanner := bufio.NewScanner(os.Stdin)\n scanner.Buffer(make([]byte, 1000000), 1000000)\n\n var W, H int\n scanner.Scan()\n fmt.Sscan(scanner.Text(),&W, &H)\n\n grid := [][]string{}\n for i := 0; i < H; i++ {\n scanner.Scan()\n line := scanner.Text()\n // _ = line // to avoid unused error\n\n row := []string{}\n chars := append([]string{\" \"}, strings.Split(line, \"\")...)\n for index, char := range chars {\n if index == len(chars) - 1 || char != chars[index + 1] {\n row = append(row, char)\n }\n }\n\n grid = append(grid, row)\n }\n\n topRow := grid[0]\n bottomRow := grid[len(grid) - 1]\n grid = grid[1:len(grid) - 1]\n\n for rowIndex := len(grid) - 1; rowIndex >= 0; rowIndex-- {\n for columnIndex, char := range grid[rowIndex] {\n if char == \"-\" {\n bottomRow[columnIndex - 1], bottomRow[columnIndex + 1] = bottomRow[columnIndex + 1], bottomRow[columnIndex - 1]\n }\n }\n }\n\n results := []string{}\n for index, char := range topRow {\n if char != \" \" {\n results = append(results, char + bottomRow[index])\n }\n }\n\n // fmt.Fprintln(os.Stderr, \"Debug messages...\")\n // fmt.Println(\"answer\")// Write answer to stdout\n for _, result := range results {\n fmt.Println(result)\n }\n}", "title": "" }, { "docid": "5afbfdaba86c2c394f76ac3c8516dd39", "score": "0.46618867", "text": "func (r QRow) Format(fs fmt.State, c rune) {\n\tvar (\n\t\ts = r.Align\n\t\tw, wOk = fs.Width()\n\t\tp, pOk = fs.Precision()\n\t\tbuf alphabet.QColumns\n\t)\n\tif s != nil {\n\t\tif pOk {\n\t\t\tbuf = s.Seq[:min(p, len(s.Seq))]\n\t\t} else {\n\t\t\tbuf = s.Seq\n\t\t}\n\t}\n\n\tswitch c {\n\tcase 'v':\n\t\tif fs.Flag('#') {\n\t\t\ttype shadowQRow QRow\n\t\t\tsr := fmt.Sprintf(\"%#v\", shadowQRow(r))\n\t\t\tfmt.Fprintf(fs, \"%T%s\", r, sr[strings.Index(sr, \"{\"):])\n\t\t\treturn\n\t\t}\n\t\tfallthrough\n\tcase 's':\n\t\tif s == nil {\n\t\t\tfmt.Fprint(fs, \"<nil>\")\n\t\t\treturn\n\t\t}\n\t\tif !fs.Flag('-') {\n\t\t\tfmt.Fprintf(fs, \"%q \", r.Name())\n\t\t}\n\t\tfor _, qc := range buf {\n\t\t\tfmt.Fprintf(fs, \"%c\", s.QFilter(s.Alpha, s.Threshold, qc[r.Row]))\n\t\t}\n\t\tif pOk && p < s.Len() {\n\t\t\tfmt.Fprint(fs, \"...\")\n\t\t}\n\tcase 'a':\n\t\tif s == nil {\n\t\t\treturn\n\t\t}\n\t\tr.formatDescLineTo(fs, '>')\n\t\tfor i, qc := range buf {\n\t\t\tfmt.Fprintf(fs, \"%c\", s.QFilter(s.Alpha, s.Threshold, qc[r.Row]))\n\t\t\tif wOk && i < s.Len()-1 && i%w == w-1 {\n\t\t\t\tfmt.Fprintln(fs)\n\t\t\t}\n\t\t}\n\t\tif pOk && p < s.Len() {\n\t\t\tfmt.Fprint(fs, \"...\")\n\t\t}\n\tcase 'q':\n\t\tif s == nil {\n\t\t\treturn\n\t\t}\n\t\tr.formatDescLineTo(fs, '@')\n\t\tfor _, qc := range buf {\n\t\t\tfmt.Fprintf(fs, \"%c\", qc[r.Row].L)\n\t\t}\n\t\tif pOk && p < s.Len() {\n\t\t\tfmt.Fprintln(fs, \"...\")\n\t\t} else {\n\t\t\tfmt.Fprintln(fs)\n\t\t}\n\t\tif fs.Flag('+') {\n\t\t\tr.formatDescLineTo(fs, '+')\n\t\t} else {\n\t\t\tfmt.Fprintln(fs, \"+\")\n\t\t}\n\t\tfor _, qc := range buf {\n\t\t\te := qc[r.Row].Q.Encode(s.Encode)\n\t\t\tif e >= unicode.MaxASCII {\n\t\t\t\te = unicode.MaxASCII - 1\n\t\t\t}\n\t\t\tfmt.Fprintf(fs, \"%c\", e)\n\t\t}\n\t\tif pOk && p < s.Len() {\n\t\t\tfmt.Fprint(fs, \"...\")\n\t\t}\n\tdefault:\n\t\tfmt.Fprintf(fs, \"%%!%c(alignment.QRow=%.10s)\", c, s)\n\t}\n}", "title": "" }, { "docid": "2e60312683ad7c422f1b44048e37e02d", "score": "0.46613884", "text": "func (row *Row) String() string {\n\tvar buffer bytes.Buffer\n\n\tbuffer.WriteString(row.name)\n\tbuffer.WriteString(\" \")\n\tbuffer.WriteString(row.typing)\n\tfor _, property := range row.properties {\n\t\tbuffer.WriteString(\" \")\n\t\tbuffer.WriteString(property)\n\t}\n\n\treturn buffer.String()\n}", "title": "" }, { "docid": "c88c8a9708efd8c6a863251677c657e0", "score": "0.46595475", "text": "func (m *Matrix) String() string {\n\tvar res bytes.Buffer\n\tres.WriteRune('[')\n\tfor row := 0; row < m.Rows; row++ {\n\t\tif row != 0 {\n\t\t\tres.WriteString(\"; \")\n\t\t}\n\t\tfor col := 0; col < m.Cols; col++ {\n\t\t\tif col != 0 {\n\t\t\t\tres.WriteRune(' ')\n\t\t\t}\n\t\t\tval := m.Get(row, col)\n\t\t\tres.WriteString(strconv.FormatFloat(val, 'g', outputPrecision, 64))\n\t\t}\n\t}\n\tres.WriteRune(']')\n\treturn res.String()\n}", "title": "" }, { "docid": "f3a236d3a8027f0c5591f39400170fca", "score": "0.4648263", "text": "func (m *Map) String() string {\n\tstr := \"\"\n\tfor row := 0; row < m.Rows; row++ {\n\t\tfor col := 0; col < m.Cols; col++ {\n\t\t\ts := m.itemGrid[row*m.Cols+col].Symbol()\n\t\t\tstr += string([]byte{s}) + \" \"\n\t\t}\n\t\tstr += \"\\n\"\n\t}\n\treturn str\n}", "title": "" }, { "docid": "a62288ec0bf86afdbb45e7ae273141df", "score": "0.46300268", "text": "func Columnise(w *tabwriter.Writer, opt []string, cc int){\n\tmod := len(opt) % cc\n\n\t// Separate full divisible from the mod.\n\tdivList := opt[:len(opt)-mod]\n\tmodList := opt[len(divList):]\n\n\tfor i := 0; i < len(divList); i=i+cc {\n\t\tvar row string\n\t\tfor t := 0; t < cc; t++ {\n\t\t\trow = row + fmt.Sprintf(\"%s\\t\", divList[i+t])\n\t\t}\n\t\tfmt.Fprintln(w, row)\n\t}\n\n\tif len(modList) != 0 {\n\t\tvar row string\n\t\tfor i := range modList {\n\t\t\trow = row + fmt.Sprintf(\"%s\\t\", modList[i])\n\t\t}\n\t\tfmt.Fprintln(w, row)\n\t}\n}", "title": "" }, { "docid": "71e185e2716955d8e6ea70372026dcbc", "score": "0.46294963", "text": "func (board Board) String() string {\n\tvar combinations uint64\n\tcombinations = 1\n\ts := \"\"\n\n\tfor y := range board.loc {\n\n\t\tfor x := range board.loc[y] {\n\t\t\tloc := &board.loc[y][x]\n\t\t\ts = s + fmt.Sprintf(\"%v \", boardLocationTypeDescription(loc.positionType))\n\t\t}\n\t\t// see the length of the current channels ... note this might not be a very\n\t\t// fair picture as the act of printing something probably give a chance for\n\t\t// the coroutines to run a bit more ...\n\t\tfor x := range board.loc[y] {\n\t\t\tloc := &board.loc[y][x]\n\t\t\ts = s + fmt.Sprintf(\"%3v \", len(loc.edgePairChan))\n\t\t}\n\n\t\t/*\n\t\t\t\t\ts = s + \" \"\n\t\t\t\t\tfor x := range board.loc[y] {\n\t\t\t\t\t\tloc := &board.loc[y][x]\n\t\t\t if loc.\n\t\t\t\t\t\ts = s + fmt.Sprintf(\"%v \", tile.rotation)\n\t\t\t\t\t} */\n\t\t/*\n\t\t\ts = s + \" \"\n\t\t\tfor x := range board.loc[y] {\n\t\t\t\tloc := &board.loc[y][x]\n\n\t\t\t\tif loc.tile != nil {\n\t\t\t\t\ts = s + fmt.Sprintf(\"%2v \", loc.tile.tileNumber)\n\t\t\t\t} else {\n\t\t\t\t\ts = s + fmt.Sprintf(\". \")\n\t\t\t\t}\n\t\t\t}\n\t\t\ts = s + \" \"\n\t\t*/\n\t\tfor x := range board.loc[y] {\n\t\t\tloc := &board.loc[y][x]\n\n\t\t\tif loc.tile != nil {\n\t\t\t\ts = s + fmt.Sprintf(\"%3v/%3v \", loc.listSize, loc.index)\n\t\t\t\tcombinations = combinations * uint64(loc.listSize)\n\t\t\t} else {\n\t\t\t\ts = s + fmt.Sprintf(\". \")\n\t\t\t}\n\t\t}\n\t\ts = s + \" \"\n\t\tfor x := range board.loc[y] {\n\t\t\tloc := &board.loc[y][x]\n\t\t\ts = s + fmt.Sprintf(\"%16v \", loc.noTimesVisited)\n\t\t}\n\t\ts = s + \"\\n\"\n\t}\n\ts = s + fmt.Sprintf(\"Current no of combinations: %v\\n\", combinations)\n\ts = s + boardshowTilesPlaced(board)\n\treturn s\n}", "title": "" }, { "docid": "3dacd20e688838fd7b4cb8667dc6f4fd", "score": "0.46280813", "text": "func ToString(table Table) string {\n\t// maxInt returns the maximum of a list of integers\n\tmaxInt := func(slc []int) (max int) {\n\t\tfor _, i := range slc {\n\t\t\tif i > max {\n\t\t\t\tmax = i\n\t\t\t}\n\t\t}\n\t\treturn max\n\t}\n\t// longestRow finds the longest row in the table and returns its length\n\tlongestRow := func(table Table) int {\n\t\tif len(table) < 1 {\n\t\t\treturn 0\n\t\t}\n\t\tmax := len(table[0])\n\t\tfor _, row := range table {\n\t\t\tif len(row) > max {\n\t\t\t\tmax = len(row)\n\t\t\t}\n\t\t}\n\t\treturn max\n\t}\n\t// longestInColumn returns the length of the longest string in the given\n\t// slice\n\tlongestInColumn := func(col Column) int {\n\t\tstrLengths := func(slc []string) (lengths []int) {\n\t\t\tfor _, str := range slc {\n\t\t\t\tlengths = append(lengths, utf8.RuneCountInString(str))\n\t\t\t}\n\t\t\treturn lengths\n\t\t}\n\t\treturn maxInt(strLengths(col))\n\t}\n\t// columnWidths gets the lengths of the widest strings in each column of a\n\t// table\n\tcolumnWidths := func(table Table) []int {\n\t\tcolumnWidths := []int{}\n\t\tfor _, row := range table {\n\t\t\tfor i, item := range row {\n\t\t\t\titemLength := utf8.RuneCountInString(item)\n\t\t\t\tif len(columnWidths) <= i {\n\t\t\t\t\tcolumnWidths = append(columnWidths, itemLength)\n\t\t\t\t} else if columnWidths[i] < itemLength {\n\t\t\t\t\tcolumnWidths[i] = itemLength\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\treturn columnWidths\n\t}\n\n\trows := []string{}\n\tlongest := longestRow(table)\n\tfor _, row := range table {\n\t\trowStr := \"\\n| \"\n\t\tfor i := 0; i < longest; i++ {\n\t\t\titem := \"\"\n\t\t\tif len(row) > i {\n\t\t\t\titem = row[i]\n\t\t\t}\n\t\t\tcolumnWidth := longestInColumn(GetColumn(i, table))\n\t\t\trowStr = rowStr + padString(item, \" \", columnWidth) + \" | \"\n\t\t}\n\t\trows = append(rows, rowStr)\n\t}\n\tmaxLength := 0\n\tfor _, row := range rows {\n\t\tlength := utf8.RuneCountInString(row)\n\t\tif length > maxLength {\n\t\t\tmaxLength = length\n\t\t}\n\t}\n\t// construct RST style row dividers\n\tnormalDivider := \"+\"\n\theaderDivider := \"+\"\n\tfor _, width := range columnWidths(table) {\n\t\tnormalDivider += repeatString(\"-\", width) + \"--+\"\n\t\theaderDivider += repeatString(\"=\", width) + \"==+\"\n\t}\n\t// intersperse those dividers\n\tseparatedRows := []string{}\n\tfor i, row := range rows {\n\t\tdivider := normalDivider\n\t\tif i == 0 {\n\t\t\tdivider = headerDivider\n\t\t}\n\t\tseparatedRows = append(separatedRows, row, \"\\n\"+divider)\n\t}\n\treturn normalDivider + strings.Join(separatedRows, \"\")\n}", "title": "" }, { "docid": "0676f7e5dcbe5acac70990a444cc1b0b", "score": "0.46183902", "text": "func drawline(i int32, cl int32, cr int32, lintype int32, noheight int32, shortl int32) {\n\tvar exhr []byte\n\tvar exhl []byte\n\tvar lnch []byte\n\tvar lcount int32\n\tvar ln int32\n\tvar linpos int32\n\tvar oldpos int32\n\tvar nodata int32\n\tlcount = 0\n\texhl = []byte(\"\\x00\")\n\texhr = exhl\n\tswitch lintype {\n\tcase '-':\n\t\tlcount = 1\n\tcase '=':\n\t\tlcount = func() int32 {\n\t\t\tif pr1403 != 0 {\n\t\t\t\treturn 1\n\t\t\t}\n\t\t\treturn 2\n\t\t}()\n\tcase 4:\n\t\tlcount = 1\n\t\tbreak\n\t}\n\tif lcount <= 0 {\n\t\treturn\n\t}\n\tnodata = noarch.BoolToInt(cr-cl >= ncol || noheight != 0 || allh(i) != 0)\n\tif noarch.Not(nodata) {\n\t\tnoarch.Fprintf(tabout, []byte(\"\\\\v'-.5m'\\x00\"))\n\t}\n\t{\n\t\toldpos = 0\n\t\tfor ln = oldpos; ln < lcount; ln++ {\n\t\t\tlinpos = 2*ln - lcount + 1\n\t\t\tif linpos != oldpos {\n\t\t\t\tnoarch.Fprintf(tabout, []byte(\"\\\\v'%dp'\\x00\"), linpos-oldpos)\n\t\t\t}\n\t\t\toldpos = linpos\n\t\t\tif shortl == 0 {\n\t\t\t\ttohcol(cl)\n\t\t\t\tif lcount > 1 {\n\t\t\t\t\tswitch interv(i, cl) {\n\t\t\t\t\tcase 1:\n\t\t\t\t\t\texhl = func() []byte {\n\t\t\t\t\t\t\tif ln == 0 {\n\t\t\t\t\t\t\t\treturn []byte(\"1p\\x00\")\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\treturn []byte(\"-1p\\x00\")\n\t\t\t\t\t\t}()\n\t\t\t\t\tcase 2:\n\t\t\t\t\t\texhl = func() []byte {\n\t\t\t\t\t\t\tif ln == 1 {\n\t\t\t\t\t\t\t\treturn []byte(\"1p\\x00\")\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\treturn []byte(\"-1p\\x00\")\n\t\t\t\t\t\t}()\n\t\t\t\t\tcase 3:\n\t\t\t\t\t\texhl = []byte(\"1p\\x00\")\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t\tif exhl[0] != 0 {\n\t\t\t\t\t\tnoarch.Fprintf(tabout, []byte(\"\\\\h'%s'\\x00\"), exhl)\n\t\t\t\t\t}\n\t\t\t\t} else if lcount == 1 {\n\t\t\t\t\tswitch interv(i, cl) {\n\t\t\t\t\tcase 1:\n\t\t\t\t\t\tfallthrough\n\t\t\t\t\tcase 2:\n\t\t\t\t\t\texhl = []byte(\"-1p\\x00\")\n\t\t\t\t\tcase 3:\n\t\t\t\t\t\texhl = []byte(\"1p\\x00\")\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t\tif exhl[0] != 0 {\n\t\t\t\t\t\tnoarch.Fprintf(tabout, []byte(\"\\\\h'%s'\\x00\"), exhl)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tif lcount > 1 {\n\t\t\t\t\tswitch interv(i, cr+1) {\n\t\t\t\t\tcase 1:\n\t\t\t\t\t\texhr = func() []byte {\n\t\t\t\t\t\t\tif ln == 0 {\n\t\t\t\t\t\t\t\treturn []byte(\"-1p\\x00\")\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\treturn []byte(\"+1p\\x00\")\n\t\t\t\t\t\t}()\n\t\t\t\t\tcase 2:\n\t\t\t\t\t\texhr = func() []byte {\n\t\t\t\t\t\t\tif ln == 1 {\n\t\t\t\t\t\t\t\treturn []byte(\"-1p\\x00\")\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\treturn []byte(\"+1p\\x00\")\n\t\t\t\t\t\t}()\n\t\t\t\t\tcase 3:\n\t\t\t\t\t\texhr = []byte(\"-1p\\x00\")\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t} else if lcount == 1 {\n\t\t\t\t\tswitch interv(i, cr+1) {\n\t\t\t\t\tcase 1:\n\t\t\t\t\t\tfallthrough\n\t\t\t\t\tcase 2:\n\t\t\t\t\t\texhr = []byte(\"+1p\\x00\")\n\t\t\t\t\tcase 3:\n\t\t\t\t\t\texhr = []byte(\"-1p\\x00\")\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tnoarch.Fprintf(tabout, []byte(\"\\\\h'|\\\\n(%2su'\\x00\"), reg(cl, 0))\n\t\t\t}\n\t\t\tnoarch.Fprintf(tabout, []byte(\"\\\\s\\\\n(%d\\x00\"), 33)\n\t\t\tif linsize != 0 {\n\t\t\t\tnoarch.Fprintf(tabout, []byte(\"\\\\v'-\\\\n(%dp/6u'\\x00\"), 33)\n\t\t\t}\n\t\t\tif shortl != 0 {\n\t\t\t\tnoarch.Fprintf(tabout, []byte(\"\\\\l'|\\\\n(%2su'\\x00\"), reg(cr, 2))\n\t\t\t} else {\n\t\t\t\tlnch = []byte(\"\\\\(ul\\x00\")\n\t\t\t\tif pr1403 != 0 {\n\t\t\t\t\tif lintype == 2 {\n\t\t\t\t\t\tlnch = []byte(\"=\\x00\")\n\t\t\t\t\t} else {\n\t\t\t\t\t\tlnch = []byte(\"\\\\(ru\\x00\")\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tif cr+1 >= ncol {\n\t\t\t\t\tnoarch.Fprintf(tabout, []byte(\"\\\\l'|\\\\n(TWu%s%s'\\x00\"), exhr, lnch)\n\t\t\t\t} else {\n\t\t\t\t\tnoarch.Fprintf(tabout, []byte(\"\\\\l'(|\\\\n(%2su+|\\\\n(%2su)/2u%s%s'\\x00\"), reg(cr, 2), reg(cr+1, 0), exhr, lnch)\n\t\t\t\t}\n\t\t\t}\n\t\t\tif linsize != 0 {\n\t\t\t\tnoarch.Fprintf(tabout, []byte(\"\\\\v'\\\\n(%dp/6u'\\x00\"), 33)\n\t\t\t}\n\t\t\tnoarch.Fprintf(tabout, []byte(\"\\\\s0\\x00\"))\n\t\t}\n\t}\n\tif oldpos != 0 {\n\t\tnoarch.Fprintf(tabout, []byte(\"\\\\v'%dp'\\x00\"), -oldpos)\n\t}\n\tif noarch.Not(nodata) {\n\t\tnoarch.Fprintf(tabout, []byte(\"\\\\v'+.5m'\\x00\"))\n\t}\n}", "title": "" }, { "docid": "5dd338f288dbefc19cd0ab12e3e420b3", "score": "0.46126965", "text": "func (l Line) String() string {\n\tw := strings.Builder{}\n\tw.WriteRune('[')\n\tfor _, p := range l {\n\t\tw.WriteString(p.String() + \" \")\n\t}\n\tw.WriteRune(']')\n\treturn w.String()\n}", "title": "" }, { "docid": "6811e7d8f0adb3c506b3dcdd68e9cdf2", "score": "0.46037853", "text": "func (ts *TableSpec) Format(buf *TrackedBuffer) {\n\tbuf.Myprintf(\"(\\n\")\n\tfor i, col := range ts.Columns {\n\t\tif i == 0 {\n\t\t\tbuf.Myprintf(\"\\t%v\", col)\n\t\t} else {\n\t\t\tbuf.Myprintf(\",\\n\\t%v\", col)\n\t\t}\n\t}\n\tfor _, idx := range ts.Indexes {\n\t\tbuf.Myprintf(\",\\n\\t%v\", idx)\n\t}\n\n\tbuf.Myprintf(\"\\n)%s\", strings.Replace(ts.Options, \", \", \",\\n \", -1))\n}", "title": "" }, { "docid": "5a778c3f4eb8fe70ce323f8fb530cca4", "score": "0.46029544", "text": "func (g *Grid) String() string {\n\treturn fmt.Sprintln(g.data)\n}", "title": "" }, { "docid": "e025e4a2349f4214e28665562d472714", "score": "0.45903486", "text": "func getCellRefsAsString(cellRefs []CellRef) string {\n\tvar s string\n\tfor i := 0; i < len(cellRefs); i++ {\n\t\tif i > 0 {\n\t\t\ts = s + \", \"\n\t\t}\n\t\ts = s + getBoardRowLetter(cellRefs[i].row) + fmt.Sprintf(\"%d\", 1+cellRefs[i].column)\n\t}\n\treturn s\n}", "title": "" }, { "docid": "2fbadd44e514ffb36a0f50a6a46b94d0", "score": "0.4583413", "text": "func (c *ConsCell) String() string {\n\tout := &bytes.Buffer{}\n\tout.WriteString(\"(\")\n\tfor current := c; current != NIL; current = current.Cdr {\n\t\tif c != current {\n\t\t\tout.WriteString(\", \")\n\t\t}\n\t\tout.WriteString(strconv.Itoa(current.Car))\n\n\t}\n\tout.WriteString(\")\")\n\n\treturn out.String()\n}", "title": "" }, { "docid": "fa79bfbeadb309fe1dec84b877de8341", "score": "0.45813677", "text": "func printGeneration(grid [][]int) {\n\n\tvar gen string\n\n\tfor _, row := range grid {\n\t\tfor _, col := range row {\n\n\t\t\tswitch col {\n\t\t\tcase 1:\n\t\t\t\tgen += fmt.Sprintf(\"%v\", \"█\")\n\t\t\tcase 0:\n\t\t\t\tgen += fmt.Sprintf(\"%v\", \"░\")\n\t\t\t}\n\t\t}\n\t\tgen += fmt.Sprintf(\"\\n\")\n\t}\n\n\tfmt.Print(\"\\x0c\")\n\tfmt.Println(gen)\n\n\ttime.Sleep(time.Second / 30)\n}", "title": "" }, { "docid": "631f84d5625ca07c4b45156aed6aeb94", "score": "0.457584", "text": "func (b playerBoard) String() string {\n\tvar buf bytes.Buffer\n\tfor _, row := range b.boardRepresentation {\n\t\tvar rowBuf bytes.Buffer\n\t\tfor _, point := range row {\n\t\t\t_, err := fmt.Fprintf(&rowBuf, \"%s \", point)\n\t\t\tif err != nil {\n\t\t\t\treturn err.Error()\n\t\t\t}\n\t\t}\n\n\t\t_, err := fmt.Fprintf(&buf, \"%s\\n\", strings.TrimSpace(rowBuf.String()))\n\t\tif err != nil {\n\t\t\treturn err.Error()\n\t\t}\n\t}\n\treturn buf.String()\n}", "title": "" }, { "docid": "769a36a12c3ac8f18af061de53535142", "score": "0.4565956", "text": "func (m *Matrix) TextAsOneLine(delimiter string) (text string) {\n\ttext = \"\"\n\tfor _, val := range m.matrix {\n\t\tif text == \"\" {\n\t\t\ttext = fmt.Sprintf(\"%f\", val)\n\t\t} else {\n\t\t\ttext = fmt.Sprintf(\"%s%s%f\", text, delimiter, val)\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "4f3b2f47a31449183df40c1f3907385c", "score": "0.4563973", "text": "func (m *Matrix) String() string {\n\tbuffer := bytes.NewBuffer(nil)\n\n\trows, cols := m.Size()\n\n\tfor row := 0; row < rows; row++ {\n\t\tfor col := 0; col < cols; col++ {\n\t\t\tbuffer.WriteString(strconv.FormatFloat(m.Get(row, col), 'f', -1, 64))\n\t\t\tbuffer.WriteRune(' ')\n\t\t}\n\t\tbuffer.WriteRune('\\n')\n\t}\n\n\treturn buffer.String()\n}", "title": "" }, { "docid": "6ad1a4afbc777fc4b918f2e3d59b50fe", "score": "0.45521566", "text": "func (grid *SSGrid) String() string {\r\n return grid.DisplayRect(grid.root.bounds)\r\n}", "title": "" }, { "docid": "36361dec16bb26988df86395f2dfc060", "score": "0.45473653", "text": "func (res *Result) Format() []map[string]interface{} {\n\tvar items []map[string]interface{}\n\n\tfor _, row := range res.Rows {\n\t\titem := make(map[string]interface{})\n\n\t\tfor i, c := range res.Columns {\n\t\t\titem[c] = row[i]\n\t\t}\n\n\t\titems = append(items, item)\n\t}\n\n\treturn items\n}", "title": "" }, { "docid": "fd898b0f4bbbbc975f2abffdfe28bc3b", "score": "0.45455876", "text": "func (row Row) String() string {\n\tif len(row) == 0 {\n\t\treturn \"{}\"\n\t}\n\n\theader := row.Header() // make order predictable\n\tbuff := append(append(append(append([]byte(`{ \"`), header[0]...), `\" : \"`...), row[header[0]]...), '\"')\n\n\tfor _, col := range header[1:] {\n\t\tbuff = append(append(append(append(append(buff, `, \"`...), col...), `\" : \"`...), row[col]...), '\"')\n\t}\n\n\tbuff = append(buff, \" }\"...)\n\treturn *(*string)(unsafe.Pointer(&buff))\n}", "title": "" } ]
88aa928c58ba94fd2b83ba551bfa55e8
CollectionRepositoryMiddleware tracks request and their latency, and adds spans to context.
[ { "docid": "f3cb698d310a81a97036d83332e6361a", "score": "0.51819", "text": "func CollectionRepositoryMiddleware(tracer opentracing.Tracer, repo lbs.CollectionRepository) lbs.CollectionRepository {\n\treturn collectionRepositoryMiddleware{\n\t\ttracer: tracer,\n\t\trepo: repo,\n\t}\n}", "title": "" } ]
[ { "docid": "92211b0cbccdcb1a775f4f814b47e106", "score": "0.54984784", "text": "func Collector(w http.ResponseWriter, r *http.Request) {\n\t// Make sure we can only be called with an HTTP POST request.\n\tif r.Method != \"POST\" {\n\t\tw.Header().Set(\"Allow\", \"POST\")\n\t\tw.WriteHeader(http.StatusMethodNotAllowed)\n\t\treturn\n\t}\n\n\tdefer r.Body.Close()\n\tbody, err := ioutil.ReadAll(r.Body)\n\n\tif err != nil {\n\t\thttp.Error(w, \"No JSON Body Posted\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tworkItemsAddedCount, err := addWorkToQueue(body)\n\n\tif err != nil {\n\t\thttp.Error(w, \"Cannot parse json body\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t// Push the work onto the queue.\n\t// WorkQueue <- work\n\tfmt.Println(strconv.Itoa(workItemsAddedCount) + \" Work request queued\")\n\n\t// And let the user know their work request was created.\n\tw.WriteHeader(http.StatusCreated)\n\treturn\n}", "title": "" }, { "docid": "1de0109a1236e485823d089c0488925e", "score": "0.5483008", "text": "func StatsCollectorMiddleware() queryrangebase.Middleware {\n\treturn queryrangebase.MiddlewareFunc(func(next queryrangebase.Handler) queryrangebase.Handler {\n\t\treturn queryrangebase.HandlerFunc(func(ctx context.Context, req queryrangebase.Request) (queryrangebase.Response, error) {\n\t\t\tlogger := spanlogger.FromContext(ctx)\n\t\t\tstart := time.Now()\n\n\t\t\t// start a new statistics context to be used by middleware, which we will merge with the response's statistics\n\t\t\tst, statsCtx := stats.NewContext(ctx)\n\n\t\t\t// execute the request\n\t\t\tresp, err := next.Do(statsCtx, req)\n\t\t\tif err != nil {\n\t\t\t\treturn resp, err\n\t\t\t}\n\n\t\t\t// collect stats and status\n\t\t\tvar statistics *stats.Result\n\t\t\tvar res promql_parser.Value\n\t\t\tvar queryType string\n\t\t\tvar totalEntries int\n\n\t\t\tif resp != nil {\n\t\t\t\tswitch r := resp.(type) {\n\t\t\t\tcase *LokiResponse:\n\t\t\t\t\tstatistics = &r.Statistics\n\t\t\t\t\ttotalEntries = int(logqlmodel.Streams(r.Data.Result).Lines())\n\t\t\t\t\tqueryType = queryTypeLog\n\t\t\t\tcase *LokiPromResponse:\n\t\t\t\t\tstatistics = &r.Statistics\n\t\t\t\t\tif r.Response != nil {\n\t\t\t\t\t\ttotalEntries = len(r.Response.Data.Result)\n\t\t\t\t\t}\n\t\t\t\t\tqueryType = queryTypeMetric\n\t\t\t\tcase *LokiSeriesResponse:\n\t\t\t\t\tstatistics = &r.Statistics\n\t\t\t\t\ttotalEntries = len(r.Data)\n\t\t\t\t\tqueryType = queryTypeSeries\n\t\t\t\tcase *LokiLabelNamesResponse:\n\t\t\t\t\tstatistics = &r.Statistics\n\t\t\t\t\ttotalEntries = len(r.Data)\n\t\t\t\t\tqueryType = queryTypeLabel\n\t\t\t\tdefault:\n\t\t\t\t\tlevel.Warn(logger).Log(\"msg\", fmt.Sprintf(\"cannot compute stats, unexpected type: %T\", resp))\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif statistics != nil {\n\t\t\t\t// merge the response's statistics with the stats collected by the middleware\n\t\t\t\tstatistics.Merge(st.Result(time.Since(start), 0, totalEntries))\n\n\t\t\t\t// Re-calculate the summary: the queueTime result is already merged so should not be updated\n\t\t\t\t// Log and record metrics for the current query\n\t\t\t\tstatistics.ComputeSummary(time.Since(start), 0, totalEntries)\n\t\t\t\tstatistics.Log(level.Debug(logger))\n\t\t\t}\n\t\t\tctxValue := ctx.Value(ctxKey)\n\t\t\tif data, ok := ctxValue.(*queryData); ok {\n\t\t\t\tdata.recorded = true\n\t\t\t\tdata.statistics = statistics\n\t\t\t\tdata.result = res\n\t\t\t\tdata.queryType = queryType\n\t\t\t\tp, errReq := paramsFromRequest(req)\n\t\t\t\tif errReq != nil {\n\t\t\t\t\treturn nil, errReq\n\t\t\t\t}\n\t\t\t\tdata.params = p\n\n\t\t\t\t// Record information for metadata queries.\n\t\t\t\tswitch r := req.(type) {\n\t\t\t\tcase *LokiLabelNamesRequest:\n\t\t\t\t\tdata.label = getLabelNameFromLabelsQuery(r.Path)\n\t\t\t\tcase *LokiSeriesRequest:\n\t\t\t\t\tdata.match = r.Match\n\t\t\t\t}\n\t\t\t}\n\t\t\treturn resp, nil\n\t\t})\n\t})\n}", "title": "" }, { "docid": "40ec9dd433be047487117a8b1ed6f524", "score": "0.53993887", "text": "func (m *Middleware) Wrap(next http.HandlerFunc) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tstartTime := time.Now()\n\n\t\tctx := r.Context()\n\t\tkind := \"server\"\n\t\tmethod := r.Method\n\t\turl := r.URL.Path\n\t\troute := m.opts.IDRegexp.ReplaceAllString(url, \":id\")\n\n\t\t// Increase the number of in-flight requests\n\t\tm.instruments.reqGauge.Add(ctx, 1,\n\t\t\tkv.String(\"method\", method),\n\t\t\tkv.String(\"route\", route),\n\t\t)\n\n\t\t// Make sure the request has a UUID\n\t\trequestUUID := r.Header.Get(requestUUIDHeader)\n\t\tif requestUUID == \"\" {\n\t\t\trequestUUID = uuid.New().String()\n\t\t\tr.Header.Set(requestUUIDHeader, requestUUID)\n\t\t}\n\n\t\t// Get the name of client for the request if any\n\t\tclientName := r.Header.Get(clientNameHeader)\n\n\t\t// Extract correlation context entries and parent span context if any\n\t\t// The first return value is a list of http attributes for the request\n\t\t_, entries, spanContext := httptrace.Extract(ctx, r)\n\n\t\t// Create a new correlation context with the extracted entries and new ones\n\t\tentries = append(entries,\n\t\t\tkv.String(\"req.uuid\", requestUUID),\n\t\t)\n\t\tctx = correlation.NewContext(ctx, entries...)\n\n\t\t// Start a new span\n\t\tctx = trace.ContextWithRemoteSpanContext(ctx, spanContext)\n\t\tctx, span := m.observer.Tracer().Start(ctx,\n\t\t\t\"http-server-request\",\n\t\t\ttrace.WithSpanKind(trace.SpanKindServer),\n\t\t)\n\t\tdefer span.End()\n\n\t\t// Create a contextualized logger\n\t\tcontextFields := []zap.Field{\n\t\t\tzap.String(\"req.uuid\", requestUUID),\n\t\t\tzap.String(\"req.kind\", kind),\n\t\t\tzap.String(\"req.method\", method),\n\t\t\tzap.String(\"req.url\", url),\n\t\t\tzap.String(\"req.route\", route),\n\t\t\tzap.String(\"traceId\", span.SpanContext().TraceID.String()),\n\t\t\tzap.String(\"spanId\", span.SpanContext().SpanID.String()),\n\t\t}\n\t\tif clientName != \"\" {\n\t\t\tcontextFields = append(contextFields, zap.String(\"client.name\", clientName))\n\t\t}\n\t\tlogger := m.observer.Logger().With(contextFields...)\n\n\t\t// Augment the request context\n\t\tctx = observer.ContextWithUUID(ctx, requestUUID)\n\t\tctx = observer.ContextWithLogger(ctx, logger)\n\t\treq := r.WithContext(ctx)\n\n\t\t// Create a wrapped response writer, so we can know about the response\n\t\trw := newResponseWriter(w)\n\n\t\t// Call http handler\n\t\tspan.AddEvent(ctx, \"calling http handler\")\n\t\tnext(rw, req)\n\n\t\tduration := time.Since(startTime).Milliseconds()\n\t\tstatusCode := rw.StatusCode\n\t\tstatusClass := rw.StatusClass\n\n\t\t// Report metrics\n\t\tm.observer.Meter().RecordBatch(ctx,\n\t\t\t[]kv.KeyValue{\n\t\t\t\tkv.String(\"method\", method),\n\t\t\t\tkv.String(\"route\", route),\n\t\t\t\tkv.Int(\"status_code\", statusCode),\n\t\t\t\tkv.String(\"status_class\", statusClass),\n\t\t\t},\n\t\t\tm.instruments.reqCounter.Measurement(1),\n\t\t\tm.instruments.reqDuration.Measurement(duration),\n\t\t)\n\n\t\t// Report logs\n\t\tmessage := fmt.Sprintf(\"%s %s %d %dms\", method, url, statusCode, duration)\n\t\tfields := []zap.Field{\n\t\t\tzap.Int(\"resp.statusCode\", statusCode),\n\t\t\tzap.String(\"resp.statusClass\", statusClass),\n\t\t\tzap.Int64(\"resp.duration\", duration),\n\t\t}\n\n\t\t// Determine the log level based on the result\n\t\tswitch {\n\t\tcase statusCode >= 500:\n\t\t\tlogger.Error(message, fields...)\n\t\tcase statusCode >= 400:\n\t\t\tlogger.Warn(message, fields...)\n\t\tcase statusCode >= 100:\n\t\t\tfallthrough\n\t\tdefault:\n\t\t\tif m.opts.LogInDebugLevel {\n\t\t\t\tlogger.Debug(message, fields...)\n\t\t\t} else {\n\t\t\t\tlogger.Info(message, fields...)\n\t\t\t}\n\t\t}\n\n\t\t// Decrease the number of in-flight requests\n\t\tm.instruments.reqGauge.Add(ctx, -1,\n\t\t\tkv.String(\"method\", method),\n\t\t\tkv.String(\"route\", route),\n\t\t)\n\n\t\t// Report the span\n\t\tspan.SetAttributes(\n\t\t\tkv.String(\"method\", method),\n\t\t\tkv.String(\"url\", url),\n\t\t\tkv.String(\"route\", route),\n\t\t\tkv.Int(\"status_code\", statusCode),\n\t\t)\n\t}\n}", "title": "" }, { "docid": "bf6badbd0cf960539c528e2f85c9d191", "score": "0.52651304", "text": "func RequestLogging(next http.Handler) http.Handler {\n return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n ctx := r.Context()\n l := ContextLogger(ctx)\n\n start := time.Now()\n wrapped := NewResponseWriter(w)\n next.ServeHTTP(wrapped, r)\n\n l.Debugf(\n \"%s %s %d %s\",\n r.Method,\n r.RequestURI,\n wrapped.Status(),\n time.Since(start),\n )\n })\n}", "title": "" }, { "docid": "c322feabbd830177b843cfe6faf0bbb1", "score": "0.5200296", "text": "func CollectStats(next echo.HandlerFunc) echo.HandlerFunc {\n\treturn func(c echo.Context) error {\n\t\tif err := next(c); err != nil {\n\t\t\tc.Error(err)\n\t\t}\n\t\trequestCount.Inc()\n\t\tstatus := strconv.Itoa(c.Response().Status)\n\t\trespStatuses.WithLabelValues(status, c.Request().Method).Inc()\n\t\tglog.V(2).Infof(\n\t\t\t\"REST API code: %v, method: %v, url: %v\\n\",\n\t\t\tstatus,\n\t\t\tc.Request().Method,\n\t\t\tc.Request().URL,\n\t\t)\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "74c4872e0b665326acc8fb2785d9faea", "score": "0.51623297", "text": "func recordRequestLatency(ctx context.Context, code string, webhookName string, latency float64) {\n\trequestLatency.WithContext(ctx).With(map[string]string{\"code\": code, \"webhook\": webhookName}).Observe(latency)\n}", "title": "" }, { "docid": "796cc41b54aafc2e77ee33329128454a", "score": "0.5152777", "text": "func WithLatencyTrackers(handler http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {\n\t\tctx := req.Context()\n\t\trequestInfo, ok := request.RequestInfoFrom(ctx)\n\t\tif !ok {\n\t\t\thandleError(w, req, http.StatusInternalServerError, fmt.Errorf(\"no RequestInfo found in context, handler chain must be wrong\"))\n\t\t\treturn\n\t\t}\n\n\t\tif watchVerbs.Has(requestInfo.Verb) {\n\t\t\thandler.ServeHTTP(w, req)\n\t\t\treturn\n\t\t}\n\n\t\treq = req.WithContext(request.WithLatencyTrackers(ctx))\n\t\tw = responsewriter.WrapForHTTP1Or2(&writeLatencyTracker{\n\t\t\tResponseWriter: w,\n\t\t\tctx: req.Context(),\n\t\t})\n\n\t\thandler.ServeHTTP(w, req)\n\t})\n}", "title": "" }, { "docid": "6e031d4f66edaa90177c78241320220a", "score": "0.5098933", "text": "func Middleware(service string, opts ...Option) flamego.Handler {\n\tcfg := newConfig(opts)\n\ttracer := cfg.TracerProvider.Tracer(\n\t\tinstrumentationName,\n\t\toteltrace.WithInstrumentationVersion(\"1.0.0\"),\n\t)\n\treturn func(res http.ResponseWriter, req *http.Request, c flamego.Context) {\n\t\tsavedCtx := c.Request().Request.Context()\n\t\tdefer func() {\n\t\t\tc.Request().Request = c.Request().Request.WithContext(savedCtx)\n\t\t}()\n\n\t\tctx := cfg.Propagators.Extract(savedCtx, propagation.HeaderCarrier(c.Request().Header))\n\t\topts := []oteltrace.SpanStartOption{\n\t\t\toteltrace.WithAttributes(semconv.NetAttributesFromHTTPRequest(\"tcp\", c.Request().Request)...),\n\t\t\toteltrace.WithAttributes(semconv.EndUserAttributesFromHTTPRequest(c.Request().Request)...),\n\t\t\toteltrace.WithAttributes(semconv.HTTPServerAttributesFromHTTPRequest(service, \"\", c.Request().Request)...),\n\t\t\toteltrace.WithSpanKind(oteltrace.SpanKindServer),\n\t\t}\n\t\t// TODO: span name should be router template not the actual request path, eg /user/:id vs /user/123\n\t\tspanName := c.Request().RequestURI\n\t\tif spanName == \"\" {\n\t\t\tspanName = fmt.Sprintf(\"HTTP %s route not found\", c.Request().Method)\n\t\t}\n\t\tctx, span := tracer.Start(ctx, spanName, opts...)\n\t\tdefer span.End()\n\n\t\t// pass the span through the request context\n\t\tc.Request().Request = c.Request().Request.WithContext(ctx)\n\n\t\t// serve the request to the next middleware\n\t\tc.Next()\n\n\t\tstatus := c.ResponseWriter().Status()\n\t\tattrs := semconv.HTTPAttributesFromHTTPStatusCode(status)\n\t\tspanStatus, spanMessage := semconv.SpanStatusFromHTTPStatusCodeAndSpanKind(status, oteltrace.SpanKindServer)\n\t\tspan.SetAttributes(attrs...)\n\t\tspan.SetStatus(spanStatus, spanMessage)\n\t}\n}", "title": "" }, { "docid": "cb8ef8f81f5af633bc26e63cad1fa401", "score": "0.50172925", "text": "func RequestTracer(inject Inject) gin.HandlerFunc {\n\treturn func(c *gin.Context) {\n\t\tif opentracing.IsGlobalTracerRegistered() {\n\t\t\treq := c.Request\n\n\t\t\twireContext, err := opentracing.GlobalTracer().Extract(\n\t\t\t\topentracing.HTTPHeaders,\n\t\t\t\topentracing.HTTPHeadersCarrier(req.Header))\n\t\t\tif err != nil && err == opentracing.ErrSpanContextNotFound {\n\t\t\t\t// Log potential tracing errors\n\t\t\t}\n\n\t\t\t// list path parameters and parameter names\n\t\t\tparams := map[string]string{}\n\t\t\tfor _, p := range c.Params {\n\t\t\t\tparams[p.Value] = p.Key\n\t\t\t}\n\n\t\t\t// Create server span or create new root span\n\t\t\tserverSpan, ctx := opentracing.StartSpanFromContext(\n\t\t\t\treq.Context(),\n\t\t\t\tutils.GetResourceName(req, params),\n\t\t\t\text.RPCServerOption(wireContext),\n\t\t\t)\n\n\t\t\t// Ensure that span is finished and return status is added to it\n\t\t\tdefer func() {\n\t\t\t\tdefer serverSpan.Finish()\n\n\t\t\t\text.HTTPStatusCode.Set(serverSpan, uint16(c.Writer.Status()))\n\t\t\t\tif len(c.Errors) > 0 {\n\t\t\t\t\tserverSpan.SetTag(\"server.errors\", c.Errors[0].Error())\n\t\t\t\t\text.Error.Set(serverSpan, true)\n\t\t\t\t}\n\t\t\t}()\n\n\t\t\t// Add tags to span\n\t\t\text.HTTPMethod.Set(serverSpan, req.Method)\n\t\t\text.HTTPUrl.Set(serverSpan, req.URL.Path)\n\t\t\tserverSpan.SetTag(\"span.type\", \"web\")\n\n\t\t\t// Add span to Request object Context\n\t\t\tctx = opentracing.ContextWithSpan(ctx, serverSpan)\n\n\t\t\t// Inject specific handling to spans\n\t\t\tif inject != nil {\n\t\t\t\tctx = inject(ctx, serverSpan)\n\t\t\t}\n\n\t\t\treq = req.WithContext(ctx)\n\n\t\t\t// Add updated context to request\n\t\t\tc.Request = req\n\t\t}\n\t\tc.Next()\n\t}\n}", "title": "" }, { "docid": "56b1fd673bc4364b7eeb9ffdf722b9c7", "score": "0.50036836", "text": "func (t *prometheusRequestMetricTracker) record() {\n\tcodeLabel := fmt.Sprintf(\"%d\", t.statusCode)\n\thttpDuration := time.Since(t.startTime)\n\tprometheusAuthSeconds.WithLabelValues(t.rootContext.Organization(), t.rootContext.Environment(), codeLabel).Observe(httpDuration.Seconds())\n}", "title": "" }, { "docid": "567393c6fb1599c138240a6ebff0fe4f", "score": "0.49623892", "text": "func AccessLogMiddleware(logger *logrus.Logger) gin.HandlerFunc {\n\treturn func(c *gin.Context) {\n\t\t// Start timer\n\t\tstart := time.Now()\n\t\tpath := c.Request.URL.Path\n\t\tquery := c.Request.URL.RawQuery\n\n\t\t// Process request\n\t\tc.Next()\n\n\t\t// Shutdown timer\n\t\tend := time.Now()\n\t\tlatency := end.Sub(start)\n\n\t\tclientIP := c.ClientIP()\n\t\tmethod := c.Request.Method\n\t\tstatusCode := c.Writer.Status()\n\n\t\tfields := logrus.Fields{\n\t\t\t\"pool\": c.GetString(\"pool\"),\n\t\t\t\"path\": path,\n\t\t\t\"query\": query,\n\t\t\t\"latency\": latency,\n\t\t\t\"ip\": clientIP,\n\t\t\t\"method\": method,\n\t\t\t\"code\": statusCode,\n\t\t\t\"req_id\": c.GetString(\"req_id\"),\n\t\t}\n\n\t\tif !isAccessLogEnabled {\n\t\t\treturn\n\t\t}\n\n\t\tif statusCode >= 500 {\n\t\t\tlogger.WithFields(fields).Error()\n\t\t} else if statusCode >= 400 && statusCode != 404 {\n\t\t\tlogger.WithFields(fields).Warn()\n\t\t} else {\n\t\t\tlogger.WithFields(fields).Info()\n\t\t}\n\t}\n}", "title": "" }, { "docid": "0c0cc36d889cd2b7013e8bbe3e492a11", "score": "0.49606746", "text": "func LoggingMiddleware(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tlog.Trace(\"%s request to %s from %s\", r.Method, r.URL.Path, r.Host)\n\t\tstartTime := time.Now()\n\t\tsrw := NewStatusRecordingResponseWriter(w)\n\t\tnext.ServeHTTP(srw, r)\n\t\tendTime := time.Now()\n\t\tlog.Trace(\"%s to %s took %v, response is %d %s\", r.Method, r.URL.Path, endTime.Sub(startTime), srw.Status(), http.StatusText(srw.Status()))\n\t})\n}", "title": "" }, { "docid": "c5ebc4ec94702166554e2cd3f028d82c", "score": "0.49535403", "text": "func RecordSidecarInjectionRequestsCount() {\n\tstats.Record(context.Background(), sidecarInjectionRequestsTotal.M(1))\n}", "title": "" }, { "docid": "87ef45a62a0cbcc9a57572779d0ab49e", "score": "0.4934362", "text": "func (collector *ChaosDashboardMetricsCollector) Collect(ch chan<- prometheus.Metric) {\n\tcollector.httpRequestDuration.Collect(ch)\n}", "title": "" }, { "docid": "956b848a609ee49b56979bdc38ded638", "score": "0.49306408", "text": "func requestMetrics(l *log.Logger) service {\n\treturn func(h http.Handler) http.Handler {\n\t\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t\tstart := time.Now()\n\t\t\th.ServeHTTP(w, r)\n\t\t\tl.Printf(\"request took %vns.\", time.Now().Sub(start).Nanoseconds())\n\t\t})\n\t}\n}", "title": "" }, { "docid": "e72a74692095b34c0b886e5a19c4364d", "score": "0.4902618", "text": "func (i *httpClientInstrumentation) Collect(c chan<- prometheus.Metric) {\n\ti.duration.Collect(c)\n\ti.inflight.Collect(c)\n\ti.dnsDuration.Collect(c)\n\ti.tlsDuration.Collect(c)\n}", "title": "" }, { "docid": "fe954edd9d4200779327396a60a397eb", "score": "0.48972562", "text": "func AddTracer(request types.Request) ([]byte, error) {\n\tvar (\n\t\tret []byte\n\t\terr error\n\t)\n\n\t// Adding a size limit to the rawrequest field\n\tif len(request.RawRequest) > configure.Current.MaxRequestSize {\n\t\trequest.RawRequest = request.RawRequest[:configure.Current.MaxRequestSize]\n\t}\n\n\tif err = store.DB.Create(&request).Error; err != nil {\n\t\tlog.Warning.Printf(err.Error())\n\t\treturn ret, err\n\t}\n\n\tinUpdateChanTracer <- request\n\tUpdateSubscribers(request)\n\tif ret, err = json.Marshal(request); err != nil {\n\t\tlog.Warning.Printf(err.Error())\n\t}\n\n\treturn ret, err\n}", "title": "" }, { "docid": "c91f2213dd7ebb4d7f9d83060cddd47e", "score": "0.48715055", "text": "func Latency(h metrics.Histogram) LabeledMiddleware {\n\treturn func(name string, in endpoint.Endpoint) endpoint.Endpoint {\n\t\treturn func(ctx context.Context, req interface{}) (interface{}, error) {\n\t\t\tdefer func(begin time.Time) {\n\t\t\t\th.With(\"endpoint\", name).Observe(time.Since(begin).Seconds())\n\t\t\t}(time.Now())\n\t\t\treturn in(ctx, req)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "2291d981d39c98ed4dd9adbdcb60e55d", "score": "0.48546362", "text": "func MetadataMiddleware(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(rw http.ResponseWriter, req *http.Request) {\n\n\t\tstart := time.Now().UTC()\n\n\t\tmetadata := &RequestMetadata{\n\t\t\tRequestID: uuid.NewV4().String(),\n\t\t\tStartTime: start,\n\t\t\tMethod: req.Method,\n\t\t\tPath: req.URL.Path,\n\t\t}\n\t\treq.Header.Set(\"X-Request-Id\", metadata.RequestID)\n\t\trw.Header().Set(\"Request-Id\", metadata.RequestID)\n\n\t\tmetadata.IP = req.Header.Get(\"X-Real-IP\")\n\t\tif metadata.IP == \"\" {\n\t\t\tmetadata.IP = req.Header.Get(\"X-Forwarded-For\")\n\t\t\tif metadata.IP == \"\" {\n\t\t\t\tmetadata.IP = req.RemoteAddr\n\t\t\t}\n\t\t}\n\n\t\t// Set context\n\t\tGetContext(req).Set(metadataCtxKey, metadata)\n\n\t\t// Use StatusStoringRequest to keep a track of the request status.\n\t\trw = NewResponseWriter(rw)\n\n\t\tdefer func() {\n\t\t\tif err := recover(); err != nil {\n\t\t\t\tbuf := make([]byte, 1<<16)\n\t\t\t\tstackSize := runtime.Stack(buf, true)\n\t\t\t\tmetadata.Logger().Error(err)\n\t\t\t\tmetadata.Logger().Errorf(\"%s\", string(buf[0:stackSize]))\n\t\t\t\tJSONError(rw, errors.New(\"Ooops. Something went wrong on our end\"), http.StatusInternalServerError)\n\t\t\t}\n\n\t\t\tresp := rw.(*ResponseWriter)\n\t\t\tmetadata.Status = resp.Status()\n\t\t\tmetadata.Size = resp.Length()\n\t\t\tstatusColor := ColourForStatus(metadata.Status)\n\t\t\tmetadata.Latency = time.Since(start)\n\n\t\t\tlog.WithFields(metadata.fields()).WithFields(log.Fields{\n\t\t\t\t\"remote_ip\": metadata.IP,\n\t\t\t\t\"method\": metadata.Method,\n\t\t\t\t\"path\": metadata.Path,\n\t\t\t\t\"size\": metadata.Size,\n\t\t\t\t\"latency\": metadata.Latency,\n\t\t\t\t\"status\": metadata.Status,\n\t\t\t}).Printf(\"%s\\t| %s | %s%d%s | %v | %s\", metadata.Path, metadata.Method, statusColor, metadata.Status, ResetColour, metadata.Latency, HumanSize(metadata.Size))\n\t\t}()\n\n\t\t// Serve\n\t\tnext.ServeHTTP(rw, req)\n\t})\n}", "title": "" }, { "docid": "2b250762a52816c00010e5ed665f4dd1", "score": "0.4840623", "text": "func (a *ServerMetrics) HTTPConnectionInc() { a.httpConnections.Inc() }", "title": "" }, { "docid": "b99cbdf2ac8df70d4e410f482539eadd", "score": "0.48368385", "text": "func Middleware(opts ...Option) echo.MiddlewareFunc {\n\treturn func(next echo.HandlerFunc) echo.HandlerFunc {\n\t\tcfg := new(config)\n\t\tdefaults(cfg)\n\t\tfor _, fn := range opts {\n\t\t\tfn(cfg)\n\t\t}\n\t\treturn func(c echo.Context) error {\n\t\t\trequest := c.Request()\n\t\t\tresource := request.Method + \" \" + c.Path()\n\t\t\topts := []ddtrace.StartSpanOption{\n\t\t\t\ttracer.ServiceName(cfg.serviceName),\n\t\t\t\ttracer.ResourceName(resource),\n\t\t\t\ttracer.SpanType(ext.SpanTypeWeb),\n\t\t\t\ttracer.Tag(ext.HTTPMethod, request.Method),\n\t\t\t\ttracer.Tag(ext.HTTPURL, request.URL.Path),\n\t\t\t}\n\n\t\t\tif !math.IsNaN(cfg.analyticsRate) {\n\t\t\t\topts = append(opts, tracer.Tag(ext.EventSampleRate, cfg.analyticsRate))\n\t\t\t}\n\t\t\tif spanctx, err := tracer.Extract(tracer.HTTPHeadersCarrier(request.Header)); err == nil {\n\t\t\t\topts = append(opts, tracer.ChildOf(spanctx))\n\t\t\t}\n\t\t\tspan, ctx := tracer.StartSpanFromContext(request.Context(), \"http.request\", opts...)\n\t\t\tdefer span.Finish()\n\n\t\t\t// pass the span through the request context\n\t\t\tc.SetRequest(request.WithContext(ctx))\n\n\t\t\t// serve the request to the next middleware\n\t\t\terr := next(c)\n\t\t\tif err != nil {\n\t\t\t\tspan.SetTag(ext.Error, err)\n\t\t\t\t// invokes the registered HTTP error handler\n\t\t\t\tc.Error(err)\n\t\t\t}\n\n\t\t\tspan.SetTag(ext.HTTPCode, strconv.Itoa(c.Response().Status))\n\t\t\treturn err\n\t\t}\n\t}\n}", "title": "" }, { "docid": "fdea2cd8e16baf4b24276521c72c0e0f", "score": "0.48342884", "text": "func flowRequestMonitorPageHandler(w http.ResponseWriter, r *http.Request) {\n\tlog.Printf(\"Serving request for request monitor view\")\n\n\tflowName := r.URL.Query().Get(\"flow-name\")\n\tcurrentRequestID := r.URL.Query().Get(\"request\")\n\n\tfunctions, err := listGoFLows()\n\tif err != nil {\n\t\tlog.Printf(\"failed to get functions, error: %v\", err)\n\t\tfunctions = make([]*Flow, 0)\n\t}\n\n\ttracingEnabled := false\n\trequests, err := listFlowRequests(flowName)\n\tif err != nil {\n\t\tlog.Printf(\"failed to get requests, error: %v\", err)\n\t\trequests = make(map[string]string)\n\t}\n\n\trequestsList := make(map[string]*RequestTrace)\n\n\tfor request, traceId := range requests {\n\t\trequestsList[request], err = listRequestTraces(request, traceId)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"failed to get request traces for request %s, traceId %s, error: %v\",\n\t\t\t\trequest, traceId, err)\n\t\t\trequestsList[request] = &RequestTrace{\n\t\t\t\tTraceId: traceId,\n\t\t\t}\n\t\t}\n\n\t\trequestState, err := getRequestState(flowName, request)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"failed to get request state for %s, request %s, error: %v\",\n\t\t\t\tflowName, request, err)\n\t\t\trequestState = \"UNKNOWN\"\n\t\t}\n\t\trequestsList[request].Status = requestState\n\n\t\ttracingEnabled = true\n\t\tif currentRequestID == \"\" {\n\t\t\tcurrentRequestID = request\n\t\t}\n\t}\n\n\tflowRequests := &FlowRequests{\n\t\tTracingEnabled: tracingEnabled,\n\t\tFlow: flowName,\n\t\tRequests: requestsList,\n\t\tCurrentRequestID: currentRequestID,\n\t}\n\n\tlocationDepths := []*Location{\n\t\t&Location{\n\t\t\tName: \"Flow : \" + flowName + \"\",\n\t\t\tLink: \"/flow/info?flow-name=\" + flowName,\n\t\t},\n\t\t&Location{\n\t\t\tName: \"Requests\",\n\t\t\tLink: \"/flow/requests?flow-name=\" + flowName,\n\t\t},\n\t}\n\n\thtmlObj := HtmlObject{\n\t\tPublicURL: publicUri,\n\t\tFunctions: functions,\n\n\t\tLocationDepths: locationDepths,\n\n\t\tCurrentLocation: &Location{\n\t\t\tName: \"requests-choice\",\n\t\t},\n\n\t\tRequests: flowRequests,\n\n\t\tTraces: requestsList[currentRequestID],\n\n\t\tInnerHtml: \"request-monitor\",\n\t}\n\n\terr = gen.ExecuteTemplate(w, \"index\", htmlObj)\n\tif err != nil {\n\t\thttp.Error(w, fmt.Sprintf(\"failed to generate requested page, error: %v\", err), http.StatusInternalServerError)\n\t}\n}", "title": "" }, { "docid": "f7f3ae3d91b212a4df67085285a0c8a0", "score": "0.48194477", "text": "func (a *APIResponsiveness) addMetricRequestLatency(resource, subresource, verb string, quantile float64, latency time.Duration) {\n\tfor i, apicall := range a.APICalls {\n\t\tif apicall.Resource == resource && apicall.Subresource == subresource && apicall.Verb == verb {\n\t\t\ta.APICalls[i] = setQuantileAPICall(apicall, quantile, latency)\n\t\t\treturn\n\t\t}\n\t}\n\tapicall := setQuantileAPICall(APICall{Resource: resource, Subresource: subresource, Verb: verb}, quantile, latency)\n\ta.APICalls = append(a.APICalls, apicall)\n}", "title": "" }, { "docid": "7997eb8329fbd2ddba4834c48931b3ef", "score": "0.48165247", "text": "func RequestLifetimeMiddleware() gin.HandlerFunc {\n\treturn func(c *gin.Context) {\n\t\tevent.DispatchEvent(c, event.EVENT_REQUEST_START, &event.RequestEvent{\n\t\t\tContext: c,\n\t\t})\n\n\t\tc.Next()\n\n\t\tgo func() {\n\t\t\tevent.DispatchEvent(c, event.EVENT_REQUEST_TERMINATE, &event.RequestEvent{\n\t\t\t\tContext: c,\n\t\t\t})\n\t\t}()\n\t}\n}", "title": "" }, { "docid": "2fc735a8a86a08ff02858f2be3427b93", "score": "0.48055542", "text": "func MiddlewareSpanWrapper(operation string) func(inner middleware.Func) middleware.Func {\n\treturn func(inner middleware.Func) middleware.Func {\n\t\treturn func(endpoint abstraction.Endpoint, loggerFactory log.Factory) func(http.Handler) http.Handler {\n\t\t\treturn func(next http.Handler) http.Handler {\n\t\t\t\treturn http.HandlerFunc(func(writer http.ResponseWriter, request *http.Request) {\n\t\t\t\t\tspan, ctx := opentracing.StartSpanFromContext(request.Context(), operation)\n\t\t\t\t\tdefer span.Finish()\n\t\t\t\t\tinner(endpoint, loggerFactory)(next).ServeHTTP(writer, request.WithContext(ctx))\n\t\t\t\t})\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "e0b6e1c05d6cf094f662c701ce39fbd1", "score": "0.4804556", "text": "func TracingMiddleware(next http.HandlerFunc) http.HandlerFunc {\n\t// checks if request has opentracing context and injects the trace context\n\t// in the logger\n\tinjectOT := func(ctx *http.Context) {\n\t\tspan := opentracing.SpanFromContext(ctx.Request.Context())\n\t\tif nil == span {\n\t\t\treturn\n\t\t}\n\t\tdefer span.Finish()\n\t\tif sc, ok := span.Context().(jaeger.SpanContext); ok {\n\t\t\tvar (\n\t\t\t\tcertKey = span.BaggageItem(BaggageKeyCertKey)\n\t\t\t\tcertSerial = span.BaggageItem(BaggageKeyCertSerial)\n\t\t\t\ttraceID = fmt.Sprint(sc.TraceID())\n\t\t\t\tspanID = fmt.Sprint(sc.SpanID())\n\t\t\t\ttraceSeq = fmt.Sprint(span)\n\t\t\t)\n\t\t\tctx.Logger = ctx.Logger.With().\n\t\t\t\tStr(LogKeyTraceID, traceID).\n\t\t\t\tStr(LogKeySpanID, spanID).\n\t\t\t\tStr(LogKeyTraceSeq, traceSeq).\n\t\t\t\tStr(LogKeyCertKey, certKey).\n\t\t\t\tStr(LogKeyCertSerial, certSerial).\n\t\t\t\tLogger() // TODO - use standardized logging lib keys\n\t\t}\n\t}\n\n\ttrace := func(ctx *http.Context, wrapped http.HandlerFunc) error {\n\t\t// not need for health check\n\t\tif ctx.RequestURI == \"/health\" {\n\t\t\treturn wrapped(ctx)\n\t\t}\n\t\ttracer := opentracing.GlobalTracer()\n\t\tspanCtx, err := tracer.Extract(opentracing.HTTPHeaders, opentracing.HTTPHeadersCarrier(ctx.Request.Header))\n\t\tif nil != err {\n\t\t\t// not a problem. New trace context will be generated\n\t\t\tctx.Logger.Warn().Err(err).Msg(\"opentracing context not found in the request\")\n\t\t}\n\t\tspan := tracer.StartSpan(ctx.Request.URL.Path, ext.RPCServerOption(spanCtx))\n\t\tdefer span.Finish()\n\n\t\t// Updating the *http.Request with new OpenTracing context\n\t\trequest := ctx.Request.WithContext(opentracing.ContextWithSpan(ctx.Request.Context(), span))\n\t\tctx.Request = request\n\n\t\tinjectOT(ctx)\n\n\t\t// calling the next handler\n\t\treturn wrapped(ctx)\n\t}\n\treturn func(ctx *http.Context) error { return trace(ctx, next) }\n}", "title": "" }, { "docid": "8dd158802c5cb6bd8a6c243d994234f2", "score": "0.4800132", "text": "func TrackSerializeResponseObjectLatency(ctx context.Context, f func()) {\n\tif tracker, ok := LatencyTrackersFrom(ctx); ok {\n\t\ttracker.SerializationTracker.Track(f)\n\t\treturn\n\t}\n\n\tf()\n}", "title": "" }, { "docid": "9728d3137038f848bf3fecb372a3647b", "score": "0.47989953", "text": "func LoggerMiddleware() func(*gin.Context) {\n\treturn func(c *gin.Context) {\n\t\tstart := time.Now().UTC()\n\t\t//keep the unmodified values\n\t\tpath := c.Request.URL.Path\n\t\tquery := c.Request.URL.RawQuery\n\t\tc.Next()\n\n\t\tend := time.Now().UTC()\n\t\tlatency := end.Sub(start)\n\n\t\tif len(c.Errors) > 0 {\n\t\t\t// Append error field if this is an erroneous request.\n\t\t\tfor _, e := range c.Errors.Errors() {\n\t\t\t\tLogger.Error(e)\n\t\t\t}\n\t\t} else {\n\t\t\tLogger.Debugf(\"%s %d %s%s - %v - %s\", c.Request.Method, c.Writer.Status(), path, query, c.ClientIP(), latency.String())\n\t\t}\n\t}\n}", "title": "" }, { "docid": "6fb4f5a1a0ddbde565a23feb9ac8ee8e", "score": "0.47970006", "text": "func Middleware(service string, opts ...Option) gin.HandlerFunc {\n\tcfg := newConfig(service)\n\tfor _, opt := range opts {\n\t\topt(cfg)\n\t}\n\tlog.Debug(\"contrib/gin-gonic/gin: Configuring Middleware: Service: %s, %#v\", cfg.serviceName, cfg)\n\tspanOpts := []tracer.StartSpanOption{\n\t\ttracer.ServiceName(cfg.serviceName),\n\t\ttracer.Tag(ext.Component, componentName),\n\t\ttracer.Tag(ext.SpanKind, ext.SpanKindServer),\n\t}\n\treturn func(c *gin.Context) {\n\t\tif cfg.ignoreRequest(c) {\n\t\t\treturn\n\t\t}\n\t\topts := append(spanOpts, tracer.ResourceName(cfg.resourceNamer(c)))\n\t\tif !math.IsNaN(cfg.analyticsRate) {\n\t\t\topts = append(opts, tracer.Tag(ext.EventSampleRate, cfg.analyticsRate))\n\t\t}\n\t\topts = append(opts, tracer.Tag(ext.HTTPRoute, c.FullPath()))\n\t\topts = append(opts, httptrace.HeaderTagsFromRequest(c.Request, cfg.headerTags))\n\t\tspan, ctx := httptrace.StartRequestSpan(c.Request, opts...)\n\t\tdefer func() {\n\t\t\thttptrace.FinishRequestSpan(span, c.Writer.Status())\n\t\t}()\n\n\t\t// pass the span through the request context\n\t\tc.Request = c.Request.WithContext(ctx)\n\n\t\t// Use AppSec if enabled by user\n\t\tif appsec.Enabled() {\n\t\t\tuseAppSec(c, span)\n\t\t}\n\n\t\t// serve the request to the next middleware\n\t\tc.Next()\n\n\t\tif len(c.Errors) > 0 {\n\t\t\tspan.SetTag(\"gin.errors\", c.Errors.String())\n\t\t}\n\t}\n}", "title": "" }, { "docid": "d7efd946f80ae3351f1b18d29695789b", "score": "0.47852215", "text": "func recordRequest(ctx context.Context, method string, start time.Time) {\n\tif err := stats.RecordWithTags(\n\t\tctx,\n\t\t[]tag.Mutator{\n\t\t\ttag.Upsert(tags.GCSMethod, method),\n\t\t},\n\t\trequestCount.M(1),\n\t); err != nil {\n\t\t// The error should be caused by a bad tag\n\t\terrorLogger.Printf(\"Cannot record request count: %v\", err)\n\t}\n\n\tlatencyUs := time.Since(start).Microseconds()\n\tlatencyMs := float64(latencyUs) / 1000.0\n\tif err := stats.RecordWithTags(\n\t\tctx,\n\t\t[]tag.Mutator{\n\t\t\ttag.Upsert(tags.GCSMethod, method),\n\t\t},\n\t\trequestLatency.M(latencyMs),\n\t); err != nil {\n\t\t// The error should be caused by a bad tag\n\t\terrorLogger.Printf(\"Cannot record request latency: %v\", err)\n\t}\n}", "title": "" }, { "docid": "6b095563c28149aece8182b3411170de", "score": "0.47851357", "text": "func Middleware(driver Driver, opts ...Option) gin.HandlerFunc {\n\toptions := middlewareOptions{\n\t\tclock: realClock{},\n\t\tuserIDExtractor: func(req *http.Request) uint { return 0 },\n\t\terrorHandler: NoopErrorHandler{},\n\t}\n\n\tfor _, opt := range opts {\n\t\topt.apply(&options)\n\t}\n\n\treturn func(c *gin.Context) {\n\t\tpath := c.Request.URL.Path\n\n\t\tif c.Request.URL.RawQuery != \"\" {\n\t\t\tpath = path + \"?\" + c.Request.URL.RawQuery\n\t\t}\n\n\t\tentry := Entry{\n\t\t\tTime: options.clock.Now(),\n\t\t\tCorrelationID: c.GetString(correlationid.ContextKey),\n\t\t\tHTTP: HTTPEntry{\n\t\t\t\tClientIP: c.ClientIP(),\n\t\t\t\tUserAgent: c.Request.UserAgent(),\n\t\t\t\tMethod: c.Request.Method,\n\t\t\t\tPath: path,\n\t\t\t},\n\t\t}\n\n\t\tvar sensitiveCall bool\n\n\t\t// Determine if this call contains sensitive information in its request body.\n\t\tfor _, r := range options.sensitivePaths {\n\t\t\tif r.MatchString(c.Request.URL.Path) {\n\t\t\t\tsensitiveCall = true\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\n\t\t// Only override the request body if there is actually one and it doesn't contain sensitive information.\n\t\tsaveBody := c.Request.Body != nil && !sensitiveCall\n\n\t\tvar buf bytes.Buffer\n\n\t\tif saveBody {\n\t\t\t// This should be ok, because the server keeps a reference to the original body,\n\t\t\t// so it can close the original request itself.\n\t\t\tc.Request.Body = ioutil.NopCloser(io.TeeReader(c.Request.Body, &buf))\n\t\t}\n\n\t\tc.Next() // process request\n\n\t\tentry.UserID = options.userIDExtractor(c.Request)\n\n\t\t// Consider making this configurable if you need to log unauthorized requests,\n\t\t// but keep in mind that in case of a public installation it's a potential DoS attack vector.\n\t\tif c.Writer.Status() == http.StatusUnauthorized {\n\t\t\treturn\n\t\t}\n\n\t\tentry.HTTP.StatusCode = c.Writer.Status()\n\t\tentry.HTTP.ResponseSize = c.Writer.Size()\n\t\tentry.HTTP.ResponseTime = int(options.clock.Since(entry.Time).Milliseconds())\n\n\t\tif saveBody {\n\t\t\t// Make sure everything is read from the body.\n\t\t\t_, err := ioutil.ReadAll(c.Request.Body)\n\t\t\tif err != nil && err != io.EOF {\n\t\t\t\toptions.errorHandler.HandleContext(c.Request.Context(), errors.WithStack(err))\n\t\t\t}\n\n\t\t\tentry.HTTP.RequestBody = string(buf.Bytes())\n\t\t}\n\n\t\tif c.IsAborted() {\n\t\t\tfor _, e := range c.Errors {\n\t\t\t\t_e, _ := e.MarshalJSON()\n\n\t\t\t\tentry.HTTP.Errors = append(entry.HTTP.Errors, string(_e))\n\t\t\t}\n\t\t}\n\n\t\terr := driver.Store(entry)\n\t\tif err != nil {\n\t\t\toptions.errorHandler.HandleContext(c.Request.Context(), errors.WithStackIf(err))\n\t\t}\n\t}\n}", "title": "" }, { "docid": "29ac927784c94fd1aec4c6d733fcfe4a", "score": "0.47725844", "text": "func RequestLoggingMiddleware(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tlog.Println(\"[ACCESS] \", r)\n\t\treqString, _ := httputil.DumpRequest(r, true)\n\t\tlog.Println(\"[ACCESS] \", r, reqString)\n\n\t\tnext.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "16459c454c611aa59a6d7d499a804052", "score": "0.47677353", "text": "func PrometheusInstrumentationMiddleware(reqCounter *prometheus.CounterVec, latencyHist *prometheus.HistogramVec) func(http.Handler) http.Handler {\n\treturn func(next http.Handler) http.Handler {\n\t\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t\tvar start time.Time = time.Now()\n\t\t\tvar observer *statusObserver = newStatusObserver(w)\n\n\t\t\tnext.ServeHTTP(observer, r)\n\n\t\t\tlatencyHist.WithLabelValues(strconv.Itoa(observer.status), r.Method).Observe(time.Since(start).Seconds())\n\t\t\treqCounter.WithLabelValues(strconv.Itoa(observer.status), r.Method).Inc()\n\t\t})\n\t}\n}", "title": "" }, { "docid": "ccc57801bf0082e0368e014fc874ffba", "score": "0.47665995", "text": "func (s *Server) trackRequest(in *serverInput) {\n\ts.mtx.Lock()\n\tdefer s.mtx.Unlock()\n\n\ts.requests++\n\n\t// if the request was not successfull we don't compute response times\n\t// as this would skew the data, knowing that failed requests\n\t// are much quicker to process in many cases\n\t// (only when RabbitMQ fails this wouldn't be the case)\n\tif !in.Success {\n\t\ts.failedRequests++\n\t\treturn\n\t}\n\n\t// compute min/max resp time values\n\tif in.RespTime < s.minRespTime {\n\t\ts.minRespTime = in.RespTime\n\t}\n\tif in.RespTime > s.maxRespTime {\n\t\ts.maxRespTime = in.RespTime\n\t}\n\n\t// store resp time, as this can be used to compute the average\n\tindex := s.respTimeBufferIndex % s.cfg.ResponseBufferSize\n\ts.respTimeBuffer[index] = in.RespTime\n\ts.respTimeBufferIndex++\n}", "title": "" }, { "docid": "216d2aab23b30887b9f506e5c4e4907f", "score": "0.47568548", "text": "func Metrics() Middleware {\n\t// This is the actual middleware function to be executed.\n\tf := func(before Handler) Handler {\n\n\t\t// Wrap this handler around the next one provided.\n\t\th := func(w http.ResponseWriter, r *http.Request) error {\n\n\t\t\tstart := time.Now()\n\n\t\t\terr := before(w, r)\n\n\t\t\tduration := time.Since(start)\n\n\t\t\tbookstoreResponseLatency.WithLabelValues(r.Method).Observe(float64(duration.Milliseconds()))\n\t\t\t// Increment the request counter.\n\t\t\tm.req.Add(1)\n\t\t\t//fmt.Println(\"url path: \", r.URL.Path)\n\t\t\tif r.URL.Path == \"/books\" {\n\t\t\t\tbookstoreRequestNumber.Inc()\n\t\t\t}\n\n\t\t\t// Update the count for the number of active goroutines every 100 requests.\n\t\t\tif m.req.Value()%100 == 0 {\n\t\t\t\tm.gr.Set(int64(runtime.NumGoroutine()))\n\t\t\t}\n\n\t\t\t// Increment the errors counter if an error occurred on this request.\n\t\t\tif err != nil {\n\t\t\t\tm.err.Add(1)\n\t\t\t\tbookstoreErrorNumber.Inc()\n\t\t\t} else { // Increment success response number.\n\t\t\t\tif r.URL.Path == \"/books\" {\n\t\t\t\t\tbookstoreSuccessResponseNumber.Inc()\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t// Return the error so it can be handled further up the chain.\n\t\t\treturn err\n\t\t}\n\n\t\treturn h\n\t}\n\n\treturn f\n}", "title": "" }, { "docid": "8b834d5c2444ba3a801fabaa28c4b2d2", "score": "0.47565138", "text": "func InstrumentingMiddleware(requestCount metrics.Counter, requestLatency metrics.Histogram) Middleware {\n\treturn func(next Service) Service {\n\t\treturn instrumentingMiddleware{\n\t\t\trequestCount: requestCount,\n\t\t\trequestLatency: requestLatency,\n\t\t\tnext: next,\n\t\t}\n\t}\n}", "title": "" }, { "docid": "e4bfd45029adebcb359a2f73d8585591", "score": "0.47521192", "text": "func (m *Manager) Collect(wt http.ResponseWriter, rq *http.Request) {\n\tcnt := 0\n\tuuid := rq.Header.Get(EndpointUUIDHeader)\n\n\tdefer rq.Body.Close()\n\n\tetid := m.eventLogger.InitTransaction()\n\tdtid := m.detectionLogger.InitTransaction()\n\ts := bufio.NewScanner(rq.Body)\n\tfor s.Scan() {\n\t\ttok := []byte(s.Text())\n\t\tlog.Debugf(\"Received Event: %s\", string(tok))\n\t\te := event.EdrEvent{}\n\n\t\tif err := json.Unmarshal(tok, &e); err != nil {\n\t\t\tlog.Errorf(\"Failed to unmarshal: %s\", tok)\n\t\t} else {\n\n\t\t\t// building up EdrData\n\t\t\tedrData := event.EdrData{}\n\t\t\tedrData.Event.Hash = utils.HashEventBytes(tok)\n\t\t\tedrData.Event.ReceiptTime = time.Now().UTC()\n\n\t\t\tedrData.Endpoint.UUID = uuid\n\n\t\t\tif endpt, ok := m.endpoints.GetMutByUUID(uuid); ok {\n\t\t\t\tedrData.Endpoint.IP = endpt.IP\n\t\t\t\tedrData.Endpoint.Hostname = endpt.Hostname\n\t\t\t\tedrData.Endpoint.Group = endpt.Group\n\t\t\t}\n\t\t\tedrData.Event.Detection = e.IsDetection()\n\n\t\t\t// setting EdrData\n\t\t\te.Event.EdrData = &edrData\n\n\t\t\tif endpt := m.mutEndpointFromRequest(rq); endpt != nil {\n\t\t\t\tm.UpdateReducer(endpt.Uuid, &e)\n\t\t\t\tif e.IsDetection() {\n\t\t\t\t\tendpt.LastDetection = e.Timestamp()\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tlog.Error(\"Failed to retrieve endpoint from request\")\n\t\t\t}\n\n\t\t\t// If it is an alert\n\t\t\tif e.IsDetection() {\n\t\t\t\tif _, err := m.detectionLogger.WriteEvent(dtid, uuid, &e); err != nil {\n\t\t\t\t\tlog.Errorf(\"Failed to write detection: %s\", err)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif _, err := m.eventLogger.WriteEvent(etid, uuid, &e); err != nil {\n\t\t\t\tlog.Errorf(\"Failed to write event: %s\", err)\n\t\t\t}\n\n\t\t\t// we queue event for streaming\n\t\t\tm.eventStreamer.Queue(&e)\n\t\t}\n\t\tcnt++\n\t}\n\n\tif err := m.eventLogger.CommitTransaction(); err != nil {\n\t\tlog.Errorf(\"Failed to commit event logger transaction: %s\", err)\n\t}\n\n\tif err := m.detectionLogger.CommitTransaction(); err != nil {\n\t\tlog.Errorf(\"Failed to commit detection logger transaction: %s\", err)\n\t}\n\tlog.Debugf(\"Count Event Received: %d\", cnt)\n\n}", "title": "" }, { "docid": "8201a622797e51980bc03c056b5153a8", "score": "0.4750696", "text": "func RequestLogger(next http.Handler) http.Handler {\n\tfn := func(w http.ResponseWriter, r *http.Request) {\n\t\tww := middleware.NewWrapResponseWriter(w, r.ProtoMajor)\n\t\tstart := time.Now()\n\n\t\tdefer func() {\n\t\t\tduration := time.Since(start)\n\t\t\tlogger := ctxlog.FromRequest(r)\n\n\t\t\tlogger.Info(\"http request\",\n\t\t\t\tzap.String(\"method\", r.Method),\n\t\t\t\tzap.String(\"url\", r.RequestURI),\n\t\t\t\tzap.String(\"proto\", r.Proto),\n\t\t\t\tzap.Int(\"status\", ww.Status()),\n\t\t\t\tzap.Int(\"size\", ww.BytesWritten()),\n\t\t\t\tzap.Duration(\"duration\", duration),\n\t\t\t)\n\t\t}()\n\n\t\tnext.ServeHTTP(ww, r)\n\t}\n\treturn http.HandlerFunc(fn)\n}", "title": "" }, { "docid": "de0e932186239b0025a89352fa53c268", "score": "0.47392035", "text": "func LogRequestBoundariesMw(c *gin.Context) {\n\tlogger := logging.FromContext(GetRequestCtx(c))\n\turi := c.Request.URL.String()\n\tlogger.WithField(\"path\", uri).Trace(\"REQUEST STARTED\")\n\tc.Next()\n\tlogger.Trace(\"REQUEST FINISHED\")\n}", "title": "" }, { "docid": "d7b76f73532c7eb1fd4ab6ecf409d002", "score": "0.47265705", "text": "func (s *Reporter) trackRequest(opType types.OpType, key []byte, endKey []byte) {\n\tif len(key) == 0 {\n\t\treturn\n\t}\n\tkeyLabel := buildKeyLabel(string(key), sensitiveBackendPrefixes, singletonBackendPrefixes, len(endKey) != 0)\n\trangeSuffix := teleport.TagFalse\n\tif len(endKey) != 0 {\n\t\t// Range denotes range queries in stat entry\n\t\trangeSuffix = teleport.TagTrue\n\t}\n\n\tcacheKey := topRequestsCacheKey{\n\t\tcomponent: s.Component,\n\t\tkey: keyLabel,\n\t\tisRange: rangeSuffix,\n\t}\n\t// We need to do ContainsOrAdd and then Get because if we do Add we hit\n\t// https://github.com/hashicorp/golang-lru/issues/141 which can cause a\n\t// memory leak in certain workloads (where we keep overwriting the same\n\t// key); it's not clear if Add to overwrite would be the correct thing to do\n\t// here anyway, as we use LRU eviction to delete unused metrics, but\n\t// overwriting might cause an eviction of the same metric we are about to\n\t// bump up in freshness, which is obviously wrong\n\tif ok, _ := s.topRequestsCache.ContainsOrAdd(cacheKey, struct{}{}); ok {\n\t\t// Refresh the key's position in the LRU cache, if it was already in it.\n\t\ts.topRequestsCache.Get(cacheKey)\n\t}\n\n\tcounter, err := requests.GetMetricWithLabelValues(s.Component, keyLabel, rangeSuffix)\n\tif err != nil {\n\t\tlog.Warningf(\"Failed to get counter: %v\", err)\n\t\treturn\n\t}\n\tcounter.Inc()\n}", "title": "" }, { "docid": "4d67fa75c2c417946ab2797b61e6ff9f", "score": "0.472248", "text": "func RequestLogger() func(next http.Handler) http.Handler {\n\treturn func(next http.Handler) http.Handler {\n\t\tfn := func(w http.ResponseWriter, r *http.Request) {\n\t\t\tt1 := time.Now()\n\n\t\t\tlogRequestStart(r)\n\n\t\t\tww := middleware.NewWrapResponseWriter(w, r.ProtoMajor)\n\n\t\t\tdefer func() {\n\t\t\t\telapsed := time.Since(t1)\n\t\t\t\tlogRequestEnd(r, ww.Status(), ww.BytesWritten(), elapsed)\n\t\t\t}()\n\n\t\t\tnext.ServeHTTP(ww, r)\n\t\t}\n\t\treturn http.HandlerFunc(fn)\n\t}\n}", "title": "" }, { "docid": "970d4895f7b804fce87c85a2fba227c0", "score": "0.47222006", "text": "func LogRequests() gin.HandlerFunc {\n\treturn func(c *gin.Context) {\n\t\tstart := time.Now().UTC()\n\t\tpath := c.Request.URL.Path\n\n\t\tc.Next()\n\n\t\trawQ := c.Request.URL.RawQuery\n\n\t\tif rawQ != \"\" {\n\t\t\tpath = path + \"?\" + rawQ\n\t\t}\n\n\t\tlog.Info().\n\t\t\tStr(\"client_ip\", c.ClientIP()).\n\t\t\tStr(\"method\", c.Request.Method).\n\t\t\tStr(\"path\", path).\n\t\t\tInt(\"status\", c.Writer.Status()).\n\t\t\tStr(\"latency\", time.Now().UTC().Sub(start).String()).\n\t\t\tMsg(\"Processed HTTP Request\")\n\t}\n}", "title": "" }, { "docid": "a3afaf2d72635738b7220034715dc69a", "score": "0.47055474", "text": "func InstrumentingMiddleware(requestCount metrics.Counter, requestLatency metrics.Histogram) Middleware {\n\treturn func(next FoosvcService) FoosvcService {\n\t\treturn instrumentingMiddleware{\n\t\t\trequestCount: requestCount,\n\t\t\trequestLatency: requestLatency,\n\t\t\tnext: next,\n\t\t}\n\t}\n}", "title": "" }, { "docid": "161c2c8638b7be09b8a5c91b06af4cc1", "score": "0.47049975", "text": "func withTracing(next http.HandlerFunc) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tspan := trace.GetSpanFromContext(r.Context())\n\t\tprop, _ := propagation.UnmarshalTraceContext(span.SerializeHeaders())\n\t\tlogrus.WithField(\"method\", r.Method).\n\t\t\tWithField(\"path\", r.URL.Path).\n\t\t\tWithField(\"trace_id\", prop.TraceID).Infoln(\"Handling request\")\n\t\tnext.ServeHTTP(w, r)\n\t}\n}", "title": "" }, { "docid": "1a2ac1d2788149ee9b28ee3396dc6d3b", "score": "0.47049445", "text": "func newRequestCountTracker(windowLength time.Duration) *requestCountTracker {\n\treturn &requestCountTracker{\n\t\trequestCount: map[string]int64{},\n\t\tstartTime: time.Now(),\n\t\tendTime: time.Now().Add(windowLength),\n\t}\n}", "title": "" }, { "docid": "a3a8b76c2375d0e7574c7234a8cf3a98", "score": "0.4704268", "text": "func (collector *Collector) Collect(ctx context.Context, request *proto.CollectRequest, response *proto.CollectResponse) error {\n fmt.Printf(\"Node: %s, Humidity: %f, Tmp: %f\\n\", request.GetNodeName(), request.GetHumidity(), request.GetTemperature())\n response.StatusCode = 0\n response.StatusMessage = \"Nice\"\n return nil\n}", "title": "" }, { "docid": "6160272fbb5c2e8082ca3c4c62a485da", "score": "0.46975777", "text": "func (app *App) Collect() {\n\tlogger.Println(\"app.Collect()\")\n\tstart := time.Now()\n\n\tswitch app.currentView.Get() {\n\tcase view.ViewLatency, view.ViewOps:\n\t\tapp.table_io_latency.Collect()\n\tcase view.ViewIO:\n\t\tapp.file_io_latency.Collect()\n\tcase view.ViewLocks:\n\t\tapp.table_lock_latency.Collect()\n\tcase view.ViewUsers:\n\t\tapp.users.Collect()\n\tcase view.ViewMutex:\n\t\tapp.mutex_latency.Collect()\n\tcase view.ViewStages:\n\t\tapp.stages_latency.Collect()\n\tcase view.ViewMemory:\n\t\tapp.memory.Collect()\n\t}\n\tapp.waitHandler.CollectedNow()\n\tlogger.Println(\"app.Collect() took\", time.Duration(time.Since(start)).String())\n}", "title": "" }, { "docid": "4137a176d241c002923978563ec721a9", "score": "0.46874183", "text": "func (c *StatsD) TrackRequest(r *http.Request, t timer.Timer, success bool) Client {\n\tb := bucket.NewHTTPRequest(c.httpRequestSection, r, success, c.httpMetricCallback, c.unicode)\n\ti := incrementer.NewStatsD(c.client)\n\n\tif nil != t {\n\t\tc.client.Timing(b.Metric(), int(t.Finish()/time.Millisecond))\n\t}\n\ti.IncrementAll(b)\n\n\treturn c\n}", "title": "" }, { "docid": "b567da0a12915b4002db9274a16cfe34", "score": "0.46860176", "text": "func (a *awsCloudStore) addThrottler(sess *session.Session) {\n\tthrottleCfg := throttle.NewDefaultServiceOperationsThrottleConfig()\n\tthrottler := throttle.NewThrottler(throttleCfg)\n\tthrottler.InjectHandlers(&sess.Handlers)\n}", "title": "" }, { "docid": "8d0c892e7a93fdeb9fe74045bcb0f81e", "score": "0.46846947", "text": "func AddToCtx() func(http.Handler) http.Handler {\n\treturn func(next http.Handler) http.Handler {\n\t\treturn http.HandlerFunc(func(rw http.ResponseWriter, req *http.Request) {\n\t\t\tctx := req.Context()\n\n\t\t\tif traceId, err := getTraceId(req.Header); err == nil {\n\t\t\t\tctx = WithTraceIdCtx(ctx, traceId)\n\t\t\t}\n\n\t\t\tif spanId, err := NewSpanId(); err == nil {\n\t\t\t\tctx = WithSpanIdCtx(ctx, spanId)\n\t\t\t}\n\n\t\t\tnext.ServeHTTP(rw, req.WithContext(ctx))\n\t\t})\n\t}\n}", "title": "" }, { "docid": "3c1ceedd32beb9b57b7fc7dff534ed8c", "score": "0.46810728", "text": "func (m *Metrics) requestHandlerWrapper (w http.ResponseWriter, r *http.Request) {\n\tresult, response := requestHandler(w, r)\n\n\tw.WriteHeader(response)\n\tif result != nil {\n\t\tm.IncScrapes(result.URL, result.StatusCode)\n\t}\n\tm.IncService(response)\n}", "title": "" }, { "docid": "844d5299556ebc32f292342f602e1939", "score": "0.46809554", "text": "func Tracing(service string, op string) startup_http.HttpMiddleware {\n\n\treturn func(handler http.Handler) http.Handler {\n\t\treturn http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {\n\t\t\tctx := req.Context()\n\n\t\t\t// Check if we already have a span. This happens when the user is\n\t\t\t// chaining multiple tracing middleware\n\t\t\tif existingSpan := opentracing.SpanFromContext(ctx); existingSpan != nil {\n\t\t\t\t// update existing span\n\t\t\t\texistingSpan.SetOperationName(op)\n\t\t\t\texistingSpan.SetTag(\"dd.service\", service)\n\n\t\t\t\t// continue\n\t\t\t\thandler.ServeHTTP(w, req)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\t// extract a span from the incoming request\n\t\t\twireContext, err := opentracing.GlobalTracer().Extract(\n\t\t\t\topentracing.HTTPHeaders, opentracing.HTTPHeadersCarrier(req.Header))\n\n\t\t\tif err != nil && err != opentracing.ErrSpanContextNotFound {\n\t\t\t\t// ignore errors but show a small warning.\n\t\t\t\tlog := GetLogger(ctx, \"httpd\")\n\t\t\t\tlog.Warnf(\"Could not extract tracer from http headers: %s\", err)\n\t\t\t}\n\n\t\t\t// start a new server side trace\n\t\t\tserverSpan := opentracing.StartSpan(op, ext.RPCServerOption(wireContext))\n\t\t\tdefer serverSpan.Finish()\n\n\t\t\t// use a clean url as resource\n\t\t\tserverSpan.SetTag(\"dd.service\", service)\n\t\t\text.HTTPMethod.Set(serverSpan, req.Method)\n\t\t\text.HTTPUrl.Set(serverSpan, cleanUrl(req.URL.String()))\n\n\t\t\t// record and log the status code of the response\n\t\t\trl, w := responseLoggerOf(w)\n\t\t\tdefer rl.addStatusToSpan(serverSpan)\n\n\t\t\t// put the span into the context\n\t\t\tctx = opentracing.ContextWithSpan(ctx, serverSpan)\n\t\t\thandler.ServeHTTP(w, req.WithContext(ctx))\n\t\t})\n\t}\n}", "title": "" }, { "docid": "9f348625a634548290bd58f17c049808", "score": "0.46788776", "text": "func (s *Server) incrementStats(r *http.Request) {\n\ts.mu.Lock()\n\tdefer s.mu.Unlock()\n\ts.stats.IncrRequestStats(r.ContentLength)\n\ts.stats.IncrRouteStats(r.URL.Path, r.ContentLength)\n}", "title": "" }, { "docid": "1155a3f70d187ce5e6c2c680f54f58be", "score": "0.46739125", "text": "func LoggingMiddleware(logger *logrus.Logger) mux.MiddlewareFunc {\n\treturn func(next http.Handler) http.Handler {\n\t\treturn http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {\n\t\t\tstart := time.Now()\n\n\t\t\tcorrelationID := getCorrelationID(r.Header)\n\t\t\tctx := WithLogger(r.Context(), logrus.NewEntry(logger).WithFields(logrus.Fields{\n\t\t\t\t\"CorrelationId\": correlationID,\n\t\t\t}))\n\n\t\t\twriter := readableResponseWriter{writer: rw, statusCode: http.StatusOK}\n\n\t\t\tGet(ctx).WithFields(logrus.Fields{\n\t\t\t\t\"http\": HTTP{\n\t\t\t\t\tRequest: &Request{\n\t\t\t\t\t\tPath: r.URL.RequestURI(),\n\t\t\t\t\t\tMethod: r.Method,\n\t\t\t\t\t\tContentType: r.Header.Get(contentTypeKey),\n\t\t\t\t\t\tUserAgent: r.Header.Get(userAgentKey),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\"host\": Host{\n\t\t\t\t\tHostname: removePort(r.Host),\n\t\t\t\t\tForwardedHostname: r.Header.Get(forwardedHostKey),\n\t\t\t\t\tIP: getIP(r),\n\t\t\t\t},\n\t\t\t}).Info(\"Incoming Request\")\n\n\t\t\tnext.ServeHTTP(&writer, r.WithContext(ctx))\n\n\t\t\tGet(ctx).WithFields(logrus.Fields{\n\t\t\t\t\"http\": HTTP{\n\t\t\t\t\tRequest: &Request{\n\t\t\t\t\t\tPath: r.URL.RequestURI(),\n\t\t\t\t\t\tMethod: r.Method,\n\t\t\t\t\t\tContentType: r.Header.Get(contentTypeKey),\n\t\t\t\t\t\tUserAgent: r.Header.Get(userAgentKey),\n\t\t\t\t\t},\n\t\t\t\t\tResponse: &Response{\n\t\t\t\t\t\tStatusCode: writer.statusCode,\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\"host\": Host{\n\t\t\t\t\tHostname: removePort(r.Host),\n\t\t\t\t\tForwardedHostname: r.Header.Get(forwardedHostKey),\n\t\t\t\t\tIP: getIP(r),\n\t\t\t\t},\n\t\t\t\t\"responseTime\": float64(time.Since(start).Microseconds()),\n\t\t\t}).Info(\"Completed Request\")\n\n\t\t})\n\t}\n}", "title": "" }, { "docid": "7deb0830b13a40547d01095e841c88f4", "score": "0.4668951", "text": "func RequestLogger(next http.Handler) http.Handler {\n\n\tfn := func(writer http.ResponseWriter, request *http.Request) {\n\n\t\tentry := initRequestEntry(request)\n\n\t\tstart := time.Now()\n\n\t\trec := httptest.NewRecorder()\n\n\t\tdefer func() {\n\n\t\t\tentry.Latency = time.Since(start)\n\n\t\t\tentry.Status = rec.Code\n\n\t\t\tif entry.Status == 0 {\n\t\t\t\tentry.Status = http.StatusOK\n\t\t\t}\n\n\t\t\tentry.ResponseBody = fmt.Sprintf(\"%q\", rec.Body)\n\n\t\t\t// this copies the recorded response to the response writer\n\t\t\tfor k, v := range rec.HeaderMap {\n\t\t\t\twriter.Header()[k] = v\n\t\t\t}\n\t\t\twriter.WriteHeader(rec.Code)\n\t\t\trec.Body.WriteTo(writer)\n\n\t\t\tDefaultLogger.Info().\n\t\t\t\tStr(\"host\", entry.Host).\n\t\t\t\tStr(\"method\", entry.Method).\n\t\t\t\tStr(\"url\", entry.URL).\n\t\t\t\tStr(\"agent\", entry.UserAgent).\n\t\t\t\tStr(\"referer\", entry.Referer).\n\t\t\t\tStr(\"protocol\", entry.Protocol).\n\t\t\t\tStr(\"remoteIp\", entry.RemoteIP).\n\t\t\t\tStr(\"serverIp\", entry.ServerIP).\n\t\t\t\tInt(\"status\", entry.Status).\n\t\t\t\tDur(\"latency\", entry.Latency).\n\t\t\t\tRawJSON(\"request\", entry.RequestBody).\n\t\t\t\tStr(\"response\", entry.ResponseBody).\n\t\t\t\tStr(\"requestId\", entry.RequestId).\n\t\t\t\tMsg(\"\")\n\t\t}()\n\n\t\trec.Header().Set(\"Content-Type\", \"text/plain; charset=utf-8\")\n\t\trec.Header().Set(\"X-Content-Type-Options\", \"nosniff\")\n\t\trec.Write([]byte(\"\"))\n\n\t}\n\n\treturn http.HandlerFunc(fn)\n}", "title": "" }, { "docid": "928d975f17bba8bb7a9d0e9a51431a8d", "score": "0.4665548", "text": "func (generator *recordedOpGenerator) pushDriverRequestOps(recordedOp *RecordedOp) {\n\tgenerator.opChan <- recordedOp\n}", "title": "" }, { "docid": "2549d6b22d0426eda2400872b80bfe76", "score": "0.46611354", "text": "func RequestLogger(logger *zap.Logger) func(next http.Handler) http.Handler {\n\treturn func(next http.Handler) http.Handler {\n\t\tfn := func(w http.ResponseWriter, r *http.Request) {\n\t\t\tww := middleware.NewWrapResponseWriter(w, r.ProtoMajor)\n\t\t\tt1 := time.Now()\n\t\t\tdefer func() {\n\t\t\t\tif ww.Status() >= 200 && ww.Status() < 300 {\n\t\t\t\t\t// Log with Debug\n\t\t\t\t\tlogger.Debug(\"Served\",\n\t\t\t\t\t\tzap.String(\"protocol\", r.Proto),\n\t\t\t\t\t\tzap.String(\"method\", r.Method),\n\t\t\t\t\t\tzap.String(\"path\", r.URL.Path),\n\t\t\t\t\t\tzap.Duration(\"latency\", time.Since(t1)),\n\t\t\t\t\t\tzap.Int(\"status\", ww.Status()),\n\t\t\t\t\t\tzap.Int(\"size\", ww.BytesWritten()),\n\t\t\t\t\t\tzap.String(\"reqId\", middleware.GetReqID(r.Context())))\n\t\t\t\t} else if ww.Status() >= 500 {\n\t\t\t\t\t// Log with Error\n\t\t\t\t\tlogger.Error(\"Served\",\n\t\t\t\t\t\tzap.String(\"protocol\", r.Proto),\n\t\t\t\t\t\tzap.String(\"method\", r.Method),\n\t\t\t\t\t\tzap.String(\"path\", r.URL.Path),\n\t\t\t\t\t\tzap.Duration(\"latency\", time.Since(t1)),\n\t\t\t\t\t\tzap.Int(\"status\", ww.Status()),\n\t\t\t\t\t\tzap.Int(\"size\", ww.BytesWritten()),\n\t\t\t\t\t\tzap.String(\"reqId\", middleware.GetReqID(r.Context())))\n\n\t\t\t\t} else {\n\t\t\t\t\t// Log with Warning\n\t\t\t\t\tlogger.Warn(\"Served\",\n\t\t\t\t\t\tzap.String(\"protocol\", r.Proto),\n\t\t\t\t\t\tzap.String(\"method\", r.Method),\n\t\t\t\t\t\tzap.String(\"path\", r.URL.Path),\n\t\t\t\t\t\tzap.Duration(\"latency\", time.Since(t1)),\n\t\t\t\t\t\tzap.Int(\"status\", ww.Status()),\n\t\t\t\t\t\tzap.Int(\"size\", ww.BytesWritten()),\n\t\t\t\t\t\tzap.String(\"reqId\", middleware.GetReqID(r.Context())))\n\t\t\t\t}\n\t\t\t}()\n\n\t\t\tnext.ServeHTTP(ww, r)\n\t\t}\n\t\treturn http.HandlerFunc(fn)\n\t}\n}", "title": "" }, { "docid": "b4ec13ffe09738d10f7998cc8f862193", "score": "0.46590257", "text": "func loggingMiddleware(inner http.Handler, name string) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\trc, r := GetContext(r)\n\t\trc.Name = name\n\n\t\tglog.Infof(\"[%s] Recevied %s request from %s\", rc.ID, name, r.RemoteAddr)\n\n\t\tstart := time.Now()\n\n\t\tinner.ServeHTTP(w, r)\n\n\t\ttt := time.Since(start)\n\t\tif rc.stats != nil {\n\t\t\trc.stats.handlerTime = tt\n\t\t}\n\n\t\tglog.Infof(\"[%s] %s took %s\", rc.ID, name, tt)\n\t})\n}", "title": "" }, { "docid": "4af76f67886e57fc5525242ff98368ab", "score": "0.46547106", "text": "func Logger(next http.Handler) http.Handler {\n\tfn := func(w http.ResponseWriter, r *http.Request) {\n\t\tww := middleware.NewWrapResponseWriter(w, r.ProtoMajor)\n\n\t\tstart := time.Now()\n\t\tdefer func() {\n\t\t\tmctx, ok := monitoring.GetMonitoringContext(r.Context())\n\t\t\tif ok {\n\t\t\t\tduration := time.Since(start)\n\n\t\t\t\terrType := \"None\"\n\t\t\t\tif mctx.HasError() {\n\t\t\t\t\terrType = mctx.GetError().ErrorType.String()\n\t\t\t\t}\n\n\t\t\t\tif errType != \"None\" {\n\t\t\t\t\tmctx.Logger().\n\t\t\t\t\t\tWith(monitoring.IntLogField(monitoring.LF_HttpStatus, ww.Status()),\n\t\t\t\t\t\t\tmonitoring.Int64LogField(monitoring.LF_Ms, duration.Milliseconds()),\n\t\t\t\t\t\t\tmonitoring.IntLogField(monitoring.LF_Bytes, ww.BytesWritten()),\n\t\t\t\t\t\t\tmonitoring.StrLogField(monitoring.LF_Error, mctx.GetError().Message),\n\t\t\t\t\t\t\tmonitoring.StrLogField(monitoring.LF_ErrorType, errType),\n\t\t\t\t\t\t\tmonitoring.StrLogField(monitoring.LF_ErrorCause, mctx.GetError().Cause)).\n\t\t\t\t\t\tWarn(\"request failed\")\n\t\t\t\t} else {\n\t\t\t\t\tmctx.Logger().\n\t\t\t\t\t\tWith(monitoring.IntLogField(monitoring.LF_HttpStatus, ww.Status()),\n\t\t\t\t\t\t\tmonitoring.Int64LogField(monitoring.LF_Ms, duration.Milliseconds()),\n\t\t\t\t\t\t\tmonitoring.IntLogField(monitoring.LF_Bytes, ww.BytesWritten())).\n\t\t\t\t\t\tInfo(\"request completed\")\n\t\t\t\t}\n\n\t\t\t\tlv := map[string]string{\n\t\t\t\t\t\"resource\": mctx.Resource(),\n\t\t\t\t\t\"operation\": mctx.Operation(),\n\t\t\t\t\t\"status\": strconv.Itoa(ww.Status()),\n\t\t\t\t\t\"error\": errType,\n\t\t\t\t}\n\n\t\t\t\tdurationHist.With(lv).Record(float64(duration.Milliseconds()))\n\t\t\t\tsizeHist.With(lv).Record(float64(ww.BytesWritten()))\n\t\t\t\treqCnt.With(lv).Incr()\n\t\t\t}\n\t\t}()\n\n\t\tnext.ServeHTTP(ww, r)\n\t}\n\treturn http.HandlerFunc(fn)\n}", "title": "" }, { "docid": "be49ee39a42d75ee499ddd4fbd90b4f0", "score": "0.4649561", "text": "func (s *Server) incrementStats(r *http.Request) {\n\ts.mu.Lock()\n\tdefer s.mu.Unlock()\n\ts.stats.IncrReqStats(r.ContentLength)\n\ts.stats.IncrRouteStats(r.URL.Path, r.ContentLength)\n}", "title": "" }, { "docid": "fda7f9ee940858870d8c9d449617d519", "score": "0.46489698", "text": "func (a *Alerter) AddRequest(req *Request) {\n\ta.counts[a.index]++\n}", "title": "" }, { "docid": "917723664be906cfd214cb6effc2c2a9", "score": "0.46479577", "text": "func PrepareMiddleware(d *InitData) {\n\tif d == nil {\n\t\tpanic(\"Please provide a pointer to a valid and instantiated GoScopeInitData.\")\n\t}\n\n\tconfigSetup(d.Config)\n\tdatabaseSetup(databaseInformation{\n\t\tdatabaseType: Config.GoScopeDatabaseType,\n\t\tconnection: Config.GoScopeDatabaseConnection,\n\t\tmaxOpenConnections: Config.GoScopeDatabaseMaxOpenConnections,\n\t\tmaxIdleConnections: Config.GoScopeDatabaseMaxIdleConnections,\n\t\tmaxConnectionLifetime: Config.GoScopeDatabaseMaxConnLifetime,\n\t})\n\n\td.Router.Use(gin.Logger())\n\td.Router.Use(gin.Recovery())\n\n\tlogger := &loggerGoScope{}\n\tgin.DefaultErrorWriter = logger\n\n\tlog.SetFlags(log.Lshortfile)\n\tlog.SetOutput(logger)\n\n\t// Use the logging middleware\n\td.Router.Use(responseLogger)\n\n\t// Catch 404s\n\td.Router.NoRoute(noRouteResponseLogger)\n\n\t// SPA routes\n\tif !Config.HasFrontendDisabled {\n\t\td.RouteGroup.GET(\"/\", requestListPageHandler)\n\t\td.RouteGroup.GET(\"\", requestListPageHandler)\n\t\td.RouteGroup.GET(\"/requests\", requestListPageHandler)\n\t\td.RouteGroup.GET(\"/logs\", logListPageHandler)\n\t\td.RouteGroup.GET(\"/logs/:id\", logDetailsPageHandler)\n\t\td.RouteGroup.GET(\"/requests/:id\", requestDetailsPageHandler)\n\t\td.RouteGroup.GET(\"/info\", systemInfoPageHandler)\n\n\t\td.RouteGroup.GET(\"/styles/:filename\", func(c *gin.Context) {\n\t\t\tvar routeData fileByRoute\n\n\t\t\terr := c.BindUri(&routeData)\n\t\t\tif err != nil {\n\t\t\t\tlog.Println(err.Error())\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tfile, err := web.StyleFiles.ReadFile(fmt.Sprintf(\"styles/%s\", routeData.FileName))\n\t\t\tif err != nil {\n\t\t\t\tlog.Println(err.Error())\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tc.Header(\"Content-Type\", \"text/css; charset=utf-8\")\n\t\t\tc.String(http.StatusOK, string(file))\n\t\t})\n\n\t\td.RouteGroup.GET(\"/scripts/:filename\", func(c *gin.Context) {\n\t\t\tvar routeData fileByRoute\n\n\t\t\terr := c.BindUri(&routeData)\n\t\t\tif err != nil {\n\t\t\t\tlog.Println(err.Error())\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tfile, err := web.ScriptFiles.ReadFile(fmt.Sprintf(\"scripts/%s\", routeData.FileName))\n\t\t\tif err != nil {\n\t\t\t\tlog.Println(err.Error())\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tc.Header(\"Content-Type\", \"application/javascript; charset=utf-8\")\n\t\t\tc.String(http.StatusOK, string(file))\n\t\t})\n\t}\n\n\t// GoScope API\n\tapiGroup := d.RouteGroup.Group(\"/api\")\n\tapiGroup.GET(\"/application-name\", getAppName)\n\tapiGroup.GET(\"/logs\", getLogListHandler)\n\tapiGroup.GET(\"/requests/:id\", showRequestDetailsHandler)\n\tapiGroup.GET(\"/logs/:id\", showLogDetailsHandler)\n\tapiGroup.GET(\"/requests\", getRequestListHandler)\n\tapiGroup.POST(\"/search/requests\", searchRequestHandler)\n\tapiGroup.POST(\"/search/logs\", searchLogHandler)\n\tapiGroup.GET(\"/info\", getSystemInfoHandler)\n}", "title": "" }, { "docid": "2348f8572a90b8f4c9d6bc217dcb7414", "score": "0.46426287", "text": "func setContext(c *gin.Context, db *geoip2.Reader) {\n\tstart := time.Now()\n\tipAddress, err := getClientIP(c)\n\tif err == nil {\n\t\tlanguage := getLanguage(c)\n\t\tresponse := getResponse(ipAddress, language, db)\n\t\tc.Set(\"GeoResponse\", response)\n\t} else {\n\t\tresponse := getErrorResponse(err.Error())\n\t\tc.Set(\"GeoResponse\", response)\n\t}\n\tduration := time.Now().Sub(start)\n\tlog.Println(\"Geo: Middleware duration\", duration)\n}", "title": "" }, { "docid": "a669ab1de8fe17ffd9f62fc8868c69b7", "score": "0.46405476", "text": "func (exp *nginxPlusExporter) Collect(ch chan<- prometheus.Metric) {\n\texp.Lock()\n\tdefer exp.Unlock()\n\n\texp.expose(ch, exp.collect(exp.scrape()))\n}", "title": "" }, { "docid": "f2b8e98177bf0c48233a318c59406ba9", "score": "0.46376646", "text": "func (App *AppServer) EnableStatTracking() {\n\tApp.stat_map = NewSafeMap()\n\tnow := time.Now().String()\n\tstaturl := makeurl(\"^/statistics/?$\", \"Statistics\",\n\t\tfunc(w http.ResponseWriter, req *http.Request) (string, int) {\n\t\t\trawdata, ok := App.stat_map.Do(func(m freemap) interface{} {\n\t\t\t\tb := []byte{}\n\t\t\t\tbuf := bytes.NewBuffer(b)\n\t\t\t\tbuf.WriteString(\n\t\t\t\t\tfmt.Sprintf(\n\t\t\t\t\t\t`<!DOCTYPE html><html>\n\t\t\t\t\t <p>Tracking since %s</p>\n\t\t\t\t\t <table border=\"2\">\n\t\t\t\t\t <tr><th>URL</th><th>\n\t\t\t\t\t Hits</th></tr>`, now),\n\t\t\t\t)\n\t\t\t\tvar urllist []string\n\t\t\t\tfor key, _ := range m {\n\t\t\t\t\turllist = append(urllist, key.(string))\n\t\t\t\t}\n\t\t\t\tsort.Strings(urllist)\n\t\t\t\tvar total int\n\t\t\t\tfor _, key := range urllist {\n\t\t\t\t\tbuf.WriteString(\n\t\t\t\t\t\tfmt.Sprintf(\"<tr><td>%s</td>\", key),\n\t\t\t\t\t)\n\t\t\t\t\ttotal += m[key].(int)\n\t\t\t\t\tbuf.WriteString(\n\t\t\t\t\t\tfmt.Sprintf(\"<td>%d</td></tr>\", m[key].(int)),\n\t\t\t\t\t)\n\t\t\t\t}\n\t\t\t\tbuf.WriteString(\n\t\t\t\t\tfmt.Sprintf(`<tr><td>Total</td><td>%d</td></tr>`, total),\n\t\t\t\t)\n\t\t\t\tbuf.WriteString(`</table></html>`)\n\t\t\t\treturn buf.String()\n\t\t\t})\n\t\t\tif !ok {\n\t\t\t\treturn \"Failure getting data\", 500\n\t\t\t}\n\t\t\treturn rawdata.(string), 200\n\n\t\t}, HTML, 0)\n\tApp.routes = append(App.routes, staturl)\n}", "title": "" }, { "docid": "60ccb7244641a8571c958b39b1161c52", "score": "0.46280524", "text": "func monitor(verb, resource string, client, contentType string, httpCode int, reqStart time.Time) {\n\telapsed := float64((time.Since(reqStart)) / time.Microsecond)\n\trequestCounter.WithLabelValues(verb, resource, client, contentType, strconv.Itoa(httpCode)).Inc()\n\trequestLatencies.WithLabelValues(verb, resource).Observe(elapsed)\n\trequestLatenciesSummary.WithLabelValues(verb, resource).Observe(elapsed)\n}", "title": "" }, { "docid": "1610c7949144a6bf5b5cfebd8f88f62c", "score": "0.46267673", "text": "func LogRequest(c *eden.Context) {\n\tstart := time.Now()\n\n\tc.Next()\n\n\tduration := time.Since(start)\n\tlog.Printf(\"%s: %s | Status: %d | Request took %f miliseconds\", c.Request.Method, c.Request.RequestURI, c.Status, duration.Seconds()*100)\n}", "title": "" }, { "docid": "44d4d9689bdd2323b25239a1fd3ed992", "score": "0.46265924", "text": "func InstrumentHttpServerRequests(observers []prometheus.ObserverVec, traceObservers []prometheus.ObserverVec, next http.Handler, serverRequestLabelFuncs ...HttpServerRequestLabelFunc) http.HandlerFunc {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tserverRequestLabelFunc := defaultMetricsHttpServerRequestLabelFunc\n\t\tif len(serverRequestLabelFuncs) > 0 {\n\t\t\tserverRequestLabelFunc = serverRequestLabelFuncs[0]\n\t\t}\n\t\tnow := time.Now()\n\t\tvar d Delegator\n\t\tif traceObservers != nil {\n\t\t\td = newDelegator(w, func(d Delegator) {\n\t\t\t\telapseTime := time.Since(now).Seconds()\n\t\t\t\tfor _, obs := range traceObservers {\n\t\t\t\t\tlabels := serverRequestLabelFunc(obs, d, r, prometheus.Labels{\"event\": d.Event()})\n\t\t\t\t\tobs.With(labels).Observe(elapseTime)\n\t\t\t\t}\n\t\t\t}, func(d Delegator) {\n\t\t\t\telapseTime := time.Since(now).Seconds()\n\t\t\t\tfor _, obs := range traceObservers {\n\t\t\t\t\tlabels := serverRequestLabelFunc(obs, d, r, prometheus.Labels{\"event\": d.Event()})\n\t\t\t\t\tobs.With(labels).Observe(elapseTime)\n\t\t\t\t}\n\t\t\t})\n\t\t} else {\n\t\t\td = newDelegator(w, nil, nil)\n\t\t}\n\t\tnext.ServeHTTP(d, r)\n\t\telapseTime := time.Since(now).Seconds()\n\t\tfor _, obs := range observers {\n\t\t\tlabels := serverRequestLabelFunc(obs, d, r)\n\t\t\tobs.With(labels).Observe(elapseTime)\n\t\t}\n\t})\n}", "title": "" }, { "docid": "4a75ee4282aa49b9f852f8c50efa7a8a", "score": "0.46251386", "text": "func mwStats(next CallFunc) CallFunc {\n\treturn func(c *Context) Renderer {\n\t\ttags := map[string]string{\n\t\t\t\"action\": fmt.Sprintf(\"%T\", c.action),\n\t\t}\n\t\tc.Ctx.Stats().Inc(\"http.conc\", tags)\n\n\t\t// Next middleware\n\t\tr := next(c)\n\n\t\ttags[\"status\"] = fmt.Sprintf(\"%v\", r.Status())\n\t\tc.Ctx.Stats().Histogram(\"http.call\", 1, tags)\n\t\tc.Ctx.Stats().Timing(\"http.time\", time.Since(c.StartAt), tags)\n\t\tc.Ctx.Stats().Dec(\"http.conc\", tags)\n\n\t\treturn r\n\t}\n}", "title": "" }, { "docid": "0d6cabef424e36a711772a6c646060b3", "score": "0.46231052", "text": "func CollectionCacheMiddleware(tracer opentracing.Tracer, cache lbs.CollectionCache) lbs.CollectionCache {\n\treturn collectionCacheMiddleware{\n\t\ttracer: tracer,\n\t\tcache: cache,\n\t}\n}", "title": "" }, { "docid": "754f955342baa51796e8b95d0e5475d3", "score": "0.46219397", "text": "func (p *Prometheus) Instrument() gin.HandlerFunc {\n\treturn func(c *gin.Context) {\n\t\tstart := time.Now()\n\t\tpath := c.FullPath()\n\n\t\tif path == \"\" || p.isIgnored(path) {\n\t\t\tc.Next()\n\t\t\treturn\n\t\t}\n\n\t\treqSz := computeApproximateRequestSize(c.Request)\n\n\t\tc.Next()\n\n\t\tstatus := strconv.Itoa(c.Writer.Status())\n\t\telapsed := float64(time.Since(start)) / float64(time.Second)\n\t\tresSz := float64(c.Writer.Size())\n\n\t\tp.reqCnt.WithLabelValues(status, c.Request.Method, c.HandlerName(), c.Request.Host, path).Inc()\n\t\tp.reqDur.WithLabelValues(c.Request.Method, path, c.Request.Host).Observe(elapsed)\n\t\tp.reqSz.Observe(float64(reqSz))\n\t\tp.resSz.Observe(resSz)\n\t}\n}", "title": "" }, { "docid": "6eb3d1f5d311eff5b8213ec64bbb08e7", "score": "0.46200842", "text": "func (i *MetricsInterceptor) BeforeDispatch(ctx context.Context, req fiber.Request) context.Context {\n\ti.statsd.Increment(i.operationName(ctx, req, \"count\"))\n\n\tctx = context.WithValue(ctx, CtxDispatchStartTimeKey, time.Now())\n\treturn ctx\n}", "title": "" }, { "docid": "3be2ccbcc84f4a6430693602b5a9b995", "score": "0.46157923", "text": "func LoggingMiddleware(next httprouter.Handle) httprouter.Handle {\n\n\treturn func(w http.ResponseWriter, r *http.Request, ps httprouter.Params) {\n\n\t\tlw := &statusLoggingResponseWriter{-1, false, w}\n\t\tstartTime := time.Now()\n\t\tnext(lw, r, ps)\n\t\tadaptlog.Simple.Printf(\"host=%s method=%s route=%s status=%d time=%s params=%s\", r.Host, r.Method, r.URL.String(), lw.status, time.Since(startTime), ps)\n\t}\n}", "title": "" }, { "docid": "73d1a1e6e457ad6233522b6098e6c8ce", "score": "0.46110833", "text": "func LoggingMiddleware(next http.HandlerFunc) http.HandlerFunc {\n\t// take a context and a handler to wrap, log context information before\n\t// executing wrapper, pass down the context, wait until execution is done,\n\t// then log again with updated context information.\n\tlog := func(ctx *http.Context, wrapped http.HandlerFunc) error {\n\t\tif ctx.RequestURI == \"/health\" {\n\t\t\treturn wrapped(ctx)\n\t\t}\n\t\tif id, err := util.Nonce(sizeReqID); err != nil {\n\t\t\tctx.Logger.Error().Err(err).Msg(\"failed to generate request id\")\n\t\t} else {\n\t\t\tctx.Logger = ctx.Logger.With().Str(\"id\", id).Logger()\n\t\t}\n\t\tlogger := ctx.Logger.With().Str(\"method\", ctx.Method).\n\t\t\tStr(\"path\", ctx.URL.Path).Str(\"remote\", ctx.RemoteHost()).\n\t\t\tLogger()\n\t\tlogger.Info().Msg(\"request start\")\n\t\terr := wrapped(ctx)\n\t\tlogger.Info().Int(\"code\", ctx.Code).Msg(\"request end\")\n\t\treturn err\n\t}\n\treturn func(ctx *http.Context) error { return log(ctx, next) }\n}", "title": "" }, { "docid": "cbf320f761e879029dc3d5df3691218a", "score": "0.4605888", "text": "func (r *RequestCapturer) capture(v interface{}) {\n\tr.requests = append(r.requests, v)\n}", "title": "" }, { "docid": "f27615a070e5bfa5d267dd31a2982d8b", "score": "0.46011156", "text": "func (c *loggedRoundTripper) logRequest(req *http.Request) {\n}", "title": "" }, { "docid": "f9b51142ee47624f3548df360488134a", "score": "0.45885253", "text": "func (pmv *ProcessMetricsViews) StartCollection() {\n\tticker := time.NewTicker(5 * time.Second)\n\tgo func() {\n\t\tfor {\n\t\t\tselect {\n\t\t\tcase <-ticker.C:\n\t\t\t\tpmv.updateViews()\n\t\t\tcase <-pmv.done:\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}()\n}", "title": "" }, { "docid": "cb1826bf06b6ec931554133c8dbe174b", "score": "0.45847327", "text": "func withRequestLog(next http.HandlerFunc) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\n\t\tnotCache(w)\n\n\t\treqDump, err := httputil.DumpRequest(r, true)\n\t\tif err != nil {\n\t\t\tlog.Println(err)\n\t\t} else {\n\t\t\tlog.Println(string(reqDump))\n\t\t}\n\n\t\tnext.ServeHTTP(w, r)\n\t}\n}", "title": "" }, { "docid": "95cccb2fd05c4df0b153a29ab72925a5", "score": "0.4578347", "text": "func addInboundRequest() {\n\tinboundRequests.Lock()\n\tinboundRequests.currentRequests++\n\tcurrentRequests := inboundRequests.currentRequests\n\tinboundRequests.Unlock()\n\tlog.Infof(\"Current inbound requests: %d\", currentRequests)\n}", "title": "" }, { "docid": "cba979719f5b6c23b6245ebb15f08552", "score": "0.45772177", "text": "func Server(tracer *go2sky.Tracer, opts ...Option) middleware.Middleware {\n\toptions := &options{\n\t\treportTags: []string{},\n\t}\n\tfor _, o := range opts {\n\t\to(options)\n\t}\n\treturn func(handler middleware.Handler) middleware.Handler {\n\t\treturn func(ctx context.Context, req interface{}) (interface{}, error) {\n\t\t\tif tr, ok := transport.FromServerContext(ctx); ok {\n\t\t\t\tspan, ctx, err := tracer.CreateEntrySpan(ctx, tr.Operation(), func(key string) (string, error) {\n\t\t\t\t\treturn tr.RequestHeader().Get(key), nil\n\t\t\t\t})\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn nil, err\n\t\t\t\t}\n\t\t\t\tdefer func() { span.End() }()\n\n\t\t\t\tspan.SetComponent(componentIDKratos)\n\t\t\t\tspan.SetSpanLayer(agentv3.SpanLayer_RPCFramework)\n\n\t\t\t\tif md, ok := metadata.FromServerContext(ctx); ok {\n\t\t\t\t\tfor _, k := range options.reportTags {\n\t\t\t\t\t\tspan.Tag(go2sky.Tag(k), md.Get(k))\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\treply, err := handler(ctx, req)\n\t\t\t\tif err != nil {\n\t\t\t\t\tspan.Error(time.Now(), err.Error())\n\t\t\t\t}\n\t\t\t\treturn reply, err\n\t\t\t} else {\n\t\t\t\tfmt.Printf(\"%+v, %+v\", ctx, req)\n\t\t\t}\n\t\t\treturn handler(ctx, req)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "2b535f778348543b2a5efe924f387033", "score": "0.45727855", "text": "func (mw *MetricsMiddleware) Intercept(nextHandler http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tww := newWrappedResponseWriter(w)\n\n\t\tstart := time.Now()\n\t\tnextHandler.ServeHTTP(ww, r)\n\t\telapsed := time.Since(start).Seconds()\n\n\t\turl, err := url.Parse(r.RequestURI)\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"failed to parse request URI: %s\", err)\n\t\t}\n\t\tmetricDim := MetricDimensions{Method: r.Method, Path: url.Path, StatusCode: ww.statusCode}\n\t\tlog.Infof(\"%s => %s %s: %d [%fs]\", r.RemoteAddr, r.Method, r.RequestURI, ww.statusCode, elapsed)\n\n\t\tmw.updateMutex.Lock()\n\t\tdefer mw.updateMutex.Unlock()\n\n\t\t// update request count for the given status code\n\t\t_, ok := mw.TotalRequests[metricDim]\n\t\tif !ok {\n\t\t\tmw.TotalRequests[metricDim] = 0\n\t\t}\n\t\tmw.TotalRequests[metricDim]++\n\n\t\t// update sum of response times for the given status code\n\t\t_, ok = mw.SumResponseTime[metricDim]\n\t\tif !ok {\n\t\t\tmw.SumResponseTime[metricDim] = 0\n\t\t}\n\t\tmw.SumResponseTime[metricDim] += elapsed\n\n\t\t// update average response time for the given status code\n\t\tmw.AvgResponseTime[metricDim] =\n\t\t\tmw.SumResponseTime[metricDim] / float64(mw.TotalRequests[metricDim])\n\n\t})\n}", "title": "" }, { "docid": "3740ef2bf6a6d2251dd82f2cf0c7ae38", "score": "0.45724115", "text": "func InstrumentingMiddleware(requestCount metrics.Counter, requestLatency metrics.Histogram, accountServiceCircuit metrics.Gauge) Middleware {\n\treturn func(next Service) Service {\n\t\treturn &instrumentingMiddleware{\n\t\t\trequestCount,\n\t\t\trequestLatency,\n\t\t\taccountServiceCircuit,\n\t\t\tnext,\n\t\t}\n\t}\n}", "title": "" }, { "docid": "2b57a01d74791b9e0d68f0996f47b422", "score": "0.45679405", "text": "func GinWrapper(l esl.Logger) gin.HandlerFunc {\n\treturn func(g *gin.Context) {\n\t\tpath := g.Request.URL.Path\n\t\tquery := g.Request.URL.RawQuery\n\n\t\tll := l.With(esl.String(\"path\", path), esl.String(\"query\", query))\n\n\t\tstart := time.Now()\n\t\tg.Next()\n\t\tend := time.Now()\n\t\tlatency := end.Sub(start)\n\n\t\tswitch {\n\t\tcase 0 < len(g.Errors):\n\t\t\tfor _, err := range g.Errors.Errors() {\n\t\t\t\tll.Debug(\"error\", esl.String(\"error\", err))\n\t\t\t}\n\t\tdefault:\n\t\t\tll.Debug(\n\t\t\t\tg.Request.Method,\n\t\t\t\tesl.Int(\"status\", g.Writer.Status()),\n\t\t\t\tesl.String(\"ip\", g.ClientIP()),\n\t\t\t\tesl.String(\"user_agent\", g.Request.UserAgent()),\n\t\t\t\tesl.String(\"time\", end.Format(time.RFC3339)),\n\t\t\t\tesl.String(\"latency\", latency.String()),\n\t\t\t)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "b84d8652366bcba35f214492f1fc2e6d", "score": "0.4565288", "text": "func (r *RequestStats) AddRequest(statusCode uint16, latency float64, staticTags uint64, dynamicTags []string) {\n\tif !r.isValid(statusCode) {\n\t\treturn\n\t}\n\n\tstatusCode = r.NormalizeStatusCode(statusCode)\n\n\tstats, exists := r.Data[statusCode]\n\tif !exists {\n\t\tstats = &RequestStat{}\n\t\tr.Data[statusCode] = stats\n\t}\n\n\tstats.StaticTags |= staticTags\n\tif len(dynamicTags) != 0 {\n\t\tstats.DynamicTags = append(stats.DynamicTags, dynamicTags...)\n\t}\n\n\tstats.Count++\n\tif stats.Count == 1 {\n\t\t// We postpone the creation of histograms when we have only one latency sample\n\t\tstats.FirstLatencySample = latency\n\t\treturn\n\t}\n\n\tif stats.Latencies == nil {\n\t\tif err := stats.initSketch(); err != nil {\n\t\t\treturn\n\t\t}\n\n\t\t// Add the deferred latency sample\n\t\tif err := stats.Latencies.Add(stats.FirstLatencySample); err != nil {\n\t\t\tlog.Debugf(\"could not add request latency to ddsketch: %v\", err)\n\t\t}\n\t}\n\n\tif err := stats.Latencies.Add(latency); err != nil {\n\t\tlog.Debugf(\"could not add request latency to ddsketch: %v\", err)\n\t}\n}", "title": "" }, { "docid": "384c9e0b0eb8faad447ce2fab41db133", "score": "0.4559318", "text": "func mwAddContext(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tctx := context.WithValue(r.Context(), \"debugging\", \"itsdebuggingtime\")\n\t\tnext.ServeHTTP(w, r.WithContext(ctx))\n\t})\n}", "title": "" }, { "docid": "4f88a501b54dd8217cbf2e9331e9b069", "score": "0.45576626", "text": "func (p *Prometheus) Middleware(c *gin.Context) {\n\tp.reqInFlight.Inc()\n\tstart := time.Now()\n\n\tdefer func() {\n\t\tp.reqDuration.Observe(time.Since(start).Seconds())\n\t\tp.reqInFlight.Dec()\n\n\t\tstatus := c.Writer.Status()\n\t\tpanicErr := recover()\n\n\t\tif panicErr != nil {\n\t\t\tvar brokenPipe bool\n\t\t\tif ne, ok := panicErr.(*net.OpError); ok {\n\t\t\t\tif se, ok := ne.Err.(*os.SyscallError); ok {\n\t\t\t\t\ts := strings.ToLower(se.Error())\n\t\t\t\t\tif strings.Contains(s, \"broken pipe\") ||\n\t\t\t\t\t\tstrings.Contains(s, \"connection reset by peer\") {\n\t\t\t\t\t\tbrokenPipe = true\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif !brokenPipe {\n\t\t\t\tstatus = http.StatusInternalServerError\n\t\t\t}\n\t\t}\n\n\t\tp.reqTotal.WithLabelValues(strconv.Itoa(status)).Inc()\n\n\t\tif panicErr != nil {\n\t\t\tpanic(panicErr)\n\t\t}\n\t}()\n\n\tc.Next()\n}", "title": "" }, { "docid": "d878066406ce085c509be74b098991d2", "score": "0.45450494", "text": "func (t *RequestLatency) Observe() {\n\t(*t.histo).WithLabelValues().Observe(time.Now().Sub(t.start).Seconds())\n}", "title": "" }, { "docid": "cf1d9887c4f7dba74f71cbde4463f700", "score": "0.45406225", "text": "func requestLogger(logger log.Logger) func(next http.Handler) http.Handler {\n\treturn func(next http.Handler) http.Handler {\n\t\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t\tstart := time.Now()\n\n\t\t\tww := middleware.NewWrapResponseWriter(w, r.ProtoMajor)\n\t\t\tnext.ServeHTTP(ww, r)\n\n\t\t\tlevel.Debug(logger).Log(\n\t\t\t\t\"proto\", r.Proto,\n\t\t\t\t\"method\", r.Method,\n\t\t\t\t\"status\", ww.Status(),\n\t\t\t\t\"path\", r.URL.Path,\n\t\t\t\t\"duration\", time.Since(start),\n\t\t\t\t\"bytes\", ww.BytesWritten(),\n\t\t\t)\n\t\t})\n\t}\n}", "title": "" }, { "docid": "5a37cce014a3e8e4cb8b56424ad45952", "score": "0.4538902", "text": "func (c *routeCollector) Collect(client rpc.Client, ch chan<- channels.InfluxDBMeasurement, label string, measurement string) error {\n\titems, err := c.tableItems(client)\n\n\tif err != nil {\n\t\tfmt.Println(\"ERROR: \", err)\n\t\treturn err\n\t}\n\n\tfor _, s := range items.Tables {\n\n\t\ttagset := make(map[string]string)\n\t\ttagset[\"host\"] = label\n\t\ttagset[\"table\"] = s.Name\n\n\t\tfieldset := map[string]interface{}{\n\t\t\t\"totalRoutes\": uint64(s.TotalRoutes),\n\t\t\t\"activeRoutes\": uint64(s.ActiveRoutes),\n\t\t}\n\n\t\tch <- channels.InfluxDBMeasurement{Measurement: measurement, TagSet: tagset, FieldSet: fieldset, TimeStamp: time.Now()}\n\n\t\tfor _, p := range s.Protocols {\n\n\t\t\ttagset := make(map[string]string)\n\t\t\ttagset[\"host\"] = label\n\t\t\ttagset[\"table\"] = s.Name\n\t\t\ttagset[\"protocol\"] = p.Name\n\n\t\t\tfieldset := map[string]interface{}{\n\t\t\t\t\"protocolName\": p.Name,\n\t\t\t\t\"protocolRoutes\": uint64(p.Routes),\n\t\t\t\t\"protocolActiveRoutes\": uint64(p.ActiveRoutes),\n\t\t\t}\n\n\t\t\tch <- channels.InfluxDBMeasurement{Measurement: measurement, TagSet: tagset, FieldSet: fieldset, TimeStamp: time.Now()}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "31513f9dfb65855142090c7aa7c6d956", "score": "0.45388624", "text": "func Capture(logger kitlog.Logger) kithttp.RequestFunc {\n\tvar transactionInfoLogger = logging.Info(logger)\n\treturn func(ctx context.Context, r *http.Request) (nctx context.Context) {\n\t\tvar tid string\n\n\t\tif tid = r.Header.Get(HeaderWPATID); tid == \"\" {\n\t\t\ttid = genTID()\n\t\t}\n\n\t\tnctx = context.WithValue(ctx, ContextKeyRequestTID, tid)\n\n\t\tvar satClientID = \"N/A\"\n\n\t\t// retrieve satClientID from request context\n\t\tif auth, ok := bascule.FromContext(r.Context()); ok {\n\t\t\tsatClientID = auth.Token.Principal()\n\t\t}\n\n\t\tlogKVs := []interface{}{logging.MessageKey(), \"record\",\n\t\t\t\"request\", transactionRequest{\n\t\t\t\tAddress: r.RemoteAddr,\n\t\t\t\tPath: r.URL.Path,\n\t\t\t\tQuery: r.URL.RawQuery,\n\t\t\t\tMethod: r.Method,\n\t\t\t},\n\t\t\t\"tid\", tid,\n\t\t\t\"satClientID\", satClientID,\n\t\t}\n\n\t\tlogKVs, _ = candlelight.AppendTraceInfo(ctx, logKVs)\n\t\ttransactionInfoLogger := kitlog.WithPrefix(transactionInfoLogger, logKVs...)\n\t\treturn context.WithValue(nctx, ContextKeyTransactionInfoLogger, transactionInfoLogger)\n\t}\n}", "title": "" }, { "docid": "f52623f9b75437958965c5e80b465ee7", "score": "0.453725", "text": "func (mw *OtelMiddleware) MiddlewareFunc(h rest.HandlerFunc) rest.HandlerFunc {\n\tcfg := config{}\n\tvar tracer oteltrace.Tracer\n\n\tif os.Getenv(\"OTEL_EXPORTER_OTLP_ENDPOINT\") != \"\" {\n\t\tfor _, opt := range mw.Opts {\n\t\t\topt.apply(&cfg)\n\t\t}\n\t\tif cfg.TracerProvider == nil {\n\t\t\tcfg.TracerProvider = otel.GetTracerProvider()\n\t\t}\n\t\ttracer = cfg.TracerProvider.Tracer(\n\t\t\ttracerName,\n\t\t\toteltrace.WithInstrumentationVersion(SemVersion()),\n\t\t)\n\t\tif cfg.Propagators == nil {\n\t\t\tcfg.Propagators = otel.GetTextMapPropagator()\n\t\t}\n\t}\n\n\treturn func(w rest.ResponseWriter, r *rest.Request) {\n\t\tif os.Getenv(\"OTEL_EXPORTER_OTLP_ENDPOINT\") == \"\" {\n\t\t\th(w, r)\n\t\t}\n\t\trequest := r.Request\n\t\tsavedCtx := request.Context()\n\t\tdefer func() {\n\t\t\trequest = request.WithContext(savedCtx)\n\t\t\tr.Request = request\n\t\t}()\n\n\t\tGetTraceHeaderFromJaeger(request)\n\t\tctx := cfg.Propagators.Extract(savedCtx, propagation.HeaderCarrier(request.Header))\n\t\topts := []oteltrace.SpanStartOption{\n\t\t\toteltrace.WithAttributes(semconv.NetAttributesFromHTTPRequest(\"tcp\", request)...),\n\t\t\toteltrace.WithAttributes(semconv.EndUserAttributesFromHTTPRequest(request)...),\n\t\t\toteltrace.WithAttributes(semconv.HTTPServerAttributesFromHTTPRequest(mw.ServiceName, r.Request.RequestURI, request)...),\n\t\t\toteltrace.WithSpanKind(oteltrace.SpanKindServer),\n\t\t}\n\n\t\tspanName := defaultGetSpanName(r.RequestURI)\n\t\tif mw.Router != nil {\n\t\t\troute, _, findit, _ := mw.Router.FindRoute(r.Method, r.URL)\n\t\t\tif findit && route != nil {\n\t\t\t\tpaths := strings.Split(r.RequestURI, \"/\")\n\t\t\t\tpath := paths[0]\n\t\t\t\tfor _, v := range paths {\n\t\t\t\t\tif path == \"\" && v != \"\" {\n\t\t\t\t\t\tpath = v\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tspanName = fmt.Sprintf(\"%s%s\", path, strings.ReplaceAll(route.PathExp, \"#\", \":\"))\n\t\t\t}\n\t\t}\n\t\tctx, span := tracer.Start(ctx, spanName, opts...)\n\t\tdefer span.End()\n\n\t\tr.Request = request.WithContext(ctx)\n\n\t\t// serve the request to the next middleware\n\t\twriter := CreateTracerWriter(w, ctx, span, tracer)\n\t\tcfg.Propagators.Inject(ctx, propagation.HeaderCarrier(w.Header()))\n\n\t\th(writer, r)\n\n\t\tcode := writer.StatusCode\n\t\tif code == 0 {\n\t\t\tcode = 200\n\t\t}\n\t\tattrs := semconv.HTTPAttributesFromHTTPStatusCode(code)\n\t\tspanStatus, spanMessage := semconv.SpanStatusFromHTTPStatusCodeAndSpanKind(code, oteltrace.SpanKindServer)\n\t\tspan.SetAttributes(attrs...)\n\t\tspan.SetStatus(spanStatus, spanMessage)\n\t}\n}", "title": "" }, { "docid": "2c42cc0bd7cf84046a1fb13ff353dc00", "score": "0.45337158", "text": "func mwLogging(next CallFunc) CallFunc {\n\treturn func(c *Context) Renderer {\n\t\tc.Ctx.Trace(\"h.http.req.start\", \"Request start\",\n\t\t\tlog.String(\"method\", c.Req.Method),\n\t\t\tlog.String(\"path\", c.Req.URL.String()),\n\t\t\tlog.String(\"user_agent\", c.Req.Header.Get(\"User-Agent\")),\n\t\t)\n\n\t\tr := next(c)\n\n\t\tc.Ctx.Trace(\"h.http.req.end\", \"Request end\",\n\t\t\tlog.Int(\"status\", r.Status()),\n\t\t\tlog.Duration(\"duration\", time.Since(c.StartAt)),\n\t\t)\n\n\t\treturn r\n\t}\n}", "title": "" }, { "docid": "377cb04cebf3c1e169597b8699346d0d", "score": "0.4532049", "text": "func Monitor(next http.Handler) http.Handler {\n\tfn := func(w http.ResponseWriter, r *http.Request) {\n\t\tctx := r.Context()\n\n\t\tcid := r.Header.Get(HDR_CorrelationID)\n\t\tif cid == \"\" {\n\t\t\tcid = uuid.NewV4().String()\n\t\t}\n\n\t\trid := r.Header.Get(HDR_RequestID)\n\t\tif rid == \"\" {\n\t\t\trid = uuid.NewV4().String()\n\t\t}\n\n\t\tnext.ServeHTTP(w, r.WithContext(monitoring.WithMonitoringContext(ctx, cid, rid)))\n\t}\n\treturn http.HandlerFunc(fn)\n}", "title": "" }, { "docid": "ca248a87bf466785a7899f250d92dbdc", "score": "0.4525232", "text": "func requestLogger(f LogFormatter) fiber.Handler {\n\treturn func(ctx *fiber.Ctx) error {\n\n\t\tentry := f.NewLogEntry(ctx)\n\t\tctx.Locals(LogEntryCtxKey, entry)\n\n\t\tt1 := time.Now()\n\t\tdefer func() {\n\t\t\tentry.Write(ctx.Response().StatusCode(), time.Since(t1))\n\t\t}()\n\n\t\treturn ctx.Next()\n\t}\n}", "title": "" }, { "docid": "4cd0e03d83026c775f18ff147dc9dc53", "score": "0.45239264", "text": "func (g *Gateway) collectionHandler(c *gin.Context) {\n\tthreadID, err := thread.Decode(c.Param(\"thread\"))\n\tif err != nil {\n\t\trenderError(c, http.StatusBadRequest, fmt.Errorf(\"invalid thread ID\"))\n\t\treturn\n\t}\n\tg.renderCollection(c, threadID, c.Param(\"collection\"))\n}", "title": "" }, { "docid": "acd1123226191ac8bbe7b672283a57a6", "score": "0.4523851", "text": "func RequestLogger(handler http.HandlerFunc) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\trw := &MyResponseWriter{ResponseWriter: w}\n\t\tstart := time.Now()\n\t\thandler.ServeHTTP(rw, r)\n\t\tlogger.Info(\"%s %s %d %s\", r.Method, r.RequestURI, rw.StatusCode(), time.Since(start))\n\t})\n}", "title": "" }, { "docid": "e62cd89252970c05d6f0f41fdf61c90f", "score": "0.45220616", "text": "func counter(w http.ResponseWriter, r *http.Request) {\n\thit() // Increment 'total hits' metric\n\tmu.Lock()\n\tfmt.Fprintf(w, \"Count: %d\\n\", count)\n\tmu.Unlock()\n\tstats.Incr(\"counter.pageview.count\", 1) // Metric to record hits per cycle for this handler\n}", "title": "" }, { "docid": "1f5b8038cd9bf49eb5eceef0354e7115", "score": "0.45210862", "text": "func (e *Endpoint) Collect(ctx context.Context, acc telegraf.Accumulator) error {\n\t// Connection could have failed on init, so we need to check for a deferred\n\t// init request.\n\tif !e.initialized {\n\t\te.log.Debug(\"Performing deferred init\")\n\t\terr := e.init(ctx)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\t// If we never managed to do a discovery, collection will be a no-op. Therefore,\n\t// we need to check that a connection is available, or the collection will\n\t// silently fail.\n\tif _, err := e.clientFactory.GetClient(ctx); err != nil {\n\t\treturn err\n\t}\n\n\te.collectMux.RLock()\n\tdefer e.collectMux.RUnlock()\n\n\tif ctx.Err() != nil {\n\t\treturn ctx.Err()\n\t}\n\n\t// If discovery interval is disabled (0), discover on each collection cycle\n\tif time.Duration(e.Parent.ObjectDiscoveryInterval) == 0 {\n\t\terr := e.discover(ctx)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tvar wg sync.WaitGroup\n\tfor k, res := range e.resourceKinds {\n\t\tif res.enabled {\n\t\t\twg.Add(1)\n\t\t\tgo func(k string) {\n\t\t\t\tdefer wg.Done()\n\t\t\t\tvar err error\n\t\t\t\tif k == \"vsan\" {\n\t\t\t\t\terr = e.collectVsan(ctx, acc)\n\t\t\t\t} else {\n\t\t\t\t\terr = e.collectResource(ctx, k, acc)\n\t\t\t\t}\n\t\t\t\tif err != nil {\n\t\t\t\t\tacc.AddError(err)\n\t\t\t\t}\n\t\t\t}(k)\n\t\t}\n\t}\n\twg.Wait()\n\n\t// Purge old timestamps from the cache\n\te.hwMarks.Purge()\n\treturn nil\n}", "title": "" }, { "docid": "f9604b1200f1f4145f802a52e69a58e4", "score": "0.45172548", "text": "func Tracing() Middleware {\n\treturn func(handler http.HandlerFunc) http.HandlerFunc {\n\t\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\t\tfmt.Printf(\"Tracing request for %s\\n\", r.RequestURI)\n\t\t\thandler(w, r)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "3af102863125ecd91583b234106bed3d", "score": "0.45138875", "text": "func Record(next http.HandlerFunc) http.HandlerFunc {\n\treturn http.HandlerFunc(func(res http.ResponseWriter, req *http.Request) {\n\t\tgo analytics.Record(req)\n\n\t\tnext.ServeHTTP(res, req)\n\t})\n}", "title": "" } ]
af29fbd458ffcae57611e5efd961c627
SimVarNavActiveFrequency Simvar args contain optional index and/or unit
[ { "docid": "ca65121a196957b3350961e57d11f3b8", "score": "0.7636919", "text": "func SimVarNavActiveFrequency(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"MHz\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"NAV ACTIVE FREQUENCY:index\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" } ]
[ { "docid": "6cdf2aae98417fe604e1054ce43298f2", "score": "0.66517645", "text": "func SimVarAdfActiveFrequency(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Frequency ADF BCD32\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"ADF ACTIVE FREQUENCY:index\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "1a3e4511de3b7ceb62ce4a7729bd2047", "score": "0.6643549", "text": "func SimVarNavStandbyFrequency(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"MHz\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"NAV STANDBY FREQUENCY:index\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "860ac5f6258708afaaf7a5c58c559f5f", "score": "0.6461366", "text": "func SimVarAdfFrequency(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Frequency BCD16\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"ADF FREQUENCY:index\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "6b13db37dbebaf08cff61952ed96f52d", "score": "0.6212341", "text": "func SimVarComActiveFrequency(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Frequency BCD16\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"COM ACTIVE FREQUENCY:index\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "0469c96d0a31e0d6b55f4a89e7be9a7a", "score": "0.61469036", "text": "func SimVarAdfExtFrequency(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Frequency BCD16\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"ADF EXT FREQUENCY:index\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "eff49ef6c9d5051001b67f7e51fb7462", "score": "0.5836831", "text": "func SimVarAdfStandbyFrequency(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Hz\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"ADF STANDBY FREQUENCY:index\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "1969f4cbf9dd49b8bc2df5c90b9e6b14", "score": "0.5622624", "text": "func playFreq(freq int) {\n\n}", "title": "" }, { "docid": "59eb753c9fdc7cf233a88fda6080cfb5", "score": "0.55183935", "text": "func SimVarComStandbyFrequency(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Frequency BCD16\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"COM STANDBY FREQUENCY:index\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "a30303ee069b1bfa7e7ca5dd7c2b8f78", "score": "0.5269633", "text": "func SimVarAdfSignal(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Number\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"ADF SIGNAL:index\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "43dfca8f98aceaa141c9776074e6fd0c", "score": "0.51159406", "text": "func SimVarNavSignal(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Number\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"NAV SIGNAL:index\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "6c30583e544bb3d7c68b5498e603df92", "score": "0.5065551", "text": "func SimVarNavSound(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Bool\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"NAV SOUND:index\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "c4e9b2349ffc785a2b2b17669e248a33", "score": "0.503263", "text": "func parallelFreq(input string, outlet chan FreqMap) {\n\toutlet <- Frequency(input)\n}", "title": "" }, { "docid": "11cf95d703ccb67875c413b7be6a38a1", "score": "0.50075483", "text": "func (r ApiSimilarityIndexRequest) Freq(freq string) ApiSimilarityIndexRequest {\n\tr.freq = &freq\n\treturn r\n}", "title": "" }, { "docid": "7d03daaaa1790ba2f988c03de675ccb6", "score": "0.49690077", "text": "func SimVarNavMagvar(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Degrees\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"NAV MAGVAR:index\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "796dcde1f334e96ae4da18a203f1cdbe", "score": "0.49457824", "text": "func SimVarAutothrottleActive(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Bool\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"AUTOTHROTTLE ACTIVE\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "c8ebfb07bbb182c43b3094ad5d22ac5c", "score": "0.48695832", "text": "func function_ua_namespace0_88_begin(server []UA_Server, ns []UA_UInt16) UA_StatusCode {\n\tvar retVal UA_StatusCode\n\tvar attr UA_VariableAttributes = UA_VariableAttributes_default\n\tattr.minimumSamplingInterval = UA_Double((0))\n\tattr.userAccessLevel = UA_Byte(1)\n\tattr.accessLevel = UA_Byte(1)\n\tattr.valueRank = UA_Int32((int32_t((__int32_t((-1))))))\n\tattr.dataType = UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 12)\n\tvar variablenode_ns_0_i_7650_variant_DataContents []UA_String = UA_String_new()\n\tvariablenode_ns_0_i_7650_variant_DataContents[0] = UA_String_fromChars([]byte(\"Argument\\x00\"))\n\tUA_Variant_setScalar((*[100000000]UA_Variant)(unsafe.Pointer(&attr.value))[:], variablenode_ns_0_i_7650_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[11]))[:])\n\tattr.displayName = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"Argument\\x00\"))\n\tattr.description = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"\\x00\"))\n\tattr.writeMask = 0\n\tattr.userWriteMask = 0\n\tretVal |= UA_Server_addNode_begin(server, UA_NODECLASS_VARIABLE, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 7650), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_QUALIFIEDNAME(UA_UInt16(ns[0]), []byte(\"Argument\\x00\")), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 69), (*[100000000]UA_VariableAttributes)(unsafe.Pointer(&attr))[:], (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[35]))[:], nil, nil)\n\tUA_String_delete(variablenode_ns_0_i_7650_variant_DataContents)\n\tretVal |= UA_Server_addReference(server, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 7650), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 47), UA_EXPANDEDNODEID_NUMERIC(UA_UInt16(ns[0]), 7617), 0)\n\treturn UA_StatusCode(retVal)\n}", "title": "" }, { "docid": "5f028045833c73bf0d0d92ca13140d92", "score": "0.4818889", "text": "func function_ua_namespace0_51_begin(server []UA_Server, ns []UA_UInt16) UA_StatusCode {\n\tvar retVal UA_StatusCode\n\tvar attr UA_VariableAttributes = UA_VariableAttributes_default\n\tattr.minimumSamplingInterval = UA_Double((0))\n\tattr.userAccessLevel = UA_Byte(1)\n\tattr.accessLevel = UA_Byte(1)\n\tattr.valueRank = UA_Int32((int32_t((__int32_t((-1))))))\n\tattr.dataType = UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 290)\n\tvar variablenode_ns_0_i_2272_variant_DataContents []UA_Double = make([]UA_Double, 1)\n\tUA_init(variablenode_ns_0_i_2272_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[10]))[:])\n\tUA_Variant_setScalar((*[100000000]UA_Variant)(unsafe.Pointer(&attr.value))[:], variablenode_ns_0_i_2272_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[10]))[:])\n\tattr.displayName = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"MinSupportedSampleRate\\x00\"))\n\tattr.description = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"The minimum sampling interval supported by the server.\\x00\"))\n\tattr.writeMask = 0\n\tattr.userWriteMask = 0\n\tretVal |= UA_Server_addNode_begin(server, UA_NODECLASS_VARIABLE, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 2272), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_QUALIFIEDNAME(UA_UInt16(ns[0]), []byte(\"MinSupportedSampleRate\\x00\")), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 68), (*[100000000]UA_VariableAttributes)(unsafe.Pointer(&attr))[:], (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[35]))[:], nil, nil)\n\tretVal |= UA_Server_addReference(server, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 2272), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 46), UA_EXPANDEDNODEID_NUMERIC(UA_UInt16(ns[0]), 2268), 0)\n\treturn UA_StatusCode(retVal)\n}", "title": "" }, { "docid": "cc761506101fe88660456c26add8c919", "score": "0.47816858", "text": "func (d *AD9910) Frequency() float64 {\n\tif d.CFR1.RAMEnabled() && d.CFR1.RAMDest() == ad9910.RAMDestFrequency {\n\t\tpanic(\"frequency is controlled by RAM\")\n\t}\n\tif d.CFR2.RampEnabled() && d.CFR2.RampDest() == ad9910.RampDestFrequency {\n\t\tpanic(\"frequency is controlled by ramp\")\n\t}\n\t// parallal data port controls frequency\n\n\tif d.CFR1.RAMEnabled() {\n\t\treturn FTWToFrequency(d.FTW.FreqTuningWord(), d.SysClock())\n\t}\n\treturn FTWToFrequency(d.STProfile0.FreqTuningWord(), d.SysClock())\n}", "title": "" }, { "docid": "46224336c3fde11820b9272da9cc0982", "score": "0.4761911", "text": "func SimVarNavLocalizer(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Degrees\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"NAV LOCALIZER:index\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "a074c304bb48741f44f37bbf1f168ca2", "score": "0.47420514", "text": "func SimVarEngOnFire(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Bool\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"ENG ON FIRE:index\",\n\t\tUnit: unit,\n\t\tSettable: true,\n\t}\n}", "title": "" }, { "docid": "8e366013f53ca3a183d55df211d82291", "score": "0.47219592", "text": "func SimVarAdfSound(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Bool\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"ADF SOUND:index\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "b0e066761b047cf497b1daa23e807c45", "score": "0.4686838", "text": "func SimVarGeneralEngGeneratorActive(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Bool\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"GENERAL ENG GENERATOR ACTIVE:index\",\n\t\tUnit: unit,\n\t\tSettable: true,\n\t}\n}", "title": "" }, { "docid": "772244592afe1f8114a69c7c0f3e1cac", "score": "0.46673805", "text": "func _AdminUpdateFrequencyNoOp() {\n\tvar x [1]struct{}\n\t_ = x[AdminFrequencyPoll-(1)]\n\t_ = x[AdminFrequencyDaily-(2)]\n\t_ = x[AdminFrequencyWeekly-(4)]\n\t_ = x[AdminFrequencyMonthly-(8)]\n\t_ = x[AdminFrequencyQuarterly-(16)]\n\t_ = x[AdminFrequencyAnually-(32)]\n\t_ = x[AdminFrequencyAutomatic-(64)]\n}", "title": "" }, { "docid": "bedb6d43d0f916df835ddc126e8135ad", "score": "0.46506366", "text": "func SimVarNavObs(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Degrees\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"NAV OBS:index\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "9fed600b589a21c67943129e95d73630", "score": "0.46469432", "text": "func (f FrequencyTable) Frequency(token string) float64 {\n\tif f.totalOccurrences == 0 {\n\t\treturn 0.0\n\t}\n\n\treturn float64(f.occurrences[strings.ToLower(token)]) / float64(f.totalOccurrences)\n}", "title": "" }, { "docid": "fdfd01b096bac728599970f7b18b14f2", "score": "0.46275795", "text": "func SimVarAirspeedTrueCalibrate(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Degrees\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"AIRSPEED TRUE CALIBRATE\",\n\t\tUnit: unit,\n\t\tSettable: true,\n\t}\n}", "title": "" }, { "docid": "93e13ec633c7f513c20d5faeb1ced2b6", "score": "0.4610825", "text": "func SimVarNavDmespeed(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Knots\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"NAV DMESPEED:index\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "f7dc81a0b77b13576b17dd46bbf78b9e", "score": "0.46069002", "text": "func stopFreq() {\n\n}", "title": "" }, { "docid": "fe2d87ebc712980a22d2f0811fb0b837", "score": "0.46054602", "text": "func SimVarPropAutoFeatherArmed(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Bool\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"PROP AUTO FEATHER ARMED:index\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "9b5c895c0cde33ff0f69d053c8919e0e", "score": "0.45574927", "text": "func (o GetEcsInvocationsInvocationOutput) Frequency() pulumi.StringOutput {\n\treturn o.ApplyT(func(v GetEcsInvocationsInvocation) string { return v.Frequency }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "8badf1695c5234528e2f12b8e233f9de", "score": "0.4539924", "text": "func SimVarAutopilotFlightDirectorActive(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Bool\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"AUTOPILOT FLIGHT DIRECTOR ACTIVE\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "efe86e121740819c8be10f8977e65cdf", "score": "0.45397824", "text": "func (d *AD9910) SetFrequency(x float64) {\n\tftw := FrequencyToFTW(x, d.SysClock())\n\n\tif d.CFR1.RAMEnabled() && d.CFR1.RAMDest() == ad9910.RAMDestFrequency {\n\t\td.CFR1.SetRAMEnabled(false)\n\t}\n\tif d.CFR2.RampEnabled() && d.CFR2.RampDest() == ad9910.RampDestFrequency {\n\t\td.CFR2.SetRampEnabled(false)\n\t}\n\n\tif !d.CFR1.RAMEnabled() {\n\t\td.STProfile0.SetFreqTuningWord(ftw)\n\t}\n\td.FTW.SetFreqTuningWord(ftw)\n}", "title": "" }, { "docid": "288163d687bfce70e3ab225fca2dbbbe", "score": "0.45248753", "text": "func function_ua_namespace0_116_begin(server []UA_Server, ns []UA_UInt16) UA_StatusCode {\n\tvar retVal UA_StatusCode\n\tvar attr UA_VariableAttributes = UA_VariableAttributes_default\n\tattr.minimumSamplingInterval = UA_Double((0))\n\tattr.userAccessLevel = UA_Byte(1)\n\tattr.accessLevel = UA_Byte(1)\n\tattr.valueRank = UA_Int32((int32_t((__int32_t((-1))))))\n\tattr.dataType = UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 7)\n\tvar variablenode_ns_0_i_2285_variant_DataContents []UA_UInt32 = make([]UA_UInt32, 1)\n\tUA_init(variablenode_ns_0_i_2285_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[6]))[:])\n\tUA_Variant_setScalar((*[100000000]UA_Variant)(unsafe.Pointer(&attr.value))[:], variablenode_ns_0_i_2285_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[6]))[:])\n\tattr.displayName = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"CurrentSubscriptionCount\\x00\"))\n\tattr.description = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"\\x00\"))\n\tattr.writeMask = 0\n\tattr.userWriteMask = 0\n\tretVal |= UA_Server_addNode_begin(server, UA_NODECLASS_VARIABLE, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 2285), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_QUALIFIEDNAME(UA_UInt16(ns[0]), []byte(\"CurrentSubscriptionCount\\x00\")), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 63), (*[100000000]UA_VariableAttributes)(unsafe.Pointer(&attr))[:], (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[35]))[:], nil, nil)\n\tretVal |= UA_Server_addReference(server, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 2285), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 47), UA_EXPANDEDNODEID_NUMERIC(UA_UInt16(ns[0]), 2275), 0)\n\treturn UA_StatusCode(retVal)\n}", "title": "" }, { "docid": "30952b85702ee1d019280258b081b425", "score": "0.45068508", "text": "func SimVarEngVibration(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Number\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"ENG VIBRATION:index\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "d6be441806fe3927503109e50ce9329e", "score": "0.4502194", "text": "func function_ua_namespace0_123_begin(server []UA_Server, ns []UA_UInt16) UA_StatusCode {\n\tvar retVal UA_StatusCode\n\tvar attr UA_VariableAttributes = UA_VariableAttributes_default\n\tattr.minimumSamplingInterval = UA_Double((0))\n\tattr.userAccessLevel = UA_Byte(1)\n\tattr.accessLevel = UA_Byte(1)\n\tattr.valueRank = UA_Int32((int32_t((__int32_t((-1))))))\n\tattr.dataType = UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 7)\n\tvar variablenode_ns_0_i_2277_variant_DataContents []UA_UInt32 = make([]UA_UInt32, 1)\n\tUA_init(variablenode_ns_0_i_2277_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[6]))[:])\n\tUA_Variant_setScalar((*[100000000]UA_Variant)(unsafe.Pointer(&attr.value))[:], variablenode_ns_0_i_2277_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[6]))[:])\n\tattr.displayName = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"CurrentSessionCount\\x00\"))\n\tattr.description = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"\\x00\"))\n\tattr.writeMask = 0\n\tattr.userWriteMask = 0\n\tretVal |= UA_Server_addNode_begin(server, UA_NODECLASS_VARIABLE, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 2277), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_QUALIFIEDNAME(UA_UInt16(ns[0]), []byte(\"CurrentSessionCount\\x00\")), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 63), (*[100000000]UA_VariableAttributes)(unsafe.Pointer(&attr))[:], (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[35]))[:], nil, nil)\n\tretVal |= UA_Server_addReference(server, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 2277), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 47), UA_EXPANDEDNODEID_NUMERIC(UA_UInt16(ns[0]), 2275), 0)\n\treturn UA_StatusCode(retVal)\n}", "title": "" }, { "docid": "dde768f1b1aa6c350df2d0e5d13c4562", "score": "0.44965595", "text": "func SimVarFlapsHandleIndex(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Number\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"FLAPS HANDLE INDEX\",\n\t\tUnit: unit,\n\t\tSettable: true,\n\t}\n}", "title": "" }, { "docid": "4f8862ad940b2582ec66d7ff1a7f7a7f", "score": "0.4495253", "text": "func SimVarApuGeneratorActive(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Bool\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"APU GENERATOR ACTIVE\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "2082fd9f23c1b19d6164edf4b9b9162b", "score": "0.44946414", "text": "func function_ua_namespace0_16_begin(server []UA_Server, ns []UA_UInt16) UA_StatusCode {\n\tvar retVal UA_StatusCode\n\tvar attr UA_VariableAttributes = UA_VariableAttributes_default\n\tattr.minimumSamplingInterval = UA_Double((0))\n\tattr.userAccessLevel = UA_Byte(1)\n\tattr.accessLevel = UA_Byte(1)\n\tattr.valueRank = UA_Int32((int32_t((__int32_t((-1))))))\n\tattr.dataType = UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 7)\n\tvar variablenode_ns_0_i_2159_variant_DataContents []UA_UInt32 = make([]UA_UInt32, 1)\n\tUA_init(variablenode_ns_0_i_2159_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[6]))[:])\n\tUA_Variant_setScalar((*[100000000]UA_Variant)(unsafe.Pointer(&attr.value))[:], variablenode_ns_0_i_2159_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[6]))[:])\n\tattr.displayName = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"PublishingIntervalCount\\x00\"))\n\tattr.description = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"\\x00\"))\n\tattr.writeMask = 0\n\tattr.userWriteMask = 0\n\tretVal |= UA_Server_addNode_begin(server, UA_NODECLASS_VARIABLE, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 2159), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_QUALIFIEDNAME(UA_UInt16(ns[0]), []byte(\"PublishingIntervalCount\\x00\")), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 63), (*[100000000]UA_VariableAttributes)(unsafe.Pointer(&attr))[:], (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[35]))[:], nil, nil)\n\tretVal |= UA_Server_addReference(server, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 2159), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 47), UA_EXPANDEDNODEID_NUMERIC(UA_UInt16(ns[0]), 2150), 0)\n\treturn UA_StatusCode(retVal)\n}", "title": "" }, { "docid": "19f2f9187aaf54c3ccb261c7fc25f393", "score": "0.44921726", "text": "func SimVarNavIdent(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"String\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"NAV IDENT\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "58dd36c4148700ab7263641de9e4a70f", "score": "0.4486345", "text": "func SimVarAdfIdent(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"String\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"ADF IDENT\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "c6f7a340d9631d7850f7829a2f7c9f52", "score": "0.44751304", "text": "func SimVarTurbEngVibration(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Number\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"TURB ENG VIBRATION:index\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "c429bc0b0d5c6a03c47dd562759122d4", "score": "0.44660532", "text": "func SimVarApuVolts(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Volts\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"APU VOLTS\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "5707da71551a560788c3ae0115efba17", "score": "0.44629967", "text": "func SimVarNavGsi(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Number\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"NAV GSI:index\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "53cd24ef1d8bedf17980da87b2d26932", "score": "0.44581252", "text": "func (sm *Simulation) plotFreq(t []float64, y []complex128, cfg *Analysis) {\n\tw := bufio.NewWriter(sm.PlotFile)\n\tdefer w.Flush()\n\n\tfmt.Fprintf(w, \"set terminal postscript eps enhanced color solid\\n\")\n\tfmt.Fprintf(w, \"set output '%s'\\n\", cfg.File)\n\tfmt.Fprintf(w, \"set multiplot layout 2, 1 title 'Frequency response'\\n\")\n\tfmt.Fprintf(w, \"set title 'Magnitude'\\n\")\n\tfmt.Fprintf(w, \"set xlabel 'Frequency (Hz)'\\n\")\n\tfmt.Fprintf(w, \"set ylabel 'Gain (dB)'\\n\")\n\tfmt.Fprintf(w, \"set log x\\n\")\n\tfmt.Fprintf(w, \"plot '-' title '' with line\\n\")\n\n\t// plot magnitude response\n\t// 20*log10(|H|)\n\tfor i := range t {\n\t\tfmt.Fprintf(w, \"%v %v\\n\", t[i], 20*math.Log10(cmplx.Abs(y[i])))\n\t}\n\n\tfmt.Fprintf(w, \"e\\n\")\n\tfmt.Fprintf(w, \"set title 'Phase'\\n\")\n\tfmt.Fprintf(w, \"set xlabel 'Frequency (Hz)'\\n\")\n\tfmt.Fprintf(w, \"set ylabel 'Argument (Degree)'\\n\")\n\tfmt.Fprintf(w, \"set yrange [-180:180]\\n\")\n\tfmt.Fprintf(w, \"plot '-' title '' with line\\n\")\n\n\t// plot phase response\n\t// degrees(arg(H))\n\tfor i := range t {\n\t\tfmt.Fprintf(w, \"%v %v\\n\", t[i], rad2deg(cmplx.Phase(y[i])))\n\t}\n\n\tfmt.Fprintf(w, \"e\\n\")\n\tfmt.Fprintf(w, \"unset multiplot\\n\")\n\tfmt.Fprintf(w, \"set yrange [*:*]\\n\")\n\tfmt.Fprintf(w, \"unset log\\n\")\n}", "title": "" }, { "docid": "5a51e23839d00ef28737e7201f6f0836", "score": "0.44470954", "text": "func function_ua_namespace0_27_begin(server []UA_Server, ns []UA_UInt16) UA_StatusCode {\n\tvar retVal UA_StatusCode\n\tvar attr UA_VariableAttributes = UA_VariableAttributes_default\n\tattr.minimumSamplingInterval = UA_Double((0))\n\tattr.userAccessLevel = UA_Byte(1)\n\tattr.accessLevel = UA_Byte(1)\n\tattr.valueRank = UA_Int32((int32_t((__int32_t((-1))))))\n\tattr.dataType = UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 7)\n\tvar variablenode_ns_0_i_2160_variant_DataContents []UA_UInt32 = make([]UA_UInt32, 1)\n\tUA_init(variablenode_ns_0_i_2160_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[6]))[:])\n\tUA_Variant_setScalar((*[100000000]UA_Variant)(unsafe.Pointer(&attr.value))[:], variablenode_ns_0_i_2160_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[6]))[:])\n\tattr.displayName = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"CurrentSubscriptionCount\\x00\"))\n\tattr.description = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"\\x00\"))\n\tattr.writeMask = 0\n\tattr.userWriteMask = 0\n\tretVal |= UA_Server_addNode_begin(server, UA_NODECLASS_VARIABLE, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 2160), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_QUALIFIEDNAME(UA_UInt16(ns[0]), []byte(\"CurrentSubscriptionCount\\x00\")), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 63), (*[100000000]UA_VariableAttributes)(unsafe.Pointer(&attr))[:], (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[35]))[:], nil, nil)\n\tretVal |= UA_Server_addReference(server, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 2160), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 47), UA_EXPANDEDNODEID_NUMERIC(UA_UInt16(ns[0]), 2150), 0)\n\treturn UA_StatusCode(retVal)\n}", "title": "" }, { "docid": "278b041e14d80b1fc774d94050770b8a", "score": "0.44384196", "text": "func SimVarHsiSpeed(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Knots\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"HSI SPEED\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "ebe05ac2adadaeccb0ae5525f220da22", "score": "0.44351378", "text": "func SimVarVariometerRate(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Feet per second\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"VARIOMETER RATE\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "b75ae8ff182edc61de45a1120b2c0a52", "score": "0.44238278", "text": "func TestFrequencyQueries1(t *testing.T) {\n\tqueries := [][]int32{\n\t\t[]int32{1, 5},\n\t\t[]int32{1, 6},\n\t\t[]int32{3, 2},\n\t\t[]int32{1, 10},\n\t\t[]int32{1, 10},\n\t\t[]int32{1, 6},\n\t\t[]int32{2, 5},\n\t\t[]int32{3, 2},\n\t}\n\n\tfreqQuery(queries)\n}", "title": "" }, { "docid": "e374949e6bb06781767ed515f7348510", "score": "0.44107553", "text": "func function_ua_namespace0_23_begin(server []UA_Server, ns []UA_UInt16) UA_StatusCode {\n\tvar retVal UA_StatusCode\n\tvar attr UA_VariableAttributes = UA_VariableAttributes_default\n\tattr.minimumSamplingInterval = UA_Double((0))\n\tattr.userAccessLevel = UA_Byte(1)\n\tattr.accessLevel = UA_Byte(1)\n\tattr.valueRank = UA_Int32((int32_t((__int32_t((-1))))))\n\tattr.dataType = UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 7)\n\tvar variablenode_ns_0_i_2152_variant_DataContents []UA_UInt32 = make([]UA_UInt32, 1)\n\tUA_init(variablenode_ns_0_i_2152_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[6]))[:])\n\tUA_Variant_setScalar((*[100000000]UA_Variant)(unsafe.Pointer(&attr.value))[:], variablenode_ns_0_i_2152_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[6]))[:])\n\tattr.displayName = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"CurrentSessionCount\\x00\"))\n\tattr.description = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"\\x00\"))\n\tattr.writeMask = 0\n\tattr.userWriteMask = 0\n\tretVal |= UA_Server_addNode_begin(server, UA_NODECLASS_VARIABLE, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 2152), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_QUALIFIEDNAME(UA_UInt16(ns[0]), []byte(\"CurrentSessionCount\\x00\")), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 63), (*[100000000]UA_VariableAttributes)(unsafe.Pointer(&attr))[:], (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[35]))[:], nil, nil)\n\tretVal |= UA_Server_addReference(server, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 2152), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 47), UA_EXPANDEDNODEID_NUMERIC(UA_UInt16(ns[0]), 2150), 0)\n\treturn UA_StatusCode(retVal)\n}", "title": "" }, { "docid": "99cf2a7eb0d8eb3662ad8eb55dbee183", "score": "0.44025314", "text": "func (rb *DatafeedConfigBuilder) Frequency(frequency *DurationBuilder) *DatafeedConfigBuilder {\n\tv := frequency.Build()\n\trb.v.Frequency = &v\n\treturn rb\n}", "title": "" }, { "docid": "7def117b0a9a68450fc1257ae2443416", "score": "0.4395156", "text": "func (r ApiCompanyEpsEstimatesRequest) Freq(freq string) ApiCompanyEpsEstimatesRequest {\n\tr.freq = &freq\n\treturn r\n}", "title": "" }, { "docid": "1e07820c4b36ec84a8876740c0346b32", "score": "0.4389265", "text": "func function_ua_namespace0_115_begin(server []UA_Server, ns []UA_UInt16) UA_StatusCode {\n\tvar retVal UA_StatusCode\n\tvar attr UA_VariableAttributes = UA_VariableAttributes_default\n\tattr.minimumSamplingInterval = UA_Double((0))\n\tattr.userAccessLevel = UA_Byte(1)\n\tattr.accessLevel = UA_Byte(1)\n\tattr.valueRank = UA_Int32((int32_t((__int32_t((-1))))))\n\tattr.dataType = UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 7)\n\tvar variablenode_ns_0_i_2286_variant_DataContents []UA_UInt32 = make([]UA_UInt32, 1)\n\tUA_init(variablenode_ns_0_i_2286_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[6]))[:])\n\tUA_Variant_setScalar((*[100000000]UA_Variant)(unsafe.Pointer(&attr.value))[:], variablenode_ns_0_i_2286_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[6]))[:])\n\tattr.displayName = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"CumulatedSubscriptionCount\\x00\"))\n\tattr.description = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"\\x00\"))\n\tattr.writeMask = 0\n\tattr.userWriteMask = 0\n\tretVal |= UA_Server_addNode_begin(server, UA_NODECLASS_VARIABLE, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 2286), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_QUALIFIEDNAME(UA_UInt16(ns[0]), []byte(\"CumulatedSubscriptionCount\\x00\")), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 63), (*[100000000]UA_VariableAttributes)(unsafe.Pointer(&attr))[:], (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[35]))[:], nil, nil)\n\tretVal |= UA_Server_addReference(server, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 2286), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 47), UA_EXPANDEDNODEID_NUMERIC(UA_UInt16(ns[0]), 2275), 0)\n\treturn UA_StatusCode(retVal)\n}", "title": "" }, { "docid": "14b22613afb0e3572dc7e1f982849684", "score": "0.4382816", "text": "func SimVarNavCdi(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Number\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"NAV CDI:index\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "ddb9adf6862f2ee6f404e8f25ef91246", "score": "0.43749544", "text": "func SimVarNumFuelSelectors(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Number\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"NUM FUEL SELECTORS\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "e14c72ff2328d538e5231d2bafc78290", "score": "0.4369872", "text": "func function_ua_namespace0_99_begin(server []UA_Server, ns []UA_UInt16) UA_StatusCode {\n\tvar retVal UA_StatusCode\n\tvar attr UA_VariableAttributes = UA_VariableAttributes_default\n\tattr.minimumSamplingInterval = UA_Double((1000))\n\tattr.userAccessLevel = UA_Byte(1)\n\tattr.accessLevel = UA_Byte(1)\n\tattr.valueRank = UA_Int32((int32_t((__int32_t((-1))))))\n\tattr.dataType = UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 12)\n\tvar variablenode_ns_0_i_2264_variant_DataContents []UA_String = make([]UA_String, 1)\n\tUA_init(variablenode_ns_0_i_2264_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[11]))[:])\n\tUA_Variant_setScalar((*[100000000]UA_Variant)(unsafe.Pointer(&attr.value))[:], variablenode_ns_0_i_2264_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[11]))[:])\n\tattr.displayName = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"SoftwareVersion\\x00\"))\n\tattr.description = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"\\x00\"))\n\tattr.writeMask = 0\n\tattr.userWriteMask = 0\n\tretVal |= UA_Server_addNode_begin(server, UA_NODECLASS_VARIABLE, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 2264), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_QUALIFIEDNAME(UA_UInt16(ns[0]), []byte(\"SoftwareVersion\\x00\")), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 63), (*[100000000]UA_VariableAttributes)(unsafe.Pointer(&attr))[:], (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[35]))[:], nil, nil)\n\tretVal |= UA_Server_addReference(server, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 2264), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 47), UA_EXPANDEDNODEID_NUMERIC(UA_UInt16(ns[0]), 2260), 0)\n\treturn UA_StatusCode(retVal)\n}", "title": "" }, { "docid": "2e4abf7fa8e9b85c2ba4900e69054444", "score": "0.43659443", "text": "func printFrequencyTable(cmd *cobra.Command, args []string) {\n\ttotalString := strings.Join(args, \" \")\n\tsingleLetterCounts := frequencyCountInString(totalString)\n\ttotalLetterCount := countTotalCharacters(totalString)\n\tfmt.Println(\"Frequency Table\")\n\tfmt.Println(\"---------------\")\n\tfmt.Printf(\"Total letters: %v\\n\", totalLetterCount)\n\tfor curByte, count := range singleLetterCounts {\n\t\tfmt.Printf(\"%c: %v (%v%%)\\n\", curByte, count, fmt.Sprintf(\"%.2f\", 100.0*(float32(count)/float32(totalLetterCount))))\n\t}\n}", "title": "" }, { "docid": "34a1d730634211069ea48b1f0cd5a742", "score": "0.4358231", "text": "func SimVarAutopilotNavSelected(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Number\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"AUTOPILOT NAV SELECTED\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "9075a2d897390d544b6d696dfe54c1ef", "score": "0.4355649", "text": "func function_ua_namespace0_100_begin(server []UA_Server, ns []UA_UInt16) UA_StatusCode {\n\tvar retVal UA_StatusCode\n\tvar attr UA_VariableAttributes = UA_VariableAttributes_default\n\tattr.minimumSamplingInterval = UA_Double((1000))\n\tattr.userAccessLevel = UA_Byte(1)\n\tattr.accessLevel = UA_Byte(1)\n\tattr.valueRank = UA_Int32((int32_t((__int32_t((-1))))))\n\tattr.dataType = UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 12)\n\tvar variablenode_ns_0_i_2263_variant_DataContents []UA_String = make([]UA_String, 1)\n\tUA_init(variablenode_ns_0_i_2263_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[11]))[:])\n\tUA_Variant_setScalar((*[100000000]UA_Variant)(unsafe.Pointer(&attr.value))[:], variablenode_ns_0_i_2263_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[11]))[:])\n\tattr.displayName = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"ManufacturerName\\x00\"))\n\tattr.description = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"\\x00\"))\n\tattr.writeMask = 0\n\tattr.userWriteMask = 0\n\tretVal |= UA_Server_addNode_begin(server, UA_NODECLASS_VARIABLE, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 2263), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_QUALIFIEDNAME(UA_UInt16(ns[0]), []byte(\"ManufacturerName\\x00\")), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 63), (*[100000000]UA_VariableAttributes)(unsafe.Pointer(&attr))[:], (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[35]))[:], nil, nil)\n\tretVal |= UA_Server_addReference(server, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 2263), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 47), UA_EXPANDEDNODEID_NUMERIC(UA_UInt16(ns[0]), 2260), 0)\n\treturn UA_StatusCode(retVal)\n}", "title": "" }, { "docid": "fad8e5afc985a86c70432b139cad66c1", "score": "0.4342085", "text": "func SimVarRecipEngEmergencyBoostActive(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Bool\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"RECIP ENG EMERGENCY BOOST ACTIVE:index\",\n\t\tUnit: unit,\n\t\tSettable: true,\n\t}\n}", "title": "" }, { "docid": "6ae4a23af95eb900ba067b6f4893f74c", "score": "0.43381232", "text": "func SimVarFuelTankSelector(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Enum\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"FUEL TANK SELECTOR:index\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "8cd255cf0e6707b67a2c6cccd75f4167", "score": "0.43358278", "text": "func (r ApiFinancialsRequest) Freq(freq string) ApiFinancialsRequest {\n\tr.freq = &freq\n\treturn r\n}", "title": "" }, { "docid": "d648b0aaac0e52607a75664c7ed3d47a", "score": "0.43226233", "text": "func (n Note) Frequency() float64 {\n\t//calc frequency, -9 half steps to base on a4\n\treturn a4 * math.Pow(math.Pow(2, 1./12.), n.Dist()-9)\n}", "title": "" }, { "docid": "bd62fb5b3e5ea05421867df33581898e", "score": "0.43162", "text": "func (p *Periph) StoreFREQUENCY(f Freq) {\n\tp.frequency.Store(uint32(f))\n}", "title": "" }, { "docid": "b61b33a7bfd3f358f0eea3bed19f307d", "score": "0.4315864", "text": "func function_ua_namespace0_21_begin(server []UA_Server, ns []UA_UInt16) UA_StatusCode {\n\tvar retVal UA_StatusCode\n\tvar attr UA_VariableAttributes = UA_VariableAttributes_default\n\tattr.minimumSamplingInterval = UA_Double((0))\n\tattr.userAccessLevel = UA_Byte(1)\n\tattr.accessLevel = UA_Byte(1)\n\tattr.valueRank = UA_Int32((int32_t((__int32_t((-1))))))\n\tattr.dataType = UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 7)\n\tvar variablenode_ns_0_i_2161_variant_DataContents []UA_UInt32 = make([]UA_UInt32, 1)\n\tUA_init(variablenode_ns_0_i_2161_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[6]))[:])\n\tUA_Variant_setScalar((*[100000000]UA_Variant)(unsafe.Pointer(&attr.value))[:], variablenode_ns_0_i_2161_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[6]))[:])\n\tattr.displayName = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"CumulatedSubscriptionCount\\x00\"))\n\tattr.description = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"\\x00\"))\n\tattr.writeMask = 0\n\tattr.userWriteMask = 0\n\tretVal |= UA_Server_addNode_begin(server, UA_NODECLASS_VARIABLE, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 2161), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_QUALIFIEDNAME(UA_UInt16(ns[0]), []byte(\"CumulatedSubscriptionCount\\x00\")), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 63), (*[100000000]UA_VariableAttributes)(unsafe.Pointer(&attr))[:], (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[35]))[:], nil, nil)\n\tretVal |= UA_Server_addReference(server, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 2161), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 47), UA_EXPANDEDNODEID_NUMERIC(UA_UInt16(ns[0]), 2150), 0)\n\treturn UA_StatusCode(retVal)\n}", "title": "" }, { "docid": "b7b96106b1f7fb026b06680e121dc9ff", "score": "0.43158343", "text": "func SimVarGeneralEngStarterActive(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Bool\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"GENERAL ENG STARTER ACTIVE\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "364915b0f188122bb7a5d27e24d29752", "score": "0.4291068", "text": "func (airtime WirelessAirtime) FrequencyName() string {\n\tif airtime.Frequency < 5000 {\n\t\treturn \"11g\"\n\t}\n\treturn \"11a\"\n}", "title": "" }, { "docid": "86c77c36fccb581db78b93fedd54ac38", "score": "0.42831984", "text": "func SimVarUnitOfMeasure(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Enum\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"UNITS OF MEASURE\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "533fcb97408c11b820277cd9db257331", "score": "0.42804402", "text": "func (r ApiCompanyEarningsQualityScoreRequest) Freq(freq string) ApiCompanyEarningsQualityScoreRequest {\n\tr.freq = &freq\n\treturn r\n}", "title": "" }, { "docid": "9942d8b7f7d916b036a6ad79e066fdf9", "score": "0.4279459", "text": "func Info(fname string) (samplerate int, channels int, err error) {\r\n\tstdout, stderr, err := run(\"sox\", \"--i\", fname)\r\n\tif err != nil {\r\n\t\treturn\r\n\t}\r\n\tstdout += stderr\r\n\tfor _, line := range strings.Split(stdout, \"\\n\") {\r\n\t\tif strings.Contains(line, \"Channels\") && channels == 0 {\r\n\t\t\tparts := strings.Fields(line)\r\n\t\t\tchannels, err = strconv.Atoi(parts[len(parts)-1])\r\n\t\t\tif err != nil {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\t\t} else if strings.Contains(line, \"Sample Rate\") && samplerate == 0 {\r\n\t\t\tparts := strings.Fields(line)\r\n\t\t\tsamplerate, err = strconv.Atoi(parts[len(parts)-1])\r\n\t\t\tif err != nil {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\t\t}\r\n\t}\r\n\treturn\r\n}", "title": "" }, { "docid": "67b9e8223f0ea5a567ecce0279df6f4d", "score": "0.42778313", "text": "func SimVarAutopilotTakeoffPowerActive(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Bool\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"AUTOPILOT TAKEOFF POWER ACTIVE\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "3919ed0435507bb2935c12b24f386dd5", "score": "0.4275213", "text": "func function_ua_namespace0_124_begin(server []UA_Server, ns []UA_UInt16) UA_StatusCode {\n\tvar retVal UA_StatusCode\n\tvar attr UA_VariableAttributes = UA_VariableAttributes_default\n\tattr.minimumSamplingInterval = UA_Double((0))\n\tattr.userAccessLevel = UA_Byte(1)\n\tattr.accessLevel = UA_Byte(1)\n\tattr.valueRank = UA_Int32((int32_t((__int32_t((-1))))))\n\tattr.dataType = UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 7)\n\tvar variablenode_ns_0_i_2278_variant_DataContents []UA_UInt32 = make([]UA_UInt32, 1)\n\tUA_init(variablenode_ns_0_i_2278_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[6]))[:])\n\tUA_Variant_setScalar((*[100000000]UA_Variant)(unsafe.Pointer(&attr.value))[:], variablenode_ns_0_i_2278_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[6]))[:])\n\tattr.displayName = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"CumulatedSessionCount\\x00\"))\n\tattr.description = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"\\x00\"))\n\tattr.writeMask = 0\n\tattr.userWriteMask = 0\n\tretVal |= UA_Server_addNode_begin(server, UA_NODECLASS_VARIABLE, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 2278), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_QUALIFIEDNAME(UA_UInt16(ns[0]), []byte(\"CumulatedSessionCount\\x00\")), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 63), (*[100000000]UA_VariableAttributes)(unsafe.Pointer(&attr))[:], (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[35]))[:], nil, nil)\n\tretVal |= UA_Server_addReference(server, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 2278), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 47), UA_EXPANDEDNODEID_NUMERIC(UA_UInt16(ns[0]), 2275), 0)\n\treturn UA_StatusCode(retVal)\n}", "title": "" }, { "docid": "ff8750a126d2aebec77ffb1ce26ba621", "score": "0.42680466", "text": "func function_ua_namespace0_117_begin(server []UA_Server, ns []UA_UInt16) UA_StatusCode {\n\tvar retVal UA_StatusCode\n\tvar attr UA_VariableAttributes = UA_VariableAttributes_default\n\tattr.minimumSamplingInterval = UA_Double((0))\n\tattr.userAccessLevel = UA_Byte(1)\n\tattr.accessLevel = UA_Byte(1)\n\tattr.valueRank = UA_Int32((int32_t((__int32_t((-1))))))\n\tattr.dataType = UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 7)\n\tvar variablenode_ns_0_i_2284_variant_DataContents []UA_UInt32 = make([]UA_UInt32, 1)\n\tUA_init(variablenode_ns_0_i_2284_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[6]))[:])\n\tUA_Variant_setScalar((*[100000000]UA_Variant)(unsafe.Pointer(&attr.value))[:], variablenode_ns_0_i_2284_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[6]))[:])\n\tattr.displayName = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"PublishingIntervalCount\\x00\"))\n\tattr.description = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"\\x00\"))\n\tattr.writeMask = 0\n\tattr.userWriteMask = 0\n\tretVal |= UA_Server_addNode_begin(server, UA_NODECLASS_VARIABLE, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 2284), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_QUALIFIEDNAME(UA_UInt16(ns[0]), []byte(\"PublishingIntervalCount\\x00\")), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 63), (*[100000000]UA_VariableAttributes)(unsafe.Pointer(&attr))[:], (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[35]))[:], nil, nil)\n\tretVal |= UA_Server_addReference(server, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 2284), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 47), UA_EXPANDEDNODEID_NUMERIC(UA_UInt16(ns[0]), 2275), 0)\n\treturn UA_StatusCode(retVal)\n}", "title": "" }, { "docid": "616bad2fe1fa06a49c1e55d80ae8e71f", "score": "0.42676216", "text": "func SimVarTurbEngNumTanksUsed(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Number\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"TURB ENG NUM TANKS USED:index\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "b46a967f33ae9d724256d349f91e2c7b", "score": "0.42604107", "text": "func function_ua_namespace0_82_begin(server []UA_Server, ns []UA_UInt16) UA_StatusCode {\n\tvar retVal UA_StatusCode\n\tvar attr UA_VariableAttributes = UA_VariableAttributes_default\n\tattr.minimumSamplingInterval = UA_Double((0))\n\tattr.userAccessLevel = UA_Byte(1)\n\tattr.accessLevel = UA_Byte(1)\n\tattr.valueRank = UA_Int32((int32_t((__int32_t((-1))))))\n\tattr.dataType = UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 12)\n\tvar variablenode_ns_0_i_106_variant_DataContents []UA_String = make([]UA_String, 1)\n\tUA_init(variablenode_ns_0_i_106_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[11]))[:])\n\tUA_Variant_setScalar((*[100000000]UA_Variant)(unsafe.Pointer(&attr.value))[:], variablenode_ns_0_i_106_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[11]))[:])\n\tattr.displayName = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"DataTypeVersion\\x00\"))\n\tattr.description = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"The version number for the data type dictionary.\\x00\"))\n\tattr.writeMask = 0\n\tattr.userWriteMask = 0\n\tretVal |= UA_Server_addNode_begin(server, UA_NODECLASS_VARIABLE, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 106), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_QUALIFIEDNAME(UA_UInt16(ns[0]), []byte(\"DataTypeVersion\\x00\")), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 68), (*[100000000]UA_VariableAttributes)(unsafe.Pointer(&attr))[:], (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[35]))[:], nil, nil)\n\tretVal |= UA_Server_addReference(server, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 106), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 37), UA_EXPANDEDNODEID_NUMERIC(UA_UInt16(ns[0]), 80), 1)\n\tretVal |= UA_Server_addReference(server, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 106), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 46), UA_EXPANDEDNODEID_NUMERIC(UA_UInt16(ns[0]), 72), 0)\n\treturn UA_StatusCode(retVal)\n}", "title": "" }, { "docid": "a73ace57ec98b3ed3992b0766996fb5c", "score": "0.42595208", "text": "func SimVarFuelTankRightAuxQuantity(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Gallons\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"FUEL TANK RIGHT AUX QUANTITY\",\n\t\tUnit: unit,\n\t\tSettable: true,\n\t}\n}", "title": "" }, { "docid": "35b4cfcce435242e9e298faf9f8b2776", "score": "0.4257736", "text": "func function_ua_namespace0_41_begin(server []UA_Server, ns []UA_UInt16) UA_StatusCode {\n\tvar retVal UA_StatusCode\n\tvar attr UA_VariableAttributes = UA_VariableAttributes_default\n\tattr.minimumSamplingInterval = UA_Double((0))\n\tattr.userAccessLevel = UA_Byte(1)\n\tattr.accessLevel = UA_Byte(1)\n\tattr.valueRank = UA_Int32((int32_t((__int32_t((-1))))))\n\tattr.dataType = UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 7)\n\tvar variablenode_ns_0_i_11710_variant_DataContents []UA_UInt32 = make([]UA_UInt32, 1)\n\tUA_init(variablenode_ns_0_i_11710_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[6]))[:])\n\tUA_Variant_setScalar((*[100000000]UA_Variant)(unsafe.Pointer(&attr.value))[:], variablenode_ns_0_i_11710_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[6]))[:])\n\tattr.displayName = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"MaxNodesPerBrowse\\x00\"))\n\tattr.description = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"The maximum number of operations in a single Browse request.\\x00\"))\n\tattr.writeMask = 0\n\tattr.userWriteMask = 0\n\tretVal |= UA_Server_addNode_begin(server, UA_NODECLASS_VARIABLE, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 11710), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_QUALIFIEDNAME(UA_UInt16(ns[0]), []byte(\"MaxNodesPerBrowse\\x00\")), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 68), (*[100000000]UA_VariableAttributes)(unsafe.Pointer(&attr))[:], (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[35]))[:], nil, nil)\n\tretVal |= UA_Server_addReference(server, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 11710), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 46), UA_EXPANDEDNODEID_NUMERIC(UA_UInt16(ns[0]), 11704), 0)\n\treturn UA_StatusCode(retVal)\n}", "title": "" }, { "docid": "f2bd66f825e17c9149f671980aa19887", "score": "0.4255259", "text": "func function_ua_namespace0_68_begin(server []UA_Server, ns []UA_UInt16) UA_StatusCode {\n\tvar retVal UA_StatusCode\n\tvar attr UA_VariableAttributes = UA_VariableAttributes_default\n\tattr.minimumSamplingInterval = UA_Double((0))\n\tattr.userAccessLevel = UA_Byte(1)\n\tattr.accessLevel = UA_Byte(1)\n\tattr.valueRank = UA_Int32((int32_t((__int32_t((-1))))))\n\tattr.dataType = UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 7)\n\tvar variablenode_ns_0_i_11714_variant_DataContents []UA_UInt32 = make([]UA_UInt32, 1)\n\tUA_init(variablenode_ns_0_i_11714_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[6]))[:])\n\tUA_Variant_setScalar((*[100000000]UA_Variant)(unsafe.Pointer(&attr.value))[:], variablenode_ns_0_i_11714_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[6]))[:])\n\tattr.displayName = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"MaxMonitoredItemsPerCall\\x00\"))\n\tattr.description = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"The maximum number of operations in a single MonitoredItem related request.\\x00\"))\n\tattr.writeMask = 0\n\tattr.userWriteMask = 0\n\tretVal |= UA_Server_addNode_begin(server, UA_NODECLASS_VARIABLE, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 11714), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_QUALIFIEDNAME(UA_UInt16(ns[0]), []byte(\"MaxMonitoredItemsPerCall\\x00\")), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 68), (*[100000000]UA_VariableAttributes)(unsafe.Pointer(&attr))[:], (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[35]))[:], nil, nil)\n\tretVal |= UA_Server_addReference(server, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 11714), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 46), UA_EXPANDEDNODEID_NUMERIC(UA_UInt16(ns[0]), 11704), 0)\n\treturn UA_StatusCode(retVal)\n}", "title": "" }, { "docid": "a2c7cb1845a12e8d1bce426772c1fb57", "score": "0.4253788", "text": "func function_ua_namespace0_59_begin(server []UA_Server, ns []UA_UInt16) UA_StatusCode {\n\tvar retVal UA_StatusCode\n\tvar attr UA_VariableAttributes = UA_VariableAttributes_default\n\tattr.minimumSamplingInterval = UA_Double((0))\n\tattr.userAccessLevel = UA_Byte(1)\n\tattr.accessLevel = UA_Byte(1)\n\tattr.valueRank = UA_Int32((int32_t((__int32_t((-1))))))\n\tattr.dataType = UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 7)\n\tvar variablenode_ns_0_i_11570_variant_DataContents []UA_UInt32 = make([]UA_UInt32, 1)\n\tUA_init(variablenode_ns_0_i_11570_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[6]))[:])\n\tUA_Variant_setScalar((*[100000000]UA_Variant)(unsafe.Pointer(&attr.value))[:], variablenode_ns_0_i_11570_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[6]))[:])\n\tattr.displayName = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"MaxNodesPerBrowse\\x00\"))\n\tattr.description = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"The maximum number of operations in a single Browse request.\\x00\"))\n\tattr.writeMask = 0\n\tattr.userWriteMask = 0\n\tretVal |= UA_Server_addNode_begin(server, UA_NODECLASS_VARIABLE, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 11570), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_QUALIFIEDNAME(UA_UInt16(ns[0]), []byte(\"MaxNodesPerBrowse\\x00\")), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 68), (*[100000000]UA_VariableAttributes)(unsafe.Pointer(&attr))[:], (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[35]))[:], nil, nil)\n\tretVal |= UA_Server_addReference(server, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 11570), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 46), UA_EXPANDEDNODEID_NUMERIC(UA_UInt16(ns[0]), 11564), 0)\n\treturn UA_StatusCode(retVal)\n}", "title": "" }, { "docid": "b5682826a6548200752e23bd77168923", "score": "0.42487666", "text": "func SimVarAirspeedIndicated(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Knots\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"AIRSPEED INDICATED\",\n\t\tUnit: unit,\n\t\tSettable: true,\n\t}\n}", "title": "" }, { "docid": "28af1dd0e014951bcdf4244f0dd50f06", "score": "0.42487198", "text": "func TestFrequencyQueries2(t *testing.T) {\n\tqueries := [][]int32{\n\t\t[]int32{1, 3},\n\t\t[]int32{2, 3},\n\t\t[]int32{3, 2},\n\t\t[]int32{1, 4},\n\t\t[]int32{1, 5},\n\t\t[]int32{1, 5},\n\t\t[]int32{1, 4},\n\t\t[]int32{3, 2},\n\t\t[]int32{2, 4},\n\t\t[]int32{3, 2},\n\t}\n\n\tfreqQuery(queries)\n}", "title": "" }, { "docid": "6ac985d0c08f1c6e566e54d7bb77ce1f", "score": "0.4240191", "text": "func SimVarRotorGovActive(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Bool\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"ROTOR GOV ACTIVE\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "3e412b2ba3e8812024fb8bcaf40b4f98", "score": "0.4239047", "text": "func (p *PositionReport) renderFreq() string {\n\tvar out string\n\t// add a delimiter if a data-extension exists\n\tif len(p.Extn) >= 7 {\n\t\tout = out + `/`\n\t}\n\treturn (out + p.Freq.Render())\n}", "title": "" }, { "docid": "a0eab6b5971aca5f3da2ecece6f1fc45", "score": "0.4238939", "text": "func freqQuery(operations [][2]int) []int {\n\tresponses := []int{}\n\tfrequencyMap := map[int]int{}\n\tfastFrequencyMap := map[int]map[int]bool{}\n\tfor _, val := range operations {\n\t\tif val[0] == 1 {\n\t\t\t// Add value\n\t\t\toldFreq := frequencyMap[val[1]]\n\t\t\tnewFreq := oldFreq + 1\n\t\t\tfrequencyMap[val[1]] = newFreq\n\t\t\t_updateFastFreq(fastFrequencyMap, newFreq, oldFreq, val[1])\n\n\t\t} else if val[0] == 2 {\n\t\t\t// Remove Value\n\t\t\tif frequencyMap[val[1]] != 0 {\n\t\t\t\toldFreq := frequencyMap[val[1]]\n\t\t\t\tnewFreq := oldFreq - 1\n\t\t\t\tfrequencyMap[val[1]] = newFreq\n\t\t\t\t_updateFastFreq(fastFrequencyMap, newFreq, oldFreq, val[1])\n\n\t\t\t}\n\t\t} else if val[0] == 3 {\n\t\t\t// Execute and store frequency query\n\t\t\tif _valueAtFrequency(fastFrequencyMap, val[1]) {\n\t\t\t\tresponses = append(responses, 1)\n\t\t\t} else {\n\t\t\t\tresponses = append(responses, 0)\n\t\t\t}\n\t\t}\n\t}\n\treturn responses\n}", "title": "" }, { "docid": "782b6d325c6cbb6e82cbce7655d208a2", "score": "0.42373845", "text": "func fvifa(rate float64, nper int) float64 {\n\t// Removable singularity at rate == 0\n\tif rate == 0 {\n\t\treturn float64(nper)\n\t}\n\n\treturn (math.Pow(1+rate, float64(nper)) - 1) / rate\n}", "title": "" }, { "docid": "d8b74744bee20d384b2e078dede78536", "score": "0.42368895", "text": "func SimVarTurbEngTankSelector(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Enum\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"TURB ENG TANK SELECTOR:index\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "337327bd68bf9cd21bdcb7014e158a0a", "score": "0.42293122", "text": "func Setup(x []float64) {\n\tpush(len(x))\n\tregister(x)\n}", "title": "" }, { "docid": "481de60ac8c5da83fbee87480298be36", "score": "0.4228355", "text": "func (r ApiCompanyRevenueEstimatesRequest) Freq(freq string) ApiCompanyRevenueEstimatesRequest {\n\tr.freq = &freq\n\treturn r\n}", "title": "" }, { "docid": "c19ed282601f606f4f84006f08a2d4b2", "score": "0.42133355", "text": "func function_ua_namespace0_55_begin(server []UA_Server, ns []UA_UInt16) UA_StatusCode {\n\tvar retVal UA_StatusCode\n\tvar attr UA_VariableAttributes = UA_VariableAttributes_default\n\tattr.minimumSamplingInterval = UA_Double((0))\n\tattr.userAccessLevel = UA_Byte(1)\n\tattr.accessLevel = UA_Byte(1)\n\tattr.valueRank = UA_Int32((int32_t((__int32_t((-1))))))\n\tattr.dataType = UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 7)\n\tvar variablenode_ns_0_i_11574_variant_DataContents []UA_UInt32 = make([]UA_UInt32, 1)\n\tUA_init(variablenode_ns_0_i_11574_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[6]))[:])\n\tUA_Variant_setScalar((*[100000000]UA_Variant)(unsafe.Pointer(&attr.value))[:], variablenode_ns_0_i_11574_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[6]))[:])\n\tattr.displayName = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"MaxMonitoredItemsPerCall\\x00\"))\n\tattr.description = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"The maximum number of operations in a single MonitoredItem related request.\\x00\"))\n\tattr.writeMask = 0\n\tattr.userWriteMask = 0\n\tretVal |= UA_Server_addNode_begin(server, UA_NODECLASS_VARIABLE, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 11574), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_QUALIFIEDNAME(UA_UInt16(ns[0]), []byte(\"MaxMonitoredItemsPerCall\\x00\")), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 68), (*[100000000]UA_VariableAttributes)(unsafe.Pointer(&attr))[:], (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[35]))[:], nil, nil)\n\tretVal |= UA_Server_addReference(server, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 11574), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 46), UA_EXPANDEDNODEID_NUMERIC(UA_UInt16(ns[0]), 11564), 0)\n\treturn UA_StatusCode(retVal)\n}", "title": "" }, { "docid": "fe3be352d02265f13a944d509dcc74ef", "score": "0.42121142", "text": "func SimVarNavAvailable(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Bool\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"NAV AVAILABLE:index\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "94e87deec6feffa1700d8a89303ea1ed", "score": "0.42073557", "text": "func (r ApiFinancialsReportedRequest) Freq(freq string) ApiFinancialsReportedRequest {\n\tr.freq = &freq\n\treturn r\n}", "title": "" }, { "docid": "299037e593d71a5a5422c1dbc06bb722", "score": "0.42040613", "text": "func (o InventoryScheduleOutput) Frequency() pulumi.StringOutput {\n\treturn o.ApplyT(func(v InventorySchedule) string { return v.Frequency }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "c38c93c7d6ceaaa2acc0628ee88a066d", "score": "0.4203748", "text": "func TestReadFrequencies_ValuesInRange_Success(t *testing.T) {\n\n\ttest := func(name string, readData []byte, expectedFrequencies Frequencies) {\n\t\tt.Run(name, func(t *testing.T) {\n\t\t\tfsp := (&fakeSerialPort{}).setReadData(readData...)\n\t\t\td := deviceFromFake(fsp)\n\t\t\tactualFrequencies, err := d.readFrequencies(getSoundCmd)\n\t\t\trequire.NoError(t, d.Close())\n\t\t\trequire.NoError(t, err)\n\t\t\tassert.Equal(t, expectedFrequencies, actualFrequencies)\n\t\t\tassert.Equal(t, []byte{getSoundCmd}, fsp.getWrittenData())\n\t\t})\n\t}\n\n\ttest(\"ZeroValues\", make([]byte, 24), Frequencies{\n\t\tFundamental: Peak{},\n\t\tPeaks: [5]Peak{},\n\t})\n\t// This data should return the same values in the Sound section (pg. 7)\n\t// of the datasheet.\n\ttest(\"IntermediateValues\", []byte{\n\t\t0x04, 0x1e, 0x1c, 0xa2, // fundamental (1054 Hz, 73.3)\n\t\t0x08, 0x16, 0x11, 0xed, // peak 2 (2070 Hz, 45.89)\n\t\t0x01, 0x11, 0x11, 0x2e, // peak 3 (273 Hz, 43.98)\n\t\t0x05, 0xa5, 0x0f, 0x6d, // peak 4 (1445 Hz, 39.49)\n\t\t0x02, 0xe6, 0x0e, 0xb9, // peak 5 (742 Hz, 37.69)\n\t\t0x06, 0xdd, 0x0e, 0x63, // peak 6 (1757 Hz, 36.83)\n\t}, Frequencies{\n\t\tFundamental: Peak{Freq: 1054, Amplitude: 73.3},\n\t\tPeaks: [5]Peak{\n\t\t\t{Freq: 2070, Amplitude: 45.89},\n\t\t\t{Freq: 273, Amplitude: 43.98},\n\t\t\t{Freq: 1445, Amplitude: 39.49},\n\t\t\t{Freq: 742, Amplitude: 37.69},\n\t\t\t{Freq: 1757, Amplitude: 36.83}},\n\t})\n\ttest(\"MaxValues\", []byte{\n\t\t0xff, 0xff, 0xff, 0xff,\n\t\t0xff, 0xff, 0xff, 0xff,\n\t\t0xff, 0xff, 0xff, 0xff,\n\t\t0xff, 0xff, 0xff, 0xff,\n\t\t0xff, 0xff, 0xff, 0xff,\n\t\t0xff, 0xff, 0xff, 0xff,\n\t}, Frequencies{\n\t\tFundamental: Peak{Freq: 65535, Amplitude: 655.35},\n\t\tPeaks: [5]Peak{\n\t\t\t{Freq: 65535, Amplitude: 655.35},\n\t\t\t{Freq: 65535, Amplitude: 655.35},\n\t\t\t{Freq: 65535, Amplitude: 655.35},\n\t\t\t{Freq: 65535, Amplitude: 655.35},\n\t\t\t{Freq: 65535, Amplitude: 655.35}},\n\t})\n}", "title": "" }, { "docid": "2f3dc97d0ff57771c4c6f7289700f8e5", "score": "0.4198456", "text": "func SimVarNavCodes(args ...interface{}) SimVar {\n\tindex, unit := readArgs(args, 0, \"Flags\")\n\treturn SimVar{\n\t\tIndex: index,\n\t\tName: \"NAV CODES:index\",\n\t\tUnit: unit,\n\t\tSettable: false,\n\t}\n}", "title": "" }, { "docid": "927365befd936d836e2d7179791c0134", "score": "0.419479", "text": "func function_ua_namespace0_101_begin(server []UA_Server, ns []UA_UInt16) UA_StatusCode {\n\tvar retVal UA_StatusCode\n\tvar attr UA_VariableAttributes = UA_VariableAttributes_default\n\tattr.minimumSamplingInterval = UA_Double((1000))\n\tattr.userAccessLevel = UA_Byte(1)\n\tattr.accessLevel = UA_Byte(1)\n\tattr.valueRank = UA_Int32((int32_t((__int32_t((-1))))))\n\tattr.dataType = UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 12)\n\tvar variablenode_ns_0_i_2262_variant_DataContents []UA_String = make([]UA_String, 1)\n\tUA_init(variablenode_ns_0_i_2262_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[11]))[:])\n\tUA_Variant_setScalar((*[100000000]UA_Variant)(unsafe.Pointer(&attr.value))[:], variablenode_ns_0_i_2262_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[11]))[:])\n\tattr.displayName = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"ProductUri\\x00\"))\n\tattr.description = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"\\x00\"))\n\tattr.writeMask = 0\n\tattr.userWriteMask = 0\n\tretVal |= UA_Server_addNode_begin(server, UA_NODECLASS_VARIABLE, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 2262), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_QUALIFIEDNAME(UA_UInt16(ns[0]), []byte(\"ProductUri\\x00\")), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 63), (*[100000000]UA_VariableAttributes)(unsafe.Pointer(&attr))[:], (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[35]))[:], nil, nil)\n\tretVal |= UA_Server_addReference(server, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 2262), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 47), UA_EXPANDEDNODEID_NUMERIC(UA_UInt16(ns[0]), 2260), 0)\n\treturn UA_StatusCode(retVal)\n}", "title": "" }, { "docid": "5ed6f9bd6fb3121897bb8bd0918a94c2", "score": "0.41928482", "text": "func isFreq(_ *validator.Validate, _ reflect.Value, _ reflect.Value,\n\tfield reflect.Value, _ reflect.Type, _ reflect.Kind, _ string) bool {\n\tfreq := strings.ToLower(field.String())\n\tif freq == \"h\" || freq == \"d\" {\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "2b2f3e90b9e1931a56441d7af606c369", "score": "0.41876644", "text": "func function_ua_namespace0_48_begin(server []UA_Server, ns []UA_UInt16) UA_StatusCode {\n\tvar retVal UA_StatusCode\n\tvar attr UA_VariableAttributes = UA_VariableAttributes_default\n\tattr.minimumSamplingInterval = UA_Double((0))\n\tattr.userAccessLevel = UA_Byte(1)\n\tattr.accessLevel = UA_Byte(1)\n\tattr.valueRank = UA_Int32((int32_t((__int32_t((-1))))))\n\tattr.dataType = UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 7)\n\tvar variablenode_ns_0_i_11709_variant_DataContents []UA_UInt32 = make([]UA_UInt32, 1)\n\tUA_init(variablenode_ns_0_i_11709_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[6]))[:])\n\tUA_Variant_setScalar((*[100000000]UA_Variant)(unsafe.Pointer(&attr.value))[:], variablenode_ns_0_i_11709_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[6]))[:])\n\tattr.displayName = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"MaxNodesPerMethodCall\\x00\"))\n\tattr.description = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"The maximum number of operations in a single Call request.\\x00\"))\n\tattr.writeMask = 0\n\tattr.userWriteMask = 0\n\tretVal |= UA_Server_addNode_begin(server, UA_NODECLASS_VARIABLE, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 11709), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_QUALIFIEDNAME(UA_UInt16(ns[0]), []byte(\"MaxNodesPerMethodCall\\x00\")), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 68), (*[100000000]UA_VariableAttributes)(unsafe.Pointer(&attr))[:], (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[35]))[:], nil, nil)\n\tretVal |= UA_Server_addReference(server, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 11709), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 46), UA_EXPANDEDNODEID_NUMERIC(UA_UInt16(ns[0]), 11704), 0)\n\treturn UA_StatusCode(retVal)\n}", "title": "" }, { "docid": "23fa86eac1581a49a9f835eadc674f2c", "score": "0.41872978", "text": "func (e *Emulator) opFx18(x byte) {\n\te.cpu.SoundTimer = e.cpu.V[x]\n}", "title": "" }, { "docid": "9778431b66f3431ff6bf56da454a3651", "score": "0.4183642", "text": "func (d *Dict) Frequency(key string) (float64, bool) {\n\treturn d.Seg.Find(key)\n}", "title": "" }, { "docid": "9512fe24b6f32362264e4e9df129fe82", "score": "0.41824955", "text": "func function_ua_namespace0_65_begin(server []UA_Server, ns []UA_UInt16) UA_StatusCode {\n\tvar retVal UA_StatusCode\n\tvar attr UA_VariableAttributes = UA_VariableAttributes_default\n\tattr.minimumSamplingInterval = UA_Double((0))\n\tattr.userAccessLevel = UA_Byte(1)\n\tattr.accessLevel = UA_Byte(1)\n\tattr.valueRank = UA_Int32((int32_t((__int32_t((-1))))))\n\tattr.dataType = UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 7)\n\tvar variablenode_ns_0_i_11711_variant_DataContents []UA_UInt32 = make([]UA_UInt32, 1)\n\tUA_init(variablenode_ns_0_i_11711_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[6]))[:])\n\tUA_Variant_setScalar((*[100000000]UA_Variant)(unsafe.Pointer(&attr.value))[:], variablenode_ns_0_i_11711_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[6]))[:])\n\tattr.displayName = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"MaxNodesPerRegisterNodes\\x00\"))\n\tattr.description = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"The maximum number of operations in a single RegisterNodes request.\\x00\"))\n\tattr.writeMask = 0\n\tattr.userWriteMask = 0\n\tretVal |= UA_Server_addNode_begin(server, UA_NODECLASS_VARIABLE, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 11711), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_QUALIFIEDNAME(UA_UInt16(ns[0]), []byte(\"MaxNodesPerRegisterNodes\\x00\")), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 68), (*[100000000]UA_VariableAttributes)(unsafe.Pointer(&attr))[:], (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[35]))[:], nil, nil)\n\tretVal |= UA_Server_addReference(server, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 11711), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 46), UA_EXPANDEDNODEID_NUMERIC(UA_UInt16(ns[0]), 11704), 0)\n\treturn UA_StatusCode(retVal)\n}", "title": "" }, { "docid": "2ce245585ebce7fe73cb28cd2a9e0293", "score": "0.41818553", "text": "func function_ua_namespace0_22_begin(server []UA_Server, ns []UA_UInt16) UA_StatusCode {\n\tvar retVal UA_StatusCode\n\tvar attr UA_VariableAttributes = UA_VariableAttributes_default\n\tattr.minimumSamplingInterval = UA_Double((0))\n\tattr.userAccessLevel = UA_Byte(1)\n\tattr.accessLevel = UA_Byte(1)\n\tattr.valueRank = UA_Int32((int32_t((__int32_t((-1))))))\n\tattr.dataType = UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 7)\n\tvar variablenode_ns_0_i_2153_variant_DataContents []UA_UInt32 = make([]UA_UInt32, 1)\n\tUA_init(variablenode_ns_0_i_2153_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[6]))[:])\n\tUA_Variant_setScalar((*[100000000]UA_Variant)(unsafe.Pointer(&attr.value))[:], variablenode_ns_0_i_2153_variant_DataContents, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[6]))[:])\n\tattr.displayName = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"CumulatedSessionCount\\x00\"))\n\tattr.description = UA_LOCALIZEDTEXT([]byte(\"\\x00\"), []byte(\"\\x00\"))\n\tattr.writeMask = 0\n\tattr.userWriteMask = 0\n\tretVal |= UA_Server_addNode_begin(server, UA_NODECLASS_VARIABLE, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 2153), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 0), UA_QUALIFIEDNAME(UA_UInt16(ns[0]), []byte(\"CumulatedSessionCount\\x00\")), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 63), (*[100000000]UA_VariableAttributes)(unsafe.Pointer(&attr))[:], (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[35]))[:], nil, nil)\n\tretVal |= UA_Server_addReference(server, UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 2153), UA_NODEID_NUMERIC(UA_UInt16(ns[0]), 47), UA_EXPANDEDNODEID_NUMERIC(UA_UInt16(ns[0]), 2150), 0)\n\treturn UA_StatusCode(retVal)\n}", "title": "" } ]
c2144bcfdfb1ea5ff657faa346d4ac77
/ NewTMSkillSetDefaults returns a new instance of TMSkill, with all fields specified by the caller. The proficiency field must be in the range of 05. If a value is passed in outside of this range, it is clipped to 0 if it's below 0, or 5 if it's above 5.
[ { "docid": "3b2aa46ce414114c9ae77fd4a56bdaf4", "score": "0.8522373", "text": "func NewTMSkillSetDefaults(id, skillID, teamMemberID string, wishList bool,\n\tproficiency int) TMSkill {\n\tif proficiency > 5 {\n\t\tproficiency = 5\n\t}\n\tif proficiency < 0 {\n\t\tproficiency = 0\n\t}\n\treturn TMSkill{\n\t\tID: id,\n\t\tSkillID: skillID,\n\t\tTeamMemberID: teamMemberID,\n\t\tWishList: wishList,\n\t\tProficiency: proficiency,\n\t}\n}", "title": "" } ]
[ { "docid": "6ceb70af915eba72f0c537ace05b461f", "score": "0.77155244", "text": "func NewTMSkillDefaults(id, skillID, teamMemberID string) TMSkill {\n\treturn TMSkill{\n\t\tID: id,\n\t\tSkillID: skillID,\n\t\tTeamMemberID: teamMemberID,\n\t\tWishList: false,\n\t\tProficiency: 0,\n\t}\n}", "title": "" }, { "docid": "64ce60c9d206524b606a5a24df0c47f4", "score": "0.532192", "text": "func (t *TMSkill) SetProficiency(proficiency int) {\n\tif proficiency > 5 {\n\t\tproficiency = 5\n\t}\n\tif proficiency < 0 {\n\t\tproficiency = 0\n\t}\n\tt.Proficiency = proficiency\n}", "title": "" }, { "docid": "2ce0b09f5b4eb1c971307842df1495d9", "score": "0.5245901", "text": "func (c *TiCommunityBlunderbuss) setDefaults() {\n\tif c.GracePeriodDuration == 0 {\n\t\tc.GracePeriodDuration = defaultGracePeriodDuration\n\t}\n}", "title": "" }, { "docid": "b4ad289e570db4d14e344013650f4c5a", "score": "0.5129425", "text": "func (o *NvmeCollectionPerformanceMetricsGetParams) SetDefaults() {\n\tvar (\n\t\tintervalDefault = string(\"1h\")\n\n\t\treturnRecordsDefault = bool(true)\n\n\t\treturnTimeoutDefault = int64(15)\n\t)\n\n\tval := NvmeCollectionPerformanceMetricsGetParams{\n\t\tInterval: &intervalDefault,\n\t\tReturnRecords: &returnRecordsDefault,\n\t\tReturnTimeout: &returnTimeoutDefault,\n\t}\n\n\tval.timeout = o.timeout\n\tval.Context = o.Context\n\tval.HTTPClient = o.HTTPClient\n\t*o = val\n}", "title": "" }, { "docid": "b21a32ccf26ea48bc18b7c456955e653", "score": "0.51146466", "text": "func (o *GetDiskMetricsParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "b49cc792917bcd3073a6d79874c2ca7f", "score": "0.50149435", "text": "func (m *PrinterBase) SetDefaults(value PrinterDefaultsable)() {\n err := m.GetBackingStore().Set(\"defaults\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "de5dccb04de0b68e72f88945642e00a8", "score": "0.49959636", "text": "func TestTMSkill_GetProficiencyString(t *testing.T) {\n\ttmSkill := NewTMSkillDefaults(\"TMSkillID\", \"SkillID\", \"TeamMemberID\")\n\n\ttmSkill.SetProficiency(0)\n\tif tmSkill.GetProficiencyString() != \"Not Applicable\" {\n\t\tt.Error(\"method TMSkill.GetProficiency() failed to give correct \" +\n\t\t\t\"representation for Proficiency level 0.\")\n\t}\n\n\ttmSkill.SetProficiency(1)\n\tif tmSkill.GetProficiencyString() != \"Fundamentally Aware\" {\n\t\tt.Error(\"method TMSkill.GetProficiency() failed to give correct \" +\n\t\t\t\"representation for Proficiency level 1.\")\n\t}\n\n\ttmSkill.SetProficiency(2)\n\tif tmSkill.GetProficiencyString() != \"Novice\" {\n\t\tt.Error(\"method TMSkill.GetProficiency() failed to give correct \" +\n\t\t\t\"representation for Proficiency level 2.\")\n\t}\n\n\ttmSkill.SetProficiency(3)\n\tif tmSkill.GetProficiencyString() != \"Intermediate\" {\n\t\tt.Error(\"method TMSkill.GetProficiency() failed to give correct \" +\n\t\t\t\"representation for Proficiency level 3.\")\n\t}\n\n\ttmSkill.SetProficiency(4)\n\tif tmSkill.GetProficiencyString() != \"Advanced\" {\n\t\tt.Error(\"method TMSkill.GetProficiency() failed to give correct \" +\n\t\t\t\"representation for Proficiency level 4.\")\n\t}\n\n\ttmSkill.SetProficiency(5)\n\tif tmSkill.GetProficiencyString() != \"Expert\" {\n\t\tt.Error(\"method TMSkill.GetProficiency() failed to give correct \" +\n\t\t\t\"representation for Proficiency level 5.\")\n\t}\n\n\ttmSkill.Proficiency = 9000\n\tif tmSkill.GetProficiencyString() != \"No String Representation Available\" {\n\t\tt.Error(\"method TMSkill.GetProficiency() failed to give correct \" +\n\t\t\t\"representation for Proficiency level outside range 0-5.\")\n\t}\n}", "title": "" }, { "docid": "f72db3d7b768f3ba05fd847efc08b787", "score": "0.4877728", "text": "func (o *CreateBatchParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "a787ce1f42e3f764a50858399c6a8257", "score": "0.4873372", "text": "func (o *FpolicyCreateParams) SetDefaults() {\n\tvar (\n\t\treturnRecordsDefault = bool(false)\n\t)\n\n\tval := FpolicyCreateParams{\n\t\tReturnRecords: &returnRecordsDefault,\n\t}\n\n\tval.timeout = o.timeout\n\tval.Context = o.Context\n\tval.HTTPClient = o.HTTPClient\n\t*o = val\n}", "title": "" }, { "docid": "561305d3206153b39256e2efc12faed0", "score": "0.48163393", "text": "func SetDefaults() {}", "title": "" }, { "docid": "5a9dfa3b81af83e2f0ae524258556a96", "score": "0.4800278", "text": "func (o *THSRAPIGeneralTimetable21221Params) SetDefaults() {\n\tvar (\n\t\tdollarTopDefault = int64(30)\n\t)\n\n\tval := THSRAPIGeneralTimetable21221Params{\n\t\tDollarTop: &dollarTopDefault,\n\t}\n\n\tval.timeout = o.timeout\n\tval.Context = o.Context\n\tval.HTTPClient = o.HTTPClient\n\t*o = val\n}", "title": "" }, { "docid": "d366aac70b27f1c07c76d26d5572dbc5", "score": "0.4783589", "text": "func (obj *RatchetGroupTicket) SetupDefaults() error {\n proxyResult := /*pr4*/C.vscr_ratchet_group_ticket_setup_defaults(obj.cCtx)\n\n err := RatchetErrorHandleStatus(proxyResult)\n if err != nil {\n return err\n }\n\n runtime.KeepAlive(obj)\n\n return nil\n}", "title": "" }, { "docid": "0f21535e3d3d2fb5bc9139067959caaa", "score": "0.4782219", "text": "func (o *PatchV1TicketingTicketsTicketIDParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "eb9017b5bf4f2e23131281011ccc66a8", "score": "0.4757509", "text": "func (o *InitializeGroupBackupParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "d1dd47340630e0d48bf4233ef08900d2", "score": "0.47339463", "text": "func (s *NotifTelegram) SetDefaults() {\n\t// noop\n}", "title": "" }, { "docid": "069d02be432cefe421737401ff312553", "score": "0.47087196", "text": "func NewOutOfMemoryThresholdsWithDefaults() *OutOfMemoryThresholds {\n\tthis := OutOfMemoryThresholds{}\n\treturn &this\n}", "title": "" }, { "docid": "a8af8b74e33df5d4f6b8a8c424c5a532", "score": "0.47064367", "text": "func (o *GetDevicesDeviceidBackupsBackupidParams) SetDefaults() {\n\tvar (\n\t\treplaceUnmsKeyDefault = bool(false)\n\t)\n\n\tval := GetDevicesDeviceidBackupsBackupidParams{\n\t\tReplaceUnmsKey: &replaceUnmsKeyDefault,\n\t}\n\n\tval.timeout = o.timeout\n\tval.Context = o.Context\n\tval.HTTPClient = o.HTTPClient\n\t*o = val\n}", "title": "" }, { "docid": "aa9f766da333bdd1e4e5dcfc1f3c6073", "score": "0.46967897", "text": "func Defaults(r *gomatrixserverlib.MSC2946SpacesRequest) {\n\tr.Limit = 2000\n\tr.MaxRoomsPerSpace = -1\n}", "title": "" }, { "docid": "f7cc1542271d7711c64cf59599b90068", "score": "0.46703282", "text": "func (o *MachinePxeParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "24e1459a6a2d127d2a864c5ca7896d73", "score": "0.46696338", "text": "func (o *GetCheckMetricDataParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "64a71dbbaf2af1155b0a061bb329278f", "score": "0.46369684", "text": "func (o *PostFlagWorkflowWorkflowIDParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "036c3ebf12feab6829fa90eb79fc8e21", "score": "0.4632003", "text": "func (o *PatchV1IntegrationsAwsCloudtrailBatchesIDParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "23372112bd50ab4beb1a16fbd30694ef", "score": "0.46286863", "text": "func (o *CreatePartitionParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "ec345843646f0dac4228687a15249447", "score": "0.46160161", "text": "func setDefaults(d *DeadlinesConfig) {\n\tfor i, deadline := range d.Deadlines {\n\t\tif deadline.DeadlineTimeFormat == \"\" {\n\t\t\td.Deadlines[i].DeadlineTimeFormat = DefaultDeadlineTimeFormat\n\t\t}\n\t\tif deadline.Threshold == 0 {\n\t\t\td.Deadlines[i].Threshold = DefaultThreshold\n\t\t}\n\t\tif deadline.ThresholdType == \"\" {\n\t\t\td.Deadlines[i].ThresholdType = DefaultThresholdType\n\t\t}\n\t}\n}", "title": "" }, { "docid": "03d48f7a3cd304ffb8aa9ab8ce0156dd", "score": "0.46057367", "text": "func (t TMSkill) NewTMSkillDTO(skillName, teamMemberName string) TMSkillDTO {\n\treturn TMSkillDTO{\n\t\tTMSkill: t,\n\t\tSkillName: skillName,\n\t\tTeamMemberName: teamMemberName,\n\t}\n}", "title": "" }, { "docid": "3cd0d415be8dea7a43b28a7cc8bcd1e5", "score": "0.4603236", "text": "func (o *StorageServiceStopDaemonPostParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "36a65dbd0e9a59dfc63fb1e09fbb100c", "score": "0.45960957", "text": "func (o *ListTasksParams) SetDefaults() {\n\tvar (\n\t\tpageSizeDefault = int32(20)\n\t)\n\n\tval := ListTasksParams{\n\t\tPageSize: &pageSizeDefault,\n\t}\n\n\tval.timeout = o.timeout\n\tval.Context = o.Context\n\tval.HTTPClient = o.HTTPClient\n\t*o = val\n}", "title": "" }, { "docid": "ca531372c8de9ac8bf398dd8aeb4edd5", "score": "0.45853457", "text": "func (o *FindTodosParams) SetDefaults() {\n\tvar (\n\t\tlimitDefault = int32(20)\n\t)\n\n\tval := FindTodosParams{\n\t\tLimit: &limitDefault,\n\t}\n\n\tval.timeout = o.timeout\n\tval.Context = o.Context\n\tval.HTTPClient = o.HTTPClient\n\t*o = val\n}", "title": "" }, { "docid": "57c46a225086aa7d71b33b7fcf6b5e67", "score": "0.45657393", "text": "func (o *GetPacketAnalyzerParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "1400ebfd3ef007471e08c108329000c4", "score": "0.4560887", "text": "func (o *AllocateSpecificIPParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "3bc1975d28d57dc126bebf3c59cf604a", "score": "0.45597303", "text": "func (o *GetMitreReportParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "7e04cdab00626eeb59ea604592369b52", "score": "0.45508602", "text": "func (o *GroupUpdatesParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "87514887bacfc29626a613b81be74b6d", "score": "0.45284548", "text": "func (o *PcloudSppplacementgroupsMembersPostParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "0850790d67e2f4399bcd0b852168c750", "score": "0.4521495", "text": "func (o *PostUserPasswordResetParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "4b6e210eb5c4acc8d463a4ec216aa2d7", "score": "0.45060748", "text": "func (o *GetRealBrowserPerformanceKPIsParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "fe835b72109a33b8820ba14c82627a3e", "score": "0.44954672", "text": "func (f *Fn) SetDefaults() {\n\n\tif f.Memory == 0 {\n\t\tf.Memory = DefaultMemory\n\t}\n\n\tif f.Config == nil {\n\t\t// keeps the json from being nil\n\t\tf.Config = map[string]string{}\n\t}\n\n\tif f.Timeout == 0 {\n\t\tf.Timeout = DefaultTimeout\n\t}\n\n\tif f.IdleTimeout == 0 {\n\t\tf.IdleTimeout = DefaultIdleTimeout\n\t}\n\n\tif time.Time(f.CreatedAt).IsZero() {\n\t\tf.CreatedAt = common.DateTime(time.Now())\n\t}\n\n\tif time.Time(f.UpdatedAt).IsZero() {\n\t\tf.UpdatedAt = common.DateTime(time.Now())\n\t}\n}", "title": "" }, { "docid": "ee9817716fd126203d653f42d6206ba4", "score": "0.44901502", "text": "func (o *PutInstallationsIDMacParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "8ca4cc2232f33cb7353df7e7a2ce7c4b", "score": "0.44901168", "text": "func (o *CreateIOCParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "b02caa8b545d60c47defddabb3701241", "score": "0.4450977", "text": "func (i *StaticMutableImage) SetDefaults() {\n\t// Set defaults\n\ti.interpolatorThreshold = int64(config.GetInstance().Images.InterpolatorThreshold)\n}", "title": "" }, { "docid": "4becb1967c9c8b767f8f70919134d456", "score": "0.44418275", "text": "func (td *TensorDisp) Defaults() {\n\tif td.ColorMap == \"\" {\n\t\ttd.ColorMap = \"ColdHot\"\n\t\ttd.Background.SetName(\"white\")\n\t}\n\tif td.Range.Max == 0 && td.Range.Min == 0 {\n\t\ttd.Range.SetMin(-1)\n\t\ttd.Range.SetMax(1)\n\t}\n\tif td.GridMinSize.Val == 0 {\n\t\ttd.GridMinSize.Set(4, units.Px)\n\t}\n\tif td.GridMaxSize.Val == 0 {\n\t\ttd.GridMaxSize.Set(2, units.Em)\n\t}\n\tif td.TotPrefSize.Val == 0 {\n\t\ttd.TotPrefSize.Set(20, units.Em)\n\t}\n\tif td.GridFill == 0 {\n\t\ttd.GridFill = 0.9\n\t\ttd.DimExtra = 0.3\n\t}\n\tif td.FontSize == 0 {\n\t\ttd.FontSize = 24\n\t}\n}", "title": "" }, { "docid": "74e16e1e85731730dbd07faa08dd0bc8", "score": "0.44408065", "text": "func Xposix_spawnattr_setsigdefault(tls TLS, _attr uintptr /* *Tposix_spawnattr_t = struct{F__...;F__pol int32;F__pad [16]int32;} */, _def uintptr /* *Tsigset_t = struct{F__bits [16]uint64;} */) (r int32) {\n\t*(*struct{ F__bits [16]uint64 })(unsafe.Pointer(_attr + 8)) = *(*struct{ F__bits [16]uint64 })(unsafe.Pointer(_def))\n\treturn int32(0)\n}", "title": "" }, { "docid": "4b33ffa93206c4b37e1f9fb8f2086cc4", "score": "0.44135514", "text": "func NewGuestCPULimitThresholdsWithDefaults() *GuestCPULimitThresholds {\n\tthis := GuestCPULimitThresholds{}\n\treturn &this\n}", "title": "" }, { "docid": "e6ca1ea0c5ff4371403ebe073ba48b50", "score": "0.4410531", "text": "func (o *PetDeleteParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "f46bbe4208b14b02a66dc9001b9c5a91", "score": "0.4403535", "text": "func (o *PostReplicationExecutionsParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "46ccaefe0dcbdc2b4759db81bc5414c4", "score": "0.43942866", "text": "func (o *GetNmsBackupsBackupidDownloadtokenParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "5ae581dbe51d4719e49ad09f7bf6aa9b", "score": "0.43915516", "text": "func (o *UpdateTCPLbParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "dd3c707c54b13268ea65087973815472", "score": "0.43903404", "text": "func (o *GetImagesParams) SetDefaults() {\n\tvar (\n\t\tallowUnstableDefault = bool(false)\n\n\t\tlimitDefault = int64(50)\n\n\t\tpageDefault = int64(1)\n\t)\n\n\tval := GetImagesParams{\n\t\tAllowUnstable: &allowUnstableDefault,\n\t\tLimit: &limitDefault,\n\t\tPage: &pageDefault,\n\t}\n\n\tval.timeout = o.timeout\n\tval.Context = o.Context\n\tval.HTTPClient = o.HTTPClient\n\t*o = val\n}", "title": "" }, { "docid": "05f0d3e1ca8be9cd8c8b3df982f68935", "score": "0.4388788", "text": "func (o *LunCollectionGetParams) SetDefaults() {\n\tvar (\n\t\treturnRecordsDefault = bool(true)\n\n\t\treturnTimeoutDefault = int64(15)\n\t)\n\n\tval := LunCollectionGetParams{\n\t\tReturnRecords: &returnRecordsDefault,\n\t\tReturnTimeout: &returnTimeoutDefault,\n\t}\n\n\tval.timeout = o.timeout\n\tval.Context = o.Context\n\tval.HTTPClient = o.HTTPClient\n\t*o = val\n}", "title": "" }, { "docid": "68305489aefc3dd7daad97b8395ce0c4", "score": "0.43844682", "text": "func (o *LogComputerBackupParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "09e44a4a2deea758c1437260685bb316", "score": "0.43767938", "text": "func (o *SnaplockRetentionPolicyDeleteParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "83320f083fc8a78c08e657158136a30b", "score": "0.43760866", "text": "func (o *GetTvlpResultParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "4780667ddfdbc03db688c44fcd1f8e23", "score": "0.4366226", "text": "func SetDefaultDuration(key string, value time.Duration) {\n if !IssetKey(key) {\n SetDuration(key, value)\n }\n}", "title": "" }, { "docid": "840fe898d78ff3f02b19042d86b8a5e6", "score": "0.43657628", "text": "func NewMatchingDowntimeWithDefaults() *MatchingDowntime {\n\tthis := MatchingDowntime{}\n\treturn &this\n}", "title": "" }, { "docid": "fb5e5d27cad81b6e8ec71d719b6f4feb", "score": "0.43622586", "text": "func NewUpdateSettingsKrb5DefaultsDefault(code int) *UpdateSettingsKrb5DefaultsDefault {\n\treturn &UpdateSettingsKrb5DefaultsDefault{\n\t\t_statusCode: code,\n\t}\n}", "title": "" }, { "docid": "395935573295a5dea43963b748f9459c", "score": "0.43620118", "text": "func (o *BounceParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "5e181289daf24eb4f3df57e059f65e16", "score": "0.43548846", "text": "func (o *IpsecPolicyCollectionGetParams) SetDefaults() {\n\tvar (\n\t\treturnRecordsDefault = bool(true)\n\n\t\treturnTimeoutDefault = int64(15)\n\t)\n\n\tval := IpsecPolicyCollectionGetParams{\n\t\tReturnRecords: &returnRecordsDefault,\n\t\tReturnTimeout: &returnTimeoutDefault,\n\t}\n\n\tval.timeout = o.timeout\n\tval.Context = o.Context\n\tval.HTTPClient = o.HTTPClient\n\t*o = val\n}", "title": "" }, { "docid": "0e3adaa487283269da3576791251259e", "score": "0.4351314", "text": "func (o *DcimRacksElevationParams) SetDefaults() {\n\tvar (\n\t\texpandDevicesDefault = bool(true)\n\n\t\tfaceDefault = string(\"front\")\n\n\t\tincludeImagesDefault = bool(true)\n\n\t\tlegendWidthDefault = int64(30)\n\n\t\trenderDefault = string(\"json\")\n\n\t\tunitHeightDefault = int64(22)\n\n\t\tunitWidthDefault = int64(220)\n\t)\n\n\tval := DcimRacksElevationParams{\n\t\tExpandDevices: &expandDevicesDefault,\n\t\tFace: &faceDefault,\n\t\tIncludeImages: &includeImagesDefault,\n\t\tLegendWidth: &legendWidthDefault,\n\t\tRender: &renderDefault,\n\t\tUnitHeight: &unitHeightDefault,\n\t\tUnitWidth: &unitWidthDefault,\n\t}\n\n\tval.timeout = o.timeout\n\tval.Context = o.Context\n\tval.HTTPClient = o.HTTPClient\n\t*o = val\n}", "title": "" }, { "docid": "dfbc811579b0e85326f52d5a6b21a5c7", "score": "0.43502975", "text": "func (t *EntryPointsTransport) SetDefaults() {\n\tt.LifeCycle = &LifeCycle{}\n\tt.LifeCycle.SetDefaults()\n\tt.RespondingTimeouts = &RespondingTimeouts{}\n\tt.RespondingTimeouts.SetDefaults()\n}", "title": "" }, { "docid": "cc3b69da5900be52a48e2a6789a6a0ac", "score": "0.43445137", "text": "func (o *MultiAdminVerifyRequestModifyParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "a456a5cb1e247cd567cc812499f9e6d1", "score": "0.4343596", "text": "func (o *MetroclusterSvmCollectionGetParams) SetDefaults() {\n\tvar (\n\t\treturnRecordsDefault = bool(true)\n\n\t\treturnTimeoutDefault = int64(15)\n\t)\n\n\tval := MetroclusterSvmCollectionGetParams{\n\t\tReturnRecords: &returnRecordsDefault,\n\t\tReturnTimeout: &returnTimeoutDefault,\n\t}\n\n\tval.timeout = o.timeout\n\tval.Context = o.Context\n\tval.HTTPClient = o.HTTPClient\n\t*o = val\n}", "title": "" }, { "docid": "585a7a5ab709058bdd7f86545a8624d3", "score": "0.43338463", "text": "func (o *GetZonesParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "ef217c287dd9eb5d9a5b83924b229a5e", "score": "0.43306252", "text": "func (o *RetrieveCashDrawerShiftParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "c6a8a94d210486f64f96dca55342a2fd", "score": "0.43288818", "text": "func (o *MetroclusterDrGroupCollectionGetParams) SetDefaults() {\n\tvar (\n\t\treturnRecordsDefault = bool(true)\n\n\t\treturnTimeoutDefault = int64(15)\n\t)\n\n\tval := MetroclusterDrGroupCollectionGetParams{\n\t\tReturnRecords: &returnRecordsDefault,\n\t\tReturnTimeout: &returnTimeoutDefault,\n\t}\n\n\tval.timeout = o.timeout\n\tval.Context = o.Context\n\tval.HTTPClient = o.HTTPClient\n\t*o = val\n}", "title": "" }, { "docid": "742318976088d7340e28c9afd1ebf93b", "score": "0.43245512", "text": "func (vc *VnetClassSpec) setDefaults() {\n\tif len(vc.CIDRBlocks) == 0 {\n\t\tvc.CIDRBlocks = []string{DefaultVnetCIDR}\n\t}\n}", "title": "" }, { "docid": "1302f27b09a840c5422ba04c8613c6ef", "score": "0.43241265", "text": "func (c *SchemaController) SetDefaults(ctx *app.SetDefaultsSchemaContext) error {\n\terr := c.store.StoreDefaultValues(ctx.Name)\n\tif err == store.ErrMissingKey {\n\t\treturn ctx.NotFound()\n\t} else if err != nil {\n\t\tctx.Logger.Error(err.Error())\n\t\treturn ctx.InternalServerError()\n\t}\n\n\treturn ctx.NotFound()\n}", "title": "" }, { "docid": "05ce3162db6c5d9d2cd16a1a7d8f32a5", "score": "0.43173984", "text": "func NomadDefaults() *Set {\n\treturn New(extractLiteral.FindAllString(HCLSpecLiteral, -1))\n}", "title": "" }, { "docid": "4db39961812b9439d311d0405a2b875b", "score": "0.4309446", "text": "func (o *SubmitProcessorVerificationRequestParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "e764f3a21cde77326796efbba30b57e6", "score": "0.43086693", "text": "func (mc *MetricCreate) defaults() {\n\tif _, ok := mc.mutation.CreatedAt(); !ok {\n\t\tv := metric.DefaultCreatedAt()\n\t\tmc.mutation.SetCreatedAt(v)\n\t}\n\tif _, ok := mc.mutation.UpdatedAt(); !ok {\n\t\tv := metric.DefaultUpdatedAt()\n\t\tmc.mutation.SetUpdatedAt(v)\n\t}\n\tif _, ok := mc.mutation.DeletedAt(); !ok {\n\t\tv := metric.DefaultDeletedAt()\n\t\tmc.mutation.SetDeletedAt(v)\n\t}\n}", "title": "" }, { "docid": "07343b9c306f94b1562ca1d3f996d1da", "score": "0.43018726", "text": "func (o *CreateEncryptionKeyParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "b7e9e76d7d4a483314be31b7cc27c99f", "score": "0.42934483", "text": "func (o *SplitStatusCollectionGetParams) SetDefaults() {\n\tvar (\n\t\treturnRecordsDefault = bool(true)\n\n\t\treturnTimeoutDefault = int64(15)\n\t)\n\n\tval := SplitStatusCollectionGetParams{\n\t\tReturnRecords: &returnRecordsDefault,\n\t\tReturnTimeout: &returnTimeoutDefault,\n\t}\n\n\tval.timeout = o.timeout\n\tval.Context = o.Context\n\tval.HTTPClient = o.HTTPClient\n\t*o = val\n}", "title": "" }, { "docid": "fcd3663bf523212958376aa539a19db7", "score": "0.4288115", "text": "func (s *MonitoringSpec) SetDefaults(defaultTokenSecretName string) {\n\tif s.GetTokenSecretName() == \"\" {\n\t\t// Note that we don't check for nil here, since even a specified, but empty\n\t\t// string should result in the default value.\n\t\ts.TokenSecretName = util.NewType[string](defaultTokenSecretName)\n\t}\n}", "title": "" }, { "docid": "b2a81b7ba8189f0063470f1830d878ed", "score": "0.42764443", "text": "func NewDefaults() *AppServer {\n\treturn New(\"development\", \"\")\n}", "title": "" }, { "docid": "55d9978c3372de8b1ef76a140793195e", "score": "0.42694083", "text": "func (o *LunAttributeDeleteParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "289262fd48e9a3707f65b683e45688b5", "score": "0.42643696", "text": "func SetDefaultTimeout(controlName string, defaultTimeout int) {\n setDefaultTimeout(controlName, defaultTimeout)\n}", "title": "" }, { "docid": "ef3fd0de79d1a116c7493de05b942969", "score": "0.4254567", "text": "func (o *UpdateSubscriptionQuantityParams) SetDefaults() {\n\tvar (\n\t\tforceNewQuantityWithPastEffectiveDateDefault = bool(false)\n\t)\n\n\tval := UpdateSubscriptionQuantityParams{\n\t\tForceNewQuantityWithPastEffectiveDate: &forceNewQuantityWithPastEffectiveDateDefault,\n\t}\n\n\tval.timeout = o.timeout\n\tval.Context = o.Context\n\tval.HTTPClient = o.HTTPClient\n\t*o = val\n}", "title": "" }, { "docid": "94c9e4557ecc36b633b8c3e8d009a82b", "score": "0.4250591", "text": "func (o *PetUpdateParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "10dacc61957cdac83119442971a95350", "score": "0.42502192", "text": "func (o *JobCollectionGetParams) SetDefaults() {\n\tvar (\n\t\treturnRecordsDefault = bool(true)\n\n\t\treturnTimeoutDefault = int64(15)\n\t)\n\n\tval := JobCollectionGetParams{\n\t\tReturnRecords: &returnRecordsDefault,\n\t\tReturnTimeout: &returnTimeoutDefault,\n\t}\n\n\tval.timeout = o.timeout\n\tval.Context = o.Context\n\tval.HTTPClient = o.HTTPClient\n\t*o = val\n}", "title": "" }, { "docid": "15494959a7cb00eaeabcd882a96084ea", "score": "0.42411923", "text": "func SetDefaults_AWSMachineSpec(obj *AWSMachineSpec) { //nolint:golint,stylecheck\n\tif obj.InstanceMetadataOptions == nil {\n\t\tobj.InstanceMetadataOptions = &InstanceMetadataOptions{}\n\t}\n\tobj.InstanceMetadataOptions.SetDefaults()\n}", "title": "" }, { "docid": "93cf7224cb33d1ce79f3e00309c19a10", "score": "0.42339376", "text": "func (vb *ViewBox) Defaults() {\n\tvb.Min = gi.Vec2DZero\n\tvb.Size = gi.Vec2DZero\n\tvb.PreserveAspectRatio.Align = None\n\tvb.PreserveAspectRatio.MeetOrSlice = Meet\n}", "title": "" }, { "docid": "df0e7e527754c1bbbc53adcec2dc2d5d", "score": "0.42285612", "text": "func (b *Base) SetDefaults(namespace string) {\n\t// Use the Jenkins X type by default\n\tif b.Agent == \"\" {\n\t\tb.Agent = JenkinsXAgent\n\t}\n\tif b.Namespace == nil || *b.Namespace == \"\" {\n\t\ts := namespace\n\t\tb.Namespace = &s\n\t}\n\tif b.Cluster == \"\" {\n\t\tb.Cluster = DefaultClusterAlias\n\t}\n}", "title": "" }, { "docid": "147328c6a6c53e8be0f33ffd2747f2c5", "score": "0.4222447", "text": "func (release *Release) SetDefaults() {\n\t// Overwrite WaitForHealthy to be Min 15 seconds, Max 5 minutes\n\twaitForHealthy := 120\n\tswitch {\n\tcase *release.Timeout < 1800:\n\t\t// Under 30 mins check every 15 seconds\n\t\twaitForHealthy = 15\n\tcase *release.Timeout < 7200:\n\t\t// Under 2 hour check every 60 seconds\n\t\twaitForHealthy = 60\n\t}\n\n\trelease.WaitForHealthy = to.Intp(waitForHealthy)\n\n\tif release.Healthy == nil {\n\t\trelease.Healthy = to.Boolp(false)\n\t}\n\n\tfor name, lc := range release.LifeCycleHooks {\n\t\tif lc != nil {\n\t\t\tlc.SetDefaults(release.AwsRegion, release.AwsAccountID, name)\n\t\t}\n\t}\n\n\tfor name, service := range release.Services {\n\t\tif service != nil {\n\t\t\tservice.SetDefaults(release, name)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "a0f81e62c284071d7aaf56464ad3698f", "score": "0.4212648", "text": "func (o *GetSegmentEffortStreamsParams) SetDefaults() {\n\tvar (\n\t\tkeyByTypeDefault = bool(true)\n\t)\n\n\tval := GetSegmentEffortStreamsParams{\n\t\tKeyByType: keyByTypeDefault,\n\t}\n\n\tval.timeout = o.timeout\n\tval.Context = o.Context\n\tval.HTTPClient = o.HTTPClient\n\t*o = val\n}", "title": "" }, { "docid": "ef510c4ad6c4fa60049fbfdc8e30495c", "score": "0.42093715", "text": "func (lc *LabelCreate) defaults() error {\n\tif _, ok := lc.mutation.CreateTime(); !ok {\n\t\tif label.DefaultCreateTime == nil {\n\t\t\treturn fmt.Errorf(\"ent: uninitialized label.DefaultCreateTime (forgotten import ent/runtime?)\")\n\t\t}\n\t\tv := label.DefaultCreateTime()\n\t\tlc.mutation.SetCreateTime(v)\n\t}\n\tif _, ok := lc.mutation.UpdateTime(); !ok {\n\t\tif label.DefaultUpdateTime == nil {\n\t\t\treturn fmt.Errorf(\"ent: uninitialized label.DefaultUpdateTime (forgotten import ent/runtime?)\")\n\t\t}\n\t\tv := label.DefaultUpdateTime()\n\t\tlc.mutation.SetUpdateTime(v)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8b6695448a8555146a12cf81ca5a2a88", "score": "0.4208939", "text": "func (o *SvmMigrationVolumeGetParams) SetDefaults() {\n\tvar (\n\t\treturnRecordsDefault = bool(true)\n\n\t\treturnTimeoutDefault = int64(15)\n\t)\n\n\tval := SvmMigrationVolumeGetParams{\n\t\tReturnRecords: &returnRecordsDefault,\n\t\tReturnTimeout: &returnTimeoutDefault,\n\t}\n\n\tval.timeout = o.timeout\n\tval.Context = o.Context\n\tval.HTTPClient = o.HTTPClient\n\t*o = val\n}", "title": "" }, { "docid": "58b2cc79ad46fe2c505e45c027631efb", "score": "0.41937366", "text": "func (o *PostHostAnnounceParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "5fc743ae0fc4b3d3572c730e737a1836", "score": "0.4193209", "text": "func (o *PutUsersUserIDCliSecretParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "a5bbf651df46f496de38a2344851f71e", "score": "0.41917104", "text": "func (o *CreatePeerFolderParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "dcc21203a5c84ac0fea046a59bcdd2ff", "score": "0.41743898", "text": "func (o *GetCPUArchitectureParams) SetDefaults() {\n\tvar (\n\t\tallowUnstableDefault = bool(false)\n\t)\n\n\tval := GetCPUArchitectureParams{\n\t\tAllowUnstable: &allowUnstableDefault,\n\t}\n\n\tval.timeout = o.timeout\n\tval.Context = o.Context\n\tval.HTTPClient = o.HTTPClient\n\t*o = val\n}", "title": "" }, { "docid": "9aad9b036c29176ab521aa5ade3cc8a6", "score": "0.4173501", "text": "func (o *StakeholderFindListParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "fcf85e913733dfdb67746847d238d7d5", "score": "0.41680446", "text": "func (o *ScanSamplesParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "20cfcf7f4f206ad43e706f6bede3b1c2", "score": "0.4166778", "text": "func SetDefaults(cc *Config) error {\n\tvar emptyMap interface{} = map[interface{}]interface{}{}\n\terrs := cr.Struct(cc, emptyMap, Validation)\n\tif errors.HasError(errs) {\n\t\treturn errors.FirstError(errs...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "32c475c2bf51373572a4ed06b974aef6", "score": "0.4161534", "text": "func (s *Space) SetDefaultValues() {\n\ts.Followers = []primitive.ObjectID{}\n\ts.Admins = []primitive.ObjectID{}\n\ts.Moderators = []primitive.ObjectID{}\n\ts.Contributors = []primitive.ObjectID{}\n\ts.Posts = []primitive.ObjectID{}\n\ts.Topics = []primitive.ObjectID{}\n\ts.Icon = \"https://kora-s3-bucket.s3.us-east-2.amazonaws.com/images/default-space-icon.png\"\n\ts.CoverPhoto = \"https://kora-s3-bucket.s3.us-east-2.amazonaws.com/images/default-space-cover.png\"\n\ts.CreatedAt = time.Now()\n\ts.UpdatedAt = time.Now()\n}", "title": "" }, { "docid": "7048698d48f71603fd4dfce983c0b66d", "score": "0.41601405", "text": "func SetDefaultLimitsForYAMLUnmarshalling(defaults Limits) {\n\tdefaultLimits = &defaults\n}", "title": "" }, { "docid": "a852478e2cadabaaf1a9d65b18787d14", "score": "0.41573536", "text": "func (o *DefaultThemeParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "be2ff801054dbf470348f0f194e0af38", "score": "0.4143339", "text": "func (m *MultiMessageType) SetDefault() {\n\tif len([]ptp.MessageType(*m)) != 0 {\n\t\treturn\n\t}\n\tfor _, v := range m.GetDefaults() {\n\t\t*m = append([]ptp.MessageType(*m), v)\n\t}\n}", "title": "" }, { "docid": "57f9cf7abda0fdcb194deac323c8bd0c", "score": "0.41414255", "text": "func (kpc *K8sPodCreate) defaults() {\n\tif _, ok := kpc.mutation.CreatedAt(); !ok {\n\t\tv := k8spod.DefaultCreatedAt()\n\t\tkpc.mutation.SetCreatedAt(v)\n\t}\n\tif _, ok := kpc.mutation.UpdatedAt(); !ok {\n\t\tv := k8spod.DefaultUpdatedAt()\n\t\tkpc.mutation.SetUpdatedAt(v)\n\t}\n\tif _, ok := kpc.mutation.DeletedAt(); !ok {\n\t\tv := k8spod.DefaultDeletedAt()\n\t\tkpc.mutation.SetDeletedAt(v)\n\t}\n}", "title": "" }, { "docid": "e917597ecb8bbd41f8fbd7c622cadb38", "score": "0.41354698", "text": "func (o *ListPacketGeneratorResultsParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "ceb01ed15fac64217b6f373104231f19", "score": "0.41352206", "text": "func (o *AddTagParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "f8d0a6ad9cd239c50ef7b874e7cbb3dd", "score": "0.41284162", "text": "func (o *DeleteDraftByIDUsingDELETEParams) SetDefaults() {\n\tvar (\n\t\ttypeVarDefault = string(\"all\")\n\t)\n\n\tval := DeleteDraftByIDUsingDELETEParams{\n\t\tType: typeVarDefault,\n\t}\n\n\tval.timeout = o.timeout\n\tval.Context = o.Context\n\tval.HTTPClient = o.HTTPClient\n\t*o = val\n}", "title": "" }, { "docid": "3d295e2da8fa4a9a41b3cfb2c2bd78d1", "score": "0.41252849", "text": "func (o *GetBgpPeersParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" } ]
ede3a63532b9008481d742eacd487a22
ExitXpath is called when production xpath is exited.
[ { "docid": "46db6b3eaaa634c47fafb8276f8455db", "score": "0.8967957", "text": "func (s *BaseXPath31Listener) ExitXpath(ctx *XpathContext) {}", "title": "" } ]
[ { "docid": "2d0707f990421645a23f907eca4baf81", "score": "0.73114777", "text": "func (s *BaseXPath31Listener) ExitStepexpr(ctx *StepexprContext) {}", "title": "" }, { "docid": "0ba01c3a0aa9a2dc17ecfa5486ad65f5", "score": "0.7184598", "text": "func (s *BaseXPath31Listener) ExitPathexpr(ctx *PathexprContext) {}", "title": "" }, { "docid": "6768c52f0599589f127ca745f2569b51", "score": "0.71044624", "text": "func (s *BaseXPath31Listener) ExitOrexpr(ctx *OrexprContext) {}", "title": "" }, { "docid": "0e0dd292d9fd7d68bb1bf394b6041e6a", "score": "0.70470446", "text": "func (s *BaseXPath31Listener) ExitContextitemexpr(ctx *ContextitemexprContext) {}", "title": "" }, { "docid": "1781c00ce19d73c1758442fa846bffa2", "score": "0.7030096", "text": "func (s *BaseXPath31Listener) ExitForexpr(ctx *ForexprContext) {}", "title": "" }, { "docid": "40fcff0b40d658ee47ab2fff484116df", "score": "0.70178443", "text": "func (s *BaseXPath31Listener) ExitMaptest(ctx *MaptestContext) {}", "title": "" }, { "docid": "e42a525874f1943bc8094a443d245311", "score": "0.6986231", "text": "func (s *BaseXPath31Listener) ExitAndexpr(ctx *AndexprContext) {}", "title": "" }, { "docid": "2146ef4991858274a643dfc8dae873a5", "score": "0.6976582", "text": "func (s *BaseXPath31Listener) ExitTreatexpr(ctx *TreatexprContext) {}", "title": "" }, { "docid": "44addb14f1e1d4c7764540f5acb63671", "score": "0.6922472", "text": "func (s *BaseXPath31Listener) ExitLetexpr(ctx *LetexprContext) {}", "title": "" }, { "docid": "9aefc2f6952ba50f8cad3e0545049af6", "score": "0.6903129", "text": "func (s *BaseXPath31Listener) ExitAttributetest(ctx *AttributetestContext) {}", "title": "" }, { "docid": "ab6be2e8a89de4fe85b57ef439a81fee", "score": "0.6875096", "text": "func (s *BaseXPath31Listener) ExitElementtest(ctx *ElementtestContext) {}", "title": "" }, { "docid": "92a33ce951fa2435dc9fb9882d084134", "score": "0.68665797", "text": "func (s *BaseXPath31Listener) ExitPostfixexpr(ctx *PostfixexprContext) {}", "title": "" }, { "docid": "997fbf9102e0db7465719c074d055ae2", "score": "0.68486863", "text": "func (s *BaseXPath31Listener) ExitPitest(ctx *PitestContext) {}", "title": "" }, { "docid": "0311c5c2a2b5e5ec44cdd3409afe7f94", "score": "0.68269205", "text": "func (s *BaseXPath31Listener) ExitDocumenttest(ctx *DocumenttestContext) {}", "title": "" }, { "docid": "81df0c490e1f6d3acbbd04106c558ef3", "score": "0.67980266", "text": "func (s *BaseXPath31Listener) ExitSimplemapexpr(ctx *SimplemapexprContext) {}", "title": "" }, { "docid": "f1a5a0425b83c42a82382d759eb0ea65", "score": "0.6792696", "text": "func (s *BaseXPath31Listener) ExitAdditiveexpr(ctx *AdditiveexprContext) {}", "title": "" }, { "docid": "849373b4427f9510e79c03d8677f4900", "score": "0.6711882", "text": "func (s *BaseXPath31Listener) ExitAuxilary(ctx *AuxilaryContext) {}", "title": "" }, { "docid": "664c127785f8691563bf6a48b5d4b9c7", "score": "0.6666157", "text": "func (s *BaseXPath31Listener) ExitAttributename(ctx *AttributenameContext) {}", "title": "" }, { "docid": "886744371d81e4c4b908d58ba8b452ea", "score": "0.6660165", "text": "func (s *BaseXPath31Listener) ExitTexttest(ctx *TexttestContext) {}", "title": "" }, { "docid": "aded20360941d315bee7e01173c3c747", "score": "0.66492856", "text": "func (s *BaseXPath31Listener) ExitExpr(ctx *ExprContext) {}", "title": "" }, { "docid": "cd52217602b24695ea7871f589998d45", "score": "0.661983", "text": "func (s *BaseXPath31Listener) ExitFunctionitemexpr(ctx *FunctionitemexprContext) {}", "title": "" }, { "docid": "ab5657f134e8ef48f43f06e0c317ecdd", "score": "0.6604858", "text": "func (s *BaseXPath31Listener) ExitNodetest(ctx *NodetestContext) {}", "title": "" }, { "docid": "35a3909a80e54142a7c2544efd8f5a22", "score": "0.659407", "text": "func (s *BaseXPath31Listener) ExitRelativepathexpr(ctx *RelativepathexprContext) {}", "title": "" }, { "docid": "75ea613c52fcafcaa53ba30a78674868", "score": "0.65736556", "text": "func (s *BaseXPath31Listener) ExitParenthesizedexpr(ctx *ParenthesizedexprContext) {}", "title": "" }, { "docid": "dee3004649a93b92c1faaec1eb0ae244", "score": "0.65717596", "text": "func (s *BaseXPath31Listener) ExitArrowexpr(ctx *ArrowexprContext) {}", "title": "" }, { "docid": "709b5dc029bfc56f318e4cd3b913c172", "score": "0.65662485", "text": "func (s *BaseXPath31Listener) ExitAnymaptest(ctx *AnymaptestContext) {}", "title": "" }, { "docid": "167a1045e989c868ff7c9a38ad098d13", "score": "0.654961", "text": "func (s *BaseXPath31Listener) ExitPredicate(ctx *PredicateContext) {}", "title": "" }, { "docid": "727bbf86992d48c483f6f09a21a1f842", "score": "0.64838296", "text": "func (s *BaseXPath31Listener) ExitAxisstep(ctx *AxisstepContext) {}", "title": "" }, { "docid": "e1f19e43232ed540d4570d28f9127f30", "score": "0.64813143", "text": "func (s *BaseXPath31Listener) ExitEnclosedexpr(ctx *EnclosedexprContext) {}", "title": "" }, { "docid": "d952cfbc35f91ba45241ad22de71baf5", "score": "0.64572835", "text": "func (s *BaseXPath31Listener) ExitElementname(ctx *ElementnameContext) {}", "title": "" }, { "docid": "a986348d29831f76f82eddf9c761296b", "score": "0.6456746", "text": "func (s *BaseXPath31Listener) ExitElementdeclaration(ctx *ElementdeclarationContext) {}", "title": "" }, { "docid": "9b358e0e5d71dbb4a06439a324a0c904", "score": "0.6452551", "text": "func (s *BaseXPath31Listener) ExitAnykindtest(ctx *AnykindtestContext) {}", "title": "" }, { "docid": "83a1bbceeb95a2910f38f1f0ffa34270", "score": "0.6452419", "text": "func (s *BaseXPath31Listener) ExitAttributedeclaration(ctx *AttributedeclarationContext) {}", "title": "" }, { "docid": "48312d7903273139de2da14ab2ef33d9", "score": "0.6438399", "text": "func (s *BaseXPath31Listener) ExitAnyfunctiontest(ctx *AnyfunctiontestContext) {}", "title": "" }, { "docid": "d888875c8df429d29917771e0284db92", "score": "0.6429112", "text": "func (s *BaseXPath31Listener) ExitPrimaryexpr(ctx *PrimaryexprContext) {}", "title": "" }, { "docid": "07f7f1b361cc594d148c52ea5d488b4d", "score": "0.63828015", "text": "func (s *BaseXPath31Listener) ExitInlinefunctionexpr(ctx *InlinefunctionexprContext) {}", "title": "" }, { "docid": "a8980b521f9c73059adf8729aa4192a7", "score": "0.63811934", "text": "func (s *BaseXPath31Listener) ExitIfexpr(ctx *IfexprContext) {}", "title": "" }, { "docid": "5f841478ff4f5253503464195bf1561c", "score": "0.63784486", "text": "func (s *BaseXPath31Listener) ExitRangeexpr(ctx *RangeexprContext) {}", "title": "" }, { "docid": "cb55e271874eacff57068448edf322a3", "score": "0.63559157", "text": "func (s *BaseXPath31Listener) ExitSchemaattributetest(ctx *SchemaattributetestContext) {}", "title": "" }, { "docid": "4a1f4fb13e0c2c4fc625f63ad0bd0c58", "score": "0.63385206", "text": "func (s *BaseXPath31Listener) ExitSchemaelementtest(ctx *SchemaelementtestContext) {}", "title": "" }, { "docid": "1fb76e344a2e45cc9bc31b4f08f65e97", "score": "0.6321983", "text": "func (s *BaseXPath31Listener) ExitLookup(ctx *LookupContext) {}", "title": "" }, { "docid": "82eef781788a58738bade9cf26b7f4df", "score": "0.6320267", "text": "func (s *BaseXPath31Listener) ExitExprsingle(ctx *ExprsingleContext) {}", "title": "" }, { "docid": "3d4921ebff6ce934abbcbf2cb1a5d7b4", "score": "0.6314554", "text": "func (s *BaseXPath31Listener) ExitReverseaxis(ctx *ReverseaxisContext) {}", "title": "" }, { "docid": "d81e0ff06d39888050e1e3a0a8e533ce", "score": "0.63132364", "text": "func (s *BaseXPath31Listener) ExitKindtest(ctx *KindtestContext) {}", "title": "" }, { "docid": "b8d008574ba6a4ca1be0599d11f1cc9f", "score": "0.6306948", "text": "func (s *BaseXPath31Listener) ExitReversestep(ctx *ReversestepContext) {}", "title": "" }, { "docid": "72060ec880ab254e49fa1918bda2052f", "score": "0.62881476", "text": "func (s *BaseXPath31Listener) ExitElementnameorwildcard(ctx *ElementnameorwildcardContext) {}", "title": "" }, { "docid": "48a9b7d7d9322654bc28bde08e068538", "score": "0.6284602", "text": "func (s *BaseXPath31Listener) ExitComparisonexpr(ctx *ComparisonexprContext) {}", "title": "" }, { "docid": "0f8b5e221ea5bd1585d993cdffbb17d4", "score": "0.6282682", "text": "func (s *BaseXPath31Listener) ExitUnaryexpr(ctx *UnaryexprContext) {}", "title": "" }, { "docid": "d4a97f266dff001930a208b35f97e2b3", "score": "0.627608", "text": "func (s *BaseXPath31Listener) ExitInstanceofexpr(ctx *InstanceofexprContext) {}", "title": "" }, { "docid": "d5fa5d005becaef1f279f2092f53f46a", "score": "0.62568146", "text": "func (s *BaseXPath31Listener) ExitQuantifiedexpr(ctx *QuantifiedexprContext) {}", "title": "" }, { "docid": "1f2db0e34eaf831f96558f356f794a06", "score": "0.62526727", "text": "func (s *BaseXPath31Listener) ExitWildcard(ctx *WildcardContext) {}", "title": "" }, { "docid": "588f46c8fad97c9df1e650ac0f1faf0c", "score": "0.6248961", "text": "func (s *BaseXPath31Listener) ExitVarref(ctx *VarrefContext) {}", "title": "" }, { "docid": "d6292d2e16eb99444bb03d1df4b1ab00", "score": "0.6222644", "text": "func (s *BaseXPath31Listener) ExitForwardstep(ctx *ForwardstepContext) {}", "title": "" }, { "docid": "5e404bcc5d541942ea82b796009871a3", "score": "0.6217776", "text": "func (s *BaseXPath31Listener) ExitOccurrenceindicator(ctx *OccurrenceindicatorContext) {}", "title": "" }, { "docid": "d0cca46bcc57be3a44fc99282a5393a5", "score": "0.6185957", "text": "func (s *BaseXPath31Listener) ExitFunctioncall(ctx *FunctioncallContext) {}", "title": "" }, { "docid": "92d89556f127d727608167dbfd30d845", "score": "0.618341", "text": "func (s *BaseXPath31Listener) ExitAnyarraytest(ctx *AnyarraytestContext) {}", "title": "" }, { "docid": "7a79a7d5ca0917d9cb083fa7f5e2b632", "score": "0.61002326", "text": "func (s *BaseXPath31Listener) ExitArgument(ctx *ArgumentContext) {}", "title": "" }, { "docid": "b54b09e593ab8009bef1803ec884b1d2", "score": "0.6095946", "text": "func (s *BaseXPath31Listener) ExitFunctionbody(ctx *FunctionbodyContext) {}", "title": "" }, { "docid": "fac348b75fcfa9e4f76aabfec066d85f", "score": "0.60683054", "text": "func (s *BaseXPath31Listener) ExitNodecomp(ctx *NodecompContext) {}", "title": "" }, { "docid": "b59b16aff2a103edd8221c414df58b94", "score": "0.6029966", "text": "func (s *BaseXPath31Listener) ExitIntersectexceptexpr(ctx *IntersectexceptexprContext) {}", "title": "" }, { "docid": "552be88b8e3455dddb999426de5517bb", "score": "0.6025937", "text": "func (s *BaseXPath31Listener) ExitEqname(ctx *EqnameContext) {}", "title": "" }, { "docid": "d7f8732d148a7af4f364e300bf2aae72", "score": "0.60245055", "text": "func (s *BaseXPath31Listener) ExitMapkeyexpr(ctx *MapkeyexprContext) {}", "title": "" }, { "docid": "c2012ebd7f05571d58bf0ecf731e2b36", "score": "0.59942806", "text": "func (s *BasePROV_NListener) ExitGenerationExpression(ctx *GenerationExpressionContext) {}", "title": "" }, { "docid": "8a232d4f117e83f6f44c366122ef6c04", "score": "0.59670436", "text": "func (s *BaseXPath31Listener) ExitFunctiontest(ctx *FunctiontestContext) {}", "title": "" }, { "docid": "967431473894995143674077c5f44fe5", "score": "0.5959317", "text": "func (s *BaseXPath31Listener) ExitNametest(ctx *NametestContext) {}", "title": "" }, { "docid": "bf05b9935a76073e8172b294eabdfd55", "score": "0.5945889", "text": "func (s *BaseXPath31Listener) ExitTypedmaptest(ctx *TypedmaptestContext) {}", "title": "" }, { "docid": "f933b43ff78b6f49ad90cb2c1cace3b8", "score": "0.59305024", "text": "func (s *BaseXPath31Listener) ExitTypename(ctx *TypenameContext) {}", "title": "" }, { "docid": "8cd786b974c6ca047593f1c0d0a08c3b", "score": "0.592179", "text": "func (s *BaseXPath31Listener) ExitMultiplicativeexpr(ctx *MultiplicativeexprContext) {}", "title": "" }, { "docid": "e6a0ecf10b1120ecb6387d998932c78d", "score": "0.5920866", "text": "func (s *BaseXPath31Listener) ExitVarname(ctx *VarnameContext) {}", "title": "" }, { "docid": "85c31851b8f41913d7d58fdcfc0fbc0c", "score": "0.5920118", "text": "func (s *BasePROV_NListener) ExitInvalidationExpression(ctx *InvalidationExpressionContext) {}", "title": "" }, { "docid": "b63b340b807b5c3847807840a1372f61", "score": "0.59185797", "text": "func (s *BaseXPath31Listener) ExitSimpleletclause(ctx *SimpleletclauseContext) {}", "title": "" }, { "docid": "e3c05cdd3a891a509f1df2ffe655f746", "score": "0.5916625", "text": "func (s *BaseXPath31Listener) ExitParenthesizeditemtype(ctx *ParenthesizeditemtypeContext) {}", "title": "" }, { "docid": "295d630e8ede63f9dbd49f349c2d2b98", "score": "0.58990407", "text": "func (s *BaseGoParserListener) ExitElement(ctx *ElementContext) {}", "title": "" }, { "docid": "4a1010137b28de410a86a5f909a359b9", "score": "0.5896516", "text": "func (s *BaseXPath31Listener) ExitCastexpr(ctx *CastexprContext) {}", "title": "" }, { "docid": "3b7c919255463e81fdb46d035417f2df", "score": "0.5869722", "text": "func (s *BaseXPath31Listener) ExitAbbrevforwardstep(ctx *AbbrevforwardstepContext) {}", "title": "" }, { "docid": "7dacf180bfe64c806a451d9e467f13da", "score": "0.5868281", "text": "func (s *BaseXPath31Listener) ExitForwardaxis(ctx *ForwardaxisContext) {}", "title": "" }, { "docid": "2040b0643042f2d93fe988f2539afa61", "score": "0.58653", "text": "func (s *BaseXPath31Listener) ExitParam(ctx *ParamContext) {}", "title": "" }, { "docid": "0bd5f059f4ed5883ca62fcc505df2c90", "score": "0.5862779", "text": "func (s *BaseDart2Listener) ExitExpression(ctx *ExpressionContext) {}", "title": "" }, { "docid": "b2c9ed9b7a116ef426abddd5e5bd4aca", "score": "0.58526766", "text": "func (s *BasePROV_NListener) ExitDerivationExpression(ctx *DerivationExpressionContext) {}", "title": "" }, { "docid": "1a80f9b12432cbdcb9e5a2f4dbf1c18b", "score": "0.5848306", "text": "func (s *BaseJavaScriptParserListener) ExitPowerExpression(ctx *PowerExpressionContext) {}", "title": "" }, { "docid": "46bd9a28d85d2705150ca986dc9d630a", "score": "0.5835211", "text": "func (s *BaseXPath31Listener) ExitNamedfunctionref(ctx *NamedfunctionrefContext) {}", "title": "" }, { "docid": "b8ccbcedcb6b9e813119fcb2c245bdb8", "score": "0.5834978", "text": "func (s *BaseXPath31Listener) ExitLiteral(ctx *LiteralContext) {}", "title": "" }, { "docid": "201b837c150aec61e3955e95760f9fac", "score": "0.5816678", "text": "func (s *BaseXPath31Listener) ExitSingletype(ctx *SingletypeContext) {}", "title": "" }, { "docid": "1785c6409307430248e5a2abf2d8b810", "score": "0.5813503", "text": "func (s *BasegengineListener) ExitExpression(ctx *ExpressionContext) {}", "title": "" }, { "docid": "4b3d535cc530a5c2d9a0c9d83f31cbeb", "score": "0.5794269", "text": "func (s *BaseXPath31Listener) ExitArrowfunctionspecifier(ctx *ArrowfunctionspecifierContext) {}", "title": "" }, { "docid": "c0b3988f87de35c4835b9ca262659bc9", "score": "0.5786834", "text": "func (s *BaseXPath31Listener) EnterXpath(ctx *XpathContext) {}", "title": "" }, { "docid": "ebcd307e9159a35bad669071ffa64407", "score": "0.5775439", "text": "func (s *BasePROV_NListener) ExitExpression(ctx *ExpressionContext) {}", "title": "" }, { "docid": "deeb3202b559dce715a493bb422c6f0f", "score": "0.5771114", "text": "func (s *BaseXPath31Listener) ExitMapvalueexpr(ctx *MapvalueexprContext) {}", "title": "" }, { "docid": "7f56ff09199050d1dfdb671c455a14cd", "score": "0.5770909", "text": "func (s *BaseXPath31Listener) ExitCommenttest(ctx *CommenttestContext) {}", "title": "" }, { "docid": "a6dfa6460051452c3181552a00ba4cc8", "score": "0.5769855", "text": "func (s *BaseXPath31Listener) ExitTypedfunctiontest(ctx *TypedfunctiontestContext) {}", "title": "" }, { "docid": "460495adb79ccae4ec9eb5e3621a1ccb", "score": "0.5757777", "text": "func (s *BaseXPath31Listener) ExitUnarylookup(ctx *UnarylookupContext) {}", "title": "" }, { "docid": "b2f0b59da2422ceaa738a0089338c3e3", "score": "0.5754169", "text": "func (s *BasegengineListener) ExitExpressionAtom(ctx *ExpressionAtomContext) {}", "title": "" }, { "docid": "673cea376f18da8ab4d49bbc29c3d20c", "score": "0.5749458", "text": "func (s *BaseAim8Listener) ExitSexpr(ctx *SexprContext) {}", "title": "" }, { "docid": "2a3c8d30209006a5955cc80b97cb2e10", "score": "0.57363516", "text": "func (s *BaseXPath31Listener) ExitArgumentplaceholder(ctx *ArgumentplaceholderContext) {}", "title": "" }, { "docid": "4138b507d3a0617971b37947af2079ac", "score": "0.57264245", "text": "func (s *BaseXPath31Listener) ExitGeneralcomp(ctx *GeneralcompContext) {}", "title": "" }, { "docid": "7771f1e4b8a27602eaabd491e7864595", "score": "0.57142395", "text": "func (s *BaseExprParserListener) ExitExpression(ctx *ExpressionContext) {}", "title": "" }, { "docid": "17fddcfd6695403099f1049921fb6536", "score": "0.5712077", "text": "func (s *Basetptp_v7_0_0_0Listener) ExitTfx_formula(ctx *Tfx_formulaContext) {}", "title": "" }, { "docid": "24ad720ac2d01d8085668687be36d4f0", "score": "0.5706111", "text": "func (s *BaseXPath31Listener) ExitArraytest(ctx *ArraytestContext) {}", "title": "" }, { "docid": "ebd2a97457237f8416b934de1e8af43b", "score": "0.57040864", "text": "func (s *BaseDart2Listener) ExitNayaExpression(ctx *NayaExpressionContext) {}", "title": "" }, { "docid": "ce7f818b4c68554558f2e583c215759d", "score": "0.5703792", "text": "func (s *BaseXPath31Listener) ExitNamespacenodetest(ctx *NamespacenodetestContext) {}", "title": "" } ]
fb5a93b11382d904dadafc4edf64897c
Capture stdour and stdout into a output.
[ { "docid": "878e94c40ff82b74bff9837033e83f49", "score": "0.7047998", "text": "func captureOutput() *output {\n\toldStdout, oldStderr := os.Stdout, os.Stderr\n\tstdout, stdoutCh := makeDiversion()\n\tstderr, stderrCh := makeDiversion()\n\tos.Stdout, os.Stderr = stdout, stderr\n\tlog.SetOutput(os.Stderr)\n\treturn &output{stdout, stdoutCh, stderr, stderrCh, oldStdout, oldStderr}\n}", "title": "" } ]
[ { "docid": "b1cf21b8014ad023567331ea1958345c", "score": "0.7144015", "text": "func CaptureStdOut(f func()) string {\n\told := os.Stdout // keep backup of the real stdout\n\n\t// re-direct stdout\n\tr, w, err := os.Pipe()\n\tmsg.FatalOnErr(err)\n\tos.Stdout = w\n\n\t// copy the output in a separate goroutine so printing can't block indefinitely\n\toutC := make(chan string)\n\tgo func() {\n\t\tvar buf bytes.Buffer\n\t\t_, err = io.Copy(&buf, r)\n\t\tmsg.OnErr(err)\n\t\toutC <- buf.String()\n\t}()\n\n\tf() // run the function\n\n\t// back to normal state\n\tmsg.FatalOnErr(w.Close())\n\tos.Stdout = old\n\n\t// read output\n\treturn <-outC\n}", "title": "" }, { "docid": "66e925a5c05e0e84ac19dfd86342b23f", "score": "0.71104187", "text": "func CaptureStdOut(f func()) string {\n\told := os.Stdout // keep backup of the real stdout.\n\t// nolint:errcheck\n\tr, w, _ := os.Pipe()\n\tos.Stdout = w\n\n\tf()\n\n\toutC := make(chan string)\n\t// copy the output in a separate goroutine so printing can't block indefinitely.\n\tgo func() {\n\t\tvar buf bytes.Buffer\n\t\t// nolint:errcheck\n\t\t// #nosec G104\n\t\tio.Copy(&buf, r)\n\t\toutC <- buf.String()\n\t}()\n\n\t// back to normal state.\n\t// nolint:errcheck\n\t// #nosec G104\n\tw.Close()\n\tos.Stdout = old // restoring the real stdout.\n\tout := <-outC\n\n\treturn out\n}", "title": "" }, { "docid": "bc2e61bab6ac55f81c3e07b927261a0a", "score": "0.70359766", "text": "func captureOutput(f func()) string {\n\told := os.Stdout\n\tr, w, _ := os.Pipe()\n\tos.Stdout = w\n\n\tf()\n\n\tw.Close()\n\tos.Stdout = old\n\tvar buf bytes.Buffer\n\tio.Copy(&buf, r) //nolint\n\treturn buf.String()\n}", "title": "" }, { "docid": "931886beae517ab750a54375347c88b2", "score": "0.68856996", "text": "func CaptureOutput(t *testing.T) OutputCapture {\n\tret := OutputCapture{\n\t\toldStdout: os.Stdout,\n\t\toldStderr: os.Stderr,\n\t\tt: t,\n\t}\n\tvar err error\n\tret.outRead, ret.outWrite, err = os.Pipe()\n\tassert.NilError(t, err)\n\tos.Stdout = ret.outWrite\n\tret.errorRead, ret.errorWrite, err = os.Pipe()\n\tassert.NilError(t, err)\n\tos.Stderr = ret.errorWrite\n\treturn ret\n}", "title": "" }, { "docid": "1d6aca9a2c8d9a37ae1b50fdd7ca8dd8", "score": "0.6682208", "text": "func captureOutput(f func()) string {\n\t// redirect output\n\told := os.Stdout\n\tr, w, _ := os.Pipe()\n\tos.Stdout = w\n\n\tf()\n\n\t// reset output again\n\tw.Close()\n\tos.Stdout = old\n\n\tcaptured, _ := ioutil.ReadAll(r)\n\treturn string(captured)\n}", "title": "" }, { "docid": "1d6aca9a2c8d9a37ae1b50fdd7ca8dd8", "score": "0.6682208", "text": "func captureOutput(f func()) string {\n\t// redirect output\n\told := os.Stdout\n\tr, w, _ := os.Pipe()\n\tos.Stdout = w\n\n\tf()\n\n\t// reset output again\n\tw.Close()\n\tos.Stdout = old\n\n\tcaptured, _ := ioutil.ReadAll(r)\n\treturn string(captured)\n}", "title": "" }, { "docid": "65dd14e607f54e6537ea591b88ac4401", "score": "0.66450214", "text": "func CaptureOutput(f func()) (*bytes.Buffer, error) {\n\tstdout, stderr := os.Stdout, os.Stderr\n\tr, w, err := os.Pipe()\n\tos.Stdout = w\n\tos.Stderr = w\n\tf()\n\terr = errs.Pair(err, w.Close())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbuf := new(bytes.Buffer)\n\t_, err = io.Copy(buf, r)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tos.Stdout, os.Stderr = stdout, stderr\n\treturn buf, nil\n}", "title": "" }, { "docid": "c18ba17ede029bebf47c9204f07af1e0", "score": "0.6620831", "text": "func (r runcmdStubResult) Stdout() *bytes.Buffer {\n\tvar b bytes.Buffer\n\tb.WriteString(r.stdout)\n\treturn &b\n}", "title": "" }, { "docid": "10b10b9a81e311b0e070c3ba01c38062", "score": "0.65996206", "text": "func captureStdout ( fn func() ) string {\n prevStdout := os.Stdout\n r, w, _ := os.Pipe()\n os.Stdout = w\n\tfn()\n ch := make(chan string)\n go func() {\n var buff bytes.Buffer\n io.Copy(&buff, r)\n ch <- buff.String()\n }()\n w.Close()\n os.Stdout = prevStdout\n str := <-ch\n return str\n}", "title": "" }, { "docid": "388abd8b51f0c62d26c4e8b0597c2f39", "score": "0.65852344", "text": "func (s *outputs) stdout() *bytes.Buffer {\n\treturn s.out\n}", "title": "" }, { "docid": "a0acfbbf66f40e3a32b2eb923ce888ae", "score": "0.6564073", "text": "func CaptureStdout(t *testing.T, fn func()) string {\n\tt.Helper()\n\n\tr, w, err := os.Pipe()\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\torig := os.Stdout\n\tos.Stdout = w\n\n\tfn()\n\n\tos.Stdout = orig\n\tif err := w.Close(); err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\tvar buf bytes.Buffer\n\tif _, err := io.Copy(&buf, r); err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\treturn buf.String()\n}", "title": "" }, { "docid": "50657ec0d056f32cbaf9df36d181793e", "score": "0.6520359", "text": "func CaptureStdout(block func()) string {\n old := os.Stdout // keep backup of the real stdout\n r, w, _ := os.Pipe()\n os.Stdout = w\n\n block()\n\n outC := make(chan string)\n // copy the output in a separate goroutine so printing can't block indefinitely\n go func() {\n var buf bytes.Buffer\n io.Copy(&buf, r)\n outC <- buf.String()\n }()\n\n // back to normal state\n w.Close()\n os.Stdout = old // restoring the real stdout\n out := <-outC\n\n // return our temp stdout\n return out\n}", "title": "" }, { "docid": "fc289bbdb7a4aa6ef75db2e88b5d7d35", "score": "0.6455049", "text": "func captureOutput(f func()) (string, error) {\n\tr, w, err := os.Pipe()\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"creating pipe: %s\", err)\n\t}\n\tstdout := os.Stdout\n\tstderr := os.Stderr\n\tos.Stdout = w\n\tos.Stderr = w\n\tdefer func() {\n\t\t// cleanup\n\t\tos.Stdout = stdout\n\t\tos.Stderr = stderr\n\t\tif err := r.Close(); err != nil {\n\t\t\tlog.Errorf(\"%s\\n\", err)\n\t\t}\n\t}()\n\t// call function\n\tf()\n\t// copy stdout\n\tvar buf bytes.Buffer\n\t// have to close write FD before reading (otherwise pipe continues)\n\tif err := w.Close(); err != nil {\n\t\treturn \"\", fmt.Errorf(\"closing pipe: %s\", err)\n\t}\n\t// read bytes written to pipe\n\tif _, err := io.Copy(&buf, r); err != nil {\n\t\treturn \"\", fmt.Errorf(\"copying buffer: %s\", err)\n\t}\n\treturn buf.String(), nil\n}", "title": "" }, { "docid": "c83f7c949fb6ba88f2e487d23cd167be", "score": "0.6423521", "text": "func SetOutput(w io.Writer) { std.SetOutput(w) }", "title": "" }, { "docid": "4f523a5dadd5289da851bf13a4c67563", "score": "0.6371097", "text": "func (c *Cmd) StdoutPipe() (io.ReadCloser, error)", "title": "" }, { "docid": "e17c8cb84c946c3e246e10e5d0e37fb4", "score": "0.63692814", "text": "func (t *Test) StdOut() *bytes.Buffer {\n\treturn t.stdOut\n}", "title": "" }, { "docid": "418e6560541cd1ef671e31e2f07ba006", "score": "0.632365", "text": "func withStdout(fn func()) (string, error) {\n\tstdout := os.Stdout\n\n\tr, w, err := os.Pipe()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tos.Stdout = w\n\tdefer func() {\n\t\tos.Stdout = stdout\n\t}()\n\n\toutC := make(chan string)\n\tgo func() {\n\t\t// capture all output\n\t\tvar buf bytes.Buffer\n\t\t_, err = io.Copy(&buf, r)\n\t\tr.Close()\n\t\toutC <- buf.String()\n\t}()\n\n\tfn()\n\tw.Close()\n\tresult := <-outC\n\treturn result, err\n}", "title": "" }, { "docid": "ed9bc0d1020515c748b58392189984f5", "score": "0.62516326", "text": "func CaptureStdout(f func(w io.Writer)) string {\n\toriginalStdout := os.Stdout\n\tr, w, _ := os.Pipe()\n\tos.Stdout = w\n\tcolor.SetOutput(w)\n\n\tf(w)\n\n\t_ = w.Close()\n\tout, _ := ioutil.ReadAll(r)\n\tos.Stdout = originalStdout\n\tcolor.SetOutput(w)\n\t_ = r.Close()\n\n\treturn string(out)\n}", "title": "" }, { "docid": "7a82a4574c841804ea3a12ff2c5d778c", "score": "0.6193731", "text": "func TestCaptureStdOut(t *testing.T) {\n\tassert := asrt.New(t)\n\trestoreOutput := util.CaptureStdOut()\n\ttext := util.RandString(128)\n\tfmt.Println(text)\n\tout := restoreOutput()\n\n\tassert.Contains(out, text)\n}", "title": "" }, { "docid": "654690b76477effeb26edafaf32e2c4e", "score": "0.6099531", "text": "func Capture() func() (string, error) {\n\tr, w, err := os.Pipe()\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tdone := make(chan error, 1)\n\n\tsave := os.Stdout\n\tos.Stdout = w\n\n\tvar buf strings.Builder\n\n\tgo func() {\n\t\t_, err := io.Copy(&buf, r)\n\t\t_ = r.Close()\n\t\tdone <- err\n\t}()\n\n\treturn func() (string, error) {\n\t\tos.Stdout = save\n\t\t_ = w.Close()\n\t\terr := <-done\n\t\tif err == nil {\n\t\t\treturn buf.String(), nil\n\t\t} else {\n\t\t\treturn \"\", &kfapis.KfError{\n\t\t\t\tCode: int(kfapis.INVALID_ARGUMENT),\n\t\t\t\tMessage: err.Error(),\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "001d076dd648ab6070b260705f5031c4", "score": "0.60556316", "text": "func TestCaptureUserOut(t *testing.T) {\n\tassert := asrt.New(t)\n\trestoreOutput := util.CaptureUserOut()\n\ttext := util.RandString(128)\n\toutput.UserOut.Println(text)\n\tout := restoreOutput()\n\n\tassert.Contains(out, text)\n}", "title": "" }, { "docid": "0affe077d0e7097e9e2d553be743ff17", "score": "0.602282", "text": "func init() {\n\tSetOutput(os.Stdout)\n}", "title": "" }, { "docid": "495e5590fbdd9e6e039eff042d889648", "score": "0.6006645", "text": "func (cmd *ExecCommandImpl) Stdout() *OutputStream {\n\treturn cmd.stdout\n}", "title": "" }, { "docid": "e53687fd47aee279ca8b567e20a95da0", "score": "0.59949803", "text": "func (cmd *CLI) StdOutput() io.Writer {\n\treturn cmd.StdOut()\n}", "title": "" }, { "docid": "d28bf23e03d8d3519cc2f01a76a3f130", "score": "0.595566", "text": "func (p *Process) Stdout() io.Writer {\n\treturn p.stdout\n}", "title": "" }, { "docid": "0d43999656c19e6eb9819b379123ffcf", "score": "0.59502935", "text": "func main() {\n\tout = bufio.NewWriter(os.Stdout)\n\terrout = bufio.NewWriter(os.Stderr)\n\n\tc := OpenCaptureOrDie()\n\tenc := json.NewEncoder(os.Stdout)\n\tfor pkt := c.Next(); pkt != nil; pkt = c.Next() {\n\t\tpkt.Decode()\n\t\tSerialisePacket(pkt, enc)\n\t}\n}", "title": "" }, { "docid": "f041f2b049c513995664e4e5f6de02ee", "score": "0.5860307", "text": "func (c *CmdReal) StdoutPipe() (io.ReadCloser, error) {\n\treturn c.cmd.StdoutPipe()\n}", "title": "" }, { "docid": "c33d52b38efa1d5c6f624a84174c2234", "score": "0.5843667", "text": "func (proxy *ProxyService) Stdout() string {\n\tproxy.mu.Lock()\n\tdefer proxy.mu.Unlock()\n\treturn proxy.stdout.String()\n}", "title": "" }, { "docid": "5adf4702db4cbf376dc89cba2897e0e2", "score": "0.57887405", "text": "func (cmd *CLI) StdOut() io.Writer {\n\tif cmd.stdOutput == nil {\n\t\tcmd.stdOutput = os.Stdout\n\t}\n\treturn cmd.stdOutput\n}", "title": "" }, { "docid": "465b60c75f4f3387d2a69791e490eaba", "score": "0.57854027", "text": "func runToolAndCollectOutput(toolPath string, args []string) (bytes.Buffer, error) {\n\tcmd := exec.Command(toolPath, args...)\n\tvar out bytes.Buffer\n\tcmd.Stdout = &out\n\terr := cmd.Run()\n\treturn out, err\n}", "title": "" }, { "docid": "b63ca2a7bd25ee5951d4137ca3ddf412", "score": "0.5777522", "text": "func (r StackdriverMessage) Stdout() {\n\t_, err := os.Stdout.WriteString(string(r))\n\tif err != nil {\n\t\tfmt.Println(err.Error())\n\t}\n}", "title": "" }, { "docid": "7f1b9f940e708fedb4a1e42ee4c4bb9f", "score": "0.57561404", "text": "func executeCommandCapturingStdout(args ...string) (string, string) {\n\n\t// We substitute our own pipe for stdout to collect the terminal output\n\t// but must be careful to always restore stadt and close the pripe files.\n\toriginalStdout := os.Stdout\n\treadFile, writeFile, err := os.Pipe()\n\tif err != nil {\n\t\tfmt.Printf(\"Could not capture stdout: %s\", err.Error())\n\t\tos.Exit(1)\n\t}\n\n\t// Be careful to both put stdout back in its proper place, and restore any\n\t// tricks that we played on our child packages to get them to cooperate in our testing.\n\tdefer func() {\n\n\t\t// Restore stdout piping\n\t\tos.Stdout = originalStdout\n\t\twriteFile.Close()\n\t\treadFile.Close()\n\t}()\n\n\t// Set our own pipe as stdout\n\tos.Stdout = writeFile\n\n\t// Run the command with a random token value that does not matter because we won't actually\n\t// be calling AWS and so it won't be able to object\n\toutput := executeCommand(args...)\n\n\t// Restore stdout and close the write end of the pipe so that we can collect the output\n\tos.Stdout = originalStdout\n\twriteFile.Close()\n\n\t// Gather the output into a byte buffer\n\toutputBytes, err := ioutil.ReadAll(readFile)\n\tif err != nil {\n\t\tfmt.Printf(\"Failed to read pipe for stdout: : %s\", err.Error())\n\t\tos.Exit(1)\n\t}\n\n\t// Return the executeCommand output and stdout\n\treturn output, string(outputBytes)\n}", "title": "" }, { "docid": "cbe04cc6402a0888c6d1a9706326a6ef", "score": "0.57451355", "text": "func TakeOverStdout() error {\n\tvar err error\n\toldStdout = os.Stdout\n\treader, writer, err = os.Pipe()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tos.Stdout = writer\n\n\treturn nil\n}", "title": "" }, { "docid": "976d1342be44c796b829818c03e05f12", "score": "0.5738245", "text": "func (cmd Cmd) Capture(stdout, stderr io.Writer) Cmd {\n\tcmd.Stdout = stdout\n\tcmd.Stderr = stderr\n\treturn cmd\n}", "title": "" }, { "docid": "5c2ffcbe43f68b2df4ad1e5bef1c2dd6", "score": "0.57329655", "text": "func (c config) Stdout() io.Writer {\n\treturn c.stdout\n}", "title": "" }, { "docid": "65c1a9a4063ca3494e7b3d49c84341bf", "score": "0.57297486", "text": "func expectOutput(t *testing.T, f func(), expected string) {\n\told := os.Stdout // keep backup of the real stdout\n\tr, w, _ := os.Pipe()\n\tos.Stdout = w\n\n\tf()\n\n\toutC := make(chan string)\n\t// copy the output in a separate goroutine so printing can't block indefinitely\n\tgo func() {\n\t\tvar buf bytes.Buffer\n\t\tio.Copy(&buf, r)\n\t\toutC <- buf.String()\n\t}()\n\n\tos.Stdout.Close()\n\tos.Stdout = old // restoring the real stdout\n\tout := <-outC\n\tif !strings.Contains(out, expected) {\n\t\tt.Errorf(\"Expected '%s', received '%s'.\", expected, out)\n\t}\n}", "title": "" }, { "docid": "1eeb123ea354d2e6a078e22b28e4fad4", "score": "0.57077944", "text": "func dupToStdOut(file *os.File) error {\n\t// https://github.com/golang/go/issues/325\n\tif err := unix.Dup2(int(file.Fd()), 1); err != nil {\n\t\treturn err\n\t}\n\tos.Stdout = file\n\treturn nil\n}", "title": "" }, { "docid": "893419c6a5dfe314df38f28ed70e044c", "score": "0.5691744", "text": "func redirect() {\n\n\tr, w, err := os.Pipe()\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tos.Stdout = w\n\treader := bufio.NewReader(r)\n\tgo func() {\n\t\tfor {\n\t\t\tline, err := reader.ReadString('\\n')\n\t\t\tif err != nil {\n\t\t\t\tl.errFile.WriteString(err.Error())\n\t\t\t}\n\t\t\tmux(&log.Log{\n\t\t\t\tTimestamp: time.Now().UTC().UnixNano() / 1e6,\n\t\t\t\tRaw: strings.TrimSpace(line),\n\t\t\t})\n\t\t}\n\t}()\n}", "title": "" }, { "docid": "f33231e309aeb846fb3dc659409ee2c6", "score": "0.568308", "text": "func (chrome *Chrome) STDOUT() string {\n\treturn chrome.stdout\n}", "title": "" }, { "docid": "462fef4f8487b7301587ea57b222774e", "score": "0.5640862", "text": "func (e *Echo) Runout(cmdStr string) {\n\tfmt.Print(e.Run(cmdStr))\n}", "title": "" }, { "docid": "1d9e0c08ab346a7c1bce1c54e0723b9f", "score": "0.56393206", "text": "func (m *MemCmd) StdoutPipe() (io.ReadCloser, error) {\n\tif m.StdoutPipeCallback != nil {\n\t\treturn m.StdoutPipeCallback(m)\n\t}\n\treturn afero.NewMemMapFs().Create(\"/tmp/test\")\n}", "title": "" }, { "docid": "64378e7a8589e7d21e4aaadc106f0249", "score": "0.56339735", "text": "func (c *Config) Stdout() *broadcaster.Unbuffered {\n\treturn c.stdout\n}", "title": "" }, { "docid": "8609e9e4f467722b032d014e832a5d07", "score": "0.5626928", "text": "func Exec(command string) (stdOut, stdErr *bytes.Buffer, err error) {\n\tc := cleanCommand(command)\n\tcmd := exec.Command(cli.Name, c...)\n\n\tvar stdOutBytes, stdErrBytes []byte\n\tvar errStdout, errStderr error\n\tstdOutIn, err := cmd.StdoutPipe()\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tstdErrIn, err := cmd.StderrPipe()\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tfmt.Printf(\"$ %s \\n\", strings.Join(cmd.Args, \" \"))\n\terr = cmd.Start()\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tvar wg sync.WaitGroup\n\twg.Add(1)\n\tgo func() {\n\t\tstdOutBytes, errStdout = copyAndCapture(os.Stdout, stdOutIn)\n\t\twg.Done()\n\t}()\n\tstdErrBytes, errStderr = copyAndCapture(os.Stderr, stdErrIn)\n\twg.Wait()\n\terr = cmd.Wait()\n\tif err != nil {\n\t\tfmt.Println(stdOut.String())\n\t\tfmt.Println(stdErr.String())\n\t}\n\tif errStdout != nil {\n\t\treturn nil, nil, fmt.Errorf(\"failed to capture stdout: %w\", errStdout)\n\t}\n\tif errStderr != nil {\n\t\treturn nil, nil, fmt.Errorf(\"failed to capture stderr: %w\", errStderr)\n\t}\n\treturn bytes.NewBuffer(stdOutBytes), bytes.NewBuffer(stdErrBytes), err\n}", "title": "" }, { "docid": "1208e18bd55b1e3576773ab06a40affc", "score": "0.5601948", "text": "func (c *Config) StdoutPipe() io.ReadCloser {\n\tbytesPipe := ioutils.NewBytesPipe()\n\tc.stdout.Add(bytesPipe)\n\treturn bytesPipe\n}", "title": "" }, { "docid": "85a8544634166c7d3ad05d8418196bdc", "score": "0.55758584", "text": "func (r *Remoter) Output(waitCtx context.Context, cmd string) (string, []byte, error) {\n\t// cannot use defer close(r.wait()) , defer may delay called,\n\t// and cause a race condition\n\tclt := r.clt\n\tssn, err := clt.NewSession()\n\tif err != nil {\n\t\treturn cmd, nil, err\n\t}\n\t// stdout stderr all in one\n\t// BUG: there will have a race condition\n\t// sub routine and this routine operate same r.closer\n\tnoNeedWait, waitGrp := r.wait(waitCtx)\n\tb, err := ssn.CombinedOutput(cmd)\n\t// tell sub routine to exit\n\tclose(noNeedWait)\n\t// wait sub routine exit\n\twaitGrp.Wait()\n\t_ = ssn.Close()\n\treturn cmd, b, err\n}", "title": "" }, { "docid": "463567802a841b06b15791abd6836668", "score": "0.5574005", "text": "func Stdout() io.Writer {\n\tstdout := colorable.NewColorableStdout()\n\tif stdout == os.Stdout {\n\t\treturn os.Stdout\n\t}\n\n\treturn &WinColorTerminal{output: stdout}\n}", "title": "" }, { "docid": "5cbcec417eb99015ebd0491e3149be84", "score": "0.55530626", "text": "func (w *spdkWrapper) suppressOutput() (restore restoreFn, err error) {\n\trealStdout, dErr := syscall.Dup(syscall.Stdout)\n\tif dErr != nil {\n\t\terr = dErr\n\t\treturn\n\t}\n\n\tdevNull, oErr := os.OpenFile(os.DevNull, os.O_WRONLY, 0)\n\tif oErr != nil {\n\t\terr = oErr\n\t\treturn\n\t}\n\n\tif err = Dup2(int(devNull.Fd()), syscall.Stdout); err != nil {\n\t\treturn\n\t}\n\n\trestore = func() {\n\t\t// NB: Normally panic() in production code is frowned upon, but in this\n\t\t// case if we get errors there really isn't any handling to be done\n\t\t// because things have gone completely sideways.\n\t\tif err := devNull.Close(); err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t\tif err := Dup2(realStdout, syscall.Stdout); err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "7d4ccddd376f81c5e7a8935d3fd12aa8", "score": "0.5542704", "text": "func (cmd *EnvironmentCommand) StdOutput() string {\n\treturn cmd.OutputBuffer.String()\n}", "title": "" }, { "docid": "67dca33a7ba8cf34d01198e86e4d2fb8", "score": "0.55395925", "text": "func (c *SSHCommand) StdoutPipe() (io.ReadCloser, error) {\n\treturn c.cmd.StdoutPipe()\n}", "title": "" }, { "docid": "7bed22df5f3d381dae6acf9902ff92aa", "score": "0.5536632", "text": "func (c *Cmd) StdoutPipe() (io.ReadCloser, error) {\n\treturn c.Cmd.StdoutPipe()\n}", "title": "" }, { "docid": "756a5b975c491fd891150d2651a94dd5", "score": "0.5531302", "text": "func Stdout(format string, a ...interface{}) {\n\tfmt.Printf(GetOutputPrefix(GetFuncName(1))+format+\"\\n\", a...)\n}", "title": "" }, { "docid": "6680bcb5943c48f2944fa8abab1ed96b", "score": "0.55162567", "text": "func Output(r cruntime.Manager, bs bootstrapper.Bootstrapper, cfg config.ClusterConfig, runner command.Runner, lines int, logOutput *os.File) error {\n\tcmds := logCommands(r, bs, cfg, lines, false)\n\tcmds[\"kernel\"] = \"uptime && uname -a && grep PRETTY /etc/os-release\"\n\n\tnames := []string{}\n\tfor k := range cmds {\n\t\tnames = append(names, k)\n\t}\n\n\tout.SetOutFile(logOutput)\n\tdefer out.SetOutFile(os.Stdout)\n\tout.SetErrFile(logOutput)\n\tdefer out.SetErrFile(os.Stderr)\n\n\tsort.Strings(names)\n\tfailed := []string{}\n\tfor i, name := range names {\n\t\tif i > 0 {\n\t\t\tout.Styled(style.Empty, \"\")\n\t\t}\n\t\tout.Styled(style.Empty, \"==> {{.name}} <==\", out.V{\"name\": name})\n\t\tvar b bytes.Buffer\n\t\tc := exec.Command(\"/bin/bash\", \"-c\", cmds[name])\n\t\tc.Stdout = &b\n\t\tc.Stderr = &b\n\t\tif rr, err := runner.RunCmd(c); err != nil {\n\t\t\tklog.Errorf(\"command %s failed with error: %v output: %q\", rr.Command(), err, rr.Output())\n\t\t\tfailed = append(failed, name)\n\t\t\tcontinue\n\t\t}\n\t\tl := \"\"\n\t\tscanner := bufio.NewScanner(&b)\n\t\tfor scanner.Scan() {\n\t\t\tl += scanner.Text() + \"\\n\"\n\t\t}\n\t\tif err := scanner.Err(); err != nil {\n\t\t\tklog.Errorf(\"failed to read output: %v\", err)\n\t\t\tfailed = append(failed, name)\n\t\t}\n\t\tout.Styled(style.Empty, l)\n\t}\n\n\tif len(failed) > 0 {\n\t\treturn fmt.Errorf(\"unable to fetch logs for: %s\", strings.Join(failed, \", \"))\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ca09f6ed727709ab49c73a7e599da55b", "score": "0.54998183", "text": "func (res *ExecResult) stdout() string {\n\treturn res.outBuffer.String()\n}", "title": "" }, { "docid": "b75dcb664221de7cdf3c0abdf59d1054", "score": "0.5496392", "text": "func SetOutput(w io.Writer) {\n\tstd.mu.Lock()\n\tdefer std.mu.Unlock()\n\tstd.out = w\n}", "title": "" }, { "docid": "b75dcb664221de7cdf3c0abdf59d1054", "score": "0.5496392", "text": "func SetOutput(w io.Writer) {\n\tstd.mu.Lock()\n\tdefer std.mu.Unlock()\n\tstd.out = w\n}", "title": "" }, { "docid": "efe095ece3ec636cac7acec2cf853226", "score": "0.5489555", "text": "func ForwardContainerOutput(exec remotecommand.Executor, stdOutWriter io.Writer, stdErrWriter io.Writer) error {\n\terr := exec.Stream(remotecommand.StreamOptions{\n\t\tStdout: stdOutWriter,\n\t\tStderr: stdErrWriter,\n\t\tTty: false,\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "07b80be9575f535a273fe96639aff39a", "score": "0.5461336", "text": "func copyOutput(r io.Reader, doneCh chan<- struct{}) {\n\tdefer close(doneCh)\n\n\tpr, err := prefixedio.NewReader(r)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tstderrR, err := pr.Prefix(ErrorPrefix)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tstdoutR, err := pr.Prefix(OutputPrefix)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tdefaultR, err := pr.Prefix(\"\")\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tvar wg sync.WaitGroup\n\twg.Add(3)\n\tgo func() {\n\t\tdefer wg.Done()\n\t\tio.Copy(os.Stderr, stderrR)\n\t}()\n\tgo func() {\n\t\tdefer wg.Done()\n\t\tio.Copy(os.Stdout, stdoutR)\n\t}()\n\tgo func() {\n\t\tdefer wg.Done()\n\t\tio.Copy(os.Stdout, defaultR)\n\t}()\n\n\twg.Wait()\n}", "title": "" }, { "docid": "f11f95fcb14a3fd4d81427c4085e53b5", "score": "0.5453399", "text": "func (c *Cmd) Output(opts ...RunOption) ([]byte, error) {\n\tif c.Stdout != nil {\n\t\treturn nil, errStdoutSet\n\t}\n\n\tvar buf bytes.Buffer\n\tc.Stdout = &buf\n\n\tif err := c.Start(); err != nil {\n\t\treturn nil, err\n\t}\n\n\terr := c.Wait(opts...)\n\treturn buf.Bytes(), err\n}", "title": "" }, { "docid": "914690696cd653d6432e203ea63d34b0", "score": "0.54522014", "text": "func setOutput(out *os.File) error {\n\treturn setStream(out, &C.rl_outstream, \"w\", syscall.Stdout)\n}", "title": "" }, { "docid": "df9de488380cdca4cb9661963aa47a9c", "score": "0.5439926", "text": "func (s *sshSessionExternal) StdoutPipe() (io.Reader, error) {\n\twr, err := s.cmd.StdoutPipe()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"ssh external: stdout pipe: %w\", err)\n\t}\n\treturn wr, nil\n}", "title": "" }, { "docid": "f55fb6ea1b20d16f04cc7a6322917241", "score": "0.5424526", "text": "func (s *DefaultServer) Stdout() []string {\n\ts.lock.RLock()\n\tdefer s.lock.RUnlock()\n\treturn s.stdout\n}", "title": "" }, { "docid": "f8138d3a97a40e82dd1a6e17ba35e7a8", "score": "0.54104286", "text": "func (c *Cmd) StderrPipe() (io.ReadCloser, error)", "title": "" }, { "docid": "9fd8a27415490beb95dfaae9bf300a9b", "score": "0.5408782", "text": "func RedirectStdout(f func()) {\n\t// Redirect stdout, the resulting image is written to this\n\told := os.Stdout\n\tr, w, err := os.Pipe()\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tos.Stdout = w\n\n\t// Discard the output in a separate goroutine so writing to stdout can't block indefinitely\n\tgo func() {\n\t\tfor err := error(nil); err == nil; _, err = io.Copy(ioutil.Discard, r) {\n\t\t}\n\t}()\n\n\tf()\n\n\tos.Stdout = old\n}", "title": "" }, { "docid": "b869ef68684d04acd8eba5b899bed1fb", "score": "0.5399124", "text": "func Stdln(output string) {\n\tfmt.Println(output)\n}", "title": "" }, { "docid": "f6b175c05d3b6a52fd55cff8aa85910c", "score": "0.53973395", "text": "func RunCaptureWithArgs(cmd Executable, args []string, env map[string]string) (stdout, stderr string, err error) {\n\toldout, olderr := os.Stdout, os.Stderr // keep backup of the real stdout\n\trOut, wOut, _ := os.Pipe()\n\trErr, wErr, _ := os.Pipe()\n\tos.Stdout, os.Stderr = wOut, wErr\n\tdefer func() {\n\t\tos.Stdout, os.Stderr = oldout, olderr // restoring the real stdout\n\t}()\n\n\t// copy the output in a separate goroutine so printing can't block indefinitely\n\tcopyStd := func(reader *os.File) *(chan string) {\n\t\tstdC := make(chan string)\n\t\tgo func() {\n\t\t\tvar buf bytes.Buffer\n\t\t\t// io.Copy will end when we call reader.Close() below\n\t\t\tio.Copy(&buf, reader) //nolint:errcheck //ignore error\n\t\t\tstdC <- buf.String()\n\t\t}()\n\t\treturn &stdC\n\t}\n\toutC := copyStd(rOut)\n\terrC := copyStd(rErr)\n\n\t// now run the command\n\terr = RunWithArgs(cmd, args, env)\n\n\t// and grab the stdout to return\n\twOut.Close()\n\twErr.Close()\n\tstdout = <-*outC\n\tstderr = <-*errC\n\treturn stdout, stderr, err\n}", "title": "" }, { "docid": "ae99b185a7bcf24ee4cbd813c670677d", "score": "0.5393836", "text": "func stdoutWriter(buffer chan []byte) {\n\tfor {\n\t\t_, err := os.Stdout.Write(<-buffer)\n\t\tif err != nil {\n\t\t\terrorLog(\"failed to write to stdout: %s\\n\", err)\n\t\t}\n\t\tlinesWritten.Inc()\n\t}\n}", "title": "" }, { "docid": "0f23190a13a36e35269d347db8a2b35e", "score": "0.5390588", "text": "func (e *executor) output(opts opts, output []string) {\n\tif opts.verbose {\n\t\tfor _, line := range output {\n\t\t\te.logLine(line)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "d52ceec8137f96e4f0dc718f5e4baaf7", "score": "0.5367128", "text": "func (s *Syncthing) outputHandler() error {\n\tlogger := log.WithFields(log.Fields{\n\t\t\"name\": \"syncthing\",\n\t})\n\n\tstdout, err := s.cmd.StdoutPipe()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\toutScanner := bufio.NewScanner(stdout)\n\n\tstderr, err := s.cmd.StderrPipe()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terrScanner := bufio.NewScanner(stderr)\n\n\tgo func() {\n\t\tfor outScanner.Scan() {\n\t\t\ttext := outScanner.Text()\n\t\t\tif strings.Contains(text, \"address already in use\") {\n\t\t\t\tlog.Fatalf(duplicateListenerError)\n\t\t\t}\n\n\t\t\tlogger.Debug(text)\n\t\t}\n\t}()\n\n\tgo func() {\n\t\tfor errScanner.Scan() {\n\t\t\tlogger.Warn(errScanner.Text())\n\t\t}\n\t}()\n\n\treturn nil\n}", "title": "" }, { "docid": "03d4228bcf11f424795e68947710b4c3", "score": "0.53639203", "text": "func (cli *ExecCli) Out() *streams.Out {\n\treturn cli.out\n}", "title": "" }, { "docid": "4fa337c9195ea2c6942dde6bd5a06542", "score": "0.53511876", "text": "func renderToSTDOUT(post interface{}) {\n\ttmplt.ExecuteTemplate(os.Stdout, \"NewsTemplate\", post)\n}", "title": "" }, { "docid": "35add9a1f381d0291e7563f3a8e94bdc", "score": "0.5348816", "text": "func CompareOutput(t *testing.T, expected string, f func()) {\n\tstdout, stderr := os.Stdout, os.Stderr\n\tr, w, err := os.Pipe()\n\tif err != nil {\n\t\tt.Error(err)\n\t}\n\tos.Stdout = w\n\tos.Stderr = w\n\n\tf()\n\tw.Close()\n\tvar buf bytes.Buffer\n\tio.Copy(&buf, r)\n\tos.Stdout, os.Stderr = stdout, stderr\n\n\tCompareCallDepth(t, buf.String(), expected, 2)\n}", "title": "" }, { "docid": "cb14be3f3bbeb460bc222934e8682b41", "score": "0.533507", "text": "func TestDoesOutput(t *testing.T, logic func(w io.Writer)) {\n\tassert.NotEmpty(t, CaptureStdout(logic))\n}", "title": "" }, { "docid": "8af5e458e5e4cc50f37a20389484edd2", "score": "0.5312253", "text": "func captureStderr(f func()) (string, error) {\n\tr, w, err := os.Pipe()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tbak := os.Stderr\n\tos.Stderr = w\n\tdefer func() { os.Stderr = bak }()\n\n\tresultCh := make(chan string)\n\t// copy the output in a separate goroutine so printing can't block indefinitely\n\tgo func() {\n\t\tvar buf bytes.Buffer\n\t\tio.Copy(&buf, r)\n\t\tresultCh <- buf.String()\n\t}()\n\n\tf()\n\tw.Close()\n\n\treturn <-resultCh, nil\n}", "title": "" }, { "docid": "f86aa579c7b0d8533d66987f4bcfa92f", "score": "0.52966774", "text": "func ScrapCmdOutput(s scraper.Scraper, a appender.Appender, extenders ...servicelog.Extender) func(*exec.Cmd) error {\n\treturn func(cmd *exec.Cmd) error {\n\t\tentries, writer := scraper.Pipe(s)\n\t\tentries = servicelog.Extend(entries, extenders...)\n\t\tcmd.Stderr = writer\n\t\tcmd.Stdout = writer\n\t\tgo a.Append(entries)\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "ae79f883b9ec156c385a0451387277cd", "score": "0.52865016", "text": "func Output(lv Level, calldepth int, s string) error {\n\treturn std.Output(lv, calldepth, s)\n}", "title": "" }, { "docid": "dc3c4489ad40315ae6fc9ad083db44d3", "score": "0.52619666", "text": "func LogrusCapture(routine func()) string {\n\tlog := \"\"\n\tr, w, _ := os.Pipe()\n\tlogrus.SetOutput(w)\n\tos.Stdout = w\n\n\troutine()\n\n\tos.Stdout = preservedOutput\n\tlogrus.SetOutput(preservedOutput)\n\n\terr := w.Close()\n\tif err != nil {\n\t\treturn \"\"\n\t}\n\n\tvar buf bytes.Buffer\n\t_, err = io.Copy(&buf, r)\n\tif err == nil {\n\t\tlog = buf.String()\n\t}\n\tfmt.Println(log)\n\treturn log\n}", "title": "" }, { "docid": "5cb4e33543ef2327eff77064a2eb0b77", "score": "0.5247892", "text": "func ForwardCmdOutput() func(*exec.Cmd) error {\n\treturn func(cmd *exec.Cmd) error {\n\t\tcmd.Stderr = os.Stderr\n\t\tcmd.Stdout = os.Stdout\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "09767ca2005a8da4da2414d63ebc633f", "score": "0.52432525", "text": "func (c *Cmd) Output() ([]byte, error)", "title": "" }, { "docid": "f5ced6c53862b3fa4381262a057ab4a7", "score": "0.52334803", "text": "func (container *Container) handleOutputs(command *exec.Cmd, results chan<- error, stop <-chan bool, logger *log.Logger) error {\n\n\t// process our outputs\n\t// stdout\n\tstdout, err := command.StdoutPipe()\n\t// check for errors\n\tif err != nil {\n\t\treturn errors.New(\"Could not connect to stdout\")\n\t}\n\toutScanner := bufio.NewScanner(stdout)\n\tgo container.handleOutput(outScanner, \"STDOUT\", results, stop, logger)\n\n\t// stderr\n\tstderr, err := command.StderrPipe()\n\t// check for errors\n\tif err != nil {\n\t\treturn errors.New(\"Could not connect to stderr\")\n\t}\n\terrScanner := bufio.NewScanner(stderr)\n\tgo container.handleOutput(errScanner, \"STDERR\", results, stop, logger)\n\treturn nil\n}", "title": "" }, { "docid": "8779295f2346456081d4118bb56fbae2", "score": "0.52206236", "text": "func getResult(testCase []string) string {\n\tfirst := exec.Command(\"go\", \"run\", \".\", testCase[0], testCase[1])\n\tsecond := exec.Command(\"cat\", \"-e\")\n\treader, writer := io.Pipe()\n\tfirst.Stdout = writer\n\tsecond.Stdin = reader\n\tvar buffer bytes.Buffer\n\tsecond.Stdout = &buffer\n\tfirst.Start()\n\tsecond.Start()\n\tfirst.Wait()\n\twriter.Close()\n\tsecond.Wait()\n\treturn buffer.String()\n}", "title": "" }, { "docid": "af7b0374625098aed5f01f17a4c10bdc", "score": "0.5216152", "text": "func (c *Cmd) StdinPipe() (io.WriteCloser, error)", "title": "" }, { "docid": "152453d149b4850c40452292b162466e", "score": "0.5212004", "text": "func (l *Logger) CaptureSTDLog() error {\n\tif !l.canSafeExec() {\n\t\treturn nil\n\t}\n\n\tlogger, err := makeLogger(l.cfg)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tminLevel := int8(zapcore.InfoLevel)\n\tmaxLevel := int8(zapcore.FatalLevel)\n\tfor i := minLevel; i <= maxLevel; i++ {\n\t\tif _, err := zap.RedirectStdLogAt(logger, zapcore.Level(i)); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tl.inner = logger.Sugar()\n\treturn nil\n}", "title": "" }, { "docid": "3e258aadeb462e12479723ebd2aed04c", "score": "0.52071124", "text": "func catOut(r io.Reader, size int64) *probe.Error {\n\tvar n int64\n\tvar e error\n\n\tvar stdout io.Writer\n\n\t// In case of a user showing the object content in a terminal,\n\t// avoid printing control and other bad characters to avoid\n\t// terminal session corruption\n\tif isTerminal() {\n\t\tstdout = newPrettyStdout(os.Stdout)\n\t} else {\n\t\tstdout = os.Stdout\n\t}\n\n\t// Read till EOF.\n\tif n, e = io.Copy(stdout, r); e != nil {\n\t\tswitch e := e.(type) {\n\t\tcase *os.PathError:\n\t\t\tif e.Err == syscall.EPIPE {\n\t\t\t\t// stdout closed by the user. Gracefully exit.\n\t\t\t\treturn nil\n\t\t\t}\n\t\t\treturn probe.NewError(e)\n\t\tdefault:\n\t\t\treturn probe.NewError(e)\n\t\t}\n\t}\n\tif size != -1 && n < size {\n\t\treturn probe.NewError(UnexpectedEOF{\n\t\t\tTotalSize: size,\n\t\t\tTotalWritten: n,\n\t\t})\n\t}\n\tif size != -1 && n > size {\n\t\treturn probe.NewError(UnexpectedEOF{\n\t\t\tTotalSize: size,\n\t\t\tTotalWritten: n,\n\t\t})\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "334aaced31fdc14161ff5c6923288c48", "score": "0.52045286", "text": "func Mock() *TestMock {\n\tt := &TestMock{}\n\tvar err error\n\tt.outc = make(chan string, 1)\n\tt.orig = os.Stdout\n\tt.r, t.w, err = os.Pipe()\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tos.Stdout = t.w\n\tgo t.run()\n\treturn t\n}", "title": "" }, { "docid": "8b32b873ad97226d08ba7daa3b978295", "score": "0.5203503", "text": "func (gsR *GameStatusRecord) ScreenOutput() {\n\tfmt.Println(gsR)\n}", "title": "" }, { "docid": "69c3905cae70e284fe4944eb584ddfa5", "score": "0.5201977", "text": "func (s Sink) Output(o Output) {\n\ts(o)\n}", "title": "" }, { "docid": "83611d534b1ff9d1780e908e71fd5809", "score": "0.5192975", "text": "func (t *TestRunner) execDebuggableWithOutput(name string, args []string, env []string, afterStart func() string, chToStdin <-chan string) ([]byte, error) {\n\tdebug := isLaunchedByDebugger\n\tif debug {\n\t\targs = append(args, \"--await-continue\")\n\t}\n\tc := exec.Command(name, args...)\n\n\t// add environment variables\n\tif env != nil {\n\t\tc.Env = env\n\t}\n\n\tvar stdout bytes.Buffer\n\tvar stderr bytes.Buffer\n\tstdin, err := c.StdinPipe()\n\tif err != nil {\n\t\treturn make([]byte, 0), err\n\t}\n\n\tc.Stdout = &stdout\n\tc.Stderr = &stderr\n\n\t// instead of err := c.Run(), we do the following\n\trunErr := c.Start()\n\tif runErr == nil {\n\t\tdefer func() {\n\t\t\t_ = c.Process.Kill() // in case we never finish c.Wait() below, and get panicked or killed\n\t\t}()\n\n\t\tif debug {\n\t\t\tbeginAzCopyDebugging(stdin)\n\t\t}\n\n\t\t// perform a specific post-start action\n\t\tif afterStart != nil {\n\t\t\tmsgToApp := afterStart() // perform a local action, here in the test suite, that may optionally produce a message to send to the the app\n\t\t\tif msgToApp != \"\" {\n\t\t\t\t_, _ = stdin.Write([]byte(msgToApp + \"\\n\")) // TODO: maybe change this to use chToStdIn\n\t\t\t}\n\t\t}\n\n\t\t// allow on-going messages to stdin\n\t\tif chToStdin != nil {\n\t\t\tgo func() {\n\t\t\t\tfor {\n\t\t\t\t\tmsg, ok := <-chToStdin\n\t\t\t\t\tif ok {\n\t\t\t\t\t\t_, _ = stdin.Write([]byte(msg + \"\\n\"))\n\t\t\t\t\t} else {\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}()\n\t\t}\n\n\t\t// wait for completion\n\t\trunErr = c.Wait()\n\t}\n\n\t// back to normal exec.Cmd.Output() processing\n\tif runErr != nil {\n\t\tif ee, ok := runErr.(*exec.ExitError); ok {\n\t\t\tee.Stderr = stderr.Bytes()\n\t\t}\n\t}\n\treturn stdout.Bytes(), runErr\n}", "title": "" }, { "docid": "cf7ee8be847320053a6aa34dcd8fecb6", "score": "0.5190554", "text": "func logToStd() {\n\tTrace.SetOutput(os.Stdout)\n\tInfo.SetOutput(os.Stdout)\n\tWarning.SetOutput(os.Stdout)\n\tError.SetOutput(os.Stdout)\n}", "title": "" }, { "docid": "5296719440e368e4da019938f1422637", "score": "0.51873785", "text": "func Redirect(cmd string, args []String, nArg uint32)(status syscall.Status) {\n\n\n\tstatus = altEthos.Close(syscall.Stdout)\n\tif status != syscall.StatusOk {\n\n\t\tshellStatus := String(\"Close failed\\n\")\n\t\taltEthos.WriteStream(syscall.Stdout, &shellStatus)\n\t\treturn\n\n\t}\n\n\tfd, status := altEthos.DirectoryOpen(string(args[nArg+1]))\n\tif status != syscall.StatusOk {\n\t\tshellStatus := String(\"DirectoryOpen failed\\n\")\n\t\taltEthos.WriteStream(syscall.Stderr, &shellStatus)\n\t\treturn\n\n\t}\n\n\n\t//status = altEthos.MoveFd(fd, syscall.Stdout)\n\n\t//if status != syscall.StatusOk {\n\n\t//\tshellStatus := String(\"MoveFd failed\\n\")\n\t//\taltEthos.WriteStream(fdd, &shellStatus)\n\t//\treturn\n\n\t//}\n\n\n\tWrapExec(cmd, args, nArg)\n\n\tstatus = altEthos.MoveFd(syscall.Stdout, fd)\n\tif status != syscall.StatusOk {\n\t\tshellStatus := String(\"MoveFd failed\\n\")\n\t\taltEthos.WriteStream(syscall.Stderr, &shellStatus)\n\t\treturn\n\n\t}\n\n\tstatus = altEthos.Close(fd)\n\tif status != syscall.StatusOk {\n\n\t\tshellStatus := String(\"Close failed\\n\")\n\t\taltEthos.WriteStream(syscall.Stdout, &shellStatus)\n\t\treturn\n\n\t}\n\n\treturn\n\n}", "title": "" }, { "docid": "72fb8144c02c888f4ca457beda8aa4ac", "score": "0.51843446", "text": "func (o StdOutput) Flush() error {\n\treturn nil\n}", "title": "" }, { "docid": "60456a45549345096eab2dd28a916730", "score": "0.51839", "text": "func RunControlOut(cmdArgs []string, user string, exitOnFailure bool, out *bytes.Buffer) error {\n\tif CommandDebug {\n\t\tfmt.Println(cmdArgs, user, exitOnFailure)\n\t}\n\tcmd := exec.Command(cmdArgs[0], cmdArgs[1:]...)\n\tcmd.Env = os.Environ()\n\tif len(user) != 0 {\n\t\tcmd.SysProcAttr = &syscall.SysProcAttr{}\n\t\tuids, _ := RunControl([]string{\"id\", \"-u\", user}, \"\", true)\n\t\tuid, _ := strconv.Atoi(strings.TrimSpace(uids))\n\t\tgids, _ := RunControl([]string{\"id\", \"-g\", user}, \"\", true)\n\t\tgid, _ := strconv.Atoi(strings.TrimSpace(gids))\n\t\tcmd.SysProcAttr.Credential = &syscall.Credential{Uid: uint32(uid), Gid: uint32(gid)}\n\t}\n\n\tif out != nil {\n\t\tcmd.Stdout = out\n\t\t//cmd.Stderr = out // comment to not capture stderr\n\t} else {\n\t\tcmd.Stdin = os.Stdin\n\t\tcmd.Stdout = os.Stdout\n\t\tcmd.Stderr = os.Stderr\n\t}\n\n\tif err := cmd.Run(); err != nil {\n\t\tif exitOnFailure {\n\t\t\tfmt.Fprintln(os.Stderr, strings.Join(cmdArgs, \" \")+\": \"+fmt.Sprint(err)+\": \"+out.String())\n\t\t\tos.Exit(1)\n\t\t} else {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "976f2d939f8e92b136a0a41c9ac36986", "score": "0.5174604", "text": "func Output(calldepth int, s string) error {\n\treturn std.Output(calldepth+1, s, std.level) // +1 for this frame.\n}", "title": "" }, { "docid": "68b6c58f0b285cba08dbd9e537fedafc", "score": "0.5169335", "text": "func (p *Process) watchOutput(w io.Writer, r io.Reader) {\n\tgo func() {\n\t\tif _, err := io.Copy(w, r); err != nil {\n\t\t\tp.log.Errorf(\"Output watcher error: %v\", err)\n\t\t}\n\t}()\n}", "title": "" }, { "docid": "5ec79783a52c9d1cf618816dd0f193e4", "score": "0.5166035", "text": "func Output(level int, calldepth int, s string) error {\n\tif level < std.level {\n\t\treturn nil\n\t}\n\treturn std.Output(level, calldepth+1, s) // +1 for this frame.\n}", "title": "" }, { "docid": "e46ed59ff4604e173a9e807eea5b050b", "score": "0.51641315", "text": "func StdIO(in io.Reader, out, err io.Writer) func(*Runner) error {\n\treturn func(r *Runner) error {\n\t\tr.Stdin = in\n\t\tif out == nil {\n\t\t\tout = ioutil.Discard\n\t\t}\n\t\tr.Stdout = out\n\t\tif err == nil {\n\t\t\terr = ioutil.Discard\n\t\t}\n\t\tr.Stderr = err\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "6b60ed67ede2177a032748b89ec0eecc", "score": "0.51573515", "text": "func (ctrl TerraformJobController) StdOut(c *gin.Context) {\n\tjob := c.MustGet(cTerraformJob).(terraform.Job)\n\tc.JSON(http.StatusOK, job.ResultStdout)\n}", "title": "" }, { "docid": "99aae850841f4285acdb4354b4f63d58", "score": "0.51522195", "text": "func TestOutputs(t *testing.T) {\n\toutputs := Outputs()\n\tdefer SetOutputs(outputs...)\n\n\t// All outputs.\n\toutput := Output{\n\t\tName: \"test\",\n\t\tWriter: os.Stdout,\n\t}\n\n\terr := SetOutputs(output)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\tout := Outputs()\n\tif len(out) != 1 {\n\t\tt.Errorf(\"Outputs did not return the correct number of outputs\")\n\t}\n\n\tif out[0].Name != output.Name {\n\t\tt.Errorf(\"Outputs did not return the correct output\")\n\t}\n\n\t// Only std*.\n\tSetOutputs(output, Stdout, Stderr)\n\tout = Outputs(Stdout.Name, Stderr.Name)\n\tif len(out) != 2 {\n\t\tt.Errorf(\"Outputs did not return the correct number of outputs\")\n\t}\n}", "title": "" }, { "docid": "c91d0e871da02d03b51836a28be36838", "score": "0.5148616", "text": "func EnableStdout() {\n\tos.Stdout = temp // turn it off\n\tglobal.Mutex.Unlock()\n}", "title": "" }, { "docid": "a64d484b6786c14bf1c6c931be5b4f3c", "score": "0.514563", "text": "func (cli *DockerCli) wrap() {\n\tif cli.out == nil || cli.in == nil || cli.err == nil {\n\t\tstdin, stdout, stderr := term.StdStreams()\n\t\tif cli.in == nil {\n\t\t\tcli.in = stream.NewInStream(stdin)\n\t\t}\n\t\tif cli.out == nil {\n\t\t\tcli.out = stream.NewOutStream(stdout)\n\t\t}\n\t\tif cli.err == nil {\n\t\t\tcli.err = stderr\n\t\t}\n\t}\n}", "title": "" }, { "docid": "cca7c847d977a684c46cfe92f39dc17e", "score": "0.51421994", "text": "func (a *ioStream) attach(stdoutW, stderrW io.Writer) error {\n\tparams := rata.Params{\n\t\t\"handle\": a.containerHandle,\n\t\t\"pid\": fmt.Sprintf(\"%d\", a.processID),\n\t\t\"streamid\": fmt.Sprintf(\"%d\", a.streamID),\n\t}\n\n\ta.wg = new(sync.WaitGroup)\n\n\tif stdoutW != nil {\n\t\terr := a.copyStream(params, stdoutW, routes.Stdout)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif stderrW != nil {\n\t\terr := a.copyStream(params, stderrW, routes.Stderr)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" } ]
897e7893bb3239050a6bf825651b2018
SetMunicipalityName adds the municipalityName to the resolve address info using g e t params
[ { "docid": "aec7bad7fdd2541e0ba4555938099b4b", "score": "0.78812474", "text": "func (o *ResolveAddressInfoUsingGETParams) SetMunicipalityName(municipalityName string) {\n\to.MunicipalityName = municipalityName\n}", "title": "" } ]
[ { "docid": "c08158e3951b285ae49eccd94889af3d", "score": "0.68731153", "text": "func (o *ResolveAddressInfoUsingGETParams) WithMunicipalityName(municipalityName string) *ResolveAddressInfoUsingGETParams {\n\to.SetMunicipalityName(municipalityName)\n\treturn o\n}", "title": "" }, { "docid": "a1b0b69043cd7717b181f2aaed7696b9", "score": "0.5521081", "text": "func (me *XsdGoPkgHasElem_MunicipalitysequencePostalAddressTypeschema_Municipality_XsdtString_) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElem_MunicipalitysequencePostalAddressTypeschema_Municipality_XsdtString_; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "722f10496504d6e7346557796fa9e809", "score": "0.48558286", "text": "func (me *XsdGoPkgHasElem_NormalizedMunicipalitysequenceLocationTypeschema_NormalizedMunicipality_XsdtString_) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElem_NormalizedMunicipalitysequenceLocationTypeschema_NormalizedMunicipality_XsdtString_; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "6ff3f07410f03be4610ccc54061e61b9", "score": "0.46985286", "text": "func (me *XsdGoPkgHasElems_NormalizedMunicipalitysequenceLocationTypeschema_NormalizedMunicipality_XsdtString_) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElems_NormalizedMunicipalitysequenceLocationTypeschema_NormalizedMunicipality_XsdtString_; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "5bb709b03a8307ce4b77582492b2ee78", "score": "0.46338323", "text": "func (m *TenantDetailedInformation) SetIndustryName(value *string)() {\n err := m.GetBackingStore().Set(\"industryName\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "efe2929906ed1f0dfb2bbf8208333538", "score": "0.46145606", "text": "func FargateProfileExternalNameConfigure(base map[string]interface{}, name string) {\n\tbase[\"fargate_profile_name\"] = name\n}", "title": "" }, { "docid": "7f1ce46eb6e9de8cc293fc27ffc70e8a", "score": "0.4592917", "text": "func (me *XsdGoPkgHasElems_MunicipalitysequenceEmploymentLocationSummaryTypeschema_Municipality_XsdtString_) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElems_MunicipalitysequenceEmploymentLocationSummaryTypeschema_Municipality_XsdtString_; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "dbb891f65dc2044c4a64f3b5e8dcd987", "score": "0.4576158", "text": "func (m *TenantDetailedInformation) SetCountryName(value *string)() {\n err := m.GetBackingStore().Set(\"countryName\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "6344d4ffdb79907f92999630f6b51e32", "score": "0.44570598", "text": "func (gid GoogleID) SetCommunityName(name string) error {\n\tif name == \"\" {\n\t\treturn gid.ClearCommunityName()\n\t}\n\n\tif len(name) > 15 {\n\t\tlog.Infow(\"community name too long\", \"gid\", gid, \"name\", name)\n\t}\n\n\tif _, err := db.Exec(\"UPDATE agent SET communityname = LEFT(?,15) WHERE gid = ?\", name, gid); err != nil {\n\t\tlog.Error(err)\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4d62b6405c0d46b1108a189a939963a8", "score": "0.44344205", "text": "func NodeGroupExternalNameConfigure(base map[string]interface{}, name string) {\n\tbase[\"name\"] = name\n}", "title": "" }, { "docid": "9599f77183bc040900e2ad0fecc4ac84", "score": "0.44131765", "text": "func SetPrgname(prgname string) {\n\tc_prgname := C.CString(prgname)\n\tdefer C.free(unsafe.Pointer(c_prgname))\n\n\tC.g_set_prgname(c_prgname)\n\n\treturn\n}", "title": "" }, { "docid": "2b65453ec2a51fdab47cff419aba7b9e", "score": "0.42285764", "text": "func (m *ProvinceMutation) SetProvinceName(s string) {\n\tm._Province_Name = &s\n}", "title": "" }, { "docid": "cbf9f6980376218b0a69357705473d75", "score": "0.4178121", "text": "func (inst *InstOr) SetName(name string) {\n\tinst.LocalName = name\n}", "title": "" }, { "docid": "dd58a1a814736e58d6b1b2411f8ad431", "score": "0.4167463", "text": "func (_DnsResolverContract *DnsResolverContractTransactor) SetName(opts *bind.TransactOpts, node [32]byte, name string) (*types.Transaction, error) {\n\treturn _DnsResolverContract.contract.Transact(opts, \"setName\", node, name)\n}", "title": "" }, { "docid": "f75f646a3410985a5b7476d3a8e62c0e", "score": "0.4164041", "text": "func (m *IdentityProvider) SetName(value *string)() {\n m.name = value\n}", "title": "" }, { "docid": "8cc7c0887e9b0a04b054b717e2eef0ec", "score": "0.41635612", "text": "func ClusterExternalNameConfigure(base map[string]interface{}, name string) {\n\tbase[\"name\"] = name\n}", "title": "" }, { "docid": "131f1e1b50e8f2360097565699216067", "score": "0.408186", "text": "func (_DnsResolverContract *DnsResolverContractTransactorSession) SetName(node [32]byte, name string) (*types.Transaction, error) {\n\treturn _DnsResolverContract.Contract.SetName(&_DnsResolverContract.TransactOpts, node, name)\n}", "title": "" }, { "docid": "b009c4f120cfd1fd58da8afd1f09f6cc", "score": "0.40772048", "text": "func (_DnsResolverContract *DnsResolverContractSession) SetName(node [32]byte, name string) (*types.Transaction, error) {\n\treturn _DnsResolverContract.Contract.SetName(&_DnsResolverContract.TransactOpts, node, name)\n}", "title": "" }, { "docid": "aacc9226b559ea72972e26cfac2c8dc1", "score": "0.40509644", "text": "func (_Person *PersonTransactor) SetName(opts *bind.TransactOpts, _name string) (*types.Transaction, error) {\n\treturn _Person.contract.Transact(opts, \"setName\", _name)\n}", "title": "" }, { "docid": "cd6a5d800f57e3bf94cfb72d18be4b30", "score": "0.40236542", "text": "func (_ReverseResolver *ReverseResolverTransactor) SetName(opts *bind.TransactOpts, node [32]byte, _name string) (*types.Transaction, error) {\n\treturn _ReverseResolver.contract.Transact(opts, \"setName\", node, _name)\n}", "title": "" }, { "docid": "8113c715a83f53bce1114c248c11eb73", "score": "0.40088734", "text": "func (g *GotoStruct) SetName(n string) {\n\tg.Name = strings.Replace(g.fieldName(n), \"_\", \"\", -1)\n}", "title": "" }, { "docid": "acfde6153cc0fcc95d863422991f92a7", "score": "0.40041196", "text": "func (b *AccountSaveProfileInfoBuilder) MaidenName(v string) *AccountSaveProfileInfoBuilder {\n\tb.Params[\"maiden_name\"] = v\n\treturn b\n}", "title": "" }, { "docid": "e3e2096f2d7ff96196917a57734cb195", "score": "0.3999193", "text": "func (m *AndroidForWorkSettings) SetOwnerOrganizationName(value *string)() {\n err := m.GetBackingStore().Set(\"ownerOrganizationName\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "e7986b54df8f71db1e243344580c571f", "score": "0.3985373", "text": "func (a *Client) SetDistroXMaintenanceModeByName(params *SetDistroXMaintenanceModeByNameParams) error {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewSetDistroXMaintenanceModeByNameParams()\n\t}\n\n\t_, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"setDistroXMaintenanceModeByName\",\n\t\tMethod: \"PUT\",\n\t\tPathPattern: \"/v1/distrox/name/{name}/maintenance\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"http\", \"https\"},\n\t\tParams: params,\n\t\tReader: &SetDistroXMaintenanceModeByNameReader{formats: a.formats},\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n\n}", "title": "" }, { "docid": "e37293e7c335fc37a909dace42702fd3", "score": "0.39604574", "text": "func (usuario *User) set_namep(n string) {\n\tusuario.nombre = n;\n}", "title": "" }, { "docid": "6d6736e43a4344cb60ba9a34d384da3a", "score": "0.3959174", "text": "func changeName(p *model.Person, name string){\n\tp.Name = name\n}", "title": "" }, { "docid": "b7f8b872ee607d2511647357d065f274", "score": "0.39590216", "text": "func (m *ProvinceMutation) ResetProvinceName() {\n\tm._Province_Name = nil\n}", "title": "" }, { "docid": "ed12411d92d6c2ab2784064f6af8723d", "score": "0.3958154", "text": "func (inst *InstInsertElement) SetName(name string) {\n\tinst.LocalName = name\n}", "title": "" }, { "docid": "4512cd9e9a9aca2629186710f926b853", "score": "0.3948941", "text": "func (m *ProvinceMutation) ProvinceName() (r string, exists bool) {\n\tv := m._Province_Name\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "title": "" }, { "docid": "1c68f4ace5f68c8e816f14828edc1ac9", "score": "0.39340183", "text": "func (p *UcpParams) SetName(name string) *UcpParams {\n\tfreeParamsName(p)\n\tp.params.name = C.CString(name)\n\truntime.SetFinalizer(p, func(f *UcpParams) { FreeNativeMemory(unsafe.Pointer(f.params.name)) })\n\tp.params.field_mask |= C.UCP_PARAM_FIELD_NAME\n\treturn p\n}", "title": "" }, { "docid": "c88687fd149852e04cc211b01d55db25", "score": "0.3932263", "text": "func (m *IosEduCertificateSettings) SetCertificationAuthorityName(value *string)() {\n err := m.GetBackingStore().Set(\"certificationAuthorityName\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "9f8612a286cf98a3e5e52622a3ec22b3", "score": "0.39274237", "text": "func (_NewsroomContract *NewsroomContractTransactor) SetName(opts *bind.TransactOpts, newName string) (*types.Transaction, error) {\n\treturn _NewsroomContract.contract.Transact(opts, \"setName\", newName)\n}", "title": "" }, { "docid": "8f0562d7a6f9e57dee08bc72a8084a17", "score": "0.39139205", "text": "func (client *Client) SetName(req *SetNameRequest) (*Ok, error) {\n\tresult, err := client.Send(Request{\n\t\tmeta: meta{\n\t\t\tType: \"setName\",\n\t\t},\n\t\tData: map[string]interface{}{\n\t\t\t\"first_name\": req.FirstName,\n\t\t\t\"last_name\": req.LastName,\n\t\t},\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif result.Type == \"error\" {\n\t\treturn nil, buildResponseError(result.Data)\n\t}\n\n\treturn UnmarshalOk(result.Data)\n}", "title": "" }, { "docid": "de4e2dc13707ff2e11f8e37ac57d14ab", "score": "0.38940516", "text": "func (o *AddressSuggestionsUsingGETParams) SetLocalityName(localityName *string) {\n\to.LocalityName = localityName\n}", "title": "" }, { "docid": "0cc7995de9fb5190d50a417cb850224f", "score": "0.38794944", "text": "func (_TronToken *TronTokenTransactor) SetName(opts *bind.TransactOpts, _name string) (*types.Transaction, error) {\n\treturn _TronToken.contract.Transact(opts, \"setName\", _name)\n}", "title": "" }, { "docid": "f03c211c1477a89b0f01607cf052b33c", "score": "0.38752413", "text": "func (m *IntuneBrandingProfile) SetContactITName(value *string)() {\n err := m.GetBackingStore().Set(\"contactITName\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "c498bd07a65f1a7afba696002c593e45", "score": "0.38750625", "text": "func (p *Persona) Set(name string) {\n\tp.name = name\n}", "title": "" }, { "docid": "917712d42bf6823e2b2640354c01502d", "score": "0.38727456", "text": "func (_ReverseResolver *ReverseResolverTransactorSession) SetName(node [32]byte, _name string) (*types.Transaction, error) {\n\treturn _ReverseResolver.Contract.SetName(&_ReverseResolver.TransactOpts, node, _name)\n}", "title": "" }, { "docid": "2c81b987a1aaa2af9923b1e4397e50f3", "score": "0.38696355", "text": "func (a *Application) setName(n string) {\n\ta.name = n\n}", "title": "" }, { "docid": "d57ac04e593dfdf4e32deda9c0050e9a", "score": "0.38661227", "text": "func (_FoMo3Dlong *FoMo3DlongTransactor) RegisterNameXaddr(opts *bind.TransactOpts, _nameString string, _affCode common.Address, _all bool) (*types.Transaction, error) {\n\treturn _FoMo3Dlong.contract.Transact(opts, \"registerNameXaddr\", _nameString, _affCode, _all)\n}", "title": "" }, { "docid": "afb839858c2e4bd8bceae4d6b5c3b0bb", "score": "0.38629043", "text": "func (m *PersonnelMutation) ResetName() {\n\tm.name = nil\n}", "title": "" }, { "docid": "a26f42173c276d9d820f3167c68545ce", "score": "0.38479915", "text": "func (_FoMo3Dlong *FoMo3DlongTransactorSession) RegisterNameXaddr(_nameString string, _affCode common.Address, _all bool) (*types.Transaction, error) {\n\treturn _FoMo3Dlong.Contract.RegisterNameXaddr(&_FoMo3Dlong.TransactOpts, _nameString, _affCode, _all)\n}", "title": "" }, { "docid": "76c5c3d8322a67a73089cdcbfa287d49", "score": "0.3847494", "text": "func (p *Provider) SetName(name string) {\n\tp.providerName = name\n}", "title": "" }, { "docid": "76c5c3d8322a67a73089cdcbfa287d49", "score": "0.3847494", "text": "func (p *Provider) SetName(name string) {\n\tp.providerName = name\n}", "title": "" }, { "docid": "76c5c3d8322a67a73089cdcbfa287d49", "score": "0.3847494", "text": "func (p *Provider) SetName(name string) {\n\tp.providerName = name\n}", "title": "" }, { "docid": "76c5c3d8322a67a73089cdcbfa287d49", "score": "0.3847494", "text": "func (p *Provider) SetName(name string) {\n\tp.providerName = name\n}", "title": "" }, { "docid": "76c5c3d8322a67a73089cdcbfa287d49", "score": "0.3847494", "text": "func (p *Provider) SetName(name string) {\n\tp.providerName = name\n}", "title": "" }, { "docid": "172d6c2460e81838f2c56f714d1ebf5b", "score": "0.38418594", "text": "func (t *Mention) SetNameForLanguage(l string, v string) {\n\tt.raw.SetNameMap(l, v)\n\n}", "title": "" }, { "docid": "e6ca0474dd1910f315a5348264aaa7b2", "score": "0.38398564", "text": "func (_ReverseResolver *ReverseResolverSession) SetName(node [32]byte, _name string) (*types.Transaction, error) {\n\treturn _ReverseResolver.Contract.SetName(&_ReverseResolver.TransactOpts, node, _name)\n}", "title": "" }, { "docid": "d8f57e13cd123378976879075e4addd2", "score": "0.3832771", "text": "func (_Token *TokenTransactor) SetName(opts *bind.TransactOpts, name_ [32]byte) (*types.Transaction, error) {\n\treturn _Token.contract.Transact(opts, \"setName\", name_)\n}", "title": "" }, { "docid": "042fa0c85c2dccae0982393df28bd309", "score": "0.38322833", "text": "func (o *ImportVCentersUsingPOSTParams) SetRegionName(regionName string) {\n\to.RegionName = regionName\n}", "title": "" }, { "docid": "fb985c497d5f4b0a41d1581373a1ff4f", "score": "0.38258672", "text": "func (inst *InstXor) SetName(name string) {\n\tinst.LocalName = name\n}", "title": "" }, { "docid": "798d5ae28dfa257a4ddfa39237882ff9", "score": "0.38243192", "text": "func SetApplicationName(applicationName string) {\n\tc_application_name := C.CString(applicationName)\n\tdefer C.free(unsafe.Pointer(c_application_name))\n\n\tC.g_set_application_name(c_application_name)\n\n\treturn\n}", "title": "" }, { "docid": "ff2efdfc817b225b3b528088c4f81547", "score": "0.38151786", "text": "func (c *ClusterNode) SetName(name string) {\n env.Output.WriteChDebug(\"(ClusterNode::SetName) Set value '\"+name+\"'\")\n c.Name = name\n}", "title": "" }, { "docid": "0ab056ba564b0d3ec5aac8e0ddc82f8f", "score": "0.38132983", "text": "func (p *person) updateName(name string) {\n\t(*p).firstName = name\n}", "title": "" }, { "docid": "3df00a06778650de4f1f7d127d7ce33a", "score": "0.38070378", "text": "func (_FoMo3Dlong *FoMo3DlongSession) RegisterNameXaddr(_nameString string, _affCode common.Address, _all bool) (*types.Transaction, error) {\n\treturn _FoMo3Dlong.Contract.RegisterNameXaddr(&_FoMo3Dlong.TransactOpts, _nameString, _affCode, _all)\n}", "title": "" }, { "docid": "3e91f759e4d21fad1f3fec3544639e7f", "score": "0.38041073", "text": "func (p *proxySet) resolveName(principals []string) string {\n\t// check if we're already using one of these principals.\n\tfor _, name := range principals {\n\t\tif _, ok := p.proxies[name]; ok {\n\t\t\treturn name\n\t\t}\n\t}\n\t// default to using the first principal\n\tname := principals[0]\n\t// if we have a `.<cluster-name>` suffix, remove it.\n\tif strings.HasSuffix(name, p.clusterName) {\n\t\tt := strings.TrimSuffix(name, p.clusterName)\n\t\tif strings.HasSuffix(t, \".\") {\n\t\t\tname = strings.TrimSuffix(t, \".\")\n\t\t}\n\t}\n\treturn name\n}", "title": "" }, { "docid": "c5d6163bbfa726fd2d1af4e1dc44ee3a", "score": "0.38011953", "text": "func MutagenSyncName(name string) string {\n\tname = strings.ReplaceAll(name, \".\", \"\")\n\tif unicode.IsNumber(rune(name[0])) {\n\t\tname = \"a\" + name\n\t}\n\treturn name\n}", "title": "" }, { "docid": "30da0c7f29b61955bc34dda75665a141", "score": "0.37858105", "text": "func (s *BasemdxListener) EnterSet_name(ctx *Set_nameContext) {}", "title": "" }, { "docid": "e7c7dab63942ad2ab46d6a0f2395dc70", "score": "0.3783341", "text": "func (ad *AliasDomain) setName(name string) error {\n\tif !validAliasDomainName(name) {\n\t\treturn ErrInvalidAliasDomainName\n\t}\n\n\tad.name = name\n\n\treturn nil\n}", "title": "" }, { "docid": "260c4e94457c0682b6f99ecf62e58649", "score": "0.37811932", "text": "func (o ConfigurationAggregatorOutput) ConfigurationAggregatorName() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *ConfigurationAggregator) pulumi.StringPtrOutput { return v.ConfigurationAggregatorName }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "fcee1ec2d26672a5a4c4360b94c9bcc7", "score": "0.37803766", "text": "func (inst *InstAnd) SetName(name string) {\n\tinst.LocalName = name\n}", "title": "" }, { "docid": "b5b57aff39082279102863511999b008", "score": "0.37778765", "text": "func OrganizationsByName(name string) *organizationByName {\n\treturn &organizationByName{map[string]interface{}{\n\t\t\"name\": name,\n\t}}\n}", "title": "" }, { "docid": "c41b55cab69554c9a97abca56a3575bf", "score": "0.3766354", "text": "func (d *Domain) UpdateName() {}", "title": "" }, { "docid": "8675f9cf37ac0f3f8baad94d9cf6e7f8", "score": "0.3764576", "text": "func (inst *InstExtractElement) SetName(name string) {\n\tinst.LocalName = name\n}", "title": "" }, { "docid": "b12260fd46df4308dd0063b7ac7b3877", "score": "0.37630042", "text": "func (rb *DataframeAnalysisFeatureProcessorTargetMeanEncodingBuilder) FeatureName(featurename Name) *DataframeAnalysisFeatureProcessorTargetMeanEncodingBuilder {\n\trb.v.FeatureName = featurename\n\treturn rb\n}", "title": "" }, { "docid": "5197b897bc963ce7cb11f32a8109cafb", "score": "0.3760094", "text": "func (nt *NetworkStru) InitName(net emer.Network, name string) {\n\tnt.EmerNet = net\n\tnt.Nm = name\n}", "title": "" }, { "docid": "461a4fbeab28ba12b52b00f7742eac49", "score": "0.37535027", "text": "func (r *PackageAggRow) SetName(name string) { r.Data.Name = &name }", "title": "" }, { "docid": "765242c75feb624f2f137f70f61a7d16", "score": "0.37478933", "text": "func (o *Node) SetName(name string) {\n\tlog.Println(\"Calling Node.SetName()\")\n\n\t// Build out the method's arguments\n\tgoArguments := make([]reflect.Value, 1, 1)\n\tgoArguments[0] = reflect.ValueOf(name)\n\n\t// Call the parent method.\n\n\to.callParentMethod(o.baseClass(), \"set_name\", goArguments, \"\")\n\n\tlog.Println(\" Function successfully completed.\")\n\n}", "title": "" }, { "docid": "ad720e519626509b6b217fb5572438bf", "score": "0.37314168", "text": "func (o *Local) SetNome(v string) {\n\to.Nome.Set(&v)\n}", "title": "" }, { "docid": "4b43a04b1e03ba2c6fc2abe007a6eaf9", "score": "0.37207028", "text": "func (e *Adaptor) SetName(n string) { e.name = n }", "title": "" }, { "docid": "4b43a04b1e03ba2c6fc2abe007a6eaf9", "score": "0.37207028", "text": "func (e *Adaptor) SetName(n string) { e.name = n }", "title": "" }, { "docid": "6dc1cf0a3f830b3225cfb07cb227ebc6", "score": "0.3718682", "text": "func (m *HospitalMutation) SetHospitalName(s string) {\n\tm._HospitalName = &s\n}", "title": "" }, { "docid": "be65341bdbe6439892ca9f6834e39518", "score": "0.37169066", "text": "func SetTaxonomyTermFieldDataViaName(iName string, taxonomy_term_field_data *TaxonomyTermFieldData) (int64, error) {\n\ttaxonomy_term_field_data.Name = iName\n\treturn Engine.Insert(taxonomy_term_field_data)\n}", "title": "" }, { "docid": "5fdf3e888a62edf2034da4d3fce14d5c", "score": "0.36996514", "text": "func (o *PCCProvider) SetName(name string) {\n\n\to.Name = name\n}", "title": "" }, { "docid": "af2c82da2b047d8459020deb42c9cd69", "score": "0.36929616", "text": "func (this *Usuario) set_name(n string) {\n\tthis.nombre = n\n}", "title": "" }, { "docid": "ee0f76930f0ae2bf6b4519e681626f11", "score": "0.36929098", "text": "func (m *CertificationControl) SetName(value *string)() {\n m.name = value\n}", "title": "" }, { "docid": "d8e4375f59ca0dec928c452f4e563ce8", "score": "0.36912134", "text": "func (me *TxsdPostalAddressTypeType) Set(s string) { (*xsdt.String)(me).Set(s) }", "title": "" }, { "docid": "4daa755b584986a5301da50c796ebdae", "score": "0.36887994", "text": "func (m *BookingCustomerInformation) SetName(value *string)() {\n err := m.GetBackingStore().Set(\"name\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "73056e5edffe21ce8d7ecd8f3d04fe4c", "score": "0.36802834", "text": "func (_Person *PersonTransactorSession) SetName(_name string) (*types.Transaction, error) {\n\treturn _Person.Contract.SetName(&_Person.TransactOpts, _name)\n}", "title": "" }, { "docid": "8cefeda471d4b83b528692a77ae3be66", "score": "0.3671875", "text": "func (node *PlaceNode) Name() string {\n\tname, _, _, _ := node.JurisdictionalEntities()\n\n\treturn name\n}", "title": "" }, { "docid": "f34d8ffeaa05251c132e8ef167074e0e", "score": "0.366732", "text": "func (o *Feature) SetOrganism(exec boil.Executor, insert bool, related *Organism) error {\n\tvar err error\n\tif insert {\n\t\tif err = related.Insert(exec); err != nil {\n\t\t\treturn errors.Wrap(err, \"failed to insert into foreign table\")\n\t\t}\n\t}\n\n\tupdateQuery := fmt.Sprintf(\n\t\t\"UPDATE \\\"feature\\\" SET %s WHERE %s\",\n\t\tstrmangle.SetParamNames(\"\\\"\", \"\\\"\", 1, []string{\"organism_id\"}),\n\t\tstrmangle.WhereClause(\"\\\"\", \"\\\"\", 2, featurePrimaryKeyColumns),\n\t)\n\tvalues := []interface{}{related.OrganismID, o.FeatureID}\n\n\tif boil.DebugMode {\n\t\tfmt.Fprintln(boil.DebugWriter, updateQuery)\n\t\tfmt.Fprintln(boil.DebugWriter, values)\n\t}\n\n\tif _, err = exec.Exec(updateQuery, values...); err != nil {\n\t\treturn errors.Wrap(err, \"failed to update local table\")\n\t}\n\n\to.OrganismID = related.OrganismID\n\n\tif o.R == nil {\n\t\to.R = &featureR{\n\t\t\tOrganism: related,\n\t\t}\n\t} else {\n\t\to.R.Organism = related\n\t}\n\n\tif related.R == nil {\n\t\trelated.R = &organismR{\n\t\t\tFeature: o,\n\t\t}\n\t} else {\n\t\trelated.R.Feature = o\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "18bbd2803ac94472f648fcf68369468a", "score": "0.36598754", "text": "func (s *BasemdxListener) ExitSet_name(ctx *Set_nameContext) {}", "title": "" }, { "docid": "fbc25cdb2a8ba4d94153197b46f7fd81", "score": "0.36578226", "text": "func (o VpcIpamOperatingRegionOutput) RegionName() pulumi.StringOutput {\n\treturn o.ApplyT(func(v VpcIpamOperatingRegion) string { return v.RegionName }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "7fc2911601d121b74d5da7f880d845c0", "score": "0.36511457", "text": "func (usuario User) set_name(n string) {\n\tusuario.nombre = n;\n}", "title": "" }, { "docid": "41f83dc5037902ac399fd485ae9172bc", "score": "0.36412016", "text": "func (o *IgroupInitiatorModifyParams) WithName(name string) *IgroupInitiatorModifyParams {\n\to.SetName(name)\n\treturn o\n}", "title": "" }, { "docid": "f3a88de4b1a9d5e50f60567d9a60c835", "score": "0.36381647", "text": "func (n *Node) SetName(name string) {\n\tn.SetNodeParamStr(horde3d.NodeParams_NameStr, name)\n}", "title": "" }, { "docid": "d357535e1fb8b2621285a64cb2d224db", "score": "0.3637739", "text": "func (gid GoogleID) SetTeamStateName(teamname string, state string) error {\n\tvar id TeamID\n\trow := db.QueryRow(\"SELECT teamID FROM team WHERE LOWER(name) LIKE LOWER(?) ORDER BY teamID LIMIT 0,1\", teamname)\n\terr := row.Scan(&id)\n\tif err != nil {\n\t\tLog.Notice(err)\n\t}\n\n\treturn gid.SetTeamState(id, state)\n}", "title": "" }, { "docid": "e4fb237542d3f8fa988e717abbadd060", "score": "0.36377203", "text": "func (m *ConfigManagerCollection) SetHierarchyName(value *string)() {\n err := m.GetBackingStore().Set(\"hierarchyName\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "6e39298b4543e8e7a44fab50ad0907fe", "score": "0.3634384", "text": "func (m *CompanyDetail) SetPronunciation(value *string)() {\n err := m.GetBackingStore().Set(\"pronunciation\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "3466a3a2dfccf7f4a0d3ec534942050d", "score": "0.36299706", "text": "func (_m *MockENamedElement) SetName(_a0 string) {\n\t_m.Called(_a0)\n}", "title": "" }, { "docid": "62413b9ed98ca5bd15ebbeb2f3767faf", "score": "0.3624222", "text": "func (o *GetDialoguesByCharacterParams) SetCharacterName(characterName string) {\n\to.CharacterName = characterName\n}", "title": "" }, { "docid": "236a74f5da0808ddb2b597e446e2e960", "score": "0.36237895", "text": "func (o VpcIpamResourceDiscoveryOperatingRegionOutput) RegionName() pulumi.StringOutput {\n\treturn o.ApplyT(func(v VpcIpamResourceDiscoveryOperatingRegion) string { return v.RegionName }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "4f5b9d2c0f9b1b784dc0fa95c60a8748", "score": "0.36194164", "text": "func (p *person) updateFirstName(newFirstName string) {\n\t// get actual value from address and adjust it\n\t(*p).firstName = newFirstName\n}", "title": "" }, { "docid": "66dee4fc6f1948c78408b82899e17fa2", "score": "0.36165884", "text": "func (rr *RelatedRemittance) FormatTownName(options FormatOptions) string {\n\treturn rr.formatAlphaField(rr.RemittanceData.TownName, 35, options)\n}", "title": "" }, { "docid": "75f002331125778048dc1d8953021ffe", "score": "0.3601318", "text": "func (un *UnionPV) SetName(name string) *UnionPV {\n\tun.pv.SetName(name)\n\tun.pvc.SetName(name)\n\treturn un\n}", "title": "" }, { "docid": "3842b524d6351fe09440ac65991af5e8", "score": "0.3599848", "text": "func (pointerToPerson *person) updateName(newFirstName string) {\n\t//point to the person's first name value and update that name at jims address\n\t(*pointerToPerson).firstName = newFirstName\n}", "title": "" }, { "docid": "2ddba1945261de2149c1d3a8c2b4151b", "score": "0.3598566", "text": "func (_NewsroomContract *NewsroomContractTransactorSession) SetName(newName string) (*types.Transaction, error) {\n\treturn _NewsroomContract.Contract.SetName(&_NewsroomContract.TransactOpts, newName)\n}", "title": "" }, { "docid": "1889cfafab36ddb3c52d282713c3df41", "score": "0.35973907", "text": "func (a *Adaptor) SetName(n string) { a.name = n }", "title": "" }, { "docid": "686e40342fb7266ab54c318b7e37424f", "score": "0.35929716", "text": "func (m *ExtensionSchemaProperty) SetName(value *string)() {\n m.name = value\n}", "title": "" } ]
054bbab1ff261b2a075f6f5994af2ca1
coord returns a coordinate string
[ { "docid": "b650c009860e4161b8daa1c1275f287b", "score": "0.7540882", "text": "func coord(x float64, y float64, d int) string { return fmt.Sprintf(`%.*f,%.*f`, d, x, d, y) }", "title": "" } ]
[ { "docid": "a0d4b17cc815ee212394bd6e65fb3005", "score": "0.75065285", "text": "func (c Coordinate) String() string {\n\treturn strconv.Itoa(c.X) + \",\" + strconv.Itoa(c.Y)\n}", "title": "" }, { "docid": "65917d984ec05770c180216bb5a07b99", "score": "0.7426294", "text": "func (c Coordinate) String() string {\n\treturn fmt.Sprintf(\"(%d, %d)\", c.X, c.Y)\n}", "title": "" }, { "docid": "a21bc45fa1f83d805a983a53ad538f41", "score": "0.6644031", "text": "func PrintCoord(v GPScoord) {\n\tfmt.Println(\"DeviceID: \", v.deviceID)\n\tfmt.Println(\"\\tDeviceName: \", v.deviceName)\n\tfmt.Printf(\"\\tLat Lon Alt: %f %f %f\\n\", v.Lat, v.Lon, v.Alt)\n\tfmt.Println(\"\\tTimestamp: \", v.timestamp.Format(time.RFC3339))\n\tfmt.Println(\"\\tdeviceType: \", v.deviceType)\n\n}", "title": "" }, { "docid": "9867c9a967ef33c1698f39e2aedf3512", "score": "0.66391015", "text": "func coordpair(x, y float64) string {\n\treturn fmt.Sprintf(\"%g %g\", x, y)\n}", "title": "" }, { "docid": "f3861b8915b4c919045b9b895cb5164d", "score": "0.66147935", "text": "func (p position) String() string {\n return fmt.Sprintf(\"{X : %d , Y: %d}\",p.X, p.Y)\n}", "title": "" }, { "docid": "66c6072413f914486506dbb7f7026ce2", "score": "0.6611457", "text": "func (c *Coordinate) String() string {\n\tif c == nil {\n\t\treturn \"\"\n\t}\n\tif *c == (Coordinate{}) {\n\t\treturn \"\"\n\t}\n\treturn fmt.Sprintf(\"%v,%v\", c.Latitude, c.Longitude)\n}", "title": "" }, { "docid": "0c3a9cca0e3c89d03820801b8a412c3c", "score": "0.65365684", "text": "func loc(x float64, y float64, d int) string { return fmt.Sprintf(`x=\"%.*f\" y=\"%.*f\"`, d, x, d, y) }", "title": "" }, { "docid": "fa07a5d6cf2dab51590d6f28912e54e8", "score": "0.6416888", "text": "func (c Coord) String() string {\n\tb := bytes.NewBuffer(nil)\n\tfor i, n := range c {\n\t\tfmt.Fprintf(b, \"%d\", n)\n\t\tif i < len(c)-1 {\n\t\t\tb.WriteRune(',')\n\t\t}\n\t}\n\treturn b.String()\n}", "title": "" }, { "docid": "bd8f7976f5a692f77bc1af6aebd3e422", "score": "0.6372601", "text": "func (fc FloatCoordinate) String() string {\n\treturn fmt.Sprintf(\"(%.2f, %.2f)\", fc.X, fc.Y)\n}", "title": "" }, { "docid": "092ef23e46a045ae5a27d68698021715", "score": "0.6304816", "text": "func (utm *UTMCoord) String() string {\n\treturn fmt.Sprintf(\"%s %.0f %.0f\", utm.Zone, utm.Easting, utm.Northing)\n}", "title": "" }, { "docid": "d6dc97f2483188da8419c0be03720684", "score": "0.62734264", "text": "func (p Position) String() (int, int) {\n\treturn p.X, p.Y\n}", "title": "" }, { "docid": "fc90e2dbb514cbd633d477d0aa483847", "score": "0.62321615", "text": "func (s GPSCoordinates) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "1caf5f4d907ba2c6360d5b3c5aad307f", "score": "0.61234623", "text": "func (p Position) String() string {\n\treturn fmt.Sprintf(\"%d-%d\", p.x, p.y)\n}", "title": "" }, { "docid": "fb33b1d0d5e95c7c37c687476dd0d5b4", "score": "0.61172235", "text": "func (p Point) String() string {\n\treturn fmt.Sprintf(\"(%d,%d)\", p.X, p.Y)\n}", "title": "" }, { "docid": "864648db52d33bfb092f5f275b52f60d", "score": "0.6098505", "text": "func (position Position) String() string {\n\treturn fmt.Sprintf(\"[X: %v, Y: %v]\", position.X, position.Y)\n}", "title": "" }, { "docid": "e1ed028c67ef8f5fbbb5037d929a766b", "score": "0.60833704", "text": "func (p *Point) String() string {\n\treturn fmt.Sprintf(\"(%.4f, %.4f)\", p.X, p.Y)\n}", "title": "" }, { "docid": "0b9ff2a7c3976662261241466d7b32d9", "score": "0.5917369", "text": "func (v Homogen) Coord() Coord {\n\treturn Coord{v.X / v.W, v.Y / v.W, v.Z / v.W}\n}", "title": "" }, { "docid": "fddc0c48aa9f754e816e9e83a7a68747", "score": "0.591026", "text": "func (_ Astro) Coord(lat, lon float64) *globe.Coord {\n\treturn &globe.Coord{\n\t\tLat: unit.AngleFromDeg(lat),\n\t\tLon: unit.AngleFromDeg(lon),\n\t}\n}", "title": "" }, { "docid": "c2157313875d9ba378bc2d0aa0baa588", "score": "0.5910027", "text": "func (pc *PolarCoord) String() string {\n\tlat, long := LatLongToString(pc, LLFdeg)\n\treturn \"lat: \" + lat + \"°, long: \" + long + \"°\"\n}", "title": "" }, { "docid": "a32448661d63b74d1ad945a42b3f32d7", "score": "0.5873942", "text": "func (c mockCoord) Coord(n int) (int, error) {\n\treturn int(c), nil\n}", "title": "" }, { "docid": "ab0e6d8209142170d65cebb8af3b2ed5", "score": "0.5849428", "text": "func (r *Resolution) String() string {\n\treturn fmt.Sprintf(\"%dx%d\", r.X, r.Y)\n}", "title": "" }, { "docid": "c3c21439c759187f7b862a215c07fe4e", "score": "0.58480096", "text": "func (p Point)String() string{\n\treturn fmt.Sprintf(\"x:%f y:%f\", p.x, p.y)\n}", "title": "" }, { "docid": "89b9dd4eb28175f46b101931b6d3d966", "score": "0.58441997", "text": "func (pos *Position) String() string {\n\treturn fmt.Sprintf(\"%s%d\", literalExpression[pos.X], pos.Y+1)\n}", "title": "" }, { "docid": "718b53f907d00a83fd83ac5849b4124f", "score": "0.57818806", "text": "func getCoords(node string) (string, string) {\n\t// Initialise variables\n\tvar lat string = \"\"\n\tvar long string = \"\"\n\n\t// Make the API call\n\tresponse := httpReq(\"http://192.168.0.17/api/interpreter?data=[out:json];node(\" + node + \");out;\")\n\n\t// Get the elements from within the response\n\tcoords, _ := response.GetObjectArray(\"elements\")\n\tfor _, properties := range coords {\n\t\t// Extract the latitude and longitude from the JSON\n\t\tlatitude, _ := properties.GetNumber(\"lat\")\n\t\tlongitude, _ := properties.GetNumber(\"lon\")\n\t\tlat = string(latitude)\n\t\tlong = string(longitude)\n\t}\n\n\t// Return the latitude and longitude of the node\n\treturn lat, long\n}", "title": "" }, { "docid": "17971e05d84c2b2b8be258908f7aafe1", "score": "0.5763742", "text": "func (obj *Coordinates) buildCoordinates() {\n\tswitch obj.formatType {\n\tcase 1:\n\t\t{\n\t\t\t//\"DD.DDDDDD°\"\n\t\t\tobj.CoordinateN = fmt.Sprintf(\"%f°\", obj.N.DD)\n\t\t\tobj.CoordinateE = fmt.Sprintf(\"%f°\", obj.E.DD)\n\n\t\t\t//TODO протестировать, рассмотреть возможность перехода на math.Mod\n\t\t\tobj.N.MM = 0\n\t\t\tobj.E.MM = 0\n\t\t\tobj.N.SS = 0\n\t\t\tobj.E.SS = 0\n\t\t}\n\tcase 2:\n\t\t{\n\t\t\t//\"DD°MM.MMMM'\"\n\t\t\tobj.CoordinateN = fmt.Sprintf(\"%.0f°%.4f'\", obj.N.DD, obj.N.MM)\n\t\t\tobj.CoordinateE = fmt.Sprintf(\"%.0f°%.4f'\", obj.E.DD, obj.E.MM)\n\n\t\t\t//TODO протестировать, рассмотреть возможность перехода на math.Mod\n\t\t\tobj.N.DD = round(obj.N.DD, 0)\n\t\t\tobj.E.DD = round(obj.N.DD, 0)\n\t\t\tobj.N.SS = 0\n\t\t\tobj.E.SS = 0\n\t\t}\n\tcase 3:\n\t\t{\n\t\t\t//\"DD°MM'SS.SSS\\\"\"\n\t\t\tobj.CoordinateN = fmt.Sprintf(\"%.0f°%.0f'%.3f\\\"\", obj.N.DD, obj.N.MM, obj.N.SS)\n\t\t\tobj.CoordinateE = fmt.Sprintf(\"%.0f°%.0f'%.3f\\\"\", obj.E.DD, obj.E.MM, obj.E.SS)\n\n\t\t\t//TODO протестировать, рассмотреть возможность перехода на math.Mod\n\t\t\tobj.N.DD = round(obj.N.DD, 0)\n\t\t\tobj.E.DD = round(obj.N.DD, 0)\n\t\t\tobj.N.MM = round(obj.N.MM, 0)\n\t\t\tobj.E.MM = round(obj.N.MM, 0)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "bbfe1b78390be7538f7bf3be1c95df4b", "score": "0.575908", "text": "func (p Point) String() string {\n\tsX := strings.TrimRight(fmt.Sprintf(\"%f\", p.x), \"0\")\n\tsX = strings.TrimRight(sX, \".\")\n\tsY := strings.TrimRight(fmt.Sprintf(\"%f\", p.y), \"0\")\n\tsY = strings.TrimRight(sY, \".\")\n\ts := fmt.Sprintf(\"(%s, %s)\", sX, sY)\n\treturn s\n}", "title": "" }, { "docid": "7b3f6a3a0b6ddbd9f4d625a66354aa19", "score": "0.5740504", "text": "func (r *Rover) GetPosition() string {\n\treturn fmt.Sprintf(\"%d,%d\", r.x, r.y)\n}", "title": "" }, { "docid": "11cf688fb24043908ed53444a921ae86", "score": "0.5705606", "text": "func (pos Position) String() string {}", "title": "" }, { "docid": "b188df429ad9bcb5bf0592d2e2d07ed0", "score": "0.5701942", "text": "func (c Centroid) String() string {\n\treturn fmt.Sprintf(\"%v\", c.Point)\n}", "title": "" }, { "docid": "4f79b9c7f5aad0298c15bacee34ce1dc", "score": "0.5651968", "text": "func tileCoordFromString(z, x, y string) (tc tileCoord, ext string, err error) {\n\tvar z64 uint64\n\tif z64, err = strconv.ParseUint(z, 10, 8); err != nil {\n\t\terr = fmt.Errorf(\"cannot parse zoom level: %v\", err)\n\t\treturn\n\t}\n\ttc.z = uint8(z64)\n\tconst (\n\t\terrMsgParse = \"cannot parse %s coordinate axis: %v\"\n\t\terrMsgOOB = \"%s coordinate (%d) is out of bounds for zoom level %d\"\n\t)\n\tif tc.x, err = strconv.ParseUint(x, 10, 64); err != nil {\n\t\terr = fmt.Errorf(errMsgParse, \"first\", err)\n\t\treturn\n\t}\n\tif tc.x >= (1 << z64) {\n\t\terr = fmt.Errorf(errMsgOOB, \"x\", tc.x, tc.z)\n\t\treturn\n\t}\n\ts := y\n\tif l := strings.LastIndex(s, \".\"); l >= 0 {\n\t\ts, ext = s[:l], s[l:]\n\t}\n\tif tc.y, err = strconv.ParseUint(s, 10, 64); err != nil {\n\t\terr = fmt.Errorf(errMsgParse, \"y\", err)\n\t\treturn\n\t}\n\tif tc.y >= (1 << z64) {\n\t\terr = fmt.Errorf(errMsgOOB, \"y\", tc.y, tc.z)\n\t\treturn\n\t}\n\treturn\n}", "title": "" }, { "docid": "e422b19c46a7aa766814f864d3c663ad", "score": "0.559939", "text": "func (p Position) String() string {\n\treturn idxString(p.Col) + idxString(p.Row)\n}", "title": "" }, { "docid": "b5a1d1c7b127f9419fc66798b74bd29a", "score": "0.5580467", "text": "func (b *Board) Position() string { return NewXFEN(b).PositionPart() }", "title": "" }, { "docid": "adf40a8ac25e3e6c1bc1919d800c5eb0", "score": "0.556825", "text": "func Pos(x, y float64) string {\n\treturn fmt.Sprintf(`\\pos(%g,%g)`, x, y)\n}", "title": "" }, { "docid": "6923fed3d7ae5ca6e14653ae9f5331f2", "score": "0.5547164", "text": "func parseCoord(input string) (*coord, error) {\n\tvar c coord\n\tif _, err := fmt.Sscanf(input, \"%d, %d\", &c.x, &c.y); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &c, nil\n}", "title": "" }, { "docid": "ddf27e10f801d663e1902214ba36279b", "score": "0.5514504", "text": "func (o *Location) String() string {\n \n o.Coordinates = map[string]float64{\"\": 0.0} \n \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "title": "" }, { "docid": "c33df33d12b0d39a3b9891c9fba187e2", "score": "0.55140543", "text": "func (r *LatLong) Coord() *globe.Coord {\n\tr.coord.Lon = -r.Longitude\n\tr.coord.Lat = r.Latitude\n\treturn &r.coord\n}", "title": "" }, { "docid": "9c10dce93aa2a3f0410d4988a35e7bac", "score": "0.54791987", "text": "func NewCoordinate(x, y int, c interface{ String() string }) *Coordinate {\n\tvar coordinate Coordinate\n\tcoordinate.Text = tl.NewText(x, y, c.String(), palette.notations, tl.ColorDefault)\n\treturn &coordinate\n}", "title": "" }, { "docid": "aaa267ff637b5962d90babe189fdbff3", "score": "0.54361355", "text": "func (p Pos) String() string {\n\treturn fmt.Sprintf(\"%d:%d\", p.Line, p.Column)\n}", "title": "" }, { "docid": "c28c0e8581a9c2f45c0ad55256133a9f", "score": "0.542827", "text": "func (g *GeoM) String() string {\n\treturn fmt.Sprintf(\"[[%f, %f, %f], [%f, %f, %f]]\", g.a_1+1, g.b, g.tx, g.c, g.d_1+1, g.ty)\n}", "title": "" }, { "docid": "d05efb211568e7f5d3a5daa9778e6a14", "score": "0.5384452", "text": "func (lvl level) realCoordinateFloat64(gridX, gridY float64) (float64, float64) {\n\tv := lvl.grid.CoordinatesFromGridCoordinates(v2d.FromXY(gridX, gridY))\n\treturn v.X(), v.Y()\n}", "title": "" }, { "docid": "e70d535badba78b63b44f4d57352cd4a", "score": "0.5348636", "text": "func (user User) PosToString() string {\n\treturn string(user.PosToBytes())\n}", "title": "" }, { "docid": "d3dfcf96784d937c31ec39813dd914f4", "score": "0.53455335", "text": "func (p *PointLike) String() string {\n\tif p.IsInf() {\n\t\treturn \"[INF]\"\n\t}\n\treturn fmt.Sprintf(\"PointLike: [%s,\\n%s]\", p.dataX.String(), p.dataY.String())\n}", "title": "" }, { "docid": "c1ae6f8b859675fcf2157a3cdbeb57d2", "score": "0.53447354", "text": "func (rect *Rect) GridLocator() string {\n\tconst floaterr = 1 + 1E-11\n\n\tvar gl []rune\n\n\tlatitude := rect.Center().Lat().Degrees() + 90\n\tlongitude := rect.Center().Lng().Degrees() + 180\n\n\tlatprec := float64(10) * 24\n\tlonprec := float64(20) * 24\n\nloop:\n\tfor i := 0; ; i++ {\n\t\tswitch i % 4 {\n\t\tcase 0:\n\t\t\tlonprec /= 24\n\t\t\tif lonprec*floaterr < rect.Size().Lng.Degrees() {\n\t\t\t\tbreak loop\n\t\t\t}\n\t\t\tc := math.Floor(longitude / lonprec)\n\t\t\tgl = append(gl, rune(byte(c)+'A'))\n\t\t\tlongitude -= c * lonprec\n\t\tcase 1:\n\t\t\tlatprec /= 24\n\t\t\tif latprec*floaterr < rect.Size().Lat.Degrees() {\n\t\t\t\tbreak loop\n\t\t\t}\n\t\t\tc := math.Floor(latitude / latprec)\n\t\t\tgl = append(gl, rune(byte(c)+'A'))\n\t\t\tlatitude -= c * latprec\n\t\tcase 2:\n\t\t\tlonprec /= 10\n\t\t\tif lonprec*floaterr < rect.Size().Lng.Degrees() {\n\t\t\t\tbreak loop\n\t\t\t}\n\t\t\tc := math.Floor(longitude / lonprec)\n\t\t\tgl = append(gl, rune(byte(c)+'0'))\n\t\t\tlongitude -= c * lonprec\n\n\t\tcase 3:\n\t\t\tlatprec /= 10\n\t\t\tif latprec*floaterr < rect.Size().Lat.Degrees() {\n\t\t\t\tbreak loop\n\t\t\t}\n\t\t\tc := math.Floor(latitude / latprec)\n\t\t\tgl = append(gl, rune(byte(c)+'0'))\n\t\t\tlatitude -= c * latprec\n\t\t}\n\t}\n\n\tl := len(gl)\n\tif l%2 == 1 {\n\t\tgl = gl[:l-1]\n\t}\n\treturn string(gl)\n}", "title": "" }, { "docid": "d8aea2f7fc3ab9d3507a61b4cb8fdf71", "score": "0.53371686", "text": "func MakeCoordinate(s string) Coordinate {\n\tvals := strings.Split(s, \",\")\n\tx, _ := strconv.Atoi(vals[0])\n\ty, _ := strconv.Atoi(vals[1])\n\treturn Coordinate{\n\t\tX: x,\n\t\tY: y,\n\t}\n}", "title": "" }, { "docid": "f9f53ec4ff103a3b95a27252e88c88da", "score": "0.53198206", "text": "func (g *Graph) GeoCoordinates(ifid uint16) staticinfo.GeoCoordinates {\n\tia, ok := g.parents[ifid]\n\tif !ok {\n\t\tpanic(\"unknown interface\")\n\t}\n\treturn staticinfo.GeoCoordinates{\n\t\tLatitude: float32(ifid),\n\t\tLongitude: float32(ifid),\n\t\tAddress: fmt.Sprintf(\"Location %s#%d\", ia, ifid),\n\t}\n}", "title": "" }, { "docid": "eba853bba9057d28a329ee1e8a6e3d34", "score": "0.5314963", "text": "func (p *Pos) String() string {\n\treturn fmt.Sprintf(\"%s:%d:%d\", p.File, p.Row, p.Col)\n}", "title": "" }, { "docid": "4a22fac8d4ff3ff69b918ca171a572e0", "score": "0.5292293", "text": "func Coordinate(v interface{}, u ...unit.LengthUnit) types.Coordinate {\n\tvar unit unit.LengthUnit\n\tif len(u) > 0 {\n\t\tunit = u[0]\n\t}\n\treturn types.Coordinate{Value: v, Unit: unit}\n}", "title": "" }, { "docid": "ddf29d2dd05fed75d1247fb9a0195526", "score": "0.52769464", "text": "func parseCoordinate(val, side string) (float32, error) {\n\tif len(strings.TrimSpace(val)) == 0 {\n\t\treturn 0, fmt.Errorf(\"empty coordinates value\")\n\t}\n\tc, err := strconv.ParseFloat(val, 32)\n\tif err != nil {\n\t\treturn 0, fmt.Errorf(\"invalid type for %s, a number is required (eg. 45.3123)\", side)\n\t}\n\tswitch side {\n\tcase Latitude:\n\t\tif c < -90 || c > 90 {\n\t\t\treturn 0, fmt.Errorf(\"%s value %s out of range (-90/+90)\", side, val)\n\t\t}\n\tcase Longitude:\n\t\tif c < -180 || c > 180 {\n\t\t\treturn 0, fmt.Errorf(\"%s value %s out of range (-180/+180)\", side, val)\n\t\t}\n\t}\n\treturn float32(c), nil\n}", "title": "" }, { "docid": "e18d2a646a0ebe5aa66dfd5776260a57", "score": "0.522356", "text": "func (l *Location) GetCoords() (x, y int) {\n\treturn l.x, l.y\n}", "title": "" }, { "docid": "5b52c0141f6a249d7c47f9a5fb010d22", "score": "0.5221603", "text": "func (p Pos) String() string {\n\treturn fmt.Sprintf(\"%d:%d\", p.Line, p.Offset)\n}", "title": "" }, { "docid": "5733f03d227fec658ed1524fd4cbca15", "score": "0.5202771", "text": "func (l Location) String () string {\n return fmt.Sprintf(l.Loc)\n}", "title": "" }, { "docid": "d9f1811e45c7e765d3119074dca137bd", "score": "0.5192484", "text": "func (b Board) getCoord(n int) (x, y int) {\n\tcol := n / len(b)\n\treturn col, n - (col)*len(b)\n}", "title": "" }, { "docid": "8dcec60e236d2cb3f272ac885fc2d739", "score": "0.51908803", "text": "func TestGetLat(t *testing.T) {\n\tcoordinates := \"(58.159912, 8.018206)\"\n\texpected := \"58.159912\"\n\tres := getLat(coordinates)\n\n\tif res != expected {\n\t\tt.Errorf(\"Error. Got %v, want %v\", res, expected)\n\t}\n}", "title": "" }, { "docid": "b5030b751bcf87348a84179adcbe5e1f", "score": "0.5171365", "text": "func (p Point) GetId() string {\n\treturn fmt.Sprintf(\"x:%d,y:%d\", p.X, p.Y)\n}", "title": "" }, { "docid": "d1ad7caa9ee39cd68b68875ea38868f1", "score": "0.515826", "text": "func (p Pos) String() string {\n\treturn p.File + \":\" + strconv.Itoa(p.Line) + \":\" + strconv.Itoa(p.Col)\n}", "title": "" }, { "docid": "55305e4802d8f2197d0c01833af83943", "score": "0.51568395", "text": "func (pos Position) String() string {\n\tswitch pos {\n\tcase Bench:\n\t\treturn \"Bench\"\n\tcase Pitcher:\n\t\treturn \"Pitcher\"\n\tcase Catcher:\n\t\treturn \"Catcher\"\n\tcase First:\n\t\treturn \"First\"\n\tcase Second:\n\t\treturn \"Second\"\n\tcase Third:\n\t\treturn \"Third\"\n\tcase LShort:\n\t\treturn \"Left Shortstop\"\n\tcase RShort:\n\t\treturn \"Right Shortstop\"\n\tcase LField:\n\t\treturn \"Left Field\"\n\tcase LCenter:\n\t\treturn \"Left Center\"\n\tcase RCenter:\n\t\treturn \"Right Center\"\n\tcase RField:\n\t\treturn \"Right Field\"\n\tdefault:\n\t\treturn \"Not a position\"\n\t}\n}", "title": "" }, { "docid": "dbf897bf5dfef1b836892bc3af69b1b3", "score": "0.5144987", "text": "func (m MultiLineString) Coordinates() interface{} {\n\treturn m.Coords // longitude (Y), latitude (X)\n}", "title": "" }, { "docid": "ef91bea6e473aa27510125bdde20cf2f", "score": "0.5137244", "text": "func (pos Position) String() string {\n\ts := \"\"\n\tif pos.IsValid() {\n\t\ts += fmt.Sprintf(\"%d:%d\", pos.Line, pos.Column)\n\t}\n\tif s == \"\" {\n\t\ts = \"-\"\n\t}\n\treturn s\n}", "title": "" }, { "docid": "fbe19ceb289d7d1c27149ce033bcf573", "score": "0.50969803", "text": "func (m MultiLineString) GetCoordinates(setnum, coordnum int) (float64, float64) {\n\tcoords := (m.Coordinates()).([][][]float64)\n\n\tlon := coords[setnum][coordnum][0]\n\tlat := coords[setnum][coordnum][1]\n\n\treturn lon, lat // longitude (Y), latitude (X)\n}", "title": "" }, { "docid": "76e1b6f8adb44bd66e177fa6224d29e2", "score": "0.50935566", "text": "func floatToGpsCoord(f float64, dir byte) string {\n\n\tnegative := math.Signbit(f)\n\tif negative {\n\t\tswitch dir {\n\t\tcase 'N':\n\t\t\tdir = 'S'\n\t\tcase 'E':\n\t\t\tdir = 'W'\n\t\t}\n\t}\n\n\tf = math.Abs(f)\n\tdegs := math.Floor(f)\n\n\tminutes := (f - degs) * 60\n\treturn fmt.Sprintf(\"%d,%f%c\", int(degs), minutes, dir)\n}", "title": "" }, { "docid": "edf94979256f97896a292ffdbc36f0ec", "score": "0.50909436", "text": "func (t *Tie) GetCoords() (float64, float64, float64, float64, float64) {\n\treturn t.Xpos - t.Width, t.Ypos - t.Height, t.Width, t.Height, -1\n}", "title": "" }, { "docid": "ceeefb84a7ce747cb2f9ebd731632bf2", "score": "0.5084897", "text": "func serializeCoordinates(x, y *big.Int) ([]byte, error) {\n\tvar format byte = 0x2\n\tif y.Bit(0) == 1 {\n\t\tformat |= 0x1\n\t}\n\n\tb := make([]byte, 33)\n\tb[0] = format\n\txx := x.Bytes()\n\n\ti := 32 - len(xx)\n\tif i < 0 {\n\t\treturn nil, fmt.Errorf(\"tezos: unexpected X value length: %d\", len(xx))\n\t}\n\tcopy(b[1+i:], xx)\n\n\treturn b, nil\n}", "title": "" }, { "docid": "37fdd6bfecedc61978464a1f6967ad65", "score": "0.5079098", "text": "func (ll LL) String() string {\n\n\treturn fmt.Sprintf(\"%.6f %.6f\", ll.Lat, ll.Lon)\n}", "title": "" }, { "docid": "aea25cba06c603ee54a7952972c95a24", "score": "0.5074737", "text": "func (p Point) Geo() (lat, lon float64) {\n\txyz := p.C()\n\tr := math.Hypot(xyz[0], xyz[1])\n\tlat = math.Atan2(xyz[2], r) * (180 / math.Pi)\n\tlon = math.Atan2(xyz[1], xyz[0]) * (180 / math.Pi)\n\treturn\n}", "title": "" }, { "docid": "2a3dedac475bcbc2c4ef50b4c0c4729c", "score": "0.50508726", "text": "func (c *MockSerfClient) GetCoordinate(node string) (*coordinate.Coordinate, error) {\n\treturn c.coords[node], nil\n}", "title": "" }, { "docid": "2d4b8c20473a7a4082d9edc51dbefcf0", "score": "0.50228226", "text": "func (p Plot) String() {}", "title": "" }, { "docid": "60b00c5b2daf4dfe5ae34d0fef56a2ef", "score": "0.50208855", "text": "func convert_tile_coords(total [][]pc.Point) {\n\tcount := 0\n\tvar totalstring []string\n\tfor _, line := range total {\n\t\ttotalstring = []string{}\n\t\tfor _, pt := range line {\n\t\t\ttotalstring = append(totalstring, fmt.Sprintf(\"[%f,%f]\", pt.X, pt.Y))\n\t\t}\n\t\t//fmt.Printf(`%d,\"[%s]\"`, count, strings.Join(totalstring, \",\"))\n\t\t//fmt.Print(\"\\n\")\n\t\tcount += 1\n\t}\n\n}", "title": "" }, { "docid": "d976af9db9a53288df86295afbf6166b", "score": "0.4995706", "text": "func (s *SquareSegment) ToString() string {\n\treturn fmt.Sprintf(\"(%d %d %d %d)\", s.xmin, s.xmax, s.ymin, s.ymax)\n}", "title": "" }, { "docid": "a52808b492ab0db58bf4d89d46035c99", "score": "0.49739352", "text": "func Encode(lat, lon float64) string {\n\tvar tt [n]byte\n\n\tlat += 90.0\n\tlon += 180.0\n\n\tlat *= 10000.0\n\tlon *= 10000.0\n\n\tlat = float64(0 | int(lat))\n\tlon = float64(0 | int(lon))\n\n\tp := lat*3600000.0 + lon\n\tttNum := p * base\n\tvar c int\n\n\tfor i := 1; i < 10; i++ {\n\t\tc += (int(p) % base) * i\n\t\tp = float64(0 | int(p/base))\n\t}\n\n\tc %= base\n\tttNum += float64(c)\n\tttNum = float64(0 | int(ttNum))\n\n\tpos := n - 1\n\tfor i := 0; i < 10; i++ {\n\t\td := int(ttNum) % base\n\n\t\tif (i == 4) || (i == 7) {\n\t\t\ttt[pos] = ' '\n\t\t\tpos--\n\t\t}\n\n\t\tttNum = float64(0 | int(ttNum/base))\n\t\ttt[pos] = byte(alphabet[int(d)])\n\t\tpos--\n\t}\n\n\treturn string(tt[:])\n}", "title": "" }, { "docid": "db06dbdc6fa1c9f57932c977834ca8ba", "score": "0.49635053", "text": "func (tp *transformer) WellKnownString() string {\n\treturn fmt.Sprintf(\"TOWGS84[\\\"%f\\\", \\\"%f\\\", \\\"%f\\\", \\\"%f\\\", \\\"%f\\\", \\\"%f\\\", \\\"%f\\\"]\", tp.dx, tp.dy, tp.dz, tp.dM, tp.drx, tp.dry, tp.drz)\n}", "title": "" }, { "docid": "1052fa1cb5a60f0da6d34b9fd1e397b5", "score": "0.49537668", "text": "func (x *Xwing) GetCoords() (float64, float64, float64, float64, float64) {\n\treturn x.Xpos, x.Ypos, x.Width, x.Height, 1\n}", "title": "" }, { "docid": "a690533dcb62c08c2c730bdc4a5fada5", "score": "0.49504316", "text": "func encodeAddress(depth uint8, coord [2]float64) []byte {\n\tnBytes := int(math.Ceil(float64(depth) / 4))\n\taddr := make([]byte, nBytes)\n\n\tvar (\n\t\tx = coord[0]\n\t\ty = coord[1]\n\n\t\txMin float64 = 0\n\t\txMax float64 = 256\n\t\txMid float64 = 128\n\n\t\tyMin float64 = 0\n\t\tyMax float64 = 256\n\t\tyMid float64 = 128\n\t)\n\n\tiDepth := int(depth)\n\tfor i := 0; i < iDepth; i++ {\n\t\tbitIdx := i * 2\n\t\tbyteIdx := int(math.Floor(float64(bitIdx) / 8))\n\t\tbitOff := uint(bitIdx - (byteIdx * 8))\n\n\t\t// Write X bit\n\t\tif x >= xMid {\n\t\t\taddr[byteIdx] |= 0x01 << (7 - bitOff)\n\t\t\txMin = xMid\n\t\t} else {\n\t\t\txMax = xMid\n\t\t}\n\t\txMid = (xMin / 2) + (xMax / 2)\n\n\t\t// Write Y bit\n\t\tif y >= yMid {\n\t\t\taddr[byteIdx] |= 0x01 << (6 - bitOff)\n\t\t\tyMin = yMid\n\t\t} else {\n\t\t\tyMax = yMid\n\t\t}\n\t\tyMid = (yMin / 2) + (yMax / 2)\n\t}\n\n\treturn addr\n}", "title": "" }, { "docid": "d168aaef8ba3791204945d70776d975a", "score": "0.4948983", "text": "func (self *Point) ToString() string{\n return self.Object.Call(\"toString\").String()\n}", "title": "" }, { "docid": "f73cdbeccce357c54cfc5819e29485f4", "score": "0.4948542", "text": "func (p Point) GeoJSON() string {\n\tmapT, _ := geojson.NewPointGeoJSON(&[]float64{p.X(), p.Y()})\n\treturn string(mapT)\n}", "title": "" }, { "docid": "e2fa6334e4a193a3248aa4d1267af9a8", "score": "0.49368426", "text": "func (atom *Atom) String() string {\n\treturn fmt.Sprintf(\"%s\\t%s\\t%s\\t%s\", atom.Element.String(),\n\t\tformatCoord(atom.X), formatCoord(atom.Y), formatCoord(atom.Z))\n}", "title": "" }, { "docid": "cb6fa56523efd26e425fb2d52684a807", "score": "0.49365884", "text": "func (v Vector) String() string {\n\treturn fmt.Sprintf(\"{x: %.1f, y: %.1f}\", v.X, v.Y)\n}", "title": "" }, { "docid": "3311de3293f1dc5ca43152ea7235b0b8", "score": "0.4927539", "text": "func pointToString(point Point) string {\n\tvar buf bytes.Buffer\n\twritePoint(&buf, point)\n\treturn buf.String()\n}", "title": "" }, { "docid": "506dd07e7b3772f4cdf71a249d0cd720", "score": "0.49272358", "text": "func (nl NodeLocIdx) String() string {\n\treturn fmt.Sprintf(\"%d\", int(nl))\n}", "title": "" }, { "docid": "6a65f931b3a62066c4ee9e159fe833f8", "score": "0.4926084", "text": "func (p Pos) String() string {\n\targs := []interface{}{p.Name, p.Line, p.Col, p.Off}\n\tf := \"%s:%d:%d [%d]\"\n\tif p.Name == \"\" {\n\t\tf = f[3:]\n\t\targs = args[1:]\n\t}\n\treturn fmt.Sprintf(f, args...)\n}", "title": "" }, { "docid": "190b3720eb1cb7e8cf36eddafc22c10e", "score": "0.49203685", "text": "func getdistance(lon float64, lat float64) string {\n deltaLon := (lon - origLon) * (math.Pi / 180)\n deltaLat := (lat - origLat) * (math.Pi / 180)\n\n a := math.Sin(deltaLat/2)*math.Sin(deltaLat/2) +\n math.Cos(origLat*(math.Pi/180))*math.Cos(lat*(math.Pi/180))*\n math.Sin(deltaLon/2)*math.Sin(deltaLon/2)\n c := 2 * math.Atan2(math.Sqrt(a), math.Sqrt(1-a))\n\n return strconv.FormatFloat(earthRadius*c, 'f', 2, 64)\n}", "title": "" }, { "docid": "9a3bbae21df56756e3cd45aa8592d457", "score": "0.49160814", "text": "func (f *FloatPoint) ToString() string {\n\tif f.X < 1.0 || f.Y < 1.0 {\n\t\treturn fmt.Sprintf(\"%1.2f,%1.2f\", f.X, f.Y) // Percentages\n\t}\n\treturn fmt.Sprintf(\"%1.0f,%1.0f\", f.X, f.Y) // Whole\n}", "title": "" }, { "docid": "80945685fdd1e3e73bee801b9bdf73da", "score": "0.48952395", "text": "func generateCoordinates() coordindate {\n\trandomIntx := rand.Intn(91)\n\trandomInty := rand.Intn(91)\n\txSign := rand.Intn(2)\n\tySign := rand.Intn(2)\n\tif xSign < 1 {\n\t\trandomIntx = randomIntx * (-1)\n\t}\n\tif ySign < 1 {\n\t\trandomInty = randomInty * (-1)\n\t}\n\treturn coordindate{X: float64(randomIntx), Y: float64(randomInty)}\n}", "title": "" }, { "docid": "66af2bc9dd1a52867427762d8526cc8c", "score": "0.48914713", "text": "func (s *Ship) CoordinateSum() int {\n\treturn int(math.Abs(float64(s.X))) + int(math.Abs(float64(s.Y)))\n}", "title": "" }, { "docid": "ea19e5665de75a005a49503374504240", "score": "0.48810756", "text": "func (v LogPos) String() string {\n\thigh := uint32(v >> 32)\n\tlow := uint32(v)\n\treturn fmt.Sprintf(\"%X/%X\", high, low)\n}", "title": "" }, { "docid": "29a008ec9d74a07127882188b278b48f", "score": "0.4879256", "text": "func newCoordinates(str, plnt, sat int) systemCoordinates {\n\treturn systemCoordinates{\n\t\tstarPosition: str,\n\t\tplanetOrbit: plnt,\n\t\tsateliteOrbit: sat,\n\t}\n}", "title": "" }, { "docid": "1e8f70a4e38dee06d95c66bac57841f1", "score": "0.48710072", "text": "func (l *Location) Value() (driver.Value, error) {\n\tdata := r2.Point{X: l.X, Y: l.Y}.String()\n\treturn data, nil\n}", "title": "" }, { "docid": "bc7e9217ba215041c480211d6a525cee", "score": "0.48694187", "text": "func (d Dimension) String() string {\n\tswitch d.Unit {\n\tcase 1:\n\t\treturn fmt.Sprintf(\"%v x %v pixels per meter\", d.X, d.Y)\n\tdefault:\n\t\treturn fmt.Sprintf(\"%v x %v pixels, unknown units\", d.X, d.Y)\n\t}\n}", "title": "" }, { "docid": "3ff9b8666c6b9d278cc55d5fea3901f1", "score": "0.48573935", "text": "func (r *Region) chunkCoordinate(localX, localZ int) int {\n return (localX + localZ*32) * 4\n}", "title": "" }, { "docid": "cdd24757f20d018a438c23b23f5c649a", "score": "0.48465952", "text": "func (m Movable) show_coords(){\n // Swap in a name if name is blank\n if m.name == \"\" {\n m.name = \"NO NAME!\"\n }\n fmt.Printf(\"%v - x: %v, y: %v\\n\", m.name, m.x, m.y)\n}", "title": "" }, { "docid": "a4df3877cc1d295fd93624a42d7aaa20", "score": "0.4839175", "text": "func distanceCoord(from, to *api.Coord) api.Coord {\n\treturn api.Coord{from.X - to.X, from.Y - to.Y}\n}", "title": "" }, { "docid": "f2c932ac02e59487d4b0c1e6c135fc30", "score": "0.4837442", "text": "func (_this *Position) Coords() *Coordinates {\n\tvar ret *Coordinates\n\tvalue := _this.Value_JS.Get(\"coords\")\n\tret = CoordinatesFromJS(value)\n\treturn ret\n}", "title": "" }, { "docid": "e561a257407e134bfe992099f4690692", "score": "0.4828394", "text": "func (s Position) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "fa6cf2c6259f9e29ac76dd2026850b47", "score": "0.48280534", "text": "func (t Topology) String() string { return string(t) }", "title": "" }, { "docid": "8aa33ddee47346214dbc1f450785b033", "score": "0.48273367", "text": "func ParseTileCoord(z, x, y string) (tc *TileCoord, err error) {\n\tvar z64 uint64\n\tif z64, err = strconv.ParseUint(z, 10, 8); err != nil {\n\t\terr = fmt.Errorf(\"%w: cannot parse zoom level: %s\", ErrInvalidTileCoord, err)\n\t\treturn\n\t}\n\n\ttc = &TileCoord{}\n\n\ttc.Z = uint8(z64)\n\n\tconst errTplParse = \"cannot parse %s coordinate axis: %w\"\n\tconst errTplOOB = \"%s coordinate (%d) is out of bounds for zoom level %d\"\n\n\tif tc.X, err = strconv.ParseUint(x, 10, 64); err != nil {\n\t\terr = fmt.Errorf(\"%w: %v\", ErrInvalidTileCoord, fmt.Errorf(errTplParse, \"first\", err))\n\t\treturn\n\t}\n\n\tif tc.X >= (1 << z64) {\n\t\terr = fmt.Errorf(\"%w: %v\", ErrInvalidTileCoord, fmt.Errorf(errTplOOB, \"x\", tc.X, tc.Z))\n\t\treturn\n\t}\n\n\ts := y\n\tif l := strings.LastIndex(s, \".\"); l >= 0 {\n\t\ts = s[:l]\n\t}\n\n\tif tc.Y, err = strconv.ParseUint(s, 10, 64); err != nil {\n\t\terr = fmt.Errorf(\"%w: %v\", ErrInvalidTileCoord, fmt.Errorf(errTplParse, \"y\", err))\n\t\treturn\n\t}\n\n\tif tc.Y >= (1 << z64) {\n\t\terr = fmt.Errorf(\"%w: %v\", ErrInvalidTileCoord, fmt.Errorf(errTplOOB, \"y\", tc.Y, tc.Z))\n\t\treturn\n\t}\n\n\ttc.Y = (1 << uint64(tc.Z)) - 1 - tc.Y\n\n\treturn\n}", "title": "" }, { "docid": "eabcc4662d93e822af6a4f7299c4b459", "score": "0.48266464", "text": "func (p *Pip) GetCoordinates() (Coordinates, error) {\n\tresult := Coordinates{}\n\terr := p.init()\n\tif err != nil {\n\t\treturn result, err\n\t}\n\n\tif evaluateResult(p.buildDescriptorContent, NameRegex) {\n\t\tcompile := regexp.MustCompile(NameRegex)\n\t\tvalues := compile.FindStringSubmatch(p.buildDescriptorContent)\n\t\tresult.ArtifactID = values[2]\n\t} else {\n\t\tresult.ArtifactID = \"\"\n\t}\n\n\tresult.Version, err = p.GetVersion()\n\tif err != nil {\n\t\treturn result, errors.Wrap(err, \"failed to retrieve coordinates\")\n\t}\n\n\treturn result, nil\n}", "title": "" }, { "docid": "1470f9bf4ad003effab008ca2a5f4039", "score": "0.4818233", "text": "func (p *Point) GetID() string { return p.id }", "title": "" }, { "docid": "3e784b36ed145b62adb574933cc5080c", "score": "0.48141456", "text": "func (p Position) Encode() uint64 {\n\treturn uint64(((p.x & 0x3ffffff) << 38) | ((p.y & 0xfff) << 26) | (p.z & 0x3ffffff))\n}", "title": "" }, { "docid": "0fa129ba3f3ef37342dd2ba9cd30e9cc", "score": "0.48138267", "text": "func generateRandomCoordinate() *coordinate.Coordinate {\n\tconfig := coordinate.DefaultConfig()\n\tcoord := coordinate.NewCoordinate(config)\n\tfor i := range coord.Vec {\n\t\tcoord.Vec[i] = rand.NormFloat64()\n\t}\n\tcoord.Error = rand.NormFloat64()\n\tcoord.Adjustment = rand.NormFloat64()\n\treturn coord\n}", "title": "" }, { "docid": "810c35cf0be4b6820a9a52167ba2c118", "score": "0.48000735", "text": "func (p Point) String() string {\n\treturn p.Summary()\n}", "title": "" }, { "docid": "e3f755fc07b5005fd52abc20e79d5a3e", "score": "0.47991154", "text": "func (obj *rectangle) String() string {\n\treturn fmt.Sprintf(\"[pos: %s, dim: %s]\", obj.pos.String(), obj.dim.String())\n}", "title": "" } ]
63edff44abb13c044d3478c14292e5ce
DeleteDataBag deletes the data bag
[ { "docid": "74662a898258661cf11ccd0ac62106fa", "score": "0.74588805", "text": "func (a *InfraProxyServer) DeleteDataBag(ctx context.Context, r *gwreq.DataBag) (*gwres.DataBag, error) {\n\treq := &infra_req.DataBag{\n\t\tOrgId: r.OrgId,\n\t\tServerId: r.ServerId,\n\t\tName: r.Name,\n\t}\n\tres, err := a.client.DeleteDataBag(ctx, req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &gwres.DataBag{\n\t\tName: res.GetName(),\n\t}, nil\n}", "title": "" } ]
[ { "docid": "1c659fa8faca02f128d03f7c41f9f5b5", "score": "0.7658588", "text": "func (s *Server) DeleteDataBag(ctx context.Context, req *request.DataBag) (*response.DataBag, error) {\n\terr := validation.New(validation.Options{\n\t\tTarget: \"databag\",\n\t\tRequest: *req,\n\t\tRequiredDefault: true,\n\t}).Validate()\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tc, err := s.createClient(ctx, req.OrgId, req.ServerId)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdata, err := c.client.DataBags.Delete(req.Name)\n\tif err != nil {\n\t\treturn nil, ParseAPIError(err)\n\t}\n\n\treturn &response.DataBag{\n\t\tName: data.Name,\n\t}, nil\n\n}", "title": "" }, { "docid": "e1c8cdcaa7c1ddf6f468c0bd4ccd868b", "score": "0.64621603", "text": "func (d DataBag) Delete(key string) error {\n\treturn d.store.HashDeleteValue(d.name, key)\n}", "title": "" }, { "docid": "0ae66d9756c9a7f2055b05eb1ed7921c", "score": "0.61772925", "text": "func (s *Server) DeleteDataBagItem(ctx context.Context, req *request.DataBagItem) (*response.DataBagItem, error) {\n\terr := validation.New(validation.Options{\n\t\tTarget: \"databag\",\n\t\tRequest: *req,\n\t\tRequiredDefault: true,\n\t}).Validate()\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tc, err := s.createClient(ctx, req.OrgId, req.ServerId)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\terr = c.client.DataBags.DeleteItem(req.Name, req.Item)\n\tif err != nil {\n\t\treturn nil, ParseAPIError(err)\n\t}\n\n\treturn &response.DataBagItem{\n\t\tName: req.Name,\n\t\tId: req.Item,\n\t}, nil\n\n}", "title": "" }, { "docid": "30fc090c87829f103dea63c4fdf8bdc4", "score": "0.5876066", "text": "func (a *InfraProxyServer) DeleteDataBagItem(ctx context.Context, r *gwreq.DataBagItem) (*gwres.DataBagItem, error) {\n\treq := &infra_req.DataBagItem{\n\t\tOrgId: r.OrgId,\n\t\tServerId: r.ServerId,\n\t\tName: r.Name,\n\t\tItem: r.Item,\n\t}\n\tres, err := a.client.DeleteDataBagItem(ctx, req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &gwres.DataBagItem{\n\t\tId: res.GetId(),\n\t\tName: res.GetName(),\n\t\tData: res.GetData(),\n\t}, nil\n}", "title": "" }, { "docid": "eb4de566faa261a6e39f674800a003fe", "score": "0.5809493", "text": "func (mb *MutableBag) Delete(name string) {\n\tdelete(mb.values, name)\n}", "title": "" }, { "docid": "f2d96f611c4d9763020b0b4bedc0fa20", "score": "0.54205287", "text": "func deleteData(w http.ResponseWriter, r *http.Request) {\n\tlog.Println(\"Trying to get data\")\n\tdecoder := json.NewDecoder(r.Body)\n var item model.Tax\n err := decoder.Decode(&item)\n if err != nil {\n panic(err)\n\t}\n\t\n\tconfig.DB.Delete(&item, item.ID)\n\n\tview.HTTPResponse(w, 200, \"Success\", nil)\n}", "title": "" }, { "docid": "d14397680473e0206bfe65c0d7422803", "score": "0.53916216", "text": "func (ds DataSet) Delete(ctx context.Context, wp *wp.WorkerPool) error {\n\tif c.Config.ElasticSearch.Enabled || c.Config.RDF.RDFStoreEnabled {\n\t\t_, err := ds.DropAll(ctx, wp)\n\t\treturn err\n\t}\n\n\tlog.Info().\n\t\tStr(\"component\", \"hub3\").\n\t\tStr(\"datasetID\", ds.Spec).\n\t\tStr(\"svc\", \"dataset\").\n\t\tMsg(\"deleting dataset\")\n\n\treturn ORM().DeleteStruct(&ds)\n}", "title": "" }, { "docid": "1e586d6b7eeafea162cf77b23a3e87ef", "score": "0.53560454", "text": "func (q *Persistence) delete(buf []uint64) []uint64 {\n\tif len(buf) == 0 {\n\t\treturn buf\n\t}\n\n\tdefer utils.Trace(\"deleted %d message(s) from backend database\", len(buf))()\n\terr := q.backend.Del(buf)\n\tif err != nil {\n\t\tlog.Errorf(\"failed to delete messages from backend database: %s\", err.Error())\n\t}\n\treturn []uint64{}\n}", "title": "" }, { "docid": "04fe6505a2d99a176ff2d1e41665c997", "score": "0.5352469", "text": "func (o *Avi) Delete(data *Data) (err error) {\n\t////////////////////////////////////////////////////////////////////////////\n\t// Retrive data from LB just in case updates were made - it happens...\n\t////////////////////////////////////////////////////////////////////////////\n\tr, err := o.Fetch(data.SourceUUID)\n\tif err != nil {\n\t\treturn\n\t}\n\t////////////////////////////////////////////////////////////////////////////\n\to.RemovedArtifacts = new(RemovedArtifacts)\n\tfor _, v := range data.Members {\n\t\to.RemovedArtifacts.Pools = append(o.RemovedArtifacts.Pools, o.Pool.Collection.Source[v.SourceUUID])\n\t}\n\t////////////////////////////////////////////////////////////////////////////\n\terr = o.Client.PoolGroup.Delete(r.SourceUUID)\n\tif err != nil {\n\t\treturn\n\t}\n\t////////////////////////////////////////////////////////////////////////////\n\tdelete(o.Collection.Source, data.SourceUUID)\n\tdelete(o.Collection.System, data.Name)\n\t////////////////////////////////////////////////////////////////////////////\n\n\treturn o.Cleanup()\n}", "title": "" }, { "docid": "fd4073f0f6258b3fdb0c0a89113e0308", "score": "0.53388524", "text": "func (b *Base) DeleteData(key string) {\n\tdelete(b.Data, key)\n}", "title": "" }, { "docid": "6836dde433dc6bd6438dcb80305dc5ca", "score": "0.53145045", "text": "func (b *mbatch) Del(key []byte) error {\n\tb.bsm.Lock()\n\tdefer b.bsm.Unlock()\n\n\tb.ops = append(b.ops, &bop{\n\t\to: opDel,\n\t\tk: key,\n\t\tv: nil,\n\t})\n\treturn nil\n}", "title": "" }, { "docid": "856a651c401c3404076b88d474a5b1ea", "score": "0.53071755", "text": "func removeData(d Data) {\n if store == nil {\n store = make(map[string]Data)\n }\n delete(store, d.SessionId)\n}", "title": "" }, { "docid": "695291c1760b041d41f45ae598215d96", "score": "0.52794904", "text": "func (b *queBatch) Del(notifyId, txHash *common.Uint256) error {\n\tb.Lock()\n\tdefer b.Unlock()\n\n\tvalue := append(notifyId[:], txHash[:]...)\n\theight, err := b.DB.Get(toKey(BKTQue, value...), nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\tb.Batch.Delete(toKey(BKTQue, value...))\n\tb.Batch.Delete(toKey(BKTQueIdx, append(height[:], value...)...))\n\treturn nil\n}", "title": "" }, { "docid": "67ce373b6c48653ff4e56e165ade7511", "score": "0.52749926", "text": "func (_m *ClientSession) DeleteData(_a0 string) {\n\t_m.Called(_a0)\n}", "title": "" }, { "docid": "bd7a11c17315122412314f811b2fe7ba", "score": "0.52746457", "text": "func (ds *databaseCommon) doDelete(datasetID string) error {\n\tcurrentRootRef, currentDatasets := ds.getRootAndDatasets()\n\tcurrentDatasets = currentDatasets.Remove(types.String(datasetID))\n\treturn ds.tryUpdateRoot(currentDatasets, currentRootRef)\n}", "title": "" }, { "docid": "b848475bb3fa304067ceb1c5c2bf6165", "score": "0.525429", "text": "func (bm *Boom) Delete(src interface{}) error {\n\tsrcs := []interface{}{src}\n\terr := bm.DeleteMulti(srcs)\n\tif merr, ok := err.(datastore.MultiError); ok {\n\t\treturn merr[0]\n\t} else if err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "c66389c7dd0684f7b391dcf2848289a0", "score": "0.5241538", "text": "func (t *SimpleChaincode) delete(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\tif len(args) != 1 {\n\t\treturn shim.Error(\"Incorrect number of arguments. Expecting 1\")\n\t}\n\n\tname := args[0]\n\n\t// Delete the key from the state in ledger\n\terr := stub.DelState(name)\n\tif err != nil {\n\t\treturn shim.Error(\"Failed to delete state\")\n\t}\n\n\t// Delete the key from detailCol collection\n\terr = stub.DelPrivateData(\"detailCol\", name) //remove the marble from chaincode state\n\tif err != nil {\n\t\treturn shim.Error(\"Failed to delete private data from detailCol:\" + err.Error())\n\t}\n\n\t// Delete the key from sensitiveCol collection\n\terr = stub.DelPrivateData(\"sensitiveCol\", name) //remove the marble from chaincode state\n\tif err != nil {\n\t\treturn shim.Error(\"Failed to delete private data from sensitiveCol:\" + err.Error())\n\t}\n\n\treturn shim.Success(nil)\n}", "title": "" }, { "docid": "86db5e6b84fe0a6295c54297f9af3f17", "score": "0.5201646", "text": "func (b *BitButt) Delete(key []byte) error {\n\tif b.closed {\n\t\treturn errClosed\n\t}\n\n\tdata := getDeleteRecord(key, time.Now())\n\n\tb.mtx.Lock()\n\n\tvar df *dataFile\n\n\tr, ok := b.keyDir[string(key)]\n\tif ok {\n\t\tr.recordSize = tombStone\n\n\t\tfileID := len(b.dataFiles) - 1\n\t\tdf = b.dataFiles[fileID]\n\t\t_, err := df.f.Write(data)\n\t\tif err != nil {\n\t\t\tb.mtx.Unlock()\n\t\t\treturn err\n\t\t}\n\n\t\tdf.offset += uint64(len(data))\n\t}\n\n\tb.mtx.Unlock()\n\n\tif df != nil && b.syncOnPut {\n\t\tif err := df.f.Sync(); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "e19f1c72429a618b81848bd9e81210db", "score": "0.5190425", "text": "func deleteData(c echo.Context) error {\n\n\t// Handle request parameter\n\tname := c.QueryParam(\"name\")\n\n\t// Connect to the database\n\tdb, err := gorm.Open(\"sqlite3\", \"test.db\")\n if err != nil {\n panic(\"failed to connect database\")\n }\n defer db.Close()\n\n // Check if the data already exsists\n var product County\n temp := db.First(&product, \"name = ?\", name).Value\n temp1 := temp.(*County)\n if temp1.Tax == 0 {\n \treturn c.String(http.StatusBadRequest, fmt.Sprintf(\"%s doesn't exist. Failed to delete.\", name))\n }\n\n // Delete the data\n db.Delete(&product)\n\n return c.String(http.StatusOK, fmt.Sprintf(\"County Name: %s has been deleted. \", name))\n\n\n}", "title": "" }, { "docid": "0f9d7bf10dfb628e7cd4f16ed194144c", "score": "0.518619", "text": "func (d *zfs) Delete(op *operations.Operation) error {\n\t// Check if the dataset/pool is already gone.\n\texists, err := d.datasetExists(d.config[\"zfs.pool_name\"])\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif !exists {\n\t\treturn nil\n\t}\n\n\t// Confirm that nothing's been left behind\n\tdatasets, err := d.getDatasets(d.config[\"zfs.pool_name\"])\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tinitialDatasets := d.initialDatasets()\n\tfor _, dataset := range datasets {\n\t\tif shared.StringInSlice(dataset, initialDatasets) {\n\t\t\tcontinue\n\t\t}\n\n\t\tfields := strings.Split(dataset, \"/\")\n\t\tif len(fields) > 1 {\n\t\t\treturn fmt.Errorf(\"ZFS pool has leftover datasets: %s\", dataset)\n\t\t}\n\t}\n\n\tif strings.Contains(d.config[\"zfs.pool_name\"], \"/\") {\n\t\t// Delete the dataset.\n\t\t_, err := shared.RunCommand(\"zfs\", \"destroy\", \"-r\", d.config[\"zfs.pool_name\"])\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t} else {\n\t\t// Delete the pool.\n\t\t_, err := shared.RunCommand(\"zpool\", \"destroy\", d.config[\"zfs.pool_name\"])\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// On delete, wipe everything in the directory.\n\terr = wipeDirectory(GetPoolMountPath(d.name))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Delete any loop file we may have used\n\tloopPath := loopFilePath(d.name)\n\terr = os.Remove(loopPath)\n\tif err != nil && !os.IsNotExist(err) {\n\t\treturn fmt.Errorf(\"Failed to remove '%s': %w\", loopPath, err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "45d4839cbcf8e5d67f031ec3104d34a0", "score": "0.51789576", "text": "func (m *Construction) Delete() {\n\tfor _, bp := range m.Bpos {\n\t\tbp.Delete()\n\t}\n\tfor _, r := range m.Runs {\n\t\tr.Delete()\n\t}\n\tdb.DB.Delete(&m)\n}", "title": "" }, { "docid": "eeb3c53eaf87ee49160c3dc6ff971018", "score": "0.5176218", "text": "func DeleteData(id int) error {\n\ttx := db.Begin()\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\ttx.Rollback()\n\t\t}\n\t}()\n\n\tdbSQL := tx.Where(\"id = ?\", id).Delete(&MemoList{})\n\tif err := dbSQL.Error; err != nil {\n\t\ttx.Rollback()\n\t\treturn err\n\t}\n\tif dbSQL.RowsAffected < 1 {\n\t\ttx.Rollback()\n\t\treturn fmt.Errorf(\"Invalid operations.\")\n\t}\n\treturn tx.Commit().Error\n}", "title": "" }, { "docid": "9471e98f3358efe1aa47a36157a3e1c3", "score": "0.5175689", "text": "func (bag *Bag) Delete(key string) {\n\tdelete(bag.secrets, key)\n}", "title": "" }, { "docid": "9582ee446647604701815eaadd438df1", "score": "0.51582974", "text": "func (db *MemBucket) Del(key string) error {\n\tdelete(db.Data, key)\n\treturn nil\n}", "title": "" }, { "docid": "296c8c3c3dea043d39cf1f5cf8607c8c", "score": "0.5124819", "text": "func (b *Bag) Reset() {\n\tb.size = 0\n\tb.data = make(map[interface{}]int)\n}", "title": "" }, { "docid": "77fcb9150f126e632cc4e8026ee59767", "score": "0.50904495", "text": "func DeleteDataTuple(database *badger.DB, key string) error {\n\treturn database.View(func(txn *badger.Txn) error {\n\t\terr := txn.Delete([]byte(key))\n\t\treturn err\n\t})\n}", "title": "" }, { "docid": "35cdc5d760d9e5765d4c23c7a34e42cc", "score": "0.50558496", "text": "func (clientSession *ClientSession) DeleteData(key string) {\n\tdelete(clientSession.data, key)\n}", "title": "" }, { "docid": "aca2bb816a54da450cfc3ea4ccb34f02", "score": "0.50403506", "text": "func dbPurgeData(db *sql.DB, label string) {\n\t// validate connection to database is still valid\n\terr := db.Ping()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tstatement, err := db.Prepare(\"DELETE FROM Domains WHERE Label=?\")\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t\treturn\n\t}\n\n\tresponse, err := statement.Exec(label)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tnumRows, err := response.RowsAffected()\n\tlog.Printf(\"Deleted %d rows for label '%s'\", numRows, label)\n}", "title": "" }, { "docid": "63976136681fe6db8f2dda2471426e4f", "score": "0.5013458", "text": "func (o *ChartDatum) Delete(exec boil.Executor) error {\n\tif o == nil {\n\t\treturn errors.New(\"models: no ChartDatum provided for delete\")\n\t}\n\n\tif err := o.doBeforeDeleteHooks(exec); err != nil {\n\t\treturn err\n\t}\n\n\targs := queries.ValuesFromMapping(reflect.Indirect(reflect.ValueOf(o)), chartDatumPrimaryKeyMapping)\n\tsql := \"DELETE FROM \\\"chart_data\\\" WHERE \\\"id\\\"=$1\"\n\n\tif boil.DebugMode {\n\t\tfmt.Fprintln(boil.DebugWriter, sql)\n\t\tfmt.Fprintln(boil.DebugWriter, args...)\n\t}\n\n\t_, err := exec.Exec(sql, args...)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"models: unable to delete from chart_data\")\n\t}\n\n\tif err := o.doAfterDeleteHooks(exec); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "a2705162faf34914c1f6bbb34811230a", "score": "0.50059533", "text": "func (b *Bag) Remove(val interface{}) {\n\told, ok := b.data[val]\n\tif ok {\n\t\tif old > 1 {\n\t\t\tb.data[val] = old - 1\n\t\t} else {\n\t\t\tdelete(b.data, val)\n\t\t}\n\t\tb.size--\n\t}\n}", "title": "" }, { "docid": "a2705162faf34914c1f6bbb34811230a", "score": "0.50059533", "text": "func (b *Bag) Remove(val interface{}) {\n\told, ok := b.data[val]\n\tif ok {\n\t\tif old > 1 {\n\t\t\tb.data[val] = old - 1\n\t\t} else {\n\t\t\tdelete(b.data, val)\n\t\t}\n\t\tb.size--\n\t}\n}", "title": "" }, { "docid": "a13ae868b6eea9b4c203fd66a24799a8", "score": "0.49711663", "text": "func (c *ModelAdaptor) Delete(d *model.KVPair) error {\n\tvar err error\n\tswitch d.Key.(type) {\n\tcase model.NodeKey:\n\t\tp, o := toNodeDeleteComponents(d)\n\t\tif err = c.applyOrDeleteSubcomponents(o); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif err = c.client.Delete(p); err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\tcase model.GlobalBGPConfigKey:\n\t\tnd := toDatastoreGlobalBGPConfig(*d)\n\t\terr := c.client.Delete(nd)\n\t\treturn errors.UpdateErrorIdentifier(err, d.Key)\n\tdefault:\n\t\treturn c.client.Delete(d)\n\t}\n}", "title": "" }, { "docid": "598b829e8fa64d6eb9021746a7d8c944", "score": "0.49631268", "text": "func BatchDeleteData(ids *[]int) error {\n\ttx := db.Begin()\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\ttx.Rollback()\n\t\t}\n\t}()\n\n\tfor _, id := range *ids {\n\t\tdbSQL := tx.Where(\"id = ?\", id).Delete(&MemoList{})\n\t\tif err := dbSQL.Error; err != nil {\n\t\t\ttx.Rollback()\n\t\t\treturn err\n\t\t}\n\n\t\tif dbSQL.RowsAffected < 1 {\n\t\t\ttx.Rollback()\n\t\t\treturn fmt.Errorf(\"Invalid operation.\")\n\t\t}\n\t}\n\treturn tx.Commit().Error\n}", "title": "" }, { "docid": "a58eaf3309f92db3bc0bead4de3bf4ae", "score": "0.49614567", "text": "func (b *Boke) Delete(db XODB) error {\n\tvar err error\n\n\t// if doesn't exist, bail\n\tif !b._exists {\n\t\treturn nil\n\t}\n\n\t// if deleted, bail\n\tif b._deleted {\n\t\treturn nil\n\t}\n\n\t// sql query\n\tconst sqlstr = `DELETE FROM ogiri.boke WHERE boke_id = ?`\n\n\t// run query\n\tXOLog(sqlstr, b.BokeID)\n\t_, err = db.Exec(sqlstr, b.BokeID)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// set deleted\n\tb._deleted = true\n\n\treturn nil\n}", "title": "" }, { "docid": "2a7fc125e17248f908ea786d34d36f97", "score": "0.49566415", "text": "func (bs ByteStore) Delete(bucket string, key string) error {\n\n\terr := bs.BoltDB.Update(func(tx *bolt.Tx) error {\n\t\tbucket := tx.Bucket([]byte(bucket))\n\t\tif bucket == nil {\n\t\t\treturn nil\n\t\t}\n\n\t\treturn bucket.Delete([]byte(key))\n\t})\n\n\treturn err\n}", "title": "" }, { "docid": "81b0aaee0f85a4c848cd17c05925dadc", "score": "0.4936609", "text": "func (m *ByteMap) Delete(key string) {\n\tm.data.Delete(key)\n}", "title": "" }, { "docid": "1c6d0738645c0da8f4ac4cc14f3401cd", "score": "0.4934039", "text": "func (t *PotCommun) delete(stub shim.ChaincodeStubInterface, args []string) pb.Response {\r\n\tif len(args) != 1 {\r\n\t\treturn shim.Error(\"Incorrect number of arguments. Expecting 1\")\r\n\t}\r\n\r\n\tA := args[0]\r\n\r\n\t// Delete the key from the state in ledger\r\n\terr := stub.DelState(A)\r\n\tif err != nil {\r\n\t\treturn shim.Error(\"Failed to delete state\")\r\n\t}\r\n\r\n\treturn shim.Success(nil)\r\n}", "title": "" }, { "docid": "cd206564238d7af624e72cacedbcfde6", "score": "0.49099144", "text": "func (o JudgementPartiesBSlice) DeleteAll(ctx context.Context, exec boil.ContextExecutor) (int64, error) {\n\tif len(o) == 0 {\n\t\treturn 0, nil\n\t}\n\n\tvar args []interface{}\n\tfor _, obj := range o {\n\t\tpkeyArgs := queries.ValuesFromMapping(reflect.Indirect(reflect.ValueOf(obj)), judgementPartiesBPrimaryKeyMapping)\n\t\targs = append(args, pkeyArgs...)\n\t}\n\n\tsql := \"DELETE FROM \\\"JudgementPartiesB\\\" WHERE \" +\n\t\tstrmangle.WhereClauseRepeated(string(dialect.LQ), string(dialect.RQ), 1, judgementPartiesBPrimaryKeyColumns, len(o))\n\n\tif boil.IsDebug(ctx) {\n\t\twriter := boil.DebugWriterFrom(ctx)\n\t\tfmt.Fprintln(writer, sql)\n\t\tfmt.Fprintln(writer, args)\n\t}\n\tresult, err := exec.ExecContext(ctx, sql, args...)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: unable to delete all from judgementPartiesB slice\")\n\t}\n\n\trowsAff, err := result.RowsAffected()\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: failed to get rows affected by deleteall for JudgementPartiesB\")\n\t}\n\n\treturn rowsAff, nil\n}", "title": "" }, { "docid": "400915888eaab19949a4a0d084497192", "score": "0.49046504", "text": "func (backend *Backend) Del(ctx context.Context, key string) error {\n\treturn backend.db.Delete([]byte(key), &opt.WriteOptions{Sync: true})\n}", "title": "" }, { "docid": "8fcbc3b8eb2e904c91b6957b097e8011", "score": "0.48778263", "text": "func (dm *DatasetManager) deleteDataset(name string) error {\n\tif err := db.DeleteResource(name); err != nil {\n\t\treturn err\n\t}\n\n\tif datasetChannel := dm.GetDatasetChannel(name); datasetChannel != nil {\n\t\tclose(datasetChannel)\n\t\tdelete(dm.DatasetChannelMap, name)\n\t}\n\n\tdelete(dm.DatasetMap, name)\n\n\tdelete(dm.DataSourcesSignal, name)\n\n\treturn nil\n}", "title": "" }, { "docid": "1bb07ee726e2104e9c73343178c89817", "score": "0.48775297", "text": "func (b *queBatch) DelAll(height uint32) error {\n\tb.Lock()\n\tdefer b.Unlock()\n\n\tvar key [4]byte\n\tbinary.BigEndian.PutUint32(key[:], height)\n\tprefix := toKey(BKTQueIdx, key[:]...)\n\tit := b.DB.NewIterator(util.BytesPrefix(prefix), nil)\n\tfor it.Next() {\n\t\tvalue := subKey(prefix, it.Key())\n\t\tb.Batch.Delete(toKey(BKTQue, value...))\n\t\tb.Batch.Delete(it.Key())\n\t}\n\tit.Release()\n\treturn nil\n}", "title": "" }, { "docid": "f16b1d5d0cb4f98828da6fbbb666510b", "score": "0.48763523", "text": "func (m *amcManager) DeleteCbsd(tx sq.BaseRunner, cbsd *DBCbsd) error {\n\tbuilder := m.builder.RunWith(tx)\n\twhere := sq.Eq{\"id\": cbsd.Id}\n\treturn db.NewQuery().\n\t\tWithBuilder(builder).\n\t\tFrom(cbsd).\n\t\tWhere(where).\n\t\tDelete()\n}", "title": "" }, { "docid": "464bf459dc711448f66a3657f0769a6c", "score": "0.4873785", "text": "func (c *Client) DataDelete(ctx context.Context, path string) error {\n\treturn c.datasvc.Delete(ctx, path)\n}", "title": "" }, { "docid": "5d77882cd8573daf519fefa7320a4490", "score": "0.4872724", "text": "func (r *RedisBasketRepository) Delete(ctx context.Context, id string) error {\n\treturn r.client.Del(ctx, id).Err()\n}", "title": "" }, { "docid": "3bcdb6a660568af13eeee3799668a9b3", "score": "0.48698145", "text": "func (o *JudgementPartiesB) Delete(ctx context.Context, exec boil.ContextExecutor) (int64, error) {\n\tif o == nil {\n\t\treturn 0, errors.New(\"models: no JudgementPartiesB provided for delete\")\n\t}\n\n\targs := queries.ValuesFromMapping(reflect.Indirect(reflect.ValueOf(o)), judgementPartiesBPrimaryKeyMapping)\n\tsql := \"DELETE FROM \\\"JudgementPartiesB\\\" WHERE \\\"Id\\\"=$1\"\n\n\tif boil.IsDebug(ctx) {\n\t\twriter := boil.DebugWriterFrom(ctx)\n\t\tfmt.Fprintln(writer, sql)\n\t\tfmt.Fprintln(writer, args...)\n\t}\n\tresult, err := exec.ExecContext(ctx, sql, args...)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: unable to delete from JudgementPartiesB\")\n\t}\n\n\trowsAff, err := result.RowsAffected()\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: failed to get rows affected by delete for JudgementPartiesB\")\n\t}\n\n\treturn rowsAff, nil\n}", "title": "" }, { "docid": "7ab99e448acc18b590e8d11814d7a6e2", "score": "0.48593915", "text": "func (b *Backend) Del(ctx context.Context, bucket, key string) (out []byte, err error) {\n\tvar (\n\t\tbuc *Bucket\n\t)\n\n\tif buc, err = b.bucket(bucket); err != nil {\n\t\treturn\n\t}\n\n\tout = buc.data[key]\n\tdelete(buc.data, key)\n\treturn\n}", "title": "" }, { "docid": "acf7be8bfe518a23b53af8a34c932675", "score": "0.485577", "text": "func Delete(data *interface{}, collection string) error {\n\tMongoInit()\n\terr := db.C(collection).Remove(data)\n\treturn err\n}", "title": "" }, { "docid": "524edc62191d8130cba098c14c960e6e", "score": "0.48503083", "text": "func (m *ConstructionBpo) Delete() {\n\tfor _, e := range m.Expenses {\n\t\te.Delete()\n\t}\n\tdb.DB.Delete(&m)\n}", "title": "" }, { "docid": "9d11425ba6b9fee2810881c12ebe2826", "score": "0.48411846", "text": "func (t *SimpleChaincode) delete(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\tif len(args) != 1 {\n\t\treturn pb.Response{Status: 400, Message: \"Incorrect number of arguments\"}\n\t}\n\n\ta := args[0]\n\n\t// Delete the key from the state in ledger\n\terr := stub.DelState(a)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\treturn shim.Success(nil)\n}", "title": "" }, { "docid": "c51ec152e40336bed3130acd7ed931b3", "score": "0.48388857", "text": "func sendDeleteDeviceProfileCmd(conn redis.Conn, storedKey string, dp models.DeviceProfile) {\n\t_ = conn.Send(DEL, storedKey)\n\t_ = conn.Send(ZREM, DeviceProfileCollection, storedKey)\n\t_ = conn.Send(HDEL, DeviceProfileCollectionName, dp.Name)\n\t_ = conn.Send(ZREM, CreateKey(DeviceProfileCollectionManufacturer, dp.Manufacturer), storedKey)\n\t_ = conn.Send(ZREM, CreateKey(DeviceProfileCollectionModel, dp.Model), storedKey)\n\tfor _, label := range dp.Labels {\n\t\t_ = conn.Send(ZREM, CreateKey(DeviceProfileCollectionLabel, label), storedKey)\n\t}\n}", "title": "" }, { "docid": "49d75611aa673285bae9ed96a6ef1d69", "score": "0.48204058", "text": "func (v *Vue) Delete(keypath string) {\r\n\tv.Call(\"$delete\", keypath)\r\n}", "title": "" }, { "docid": "942f3e730a35804eec9c99113195a59b", "score": "0.48197907", "text": "func (db *DB) Del(key string) {\n\n}", "title": "" }, { "docid": "f09070d68c9f5c1abedce7895fe5d7b1", "score": "0.4814482", "text": "func (t *SimpleChaincode) delete(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\tif len(args) != 1 {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting 1\")\n\t}\n\n\tA := args[0]\n\n\t// Delete the key from the state in ledger\n\terr := stub.DelState(A)\n\tif err != nil {\n\t\treturn nil, errors.New(\"Failed to delete state\")\n\t}\n\n\treturn nil, nil\n}", "title": "" }, { "docid": "ce392d23979eaf79dea8a60f2f6df8f3", "score": "0.48114946", "text": "func (impl *bst) Delete(k Key) {\n\n}", "title": "" }, { "docid": "beeb42c8ef81c58a0f1857518817bcae", "score": "0.4808634", "text": "func (this GtmDb) Delete(record interface{}) bool {\n\tif record == nil {\n\t\treturn false\n\t}\n\tfor k, _ := range record.(entity.Map) {\n\t out , err := exec.Command(\"mumps\",\"-run\",\"%XCMD\",\"zlink \\\"\" + this.MFilePath + \"\\\" set ^db=\\\"\" + this.Conn + \"\\\" write $$delete^GtmDb(\\\"\" + string(k) + \"\\\")\").Output()\n \tif err == nil {\n s := \"\"\n for _, field := range out {\n s = s+string(field)\n }\n\t\t\ts=s[0:len(s)-1]\n\t\t\tif s==\"1\" {\n\t\t\t\treturn true\n\t\t\t}\n }\n\t}\n\treturn true\n}", "title": "" }, { "docid": "88d09c040fade2549a15999d03c567bd", "score": "0.48069316", "text": "func unloadTestData(t *testing.T, db *db.DB) {\n\tt.Log(\"\\tWhen unloading data for the tests\")\n\t{\n\t\ttstdata.Drop(db)\n\n\t\tif err := sfix.Remove(db, \"STEST_T\"); err != nil {\n\t\t\tt.Fatalf(\"\\t%s\\tShould be able to remove the scripts : %v\", tests.Failed, err)\n\t\t}\n\t\tt.Logf(\"\\t%s\\tShould be able to remove the scripts.\", tests.Success)\n\n\t\tif err := mfix.Remove(db, \"test_xenia_data\"); err != nil {\n\t\t\tt.Fatalf(\"\\t%s\\tShould be able to remove the masks : %v\", tests.Failed, err)\n\t\t}\n\t\tt.Logf(\"\\t%s\\tShould be able to remove the masks.\", tests.Success)\n\t}\n}", "title": "" }, { "docid": "f322af8ffa2f8f589b029c9c9e684999", "score": "0.48051286", "text": "func (ts *Tileset) delete() error {\n\tif ts.db != nil {\n\t\tts.db.Close()\n\t}\n\tts.db = nil\n\tts.published = false\n\n\treturn nil\n}", "title": "" }, { "docid": "06e7096858cb38d420274b3d793952e4", "score": "0.48013598", "text": "func (d *driver) DeleteData(ctx context.Context, path string) (bool, error) {\n\td.modulesMux.RLock()\n\tdefer d.modulesMux.RUnlock()\n\tp, err := parsePath(path)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\ttxn, err := d.storage.NewTransaction(ctx, storage.WriteParams)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\tif err := d.storage.Write(ctx, txn, storage.RemoveOp, p, interface{}(nil)); err != nil {\n\t\td.storage.Abort(ctx, txn)\n\t\tif storage.IsNotFound(err) {\n\t\t\treturn false, nil\n\t\t}\n\t\treturn false, err\n\t}\n\tif err := d.storage.Commit(ctx, txn); err != nil {\n\t\treturn false, err\n\t}\n\treturn true, nil\n}", "title": "" }, { "docid": "4984e6c914ccdbb17be24753de6ebdde", "score": "0.479925", "text": "func TestDeleteBSOsInCorrectCollection(t *testing.T) {\n\tdb, _ := getTestDB()\n\tassert := assert.New(t)\n\n\tpayload := \"data\"\n\tif _, err := db.PutBSO(1, \"b1\", &payload, nil, nil); !assert.NoError(err) {\n\t\treturn\n\t}\n\tif _, err := db.PutBSO(2, \"b1\", &payload, nil, nil); !assert.NoError(err) {\n\t\treturn\n\t}\n\n\t_, err := db.DeleteBSOs(1, \"b1\")\n\tif !assert.NoError(err) {\n\t\treturn\n\t}\n\n\tbso, err := db.GetBSO(2, \"b1\")\n\tassert.NotNil(bso)\n\tassert.NoError(err)\n}", "title": "" }, { "docid": "74f7e4606e22a61473c16d948d0664fb", "score": "0.47989783", "text": "func (s *DropletsServiceOp) delete(ctx context.Context, path string) (*Response, error) {\n\treq, err := s.client.NewRequest(ctx, http.MethodDelete, path, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresp, err := s.client.Do(ctx, req, nil)\n\n\treturn resp, err\n}", "title": "" }, { "docid": "f82e48ff8b5aa0d57b7b1092f0cafd26", "score": "0.4786191", "text": "func (er *EntityRelation) DeleteB(bid ID) {\n\tids := er.bindex[bid]\n\tdelete(er.bindex, bid)\n\tfor _, id := range ids {\n\t\tEnt(&er.Scope, id).Destroy()\n\t}\n}", "title": "" }, { "docid": "cbbc7627af44c291822401b2bcbac3db", "score": "0.4776726", "text": "func (c *promCounter) Delete(tagsValue ...string) {\n\tc.pc.DeleteLabelValues(tagsValue...)\n}", "title": "" }, { "docid": "bd1d4d0361a691d585857d9a72d39e3a", "score": "0.47730798", "text": "func TestDumbDB_Remove(t *testing.T) {\n\n\tdbName := \"TestDumbDB_Remove\"\n\tdbP := dDB.NewDumbDB(\".\", dbName, os.Stdout)\n\n\tif dbP == nil {\n\t\tt.Errorf(\"Error creating DB %s\", dbName)\n\t}\n\n\terr := dbP.Store(User1.GetRecord(), dbName)\n\tif err != nil {\n\t\tt.Errorf(\"Error creating Record Record: %v Error: %s\", User1, err.Error())\n\t}\n\n\terr = dbP.Store(User2.GetRecord(), dbName)\n\tif err != nil {\n\t\tt.Errorf(\"Error creating Record Record: %v Error: %s\", User2, err.Error())\n\t}\n\n\terr = dbP.Remove(User1.GetKey(), dbName)\n\tif err != nil {\n\t\tt.Errorf(\"Error deleting Record Record: %v Error: %s\", User1, err.Error())\n\t}\n\n\terr = dbP.Remove(User2.GetKey(), dbName)\n\tif err != nil {\n\t\tt.Errorf(\"Error deleting Record Record: %v Error: %s\", User2, err.Error())\n\t}\n\n\tdummy := LargeKeyRecord{\n\t\tDummy: \"This will simulate large key record.\",\n\t}\n\n\terr = dbP.Remove(dummy.GetKey(), dbName)\n\tif err != bolt.ErrKeyTooLarge {\n\t\tt.Errorf(\"Expected error while creating record. Key size: %d\", len(dummy.GetKey()))\n\t}\n\n\tdbP.PrintStats()\n\tremoveDbFile(dbP.DbFullName)\n}", "title": "" }, { "docid": "9c3b7b5c2526761a461c9a2bfa2e3661", "score": "0.47691202", "text": "func (ss *sservice) EraseData(serviceName string) (err error) {\n\tif err = ss.ReadConfig(serviceName); err != nil {\n\t\treturn err\n\t}\n\tvar path string\n\tif path, err = helper.ResolvePath(filepath.FromSlash(ss.v.GetString(\"dir\")), false); err != nil {\n\t\treturn err\n\t}\n\tdata := filepath.Join(path, \"data\")\n\tif err := ss.os.RemoveAll(data); err != nil {\n\t\treturn err\n\t}\n\timmudbsys := filepath.Join(path, \"immudbsys\")\n\tif err := ss.os.RemoveAll(immudbsys); err != nil {\n\t\treturn err\n\t}\n\tif err := ss.os.RemoveAll(filepath.Join(path, \"immudb.identifier\")); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f5149df141f891067772637911718e24", "score": "0.47687766", "text": "func DeleteData(ctx context.Context, id string) error {\n\n\tif id == \"\" {\n\t\treturn errors.New(\"Nil job ID parameter\")\n\t}\n\n\t_, err := coll.Doc(id).Delete(ctx)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Error deleting data: %v\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "c35a78df2fb0c92c8707b1fefb8a4941", "score": "0.47681054", "text": "func (o *Chadoprop) Delete(exec boil.Executor) error {\n\tif o == nil {\n\t\treturn errors.New(\"chado: no Chadoprop provided for delete\")\n\t}\n\n\tif err := o.doBeforeDeleteHooks(exec); err != nil {\n\t\treturn err\n\t}\n\n\targs := queries.ValuesFromMapping(reflect.Indirect(reflect.ValueOf(o)), chadopropPrimaryKeyMapping)\n\tsql := \"DELETE FROM \\\"chadoprop\\\" WHERE \\\"chadoprop_id\\\"=$1\"\n\n\tif boil.DebugMode {\n\t\tfmt.Fprintln(boil.DebugWriter, sql)\n\t\tfmt.Fprintln(boil.DebugWriter, args...)\n\t}\n\n\t_, err := exec.Exec(sql, args...)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"chado: unable to delete from chadoprop\")\n\t}\n\n\tif err := o.doAfterDeleteHooks(exec); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "f53941b89e1aff7ca0e129d63e670240", "score": "0.47670504", "text": "func (cfile *CFile) delAllDataConn() {\n\tcfile.DataConnLocker.Lock()\n\tfor k, v := range cfile.DataConn {\n\t\tv.Close()\n\t\tdelete(cfile.DataConn, k)\n\t}\n\tcfile.DataConnLocker.Unlock()\n}", "title": "" }, { "docid": "2d1a525f876a41a3e4c61a6c262b81e3", "score": "0.4763356", "text": "func (o *EmailSend) Delete(exec boil.Executor) (int64, error) {\n\tif o == nil {\n\t\treturn 0, errors.New(\"models: no EmailSend provided for delete\")\n\t}\n\n\targs := queries.ValuesFromMapping(reflect.Indirect(reflect.ValueOf(o)), emailSendPrimaryKeyMapping)\n\tsql := \"DELETE FROM `email_send` WHERE `data_id`=?\"\n\n\tif boil.DebugMode {\n\t\tfmt.Fprintln(boil.DebugWriter, sql)\n\t\tfmt.Fprintln(boil.DebugWriter, args...)\n\t}\n\n\tresult, err := exec.Exec(sql, args...)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: unable to delete from email_send\")\n\t}\n\n\trowsAff, err := result.RowsAffected()\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: failed to get rows affected by delete for email_send\")\n\t}\n\n\treturn rowsAff, nil\n}", "title": "" }, { "docid": "22dabdd46ca9c6e2bbc3c6cd994695fd", "score": "0.47585255", "text": "func (m LDBMap) BatchDelete(key string) {\n\t(*m.lock).Lock()\n\tdefer (*m.lock).Unlock()\n\n\tm.batch.Delete([]byte(key))\n}", "title": "" }, { "docid": "48f8bb6ca459c4f54f3f3a380353ce8d", "score": "0.47558662", "text": "func (s *Skiplist) Del(datas ...interface{}) int {\n\ts.lock.Lock()\n\tdefer s.lock.Unlock()\n\ti := 0\n\tfor _, v := range datas {\n\t\tdataScore, ok := s.scoreMap[v]\n\t\tif ok {\n\t\t\tif s.delByScore(v, dataScore) {\n\t\t\t\ti++\n\t\t\t}\n\t\t}\n\t}\n\treturn i\n}", "title": "" }, { "docid": "7e741c1da9f34f943ebcfa765b9a9d91", "score": "0.47532076", "text": "func (t *SimpleChaincode) delete(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\tif len(args) != 1 {\n\t\treturn shim.Error(\"Incorrect number of arguments. Expecting 1\")\n\t}\n\n\tA := args[0]\n\n\t// Delete the key from the state in ledger\n\terr := stub.DelState(A)\n\tif err != nil {\n\t\treturn shim.Error(\"Failed to delete state\")\n\t}\n\n\treturn shim.Success(nil)\n}", "title": "" }, { "docid": "7e741c1da9f34f943ebcfa765b9a9d91", "score": "0.47532076", "text": "func (t *SimpleChaincode) delete(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\tif len(args) != 1 {\n\t\treturn shim.Error(\"Incorrect number of arguments. Expecting 1\")\n\t}\n\n\tA := args[0]\n\n\t// Delete the key from the state in ledger\n\terr := stub.DelState(A)\n\tif err != nil {\n\t\treturn shim.Error(\"Failed to delete state\")\n\t}\n\n\treturn shim.Success(nil)\n}", "title": "" }, { "docid": "0bb015475077d95e75a96235d61aba1f", "score": "0.47529334", "text": "func DeleteDisponibilidadData(id int) (err error) {\n\to := orm.NewOrm()\n\to.Begin()\n\n\tvar maps []orm.Params\n\tqb, _ := orm.NewQueryBuilder(\"mysql\")\n\tqb.Select(\"id as \\\"Id\\\"\").\n\t\tFrom(\"financiera.disponibilidad_proceso_externo\").\n\t\tWhere(\"disponibilidad = ?\")\n\tif _, err = o.Raw(qb.String(), id).Values(&maps); err != nil {\n\t\to.Rollback()\n\t\treturn\n\t}\n\n\tfor _, data := range maps {\n\t\tif idDispExt, err := strconv.Atoi(data[\"Id\"].(string)); err == nil {\n\t\t\tif _, err := o.Delete(&DisponibilidadProcesoExterno{Id: idDispExt}); err != nil {\n\t\t\t\to.Rollback()\n\t\t\t\treturn err\n\t\t\t}\n\t\t} else {\n\t\t\to.Rollback()\n\t\t\treturn err\n\t\t}\n\n\t}\n\n\tvar dispApr []orm.Params\n\tqb, _ = orm.NewQueryBuilder(\"mysql\")\n\tqb.Select(\"id as \\\"Id\\\"\").\n\t\tFrom(\"financiera.disponibilidad_apropiacion\").\n\t\tWhere(\"disponibilidad = ?\")\n\tif _, err = o.Raw(qb.String(), id).Values(&dispApr); err != nil {\n\t\to.Rollback()\n\t\treturn\n\t}\n\n\tfor _, data := range dispApr {\n\t\tif idDispExt, err := strconv.Atoi(data[\"Id\"].(string)); err == nil {\n\t\t\tif _, err := o.Delete(&DisponibilidadApropiacion{Id: idDispExt}); err != nil {\n\t\t\t\to.Rollback()\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t} else {\n\t\t\to.Rollback()\n\t\t\treturn err\n\t\t}\n\n\t}\n\n\tif _, err = o.Delete(&Disponibilidad{Id: id}); err != nil {\n\t\to.Rollback()\n\t\treturn\n\t}\n\n\to.Commit()\n\treturn\n}", "title": "" }, { "docid": "e2626f4abf691b4f9d38a394715013e5", "score": "0.4752517", "text": "func (o *Kanban) Delete(ctx context.Context, exec boil.ContextExecutor) (int64, error) {\n\tif o == nil {\n\t\treturn 0, errors.New(\"model: no Kanban provided for delete\")\n\t}\n\n\tif err := o.doBeforeDeleteHooks(ctx, exec); err != nil {\n\t\treturn 0, err\n\t}\n\n\targs := queries.ValuesFromMapping(reflect.Indirect(reflect.ValueOf(o)), kanbanPrimaryKeyMapping)\n\tsql := \"DELETE FROM `kanbans` WHERE `id`=?\"\n\n\tif boil.IsDebug(ctx) {\n\t\twriter := boil.DebugWriterFrom(ctx)\n\t\tfmt.Fprintln(writer, sql)\n\t\tfmt.Fprintln(writer, args...)\n\t}\n\tresult, err := exec.ExecContext(ctx, sql, args...)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"model: unable to delete from kanbans\")\n\t}\n\n\trowsAff, err := result.RowsAffected()\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"model: failed to get rows affected by delete for kanbans\")\n\t}\n\n\tif err := o.doAfterDeleteHooks(ctx, exec); err != nil {\n\t\treturn 0, err\n\t}\n\n\treturn rowsAff, nil\n}", "title": "" }, { "docid": "2d6303166b738054ac6089d7181dce47", "score": "0.47287285", "text": "func (querier *ModelQuerier) DeleteApplicationData(\n\tapp *Application, path lib.Path) error {\n\n\t// Empty the table if the path is root.\n\tif path.IsRoot() {\n\t\terr := r.Table(app.TableName).Delete().Exec(querier.session)\n\t\treturn err\n\t}\n\n\t// Delete the top-level doc if the path isn't nested.\n\tif len(path.RemainingSegments) == 0 {\n\t\terr := r.Table(app.TableName).Filter(map[string]string{\n\t\t\t\"name\": path.TopLevelDocName}).Delete().Exec(querier.session)\n\t\treturn err\n\t}\n\n\t// If the path is nested, read the data, then delete the given entry from the map,\n\t// then resave.\n\n\t// The below code is partly taken from ReadApplicationData and can probably be refactored.\n\tres, err := r.Table(app.TableName).Filter(map[string]string{\"name\": path.TopLevelDocName}).Run(querier.session)\n\tdefer res.Close()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// If the top-level doc for this query doesn't exist, return nil.\n\tif res.IsNil() {\n\t\treturn nil\n\t}\n\n\tvar doc appDoc\n\terr = res.One(&doc)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tnextMapLevel, ok := doc.Data.(map[string]interface{})\n\tif !ok {\n\t\treturn nil\n\t}\n\n\t// Dive into the nested maps.\n\tfor idx, segment := range path.RemainingSegments {\n\t\t// Try to get the next nested level for each remaining segment.\n\t\t_, ok = nextMapLevel[segment]\n\t\tif !ok {\n\t\t\treturn nil\n\t\t}\n\n\t\t// If this is the last segment, delete it from the map and replace in the db.\n\t\tif idx == len(path.RemainingSegments)-1 {\n\t\t\tdelete(nextMapLevel, segment)\n\t\t\terr = r.Table(app.TableName).Get(doc.ID).Replace(doc).Exec(querier.session)\n\t\t\treturn err\n\t\t}\n\n\t\tnextMapLevel, ok = nextMapLevel[segment].(map[string]interface{})\n\t\t// The nest doesn't go any further, so return nil.\n\t\tif !ok {\n\t\t\treturn nil\n\t\t}\n\t}\n\n\t// This should never be reached.\n\tlog.Println(\"ERROR: This should never be reached.\")\n\treturn nil\n}", "title": "" }, { "docid": "09426ed1c3b0239078c1bd61c404d900", "score": "0.47269508", "text": "func (bof *batchStruct) delete(keys ...string) *batchStruct {\n\tfor _, key := range keys {\n\t\tbof.operations = append(bof.operations, storage.DeleteOperation(key))\n\t}\n\n\treturn bof\n}", "title": "" }, { "docid": "bcc0f55c4ab0d2750a03bafd544016bb", "score": "0.47173214", "text": "func (display *display) putIntoDataBag(dataHints []*HintStruct) error {\n\n\tdisplay.setDstUserIDIfNotSet()\n\n\tlog.Println(\"Going to put data into data bags\")\n\t\n\tvar queries1, queries2, queries3 []string\n\n\tfor _, dataHint := range dataHints {\n\n\t\tvar attrsToBeSetToNULLs []string\n\t\tvar q1, q2, q3 string\n\n\t\t// we try to avoid putting data into data bags if it is not in the\n\t\t// currently checked user's migration\n\t\tif !display.isNodeInCurrentMigration(dataHint) {\n\t\t\tlog.Println(`This data is not migrated by the currently checked user,\n\t\t\t\tso it will not be put into data bags by this display thread`)\n\t\t\tcontinue\n\t\t}\n\n\t\t// dataHint.Data could be nil, which means there is no data,\n\t\t// if a thread crashes before executing queries3\n\t\t// and after executing queries1 and queries2, or data is deleted by services.\n\t\t// In both cases, there is no need to execute queries1 and queries2 again.\n\t\tif dataHint.Data != nil {\n\n\t\t\tattrsToBeSetToNULLs = display.getAttributesToSetAsSTENCILNULLs(dataHint)\n\n\t\t\tdisplay.refreshCachedDataHint(dataHint)\n\n\t\t\tvar STENCIL_NULL interface{}\n\n\t\t\tSTENCIL_NULL = \"-1\"\t\t\t\n\n\t\t\tfor attr := range dataHint.Data {\n\t\t\t\tif common_funcs.ExistsInSlice(attrsToBeSetToNULLs, attr) {\n\t\t\t\t\tdataHint.Data[attr] = STENCIL_NULL\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tprocData := addTableNameToDataAttibutes(dataHint.Data, dataHint.Table)\n\n\t\t\tq1 = fmt.Sprintf(\n\t\t\t\t`INSERT INTO data_bags (app, member, id, data, user_id, migration_id) VALUES \n\t\t\t\t(%s, %s, %d, '%s', %s, %d)`,\n\t\t\t\tdisplay.dstAppConfig.appID,\n\t\t\t\tdataHint.TableID,\n\t\t\t\tdataHint.KeyVal[\"id\"],\n\t\t\t\tConvertMapToJSONString(procData),\n\t\t\t\tdisplay.dstAppConfig.userID,\n\t\t\t\tdisplay.migrationID,\n\t\t\t)\n\n\t\t\tif !display.markAsDelete {\n\t\t\t\tq2 = fmt.Sprintf(\n\t\t\t\t\t`DELETE FROM \"%s\" WHERE id = %d`,\n\t\t\t\t\tdataHint.Table, dataHint.KeyVal[\"id\"],\n\t\t\t\t)\n\t\t\t} else {\n\t\t\t\tq2 = fmt.Sprintf(\n\t\t\t\t\t`UPDATE \"%s\" SET mark_as_delete = true WHERE id = %d`,\n\t\t\t\t\tdataHint.Table, dataHint.KeyVal[\"id\"],\n\t\t\t\t)\n\t\t\t}\n\n\t\t}\n\n\t\tq3 = fmt.Sprintf(\n\t\t\t`UPDATE display_flags SET display_flag = false, updated_at = now() \n\t\t\tWHERE app_id = %s and table_id = %s and id = %d;`,\n\t\t\tdisplay.dstAppConfig.appID,\n\t\t\tdataHint.TableID, dataHint.KeyVal[\"id\"],\n\t\t)\n\n\t\tlog.Println(\"^^^^^^^^^^^ Put Data Into Data Bags ^^^^^^^^^^^\")\n\t\tif dataHint.Data != nil {\n\t\t\tlog.Println(\"Attributes need to be set as STENCIL_NULLs (-1):\", attrsToBeSetToNULLs)\n\t\t\tlog.Println(\"INSERT INTO data_bags:\", q1)\n\t\t\tif !display.markAsDelete {\n\t\t\t\tlog.Println(\"DELETE FROM the application:\", q2)\n\t\t\t} else {\n\t\t\t\tlog.Println(\"MARK AS DELETE in the application:\", q2)\n\t\t\t}\n\t\t}\n\t\tlog.Println(\"UPDATE display_flags:\", q3)\n\t\tlog.Println(\"^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^\")\n\n\t\tqueries1 = append(queries1, q1)\n\t\tqueries2 = append(queries2, q2)\n\t\tqueries3 = append(queries3, q3)\n\n\t}\n\n\t// Since queries1 and queries3 need to be executed in Stencil, while queries2\n\t// need to be executed in the application database.\n\t// The sequence of executing the three queries ensure that\n\t// there is no anomaly.\n\tif err := db.TxnExecute(display.stencilDBConn, queries1); err != nil {\n\t\treturn err\n\t} else {\n\t\tif err1 := db.TxnExecute(display.dstAppConfig.DBConn, queries2); err1 != nil {\n\t\t\treturn err1\n\t\t} else {\n\t\t\tif err2 := db.TxnExecute(display.stencilDBConn, queries3); err2 != nil {\n\t\t\t\treturn err2\n\t\t\t} else {\n\t\t\t\treturn nil\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "86b744b0744eb081be70211bac4c05f9", "score": "0.47158706", "text": "func (o *FeatureDbxref) Delete(exec boil.Executor) error {\n\tif o == nil {\n\t\treturn errors.New(\"chado: no FeatureDbxref provided for delete\")\n\t}\n\n\tif err := o.doBeforeDeleteHooks(exec); err != nil {\n\t\treturn err\n\t}\n\n\targs := queries.ValuesFromMapping(reflect.Indirect(reflect.ValueOf(o)), featureDbxrefPrimaryKeyMapping)\n\tsql := \"DELETE FROM \\\"feature_dbxref\\\" WHERE \\\"feature_dbxref_id\\\"=$1\"\n\n\tif boil.DebugMode {\n\t\tfmt.Fprintln(boil.DebugWriter, sql)\n\t\tfmt.Fprintln(boil.DebugWriter, args...)\n\t}\n\n\t_, err := exec.Exec(sql, args...)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"chado: unable to delete from feature_dbxref\")\n\t}\n\n\tif err := o.doAfterDeleteHooks(exec); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "02536c82818dff674297e92e7a830b4d", "score": "0.47148284", "text": "func DeleteBid(w http.ResponseWriter, r *http.Request) {\n\n\tvar reqData map[string]interface{}\n\terr := json.NewDecoder(r.Body).Decode(&reqData)\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tw.Write([]byte(\"json format is expected\"))\n\t\treturn\n\t}\n\titem := reqData[\"item\"].(string)\n\tuserName := reqData[\"user_name\"].(string)\n\totpt := bid.DeleteBid(item, userName)\n\tw.Header().Set(\"Content-type\", \"application/json\")\n\tjson.NewEncoder(w).Encode(otpt)\n}", "title": "" }, { "docid": "3423a4a9adf7152c11282c4a775912c9", "score": "0.47087833", "text": "func (collection *Collection) delete(db *sqlx.DB) error {\n\t// TODO: delete features first\n\n\tsql, args, sqlErr := builder.\n\t\tDelete(collectionTable).\n\t\tWhere(sq.Eq{\"name\": collection.Name}).ToSql()\n\n\tif sqlErr != nil {\n\t\treturn sqlErr\n\t}\n\n\t_, err := db.Exec(sql, args...)\n\treturn err\n}", "title": "" }, { "docid": "b9f17efb430384d10d6caa996bc02731", "score": "0.47086012", "text": "func (m *RedisEngine) DeleteData(keys ...interface{}) error {\n\treturn m.Do(\"DEL\", keys...).Err\n}", "title": "" }, { "docid": "7bc955f4b2c2e94f75fa9ac03157054a", "score": "0.47062898", "text": "func (d *Decoder) Delete() {\n\tC.mpg123_delete(d.handle)\n}", "title": "" }, { "docid": "a3321828738d28185aa67b70bc4a1925", "score": "0.4698053", "text": "func Delete(ctx echo.Context) error {\n\tvar request = echo.Map{}\n\tif err := ctx.Bind(&request); err != nil {\n\t\tfmt.Println(err)\n\t}\n\tcollection := fmt.Sprintf(\"%v\", request[\"collection\"])\n\tdelete(request, \"collection\")\n\trequestData, err := json.Marshal(request)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\trequestJsonString := string(requestData)\n\tvar command COMMAND\n\tif _, ok := collections.Load(collection); ok {\n\t\tcommand = COMMAND{\n\t\t\tCommandID: guuid.New().String(),\n\t\t\tCommand: \"DELETE\",\n\t\t\tCollection: collection,\n\t\t\tSearch: []byte(requestJsonString),\n\t\t\tData: nil,\n\t\t}\n\t} else {\n\t\treturn ctx.JSON(http.StatusBadRequest, \"Collection not found!\")\n\t}\n\tgo worker(command.CommandID, jobs, results)\n\tjobs <- command\n\tvar result string\n\tfor result = <- results ; !strings.Contains(result, command.CommandID); {\n\t\tfmt.Println(result, \" \", command.CommandID)\n\t\tcontinue\n\t}\n\treturn ctx.JSON(http.StatusOK, result)\n}", "title": "" }, { "docid": "a993d642ae5c8e9eef076e997877b7ec", "score": "0.46972236", "text": "func (kv *kvData) Del(key string) {\n\tkv.data.Remove(key)\n}", "title": "" }, { "docid": "0d673bc54e0ebf03b4d337dcd9afbde6", "score": "0.4687724", "text": "func (b *leveldbBatch) Delete(key []byte) error {\n\tb.b.Delete(key)\n\tb.size++\n\treturn nil\n}", "title": "" }, { "docid": "d0d64bdd69412a1093bf80757ce5573a", "score": "0.4685374", "text": "func DeleteAllItems() {\n\n\tfor k := range dataStore {\n\t\tdelete(dataStore, k)\n\t}\n}", "title": "" }, { "docid": "010aedc4b0d6a406d06ecb8c5aafa907", "score": "0.46781403", "text": "func (xdgc *XDemoGroupContainer) Delete(db XODB) error {\n\tvar err error\n\n\t// if doesn't exist, bail\n\tif !xdgc._exists {\n\t\treturn nil\n\t}\n\n\t// if deleted, bail\n\tif xdgc._deleted {\n\t\treturn nil\n\t}\n\n\t// sql query\n\tconst sqlstr = `DELETE FROM x_showroom.x_demo_group_container WHERE id = ?`\n\n\t// run query\n\tXOLog(sqlstr, xdgc.ID)\n\t_, err = db.Exec(sqlstr, xdgc.ID)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// set deleted\n\txdgc._deleted = true\n\n\treturn nil\n}", "title": "" }, { "docid": "9ae9e50b0600e51e854464a37e7c8c3d", "score": "0.46695894", "text": "func (crud *caCertificatePostAction) Delete(arg ...crud.Arg) (crud.Arg, error) {\n\ts, ok := arg[0].(*state.KongState)\n\tif !ok {\n\t\tpanic(\"whoops\")\n\t}\n\tsvc, ok := arg[1].(*state.CACertificate)\n\tif !ok {\n\t\tpanic(\"whoops\")\n\t}\n\ts.CACertificates.Delete(*svc.ID)\n\treturn nil, nil\n}", "title": "" }, { "docid": "b8d5f4df83146f755a41fa49a77d5513", "score": "0.46662346", "text": "func (ds *DataStore) Del(key string) (prev []byte, ok bool, err error) {\n\turl := ds.address + \"/data/\" + key\n\treq, err := http.NewRequest(\"DELETE\", url, nil)\n\tif err != nil {\n\t\treturn\n\t}\n\tresp, err := ds.client.Do(req)\n\tif err != nil {\n\t\treturn\n\t}\n\tdefer resp.Body.Close()\n\n\tif resp.StatusCode == http.StatusOK {\n\t\tok = true\n\t}\n\n\tprev, err = ioutil.ReadAll(resp.Body)\n\treturn\n}", "title": "" }, { "docid": "6607a5c74f523b0501598f2f9b25be56", "score": "0.46655753", "text": "func (t *SimpleChaincode) delete(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\tvar jsonResp string\n\tvar offerJSON offer\n\tif len(args) != 1 {\n\t\treturn shim.Error(\"Incorrect number of arguments. Expecting 1\")\n\t}\n\n\tofferIdAsString := args[0]\n\tvalAsbytes, err := stub.GetState(offerIdAsString)\n\tif err != nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + offerIdAsString + \"\\\"}\"\n\t\treturn shim.Error(jsonResp)\n\t} else if valAsbytes == nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Offer does not exist: \" + offerIdAsString + \"\\\"}\"\n\t\treturn shim.Error(jsonResp)\n\t}\n\n\terr = json.Unmarshal([]byte(valAsbytes), &offerJSON)\n\tif err != nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to decode JSON of: \" + offerIdAsString + \"\\\"}\"\n\t\treturn shim.Error(jsonResp)\n\t}\n\n\terr = stub.DelState(offerIdAsString)\n\tif err != nil {\n\t\treturn shim.Error(\"Failed to delete state:\" + err.Error())\n\t}\n\n\tindexKey := \"ownerName~objectName\"\n\townerNameObjectNameIndexKey, err := stub.CreateCompositeKey(indexKey, []string{offerJSON.OwnerName, offerJSON.ObjectName})\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\terr = stub.DelState(ownerNameObjectNameIndexKey)\n\tif err != nil {\n\t\treturn shim.Error(\"Failed to delete state:\" + err.Error())\n\t}\n\treturn shim.Success(nil)\n}", "title": "" }, { "docid": "bf9cc002b89875b29f468eab8ba636f1", "score": "0.46619916", "text": "func (s *Segment) deleteElements(ctx context.Context, store blobstore.WithSet) error {\n\treturn store.Delete(ctx, s.StorageKey())\n}", "title": "" }, { "docid": "0c3b057c90a8ad1a6d3a5531d4abba42", "score": "0.4656573", "text": "func (b *Backend) Delete(key string) error {\n\treturn b.db.Update(func(tx *bolt.Tx) error {\n\t\tbucket := tx.Bucket([]byte(BucketOutputLayouts))\n\t\treturn bucket.Delete([]byte(key))\n\t})\n}", "title": "" }, { "docid": "f99200a3da502f5a045a6c5d094fa29f", "score": "0.46558884", "text": "func (s *EdgehubStorage) MergeDelete() error {\n\tbatch := new(leveldb.Batch)\n\n\titer := s.LevelDB.db.NewIterator(nil, nil)\n\tfor iter.Next() {\n\t\tname := string(iter.Key())\n\n\t\tobjType, key, err := splitKeyName(name)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"merge storage failed: splitKeyName %s error\", string(name))\n\t\t}\n\n\t\tif _, ok := s.Cache[objType]; !ok {\n\t\t\tbatch.Delete(iter.Key())\n\t\t\tcontinue\n\t\t}\n\n\t\t_, exist, err := s.Cache[objType].GetByKey(key)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"merge storage failed: %v\", err)\n\t\t}\n\t\tif !exist {\n\t\t\tbatch.Delete(iter.Key())\n\t\t}\n\t}\n\n\ts.LevelDB.db.Write(batch, nil)\n\titer.Release()\n\n\treturn nil\n}", "title": "" }, { "docid": "26c8990fb0d24ca2ee358fc2a4264fd5", "score": "0.46526653", "text": "func (t *SimpleChaincode) Delete(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\tif len(args) != 1 {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting 1\")\n\t}\n\t\n\tname := args[0]\n\terr := stub.DelState(name)\t\t\t\t\t\t\t\t\t\t\t\t\t//remove the key from chaincode state\n\tif err != nil {\n\t\treturn nil, errors.New(\"Failed to delete state\")\n\t}\n\n\t//get the marble index\n\tdataAsBytes, err := stub.GetState(dataIndexStr)\n\tif err != nil {\n\t\treturn nil, errors.New(\"Failed to get marble index\")\n\t}\n\tvar dataIndex []string\n\tjson.Unmarshal(dataAsBytes, &dataIndex)\t\t\t\t\t\t\t\t//un stringify it aka JSON.parse()\n\n\n// ============================================================================================================================\n// Have to check what is datasAsBytes/marbleasBytes !!!!\n// IMPORTANT\n// ============================================================================================================================\n\n\t//remove marble from index\n\tfor i,val := range dataIndex{\n\t\tfmt.Println(strconv.Itoa(i) + \" - looking at \" + val + \" for \" + name)\n\t\tif val == name{\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t//find the correct marble\n\t\t\tfmt.Println(\"found data\")\n\t\t\tdataIndex = append(dataIndex[:i], dataIndex[i+1:]...)\t\t\t//remove it\n\t\t\tfor x:= range dataIndex{\t\t\t\t\t\t\t\t\t\t\t//debug prints...\n\t\t\t\tfmt.Println(string(x) + \" - \" + dataIndex[x])\n\t\t\t}\n\t\t\tbreak\n\t\t}\n\t}\n\tjsonAsBytes, _ := json.Marshal(dataIndex)\t\t\t\t\t\t\t\t\t//save new index\n\terr = stub.PutState(dataIndexStr, jsonAsBytes)\n\treturn nil, nil\n}", "title": "" }, { "docid": "abf3e09bcdbb992e026c732ec426c73d", "score": "0.46495625", "text": "func (s *NodbStore) Delete(key interface{}) error {\n\ts.lock.Lock()\n\tdefer s.lock.Unlock()\n\n\tdelete(s.data, key)\n\treturn nil\n}", "title": "" }, { "docid": "b97407211de25083e9c968da3c9ca392", "score": "0.46490395", "text": "func (self *MapStore) Delete(rec record.Record) error {\n // input validation\n if rec == nil { return ErrNilRecord }\n\n // check if the record exists and if so, delete it\n var cleanLabel = strings.TrimSuffix(rec.GetLabel(), \".\")\n if collection, exists := self.Backing[cleanLabel] ; exists {\n for i, curr := range collection {\n // if the labels and types match\n if curr.GetLabel() == rec.GetLabel() && curr.GetType() == rec.GetType() {\n // do an \"in-place remove\" of the record -- still O(n-i), but preserves added order\n // but first, null out the position in the slice the record was\n // records are pointers and will not get garbage collected if the entry is not nil'd\n self.Backing[cleanLabel][i] = nil\n self.Backing[cleanLabel] = append(self.Backing[cleanLabel][:i], self.Backing[cleanLabel][i + 1:]...)\n self.Records -= 1\n return nil\n }\n }\n }\n\n // either there was no collection at the label,\n // or the record did not exist in the collection.... either way 404\n return ErrNotFound\n}", "title": "" }, { "docid": "341840d9d811f5fa04aa0777c0d1f9b1", "score": "0.46473682", "text": "func (s *CouchbaseSessionStore) Delete(key interface{}) error {\n\ts.lock.Lock()\n\tdefer s.lock.Unlock()\n\n\tdelete(s.data, key)\n\treturn nil\n}", "title": "" }, { "docid": "a71cb51cca6f1dfa6e0e30e6c193f3e0", "score": "0.4645814", "text": "func Clear(dbDriver neo4j.Driver) {\n\tsess, err := dbDriver.Session(neo4j.AccessModeWrite)\n\tpanicOnErr(err)\n\t_, err = sess.Run(\"match(n) detach delete n\", nil)\n\tpanicOnErr(err)\n}", "title": "" }, { "docid": "b0a8b2b2d693f2d8a7cc34abf8af7aa0", "score": "0.46445012", "text": "func (s *Sked) Delete(id uint64, tag string) error {\n\ts.rw.Lock()\n\tdefer s.rw.Unlock()\n\terr := s.DB.Update(func(tx *bolt.Tx) error {\n\t\tb := tx.Bucket([]byte(s.options.Bucket))\n\t\tcur := b.Cursor()\n\t\tkey := &Key{ID: id, Tag: tag}\n\t\tmatchBytes, err := key.MatchKey()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tfor k, _ := cur.First(); k != nil; k, _ = cur.Next() {\n\t\t\tif bytes.Contains(k, matchBytes) {\n\t\t\t\tb.Delete(k)\n\t\t\t}\n\t\t}\n\t\treturn nil\n\t})\n\treturn err\n}", "title": "" }, { "docid": "dfdf52639053de01a2043844bad4775e", "score": "0.4643527", "text": "func (db *Database) Clear() {\n\tfor k := range db.data {\n\t\tdelete(db.data, k)\n\t}\n}", "title": "" } ]
c696d3efc7d04af789e8c29f94fe2845
Trace will log an infolevel message in Zap.
[ { "docid": "b8be38f07a197fae1a8a5832f6d88642", "score": "0.760467", "text": "func (w Wrapper) Trace(msg string, args ...interface{}) {\n\tw.Zap.Info(msg, convertToZapAny(args...)...)\n}", "title": "" } ]
[ { "docid": "5cfdd077e8e8610ae20e97470f80c6dc", "score": "0.7242433", "text": "func (t *Tracer) TraceInfo(format string, args ...interface{}) {\n\tt.Trace(LevelInfo, format, args...)\n}", "title": "" }, { "docid": "2a3513ba0f6764659d5c064b25296f1c", "score": "0.70449156", "text": "func (l *DefaultLogger) Trace(message string) {\n\tprintln(\"TRA | \" + message)\n}", "title": "" }, { "docid": "04e02935abe8bd50e00d8d7f038ed9e2", "score": "0.6934188", "text": "func Trace(v ...interface{}) {\n\tif lvl == lt {\n\t\tlog(out, px, \"trace\", v...)\n\t}\n}", "title": "" }, { "docid": "617def8d58856688987009766ffe1c4d", "score": "0.6872611", "text": "func (l *Log) Trace(msg string, keysAndValues ...interface{}) {\n\tif (*l.log).V(2).Enabled() {\n\t\t// The V(1) level here is intentional:\n\t\t// sTRACE = finer DEBUG logging but is only enabled by setting V=2\n\t\t(*l.log).V(1).Info(fmt.Sprintf(\"TRACE: %s\", msg), keysAndValues...)\n\t}\n}", "title": "" }, { "docid": "118b774d1377651550104aefd524c9f2", "score": "0.6836396", "text": "func (l *Logger) Trace(args ...interface{}) {\n\tl.Log(TraceLevel, args...)\n}", "title": "" }, { "docid": "3ace7e1f7ead6171190a7679654f15d8", "score": "0.6803793", "text": "func (log *Log) Trace(message ...interface{}) {\n\tif log.level <= TRACE {\n\t\tlog.Println(\"TRACE:\", message)\n\t}\n}", "title": "" }, { "docid": "3ab3c88b6e5b22ff597ec5cb112fb710", "score": "0.6759248", "text": "func (self *TLogger) Trace(v ...interface{}) {\r\n\tmsg := fmt.Sprint(v...)\r\n\tself.manager.write(LevelTrace, \"[TRACE] \"+msg)\r\n}", "title": "" }, { "docid": "fb962176337d3624d850dc6f49f3a9fe", "score": "0.6749278", "text": "func (s *Service) Trace(msg string, args ...interface{}) {\n\ts.Log.Trace(msg, args...)\n}", "title": "" }, { "docid": "1fe5424ec4c9475d5aa2ae24c59253c4", "score": "0.6729298", "text": "func (l ZapLogger) Info(args ...interface{}) {\n\tl._log.Info(fmt.Sprint(args...))\n}", "title": "" }, { "docid": "a17d1647c52ac4eeb24c91423d54f513", "score": "0.6700909", "text": "func (l *Logger) Trace(v ...interface{}) {\n\tif l.level == lt {\n\t\tlog(l.out, l.prefix, \"trace\", v...)\n\t}\n}", "title": "" }, { "docid": "3795e13813b744af819911cd2a01640f", "score": "0.66309553", "text": "func (l *LoggerAdapter) Trace(msg string, fields ...map[string]interface{}) {\n\tl.logger.Trace(msg, fields...)\n}", "title": "" }, { "docid": "3bb8dc2d227fd1e47354330a1267a778", "score": "0.6598467", "text": "func (l Logger) Trace(msg ...interface{}) {\n\tif ce := l.logger.Check(zap.DebugLevel-1, fmt.Sprint(msg...)); ce != nil {\n\t\tce.Write()\n\t}\n}", "title": "" }, { "docid": "7afe58e233d77c13287910530f0c9185", "score": "0.6576367", "text": "func (l *Logger) Trace(message string) {\n\tif l.level <= TRACE {\n\t\tl.log(message, TRACE)\n\t}\n}", "title": "" }, { "docid": "7bf89baaeb57ca55feb786d3ce2ca182", "score": "0.65744376", "text": "func Trace(title string, functionName string, format string, a ...interface{}) {\n\tlogger.Trace.Output(2, fmt.Sprintf(\"%s : %s : Info : %s\\n\", title, functionName, fmt.Sprintf(format, a...)))\n}", "title": "" }, { "docid": "41a18a5b003c4f5f04fbfe27293a33c9", "score": "0.6536249", "text": "func (LCWLogger *fullLCWLogger) Trace(message ...interface{}) {\n\tif LCWLogger.highestLevel >= TraceLevel {\n\t\tif LCWLogger.setLogger == nil {\n\t\t\tif LCWLogger.forceFlush.IsSet() {\n\t\t\t\twg := &sync.WaitGroup{}\n\t\t\t\twg.Add(1)\n\t\t\t\tLCWLogger.logQueue <- LCWLogger.wrapMessage(TraceLevel, wg, message...)\n\t\t\t\twg.Wait()\n\t\t\t} else {\n\t\t\t\tLCWLogger.logQueue <- LCWLogger.wrapMessage(TraceLevel, nil, message...)\n\t\t\t}\n\t\t} else {\n\t\t\tLCWLogger.setLogger.Debug(message...)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "a054b4b8fc381af6b95f9948039b272c", "score": "0.6523043", "text": "func (l *TestLogger) Trace(msg string, fields ...map[string]interface{}) {\n\tl.record(Trace, msg, fields)\n}", "title": "" }, { "docid": "ee6e8b8ff981e7b81563aba8542c51ab", "score": "0.6518303", "text": "func (l *Logger) Trace(msg string, fields ...map[string]interface{}) {\n\n}", "title": "" }, { "docid": "e2f44f458971605c33fb79146a97a8e7", "score": "0.6516219", "text": "func (c customLogger) Trace(message string) {\n\n\tinitLogger()\n\tlog.Printf(\"%s %s\", terminal.Colorize(\"[TRACE]\", terminal.CYAN), message)\n}", "title": "" }, { "docid": "7afd37bc3570f69f04f2a21a392696f8", "score": "0.6507093", "text": "func (bl *BeeLogger) Trace(format string, v ...interface{}) {\n\tif LevelDebug > bl.level {\n\t\treturn\n\t}\n\tmsg := fmt.Sprintf(\"[D] \"+format, v...)\n\tbl.writerMsg(LevelDebug, msg)\n}", "title": "" }, { "docid": "2764748c5ed56705a29dbd877b7a69b3", "score": "0.6489053", "text": "func (l *TestLoggerFacade) Trace(msg string, fields ...map[string]interface{}) {\n\tl.record(Trace, msg, fields)\n}", "title": "" }, { "docid": "7421c28c2eca852e301fb4ac1d843069", "score": "0.6487643", "text": "func Trace(msg string, args ...interface{}) {\n\tmyLogger.Tracef(msg, args...)\n}", "title": "" }, { "docid": "bdff45945ec54c0a333440cf2da1be81", "score": "0.6452028", "text": "func (fl FileLogger) Trace(msgs ...interface{}) {\n\tif fl.logLvl > trace {\n\t\treturn\n\t}\n\tmsgs = append([]interface{}{getCallingStack()}, msgs...)\n\tfl.trace.Println(extractText(msgs))\n}", "title": "" }, { "docid": "25b621462697e260a75e301394fd7370", "score": "0.6439685", "text": "func (l *Logger) Info(args ...interface{}) {\n\tl.zapSugar.Info(args...)\n}", "title": "" }, { "docid": "21cc212f0f46c9146519963463c7e603", "score": "0.64383566", "text": "func (ll *LeveledLogger) Trace(msg string) {\n\tll.Tracef(\"%s\", msg)\n}", "title": "" }, { "docid": "77d993cf19cb1ee1e743544d7cf1d96e", "score": "0.642463", "text": "func Info(ctx context.Context, msg string, fields ...zapcore.Field) {\n\tLogger(ctx).Info(msg, fields...)\n}", "title": "" }, { "docid": "9a5c43f1170d02a6267de28a4bec5566", "score": "0.6411543", "text": "func Trace(v ...interface{}) {\n\tpkgOperationsMutex.Lock()\n\tdefer pkgOperationsMutex.Unlock()\n\tCurrent.traceWithCallDepth(staticFuncCallDepth, newLogMessage(v))\n}", "title": "" }, { "docid": "7205bf2f82837fe4e733bd4b6de5d904", "score": "0.6403556", "text": "func Info(msg string, fields ...zap.Field) {\n\tgetGlobalLog().Info(msg, fields...)\n}", "title": "" }, { "docid": "6aeeca7ceba18e87c716c25aeda027d1", "score": "0.63995075", "text": "func (p *Logger) Trace(v ...interface{}) {\n\tp.print(\"T\", fmt.Sprint(v...), Trace)\n}", "title": "" }, { "docid": "f842ab6df27288f11948a4c8f3deb59d", "score": "0.639721", "text": "func (l LogrusLogger) Trace(msg string, fields ...interface{}) {\n\tl.logger.WithFields(createFieldMap(fields)).Trace(msg)\n}", "title": "" }, { "docid": "5a8217f22c4edfe5111d3dae9e58eca8", "score": "0.639433", "text": "func (*logger) Trace(v ...interface{}) { log.TraceStackDepth(2, v...) }", "title": "" }, { "docid": "1f234dd9142cc4a90491276b94a585fd", "score": "0.6383005", "text": "func (logger *tracingLogger) Info(format string, args ...interface{}) {\n\tlogger.dispatchLogf(INFO, format, args...)\n}", "title": "" }, { "docid": "32eb42450c6aea0035faa1a8feb91186", "score": "0.637774", "text": "func (log *Log) Trace(message string) {\n\tlog.Log(common.NewMessage(common.MessageTrace, log.target, message))\n}", "title": "" }, { "docid": "eaecb711d753372b799f90114e9ad309", "score": "0.6365547", "text": "func Trace(msg string) {\n\tglobalLogger.Trace(msg)\n}", "title": "" }, { "docid": "eaae029672e6156d7b2984944c35070d", "score": "0.63607895", "text": "func (lc EdgeXLogger) Trace(msg string, labels ...string) error {\n\tlc.stdOutLogger.SetPrefix(\"TRACE: \")\n\tlc.stdOutLogger.Println(msg)\n\treturn lc.log(support_domain.TRACE, msg, labels)\n}", "title": "" }, { "docid": "e22bae45710e847726eb44ffaabdb6f4", "score": "0.6359131", "text": "func (l *thundraLogger) Trace(v ...interface{}) {\n\tif logLevelCode > traceLogLevelCode {\n\t\treturn\n\t}\n\tlogManager.recentLogLevel = traceLogLevel\n\tlogManager.recentLogLevelCode = traceLogLevelCode\n\tl.Output(2, fmt.Sprint(v...))\n}", "title": "" }, { "docid": "0b37f3c59b0f2dda94d5503b206371ea", "score": "0.63502836", "text": "func Trace(msg string, ctx ...Ctx) {\n\tLog.Trace(msg, ctx...)\n}", "title": "" }, { "docid": "2a2fec6f3ef091812fb9fbf81d5a517c", "score": "0.63461846", "text": "func Info(v ...interface{}) {\n\tif lvl <= li {\n\t\tlog(out, px, \"info\", v...)\n\t}\n}", "title": "" }, { "docid": "e2babcfc11ae03607d9706ab6691c5f2", "score": "0.63402677", "text": "func (a *adapter) Info(msg string, data ...interface{}) {\n\tctx := []interface{}{\"lvl\", \"info\", \"msg\", msg}\n\tctx = append(ctx, data...)\n\ta.Logger.Log(ctx...)\n}", "title": "" }, { "docid": "ea5d67424d302189022ce9bac3b63500", "score": "0.6323144", "text": "func (z *Zap) Info(args ...interface{}) {\n\tz.logger.Info(z.prependSlice(args)...)\n}", "title": "" }, { "docid": "bf5e2403e0dc3b6fdc7704b9b7f55701", "score": "0.62951136", "text": "func Info(ctx context.Context, msg string, args ...interface{}) {\n\tsendToAppender(ctx, InfoLevel, nil, msg, args...)\n}", "title": "" }, { "docid": "4112cbe45f909f4fa2d09f3c815e48b4", "score": "0.6287433", "text": "func (bootstrap *Bootstrap) Trace(v ...interface{}) {\r\n\tlogger.Trace(v...)\r\n}", "title": "" }, { "docid": "77c14c7e2ddde45dd456356ae5d200dd", "score": "0.62777084", "text": "func Trace(format string, v ...interface{}) {\n\tif LogInstance != nil {\n\t\tLogInstance.TracePrint(\"> \"+format+\"\\n\", v...)\n\t}\n}", "title": "" }, { "docid": "58be98b1b506f00adb34776d0e0484d3", "score": "0.62684757", "text": "func (l *Logger) Trace(msg string, fields watermill.LogFields) {\n\tfields = l.fields.Add(fields)\n\tfs := make([]zap.Field, 0, len(fields)+1)\n\tfor k, v := range fields {\n\t\tfs = append(fs, zap.Any(k, v))\n\t}\n\tl.backend.Debug(msg, fs...)\n}", "title": "" }, { "docid": "fefc0d1aea0d3694866c8118bafcaf8a", "score": "0.6258293", "text": "func Trace(message ...interface{}) {\n\tstd.Trace(message...)\n}", "title": "" }, { "docid": "4a9f91f7897c1c3f13ccbfc830aa3e7c", "score": "0.6257062", "text": "func (sl SpanLogger) Info(msg string, attributes ...Attribute) {\n\tsl.logToSpan(\"info\", msg, attributes...)\n}", "title": "" }, { "docid": "ede3bc29224d51d473a02a71ba28667c", "score": "0.625402", "text": "func Info(ctx context.Context, msg string, fields ...zap.Field) {\n\tgetLogger(ctx).Info(msg, fields...)\n}", "title": "" }, { "docid": "252ba42874974589fb0aa5207e1be5ef", "score": "0.6247997", "text": "func (l *CaptureLogger) Info(args ...interface{}) {\n\tl.loga(LevelInfo, args...)\n}", "title": "" }, { "docid": "50c3c510ee01c37e77ca63e18de43446", "score": "0.6242419", "text": "func (l *LogrusLogger) Trace(format string, args ...interface{}) {\n\tif l == nil {\n\t\tpanic(\"logger undefined\")\n\t}\n\n\tl.Log.Tracef(format, args...)\n}", "title": "" }, { "docid": "f52a5bfe7fe81219ec4cb9be69f71ccd", "score": "0.6209178", "text": "func Info(event string, ctx Context) { fire(LevelInfo, event, ctx) }", "title": "" }, { "docid": "2894024e82fdc91245b2724ecc2f30eb", "score": "0.6205674", "text": "func (cl *ContractLogger) Info(msg interface{}) {\n if INFO > cl.level { return }\n logMessage(INFO, buildLogString(cl.module, INFO, msg))\n}", "title": "" }, { "docid": "f97bd309fd31133250f72f7166aec94a", "score": "0.62007165", "text": "func Info(msg string, fields ...zap.Field) {\n\tLogger.Info(msg, fields...)\n}", "title": "" }, { "docid": "ed03fea6d8929409759ba0ed54bf0bac", "score": "0.61990047", "text": "func (t *T) Info(args ...interface{}) {\n\tt.logger.InfoDepth(1, t.prefixedArgs(args)...)\n\tt.ctxLogger.InfoDepth(t, 1, t.prefixedArgs(args)...)\n}", "title": "" }, { "docid": "062da495b5b7fa0c7f32834a20a03751", "score": "0.6194255", "text": "func Trace(a ...interface{}) {\n\tlogger.Trace.Output(2, fmt.Sprintf(\"%s\\n\", fmt.Sprint(a...)))\n}", "title": "" }, { "docid": "de6bc528695e135d2eef6fb2fd98256b", "score": "0.61922663", "text": "func (log LogrTestLogger) Info(msg string, args ...interface{}) {\n\tlog.T.Logf(\"[INFO] \"+msg, args...)\n}", "title": "" }, { "docid": "a7835cfd3a4774d10a09b8d83686606c", "score": "0.6190887", "text": "func Info(ctx context.Context, arg any) { doLog(ctx, SeverityInfo, arg) }", "title": "" }, { "docid": "a03255cfc7dbbc7e6e6733fe1e3c81e2", "score": "0.61608064", "text": "func (e *Echo) Trace(path string, h interface{}, m ...interface{}) {\n\te.add(TRACE, path, h, m...)\n}", "title": "" }, { "docid": "c484defbc70b327dab4d9b1d9c4bd098", "score": "0.6153511", "text": "func (t *Tracer) Trace(level Level, format string, args ...interface{}) {\n\n\tif t == nil {\n\t\treturn\n\t}\n\n\tif level >= t.level && level < LevelNothing {\n\t\tif t.deferred {\n\t\t\tt.deferredData = append(t.deferredData, deferredTrace{fmt: format, args: args, level: level, now: time.Now()})\n\t\t} else {\n\t\t\ttrace := Trace{fmt.Sprintf(format, args...), level, time.Now()}\n\t\t\tt.data = append(t.data, trace)\n\t\t}\n\t} else if level <= LevelEverything {\n\t\tpanic(\"tracer: level is invalid: Cannot Trace with LevelEverything or below.\")\n\t} else if level >= LevelNothing {\n\t\tpanic(\"tracer: level is invalid: Cannot Trace with LevelNothing or above.\")\n\t}\n\n}", "title": "" }, { "docid": "27139b943914a3da73bd50b0dca33346", "score": "0.61501724", "text": "func (c *Core) Info(msg string, fields ...zap.Field) {\n\tc.Logger.Info(msg, fields...)\n}", "title": "" }, { "docid": "944805b3b11bf9d9a4d447b5af1a8270", "score": "0.61466914", "text": "func (l *Logger) Info(msg string, fields ...zap.Field) {\n\tl.zap.Info(msg, fields...)\n\tl.zapCounter++\n\tl.trySync()\n}", "title": "" }, { "docid": "4284504b6e7a5162dfacced61b3d0a75", "score": "0.61425", "text": "func (l *Logger) Trace(msg string) Interface {\n\treturn NewEntry(l, l.t).Trace(msg)\n}", "title": "" }, { "docid": "8d54927886616c59986f6804fbd72f4a", "score": "0.6140841", "text": "func (k *KafkaLogEmitter) Trace(message string, params ...interface{}) {\n\tk.Emit(newLogLine(k.config.Source, TraceLogTypeId, fmt.Sprintf(message, params), k.config.Tags))\n}", "title": "" }, { "docid": "6dda4e652f4f676fd4a63650470bda90", "score": "0.6132729", "text": "func Trace(v ...interface{}) {\n\tlogger.Trace(v...)\n}", "title": "" }, { "docid": "3c6c1c14e51d3d88c232e32bccd18b65", "score": "0.61237687", "text": "func Trace(ctx context.Context, msg string, args ...interface{}) {\n\tlogger := logging.GetSDKRootLogger(ctx)\n\tif logger == nil {\n\t\t// this essentially should never happen in production the root\n\t\t// logger for code should be injected by the in\n\t\t// question, so really this is only likely in unit tests, at\n\t\t// most so just making this a no-op is fine\n\t\treturn\n\t}\n\tlogger.Trace(msg, args...)\n}", "title": "" }, { "docid": "09a9f6ae00a6cd8c4027a13d082e8b96", "score": "0.6114182", "text": "func Info(msg string, fields ...zapcore.Field) {\n\tlogger.Info(msg, fields...)\n}", "title": "" }, { "docid": "14003ba549f7f656ac5a41b8aef3d81b", "score": "0.6107971", "text": "func (nt *nilTracer) Trace(a ...interface{}) {}", "title": "" }, { "docid": "9877608917c68cd4bde66eb7888b785f", "score": "0.6105772", "text": "func Trace(v ...interface{}) {\n\tlog.Trace(generateFmtStr(len(v)), v...)\n}", "title": "" }, { "docid": "c980c4db830c0bb2a0159ad7a9074a9c", "score": "0.6102435", "text": "func Info(args ...interface{}) {\n _PriLogger.Info(args...)\n}", "title": "" }, { "docid": "643fef93098b5ccad42d2182a2cebe32", "score": "0.60977507", "text": "func (l *Logger) Info(v ...interface{}) {\n\tif l.level <= li {\n\t\tlog(l.out, l.prefix, \"info\", v...)\n\t}\n}", "title": "" }, { "docid": "a733541ed4fcab9dd56b019a81372fb8", "score": "0.6097717", "text": "func (l StandardOutputDispatcher) Trace(msg string) {\n\tl.Log(logging.TraceMessage(msg))\n}", "title": "" }, { "docid": "12ae1c3a1d2dd2584435ca575314eb5d", "score": "0.60874647", "text": "func Trace(args ...any) { std.log(TraceLevel, args) }", "title": "" }, { "docid": "e1927c45b4d717526660813b4788d072", "score": "0.60869086", "text": "func (router *Router) Trace(path string, h HttpHandler) {\n\trouter.Handle(http.MethodTrace, path, h)\n}", "title": "" }, { "docid": "02ceb55dfb9db5192298cf0101ad2149", "score": "0.6083307", "text": "func (l *Logger) Info(msg string, fields ...zapcore.Field) {\n\tl.write(zapcore.InfoLevel, msg, fields)\n}", "title": "" }, { "docid": "8671e6bc9555e266644102d25c8adf27", "score": "0.6080254", "text": "func Info(msg string, ctx ...Ctx) {\n\tLog.Info(msg, ctx...)\n}", "title": "" }, { "docid": "0972bd8e87d0117e097164b42c3eefcf", "score": "0.6073952", "text": "func (t *tracer) Trace(a ...interface{}) {\n\tif _, err := fmt.Fprint(t.out, a...); err != nil {\n\t\tlog.Fatalf(\"failed to trace: %v\", a...)\n\t}\n\tif _, err := fmt.Fprintln(t.out); err != nil {\n\t\tlog.Fatalf(\"failed to add line to trace\")\n\t}\n\n}", "title": "" }, { "docid": "d256d55ff8459254a1f388701820b556", "score": "0.60666937", "text": "func (lgr *Logger) Info(traceCode string, fields map[string]interface{}) {\n\tlgr.Entry.WithFields(fields).Info(traceCode)\n}", "title": "" }, { "docid": "e4b11f256d5a204dcffd768a9f7e90bc", "score": "0.60635185", "text": "func (log *Logger) Trace(arg0 interface{}, args ...interface{}) {\n switch first := arg0.(type) {\n case string:\n log.logf(TRACE, first, args...)\n case func() string:\n log.logc(TRACE, first)\n default:\n log.logf(TRACE,\n fmt.Sprint(arg0) + strings.Repeat(\" %v\", len(args)), args...)\n }\n}", "title": "" }, { "docid": "f433a1f7773b4c40a43c272b55d830c2", "score": "0.6062168", "text": "func (t *nilTracer) Trace(a ...interface{}) {}", "title": "" }, { "docid": "f433a1f7773b4c40a43c272b55d830c2", "score": "0.6062168", "text": "func (t *nilTracer) Trace(a ...interface{}) {}", "title": "" }, { "docid": "7ebf9a2a0fffa9b67b0a55928edef59a", "score": "0.60539687", "text": "func Trace(arg0 interface{}, args ...interface{}) {\n\tdlog.Trace(arg0, args...)\n}", "title": "" }, { "docid": "87bc14cefe3780bcc8161bb35c47d11d", "score": "0.60456556", "text": "func Trace(format string, ctx ...interface{}) {\n\tformat = fmt.Sprintf(format, ctx...)\n\troot.write(format, LvlTrace, nil)\n}", "title": "" }, { "docid": "26c0f2ae2bad655753d3483bbb50d70b", "score": "0.60321176", "text": "func (instance *tracer) Trace(msg ...interface{}) Tracer {\n\tif !valid.IsNil(instance) && instance.enabled {\n\t\tmessage := \"--- \" + instance.buildMessage(0) + \": \" + strprocess.FormatStrings(msg...)\n\t\tmessage = strings.ReplaceAll(message, \"\\n\", \"\\t\")\n\t\tif message != \"\" {\n\t\t\tlogrus.WithContext(instance.context).Tracef(message)\n\t\t}\n\t}\n\treturn instance\n}", "title": "" }, { "docid": "2f238115f8989b6a10ffb378b242d919", "score": "0.6030711", "text": "func (event *Event) Info(args ...interface{}) {\n\tevent.Log(infoLevel, args...)\n}", "title": "" }, { "docid": "18631a3144c515ca99b13fde0674db66", "score": "0.6020692", "text": "func Info(msg string, args ...interface{}) {\n\n\tif level&INFO != 0 {\n\n\t\twriteMessage(\"INFO\", msg, args...)\n\n\t}\n}", "title": "" }, { "docid": "36f9cbd5c906c241506fc91f142d5d38", "score": "0.6010368", "text": "func Info(args ...any) { std.log(InfoLevel, args) }", "title": "" }, { "docid": "fc725cf6f5227fec7ec268320b3d9559", "score": "0.6008991", "text": "func (sl noOpLogger) Info(msg string, attributes ...Attribute) {}", "title": "" }, { "docid": "e6479dca2f4b016ba060d78ea054266a", "score": "0.5998896", "text": "func (l *Logger) Info(msg string, params ...interface{}) {\n\tl.log(callDepth, InfoLevel, msg, params...)\n}", "title": "" }, { "docid": "65228d967f51785df9ee06504dfa2a34", "score": "0.59907275", "text": "func (self *TLogger) Info(v ...interface{}) {\r\n\tmsg := fmt.Sprint(v...)\r\n\tself.manager.write(LevelInfo, \"[INFO] \"+msg)\r\n}", "title": "" }, { "docid": "777d790864f3468697c18a5ab660ae62", "score": "0.5984825", "text": "func (l *Logger) Info(args ...interface{}) {\n\tl.Log(InfoLevel, args...)\n}", "title": "" }, { "docid": "6a1c230b84772f27e5b9e357f62702d6", "score": "0.59825206", "text": "func (ml *MockLogger) Info(args ...interface{}) {\n\tml.call(\"Info\", args...)\n}", "title": "" }, { "docid": "09a7f4d19852c6c3a49628fc69c1b429", "score": "0.59754026", "text": "func (a *Air) TRACE(path string, h Handler, gases ...Gas) {\n\ta.router.register(http.MethodTrace, path, h, gases...)\n}", "title": "" }, { "docid": "659d81ab2de565c05b50c32171ded01d", "score": "0.5972504", "text": "func (g *slogger) Info(args ...any) {\n\tg.log(context.Background(), slog.LevelInfo, args...)\n}", "title": "" }, { "docid": "a7064b82ce481ff8f6cdfa8633d05ff2", "score": "0.597126", "text": "func (l *logger) Info(log string, fields ...zapcore.Field) {\n\tl.l.Info(log, fields...)\n}", "title": "" }, { "docid": "27747f25d1ea57e10ea35f9575aa3a67", "score": "0.59705484", "text": "func (a *Air) INFO(msg string, extras ...map[string]interface{}) {\n\ta.logger.log(LoggerLevelInfo, msg, extras...)\n}", "title": "" }, { "docid": "9affb86a7ad7438aa4d55f66ae7c49c0", "score": "0.5963846", "text": "func (e *Echo) Trace(path string, h Handler) {\n\te.add(TRACE, path, h)\n}", "title": "" }, { "docid": "8992cb90edb462460e657f2a2ee5fc22", "score": "0.5962499", "text": "func (logger *GPLogger) Trace(key string, value interface{}, msg string) {\n\tlogger.print.WithField(key, value).Trace(msg)\n\tif logger.RunMode == \"release\" {\n\t\tlogger.write.WithField(key, value).Trace(msg)\n\t}\n\n}", "title": "" }, { "docid": "0d093a6b794dca61060ab6a08d21f904", "score": "0.5956887", "text": "func Trace(args ...interface{}) {\n\tmu.RLock()\n\tdefer mu.RUnlock()\n\n\tl.Trace(args...)\n}", "title": "" }, { "docid": "a120e31a066886eac13d78518bcf1631", "score": "0.595569", "text": "func (t *Test) Info(msg string) {\n\tt.t.Helper()\n\tt.logger.Log(logger.Info, msg)\n}", "title": "" }, { "docid": "eaf39101504f031f5796b12939fc3377", "score": "0.5948284", "text": "func Trace(v ...interface{}) {\n\tBeeLogger.Trace(generateFmtStr(len(v)), v...)\n}", "title": "" }, { "docid": "06d8cf257c121064ddcd23cb664eead0", "score": "0.5945766", "text": "func (this *TestFrameworkContext) LogInfo(arg0 interface{}, args ...interface{}) {\n\tlog4.Info(arg0, args...)\n}", "title": "" }, { "docid": "a03b46fc3fc9128ed2d246ca5ae91eef", "score": "0.5944164", "text": "func (l forGRPC) Info(args ...interface{}) {\n\tif VerboseLevel() <= 0 {\n\t\treturn\n\t}\n\tl.loggers[0].Log(\"msg\", fmt.Sprint(args...))\n}", "title": "" } ]
305e66f6130e429d0e4ec08862e074ca
WithOffset adds the offset to the extras custom fields list params
[ { "docid": "9628d892d590cf47b71322bad38411f8", "score": "0.77047604", "text": "func (o *ExtrasCustomFieldsListParams) WithOffset(offset *int64) *ExtrasCustomFieldsListParams {\n\to.SetOffset(offset)\n\treturn o\n}", "title": "" } ]
[ { "docid": "66040c8b205a01a2d4b9f68db7d6ee98", "score": "0.6732851", "text": "func (o *ExtrasCustomFieldsListParams) SetOffset(offset *int64) {\n\to.Offset = offset\n}", "title": "" }, { "docid": "8d627465b682f5728da107b2cdda479d", "score": "0.62493205", "text": "func WithOffset(options *Options, offset int) *Options {\n\tif options.Limit != 0 {\n\t\toptions.Offset = offset\n\t}\n\treturn options\n}", "title": "" }, { "docid": "4b98eb96ab18db8ac799b252cbc03d5a", "score": "0.61208045", "text": "func (_options *ListTagsOptions) SetOffset(offset int64) *ListTagsOptions {\n\t_options.Offset = core.Int64Ptr(offset)\n\treturn _options\n}", "title": "" }, { "docid": "8eb58cfcce7a3072cb7dcec0947c0f7f", "score": "0.6097666", "text": "func (b *FriendsGetSuggestionsBuilder) Offset(v int) *FriendsGetSuggestionsBuilder {\n\tb.Params[\"offset\"] = v\n\treturn b\n}", "title": "" }, { "docid": "2d2b2018dabd4094b26e8eaf73d5877d", "score": "0.6016652", "text": "func (b *FriendsGetBuilder) Offset(v int) *FriendsGetBuilder {\n\tb.Params[\"offset\"] = v\n\treturn b\n}", "title": "" }, { "docid": "15400e25d9a610bd471ebd81bb03b69d", "score": "0.5982204", "text": "func (b *FriendsGetMutualBuilder) Offset(v int) *FriendsGetMutualBuilder {\n\tb.Params[\"offset\"] = v\n\treturn b\n}", "title": "" }, { "docid": "b2967242350fe69c232bbfbe158e97ec", "score": "0.5838072", "text": "func (b *FriendsSearchBuilder) Offset(v int) *FriendsSearchBuilder {\n\tb.Params[\"offset\"] = v\n\treturn b\n}", "title": "" }, { "docid": "e7fd209f7af3ba95647e0275821da04b", "score": "0.5817701", "text": "func (b *FriendsGetRequestsBuilder) Offset(v int) *FriendsGetRequestsBuilder {\n\tb.Params[\"offset\"] = v\n\treturn b\n}", "title": "" }, { "docid": "5feb70d90d6cb8b85a325d5b6251c2df", "score": "0.57957184", "text": "func NewExtrasCustomFieldsListParamsWithHTTPClient(client *http.Client) *ExtrasCustomFieldsListParams {\n\treturn &ExtrasCustomFieldsListParams{\n\t\tHTTPClient: client,\n\t}\n}", "title": "" }, { "docid": "54e4ed47ebeeefdecd25a4a975b6b2fd", "score": "0.57894087", "text": "func (o *ExtrasJobResultsListParams) WithOffset(offset *int64) *ExtrasJobResultsListParams {\n\to.SetOffset(offset)\n\treturn o\n}", "title": "" }, { "docid": "23cb8bd0e2f4e0b66296909cc63d5c1d", "score": "0.5784857", "text": "func (o *GetAPIFeaturesParams) SetOffset(offset *int64) {\n\to.Offset = offset\n}", "title": "" }, { "docid": "a55f3df06c4546de987188df38b514e4", "score": "0.5784355", "text": "func (r ApiSearchMenuItemsRequest) Offset(offset int32) ApiSearchMenuItemsRequest {\n\tr.offset = &offset\n\treturn r\n}", "title": "" }, { "docid": "5582fd2731a65b47a0efbe53cbc56ca4", "score": "0.5738971", "text": "func (r DAGApiApiPatchDagsRequest) Offset(offset int32) DAGApiApiPatchDagsRequest {\n\tr.offset = &offset\n\treturn r\n}", "title": "" }, { "docid": "8340e704bd4d18bd7a0a5f0576de7c6a", "score": "0.57224125", "text": "func (o *TagsListParams) WithOffset(offset *int64) *TagsListParams {\n\to.SetOffset(offset)\n\treturn o\n}", "title": "" }, { "docid": "8388b174a041680494b2a92f8da0dba9", "score": "0.5691323", "text": "func (b *FriendsGetOnlineBuilder) Offset(v int) *FriendsGetOnlineBuilder {\n\tb.Params[\"offset\"] = v\n\treturn b\n}", "title": "" }, { "docid": "de4475f776a24995dafcdf9be8b8bce8", "score": "0.5624945", "text": "func (b Builder) Offset(offset int) Builder {\n\treturn builder.Set(b, \"Offset\", fmt.Sprintf(\"%d\", offset)).(Builder)\n}", "title": "" }, { "docid": "363c10f95f4a13a33f866f514a8651be", "score": "0.56221044", "text": "func (o *TagsListParams) SetOffset(offset *int64) {\n\to.Offset = offset\n}", "title": "" }, { "docid": "b90a0c45d2587ddb65899e4dd52b36ab", "score": "0.5604586", "text": "func ReleaseListOffset(offset string) ReleaseListOption {\n\treturn func(opts *options) {\n\t\topts.listReq.Offset = offset\n\t}\n}", "title": "" }, { "docid": "0e5d5d20df1901fb90df2a885f88dc9a", "score": "0.55810064", "text": "func (o *ExtrasJobResultsListParams) SetOffset(offset *int64) {\n\to.Offset = offset\n}", "title": "" }, { "docid": "17342d7238cba9aec3886400ad124ef4", "score": "0.5574356", "text": "func NewExtrasCustomFieldsListParams() *ExtrasCustomFieldsListParams {\n\treturn &ExtrasCustomFieldsListParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "title": "" }, { "docid": "713f8d73ab0c0e777217880ce9b49c3a", "score": "0.5570713", "text": "func SetOffset(offset int) Param {\n\treturn setParamInt(\"offset\", offset)\n}", "title": "" }, { "docid": "edac0141311152853c972c02661b832c", "score": "0.5521365", "text": "func (o *GetContactsFromListParams) SetOffset(offset *int64) {\n\to.Offset = offset\n}", "title": "" }, { "docid": "b9995bd638233e3e5c400b6bf0f3c5e6", "score": "0.5513389", "text": "func (cs *Composite) AppendOffset(r Modifiable, v physics.Vector) {\n\tr.SetPos(v.X(), v.Y())\n\tcs.rs = append(cs.rs, r)\n}", "title": "" }, { "docid": "9f5810b37d0838ee0c615f7d654d6210", "score": "0.5492865", "text": "func (r *ListIncidentsOptionalParameters) WithPageOffset(pageOffset int64) *ListIncidentsOptionalParameters {\n\tr.PageOffset = &pageOffset\n\treturn r\n}", "title": "" }, { "docid": "9eb20bc0d50425210ff97321b14a9b63", "score": "0.5492289", "text": "func (r DAGApiApiGetDagsRequest) Offset(offset int32) DAGApiApiGetDagsRequest {\n\tr.offset = &offset\n\treturn r\n}", "title": "" }, { "docid": "0da4b9a4eb8fbbb56b3c5dee9228e338", "score": "0.54865664", "text": "func (b *StoriesGetViewersBuilder) Offset(v int) *StoriesGetViewersBuilder {\n\tb.Params[\"offset\"] = v\n\treturn b\n}", "title": "" }, { "docid": "50d3d755bc3a18e754443ce803696ab5", "score": "0.5481446", "text": "func (o *GetUserActivitiesHandlerParams) SetOffset(offset *int64) {\n\to.Offset = offset\n}", "title": "" }, { "docid": "d78e3aacc625dad9758c0b640642845f", "score": "0.5425428", "text": "func (rq *RecommendationsQuery) Offset(offset int) *RecommendationsQuery {\n\trq.offset = &offset\n\treturn rq\n}", "title": "" }, { "docid": "06d290a4c2523858278223c26c62057a", "score": "0.5420506", "text": "func (o *QueryItemsParams) WithOffset(offset *int32) *QueryItemsParams {\n\to.SetOffset(offset)\n\treturn o\n}", "title": "" }, { "docid": "36860c706007987fc326131a054643db", "score": "0.53929293", "text": "func (_options *QueryNoticesOptions) SetOffset(offset int64) *QueryNoticesOptions {\n\t_options.Offset = core.Int64Ptr(offset)\n\treturn _options\n}", "title": "" }, { "docid": "8541e95385d1f19a46b70439eb4144d8", "score": "0.5385687", "text": "func (mimq *MoreInfoModuleQuery) Offset(offset int) *MoreInfoModuleQuery {\n\tmimq.offset = &offset\n\treturn mimq\n}", "title": "" }, { "docid": "485793ebaef6ac47f4e4176258165cd9", "score": "0.5366536", "text": "func (b *BoardGetCommentsBuilder) Offset(v int) *BoardGetCommentsBuilder {\n\tb.Params[\"offset\"] = v\n\treturn b\n}", "title": "" }, { "docid": "acadbc4b2a7af880d7c51788d295a0a7", "score": "0.5352797", "text": "func (o *GetAllMyScratchRecipesParams) SetOffset(offset *int64) {\n\to.Offset = offset\n}", "title": "" }, { "docid": "1f680db37b1c74b0476b9a7f0ff7d31f", "score": "0.53486943", "text": "func (b *Builder) Offset(delta int) *Builder {\n\tb.offset += delta\n\treturn b\n}", "title": "" }, { "docid": "4d289cbcb76a3788186fc4ac7d713308", "score": "0.53384256", "text": "func (item *SchoolItem) AddOffset(offset string) {\n\tcell := item.AddCell()\n\tcell.Value = offset\n}", "title": "" }, { "docid": "3479a7af1cbeef5985563566c8a054c0", "score": "0.5335805", "text": "func (cs *Composite) AddOffset(i int, v physics.Vector) {\n\tif i < len(cs.rs) {\n\t\tcs.rs[i].SetPos(v.X(), v.Y())\n\t}\n}", "title": "" }, { "docid": "13c7bb1acb305023304c2cd8c273477f", "score": "0.5335678", "text": "func (aaq *APIAuditQuery) Offset(offset int) *APIAuditQuery {\n\taaq.offset = &offset\n\treturn aaq\n}", "title": "" }, { "docid": "6e17839105d66cba6c695cd034e64d2c", "score": "0.5323979", "text": "func (o *ExtrasCustomFieldsListParams) WithContext(ctx context.Context) *ExtrasCustomFieldsListParams {\n\to.SetContext(ctx)\n\treturn o\n}", "title": "" }, { "docid": "5bf689294b1ed7a6ab93bf2b3942a2fd", "score": "0.5306665", "text": "func (e *EntryQueryBuilder) WithOffset(offset int) *EntryQueryBuilder {\n\tif offset > 0 {\n\t\te.offset = offset\n\t}\n\treturn e\n}", "title": "" }, { "docid": "17a79619ecc42e3663c00e7fc6520979", "score": "0.5305032", "text": "func (b *BoardGetTopicsBuilder) Offset(v int) *BoardGetTopicsBuilder {\n\tb.Params[\"offset\"] = v\n\treturn b\n}", "title": "" }, { "docid": "5293d316dbfd95e7a82c851a97b9d127", "score": "0.5300973", "text": "func (o *DcimInventoryItemsListParams) SetOffset(offset *int64) {\n\to.Offset = offset\n}", "title": "" }, { "docid": "247cef6c5bf04c89e65392313fd9595e", "score": "0.5297708", "text": "func (aq *AuthQuery) Offset(offset int) *AuthQuery {\n\taq.offset = &offset\n\treturn aq\n}", "title": "" }, { "docid": "efdcbfd211353b6cca2fcd1d89238b52", "score": "0.52951103", "text": "func Offset(offset int) Options {\n\treturn &DatabaseOptions{ApplyFunc: func(db *gorm.DB) {\n\t\tdb.Offset(offset)\n\t}}\n}", "title": "" }, { "docid": "a4456800f1c68eb2d22cf1c5ce04282c", "score": "0.5290473", "text": "func (sb *SelectBuilder) Offset(offset int) *SelectBuilder {\n\tsb.offset = offset\n\tsb.marker = selectMarkerAfterLimit\n\treturn sb\n}", "title": "" }, { "docid": "71c6980ad61cf8a95ee97121435dbcb9", "score": "0.5272618", "text": "func (oq *OfficerQuery) Offset(offset int) *OfficerQuery {\n\toq.offset = &offset\n\treturn oq\n}", "title": "" }, { "docid": "bf48ed409798aa01489972adad8a6478", "score": "0.5269889", "text": "func (o *GetUserActivitiesHandlerParams) WithOffset(offset *int64) *GetUserActivitiesHandlerParams {\n\to.SetOffset(offset)\n\treturn o\n}", "title": "" }, { "docid": "c7b0c8d3c48f5af60ac03918a14715fe", "score": "0.52683526", "text": "func (_options *QueryOptions) SetOffset(offset int64) *QueryOptions {\n\t_options.Offset = core.Int64Ptr(offset)\n\treturn _options\n}", "title": "" }, { "docid": "20e691dbb2a2c07535b7d60c787d2cf2", "score": "0.52682495", "text": "func (o *SecretsSecretsListParams) SetOffset(offset *int64) {\n\to.Offset = offset\n}", "title": "" }, { "docid": "aee9d712e39d7b2ad762107108db571b", "score": "0.52226275", "text": "func (r *SearchIncidentsOptionalParameters) WithPageOffset(pageOffset int64) *SearchIncidentsOptionalParameters {\n\tr.PageOffset = &pageOffset\n\treturn r\n}", "title": "" }, { "docid": "6357bf3ee15cc1f422d00dcc368f8276", "score": "0.52096623", "text": "func (b DeleteBuilder) Offset(offset uint64) DeleteBuilder {\n\treturn builder.Set(b, \"Offset\", fmt.Sprintf(\"%d\", offset)).(DeleteBuilder)\n}", "title": "" }, { "docid": "2851a8cd0a0f32ba49a0f032e291cc61", "score": "0.52060676", "text": "func (aq *AntenatalinformationQuery) Offset(offset int) *AntenatalinformationQuery {\n\taq.offset = &offset\n\treturn aq\n}", "title": "" }, { "docid": "bdecb3b7004c6e8f7216e58e5de95c95", "score": "0.5199696", "text": "func (options *ListClustersOptions) SetOffset(offset int64) *ListClustersOptions {\n\toptions.Offset = core.Int64Ptr(offset)\n\treturn options\n}", "title": "" }, { "docid": "7f427a9987775b343779ae9d14c77358", "score": "0.5199188", "text": "func objectFieldOffset(frame *rtda.Frame) {\n\tvars := frame.LocalVars()\n\tjField := vars.GetRef(1)\n\n\toffset := jField.GetFieldValue(\"slot\", \"I\").(int32)\n\n\tstack := frame.OperandStack()\n\tstack.PushLong(int64(offset))\n}", "title": "" }, { "docid": "d570c5aea33b4130eb5bb76f722dfb7c", "score": "0.5196559", "text": "func (o *ListInvitesParams) SetOffset(offset *int64) {\n\to.Offset = offset\n}", "title": "" }, { "docid": "37d8677054226f6c87957024c6954fbf", "score": "0.5185594", "text": "func (imr *InvokeMethodRequest) WithCustomHTTPMetadata(md map[string]string) *InvokeMethodRequest {\n\tfor k, v := range md {\n\t\tif imr.r.Metadata == nil {\n\t\t\timr.r.Metadata = make(map[string]*internalv1pb.ListStringValue)\n\t\t}\n\n\t\t// NOTE: We don't explicitly lowercase the keys here but this will be done\n\t\t// later when attached to the HTTP request as headers.\n\t\timr.r.Metadata[k] = &internalv1pb.ListStringValue{Values: []string{v}}\n\t}\n\n\treturn imr\n}", "title": "" }, { "docid": "0228f2f874e8a8a9a652fb0359d788be", "score": "0.5181725", "text": "func (o *GetActiveCustomGameSessionsParams) SetOffset(offset *int64) {\n\to.Offset = offset\n}", "title": "" }, { "docid": "233bb5170b18da799b0347a7f6b2b3ba", "score": "0.5176322", "text": "func (r ApiListImagesByContentSetRequest) Offset(offset int32) ApiListImagesByContentSetRequest {\n\tr.offset = &offset\n\treturn r\n}", "title": "" }, { "docid": "30e7ab1d415569a34d339dd1a551b6a1", "score": "0.5174348", "text": "func (o *QueryItemsParams) SetOffset(offset *int32) {\n\to.Offset = offset\n}", "title": "" }, { "docid": "e8fd67ab5e5d5d03dd2fccf2c9c38406", "score": "0.5170058", "text": "func OptOffset(offset int) Option {\n\treturn func(rm *ReadManager) error {\n\t\tif offset < 0 {\n\t\t\treturn fmt.Errorf(\"invalid offset %d. Must be zero or positive integer\", offset)\n\t\t}\n\t\trm.offset = offset\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "d507876d8bf62f43860b4b2f388a1db4", "score": "0.51601297", "text": "func (o *ListServicesParams) SetOffset(offset *int64) {\n\to.Offset = offset\n}", "title": "" }, { "docid": "064c6fd353cecdf77d78df58f31894fa", "score": "0.5158617", "text": "func (sq *SpecialdoctorQuery) Offset(offset int) *SpecialdoctorQuery {\n\tsq.offset = &offset\n\treturn sq\n}", "title": "" }, { "docid": "2ed8449625a87f5fe21a44e30047cecc", "score": "0.5156852", "text": "func (ggq *GithubGistQuery) Offset(offset int) *GithubGistQuery {\n\tggq.ctx.Offset = &offset\n\treturn ggq\n}", "title": "" }, { "docid": "c9222bf4ef1a0415cf5a9f3fd36043af", "score": "0.5145285", "text": "func (wq *WechatQuery) Offset(offset int) *WechatQuery {\n\twq.offset = &offset\n\treturn wq\n}", "title": "" }, { "docid": "a3898106a96e9864d541db06c909f41f", "score": "0.51433694", "text": "func (o *GetPaymentsParams) SetOffset(offset *int64) {\n\to.Offset = offset\n}", "title": "" }, { "docid": "72bcd9415a31b4efed89a243a107872f", "score": "0.5139609", "text": "func NewExtrasCustomFieldsListParamsWithTimeout(timeout time.Duration) *ExtrasCustomFieldsListParams {\n\treturn &ExtrasCustomFieldsListParams{\n\t\ttimeout: timeout,\n\t}\n}", "title": "" }, { "docid": "a9016aa4443630a507a7c55724baa41e", "score": "0.51328266", "text": "func (cs *CompositeR) AddOffset(i int, v physics.Vector) {\n\tif i < len(cs.rs) {\n\t\tcs.rs[i].SetPos(v.X(), v.Y())\n\t}\n}", "title": "" }, { "docid": "a46b7bc6bf847b67a4b1d1a58eb25bff", "score": "0.51326233", "text": "func (sq *ShoppingQuery) Offset(offset int) *ShoppingQuery {\n\tsq.offset = &offset\n\treturn sq\n}", "title": "" }, { "docid": "4ce32026129590c95feb9a25e206cefc", "score": "0.5130465", "text": "func (bq *BookcourseQuery) Offset(offset int) *BookcourseQuery {\n\tbq.offset = &offset\n\treturn bq\n}", "title": "" }, { "docid": "5b4f59737b15da97f2881d54c0dd0a27", "score": "0.5113405", "text": "func (_options *QueryCollectionNoticesOptions) SetOffset(offset int64) *QueryCollectionNoticesOptions {\n\t_options.Offset = core.Int64Ptr(offset)\n\treturn _options\n}", "title": "" }, { "docid": "38a0c01e30a09342a143406bba8554f4", "score": "0.51133287", "text": "func (o *PullRequestEventsListParams) SetOffset(offset *int64) {\n\to.Offset = offset\n}", "title": "" }, { "docid": "fe107bd0aa4cffa88b35e18e30b61540", "score": "0.5110611", "text": "func (oesq *OtherEventStatsQuery) Offset(offset int) *OtherEventStatsQuery {\n\toesq.offset = &offset\n\treturn oesq\n}", "title": "" }, { "docid": "71fd1217d5d5215180c1f93420cf38c5", "score": "0.5108434", "text": "func (o *PullRequestEventsListParams) WithOffset(offset *int64) *PullRequestEventsListParams {\n\to.SetOffset(offset)\n\treturn o\n}", "title": "" }, { "docid": "222623434113b936ab13c4a92cdaa18a", "score": "0.5107032", "text": "func (vrq *VehicleRegistrationQuery) Offset(offset int) *VehicleRegistrationQuery {\n\tvrq.offset = &offset\n\treturn vrq\n}", "title": "" }, { "docid": "867bca6d21f706c90046d7d6a3541e3b", "score": "0.51061517", "text": "func (gq *GreeterQuery) Offset(offset int) *GreeterQuery {\n\tgq.offset = &offset\n\treturn gq\n}", "title": "" }, { "docid": "81141bdae74322daaa8fb23309ac73bf", "score": "0.5103888", "text": "func (fq *FinancialQuery) Offset(offset int) *FinancialQuery {\n\tfq.offset = &offset\n\treturn fq\n}", "title": "" }, { "docid": "b8899ef51376ad97eea7b1484f4a4d32", "score": "0.5102421", "text": "func (o *ExtrasCustomFieldsListParams) WithLimit(limit *int64) *ExtrasCustomFieldsListParams {\n\to.SetLimit(limit)\n\treturn o\n}", "title": "" }, { "docid": "ac1ecafb4e7aa8e2439d865d5ebff714", "score": "0.50906056", "text": "func (fm *FieldModelEnumInt64) SetFBEOffset(value int) { fm.offset = value }", "title": "" }, { "docid": "180b24c5e319b9a07e513cf23e5614c9", "score": "0.5089691", "text": "func (rq *ReferrerQuery) Offset(offset int) *ReferrerQuery {\n\trq.offset = &offset\n\treturn rq\n}", "title": "" }, { "docid": "b4eb15e4f891a0dcf2cd71bce87fe69f", "score": "0.5088489", "text": "func (q *Stmt) Offset(offset interface{}) *Stmt {\n\tq.addChunk(posOffset, \"OFFSET ?\", \"\", []interface{}{offset}, \"\")\n\treturn q\n}", "title": "" }, { "docid": "90e3ebe5e51584631d10eedce8c3df6f", "score": "0.50867873", "text": "func (ivq *ItemVariationQuery) Offset(offset int) *ItemVariationQuery {\n\tivq.offset = &offset\n\treturn ivq\n}", "title": "" }, { "docid": "b9327d5285860f5e800bc788b4d58de1", "score": "0.5083608", "text": "func (q *Query) Offset(offset int) *Query {\n\tq.offset = offset\n\treturn q\n}", "title": "" }, { "docid": "5618573e431c6c3167282bcfb80e4f9a", "score": "0.50753117", "text": "func (c *BuildattemptListCall) ExtraFields(extraFields ...string) *BuildattemptListCall {\n\tc.urlParams_.SetMulti(\"extraFields\", append([]string{}, extraFields...))\n\treturn c\n}", "title": "" }, { "docid": "b9d55aca4a4b6bc41e63b4cf3277d4c0", "score": "0.50751346", "text": "func (kq *KpiQuery) Offset(offset int) *KpiQuery {\n\tkq.offset = &offset\n\treturn kq\n}", "title": "" }, { "docid": "ff8ebcf19d7a8b618fe7fbd984992fdb", "score": "0.5066754", "text": "func (urq *UserRoleQuery) Offset(offset int) *UserRoleQuery {\n\turq.offset = &offset\n\treturn urq\n}", "title": "" }, { "docid": "7c6fe6a978e8e7f8f6f5b55c9008c43e", "score": "0.50380015", "text": "func (c *Controller) UpdateAddressCustomFields(id int, in map[string]interface{}) (message string, err error) {\n\tmessage, err = c.Client.UpdateCustomFields(id, in, \"addresses\")\n\treturn\n}", "title": "" }, { "docid": "149060f674344724c8e7bce63ddca063", "score": "0.5033445", "text": "func (lq *LicenseQuery) Offset(offset int) *LicenseQuery {\n\tlq.ctx.Offset = &offset\n\treturn lq\n}", "title": "" }, { "docid": "8436649e543bb306a0cd18f2abd04611", "score": "0.5029252", "text": "func (uq *UserQuery) Offset(offset int) *UserQuery {\n\tuq.ctx.Offset = &offset\n\treturn uq\n}", "title": "" }, { "docid": "c643ccbf70f3d6e32aebb4bbd3048b6f", "score": "0.5026749", "text": "func Offset(offset int) Opt {\n\treturn func(l *Location) error {\n\t\tif l.col != nil || l.line != nil {\n\t\t\treturn errors.New(\"cannot open an offset and a line/column\")\n\t\t}\n\t\tl.offset = &offset\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "d1eb4f54df1ca0cb1494493c4ee0dd6e", "score": "0.50231427", "text": "func (fm *FinalModelStructNested) SetFBEOffset(value int) { fm.offset = value }", "title": "" }, { "docid": "c899696ba50294e701633d42872e8dde", "score": "0.50179434", "text": "func (qedq *QccEnterpriseDataQuery) Offset(offset int) *QccEnterpriseDataQuery {\n\tqedq.offset = &offset\n\treturn qedq\n}", "title": "" }, { "docid": "ebf19040b200112cef06822eb2d22d5e", "score": "0.50141114", "text": "func (q *Query) Offset(startOffset int) *Query {\n\tif startOffset > cInt32Max {\n\t\tstartOffset = cInt32Max\n\t}\n\tq.ser.PutVarCUInt(queryOffset).PutVarCUInt(startOffset)\n\treturn q\n}", "title": "" }, { "docid": "ee548d6ae959b8f5d841394a4e2fa2e7", "score": "0.50125915", "text": "func (upidq *UserPropertyInDeptQuery) Offset(offset int) *UserPropertyInDeptQuery {\n\tupidq.offset = &offset\n\treturn upidq\n}", "title": "" }, { "docid": "d0f760ab7847533131e420cd79ca6496", "score": "0.5010894", "text": "func (cq *CarregisterQuery) Offset(offset int) *CarregisterQuery {\n\tcq.offset = &offset\n\treturn cq\n}", "title": "" }, { "docid": "800e4c1dfba713eb4f74e151b704a59f", "score": "0.5001402", "text": "func (qq *QuestionQuery) Offset(offset int) *QuestionQuery {\n\tqq.offset = &offset\n\treturn qq\n}", "title": "" }, { "docid": "1ae0fb03f303170cc3eedb47b0f38c9a", "score": "0.49980283", "text": "func (rq *RoleQuery) Offset(offset int) *RoleQuery {\n\trq.ctx.Offset = &offset\n\treturn rq\n}", "title": "" }, { "docid": "6a66f065bbf86764ec189f04a5da0c96", "score": "0.49977684", "text": "func (aq *AdminrepairQuery) Offset(offset int) *AdminrepairQuery {\n\taq.offset = &offset\n\treturn aq\n}", "title": "" }, { "docid": "146ad57cc208248f0d7e2538ed3768d2", "score": "0.49912345", "text": "func (o *DcimInventoryItemsListParams) WithOffset(offset *int64) *DcimInventoryItemsListParams {\n\to.SetOffset(offset)\n\treturn o\n}", "title": "" }, { "docid": "2401dcae3c0f4c7b5c8144914c9356cb", "score": "0.49896836", "text": "func (o *SearchLooksParams) SetOffset(offset *int64) {\n\to.Offset = offset\n}", "title": "" }, { "docid": "b858387268674a032b6e4b2d62de930a", "score": "0.4985207", "text": "func (o *GetAPIFeaturesParams) WithOffset(offset *int64) *GetAPIFeaturesParams {\n\to.SetOffset(offset)\n\treturn o\n}", "title": "" }, { "docid": "5ee3dd77c31e101203454ff467ff3dec", "score": "0.49842748", "text": "func (epdq *EquipmentPositionDefinitionQuery) Offset(offset int) *EquipmentPositionDefinitionQuery {\n\tepdq.offset = &offset\n\treturn epdq\n}", "title": "" } ]
e0b46b0c3db68561955b55fd0021083c
Email address of the user who initiated this build. Note that this was the user's email address at the time the build was initiated; this address may not represent the same enduser for all time.
[ { "docid": "ce17da89bddd46f6458badf5ddd1577f", "score": "0.0", "text": "func (o BuildProvenanceOutput) Creator() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v BuildProvenance) *string { return v.Creator }).(pulumi.StringPtrOutput)\n}", "title": "" } ]
[ { "docid": "41df629c3f20fec6546c75ea2e90df02", "score": "0.68878543", "text": "func (project *Project) Email() string {\n\treturn project.config.Raw.Section(\"user\").Option(\"email\")\n}", "title": "" }, { "docid": "e0b5978c10b5f84cedab411d3853bd14", "score": "0.6724539", "text": "func (c *githubCodeReview) UserEmail() string {\n\treturn c.userEmail\n}", "title": "" }, { "docid": "0505e32d0415272daf54b0756cb64a4a", "score": "0.6628738", "text": "func (c *gerritCodeReview) UserEmail() string {\n\treturn c.userEmail\n}", "title": "" }, { "docid": "29e9940335a80546ac9f6d179ca608fc", "score": "0.66020274", "text": "func (u *user) Email() string { return u.userData.Email }", "title": "" }, { "docid": "a4b08840c567afeda7446d7e8db1ddf4", "score": "0.6597932", "text": "func (o ProjectUserOutput) Email() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *ProjectUser) pulumi.StringOutput { return v.Email }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "66e24ac354b91004396f7bd07bf59179", "score": "0.6580983", "text": "func (u *IdentifiedUser) Email() string {\n\treturn u.email\n}", "title": "" }, { "docid": "6f5e5318baf7b130fb28be92c31f7780", "score": "0.6550393", "text": "func (u *User) Email() string { return u.Emailx }", "title": "" }, { "docid": "a12b234c67cab7aa104b9bb4ca150dd1", "score": "0.64932805", "text": "func (s *Session) Email() string {\n\tif s.sessionType == apitypes.MachineSession {\n\t\treturn \"none\"\n\t}\n\n\treturn s.identity.Body.(*primitive.User).Email\n}", "title": "" }, { "docid": "b6bc3fa440161d2b1a79d5a1edec0357", "score": "0.639749", "text": "func (r *Member) Email() pulumi.StringOutput {\n\treturn (pulumi.StringOutput)(r.s.State[\"email\"])\n}", "title": "" }, { "docid": "5bc0a8d548efbc7933f62920c9a4fac5", "score": "0.6389362", "text": "func (o MonitorUserOutput) Email() pulumi.StringOutput {\n\treturn o.ApplyT(func(v MonitorUser) string { return v.Email }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "18f8b846e721ba7aefa0cce96b35a8cc", "score": "0.6353422", "text": "func Email() string {\n\treturn fmt.Sprintf(\"%s@%s\", Username(), Domain())\n}", "title": "" }, { "docid": "5498a826509819a7a6246063a3bb831b", "score": "0.62803507", "text": "func (o DeploymentOutput) UserEmail() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v Deployment) *string { return v.UserEmail }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "0a237b5572db0b675749c0c7830e97f8", "score": "0.62664217", "text": "func (o UserOutput) Email() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *User) pulumi.StringOutput { return v.Email }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "0a237b5572db0b675749c0c7830e97f8", "score": "0.62664217", "text": "func (o UserOutput) Email() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *User) pulumi.StringOutput { return v.Email }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "dcc5336725f86f8dc98e606e85b55628", "score": "0.62549806", "text": "func getUserEmail() string {\n\tenvContent := os.Getenv(\"USER_EMAIL\")\n\tif envContent == \"\" {\n\t\tenvContent = \"admin@example.com\"\n\t}\n\treturn envContent\n}", "title": "" }, { "docid": "4076fb24c2b385cb67c113dbe1e401e6", "score": "0.62456155", "text": "func (u *User) Email() string {\n\treturn u.email\n}", "title": "" }, { "docid": "01aec4346f3e9a192f316f9ff959cf65", "score": "0.624506", "text": "func (o UserOutput) Email() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *User) pulumi.StringPtrOutput { return v.Email }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "418bd77766badc2817ae478420789213", "score": "0.62442374", "text": "func (state *UserState) Email(username string) (string, error) {\n\treturn state.users.Get(username, \"email\")\n}", "title": "" }, { "docid": "055591dca87f9a3d2be8c75f42b00288", "score": "0.61900103", "text": "func (o *DeviceComplianceSettingState) GetUserEmail() string {\n\tif o == nil || o.UserEmail == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.UserEmail\n}", "title": "" }, { "docid": "8b09729537cfff2ab4df4ad839ac1600", "score": "0.61243844", "text": "func (o LookupUserResultOutput) Email() pulumi.StringOutput {\n\treturn o.ApplyT(func(v LookupUserResult) string { return v.Email }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "92787d5eae9980bd45b3f1bdad070179", "score": "0.6108916", "text": "func (o MonitorUserPtrOutput) Email() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *MonitorUser) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.Email\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "0006309c86b6c1a0f3b78ca665fd5671", "score": "0.60490143", "text": "func (ui *UserInfo) GetEmail() string {\n\treturn ui.Email\n}", "title": "" }, { "docid": "c52896dd56a407380837f8c6f01e5329", "score": "0.60356003", "text": "func (a account) Email() string {\n\treturn a.email\n}", "title": "" }, { "docid": "a655db7e38e0a7fb8129fc0d88e2c01b", "score": "0.6023473", "text": "func Email(r *http.Request) string {\n\treturn r.Context().Value(emailKey{}).(string)\n}", "title": "" }, { "docid": "4ef8d39bf6e03d5d9774174e1a64b9a6", "score": "0.6019743", "text": "func (o DeploymentResponseOutput) UserEmail() pulumi.StringOutput {\n\treturn o.ApplyT(func(v DeploymentResponse) string { return v.UserEmail }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "8e9f00924b6147543b58d94591080a23", "score": "0.6008465", "text": "func (v *SetSecretsSetSecretsSetSecretsPayloadReleaseUser) GetEmail() string { return v.Email }", "title": "" }, { "docid": "3ddb8418cee13190d169fac3d030104d", "score": "0.5961713", "text": "func (o DeploymentPtrOutput) UserEmail() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *Deployment) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.UserEmail\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "6eaf09b145096f005dc4b459eb6ad398", "score": "0.5931365", "text": "func (o GetUsersUserOutput) Email() pulumi.StringOutput {\n\treturn o.ApplyT(func(v GetUsersUser) string { return v.Email }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "d93107cb19d63279b70c4909ae131989", "score": "0.5873031", "text": "func (o ApplicationSpecDescriptorOwnersOutput) Email() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ApplicationSpecDescriptorOwners) *string { return v.Email }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "cfd8ad053f6f189257645c44317b9306", "score": "0.58656573", "text": "func (a Alias) Email() string {\n\treturn fmt.Sprintf(\"%s@%s\", a.Name, a.account.Domain.Name)\n}", "title": "" }, { "docid": "dbdcb4b4daef96088b1489def5758431", "score": "0.5850331", "text": "func (c *auth0TenantClaims) Email() string {\n\treturn c.EmailValue\n}", "title": "" }, { "docid": "b3cd85d415d2f4975534c16a52018dbf", "score": "0.5841332", "text": "func userEmail(r *http.Request) string {\n\n\tassertion := r.Header.Get(\"X-Goog-IAP-JWT-Assertion\")\n\tif assertion == \"\" {\n\t\tlog.Printf(\"No Cloud IAP header found.\")\n\t\treturn \"\"\n\t}\n\n\te := r.Header.Get(\"X-Goog-Authenticated-User-Email\")\n\te = strings.Replace(e, \"accounts.google.com:\", \"\", 1)\n\n\treturn e\n}", "title": "" }, { "docid": "0cf4ffdb583e93f4cf711511596ef90b", "score": "0.57990813", "text": "func (m *ManagedTenantEmailNotification) GetCreatedByUserId()(*string) {\n val, err := m.GetBackingStore().Get(\"createdByUserId\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*string)\n }\n return nil\n}", "title": "" }, { "docid": "50482e930cab67d342d7066e9a2decf1", "score": "0.5766146", "text": "func (o *OidcUserInfo) GetEmail() string {\n\tif o == nil || o.Email == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Email\n}", "title": "" }, { "docid": "fea6b00cd5a3e69cf0af38b51d4d1556", "score": "0.57344246", "text": "func (c *Contact) Email() string {\n\treturn c.email\n}", "title": "" }, { "docid": "4bd6137b3f3342ccfbc574e8198e5ec1", "score": "0.572053", "text": "func who(w http.ResponseWriter, r *http.Request) {\n\tctx := appengine.NewContext(r)\n\tu := user.Current(ctx)\n\tw.Write([]byte(fmt.Sprintf(`email: %s authdomain: %s id: %s cid: %s`, u.Email, u.AuthDomain, u.ID, u.ClientID)))\n}", "title": "" }, { "docid": "81ccf123896893309126190bbf0ab9ac", "score": "0.57184887", "text": "func (u *User) GetEmail() string {\n\tif u.Identities != nil && len(u.Identities) > 0 {\n\t\tfor _, i := range u.Identities {\n\t\t\tif i.Email != \"\" {\n\t\t\t\treturn i.Email\n\t\t\t}\n\t\t}\n\t}\n\n\treturn \"\"\n}", "title": "" }, { "docid": "a33cb2e25f54f12a6903a6afacf564e3", "score": "0.57162845", "text": "func GetEmail(c echo.Context) string {\n\treturn GetUser(c)[\"email\"].(string)\n}", "title": "" }, { "docid": "0923e235696da2efa50ab78bb9273119", "score": "0.57148063", "text": "func (o ApplicationSpecDescriptorMaintainersOutput) Email() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ApplicationSpecDescriptorMaintainers) *string { return v.Email }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "bb3345ab13a99cd4ae0b2ba5c0a4e413", "score": "0.566908", "text": "func (d *DeploymentCauseDetailsDigitalOceanUser) GetEmail() string {\n\tif d == nil {\n\t\treturn \"\"\n\t}\n\treturn d.Email\n}", "title": "" }, { "docid": "8081e10231404c7175f404a012c0222d", "score": "0.5668701", "text": "func (m *UserOaInfoMutation) Email() (r string, exists bool) {\n\tv := m.email\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "title": "" }, { "docid": "f4edae683d3b69778fa4eae1efcbab76", "score": "0.5667717", "text": "func (o MetadataAuthorOutput) Email() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v MetadataAuthor) *string { return v.Email }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "ea51430c8dbef1f7916f46c9e47846b2", "score": "0.56626636", "text": "func (u *User) buildFullEmailAddress() string {\n\treturn fmt.Sprintf(\"%s <%s>\", u.Name(), u.Email)\n}", "title": "" }, { "docid": "fdd29dc9f5ed9089a342ecf8db328bdc", "score": "0.5661261", "text": "func (a Account) Email() string {\n\treturn fmt.Sprintf(\"%s@%s\", a.Name, a.Domain.Name)\n}", "title": "" }, { "docid": "8ffdb5de993f5d546ee95bacee9fd51c", "score": "0.565863", "text": "func (up UserProfile) GetEmail() string {\n\treturn up.email\n}", "title": "" }, { "docid": "3b6f0ea7869f84c9dc1f2f0f9ee77561", "score": "0.56275994", "text": "func GetUserEmailFromContext(ctx context.Context) string {\n\tval := ctx.Value(CtxAuthUser)\n\tif val != nil {\n\t\tauthUser := val.(*auth.User) // nolint\n\t\tif authUser != nil {\n\t\t\treturn authUser.Email\n\t\t}\n\t}\n\n\treturn \"\"\n}", "title": "" }, { "docid": "09660cd9c21684e90b9ea275e1ff02bb", "score": "0.5626137", "text": "func (m *UserMutation) Email() (r string, exists bool) {\n\tv := m.email\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "title": "" }, { "docid": "09660cd9c21684e90b9ea275e1ff02bb", "score": "0.5626137", "text": "func (m *UserMutation) Email() (r string, exists bool) {\n\tv := m.email\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "title": "" }, { "docid": "09660cd9c21684e90b9ea275e1ff02bb", "score": "0.5626137", "text": "func (m *UserMutation) Email() (r string, exists bool) {\n\tv := m.email\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "title": "" }, { "docid": "00f95fb4e8e9a4b17297ce606c109afe", "score": "0.5619471", "text": "func BuildUser() string {\n\treturn buildUser\n}", "title": "" }, { "docid": "932941ebae39c6e93fd4902f0e7d7506", "score": "0.56185377", "text": "func (s *Session) Email() (email string, err error) {\n\temail, err = redis.GetUserEmail(s.UserID)\n\tif err != nil {\n\t\terr = errors.Wrap(err, \"cannot get user's email from Redis\")\n\t}\n\treturn\n}", "title": "" }, { "docid": "f9c4ecfa61aaef2e2f981b83c807cd51", "score": "0.5607081", "text": "func (m *PersonalMutation) Email() (r string, exists bool) {\n\tv := m._Email\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "title": "" }, { "docid": "099b7db7a593bc38c56c4cd4a74279d6", "score": "0.55967283", "text": "func (r AccountResolver) Email() string {\n\treturn r.account.Email\n}", "title": "" }, { "docid": "228ec1e7ccf4b62e45d10d7721972367", "score": "0.55655974", "text": "func (o AccountOutput) Email() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *Account) pulumi.StringOutput { return v.Email }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "e7785f1c1fda1a369552086a5abd6696", "score": "0.5565369", "text": "func (o *IdentityCreateUserRequest) GetEmail() string {\n\tif o == nil || o.Email == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Email\n}", "title": "" }, { "docid": "16eb28c2be3612111e4be35eb0359d87", "score": "0.5557637", "text": "func (m *RestaurantOwnerMutation) Email() (r string, exists bool) {\n\tv := m.email\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "title": "" }, { "docid": "86b01e26353eaf2be9ef474aa05dd799", "score": "0.55428493", "text": "func (o MetadataAuthorPtrOutput) Email() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *MetadataAuthor) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Email\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "4b47128527787e7cd58aa1ca58e505f5", "score": "0.55412424", "text": "func (m *EmployeeMutation) Email() (r string, exists bool) {\n\tv := m._Email\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "title": "" }, { "docid": "2846317d27a53218fad6a45b0ec844fd", "score": "0.5539866", "text": "func (i *SpawnedEC2Instance) User() string {\n\treturn i.config.HostUser\n}", "title": "" }, { "docid": "1036e89dfb69513ef83fb3ec58064279", "score": "0.552709", "text": "func (i *serviceInfo) ActualUser() string {\n\treturn i.actualUser\n}", "title": "" }, { "docid": "d9b9970c3bad08cbbffe8cb873fe1f28", "score": "0.5497495", "text": "func (o AppConnectorPrincipalInfoServiceAccountOutput) Email() pulumi.StringOutput {\n\treturn o.ApplyT(func(v AppConnectorPrincipalInfoServiceAccount) string { return v.Email }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "155f13c33cb709f7ca6867b971cf281b", "score": "0.5493678", "text": "func GetUserEmail() *ast.Rule {\n\treturn ast.MustParseRule(`\nget_user_email(session, user) = v {\n\tv = user.email\n} else = \"\" {\n\ttrue\n}\n`)\n}", "title": "" }, { "docid": "ca2c828eb5cdbd8c5e0125720db05798", "score": "0.54932404", "text": "func (m *Invitation) GetInvitedUserDisplayName()(*string) {\n return m.invitedUserDisplayName\n}", "title": "" }, { "docid": "7b716a5a474b55e69332bb68bad0b0ac", "score": "0.54893714", "text": "func (c *Creator) GetEmail() string {\n\tif c == nil || c.Email == nil {\n\t\treturn \"\"\n\t}\n\treturn *c.Email\n}", "title": "" }, { "docid": "aba10f325e5c4a2e2731e3680bb01399", "score": "0.5489089", "text": "func (a *AccountDetail) GetEmailAddress() string {\n\treturn a.Username\n}", "title": "" }, { "docid": "2a5d7df7b0af94d91d98c00f95172370", "score": "0.54873955", "text": "func (u AuthentifiedUser) GetEmail() string {\n\tif u.Contacts == nil {\n\t\treturn \"\"\n\t}\n\tbyEmails := u.Contacts.Filter(UserContactTypeEmail)\n\tprimaryEmailAdress := byEmails.Primary()\n\treturn primaryEmailAdress.Value\n}", "title": "" }, { "docid": "946971da6046598c365cadb18ebcabe7", "score": "0.5455445", "text": "func (o *ListWorkspaceUsersWithMemberData) GetEmail() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.Email\n}", "title": "" }, { "docid": "85c6ce7a990286271646d19921f0fb2b", "score": "0.54208297", "text": "func (u *HeaderUser) GetEmail() string {\n\treturn u.Email\n}", "title": "" }, { "docid": "06be239d46ef31b9615aed8334d3215a", "score": "0.5420325", "text": "func getUser() string { return getEnv(\"ES_USER\", \"\") }", "title": "" }, { "docid": "86a4bd83780e86d4196af71ccfbcabad", "score": "0.5420033", "text": "func (o *IamUserAllOf) GetEmail() string {\n\tif o == nil || o.Email == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Email\n}", "title": "" }, { "docid": "938a2ca3369b860cda1f98a51db91887", "score": "0.54075867", "text": "func (m *EducationSubmissionIndividualRecipient) GetUserId()(*string) {\n val, err := m.GetBackingStore().Get(\"userId\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*string)\n }\n return nil\n}", "title": "" }, { "docid": "22176dffcf2c691f8dc4f5a6096bfd90", "score": "0.5405497", "text": "func (o RegisteredDomainAdminContactOutput) Email() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RegisteredDomainAdminContact) *string { return v.Email }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "7dd065b520e3e4ba48ea0ea7edb3510a", "score": "0.5400772", "text": "func (c *Chrome) User() string { return c.user }", "title": "" }, { "docid": "7dd065b520e3e4ba48ea0ea7edb3510a", "score": "0.5400772", "text": "func (c *Chrome) User() string { return c.user }", "title": "" }, { "docid": "10469bce9bade7aa101793ca99bfb5f1", "score": "0.53862345", "text": "func (n *noAuth) User() string {\n\treturn n.user\n}", "title": "" }, { "docid": "cb0ce803d0b9cfda7bfcb51b6a4962d3", "score": "0.5382339", "text": "func getEmail(tokenInfo *AccessTokenInfo) string {\n\treturn tokenInfo.Email\n}", "title": "" }, { "docid": "144e21c102afc5ed58cdd0c27193aef6", "score": "0.5376622", "text": "func (m *AttackSimulationUser) GetEmail()(*string) {\n val, err := m.GetBackingStore().Get(\"email\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*string)\n }\n return nil\n}", "title": "" }, { "docid": "02503f3dcfa7e746ee7fb2a1982c4961", "score": "0.53713644", "text": "func (o *EntityWatchlistSearchTerms) GetEmailAddress() string {\n\tif o == nil || o.EmailAddress.Get() == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.EmailAddress.Get()\n}", "title": "" }, { "docid": "68024c18f805e2fd139dbe5ae7dc5f8b", "score": "0.5354192", "text": "func (m *CustomerMutation) Email() (r string, exists bool) {\n\tv := m.email\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "title": "" }, { "docid": "e5be23cabad2f3947c4736e1dea05803", "score": "0.5349478", "text": "func (o *ForcedNotificationChangedEvent) GetUserId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.UserId\n}", "title": "" }, { "docid": "9af42be83d1b4a63f478b3db1cf639f4", "score": "0.5339822", "text": "func (o *DashboardUser) GetEmailAddress() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.EmailAddress\n}", "title": "" }, { "docid": "f5cc3d00df2bf52c0af33420325d1bc4", "score": "0.53391707", "text": "func (m *ManagedTenantTicketingEndpoint) GetCreatedByUserId()(*string) {\n val, err := m.GetBackingStore().Get(\"createdByUserId\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*string)\n }\n return nil\n}", "title": "" }, { "docid": "d2760d07bb788f96f25ce1344bc14aad", "score": "0.5331869", "text": "func (o RegisteredDomainRegistrantContactOutput) Email() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RegisteredDomainRegistrantContact) *string { return v.Email }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "7d08b05afa26a696b11ec4b6ae3ca8bf", "score": "0.53298026", "text": "func getUseraddr(req *http.Request) string {\n\tip, err := originalClientIP(req)\n\tif err != nil {\n\t\treturn \"\"\n\t}\n\treturn net.JoinHostPort(ip.String(), \"1\")\n}", "title": "" }, { "docid": "6961b995988cb2054cb1ef71349123bc", "score": "0.53257173", "text": "func (o *User) GetEmail() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.Email\n}", "title": "" }, { "docid": "6961b995988cb2054cb1ef71349123bc", "score": "0.53257173", "text": "func (o *User) GetEmail() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.Email\n}", "title": "" }, { "docid": "4a14c1313d088781a8525127e1fad4af", "score": "0.53223413", "text": "func (m *UserMutation) USEREMAIL() (r string, exists bool) {\n\tv := m._USER_EMAIL\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "title": "" }, { "docid": "4a14c1313d088781a8525127e1fad4af", "score": "0.53223413", "text": "func (m *UserMutation) USEREMAIL() (r string, exists bool) {\n\tv := m._USER_EMAIL\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "title": "" }, { "docid": "fd2cf688d0dad659d99d1c39900f3a34", "score": "0.53203595", "text": "func (u User) GetEmail() string {\n\treturn u.Email\n}", "title": "" }, { "docid": "fd2cf688d0dad659d99d1c39900f3a34", "score": "0.53203595", "text": "func (u User) GetEmail() string {\n\treturn u.Email\n}", "title": "" }, { "docid": "c97ddf9c2a91a337fcdb8417dd1cd0fc", "score": "0.5310507", "text": "func (m *gerritEvent) CreatedBy() string {\n\treturn m.createdByField\n}", "title": "" }, { "docid": "5d8476eeb85b253469460d99d8e3e428", "score": "0.5303526", "text": "func (t *Todo) User() string {\n\treturn t.user\n}", "title": "" }, { "docid": "b518faf341c8dbe1203b5f73c1d939e4", "score": "0.52915275", "text": "func (s Subject) HostUser() string {\n\treturn s.Instance.Host + \" \" + s.Instance.User\n}", "title": "" }, { "docid": "d0158a968631385384eafb673203d4ae", "score": "0.52884364", "text": "func (o ServiceAccountOutput) Email() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ServiceAccount) *string { return v.Email }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "d0158a968631385384eafb673203d4ae", "score": "0.52884364", "text": "func (o ServiceAccountOutput) Email() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ServiceAccount) *string { return v.Email }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "f2dc316e1487d6b0f58dceac41d70899", "score": "0.5285149", "text": "func (o AppConnectorPrincipalInfoServiceAccountPtrOutput) Email() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *AppConnectorPrincipalInfoServiceAccount) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.Email\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "6edc7d427ccd4265dbdd115f1963ac02", "score": "0.5283832", "text": "func (m message) User() string {\r\n\treturn m.user\r\n}", "title": "" }, { "docid": "1068416c7c7a34f5f4417cae4eb07995", "score": "0.5282335", "text": "func (i *Instance) Owner() *mail.Address {\n\tif addr, err := mail.ParseAddress(i.Tag(\"Owner\")); err == nil {\n\t\treturn addr\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "13280fdb970f8b227d58e88429767bd0", "score": "0.5275814", "text": "func (o RegisteredDomainTechContactOutput) Email() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RegisteredDomainTechContact) *string { return v.Email }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "7e78e641d1ba15446a3d52112c3eaf42", "score": "0.52716976", "text": "func (e *Endpoint) GetCurrentUser() string {\n\treturn \"/user/@me\"\n}", "title": "" }, { "docid": "ab5bf808d3070cac97334735f84c475a", "score": "0.52683425", "text": "func AuthorizedEmail(ctx context.Context) string {\n\tif session := GetSession(ctx); session != nil {\n\t\temail := session.Email\n\t\tif isAuthorized(email) {\n\t\t\treturn email\n\t\t}\n\t}\n\treturn \"\"\n}", "title": "" } ]
d1f6d6327505dc21f2905704b420a5a7
NewSignalDecisionOutcomeFromValue returns a pointer to a valid SignalDecisionOutcome for the value passed as argument, or an error if the value passed is not allowed by the enum
[ { "docid": "1dc3eb9260382263af1b08f7ab3be8ad", "score": "0.78304577", "text": "func NewSignalDecisionOutcomeFromValue(v string) (*SignalDecisionOutcome, error) {\n\tev := SignalDecisionOutcome(v)\n\n\n\treturn &ev, nil\n}", "title": "" } ]
[ { "docid": "3fa33193f5b057601497089fa8ffab6a", "score": "0.5577816", "text": "func (v SignalDecisionOutcome) Ptr() *SignalDecisionOutcome {\n\treturn &v\n}", "title": "" }, { "docid": "049fa456af93a90f61c289177b49917d", "score": "0.4986997", "text": "func CreateTermsAndConditionsAcceptanceStatusFromDiscriminatorValue(parseNode i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.ParseNode)(i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.Parsable, error) {\n return NewTermsAndConditionsAcceptanceStatus(), nil\n}", "title": "" }, { "docid": "b9233800719436b91646c71539d96963", "score": "0.4954654", "text": "func ToPendingDecisionState(t *shared.PendingDecisionState) *types.PendingDecisionState {\n\tif t == nil {\n\t\treturn nil\n\t}\n\tswitch *t {\n\tcase shared.PendingDecisionStateScheduled:\n\t\tv := types.PendingDecisionStateScheduled\n\t\treturn &v\n\tcase shared.PendingDecisionStateStarted:\n\t\tv := types.PendingDecisionStateStarted\n\t\treturn &v\n\t}\n\tpanic(\"unexpected enum value\")\n}", "title": "" }, { "docid": "4680871978e219768fba9ece6555ac9e", "score": "0.48777747", "text": "func FromPendingDecisionState(t *types.PendingDecisionState) *shared.PendingDecisionState {\n\tif t == nil {\n\t\treturn nil\n\t}\n\tswitch *t {\n\tcase types.PendingDecisionStateScheduled:\n\t\tv := shared.PendingDecisionStateScheduled\n\t\treturn &v\n\tcase types.PendingDecisionStateStarted:\n\t\tv := shared.PendingDecisionStateStarted\n\t\treturn &v\n\t}\n\tpanic(\"unexpected enum value\")\n}", "title": "" }, { "docid": "fba35c694c9076fdae6659712038ee8f", "score": "0.4842324", "text": "func CreateDetectionActionFromDiscriminatorValue(parseNode i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.ParseNode)(i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.Parsable, error) {\n return NewDetectionAction(), nil\n}", "title": "" }, { "docid": "514e770864ddd415a1ee82e2f14c3714", "score": "0.48418617", "text": "func MessageEnumFromValue(value string) MessageEnum {\n switch value {\n case \"success\":\n return Message_SUCCESS\n case \"failure\":\n return Message_FAILURE\n default:\n return Message_SUCCESS\n }\n}", "title": "" }, { "docid": "e1ab29303d66383a7d93624a0245bf7d", "score": "0.47998136", "text": "func ToDecisionType(t *shared.DecisionType) *types.DecisionType {\n\tif t == nil {\n\t\treturn nil\n\t}\n\tswitch *t {\n\tcase shared.DecisionTypeScheduleActivityTask:\n\t\tv := types.DecisionTypeScheduleActivityTask\n\t\treturn &v\n\tcase shared.DecisionTypeRequestCancelActivityTask:\n\t\tv := types.DecisionTypeRequestCancelActivityTask\n\t\treturn &v\n\tcase shared.DecisionTypeStartTimer:\n\t\tv := types.DecisionTypeStartTimer\n\t\treturn &v\n\tcase shared.DecisionTypeCompleteWorkflowExecution:\n\t\tv := types.DecisionTypeCompleteWorkflowExecution\n\t\treturn &v\n\tcase shared.DecisionTypeFailWorkflowExecution:\n\t\tv := types.DecisionTypeFailWorkflowExecution\n\t\treturn &v\n\tcase shared.DecisionTypeCancelTimer:\n\t\tv := types.DecisionTypeCancelTimer\n\t\treturn &v\n\tcase shared.DecisionTypeCancelWorkflowExecution:\n\t\tv := types.DecisionTypeCancelWorkflowExecution\n\t\treturn &v\n\tcase shared.DecisionTypeRequestCancelExternalWorkflowExecution:\n\t\tv := types.DecisionTypeRequestCancelExternalWorkflowExecution\n\t\treturn &v\n\tcase shared.DecisionTypeRecordMarker:\n\t\tv := types.DecisionTypeRecordMarker\n\t\treturn &v\n\tcase shared.DecisionTypeContinueAsNewWorkflowExecution:\n\t\tv := types.DecisionTypeContinueAsNewWorkflowExecution\n\t\treturn &v\n\tcase shared.DecisionTypeStartChildWorkflowExecution:\n\t\tv := types.DecisionTypeStartChildWorkflowExecution\n\t\treturn &v\n\tcase shared.DecisionTypeSignalExternalWorkflowExecution:\n\t\tv := types.DecisionTypeSignalExternalWorkflowExecution\n\t\treturn &v\n\tcase shared.DecisionTypeUpsertWorkflowSearchAttributes:\n\t\tv := types.DecisionTypeUpsertWorkflowSearchAttributes\n\t\treturn &v\n\t}\n\tpanic(\"unexpected enum value\")\n}", "title": "" }, { "docid": "2d18d47c00bc0f65b41230b935b9d7a4", "score": "0.46454906", "text": "func (v SignalDecisionOutcome) IsValid() bool {\n\tfor _, existing := range allowedSignalDecisionOutcomeEnumValues {\n\t\tif existing == v {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "d2ace6392da24bc9ffcc925583c6ccb6", "score": "0.4639286", "text": "func Status7EnumFromValue(value string) Status7Enum {\r\n switch value {\r\n case \"Active\":\r\n return Status7_ACTIVE\r\n case \"Deactivated\":\r\n return Status7_DEACTIVATED\r\n case \"Deleted\":\r\n return Status7_DELETED\r\n default:\r\n return Status7_ACTIVE\r\n }\r\n}", "title": "" }, { "docid": "bb68ade2ca47802b5b7afd82db0e2b3a", "score": "0.46278876", "text": "func NewValue(v interface{}) *Value {\n\tswitch v := v.(type) {\n\tcase nil:\n\t\treturn &Value{}\n\tcase *Capture:\n\t\treturn &Value{Val: &Value_Capture{v}}\n\tcase *Context:\n\t\treturn &Value{Val: &Value_Context{v}}\n\tcase *Contexts:\n\t\treturn &Value{Val: &Value_Contexts{v}}\n\tcase *Commands:\n\t\treturn &Value{Val: &Value_Commands{v}}\n\tcase *CommandTree:\n\t\treturn &Value{Val: &Value_CommandTree{v}}\n\tcase *CommandTreeNode:\n\t\treturn &Value{Val: &Value_CommandTreeNode{v}}\n\tcase *ConstantSet:\n\t\treturn &Value{Val: &Value_ConstantSet{v}}\n\tcase *Event:\n\t\treturn &Value{Val: &Value_Event{v}}\n\tcase *Events:\n\t\treturn &Value{Val: &Value_Events{v}}\n\tcase *Memory:\n\t\treturn &Value{Val: &Value_Memory{v}}\n\tcase *memory_box.Value:\n\t\treturn &Value{Val: &Value_MemoryBox{v}}\n\tcase path.Node:\n\t\treturn &Value{Val: &Value_Path{v.Path()}}\n\tcase *Report:\n\t\treturn &Value{Val: &Value_Report{v}}\n\tcase *Resources:\n\t\treturn &Value{Val: &Value_Resources{v}}\n\tcase *Messages:\n\t\treturn &Value{Val: &Value_Messages{v}}\n\tcase *StateTree:\n\t\treturn &Value{Val: &Value_StateTree{v}}\n\tcase *StateTreeNode:\n\t\treturn &Value{Val: &Value_StateTreeNode{v}}\n\tcase *Stats:\n\t\treturn &Value{Val: &Value_Stats{v}}\n\tcase *api.Command:\n\t\treturn &Value{Val: &Value_Command{v}}\n\tcase *api.Mesh:\n\t\treturn &Value{Val: &Value_Mesh{v}}\n\tcase *api.Metrics:\n\t\treturn &Value{Val: &Value_Metrics{v}}\n\tcase *api.ResourceData:\n\t\treturn &Value{Val: &Value_ResourceData{v}}\n\tcase *image.Info:\n\t\treturn &Value{Val: &Value_ImageInfo{v}}\n\tcase *device.Instance:\n\t\treturn &Value{Val: &Value_Device{v}}\n\tcase *api.MultiResourceData:\n\t\treturn &Value{Val: &Value_MultiResourceData{v}}\n\tcase *DeviceTraceConfiguration:\n\t\treturn &Value{Val: &Value_TraceConfig{v}}\n\tcase *types.Type:\n\t\treturn &Value{Val: &Value_Type{v}}\n\n\tdefault:\n\t\tif v := box.NewValue(v); v != nil {\n\t\t\treturn &Value{Val: &Value_Box{v}}\n\t\t}\n\t}\n\tpanic(fmt.Errorf(\"Cannot box value type %T\", v))\n}", "title": "" }, { "docid": "560cf4ffc791e102f651fb5bb5fb815a", "score": "0.4595556", "text": "func FromDecisionType(t *types.DecisionType) *shared.DecisionType {\n\tif t == nil {\n\t\treturn nil\n\t}\n\tswitch *t {\n\tcase types.DecisionTypeScheduleActivityTask:\n\t\tv := shared.DecisionTypeScheduleActivityTask\n\t\treturn &v\n\tcase types.DecisionTypeRequestCancelActivityTask:\n\t\tv := shared.DecisionTypeRequestCancelActivityTask\n\t\treturn &v\n\tcase types.DecisionTypeStartTimer:\n\t\tv := shared.DecisionTypeStartTimer\n\t\treturn &v\n\tcase types.DecisionTypeCompleteWorkflowExecution:\n\t\tv := shared.DecisionTypeCompleteWorkflowExecution\n\t\treturn &v\n\tcase types.DecisionTypeFailWorkflowExecution:\n\t\tv := shared.DecisionTypeFailWorkflowExecution\n\t\treturn &v\n\tcase types.DecisionTypeCancelTimer:\n\t\tv := shared.DecisionTypeCancelTimer\n\t\treturn &v\n\tcase types.DecisionTypeCancelWorkflowExecution:\n\t\tv := shared.DecisionTypeCancelWorkflowExecution\n\t\treturn &v\n\tcase types.DecisionTypeRequestCancelExternalWorkflowExecution:\n\t\tv := shared.DecisionTypeRequestCancelExternalWorkflowExecution\n\t\treturn &v\n\tcase types.DecisionTypeRecordMarker:\n\t\tv := shared.DecisionTypeRecordMarker\n\t\treturn &v\n\tcase types.DecisionTypeContinueAsNewWorkflowExecution:\n\t\tv := shared.DecisionTypeContinueAsNewWorkflowExecution\n\t\treturn &v\n\tcase types.DecisionTypeStartChildWorkflowExecution:\n\t\tv := shared.DecisionTypeStartChildWorkflowExecution\n\t\treturn &v\n\tcase types.DecisionTypeSignalExternalWorkflowExecution:\n\t\tv := shared.DecisionTypeSignalExternalWorkflowExecution\n\t\treturn &v\n\tcase types.DecisionTypeUpsertWorkflowSearchAttributes:\n\t\tv := shared.DecisionTypeUpsertWorkflowSearchAttributes\n\t\treturn &v\n\t}\n\tpanic(\"unexpected enum value\")\n}", "title": "" }, { "docid": "77740b1d63bf7d1cce8ec4ce371282c4", "score": "0.45553514", "text": "func (p P2PAdjacencyStateTLV) Value() interface{} {\n\treturn p\n}", "title": "" }, { "docid": "e2f6cd27dd51d063040e463cdd1b2e37", "score": "0.45307723", "text": "func CreateAlertImpactFromDiscriminatorValue(parseNode i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.ParseNode)(i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.Parsable, error) {\n return NewAlertImpact(), nil\n}", "title": "" }, { "docid": "5255988f530e90f1c7fff2553bb715b1", "score": "0.45306796", "text": "func CreateThreatAssessmentResultFromDiscriminatorValue(parseNode i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.ParseNode)(i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.Parsable, error) {\n return NewThreatAssessmentResult(), nil\n}", "title": "" }, { "docid": "ed4c4f1bb331f2fc23828cd8678db5fd", "score": "0.44635352", "text": "func NewTermsAndConditionsAcceptanceStatus()(*TermsAndConditionsAcceptanceStatus) {\n m := &TermsAndConditionsAcceptanceStatus{\n Entity: *NewEntity(),\n }\n return m\n}", "title": "" }, { "docid": "ab3fc85de88cfad81579bfc0cb03afd1", "score": "0.43910348", "text": "func NewValue(t interface{}) Value {\n\tswitch t := t.(type) {\n\tcase error:\n\t\treturn Value{err: t}\n\tcase Value:\n\t\treturn t\n\tcase []byte:\n\t\treturn Value{b: t}\n\tcase string:\n\t\treturn Value{b: StringToBytes(t)}\n\tcase bool:\n\t\tif t {\n\t\t\treturn Value{b: []byte{1}}\n\t\t}\n\t\treturn Value{b: ZeroByte}\n\tcase proto.Message:\n\t\tb, _ := proto.Marshal(t)\n\t\treturn Value{b: b}\n\tcase int:\n\t\tb, _ := proto.Marshal(&pb.IntValue{Value: int64(t)})\n\t\treturn Value{b: b}\n\tcase int8:\n\t\tb, _ := proto.Marshal(&pb.IntValue{Value: int64(t)})\n\t\treturn Value{b: b}\n\tcase int16:\n\t\tb, _ := proto.Marshal(&pb.IntValue{Value: int64(t)})\n\t\treturn Value{b: b}\n\tcase int32:\n\t\tb, _ := proto.Marshal(&pb.IntValue{Value: int64(t)})\n\t\treturn Value{b: b}\n\tcase int64:\n\t\tb, _ := proto.Marshal(&pb.IntValue{Value: t})\n\t\treturn Value{b: b}\n\tcase float32:\n\t\tb, _ := proto.Marshal(&pb.FloatValue{Value: float64(t)})\n\t\treturn Value{b: b}\n\tcase float64:\n\t\tb, _ := proto.Marshal(&pb.FloatValue{Value: t})\n\t\treturn Value{b: b}\n\tcase time.Time:\n\t\tb, _ := proto.Marshal(&pb.IntValue{Value: int64(t.Nanosecond())})\n\t\treturn Value{b: b}\n\tcase time.Duration:\n\t\tb, _ := proto.Marshal(&pb.IntValue{Value: t.Nanoseconds()})\n\t\treturn Value{b: b}\n\tcase [][]byte:\n\t\tb, _ := proto.Marshal(&pb.List{Value: t})\n\t\treturn Value{b: b}\n\tcase []string:\n\t\tb, _ := proto.Marshal(&pb.List{Value: ListStringToBytes(t)})\n\t\treturn Value{b: b}\n\tcase []Value:\n\t\tb, _ := proto.Marshal(&pb.List{Value: ListValueToBytes(t)})\n\t\treturn Value{b: b}\n\tcase map[string]string:\n\t\tb, _ := proto.Marshal(&pb.Hash{Value: MapStringToMapBytes(t)})\n\t\treturn Value{b: b}\n\tcase map[string][]byte:\n\t\tb, _ := proto.Marshal(&pb.Hash{Value: t})\n\t\treturn Value{b: b}\n\tcase map[string]bool:\n\t\tb, _ := proto.Marshal(&pb.Hash{Value: MapBoolToMapBytes(t)})\n\t\treturn Value{b: b}\n\tcase map[string]int64:\n\t\tb, _ := proto.Marshal(&pb.Hash{Value: MapIntToMapBytes(t)})\n\t\treturn Value{b: b}\n\tcase map[string]float64:\n\t\tb, _ := proto.Marshal(&pb.Hash{Value: MapFloatToMapBytes(t)})\n\t\treturn Value{b: b}\n\tcase map[string]Value:\n\t\tb, _ := proto.Marshal(&pb.Hash{Value: MapValueToMapBytes(t)})\n\t\treturn Value{b: b}\n\tdefault:\n\t\treturn Value{err: errors.New(\"Unknown type, recommend marshalling to byte slice\")}\n\t}\n}", "title": "" }, { "docid": "ccb95277ce31113c2f49b5beee567b8b", "score": "0.43843704", "text": "func (e enum8) ValueOf(name string) (uint64, error) {\n\tout := new(uint8)\n\terr := enumvalue(e, name, unsafe.Pointer(out))\n\treturn uint64(*out), err\n}", "title": "" }, { "docid": "59cb1b68c642e17cffd8a935772c5202", "score": "0.43729553", "text": "func (this AttestationConveyancePreference) Value() string {\n\tidx := int(this)\n\tif idx >= 0 && idx < len(attestationConveyancePreferenceToWasmTable) {\n\t\treturn attestationConveyancePreferenceToWasmTable[idx]\n\t}\n\tpanic(\"unknown input value\")\n}", "title": "" }, { "docid": "4cff62ca1b53c05353be6f7c85f87046", "score": "0.43575558", "text": "func NewVerificationStateFromValue(v string) (*VerificationState, error) {\n\tev := VerificationState(v)\n\tif ev.IsValid() {\n\t\treturn &ev, nil\n\t} else {\n\t\treturn nil, fmt.Errorf(\"invalid value '%v' for VerificationState: valid values are %v\", v, allowedVerificationStateEnumValues)\n\t}\n}", "title": "" }, { "docid": "93ccfd7b1b62640546e9c724f154da41", "score": "0.43408453", "text": "func MyEnumFromString(s string) (MyEnum, error) {\n if v, ok := MyEnumToValue[s]; ok {\n return v, nil\n }\n return MyEnum(0), fmt.Errorf(\"not a valid MyEnum string\")\n}", "title": "" }, { "docid": "d90ffd5bf6381cfc4e906e9083f148a7", "score": "0.43294725", "text": "func CreateUserExperienceAnalyticsAnomalyFromDiscriminatorValue(parseNode i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.ParseNode)(i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.Parsable, error) {\n return NewUserExperienceAnalyticsAnomaly(), nil\n}", "title": "" }, { "docid": "267c488bf223a5fabf48e032077dc936", "score": "0.42805117", "text": "func New(value int) alertCode {\n\treturn alertCode(value)\n}", "title": "" }, { "docid": "fda2c858893612d2d6acab4435d061c9", "score": "0.42802358", "text": "func TierType2EnumFromValue(value string) TierType2Enum {\r\n switch value {\r\n case \"kGoogleStandard\":\r\n return TierType2_KGOOGLESTANDARD\r\n case \"kGoogleNearline\":\r\n return TierType2_KGOOGLENEARLINE\r\n case \"kGoogleColdline\":\r\n return TierType2_KGOOGLECOLDLINE\r\n case \"kGoogleRegional\":\r\n return TierType2_KGOOGLEREGIONAL\r\n case \"kGoogleMultiRegional\":\r\n return TierType2_KGOOGLEMULTIREGIONAL\r\n default:\r\n return TierType2_KGOOGLESTANDARD\r\n }\r\n}", "title": "" }, { "docid": "a30b7de6eab6c8ccc64b2ab63c886fa2", "score": "0.42684463", "text": "func (e CampaignKind) Value() (driver.Value, error) {\n\tif !e.IsValid() {\n\t\treturn nil, t9e.G(\"invalid status\")\n\t}\n\treturn string(e), nil\n}", "title": "" }, { "docid": "a737238890bccebc6fe705db7098d1c4", "score": "0.42402366", "text": "func (o EnterpriseCrmEventbusProtoConditionOutput) Value() EnterpriseCrmEventbusProtoValueTypePtrOutput {\n\treturn o.ApplyT(func(v EnterpriseCrmEventbusProtoCondition) *EnterpriseCrmEventbusProtoValueType { return v.Value }).(EnterpriseCrmEventbusProtoValueTypePtrOutput)\n}", "title": "" }, { "docid": "e5d70015eec0abc8505b84e4ad393ba5", "score": "0.42382625", "text": "func (s actionResponseTag) Value() uint8 {\n\treturn uint8(s)\n}", "title": "" }, { "docid": "6f3b955620e58008afee574c37e002d0", "score": "0.42341253", "text": "func enumvalue(e Enum, name string, ptr unsafe.Pointer) error {\n\treturn core.Status(int(C.H5Tenum_valueof(\n\t\tC.hid_t(e.Id()),\n\t\tC.CString(name),\n\t\tptr)), \"getting enum value\")\n}", "title": "" }, { "docid": "cad431daa649778530d7d694141e6c28", "score": "0.4226875", "text": "func NewValue(i interface{}) *api.Value {\n\tswitch v := i.(type) {\n\tcase string:\n\t\treturn &api.Value{\n\t\t\tType: api.ValueType_STRING,\n\t\t\tValue: &api.Value_StringValue{StringValue: v},\n\t\t}\n\tcase int8:\n\t\treturn &api.Value{\n\t\t\tType: api.ValueType_SINT8,\n\t\t\tValue: &api.Value_SignedValue{SignedValue: int64(v)},\n\t\t}\n\tcase int16:\n\t\treturn &api.Value{\n\t\t\tType: api.ValueType_SINT16,\n\t\t\tValue: &api.Value_SignedValue{SignedValue: int64(v)},\n\t\t}\n\tcase int32:\n\t\treturn &api.Value{\n\t\t\tType: api.ValueType_SINT32,\n\t\t\tValue: &api.Value_SignedValue{SignedValue: int64(v)},\n\t\t}\n\tcase int64:\n\t\treturn &api.Value{\n\t\t\tType: api.ValueType_SINT64,\n\t\t\tValue: &api.Value_SignedValue{SignedValue: v},\n\t\t}\n\tcase uint8:\n\t\treturn &api.Value{\n\t\t\tType: api.ValueType_UINT8,\n\t\t\tValue: &api.Value_UnsignedValue{UnsignedValue: uint64(v)},\n\t\t}\n\tcase uint16:\n\t\treturn &api.Value{\n\t\t\tType: api.ValueType_UINT16,\n\t\t\tValue: &api.Value_UnsignedValue{UnsignedValue: uint64(v)},\n\t\t}\n\tcase uint32:\n\t\treturn &api.Value{\n\t\t\tType: api.ValueType_UINT32,\n\t\t\tValue: &api.Value_UnsignedValue{UnsignedValue: uint64(v)},\n\t\t}\n\tcase uint64:\n\t\treturn &api.Value{\n\t\t\tType: api.ValueType_UINT64,\n\t\t\tValue: &api.Value_UnsignedValue{UnsignedValue: v},\n\t\t}\n\tcase bool:\n\t\treturn &api.Value{\n\t\t\tType: api.ValueType_BOOL,\n\t\t\tValue: &api.Value_BoolValue{BoolValue: v},\n\t\t}\n\tcase float64:\n\t\treturn &api.Value{\n\t\t\tType: api.ValueType_DOUBLE,\n\t\t\tValue: &api.Value_DoubleValue{DoubleValue: v},\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "62841902e50c068ea94deed1e72a5887", "score": "0.4226875", "text": "func NewValue(i interface{}) *api.Value {\n\tswitch v := i.(type) {\n\tcase string:\n\t\treturn &api.Value{\n\t\t\tType: api.ValueType_STRING,\n\t\t\tValue: &api.Value_StringValue{StringValue: v},\n\t\t}\n\tcase int8:\n\t\treturn &api.Value{\n\t\t\tType: api.ValueType_SINT8,\n\t\t\tValue: &api.Value_SignedValue{SignedValue: int64(v)},\n\t\t}\n\tcase int16:\n\t\treturn &api.Value{\n\t\t\tType: api.ValueType_SINT16,\n\t\t\tValue: &api.Value_SignedValue{SignedValue: int64(v)},\n\t\t}\n\tcase int32:\n\t\treturn &api.Value{\n\t\t\tType: api.ValueType_SINT32,\n\t\t\tValue: &api.Value_SignedValue{SignedValue: int64(v)},\n\t\t}\n\tcase int64:\n\t\treturn &api.Value{\n\t\t\tType: api.ValueType_SINT64,\n\t\t\tValue: &api.Value_SignedValue{SignedValue: v},\n\t\t}\n\tcase uint8:\n\t\treturn &api.Value{\n\t\t\tType: api.ValueType_UINT8,\n\t\t\tValue: &api.Value_UnsignedValue{UnsignedValue: uint64(v)},\n\t\t}\n\tcase uint16:\n\t\treturn &api.Value{\n\t\t\tType: api.ValueType_UINT16,\n\t\t\tValue: &api.Value_UnsignedValue{UnsignedValue: uint64(v)},\n\t\t}\n\tcase uint32:\n\t\treturn &api.Value{\n\t\t\tType: api.ValueType_UINT32,\n\t\t\tValue: &api.Value_UnsignedValue{UnsignedValue: uint64(v)},\n\t\t}\n\tcase uint64:\n\t\treturn &api.Value{\n\t\t\tType: api.ValueType_UINT64,\n\t\t\tValue: &api.Value_UnsignedValue{UnsignedValue: v},\n\t\t}\n\tcase bool:\n\t\treturn &api.Value{\n\t\t\tType: api.ValueType_BOOL,\n\t\t\tValue: &api.Value_BoolValue{BoolValue: v},\n\t\t}\n\tcase float64:\n\t\treturn &api.Value{\n\t\t\tType: api.ValueType_DOUBLE,\n\t\t\tValue: &api.Value_DoubleValue{DoubleValue: v},\n\t\t}\n\tcase *timestamp.Timestamp:\n\t\treturn &api.Value{\n\t\t\tType: api.ValueType_TIMESTAMP,\n\t\t\tValue: &api.Value_TimestampValue{\n\t\t\t\tTimestampValue: v,\n\t\t\t},\n\t\t}\n\tcase time.Time:\n\t\tts := &timestamp.Timestamp{\n\t\t\tSeconds: int64(v.UnixNano() / int64(time.Second)),\n\t\t\tNanos: int32(v.UnixNano() % int64(time.Second)),\n\t\t}\n\t\treturn &api.Value{\n\t\t\tType: api.ValueType_TIMESTAMP,\n\t\t\tValue: &api.Value_TimestampValue{\n\t\t\t\tTimestampValue: ts,\n\t\t\t},\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "0462dca03d3c298e98fc3823f4f07139", "score": "0.42242286", "text": "func FromDecision(t *types.Decision) *shared.Decision {\n\tif t == nil {\n\t\treturn nil\n\t}\n\treturn &shared.Decision{\n\t\tDecisionType: FromDecisionType(t.DecisionType),\n\t\tScheduleActivityTaskDecisionAttributes: FromScheduleActivityTaskDecisionAttributes(t.ScheduleActivityTaskDecisionAttributes),\n\t\tStartTimerDecisionAttributes: FromStartTimerDecisionAttributes(t.StartTimerDecisionAttributes),\n\t\tCompleteWorkflowExecutionDecisionAttributes: FromCompleteWorkflowExecutionDecisionAttributes(t.CompleteWorkflowExecutionDecisionAttributes),\n\t\tFailWorkflowExecutionDecisionAttributes: FromFailWorkflowExecutionDecisionAttributes(t.FailWorkflowExecutionDecisionAttributes),\n\t\tRequestCancelActivityTaskDecisionAttributes: FromRequestCancelActivityTaskDecisionAttributes(t.RequestCancelActivityTaskDecisionAttributes),\n\t\tCancelTimerDecisionAttributes: FromCancelTimerDecisionAttributes(t.CancelTimerDecisionAttributes),\n\t\tCancelWorkflowExecutionDecisionAttributes: FromCancelWorkflowExecutionDecisionAttributes(t.CancelWorkflowExecutionDecisionAttributes),\n\t\tRequestCancelExternalWorkflowExecutionDecisionAttributes: FromRequestCancelExternalWorkflowExecutionDecisionAttributes(t.RequestCancelExternalWorkflowExecutionDecisionAttributes),\n\t\tRecordMarkerDecisionAttributes: FromRecordMarkerDecisionAttributes(t.RecordMarkerDecisionAttributes),\n\t\tContinueAsNewWorkflowExecutionDecisionAttributes: FromContinueAsNewWorkflowExecutionDecisionAttributes(t.ContinueAsNewWorkflowExecutionDecisionAttributes),\n\t\tStartChildWorkflowExecutionDecisionAttributes: FromStartChildWorkflowExecutionDecisionAttributes(t.StartChildWorkflowExecutionDecisionAttributes),\n\t\tSignalExternalWorkflowExecutionDecisionAttributes: FromSignalExternalWorkflowExecutionDecisionAttributes(t.SignalExternalWorkflowExecutionDecisionAttributes),\n\t\tUpsertWorkflowSearchAttributesDecisionAttributes: FromUpsertWorkflowSearchAttributesDecisionAttributes(t.UpsertWorkflowSearchAttributesDecisionAttributes),\n\t}\n}", "title": "" }, { "docid": "a8e428aacd004b10c8c6de2b61ee1637", "score": "0.42220882", "text": "func CreateDomainStateFromDiscriminatorValue(parseNode i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.ParseNode)(i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.Parsable, error) {\n return NewDomainState(), nil\n}", "title": "" }, { "docid": "c6dc7c607d1d1443a65e46ec7179dca3", "score": "0.42198372", "text": "func ToDecision(t *shared.Decision) *types.Decision {\n\tif t == nil {\n\t\treturn nil\n\t}\n\treturn &types.Decision{\n\t\tDecisionType: ToDecisionType(t.DecisionType),\n\t\tScheduleActivityTaskDecisionAttributes: ToScheduleActivityTaskDecisionAttributes(t.ScheduleActivityTaskDecisionAttributes),\n\t\tStartTimerDecisionAttributes: ToStartTimerDecisionAttributes(t.StartTimerDecisionAttributes),\n\t\tCompleteWorkflowExecutionDecisionAttributes: ToCompleteWorkflowExecutionDecisionAttributes(t.CompleteWorkflowExecutionDecisionAttributes),\n\t\tFailWorkflowExecutionDecisionAttributes: ToFailWorkflowExecutionDecisionAttributes(t.FailWorkflowExecutionDecisionAttributes),\n\t\tRequestCancelActivityTaskDecisionAttributes: ToRequestCancelActivityTaskDecisionAttributes(t.RequestCancelActivityTaskDecisionAttributes),\n\t\tCancelTimerDecisionAttributes: ToCancelTimerDecisionAttributes(t.CancelTimerDecisionAttributes),\n\t\tCancelWorkflowExecutionDecisionAttributes: ToCancelWorkflowExecutionDecisionAttributes(t.CancelWorkflowExecutionDecisionAttributes),\n\t\tRequestCancelExternalWorkflowExecutionDecisionAttributes: ToRequestCancelExternalWorkflowExecutionDecisionAttributes(t.RequestCancelExternalWorkflowExecutionDecisionAttributes),\n\t\tRecordMarkerDecisionAttributes: ToRecordMarkerDecisionAttributes(t.RecordMarkerDecisionAttributes),\n\t\tContinueAsNewWorkflowExecutionDecisionAttributes: ToContinueAsNewWorkflowExecutionDecisionAttributes(t.ContinueAsNewWorkflowExecutionDecisionAttributes),\n\t\tStartChildWorkflowExecutionDecisionAttributes: ToStartChildWorkflowExecutionDecisionAttributes(t.StartChildWorkflowExecutionDecisionAttributes),\n\t\tSignalExternalWorkflowExecutionDecisionAttributes: ToSignalExternalWorkflowExecutionDecisionAttributes(t.SignalExternalWorkflowExecutionDecisionAttributes),\n\t\tUpsertWorkflowSearchAttributesDecisionAttributes: ToUpsertWorkflowSearchAttributesDecisionAttributes(t.UpsertWorkflowSearchAttributesDecisionAttributes),\n\t}\n}", "title": "" }, { "docid": "2b4f5edf03aa5469f1ae489f9b4b0124", "score": "0.4214876", "text": "func enumValueGenerator(valuesFunc interface{}) func(*testing.T, *rand.Rand) thriftType {\n\tvfunc := reflect.ValueOf(valuesFunc)\n\ttyp := vfunc.Type().Out(0).Elem() // Foo_Values() []Foo -> Foo\n\treturn func(t *testing.T, rand *rand.Rand) thriftType {\n\t\tknownValues := vfunc.Call(nil)[0]\n\n\t\tvar giveV reflect.Value\n\t\t// Flip a coin to decide whether we're evaluating a known or\n\t\t// unknown value.\n\t\tif rand.Int()%2 == 0 && knownValues.Len() > 0 {\n\t\t\t// Pick a known value at random\n\t\t\tgiveV = knownValues.Index(rand.Intn(knownValues.Len()))\n\t\t} else {\n\t\t\t// give = MyEnum($randomValue)\n\t\t\tgiveV = reflect.New(typ).Elem()\n\t\t\tgiveV.Set(reflect.ValueOf(rand.Int31()).Convert(typ))\n\t\t}\n\n\t\treturn giveV.Addr().Interface().(thriftType)\n\t}\n}", "title": "" }, { "docid": "217a810586dd6e5e8c2ae245f20d86af", "score": "0.42064935", "text": "func MakeUnknown() Value { return unknownVal{} }", "title": "" }, { "docid": "20e147ecae6fceb14bbec36d2660e474", "score": "0.4185696", "text": "func CreateMessageSecurityStateFromDiscriminatorValue(parseNode i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.ParseNode)(i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.Parsable, error) {\n return NewMessageSecurityState(), nil\n}", "title": "" }, { "docid": "0bc067d835f30e6d94e602e9777d21b2", "score": "0.41768286", "text": "func RegistrationStatusTypePUnknownFutureValue() *RegistrationStatusType {\n\tv := RegistrationStatusTypeVUnknownFutureValue\n\treturn &v\n}", "title": "" }, { "docid": "a94efe8eb53b875c6b6cf7a974413728", "score": "0.41741374", "text": "func ProtocolEnumFromValue(value string) ProtocolEnum {\r\n switch value {\r\n case \"kNfs\":\r\n return Protocol_KNFS\r\n case \"kCifs2\":\r\n return Protocol_KCIFS2\r\n case \"kHttp\":\r\n return Protocol_KHTTP\r\n default:\r\n return Protocol_KNFS\r\n }\r\n}", "title": "" }, { "docid": "73a3e925966e83998567b923fb952146", "score": "0.41670328", "text": "func GetTypeOutcome(outcome []int) string {\n\tif outcome[0]+outcome[1]+outcome[2] <= 10 {\n\t\treturn SELECTION_XIU\n\t} else {\n\t\treturn SELECTION_TAI\n\t}\n}", "title": "" }, { "docid": "9d7dfd2f0d2c92d0d22ec3cda687ab84", "score": "0.4157401", "text": "func NewAllowedValue()(*AllowedValue) {\n m := &AllowedValue{\n Entity: *NewEntity(),\n }\n return m\n}", "title": "" }, { "docid": "560e7bc40697e9027db828ce7ac03ca4", "score": "0.41425315", "text": "func (e Strategy) Value() (driver.Value, error) {\n\tif !e.IsValid() {\n\t\treturn nil, t9e.G(\"invalid status\")\n\t}\n\treturn string(e), nil\n}", "title": "" }, { "docid": "7586e73d52aa5d365e0d135898e0d3e2", "score": "0.413997", "text": "func (m drgattachmentnetworkcreatedetails) ValidateEnumValue() (bool, error) {\n\terrMessage := []string{}\n\n\tif len(errMessage) > 0 {\n\t\treturn true, fmt.Errorf(strings.Join(errMessage, \"\\n\"))\n\t}\n\treturn false, nil\n}", "title": "" }, { "docid": "de1f2397a0f5e643e7c591c794fefc06", "score": "0.41374987", "text": "func (o EnterpriseCrmEventbusProtoConditionResponseOutput) Value() EnterpriseCrmEventbusProtoValueTypeResponseOutput {\n\treturn o.ApplyT(func(v EnterpriseCrmEventbusProtoConditionResponse) EnterpriseCrmEventbusProtoValueTypeResponse {\n\t\treturn v.Value\n\t}).(EnterpriseCrmEventbusProtoValueTypeResponseOutput)\n}", "title": "" }, { "docid": "260c61b47e7159121c7f31038f4a133a", "score": "0.4137164", "text": "func (s *BaseDart2Listener) ExitEnumType(ctx *EnumTypeContext) {}", "title": "" }, { "docid": "df5885f53f0e153494be46cd27d2a701", "score": "0.41350234", "text": "func newStatusCode() int {\n\tc, err := weightedrand.NewChooser(\n\t\tweightedrand.Choice{Item: http.StatusOK, Weight: 940},\n\t\tweightedrand.Choice{Item: http.StatusMovedPermanently, Weight: 10},\n\t\tweightedrand.Choice{Item: http.StatusInternalServerError, Weight: 5},\n\t\tweightedrand.Choice{Item: http.StatusServiceUnavailable, Weight: 5},\n\t\tweightedrand.Choice{Item: http.StatusNotFound, Weight: 40},\n\t\tweightedrand.Choice{Item: http.StatusBadRequest, Weight: 2},\n\t)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tstatusCode := c.Pick().(int)\n\treturn statusCode\n}", "title": "" }, { "docid": "125781e90968739bfa6b292afb112be4", "score": "0.41282487", "text": "func (m createfsucycledetails) ValidateEnumValue() (bool, error) {\n\terrMessage := []string{}\n\n\tif len(errMessage) > 0 {\n\t\treturn true, fmt.Errorf(strings.Join(errMessage, \"\\n\"))\n\t}\n\treturn false, nil\n}", "title": "" }, { "docid": "f1c8d0e182b8ad897149f691eb5e0cf1", "score": "0.4104347", "text": "func FromSignalExternalWorkflowExecutionDecisionAttributes(t *types.SignalExternalWorkflowExecutionDecisionAttributes) *shared.SignalExternalWorkflowExecutionDecisionAttributes {\n\tif t == nil {\n\t\treturn nil\n\t}\n\treturn &shared.SignalExternalWorkflowExecutionDecisionAttributes{\n\t\tDomain: &t.Domain,\n\t\tExecution: FromWorkflowExecution(t.Execution),\n\t\tSignalName: &t.SignalName,\n\t\tInput: t.Input,\n\t\tControl: t.Control,\n\t\tChildWorkflowOnly: &t.ChildWorkflowOnly,\n\t}\n}", "title": "" }, { "docid": "a6cc924c5fb75c5cf00efdc198824132", "score": "0.41020593", "text": "func (iotHub *IotHub_STATUS) ConvertStatusFrom(source genruntime.ConvertibleStatus) error {\n\tif source == iotHub {\n\t\treturn errors.New(\"attempted conversion between unrelated implementations of github.com/Azure/azure-service-operator/v2/pkg/genruntime/ConvertibleStatus\")\n\t}\n\n\treturn source.ConvertStatusTo(iotHub)\n}", "title": "" }, { "docid": "4cfb04ae2efd56f7548c52ad294e0b95", "score": "0.4093452", "text": "func (omc *OutcomeMeasurementCreate) SetOutcomeMeasurementValue(s string) *OutcomeMeasurementCreate {\n\tomc.mutation.SetOutcomeMeasurementValue(s)\n\treturn omc\n}", "title": "" }, { "docid": "8c9da3b8ddd43a17490ea8e8f0c4c361", "score": "0.40705422", "text": "func (e *EnumType) Value(name string) int64 { return e.toInt[name] }", "title": "" }, { "docid": "b1fc2069791066787dda7183810b56f6", "score": "0.40692273", "text": "func AlertStateListEnumFromValue(value string) AlertStateListEnum {\r\n switch value {\r\n case \"kOpen\":\r\n return AlertStateList_KOPEN\r\n case \"kResolved\":\r\n return AlertStateList_KRESOLVED\r\n case \"kAlertSuppressed\":\r\n return AlertStateList_KALERTSUPPRESSED\r\n default:\r\n return AlertStateList_KOPEN\r\n }\r\n}", "title": "" }, { "docid": "448c32b20bb9face47239d9b6d9843af", "score": "0.40591884", "text": "func MyEnumPtr(v MyEnum) *MyEnum {\n return &v\n}", "title": "" }, { "docid": "b2c7ee2464602e2b6e8e5be23f7d9c64", "score": "0.40580007", "text": "func (v *ChoiceValidator) GetValue() interface{} {\n\treturn v.Value\n}", "title": "" }, { "docid": "4a497357d28513da058344c09a0e3e75", "score": "0.405647", "text": "func NewState(name string) State {\n\tswitch name {\n\tcase StateStringOK:\n\t\treturn StateOK\n\tcase StateStringWarning:\n\t\treturn StateWarning\n\tcase StateStringCritical:\n\t\treturn StateCritical\n\tcase StateStringUnknown:\n\t\treturn StateUnknown\n\tdefault:\n\t\treturn StateNil\n\t}\n}", "title": "" }, { "docid": "9793caf18e6c2ba4ad84901a5dab4e08", "score": "0.40541503", "text": "func (m sourcedetails) ValidateEnumValue() (bool, error) {\n\terrMessage := []string{}\n\n\tif len(errMessage) > 0 {\n\t\treturn true, fmt.Errorf(strings.Join(errMessage, \"\\n\"))\n\t}\n\treturn false, nil\n}", "title": "" }, { "docid": "65f2f35b9de27b68b5cabc9231d5ba6f", "score": "0.40475738", "text": "func valueOf(v interface{}) Value {\n\tswitch v.(type) {\n\tcase *bool:\n\t\treturn (*boolValue)(v.(*bool))\n\tcase *int:\n\t\treturn (*intValue)(v.(*int))\n\tcase *uint:\n\t\treturn (*uintValue)(v.(*uint))\n\tcase *float64:\n\t\treturn (*floatValue)(v.(*float64))\n\tcase *string:\n\t\treturn (*stringValue)(v.(*string))\n\tcase *time.Duration:\n\t\treturn (*durationValue)(v.(*time.Duration))\n\tcase *[]string:\n\t\treturn (*stringsValue)(v.(*[]string))\n\tcase Value:\n\t\treturn v.(Value)\n\tdefault:\n\t\tpanic(fmt.Errorf(\"cannot convert %#v to a Value\", v))\n\t}\n}", "title": "" }, { "docid": "c4426474c840727c53c1efb0aad9d4e7", "score": "0.40468752", "text": "func (E_SrlNokiaNetworkInstance_NetworkInstance_Protocols_Bgp_Ipv4Unicast_Convergence_ConvergenceState) IsYANGGoEnum() {}", "title": "" }, { "docid": "bff5cebff2cc7f5c4d8faee13cc0d2f5", "score": "0.4040551", "text": "func (t *PostOpLevel) FromStringValue(s string) error {\n\tswitch strings.ToLower(s) {\n\t//nolint:goconst // This 'false' and other 'false's aren't the same.\n\tcase \"off\", \"false\":\n\t\t*t = OpLevelOff\n\tcase \"required\", \"true\":\n\t\t*t = OpLevelRequired\n\tcase \"optional\":\n\t\t*t = OpLevelOptional\n\tdefault:\n\t\treturn errors.Errorf(\"invalid op level '%s', please choose valid option between ['off', 'optional', 'required']\", s)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "82721d18f668a32096b7304026b9210a", "score": "0.40383834", "text": "func AlertStateListEnumToValue(alertStateListEnum AlertStateListEnum) string {\r\n switch alertStateListEnum {\r\n case AlertStateList_KOPEN:\r\n \t\treturn \"kOpen\"\t\t\r\n case AlertStateList_KRESOLVED:\r\n \t\treturn \"kResolved\"\t\t\r\n case AlertStateList_KALERTSUPPRESSED:\r\n \t\treturn \"kAlertSuppressed\"\t\t\r\n default:\r\n \treturn \"kOpen\"\r\n }\r\n}", "title": "" }, { "docid": "fc2c591abd8a9840fbdf5a1b8f55beef", "score": "0.403231", "text": "func (s *Basetptp_v7_0_0_0Listener) EnterStatus_value(ctx *Status_valueContext) {}", "title": "" }, { "docid": "84f08ff3d26c984c6f17775d1991f61c", "score": "0.4030294", "text": "func (b *basePositiveInteger) Value() interface{} {\n\tswitch {\n\tcase b.V > math.MaxUint32:\n\t\treturn b.V\n\tcase b.V > math.MaxUint16:\n\t\treturn uint32(b.V)\n\tcase b.V > math.MaxUint8:\n\t\treturn uint16(b.V)\n\tdefault:\n\t\treturn uint8(b.V)\n\t}\n}", "title": "" }, { "docid": "361394965d8fbb7127ed70c283de66a2", "score": "0.40216485", "text": "func PrivilegesTypeEnumFromValue(value string) PrivilegesTypeEnum {\r\n switch value {\r\n case \"kNone\":\r\n return PrivilegesType_KNONE\r\n case \"kAll\":\r\n return PrivilegesType_KALL\r\n case \"kSpecific\":\r\n return PrivilegesType_KSPECIFIC\r\n default:\r\n return PrivilegesType_KNONE\r\n }\r\n}", "title": "" }, { "docid": "710fcdf087303b0211bf8e96b953548b", "score": "0.4003145", "text": "func (m SourceVcnIdCondition) ValidateEnumValue() (bool, error) {\n\terrMessage := []string{}\n\n\tif len(errMessage) > 0 {\n\t\treturn true, fmt.Errorf(strings.Join(errMessage, \"\\n\"))\n\t}\n\treturn false, nil\n}", "title": "" }, { "docid": "f6cd3bf602aaccf83768a1fa03088ad1", "score": "0.40011376", "text": "func FromQueryRejectCondition(t *types.QueryRejectCondition) *shared.QueryRejectCondition {\n\tif t == nil {\n\t\treturn nil\n\t}\n\tswitch *t {\n\tcase types.QueryRejectConditionNotOpen:\n\t\tv := shared.QueryRejectConditionNotOpen\n\t\treturn &v\n\tcase types.QueryRejectConditionNotCompletedCleanly:\n\t\tv := shared.QueryRejectConditionNotCompletedCleanly\n\t\treturn &v\n\t}\n\tpanic(\"unexpected enum value\")\n}", "title": "" }, { "docid": "2e592942d2838f6073bfbace1cc4d4cf", "score": "0.3995934", "text": "func FromParentClosePolicy(t *types.ParentClosePolicy) *shared.ParentClosePolicy {\n\tif t == nil {\n\t\treturn nil\n\t}\n\tswitch *t {\n\tcase types.ParentClosePolicyAbandon:\n\t\tv := shared.ParentClosePolicyAbandon\n\t\treturn &v\n\tcase types.ParentClosePolicyRequestCancel:\n\t\tv := shared.ParentClosePolicyRequestCancel\n\t\treturn &v\n\tcase types.ParentClosePolicyTerminate:\n\t\tv := shared.ParentClosePolicyTerminate\n\t\treturn &v\n\t}\n\tpanic(\"unexpected enum value\")\n}", "title": "" }, { "docid": "ddda456d2ea029fab9cca7d66b4e01b7", "score": "0.3995728", "text": "func (s Status) Value() (driver.Value, error) {\n\treturn int(s), nil\n}", "title": "" }, { "docid": "1c1d6db970cc3c6a0cdb9443529758dd", "score": "0.39941615", "text": "func CreateAllowedValueFromDiscriminatorValue(parseNode i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.ParseNode)(i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.Parsable, error) {\n return NewAllowedValue(), nil\n}", "title": "" }, { "docid": "37ec313b9b8d50c05619f2f90ba97be5", "score": "0.39866576", "text": "func NewValue(val interface{}) Value {\n\tif val == nil {\n\t\treturn NULL_VALUE\n\t}\n\n\tswitch val := val.(type) {\n\tcase Value:\n\t\treturn val\n\tcase float64:\n\t\treturn floatValue(val)\n\tcase string:\n\t\treturn stringValue(val)\n\tcase bool:\n\t\treturn boolValue(val)\n\tcase nil:\n\t\treturn NULL_VALUE\n\tcase []byte:\n\t\treturn newValueFromBytes(val)\n\tcase []interface{}:\n\t\treturn sliceValue(val)\n\tcase map[string]interface{}:\n\t\treturn objectValue(val)\n\tcase int:\n\t\treturn floatValue(val)\n\tcase []Value:\n\t\trv := make([]interface{}, len(val))\n\t\tfor i, v := range val {\n\t\t\trv[i] = v\n\t\t}\n\t\treturn sliceValue(rv)\n\tcase []AnnotatedValue:\n\t\trv := make([]interface{}, len(val))\n\t\tfor i, v := range val {\n\t\t\trv[i] = v\n\t\t}\n\t\treturn sliceValue(rv)\n\tdefault:\n\t\tfor _, c := range _CONVERSIONS {\n\t\t\tif reflect.TypeOf(val).ConvertibleTo(c) {\n\t\t\t\treturn NewValue(reflect.ValueOf(val).Convert(c).Interface())\n\t\t\t}\n\t\t}\n\n\t\tpanic(fmt.Sprintf(\"Cannot create value for type %T.\", val))\n\t}\n}", "title": "" }, { "docid": "6f6915b5e3d527d98eeca182f3cb97ca", "score": "0.3983989", "text": "func CreateDeviceCompliancePolicyFromDiscriminatorValue(parseNode i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.ParseNode)(i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.Parsable, error) {\n if parseNode != nil {\n mappingValueNode, err := parseNode.GetChildNode(\"@odata.type\")\n if err != nil {\n return nil, err\n }\n if mappingValueNode != nil {\n mappingValue, err := mappingValueNode.GetStringValue()\n if err != nil {\n return nil, err\n }\n if mappingValue != nil {\n switch *mappingValue {\n case \"#microsoft.graph.androidCompliancePolicy\":\n return NewAndroidCompliancePolicy(), nil\n case \"#microsoft.graph.androidWorkProfileCompliancePolicy\":\n return NewAndroidWorkProfileCompliancePolicy(), nil\n case \"#microsoft.graph.iosCompliancePolicy\":\n return NewIosCompliancePolicy(), nil\n case \"#microsoft.graph.macOSCompliancePolicy\":\n return NewMacOSCompliancePolicy(), nil\n case \"#microsoft.graph.windows10CompliancePolicy\":\n return NewWindows10CompliancePolicy(), nil\n case \"#microsoft.graph.windows10MobileCompliancePolicy\":\n return NewWindows10MobileCompliancePolicy(), nil\n case \"#microsoft.graph.windows81CompliancePolicy\":\n return NewWindows81CompliancePolicy(), nil\n case \"#microsoft.graph.windowsPhone81CompliancePolicy\":\n return NewWindowsPhone81CompliancePolicy(), nil\n }\n }\n }\n }\n return NewDeviceCompliancePolicy(), nil\n}", "title": "" }, { "docid": "24319f47bf0c26391b06b6f1a14cf89c", "score": "0.39791384", "text": "func (o *UMGroupPreferenceAllOf) GetValueOk() (*string, bool) {\n\tif o == nil || o.Value == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Value, true\n}", "title": "" }, { "docid": "167109fee7535433ff11e89e398a114a", "score": "0.3978945", "text": "func CreateIosCompliancePolicyFromDiscriminatorValue(parseNode i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.ParseNode)(i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.Parsable, error) {\n return NewIosCompliancePolicy(), nil\n}", "title": "" }, { "docid": "6885bd5c353df712da715c1f7ae5960c", "score": "0.3972992", "text": "func NewRiskCheckBehaviorBotDetectedLabelFromValue(v string) (*RiskCheckBehaviorBotDetectedLabel, error) {\n\tev := RiskCheckBehaviorBotDetectedLabel(v)\n\n\n\treturn &ev, nil\n}", "title": "" }, { "docid": "c4417358a617d4a3c191400bf4b49233", "score": "0.39667884", "text": "func (m TargetSummary) ValidateEnumValue() (bool, error) {\n\terrMessage := []string{}\n\n\tif _, ok := GetMappingTargetSummaryStatusEnum(string(m.Status)); !ok && m.Status != \"\" {\n\t\terrMessage = append(errMessage, fmt.Sprintf(\"unsupported enum value for Status: %s. Supported values are: %s.\", m.Status, strings.Join(GetTargetSummaryStatusEnumStringValues(), \",\")))\n\t}\n\tif len(errMessage) > 0 {\n\t\treturn true, fmt.Errorf(strings.Join(errMessage, \"\\n\"))\n\t}\n\treturn false, nil\n}", "title": "" }, { "docid": "466300696fb318ff1b5757f5ec409ea9", "score": "0.3965636", "text": "func (u *UnknownTLV) Value() interface{} {\n\treturn u\n}", "title": "" }, { "docid": "c647ac3ac5993ff6f2e78d8f400d4f1e", "score": "0.39656228", "text": "func PossibleSignalTypeValues() []SignalType {\n\treturn []SignalType{\n\t\tSignalTypeLog,\n\t\tSignalTypeMetric,\n\t\tSignalTypeUnknown,\n\t}\n}", "title": "" }, { "docid": "2a1d7a4286792261140080c84c561800", "score": "0.39644313", "text": "func UnitsEnumFromValue(value string) UnitsEnum {\n switch value {\n case \"pounds\":\n return Units_POUNDS\n default:\n return Units_POUNDS\n }\n}", "title": "" }, { "docid": "67a120f51a416953da42afc073f470b0", "score": "0.39542148", "text": "func (oouo *OutcomeOverviewUpdateOne) AddOutcomeOverviewValue(f float64) *OutcomeOverviewUpdateOne {\n\toouo.mutation.AddOutcomeOverviewValue(f)\n\treturn oouo\n}", "title": "" }, { "docid": "6e6f144b2f22c915c3f8bac28d3448e9", "score": "0.39523423", "text": "func (m AlarmHistoryEntry) ValidateEnumValue() (bool, error) {\n\terrMessage := []string{}\n\n\tif len(errMessage) > 0 {\n\t\treturn true, fmt.Errorf(strings.Join(errMessage, \"\\n\"))\n\t}\n\treturn false, nil\n}", "title": "" }, { "docid": "bb95b599a122b475603161df97206426", "score": "0.3950415", "text": "func (jbobject *ServicesEc2ModelCancelSpotInstanceRequestState) ValueOf(a string) *ServicesEc2ModelCancelSpotInstanceRequestState {\n\tconv_a := javabind.NewGoToJavaString()\n\tif err := conv_a.Convert(a); err != nil {\n\t\tpanic(err)\n\t}\n\tjret, err := javabind.GetEnv().CallStaticMethod(\"com/amazonaws/services/ec2/model/CancelSpotInstanceRequestState\", \"valueOf\", \"com/amazonaws/services/ec2/model/CancelSpotInstanceRequestState\", conv_a.Value().Cast(\"java/lang/String\"))\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tconv_a.CleanUp()\n\tretconv := javabind.NewJavaToGoCallable()\n\tdst := &javabind.Callable{}\n\tretconv.Dest(dst)\n\tif err := retconv.Convert(javabind.ObjectRef(jret)); err != nil {\n\t\tpanic(err)\n\t}\n\tretconv.CleanUp()\n\tunique_x := &ServicesEc2ModelCancelSpotInstanceRequestState{}\n\tunique_x.Callable = dst\n\treturn unique_x\n}", "title": "" }, { "docid": "fe42f2fde9363d861cb99609ae6c9626", "score": "0.39411357", "text": "func (m GenerateKeyDetails) ValidateEnumValue() (bool, error) {\n\terrMessage := []string{}\n\n\tif len(errMessage) > 0 {\n\t\treturn true, fmt.Errorf(strings.Join(errMessage, \"\\n\"))\n\t}\n\treturn false, nil\n}", "title": "" }, { "docid": "2dec859faaeee9ab06036482d854719c", "score": "0.39347535", "text": "func NewIncomeVerificationSourceTypeFromValue(v string) (*IncomeVerificationSourceType, error) {\n\tev := IncomeVerificationSourceType(v)\n\n\n\treturn &ev, nil\n}", "title": "" }, { "docid": "a8ad2f94c96af55363d23ea1ab7f870a", "score": "0.39330095", "text": "func Type2EnumFromValue(value string) Type2Enum {\r\n switch value {\r\n case \"kSubscription\":\r\n return Type2_KSUBSCRIPTION\r\n case \"kResourceGroup\":\r\n return Type2_KRESOURCEGROUP\r\n case \"kVirtualMachine\":\r\n return Type2_KVIRTUALMACHINE\r\n case \"kStorageAccount\":\r\n return Type2_KSTORAGEACCOUNT\r\n case \"kStorageKey\":\r\n return Type2_KSTORAGEKEY\r\n case \"kStorageContainer\":\r\n return Type2_KSTORAGECONTAINER\r\n case \"kStorageBlob\":\r\n return Type2_KSTORAGEBLOB\r\n case \"kStorageResourceGroup\":\r\n return Type2_KSTORAGERESOURCEGROUP\r\n case \"kNetworkSecurityGroup\":\r\n return Type2_KNETWORKSECURITYGROUP\r\n case \"kVirtualNetwork\":\r\n return Type2_KVIRTUALNETWORK\r\n case \"kNetworkResourceGroup\":\r\n return Type2_KNETWORKRESOURCEGROUP\r\n case \"kSubnet\":\r\n return Type2_KSUBNET\r\n case \"kComputeOptions\":\r\n return Type2_KCOMPUTEOPTIONS\r\n default:\r\n return Type2_KSUBSCRIPTION\r\n }\r\n}", "title": "" }, { "docid": "35d071bfeb4c854598dedb75973138c3", "score": "0.39324552", "text": "func PrivilegesTypeEnumToValue(privilegesTypeEnum PrivilegesTypeEnum) string {\r\n switch privilegesTypeEnum {\r\n case PrivilegesType_KNONE:\r\n \t\treturn \"kNone\"\t\t\r\n case PrivilegesType_KALL:\r\n \t\treturn \"kAll\"\t\t\r\n case PrivilegesType_KSPECIFIC:\r\n \t\treturn \"kSpecific\"\t\t\r\n default:\r\n \treturn \"kNone\"\r\n }\r\n}", "title": "" }, { "docid": "631473ad1218e7caf3304e18abb77b8e", "score": "0.39278087", "text": "func ValueOf(v interface{}) Value {\n\treturn Value{v}\n}", "title": "" }, { "docid": "6175d5a2ad0e08240efe28e6afec7994", "score": "0.39243084", "text": "func (s *Basetptp_v7_0_0_0Listener) ExitStatus_value(ctx *Status_valueContext) {}", "title": "" }, { "docid": "2b5df37c4bbda460cf3b369ce0111e0d", "score": "0.3922801", "text": "func FulfillmentTypeEnumFromValue(value string) FulfillmentTypeEnum {\n switch value {\n case \"Enum_Will_Call\":\n return FulfillmentType_ENUM_WILL_CALL\n case \"Enum_DTCDirect_Ship\":\n return FulfillmentType_ENUM_DTCDIRECT_SHIP\n case \"Enum_DTCTemp_Control\":\n return FulfillmentType_ENUM_DTCTEMP_CONTROL\n case \"Enum_3Tier\":\n return FulfillmentType_ENUM_3TIER\n case \"DTT\":\n return FulfillmentType_DTT\n case \"Transfer\":\n return FulfillmentType_TRANSFER\n default:\n return FulfillmentType_ENUM_WILL CALL\n }\n}", "title": "" }, { "docid": "788b97ee6c3e674657ecd5b472d41d8f", "score": "0.3922057", "text": "func (dlr DLRStatus) Value() (driver.Value, error) {\n\treturn int(dlr), nil\n}", "title": "" }, { "docid": "b8fec196cf6b12169413eb9942985de7", "score": "0.39216962", "text": "func (this StatsIceCandidatePairState) Value() string {\n\tidx := int(this)\n\tif idx >= 0 && idx < len(rTCStatsIceCandidatePairStateToWasmTable) {\n\t\treturn rTCStatsIceCandidatePairStateToWasmTable[idx]\n\t}\n\tpanic(\"unknown input value\")\n}", "title": "" }, { "docid": "3ca19f85ccf7f8fa124d1a69a4299a01", "score": "0.3921531", "text": "func (this PermissionState) Value() string {\n\tidx := int(this)\n\tif idx >= 0 && idx < len(permissionStateToWasmTable) {\n\t\treturn permissionStateToWasmTable[idx]\n\t}\n\tpanic(\"unknown input value\")\n}", "title": "" }, { "docid": "69478701a2237e52f5f2a7d1f863f5db", "score": "0.39211175", "text": "func FulfillmentTypeEnumToValue(fulfillmentTypeEnum FulfillmentTypeEnum) string {\n switch fulfillmentTypeEnum {\n case FulfillmentType_ENUM_WILL_CALL:\n \t\treturn \"Enum_Will Call\"\t\t\n case FulfillmentType_ENUM_DTCDIRECT_SHIP:\n \t\treturn \"Enum_DTCDirect Ship\"\t\t\n case FulfillmentType_ENUM_DTCTEMP_CONTROL:\n \t\treturn \"Enum_DTCTemp Control\"\t\t\n case FulfillmentType_ENUM_3TIER:\n \t\treturn \"Enum_3Tier\"\t\t\n case FulfillmentType_DTT:\n \t\treturn \"DTT\"\t\t\n case FulfillmentType_TRANSFER:\n \t\treturn \"Transfer\"\t\t\n default:\n \treturn \"Enum_Will Call\"\n }\n}", "title": "" }, { "docid": "9766de4dfeb402794df9bd45cd42ffec", "score": "0.39180303", "text": "func (FraudDetectionDecision) Values() []FraudDetectionDecision {\n\treturn []FraudDetectionDecision{\n\t\t\"HIGH_RISK\",\n\t\t\"LOW_RISK\",\n\t\t\"NOT_ENOUGH_SPEECH\",\n\t}\n}", "title": "" }, { "docid": "477e68744efaa80733c954e5cfa6f4c5", "score": "0.391528", "text": "func ToArchivalStatus(t *shared.ArchivalStatus) *types.ArchivalStatus {\n\tif t == nil {\n\t\treturn nil\n\t}\n\tswitch *t {\n\tcase shared.ArchivalStatusDisabled:\n\t\tv := types.ArchivalStatusDisabled\n\t\treturn &v\n\tcase shared.ArchivalStatusEnabled:\n\t\tv := types.ArchivalStatusEnabled\n\t\treturn &v\n\t}\n\tpanic(\"unexpected enum value\")\n}", "title": "" }, { "docid": "4d08017e07e91d04b08b4f53116159f8", "score": "0.3911109", "text": "func NewInvalid(ctx context.Context, msg string) *rpc.Status {\n\treturn &rpc.Status{\n\t\tCode: rpc.Code_CODE_INVALID_ARGUMENT,\n\t\tMessage: msg,\n\t\tTrace: getTrace(ctx),\n\t}\n}", "title": "" }, { "docid": "4e7dfaf9e6997a45da43f5c8dc1fceeb", "score": "0.3906272", "text": "func (E_SrlNokiaQos_DropProbability) IsYANGGoEnum() {}", "title": "" }, { "docid": "61c79bec4b361755436d7f3a14819f1d", "score": "0.3901637", "text": "func NewInvalid(ctx context.Context, msg string) *rpc.Status {\n\tlog := appctx.GetLogger(ctx).With().CallerWithSkipFrameCount(3).Logger()\n\tlog.Warn().Msg(msg)\n\treturn &rpc.Status{\n\t\tCode: rpc.Code_CODE_INVALID_ARGUMENT,\n\t\tMessage: msg,\n\t\tTrace: getTrace(ctx),\n\t}\n}", "title": "" }, { "docid": "1cc8e3e6e6a85cd0112597d7b595da61", "score": "0.39010766", "text": "func DayCountEnumFromValue(value string) DayCountEnum {\r\n switch value {\r\n case \"kFirst\":\r\n return DayCount_KFIRST\r\n case \"kSecond\":\r\n return DayCount_KSECOND\r\n case \"kThird\":\r\n return DayCount_KTHIRD\r\n case \"kFourth\":\r\n return DayCount_KFOURTH\r\n case \"kLast\":\r\n return DayCount_KLAST\r\n default:\r\n return DayCount_KFIRST\r\n }\r\n}", "title": "" }, { "docid": "b76bf03c72e73b2c582f4c903bbbf0e6", "score": "0.3886912", "text": "func (this QualityLimitationReason) Value() string {\n\tidx := int(this)\n\tif idx >= 0 && idx < len(rTCQualityLimitationReasonToWasmTable) {\n\t\treturn rTCQualityLimitationReasonToWasmTable[idx]\n\t}\n\tpanic(\"unknown input value\")\n}", "title": "" }, { "docid": "7942e6e0467358a797cb8e81c371f2b1", "score": "0.3885859", "text": "func FromArchivalStatus(t *types.ArchivalStatus) *shared.ArchivalStatus {\n\tif t == nil {\n\t\treturn nil\n\t}\n\tswitch *t {\n\tcase types.ArchivalStatusDisabled:\n\t\tv := shared.ArchivalStatusDisabled\n\t\treturn &v\n\tcase types.ArchivalStatusEnabled:\n\t\tv := shared.ArchivalStatusEnabled\n\t\treturn &v\n\t}\n\tpanic(\"unexpected enum value\")\n}", "title": "" }, { "docid": "494fbcd5ab364886ac8b6bdf76b405e2", "score": "0.388562", "text": "func (E_SrlNokiaQos_EcnDropProbability) IsYANGGoEnum() {}", "title": "" }, { "docid": "a930bb548a6d960834a3f620c5545fe6", "score": "0.3883506", "text": "func (e InventoryState) Value() (driver.Value, error) {\n\tif !e.IsValid() {\n\t\treturn nil, t9e.G(\"invalid status\")\n\t}\n\treturn string(e), nil\n}", "title": "" }, { "docid": "f95f0eceef79720b70794f28ed01aff2", "score": "0.388256", "text": "func NewDeviceManagementConfigurationChoiceSettingValue()(*DeviceManagementConfigurationChoiceSettingValue) {\n m := &DeviceManagementConfigurationChoiceSettingValue{\n DeviceManagementConfigurationSettingValue: *NewDeviceManagementConfigurationSettingValue(),\n }\n odataTypeValue := \"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue\"\n m.SetOdataType(&odataTypeValue)\n return m\n}", "title": "" } ]
c8dbfaf17dc5ef46f1d5291278567c75
WithSignature returns a new transaction with the given signature. This signature needs to be formatted as described in the yellow paper (v+27).
[ { "docid": "ee0a278ca6206e68c187b215843ac02a", "score": "0.7817775", "text": "func (tx *Transaction) WithSignature(signer STDSigner, sig []byte) (*Transaction, error) {\n\tr, s, v, err := signer.SignatureValues(sig)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tcpy := &Transaction{data: tx.data}\n\tcpy.data.R, cpy.data.S, cpy.data.V = r, s, v\n\treturn cpy, nil\n}", "title": "" } ]
[ { "docid": "cee20dbb4101d510790de83e33783f8f", "score": "0.82924885", "text": "func (t *Transaction) WithSignature(sig []byte) *Transaction {\n\tnewTx := Transaction{\n\t\tbody: t.body,\n\t}\n\t// copy sig\n\tnewTx.body.Signature = append([]byte(nil), sig...)\n\treturn &newTx\n}", "title": "" }, { "docid": "43fbe89f1575cf18ffabff8d19542900", "score": "0.78833604", "text": "func (tx *Transaction) WithSignature(signer types.STDSigner, sig []byte) (*Transaction, error) {\n\tr, s, v, err := signer.SignatureValues(sig)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tcpy := &Transaction{data: tx.data}\n\tcpy.data.R, cpy.data.S, cpy.data.V = r, s, v\n\treturn cpy, nil\n}", "title": "" }, { "docid": "135e3d1f33ed3c3f3318ad47aa417d01", "score": "0.78800935", "text": "func (hs HomesteadSigner) WithSignature(tx *Transaction, sig []byte) (*Transaction, error) {\n\tif len(sig) != 65 {\n\t\tpanic(fmt.Sprintf(\"wrong size for snature: got %d, want 65\", len(sig)))\n\t}\n\tcpy := &Transaction{data: tx.data}\n\tcpy.data.R = new(big.Int).SetBytes(sig[:32])\n\tcpy.data.S = new(big.Int).SetBytes(sig[32:64])\n\tcpy.data.V = new(big.Int).SetBytes([]byte{sig[64] + 27})\n\treturn cpy, nil\n}", "title": "" }, { "docid": "9d295bf465a1667f8d5809371e920ebb", "score": "0.7799997", "text": "func (tx *Transaction) WithSignature(sig *crypto.Signature) {\n\tvar err error\n\ttx.Header.Signature, err = sig.MarshalText()\n\tif err != nil {\n\t\ttx.Header.Signature = nil\n\t\tlog.Errorf(\"Append withSignature err: %+v\", err)\n\t}\n}", "title": "" }, { "docid": "0bcf83de52cc870223cd97d2a7ebbb16", "score": "0.7788581", "text": "func (fs FrontierSigner) WithSignature(tx *Transaction, sig []byte) (*Transaction, error) {\n\tif len(sig) != 65 {\n\t\tpanic(fmt.Sprintf(\"wrong size for snature: got %d, want 65\", len(sig)))\n\t}\n\tcpy := &Transaction{data: tx.data}\n\tcpy.data.R = new(big.Int).SetBytes(sig[:32])\n\tcpy.data.S = new(big.Int).SetBytes(sig[32:64])\n\tcpy.data.V = new(big.Int).SetBytes([]byte{sig[64] + 27})\n\treturn cpy, nil\n}", "title": "" }, { "docid": "5e0926b63706d297d94a76e30ae56aec", "score": "0.7610289", "text": "func (t *Transaction) Signature(signature string) *Transaction {\n\tt.signature = signature\n\treturn t\n}", "title": "" }, { "docid": "8f563b0fc68ef61f808471bd3cc9de7e", "score": "0.73145664", "text": "func (s EIP155Signer) WithSignature(tx *Transaction, sig []byte) (*Transaction, error) {\n\tif len(sig) != 65 {\n\t\tpanic(fmt.Sprintf(\"wrong size for signature: got %d, want 65\", len(sig)))\n\t}\n\n\tcpy := &Transaction{data: tx.data}\n\tcpy.data.R = new(big.Int).SetBytes(sig[:32])\n\tcpy.data.S = new(big.Int).SetBytes(sig[32:64])\n\tcpy.data.V = new(big.Int).SetBytes([]byte{sig[64]})\n\tif s.chainId.BitLen() > 0 {\n\t\tcpy.data.V = big.NewInt(int64(sig[64] + 35))\n\t\tcpy.data.V.Add(cpy.data.V, s.chainIdMul)\n\t}\n\treturn cpy, nil\n}", "title": "" }, { "docid": "1625ff81b5897fb6b1a7079247371464", "score": "0.6712791", "text": "func (header *Header) WithSignature(sig []byte) (*Header, error) {\n\tif len(sig) != 65 {\n\t\tpanic(fmt.Sprint(\"wrong size for signature: got %d, want 65\", len(sig)))\n\t}\n\tr := new(big.Int).SetBytes(sig[:32])\n\ts := new(big.Int).SetBytes(sig[32:64])\n\tv := new(big.Int).SetBytes([]byte{sig[64]})\n\tcpy := CopyHeader(header)\n\tcpy.R, cpy.S, cpy.V = r, s, v\n\treturn cpy, nil\n}", "title": "" }, { "docid": "acadc27eca5cb057df983032456d9e8f", "score": "0.6593145", "text": "func Signature(multisigAccount, txHash string) base.SignatureT {\n\tvar compressedAccount string\n\tif len(multisigAccount) != 0 {\n\t\tcompressedAccount = strings.ToUpper(strings.Replace(multisigAccount, \"-\", \"\", -1))\n\t}\n\n\treturn base.SignatureT{\n\t\tOtherHash: struct{ Data string }{Data: txHash},\n\t\tOtherAccount: compressedAccount,\n\t}\n}", "title": "" }, { "docid": "1aae183c28fea0fd3d9cdf0ed0c98900", "score": "0.6570315", "text": "func WithSignature(sig []byte) (*big.Int, *big.Int, *big.Int, error) {\r\n\treturn SignatureValues(sig)\r\n}", "title": "" }, { "docid": "a054ddb1dac35b5287a31d3e05c9feca", "score": "0.6566403", "text": "func (build *signedTransactionsBuilder) WithSignature(sig users.Signature) aggregated.SignedTransactionsBuilder {\n\tbuild.sig = sig\n\treturn build\n}", "title": "" }, { "docid": "5cd011528aca107030303d8a20f05e0b", "score": "0.6367861", "text": "func NewSignature(pkg *types.Package, sig *types.Signature) *Signature {\n\ts := &Signature{\n\t\tpkg: pkg,\n\t\tsig: sig,\n\t}\n\ts.init()\n\treturn s\n}", "title": "" }, { "docid": "5655a63f30477f07142b900978fc8b04", "score": "0.6268609", "text": "func (transaction *TokenDeleteTransaction) AddSignature(publicKey PublicKey, signature []byte) *TokenDeleteTransaction {\n\ttransaction._RequireOneNodeAccountID()\n\n\tif transaction._KeyAlreadySigned(publicKey) {\n\t\treturn transaction\n\t}\n\n\tif transaction.signedTransactions._Length() == 0 {\n\t\treturn transaction\n\t}\n\n\ttransaction.transactions = _NewLockableSlice()\n\ttransaction.publicKeys = append(transaction.publicKeys, publicKey)\n\ttransaction.transactionSigners = append(transaction.transactionSigners, nil)\n\ttransaction.transactionIDs.locked = true\n\n\tfor index := 0; index < transaction.signedTransactions._Length(); index++ {\n\t\tvar temp *services.SignedTransaction\n\t\tswitch t := transaction.signedTransactions._Get(index).(type) { //nolint\n\t\tcase *services.SignedTransaction:\n\t\t\ttemp = t\n\t\t}\n\t\ttemp.SigMap.SigPair = append(\n\t\t\ttemp.SigMap.SigPair,\n\t\t\tpublicKey._ToSignaturePairProtobuf(signature),\n\t\t)\n\t\ttransaction.signedTransactions._Set(index, temp)\n\t}\n\n\treturn transaction\n}", "title": "" }, { "docid": "112837934dea4b3241555e978e92b477", "score": "0.6264559", "text": "func (transaction *Transaction) AddSignature(sign *crypto.Signature) {\n\n\tsigs := transaction.GetSignatures()\n\ttransaction.Signatures = append(sigs, sign)\n}", "title": "" }, { "docid": "cfdf4d460828a02ba2cef8e05bf3e69c", "score": "0.62452954", "text": "func withSignature(ctx context.Context, id string) context.Context {\n\treturn context.WithValue(ctx, signatureKey, id)\n}", "title": "" }, { "docid": "2770e2c229733084a6b0f988ca108ef8", "score": "0.6224981", "text": "func NewSignature(name string) Signature {\n\treturn Signature{\n\t\tName: name,\n\t\tCreatedAt: time.Now(),\n\t}\n}", "title": "" }, { "docid": "8e720e7d868c8479e2a5fa1a5390947c", "score": "0.6177124", "text": "func (transaction *FreezeTransaction) AddSignature(publicKey PublicKey, signature []byte) *FreezeTransaction {\n\ttransaction._RequireOneNodeAccountID()\n\n\tif transaction._KeyAlreadySigned(publicKey) {\n\t\treturn transaction\n\t}\n\n\tif transaction.signedTransactions._Length() == 0 {\n\t\treturn transaction\n\t}\n\n\ttransaction.transactions = _NewLockableSlice()\n\ttransaction.publicKeys = append(transaction.publicKeys, publicKey)\n\ttransaction.transactionSigners = append(transaction.transactionSigners, nil)\n\ttransaction.transactionIDs.locked = true\n\n\tfor index := 0; index < transaction.signedTransactions._Length(); index++ {\n\t\tvar temp *services.SignedTransaction\n\t\tswitch t := transaction.signedTransactions._Get(index).(type) { //nolint\n\t\tcase *services.SignedTransaction:\n\t\t\ttemp = t\n\t\t}\n\t\ttemp.SigMap.SigPair = append(\n\t\t\ttemp.SigMap.SigPair,\n\t\t\tpublicKey._ToSignaturePairProtobuf(signature),\n\t\t)\n\t\ttransaction.signedTransactions._Set(index, temp)\n\t}\n\n\treturn transaction\n}", "title": "" }, { "docid": "cebaac8b0337f48348a3afa456be8d3f", "score": "0.61646634", "text": "func AppendSignature(transactionSigned xdr.TransactionEnvelope, txeB *b.TransactionEnvelopeBuilder) error {\n\tif len(transactionSigned.Signatures) == 0 {\n\t\treturn errors.New(\"transactionEnvelop unsigned\")\n\t}\n\ttxeB.E.Signatures = append(txeB.E.Signatures, transactionSigned.Signatures[len(transactionSigned.Signatures)-1])\n\treturn nil\n}", "title": "" }, { "docid": "784d7d33f52804702408e6bf0b9081e2", "score": "0.6162808", "text": "func (tx *Transaction) AsSignaturePayload() Transaction {\n\tvar ins []TxInput\n\tvar outs []TxOutput\n\tfor _, i := range tx.Vin {\n\t\tins = append(ins, TxInput{i.Txid, i.Vout, nil, nil})\n\t}\n\tfor _, o := range tx.Vout {\n\t\touts = append(outs, TxOutput{o.Value, o.PubKeyHash})\n\t}\n\treturn Transaction{tx.ID, ins, outs}\n}", "title": "" }, { "docid": "9066355fc36538a0da0256e01badb286", "score": "0.61416376", "text": "func (contract *Contract) NewSignedTransaction(bytes []byte, signature []byte) (*Transaction, error) {\n\tvar preparedTransaction *gateway.PreparedTransaction\n\tif err := proto.Unmarshal(bytes, &gateway.PreparedTransaction{}); err != nil {\n\t\treturn nil, errors.Wrap(err, \"Failed to deserialize transaction\")\n\t}\n\n\ttransaction := &Transaction{\n\t\tclient: contract.network.gateway.client,\n\t\tsign: contract.network.gateway.sign,\n\t\thash: contract.network.gateway.hash,\n\t\tpreparedTransaction: preparedTransaction,\n\t}\n\n\ttransaction.setSignature(signature)\n\n\treturn transaction, nil\n}", "title": "" }, { "docid": "d59600f04b2ff7ce0e34a271ca943991", "score": "0.5992674", "text": "func (o *ListTagsParams) SetWithSignature(withSignature *bool) {\n\to.WithSignature = withSignature\n}", "title": "" }, { "docid": "7606d82b8aa63d444b5464e9b1010ab9", "score": "0.57999724", "text": "func (weuo *WorkflowEventsUpdateOne) SetSignature(b []byte) *WorkflowEventsUpdateOne {\n\tweuo.mutation.SetSignature(b)\n\treturn weuo\n}", "title": "" }, { "docid": "a8c7cbcfa096368f61c076a929f31f65", "score": "0.5781545", "text": "func NewSignature(recv *types.Var, params, results *types.Tuple, variadic bool) *types.Signature {\n\treturn types.NewSignature(recv, params, results, variadic)\n}", "title": "" }, { "docid": "0ba62b043b235cd1353ea5799eb4d569", "score": "0.5778252", "text": "func (weu *WorkflowEventsUpdate) SetSignature(b []byte) *WorkflowEventsUpdate {\n\tweu.mutation.SetSignature(b)\n\treturn weu\n}", "title": "" }, { "docid": "9ed3c8cd959d2ef15a2fa1b2081b6bea", "score": "0.56693906", "text": "func (transaction *TokenDeleteTransaction) SignWith(\n\tpublicKey PublicKey,\n\tsigner TransactionSigner,\n) *TokenDeleteTransaction {\n\tif !transaction._KeyAlreadySigned(publicKey) {\n\t\ttransaction._SignWith(publicKey, signer)\n\t}\n\n\treturn transaction\n}", "title": "" }, { "docid": "cfbfea51b45952fd3d7e49b1df5eb9af", "score": "0.5626476", "text": "func (transaction *TopicUpdateTransaction) SignWith(\n\tpublicKey PublicKey,\n\tsigner TransactionSigner,\n) *TopicUpdateTransaction {\n\tif !transaction._KeyAlreadySigned(publicKey) {\n\t\ttransaction._SignWith(publicKey, signer)\n\t}\n\n\treturn transaction\n}", "title": "" }, { "docid": "af09e0e724aee0639108efbf7d86d174", "score": "0.56139", "text": "func (s *CustomCodeSigning) SetSignature(v *CodeSigningSignature) *CustomCodeSigning {\n\ts.Signature = v\n\treturn s\n}", "title": "" }, { "docid": "a6b775222ad7aa2612ea0677e3074dbb", "score": "0.5572749", "text": "func Signature(request *http.Request, payload string, timestamp time.Time, region, service, key string) string {\n\tstring := canonicalString(request, payload)\n\thashed := fmt.Sprintf(\"%x\", sha256.Sum256([]byte(string)))\n\tstringToSign := stringToSign(timestamp, region, service, hashed)\n\tsigningKey := deriveSigningKey(key, timestamp, region, service)\n\n\treturn calculateSignature(signingKey, stringToSign)\n}", "title": "" }, { "docid": "538857a37276a6cc5ef4288590b6efdc", "score": "0.5551691", "text": "func (r *Request) SetSignature(signature string) {\n\tr.Signature = signature\n}", "title": "" }, { "docid": "f5afdc9ef85f6d7ec420a7ef3af7d44a", "score": "0.5512738", "text": "func (s *Signer) Signature(request *http.Request, akey string, skey string, body []byte) string {\r\n\trequest.Header.Add(hwsDate, s.signTime.UTC().Format(timeFormat))\r\n\tcanonicalString := s.buildCanonicalRequest(request, body)\r\n\tstringtoSign := s.buildStringtoSign(canonicalString)\r\n\tsignatureStr := s.buildSignature(skey, stringtoSign)\r\n\tcredentialString := s.buildCredentialString()\r\n\tsignedHeaders := s.buildsignedHeadersString(request)\r\n\r\n\tparts := []string{\r\n\t\tauthHeaderPrefix + \" Credential=\" + akey + \"/\" + credentialString,\r\n\t\t\"SignedHeaders=\" + signedHeaders,\r\n\t\t\"Signature=\" + signatureStr,\r\n\t}\r\n\r\n\treturn strings.Join(parts, \", \")\r\n}", "title": "" }, { "docid": "4761ab4b240b2df10a241308e1c5aa80", "score": "0.5502724", "text": "func (o *RunsForRunAndRouteTypeParams) SetSignature(signature *string) {\n\to.Signature = signature\n}", "title": "" }, { "docid": "fdc130f83b2687a3e63791a3cd1b0145", "score": "0.548569", "text": "func InsertSignature(conn *neoism.Database, pubkey *puck_gpg.PrimaryKey, uid *puck_gpg.UserID, sig *puck_gpg.Signature) {\n\n\tsignerKID := sig.IssuerKeyID()\n\tsigneeKID := pubkey.KeyID()\n\n\tapp.Logger.Debugf(\"Got Signature by %s on %s\", signerKID, signeeKID)\n\n\t// Stub out the signer key, in case it's not yet in the DB\n\tq_signer := neoism.CypherQuery{\n\t\tStatement: `MERGE (n:Key {keyid: {kid}});`,\n\t\tParameters: neoism.Props{\"kid\": signerKID},\n\t}\n\terr := conn.Cypher(&q_signer)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\t//Add the signature record\n\tq_signature := neoism.CypherQuery{\n\t\tStatement: `\n\t\t\tMATCH \n\t\t\t\t(m:Key {keyid: {signee}})-[ii:HasID]-(i:UserID {uuid: {uuid}}), \n\t\t\t\t(n:Key {keyid: {signer}})\n\t\t\tMERGE n-[r:SIGNS]->i`,\n\t\tParameters: neoism.Props{\n\t\t\t\"uuid\": uid.UUID,\n\t\t\t\"signee\": signeeKID,\n\t\t\t\"signer\": signerKID,\n\t\t},\n\t}\n\terr = conn.Cypher(&q_signature)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tapp.SigCounter.Mark(1)\n}", "title": "" }, { "docid": "d3e8d6459d7c67e9a9ecb08d6b80b1a6", "score": "0.5485256", "text": "func (o BuildSignatureOutput) Signature() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v BuildSignature) *string { return v.Signature }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "b0ca4434f432edc5e10231ebbc55e5a3", "score": "0.5480471", "text": "func (build *blockBuilder) WithSignatures(sigs stored_users.Signatures) stored_validated_block.BlockBuilder {\n\tbuild.sigs = sigs\n\treturn build\n}", "title": "" }, { "docid": "37294e0b15cd52395f6e9def3ff1136d", "score": "0.5478734", "text": "func FakeTransaction() Transaction {\n\treturn Transaction(FakeHash())\n}", "title": "" }, { "docid": "474b9cf9fdb531440e59992a261f5038", "score": "0.5475492", "text": "func NewRawCardSignatureWithSignature(signerId string, signature []byte) *RawCardSignature {\n\tsignerIdChar := C.CString(signerId)\n\tdefer C.free(unsafe.Pointer(signerIdChar))\n\tsignerIdStr := C.vsc_str_from_str(signerIdChar)\n\tsignatureData := helperWrapData(signature)\n\n\tproxyResult := /*pr4*/ C.vssc_raw_card_signature_new_with_signature(signerIdStr, signatureData)\n\n\truntime.KeepAlive(signerId)\n\n\tobj := &RawCardSignature{\n\t\tcCtx: proxyResult,\n\t}\n\truntime.SetFinalizer(obj, (*RawCardSignature).Delete)\n\treturn obj\n}", "title": "" }, { "docid": "af316080720bace7de28094d5721eac6", "score": "0.5434156", "text": "func (bc *Blockchain) VerifyTransactionSignature(senderPublicKey *ecdsa.PublicKey, s *utils.Signature, t *Transaction) bool {\n\tm, _ := json.Marshal(t)\n\th := sha256.Sum256([]byte(m))\n\treturn ecdsa.Verify(senderPublicKey, h[:], s.R, s.S)\n}", "title": "" }, { "docid": "9b35480aebe9fe98ef3fae25e091d472", "score": "0.5432426", "text": "func (transaction *TransferTransaction) SignWith(\n\tpublicKey PublicKey,\n\tsigner TransactionSigner,\n) *TransferTransaction {\n\tif !transaction.IsFrozen() {\n\t\t_, _ = transaction.Freeze()\n\t}\n\n\tif !transaction.keyAlreadySigned(publicKey) {\n\t\ttransaction.signWith(publicKey, signer)\n\t}\n\n\treturn transaction\n}", "title": "" }, { "docid": "77da7982f75bdc6d36e564775cba843a", "score": "0.5410858", "text": "func (o *DisruptionsGetDisruptionModesParams) SetSignature(signature *string) {\n\to.Signature = signature\n}", "title": "" }, { "docid": "044d871165b84294486d88217a2b5a5a", "score": "0.53786904", "text": "func (o *XmlNs0SignedDataAllOf) SetSignature(v string) {\n\to.Signature = &v\n}", "title": "" }, { "docid": "24ccce51e3da51bf87020b3acd32456f", "score": "0.5376001", "text": "func (transaction *FreezeTransaction) SignWith(\n\tpublicKey PublicKey,\n\tsigner TransactionSigner,\n) *FreezeTransaction {\n\tif !transaction._KeyAlreadySigned(publicKey) {\n\t\ttransaction._SignWith(publicKey, signer)\n\t}\n\n\treturn transaction\n}", "title": "" }, { "docid": "6e59462f0b4e37e049d2616b6edc538f", "score": "0.53610855", "text": "func SigningTransaction(ks *keystore.KeyStore, signingAddress string, password string) {\n\t// Create a new account to sign transactions with\n\t//signer, _ := ks.NewAccount(password)\n\tsigner := accounts.Account{Address: common.HexToAddress(signingAddress)}\n\tblock := oop.EthBlock{}.Hash\n\ttxHash := common.HexToHash(block)\n\n\t// Sign a transaction with a single authorization\n\tsignature, _ := ks.SignHashWithPassphrase(signer, password, txHash.Bytes())\n\n\t// Sign a transaction with multiple manually cancelled authorizations\n\t_ = ks.Unlock(signer, password)\n\tsignature, _ = ks.SignHash(signer, txHash.Bytes())\n\t_ = ks.Lock(signer.Address)\n\n\t/*\n\t// Sign a transaction with multiple automatically cancelled authorizations\n\t_ = ks.TimedUnlock(signer, password, time.Second)\n\tsignature, _ = ks.SignHash(signer, txHash.Bytes())\n\t*/\n\n\tfmt.Println(signature)\n}", "title": "" }, { "docid": "869fc84950b7cec1625364518a163d1e", "score": "0.53557503", "text": "func WithSignatureRepresentation(signature verifiable.SignatureRepresentation) Opt {\n\treturn func(ctx *verifiable.LinkedDataProofContext) {\n\t\tctx.SignatureRepresentation = signature\n\t}\n}", "title": "" }, { "docid": "390c458c14f59f5949f228f00f44dea9", "score": "0.53552896", "text": "func NewSignature(n types.Node, c14n, sig TransformID, id string) (*Signature, error) {\n\tdoc, err := n.OwnerDocument()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tsignnode, err := clib.XMLSecTmplSignatureCreateNsPref(\n\t\tdoc,\n\t\tclib.TransformID(c14n),\n\t\tclib.TransformID(sig),\n\t\tid,\n\t\tclib.Prefix,\n\t)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tn.AddChild(signnode)\n\n\treturn &Signature{\n\t\tsignmethod: sig,\n\t\tsignnode: signnode,\n\t}, nil\n}", "title": "" }, { "docid": "5b1800f249c32e36e4072c109708b8e1", "score": "0.5329497", "text": "func NewStdSignature(pubkey crypto.PubKey, signature []byte) StdSignature {\n\treturn StdSignature{\n\t\tPubKey: pubkey,\n\t\tSignature: signature,\n\t}\n}", "title": "" }, { "docid": "7d517972bf9d0b9b59f524da55909378", "score": "0.5329371", "text": "func AddSignature(message map[string]interface{}, key *rsa.PrivateKey, includeDate bool, expiration time.Duration) error {\n\tif sig, err := CreateSignature(message, key, includeDate, expiration); sig != nil {\n\t\tmessage[\"(signed)\"] = sig\n\t\treturn nil\n\t} else {\n\t\treturn err\n\t}\n}", "title": "" }, { "docid": "7329518c4bb83b9484ed5112bd496f17", "score": "0.53257626", "text": "func (it *Item) AddSignature(pub *keys.PublicKey, sig []byte) {\n\tpubHex := hex.EncodeToString(pub.Bytes())\n\tit.Signatures[pubHex] = sig\n}", "title": "" }, { "docid": "94af8a914b8e49549ae4aef2033ca809", "score": "0.53142285", "text": "func (o *ListTagsParams) WithWithSignature(withSignature *bool) *ListTagsParams {\n\to.SetWithSignature(withSignature)\n\treturn o\n}", "title": "" }, { "docid": "56dc21c475b253886f90d64ed079dbd2", "score": "0.5294804", "text": "func NewSignatureAuthentication(document, signature []byte, keys []SigningKey) PackageAuthentication {\n\treturn signatureAuthentication{\n\t\tDocument: document,\n\t\tSignature: signature,\n\t\tKeys: keys,\n\t}\n}", "title": "" }, { "docid": "89f2d8fcc2de1f37d75b3f84e4f3d478", "score": "0.52758574", "text": "func NewSignatureHandler() *signatureHandler {\n\treturn &signatureHandler{}\n}", "title": "" }, { "docid": "bd057472d511f7bfb5cdebe4ca382dac", "score": "0.5263343", "text": "func NewSignatureUnlockBlock(signature Signature) *SignatureUnlockBlock {\n\treturn model.NewImmutable[SignatureUnlockBlock](&signatureUnlockBlockModel{\n\t\tSignature: signature,\n\t})\n}", "title": "" }, { "docid": "153538add0846d2596e1a10d3d860858", "score": "0.5187453", "text": "func (o BuildSignatureResponseOutput) Signature() pulumi.StringOutput {\n\treturn o.ApplyT(func(v BuildSignatureResponse) string { return v.Signature }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "6c01f61fa4681e13b1cd89a033f4d062", "score": "0.5179626", "text": "func (interest *Interest) SignWith(signer func(name Name, si *SigInfo) (LLSign, error)) error {\n\tif interest.SigInfo == nil {\n\t\tinterest.SigInfo = newNullSigInfo()\n\t}\n\tllSign, e := signer(interest.Name, interest.SigInfo)\n\tif e != nil {\n\t\treturn e\n\t}\n\n\tsignedPortion, e := interest.encodeSignedPortion()\n\tif e != nil {\n\t\treturn e\n\t}\n\n\tsig, e := llSign(signedPortion)\n\tif e != nil {\n\t\treturn e\n\t}\n\tinterest.SigValue = sig\n\n\tinterest.UpdateParamsDigest()\n\treturn nil\n}", "title": "" }, { "docid": "172ee673d1fbcce892141c4874780c55", "score": "0.5173157", "text": "func NewTransaction(sender string, recipient string, value float32) *Transaction {\n\treturn &Transaction{sender, recipient, value}\n}", "title": "" }, { "docid": "c08ec99b8fd2263f47db68924d2cfe98", "score": "0.51711345", "text": "func (t *Transaction) PreSign(key account.Key) {\n\tsha3ToHex := func(value []byte) string {\n\t\th := sha3.NewKeccak256()\n\t\t_, _ = h.Write(value)\n\t\treturn \"0x\" + common.Bytes2Hex(h.Sum([]byte{}))\n\t}\n\n\trawPayload := t.payload\n\n\t// --- create sig_pub ---\n\tpubTxExtra := NewKVExtra()\n\tprivateRawData := PrivateTransactionRawData{\n\t\tPayload: sha3ToHex([]byte(t.payload)),\n\t\tCollection: t.participants,\n\t\tPublicSignature: \"\",\n\t}\n\n\tt.hasExtra = true\n\n\tpubTxExtra.add(KVExtraPrivateKey, privateRawData)\n\n\tif t.kvExtra != nil {\n\t\tfor k, v := range t.kvExtra.data {\n\t\t\tvar stringifyResult string\n\t\t\tif strings.EqualFold(k, KVExtraVersionKey) {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif str, ok := v.(string); ok {\n\t\t\t\tstringifyResult = str\n\t\t\t} else {\n\t\t\t\tvalue, err := json.Marshal(v)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlogger.Error(err)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tstringifyResult = string(value)\n\t\t\t}\n\t\t\tvalHash := sha3ToHex([]byte(stringifyResult))\n\t\t\tpubTxExtra.add(k, valHash)\n\t\t}\n\t} else {\n\t\tt.kvExtra = NewKVExtra()\n\t}\n\n\tt.extra = pubTxExtra.Stringify()\n\tt.payload = \"\"\n\n\tpubSig := GenSinPub(key, needHashString(t))\n\n\t// --- create sig_pri ---\n\textraBytesRaw := []byte(t.extra)\n\n\t// in order to keep the order of keys, we should operate on t.extra\n\n\t// reset private data\n\textraBytesRaw, err := jsonparser.Set(extraBytesRaw, []byte(strconv.Quote(rawPayload)), KVExtraPrivateKey, KVExtraPrivatePayloadKey)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\textraBytesRaw, err = jsonparser.Set(extraBytesRaw, []byte(strconv.Quote(pubSig)), KVExtraPrivateKey, KVExtraPrivatePubSigKey)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\t// reset kvExtra data\n\tfor k, v := range t.kvExtra.data {\n\t\tvar stringifyResult string\n\t\tif strings.EqualFold(k, KVExtraVersionKey) {\n\t\t\tcontinue\n\t\t}\n\t\tif str, ok := v.(string); ok {\n\t\t\tstringifyResult = str\n\t\t} else {\n\t\t\tvalue, err := json.Marshal(v)\n\t\t\tif err != nil {\n\t\t\t\tlogger.Error(err)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tstringifyResult = string(value)\n\t\t}\n\t\textraBytesRaw, err = jsonparser.Set(extraBytesRaw, []byte(strconv.Quote(stringifyResult)), k)\n\t\tif err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t}\n\n\tt.extra = string(extraBytesRaw)\n}", "title": "" }, { "docid": "c8419baf77cb75fe48b0109dd81a84cf", "score": "0.51661825", "text": "func NewSignature(msg []byte, privKey abstract.Scalar) Signature {\n\tsig := &Signature{}\n\thashFunc := suite.Hash()\n\tk := suite.Scalar().Pick(random.Stream)\n\t//compute r = g^k\n\tr := suite.Point().Mul(nil, k)\n\t// compute e = H(msg || r)\n\tb, _ := r.MarshalBinary()\n\thashFunc.Write(msg)\n\te := hashFunc.Sum(b)\n\teScalar := suite.Scalar().SetBytes(e)\n\t// s = k - x*e\n\ts := suite.Scalar().Sub(k, suite.Scalar().Mul(privKey, eScalar))\n\tsig.e = eScalar\n\tsig.s = s\n\treturn *sig\n}", "title": "" }, { "docid": "b1321b94dee2dd76082a8e5b459cdb52", "score": "0.516266", "text": "func (_Safe *SafeTransactor) IsValidSignature(opts *bind.TransactOpts, _data []byte, _signature []byte) (*types.Transaction, error) {\n\treturn _Safe.contract.Transact(opts, \"isValidSignature\", _data, _signature)\n}", "title": "" }, { "docid": "c58bab5033a7973fc40ca704152451c9", "score": "0.51562786", "text": "func CheckSignature(i *map[string]interface{}, name string) error {\n\tstate, name := converter.ParseName(name)\n\tsc := (*i)[`sc`].(*SmartContract)\n\tsn := model.Signature{}\n\tsn.SetTablePrefix(converter.Int64ToStr(int64(state)))\n\t_, err := sn.Get(name)\n\tif err != nil {\n\t\treturn logErrorDB(err, \"executing single query\")\n\t}\n\tif len(sn.Value) == 0 {\n\t\treturn nil\n\t}\n\thexsign, err := hex.DecodeString((*i)[`Signature`].(string))\n\tif len(hexsign) == 0 || err != nil {\n\t\treturn logError(errWrongSignature, consts.ConversionError, \"converting signature to hex\")\n\t}\n\n\tvar sign TxSignJSON\n\tif err = unmarshalJSON([]byte(sn.Value), &sign, `unmarshalling sign`); err != nil {\n\t\treturn err\n\t}\n\twallet := (*i)[`key_id`].(int64)\n\tforsign := fmt.Sprintf(`%d,%d`, uint64((*i)[`time`].(int64)), uint64(wallet))\n\tfor _, isign := range sign.Params {\n\t\tval := (*i)[isign.Param]\n\t\tif val == nil {\n\t\t\tval = ``\n\t\t}\n\t\tforsign += fmt.Sprintf(`,%v`, val)\n\t}\n\n\tCheckSignResult, err := utils.CheckSign(sc.PublicKeys, []byte(forsign), hexsign, true)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif !CheckSignResult {\n\t\treturn logErrorfShort(eIncorrectSignature, forsign, consts.InvalidObject)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "1755b38391d7ecd13e5810109f49d881", "score": "0.51480365", "text": "func (act *AbstractAction) SetSignature(signature []byte) {\n\tact.signature = make([]byte, len(signature))\n\tcopy(act.signature, signature)\n}", "title": "" }, { "docid": "a4e121ac4f2b005c1c5f6e9e3262d828", "score": "0.5147559", "text": "func (this *Prepare) Signature() value.Value {\n\treturn value.NewValue(value.JSON.String())\n}", "title": "" }, { "docid": "ad6750712bb765cc4fce6242e140cb8c", "score": "0.51469064", "text": "func (_Exchange *ExchangeCallerSession) IsValidTransactionSignature(transaction Struct3, signature []byte) (bool, error) {\n\treturn _Exchange.Contract.IsValidTransactionSignature(&_Exchange.CallOpts, transaction, signature)\n}", "title": "" }, { "docid": "ea781687a3d902f38a5fa5920145fc4b", "score": "0.51389277", "text": "func (c *Wallet) VerifySignature(pubKey, msg, signature string) error {\n\treturn errors.New(\"verify signature not supported for BBC currently\")\n}", "title": "" }, { "docid": "219c93ee021467474565a0769aadc707", "score": "0.51348525", "text": "func SignaturePolicy(policy crypto.SignaturePolicy) BuilderOption {\n\treturn func(o *options) {\n\t\to.signaturePolicy = policy\n\t}\n}", "title": "" }, { "docid": "32adebf489f9c033141354874ee29eb3", "score": "0.5121667", "text": "func (c *Ctx) Signature() string {\n\treturn fmt.Sprintf(\n\t\t\"✒️ <code>%s %s</code> (@%s)\",\n\t\thtml.EscapeString(c.TelegramUser().FirstName),\n\t\thtml.EscapeString(c.TelegramUser().LastName),\n\t\thtml.EscapeString(c.TelegramUser().Username),\n\t)\n}", "title": "" }, { "docid": "e39e8004460fa2fbc3497ef859bc4e20", "score": "0.5105476", "text": "func SignatureScript(\n\ttx *MsgTx,\n\tidx int,\n\tsubscript []byte,\n\thashType txscript.SigHashType,\n\tprivKey *btcec.PrivateKey,\n\tcompress bool,\n\tamount int64,\n) ([]byte, error) {\n\tsig, err := RawTxInSignature(tx, idx, subscript, hashType, privKey, amount)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tpk := (*btcec.PublicKey)(&privKey.PublicKey)\n\tvar pkData []byte\n\tif compress {\n\t\tpkData = pk.SerializeCompressed()\n\t} else {\n\t\tpkData = pk.SerializeUncompressed()\n\t}\n\n\treturn txscript.NewScriptBuilder().AddData(sig).AddData(pkData).Script()\n}", "title": "" }, { "docid": "c4edbfb8e10fdb8beec7377684e4a44e", "score": "0.51054394", "text": "func (s *mspSigner) NewSignatureHeader() (*cb.SignatureHeader, error) {\n\tsigner, err := mspmgmt.GetLocalMSP().GetDefaultSigningIdentity()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Failed getting MSP-based signer [%s]\", err)\n\t}\n\n\tcreatorIdentityRaw, err := signer.Serialize()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Failed serializing creator public identity [%s]\", err)\n\t}\n\n\tnonce, err := crypto.GetRandomNonce()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Failed creating nonce [%s]\", err)\n\t}\n\n\tsh := &cb.SignatureHeader{}\n\tsh.Creator = creatorIdentityRaw\n\tsh.Nonce = nonce\n\n\treturn sh, nil\n}", "title": "" }, { "docid": "8ae196504022d80c4ee558ee19661748", "score": "0.50953835", "text": "func Signature() string {\r\n\tvar hash []byte\r\n\tfor _, block := range chain.blocks {\r\n\t\thash = append(hash, block.Hash...)\r\n\t}\r\n\th := sha256.New()\r\n\th.Write(hash)\r\n\treturn fmt.Sprintf(\"%x\", h.Sum(nil))\r\n}", "title": "" }, { "docid": "7fe4d3b3a80ed9eada47e4752cf58ffe", "score": "0.50933254", "text": "func (self *Context) StartSignature() {\n\tif _, ok := self.writer.(*HashWriter); !ok {\n\t\tself.writer = NewHashWriter(self.writer)\n\t}\n}", "title": "" }, { "docid": "1ec3ffcceaef1c77d79878646822bd3d", "score": "0.5092346", "text": "func (o PgpSignedAttestationOutput) Signature() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v PgpSignedAttestation) *string { return v.Signature }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "f399512b5216a1508e666c177268c77a", "score": "0.50876766", "text": "func NewSignature(size int) Signature {\n\tsignatures := make(Signature, size)\n\tsignatures.Initialize()\n\treturn signatures\n}", "title": "" }, { "docid": "8fd2a54cb188d844b76f62bb6e5c6ef8", "score": "0.50858873", "text": "func (_Exchange *ExchangeSession) IsValidTransactionSignature(transaction Struct3, signature []byte) (bool, error) {\n\treturn _Exchange.Contract.IsValidTransactionSignature(&_Exchange.CallOpts, transaction, signature)\n}", "title": "" }, { "docid": "846892f05e644974c45c420d31924e65", "score": "0.5083169", "text": "func signTx(ctx ctx.Context, params []string) {\n\tif len(params) < 1 {\n\t\tfmt.Println(\"params not enough\")\n\t\treturn\n\t}\n\n\tvar adln = len(params) - 1\n\tvar addresslist = make([]fields.Address, 0, adln)\n\tfor i := 1; i < len(params); i++ {\n\t\taddress := ctx.IsInvalidAccountAddress(params[i])\n\t\tif address == nil {\n\t\t\treturn\n\t\t}\n\t\taddresslist = append(addresslist, *address)\n\t}\n\n\ttxhashnofee, err := hex.DecodeString(params[0])\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn\n\t}\n\n\tnewTrs := ctx.GetTxFromRecord(txhashnofee)\n\tif newTrs == nil {\n\t\tfmt.Printf(\" tx <%s> not find!\", params[0])\n\t\treturn\n\t}\n\n\t// ok\n\tctx.Println(\"hash: <\" + hex.EncodeToString(newTrs.Hash()) + \">, hash_with_fee: <\" + hex.EncodeToString(newTrs.HashWithFee()) + \">\")\n\n\t// Execute signature\n\t// sign // 并且加入新增的需要签名的数据\n\te6 := newTrs.FillNeedSigns(ctx.GetAllPrivateKeyBytes(), addresslist)\n\tif e6 != nil {\n\t\tfmt.Println(\"sign transaction error: \" + e6.Error())\n\t\treturn\n\t}\n\n\t// Judge whether the signature is completed\n\tsigok, sigerr := newTrs.VerifyAllNeedSigns()\n\tnosigntip := \"\"\n\tif !sigok || sigerr != nil {\n\t\tnosigntip = \" [NOT SIGN COMPLETELY]\"\n\t\tfmt.Println(\"Attention: transaction verify need signs fail!\", sigerr)\n\t\treturn\n\t}\n\n\tbodybytes, e7 := newTrs.Serialize()\n\tif e7 != nil {\n\t\tfmt.Println(\"transaction serialize error, \" + e7.Error())\n\t\treturn\n\t}\n\n\t// print\n\tctx.Println(\"body length \" + strconv.Itoa(len(bodybytes)) + \" bytes, hex body is:\")\n\tctx.Println(\"-------- TRANSACTION BODY\" + nosigntip + \" START --------\")\n\tctx.Println(hex.EncodeToString(bodybytes))\n\tctx.Println(\"-------- TRANSACTION BODY\" + nosigntip + \" END --------\")\n\n\t// record\n\tctx.SetTxToRecord(newTrs.Hash(), newTrs)\n}", "title": "" }, { "docid": "ae2f1297a5a8b0998bc7c13bd984f769", "score": "0.50804937", "text": "func (*Backend) VerifySignature(msg []byte, sig wallet.Sig, a wallet.Address) (bool, error) {\n\treturn VerifySignature(msg, sig, a)\n}", "title": "" }, { "docid": "36464d32badb51d34fc645b8dea3ed51", "score": "0.5073811", "text": "func CreateSignature(t *jwt.Token, key interface{}, body string, b64encoded bool) (string, error) {\n\tvar sig, sstr string\n\tvar err error\n\tif sstr, err = SigningString(t, body, b64encoded); err != nil {\n\t\treturn \"\", fmt.Errorf(\"authentication.CreateSignature: SigningString(t, body) failed: %w\", err)\n\t}\n\n\tif sig, err = t.Method.Sign(sstr, key); err != nil {\n\t\treturn \"\", fmt.Errorf(\"authentication.CreateSignature: t.Method.Sign(sstr, key failed: %w\", err)\n\t}\n\treturn strings.Join([]string{sstr, sig}, \".\"), nil\n}", "title": "" }, { "docid": "b847ad17676b783ac5244109e3345f97", "score": "0.5053824", "text": "func (c *AcmeClient) EncodeSignature(r, s *big.Int) string {\n\n\tbytesR := r.Bytes()\n\tbytesS := s.Bytes()\n\n\tpaddingBytesR := []byte{}\n\tpaddingBytesS := []byte{}\n\n\tfor i := 0; i < 32-len(bytesR); i++ {\n\t\tpaddingBytesR = append(paddingBytesR, 0)\n\t}\n\tfor i := 0; i < 32-len(bytesS); i++ {\n\t\tpaddingBytesS = append(paddingBytesS, 0)\n\t}\n\n\tpaddedR := append(paddingBytesR, r.Bytes()...)\n\tpaddedS := append(paddingBytesS, s.Bytes()...)\n\trsBytes := append(paddedR, paddedS...)\n\n\treturn base64.URLEncoding.WithPadding(base64.NoPadding).EncodeToString(rsBytes)\n}", "title": "" }, { "docid": "29d512c257650ac506aaf8ff8218c3c2", "score": "0.5051635", "text": "func (db *AbiDb) AddSignature(selector string, data []byte) error {\n\tif len(data) < 4 {\n\t\treturn nil\n\t}\n\t_, err := db.LookupMethodSelector(data[:4])\n\tif err == nil {\n\t\treturn nil\n\t}\n\tsig := common.ToHex(data[:4])\n\treturn db.saveCustomAbi(selector, sig)\n}", "title": "" }, { "docid": "ddffe2461646d61567cbf2fb6b1677fc", "score": "0.50485206", "text": "func (c *ContactSelf) Signature(signature string) error {\n\tpuppetId := c.GetPuppet().SelfID()\n\tif puppetId == \"\" {\n\t\treturn errors.New(\"can not set signature for user self, user might be either not logged in or already logged out\")\n\t}\n\tif c.Id != puppetId {\n\t\treturn errors.New(\"only can change signature for user self\")\n\t}\n\treturn c.GetPuppet().SetContactSelfSignature(signature)\n}", "title": "" }, { "docid": "7f454e9235517f1413aaad591c67988f", "score": "0.5048327", "text": "func (c *Client) CreateSenderSignature(newSig SenderSignatureOpts) (*SenderSignature, error) {\n\tvar ret SenderSignature\n\n\treq := parameters{\n\t\tmethod: http.MethodPost,\n\t\tendpoint: \"/senders\",\n\t\texpectedStatusCode: http.StatusOK,\n\t\trespTarget: &ret,\n\t\ttoken: c.AccountToken,\n\t\tpayload: newSig,\n\t}\n\n\terr := c.doRequest(req)\n\treturn &ret, err\n}", "title": "" }, { "docid": "024cc515c291e495d4a8f7c807e292a1", "score": "0.5046001", "text": "func (stub NoSignaturesInitialize) PutSignaturesWithFormat(ctx context.Context, signatures []signature.Signature, instanceDigest *digest.Digest) error {\n\tif len(signatures) != 0 {\n\t\treturn errors.New(stub.message)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "47e525b81217f4b9c081d026747434a6", "score": "0.504335", "text": "func (s *signatureData) SetSignature(sig string) error {\n\tdoc := etree.NewDocument()\n\terr := doc.ReadFromString(sig)\n\ts.signature = doc.Root()\n\treturn err\n}", "title": "" }, { "docid": "3fe0f72c2c6e3b7a891b115484747007", "score": "0.50384784", "text": "func (_Safe *SafeSession) IsValidSignature(_data []byte, _signature []byte) (*types.Transaction, error) {\n\treturn _Safe.Contract.IsValidSignature(&_Safe.TransactOpts, _data, _signature)\n}", "title": "" }, { "docid": "0c5a55b2993020399f0f46acd38c3bc9", "score": "0.5015566", "text": "func (c *ParameterContext) AddSignature(h util.Uint160, ctr *wallet.Contract, pub *keys.PublicKey, sig []byte) error {\n\titem := c.getItemForContract(h, ctr)\n\tif _, pubs, ok := vm.ParseMultiSigContract(ctr.Script); ok {\n\t\tif item.GetSignature(pub) != nil {\n\t\t\treturn errors.New(\"signature is already added\")\n\t\t}\n\t\tpubBytes := pub.Bytes()\n\t\tvar contained bool\n\t\tfor i := range pubs {\n\t\t\tif bytes.Equal(pubBytes, pubs[i]) {\n\t\t\t\tcontained = true\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif !contained {\n\t\t\treturn errors.New(\"public key is not present in script\")\n\t\t}\n\t\titem.AddSignature(pub, sig)\n\t\tif len(item.Signatures) == len(ctr.Parameters) {\n\t\t\tindexMap := map[string]int{}\n\t\t\tfor i := range pubs {\n\t\t\t\tindexMap[hex.EncodeToString(pubs[i])] = i\n\t\t\t}\n\t\t\tsigs := make([]sigWithIndex, 0, len(item.Signatures))\n\t\t\tfor pub, sig := range item.Signatures {\n\t\t\t\tsigs = append(sigs, sigWithIndex{index: indexMap[pub], sig: sig})\n\t\t\t}\n\t\t\tsort.Slice(sigs, func(i, j int) bool {\n\t\t\t\treturn sigs[i].index < sigs[j].index\n\t\t\t})\n\t\t\tfor i := range sigs {\n\t\t\t\titem.Parameters[i] = smartcontract.Parameter{\n\t\t\t\t\tType: smartcontract.SignatureType,\n\t\t\t\t\tValue: sigs[i].sig,\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\treturn nil\n\t}\n\n\tindex := -1\n\tfor i := range ctr.Parameters {\n\t\tif ctr.Parameters[i].Type == smartcontract.SignatureType {\n\t\t\tif index >= 0 {\n\t\t\t\treturn errors.New(\"multiple signature parameters in non-multisig contract\")\n\t\t\t}\n\t\t\tindex = i\n\t\t}\n\t}\n\tif index != -1 {\n\t\titem.Parameters[index].Value = sig\n\t} else if !ctr.Deployed {\n\t\treturn errors.New(\"missing signature parameter\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "9e17ba59e58dd1c5506037f05a2e393a", "score": "0.5012859", "text": "func (o BuildSignaturePtrOutput) Signature() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *BuildSignature) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Signature\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "f1d88ad62c5b6e9e628b688ffda6f7f1", "score": "0.5007884", "text": "func signature() *git.Signature {\n\treturn &git.Signature{\n\t\tName: \"gong tester\",\n\t\tEmail: \"gong@tester.com\",\n\t\tWhen: time.Now(),\n\t}\n}", "title": "" }, { "docid": "8ec05cad87d9c128979698b17daf6988", "score": "0.5004347", "text": "func rawTxInSignature(tx *wire.MsgTx, idx int, prevScriptBytes []byte,\n\thashType txscript.SigHashType, key *btcec.PrivateKey, amt int64, currentHeight uint64) ([]byte, error) {\n\n\thash, err := calcSignatureHash(prevScriptBytes, hashType, tx, idx, amt, 0, currentHeight)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsignature, err := key.Sign(hash)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"cannot sign tx input: %s\", err)\n\t}\n\n\treturn append(signature.Serialize(), byte(hashType)), nil\n}", "title": "" }, { "docid": "0f2583fd4d718a89a26c790ef320b8fd", "score": "0.49948287", "text": "func NewSignature(r, s *btcec.ModNScalar) *Signature {\n\treturn secp_ecdsa.NewSignature(r, s)\n}", "title": "" }, { "docid": "37aef96f6b7c7775b9dc9854c6374613", "score": "0.49946278", "text": "func (self *TraitDBusMessage) SetSignature(value string) {\n\t__cgo__value := (*C.gchar)(unsafe.Pointer(C.CString(value)))\n\tC.g_dbus_message_set_signature(self.CPointer, __cgo__value)\n\tC.free(unsafe.Pointer(__cgo__value))\n\treturn\n}", "title": "" }, { "docid": "866c1f88401c0a73f2e72740a170326f", "score": "0.49918947", "text": "func BuildSignatureHeader(txID *txid.TransactionID) *common.SignatureHeader {\n\tserializedIdentity := &msp.SerializedIdentity{\n\t\tMspid: txID.MSPID(),\n\t\tIdBytes: txID.Identity().Certificate().Bytes(),\n\t}\n\treturn &common.SignatureHeader{\n\t\tCreator: util.MarshalOrPanic(serializedIdentity),\n\t\tNonce: txID.Nonce(),\n\t}\n}", "title": "" }, { "docid": "8035452d2f933f10e6dc5e2156a464f3", "score": "0.49916437", "text": "func (_Safe *SafeTransactorSession) IsValidSignature(_data []byte, _signature []byte) (*types.Transaction, error) {\n\treturn _Safe.Contract.IsValidSignature(&_Safe.TransactOpts, _data, _signature)\n}", "title": "" }, { "docid": "7b303737f6e7db53a0e69801ae75cf4c", "score": "0.49819168", "text": "func SignTransaction(tx *Transaction, privKey ecdsa.PrivateKey) {\n\t// prevTxs := make(map[string]Transaction)\n\n\t// for _, in := range tx.Inputs {\n\t// \tprevTX, err := FindTransaction(in.ID)\n\t// \tutils.HandleErr(err)\n\t// \tprevTxs[hex.EncodeToString(prevTX.ID)] = prevTX\n\t// }\n\ttx.Sign(privKey)\n}", "title": "" }, { "docid": "a8c5a7757efad02e6337095c31cc7462", "score": "0.4973126", "text": "func MakeSignature(name, passphrase string, msg StdSignMsg) (sig auth.StdSignature, err error) {\n\tkeybase, err := keys.GetKeyBase()\n\tif err != nil {\n\t\treturn\n\t}\n\tsigBytes, pubkey, err := keybase.Sign(name, passphrase, msg.Bytes())\n\tif err != nil {\n\t\treturn\n\t}\n\treturn auth.StdSignature{\n\t\tPubKey: pubkey,\n\t\tSignature: sigBytes,\n\t}, nil\n}", "title": "" }, { "docid": "f45936c55b059df5674134b26c92e5d1", "score": "0.4973076", "text": "func (_Exchange *ExchangeCaller) IsValidTransactionSignature(opts *bind.CallOpts, transaction Struct3, signature []byte) (bool, error) {\n\tvar (\n\t\tret0 = new(bool)\n\t)\n\tout := ret0\n\terr := _Exchange.contract.Call(opts, out, \"isValidTransactionSignature\", transaction, signature)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "4918640d92e9e94823aa2a06b5bebe02", "score": "0.49711612", "text": "func (mr *MockSignedMessageMockRecorder) SetSignature(arg0 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"SetSignature\", reflect.TypeOf((*MockSignedMessage)(nil).SetSignature), arg0)\n}", "title": "" }, { "docid": "28d34373b01013dc19ac91addc85a7c4", "score": "0.49692565", "text": "func (s *Signature) String() string {\n\tvar b strings.Builder\n\n\tb.WriteString(\"KSI Signature:\\n\")\n\tif s == nil {\n\t\treturn \"(null)\\n\"\n\t}\n\n\tb.WriteString(\"Document hash: \")\n\tif imprint, err := s.DocumentHash(); err == nil {\n\t\tb.WriteString(imprint.String())\n\t\tb.WriteString(\"\\n\")\n\t} else {\n\t\tb.WriteString(\"N/A\\n\")\n\t}\n\n\tb.WriteString(\"Signing time: \")\n\tif time, err := s.SigningTime(); err == nil {\n\t\tb.WriteString(\"(\")\n\t\tb.WriteString(strconv.FormatInt(time.Unix(), 10))\n\t\tb.WriteString(\") \")\n\t\tb.WriteString(time.String())\n\t\tb.WriteString(\"\\n\")\n\t} else {\n\t\tb.WriteString(\"N/A\\n\")\n\t}\n\n\tif id, err := s.AggregationHashChainIdentity(); err == nil {\n\t\tb.WriteString(id.String())\n\t}\n\n\tb.WriteString(\"Trust anchor: \")\n\tif s.calAuthRec != nil {\n\t\tb.WriteString(\"'Calendar Authentication Record'.\")\n\t} else if s.publication != nil {\n\t\tb.WriteString(\"'Publication Record'.\")\n\t} else if s.calChain != nil {\n\t\tb.WriteString(\"'Calendar Blockchain'.\")\n\t} else {\n\t\tb.WriteString(\"N/A.\")\n\t}\n\tb.WriteString(\"\\n\")\n\n\tb.WriteString(\"-------------------------------------------\\n\")\n\tif s.aggrChainList != nil {\n\t\tfor i, chain := range *s.aggrChainList {\n\t\t\tb.WriteString(strconv.FormatInt(int64(i), 10))\n\t\t\tb.WriteString(\". Aggregation hash chain:\\n\")\n\t\t\tb.WriteString(chain.String())\n\t\t\tb.WriteString(\"\\n\")\n\t\t}\n\t} else {\n\t\tb.WriteString(\"Aggregation hash chain: N/A\\n\")\n\t}\n\n\tb.WriteString(\"-------------------------------------------\\n\")\n\tif s.calChain != nil {\n\t\tb.WriteString(\"Calendar hash chain:\\n\")\n\t\tb.WriteString(s.calChain.String())\n\t\tb.WriteString(\"\\n\")\n\t}\n\treturn b.String()\n}", "title": "" }, { "docid": "0e439ceedf8c421e5c281a001f2250e9", "score": "0.4968329", "text": "func (b *TransactionBuilder) Sign() *TransactionBuilder {\n\tb.sign = true\n\treturn b\n}", "title": "" }, { "docid": "536111e041e73bbb43cc3eff1e050ece", "score": "0.49530852", "text": "func NewSignature(rd uint, val interface{}) (s Signature) {\n\tvar sign interface{}\n\tvar rec = NewSignature\n\n\thalg := sha256.New()\n\n\thalg.Write([]byte(fmt.Sprintf(\"%+v\", reflect.TypeOf(val))))\n\n\tswitch kind := reflect.ValueOf(val).Kind(); kind {\n\tcase reflect.Func:\n\t\thalg.Write([]byte(fmt.Sprintf(\"%v%v%v\", reflect.ValueOf(val).Pointer(), function.Name(val), function.Signature(val))))\n\tcase reflect.Array, reflect.Slice:\n\t\tif rd >= 0 {\n\t\t\tparams := val.([]interface{})\n\t\t\tfor _, param := range params {\n\t\t\t\tsubsign := rec(rd-1, param)\n\t\t\t\thalg.Write([]byte(fmt.Sprintf(\"%+v\", reflect.TypeOf(param))))\n\t\t\t\thalg.Write([]byte(subsign.(string)))\n\t\t\t}\n\t\t} else {\n\t\t\thalg.Write([]byte(fmt.Sprintf(\"%+v\", val)))\n\t\t}\n\tcase reflect.Map:\n\t\tif rd >= 0 {\n\t\t\trmap := reflect.ValueOf(val)\n\t\t\tkeys := rmap.MapKeys()\n\n\t\t\tshkeys := make([]string, 0, len(keys))\n\t\t\thmap := make(map[string]string)\n\t\t\tfor _, key := range keys {\n\t\t\t\tkeySign := rec(rd-1, key.Interface())\n\t\t\t\tkeyTypeSign := rec(rd-1, fmt.Sprintf(\"%+v\", reflect.TypeOf(key.Interface())))\n\t\t\t\tval := rmap.MapIndex(key)\n\t\t\t\tvalSign := rec(rd-1, val.Interface())\n\t\t\t\tvalTypeSign := rec(rd-1, fmt.Sprintf(\"%+v\", reflect.TypeOf(val.Interface())))\n\t\t\t\thkey := fmt.Sprintf(\"%+v %+v\", keySign, keyTypeSign)\n\t\t\t\thval := fmt.Sprintf(\"%+v %+v\", valSign, valTypeSign)\n\t\t\t\thmap[hkey] = hval\n\t\t\t\tshkeys = append(shkeys, hkey)\n\t\t\t}\n\t\t\tsort.Strings(shkeys)\n\n\t\t\tfor _, hkey := range shkeys {\n\t\t\t\tksts := strings.Split(hkey, \" \")\n\t\t\t\tfor _, subsign := range ksts {\n\t\t\t\t\thalg.Write([]byte(fmt.Sprintf(\"%+v\", subsign)))\n\t\t\t\t}\n\n\t\t\t\tvsts := strings.Split(hmap[hkey], \" \")\n\t\t\t\tfor _, subsign := range vsts {\n\t\t\t\t\thalg.Write([]byte(fmt.Sprintf(\"%+v\", subsign)))\n\t\t\t\t}\n\t\t\t}\n\t\t} else {\n\t\t\thalg.Write([]byte(fmt.Sprintf(\"%+v\", val)))\n\t\t}\n\tcase reflect.Struct:\n\t\tif rd >= 0 {\n\t\t\trstruct := reflect.ValueOf(val)\n\t\t\tcnt := rstruct.NumField()\n\n\t\t\t// In `reflect`, Field() also behaves non-deterministically. It sucks.\n\t\t\t// One can not rely on uniqueness of field names, content or type,\n\t\t\t// but forced to sort by signature of value and type.\n\t\t\t// Otherwise, this behaviour causes unintended side-effects.\n\t\t\t// See also: https://golang.org/src/reflect/type.go?s=7347:7852#L199\n\t\t\tsvtkeys := make([]string, 0, cnt)\n\t\t\tfor i := 0; i < cnt; i++ {\n\t\t\t\tfield := rstruct.Field(i)\n\t\t\t\tvalSign := rec(rd-1, field.Interface())\n\t\t\t\ttypeSign := rec(rd-1, fmt.Sprintf(\"%+v\", field.Type()))\n\t\t\t\tsvtkey := fmt.Sprintf(\"%+v %+v\", valSign, typeSign)\n\t\t\t\tsvtkeys = append(svtkeys, svtkey)\n\t\t\t}\n\t\t\tsort.Strings(svtkeys)\n\n\t\t\tfor _, svtkey := range svtkeys {\n\t\t\t\tvsts := strings.Split(svtkey, \" \")\n\t\t\t\tfor _, subsign := range vsts {\n\t\t\t\t\thalg.Write([]byte(fmt.Sprintf(\"%+v\", subsign)))\n\t\t\t\t}\n\t\t\t}\n\t\t} else {\n\t\t\thalg.Write([]byte(fmt.Sprintf(\"%+v\", val)))\n\t\t}\n\tcase reflect.Ptr:\n\t\trptr := reflect.ValueOf(val)\n\t\trval := reflect.Indirect(rptr).Interface()\n\t\trkind := reflect.ValueOf(rval).Kind()\n\t\tif rkind == reflect.Array || rkind == reflect.Slice || rkind == reflect.Map || rkind == reflect.Struct {\n\t\t\tsubsign := rec(rd, rval)\n\t\t\thalg.Write([]byte(fmt.Sprintf(\"%+v\", subsign)))\n\t\t} else {\n\t\t\thalg.Write([]byte(fmt.Sprintf(\"%+v\", rptr.Interface())))\n\t\t}\n\tdefault:\n\t\thalg.Write([]byte(fmt.Sprintf(\"%+v\", val)))\n\t}\n\n\tsign = fmt.Sprintf(\"%x\", halg.Sum(nil))\n\n\ts = sign\n\n\treturn s\n}", "title": "" }, { "docid": "db249beef03757fbe84cfb8c7cdbb892", "score": "0.49461862", "text": "func GeneratorSignature(signature crypto.Digest, pk crypto.PublicKey) (crypto.Digest, error) {\n\ts := make([]byte, crypto.DigestSize*2)\n\tcopy(s[:crypto.DigestSize], signature[:])\n\tcopy(s[crypto.DigestSize:], pk[:])\n\treturn crypto.FastHash(s)\n}", "title": "" }, { "docid": "13623922cb37452d6813b5695102d48d", "score": "0.4939208", "text": "func (client *Client) signature(secretKey string) string {\n\tstringToSign := client.calculateStringToSignV2()\n\tsignature2 := SignV2(stringToSign, secretKey)\n\treturn signature2\n}", "title": "" }, { "docid": "311febeb24de1a598b99e998a9b4b36e", "score": "0.49391967", "text": "func (t Transaction) SigHash(i int) hash.Hash {\n\tvar signedData []byte\n\tif t.Signatures[i].CoveredFields.WholeTransaction {\n\t\tsignedData = append(signedData, encoding.MarshalAll(\n\t\t\tt.Inputs,\n\t\t\tt.MinerFees,\n\t\t\tt.Outputs,\n\t\t\tt.FileContracts,\n\t\t\tt.StorageProofs,\n\t\t\tt.ArbitraryData,\n\t\t\tt.Signatures[i].InputID,\n\t\t\tt.Signatures[i].PublicKeyIndex,\n\t\t\tt.Signatures[i].TimeLock,\n\t\t)...)\n\t} else {\n\t\tfor _, minerFee := range t.Signatures[i].CoveredFields.MinerFees {\n\t\t\tsignedData = append(signedData, encoding.Marshal(t.MinerFees[minerFee])...)\n\t\t}\n\t\tfor _, input := range t.Signatures[i].CoveredFields.Inputs {\n\t\t\tsignedData = append(signedData, encoding.Marshal(t.Inputs[input])...)\n\t\t}\n\t\tfor _, output := range t.Signatures[i].CoveredFields.Outputs {\n\t\t\tsignedData = append(signedData, encoding.Marshal(t.Outputs[output])...)\n\t\t}\n\t\tfor _, contract := range t.Signatures[i].CoveredFields.Contracts {\n\t\t\tsignedData = append(signedData, encoding.Marshal(t.FileContracts[contract])...)\n\t\t}\n\t\tfor _, storageProof := range t.Signatures[i].CoveredFields.StorageProofs {\n\t\t\tsignedData = append(signedData, encoding.Marshal(t.StorageProofs[storageProof])...)\n\t\t}\n\t\tfor _, arbData := range t.Signatures[i].CoveredFields.ArbitraryData {\n\t\t\tsignedData = append(signedData, encoding.Marshal(t.ArbitraryData[arbData])...)\n\t\t}\n\t}\n\n\tfor _, sig := range t.Signatures[i].CoveredFields.Signatures {\n\t\tsignedData = append(signedData, encoding.Marshal(t.Signatures[sig])...)\n\t}\n\n\treturn hash.HashBytes(signedData)\n}", "title": "" }, { "docid": "33ebdda40b619715d1ea2636ee8c5ab0", "score": "0.49382704", "text": "func SignatureNew(algConst int) *Signature {\n\tsignatureNew := libesigner.MustFindProc(\"SignatureNew\")\n\tr, _, _ := signatureNew.Call(uintptr(algConst))\n\treturn &Signature{r}\n}", "title": "" } ]
4dd43833e988976cfb3e4329249831a7
CheckHeader verifies that the given puller contains the given header
[ { "docid": "debf84283e9839e289e8891843062bfb", "score": "0.8209624", "text": "func CheckHeader(t *testing.T, puller helm.ChartPuller, key, value string) {\n\t// The header property is private so we need to use reflect to get its value\n\tresolver := puller.(*helm.OCIPuller).Resolver\n\tresolverValue := reflect.ValueOf(resolver)\n\theaderValue := reflect.Indirect(resolverValue).FieldByName(\"header\")\n\tgot := fmt.Sprintf(\"%v\", headerValue)\n\texpected := fmt.Sprintf(\"%s:[%s]\", key, value)\n\tif !strings.Contains(got, expected) {\n\t\tt.Errorf(\"Expecting %s to contain %s\", got, expected)\n\t}\n}", "title": "" } ]
[ { "docid": "5981e1da0496ccc56bb02d25d45d878c", "score": "0.71376806", "text": "func CheckHeader(header, regex string) Check {\n\tre := regexp.MustCompile(regex)\n\n\tf := func(resp *http.Response) bool {\n\t\tvalues := resp.Header.Values(header)\n\t\tif values == nil {\n\t\t\treturn false\n\t\t}\n\n\t\tfor i := range values {\n\t\t\tif re.MatchString(values[i]) {\n\t\t\t\treturn true\n\t\t\t}\n\t\t}\n\n\t\treturn false\n\t}\n\n\treturn f\n}", "title": "" }, { "docid": "373cd2f8ccbf8634d435b3108c3c8762", "score": "0.673122", "text": "func verifyHeader(hActual *http.Header, hMustBe *descriptor.Headers) error {\n\n\tfor k, v := range *hMustBe {\n\n\t\tvar msg string\n\n\t\tfound := hActual.Get(k)\n\n\t\tif len(strings.TrimSpace(found)) == 0 {\n\t\t\tmsg = fmt.Sprintf(\"The key %s is missing in the request header.\", k)\n\t\t\treturn errors.New(msg)\n\t\t}\n\n\t\tif found != v {\n\t\t\tmsg = fmt.Sprintf(\"The value %s of key %s is not equal to desired value %s.\", k, found, v)\n\t\t\treturn errors.New(msg)\n\t\t}\n\n\t}\n\n\treturn nil\n\n}", "title": "" }, { "docid": "5f66761e64bde7472b232e80a687291f", "score": "0.6699585", "text": "func headerCheck(w http.ResponseWriter, r *http.Request) {\n\theaders := map[string]string{\n\t\t\"X-Auth\": \"r8ewap98gfh4d8\",\n\t\t\"Keep-Alive\": \"300\",\n\t\t\"Accept\": \"application/vnd.coreos.ignition+json;version=3.4.0, */*;q=0.1\",\n\t\t\"Accept-Encoding\": \"identity\",\n\t}\n\n\tfor headerName, headerValue := range headers {\n\t\tif val, ok := r.Header[headerName]; ok {\n\t\t\tif val[0] != headerValue {\n\t\t\t\terrorHandler(w, headerName+\" header value is incorrect\")\n\t\t\t\treturn\n\t\t\t}\n\t\t} else {\n\t\t\terrorHandler(w, headerName+\" header is missing\")\n\t\t\treturn\n\t\t}\n\t}\n\n\tif val, ok := r.Header[\"User-Agent\"]; ok {\n\t\tif !strings.HasPrefix(val[0], \"Ignition/\") {\n\t\t\terrorHandler(w, \"User-Agent header value is incorrect\")\n\t\t\treturn\n\t\t}\n\t} else {\n\t\terrorHandler(w, \"User-Agent header is missing\")\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "a8b85b5653b7f2905fe834694516386b", "score": "0.64635265", "text": "func TestHeader(t *testing.T, r *http.Request, header string, expected string) {\n\tif actual := r.Header.Get(header); expected != actual {\n\t\tt.Errorf(\"Header %s = %s, expected %s\", header, actual, expected)\n\t}\n}", "title": "" }, { "docid": "55bcc93dd22eb456aae9dc2dcb7cc118", "score": "0.6409655", "text": "func (va *Validator) ValidateHeader(v base.HeaderValue, method base.Method, ur *base.URL,\n\taltURL *base.URL) error {\n\tif len(v) == 0 {\n\t\treturn fmt.Errorf(\"authorization header not provided\")\n\t}\n\tif len(v) > 1 {\n\t\treturn fmt.Errorf(\"authorization header provided multiple times\")\n\t}\n\n\tv0 := v[0]\n\n\tswitch {\n\tcase strings.HasPrefix(v0, \"Basic \"):\n\t\tinResponse := v0[len(\"Basic \"):]\n\n\t\ttmp, err := base64.StdEncoding.DecodeString(inResponse)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"wrong response\")\n\t\t}\n\t\ttmp2 := strings.Split(string(tmp), \":\")\n\t\tif len(tmp2) != 2 {\n\t\t\treturn fmt.Errorf(\"wrong response\")\n\t\t}\n\t\tuser, pass := tmp2[0], tmp2[1]\n\n\t\tif !va.userHashed {\n\t\t\tif user != va.user {\n\t\t\t\treturn fmt.Errorf(\"wrong response\")\n\t\t\t}\n\t\t} else {\n\t\t\tif sha256Base64(user) != va.user {\n\t\t\t\treturn fmt.Errorf(\"wrong response\")\n\t\t\t}\n\t\t}\n\n\t\tif !va.passHashed {\n\t\t\tif pass != va.pass {\n\t\t\t\treturn fmt.Errorf(\"wrong response\")\n\t\t\t}\n\t\t} else {\n\t\t\tif sha256Base64(pass) != va.pass {\n\t\t\t\treturn fmt.Errorf(\"wrong response\")\n\t\t\t}\n\t\t}\n\n\tcase strings.HasPrefix(v0, \"Digest \"):\n\t\tvar auth headers.Auth\n\t\terr := auth.Read(base.HeaderValue{v0})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif auth.Realm == nil {\n\t\t\treturn fmt.Errorf(\"realm not provided\")\n\t\t}\n\n\t\tif auth.Nonce == nil {\n\t\t\treturn fmt.Errorf(\"nonce not provided\")\n\t\t}\n\n\t\tif auth.Username == nil {\n\t\t\treturn fmt.Errorf(\"username not provided\")\n\t\t}\n\n\t\tif auth.URI == nil {\n\t\t\treturn fmt.Errorf(\"uri not provided\")\n\t\t}\n\n\t\tif auth.Response == nil {\n\t\t\treturn fmt.Errorf(\"response not provided\")\n\t\t}\n\n\t\tif *auth.Nonce != va.nonce {\n\t\t\treturn fmt.Errorf(\"wrong nonce\")\n\t\t}\n\n\t\tif *auth.Realm != va.realm {\n\t\t\treturn fmt.Errorf(\"wrong realm\")\n\t\t}\n\n\t\tif *auth.Username != va.user {\n\t\t\treturn fmt.Errorf(\"wrong username\")\n\t\t}\n\n\t\turlString := ur.String()\n\n\t\tif *auth.URI != urlString {\n\t\t\t// do another try with the alternative URL\n\t\t\tif altURL != nil {\n\t\t\t\turlString = altURL.String()\n\t\t\t}\n\n\t\t\tif *auth.URI != urlString {\n\t\t\t\treturn fmt.Errorf(\"wrong url\")\n\t\t\t}\n\t\t}\n\n\t\tresponse := md5Hex(md5Hex(va.user+\":\"+va.realm+\":\"+va.pass) +\n\t\t\t\":\" + va.nonce + \":\" + md5Hex(string(method)+\":\"+urlString))\n\n\t\tif *auth.Response != response {\n\t\t\treturn fmt.Errorf(\"wrong response\")\n\t\t}\n\n\tdefault:\n\t\treturn fmt.Errorf(\"unsupported authorization header\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "83595f3bdb788c4a6c67c26bb959f95f", "score": "0.6363958", "text": "func checkHeaders(h Headers, p string) error {\n\tif h == nil {\n\t\treturn EHDRNIL\n\t}\n\t// Length check\n\tif e := h.Validate(); e != nil {\n\t\treturn e\n\t}\n\t// Empty key / value check\n\tfor i := 0; i < len(h); i += 2 {\n\t\tif h[i] == \"\" {\n\t\t\treturn EHDRMTK\n\t\t}\n\t\tif p == SPL_10 && h[i+1] == \"\" {\n\t\t\treturn EHDRMTV\n\t\t}\n\t}\n\t// UTF8 check\n\tif p != SPL_10 {\n\t\t_, e := h.ValidateUTF8()\n\t\tif e != nil {\n\t\t\treturn e\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e05588d91877b17ce1e5de5b34fca9cc", "score": "0.6303079", "text": "func TestStandardConformingHeader(t *testing.T) {\n\tregex := regexp.MustCompile(headerMatch)\n\tif regex.Find(header) == nil {\n\t\tt.Errorf(\"Header %s does not match required regex.\\n\", header)\n\t}\n}", "title": "" }, { "docid": "defa70dcbc5d57be0cd8423184f02066", "score": "0.6222087", "text": "func requestHasHeader(request *http.Request, header string) bool {\n\t_, found := request.Header[header]\n\treturn found\n}", "title": "" }, { "docid": "bf5f9f99e7a21e919ae9d1926cff8371", "score": "0.6171891", "text": "func headerMatcher(key string) (string, bool) {\n\tswitch key {\n\tcase \"X-User-Id\":\n\t\treturn key, true\n\tdefault:\n\t\treturn runtime.DefaultHeaderMatcher(key)\n\t}\n}", "title": "" }, { "docid": "f265e2f183d606ad31aac0e9eafd2aa9", "score": "0.6167092", "text": "func check_header() {\n\turl := \"http://localhost:8732/chains/main/blocks/head/header\"\n\tdata_dir := \"/home/tezos/.tezos-node\"\n\tlast_block := data_dir + \"/last_block\"\n\tresync := data_dir + \"/resync\"\n\tbody := getBody(url)\n\n\t// Parse the JSON\n\tvar header Header\n\terr := json.Unmarshal(body, &header)\n\tcheckError(err)\n\n\t// Get last block\n\tdata, err := ioutil.ReadFile(last_block)\n\tif err == nil {\n\t\tif string(data) == strconv.Itoa(header.Level) {\n\t\t\t// Don't overwrite file in case it has been acknowledged\n\t\t\t_, err := os.Stat(resync)\n\t\t\tif os.IsNotExist(err) {\n\t\t\t\terr = ioutil.WriteFile(resync, []byte(\"\"), 0644)\n\t\t\t\tcheckError(err)\n\t\t\t}\n\t\t\tlog.Fatal(\"Block level has not changed!\")\n\t\t} else {\n\t\t\tos.Remove(resync)\n\t\t}\n\t}\n\n\t// Write last block state\n\terr = ioutil.WriteFile(last_block, []byte(strconv.Itoa(header.Level)), 0644)\n\tcheckError(err)\n\tfmt.Println(\"Current block level is now\", header.Level)\n}", "title": "" }, { "docid": "b38846e99f1065f8f39512765ad4d045", "score": "0.61321926", "text": "func (g GHTTPWithGomega) VerifyHeader(header http.Header) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, req *http.Request) {\n\t\tfor key, values := range header {\n\t\t\tkey = http.CanonicalHeaderKey(key)\n\t\t\tg.gomega.Expect(req.Header[key]).Should(Equal(values), \"Header mismatch for key: %s\", key)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "0fa507aa2882933ef8b9357e9b46f60c", "score": "0.60995805", "text": "func verifyUrtpHeader(header []byte) bool {\n var isHeader bool\n\n if len(header) >= URTP_HEADER_SIZE {\n if header[0] == SYNC_BYTE {\n if header[1] < MAX_NUM_AUDIO_CODING_SCHEMES {\n bytesOfPayload := ((int(header[URTP_NUM_BYTES_AUDIO_OFFSET]) << 8) + (int(header[URTP_NUM_BYTES_AUDIO_OFFSET + 1])))\n if bytesOfPayload <= URTP_DATAGRAM_MAX_SIZE {\n isHeader = true;\n } else {\n log.Printf(\"NOT a URTP header %x (%d (0x%x, in the last two bytes) is larger than the maximum number of payload bytes (%d)).\\n\", header,\n bytesOfPayload, bytesOfPayload, URTP_DATAGRAM_MAX_SIZE)\n }\n } else {\n log.Printf(\"NOT a URTP header %x (0x%x in the second byte is not a valid audio coding scheme).\\n\", header, header[1])\n }\n } else {\n log.Printf(\"NOT a URTP header %x (0x%x at the start is not a sync byte (%x)).\\n\", header, header[0], SYNC_BYTE)\n }\n } else {\n log.Printf(\"NOT a URTP header %x (must be at least %d bytes long).\\n\", header, URTP_HEADER_SIZE)\n }\n\n return isHeader\n}", "title": "" }, { "docid": "bd4c523537790ecfb755f70dbf1d0df3", "score": "0.6092056", "text": "func (rr *ResponseRecorder) AssertHeader(name string, want string) {\n\tif got := rr.Header().Get(name); got != want {\n\t\trr.t.Errorf(\"header %s: got: %s, want: %s\", name, got, want)\n\t}\n}", "title": "" }, { "docid": "4eeb604868a4b62cc8d7dceb67f8273f", "score": "0.6083286", "text": "func HeaderIdentifierCheck(bizMsgIdr string, msgDefIdr string, msgType string) error {\n\tmsgDefIdr = strings.TrimSpace(strings.ToUpper(msgDefIdr))\n\tbizMsgIdr = strings.TrimSpace(strings.ToUpper(bizMsgIdr))\n\tmsgType = strings.TrimSpace(strings.ToUpper(msgType))\n\n\tif msgDefIdr != msgType {\n\t\treturn errors.New(\"MsgDefIdr does not match the actual message type\")\n\t}\n\n\tr := regexp.MustCompile(`^B([12]\\d{3}(0[1-9]|1[0-2])(0[1-9]|[12]\\d|3[01]))[A-Z0-9]{11}[B,H,G]{1}[A-Z]{2}[0-9]{7}$`)\n\tif !r.MatchString(bizMsgIdr) {\n\t\treturn errors.New(\"BizMsgIdr value format is incorrect\")\n\t}\n\n\tfor _, n := range constant.SUPPORT_MESSAGE_TYPES {\n\t\tif msgDefIdr == strings.ToUpper(n) {\n\t\t\treturn nil\n\t\t}\n\t}\n\treturn errors.New(\"MsgDefIdr value format is incorrect\")\n}", "title": "" }, { "docid": "4e17c5736e313247868af93ec7d76ff1", "score": "0.6053219", "text": "func (h Header) Check() error {\n\tif len(h.Options)%4 != 0 || int(h.IHL) != 5+len(h.Options)/4 {\n\t\treturn ErrInvalidIHL\n\t} else if int(h.IHL)*4 > int(h.TotalLength) {\n\t\treturn ErrInvalidTotalLength\n\t} else if h.CalculateChecksum() != h.Checksum {\n\t\treturn ErrInvalidChecksum\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8cb8cdb40bd3fe982453573684930c19", "score": "0.60425663", "text": "func (beacon *Beacon) verifyHeader(chain consensus.ChainHeaderReader, header, parent *model.Header) error {\n\t// Ensure that the header's extra-data section is of a reasonable size\n\tif len(header.Extra) > 32 {\n\t\treturn fmt.Errorf(\"extra-data longer than 32 bytes (%d)\", len(header.Extra))\n\t}\n\t// Verify the seal parts. Ensure the nonce and uncle hash are the expected value.\n\tif header.Nonce != beaconNonce {\n\t\treturn errInvalidNonce\n\t}\n\tif header.UncleHash != model.EmptyUncleHash {\n\t\treturn errInvalidUncleHash\n\t}\n\t// Verify the block's difficulty to ensure it's the default constant\n\tif beaconDifficulty.Cmp(header.Difficulty) != 0 {\n\t\treturn fmt.Errorf(\"invalid difficulty: have %v, want %v\", header.Difficulty, beaconDifficulty)\n\t}\n\t// Verify that the gas limit is <= 2^63-1\n\tif header.GasLimit > config.MaxGasLimit {\n\t\treturn fmt.Errorf(\"invalid gasLimit: have %v, max %v\", header.GasLimit, config.MaxGasLimit)\n\t}\n\t// Verify that the gasUsed is <= gasLimit\n\tif header.GasUsed > header.GasLimit {\n\t\treturn fmt.Errorf(\"invalid gasUsed: have %d, gasLimit %d\", header.GasUsed, header.GasLimit)\n\t}\n\t// Verify that the block number is parent's +1\n\tif diff := new(big.Int).Sub(header.Number, parent.Number); diff.Cmp(common.Big1) != 0 {\n\t\treturn consensus.ErrInvalidNumber\n\t}\n\t// Verify the header's EIP-1559 attributes.\n\treturn misc.VerifyEip1559Header(chain.Config(), parent, header)\n}", "title": "" }, { "docid": "2d1a6cd026aaece50bace679436e7872", "score": "0.60336035", "text": "func checkHeaderValue(value string) bool {\n\tindex, hit := checkHeaderValuePrefix(value)\n\tif hit {\n\t\tif checkHeaderValueContent(value[index+1:]) {\n\t\t\treturn true\n\t\t}\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "22da0f4eeb5131043b800338b62a8e27", "score": "0.60183674", "text": "func (auth *AuthProxy) HasHeader() bool {\n\treturn len(auth.header) != 0\n}", "title": "" }, { "docid": "e0d068bfe234f6fb044b83c425c3cc12", "score": "0.59725136", "text": "func (r *Response) AssertHeaderContains(key, expected string) {\n\trestore := r.assert.IncrCallstackOffset()\n\tdefer restore()\n\tvalue := r.AssertHeader(key)\n\tr.assert.Substring(expected, value, \"header value does not contain expected\")\n}", "title": "" }, { "docid": "ee60dd0f80ccbad1ed31a74c10a349bc", "score": "0.59411025", "text": "func (m *MockNode_FetchX509SVIDClient) Header() (metadata.MD, error) {\n\tret := m.ctrl.Call(m, \"Header\")\n\tret0, _ := ret[0].(metadata.MD)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "f32e64f88d17935ec209862216b786ed", "score": "0.59040546", "text": "func (m HTTPBasicAuth) CheckHeader(auth *AuthInfo, req *http.Request) (err *AuthErr) {\n\t// At this step, auth.AccessKey contains the Base64 encoded authentication string.\n\t// Let's extract the provided username and password.\n\taccess, berr := base64.StdEncoding.DecodeString(auth.AccessKey)\n\tif berr != nil {\n\t\treturn &AuthErr{Status: 401, Err: errors.New(\"could not base64 decode access string\")}\n\t}\n\n\tsplitauth := strings.Split(string(access), \":\")\n\tif len(splitauth) != 2 {\n\t\treturn &AuthErr{401, errors.New(\"invalid format for username and password\")}\n\t}\n\t// The format is correct, let's set the authInfo.\n\tauth.AccessKey = splitauth[0]\n\tauth.Secret = splitauth[1]\n\treturn\n}", "title": "" }, { "docid": "e2cfd16c208a083f73d7b89e16f4ff0e", "score": "0.5892391", "text": "func (response *Response) HasHeaderValue(\n\theader string, has string,\n) (string, bool) {\n\thas = strings.ToLower(has)\n\n\tfor _, value := range response.GetHeaderValues(header) {\n\t\tkeyval := append(strings.Split(value, \"=\"), \"\")\n\t\tkey, value := keyval[0], keyval[1]\n\n\t\tif strings.ToLower(key) == has {\n\t\t\treturn value, true\n\t\t}\n\t}\n\n\treturn \"\", false\n}", "title": "" }, { "docid": "9329a80a4ed7f67b4ca06b5f99da88c2", "score": "0.5882609", "text": "func (h Header) Check() bool {\n\tif h.Magic != MagicNumber {\n\t\treturn false\n\t}\n\n\tif h.Version.Major != VersionMajor {\n\t\treturn false\n\t}\n\n\tif checksum, err := h.checksum(); h.Checksum != checksum || err != nil {\n\t\treturn false\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "e74e310e891813fdfc74b6f3ca3a1619", "score": "0.5868868", "text": "func HeaderValid() string {\n\treturn \"Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpZCI6MSwidSI6ImpvaG5kb2UiLCJlIjoiam9obmRvZUBtYWlsLmNvbSIsInIiOjEsImMiOjEsImwiOjEsImV4cCI6NDEwOTMyMDg5NCwiaWF0IjoxNTE2MjM5MDIyfQ.8Fa8mhshx3tiQVzS5FoUXte5lHHC4cvaa_tzvcel38I\"\n}", "title": "" }, { "docid": "4b1ef0ffd8e810b466c62ea534204de3", "score": "0.58397025", "text": "func isHeaderLine(line string) bool {\n\treturn strings.HasPrefix(strings.TrimSpace(line), `#==[`)\n}", "title": "" }, { "docid": "150b045e71b522f3e86e9d5eb7401d9c", "score": "0.5833733", "text": "func checkHeaderText(headerText string) {\n\tif strings.ContainsAny(headerText, \"\\n\\r\") {\n\t\tpanic(\"Possible Email header injection: \" + headerText)\n\t}\n}", "title": "" }, { "docid": "074e4c95d1052cfa6c47937aaadb758a", "score": "0.5829051", "text": "func (h *Handler) Check(req events.Request) bool {\n\treturn req.Headers[headerName] != \"\"\n}", "title": "" }, { "docid": "6a8826a009959ed19753c2fe7e3a34d2", "score": "0.57965213", "text": "func (res *DkvResponse) PullHeader(r *bufio.Reader) error {\n\tline, _, err := r.ReadLine()\n\tif err != nil {\n\t\treturn nil\n\t}\n\tarr := strings.Split(string(line), \" \")\n\tres.Version = arr[0]\n\tres.Status = arr[1]\n\treturn nil\n}", "title": "" }, { "docid": "79376b8a276c1bdf1979a75172fb2545", "score": "0.5752758", "text": "func checkExistsString(headers map[string]interface{}, name string) (string, error) {\n\treturn checkExistsStringWhat(headers, name, \"header\")\n}", "title": "" }, { "docid": "da0f3cdc289f3a8904e20718b94a7402", "score": "0.57387555", "text": "func singleHeader(r *http.Request, name string) (string, bool) {\n\tvalues, ok := r.Header[name]\n\tif !ok {\n\t\treturn \"\", false\n\t}\n\tif len(values) != 1 {\n\t\treturn \"\", false\n\t}\n\treturn values[0], true\n}", "title": "" }, { "docid": "1381e5b634086a3284f1e91a9a8b7810", "score": "0.5729664", "text": "func InvalidCLHeader(URL string, postData string, contentType string, HTTPv string, path string, method string) []bool {\n\tfmt.Println(\"Checking for CL header as Content_Length...\")\n\tr := TCPeditor{}\n\tr.Server = URL\n\tr.Host = URL\n\tr.Method = method\n\tr.Path = path\n\tr.HttpVersion = HTTPv\n\tr.Body = postData\n\tr.Headers = []string{\"Content-Type: \" + contentType, \"Content_Length: \" + strconv.Itoa(len(postData))}\n\tsc, res := r.MakeRequest()\n\n\tdefer fmt.Println(\"Done...\")\n\tif sc == \"200\" {\n\t\tif strings.Contains(res, \"input2=Testing, input3=Fuzzer\") {\n\t\t\treturn []bool{true, true}\n\t\t}\n\t}\n\treturn []bool{false, HitsServer(sc, res)}\n}", "title": "" }, { "docid": "7a24f47b9e5a731d427ead9e2c316a29", "score": "0.57092446", "text": "func validateAuthHeaderFormat(t *string) (bool, error) {\n\n\tsplitToken := strings.Split(*t, \"Bearer\")\n\n\tif len(splitToken) != 2 {\n\t\treturn false, errors.New(\"Auth header is missing or not in a proper format\")\n\t}\n\n\t*t = strings.TrimSpace(splitToken[1])\n\treturn true, nil\n\n}", "title": "" }, { "docid": "9a7ba429fd6056f2660f3c37e74c17f9", "score": "0.57088536", "text": "func readHeader(r io.Reader, h *header, version int) error {\n\tbuf := make([]byte, headerSize(version))\n\t_, err := r.Read(buf)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif version == 1 {\n\t\tbuf = append(buf, \"sha1\"...)\n\t}\n\n\treturn binary.Read(bytes.NewBuffer(buf), binary.BigEndian, h)\n}", "title": "" }, { "docid": "1759da5297c017b6e2a9aae908e81950", "score": "0.56879026", "text": "func (r *Response) AssertHeader(key string) string {\n\trestore := r.assert.IncrCallstackOffset()\n\tdefer restore()\n\tr.assert.NotEmpty(r.Header, \"response contains no header\")\n\tvalue, ok := r.Header[key]\n\tr.assert.True(ok, \"header '\"+key+\"' not found\")\n\treturn value\n}", "title": "" }, { "docid": "9346ab1f5ba9e6d22585a3da5563a905", "score": "0.56703514", "text": "func headerMatch(req *http.Request, name string, value string) bool {\n\tname = http.CanonicalHeaderKey(name)\n\tvalue = strings.ToLower(value)\n\n\tif header := req.Header[name]; header != nil {\n\t\tfor _, hv := range header {\n\t\t\tif value == strings.ToLower(hv) {\n\t\t\t\treturn true\n\t\t\t}\n\t\t}\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "a8a82577444efc690600bec2a60c26c7", "score": "0.56206167", "text": "func (beacon *Beacon) VerifyHeader(chain consensus.ChainHeaderReader, header *model.Header, seal bool) error {\n\treached, _ := IsTTDReached(chain, header.ParentHash, header.Number.Uint64()-1)\n\tif !reached {\n\t\treturn beacon.ethone.VerifyHeader(chain, header, seal)\n\t}\n\t// Short circuit if the parent is not known\n\tparent := chain.GetHeader(header.ParentHash, header.Number.Uint64()-1)\n\tif parent == nil {\n\t\treturn consensus.ErrUnknownAncestor\n\t}\n\t// Sanity checks passed, do a proper verification\n\treturn beacon.verifyHeader(chain, header, parent)\n}", "title": "" }, { "docid": "2decd476bcbc8a3e8112a592ed8e94d0", "score": "0.5615827", "text": "func hasTarHeader(buf []byte) bool {\n\tif len(buf) < tarBlockSize {\n\t\treturn false\n\t}\n\n\tb := buf[148:156]\n\tb = bytes.Trim(b, \" \\x00\") // clean up all spaces and null bytes\n\tif len(b) == 0 {\n\t\treturn false // unknown format\n\t}\n\thdrSum, err := strconv.ParseUint(string(b), 8, 64)\n\tif err != nil {\n\t\treturn false\n\t}\n\n\t// According to the go official archive/tar, Sun tar uses signed byte\n\t// values so this calcs both signed and unsigned\n\tvar usum uint64\n\tvar sum int64\n\tfor i, c := range buf {\n\t\tif 148 <= i && i < 156 {\n\t\t\tc = ' ' // checksum field itself is counted as branks\n\t\t}\n\t\tusum += uint64(uint8(c))\n\t\tsum += int64(int8(c))\n\t}\n\n\tif hdrSum != usum && int64(hdrSum) != sum {\n\t\treturn false // invalid checksum\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "24f7d37d51064a6e89358ba6c223dc6d", "score": "0.56034565", "text": "func ParseReportOnlyHeader(resp *http.Response) *Header {\n\tif resp == nil {\n\t\treturn nil\n\t}\n\n\t// only make a header when using TLS\n\tif resp.TLS == nil {\n\t\treturn nil\n\t}\n\n\tv, ok := resp.Header[\"Public-Key-Pins-Report-Only\"]\n\tif !ok {\n\t\treturn nil\n\t}\n\n\t// use the first header per RFC\n\treturn populate(&Header{}, v[0])\n}", "title": "" }, { "docid": "9640d66db31898f78a408e6d16332250", "score": "0.55963665", "text": "func readHeader(r io.Reader, length *int64) (int, error) {\n\tbuf := make([]byte, len(header), len(header))\n\n\tn, err := r.Read(buf)\n\n\tif n != len(header) || err != nil {\n\t\treturn n, fmt.Errorf(\"Error reading header. The header bust be \\\"%v\\\" with a lenght of %v. Readed %v bytes. Error was: %v\\n\", header, len(header), n, err)\n\t}\n\n\theader := string(buf)\n\n\tif header != header {\n\t\treturn n, fmt.Errorf(\"The reader header %v is not SPLICE\", header)\n\t}\n\n\terr = binary.Read(r, binary.BigEndian, length)\n\n\treturn headerLenght, err\n}", "title": "" }, { "docid": "20206212a0afc77bff0bcd8a2d95000a", "score": "0.5583538", "text": "func ( h Header ) Exists( name string ) bool {\n\t_, exists := h[ name ]\n\treturn exists\n}", "title": "" }, { "docid": "4f5632ba41aa1bc213251f68ea10d542", "score": "0.55829084", "text": "func TestGetHeader(t *testing.T) {\n\thttpRequest, _ := http.NewRequest(\"GET\", \"/\", nil)\n\thttpRequest.Header.Set(\"X-Test-Header\", \"yes\")\n\n\trequest := NewRequest(httpRequest)\n\n\tif request.GetHeader(\"X-Test-Header\") != \"yes\" {\n\t\tt.Fail()\n\t}\n}", "title": "" }, { "docid": "4ef6262b405a2bc7f560ac2ee2f5cca2", "score": "0.5581751", "text": "func preProcessorIsValidWithHeaderRow(p preProcessor, d sheetDetails) error {\n\tsheetHeaderColIndices := d.headerExcelColumnIndices()\n\tfor taggedHeader := range p.headerFieldMap {\n\t\tindices, ok := sheetHeaderColIndices[taggedHeader]\n\t\tif !ok {\n\t\t\treturn ErrTaggedHeaderDNEInData\n\t\t}\n\t\tif len(indices) > 1 {\n\t\t\treturn ErrTaggedHeaderNotUnique\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "2029d12a18076e6d43148775bf6ca3ff", "score": "0.55807346", "text": "func isReflectHeader(t types.Type) bool {\n\tif named, ok := t.(*types.Named); ok {\n\t\tif obj := named.Obj(); obj.Pkg() != nil && obj.Pkg().Path() == \"reflect\" {\n\t\t\tswitch obj.Name() {\n\t\t\tcase \"SliceHeader\", \"StringHeader\":\n\t\t\t\treturn true\n\t\t\t}\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "e26746549001f96ac93a9ee8c6f1a192", "score": "0.55697393", "text": "func (m *Manifest) CheckHeaderIsValid() error {\n\tif m.Header.Format == 0 {\n\t\treturn errors.New(\"manifest format not set\")\n\t}\n\n\tif m.Header.Version == 0 {\n\t\treturn errors.New(\"manifest has version zero, version must be positive\")\n\t}\n\n\tif m.Header.Version < m.Header.Previous {\n\t\treturn errors.New(\"version is smaller than previous\")\n\t}\n\n\tif m.Header.FileCount == 0 {\n\t\treturn errors.New(\"manifest has a zero file count\")\n\t}\n\n\tif m.Header.ContentSize == 0 {\n\t\treturn errors.New(\"manifest has zero contentsize\")\n\t}\n\n\tif m.Header.TimeStamp.IsZero() {\n\t\treturn errors.New(\"manifest timestamp not set\")\n\t}\n\n\t// Includes are not required.\n\treturn nil\n}", "title": "" }, { "docid": "228176d9619a9b69c033aa152f608e2d", "score": "0.55657315", "text": "func redirectedHeaderCheck(w http.ResponseWriter, r *http.Request) {\n\tif _, ok := r.Header[\"X-Auth\"]; ok {\n\t\terrorHandler(w, \"Found redundant header X-Auth\")\n\t\treturn\n\t}\n\n\tif _, ok := r.Header[\"Keep-Alive\"]; ok {\n\t\terrorHandler(w, \"Found redundant header Keep-Alive\")\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "7c4f9fbb6db43d0881f8d9bf0f557cce", "score": "0.5564649", "text": "func (m *MockApp_QueryClient) Header() (metadata.MD, error) {\n\tret := m.ctrl.Call(m, \"Header\")\n\tret0, _ := ret[0].(metadata.MD)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "f7cf2df707eb9e68da411eb3df1f7edb", "score": "0.55498713", "text": "func (d *Dkim) Header(line string) Status {\n\tdata := []byte(line)\n\treturn Status(C.dkim_header(d.dkim, (*C.u_char)(unsafe.Pointer(&data[0])), C.size_t(len(data))))\n}", "title": "" }, { "docid": "c883b8e8d33b0e461ae7ef99932f93b7", "score": "0.55387247", "text": "func Header(req events.APIGatewayProxyRequest, name string) string {\n\tfor k, v := range req.Headers {\n\t\tif strings.ToLower(k) == strings.ToLower(name) {\n\t\t\treturn v\n\t\t}\n\t}\n\n\treturn \"\"\n}", "title": "" }, { "docid": "e11161632a1c560de1d09ab76de9c37b", "score": "0.5537013", "text": "func (m *MockNode_AttestClient) Header() (metadata.MD, error) {\n\tret := m.ctrl.Call(m, \"Header\")\n\tret0, _ := ret[0].(metadata.MD)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "6c992512f37771fe609ff864ee20176a", "score": "0.55360836", "text": "func (m *MockHello_DuplexstreamClient) Header() (metadata.MD, error) {\n\tret := m.ctrl.Call(m, \"Header\")\n\tret0, _ := ret[0].(metadata.MD)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "7eb0e51cdebf1c0f47970448cb350ad5", "score": "0.5526906", "text": "func checkHeaderEqual(headerA, headerB wire.BlockHeader) error {\n\tif headerA.Version != headerB.Version {\n\t\treturn fmt.Errorf(\"block header Version mismatch: %v != %v\", headerA.Version, headerB.Version)\n\t}\n\n\tif !headerA.PrevBlock.IsEqual(&headerB.PrevBlock) {\n\t\treturn fmt.Errorf(\"block header PrevBlock mismatch: %v != %v\", headerA.PrevBlock, headerB.PrevBlock)\n\t}\n\n\tif !headerA.MerkleRoot.IsEqual(&headerB.MerkleRoot) {\n\t\treturn fmt.Errorf(\"block header MerkleRoot mismatch: %v != %v\", headerA.MerkleRoot, headerB.MerkleRoot)\n\t}\n\n\tif !headerA.Timestamp.Equal(headerB.Timestamp) {\n\t\treturn fmt.Errorf(\"block header Timestamp mismatch: %v != %v\", headerA.Timestamp, headerB.Timestamp)\n\t}\n\n\tif headerA.Bits != headerB.Bits {\n\t\treturn fmt.Errorf(\"block header Bits mismatch: %v != %v\", headerA.Bits, headerB.Bits)\n\t}\n\n\tif headerA.Nonce != headerB.Nonce {\n\t\treturn fmt.Errorf(\"block header Nonce mismatch: %v != %v\", headerA.Bits, headerB.Bits)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "967b581fc1f7722150574d4ea85781c1", "score": "0.55208355", "text": "func (d libraryDependencyTag) header() bool {\n\treturn d.Kind == headerLibraryDependency\n}", "title": "" }, { "docid": "49fb23659d29dac85f593c5fab919117", "score": "0.5514306", "text": "func checkHeaderDuplicates(ai AggregateInfo)(bool, string){\n\tdupMap := make(map[string]int)\n\tfor idx, header := range ai.Header(){\n\t\tif _, ok := dupMap[header]; ok {\n\t\t\treturn true, header\n\t\t}\n\t\tdupMap[header] = idx\n\t}\n\treturn false, \"\"\n}", "title": "" }, { "docid": "688015cf312f7c97183d5ed0820212df", "score": "0.5492853", "text": "func isHeader(row []string) bool {\n\treturn strings.Join(row, \",\") == DefaultHeader\n}", "title": "" }, { "docid": "5d6a2d2ac898e2dc4b8acae723e5cc82", "score": "0.5491369", "text": "func IsVbriHeader(frame *MP3Frame) bool {\n\n\t// The VBRI header begins after a fixed 32-byte offset. We also need to\n\t// allow 4 bytes for the frame header.\n\tid := frame.RawBytes[36 : 36+4]\n\n\tif bytes.Equal(id, []byte(\"VBRI\")) {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "8db3dfa922ade25fe9c0d0860bf9c48c", "score": "0.5485543", "text": "func headerContains(header []string, value string) bool {\n\tfor _, h := range header {\n\t\tfor _, v := range strings.Split(h, \",\") {\n\t\t\tif strings.EqualFold(strings.TrimSpace(v), value) {\n\t\t\t\treturn true\n\t\t\t}\n\t\t}\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "6566a2105a91915e35ada917ca240039", "score": "0.5462089", "text": "func verifyStunHeaderMostSignificant2Bits(header []byte) bool {\n\treturn (header[0] >> 6) == 0\n}", "title": "" }, { "docid": "89b00c254aa5853bbe1fb63d0916f7cd", "score": "0.5458748", "text": "func TestHeadersCompare(t *testing.T) {\n\tha := Headers{\"ka\", \"va\", \"kb\", \"vb\", \"kc\", \"vc\"}\n\thb := Headers{\"ka\", \"va\", \"kb\", \"vb\", \"kc\", \"vc\"}\n\thc := Headers{\"ka\", \"va\"}\n\thd := Headers{\"k1\", \"v1\", \"k2\", \"v2\", \"k3\", \"v3\"}\n\tb := ha.Compare(hb)\n\tif !b {\n\t\tt.Fatalf(\"CMP01 Expected true, got false\")\n\t}\n\tb = ha.Compare(hc)\n\tif b {\n\t\tt.Fatalf(\"CMP02 Expected false, got true\")\n\t}\n\tb = ha.Compare(hd)\n\tif b {\n\t\tt.Fatalf(\"CMP03 Expected false, got true\")\n\t}\n\tb = hd.Compare(ha)\n\tif b {\n\t\tt.Fatalf(\"CMP04 Expected false, got true\")\n\t}\n}", "title": "" }, { "docid": "050b4a4c621e779549026da5499497ce", "score": "0.5445773", "text": "func (c Content) SnortHTTPHeader() bool {\n\tfor _, o := range c.Options {\n\t\tif o.Name == \"http_header\" {\n\t\t\tif bytes.HasSuffix(c.Pattern, []byte(\"\\r\\n\\r\\n\")) {\n\t\t\t\treturn true\n\t\t\t}\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "5d410e9e1032c877ab64fc2412f23c1b", "score": "0.5433369", "text": "func (bc *BlockChain) HasHeader(hash common.Hash, number uint64) bool {\n\treturn bc.hc.HasHeader(hash, number)\n}", "title": "" }, { "docid": "84eb7e75585ef147e7bd77abfa011acd", "score": "0.54166937", "text": "func (r *Rule) SnortHTTPHeader() bool {\n\tcs := r.Contents()\n\tif len(cs) < 1 {\n\t\treturn false\n\t}\n\tfor _, c := range cs {\n\t\tif c.SnortHTTPHeader() {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "312e8ae7ccc5af1482bbcbe0f25ecf29", "score": "0.5410942", "text": "func (m *MockRuntime_SubscribeConfigurationClient) Header() (metadata.MD, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Header\")\n\tret0, _ := ret[0].(metadata.MD)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "af4f452d36cd754acc49648ac0690c44", "score": "0.5406606", "text": "func (m *MockRuntime_GetFileClient) Header() (metadata.MD, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Header\")\n\tret0, _ := ret[0].(metadata.MD)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "a2dd3dc618f5ad77c35bc609f2b29b33", "score": "0.539131", "text": "func (cs *CSVReader) HasHeader() *CSVReader {\n\tif cs.doneinit {\n\t\tmsg := \"FromCSV: can't call HasHeader after beginning data read\"\n\t\tpanic(msg)\n\t}\n\tcs.hasheader = true\n\treturn cs\n}", "title": "" }, { "docid": "c808db4bc1270960e83423a58b67d52b", "score": "0.5380215", "text": "func isCommandHeader(line string) bool {\n\treturn strings.Contains(line, \"[ Command ]\")\n}", "title": "" }, { "docid": "ffd83a68ecfdd5b6feef8a0f542769e5", "score": "0.53799987", "text": "func (t TokenManager) HeaderRequired() bool {\n\treturn t.Required\n}", "title": "" }, { "docid": "eaceda2e6ba6e2acf541e107d9d75265", "score": "0.5365846", "text": "func HasHeaders(names []string, headers http.Header) bool {\n\tfor _, h := range names {\n\t\tif headers.Get(h) != \"\" {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "124f089bed36ccebfbb4a39ac5eb5b3f", "score": "0.5362892", "text": "func (m *MockImages_CreateImageClient) Header() (metadata.MD, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Header\")\n\tret0, _ := ret[0].(metadata.MD)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "7544270128687bdcbb4f0086c76e781c", "score": "0.53581893", "text": "func TestPermittedHeaderRegexp(t *testing.T) {\n\t// The syntax is http-request set-header <name> <fmt>. As per this http://cbonte.github.io/haproxy-dconv/2.6/configuration.html#4.2-http-request%20add-header\n\t// the format follows the log-format rules (see Custom Log Format in section 8.2.4) i.e http://cbonte.github.io/haproxy-dconv/2.6/configuration.html#8.2.4\n\t// The usage of it shall be as per section 8.2.6\n\t// However for dynamic values, req.hdr, res.hdr, ssl_c_der are the allowed fetchers and lower, base64 are the allowed converters.\n\ttype HeaderValueTest struct {\n\t\tdescription string\n\t\tvalidInput bool\n\t\tinput string\n\t}\n\n\ttests := []HeaderValueTest{\n\t\t{description: \"empty value\", input: ``, validInput: false},\n\t\t{description: \"single character\", input: `a`, validInput: true},\n\t\t{description: \"multiple characters\", input: `abc`, validInput: true},\n\t\t{description: \"multiple words without escaped space\", input: `abc def`, validInput: true},\n\t\t{description: \"multiple words with escaped space\", input: `abc\\ def`, validInput: true},\n\t\t{description: \"multiple words each word quoted\", input: `\"abc\"\\ \"def\"`, validInput: true},\n\t\t{description: \"multiple words each word quoted and with an embedded space\", input: `\"abc \"\\ \"def \"`, validInput: true},\n\t\t{description: \"multiple words each word one double quoted and other single quoted and with an embedded space\", input: `\"abc \"\\ 'def '`, validInput: true},\n\t\t{description: \"single % character\", input: `%`, validInput: false},\n\t\t{description: \"escaped % character\", input: `%%`, validInput: true},\n\t\t{description: \"escaped % and only a % character\", input: `%%%`, validInput: false},\n\t\t{description: \"two literal % characters\", input: `%%%%`, validInput: true},\n\t\t{description: \"zero percent\", input: `%%%%%%0`, validInput: true},\n\t\t{description: \"escaped expression\", input: `%%[XYZ.hdr(Host)]\\ %[XYZ.hdr(Host)]`, validInput: true},\n\t\t{description: \"simple empty expression\", input: `%[]`, validInput: false},\n\t\t{description: \"nested empty expressions\", input: `%[%[]]`, validInput: false},\n\t\t{description: \"empty quoted value\", input: `%{+Q}`, validInput: false},\n\t\t{description: \"quoted value\", input: `%{+Q}foo`, validInput: false},\n\t\t{description: \"quoted value\", input: `%{+Q} ssl_c_der`, validInput: false},\n\t\t{description: \"valid input\", input: `{+Q}[ssl_c_der,base64]`, validInput: true},\n\t\t{description: \"valid input\", input: `%{+Q}[ssl_c_der,base64]`, validInput: true},\n\n\t\t{description: \"hdr with empty field\", input: `%[XYZ.hdr()]`, validInput: false},\n\t\t{description: \"hdr with percent field\", input: `%[XYZ.hdr(%)]`, validInput: false},\n\t\t{description: \"hdr with known field\", input: `%[XYZ.hdr(Host)]`, validInput: true},\n\t\t{description: \"hdr with syntax error\", input: `%[XYZ.hdr(Host]`, validInput: false},\n\n\t\t{description: \"hdr with valid X-XSS-Protection value\", input: `1;mode=block`, validInput: true},\n\t\t{description: \"hdr with valid Content-Type value\", input: `text/plain,text/html`, validInput: true},\n\n\t\t{description: \"incomplete expression\", input: `%[req`, validInput: false},\n\t\t{description: \"quoted field\", input: `%[XYZ.hdr(%{+Q}Host)]`, validInput: false},\n\n\t\t// If the value has \"if foo\" in it, the string \"if foo\" will be taken literally as part of the value.\n\t\t// The router will quote the entire value so that the \"if foo\" is not interpreted as a conditional.\n\t\t{description: \"value with conditional expression\", input: `%[XYZ.hdr(Host)] if foo`, validInput: true},\n\t\t{description: \"value with what looks like a conditional expression\", input: `%[XYZ.hdr(Host)]\\ if\\ foo`, validInput: true},\n\n\t\t{description: \"unsupported fetcher and converter\", input: `%[date(3600),http_date]`, validInput: false},\n\t\t{description: \"not allowed sample fetchers\", input: `%[foo,lower]`, validInput: false},\n\t\t{description: \"not allowed converters\", input: `%[req.hdr(host),foo]`, validInput: false},\n\t\t{description: \"missing parentheses or braces `}`\", input: `%{Q[req.hdr(host)]`, validInput: false},\n\t\t{description: \"missing parentheses or braces `{`\", input: `%Q}[req.hdr(host)]`, validInput: false},\n\t\t{description: \"missing parentheses or braces `}`\", input: `%{{Q}[req.hdr(host)]`, validInput: false},\n\t\t{description: \"missing parentheses or braces `]`\", input: `%[req.hdr(host)`, validInput: false},\n\t\t{description: \"missing parentheses or braces `[`\", input: `%req.hdr(host)]`, validInput: false},\n\t\t{description: \"missing parentheses or braces `(`\", input: `%[req.hdrhost)]`, validInput: false},\n\t\t{description: \"missing parentheses or braces `)`\", input: `%[req.hdr(host]`, validInput: false},\n\t\t{description: \"missing parentheses or braces `)]`\", input: `%[req.hdr(host`, validInput: false},\n\t\t{description: \"missing parentheses or braces `[]`\", input: `%{req.hdr(host)}`, validInput: false},\n\t\t{description: \"parameters for a sample fetcher that doesn't take parameters\", input: `%[ssl_c_der(host)]`, validInput: false},\n\t\t{description: \"dangerous sample fetchers and converters\", input: `%[env(FOO)]`, validInput: false},\n\t\t{description: \"dangerous sample fetchers and converters\", input: `%[req.hdr(host),debug()]`, validInput: false},\n\t\t{description: \"extra comma\", input: `%[req.hdr(host),,lower]`, validInput: false},\n\n\t\t// CR and LF are not allowed in header value as per RFC https://datatracker.ietf.org/doc/html/rfc7230#section-3.2.4\n\t\t{description: \"carriage return\", input: \"\\r\", validInput: false},\n\t\t{description: \"CRLF\", input: \"\\r\\n\", validInput: false},\n\n\t\t// HAProxy does not interpret ${} syntax, so it is safe to have ${ in the value; it will be taken\n\t\t// literally as part of the header value.\n\t\t{description: \"environment variable with a bracket missing\", input: `${NET_COOLOCP_HOSTPRIMARY`, validInput: true},\n\t\t{description: \"value with conditional expression and env var\", input: `%[XYZ.hdr(Host)] if ${NET_COOLOCP_HOSTPRIMARY`, validInput: true},\n\t\t{description: \"value with what looks like a conditional expression and env var\", input: `%[XYZ.hdr(Host)]\\ if\\ ${NET_COOLOCP_HOSTPRIMARY`, validInput: true},\n\n\t\t{description: \"sample value\", input: `%ci:%cp [%tr] %ft %ac/%fc %[fc_err]/%[ssl_fc_err,hex]/%[ssl_c_err]/%[ssl_c_ca_err]/%[ssl_fc_is_resumed] %[ssl_fc_sni]/%sslv/%sslc`, validInput: false},\n\t\t{description: \"interpolation of T i.e %T\", input: `%T`, validInput: false},\n\n\t\t// url\n\t\t// regex does not check validity of url in a header value.\n\t\t{description: \"hdr with url\", input: `http:??//url/hack`, validInput: true},\n\n\t\t// spaces and tab\n\t\t// regex allows spaces before and after. The reason is that after a dynamic value is provided someone might provide a condition `%[XYZ.hdr(Host)] if foo` which would have\n\t\t// spaces after the dynamic value and if condition.\n\t\t// tab is rejected as control characters are not allowed by the regex.\n\t\t{description: \"space before and after the value\", input: ` T `, validInput: true},\n\t\t{description: \"double space before and after the value\", input: ` T `, validInput: true},\n\t\t{description: \"tab before and after the value\", input: \"\\tT\\t\", validInput: false},\n\t}\n\n\tvar requestTypes = []struct {\n\t\tdescription string\n\t\tregexp *regexp.Regexp\n\t\ttestInputSubstituter func(s string) string\n\t}{{\n\t\tdescription: \"request\",\n\t\tregexp: permittedRequestHeaderValueRE,\n\t\ttestInputSubstituter: func(s string) string { return strings.ReplaceAll(s, \"XYZ\", \"req\") },\n\t}, {\n\t\tdescription: \"response\",\n\t\tregexp: permittedResponseHeaderValueRE,\n\t\ttestInputSubstituter: func(s string) string { return strings.ReplaceAll(s, \"XYZ\", \"res\") },\n\t}}\n\n\tfor _, rt := range requestTypes {\n\t\tt.Run(rt.description, func(t *testing.T) {\n\t\t\tfor _, tc := range tests {\n\t\t\t\tt.Run(tc.description, func(t *testing.T) {\n\t\t\t\t\tinput := rt.testInputSubstituter(tc.input)\n\t\t\t\t\tif got := rt.regexp.MatchString(input); got != tc.validInput {\n\t\t\t\t\t\tt.Errorf(\"%q: expected %v, got %t\", input, tc.validInput, got)\n\t\t\t\t\t}\n\t\t\t\t})\n\t\t\t}\n\t\t})\n\t}\n}", "title": "" }, { "docid": "c3091418af7ddc68b216e0ebefe9d585", "score": "0.5357066", "text": "func (m *MockCfgMgmtService_NodeExportClient) Header() (metadata.MD, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Header\")\n\tret0, _ := ret[0].(metadata.MD)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "e42fec0c4998323537e758dc096b099d", "score": "0.5355011", "text": "func (m *headerMatcher) inspect(w http.ResponseWriter, expectedFS, expectedPL string) {\n\terr := func() error {\n\t\tif w == nil {\n\t\t\treturn fmt.Errorf(\"expected a non nil HTTP response\")\n\t\t}\n\n\t\tkey := flowcontrol.ResponseHeaderMatchedFlowSchemaUID\n\t\tif value := w.Header().Get(key); expectedFS != value {\n\t\t\treturn fmt.Errorf(\"expected HTTP header %s to have value %q, but got: %q\", key, expectedFS, value)\n\t\t}\n\n\t\tkey = flowcontrol.ResponseHeaderMatchedPriorityLevelConfigurationUID\n\t\tif value := w.Header().Get(key); expectedPL != value {\n\t\t\treturn fmt.Errorf(\"expected HTTP header %s to have value %q, but got %q\", key, expectedPL, value)\n\t\t}\n\t\treturn nil\n\t}()\n\tif err == nil {\n\t\treturn\n\t}\n\n\tm.lock.Lock()\n\tdefer m.lock.Unlock()\n\tm.errsGot = append(m.errsGot, err)\n}", "title": "" }, { "docid": "1c3cd9a01f80b20c4c999923d7bfd512", "score": "0.53291416", "text": "func Header(payload, name []byte) []byte {\n\tval, _, _, _ := header(payload, name)\n\n\treturn val\n}", "title": "" }, { "docid": "f0f76dcbaa495799a253667df79c7e41", "score": "0.53274834", "text": "func (s *Splice) readHeader(r io.Reader) error {\n\tvar err error\n\tif err = s.checkSignature(r); err != nil {\n\t\treturn err\n\t}\n\terr = binary.Read(r, binary.BigEndian, &s.BodyLength)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "92d2f76ec27c5cfc7a1a754c32080f11", "score": "0.5315116", "text": "func (c *Client) ValidateTokenHeader(req *http.Request) (bool, error) {\n\ttoken := req.Header.Get(\"token\")\n\t_, isValid, err := c.T.ValidateToken(token)\n\treturn isValid, err\n}", "title": "" }, { "docid": "246d690d56001af673dda515dd54072f", "score": "0.5314253", "text": "func (m *MockCfgMgmtService_ReportExportClient) Header() (metadata.MD, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Header\")\n\tret0, _ := ret[0].(metadata.MD)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "43ef360deb77cc60556957a824ff4637", "score": "0.53111064", "text": "func IsHeaderUserTag(code string) bool {\n\tfor _, c := range code {\n\t\tif ('a' <= c) && (c <= 'z') {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "1ae010cfffb3279d61ef5a2c1424b194", "score": "0.53036976", "text": "func TestServerSendsHeader(t *testing.T) {}", "title": "" }, { "docid": "a5263e1066923e72900078df289154fd", "score": "0.5296006", "text": "func ParseHeader(resp *http.Response) *Header {\n\tif resp == nil {\n\t\treturn nil\n\t}\n\n\t// only make a header when using TLS\n\tif resp.TLS == nil {\n\t\treturn nil\n\t}\n\n\tv, ok := resp.Header[\"Public-Key-Pins\"]\n\tif !ok {\n\t\treturn nil\n\t}\n\n\t// use the first header per RFC\n\treturn populate(&Header{}, v[0])\n}", "title": "" }, { "docid": "870a122d98fb352c6a74e5e050008c39", "score": "0.52955", "text": "func IsXingHeader(frame *MP3Frame) bool {\n\n\t// The Xing header begins directly after the side information block. We\n\t// also need to allow 4 bytes for the frame header.\n\toffset := 4 + getSideInfoSize(frame)\n\tid := frame.RawBytes[offset : offset+4]\n\n\tif bytes.Equal(id, []byte(\"Xing\")) || bytes.Equal(id, []byte(\"Info\")) {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "70e0200d9e147d2426e140f0495c24e5", "score": "0.52940524", "text": "func TestParseHeaders(t *testing.T) {\n\ttests := []struct {\n\t\tdesc string\n\t\tin []string\n\t\tout []Header\n\t\terr string\n\t}{\n\t\t{\n\t\t\tdesc: \"parse multiple headers\",\n\t\t\tin: []string{\n\t\t\t\t\"Host: example.com \",\n\t\t\t\t\"X-Teleport-Logins: root, {{internal.logins}}\",\n\t\t\t\t\"X-Env : {{external.env}}\",\n\t\t\t\t\"X-Env: env:prod\",\n\t\t\t\t\"X-Empty:\",\n\t\t\t},\n\t\t\tout: []Header{\n\t\t\t\t{Name: \"Host\", Value: \"example.com\"},\n\t\t\t\t{Name: \"X-Teleport-Logins\", Value: \"root, {{internal.logins}}\"},\n\t\t\t\t{Name: \"X-Env\", Value: \"{{external.env}}\"},\n\t\t\t\t{Name: \"X-Env\", Value: \"env:prod\"},\n\t\t\t\t{Name: \"X-Empty\", Value: \"\"},\n\t\t\t},\n\t\t},\n\t\t{\n\t\t\tdesc: \"invalid header format (missing value)\",\n\t\t\tin: []string{\"X-Header\"},\n\t\t\terr: `failed to parse \"X-Header\" as http header`,\n\t\t},\n\t\t{\n\t\t\tdesc: \"invalid header name (empty)\",\n\t\t\tin: []string{\": missing\"},\n\t\t\terr: `invalid http header name: \": missing\"`,\n\t\t},\n\t\t{\n\t\t\tdesc: \"invalid header name (space)\",\n\t\t\tin: []string{\"X Space: space\"},\n\t\t\terr: `invalid http header name: \"X Space: space\"`,\n\t\t},\n\t}\n\tfor _, test := range tests {\n\t\tt.Run(test.desc, func(t *testing.T) {\n\t\t\tout, err := ParseHeaders(test.in)\n\t\t\tif test.err != \"\" {\n\t\t\t\trequire.EqualError(t, err, test.err)\n\t\t\t} else {\n\t\t\t\trequire.NoError(t, err)\n\t\t\t\trequire.Equal(t, test.out, out)\n\t\t\t}\n\t\t})\n\t}\n}", "title": "" }, { "docid": "8453ac1d30e594b91e306e559a0782b3", "score": "0.52909696", "text": "func ParseHeader(reader *bufio.Reader) (hdr *Header, lines int, err error) {\n\thdr = NewHeader()\n\tvar sc StringScanner\n\tfor first := true; ; first = false {\n\t\tswitch data, err := reader.Peek(1); {\n\t\tcase err == io.EOF:\n\t\t\treturn hdr, lines, sc.err\n\t\tcase err != nil:\n\t\t\treturn hdr, lines, err\n\t\tcase data[0] != '@':\n\t\t\treturn hdr, lines, sc.err\n\t\t}\n\t\tbytes, err := reader.ReadSlice('\\n')\n\t\tlength := len(bytes)\n\t\tswitch {\n\t\tcase err == nil:\n\t\t\tlength--\n\t\tcase err != io.EOF:\n\t\t\treturn hdr, lines, err\n\t\t}\n\t\tlines++\n\t\tline := string(bytes[4:length])\n\t\tsc.Reset(line)\n\t\tswitch string(bytes[0:4]) {\n\t\tcase \"@HD\\t\":\n\t\t\tif !first {\n\t\t\t\treturn hdr, lines, errors.New(\"@HD line not in first line when parsing a SAM header\")\n\t\t\t}\n\t\t\thdr.HD = sc.ParseHeaderLine()\n\t\tcase \"@SQ\\t\":\n\t\t\thdr.SQ = append(hdr.SQ, sc.ParseHeaderLine())\n\t\tcase \"@RG\\t\":\n\t\t\thdr.RG = append(hdr.RG, sc.ParseHeaderLine())\n\t\tcase \"@PG\\t\":\n\t\t\thdr.PG = append(hdr.PG, sc.ParseHeaderLine())\n\t\tcase \"@CO\\t\":\n\t\t\thdr.CO = append(hdr.CO, line)\n\t\tdefault:\n\t\t\tswitch code := string(bytes[0:3]); {\n\t\t\tcase code == \"@CO\":\n\t\t\t\thdr.CO = append(hdr.CO, string(bytes[3:]))\n\t\t\tcase IsHeaderUserTag(code):\n\t\t\t\tif bytes[3] != '\\t' {\n\t\t\t\t\treturn hdr, lines, fmt.Errorf(\"Header code %v not followed by a tab when parsing a SAM header\", code)\n\t\t\t\t}\n\t\t\t\thdr.AddUserRecord(code, sc.ParseHeaderLine())\n\t\t\tdefault:\n\t\t\t\treturn hdr, lines, fmt.Errorf(\"Unknown SAM record type code %v\", code)\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "09ff96a83da158e54aef75c5bca0f153", "score": "0.5289773", "text": "func (s SSH) Identify(header []byte) bool {\n\t// first 3 bytes of 1.0/2.0 is literal `SSH`\n\tif bytes.Compare(header, []byte(\"SSH\")) == 0 {\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "36f277f932be75e54c8b4b4fb33f052f", "score": "0.5282706", "text": "func ValidateAuthorizationHeader(c *gin.Context) {\n\tauthorizationHeader := c.GetHeader(\"Authorization\")\n\tenvAuthorization := os.Getenv(\"REQ_VALIDATOR\")\n\n\tif authorizationHeader != envAuthorization {\n\t\tc.JSON(http.StatusForbidden, gin.H{\n\t\t\t\"error\": \"Request was not possible due to missing or invalid header\",\n\t\t})\n\t\treturn\n\t}\n\tlog.Println(\"Request authorized\")\n\tc.Next()\n}", "title": "" }, { "docid": "502946ced1e9677dc84c5c5859adaed2", "score": "0.52800304", "text": "func (m *MockEventFeedService_EventExportClient) Header() (metadata.MD, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Header\")\n\tret0, _ := ret[0].(metadata.MD)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "94d6c6a6f696eb54a013b9af6d71dbe5", "score": "0.5277731", "text": "func (clr *CSVLedgerRepository) parseHeaders(headers []string) error {\n\trequiredHeaderFound := make(map[string]bool)\n\tfor _, requiredHeader := range requiredHeaders {\n\t\trequiredHeaderFound[requiredHeader] = false\n\t}\n\tfor colIdx, header := range headers {\n\t\theader = cleanNonPrintable.ReplaceAllString(header, \"\")\n\t\tif _, ok := requiredHeaderFound[header]; ok {\n\t\t\trequiredHeaderFound[header] = true\n\t\t}\n\t\tclr.fieldColIndex[header] = colIdx\n\t}\n\n\tfieldsNotFound := make([]string, 0)\n\tfor requiredHeader, found := range requiredHeaderFound {\n\t\tif !found {\n\t\t\tfieldsNotFound = append(fieldsNotFound, requiredHeader)\n\t\t}\n\t}\n\tif len(fieldsNotFound) > 0 {\n\t\treturn LedgerRepositoryError{\n\t\t\tMessage: \"failed to find the following fields in the CSV: \" +\n\t\t\t\tfmt.Sprintf(\"%s\", fieldsNotFound),\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "4c6d3cf469d5711140e45afa38270d83", "score": "0.5271455", "text": "func (m *MockConnection_ConnectClient) Header() (metadata.MD, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Header\")\n\tret0, _ := ret[0].(metadata.MD)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "51f753deeaa13352aeba69cc24f5f901", "score": "0.5269885", "text": "func (h *Handler) RxHeader() bool {\n //h.DetectInit()\n b := h.WaitTillRxNonNull()\n h.RxTotal(h.headerbuf[1:],100)\n h.headerbuf[0] = b\n //fmt.Printf(\"% x \",h.headerbuf)\n //fmt.Printf(\"%d\\n\",h.header.DtNum)\n\n // Converting from bytes to Header and verifying\n h.header.ReadBytes(&(h.headerbuf[0]))\n if !h.header.IsOk() {\n return false\n }\n\n // updating the last dataframe number read\n h.DtNum = h.header.DtNum\n fmt.Println(h.header)\n return true\n}", "title": "" }, { "docid": "1174e6c70c85db53615e203fec982f3f", "score": "0.52660936", "text": "func CheckAndWriteHeader(e error, w http.ResponseWriter, status int) {\n\tif err != nil {\n\t\tw.WriteHeader(status)\n\t\tfmt.Fprintf(w, err.Error())\n\t}\n}", "title": "" }, { "docid": "de3b3b892591658def366546bf25de40", "score": "0.526107", "text": "func checkCorrupt(file *os.File) (*header, error) {\n\tlength, err := fileLength(file)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif length == 0 {\n\t\treturn nil, err\n\t}\n\t_, err = file.Seek(0, io.SeekStart)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\theader := &header{}\n\tcurrentOffset := int64(0)\n\tversion, err := ReadInt(file, currentOffset)\n\tcurrentOffset += 4\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif version != MagicVersionNumber {\n\t\treturn nil, CorruptVersionError\n\t}\n\theader.version = version\n\t// TODO(chermehdi): Use the flags\n\tflags, err := ReadInt(file, currentOffset)\n\tcurrentOffset += 4\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\theader.flags = flags\n\n\telementCount, err := ReadLong(file, currentOffset)\n\tcurrentOffset += 8\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\theader.elementCount = elementCount\n\n\theadOffset, err := ReadLong(file, currentOffset)\n\tcurrentOffset += 8\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\ttailOffset, err := ReadLong(file, currentOffset)\n\tcurrentOffset += 8\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\theader.head = &elementPtr{\n\t\toffset: headOffset,\n\t\tlength: 0,\n\t}\n\theader.tail = &elementPtr{\n\t\toffset: tailOffset,\n\t\tlength: 0,\n\t}\n\theadLength, err := ReadLong(file, headOffset)\n\tif err == nil {\n\t\theader.head.length = headLength\n\t}\n\ttailLength, err := ReadLong(file, tailOffset)\n\tif err == nil {\n\t\theader.tail.length = tailLength\n\t}\n\treturn header, nil\n}", "title": "" }, { "docid": "ea767604ca5d3f140c9a52b9d2f843f6", "score": "0.5259416", "text": "func ExtractHeader(block []byte, checkHeight uint64) (*Header, blockdigest.Digest, []byte, error) {\n\tif len(block) < totalBlockSize {\n\t\treturn nil, blockdigest.Digest{}, nil, fault.ErrInvalidBlockHeaderSize\n\t}\n\tpackedHeader := PackedHeader{}\n\tcopy(packedHeader[:], block[:totalBlockSize])\n\n\theader, err := packedHeader.Unpack()\n\tif nil != err {\n\t\treturn nil, blockdigest.Digest{}, nil, err\n\t}\n\n\tif checkHeight > 0 && header.Number != checkHeight {\n\t\treturn nil, blockdigest.Digest{}, nil, fault.ErrHeightOutOfSequence\n\t}\n\n\tvar digest blockdigest.Digest\n\tif storage.Pool.BlockHeaderHash != nil {\n\t\tthisBlockNumberKey := make([]byte, 8)\n\t\tbinary.BigEndian.PutUint64(thisBlockNumberKey, header.Number)\n\t\tdigestBytes := storage.Pool.BlockHeaderHash.Get(thisBlockNumberKey)\n\t\tif err := blockdigest.DigestFromBytes(&digest, digestBytes); err != nil {\n\t\t\tdigest = blockdigest.NewDigest(packedHeader[:])\n\t\t}\n\t} else {\n\t\tdigest = blockdigest.NewDigest(packedHeader[:])\n\t}\n\n\tblockDifficulty := header.Difficulty.BigInt()\n\tcurrentDifficulty := difficulty.Current.BigInt()\n\n\tn := big.NewInt(10) // range ± N%\n\tl := big.NewInt(0)\n\th := big.NewInt(0)\n\th.Quo(currentDifficulty, n)\n\tl.Sub(currentDifficulty, h) // current - N%\n\th.Add(currentDifficulty, h) // current + N%\n\n\tif blockDifficulty.Cmp(l) < 0 || blockDifficulty.Cmp(h) > 0 || digest.Cmp(blockDifficulty) > 0 {\n\t\treturn nil, blockdigest.Digest{}, nil, fault.ErrInvalidBlockHeaderDifficulty\n\t}\n\n\treturn header, digest, block[totalBlockSize:], nil\n\n}", "title": "" }, { "docid": "ccfb21fb9f3e2902e4dcc0a0065a55fe", "score": "0.5253599", "text": "func (p Provider) Header(h *jwt.Header) {\n\th.Alg = algToString(p.alg)\n\tif p.settings.kid != \"\" {\n\t\th.Kid = p.settings.kid\n\t}\n\tif p.settings.jku != \"\" {\n\t\th.Jku = p.settings.jku\n\t}\n}", "title": "" }, { "docid": "e63752bf2434b65ba7b079fd3a9874d5", "score": "0.52390057", "text": "func CheckCsvHeaders(row, expectedHeaders []string) (int, error) {\n\theaders := CsvHeadersToMap(row)\n\tvar minRowCols int\n\tfor _, x := range expectedHeaders {\n\t\tif v, ok := headers[x]; !ok {\n\t\t\treturn -1, HeaderError(fmt.Sprintf(\"Missing header '%s'\", x))\n\t\t} else if v > minRowCols {\n\t\t\tminRowCols = v\n\t\t}\n\t}\n\treturn minRowCols, nil\n}", "title": "" }, { "docid": "7eefb1352da7ca851d33bba7cee015f8", "score": "0.52389985", "text": "func (m *MockRuntime_PutFileClient) Header() (metadata.MD, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Header\")\n\tret0, _ := ret[0].(metadata.MD)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "fb0380997db44acd970b3880064744c7", "score": "0.52373374", "text": "func inspectFileheader(ctx *ctx_type, d []byte) error {\n\n\tstartLine(ctx, 0)\n\tctx.print(\"----- FILEHEADER -----\\n\")\n\n\tctx.fileType = string(d[0:2])\n\tctx.pfxPrintfAbs(0, \"bfType\", \"0x%02x 0x%02x (%+q)\", d[0], d[1], ctx.fileType)\n\n\tfileTypeName := fileTypeNames[ctx.fileType]\n\tif fileTypeName == \"\" {\n\t\tctx.printf(\"\\n\")\n\t\treturn errors.New(\"Not a BMP file\")\n\t}\n\tctx.printf(\" = %s\\n\", fileTypeName)\n\tif ctx.fileType != \"BM\" {\n\t\treturn errors.New(\"File type not supported\")\n\t}\n\n\tdetectVersion(ctx, ctx.data)\n\tstartLine(ctx, 0)\n\tctx.printf(\"(Version detected: %s)\\n\", ctx.bmpVerName)\n\n\tbfSize := getDWORD(d[2:6])\n\tctx.pfxPrintfAbs(2, \"bfSize\", \"%v\\n\", bfSize)\n\t// The Size field is usually is set to the file size. But in OS/2 BMPs\n\t// it can be set to the fileHeader size + infoHeader size, so don't warn\n\t// about that.\n\tif (int64(bfSize) != ctx.fileSize) && (bfSize != 14+ctx.infoHeaderSize) {\n\t\tctx.printf(\"Warning: Reported file size (%v) does not equal actual file size (%v)\\n\",\n\t\t\tbfSize, ctx.fileSize)\n\t}\n\n\tbfReserved1 := getWORD(d[6:8])\n\tctx.pfxPrintfAbs(6, \"bfReserved1\", \"%v\\n\", bfReserved1)\n\n\tbfReserved2 := getWORD(d[8:10])\n\tctx.pfxPrintfAbs(8, \"bfReserved2\", \"%v\\n\", bfReserved2)\n\n\tctx.bfOffBits = getDWORD(d[10:14])\n\tctx.pfxPrintfAbs(10, \"bfOffBits\", \"%v\\n\", ctx.bfOffBits)\n\n\treturn nil\n}", "title": "" }, { "docid": "c9eb3efae29cd57df6fa1e74f08c4e90", "score": "0.5230258", "text": "func (h *HeaderChecker) HeaderChanged(newHeader *Header) bool {\n\tchanged := !newHeader.Equals(h.LastHeader)\n\th.LastHeader = newHeader\n\treturn changed\n}", "title": "" }, { "docid": "4a15468a3a4f8c27af019cfb4c2e5bf7", "score": "0.5220635", "text": "func TestEqualHeader(t *testing.T) {\n\tInstallGPT()\n\tr := bytes.NewReader(disk)\n\tp, err := New(r)\n\tif err != nil {\n\t\tt.Fatalf(\"TestEqualHeader: Reading in gpt: got %v, want nil\", err)\n\t}\n\n\tif err := EqualHeader(p.Primary.Header, p.Backup.Header); err != nil {\n\t\tt.Fatalf(\"TestEqualHeader: got %v, want nil\", err)\n\t}\n\t// Yes, we assume a certain order, but it sure simplifies the test :-)\n\tp.Primary.Signature++\n\tp.Primary.Revision++\n\tp.Primary.HeaderSize++\n\tp.Primary.CurrentLBA++\n\tp.Primary.FirstLBA++\n\tp.Primary.LastLBA++\n\tp.Primary.DiskGUID.B[0]++\n\tp.Primary.NPart--\n\tp.Primary.PartSize--\n\tp.Primary.PartCRC++\n\tif err = EqualHeader(p.Primary.Header, p.Backup.Header); err == nil {\n\t\tt.Fatalf(\"TestEqualHeader: got %v, want nil\", err)\n\t}\n\tt.Logf(\"TestEqualHeader: EqualHeader returns %v\", err)\n\n\tif err.Error() != equalHeaderError {\n\t\tt.Fatalf(\"TestEqualHeader: got %v, want %v\", err.Error(), equalHeaderError)\n\t}\n}", "title": "" }, { "docid": "5cad95e122943091f527628e80d98073", "score": "0.5214558", "text": "func TestParseHeader(t *testing.T) {\n\t// Read all data\n\tdata, err := ioutil.ReadFile(\"main_test.cvd\")\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\tdef, err := parseHeader(data)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\tif def.Level != 60 {\n\t\tt.Errorf(\"Parsing Level header, expected level 60, got %s\\n\", def.Level)\n\t}\n\n\tif def.TotalSignatures != 2424225 {\n\t\tt.Errorf(\"Parsing TotalSignatures header, expected level 2424225, got %s\\n\", def.TotalSignatures)\n\t}\n\n\tif def.Version != 55 {\n\t\tt.Errorf(\"Parsing TotalSignatures header, expected level 55, got %s\\n\", def.Version)\n\t}\n\n\tif def.MD5Hash == \"\" {\n\t\tt.Error(\"Parsing MD5 hash header and got it empty\")\n\t}\n\n\tif def.Signature == \"\" {\n\t\tt.Error(\"Parsing Signature header and got it empty\")\n\t}\n\n\tfiles, err := extractFiles(data, MAIN_DEFINITION)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\tif len(files) == 0 {\n\t\tt.Fatal(\"Could not extract a single file\")\n\t}\n\n\tfmt.Println(\"OK. Header parsing SUCCESS\")\n\n}", "title": "" }, { "docid": "0597c2f5b8ab0675e6c17e7ddd32b4f1", "score": "0.5214416", "text": "func (m HMACManager) HeaderRequired() bool {\n\treturn m.Required\n}", "title": "" }, { "docid": "ca43f690d49291cc8a8d280f1750af4e", "score": "0.5214279", "text": "func readHeader(hdr []byte) (marshaledType, []byte, error) {\n\tif len(hdr) < headerSize {\n\t\treturn 0, nil, fmt.Errorf(\"header is too small\")\n\t}\n\tif !bytes.Equal(hdr[0:len(magicNumber)], magicNumber) {\n\t\treturn 0, nil, fmt.Errorf(\"invalid magic number\")\n\t}\n\treturn marshaledType(hdr[len(magicNumber)]), hdr[headerSize:], nil\n}", "title": "" }, { "docid": "41a24aca716aaa1780b9c0130d00fad7", "score": "0.52096057", "text": "func (m *MockDeviceService_ListClient) Header() (metadata.MD, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Header\")\n\tret0, _ := ret[0].(metadata.MD)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" } ]
2eef58376a1ac79220530a21bba9624b
Token returns the Ghost jwt token needed for token based authenication.
[ { "docid": "f47e441db97f47e3cfc2ad0f1583fa4d", "score": "0.6724254", "text": "func (ats *AdminTokenSource) Token() (*oauth2.Token, error) {\n\tsplit := strings.Split(ats.Key, \":\")\n\tif len(split) != 2 {\n\t\treturn nil, fmt.Errorf(\"incorrect key format\")\n\t}\n\tkid, secret := split[0], split[1]\n\n\tsecretBytes, err := hex.DecodeString(secret)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"secret portion of key not valid hex\")\n\t}\n\n\tclaims := &jwt.StandardClaims{\n\t\tAudience: tokenAudience,\n\t\tIssuedAt: time.Now().Unix(),\n\t\tExpiresAt: time.Now().Unix() + (5 * 60),\n\t}\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\n\ttoken.Header[\"kid\"] = kid\n\tss, err := token.SignedString(secretBytes)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to create auth token: %v\", err)\n\t}\n\n\treturn &oauth2.Token{\n\t\tAccessToken: ss,\n\t\tExpiry: time.Now().Add(time.Minute * 5),\n\t\tTokenType: tokenType,\n\t}, nil\n}", "title": "" } ]
[ { "docid": "95b7c6e440ebd7c19f4337c87cd96013", "score": "0.752199", "text": "func (h Handlers) Token(ctx context.Context, w http.ResponseWriter, r *http.Request) error {\n\tkid := web.Param(r, \"kid\")\n\tif kid == \"\" {\n\t\treturn v1Web.NewRequestError(errors.New(\"missing kid\"), http.StatusBadRequest)\n\t}\n\n\temail, pass, ok := r.BasicAuth()\n\tif !ok {\n\t\treturn auth.NewAuthError(\"must provide email and password in Basic auth\")\n\t}\n\n\taddr, err := mail.ParseAddress(email)\n\tif err != nil {\n\t\treturn auth.NewAuthError(\"invalid email format\")\n\t}\n\n\tusr, err := h.User.Authenticate(ctx, *addr, pass)\n\tif err != nil {\n\t\tswitch {\n\t\tcase errors.Is(err, user.ErrNotFound):\n\t\t\treturn v1Web.NewRequestError(err, http.StatusNotFound)\n\t\tcase errors.Is(err, user.ErrAuthenticationFailure):\n\t\t\treturn auth.NewAuthError(err.Error())\n\t\tdefault:\n\t\t\treturn fmt.Errorf(\"authenticating: %w\", err)\n\t\t}\n\t}\n\n\tclaims := auth.Claims{\n\t\tRegisteredClaims: jwt.RegisteredClaims{\n\t\t\tSubject: usr.ID.String(),\n\t\t\tIssuer: \"service project\",\n\t\t\tExpiresAt: jwt.NewNumericDate(time.Now().UTC().Add(time.Hour)),\n\t\t\tIssuedAt: jwt.NewNumericDate(time.Now().UTC()),\n\t\t},\n\t\tRoles: usr.Roles,\n\t}\n\n\tvar tkn struct {\n\t\tToken string `json:\"token\"`\n\t}\n\ttkn.Token, err = h.Auth.GenerateToken(kid, claims)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"generating token: %w\", err)\n\t}\n\n\treturn web.Respond(ctx, w, tkn, http.StatusOK)\n}", "title": "" }, { "docid": "2776a6f28f5f22952a01bab7e31eb3aa", "score": "0.74598324", "text": "func GenerateToken(c *gin.Context) {\n\tcurrentUser := GetCurrentUser(c.Request)\n\tif currentUser == nil {\n\t\terr := c.AbortWithError(http.StatusUnauthorized, fmt.Errorf(\"Invalid session\"))\n\t\tlog.Info(c.ClientIP(), err.Error())\n\t\treturn\n\t}\n\n\ttokenRequest := struct {\n\t\tName string `json:\"name,omitempty\"`\n\t}{Name: \"generated\"}\n\n\tif c.Request.Method == http.MethodPost {\n\t\tif err := c.ShouldBindJSON(&tokenRequest); err != nil {\n\t\t\terr := c.AbortWithError(http.StatusBadRequest, err)\n\t\t\tlog.Info(c.ClientIP(), err.Error())\n\t\t\treturn\n\t\t}\n\t}\n\n\ttokenID := uuid.NewV4().String()\n\n\t// Create the Claims\n\tclaims := &ScopedClaims{\n\t\tStandardClaims: jwt.StandardClaims{\n\t\t\tIssuer: JwtIssuer,\n\t\t\tAudience: JwtAudience,\n\t\t\tIssuedAt: jwt.TimeFunc().Unix(),\n\t\t\tExpiresAt: 0,\n\t\t\tSubject: strconv.Itoa(int(currentUser.ID)),\n\t\t\tId: tokenID,\n\t\t},\n\t\tScope: \"api:invoke\", // \"scope\" for Pipeline\n\t\tType: DroneUserCookieType, // \"type\" for Drone\n\t\tText: currentUser.Login, // \"text\" for Drone\n\t}\n\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\n\tsignedToken, err := token.SignedString([]byte(signingKeyBase32))\n\n\tif err != nil {\n\t\terr = c.AbortWithError(http.StatusInternalServerError, fmt.Errorf(\"Failed to sign token: %s\", err))\n\t\tlog.Info(c.ClientIP(), err.Error())\n\t} else {\n\t\tuserID := strconv.Itoa(int(currentUser.ID))\n\t\ttoken := NewToken(tokenID, tokenRequest.Name)\n\t\terr = tokenStore.Store(userID, token)\n\t\tif err != nil {\n\t\t\terr = c.AbortWithError(http.StatusInternalServerError, fmt.Errorf(\"Failed to store token: %s\", err))\n\t\t\tlog.Info(c.ClientIP(), err.Error())\n\t\t} else {\n\t\t\tc.JSON(http.StatusOK, gin.H{\"id\": tokenID, \"token\": signedToken})\n\t\t}\n\t}\n}", "title": "" }, { "docid": "8b6099767c0fe5e5f378c81e7bbe54b5", "score": "0.7411622", "text": "func (hrc *HTTPRequestContext) Token() string {\n\treturn strings.Replace(hrc.r.Header.Get(\"Authorization\"), \"Bearer \", \"\", 1)\n}", "title": "" }, { "docid": "f5a7ab897abea5b44ae7d7994359a1de", "score": "0.73947835", "text": "func Token(ctx context.Context) (*jwt.Token, error) {\n\treturn tokenFromContext(ctx)\n}", "title": "" }, { "docid": "89a9015cafd50db2bba53370f38647a9", "score": "0.7363631", "text": "func (c *Claims) Token() (string, error) {\n\ttok := jwt.NewWithClaims(jwt.SigningMethodHS256, c)\n\treturn tok.SignedString(secretKey)\n}", "title": "" }, { "docid": "75f20344594ba49ecd8fc796a39a8517", "score": "0.73262775", "text": "func GetToken(w http.ResponseWriter, r *http.Request) {\n\tvar user users.User\n\tvar err error\n\tvar token string\n\terr = json.NewDecoder(r.Body).Decode(&user)\n\tif err != nil {\n\t\terrorImpl.WriteHTTPError(w, http.StatusInternalServerError, errorImpl.AuthError(\"Decode user error\", err))\n\t\treturn\n\t}\n\tuser.DBClient = pgClient\n\tres, err := user.CheckUser()\n\tif !res {\n\t\terrorImpl.WriteHTTPError(w, http.StatusInternalServerError, errorImpl.AuthError(\"Check users error\", err))\n\t\treturn\n\t}\n\tok, err := user.CheckPasswordExp()\n\tif err != nil {\n\t\terrorImpl.WriteHTTPError(w, http.StatusInternalServerError, errorImpl.AuthError(\"Check password exp error\", err))\n\t\treturn\n\t}\n\tif ok {\n\t\ttoken, err = user.NewTokenString(false)\n\t\tif err != nil {\n\t\t\terrorImpl.WriteHTTPError(w, http.StatusInternalServerError, errorImpl.AuthError(\"Get new token error\", err))\n\t\t\treturn\n\t\t}\n\t\tw.WriteHeader(http.StatusOK)\n\t\t_, errWrite := w.Write([]byte(\"{\\\"Token\\\":\\\"\" + token + \"\\\"}\"))\n\t\tif errWrite != nil {\n\t\t\tlog.Printf(\"[ERROR] Token created, but Not Writing to ResponseWriter due: %s\", errWrite.Error())\n\t\t}\n\t\treturn\n\t}\n\ttoken, err = user.NewTokenString(true)\n\tif err != nil {\n\t\terrorImpl.WriteHTTPError(w, http.StatusInternalServerError, errorImpl.AuthError(\"Get new token error\", err))\n\t\treturn\n\t}\n\tw.WriteHeader(http.StatusOK)\n\t_, errWrite := w.Write([]byte(\"{\\\"Token\\\":\\\"\" + token + \"\\\"}\"))\n\tif errWrite != nil {\n\t\tlog.Printf(\"[ERROR] Token created, but Not Writing to ResponseWriter due: %s\", errWrite.Error())\n\t}\n}", "title": "" }, { "docid": "364adfc897df8c8ab8b9935b4cbf120d", "score": "0.72897494", "text": "func GenerateToken(user *models.User) (*string, error) {\n\tnowTime := time.Now()\n\texpireTime := nowTime.Add(time.Duration(viper.GetInt(\"app.TokenTimeLive\")) * time.Hour)\n\tclaims := Claims{\n\t\tuser.Username,\n\t\tuser.Password,\n\t\tjwt.StandardClaims{\n\t\t\tExpiresAt: expireTime.Unix(),\n\t\t\tIssuer: \"gin-blog\",\n\t\t},\n\t}\n\t// Устанавливаем набор параметров для токена\n\ttokenClaims := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\n\t// Подписываем токен нашим секретным ключем\n\ttoken, err := tokenClaims.SignedString([]byte(viper.GetString(\"app.JwtSecret\")))\n\treturn &token, errors.WithStack(err)\n}", "title": "" }, { "docid": "befa884f0831ac04d6f9d2bdf8ca089e", "score": "0.7219853", "text": "func GetJWTToken(ctx iris.Context, claims map[string]interface{}) string {\r\n\tclaims[\"iat\"]=strconv.FormatInt(time.Now().Unix(),10)\r\n\tclaims[\"iss\"]=ctx.Host()\r\n\ttoken := jwt.NewTokenWithClaims(jwt.SigningMethodHS256, jwt.MapClaims(claims))\r\n\r\n\t// Sign and get the complete encoded token as a string using the secret\r\n\ttokenString, _ := token.SignedString([]byte(TrionConfig.SecretKey))\r\n\treturn tokenString\r\n}", "title": "" }, { "docid": "d30d8f7663b480d795a1bcc2df3ec81f", "score": "0.72083914", "text": "func (r Request) Token() string { return r.get(\"token\") }", "title": "" }, { "docid": "f8f3576cab4322a03c395a66f5b9eefb", "score": "0.71755785", "text": "func (a *auth) GetToken() string {\n\treturn a.token\n}", "title": "" }, { "docid": "670e4810aadff36e9884132ef654739e", "score": "0.7130475", "text": "func (admin *AdminJwt) GenerateToken() (string, error) {\n\tnowTime := time.Now()\n\texpireTime := nowTime.Add(10 * time.Hour)\n\n\tclaims := Claims{\n\t\tadmin.UserID,\n\t\tjwt.StandardClaims{\n\t\t\tExpiresAt: expireTime.Unix(),\n\t\t\tIssuer: \"hjd\",\n\t\t},\n\t}\n\n\ttokenClaims := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\n\ttoken, err := tokenClaims.SignedString(jwtSecret)\n\n\treturn token, err\n}", "title": "" }, { "docid": "236b4f5252d4b7a7cb05e72498bdf896", "score": "0.7125428", "text": "func (a *AppAuth) Token() (*oauth2.Token, error) {\n\tt, exp, err := a.GenerateJWT()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &oauth2.Token{\n\t\tAccessToken: t,\n\t\tExpiry: *exp,\n\t}, nil\n}", "title": "" }, { "docid": "3d366901bb619b64728ae44feb626d99", "score": "0.71249545", "text": "func (u User) GetToken() string {\n\tbyteSlc, _ := json.Marshal(u)\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, jwt.MapClaims{\n\t\t\"data\": string(byteSlc),\n\t})\n\ttokenString, _ := token.SignedString(jwtSecret)\n\treturn tokenString\n}", "title": "" }, { "docid": "d8cc9d585db7d039bbd1c4ca94ff7e85", "score": "0.70761573", "text": "func GetToken(r *http.Request) string {\r\n\tbearerToken := r.Header.Get(\"Authorization\")\r\n\r\n\tstrArr := strings.Split(bearerToken, \" \")\r\n\r\n\tif len(strArr) == 2 {\r\n\t\treturn strArr[1]\r\n\t} else {\r\n\t\treturn \"\"\r\n\t}\r\n\r\n}", "title": "" }, { "docid": "6e705adc96452ba352e82317c329f129", "score": "0.70575994", "text": "func GenerateToken(id int, username, password string, organID, chatUID int, realName string) (string, error) {\n\tnowTime := time.Now()\n\texpireTime := nowTime.Add(12 * time.Hour)\n\tclaims := Claims{\n\t\tid,\n\t\tusername,\n\t\tEncodeMD5(password),\n\t\trealName,\n\t\tjwt.StandardClaims{\n\t\t\tExpiresAt: expireTime.Unix(),\n\t\t\tIssuer: \"gin-customer\",\n\t\t},\n\t}\n\n\ttokenClaims := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\n\ttoken, err := tokenClaims.SignedString(jwtSecret)\n\n\treturn token, err\n}", "title": "" }, { "docid": "3bd90f286eb6ae2722af9f2bcaf0d052", "score": "0.70435935", "text": "func GetToken() string {\n\treturn token\n}", "title": "" }, { "docid": "ece37ae0015535746adf3d4dc09c9fb9", "score": "0.70184207", "text": "func (token *Token) GetToken() string { return token.token }", "title": "" }, { "docid": "1d4434bbe5bd85138e16d774f61e8b8c", "score": "0.70001864", "text": "func (x *Xerxes) Token(token Token) (*jwt.Token, error) {\n\treturn x.Security.ParseJwt(token)\n}", "title": "" }, { "docid": "5586b2b9c9e47251ccd04a6b3a36479b", "score": "0.69888854", "text": "func (a *Auth) GetToken(requestAuth *RequestAuth) (string, error) {\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, jwt.MapClaims{\n\t\t\"id\": requestAuth.ID,\n\t\t\"email\": requestAuth.Email,\n\t\t\"exp\": time.Now().Add(time.Hour * expirationTimeToken).Unix(),\n\t})\n\treturn token.SignedString([]byte(a.secret))\n}", "title": "" }, { "docid": "45e4811d9dc035de6d2f86cf91cea184", "score": "0.6987361", "text": "func GetToken(r *http.Request) (*jwt.Token, *jwt.StandardClaims, error) {\n\tm := request.MultiExtractor{\n\t\trequest.AuthorizationHeaderExtractor,\n\t}\n\tclaims := &jwt.StandardClaims{}\n\n\ttoken, err := request.ParseFromRequestWithClaims(r, m, claims, func(t *jwt.Token) (interface{}, error) {\n\t\treturn SECRET, nil\n\t})\n\treturn token, claims, err\n}", "title": "" }, { "docid": "bccb8ca115dc14aea61bd8b1aa37fdcd", "score": "0.6983505", "text": "func (b *Bearer) Token() (*oauth2.Token, error) {\n\tvar err error\n\n\tclaims := make(map[string]interface{}, len(b.claims))\n\tfor k, val := range b.claims {\n\t\tclaims[k] = val\n\t}\n\n\tnow := time.Now()\n\tn := json.Number(strconv.FormatInt(now.Unix(), 10))\n\n\t// add expiration\n\tif b.addExpiration {\n\t\tclaims[\"exp\"] = json.Number(strconv.FormatInt(now.Add(b.expiresIn).Unix(), 10))\n\t}\n\n\t// add issued at\n\tif b.addIssuedAt {\n\t\tclaims[\"iat\"] = n\n\t}\n\n\t// add not before\n\tif b.addNotBefore {\n\t\tclaims[\"nbf\"] = n\n\t}\n\n\t// encode token\n\tbuf, err := b.signer.Encode(claims)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"jwt/bearer: could not encode claims: %v\", err)\n\t}\n\n\t// build client\n\tclient := oauth2.NewClient(b.context, nil)\n\tclient.Transport = b.transport\n\n\t// create values\n\tv := url.Values{}\n\tv.Set(\"grant_type\", GrantType)\n\tv.Set(\"assertion\", string(buf))\n\n\t// do assertion\n\tres, err := client.PostForm(b.tokenURL, v)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"jwt/bearer: cannot do token assertion: %v\", err)\n\t}\n\tdefer res.Body.Close()\n\n\t// read response\n\tbody, err := ioutil.ReadAll(io.LimitReader(res.Body, 1<<20))\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"jwt/bearer: cannot fetch token: %v\", err)\n\t}\n\n\t// check status code\n\tif c := res.StatusCode; c < 200 || c > 299 {\n\t\treturn nil, fmt.Errorf(\"jwt/bearer: cannot fetch token: %s (%d): %s\", res.Status, res.StatusCode, string(body))\n\t}\n\n\t// decode body\n\tvar tv struct {\n\t\tAccessToken string `json:\"access_token\"`\n\t\tTokenType string `json:\"token_type\"`\n\t\tIDToken string `json:\"id_token\"`\n\t\tExpiresIn int64 `json:\"expires_in\"`\n\t}\n\n\t// unmarhsal returned token\n\terr = json.Unmarshal(body, &tv)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"jwt/bearer: cannot fetch token: %v\", err)\n\t}\n\n\tret := &oauth2.Token{\n\t\tAccessToken: tv.AccessToken,\n\t\tTokenType: tv.TokenType,\n\t}\n\n\t// check passed expiration time\n\tif secs := tv.ExpiresIn; secs > 0 {\n\t\tret.Expiry = time.Now().Add(time.Duration(secs) * time.Second)\n\t}\n\n\tif tv.IDToken != \"\" {\n\t\tvar e struct {\n\t\t\tExpiration int64 `json:\"exp\"`\n\t\t}\n\n\t\t// decode returned id_token to get expiration\n\t\terr = b.signer.Decode([]byte(tv.IDToken), &e)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"jwt/bearer: could not decode id_token: %v\", err)\n\t\t}\n\n\t\tret.Expiry = time.Unix(e.Expiration, 0)\n\t}\n\n\treturn ret, nil\n}", "title": "" }, { "docid": "68b64086e1cc16639a61779c14ff5faa", "score": "0.6981651", "text": "func GenToken(id uint) (string, error) {\n\n\t/* Create Token */\n\tjwtToken := jwt.New(jwt.SigningMethodHS256)\n\n\t/* Set token claims */\n\tjwtToken.Claims = jwt.MapClaims{\n\t\t\"id\": id,\n\t\t\"exp\": time.Now().Add(time.Second * config.Jwt.ExpiresIn).Unix(),\n\t\t\"iss\": config.Jwt.Issuer,\n\t}\n\n\t/* Sign the token with our secret */\n\treturn jwtToken.SignedString(myJwtSigningKey)\n\n}", "title": "" }, { "docid": "3f465f03e6f92147659272cffcc3663d", "score": "0.6977413", "text": "func getToken(r *http.Request) (string, error) {\n\treqToken := r.Header.Get(\"Authorization\")\n\tif reqToken == \"\" {\n\t\treturn \"\", errors.New(\"no auth token\")\n\t}\n\tsplitToken := strings.Split(reqToken, \"Bearer\")\n\tif len(splitToken) < 2 {\n\t\treturn \"\", errors.New(\"no valid token\")\n\t}\n\treqToken = splitToken[1]\n\tif reqToken == \"\" {\n\t\treturn \"\", errors.New(\"no auth token\")\n\t}\n\treturn strings.Replace(reqToken, \" \", \"\", -1), nil\n}", "title": "" }, { "docid": "ee7895d0a9c90fffba37beb4bd4a4cee", "score": "0.6964705", "text": "func getjwtToken(headers http.Header) string {\n\tauthStringSlices := strings.Split(headers.Get(\"Authorization\"), \"bearer \")\n\n\tif len(authStringSlices) < 2 {\n\t\treturn \"\"\n\t}\n\treturn authStringSlices[1]\n}", "title": "" }, { "docid": "c819bf7329008fe2bee76d0007076a07", "score": "0.6947777", "text": "func GenerateToken() (string, error) {\n\tmySigningKey := []byte(\"drowssap\")\n\n\tclaims := &jwt.StandardClaims{\n\t\tExpiresAt: time.Now().Add(time.Minute*15).Unix(),\n\t}\n\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\n\treturn token.SignedString(mySigningKey)\n}", "title": "" }, { "docid": "47ac05293a3691d8d00338bd26dcd51d", "score": "0.6945056", "text": "func (a *Authorizer) getToken(r *http.Request) string {\n\ttoken := r.Header.Get(\"Authorization\")\n\treturn token\n}", "title": "" }, { "docid": "6030046501710680bdd40ab2c031aa93", "score": "0.69386417", "text": "func (h *AuthHandler) Token(w http.ResponseWriter, r *http.Request) {\n\tvar data TokenRequest\n\t_ = json.NewDecoder(r.Body).Decode(&data)\n\tdefer r.Body.Close()\n\n\ttoken, err := h.auth.GenerateToken(&auth.GenerateTokenRequest{\n\t\tUsername: data.Username,\n\t\tPassword: data.Password,\n\t})\n\tif err != nil {\n\t\tswitch e := err.(type) {\n\t\tcase *client.Error:\n\t\t\th.RespondError(w, e, e.StatusCode)\n\t\t\treturn\n\t\tdefault:\n\t\t\th.RespondError(w, err, http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\t}\n\n\th.Respond(w, token)\n}", "title": "" }, { "docid": "70bbec69a808476a0d2f3df2148e97ac", "score": "0.69145024", "text": "func (a *JWTAccessGenerate) Token(data *GenerateBasic) (string, error) {\n\tclaims := &JWTAccessClaims{\n\t\tUserName: data.UserInfo.GetUserName(),\n\t\tEmail: data.UserInfo.GetEmail(),\n\t\tName: data.UserInfo.GetName(),\n\t\tStandardClaims: jwt.StandardClaims{\n\t\t\tIssuedAt: time.Now().Unix(),\n\t\t\tExpiresAt: data.TokenInfo.GetAccessCreateAt().Add(data.TokenInfo.GetAccessExpiresIn()).Unix(),\n\t\t},\n\t}\n\ttoken := jwt.NewWithClaims(a.SignedMethod, claims)\n\tvar key interface{}\n\tif a.isEs() {\n\t\tv, err := jwt.ParseECPrivateKeyFromPEM(a.SignedKey)\n\t\tif err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\t\tkey = v\n\t} else if a.isRsOrPS() {\n\t\tv, err := jwt.ParseRSAPrivateKeyFromPEM(a.SignedKey)\n\t\tif err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\t\tkey = v\n\t} else if a.isHs() {\n\t\tkey = a.SignedKey\n\t} else {\n\t\treturn \"\", errs.New(\"unsupported sign method\")\n\t}\n\n\taccess, err := token.SignedString(key)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn access, nil\n}", "title": "" }, { "docid": "d155f401a2778ea91a045e18e52ac7a7", "score": "0.6908921", "text": "func GetToken(claims AuthClaims) (token []byte, err error) {\n\n\tlog.Debug(\"GetToken: Generating new auth token...\")\n\n\tif secret == nil {\n\t\tinitAuth()\n\t}\n\n\tnow := time.Now()\n\tclaims.Payload = jwt.Payload{\n\t\tIssuer: \"disttrace\",\n\t\tSubject: claims.Username,\n\t\tExpirationTime: jwt.NumericDate(now.Add(time.Hour)),\n\t\tIssuedAt: jwt.NumericDate(now),\n\t}\n\n\ttoken, err = jwt.Sign(claims, secret)\n\tif err != nil {\n\t\tlog.Error(\"GetToken: Couldn't sign claims, Error: \", err)\n\t}\n\n\tlog.Debug(\"GetToken: Returning new auth token\")\n\treturn\n}", "title": "" }, { "docid": "148dfffeaa8da00b6285dfed988fe221", "score": "0.6891647", "text": "func GenerateToken(user types.User, hclaims string, majVersion Version) (types.Token, error) {\n\n\t//Create the token\n\ttoken := jwt.New(jwt.SigningMethodHS256)\n\n\t// Create a map to store our claims\n\tclaims := token.Claims.(jwt.MapClaims)\n\n\t// Set claims\n\tclaims[\"username\"] = user.Username\n\tclaims[\"uid\"] = user.UID\n\t//\tfilteredGroups := FilterGroupsOnClaims(user.Groups, hclaims)\n\tclaims[\"groups\"] = user.Groups\n\tclaims[\"exp\"] = time.Now().Add(time.Hour * 24).Unix()\n\tclaims[\"iat\"] = time.Now().Unix()\n\n\tsignedToken, err := token.SignedString([]byte(config.AppConfig.AuthConfig.AuthSigningKey))\n\tif err != nil {\n\t\tlog.Errorf(\"Cannot sign token : %s\", err)\n\t\treturn types.Token{}, err\n\t}\n\n\treturn types.Token{\n\t\tJWT: signedToken,\n\t\tExpiry: claims[\"exp\"].(int64),\n\t}, nil\n\n}", "title": "" }, { "docid": "ee991230db7943ddc34f60288f272be2", "score": "0.68852794", "text": "func (s Server) Token(ctx echo.Context, params serverexternal.TokenParams) error {\n\treturn ctx.JSON(http.StatusOK, serverexternal.ResponsesToken{\n\t\tAccessToken: \"eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJpbnNvbGFyIiwic3ViIjoiZXhjaGFuZ2UtbmFtZSIsImlhdCI6MTUxNjIzOTAyMiwiZXhwIjoxNTE2MjQ1MDAwfQ.kT9y2S3FrHT_x25J8vx8n_WEkd0zbIHiqmzDW0H1ViI\",\n\t\tExpiration: 1590656252,\n\t})\n}", "title": "" }, { "docid": "e433df3cd63bd6d71ce265962e06c7c6", "score": "0.68642443", "text": "func GetToken() (string, error) {\n\n\tif token != \"\" {\n\t\treturn token, nil\n\t}\n\n\tttl := 24 * time.Hour\n\tclient := apiclient.Default\n\n\tcnf, err := config.GetConfig()\n\n\tsessionReq := &session.TokenSessionCreateCreateParams{\n\t\tConsumerToken: cnf.ConsumerToken,\n\t\tEmployeeToken: cnf.EmployeeToken,\n\t\tExpirationDate: time.Now().Add(ttl).Format(\"2006-01-02\"),\n\t}\n\n\tres, err := client.Session.TokenSessionCreateCreate(sessionReq.WithTimeout(10 * time.Second))\n\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\ttoken = res.Payload.Value.Token\n\n\treturn token, nil\n}", "title": "" }, { "docid": "6143e1effa0ff0d1b70708f4c2548562", "score": "0.6848207", "text": "func (a *AppContext) getToken(w http.ResponseWriter, r *http.Request) {\n\tlog.Trace(log.Here(), \"getToken() : calling method -\")\n\n\ttype Authent struct {\n\t\tUsername string `json:\"username\"`\n\t\tPassword string `json:\"password\"`\n\t}\n\n\tvar authent Authent\n\terr := json.NewDecoder(r.Body).Decode(&authent)\n\tif err != nil {\n\t\tcommon.SendError(log.Here(), w, err)\n\t\treturn\n\t}\n\n\tif authent.Username == \"\" {\n\t\tcommon.SendError(log.Here(), w, errors.New(\"no username given\"))\n\t\treturn\n\t}\n\tif authent.Password == \"\" {\n\t\tcommon.SendError(log.Here(), w, errors.New(\"no password given\"))\n\t\treturn\n\t}\n\n\tuser, err2 := a.SqlContext.GetUserByCredentials(authent.Username, authent.Password)\n\tif err2 != nil {\n\t\tcommon.SendError(log.Here(), w, err2)\n\t\treturn\n\t}\n\n\tif !user.Activated {\n\t\tcommon.SendError(log.Here(), w, errors.New(\"user not activated\"))\n\t\treturn\n\t}\n\n\tuserRole, _ := a.SqlContext.GetRole(user.Role_id)\n\tauthorized := a.SqlContext.IsPermitted4User(userRole, user.Id, user.Username, \"getToken\", \"\")\n\tif authorized {\n\t\tlog.Trace(log.Here(), \"The user: \", user.Username, \" is granted to get a token\")\n\t} else {\n\t\tlog.Trace(log.Here(), \"The user: \", user.Username, \" is not authorized get a token\")\n\t\tcommon.SendError(log.Here(), w, errors.New(\"User not authorized for this resource!\"))\n\t\treturn\n\t}\n\texpire_in := a.Settings.ExpireInToken\n\ttoken, err3 := a.SqlContext.CreateToken(user, expire_in)\n\tif err3 != nil {\n\t\tcommon.SendError(log.Here(), w, err3)\n\t\treturn\n\t}\n\ttokenString, _ := json.Marshal(token)\n\tlog.Trace(log.Here(), \"create token:\", string(tokenString))\n\tcommon.BuildHttp201Response(w, token)\n}", "title": "" }, { "docid": "9c6c1a08bc000126d3474b6978102bc2", "score": "0.6847102", "text": "func RequestToken(db *gorm.DB, w http.ResponseWriter, r *http.Request) {\n\n\tcred := Credentials{}\n\tdecoder := json.NewDecoder(r.Body)\n\tif err := decoder.Decode(&cred); err != nil {\n\t\trespondError(w, http.StatusBadRequest, err.Error())\n\t\treturn\n\t}\n\n\tdefer r.Body.Close()\n\n\tif cred.Username != systemUser || cred.Password != systemPassword {\n\t\trespondError(w, http.StatusUnauthorized, \"Username or Password is invalid\")\n\t\treturn\n\t}\n\n\t// Declare the expiration time of the token here, we have kept it as 5 minutes\n\texpirationTime := time.Now().Add(5 * time.Minute)\n\t// Create the JWT claims, which includes the username and expiry time\n\tclaims := &Claims{\n\t\tUsername: cred.Username,\n\t\tStandardClaims: jwt.StandardClaims{\n\t\t\t// In JWT, the expiry time is expressed as unix milliseconds\n\t\t\tExpiresAt: expirationTime.Unix(),\n\t\t},\n\t}\n\n\t// Declare the token with the algorithm used for signing, and the claims\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\n\t// Create the JWT string\n\ttokenString, err := token.SignedString(jwtKey)\n\tif err != nil {\n\t\t// If there is an error in creating the JWT return an internal server error\n\t\trespondError(w, http.StatusInternalServerError, err.Error())\n\t\treturn\n\t}\n\ttok := jwtoken{Token: tokenString}\n\n\trespondJSON(w, http.StatusOK, tok)\n}", "title": "" }, { "docid": "c3f65e05411e3c69285324b6e280602d", "score": "0.6832881", "text": "func getToken(req *http.Request) string {\n\tauth, ok := req.Header[\"Authorization\"]\n\tif !ok || len(auth) == 0 {\n\t\treturn \"\"\n\t}\n\n\ttoken := auth[0]\n\tif !strings.HasPrefix(token, `Token token=\"`) || !strings.HasSuffix(token, `\"`) {\n\t\treturn \"\"\n\t}\n\n\treturn token[13 : len(token)-1]\n}", "title": "" }, { "docid": "8f5858651de7982dd166a7aee14cc4b5", "score": "0.68278843", "text": "func TokenGet(w http.ResponseWriter, req *http.Request) {\n\tlog.Println(\"GET /token\")\n\n\tw.Header().Set(\"Content-Type\", \"text/plain\")\n\n\tmySigningKey := []byte(config.Get().TokenSecret)\n\n\toneDayInSeconds := int64(60 * 60 * 24)\n\n\tclaims := jwt.StandardClaims{\n\t\tExpiresAt: time.Now().Unix() + oneDayInSeconds,\n\t\tIssuer: \"secret-issuer\",\n\t}\n\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\n\tss, err := token.SignedString(mySigningKey)\n\tif err != nil {\n\t\tInternalError(w, \"\")\n\t\treturn\n\t}\n\n\t_, err = w.Write([]byte(ss))\n\tif err != nil {\n\t\tInternalError(w, \"\")\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "cd2c5270f6705986f61c9aa4d0d3a1ea", "score": "0.6821556", "text": "func (test *Test) Token(email string, pass string) string {\n\ttest.t.Log(\"Generating token for test ...\")\n\n\taddr, _ := mail.ParseAddress(email)\n\n\tstore := userdb.NewStore(test.Log, test.DB)\n\tdbUsr, err := store.QueryByEmail(context.Background(), *addr)\n\tif err != nil {\n\t\treturn \"\"\n\t}\n\n\tclaims := auth.Claims{\n\t\tRegisteredClaims: jwt.RegisteredClaims{\n\t\t\tSubject: dbUsr.ID.String(),\n\t\t\tIssuer: \"service project\",\n\t\t\tExpiresAt: jwt.NewNumericDate(time.Now().UTC().Add(time.Hour)),\n\t\t\tIssuedAt: jwt.NewNumericDate(time.Now().UTC()),\n\t\t},\n\t\tRoles: dbUsr.Roles,\n\t}\n\n\ttoken, err := test.Auth.GenerateToken(kid, claims)\n\tif err != nil {\n\t\ttest.t.Fatal(err)\n\t}\n\n\treturn token\n}", "title": "" }, { "docid": "f31314d5bb718ea1534c2bcd02ff2aa7", "score": "0.68175435", "text": "func (f *tokenCredential) Token() string { return f.token.Load().(string) }", "title": "" }, { "docid": "289c7fbc7648e51223dfcfb97c17305c", "score": "0.680517", "text": "func GetToken(username string) (string, error) {\n\texpirationTime := time.Now().Add(5 * time.Minute) // TODO Set the time in config\n\n\tclaims := &Claims{\n\t\tUsername: username,\n\t\tStandardClaims: jwt.StandardClaims{\n\t\t\tExpiresAt: expirationTime.Unix(),\n\t\t},\n\t}\n\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\n\n\ttokenString, err := token.SignedString(jwtKey)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn tokenString, nil\n}", "title": "" }, { "docid": "36fd49fe52e83cc16ebecf171a94ddd9", "score": "0.67916816", "text": "func GetToken(user *models.User, expiresAt float64, issuedAt float64) string {\n\t// Check userName and password\n\n\tclaims := make(jwt.MapClaims)\n\tclaims[\"exp\"] = expiresAt\n\tclaims[\"iat\"] = issuedAt\n\tclaims[\"userID\"] = user.ID.Hex()\n\tclaims[\"companyID\"] = user.CompanyID.Hex()\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS512, claims)\n\tcreatedToken, _ := token.SignedString([]byte(ourLittleSecret))\n\n\treturn createdToken\n}", "title": "" }, { "docid": "db7448d71e9227f9351409cc64d7b6ef", "score": "0.6777648", "text": "func (authentication *JWTAuthentication) GenerateToken(userID string) (string, error) {\n\tconst JWTExpirationDelta = 72\n\n\t// Create the Claims\n\tclaims := MyCustomClaims{\n\t\tuserID,\n\t\tjwt.StandardClaims{\n\t\t\tIssuedAt: time.Now().Unix(),\n\t\t\tExpiresAt: time.Now().Add(time.Hour * time.Duration(JWTExpirationDelta)).Unix(),\n\t\t\tIssuer: \"Fabulous Kev Kev\",\n\t\t},\n\t}\n\t// token := jwt.NewWithClaims(jwt.SigningMethodRS512, claims)\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\n\n\t// token := jwt.NewWithClaims(jwt.SigningMethodRS512, jwt.MapClaims{\n\t// \t\"exp\": time.Now().Add(time.Hour * time.Duration(JWTExpirationDelta)).Unix(),\n\t// \t\"iat\": time.Now().Unix(),\n\t// \t\"sub\": userID,\n\t// })\n\n\t// Sign and get the complete encoded token as a string using the secret\n\t// tokenString, err := token.SignedString(authentication.privateKey)\n\ttokenString, err := token.SignedString([]byte(\"motherfucker\"))\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tfmt.Printf(\"%v %v\", tokenString, err)\n\treturn tokenString, nil\n}", "title": "" }, { "docid": "b5dc6e8f583bbece47f4b40de72ce5da", "score": "0.6777274", "text": "func (a *Authenticator) GenToken(email, password string) (string, error) {\n\tuser, err := a.users.GetByCreds(email, password)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\ttoken := jwt.NewWithClaims(a.method, jwt.MapClaims{\n\t\t\"exp\": time.Now().Add(a.exp),\n\t\t\"sub\": user.ID,\n\t})\n\n\treturn token.SignedString([]byte(a.secret))\n}", "title": "" }, { "docid": "9f7afef2fc330390d5156a4fd5ed8546", "score": "0.6770913", "text": "func GenerateToken() string {\n\tclaims := &jwt.StandardClaims{\n\t\tNotBefore: int64(time.Now().Unix()),\n\t\tExpiresAt: int64(time.Now().Unix() + 1000),\n\t\tIssuer: \"qiangjiyi\",\n\t}\n\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\n\tss, err := token.SignedString(key)\n\tif err != nil {\n\t\tlogs.Error(err)\n\t\treturn \"\"\n\t}\n\treturn ss\n}", "title": "" }, { "docid": "164a1609226041ec3d16f5910adcf0de", "score": "0.6753517", "text": "func ValidateToken(request *http.Request) (models.Token, error) {\n\ttokenString := strings.Replace(request.Header.Get(\"Authorization\"), \"bearer \", \"\", -1)\n\ttoken := new(models.Token)\n\ttok, err := jwt.Parse(tokenString, func(t *jwt.Token) (interface{}, error) {\n\t\treturn ourLittleSecret, nil\n\t})\n\n\tif err != nil {\n\t\treturn *token, err\n\t}\n\n\tif !tok.Valid {\n\t\treturn *token, errors.New(\"token invalid\")\n\t}\n\n\terr = tok.Claims.Valid()\n\n\tif err != nil {\n\t\treturn *token, errors.New(\"token time invalid\")\n\t}\n\n\ttoken.ExpiresAt = tok.Claims.(jwt.MapClaims)[\"exp\"].(float64)\n\ttoken.IssuedAt = tok.Claims.(jwt.MapClaims)[\"iat\"].(float64)\n\ttoken.CompanyID = tok.Claims.(jwt.MapClaims)[\"companyID\"].(string)\n\ttoken.UserID = tok.Claims.(jwt.MapClaims)[\"userID\"].(string)\n\ttoken.Token = tokenString\n\n\tif currentTime := int(time.Now().Unix()); int(token.ExpiresAt) < currentTime {\n\t\treturn *token, errors.New(\"Expired token\")\n\t} else if int(token.IssuedAt) > currentTime {\n\t\treturn *token, errors.New(\"Invalid issued time\")\n\t} else if len(token.CompanyID) <= 10 {\n\t\treturn *token, errors.New(\"Missing info\")\n\t} else if len(token.UserID) <= 0 {\n\t\treturn *token, errors.New(\"Missing info\")\n\t}\n\n\treturn *token, nil\n}", "title": "" }, { "docid": "d391430c85c7c1b1784f1cde65e3a721", "score": "0.67480534", "text": "func (j *JwtWrapper) GenerateToken(success string, msg string, admin string, lastLogin string, username string, uuid1 string) (signedToken string, claims *JwtClaim, err error) {\r\n\tif uuid1 == \"\" {\r\n\t\tuuid1 = uuid.NewV4().String()\r\n\r\n\t}\r\n\tjwtContext := JwtContext{\r\n\t\tsuccess,\r\n\t\tmsg,\r\n\t\tadmin,\r\n\t\tlastLogin,\r\n\t\tusername,\r\n\t\tuuid1}\r\n\r\n\tclaims = &JwtClaim{\r\n\t\tContext: jwtContext,\r\n\t\tStandardClaims: jwt.StandardClaims{\r\n\t\t\tExpiresAt: time.Now().Local().Add(time.Minute * time.Duration(j.ExpirationMinutes)).Unix(),\r\n\t\t\tIssuer: j.Issuer,\r\n\t\t},\r\n\t}\r\n\r\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\r\n\r\n\tsignedToken, err = token.SignedString([]byte(j.SecretKey))\r\n\tif err != nil {\r\n\t\treturn\r\n\t}\r\n\r\n\treturn\r\n}", "title": "" }, { "docid": "93cc4aa2cb04ca91a74fec3d0134d723", "score": "0.6745586", "text": "func GenerateToken(claims *Claims, secretKey []byte) (string, error) {\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\n\tss, err := token.SignedString(secretKey)\n\treturn ss, err\n}", "title": "" }, { "docid": "fa599c727829f1e4d98e61e5a9bdb12d", "score": "0.67395455", "text": "func (backend *JWTAuthenticationBackend) GenerateToken(user AuthStruct) (string, error) {\n\n\tvar signingKey []byte\n\tsigningKey, err := json.Marshal(backend.PublicKey)\n\n\tclaims := jwt.MapClaims{\n\t\t\"exp\": time.Now().Add(time.Hour * time.Duration(tokenDuration)).Unix(),\n\t\t\"iat\": time.Now().Unix(),\n\t\t\"id\": user.ID,\n\t}\n\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\n\tss, err := token.SignedString(signingKey)\n\n\treturn ss, err\n}", "title": "" }, { "docid": "000cd93263a14e03d022cb97b01d6040", "score": "0.67359966", "text": "func GetToken(req *http.Request) string {\n\tcookie, err := req.Cookie(\"Auth\")\n\tif err != nil {\n\t\treturn \"none\"\n\t}\n\treturn cookie.Value\n}", "title": "" }, { "docid": "aca9e6f223cfdf599e8684538be2b303", "score": "0.67336154", "text": "func (u *Users) Token(ctx context.Context, w http.ResponseWriter, r *http.Request) error {\n\tv, ok := ctx.Value(web.KeyValues).(*web.Values)\n\tif !ok {\n\t\treturn errors.New(\"web value missing from context\")\n\t}\n\n\temail, pass, ok := r.BasicAuth()\n\tif !ok {\n\t\terr := errors.New(\"must provide email and password in Basic auth\")\n\t\treturn web.NewRequestError(err, http.StatusUnauthorized)\n\t}\n\n\tclaims, err := user.Authenticate(ctx, u.db, v.Start, email, pass)\n\tif err != nil {\n\t\tswitch err {\n\t\tcase user.ErrAuthenticationFailure:\n\t\t\treturn web.NewRequestError(err, http.StatusUnauthorized)\n\t\tdefault:\n\t\t\treturn errors.Wrap(err, \"authenticating\")\n\t\t}\n\t}\n\n\tvar tkn struct {\n\t\tToken string `json:\"token\"`\n\t}\n\ttkn.Token, err = u.authenticator.GenerateToken(claims)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"generating token\")\n\t}\n\n\treturn web.Respond(ctx, w, tkn, http.StatusOK)\n}", "title": "" }, { "docid": "3eeaab6fefcd46f43177bb5a68e0847c", "score": "0.6709993", "text": "func GetToken(username string, role string) (string, error) {\n\tgodotenv.Load()\n\tsigningKey := []byte(os.Getenv(\"ACCESS_SECRET\"))\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, jwt.MapClaims{\n\t\t\"username\": username,\n\t\t\"role\": role,\n\t\t\"expires\" : time.Now().Add(time.Minute * 30).Unix(),\n\t})\n\ttokenString, err := token.SignedString(signingKey)\n\treturn tokenString, err\n}", "title": "" }, { "docid": "e44ee5c0873994d6c3ad3b3f80bef5ff", "score": "0.6704173", "text": "func GetToken(username string) string {\n\tvar t []byte\n\n\t// If the configuration has changed, re-load the keys\n\tif confVersion != util.GetConfig().Version {\n\t\tloadMintKey()\n\t}\n\n\tn, _ := time.Now().MarshalText()\n\tt, _ = json.Marshal(TokenStruct{Username: username, MintTime: string(n)})\n\n\ttoken, err := fernet.EncryptAndSign(t, GetKey())\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn string(token)\n}", "title": "" }, { "docid": "22f96a9c42a8b3065a10afdc3071d830", "score": "0.6696025", "text": "func GenerateToken(user user.User) (string, error) {\n\n\t// Create the Claims\n\tclaims := MyCustomClaims{\n\t\tuser.ID,\n\t\tjwt.MapClaims{\n\t\t\t\"exp\": time.Now().Add(time.Hour * time.Duration(24)).Unix(),\n\t\t\t\"iat\": time.Now().Unix(),\n\t\t},\n\t}\n\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\n\n\ttokenString, err := token.SignedString(PublicKey)\n\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn tokenString, nil\n}", "title": "" }, { "docid": "769c0e4f3cf28ed486f2966d6e97dc0b", "score": "0.6681904", "text": "func (j *JWT) GenerateToken(claims *TokenClaims) (string, error) {\n\t//claims.StandardClaims.ExpiresAt = time.Now().Add(time.Second * time.Duration(j.ExpireTime)).Unix()\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\n\treturn token.SignedString(j.Secretkey)\n}", "title": "" }, { "docid": "2b1d90925e94fab4f87ee3bb2fb94572", "score": "0.6673531", "text": "func (t *OAuth1AuthorizationToken) Token() string {\n\treturn t.OAuthToken\n}", "title": "" }, { "docid": "c29125eee92f1b7defaee4b7172078ef", "score": "0.6666749", "text": "func jwtToken(secret string) gin.HandlerFunc {\n\treturn func(c *gin.Context) {\n\t\tauthHeader := c.GetHeader(\"authorization\")\n\n\t\tif !strings.HasPrefix(authHeader, \"Bearer \") {\n\t\t\treturn\n\t\t}\n\n\t\ttokenString := strings.Split(authHeader, \" \")[1]\n\n\t\ttoken, err := jwt.Parse(tokenString, func(token *jwt.Token) (interface{}, error) {\n\t\t\treturn []byte(secret), nil\n\t\t})\n\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\n\t\tc.Set(\"userID\", token.Claims.(jwt.MapClaims)[\"sub\"])\n\n\t\tif permissionsObj, ok := token.Claims.(jwt.MapClaims)[\"permissions\"].([]interface{}); ok {\n\t\t\tpermissions := make([]string, 0)\n\t\t\tfor _, permission := range permissionsObj {\n\t\t\t\tpermissions = append(permissions, permission.(string))\n\t\t\t}\n\n\t\t\tc.Set(\"permissions\", permissions)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "5861ff66e13682039fc2b9dc1369324a", "score": "0.6665675", "text": "func GetToken(r *http.Request) (string, error) {\n\t//cookies := r.Cookies()\n\t//for _, cookie := range cookies {\n\t//\tif cookie.Name == tokenArgName {\n\t//\t\treturn cookie.Value, nil\n\t//\t}\n\t//}\n\t//return \"\", errors.New(\"no token\")\n\treturn r.URL.Query().Get(\"token\"),nil\n}", "title": "" }, { "docid": "e1244e56273fef16f9beac4e7825bdbb", "score": "0.66643274", "text": "func getToken(ctx context.Context) *jwt.Token {\n\tobj := ctx.Value(tokenKey)\n\tif obj == nil {\n\t\treturn nil\n\t}\n\n\treturn obj.(*jwt.Token)\n}", "title": "" }, { "docid": "ea9b38c7c3977a6f3309cf68c005c701", "score": "0.665162", "text": "func (this *TokenService) GenerateToken(request *mrequest.UserLogin) (*models.Token, *http.Cookie, *mresponse.ErrorResponse) {\n\t// get from env secret key and expiration time\n\tsecretKey := os.Getenv(\"JWT_SECRET_KEY\")\n\tenvExpir := os.Getenv(\"JWT_TOKEN_MIN_EXPIRE\")\n\tintExpir, err := strconv.ParseInt(envExpir, 10, 64)\n\tif err != nil {\n\t\terrR := errors.HandleErrorResponse(errors.UNKNOWN_ERROR, nil, err.Error())\n\t\treturn nil, nil, errR\n\t}\n\n\t// validate request\n\te := errors.ValidateRequest(request)\n\tif e != nil {\n\t\treturn nil, nil, e\n\t}\n\n\t// find user in database\n\tuserRequest := mrequest.UserRead{\n\t\tUsername: request.Username,\n\t}\n\n\tu, err := this.userRepository.ReadOne(&userRequest)\n\tif err != nil {\n\t\te = errors.HandleErrorResponse(errors.UNAUTHORIZED, nil, err.Error())\n\t\treturn nil, nil, e\n\t}\n\n\t// match password\n\terr = helper.Compare(u.Password, request.Password)\n\tif err != nil {\n\t\te = errors.HandleErrorResponse(errors.UNAUTHORIZED, nil, err.Error())\n\t\treturn nil, nil, e\n\t}\n\n\t//build claims\n\n\tclaims := models.Claims{}\n\n\t// assign custom claims\n\tclaims.Username = u.Username\n\tclaims.Roles = make([]*models.Role, len(u.Roles))\n\tcopy(claims.Roles, u.Roles)\n\n\t// prepare token expiration\n\tnow := time.Now()\n\texpir := now.Add(time.Minute * time.Duration(intExpir))\n\n\t// assign values to standard claims\n\tclaims.Issuer = \"authentication\"\n\tclaims.Audience = \"ecommerce_admin\"\n\tclaims.ExpiresAt = expir.Unix()\n\tclaims.IssuedAt = now.Unix()\n\n\t// create token & sign token\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\n\tt, err := token.SignedString([]byte(secretKey))\n\n\tif err != nil {\n\t\terrR := errors.HandleErrorResponse(errors.UNKNOWN_ERROR, nil, err.Error())\n\t\treturn nil, nil, errR\n\t}\n\n\tres := models.Token{\n\t\tToken: t,\n\t}\n\n\t// set token to cookie\n\tencodedToken := url.QueryEscape(t)\n\n\tcookie := http.Cookie{\n\t\tName: \"JWT\",\n\t\tValue: encodedToken,\n\t\tExpires: expir,\n\t\tPath: \"/\",\n\t\tDomain: this.config.CookieDomain,\n\t\tSecure: true,\n\t\tHttpOnly: true,\n\t}\n\n\treturn &res, &cookie, nil\n}", "title": "" }, { "docid": "c36ad819e763934c21e9f101def77c80", "score": "0.66510624", "text": "func getToken(w io.Writer, r *http.Request) error {\n\tc := appengine.NewContext(r)\n\ttoken := make(map[string]string)\n\tu := user.Current(c)\n\n\ttok, err := channel.Create(c, u.Email)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"token not generated: %v\", err)\n\t}\n\ttoken[\"token\"] = tok\n\treturn json.NewEncoder(w).Encode(token)\n}", "title": "" }, { "docid": "9d3918f0f1e45ec47eaf343d7dbb942f", "score": "0.6626052", "text": "func (c *Client) Token() string {\n\treturn c.configuration.token\n}", "title": "" }, { "docid": "5995880bcf688ba52fed9e36c960821b", "score": "0.66231316", "text": "func Gentoken(username string) (string, error) {\n\texpTime := time.Now().Add(config.JWTLife)\n\tclaims := &Claims{\n\t\tusername,\n\t\tjwt.StandardClaims{\n\t\t\tExpiresAt: expTime.Unix(),\n\t\t\tIssuer: \"godrivedev\",\n\t\t\tIssuedAt: time.Now().Unix(),\n\t\t},\n\t}\n\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\n\ttokenStr, err := token.SignedString(jwtKey)\n\n\treturn tokenStr, err\n}", "title": "" }, { "docid": "040117fd9790e3f3fa73a89ec80e1a91", "score": "0.66212106", "text": "func GenerateToken(user User) (string, error) {\n\tvar err error\n\tsecret := \"secret\"\n\n\t// TODO: What is the HS256 type of encryption??\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256,\n\t\tjwt.MapClaims{\"email\": user.Email, \"iss\": \"course\"})\n\n\t//spew.Dump(token)\n\n\ttokenString, err := token.SignedString([]byte(secret))\n\n\t//fmt.Println(\"tokenString:\", tokenString)\n\n\tif err != nil {\n\t\tfmt.Println(\"**** Error in Generate Token ****\")\n\t\tlog.Fatal(err)\n\t}\n\n\treturn tokenString, nil\n}", "title": "" }, { "docid": "127ef63659e173c555406cc784332b87", "score": "0.66210526", "text": "func (j *Jwt) GenerateToken(claims *CustomClaims) (string, error) {\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, claims) //key: type of interface\n\treturn token.SignedString(j.SignKey) // key: interface ====> string\n}", "title": "" }, { "docid": "3bdab86105399a619db1e68f8c63e783", "score": "0.6617544", "text": "func GenerateJWT(user models.Usuario) string {\n // Set custom claims\n claims := &Claim{\n user,\n jwt.StandardClaims{\n ExpiresAt: time.Now().Add(time.Hour * 2).Unix(),\n Issuer: \"paul\",\n },\n }\n\n // Create token with claims\n token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\n\n // Generate encoded token and send it as response.\n result, err := token.SignedString([]byte(config.GetConfig().Server.Key))\n if err != nil {\n log.Fatal(\"No se pudo firmar el token\")\n }\n return result\n}", "title": "" }, { "docid": "5b1024c00f9219b5cf4edaa3943afb70", "score": "0.6604902", "text": "func (JWT) GenerateToken(data interface{}) (string, JWTCustomClaims, error) {\n\tclaims := JWTCustomClaims{\n\t\tStandardClaims: jwt.StandardClaims{\n\t\t\tIssuedAt: time.Now().Unix(),\n\t\t\tExpiresAt: time.Now().Add(5 * time.Hour).Unix(), // only valid in 5 hours\n\t\t\tNotBefore: time.Now().Add(100 * time.Millisecond).Unix(), // just valid after 100ms\n\t\t},\n\t\tPayload: data,\n\t}\n\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\n\n\t// Sign and get the complete encoded token as a string using the secret\n\ttokenString, err := token.SignedString(jwtSecret)\n\n\treturn tokenString, claims, err\n}", "title": "" }, { "docid": "467cac4996be7d34ec20ebff01dd6fef", "score": "0.6584941", "text": "func (c *BaseController) ParseToken() (t *jwt.Token, e error) {\n\n\tauthString := c.Ctx.Input.Header(\"Authorization\")\n\tbeego.Debug(\"AuthString:\", authString)\n\n\tkv := strings.Split(authString, \" \")\n\tif len(kv) != 2 || kv[0] != \"Bearer\" {\n\t\tbeego.Error(\"AuthString invalid:\", authString)\n\t\treturn nil, errors.New(\"errInputData\")\n\t}\n\ttokenString := kv[1]\n\n\t// Parse token\n\ttoken, err := jwt.Parse(tokenString, func(token *jwt.Token) (interface{}, error) {\n\t\treturn []byte(\"yooplus\"), nil\n\t})\n\tif err != nil {\n\t\tbeego.Error(\"Parse token:\", err)\n\t\tif ve, ok := err.(*jwt.ValidationError); ok {\n\t\t\tif ve.Errors&jwt.ValidationErrorMalformed != 0 {\n\t\t\t\t// That‘s not even a token\n\t\t\t\treturn nil, errors.New(\"errInputData\")\n\t\t\t} else if ve.Errors&(jwt.ValidationErrorExpired|jwt.ValidationErrorNotValidYet) != 0 {\n\t\t\t\t// Token is either expired or not active yet\n\t\t\t\treturn nil, errors.New(\"errExpired\")\n\t\t\t} else {\n\t\t\t\t// Couldn‘t handle this token\n\t\t\t\treturn nil, errors.New(\"errInputData\")\n\t\t\t}\n\t\t} else {\n\t\t\t// Couldn‘t handle this token\n\t\t\treturn nil, errors.New(\"errInputData\")\n\t\t}\n\t}\n\tif !token.Valid {\n\t\tbeego.Error(\"Token invalid:\", tokenString)\n\t\treturn nil, errors.New(\"errInputData\")\n\t}\n\tbeego.Debug(\"Token:\", token)\n\n\treturn token, nil\n}", "title": "" }, { "docid": "088114b41f267b3099ee098fc372e2f8", "score": "0.6582508", "text": "func (j *JWT) GenerateToken(user string, pass string) (string, error) {\n\ttoken := jwt.New(jwt.SigningMethodHS256)\n\tclaims := token.Claims.(jwt.MapClaims)\n\tclaims[\"user\"] = user\n\tud, ok := j.GetUserData(user)\n\tif pass != ud.Password {\n\t\tud = ud.NewData\n\t}\n\tif ok {\n\t\tif ud.Exp == 0 {\n\t\t\tud.Exp = 60\n\t\t}\n\t\tclaims[\"exp\"] = time.Now().Add(time.Minute * time.Duration(ud.Exp)).Unix()\n\t} else {\n\t\treturn \"\", fmt.Errorf(\"JWT: user not found\")\n\t}\n\ttoken.Claims = claims\n\treturn token.SignedString([]byte(ud.Secret))\n}", "title": "" }, { "docid": "59bd21e0db3b7d8960bebdbcf5911f2d", "score": "0.6581199", "text": "func ParseToken(c *gin.Context, config *conf.GlobalConfiguration, token string) (t *jwt.Token, err error) {\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tSigningAlgorithm := \"H256\"\n\tKey := []byte(\"dsdsdsds\")\n\treturn jwt.Parse(token, func(t *jwt.Token) (interface{}, error) {\n\t\tif jwt.GetSigningMethod(SigningAlgorithm) != t.Method {\n\t\t\treturn nil, ErrInvalidSigningAlgorithm\n\t\t}\n\t\t// save token string if vaild\n\t\t// c.Set(\"JWT_TOKEN\", token)\n\t\treturn Key, nil\n\t})\n}", "title": "" }, { "docid": "cfa7b03d13d2f53281d5d12bf03061b0", "score": "0.65799326", "text": "func (authorization *Authorization) GetToken() (string, int, time.Time) {\n\treturn authorization.ExchangeAuthorizationCode()\n}", "title": "" }, { "docid": "ff754bf0bbdaf1db2306f59fdd3f6f60", "score": "0.6577212", "text": "func GetToken() string {\n\tdata, err := ioutil.ReadFile(TokenPath())\n\n\tif err != nil {\n\t\tio.ErrorMessage(\n\t\t\t\"hostify.key file was not found please add your user token\\n\" + io.Trace)\n\t\tlog.Fatal(err)\n\t}\n\n\treturn string(data)\n}", "title": "" }, { "docid": "06277483235e22b3a3653ccd3b7f3268", "score": "0.65667486", "text": "func (b *Cloud) token() (string, error) {\n\thostname, err := svchost.ForComparison(b.hostname)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tcreds, err := b.services.CredentialsForHost(hostname)\n\tif err != nil {\n\t\tlog.Printf(\"[WARN] Failed to get credentials for %s: %s (ignoring)\", b.hostname, err)\n\t\treturn \"\", nil\n\t}\n\tif creds != nil {\n\t\treturn creds.Token(), nil\n\t}\n\treturn \"\", nil\n}", "title": "" }, { "docid": "ffe8a1c1ab12a1e60e0454b326a4d57d", "score": "0.656132", "text": "func (t TokenService) NewToken() string {\n\texpires := time.Now().Add(time.Hour * 1)\n\t// Create the Claims\n\tclaims := &jwt.StandardClaims{\n\t\tExpiresAt: expires.Unix(),\n\t\tIssuer: \"pricetravel.com.mx\",\n\t}\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodRS256, claims)\n\n\tsignedKey, err := t.rsa.GetSingKey()\n\tif err != nil {\n\t\tfmt.Print(\"No se pudo obtener la SignedKey\", err)\n\t}\n\tss, err := token.SignedString(signedKey)\n\tif err != nil {\n\t\tfmt.Print(\"No se pudo generar el token\", err)\n\t}\n\treturn ss\n}", "title": "" }, { "docid": "f7da7806884eb475df2dea09bc22da56", "score": "0.6557636", "text": "func GenerateJWT(data models.Token) string {\n\tclaims := models.Claim{\n\t\tUserID: data.UserID,\n\t\tEmail: data.Email,\n\t\tToken: data.Token,\n\t\tAdmin: data.RolID,\n\t\tStandardClaims: jwt.StandardClaims{\n\t\t\tExpiresAt: time.Now().Add(time.Hour * 72).Unix(),\n\t\t\tIssuer: \"Api - cloud\",\n\t\t},\n\t}\n\t// Create token with claims\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\n\n\t// Generate encoded token and send it as response.\n\tt, err := token.SignedString([]byte(\"secret\"))\n\tif err != nil {\n\t\tlog.Fatal(\"Error: Couldn't signed the token\")\n\t}\n\n\treturn t\n}", "title": "" }, { "docid": "70fcc8b86301538f9ad5921c43bdb4d9", "score": "0.6547637", "text": "func GetToken(resource string) string {\n\tkey := base64.StdEncoding.EncodeToString([]byte(resource))\n\tval, _ := base64.StdEncoding.DecodeString(tokens[key])\n\treturn string(val)\n}", "title": "" }, { "docid": "e14cceb2a1bc161a8a85c710048c70b4", "score": "0.65470654", "text": "func ValidateToken(mysecret string, mytoken string) (string, bool) {\n\tsecret := []byte(mysecret)\n\n\ttokenString := []byte(mytoken)\n\n\tverifiedToken, err := jwt.Verify(jwt.HS256, secret, tokenString)\n\tif err != nil {\n\t\treturn \"\", false\n\t}\n\tvar claims = struct {\n\t\tToken string `json:\"token\"`\n\t\tExp int64 `json:\"exp\"`\n\t}{}\n\n\tverifiedToken.Claims(&claims)\n\tif claims.Exp < time.Now().Local().Unix() {\n\t\terr = errors.New(\"JWT is expired\")\n\t\tprintln(err)\n\t\treturn claims.Token, false\n\t}\n\t// println(claims.Exp) // debug\n\t// println(claims.Token)\n\n\treturn \"\", true\n\n}", "title": "" }, { "docid": "270845e5ab24a05dda46cd11b25867e1", "score": "0.6545673", "text": "func GenerateToken(name string) string {\n // create header\n token := jwt.New(jwt.SigningMethodHS256)\n claims := make(jwt.MapClaims)\n\n // add payload\n claims[\"iss\"] = \"CloudCompute711\"\n claims[\"sub\"] = \"SWAPI\"\n claims[\"exp\"] = time.Now().Add(time.Hour * time.Duration(1)).Unix()\n claims[\"iat\"] = time.Now().Unix()\n token.Claims = claims\n\n // create signature\n tokenString, _ := token.SignedString([]byte(name))\n return tokenString\n}", "title": "" }, { "docid": "62e0b70e863d2f304c4a92e350663df7", "score": "0.65441865", "text": "func GenerateToken(userId string) (string, error) {\n\t// Generate claims object that contains user's ObjectID and expires in 1 week.\n\tclaims := jwt.NewWithClaims(jwt.SigningMethodHS256, jwt.StandardClaims{\n\t\tSubject: userId,\n\t\tExpiresAt: time.Now().Add((time.Hour * 24) * 7).Unix(),\n\t})\n\n\t// Sign the claim and return the generated token string.\n\ttoken, err := claims.SignedString([]byte(jwtServiceCreds.secretKey))\n\treturn token, err\n}", "title": "" }, { "docid": "c7c5d160e57e5aac4e34405ba1eaed9f", "score": "0.65435106", "text": "func GetToken(w http.ResponseWriter, r *http.Request) {\n\t// Redirect logged in users\n\tfmt.Println(\"in GetUser\")\n\n\tfmt.Println(r)\n\temail := r.FormValue(\"email\")\n\tpassword := r.FormValue(\"password\")\n\n\tfmt.Println(\"password==\", password, \",email=\", email)\n\n\tuser := &User{}\n\tif err := dbmap.SelectOne(user, \"SELECT * FROM users WHERE email=$1\", email); err != nil {\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"error\": err,\n\t\t\t\"user\": user,\n\t\t}).Warn(\"Error retrieving User.\")\n\t\treturn\n\t}\n\n\tfmt.Println(user)\n\n\tw.Header().Set(\"Content-Type\", \"application/json; charset=UTF-8\")\n\tw.WriteHeader(http.StatusOK)\n\n\tuser.RefreshToken()\n\tfmt.Println(user)\n\tfmt.Println(user.Token)\n\n\tif err := json.NewEncoder(w).Encode(user.Token); err != nil {\n\t\tpanic(err)\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "633eddd9fcfb65bf8885bd33499c4aa2", "score": "0.65364254", "text": "func (s *Server) GenerateToken(info *UserInfo) (string, error) {\n\tclaims := &Claims{\n\t\tStandardClaims: jwt.StandardClaims{\n\t\t\tExpiresAt: time.Now().Add(s.expiration).Unix(),\n\t\t},\n\t\tUserInfo: *info,\n\t}\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\n\tsigned, err := token.SignedString(s.secret)\n\tif err != nil {\n\t\treturn \"\", errors.Wrap(err, \"failed to generate token\")\n\t}\n\treturn signed, nil\n}", "title": "" }, { "docid": "aea881f941439f9ba00d46bab0925130", "score": "0.65223163", "text": "func (obj *JwtGenerator) GenerateToken(identity string) (*Jwt, error) {\n\tvar error C.vssc_error_t\n\tC.vssc_error_reset(&error)\n\tidentityChar := C.CString(identity)\n\tdefer C.free(unsafe.Pointer(identityChar))\n\tidentityStr := C.vsc_str_from_str(identityChar)\n\n\tproxyResult := /*pr4*/ C.vssc_jwt_generator_generate_token(obj.cCtx, identityStr, &error)\n\n\terr := CoreSdkErrorHandleStatus(error.status)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\truntime.KeepAlive(obj)\n\n\truntime.KeepAlive(identity)\n\n\treturn NewJwtWithCtx(unsafe.Pointer(proxyResult)) /* r6 */, nil\n}", "title": "" }, { "docid": "fa34a3aea1b7cdca2c306026867a8e0c", "score": "0.6520021", "text": "func (f *tokenCredentialWithRefresh) Token() string { return f.token.Token() }", "title": "" }, { "docid": "36e17bc1ed0d55015bdca31ea3e194c4", "score": "0.6511631", "text": "func (s *Service) Token(ctx context.Context) (TokenOutput, error) {\n\tvar out TokenOutput\n\tuid, ok := ctx.Value(KeyAuthUserID).(string)\n\tif !ok {\n\t\treturn out, ErrUnauthenticated\n\t}\n\n\tvar err error\n\tout.Token, err = s.codec().EncodeToString(uid)\n\tif err != nil {\n\t\treturn out, fmt.Errorf(\"could not create token: %w\", err)\n\t}\n\n\tout.ExpiresAt = time.Now().Add(authTokenTTL)\n\n\treturn out, nil\n}", "title": "" }, { "docid": "cc77bf7959728b1cc94c56d496524cf0", "score": "0.6511124", "text": "func GenerateToken(data Info) (string, error) {\n\ttoken := jwt.New(jwt.SigningMethodHS256)\n\tclaims := token.Claims.(jwt.MapClaims)\n\tclaims[\"auth-information\"] = data\n\ttokenString, err := token.SignedString([]byte(\"secret-key\"))\n\tif err != nil {\n\t\treturn tokenString, err\n\t}\n\treturn tokenString, nil\n}", "title": "" }, { "docid": "f3dbde1242fcbdc6dbfe707f5d875f3d", "score": "0.6509399", "text": "func (a *Account) Token(ctx context.Context, w http.ResponseWriter, r *http.Request) error {\n\n\tctx, span := trace.StartSpan(ctx, \"handlers.Account.Token\")\n\tdefer span.End()\n\n\tv, ok := ctx.Value(web.KeyValues).(*web.Values)\n\tif !ok {\n\t\treturn web.NewShutdownError(\"web value missing from context\")\n\t}\n\n\tname, pass, ok := r.BasicAuth()\n\tif !ok {\n\t\terr := errors.New(\"must provide name and password in Basic auth\")\n\t\treturn web.NewRequestError(err, http.StatusUnauthorized)\n\t}\n\n\tclaims, err := account.Authenticate(ctx, a.db, v.Start, name, pass)\n\tif err != nil {\n\t\tswitch err {\n\t\tcase account.ErrAuthenticationFailure:\n\t\t\treturn web.NewRequestError(err, http.StatusUnauthorized)\n\t\tdefault:\n\t\t\treturn errors.Wrap(err, \"authenticating\")\n\t\t}\n\t}\n\n\tvar tkn struct {\n\t\tToken string `json:\"token\"`\n\t}\n\ttkn.Token, err = a.authenticator.GenerateToken(claims)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"generating token\")\n\t}\n\n\treturn web.Respond(ctx, w, tkn, http.StatusOK)\n}", "title": "" }, { "docid": "7e71fe46aa049936c673f7d9d4a7d6c0", "score": "0.65080893", "text": "func (c *Client) GetToken() (token string, err error) {\n\tvar (\n\t\traw []byte\n\t\treq *http.Request\n\t\tres *http.Response\n\t\tresRaw []byte\n\t\tmatched bool\n\t)\n\n\ttr := tokenRequest{\n\t\tc.Appusername,\n\t\tc.Apppassword,\n\t}\n\n\traw, err = json.Marshal(tr)\n\tif err != nil {\n\t\treturn \"\", errors.New(\"unable to get app token\")\n\t}\n\n\treq, err = http.NewRequest(\"POST\", c.Endpoint+\"/GetToken\",\n\t\tbytes.NewReader(raw))\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treq.Header.Add(\"Content-Type\", \"application/json\")\n\n\tres, err = c.HTTPClient.Do(req)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tresRaw, err = ioutil.ReadAll(res.Body)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tres.Body.Close()\n\n\tmatched, err = regexp.Match(ehrtokenregex, resRaw)\n\tif err != nil || !matched {\n\t\treturn \"\", errors.New(\"unable to fetch GRT token from Allscripts\")\n\t}\n\n\ttoken = string(resRaw)\n\n\treturn\n}", "title": "" }, { "docid": "6d37ce5c682b78bce524a65dbbbbe3e9", "score": "0.65079135", "text": "func GenerateToken(user User) (string, error) {\n\tclaims := Claims{\n\t\tuser,\n\t\tjwt.StandardClaims{\n\t\t\tExpiresAt: time.Now().Add(TokenExpireDuration).Unix(),\n\t\t\tIssuer: \"yst\",\n\t\t},\n\t}\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\n\treturn token.SignedString(EncryptionKey)\n}", "title": "" }, { "docid": "b7b4225ee1e232d5754003124205a74b", "score": "0.6506765", "text": "func GenerateToken(user models.User) (string, error) {\n\tsecret := os.Getenv(\"JWT_SECRET\")\n\n\tclaims := jwt.MapClaims{\n\t\t\"email\": user.Email,\n\t\t\"id\": user.ID,\n\t\t\"iss\": \"course\",\n\t\t\"sub\": \"user\",\n\t\t\"iat\": time.Now().Unix(),\n\t\t\"exp\": time.Now().Add(time.Hour * 40).Unix(),\n\t}\n\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\n\n\ttokenString, err := token.SignedString([]byte(secret))\n\tif err != nil {\n\t\treturn \"\", &models.RequestError{\n\t\t\tStatusCode: http.StatusInternalServerError,\n\t\t\tMessage: \"Internal server Error\",\n\t\t}\n\t}\n\treturn tokenString, nil\n}", "title": "" }, { "docid": "67f07d6edbe63460bd0bfd6ba895d277", "score": "0.6497665", "text": "func GetJWT(r *api.Request) string {\n\tps := r.Header[\"Token\"]\n\tif ps == nil || len(ps.Values) == 0 {\n\t\treturn \"\"\n\t}\n\treturn ps.Values[0]\n}", "title": "" }, { "docid": "dc21b053ec2b04f4e47cb3b69bfa3d6d", "score": "0.6495008", "text": "func (ts *tokenServer) getToken(ctx context.Context, w http.ResponseWriter, r *http.Request) error {\n\tparams := r.URL.Query()\n\tservice := params.Get(\"service\")\n\tscopeSpecifiers := params[\"scope\"]\n\n\trequestedAccessList := ResolveScopeSpecifiers(ctx, scopeSpecifiers)\n\n\tusername, pw, _ := r.BasicAuth()\n\n\tgrantedAccessList := ts.authorize(username, pw, requestedAccessList)\n\n\ttoken, err := ts.issuer.CreateJWT(username, service, grantedAccessList)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tresponse := tokenResponse{\n\t\tToken: token,\n\t\tExpiresIn: int(ts.issuer.Expiration.Seconds()),\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tjson.NewEncoder(w).Encode(response)\n\n\tlogrus.Info(\"get token complete\")\n\treturn nil\n}", "title": "" }, { "docid": "cf73c15b9f1e93580ed7e5ab8556e101", "score": "0.64773417", "text": "func (t *OAuth1RequestToken) Token() string {\n\treturn t.OAuthToken\n}", "title": "" }, { "docid": "6c598580e324d84232711a087da045fd", "score": "0.64748394", "text": "func (s *authService) GenerateToken(userID int) (string, error) {\n\ttoken := jwt.New(jwt.SigningMethodHS256)\n\tclaims := token.Claims.(jwt.MapClaims)\n\tclaims[\"user_id\"] = userID\n\n\tsignedToken, err := token.SignedString(SECRET_KEY)\n\n\tif err != nil {\n\t\treturn signedToken, err\n\t}\n\n\treturn signedToken, nil\n}", "title": "" }, { "docid": "36f8dc93733c357e3ad6ecb644004189", "score": "0.6474187", "text": "func (client *K8SClient) GetToken() string {\n\treturn client.token\n}", "title": "" }, { "docid": "67c697e903471e62c315c210251f17c1", "score": "0.6466801", "text": "func GenrateJWT() (string, error) {\n\n\t//Create a new token object, specifying signing method\n\ttoken := jwt.New(jwt.SigningMethodHS256)\n\n\t//Sign and get the complete encoded token as a string using the secret\n\treturn token.SignedString(JwtSigningScrect)\n}", "title": "" }, { "docid": "b8f03d4def8aea268487aa0244e203ca", "score": "0.6465428", "text": "func JWTTokenGeneration(userName string) (string, error) {\n\t//Temporary signing key\n\tmySigningKey := []byte(\"TempSigningKey\")\n\n\t// Create the Claims\n\tclaims := &CustomClaims{\n\t\tuserName,\n\t\tjwt.StandardClaims{\n\t\t\tExpiresAt: time.Now().Add(time.Hour * 24).Unix(),\n\t\t},\n\t}\n\n\t//Signing the token\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\n\tss, err := token.SignedString(mySigningKey)\n\tif err != nil {\n\n\t\treturn \"\", err\n\t}\n\treturn ss, nil\n}", "title": "" }, { "docid": "c95fde35ebfdddb42717fc38d8020922", "score": "0.6463416", "text": "func (fbd *FBDAPI) GetToken() string {\n\treturn fbd.token\n}", "title": "" }, { "docid": "150561dfacd2278bddbc20e28391ae78", "score": "0.64560217", "text": "func (c *AuthController) Token(ctx *app.TokenAuthContext) error {\n\t// authenticate\n\tu, p, _ := ctx.Request.BasicAuth()\n\n\tgoa.LogInfo(ctx, \"token auth\", \"user\", u)\n\tlogin := models.Login{\n\t\tEmail: u,\n\t\tPassword: p,\n\t}\n\n\tuserdb := models.NewUserDB(c.e.DB)\n\tuser, err := userdb.GetByLogin(ctx, login)\n\tif err != nil {\n\t\tgoa.LogError(ctx, \"find user by login\", \"error\", err.Error())\n\t\treturn err\n\t}\n\ttenantdb := models.NewTenantDB(c.e.DB)\n\tvar tenant models.Tenant\n\tvar e error\n\tif user.TenantID > 0 {\n\t\ttenant, e = tenantdb.Get(ctx, user.TenantID)\n\t\tif e != nil {\n\t\t\tgoa.LogError(ctx, \"find tenant by id\", \"error\", e.Error())\n\t\t\treturn err\n\t\t}\n\t}\n\t// create token\n\tclaims := make(map[string]interface{})\n\tclaims[\"sub\"] = user.ID\n\tclaims[\"role\"] = user.Role\n\n\tt, err := c.tm.Create(claims)\n\t// return token\n\ta := &app.Authorize{}\n\ttt := \"Bearer\"\n\ta.TokenType = &tt\n\ta.AccessToken = &t\n\tttl := c.spec.TTLMinutes * 60\n\ta.ExpiresIn = &ttl\n\ta.User = user.UserToUser()\n\ta.Tenant = tenant.TenantToTenant()\n\treturn ctx.Created(a)\n}", "title": "" }, { "docid": "d477c3d664a6a5a3e1e8e5cbdbfd7b45", "score": "0.6449126", "text": "func (z *API) GetToken(ctx context.Context, req *msg.TokenRequest) (*msg.TokenResponse, error) {\n\n\tuser := ctx.Value(\"user\").(*auth.User)\n\n\ttoken, exp, errGenerate := auth.GenerateToken(user)\n\tif errGenerate != nil {\n\t\treturn nil, errGenerate\n\t}\n\n\trsp := &msg.TokenResponse{\n\t\tUsername: user.Name,\n\t\tToken: string(token),\n\t\tExpiration: exp.Unix(),\n\t}\n\n\treturn rsp, nil\n\n}", "title": "" }, { "docid": "36a9dac2a0c2ea847406cdbd6825c6be", "score": "0.6449051", "text": "func Token(w http.ResponseWriter, r *http.Request, sess *sessions.Session) string {\n\t// Generate the map if it doesn't exist\n\tif _, ok := sess.Values[TokenName]; !ok {\n\t\tsess.Values[TokenName] = make(StringMap)\n\t}\n\n\tpath := r.URL.Path\n\n\tif SingleToken {\n\t\tpath = \"/\"\n\t}\n\n\tsessMap := sess.Values[TokenName].(StringMap)\n\tif _, ok := sessMap[path]; !ok {\n\t\tsessMap[path] = generate(TokenLength)\n\t\tsess.Save(r, w)\n\t}\n\n\treturn sessMap[path]\n}", "title": "" }, { "docid": "0c948969d2397dd011868ab2d16e3fd2", "score": "0.64416987", "text": "func GenerateToken(ID uint) (string, error) {\n\tclaims := &Claims{\n\t\tID: ID,\n\t\tStandardClaims: jwt.StandardClaims{\n\t\t\tIssuedAt: time.Now().Unix(),\n\t\t\tExpiresAt: time.Now().Add(30 * time.Minute).Unix(), //Expiration time is set to 5 minutes\n\t\t},\n\t}\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\n\ttokenString, err := token.SignedString([]byte(config.Jwtsecret))\n\treturn tokenString, err\n}", "title": "" }, { "docid": "17bbd1e1d6843be137ad74550ea57afa", "score": "0.64396346", "text": "func (aw *AuthWrapper) GenerateToken() {\n\tclaims := jwt.MapClaims{\"user\": aw.Auth.Email}\n\ttokenAuth := TokenSetting()\n\n\tduration, err := time.ParseDuration(\"15m\")\n\tif err != nil {\n\t\treturn\n\t}\n\tjwtauth.SetExpiryIn(claims, duration)\n\t_, tokenString, _ := tokenAuth.Encode(claims)\n\tduration, err = time.ParseDuration(\"24h\")\n\tif err != nil {\n\t\treturn\n\t}\n\tjwtauth.SetExpiryIn(claims, duration)\n\t_, refreshToken, _ := tokenAuth.Encode(claims)\n\n\taw.Auth.AcessToken = tokenString\n\taw.Auth.RefreshToken = refreshToken\n}", "title": "" } ]
2f4176bca1e821633c0304f522c46176
fieldIdx finds the index of the field referred to by the ODOT node n.
[ { "docid": "669eb54ba0744e0c6a72664085166a85", "score": "0.80512595", "text": "func fieldIdx(n *Node) int {\n\tt := n.Left.Type\n\tf := n.Sym\n\tif !t.IsStruct() {\n\t\tpanic(\"ODOT's LHS is not a struct\")\n\t}\n\n\tvar i int\n\tfor _, t1 := range t.Fields().Slice() {\n\t\tif t1.Sym != f {\n\t\t\ti++\n\t\t\tcontinue\n\t\t}\n\t\tif t1.Offset != n.Xoffset {\n\t\t\tpanic(\"field offset doesn't match\")\n\t\t}\n\t\treturn i\n\t}\n\tpanic(fmt.Sprintf(\"can't find field in expr %v\\n\", n))\n\n\t// TODO: keep the result of this function somewhere in the ODOT Node\n\t// so we don't have to recompute it each time we need it.\n}", "title": "" } ]
[ { "docid": "532527894c04eab835e70d6d596c8cde", "score": "0.7322837", "text": "func (k *Kind) FieldIndex(n string) (ret int) {\n\tif prev := k.lastOne - 1; prev >= 0 && k.fields[prev].Name == n {\n\t\tret = prev\n\t} else {\n\t\tk.ensureTraits()\n\t\tif aspect := findAspect(n, k.traits); len(aspect) > 0 {\n\t\t\tret = k.fieldIndex(aspect)\n\t\t} else {\n\t\t\tret = k.fieldIndex(n)\n\t\t}\n\t\tk.lastOne = ret + 1\n\t}\n\treturn\n}", "title": "" }, { "docid": "19c0e7f5d9493d40caaac36f1037036d", "score": "0.68014926", "text": "func FieldIndex(field string) string {\n\treturn \"f:\" + field\n}", "title": "" }, { "docid": "a2d050b277f258772e451b34b169eb51", "score": "0.65393823", "text": "func (field Field) FieldIndex() []int {\n\treturn field.fieldIndex\n}", "title": "" }, { "docid": "3aa063fae6407f5c2a2721b997b7eab9", "score": "0.6263474", "text": "func NthField(buf []byte, n int) (start, end int) {\n\ti := 0\n\toffset := 0\n\tfor {\n\t\tstart, end = NextField(buf)\n\t\tif i >= n {\n\t\t\tbreak\n\t\t}\n\t\toffset += end + 1\n\t\tbuf = buf[end+1:]\n\t\ti++\n\t}\n\treturn start + offset, end + offset\n}", "title": "" }, { "docid": "6aa4e0610a613a781d869d08012f37ac", "score": "0.6190896", "text": "func (f Field) Index() int {\n\treturn f.idx\n}", "title": "" }, { "docid": "3e883c53c00c38bcacb2a8ab5a958a16", "score": "0.6115994", "text": "func (dbf *DBF) FieldPos(fieldname string) int {\n\tfor i := 0; i < len(dbf.fields); i++ {\n\t\tif dbf.fields[i].FieldName() == fieldname {\n\t\t\treturn i\n\t\t}\n\t}\n\treturn -1\n}", "title": "" }, { "docid": "61e2d6dfdcf5190a90699df33ce9d64f", "score": "0.6043409", "text": "func lookupField(node *ast.StructType, index int) *ast.Field {\n\tstartIndex := 0\n\n\tfor _, f := range node.Fields.List {\n\t\tlength := len(f.Names)\n\t\tif length == 0 { // Embedded field\n\t\t\tlength = 1\n\t\t}\n\n\t\tendIndex := startIndex + length\n\t\tif index >= startIndex && index < endIndex {\n\t\t\treturn f\n\t\t}\n\n\t\tstartIndex += length\n\t}\n\n\tpanic(fmt.Sprintf(\"index %d out of range %d\", index, node.Fields.NumFields()))\n}", "title": "" }, { "docid": "9d06aa881c6de162b19426dda3ba3252", "score": "0.6013839", "text": "func (c *CSVData) GetFieldIndex(f string) (int, bool) {\n\tval, ok := c.fieldIndex[f]\n\treturn val, ok\n}", "title": "" }, { "docid": "d849574bf52ec7c9f03b837103894877", "score": "0.59547377", "text": "func GetFieldIndex(name string) int {\n\tarray := strings.Split(name, \"-\")\n\tinterim := concat(array[0 : len(array)-1]...)\n\tindex, err := strconv.Atoi(interim)\n\tif err != nil {\n\t\tlog.Fatal(\"Invalid Slice Index\", \"name\", name, \"interim\", interim)\n\t}\n\treturn index\n}", "title": "" }, { "docid": "b6358ca24f1b9a1314b48b20f38e4ccc", "score": "0.59044176", "text": "func getFieldIndexOrTag(field reflect.StructField) (string, error) {\n\tdataFieldName := field.Name\n\n\tif fieldIndex := field.Tag.Get(\"index\"); fieldIndex != \"\" {\n\t\treturn fieldIndex, nil\n\t}\n\n\tif len(dataFieldName) > 0 && fieldNameTagRe.MatchString(dataFieldName) {\n\t\treturn dataFieldName[1:], nil\n\t}\n\n\treturn \"\", nil\n}", "title": "" }, { "docid": "e79966301d5ceab97c5c6f15f920ec2d", "score": "0.5832237", "text": "func (this *optSelect) getFieldIndex(name string) int {\n\tmSelectExprs := this.stmt.SelectExprs\n\tfor i,sExpr := range mSelectExprs{\n\t\t_,startOk := sExpr.(*sqlparser.StarExpr)\n\t\tif startOk && len(mSelectExprs) == 1{\n\t\t\treturn 0\n\t\t}\n\t\tvExpr,ok := sExpr.(*sqlparser.AliasedExpr)\n\t\tif !ok{\n\t\t\tcontinue\n\t\t}\n\t\t//\n\t\tif ! vExpr.As.IsEmpty(){\n\t\t\tif vExpr.As.String() == name{\n\t\t\t\treturn i\n\t\t\t}\n\t\t}\n\t\tbuf := sqlparser.NewTrackedBuffer(nil)\n\t\tvExpr.Expr.Format(buf)\n\t\tif buf.String() == name{\n\t\t\treturn i\n\t\t}\n\t}\n\treturn -1\n}", "title": "" }, { "docid": "ec37a39a81d1e73d1d05005c8d408e6c", "score": "0.5818611", "text": "func (s *Struct) Field(i int) *Var { return s.fields[i] }", "title": "" }, { "docid": "9d4fe05501a95de341816d4032e6b144", "score": "0.5770725", "text": "func NextField(buf []byte) (start, end int) {\n\ti := 0\n\tl := len(buf)\n\tfor i < l && IsSpace(buf[i]) {\n\t\ti++\n\t}\n\tif i+1 >= len(buf) {\n\t\treturn i, i\n\t}\n\n\tj := i + 1\n\tfor j < l && !IsSpace(buf[j]) {\n\t\tj++\n\t}\n\treturn i, j\n}", "title": "" }, { "docid": "085d4b28fbc35935e67ed72665d1894c", "score": "0.57075614", "text": "func GetFieldOffset(obj *ObjectDesc, objtype *TypeDesc) uint64 {\n var offset uint64;\n offset = GetObjectOffset(obj, objtype.Fields);\n return offset;\n}", "title": "" }, { "docid": "a6aac43340773a2920ccf225498f2c97", "score": "0.5615283", "text": "func (fs *Fields) Index(name string, from int) int {\n\tfor i := from; i < len(*fs); i++ {\n\t\tif (*fs)[i].Is(name) {\n\t\t\treturn i\n\t\t}\n\t}\n\n\treturn -1\n}", "title": "" }, { "docid": "0e0e45215fc5965fafbc56f02f6f123f", "score": "0.5543386", "text": "func (f *Fields) Index(i int) *Field {\n\treturn (*f.s)[i]\n}", "title": "" }, { "docid": "51ddb919d2b806a9c72d3ac55d20560c", "score": "0.5537212", "text": "func (sn *SNode) BitNdx(lvl uint) (index uint, err error) {\n\n\t// XXX possible errors ignored\n\n\tif err == nil {\n\t\tkey := sn.GetKey()\n\t\thc := uint(key.Hashcode()) // cache me ?\n\t\tshiftCount := uint(W * lvl)\n\n\t\tindex = KEY_MASK & (hc >> shiftCount)\n\t}\n\treturn\n}", "title": "" }, { "docid": "afd1a6ddb0346805296a1e46dd640a5a", "score": "0.5518879", "text": "func (t *Tuple) GetFieldAt(i int) (fld interface{}) {\n\tif t != nil && i >= 0 && i < t.Length() {\n\t\tfld = (*t).Flds[i]\n\t}\n\n\treturn fld\n}", "title": "" }, { "docid": "504fa8c8174b7129cf76c597f9f7fe08", "score": "0.55056757", "text": "func (n *Node) fieldKey() string {\n\tif n.Name != \"\" {\n\t\t// return user defined node name as field key\n\t\treturn n.Name\n\t}\n\n\t// fallback: field key is extracted from mandatory node address\n\ti := strings.LastIndex(n.Address, \"/\")\n\tif i > 0 {\n\t\t// return last part of node address as field key\n\t\treturn n.Address[i+1:]\n\t}\n\n\t// return full node address as field key\n\treturn n.Address\n}", "title": "" }, { "docid": "dca209a0a929d1cc667be1b060c06bb6", "score": "0.55001605", "text": "func (f Fields) getIndex(name string) int {\n\tfor i, data := range f {\n\t\tif name == data.Key {\n\t\t\treturn i\n\t\t}\n\t}\n\treturn -1\n}", "title": "" }, { "docid": "326deaee59089b2d95415614ba260774", "score": "0.547784", "text": "func (t *structType) Field(i int) (f StructField) {\n\tif i < 0 || i >= len(t.fields) {\n\t\tpanic(\"reflect: Field index out of bounds\")\n\t}\n\tp := &t.fields[i]\n\tf.Type = toType(p.typ)\n\tf.Name = p.name.name()\n\tf.Anonymous = p.embedded()\n\tif !p.name.isExported() {\n\t\tf.PkgPath = t.pkgPath.name()\n\t}\n\tif tag := p.name.tag(); tag != \"\" {\n\t\tf.Tag = StructTag(tag)\n\t}\n\tf.Offset = p.offset()\n\n\t// NOTE(rsc): This is the only allocation in the interface\n\t// presented by a reflect.Type. It would be nice to avoid,\n\t// at least in the common cases, but we need to make sure\n\t// that misbehaving clients of reflect cannot affect other\n\t// uses of reflect. One possibility is CL 5371098, but we\n\t// postponed that ugliness until there is a demonstrated\n\t// need for the performance. This is issue 2320.\n\tf.Index = []int{i}\n\treturn\n}", "title": "" }, { "docid": "ac3567612ac50a187affef93940e91c7", "score": "0.5466492", "text": "func (m TranslateOffsetMap) FieldOffset(index, name string) uint64 {\n\tif m[index] == nil {\n\t\treturn 0\n\t}\n\treturn m[index].Fields[name]\n}", "title": "" }, { "docid": "ac3567612ac50a187affef93940e91c7", "score": "0.5466492", "text": "func (m TranslateOffsetMap) FieldOffset(index, name string) uint64 {\n\tif m[index] == nil {\n\t\treturn 0\n\t}\n\treturn m[index].Fields[name]\n}", "title": "" }, { "docid": "0827ee9d7f6fad95f70884bdb9a1799a", "score": "0.546379", "text": "func (c *ClientMgr) IndexField(obj runtime.Object, field string, extractValue client.IndexerFunc) error {\n\treturn c.ctrlCache.IndexField(context.Background(), obj, field, extractValue)\n}", "title": "" }, { "docid": "14ed843b8c4fab88fe4294c0ddd976f9", "score": "0.5446267", "text": "func (nd *NetData) RecIdx(recno int) int {\n\tridx := nd.Ring.LastIdx()\n\tif nd.Ring.IdxIsValid(recno) {\n\t\tridx = nd.Ring.Idx(recno)\n\t}\n\treturn ridx\n}", "title": "" }, { "docid": "1baa188f6ecac0cb04d6df41c2daa875", "score": "0.5435057", "text": "func (cols Headers) GetIndex(field string) int {\n\tfor _, col := range cols {\n\t\tif col.Field == field {\n\t\t\treturn col.Index\n\t\t}\n\t}\n\treturn -1\n}", "title": "" }, { "docid": "41e370b40fd2cca0a199dd1cf8c84098", "score": "0.5427122", "text": "func (p *interp) getField(index int) value {\n\tif index == 0 {\n\t\tif p.lineIsTrueStr {\n\t\t\treturn str(p.line)\n\t\t} else {\n\t\t\treturn numStr(p.line)\n\t\t}\n\t}\n\tp.ensureFields()\n\tif index < 1 {\n\t\tindex = len(p.fields) + 1 + index\n\t\tif index < 1 {\n\t\t\treturn str(\"\")\n\t\t}\n\t}\n\tif index > len(p.fields) {\n\t\treturn str(\"\")\n\t}\n\tif p.fieldsIsTrueStr[index-1] {\n\t\treturn str(p.fields[index-1])\n\t} else {\n\t\treturn numStr(p.fields[index-1])\n\t}\n}", "title": "" }, { "docid": "8aedb31a07d414d49ac099108a1d89e7", "score": "0.54226047", "text": "func (s *Structure) StringFieldIndex(str string) int {\n\tif s.Schema == nil {\n\t\treturn -1\n\t}\n\tfor i, f := range s.Schema.Fields {\n\t\tif f.Name == str {\n\t\t\treturn i\n\t\t}\n\t}\n\treturn -1\n}", "title": "" }, { "docid": "d6ef0b43d6981dd90fb40f85def4ea0a", "score": "0.5420357", "text": "func (slice NodeSlice) index(n Node) int {\n\t// sort.Search() doesn't work as a general purpose search.\n\t// return sort.Search(len(slice), func(j int) bool {\n\t// \treturn slice[j] == n\n\t// })\n\tfor i := 0; i < len(slice); i++ {\n\t\tif slice[i] == n {\n\t\t\treturn i\n\t\t}\n\t}\n\treturn notFound\n}", "title": "" }, { "docid": "e885b337496cc5a8837247f468c20068", "score": "0.539583", "text": "func (t *Type) FieldOff(i int) int64 {\n\tif s := t.Struct(); s == nil {\n\t\tpanic(\"FieldOff can only be called with Struct's\")\n\t} else {\n\t\tif s.NumFields() <= i {\n\t\t\tpanic(\"Invalid field #\")\n\t\t}\n\t\tstd := StdSizes()\n\t\tfield := s.Field(int(i))\n\t\toffsets := std.Offsetsof([]*types.Var{field})\n\t\treturn offsets[0]\n\t}\n}", "title": "" }, { "docid": "b5ae53922275f228403e65d93f5fcc66", "score": "0.5388401", "text": "func (t *structType) FieldByIndex(index []int) (f StructField) {\n\tf.Type = toType(&t.rtype)\n\tfor i, x := range index {\n\t\tif i > 0 {\n\t\t\tft := f.Type\n\t\t\tif ft.Kind() == Ptr && ft.Elem().Kind() == Struct {\n\t\t\t\tft = ft.Elem()\n\t\t\t}\n\t\t\tf.Type = ft\n\t\t}\n\t\tf = f.Type.Field(x)\n\t}\n\treturn\n}", "title": "" }, { "docid": "9e7c6e03a95ac621da0aee54c48b70aa", "score": "0.53553045", "text": "func fileIndexRecord(db *leveldb.DB, n uint32) (*blockFile, error) {\n\tvalue := make([]byte, 4)\n\tbinary.BigEndian.PutUint32(value, n)\n\tdata, err := db.Get(append([]byte(\"f\"), value...), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbuf, err := parser.New(data)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tf := decodeBlockFileIdx(buf)\n\treturn f, nil\n}", "title": "" }, { "docid": "32a05de5fa286795098291af07a51803", "score": "0.532921", "text": "func IntField(name string, offset uint64) *Field {\n\treturn newField(reflect.TypeOf(int(0)),\n\t\tname,\n\t\toffset,\n\t)\n}", "title": "" }, { "docid": "c69b4fcf7f13ceaf7d4a3cf48e13d794", "score": "0.53201854", "text": "func FieldIndex() (fields []string) {\n\treturn FieldsInfoQuote()\n}", "title": "" }, { "docid": "77203a5913ba321199be8402dd8c414a", "score": "0.5314885", "text": "func (s *nodeStack) index(n Node) int {\n\tfor i := len(*s) - 1; i >= 0; i-- {\n\t\tif (*s)[i] == n {\n\t\t\treturn i\n\t\t}\n\t}\n\treturn -1\n}", "title": "" }, { "docid": "d103aec470b90332bc9242fc72efe48e", "score": "0.5247104", "text": "func (p *interp) getField(index int) (value, error) {\n\tif index < 0 {\n\t\treturn value{}, newError(\"field index negative: %d\", index)\n\t}\n\tif index == 0 {\n\t\treturn numStr(p.line), nil\n\t}\n\tif index > len(p.fields) {\n\t\treturn str(\"\"), nil\n\t}\n\treturn numStr(p.fields[index-1]), nil\n}", "title": "" }, { "docid": "70457b3fec2ce4f5bdfa743bf2bf16e7", "score": "0.52374274", "text": "func (ms modelSpec) indexTypeForField(fieldName string) (indexType, bool) {\n\tif index, found := ms.primativeIndexes[fieldName]; found {\n\t\treturn index.indexType, true\n\t} else if index, found := ms.pointerIndexes[fieldName]; found {\n\t\treturn index.indexType, true\n\t} else {\n\t\treturn 0, false\n\t}\n}", "title": "" }, { "docid": "73f348c62c111cc6101944f408508e5e", "score": "0.5236235", "text": "func (e GetClusterInfoResponseBody_NodeValidationError) Field() string { return e.field }", "title": "" }, { "docid": "617b5ff5b151fdab4256d148044d6205", "score": "0.5235344", "text": "func NextNofId(n, key int) *MemberType {\n\tindex := MemList.searchIndexById(key)\n\tindex = (index + n) % len(MemList.members)\n\treturn &MemList.members[index]\n}", "title": "" }, { "docid": "f9f475f0558eea79f1647199eb974e7b", "score": "0.52308893", "text": "func (nbs *Neighbors) GetField(field string) (interface{}, error) {\n\tvar result []interface{}\n\n\tfor _, nb := range *nbs {\n\t\tswitch field {\n\t\tcase \"Vlan\":\n\t\t\tresult = append(result, nb.Vlan)\n\t\tcase \"VNI\":\n\t\t\tresult = append(result, nb.VNI)\n\t\tcase \"IfIndex\":\n\t\t\tresult = append(result, nb.IfIndex)\n\t\tcase \"Flags\":\n\t\t\tresult = append(result, nb.Flags)\n\t\tcase \"MAC\":\n\t\t\tresult = append(result, nb.MAC)\n\t\tcase \"IP\":\n\t\t\tresult = append(result, nb.IP)\n\t\tcase \"State\":\n\t\t\tresult = append(result, nb.State)\n\t\tdefault:\n\t\t\treturn result, common.ErrFieldNotFound\n\t\t}\n\t}\n\n\treturn result, nil\n}", "title": "" }, { "docid": "745536c6f3e452848449094d1bfb2b9d", "score": "0.5220942", "text": "func SplitFieldAndIndex(step string) (field string, idx int) {\n\tfield, idx = step, -1\n\tdata := []byte(step)\n\tsize := len(data)\n\tif size < 4 || data[size-1] != ']' || data[size-2] < '0' || data[size-2] > '9' {\n\t\treturn\n\t}\n\t// split fail if i==0\n\tfor i := size - 3; i > 0; i-- {\n\t\tif data[i] >= '0' && data[i] <= '9' {\n\t\t\t// continue\n\t\t} else if data[i] == '[' {\n\t\t\t// filt field[00]\n\t\t\tif data[i+1] == '0' && data[i+2] == '0' {\n\t\t\t\tbreak\n\t\t\t}\n\t\t\ti64, err := strconv.ParseInt(string(data[i+1:size-1]), 10, 64)\n\t\t\tif err != nil {\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tfield = string(data[:i])\n\t\t\tidx = int(i64)\n\t\t\tbreak\n\t\t} else {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "7411b55d7ef51a0f16fac5d7d25924da", "score": "0.5203778", "text": "func (t *Type) Field(i int) *Field {\n\treturn t.Fields().Slice()[i]\n}", "title": "" }, { "docid": "9b4bf92ecff35105c8663445f01552c2", "score": "0.5193131", "text": "func (arg0 *java_lang_Object) getFieldInt(field string) int32 {\n\treturn arg0.getField(field).(int32)\n}", "title": "" }, { "docid": "ee0690b2b14a7f27333d04889e48f537", "score": "0.5181678", "text": "func Int16Field(name string, offset uint64) *Field {\n\treturn newField(reflect.TypeOf(int16(0)),\n\t\tname,\n\t\toffset,\n\t)\n}", "title": "" }, { "docid": "ad1869832f864d34ec219e7c2a440000", "score": "0.5166469", "text": "func sfoField(f afero.File, field string) (string, error) {\n\tvar hdr sfoHeader\n\n\tif err := binary.Read(f, binary.LittleEndian, &hdr); err != nil {\n\t\treturn \"\", fmt.Errorf(\"sfo header read failed: %w\", err)\n\t}\n\n\tif hdr.Magic != sfoMagic {\n\t\treturn \"\", fmt.Errorf(\"bad sfo magic: %s\", hdr.Magic)\n\t}\n\n\tvar idxEntry *sfoIndexTableEntry\n\n\tfor i := uint32(0); i < hdr.TableEntriesCount; i++ {\n\t\tvar e sfoIndexTableEntry\n\n\t\tindexEntryOff := binary.Size(hdr) + int(i)*binary.Size(e)\n\n\t\tif _, err := f.Seek(int64(indexEntryOff), io.SeekStart); err != nil {\n\t\t\treturn \"\", fmt.Errorf(\"seek to index entry %d failed: %w\", i, err)\n\t\t}\n\n\t\tif err := binary.Read(f, binary.LittleEndian, &e); err != nil {\n\t\t\treturn \"\", fmt.Errorf(\"failed to parse index table entry: %w\", err)\n\t\t}\n\n\t\tkeyOff := hdr.KeyTableStart + uint32(e.KeyOffset)\n\n\t\t_, err := f.Seek(int64(keyOff), io.SeekStart)\n\t\tif err != nil {\n\t\t\treturn \"\", fmt.Errorf(\"failed to seek to key at %d: %w\", keyOff, err)\n\t\t}\n\n\t\tkey, err := bufio.NewReader(f).ReadBytes(0)\n\t\tif err != nil {\n\t\t\treturn \"\", fmt.Errorf(\"failed to read key at %d: %w\", keyOff, err)\n\t\t}\n\n\t\tif string(key[:len(key)-1]) == field {\n\t\t\tidxEntry = &e\n\t\t\tbreak\n\t\t}\n\t}\n\n\tif idxEntry == nil {\n\t\treturn \"\", fmt.Errorf(\"field was not found\")\n\t}\n\n\toff := int64(hdr.DataTableStart) + int64(idxEntry.DataOffset)\n\n\t_, err := f.Seek(off, io.SeekStart)\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"failed to seek to key at %d: %w\", off, err)\n\t}\n\n\tret := make([]byte, idxEntry.DataLen)\n\n\t_, err = io.ReadFull(f, ret)\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"failed to read value: %w\", err)\n\t}\n\n\treturn string(ret[:len(ret)-1]), nil\n}", "title": "" }, { "docid": "99ede9d8254379ebc3b8468a509194e2", "score": "0.5161238", "text": "func (n Node) Index(i int) Node {\n\tif nn := n.get(); nn != nil && nn.info.IsArray() && 0 <= i && i < len(nn.values) {\n\t\tn.id = nn.values[i].id\n\t\treturn n\n\t}\n\tn.id = maxUint\n\treturn n\n}", "title": "" }, { "docid": "5a6487c86ff15ad56c9a9a37763b5cac", "score": "0.51432043", "text": "func findFieldIndex(s reflect.Value, name string) (int, error) {\n\t// the type of the value\n\tsType := s.Type()\n\n\t// first look for matching tags so we can overwrite matching field names\n\tfor i := 0; i < sType.NumField(); i++ {\n\t\t// the field we are current scanning\n\t\tfield := sType.Field(i)\n\n\t\t// the value of the survey tag\n\t\ttag := field.Tag.Get(tagName)\n\t\t// if the tag matches the name we are looking for\n\t\tif tag != \"\" && tag == name {\n\t\t\t// then we found our index\n\t\t\treturn i, nil\n\t\t}\n\t}\n\n\t// then look for matching names\n\tfor i := 0; i < sType.NumField(); i++ {\n\t\t// the field we are current scanning\n\t\tfield := sType.Field(i)\n\n\t\t// if the name of the field matches what we're looking for\n\t\tif strings.ToLower(field.Name) == strings.ToLower(name) {\n\t\t\treturn i, nil\n\t\t}\n\t}\n\n\t// we didn't find the field\n\treturn -1, errFieldNotMatch{name}\n}", "title": "" }, { "docid": "8febe1d4d3d61a3ac80df6ea188b78b6", "score": "0.5123634", "text": "func (e UpdateNodeStateRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "66dacbd075d9ea3e3219fdcdb0200cd3", "score": "0.5118398", "text": "func (temp *Template) getFieldAt(i int) interface{} {\n\treturn temp.Fields[i]\n}", "title": "" }, { "docid": "09f5170962830ea1e10f8ebca8639798", "score": "0.5082047", "text": "func (p *Parser) Field(field []string) (Node []string, e error) {\n\tp.pushTrace(\"Field\")\n\tdefer p.popTrace()\n\n\t_, err, isPoint := p.match(finlex.TokType('.'))\n\tif err != nil || !isPoint {\n\t\treturn field, err\n\t}\n\ttok, err, isRecordField := p.match(finlex.TokId)\n\tif err != nil || !isRecordField {\n\t\treturn field, errors.New(\"Error: Missing id after '.'\")\n\t}\n\n\trecord_field := tok.GetLexeme()\n\tfield = append(field, record_field)\n\n\totherfield, err := p.Field(field)\n\tif err != nil {\n\t\treturn otherfield, err\n\t}\n\treturn otherfield, nil\n}", "title": "" }, { "docid": "25e1e6b52c1e920715a8444e339f602e", "score": "0.5077055", "text": "func (info *FieldInfo) Node() *ast.Field {\n\treturn info.node\n}", "title": "" }, { "docid": "9068f14299d4d5c97640cb5654042792", "score": "0.5076226", "text": "func (t *T) Field(n string) *T {\n\tfor _, f := range t.Fields {\n\t\tif f.Name == n {\n\t\t\treturn f.T\n\t\t}\n\t}\n\treturn Errorf(\"field %q not found\", n)\n}", "title": "" }, { "docid": "d1f0835cbc9e73280639c47b7cb8a6cb", "score": "0.5051625", "text": "func _getField(ls LuaState, key string, dft int64) int {\n\tt := ls.GetField(-1, key)\n\tres, isNum := ls.ToIntegerX(-1)\n\tif !isNum {\n\t\tif t != LUA_TNIL {\n\t\t\treturn ls.Error2(\"field '%s' is not an integer\", key)\n\t\t} else if dft < 0 {\n\t\t\treturn ls.Error2(\"field '%s' missing in date table\", key)\n\t\t}\n\t\tres = dft\n\t}\n\tls.Pop(1)\n\treturn int(res)\n}", "title": "" }, { "docid": "23f1e7e785625ed2708377183e4bde2c", "score": "0.50495374", "text": "func (l *luaState) GetField(idx int, k string) LuaType {\n\tt := l.stack.get(idx)\n\treturn l.getTable(t, k, false)\n}", "title": "" }, { "docid": "15a05eaeb4b6278d1ff49a5f311f07da", "score": "0.5026092", "text": "func (id NodeID) Field() log.Field { return log.String(\"node_id\", id.Key) }", "title": "" }, { "docid": "50aa1425d65ba8d08f805c2573632434", "score": "0.5001996", "text": "func (addenda02 *Addenda02) TraceNumberField() string {\n\treturn addenda02.stringField(addenda02.TraceNumber, 15)\n}", "title": "" }, { "docid": "c3709044b9ac2707a3191c2961f36d83", "score": "0.4962971", "text": "func (c *Contacts) IndexOf(node *Node) int {\n\tc.mutex.RLock()\n\tdefer c.mutex.RUnlock()\n\n\tid := c.nodeID(node)\n\tif i, ok := c.uniq[id]; ok {\n\t\treturn i\n\t}\n\treturn -1\n}", "title": "" }, { "docid": "efbf6bdba8cf568a3c5690d2406e1a6a", "score": "0.49618822", "text": "func (e ElasticNodeGroupValidationError) Field() string { return e.field }", "title": "" }, { "docid": "c60f17a481940b3397a4dbe4bd4c557d", "score": "0.49597716", "text": "func (ro *RemittanceOriginator) IdentificationNumberField() string {\n\treturn ro.alphaField(ro.IdentificationNumber, 35)\n}", "title": "" }, { "docid": "2f2e0f25b2db4cf33a494dadf1d6c3ca", "score": "0.4952639", "text": "func (l *LList) findNthFromBeg(n int) int {\n\tcurrent := l.head\n\tfor i := 1; i < n; i++ {\n\t\tcurrent = current.next\n\t}\n\treturn current.data\n}", "title": "" }, { "docid": "f40b7e57340b4c362ab1ab91f7dc8a80", "score": "0.49512047", "text": "func (ntq *NumberTokenQuery) OnlyIDX(ctx context.Context) int {\n\tid, err := ntq.OnlyID(ctx)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn id\n}", "title": "" }, { "docid": "82e68368352635f54c006b343bf25f86", "score": "0.49494588", "text": "func (e UpdateNodesStateResponseBodyValidationError) Field() string { return e.field }", "title": "" }, { "docid": "66601054599cd229b9c3dd04eb681694", "score": "0.4937363", "text": "func findNodeIndex(r []uint32, d uint32) int {\n\tfor i, v := range r {\n\t\tif v == d {\n\t\t\treturn i\n\t\t}\n\t}\n\treturn -1\n}", "title": "" }, { "docid": "fc1dc57cbcf4faa1b3b944d250fb6553", "score": "0.49192315", "text": "func (e GlobalSecondaryIndexValidationError) Field() string { return e.field }", "title": "" }, { "docid": "fc1dc57cbcf4faa1b3b944d250fb6553", "score": "0.49192315", "text": "func (e GlobalSecondaryIndexValidationError) Field() string { return e.field }", "title": "" }, { "docid": "4deab639f10aa5386d1d2f51cf6923d1", "score": "0.49115646", "text": "func offsetOf(f reflect.StructField, x exporter) offset {\n\tif len(f.Index) != 1 {\n\t\tpanic(\"embedded structs are not supported\")\n\t}\n\tif f.PkgPath == \"\" {\n\t\treturn offset{index: f.Index[0]} // field is already exported\n\t}\n\tif x == nil {\n\t\tpanic(\"exporter must be provided for unexported field\")\n\t}\n\treturn offset{index: f.Index[0], export: x}\n}", "title": "" }, { "docid": "001e3cb3cc88714d9e4526e0f00ead07", "score": "0.4903476", "text": "func (nbs *Neighbors) GetFieldInt64(key string) (int64, error) {\n\tfor _, nb := range *nbs {\n\t\tswitch key {\n\t\tcase \"Vlan\":\n\t\t\treturn nb.Vlan, nil\n\t\tcase \"VNI\":\n\t\t\treturn nb.VNI, nil\n\t\tcase \"IfIndex\":\n\t\t\treturn nb.IfIndex, nil\n\t\t}\n\t}\n\treturn 0, common.ErrFieldNotFound\n}", "title": "" }, { "docid": "28444e51001e47780122f6132c6157e4", "score": "0.4902328", "text": "func (cols Headers) GetField(index int) string {\n\tfor _, col := range cols {\n\t\tif col.Index == index {\n\t\t\treturn col.Field\n\t\t}\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "e000af318c25de9855453e101f04bd10", "score": "0.48985928", "text": "func FieldOffsetFromField(f Field) FieldOffset {\n\treturn fieldFieldOffset(f)\n}", "title": "" }, { "docid": "c823fe57e53ffe951bc8b45174ecfffe", "score": "0.48964748", "text": "func (f *Field) getFieldAddr() interface{} {\n\tswitch f.typ {\n\n\tcase\n\t\t\"int\", \"uint\",\n\t\t\"int8\", \"uint8\",\n\t\t\"int16\", \"uint16\",\n\t\t\"int32\", \"uint32\",\n\t\t\"int64\", \"uint64\":\n\t\treturn &f.nullInt64\n\tcase \"float32\", \"float64\":\n\t\treturn &f.nullFloat64\n\tcase \"string\":\n\t\treturn &f.nullString\n\tcase \"bool\":\n\t\treturn &f.nullBool\n\tcase \"custom\", \"time\":\n\t\treturn &f.raw\n\tcase \"raw\":\n\t\treturn &f.raw\n\tdefault:\n\t\treturn &f.addr\n\t}\n}", "title": "" }, { "docid": "3db873b7c59ee841a90dcd4a20974f24", "score": "0.4890297", "text": "func (l LayerID) Field() log.Field { return log.Uint32(\"layer_id\", l.Value) }", "title": "" }, { "docid": "9a795e89f3696d8c0c2959262cf726d7", "score": "0.48842984", "text": "func (pc *passContext) fieldListFor(pos token.Pos, fieldObj types.Object, index int, fieldName string, checkMutex bool) (int, bool) {\n\tvar lff lockFieldFacts\n\tif !pc.pass.ImportObjectFact(fieldObj, &lff) {\n\t\t// This should not happen: we export facts for all fields.\n\t\tpanic(fmt.Sprintf(\"no lockFieldFacts available for field %s\", fieldName))\n\t}\n\t// Check that it is indeed a mutex.\n\tif checkMutex && !lff.IsMutex && !lff.IsRWMutex {\n\t\tpc.maybeFail(pos, \"field %s is not a mutex or an rwmutex\", fieldName)\n\t\treturn 0, false\n\t}\n\t// Return the resolution path.\n\tif lff.IsPointer {\n\t\treturn -(index + 1), true\n\t}\n\treturn (index + 1), true\n}", "title": "" }, { "docid": "64320a317c6dacb9dcaf830977645e14", "score": "0.4866869", "text": "func (e NodeGroupValidationError) Field() string { return e.field }", "title": "" }, { "docid": "596ce8c1955cf9d98554fe304f57013b", "score": "0.4863679", "text": "func (e NemSpecificValidationError) Field() string { return e.field }", "title": "" }, { "docid": "b9dea32acf7ee14de5cffcc53dc3b5d7", "score": "0.4857538", "text": "func (e ReservedNodeGroupValidationError) Field() string { return e.field }", "title": "" }, { "docid": "e2e6e4f69dbd073757f92da71b22e7ea", "score": "0.48542172", "text": "func (bh *BatchHeader) ODFIIdentificationField() string {\n\treturn bh.stringField(bh.ODFIIdentification, 8)\n}", "title": "" }, { "docid": "9d04e6c32bb5cd758f10dabb771337c5", "score": "0.48456234", "text": "func getIntFieldValue(fieldName, fieldValue string) int {\n\tmv := -1\n\tfor i, v := range Enums[fieldName] {\n\t\tif v == fieldValue {\n\t\t\tmv = i\n\t\t\tbreak\n\t\t}\n\t}\n\treturn mv\n}", "title": "" }, { "docid": "97467da10ded3471150a93f5dd98afe5", "score": "0.48395675", "text": "func (ctxt *Link) getFileIndexAndLine(xpos src.XPos) (int, int32) {\n\tf, l := ctxt.getFileSymbolAndLine(xpos)\n\treturn ctxt.PosTable.FileIndex(f), l\n}", "title": "" }, { "docid": "91a3cb7abe97888f0cc7dbe6606a5313", "score": "0.48374104", "text": "func (ly *CTLayer) UnitVarIdx(varNm string) (int, error) {\n\tvidx, err := ly.TopoInhibLayer.UnitVarIdx(varNm)\n\tif err == nil {\n\t\treturn vidx, err\n\t}\n\tif varNm != \"CtxtGe\" {\n\t\treturn -1, fmt.Errorf(\"deep.CTLayer: variable named: %s not found\", varNm)\n\t}\n\tnn := ly.TopoInhibLayer.UnitVarNum()\n\treturn nn, nil\n}", "title": "" }, { "docid": "bc7c7812ab39af94cd2ea4901de50515", "score": "0.48272955", "text": "func (e CreateNodeRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "4770a273eec82fe58b107e2f7992a784", "score": "0.48239917", "text": "func (e NodeMetadataValidationError) Field() string { return e.field }", "title": "" }, { "docid": "b9d066b86c3e84bd9658dc80bdf6cbaf", "score": "0.4814136", "text": "func (binlogCoordinates *BinlogCoordinates) FileNumber() (int, int) {\n\ttokens := strings.Split(binlogCoordinates.LogFile, \".\")\n\tnumPart := tokens[len(tokens)-1]\n\tnumLen := len(numPart)\n\tfileNum, err := strconv.Atoi(numPart)\n\tif err != nil {\n\t\treturn 0, 0\n\t}\n\treturn fileNum, numLen\n}", "title": "" }, { "docid": "db97c0e4dcbdf4514cbf53d9197e3e55", "score": "0.4804871", "text": "func (r *Record) Field(pos int) (interface{}, error) {\n\tif pos < 0 || len(r.data) < pos {\n\t\treturn 0, ErrInvalidField\n\t}\n\treturn r.data[pos], nil\n}", "title": "" }, { "docid": "22e1af9155cb277cb272ab6a58464b95", "score": "0.47979477", "text": "func (iatBh *IATBatchHeader) ODFIIdentificationField() string {\n\treturn iatBh.stringField(iatBh.ODFIIdentification, 8)\n}", "title": "" }, { "docid": "7362d0607cf8f718d5f5d8a4cca9f750", "score": "0.47941354", "text": "func (e IndexUpdateActionValidationError) Field() string { return e.field }", "title": "" }, { "docid": "51bd3c10d6dba0ed5c2efd60aed7c56c", "score": "0.47921154", "text": "func objectFieldOffset(frame *rtda.Frame) {\n\tvars := frame.LocalVars()\n\tjField := vars.GetRef(1)\n\n\toffset := jField.GetIntVar(\"slot\", \"I\")\n\n\tstack := frame.OperandStack()\n\tstack.PushLong(int64(offset))\n}", "title": "" }, { "docid": "70c0fae0d3b0d21f7be71967d09e5c5a", "score": "0.47888386", "text": "func alpindex(idx int, node *pqnode.Node) *pqnode.Node {\n\tif i, err := strconv.Atoi(node.Index); err == nil && i == idx && (strings.TrimSpace(node.Word) != \"\" || len(node.NodeList) > 1) {\n\t\treturn node\n\t}\n\tfor _, n := range node.NodeList {\n\t\tif n2 := alpindex(idx, n); n2 != nil {\n\t\t\treturn n2\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "bf31efd3440f4c70947c3c6a21285831", "score": "0.47845963", "text": "func GetField(ctx *gin.Context, index int) string {\n\tpath := strings.Trim(ctx.Request.URL.Path, \"/\")\n\tfields := strings.Split(path, \"/\")\n\tif index > 0 {\n\t\treturn fields[index]\n\t}\n\treturn fields[len(fields)+index]\n}", "title": "" }, { "docid": "a8c55ca240d3cdbf2a7514b1c4c8dce8", "score": "0.4783012", "text": "func (e DeleteNodeRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "9b874099e79c641f4cc6b49a4a6463d0", "score": "0.47809234", "text": "func tagToOffset(field reflect.StructField) int64 {\n\trawOffset := field.Tag.Get(\"offset\")\n\toffset, err := strconv.ParseInt(rawOffset, 0, 16)\n\tif err != nil {\n\t\treturn -1\n\t}\n\treturn offset\n}", "title": "" }, { "docid": "67ff7f2949b67b3cc9a33c9f5c38146d", "score": "0.4773376", "text": "func emitFieldSelection(f *Function, v Value, index int, wantAddr bool, id *ast.Ident) Value {\n\tif st, vptr := deref(v.Type()); vptr {\n\t\tfld := fieldOf(st, index)\n\t\tinstr := &FieldAddr{\n\t\t\tX: v,\n\t\t\tField: index,\n\t\t}\n\t\tinstr.setPos(id.Pos())\n\t\tinstr.setType(types.NewPointer(fld.Type()))\n\t\tv = f.emit(instr)\n\t\t// Load the field's value iff we don't want its address.\n\t\tif !wantAddr {\n\t\t\tv = emitLoad(f, v)\n\t\t}\n\t} else {\n\t\tfld := fieldOf(v.Type(), index)\n\t\tinstr := &Field{\n\t\t\tX: v,\n\t\t\tField: index,\n\t\t}\n\t\tinstr.setPos(id.Pos())\n\t\tinstr.setType(fld.Type())\n\t\tv = f.emit(instr)\n\t}\n\temitDebugRef(f, id, v, wantAddr)\n\treturn v\n}", "title": "" }, { "docid": "8d5daa4a212465aa257645ba501ca6af", "score": "0.47732127", "text": "func (e CreateTransactionNemSpecificValidationError) Field() string { return e.field }", "title": "" }, { "docid": "90014f3524eed1e3ed1601b475559d7c", "score": "0.47729248", "text": "func makeFieldIndex(s []string) map[string]int {\n\tm := map[string]int{}\n\tfor i := range s {\n\t\tm[s[i]] = i\n\t}\n\treturn m\n}", "title": "" }, { "docid": "25b9fff36cb32a00ee11ff0563ac29de", "score": "0.4769308", "text": "func (d *KVFileStore) calcFileIndex(id Identifier) (uint64, error) {\n\ts := d.subtreeSize(id)\n\ts1, err := d.leftSiblingsSubtreeSize(id)\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\n\tidx := s + s1 - 1\n\toffset := idx * shared.WB\n\t//fmt.Printf(\"Node id %s. Index: %d. Offset: %d\\n\", id, idx, offset)\n\treturn offset, nil\n}", "title": "" }, { "docid": "cf59f1a70ec76c505ae5073f98d07b96", "score": "0.47627282", "text": "func IntField(name string, value int) FieldOpt {\n\tswitch unsafe.Sizeof(value) {\n\tcase 4:\n\t\treturn Int32Field(name, int32(value))\n\tcase 8:\n\t\treturn Int64Field(name, int64(value))\n\tdefault:\n\t\tpanic(\"Unsupported int size\")\n\t}\n}", "title": "" }, { "docid": "ae76115d38c6d05ee122e4a2d68d583b", "score": "0.4757746", "text": "func getField(v reflect.Value, i int) reflect.Value {\n\tval := v.Field(i)\n\tif val.Kind() == reflect.Interface && !val.IsNil() {\n\t\tval = val.Elem()\n\t}\n\treturn val\n}", "title": "" }, { "docid": "39b075227f1e2668d3ecbd4dab8a68da", "score": "0.4749112", "text": "func (e DeleteNodeResponseBodyValidationError) Field() string { return e.field }", "title": "" }, { "docid": "9834173be523f68a8bedc6ed0a80c385", "score": "0.47446862", "text": "func fieldByIndex(v reflect.Value, index []int) reflect.Value {\n\tif len(index) == 1 {\n\t\treturn v.Field(index[0])\n\t}\n\n\tfor _, x := range index {\n\t\tf := v.Field(x)\n\t\tif f.Kind() == reflect.Ptr {\n\t\t\tif f.IsNil() {\n\t\t\t\tf.Set(reflect.New(f.Type().Elem()))\n\t\t\t}\n\n\t\t\tf = f.Elem()\n\t\t}\n\t\tv = f\n\t}\n\treturn v\n}", "title": "" }, { "docid": "ad1a8f67de346f82a7b0c2a088841ead", "score": "0.4735659", "text": "func (t *Table) getField(col string) (int, *sql.Column) {\n\ti := t.schema.IndexOf(col, t.name)\n\tif i == -1 {\n\t\treturn -1, nil\n\t}\n\n\treturn i, t.schema.Schema[i]\n}", "title": "" }, { "docid": "527d4a369eda1d939740d88c12467aab", "score": "0.47333658", "text": "func (h *Header) Index(n string) int {\n\tidx, ok := h.cards[n]\n\tif ok {\n\t\treturn idx\n\t}\n\treturn -1\n}", "title": "" } ]
ca9707a695f52f66c6087907565d95bf
BaselineCategoryListIDs returns the "baseline_category_list" edge IDs in the mutation.
[ { "docid": "44152414ddd09b33415af9b889832d53", "score": "0.7893474", "text": "func (m *BaselineClassMutation) BaselineCategoryListIDs() (ids []int) {\n\tfor id := range m.baseline_category_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" } ]
[ { "docid": "a204d1037afca35abe6d4a83b54ec655", "score": "0.7295475", "text": "func (m *BaselineClassMutation) RemovedBaselineCategoryListIDs() (ids []int) {\n\tfor id := range m.removedbaseline_category_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "e22dbd01726eb778b383d0ac5b963532", "score": "0.7276639", "text": "func (m *BaselineClassMutation) AddBaselineCategoryListIDs(ids ...int) {\n\tif m.baseline_category_list == nil {\n\t\tm.baseline_category_list = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.baseline_category_list[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "764a90a844c01e0a863accdb27192332", "score": "0.70447665", "text": "func (m *BaselineCategoryMutation) BaselineMeasurementListIDs() (ids []int) {\n\tfor id := range m.baseline_measurement_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "d00f1f366ece278385611fe7d9540cdf", "score": "0.6616883", "text": "func (m *BaselineCharacteristicsModuleMutation) BaselineMeasureListIDs() (ids []int) {\n\tfor id := range m.baseline_measure_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "67a59d7f8a017f41fb61e17ca481f963", "score": "0.65602577", "text": "func (m *BaselineMeasureMutation) BaselineClassListIDs() (ids []int) {\n\tfor id := range m.baseline_class_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "3e609a0628d0f2b647976e85b23471a1", "score": "0.64575195", "text": "func (m *BaselineCategoryMutation) AddBaselineMeasurementListIDs(ids ...int) {\n\tif m.baseline_measurement_list == nil {\n\t\tm.baseline_measurement_list = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.baseline_measurement_list[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "ac6421505f710c59201a6e553f2eaea4", "score": "0.64491355", "text": "func (m *BaselineClassMutation) RemoveBaselineCategoryListIDs(ids ...int) {\n\tif m.removedbaseline_category_list == nil {\n\t\tm.removedbaseline_category_list = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tdelete(m.baseline_category_list, ids[i])\n\t\tm.removedbaseline_category_list[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "75fffb4ddbebae099d8609e29ae980ab", "score": "0.6395476", "text": "func (m *BaselineCategoryMutation) RemovedBaselineMeasurementListIDs() (ids []int) {\n\tfor id := range m.removedbaseline_measurement_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "a3597c062acfa871432fb7d7a1eae218", "score": "0.6251727", "text": "func (m *BaselineCharacteristicsModuleMutation) BaselineGroupListIDs() (ids []int) {\n\tfor id := range m.baseline_group_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "4144649e26528a69738cf48fea4dd1ef", "score": "0.6208025", "text": "func (m *BaselineMeasureMutation) RemovedBaselineClassListIDs() (ids []int) {\n\tfor id := range m.removedbaseline_class_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "f740838a8c3bce770b3ace8aacc7bb5b", "score": "0.6127067", "text": "func (m *BaselineMeasureMutation) AddBaselineClassListIDs(ids ...int) {\n\tif m.baseline_class_list == nil {\n\t\tm.baseline_class_list = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.baseline_class_list[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "9f22b86d62bdf530f43ba4924fd91bab", "score": "0.5996423", "text": "func (m *OutcomeClassMutation) OutcomeCategoryListIDs() (ids []int) {\n\tfor id := range m.outcome_category_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "c05780bc6204ebcd607c9928383d0ed7", "score": "0.59887534", "text": "func (m *BaselineClassMutation) ResetBaselineCategoryList() {\n\tm.baseline_category_list = nil\n\tm.clearedbaseline_category_list = false\n\tm.removedbaseline_category_list = nil\n}", "title": "" }, { "docid": "f631c4dd4d18052c55e3dcd8afbdee38", "score": "0.5980097", "text": "func (m *BaselineDenomMutation) BaselineDenomCountListIDs() (ids []int) {\n\tfor id := range m.baseline_denom_count_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "6e1be991fb084d3244b7f66cd2bdb492", "score": "0.5976466", "text": "func (m *BaselineCharacteristicsModuleMutation) RemovedBaselineMeasureListIDs() (ids []int) {\n\tfor id := range m.removedbaseline_measure_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "eb95b19fc82e9bfa0d1e5fbc8e011fd9", "score": "0.5830949", "text": "func (m *BaselineCharacteristicsModuleMutation) AddBaselineMeasureListIDs(ids ...int) {\n\tif m.baseline_measure_list == nil {\n\t\tm.baseline_measure_list = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.baseline_measure_list[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "bbc03e4d1fa7610b7264f02fcb1ee988", "score": "0.5821159", "text": "func (m *BaselineCharacteristicsModuleMutation) BaselineDenomListIDs() (ids []int) {\n\tfor id := range m.baseline_denom_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "f8b45c9c0217968273d93a6a539e10e4", "score": "0.5817852", "text": "func (bdc *BaselineDenomCreate) AddBaselineDenomCountListIDs(ids ...int) *BaselineDenomCreate {\n\tbdc.mutation.AddBaselineDenomCountListIDs(ids...)\n\treturn bdc\n}", "title": "" }, { "docid": "db84f9c9f0ccd972a1642ba258233a91", "score": "0.57857996", "text": "func (m *BaselineCategoryMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase baselinecategory.EdgeParent:\n\t\tif id := m.parent; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\tcase baselinecategory.EdgeBaselineMeasurementList:\n\t\tids := make([]ent.Value, 0, len(m.baseline_measurement_list))\n\t\tfor id := range m.baseline_measurement_list {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c6308eb28a998d4faa035efc66440dc0", "score": "0.576309", "text": "func (m *BaselineDenomMutation) RemovedBaselineDenomCountListIDs() (ids []int) {\n\tfor id := range m.removedbaseline_denom_count_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "f6cca8b2ac43dd448537d8da68ca428f", "score": "0.5745955", "text": "func (m *BaselineMeasureDenomMutation) BaselineMeasureDenomCountListIDs() (ids []int) {\n\tfor id := range m.baseline_measure_denom_count_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "1fe182b279b03537e8fe449ccb4dad87", "score": "0.57410324", "text": "func (m *BaselineCategoryMutation) RemoveBaselineMeasurementListIDs(ids ...int) {\n\tif m.removedbaseline_measurement_list == nil {\n\t\tm.removedbaseline_measurement_list = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tdelete(m.baseline_measurement_list, ids[i])\n\t\tm.removedbaseline_measurement_list[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "09c646cca12ba5416936bc15bdebd9bc", "score": "0.5731785", "text": "func (m *BaselineMeasureMutation) BaselineMeasureDenomListIDs() (ids []int) {\n\tfor id := range m.baseline_measure_denom_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "86ec359c3c9175058128d2e2c219bc8d", "score": "0.5719508", "text": "func (m *OutcomeClassMutation) RemovedOutcomeCategoryListIDs() (ids []int) {\n\tfor id := range m.removedoutcome_category_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "804f08597fae053d8c7a97335bda18a6", "score": "0.5700463", "text": "func (bmu *BaselineMeasureUpdate) AddBaselineClassListIDs(ids ...int) *BaselineMeasureUpdate {\n\tbmu.mutation.AddBaselineClassListIDs(ids...)\n\treturn bmu\n}", "title": "" }, { "docid": "5ee75af55d14e39f72fa743727f95ba3", "score": "0.5698349", "text": "func (m *BaselineClassMutation) ClearBaselineCategoryList() {\n\tm.clearedbaseline_category_list = true\n}", "title": "" }, { "docid": "b08c90ce6241cdb842063f794cd1ad7a", "score": "0.5692869", "text": "func (m *BaselineClassDenomMutation) BaselineClassDenomCountListIDs() (ids []int) {\n\tfor id := range m.baseline_class_denom_count_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "d7894353eab7ca1bf47be6da3c29a922", "score": "0.56868976", "text": "func (m *BaselineCharacteristicsModuleMutation) RemovedBaselineGroupListIDs() (ids []int) {\n\tfor id := range m.removedbaseline_group_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "01bba72e2e852f5ae6838ea6a9ec53bb", "score": "0.5641395", "text": "func (m *BaselineCharacteristicsModuleMutation) AddBaselineGroupListIDs(ids ...int) {\n\tif m.baseline_group_list == nil {\n\t\tm.baseline_group_list = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.baseline_group_list[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "426dc1efe8f89686c6ca57367e0a3a02", "score": "0.56071484", "text": "func (m *BaselineMeasureDenomMutation) RemovedBaselineMeasureDenomCountListIDs() (ids []int) {\n\tfor id := range m.removedbaseline_measure_denom_count_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "659685d0e060f2c86e74ccde15cbfa53", "score": "0.5601515", "text": "func (m *BaselineClassMutation) BaselineClassDenomListIDs() (ids []int) {\n\tfor id := range m.baseline_class_denom_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "be293ad5f9cc8f40fbb875b164e3c23e", "score": "0.55981773", "text": "func (m *BaselineDenomMutation) AddBaselineDenomCountListIDs(ids ...int) {\n\tif m.baseline_denom_count_list == nil {\n\t\tm.baseline_denom_count_list = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.baseline_denom_count_list[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "3271a6995c5131aa9e973247c7641546", "score": "0.5585308", "text": "func (m *BaselineClassDenomMutation) RemovedBaselineClassDenomCountListIDs() (ids []int) {\n\tfor id := range m.removedbaseline_class_denom_count_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "b3c002975217573e0213c0e15a9c5a81", "score": "0.5571604", "text": "func (m *BaselineMeasureMutation) RemovedBaselineMeasureDenomListIDs() (ids []int) {\n\tfor id := range m.removedbaseline_measure_denom_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "cab6d2d4930814abf13293ae46d3cd2d", "score": "0.5541326", "text": "func (bmuo *BaselineMeasureUpdateOne) AddBaselineClassListIDs(ids ...int) *BaselineMeasureUpdateOne {\n\tbmuo.mutation.AddBaselineClassListIDs(ids...)\n\treturn bmuo\n}", "title": "" }, { "docid": "7aa7b9ebce52e207c849152ca4843669", "score": "0.5536727", "text": "func (m *BaselineClassMutation) RemovedBaselineClassDenomListIDs() (ids []int) {\n\tfor id := range m.removedbaseline_class_denom_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "62e9f45e2e97d8109138c01f0e4c9491", "score": "0.5535422", "text": "func (m *BaselineMeasureDenomMutation) AddBaselineMeasureDenomCountListIDs(ids ...int) {\n\tif m.baseline_measure_denom_count_list == nil {\n\t\tm.baseline_measure_denom_count_list = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.baseline_measure_denom_count_list[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "bc2ca1e95f6e678fa62e870111b414eb", "score": "0.5520901", "text": "func (m *BaselineCharacteristicsModuleMutation) RemovedBaselineDenomListIDs() (ids []int) {\n\tfor id := range m.removedbaseline_denom_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "7f0dd096a0c9a7ed420866692fe421e5", "score": "0.5499053", "text": "func (m *BaselineCategoryMutation) ParentIDs() (ids []int) {\n\tif id := m.parent; id != nil {\n\t\tids = append(ids, *id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "ddf14ec78c80125e63d52ab9925b67b5", "score": "0.54473424", "text": "func (m *BaselineMeasureMutation) RemoveBaselineClassListIDs(ids ...int) {\n\tif m.removedbaseline_class_list == nil {\n\t\tm.removedbaseline_class_list = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tdelete(m.baseline_class_list, ids[i])\n\t\tm.removedbaseline_class_list[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "22a9a380809672204f8b8ec0d1ee2677", "score": "0.54456586", "text": "func (m *BaselineClassDenomMutation) AddBaselineClassDenomCountListIDs(ids ...int) {\n\tif m.baseline_class_denom_count_list == nil {\n\t\tm.baseline_class_denom_count_list = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.baseline_class_denom_count_list[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "82dfe25a3df46ab044a9276f14e6e069", "score": "0.539183", "text": "func (m *BaselineClassMutation) BaselineCategoryListCleared() bool {\n\treturn m.clearedbaseline_category_list\n}", "title": "" }, { "docid": "f4869b34910a9685122c64f14b53481a", "score": "0.5387544", "text": "func (m *BaselineCharacteristicsModuleMutation) AddBaselineDenomListIDs(ids ...int) {\n\tif m.baseline_denom_list == nil {\n\t\tm.baseline_denom_list = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.baseline_denom_list[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "899923f50a30f067c5276052a8d29423", "score": "0.5366968", "text": "func (m *BaselineCategoryMutation) IDs(ctx context.Context) ([]int, error) {\n\tswitch {\n\tcase m.op.Is(OpUpdateOne | OpDeleteOne):\n\t\tid, exists := m.ID()\n\t\tif exists {\n\t\t\treturn []int{id}, nil\n\t\t}\n\t\tfallthrough\n\tcase m.op.Is(OpUpdate | OpDelete):\n\t\treturn m.Client().BaselineCategory.Query().Where(m.predicates...).IDs(ctx)\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"IDs is not allowed on %s operations\", m.op)\n\t}\n}", "title": "" }, { "docid": "bf0e5d80184f0a4eecfaa5c8a8fe3e96", "score": "0.53380907", "text": "func (m *BaselineMeasureMutation) AddBaselineMeasureDenomListIDs(ids ...int) {\n\tif m.baseline_measure_denom_list == nil {\n\t\tm.baseline_measure_denom_list = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.baseline_measure_denom_list[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "b57a8c6d0967fda6b06e5ea71500ed77", "score": "0.53353024", "text": "func (bdc *BaselineDenomCreate) AddBaselineDenomCountList(b ...*BaselineDenomCount) *BaselineDenomCreate {\n\tids := make([]int, len(b))\n\tfor i := range b {\n\t\tids[i] = b[i].ID\n\t}\n\treturn bdc.AddBaselineDenomCountListIDs(ids...)\n}", "title": "" }, { "docid": "856f4b3bfc0805da2e3f3819c5fa64cd", "score": "0.5326995", "text": "func (m *BaselineClassMutation) AddBaselineClassDenomListIDs(ids ...int) {\n\tif m.baseline_class_denom_list == nil {\n\t\tm.baseline_class_denom_list = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.baseline_class_denom_list[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "aa7e6ee5117e756e7b99db9e8e3ca393", "score": "0.5229778", "text": "func (m *BaselineClassMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase baselineclass.EdgeParent:\n\t\tif id := m.parent; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\tcase baselineclass.EdgeBaselineClassDenomList:\n\t\tids := make([]ent.Value, 0, len(m.baseline_class_denom_list))\n\t\tfor id := range m.baseline_class_denom_list {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\tcase baselineclass.EdgeBaselineCategoryList:\n\t\tids := make([]ent.Value, 0, len(m.baseline_category_list))\n\t\tfor id := range m.baseline_category_list {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "428f9358bb67f211ff0638e0e11bde01", "score": "0.5216535", "text": "func (m *OutcomeClassMutation) AddOutcomeCategoryListIDs(ids ...int) {\n\tif m.outcome_category_list == nil {\n\t\tm.outcome_category_list = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.outcome_category_list[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "f2025726f463a95fac79fe7ca24feba6", "score": "0.51890016", "text": "func (bmu *BaselineMeasureUpdate) RemoveBaselineClassListIDs(ids ...int) *BaselineMeasureUpdate {\n\tbmu.mutation.RemoveBaselineClassListIDs(ids...)\n\treturn bmu\n}", "title": "" }, { "docid": "46f371904a837136764380b798999299", "score": "0.51662135", "text": "func (m *BaselineMeasureMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase baselinemeasure.EdgeParent:\n\t\tif id := m.parent; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\tcase baselinemeasure.EdgeBaselineMeasureDenomList:\n\t\tids := make([]ent.Value, 0, len(m.baseline_measure_denom_list))\n\t\tfor id := range m.baseline_measure_denom_list {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\tcase baselinemeasure.EdgeBaselineClassList:\n\t\tids := make([]ent.Value, 0, len(m.baseline_class_list))\n\t\tfor id := range m.baseline_class_list {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "edbcccc1603249b215c18947c074970e", "score": "0.51210046", "text": "func (m *BaselineCharacteristicsModuleMutation) RemoveBaselineMeasureListIDs(ids ...int) {\n\tif m.removedbaseline_measure_list == nil {\n\t\tm.removedbaseline_measure_list = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tdelete(m.baseline_measure_list, ids[i])\n\t\tm.removedbaseline_measure_list[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "f50f6d1baf3a9f1728f2cb90b5d648f5", "score": "0.51187915", "text": "func (m *BaselineCategoryMutation) RemovedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase baselinecategory.EdgeBaselineMeasurementList:\n\t\tids := make([]ent.Value, 0, len(m.removedbaseline_measurement_list))\n\t\tfor id := range m.removedbaseline_measurement_list {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "1fa5a2c4c31abcadda34545886650880", "score": "0.5107859", "text": "func (bmu *BaselineMeasureUpdate) AddBaselineMeasureDenomListIDs(ids ...int) *BaselineMeasureUpdate {\n\tbmu.mutation.AddBaselineMeasureDenomListIDs(ids...)\n\treturn bmu\n}", "title": "" }, { "docid": "ce1fe8c6032de2c61a5881ef13354b7d", "score": "0.5076882", "text": "func (m *BaselineMeasureMutation) ParentIDs() (ids []int) {\n\tif id := m.parent; id != nil {\n\t\tids = append(ids, *id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "59aefbd08884dd78bca24a4e3994cb9f", "score": "0.50758356", "text": "func (args *Batch) IdList () ([]string, error) {\n\tvar txidList []string\n\n\ttxCount, err := strconv.Atoi(args.Args.TxCount)\n\tif err != nil {\n return []string{}, err\n }\n\n\tfor txIndex := 0; txIndex < txCount; txIndex++ {\n\t\ttxid, err := args.TxId()\n\t\tif err != nil {\n\t\t\treturn []string{}, err\n\t\t}\n\t\ttxidList = append(txidList, txid)\n\t}\n\treturn txidList, nil\n}", "title": "" }, { "docid": "e6dae0eb329c5e53c2c9343bd70c9c37", "score": "0.5058193", "text": "func (bmu *BaselineMeasureUpdate) AddBaselineClassList(b ...*BaselineClass) *BaselineMeasureUpdate {\n\tids := make([]int, len(b))\n\tfor i := range b {\n\t\tids[i] = b[i].ID\n\t}\n\treturn bmu.AddBaselineClassListIDs(ids...)\n}", "title": "" }, { "docid": "a3397ef5b1b9ce8fc9e8cbd2e687ccf2", "score": "0.5017083", "text": "func (m *OutcomeMeasureMutation) RemovedOutcomeAnalysisListIDs() (ids []int) {\n\tfor id := range m.removedoutcome_analysis_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "4684445f4e815f7b030639cadac37ea2", "score": "0.50170773", "text": "func (m *OutcomeMeasureMutation) OutcomeAnalysisListIDs() (ids []int) {\n\tfor id := range m.outcome_analysis_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "d9491b66d2b0ade02e25b296ae54c840", "score": "0.5000819", "text": "func (m *BaselineCategoryMutation) ResetBaselineMeasurementList() {\n\tm.baseline_measurement_list = nil\n\tm.clearedbaseline_measurement_list = false\n\tm.removedbaseline_measurement_list = nil\n}", "title": "" }, { "docid": "481845689439b21796bbb9710cf9124f", "score": "0.49975222", "text": "func (m *BaselineDenomMutation) RemoveBaselineDenomCountListIDs(ids ...int) {\n\tif m.removedbaseline_denom_count_list == nil {\n\t\tm.removedbaseline_denom_count_list = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tdelete(m.baseline_denom_count_list, ids[i])\n\t\tm.removedbaseline_denom_count_list[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "a1581e02cb9331af9bb28c4823783fc3", "score": "0.49793375", "text": "func (bmuo *BaselineMeasureUpdateOne) AddBaselineMeasureDenomListIDs(ids ...int) *BaselineMeasureUpdateOne {\n\tbmuo.mutation.AddBaselineMeasureDenomListIDs(ids...)\n\treturn bmuo\n}", "title": "" }, { "docid": "ef91118a041150379aeca481a7f319f6", "score": "0.4977582", "text": "func (m *OutcomeMeasuresModuleMutation) OutcomeMeasureListIDs() (ids []int) {\n\tfor id := range m.outcome_measure_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "7ed90a607e60fbc789f687ad15ff7f88", "score": "0.49671027", "text": "func (m *BaselineCharacteristicsModuleMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase baselinecharacteristicsmodule.EdgeParent:\n\t\tif id := m.parent; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\tcase baselinecharacteristicsmodule.EdgeBaselineGroupList:\n\t\tids := make([]ent.Value, 0, len(m.baseline_group_list))\n\t\tfor id := range m.baseline_group_list {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\tcase baselinecharacteristicsmodule.EdgeBaselineDenomList:\n\t\tids := make([]ent.Value, 0, len(m.baseline_denom_list))\n\t\tfor id := range m.baseline_denom_list {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\tcase baselinecharacteristicsmodule.EdgeBaselineMeasureList:\n\t\tids := make([]ent.Value, 0, len(m.baseline_measure_list))\n\t\tfor id := range m.baseline_measure_list {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "fef12066e8df23f92762fe6f4ba5d12c", "score": "0.49573395", "text": "func (m *OutcomeCategoryMutation) OutcomeMeasurementListIDs() (ids []int) {\n\tfor id := range m.outcome_measurement_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "b9cf10449f36914ecacbd1301ccb905a", "score": "0.4955923", "text": "func (m *BaselineCategoryMutation) AddedEdges() []string {\n\tedges := make([]string, 0, 2)\n\tif m.parent != nil {\n\t\tedges = append(edges, baselinecategory.EdgeParent)\n\t}\n\tif m.baseline_measurement_list != nil {\n\t\tedges = append(edges, baselinecategory.EdgeBaselineMeasurementList)\n\t}\n\treturn edges\n}", "title": "" }, { "docid": "3d4b98be14f78adabced59a6a69c1282", "score": "0.49530798", "text": "func (m *OutcomeCategoryMutation) RemovedOutcomeMeasurementListIDs() (ids []int) {\n\tfor id := range m.removedoutcome_measurement_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "313c0e8b3788cfb6597526e02130e4f8", "score": "0.4945234", "text": "func (m *BaselineCharacteristicsModuleMutation) RemoveBaselineGroupListIDs(ids ...int) {\n\tif m.removedbaseline_group_list == nil {\n\t\tm.removedbaseline_group_list = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tdelete(m.baseline_group_list, ids[i])\n\t\tm.removedbaseline_group_list[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "655d57a0e3521caa67ef0f64ef31efd8", "score": "0.49354586", "text": "func (bmuo *BaselineMeasureUpdateOne) RemoveBaselineClassListIDs(ids ...int) *BaselineMeasureUpdateOne {\n\tbmuo.mutation.RemoveBaselineClassListIDs(ids...)\n\treturn bmuo\n}", "title": "" }, { "docid": "dcbb9dbe54336e9f512ddc9188aa392c", "score": "0.49292448", "text": "func (m *BaselineMeasureDenomMutation) RemoveBaselineMeasureDenomCountListIDs(ids ...int) {\n\tif m.removedbaseline_measure_denom_count_list == nil {\n\t\tm.removedbaseline_measure_denom_count_list = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tdelete(m.baseline_measure_denom_count_list, ids[i])\n\t\tm.removedbaseline_measure_denom_count_list[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "3ffa66fac46c8311c4e6edc0762fb348", "score": "0.49206486", "text": "func (m *BaselineCategoryMutation) ClearedEdges() []string {\n\tedges := make([]string, 0, 2)\n\tif m.clearedparent {\n\t\tedges = append(edges, baselinecategory.EdgeParent)\n\t}\n\tif m.clearedbaseline_measurement_list {\n\t\tedges = append(edges, baselinecategory.EdgeBaselineMeasurementList)\n\t}\n\treturn edges\n}", "title": "" }, { "docid": "e5e1056492cfebf815c397b975eef931", "score": "0.48925558", "text": "func (m *OutcomeMeasureMutation) RemovedOutcomeOverviewListIDs() (ids []int) {\n\tfor id := range m.removedoutcome_overview_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "766f1aff5f7758e6bb0784298250e897", "score": "0.4892457", "text": "func (m *OutcomeMeasuresModuleMutation) RemovedOutcomeMeasureListIDs() (ids []int) {\n\tfor id := range m.removedoutcome_measure_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "dbe83dd69f471a642cd3e68a293dbcd0", "score": "0.4886164", "text": "func (m *BaselineMeasureDenomCountMutation) ParentIDs() (ids []int) {\n\tif id := m.parent; id != nil {\n\t\tids = append(ids, *id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "a220f1ade3e50f48d0bfa58437eb1aed", "score": "0.48820865", "text": "func (m *BaselineClassDenomMutation) RemoveBaselineClassDenomCountListIDs(ids ...int) {\n\tif m.removedbaseline_class_denom_count_list == nil {\n\t\tm.removedbaseline_class_denom_count_list = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tdelete(m.baseline_class_denom_count_list, ids[i])\n\t\tm.removedbaseline_class_denom_count_list[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "63101861dfa14aa06063c417d98ee4c3", "score": "0.4860571", "text": "func (bmuo *BaselineMeasureUpdateOne) AddBaselineClassList(b ...*BaselineClass) *BaselineMeasureUpdateOne {\n\tids := make([]int, len(b))\n\tfor i := range b {\n\t\tids[i] = b[i].ID\n\t}\n\treturn bmuo.AddBaselineClassListIDs(ids...)\n}", "title": "" }, { "docid": "8b0ecbaaaef9aaf53ebce87c69b6ea05", "score": "0.4857473", "text": "func (m *OutcomeMeasureMutation) RemovedOutcomeClassListIDs() (ids []int) {\n\tfor id := range m.removedoutcome_class_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "496362e0ca250b686a860d7b30f85f32", "score": "0.48432368", "text": "func (m *BaselineMeasurementMutation) ParentIDs() (ids []int) {\n\tif id := m.parent; id != nil {\n\t\tids = append(ids, *id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "b575c86cc4c6454b1d218876766b448c", "score": "0.48212704", "text": "func (kz *Kazoo) brokerIDList() ([]int32, error) {\n\tbrokers, err := kz.Brokers()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresult := make([]int32, 0, len(brokers))\n\tfor id := range brokers {\n\t\tresult = append(result, id)\n\t}\n\n\t// return sorted list to match the offical kafka sdks\n\tsort.Sort(int32Slice(result))\n\n\treturn result, nil\n}", "title": "" }, { "docid": "882db58289f9b72dc4ee8073c2baa27e", "score": "0.48179817", "text": "func (m *BaselineCategoryMutation) ClearBaselineMeasurementList() {\n\tm.clearedbaseline_measurement_list = true\n}", "title": "" }, { "docid": "425cec6ff349a2730b8340ae6864f5c4", "score": "0.48106822", "text": "func (m *OutcomeAnalysisMutation) OutcomeAnalysisGroupIDListIDs() (ids []int) {\n\tfor id := range m.outcome_analysis_group_id_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "fd4a94cb4aecf7fa19342b20d7b8b005", "score": "0.4805579", "text": "func (m *FlowPeriodMutation) FlowDropWithdrawListIDs() (ids []int) {\n\tfor id := range m.flow_drop_withdraw_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "04b3826fc6543ca827320a16853be7cd", "score": "0.4783657", "text": "func (ec *equipCatDecoder) AllCatIDs() []string {\n\tkeys := make([]string, 0, len(ec.categories))\n\tfor k := range ec.categories {\n\t\tkeys = append(keys, k)\n\t}\n\treturn keys\n}", "title": "" }, { "docid": "5aae0992e96cd48aa05d3852eedac912", "score": "0.47820735", "text": "func (bmu *BaselineMeasureUpdate) RemoveBaselineClassList(b ...*BaselineClass) *BaselineMeasureUpdate {\n\tids := make([]int, len(b))\n\tfor i := range b {\n\t\tids[i] = b[i].ID\n\t}\n\treturn bmu.RemoveBaselineClassListIDs(ids...)\n}", "title": "" }, { "docid": "bcc6327a26f10016cbe24e5873dd8d80", "score": "0.478171", "text": "func (m *BaselineDenomCountMutation) ParentIDs() (ids []int) {\n\tif id := m.parent; id != nil {\n\t\tids = append(ids, *id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "980d268133bf30846e5fbb581f683899", "score": "0.47744253", "text": "func (m *BaselineCategoryMutation) RemovedEdges() []string {\n\tedges := make([]string, 0, 2)\n\tif m.removedbaseline_measurement_list != nil {\n\t\tedges = append(edges, baselinecategory.EdgeBaselineMeasurementList)\n\t}\n\treturn edges\n}", "title": "" }, { "docid": "bf7b81858d9b8189e89594821dbd2c8b", "score": "0.4773903", "text": "func (m *OutcomeMeasureMutation) OutcomeClassListIDs() (ids []int) {\n\tfor id := range m.outcome_class_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "6eaeedde5cac2c2c9e9e8952603338bc", "score": "0.4773293", "text": "func (m *OutcomeMeasureMutation) OutcomeGroupListIDs() (ids []int) {\n\tfor id := range m.outcome_group_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "e1b3d36cc60d2a38abf8c788146133d7", "score": "0.47711933", "text": "func (m *BaselineMeasureMutation) RemoveBaselineMeasureDenomListIDs(ids ...int) {\n\tif m.removedbaseline_measure_denom_list == nil {\n\t\tm.removedbaseline_measure_denom_list = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tdelete(m.baseline_measure_denom_list, ids[i])\n\t\tm.removedbaseline_measure_denom_list[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "19a4f0023c06731dac566de70f143dc1", "score": "0.47701168", "text": "func (m *BaselineMeasureDenomMutation) ParentIDs() (ids []int) {\n\tif id := m.parent; id != nil {\n\t\tids = append(ids, *id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "4da1e5e6025b1a9071c80ee9c7951a7a", "score": "0.4762413", "text": "func (m *BaselineGroupMutation) ParentIDs() (ids []int) {\n\tif id := m.parent; id != nil {\n\t\tids = append(ids, *id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "6a6e4322712f79ba4ae49b131982d231", "score": "0.47576046", "text": "func (m *BaselineClassMutation) ParentIDs() (ids []int) {\n\tif id := m.parent; id != nil {\n\t\tids = append(ids, *id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "5feaa588e7078e590ae38f296a2439eb", "score": "0.4757155", "text": "func (m *BaselineDenomMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase baselinedenom.EdgeParent:\n\t\tif id := m.parent; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\tcase baselinedenom.EdgeBaselineDenomCountList:\n\t\tids := make([]ent.Value, 0, len(m.baseline_denom_count_list))\n\t\tfor id := range m.baseline_denom_count_list {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d20f9dd7f7622289de4d3813a088e118", "score": "0.47442877", "text": "func (m *BaselineClassMutation) RemoveBaselineClassDenomListIDs(ids ...int) {\n\tif m.removedbaseline_class_denom_list == nil {\n\t\tm.removedbaseline_class_denom_list = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tdelete(m.baseline_class_denom_list, ids[i])\n\t\tm.removedbaseline_class_denom_list[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "63631d7f5bc6eb77b394c0b7641b0cb7", "score": "0.47415915", "text": "func (m *OutcomeMeasureMutation) OutcomeOverviewListIDs() (ids []int) {\n\tfor id := range m.outcome_overview_list {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "f8c0e5dbd0d6e3fd9052da2a8e176266", "score": "0.47376847", "text": "func (m *BaselineMeasureMutation) IDs(ctx context.Context) ([]int, error) {\n\tswitch {\n\tcase m.op.Is(OpUpdateOne | OpDeleteOne):\n\t\tid, exists := m.ID()\n\t\tif exists {\n\t\t\treturn []int{id}, nil\n\t\t}\n\t\tfallthrough\n\tcase m.op.Is(OpUpdate | OpDelete):\n\t\treturn m.Client().BaselineMeasure.Query().Where(m.predicates...).IDs(ctx)\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"IDs is not allowed on %s operations\", m.op)\n\t}\n}", "title": "" }, { "docid": "4319427dd8b7b74ae5069d4e31ee8baa", "score": "0.4730491", "text": "func (m *OutcomeCategoryMutation) ParentIDs() (ids []int) {\n\tif id := m.parent; id != nil {\n\t\tids = append(ids, *id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "9e45cce23af5d83d41c0ebff27941a37", "score": "0.47268108", "text": "func (m *ResultsDefinitionMutation) BaselineCharacteristicsModuleIDs() (ids []int) {\n\tif id := m.baseline_characteristics_module; id != nil {\n\t\tids = append(ids, *id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "3fe219e16383f68fe65b6130e108ae24", "score": "0.47248873", "text": "func (m *OutcomeCategoryMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase outcomecategory.EdgeParent:\n\t\tif id := m.parent; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\tcase outcomecategory.EdgeOutcomeMeasurementList:\n\t\tids := make([]ent.Value, 0, len(m.outcome_measurement_list))\n\t\tfor id := range m.outcome_measurement_list {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "716d65480a973a25fe2a732cacee23ba", "score": "0.47189015", "text": "func (m *BaselineCharacteristicsModuleMutation) RemoveBaselineDenomListIDs(ids ...int) {\n\tif m.removedbaseline_denom_list == nil {\n\t\tm.removedbaseline_denom_list = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tdelete(m.baseline_denom_list, ids[i])\n\t\tm.removedbaseline_denom_list[ids[i]] = struct{}{}\n\t}\n}", "title": "" } ]
f7844ee521798988b2ca445ee7c4e33b
Deprecated: Use AppRequest.ProtoReflect.Descriptor instead.
[ { "docid": "7d2f2d6d22f4feff9e6f4ac2d430263a", "score": "0.6888006", "text": "func (*AppRequest) Descriptor() ([]byte, []int) {\n\treturn file_app_proto_rawDescGZIP(), []int{0}\n}", "title": "" } ]
[ { "docid": "9904acb6a871d71afc9c9e40b13db7be", "score": "0.711145", "text": "func (*FirewallRequest) Descriptor() ([]byte, []int) {\n\treturn file_app_proto_rawDescGZIP(), []int{4}\n}", "title": "" }, { "docid": "2f416844b016feeb7fa07b23bf564a7f", "score": "0.7069048", "text": "func (*UpdateAppRequest) Descriptor() ([]byte, []int) {\n\treturn file_api_proto_v1_apps_proto_rawDescGZIP(), []int{7}\n}", "title": "" }, { "docid": "1758b6ab022c07b1f1fae6d82b2eb55d", "score": "0.70072", "text": "func (*TeamRequest) Descriptor() ([]byte, []int) {\n\treturn file_internal_app_grpc_proto_requests_proto_rawDescGZIP(), []int{8}\n}", "title": "" }, { "docid": "8f09516531018d896a0638cf276aafae", "score": "0.69864607", "text": "func (*GetAppRequest) Descriptor() ([]byte, []int) {\n\treturn file_api_proto_v1_apps_proto_rawDescGZIP(), []int{5}\n}", "title": "" }, { "docid": "87974b61ca4e0db6813b3766dda7b0ad", "score": "0.6907532", "text": "func (*CreateAppRequest) Descriptor() ([]byte, []int) {\n\treturn file_api_proto_v1_apps_proto_rawDescGZIP(), []int{6}\n}", "title": "" }, { "docid": "ebe3824dee019ebeb1ff01f3a76e1896", "score": "0.68762875", "text": "func (*UpdateAppRequest) Descriptor() ([]byte, []int) {\n\treturn file_info_proto_rawDescGZIP(), []int{17}\n}", "title": "" }, { "docid": "8314d4e497d8b02c4858b4157405547d", "score": "0.68752444", "text": "func (*UpdatePermissionRequest) Descriptor() ([]byte, []int) {\n\treturn file_apps_role_pb_request_proto_rawDescGZIP(), []int{9}\n}", "title": "" }, { "docid": "72f239f01518a5ad3731f1293550d57e", "score": "0.6868455", "text": "func (*PatchFirewallRequest) Descriptor() ([]byte, []int) {\n\treturn file_google_cloud_compute_v1_compute_proto_rawDescGZIP(), []int{822}\n}", "title": "" }, { "docid": "38679e1c841c18ffae7059714319ab08", "score": "0.68668073", "text": "func (*UpdateResourceRequest) Descriptor() ([]byte, []int) {\n\treturn file_api_proto_v1_apps_proto_rawDescGZIP(), []int{13}\n}", "title": "" }, { "docid": "78929ff86ddacb708f668bd3a27c6911", "score": "0.6865015", "text": "func (*DeltaUpdateLabelRequest_Request) Descriptor() ([]byte, []int) {\n\treturn file_google_apps_drive_labels_v2beta_requests_proto_rawDescGZIP(), []int{4, 0}\n}", "title": "" }, { "docid": "17b8c7d534af5ee786e739bf15bd8d39", "score": "0.68596965", "text": "func (x *fastReflection_App) Descriptor() protoreflect.MessageDescriptor {\n\treturn md_App\n}", "title": "" }, { "docid": "3521cbabb3766dbf650a9436b912c136", "score": "0.6835291", "text": "func (*DeleteAppRequest) Descriptor() ([]byte, []int) {\n\treturn file_api_proto_v1_apps_proto_rawDescGZIP(), []int{8}\n}", "title": "" }, { "docid": "72d83e11153765707d04fe89609048cf", "score": "0.68133235", "text": "func (*WithAppInfoRequest) Descriptor() ([]byte, []int) {\n\treturn file_src_grpc_auth_proto_rawDescGZIP(), []int{13}\n}", "title": "" }, { "docid": "7864577f377b3b48a8ad53ddd1e1104e", "score": "0.68059134", "text": "func (*TokenRequest) Descriptor() ([]byte, []int) {\n\treturn file_pkg_apiserver_apipb_api_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "7ec0f91694f45452682cd3dc08fe3485", "score": "0.67986685", "text": "func (*UpdateApplicationRequest) Descriptor() ([]byte, []int) {\n\treturn file_application_proto_rawDescGZIP(), []int{6}\n}", "title": "" }, { "docid": "7299f00ea8c58365b8197ae41c5d6b5b", "score": "0.67928696", "text": "func (*MetadataKind_Request) Descriptor() ([]byte, []int) {\n\treturn file_github_com_solo_io_solo_apis_api_gloo_gloo_external_envoy_type_metadata_v3_metadata_proto_rawDescGZIP(), []int{1, 0}\n}", "title": "" }, { "docid": "4520a2a427b4cf8f7dbf52aabe1068cb", "score": "0.6784596", "text": "func (*APIRequest) Descriptor() ([]byte, []int) {\n\treturn file_proto_explore_proto_rawDescGZIP(), []int{6}\n}", "title": "" }, { "docid": "26629797d5c2621f4578b689b8eee5a9", "score": "0.67829394", "text": "func (*UpdateDomainInfoRequest) Descriptor() ([]byte, []int) {\n\treturn file_apps_domain_pb_request_proto_rawDescGZIP(), []int{2}\n}", "title": "" }, { "docid": "ba614663812eec6627ef50254a90a92a", "score": "0.6776472", "text": "func (*UpdateRequest) Descriptor() ([]byte, []int) {\n\treturn file_spotigraph_person_v1_person_api_proto_rawDescGZIP(), []int{2}\n}", "title": "" }, { "docid": "6542e15c6af00670dc1999e3aec9b903", "score": "0.6759801", "text": "func (*DeleteResourceRequest) Descriptor() ([]byte, []int) {\n\treturn file_api_proto_v1_apps_proto_rawDescGZIP(), []int{14}\n}", "title": "" }, { "docid": "c56ccf3bf2d6eec50b264a505dacc467", "score": "0.6754279", "text": "func (*UpdateLabelPermissionRequest) Descriptor() ([]byte, []int) {\n\treturn file_google_apps_drive_labels_v2beta_requests_proto_rawDescGZIP(), []int{13}\n}", "title": "" }, { "docid": "88124cdbe30ebdefbe04afb0df091a6d", "score": "0.67534983", "text": "func (*PatchFirewallPolicyRequest) Descriptor() ([]byte, []int) {\n\treturn file_google_cloud_compute_v1_compute_proto_rawDescGZIP(), []int{821}\n}", "title": "" }, { "docid": "f2e6578235b52af13c473d0cb996ded6", "score": "0.6750258", "text": "func (*TeamResultRequest) Descriptor() ([]byte, []int) {\n\treturn file_internal_app_grpc_proto_requests_proto_rawDescGZIP(), []int{9}\n}", "title": "" }, { "docid": "2fc4195ecd549141dd2e2887816ab22c", "score": "0.6749115", "text": "func (*CalculatorRequest) Descriptor() ([]byte, []int) {\n\treturn file_hello_hellopb_hello_proto_rawDescGZIP(), []int{2}\n}", "title": "" }, { "docid": "1931762f8cfdcee26c3dd899d14afcdb", "score": "0.67481977", "text": "func (*DeltaUpdateLabelRequest) Descriptor() ([]byte, []int) {\n\treturn file_google_apps_drive_labels_v2beta_requests_proto_rawDescGZIP(), []int{4}\n}", "title": "" }, { "docid": "c136564eef59aa6ec44de25894cb978c", "score": "0.6744426", "text": "func (*UpdateFirewallRequest) Descriptor() ([]byte, []int) {\n\treturn file_google_cloud_compute_v1_compute_proto_rawDescGZIP(), []int{1227}\n}", "title": "" }, { "docid": "c8b2dc12bbf3938b19dba7de2398d389", "score": "0.6741955", "text": "func (*DelRuntimeRequest) Descriptor() ([]byte, []int) {\n\treturn file_runtime_proto_rawDescGZIP(), []int{8}\n}", "title": "" }, { "docid": "100883f8ee78d51d5a6fa412b7b5c649", "score": "0.67406505", "text": "func (*UpdateDomainSecurityRequest) Descriptor() ([]byte, []int) {\n\treturn file_apps_domain_pb_request_proto_rawDescGZIP(), []int{6}\n}", "title": "" }, { "docid": "29d1e80baf3862905d870cff69864ac8", "score": "0.67402947", "text": "func (x *fastReflection_QueryEvidenceRequest) Descriptor() protoreflect.MessageDescriptor {\n\treturn md_QueryEvidenceRequest\n}", "title": "" }, { "docid": "eb58c914d7d08ce4aacb6918caa68d86", "score": "0.67384845", "text": "func (*PlatformRequest) Descriptor() ([]byte, []int) {\n\treturn file_app_proto_rawDescGZIP(), []int{6}\n}", "title": "" }, { "docid": "299a8ae156b6d70875f1b265a9b45fdf", "score": "0.67362136", "text": "func (*ChangeProblemInfoRequest) Descriptor() ([]byte, []int) {\n\treturn file_proto_library_checker_proto_rawDescGZIP(), []int{16}\n}", "title": "" }, { "docid": "e13d343b31ed5ca4ee0958b637e124e0", "score": "0.6735985", "text": "func (*DeltaDiscoveryRequest) Descriptor() ([]byte, []int) {\n\treturn file_envoy_service_discovery_v3_discovery_proto_rawDescGZIP(), []int{2}\n}", "title": "" }, { "docid": "8e003d4b3e96bd1ce50b472d8682680c", "score": "0.6734465", "text": "func (*ChangeUserInfoRequest) Descriptor() ([]byte, []int) {\n\treturn file_proto_library_checker_proto_rawDescGZIP(), []int{9}\n}", "title": "" }, { "docid": "19ec7e8609ce5c41acbfe907a9b2df99", "score": "0.67342114", "text": "func (*FooRequest) Descriptor() ([]byte, []int) {\n\treturn file_examples_internal_proto_examplepb_ignore_comment_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "000b634af02cdf7cc3479cb58c1ef451", "score": "0.67056847", "text": "func (*HooksVersion_Request) Descriptor() ([]byte, []int) {\n\treturn file_pkg_hooks_hooks_proto_rawDescGZIP(), []int{2, 0}\n}", "title": "" }, { "docid": "a8585c2b604a41c0c04bcedd4824738d", "score": "0.6700788", "text": "func (*Request) Descriptor() ([]byte, []int) {\n\treturn file_rpc_proto_customization_proto_rawDescGZIP(), []int{1}\n}", "title": "" }, { "docid": "c9b568ef323b2eb63be2d25916a39d57", "score": "0.66972965", "text": "func (*OnlineReq) Descriptor() ([]byte, []int) {\n\treturn file_api_logic_grpc_api_proto_rawDescGZIP(), []int{12}\n}", "title": "" }, { "docid": "3590091ec4f39e755ebd6e78f6b71cde", "score": "0.6693965", "text": "func (*UpdateRequest) Descriptor() ([]byte, []int) {\n\treturn file_protobuf_brand_proto_rawDescGZIP(), []int{6}\n}", "title": "" }, { "docid": "c6bac4554705970bc7cb91e717f66417", "score": "0.6692649", "text": "func (*DescribePermissionRequest) Descriptor() ([]byte, []int) {\n\treturn file_apps_role_pb_request_proto_rawDescGZIP(), []int{6}\n}", "title": "" }, { "docid": "e146ee317f78ee5720a430f93c5ab0b7", "score": "0.6691511", "text": "func (*UpdateRequest) Descriptor() ([]byte, []int) {\n\treturn file_proto_publicapi_proto_rawDescGZIP(), []int{9}\n}", "title": "" }, { "docid": "2bd36c6bdc2d94a49303b648479b7650", "score": "0.6691291", "text": "func (*TeamStatRequest) Descriptor() ([]byte, []int) {\n\treturn file_internal_app_grpc_proto_requests_proto_rawDescGZIP(), []int{11}\n}", "title": "" }, { "docid": "71d194a016e72a9cdad52fc2c64088c9", "score": "0.6690715", "text": "func (*ManifestRequest) Descriptor() ([]byte, []int) {\n\treturn file_pkg_proto_service_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "056c8340571b7f72042106777d68e36e", "score": "0.66907066", "text": "func (*UpdateRequest) Descriptor() ([]byte, []int) {\n\treturn file_proto_comments_proto_rawDescGZIP(), []int{5}\n}", "title": "" }, { "docid": "f0e3cbf6459eaec7c6b71ffd31e03d56", "score": "0.6685527", "text": "func (*CreateWebhookRequest) Descriptor() ([]byte, []int) {\n\treturn file_canis_apiserver_proto_rawDescGZIP(), []int{34}\n}", "title": "" }, { "docid": "63aa03d6fc8935fa89c43bfcb35bfad2", "score": "0.66824806", "text": "func (*Request) Descriptor() ([]byte, []int) {\n\treturn file_proto_hello_hello_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "0468226c82c597519652f0966b3f1cd7", "score": "0.66814774", "text": "func (*UpdateSchemaRequest) Descriptor() ([]byte, []int) {\n\treturn file_canis_apiserver_proto_rawDescGZIP(), []int{13}\n}", "title": "" }, { "docid": "76c598608ccd312725e0e28b1682bf3e", "score": "0.6677483", "text": "func (*HealthCheckRequest) Descriptor() ([]byte, []int) {\n\treturn file_usersvc_v1_proto_proto_rawDescGZIP(), []int{8}\n}", "title": "" }, { "docid": "cef72766b186bbbd9e4b1d3f262f0626", "score": "0.66765237", "text": "func (*UpdateObjectRequest) Descriptor() ([]byte, []int) {\n\treturn file_api_proto_v1_apps_proto_rawDescGZIP(), []int{19}\n}", "title": "" }, { "docid": "0f7da0624b00e49e8a16acf8cbaa0bb3", "score": "0.6675573", "text": "func (*UpdateTelemetryReportedRequest) Descriptor() ([]byte, []int) {\n\treturn file_interservice_cfgmgmt_request_telemetry_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "479f248251b8099e615629fef82c2bb7", "score": "0.66755664", "text": "func (*UpdateRequest) Descriptor() ([]byte, []int) {\n\treturn file_proto_lists_proto_rawDescGZIP(), []int{5}\n}", "title": "" }, { "docid": "95f1bae051505a36717c3a473e52e5a1", "score": "0.66720504", "text": "func (*DeepHealthCheckRequest) Descriptor() ([]byte, []int) {\n\treturn file_rapid_public_api_v1_api_health_check_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "3a051894f802337f4a211bf043dbbf4b", "score": "0.66658986", "text": "func (*TokenIntrospectionRequest) Descriptor() ([]byte, []int) {\n\treturn file_oidc_core_v1_introspection_api_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "5ba75215a5b45cba0338ef1a42766748", "score": "0.66625917", "text": "func (*DeviceUpdateRequest) Descriptor() ([]byte, []int) {\n\treturn file_api_proto_rawDescGZIP(), []int{86}\n}", "title": "" }, { "docid": "a3b09757ef94997f39c5529a706c5cc4", "score": "0.6661789", "text": "func (*BlackFriendReq) Descriptor() ([]byte, []int) {\n\treturn file_v1_friend_proto_rawDescGZIP(), []int{5}\n}", "title": "" }, { "docid": "826f3fb020b645830b11336453ab1182", "score": "0.665902", "text": "func (*QueryPermissionRequest) Descriptor() ([]byte, []int) {\n\treturn file_pkg_permission_pb_request_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "da27059c7462aaea2ef27b01dacc8351", "score": "0.66583586", "text": "func (*IntrospectRequest) Descriptor() ([]byte, []int) {\n\treturn file_oauth2_proto_rawDescGZIP(), []int{7}\n}", "title": "" }, { "docid": "021da007b309700f8d4e6759f18759ce", "score": "0.6658078", "text": "func (*DeltaUpdateLabelRequest_UpdateFieldTypeRequest) Descriptor() ([]byte, []int) {\n\treturn file_google_apps_drive_labels_v2beta_requests_proto_rawDescGZIP(), []int{4, 7}\n}", "title": "" }, { "docid": "fb2c9c1a365d0f0ab6153e85aeacab52", "score": "0.6656753", "text": "func (*UpdateRequest) Descriptor() ([]byte, []int) {\n\treturn file_dns_dns_service_dns_proto_rawDescGZIP(), []int{4}\n}", "title": "" }, { "docid": "2f36fc97dd05845908fd5f50231b7109", "score": "0.6656361", "text": "func (*GetAppsRequest) Descriptor() ([]byte, []int) {\n\treturn file_info_proto_rawDescGZIP(), []int{18}\n}", "title": "" }, { "docid": "f5ec84fe72153667840da95271710897", "score": "0.66540307", "text": "func (*FixtureRequest) Descriptor() ([]byte, []int) {\n\treturn file_internal_app_grpc_proto_requests_proto_rawDescGZIP(), []int{1}\n}", "title": "" }, { "docid": "1e0e6080808fd9f067f0c0f0221017f7", "score": "0.6650339", "text": "func (*TraceRequest) Descriptor() ([]byte, []int) {\n\treturn file_github_com_micro_micro_service_debug_proto_debug_proto_rawDescGZIP(), []int{7}\n}", "title": "" }, { "docid": "af5996797f20f367667cf19a6848a55e", "score": "0.6648944", "text": "func (*DeviceTopicUpdateRequest) Descriptor() ([]byte, []int) {\n\treturn file_api_proto_rawDescGZIP(), []int{97}\n}", "title": "" }, { "docid": "b537d1af47037cc644d1d73af1aded09", "score": "0.66442287", "text": "func (*UpdateRequest) Descriptor() ([]byte, []int) {\n\treturn file_proto_notes_proto_rawDescGZIP(), []int{5}\n}", "title": "" }, { "docid": "a5ce889c7979cd3c093acb8155ade4e9", "score": "0.66426307", "text": "func (*DependRequest) Descriptor() ([]byte, []int) {\n\treturn file_proto_depend_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "b8945f39bbf62e05d321bbc3ce100c57", "score": "0.66424274", "text": "func (*UpdateRequest) Descriptor() ([]byte, []int) {\n\treturn file_demo_proto_rawDescGZIP(), []int{4}\n}", "title": "" }, { "docid": "9ece8c1109adf7ba1e60246fde02c25b", "score": "0.6639446", "text": "func (*MyRequest) Descriptor() ([]byte, []int) {\n\treturn file_notifications_proto_rawDescGZIP(), []int{6}\n}", "title": "" }, { "docid": "5225e772d12fde4ec2633e49c4aa1678", "score": "0.66391444", "text": "func (*UpdateRequest) Descriptor() ([]byte, []int) {\n\treturn file_protobuf_brand_proto_rawDescGZIP(), []int{1}\n}", "title": "" }, { "docid": "f6142df939736678f98cf29d5fce663a", "score": "0.66375744", "text": "func (*CallApiEndpointRequest) Descriptor() ([]byte, []int) {\n\treturn file_console_proto_rawDescGZIP(), []int{9}\n}", "title": "" }, { "docid": "f20bf6ddcabcfb319545031f56a1bdbe", "score": "0.6637069", "text": "func (*CompileRequest) Descriptor() ([]byte, []int) {\n\treturn file_toit_api_program_proto_rawDescGZIP(), []int{1}\n}", "title": "" }, { "docid": "fe791d01c30d8f72bafb1e5f8564d717", "score": "0.66362524", "text": "func (*ListenRequest) Descriptor() ([]byte, []int) {\n\treturn edgelq_proxies_proto_v1alpha_broker_custom_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "cb427d2376f200cedca8bbe991239a47", "score": "0.6634294", "text": "func (*UpdateAnalysisRequest) Descriptor() ([]byte, []int) {\n\treturn file_go_chromium_org_luci_bisection_proto_gofindit_proto_rawDescGZIP(), []int{7}\n}", "title": "" }, { "docid": "46aa1c974e1ce233595dbdf1dfb687c7", "score": "0.6629917", "text": "func (*PatchGlobalForwardingRuleRequest) Descriptor() ([]byte, []int) {\n\treturn file_google_cloud_compute_v1_compute_proto_rawDescGZIP(), []int{824}\n}", "title": "" }, { "docid": "3c146c53d88611dbc2056eb4bb322621", "score": "0.66294354", "text": "func (*RequestRef) Descriptor() ([]byte, []int) {\n\treturn file_requestpb_requestpb_proto_rawDescGZIP(), []int{1}\n}", "title": "" }, { "docid": "c52129c1bd3f86ec7e932d28dacee4a1", "score": "0.6628977", "text": "func (*DiscoveryRequest) Descriptor() ([]byte, []int) {\n\treturn file_envoy_service_discovery_v3_discovery_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "69c16b214fea9c00572e32ca4fe28bbc", "score": "0.6628645", "text": "func (*UpdateRequest) Descriptor() ([]byte, []int) {\n\treturn file_todo_service_proto_rawDescGZIP(), []int{6}\n}", "title": "" }, { "docid": "0b163a4b8e4397a4019b9f8aa2ba6df3", "score": "0.66277397", "text": "func (*CMsgSteamLearn_Inference_Request) Descriptor() ([]byte, []int) {\n\treturn file_steammessages_steamlearn_steamworkssdk_proto_rawDescGZIP(), []int{19}\n}", "title": "" }, { "docid": "2dc3cf32e289774a1e2e07ca5740140a", "score": "0.66275376", "text": "func (x *fastReflection_TxDecodeRequest) Descriptor() protoreflect.MessageDescriptor {\n\treturn md_TxDecodeRequest\n}", "title": "" }, { "docid": "c7b53671ba144b2c1b0ef211626302ca", "score": "0.662613", "text": "func (*GetResourceRequest) Descriptor() ([]byte, []int) {\n\treturn file_api_proto_v1_apps_proto_rawDescGZIP(), []int{11}\n}", "title": "" }, { "docid": "2bb8b6669e3d672ea692c19f99bb48ab", "score": "0.66257197", "text": "func (*Request) Descriptor() ([]byte, []int) {\n\treturn file_discovery_protocol_proto_rawDescGZIP(), []int{1}\n}", "title": "" }, { "docid": "94db2733de92961d3b6b4117eda49583", "score": "0.6622765", "text": "func (*CheckPermissionRequest) Descriptor() ([]byte, []int) {\n\treturn file_pkg_permission_pb_request_proto_rawDescGZIP(), []int{2}\n}", "title": "" }, { "docid": "836bdcd4b4cee68f542111f6feb9b043", "score": "0.66211736", "text": "func (*GetFirewallRequest) Descriptor() ([]byte, []int) {\n\treturn file_google_cloud_compute_v1_compute_proto_rawDescGZIP(), []int{310}\n}", "title": "" }, { "docid": "94b3667230cedc8c46ee35ab5d98e972", "score": "0.66159415", "text": "func (*Request) Descriptor() ([]byte, []int) {\n\treturn file_apps_room_proto_room_proto_rawDescGZIP(), []int{1}\n}", "title": "" }, { "docid": "35cb234fb02b9613ec4805e3e0009a44", "score": "0.6614349", "text": "func (*DeleteWebhookRequest) Descriptor() ([]byte, []int) {\n\treturn file_canis_apiserver_proto_rawDescGZIP(), []int{36}\n}", "title": "" }, { "docid": "3931034e9b42c88e87e73cefa7eebfd0", "score": "0.66121775", "text": "func (*UpdateConversationV1Request) Descriptor() ([]byte, []int) {\n\treturn file_api_api_proto_rawDescGZIP(), []int{6}\n}", "title": "" }, { "docid": "7f514b209c4bd5ea39c14d2f4ecb64ad", "score": "0.66111577", "text": "func (*ProblemInfoRequest) Descriptor() ([]byte, []int) {\n\treturn file_proto_library_checker_proto_rawDescGZIP(), []int{14}\n}", "title": "" }, { "docid": "b5e89ccdab784f47a8a992bf9045570c", "score": "0.6610018", "text": "func (*ComposeFirewallGlobalBoardRequest) Descriptor() ([]byte, []int) {\n\treturn file_service_firewall_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "17b7e7a8bd87c4d2c0145a9577a6d6f0", "score": "0.66079414", "text": "func (*DescribeDomainRequest) Descriptor() ([]byte, []int) {\n\treturn file_apps_domain_pb_request_proto_rawDescGZIP(), []int{3}\n}", "title": "" }, { "docid": "f596e55239c1b9ac483688fef764c3c3", "score": "0.6606056", "text": "func (*QueryPermissionRequest) Descriptor() ([]byte, []int) {\n\treturn file_apps_role_pb_request_proto_rawDescGZIP(), []int{5}\n}", "title": "" }, { "docid": "3fd4976d6114a0858787ae0073e385a9", "score": "0.66056746", "text": "func (*Me_Request) Descriptor() ([]byte, []int) {\n\treturn file_sgtm_proto_rawDescGZIP(), []int{6, 0}\n}", "title": "" }, { "docid": "8b9e8e07aca7bfb5757d3c4cdef3682b", "score": "0.6603704", "text": "func (*PatchRuleFirewallPolicyRequest) Descriptor() ([]byte, []int) {\n\treturn file_google_cloud_compute_v1_compute_proto_rawDescGZIP(), []int{851}\n}", "title": "" }, { "docid": "678fa0a8149a04f6880f02a5437a78e3", "score": "0.6601868", "text": "func (*UpdateFriendReq) Descriptor() ([]byte, []int) {\n\treturn file_v1_friend_proto_rawDescGZIP(), []int{2}\n}", "title": "" }, { "docid": "6faa4e533109d9c10cf57841c8f43f21", "score": "0.65983784", "text": "func (*TokenRequest) Descriptor() ([]byte, []int) {\n\treturn file_api_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "6663481547cb78d747fbacb8f10ab8ef", "score": "0.65959805", "text": "func (*ValidateRequest) Descriptor() ([]byte, []int) {\n\treturn file_proto_brackets_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "a66164023a5f2ca0862458e9261e596b", "score": "0.6594668", "text": "func (*UpdateAndroidAppDataStreamRequest) Descriptor() ([]byte, []int) {\n\treturn file_google_analytics_management_v1alpha_management_api_proto_rawDescGZIP(), []int{42}\n}", "title": "" }, { "docid": "8bf5d238e75c571cf522c26c8509956a", "score": "0.6593474", "text": "func (*Request) Descriptor() ([]byte, []int) {\n\treturn file_proto_AService_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "436e22c328140ef4f25a89df99c4420d", "score": "0.6592651", "text": "func (*MsgRequest) Descriptor() ([]byte, []int) {\n\treturn file_grpc_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "17fc4e5e42cd6a72b75f4b311fd0e4fe", "score": "0.6592444", "text": "func (*Request) Descriptor() ([]byte, []int) {\n\treturn file_proto_getCaptcha_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "6d0a62479c56710c39db0bd64abb82b6", "score": "0.6589627", "text": "func (*DecodeSystemMessageRequest) Descriptor() ([]byte, []int) {\n\treturn file_toit_api_program_proto_rawDescGZIP(), []int{20}\n}", "title": "" }, { "docid": "3b2b2bd58f38f02680266f22944e04ec", "score": "0.6588537", "text": "func (*CommunicationRequest) Descriptor() ([]byte, []int) {\n\treturn file_proto_google_fhir_proto_r5_core_resources_communication_request_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "a48befbba776422b379964bd94b1899b", "score": "0.6584272", "text": "func (*Request) Descriptor() ([]byte, []int) {\n\treturn file_tls_tls_proto_rawDescGZIP(), []int{0}\n}", "title": "" } ]
b6bd80962273931e8fc68251b62193a9
RegisterAPI registers the supplied interface instance as providing 'API' operations for the specified types. This interface instance is returned by APIForKey when called for the specified types.
[ { "docid": "881d7112c28321be0029e0aeaaeba7fe", "score": "0.7940192", "text": "func (r *Registrar) RegisterAPI(ifc API, types ...interface{}) error {\n\tr.mu.Lock()\n\tdefer r.mu.Unlock()\n\tfor _, typ := range types {\n\t\ttyp := reflect.TypeOf(typ).String()\n\t\tif _, ok := r.apis[typ]; ok {\n\t\t\treturn fmt.Errorf(\"type %v already registered\", typ)\n\t\t}\n\t\tr.apis[typ] = ifc\n\t}\n\treturn nil\n}", "title": "" } ]
[ { "docid": "0df10ac099846c99a2cff9136f3792f9", "score": "0.6960841", "text": "func Register(api API) {\n\tid := api.ID()\n\tif existing, present := apis[id]; present {\n\t\tpanic(fmt.Errorf(\"API %s registered more than once. First: %T, Second: %T\", id, existing, api))\n\t}\n\tapis[id] = api\n\n\tindex := api.Index()\n\tif existing, present := indices[index]; present {\n\t\tpanic(fmt.Errorf(\"API %s used an occupied index %d. First: %T, Second: %T\", id, index, existing, api))\n\t}\n\tindices[index] = api\n}", "title": "" }, { "docid": "336c446b51483d7bb0227d859effd7e1", "score": "0.6755383", "text": "func RegisterAPI(r *gin.Engine, container *dig.Container) error {\n\terr := api.Inject(container)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn container.Invoke(func(\n\t\tjwt jwt.IJWTAuth,\n\t\te *casbin.SyncedEnforcer,\n\t\tcAuth *api.Auth,\n\t\tcMenu *api.Menu,\n\t\tcRole *api.Role,\n\t\tcUser *api.User,\n\t) error {\n\t\tg := r.Group(\"/api\")\n\n\t\tg.Use(middleware.UserAuthMiddleware(jwt,\n\t\t\tmiddleware.AllowPathPrefixSkipper(\"/api/v1/auth\", \"/api/v1/pub/refresh-token\"),\n\t\t))\n\n\t\tg.Use(middleware.CasbinMiddleware(e,\n\t\t\tmiddleware.AllowPathPrefixSkipper(\"/api/v1/pub\", \"/api/v1/auth\"),\n\t\t))\n\n\t\tv1 := g.Group(\"/v1\")\n\t\t{\n\t\t\tauth := v1.Group(\"/auth\")\n\t\t\t{\n\t\t\t\tauth.POST(\"/login\", cAuth.Login)\n\t\t\t\tauth.POST(\"/register\", cAuth.Register)\n\n\t\t\t}\n\t\t\tgCurrent := v1.Group(\"/pub\") //public api\n\t\t\t{\n\t\t\t\tgCurrent.PUT(\"/password\", cUser.ChangePassword)\n\t\t\t\tgCurrent.GET(\"/user\", cUser.GetUserInfo)\n\t\t\t\tgCurrent.GET(\"/menu-tree\", cUser.QueryUserMenuTree)\n\t\t\t\tgCurrent.POST(\"/refresh-token\", cAuth.RefreshToken)\n\t\t\t}\n\n\t\t\tgMenu := v1.Group(\"menus\")\n\t\t\t{\n\t\t\t\tgMenu.GET(\"\", cMenu.Query)\n\t\t\t\tgMenu.GET(\":id\", cMenu.Get)\n\t\t\t\tgMenu.POST(\"\", cMenu.Create)\n\t\t\t\tgMenu.PUT(\":id\", cMenu.Update)\n\t\t\t\tgMenu.DELETE(\":id\", cMenu.Delete)\n\t\t\t\tgMenu.PATCH(\":id/enable\", cMenu.Enable)\n\t\t\t\tgMenu.PATCH(\":id/disable\", cMenu.Disable)\n\t\t\t}\n\t\t\tv1.GET(\"/menus.tree\", cMenu.QueryTree)\n\n\t\t\tgRole := v1.Group(\"roles\")\n\t\t\t{\n\t\t\t\tgRole.GET(\"\", cRole.Query)\n\t\t\t\tgRole.GET(\":id\", cRole.Get)\n\t\t\t\tgRole.POST(\"\", cRole.Create)\n\t\t\t\tgRole.PUT(\":id\", cRole.Update)\n\t\t\t\tgRole.DELETE(\":id\", cRole.Delete)\n\t\t\t\tgRole.PATCH(\":id/enable\", cRole.Enable)\n\t\t\t\tgRole.PATCH(\":id/disable\", cRole.Disable)\n\t\t\t}\n\t\t\tv1.GET(\"/roles.select\", cRole.QuerySelect)\n\n\t\t\tgUser := v1.Group(\"users\")\n\t\t\t{\n\t\t\t\tgUser.GET(\"\", cUser.Query)\n\t\t\t\tgUser.GET(\":id\", cUser.Get)\n\t\t\t\tgUser.POST(\"\", cUser.Create)\n\t\t\t\tgUser.PUT(\":id\", cUser.Update)\n\t\t\t\tgUser.DELETE(\":id\", cUser.Delete)\n\t\t\t\tgUser.PATCH(\":id/enable\", cUser.Enable)\n\t\t\t\tgUser.PATCH(\":id/disable\", cUser.Disable)\n\t\t\t}\n\t\t}\n\t\treturn nil\n\t})\n}", "title": "" }, { "docid": "48e16ff6173515aefd8d2269133443df", "score": "0.6270058", "text": "func (a *API) RegisterAPI(httpPathPrefix string, actualCfg interface{}, defaultCfg interface{}) {\n\ta.indexPage.AddLink(SectionAdminEndpoints, \"/config\", \"Current Config (including the default values)\")\n\ta.indexPage.AddLink(SectionAdminEndpoints, \"/config?mode=diff\", \"Current Config (show only values that differ from the defaults)\")\n\n\ta.RegisterRoute(\"/config\", a.cfg.configHandler(actualCfg, defaultCfg), false, \"GET\")\n\ta.RegisterRoute(\"/\", indexHandler(httpPathPrefix, a.indexPage), false, \"GET\")\n\ta.RegisterRoute(\"/debug/fgprof\", fgprof.Handler(), false, \"GET\")\n}", "title": "" }, { "docid": "38fce72983c5016c84ffaf5eed8797d2", "score": "0.625016", "text": "func (a *Router) RegisterAPI(app *gin.Engine) {\n\tg := app.Group(\"/api\")\n\n\tv1 := g.Group(\"/v1\")\n\t{\n\t\tuser := v1.Group(\"/users\")\n\t\t{\n\t\t\tuser.POST(\"\", a.UserAPI.Create)\n\t\t\tuser.GET(\"\", a.UserAPI.GetByName)\n\t\t\tuser.GET(\"/:userId\", a.UserAPI.Get)\n\t\t\tuser.PUT(\"/:userId\", a.UserAPI.Update)\n\t\t\tuser.DELETE(\"/:userId\", a.UserAPI.Delete)\n\t\t}\n\t} // v1 end\n}", "title": "" }, { "docid": "ebaa0354ad9a071569fa087636de0a0e", "score": "0.6193663", "text": "func (r *registerer) Register(mux HTTPMux, apis []API) {\n\treg := Register\n\tif r.parent != nil {\n\t\treg = r.parent.Register\n\t}\n\n\tfor x, a := range apis {\n\t\tapis[x].Handler = r.m(a.Handler)\n\t}\n\n\treg(mux, apis)\n}", "title": "" }, { "docid": "f8aabc6a52cb821b4c7c8f8f8c6eb90d", "score": "0.6128657", "text": "func (a *API) Register(r Registrator) *API {\n\tfor p, f := range r.RegisterAPIHandles() {\n\t\tmux.HandleFunc(\"/\"+r.GetName()+\"/\"+p, f)\n\t}\n\n\tfor p, f := range r.DefaultAPIHandles() {\n\t\tmux.HandleFunc(\"/\"+r.GetName()+\"/\"+p, f)\n\t}\n\n\treturn a\n}", "title": "" }, { "docid": "f66e19b35da899a63ea45e7970b80667", "score": "0.61059874", "text": "func RegisterTypes(registry interface {\n\t RegisterType(name string, obj any)\n}) {\n registry.RegisterType(\"test.dev/fixtures/no-legacy-apis/MyStruct\", &MyStruct{})\n registry.RegisterType(\"test.dev/fixtures/no-legacy-apis/MyUnion\", &MyUnion{})\n\n registry.RegisterType(\"test.dev/fixtures/no-legacy-apis/MyEnum\", MyEnum(0))\n}", "title": "" }, { "docid": "4198b2db5138c72f441297c8b2a1c85f", "score": "0.58678406", "text": "func (s *Server) RegisterHTTPAPI(r apiserver.HTTPRouter) {\n\tr.POST(\"/neutron/:type\", s.handleNeutronPostRequest, apiserver.WithHomepageName(\"neutron plugin\"))\n}", "title": "" }, { "docid": "035698ee9d70c97db11e8e594796b287", "score": "0.5847117", "text": "func (client *Client) RegisterAPIHandles() map[string]func(w http.ResponseWriter, r *http.Request) {\n\tcmds := make(map[string]func(w http.ResponseWriter, r *http.Request))\n\n\tcmds[\"info\"] = client.clientInfo\n\tcmds[\"stop\"] = client.cmdstop\n\n\treturn cmds\n}", "title": "" }, { "docid": "9ab769031f5a567836f82966a1f327fb", "score": "0.5801431", "text": "func (a *API) Register(r chi.Router, mw func(http.Handler) http.Handler) {\n\tr2 := chi.NewRouter()\n\tr2.Use(mw)\n\tregisterAnime(r2, a.api)\n\tregisterManga(r2, a.api)\n\tregisterCharacter(r2, a.api)\n\tregisterPeople(r2, a.api)\n\tregisterProducerMagazine(r2, a.api)\n\tregisterGenre(r2, a.api)\n\tregisterSearch(r2, a.api)\n\tregisterCommon(r2, a.api)\n\tr.Mount(\"/\", r2)\n}", "title": "" }, { "docid": "cae0350ca5750a5f82a262e591ffce57", "score": "0.579215", "text": "func RegisterApi(route string, method string, handler func(*Txn), filters ...ControllerFilter) {\n\tm := strings.ToUpper(method)\n\n\tcontroller := NewController(route, []string{m}, handler)\n\tcontroller.Config().Filters = filters\n\tRegister([]string{m}, controller)\n}", "title": "" }, { "docid": "4a123a0bee36570e704ce65813127938", "score": "0.5767662", "text": "func (api *restApi) RegisterResource(iface interface{}) {\n\tbaseName := getBaseName(iface)\n\n\tif handler, ok := iface.(deleteItemResource); ok {\n\t\tapi.itemResources[\"DELETE\"][baseName] = handler.DeleteItem\n\t}\n\n\tif handler, ok := iface.(getItemResource); ok {\n\t\tapi.itemResources[\"GET\"][baseName] = handler.GetItem\n\t}\n\n\tif handler, ok := iface.(headItemResource); ok {\n\t\tapi.itemResources[\"HEAD\"][baseName] = handler.HeadItem\n\t}\n\n\tif handler, ok := iface.(patchItemResource); ok {\n\t\tapi.itemResources[\"PATCH\"][baseName] = handler.PatchItem\n\t}\n\n\tif handler, ok := iface.(postItemResource); ok {\n\t\tapi.itemResources[\"POST\"][baseName] = handler.PostItem\n\t}\n\n\tif handler, ok := iface.(putItemResource); ok {\n\t\tapi.itemResources[\"PUT\"][baseName] = handler.PutItem\n\t}\n\n\tif handler, ok := iface.(deleteCollectionResource); ok {\n\t\tapi.collectionResources[\"DELETE\"][baseName] = handler.DeleteCollection\n\t}\n\n\tif handler, ok := iface.(getCollectionResource); ok {\n\t\tapi.collectionResources[\"GET\"][baseName] = handler.GetCollection\n\t}\n\n\tif handler, ok := iface.(headCollectionResource); ok {\n\t\tapi.collectionResources[\"HEAD\"][baseName] = handler.HeadCollection\n\t}\n\n\tif handler, ok := iface.(patchCollectionResource); ok {\n\t\tapi.collectionResources[\"PATCH\"][baseName] = handler.PatchCollection\n\t}\n\n\tif handler, ok := iface.(postCollectionResource); ok {\n\t\tapi.collectionResources[\"POST\"][baseName] = handler.PostCollection\n\t}\n\n\tif handler, ok := iface.(putCollectionResource); ok {\n\t\tapi.collectionResources[\"PUT\"][baseName] = handler.PutCollection\n\t}\n}", "title": "" }, { "docid": "5f8cbd4007c1e2dcd0d3edd943ceb65e", "score": "0.5740338", "text": "func (h *Headscale) RegisterWebAPI(c *gin.Context) {\n\tmKeyStr := c.Query(\"key\")\n\tif mKeyStr == \"\" {\n\t\tc.String(http.StatusBadRequest, \"Wrong params\")\n\t\treturn\n\t}\n\n\t// spew.Dump(c.Params)\n\n\tc.Data(http.StatusOK, \"text/html; charset=utf-8\", []byte(fmt.Sprintf(`\n\t<html>\n\t<body>\n\t<h1>headscale</h1>\n\t<p>\n\t\tRun the command below in the headscale server to add this machine to your network:\n\t</p>\n\n\t<p>\n\t\t<code>\n\t\t\t<b>headscale -n NAMESPACE nodes register %s</b>\n\t\t</code>\n\t</p>\n\n\t</body>\n\t</html>\n\n\t`, mKeyStr)))\n}", "title": "" }, { "docid": "ba8a7587488cfdb2dc86f0672ab7063a", "score": "0.573157", "text": "func Register(apis []*API, svc Service) {\n\n\tvar buf = new(bytes.Buffer)\n\n\tinstance, err := os.Hostname()\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\turl := buildRegisterURL(instance)\n\n\tpayload := &Manifest{apis, svc}\n\tjson.NewEncoder(buf).Encode(&payload)\n\n\treq, err := http.NewRequest(\"POST\", url, buf)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\treq.Header.Set(\"X-Custom-Header\", \"myvalue\")\n\treq.Header.Set(\"Content-Type\", \"application/json\")\n\n\tclient := &http.Client{\n\t\tTimeout: time.Second * 10,\n\t}\n\tresp, err := client.Do(req)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tdefer resp.Body.Close()\n\n\tfmt.Println(\"response Status:\", resp.Status)\n\tfmt.Println(\"response Headers:\", resp.Header)\n\tbody, _ := ioutil.ReadAll(resp.Body)\n\tfmt.Println(\"response Body:\", string(body))\n}", "title": "" }, { "docid": "926c7e91b85a06442c71363c9cd1ac90", "score": "0.5726828", "text": "func (api *ApiV1) Register(group *echo.Group) {\n\tapi.authAPI.Register(group.Group(\"/authentication\"))\n\tapi.certificateTemplateAPI.Register(group.Group(\"/certificate-templates\"))\n\tapi.certificateAPI.Register(group.Group(\"/certificates\"))\n\tapi.commonAuthorityAPI.Register(group.Group(\"/common-authorities\"))\n\tapi.consumerTypeAPI.Register(group.Group(\"/consumer-types\"))\n\tapi.statusAPI.Register(group.Group(\"/status\"))\n\tapi.versionAPI.Register(group.Group(\"/version\"))\n}", "title": "" }, { "docid": "8965e5cb6e246c7e9c189cd81076dc74", "score": "0.57099414", "text": "func Register(function API) error {\n\tif function.name == \"\" || function.Function == nil {\n\t\treturn errors.New(\"API has missing fields\")\n\t}\n\treglock.Lock()\n\tif registry == nil {\n\t\tregistry = make(map[string]API)\n\t}\n\tregistry[function.name] = function\n\treglock.Unlock()\n\treturn nil\n}", "title": "" }, { "docid": "20e1a57617cb2e7b0008f5e1c0118f07", "score": "0.56953055", "text": "func (this ApiResource) Register() {\n\tengine.Register(this)\n}", "title": "" }, { "docid": "4707584760278f081a2b22828f36b37f", "score": "0.56853586", "text": "func Register(opt ApiFakeOptions) macaron.Handler {\n\n\t// Check if fakes folder exist\n\tif isNotExist(opt.BaseFolder) {\n\t\tif err := os.Mkdir(opt.BaseFolder, 0755); err != nil {\n\t\t\tlog.Fatal(4, \"Please create a 'fakes' folder: [%v]\", opt.BaseFolder)\n\t\t}\n\t}\n\n\t// Check if default folder in faker exist\n\tp := path.Join(opt.BaseFolder, opt.DefaultApi)\n\tif isNotExist(p) {\n\t\tif err := os.Mkdir(path.Join(p), 0755); err != nil {\n\t\t\tlog.Fatal(4, \"Please create a 'default' folder: [%v]\", p)\n\t\t}\n\t}\n\n\treturn func(ctx *macaron.Context) {\n\t\tapi := &ApiFake{\n\t\t\tDelay: 0,\n\t\t\tDomain: \"default\",\n\t\t\tDefault: opt.DefaultApi,\n\t\t\tFolder: opt.BaseFolder,\n\t\t\tContext: ctx,\n\t\t\tResponseIndex: -1,\n\t\t}\n\n\t\t// AutoConfig load method itself\n\t\tapi.registerDomain()\n\t\tapi.registerDelay()\n\t\tapi.registerResponseSlice()\n\n\t\t// Share FakeApi Module for all handlers\n\t\tctx.Map(api)\n\n\t\t// Execute handlers\n\t\tctx.Next()\n\n\t\t// Apply delay\n\t\ttime.Sleep(time.Duration(api.Delay) * time.Millisecond)\n\t}\n}", "title": "" }, { "docid": "15ca87d15d1d7c88eb04be0e8428c97d", "score": "0.56807077", "text": "func NewAPI(k8sClient kubernetes.Interface, resources ...ApiResource) *API {\n\tsharedInformers := informers.NewSharedInformerFactory(k8sClient, 10*time.Minute)\n\n\tapi := &API{\n\t\tClient: k8sClient,\n\t\tsyncChecks: make([]cache.InformerSynced, 0),\n\t\tsharedInformers: sharedInformers,\n\t}\n\n\tfor _, resource := range resources {\n\t\tswitch resource {\n\t\tcase CM:\n\t\t\tapi.cm = sharedInformers.Core().V1().ConfigMaps()\n\t\t\tapi.syncChecks = append(api.syncChecks, api.cm.Informer().HasSynced)\n\t\tcase Deploy:\n\t\t\tapi.deploy = sharedInformers.Apps().V1beta2().Deployments()\n\t\t\tapi.syncChecks = append(api.syncChecks, api.deploy.Informer().HasSynced)\n\t\tcase Endpoint:\n\t\t\tapi.endpoint = sharedInformers.Core().V1().Endpoints()\n\t\t\tapi.syncChecks = append(api.syncChecks, api.endpoint.Informer().HasSynced)\n\t\tcase NS:\n\t\t\tapi.ns = sharedInformers.Core().V1().Namespaces()\n\t\t\tapi.syncChecks = append(api.syncChecks, api.ns.Informer().HasSynced)\n\t\tcase Pod:\n\t\t\tapi.pod = sharedInformers.Core().V1().Pods()\n\t\t\tapi.syncChecks = append(api.syncChecks, api.pod.Informer().HasSynced)\n\t\tcase RC:\n\t\t\tapi.rc = sharedInformers.Core().V1().ReplicationControllers()\n\t\t\tapi.syncChecks = append(api.syncChecks, api.rc.Informer().HasSynced)\n\t\tcase RS:\n\t\t\tapi.rs = sharedInformers.Apps().V1beta2().ReplicaSets()\n\t\t\tapi.syncChecks = append(api.syncChecks, api.rs.Informer().HasSynced)\n\t\tcase Svc:\n\t\t\tapi.svc = sharedInformers.Core().V1().Services()\n\t\t\tapi.syncChecks = append(api.syncChecks, api.svc.Informer().HasSynced)\n\t\t}\n\t}\n\n\treturn api\n}", "title": "" }, { "docid": "b6459b3082784b2bc214668e97f3741e", "score": "0.56709236", "text": "func (p *Dynamic) RegisterHTTPAPI(r apiserver.HTTPRouter) {\n\tr.Group(\n\t\tp.config.Path,\n\t\tapiserver.WithMiddleware(p.middleware),\n\t\tapiserver.WithNoAuth(),\n\t\tapiserver.WithHomepageType(apiserver.ProxyEndpoint),\n\t)\n}", "title": "" }, { "docid": "1031d4f4a72074ae9f922d15ece8315e", "score": "0.5658777", "text": "func (AppModuleBasic) RegisterInterfaces(registry codectypes.InterfaceRegistry) {}", "title": "" }, { "docid": "2dd3ce8b65cd094808bc676e04bc33cd", "score": "0.56440234", "text": "func RegisterAPIHandler(\n\tsystem *actor.System,\n\techo *echo.Echo,\n\tdb *db.PgDB,\n\tproxyRef *actor.Ref,\n\ttimeout int,\n\tdefaultAgentUserGroup model.AgentUserGroup,\n\ttaskSpec *tasks.TaskSpec,\n\tmiddleware ...echo.MiddlewareFunc,\n) {\n\tsystem.ActorOf(actor.Addr(\"commands\"), &commandManager{\n\t\tdefaultAgentUserGroup: defaultAgentUserGroup,\n\t\tdb: db,\n\t\ttaskSpec: taskSpec,\n\t})\n\techo.Any(\"/commands*\", api.Route(system, nil), middleware...)\n\n\tsystem.ActorOf(actor.Addr(\"notebooks\"), &notebookManager{\n\t\tdefaultAgentUserGroup: defaultAgentUserGroup,\n\t\tdb: db,\n\t\ttaskSpec: taskSpec,\n\t})\n\techo.Any(\"/notebooks*\", api.Route(system, nil), middleware...)\n\n\tsystem.ActorOf(actor.Addr(\"shells\"), &shellManager{\n\t\tdefaultAgentUserGroup: defaultAgentUserGroup,\n\t\tdb: db,\n\t\ttaskSpec: taskSpec,\n\t})\n\techo.Any(\"/shells*\", api.Route(system, nil), middleware...)\n\n\tsystem.ActorOf(actor.Addr(\"tensorboard\"), &tensorboardManager{\n\t\tdefaultAgentUserGroup: defaultAgentUserGroup,\n\t\tdb: db,\n\t\ttaskSpec: taskSpec,\n\t\tproxyRef: proxyRef,\n\t\ttimeout: time.Duration(timeout) * time.Second,\n\t})\n\techo.Any(\"/tensorboard*\", api.Route(system, nil), middleware...)\n}", "title": "" }, { "docid": "532a249727b27f4a0b0dadd294fb9ae1", "score": "0.5628659", "text": "func RegisterTypes(registry interface {\n\t RegisterType(name string, initializer func() any)\n}) {\n\n}", "title": "" }, { "docid": "532a249727b27f4a0b0dadd294fb9ae1", "score": "0.5628659", "text": "func RegisterTypes(registry interface {\n\t RegisterType(name string, initializer func() any)\n}) {\n\n}", "title": "" }, { "docid": "532a249727b27f4a0b0dadd294fb9ae1", "score": "0.5628659", "text": "func RegisterTypes(registry interface {\n\t RegisterType(name string, initializer func() any)\n}) {\n\n}", "title": "" }, { "docid": "6e0751977d8787292d5bfae66335c006", "score": "0.56081414", "text": "func RegisterInterface(fqn FQN, iface reflect.Type, maker func() interface{}) {\n\tclient := kernel.GetClient()\n\tif err := client.Types().RegisterInterface(api.FQN(fqn), iface, maker); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "95a0bc51fab13e81b683acfb7a175b73", "score": "0.55873984", "text": "func (h *APIResourceHandler) Register(router *mux.Router) {\n\t// create a resource\n\t// used by kubectl to create a resource\n\t// should support same serializations kubectl does\n\trouter.HandleFunc(\"/apis/{group}/{version}/{resource}\", Adapt(h.ResourcePostHandler)).\n\t\tMethods(\"POST\")\n\n\t// used by kubectl to list objects of a particular resource\n\t// TODO: investigate create a Handler specialized in resource entities\n\trouter.HandleFunc(\"/apis/{group}/{version}/{resource}\", Adapt(h.ObjectLister)).\n\t\tMethods(\"GET\")\n\t// used by kubectl to discover all the resources for an API Group\n\trouter.HandleFunc(\"/apis/{group}/{version}\", Adapt(h.APIResourceLister)).\n\t\tMethods(\"GET\")\n\t// used by kubectl to discover available API Groups\n\trouter.HandleFunc(\"/apis\", Adapt(h.APIGroupLister))\n\n\t// used by kubectl to gather the OpenAPI specification of resources managed by this server.\n\t// TODO: implement OpenAPI v2 generator from registered CRDs\n\trouter.HandleFunc(\"/openapi/v2\", Adapt(h.OpenAPIHandler))\n}", "title": "" }, { "docid": "cc069c88b16b1718723d4c6b66cb8daa", "score": "0.5573207", "text": "func registerAPIFunctions(muxRouter *mux.Router, objLayer ObjectLayer, apiFunctions ...string) {\n\tif len(apiFunctions) == 0 {\n\t\t// Register all api endpoints by default.\n\t\tregisterAPIRouter(muxRouter, true, false)\n\t\treturn\n\t}\n\t// API Router.\n\tapiRouter := muxRouter.PathPrefix(SlashSeparator).Subrouter()\n\t// Bucket router.\n\tbucketRouter := apiRouter.PathPrefix(\"/{bucket}\").Subrouter()\n\n\t// All object storage operations are registered as HTTP handlers on `objectAPIHandlers`.\n\t// When the handlers get a HTTP request they use the underlying ObjectLayer to perform operations.\n\tglobalObjLayerMutex.Lock()\n\tglobalObjectAPI = objLayer\n\tglobalObjLayerMutex.Unlock()\n\n\t// When cache is enabled, Put and Get operations are passed\n\t// to underlying cache layer to manage object layer operation and disk caching\n\t// operation\n\tapi := objectAPIHandlers{\n\t\tObjectAPI: newObjectLayerFn,\n\t\tCacheAPI: newCacheObjectsFn,\n\t\tEncryptionEnabled: func() bool { return true },\n\t}\n\n\t// Register ListBuckets\thandler.\n\tapiRouter.Methods(\"GET\").HandlerFunc(api.ListBucketsHandler)\n\t// Register all bucket level handlers.\n\tregisterBucketLevelFunc(bucketRouter, api, apiFunctions...)\n}", "title": "" }, { "docid": "e9715ec547839619adf398815210bbdb", "score": "0.55717885", "text": "func (a *API) Register(r *route.Router) {\n\tinstr := func(name string, f apiFunc) http.HandlerFunc {\n\t\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t\tsetCORS(w)\n\t\t\tif data, err := f(r); err != nil {\n\t\t\t\trespondError(w, err, data)\n\t\t\t} else if data != nil {\n\t\t\t\trespond(w, data)\n\t\t\t} else {\n\t\t\t\tw.WriteHeader(http.StatusNoContent)\n\t\t\t}\n\t\t})\n\t}\n\t_ = instr\n\n\tfor _, h := range handle.Routers() {\n\t\ta.Logger().Info(\"register\", zap.String(\"location\", h.Location()))\n\n\t\tr.Get(h.Location(), h.ServerHTTP)\n\t\tr.Post(h.Location(), h.ServerHTTP)\n\t}\n}", "title": "" }, { "docid": "194400b46a347c88a4e3644bda27d024", "score": "0.55694526", "text": "func (client *Client) RegisterAPIHandles() map[string]api.Handle {\n\tcmds := make(map[string]api.Handle)\n\n\tcmds[\"stop\"] = func(w http.ResponseWriter, r *http.Request) {\n\t\tclient.Stop()\n\t}\n\n\tcmds[\"start\"] = func(w http.ResponseWriter, r *http.Request) {\n\t\tclient.Start()\n\t}\n\n\treturn cmds\n}", "title": "" }, { "docid": "6f0e239ee8d72facd8a4be433d0b6d98", "score": "0.5559251", "text": "func Register(impls []api.Implementation) []api.Implementation {\n\treturn append(impls, Impl)\n}", "title": "" }, { "docid": "608ffdb9102f474adaf51bdf7fba371f", "score": "0.5538756", "text": "func (p *SetTagPlugin) RegisterHTTPAPI(r apiserver.HTTPRouter) {\n\tr.POST(SetTagPath, p.RESTSetTag)\n}", "title": "" }, { "docid": "ffa4963cc802a00eae064ee9ce5e1b86", "score": "0.5538248", "text": "func ProvideRegisterAPI(c service.RegisterServ) RegisterAPI {\n\treturn RegisterAPI{Service: c, Engine: c.Engine}\n}", "title": "" }, { "docid": "b27407bf31c7c1649e0567478ff2b18b", "score": "0.5491202", "text": "func (api *API) Register(r *route.Router) {\n\tinstr := func(name string, f apiFunc) http.HandlerFunc {\n\t\thf := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t\tsetCORS(w)\n\t\t\tif data, err := f(r); err != nil {\n\t\t\t\trespondError(w, err, data)\n\t\t\t} else if data != nil {\n\t\t\t\trespond(w, data)\n\t\t\t} else {\n\t\t\t\tw.WriteHeader(http.StatusNoContent)\n\t\t\t}\n\t\t})\n\t\treturn api.ready(prometheus.InstrumentHandler(name, httputil.CompressionHandler{\n\t\t\tHandler: hf,\n\t\t}))\n\t}\n\n\tr.Options(\"/*path\", instr(\"options\", api.options))\n\n\tr.Get(\"/targets\", instr(\"targets\", api.targets))\n\n\tr.Get(\"/status/config\", instr(\"config\", api.serveConfig))\n}", "title": "" }, { "docid": "82cfb623b409322cd15ef59c4f6ca949", "score": "0.5442815", "text": "func (f *Framework) RegisterAPIHandler(version int, path string, handleFunction func(w http.ResponseWriter, r *http.Request), methods ...string) {\n\tf.RegisterHandler(fmt.Sprintf(\"api/v%d/%s\", version, path), handleFunction, methods...)\n}", "title": "" }, { "docid": "eba5b5f254498952cc3b3b346288819f", "score": "0.5394317", "text": "func (m *Instance) InstallAPIs(apiResourceConfigSource serverstorage.APIResourceConfigSource, restOptionsGetter generic.RESTOptionsGetter, restStorageProviders ...RESTStorageProvider) error {\n\tnonLegacy := []*genericapiserver.APIGroupInfo{}\n\n\t// used later in the loop to filter the served resource by those that have expired.\n\tresourceExpirationEvaluator, err := genericapiserver.NewResourceExpirationEvaluator(*m.GenericAPIServer.Version)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfor _, restStorageBuilder := range restStorageProviders {\n\t\tgroupName := restStorageBuilder.GroupName()\n\t\tapiGroupInfo, err := restStorageBuilder.NewRESTStorage(apiResourceConfigSource, restOptionsGetter)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"problem initializing API group %q : %v\", groupName, err)\n\t\t}\n\t\tif len(apiGroupInfo.VersionedResourcesStorageMap) == 0 {\n\t\t\t// If we have no storage for any resource configured, this API group is effectively disabled.\n\t\t\t// This can happen when an entire API group, version, or development-stage (alpha, beta, GA) is disabled.\n\t\t\tklog.Infof(\"API group %q is not enabled, skipping.\", groupName)\n\t\t\tcontinue\n\t\t}\n\n\t\t// Remove resources that serving kinds that are removed.\n\t\t// We do this here so that we don't accidentally serve versions without resources or openapi information that for kinds we don't serve.\n\t\t// This is a spot above the construction of individual storage handlers so that no sig accidentally forgets to check.\n\t\tresourceExpirationEvaluator.RemoveDeletedKinds(groupName, apiGroupInfo.Scheme, apiGroupInfo.VersionedResourcesStorageMap)\n\t\tif len(apiGroupInfo.VersionedResourcesStorageMap) == 0 {\n\t\t\tklog.V(1).Infof(\"Removing API group %v because it is time to stop serving it because it has no versions per APILifecycle.\", groupName)\n\t\t\tcontinue\n\t\t}\n\n\t\tklog.V(1).Infof(\"Enabling API group %q.\", groupName)\n\n\t\tif postHookProvider, ok := restStorageBuilder.(genericapiserver.PostStartHookProvider); ok {\n\t\t\tname, hook, err := postHookProvider.PostStartHook()\n\t\t\tif err != nil {\n\t\t\t\tklog.Fatalf(\"Error building PostStartHook: %v\", err)\n\t\t\t}\n\t\t\tm.GenericAPIServer.AddPostStartHookOrDie(name, hook)\n\t\t}\n\n\t\tif len(groupName) == 0 {\n\t\t\t// the legacy group for core APIs is special that it is installed into /api via this special install method.\n\t\t\tif err := m.GenericAPIServer.InstallLegacyAPIGroup(genericapiserver.DefaultLegacyAPIPrefix, &apiGroupInfo); err != nil {\n\t\t\t\treturn fmt.Errorf(\"error in registering legacy API: %w\", err)\n\t\t\t}\n\t\t} else {\n\t\t\t// everything else goes to /apis\n\t\t\tnonLegacy = append(nonLegacy, &apiGroupInfo)\n\t\t}\n\t}\n\n\tif err := m.GenericAPIServer.InstallAPIGroups(nonLegacy...); err != nil {\n\t\treturn fmt.Errorf(\"error in registering group versions: %v\", err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "45ec539683fb805e3331153d6960d971", "score": "0.53935903", "text": "func (s *Spriteful) register(container *restful.Container) {\n\tlogrus.Info(\"Creating API endpoints...\")\n\n\tws := &restful.WebService{}\n\tws.Path(\"/api/v1\")\n\n\tws.Route(ws.GET(\"boot/{mac-addr}\").To(s.handleBootRequest).\n\t\tConsumes(restful.MIME_JSON).\n\t\tProduces(restful.MIME_JSON).\n\t\tParam(ws.PathParameter(\"mac-addr\", \"the mac address\")).\n\t\tWrites(PixieResponse{}))\n\tlogrus.Info(`pixiecore endpoint created at \"api/v1/boot/{mac}\".`)\n\n\tws.Route(ws.GET(\"/static/{resource:*}\").To(s.handleResourceRequest).\n\t\tParam(ws.PathParameter(\"resource\", \"the resource file\")))\n\tlogrus.Info(`static endpoint created at \"api/v1/static/{.*}\".`)\n\n\tws.Route(ws.HEAD(\"/static/{resource:*}\").To(s.handleResourceRequest).\n\t\tParam(ws.PathParameter(\"resource\", \"the resource file\")))\n\tlogrus.Info(`static endpoint created at \"api/v1/static/{.*}\".`)\n\n\tws.Route(ws.GET(\"/template/{template:*}\").To(s.handleTemplateRequest).\n\t\tParam(ws.PathParameter(\"template\", \"the template file\")))\n\n\tcontainer.Add(ws)\n}", "title": "" }, { "docid": "870830695a76972b54a723662dd090b3", "score": "0.5393112", "text": "func (s *InstancesServiceOp) Register(ctx context.Context, i Instance) (*Instance, *Response, error) {\n\t// if id < 1 {\n\t// \treturn nil, nil, NewArgError(\"id\", \"cannot be less than 1\")\n\t// }\n\n\tpath := fmt.Sprintf(\"%s\", instancesBasePath)\n\treq, err := s.client.NewRequest(ctx, http.MethodPost, path, nil)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\troot := new(instanceRoot)\n\tresp, err := s.client.Do(ctx, req, root)\n\tif err != nil {\n\t\treturn nil, resp, err\n\t}\n\n\treturn root.Instance, resp, err\n}", "title": "" }, { "docid": "74eba9b45078228041d6c74cb9583844", "score": "0.5362721", "text": "func (a *Client) AddAPI(params *AddAPIParams, authInfo runtime.ClientAuthInfoWriter) (*AddAPIOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewAddAPIParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"addAPI\",\n\t\tMethod: \"POST\",\n\t\tPathPattern: \"/\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"http\", \"https\"},\n\t\tParams: params,\n\t\tReader: &AddAPIReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result.(*AddAPIOK), nil\n\n}", "title": "" }, { "docid": "7235d466444235012b630502449a1d4c", "score": "0.53427947", "text": "func (a *API) RegisterRulerAPI(r *ruler.API) {\n\t// Prometheus Rule API Routes\n\ta.RegisterRoute(path.Join(a.cfg.PrometheusHTTPPrefix, \"/api/v1/rules\"), http.HandlerFunc(r.PrometheusRules), true, \"GET\")\n\ta.RegisterRoute(path.Join(a.cfg.PrometheusHTTPPrefix, \"/api/v1/alerts\"), http.HandlerFunc(r.PrometheusAlerts), true, \"GET\")\n\n\t// Ruler API Routes\n\ta.RegisterRoute(\"/api/v1/rules\", http.HandlerFunc(r.ListRules), true, \"GET\")\n\ta.RegisterRoute(\"/api/v1/rules/{namespace}\", http.HandlerFunc(r.ListRules), true, \"GET\")\n\ta.RegisterRoute(\"/api/v1/rules/{namespace}/{groupName}\", http.HandlerFunc(r.GetRuleGroup), true, \"GET\")\n\ta.RegisterRoute(\"/api/v1/rules/{namespace}\", http.HandlerFunc(r.CreateRuleGroup), true, \"POST\")\n\ta.RegisterRoute(\"/api/v1/rules/{namespace}/{groupName}\", http.HandlerFunc(r.DeleteRuleGroup), true, \"DELETE\")\n\ta.RegisterRoute(\"/api/v1/rules/{namespace}\", http.HandlerFunc(r.DeleteNamespace), true, \"DELETE\")\n\n\t// Legacy Prometheus Rule API Routes\n\ta.RegisterRoute(path.Join(a.cfg.LegacyHTTPPrefix, \"/api/v1/rules\"), http.HandlerFunc(r.PrometheusRules), true, \"GET\")\n\ta.RegisterRoute(path.Join(a.cfg.LegacyHTTPPrefix, \"/api/v1/alerts\"), http.HandlerFunc(r.PrometheusAlerts), true, \"GET\")\n\n\t// Legacy Ruler API Routes\n\ta.RegisterRoute(path.Join(a.cfg.LegacyHTTPPrefix, \"/rules\"), http.HandlerFunc(r.ListRules), true, \"GET\")\n\ta.RegisterRoute(path.Join(a.cfg.LegacyHTTPPrefix, \"/rules/{namespace}\"), http.HandlerFunc(r.ListRules), true, \"GET\")\n\ta.RegisterRoute(path.Join(a.cfg.LegacyHTTPPrefix, \"/rules/{namespace}/{groupName}\"), http.HandlerFunc(r.GetRuleGroup), true, \"GET\")\n\ta.RegisterRoute(path.Join(a.cfg.LegacyHTTPPrefix, \"/rules/{namespace}\"), http.HandlerFunc(r.CreateRuleGroup), true, \"POST\")\n\ta.RegisterRoute(path.Join(a.cfg.LegacyHTTPPrefix, \"/rules/{namespace}/{groupName}\"), http.HandlerFunc(r.DeleteRuleGroup), true, \"DELETE\")\n\ta.RegisterRoute(path.Join(a.cfg.LegacyHTTPPrefix, \"/rules/{namespace}\"), http.HandlerFunc(r.DeleteNamespace), true, \"DELETE\")\n}", "title": "" }, { "docid": "979d8a87bee443f80c47cfaecab1398f", "score": "0.53309065", "text": "func registerAPIHandlers(mux *router.Router, a storageAPI, w *webAPI) {\n\t// Minio rpc router\n\tminio := mux.NewRoute().PathPrefix(privateBucket).Subrouter()\n\n\t// Initialize json rpc handlers.\n\trpc := jsonrpc.NewServer()\n\tcodec := json2.NewCodec()\n\trpc.RegisterCodec(codec, \"application/json\")\n\trpc.RegisterCodec(codec, \"application/json; charset=UTF-8\")\n\trpc.RegisterService(w, \"Web\")\n\n\t// RPC handler at URI - /minio/rpc\n\tminio.Path(\"/rpc\").Handler(rpc)\n\t// Serve javascript files and favicon.ico from assets\n\tminio.Path(\"/{assets:[^/]+.js|favicon.ico}\").Handler(http.StripPrefix(privateBucket, http.FileServer(assetFS())))\n\t// Serve index.html for rest of the requests\n\tminio.Path(\"/{index:.*}\").Handler(indexHandler{http.StripPrefix(privateBucket, http.FileServer(assetFS()))})\n\n\t// API Router\n\tapi := mux.NewRoute().PathPrefix(\"/\").Subrouter()\n\n\t// Bucket router\n\tbucket := api.PathPrefix(\"/{bucket}\").Subrouter()\n\n\t// Object operations\n\tbucket.Methods(\"HEAD\").Path(\"/{object:.+}\").HandlerFunc(a.HeadObjectHandler)\n\tbucket.Methods(\"PUT\").Path(\"/{object:.+}\").HandlerFunc(a.PutObjectPartHandler).Queries(\"partNumber\", \"{partNumber:[0-9]+}\", \"uploadId\", \"{uploadId:.*}\")\n\tbucket.Methods(\"GET\").Path(\"/{object:.+}\").HandlerFunc(a.ListObjectPartsHandler).Queries(\"uploadId\", \"{uploadId:.*}\")\n\tbucket.Methods(\"POST\").Path(\"/{object:.+}\").HandlerFunc(a.CompleteMultipartUploadHandler).Queries(\"uploadId\", \"{uploadId:.*}\")\n\tbucket.Methods(\"POST\").Path(\"/{object:.+}\").HandlerFunc(a.NewMultipartUploadHandler).Queries(\"uploads\", \"\")\n\tbucket.Methods(\"DELETE\").Path(\"/{object:.+}\").HandlerFunc(a.AbortMultipartUploadHandler).Queries(\"uploadId\", \"{uploadId:.*}\")\n\tbucket.Methods(\"GET\").Path(\"/{object:.+}\").HandlerFunc(a.GetObjectHandler)\n\tbucket.Methods(\"PUT\").Path(\"/{object:.+}\").HandlerFunc(a.PutObjectHandler)\n\tbucket.Methods(\"DELETE\").Path(\"/{object:.+}\").HandlerFunc(a.DeleteObjectHandler)\n\n\t// Bucket operations\n\tbucket.Methods(\"GET\").HandlerFunc(a.GetBucketLocationHandler).Queries(\"location\", \"\")\n\tbucket.Methods(\"GET\").HandlerFunc(a.GetBucketACLHandler).Queries(\"acl\", \"\")\n\tbucket.Methods(\"GET\").HandlerFunc(a.ListMultipartUploadsHandler).Queries(\"uploads\", \"\")\n\tbucket.Methods(\"GET\").HandlerFunc(a.ListObjectsHandler)\n\tbucket.Methods(\"PUT\").HandlerFunc(a.PutBucketACLHandler).Queries(\"acl\", \"\")\n\tbucket.Methods(\"PUT\").HandlerFunc(a.PutBucketHandler)\n\tbucket.Methods(\"HEAD\").HandlerFunc(a.HeadBucketHandler)\n\tbucket.Methods(\"POST\").HandlerFunc(a.PostPolicyBucketHandler)\n\tbucket.Methods(\"DELETE\").HandlerFunc(a.DeleteBucketHandler)\n\n\t// Root operation\n\tapi.Methods(\"GET\").HandlerFunc(a.ListBucketsHandler)\n}", "title": "" }, { "docid": "a1995dd660bb28960b8ce04ec16a58d4", "score": "0.53233427", "text": "func (s *Server) RegisterGRPCAPI(r apiserver.GRPCRouter) {\n}", "title": "" }, { "docid": "47d1f5d88865d10f97555c414cf1702d", "score": "0.531231", "text": "func (h *KnownTypesServiceHTTPConverter) Api(cb func(ctx context.Context, w http.ResponseWriter, r *http.Request, arg, ret proto.Message, err error), interceptors ...grpc.UnaryServerInterceptor) http.HandlerFunc {\n\tif cb == nil {\n\t\tcb = func(ctx context.Context, w http.ResponseWriter, r *http.Request, arg, ret proto.Message, err error) {\n\t\t\tif err != nil {\n\t\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\t\tp := status.New(codes.Unknown, err.Error()).Proto()\n\t\t\t\tswitch contentType, _, _ := mime.ParseMediaType(r.Header.Get(\"Content-Type\")); contentType {\n\t\t\t\tcase \"application/protobuf\", \"application/x-protobuf\":\n\t\t\t\t\tbuf, err := proto.Marshal(p)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn\n\t\t\t\t\t}\n\t\t\t\t\tif _, err := io.Copy(w, bytes.NewBuffer(buf)); err != nil {\n\t\t\t\t\t\treturn\n\t\t\t\t\t}\n\t\t\t\tcase \"application/json\":\n\t\t\t\t\tbuf, err := protojson.Marshal(p)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn\n\t\t\t\t\t}\n\t\t\t\t\tif _, err := io.Copy(w, bytes.NewBuffer(buf)); err != nil {\n\t\t\t\t\t\treturn\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tctx := r.Context()\n\n\t\tcontentType, _, _ := mime.ParseMediaType(r.Header.Get(\"Content-Type\"))\n\n\t\taccepts := strings.Split(r.Header.Get(\"Accept\"), \",\")\n\t\taccept := accepts[0]\n\t\tif accept == \"*/*\" || accept == \"\" {\n\t\t\tif contentType != \"\" {\n\t\t\t\taccept = contentType\n\t\t\t} else {\n\t\t\t\taccept = \"application/json\"\n\t\t\t}\n\t\t}\n\n\t\tw.Header().Set(\"Content-Type\", accept)\n\n\t\targ := &apipb.Api{}\n\t\tif r.Method != http.MethodGet {\n\t\t\tbody, err := ioutil.ReadAll(r.Body)\n\t\t\tif err != nil {\n\t\t\t\tcb(ctx, w, r, nil, nil, err)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tswitch contentType {\n\t\t\tcase \"application/protobuf\", \"application/x-protobuf\":\n\t\t\t\tif err := proto.Unmarshal(body, arg); err != nil {\n\t\t\t\t\tcb(ctx, w, r, nil, nil, err)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\tcase \"application/json\":\n\t\t\t\tif err := protojson.Unmarshal(body, arg); err != nil {\n\t\t\t\t\tcb(ctx, w, r, nil, nil, err)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tw.WriteHeader(http.StatusUnsupportedMediaType)\n\t\t\t\t_, err := fmt.Fprintf(w, \"Unsupported Content-Type: %s\", contentType)\n\t\t\t\tcb(ctx, w, r, nil, nil, err)\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\n\t\tn := len(interceptors)\n\t\tchained := func(ctx context.Context, arg interface{}, info *grpc.UnaryServerInfo, handler grpc.UnaryHandler) (interface{}, error) {\n\t\t\tchainer := func(currentInter grpc.UnaryServerInterceptor, currentHandler grpc.UnaryHandler) grpc.UnaryHandler {\n\t\t\t\treturn func(currentCtx context.Context, currentReq interface{}) (interface{}, error) {\n\t\t\t\t\treturn currentInter(currentCtx, currentReq, info, currentHandler)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tchainedHandler := handler\n\t\t\tfor i := n - 1; i >= 0; i-- {\n\t\t\t\tchainedHandler = chainer(interceptors[i], chainedHandler)\n\t\t\t}\n\t\t\treturn chainedHandler(ctx, arg)\n\t\t}\n\n\t\tinfo := &grpc.UnaryServerInfo{\n\t\t\tServer: h.srv,\n\t\t\tFullMethod: \"/knowntypes.KnownTypesService/Api\",\n\t\t}\n\n\t\thandler := func(c context.Context, req interface{}) (interface{}, error) {\n\t\t\treturn h.srv.Api(c, req.(*apipb.Api))\n\t\t}\n\n\t\tiret, err := chained(ctx, arg, info, handler)\n\t\tif err != nil {\n\t\t\tcb(ctx, w, r, arg, nil, err)\n\t\t\treturn\n\t\t}\n\n\t\tret, ok := iret.(*apipb.Api)\n\t\tif !ok {\n\t\t\tcb(ctx, w, r, arg, nil, fmt.Errorf(\"/knowntypes.KnownTypesService/Api: interceptors have not return apipb.Api\"))\n\t\t\treturn\n\t\t}\n\n\t\tswitch accept {\n\t\tcase \"application/protobuf\", \"application/x-protobuf\":\n\t\t\tbuf, err := proto.Marshal(ret)\n\t\t\tif err != nil {\n\t\t\t\tcb(ctx, w, r, arg, ret, err)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tif _, err := io.Copy(w, bytes.NewBuffer(buf)); err != nil {\n\t\t\t\tcb(ctx, w, r, arg, ret, err)\n\t\t\t\treturn\n\t\t\t}\n\t\tcase \"application/json\":\n\t\t\tbuf, err := protojson.Marshal(ret)\n\t\t\tif err != nil {\n\t\t\t\tcb(ctx, w, r, arg, ret, err)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tif _, err := io.Copy(w, bytes.NewBuffer(buf)); err != nil {\n\t\t\t\tcb(ctx, w, r, arg, ret, err)\n\t\t\t\treturn\n\t\t\t}\n\t\tdefault:\n\t\t\tw.WriteHeader(http.StatusUnsupportedMediaType)\n\t\t\t_, err := fmt.Fprintf(w, \"Unsupported Accept: %s\", accept)\n\t\t\tcb(ctx, w, r, arg, ret, err)\n\t\t\treturn\n\t\t}\n\t\tcb(ctx, w, r, arg, ret, nil)\n\t})\n}", "title": "" }, { "docid": "69a911395c4a985f540bc575db989c8d", "score": "0.52974993", "text": "func RegisterGRPCAPI(srv *grpc.Server, c Controller, restricted bool) {\n\tgrpcAPI := &GrpcAPI{\n\t\tc: c,\n\t\trestricted: restricted,\n\t}\n\tpbgo.RegisterRegistryServer(srv, grpcAPI)\n}", "title": "" }, { "docid": "be799439a3299b027143b0bc6815fa78", "score": "0.52871317", "text": "func (r *Registry) Register(kind Kind, a Actions) error {\n\tif kind == \"\" {\n\t\treturn errors.New(\"kind cannot be empty\")\n\t}\n\tm := r.typesMap()\n\tif _, ok := m[kind]; ok {\n\t\treturn errors.New(\"kind '\" + string(kind) + \"' already registered\")\n\t}\n\tm[kind] = a\n\treturn nil\n}", "title": "" }, { "docid": "3c8e01d391012488cbb6402e1b7c8693", "score": "0.526462", "text": "func registerTypes() {\n\tgorpc.RegisterType(rpc.Request{})\n\tgorpc.RegisterType(rpc.Response{})\n}", "title": "" }, { "docid": "e1037c0198e5d39b506b607488534ad2", "score": "0.52611274", "text": "func NewAPI(identityProvider IdentityProvider, account Account) API {\n\treturn API{\n\t\tIdentityProvider: identityProvider,\n\t\tAccount: account,\n\t}\n}", "title": "" }, { "docid": "f49de79722f751057b5050c276e8c182", "score": "0.5247814", "text": "func Register(scheme string, provider interface{}) {\n\tif g, ok := provider.(Getter); ok {\n\t\tgetters[scheme] = g\n\t}\n\tif p, ok := provider.(Putter); ok {\n\t\tputters[scheme] = p\n\t}\n\tif l, ok := provider.(Lister); ok {\n\t\tlisters[scheme] = l\n\t}\n\tif v, ok := provider.(Versioner); ok {\n\t\tversioners[scheme] = v\n\t}\n\tif p, ok := provider.(Provider); ok {\n\t\tproviders[scheme] = p\n\t}\n}", "title": "" }, { "docid": "48914c5ec8d9cb25171f676d1e3e4bb2", "score": "0.5246485", "text": "func (i *FakeAgentAPI) RegisterControllerAPI(controllerAPI types.ControllerAPI) {\n\tlog.Infof(\"set controller API\")\n\ti.ControllerAPI = controllerAPI\n}", "title": "" }, { "docid": "d382291d7efb440bd5a1f60453ddcb55", "score": "0.52427095", "text": "func Register(methods []string, controller Controller) {\n\tregisterQueue = append(registerQueue, controllerWrapper{controller, methods})\n}", "title": "" }, { "docid": "b9b932e0358bc397c7b2fc70f51a3f08", "score": "0.5235656", "text": "func NewDeviceTypesAPI() *DeviceTypesAPI {\n\treturn &DeviceTypesAPI{\n\t\tClient: client.DefaultAPIClient,\n\t}\n}", "title": "" }, { "docid": "ba0ae652305364af15156d920ca3749a", "score": "0.523415", "text": "func RegisterAPIOnRouter(m *mux.Router, f AppFactory) error {\n\n\tm.HandleFunc(\"/version\", makeAppHandler(getVersion, f, http.StatusOK)).Methods(\"GET\")\n\tm.HandleFunc(\"/currentUser\", makeAppHandler(getCurrentUser, f, http.StatusOK)).Methods(\"GET\")\n\n\tm.HandleFunc(\"/users/{userName}/pages/{pageName}\", makeAppHandler(getPage, f, http.StatusOK)).Methods(\"GET\")\n\n\tm.HandleFunc(\"/users/{userName}/pages/{pageName}/items\", makeAppHandler(getItems, f, http.StatusOK)).Methods(\"GET\")\n\tm.HandleFunc(\"/users/{userName}/pages/{pageName}/items\", makeAppHandler(createItem, f, http.StatusCreated)).Methods(\"POST\")\n\n\tm.HandleFunc(\"/users/{userName}/pages/{pageName}/items/{itemID}\", makeAppHandler(editItem, f, http.StatusAccepted)).Methods(\"POST\")\n\tm.HandleFunc(\"/users/{userName}/pages/{pageName}/items/{itemID}\", makeAppHandler(putItem, f, http.StatusOK)).Methods(\"PUT\")\n\tm.HandleFunc(\"/users/{userName}/pages/{pageName}/items/{itemID}\", makeAppHandler(deleteItem, f, http.StatusOK)).Methods(\"DELETE\")\n\n\treturn nil\n}", "title": "" }, { "docid": "c78d4890c94abd49c037a3bfc7b78a5e", "score": "0.5229325", "text": "func NewAPI() *API {\n\treturn &API{}\n}", "title": "" }, { "docid": "c78d4890c94abd49c037a3bfc7b78a5e", "score": "0.5229325", "text": "func NewAPI() *API {\n\treturn &API{}\n}", "title": "" }, { "docid": "c78d4890c94abd49c037a3bfc7b78a5e", "score": "0.5229325", "text": "func NewAPI() *API {\n\treturn &API{}\n}", "title": "" }, { "docid": "255ce74eebe209bd34f4379f93425ca6", "score": "0.5227393", "text": "func (s Serializer) Register(types ...interface{}) error {\n\tfor _, typ := range types {\n\t\tt := reflect.TypeOf(typ)\n\t\tname, aliases := s.resolver.ResolveName(typ)\n\n\t\tif err := s.register(name, t); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tfor _, a := range aliases {\n\t\t\tif err := s.register(a, t); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "51eddb511a51b571197006b59886c441", "score": "0.5226283", "text": "func (p *SetTagPlugin) RegisterGRPCAPI(r apiserver.GRPCRouter) {\n\tr.RegisterService(&_SetTag_serviceDesc, p)\n}", "title": "" }, { "docid": "7d041011126067b58fef3525f395472b", "score": "0.5223489", "text": "func Register(plugins *admission.Plugins) {\n\tplugins.Register(PluginName, func(config io.Reader) (admission.Interface, error) {\n\t\treturn NewValidateAPIServer()\n\t})\n}", "title": "" }, { "docid": "26399152002cd628c4164965f80f726d", "score": "0.52225196", "text": "func Register(typ ...Type) {\n\ttypes = append(types, typ...)\n}", "title": "" }, { "docid": "734e858bdce79a1235049d6222943478", "score": "0.5219183", "text": "func (api *API) Register(r *route.Router) {\n\twrap := func(f http.HandlerFunc) http.HandlerFunc {\n\t\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t\tsetCORS(w)\n\t\t\tf(w, r)\n\t\t})\n\t}\n\n\tr.Options(\"/*path\", wrap(func(w http.ResponseWriter, r *http.Request) {}))\n\n\tr.Get(\"/status\", wrap(api.status))\n\tr.Get(\"/receivers\", wrap(api.receivers))\n\n\tr.Get(\"/alerts\", wrap(api.listAlerts))\n\tr.Post(\"/alerts\", wrap(api.addAlerts))\n\n\tr.Get(\"/silences\", wrap(api.listSilences))\n\tr.Post(\"/silences\", wrap(api.setSilence))\n\tr.Get(\"/silence/:sid\", wrap(api.getSilence))\n\tr.Del(\"/silence/:sid\", wrap(api.delSilence))\n}", "title": "" }, { "docid": "40c96241e1014761be83f95a9a303c5e", "score": "0.5206003", "text": "func (hd *Datapath) RegisterStateAPI(na types.CtrlerIntf) {\n\thd.Hal.StateAPI = na\n}", "title": "" }, { "docid": "c38eac0089565398c2b07afca45806f7", "score": "0.5202682", "text": "func (h *Helper) Register(server *endpoints.Server, service interface{}, si *endpoints.ServiceInfo,\n\tmi MethodInfoMap) error {\n\tif server == nil {\n\t\treturn ErrServerNil\n\t}\n\tif service == nil {\n\t\treturn ErrServiceNil\n\t}\n\tif si == nil {\n\t\tsi = &endpoints.ServiceInfo{Default: true}\n\t}\n\n\tapi, err := server.RegisterService(service, si.Name, si.Version,\n\t\tsi.Description, si.Default)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfor methodName, info := range mi {\n\t\tmethod := api.MethodByName(methodName)\n\t\tif method == nil {\n\t\t\treturn fmt.Errorf(\n\t\t\t\terrPrefix+\"no method %q (did you forget to export it?)\", methodName)\n\t\t}\n\t\tcurInfo := method.Info()\n\t\t// These three are set automatically based on reflection, so only override\n\t\t// them if the info object contains something new.\n\t\tif info.Name == \"\" {\n\t\t\tinfo.Name = curInfo.Name\n\t\t}\n\t\tif info.Path == \"\" {\n\t\t\tinfo.Path = curInfo.Path\n\t\t}\n\t\tif info.HTTPMethod == \"\" {\n\t\t\tinfo.HTTPMethod = curInfo.HTTPMethod\n\t\t}\n\t\t*curInfo = *info\n\t\tmi[methodName] = curInfo // So that we can observe the merged result\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "47830992ab20ffcfb2c19ef02dfa16d5", "score": "0.5197602", "text": "func (a *API) Register(r *route.Router, prefix string) {\n\tr.Post(prefix+\"/diagnostics\", a.handle(a.diagnostics))\n\tr.Post(prefix+\"/completion\", a.handle(a.completion))\n\tr.Post(prefix+\"/hover\", a.handle(a.hover))\n\tr.Post(prefix+\"/signatureHelp\", a.handle(a.signature))\n\tif a.enableMetrics {\n\t\tr.Get(\"/metrics\", promhttp.Handler().ServeHTTP)\n\t}\n}", "title": "" }, { "docid": "817d8f7f1d71b9971f4616d556a05a66", "score": "0.51783", "text": "func Register(name string, backendType string, init initFunc, getCoudService getCloudServiceFunc) {\n\tif name == \"\" {\n\t\tlogrus.Fatal(errNoName)\n\t}\n\tif backendType == \"\" {\n\t\tlogrus.Fatal(errNoType)\n\t}\n\tfor _, b := range backends.r {\n\t\tif b.backendType == backendType {\n\t\t\tlogrus.Fatal(errTypeRegistered)\n\t\t}\n\t}\n\n\tbackends.r = append(backends.r, &registeredBackend{\n\t\tname,\n\t\tbackendType,\n\t\tinit,\n\t\tgetCoudService,\n\t})\n}", "title": "" }, { "docid": "598392cec498d0963d5a6a5704bea5a3", "score": "0.51780194", "text": "func Register(rootRouter *mux.Router, context *Context) {\n\tapiRouter := rootRouter.PathPrefix(\"/api/v1\").Subrouter()\n\n\tinitPlugins(apiRouter, context)\n\tinitLabels(apiRouter, context)\n\tinitHealthCheck(apiRouter, context)\n}", "title": "" }, { "docid": "d09543edd07c0deb302123bdd5a29a00", "score": "0.5173849", "text": "func Create(fqn FQN, args []interface{}, interfaces []FQN, overrides []Override, inst interface{}) {\n\tclient := kernel.GetClient()\n\n\tinstVal := reflect.ValueOf(inst).Elem()\n\tinstType := instVal.Type()\n\tnumField := instType.NumField()\n\tfor i := 0; i < numField; i++ {\n\t\tfield := instType.Field(i)\n\t\tif !field.Anonymous {\n\t\t\tcontinue\n\t\t}\n\t\tswitch field.Type.Kind() {\n\t\tcase reflect.Interface:\n\t\t\tfieldVal := instVal.Field(i)\n\t\t\tif !fieldVal.IsNil() {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif err := client.Types().InitJsiiProxy(fieldVal); err != nil {\n\t\t\t\tpanic(err)\n\t\t\t}\n\n\t\tcase reflect.Struct:\n\t\t\tfieldVal := instVal.Field(i)\n\t\t\tif !fieldVal.IsZero() {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif err := client.Types().InitJsiiProxy(fieldVal); err != nil {\n\t\t\t\tpanic(err)\n\t\t\t}\n\t\t}\n\t}\n\n\tvar interfaceFQNs []api.FQN\n\tfor _, iface := range interfaces {\n\t\tinterfaceFQNs = append(interfaceFQNs, api.FQN(iface))\n\t}\n\tvar apiOverrides []api.Override\n\tfor _, override := range overrides {\n\t\tapiOverrides = append(apiOverrides, override)\n\t}\n\n\tres, err := client.Create(kernel.CreateRequest{\n\t\tAPI: \"create\",\n\t\tFQN: api.FQN(fqn),\n\t\tArguments: castPtrsToRef(args),\n\t\tInterfaces: interfaceFQNs,\n\t\tOverrides: apiOverrides,\n\t})\n\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tif err = client.RegisterInstance(instVal, res.InstanceID); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "3bdb330a92831235301cada6be9ee060", "score": "0.5173369", "text": "func NewAPI(opts ...APIOption) (*API, error) {\n\tapi := &API{\n\t\tstructTagKey: \"db\",\n\t\tcolumnSeparator: \".\",\n\t\tfieldMapperFn: SnakeCaseMapper,\n\t\tallowUnknownColumns: false,\n\t}\n\tfor _, o := range opts {\n\t\to(api)\n\t}\n\tfor _, stOpt := range api.scannableTypesOption {\n\t\tst := reflect.TypeOf(stOpt)\n\t\tif st == nil {\n\t\t\treturn nil, fmt.Errorf(\"scany: scannable type must be a pointer, got %T\", st)\n\t\t}\n\t\tif st.Kind() != reflect.Ptr {\n\t\t\treturn nil, fmt.Errorf(\"scany: scannable type must be a pointer, got %s: %s\",\n\t\t\t\tst.Kind(), st.String())\n\t\t}\n\t\tst = st.Elem()\n\t\tif st.Kind() != reflect.Interface {\n\t\t\treturn nil, fmt.Errorf(\"scany: scannable type must be a pointer to an interface, got %s: %s\",\n\t\t\t\tst.Kind(), st.String())\n\t\t}\n\t\tapi.scannableTypesReflect = append(api.scannableTypesReflect, st)\n\t}\n\treturn api, nil\n}", "title": "" }, { "docid": "2b14ecc2eee4cefafac390a454259555", "score": "0.5168726", "text": "func RegisterConversions(s *runtime.Scheme) error {\n\tif err := s.AddGeneratedConversionFunc((*APIResourceReference)(nil), (*operators.APIResourceReference)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_APIResourceReference_To_operators_APIResourceReference(a.(*APIResourceReference), b.(*operators.APIResourceReference), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.APIResourceReference)(nil), (*APIResourceReference)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_APIResourceReference_To_v1alpha1_APIResourceReference(a.(*operators.APIResourceReference), b.(*APIResourceReference), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*APIServiceDefinitions)(nil), (*operators.APIServiceDefinitions)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_APIServiceDefinitions_To_operators_APIServiceDefinitions(a.(*APIServiceDefinitions), b.(*operators.APIServiceDefinitions), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.APIServiceDefinitions)(nil), (*APIServiceDefinitions)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_APIServiceDefinitions_To_v1alpha1_APIServiceDefinitions(a.(*operators.APIServiceDefinitions), b.(*APIServiceDefinitions), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*APIServiceDescription)(nil), (*operators.APIServiceDescription)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_APIServiceDescription_To_operators_APIServiceDescription(a.(*APIServiceDescription), b.(*operators.APIServiceDescription), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.APIServiceDescription)(nil), (*APIServiceDescription)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_APIServiceDescription_To_v1alpha1_APIServiceDescription(a.(*operators.APIServiceDescription), b.(*APIServiceDescription), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*ActionDescriptor)(nil), (*operators.ActionDescriptor)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_ActionDescriptor_To_operators_ActionDescriptor(a.(*ActionDescriptor), b.(*operators.ActionDescriptor), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.ActionDescriptor)(nil), (*ActionDescriptor)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_ActionDescriptor_To_v1alpha1_ActionDescriptor(a.(*operators.ActionDescriptor), b.(*ActionDescriptor), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*AppLink)(nil), (*operators.AppLink)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_AppLink_To_operators_AppLink(a.(*AppLink), b.(*operators.AppLink), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.AppLink)(nil), (*AppLink)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_AppLink_To_v1alpha1_AppLink(a.(*operators.AppLink), b.(*AppLink), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*CRDDescription)(nil), (*operators.CRDDescription)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_CRDDescription_To_operators_CRDDescription(a.(*CRDDescription), b.(*operators.CRDDescription), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.CRDDescription)(nil), (*CRDDescription)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_CRDDescription_To_v1alpha1_CRDDescription(a.(*operators.CRDDescription), b.(*CRDDescription), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*CatalogSource)(nil), (*operators.CatalogSource)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_CatalogSource_To_operators_CatalogSource(a.(*CatalogSource), b.(*operators.CatalogSource), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.CatalogSource)(nil), (*CatalogSource)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_CatalogSource_To_v1alpha1_CatalogSource(a.(*operators.CatalogSource), b.(*CatalogSource), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*CatalogSourceList)(nil), (*operators.CatalogSourceList)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_CatalogSourceList_To_operators_CatalogSourceList(a.(*CatalogSourceList), b.(*operators.CatalogSourceList), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.CatalogSourceList)(nil), (*CatalogSourceList)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_CatalogSourceList_To_v1alpha1_CatalogSourceList(a.(*operators.CatalogSourceList), b.(*CatalogSourceList), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*CatalogSourceSpec)(nil), (*operators.CatalogSourceSpec)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_CatalogSourceSpec_To_operators_CatalogSourceSpec(a.(*CatalogSourceSpec), b.(*operators.CatalogSourceSpec), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.CatalogSourceSpec)(nil), (*CatalogSourceSpec)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_CatalogSourceSpec_To_v1alpha1_CatalogSourceSpec(a.(*operators.CatalogSourceSpec), b.(*CatalogSourceSpec), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*CatalogSourceStatus)(nil), (*operators.CatalogSourceStatus)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_CatalogSourceStatus_To_operators_CatalogSourceStatus(a.(*CatalogSourceStatus), b.(*operators.CatalogSourceStatus), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.CatalogSourceStatus)(nil), (*CatalogSourceStatus)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_CatalogSourceStatus_To_v1alpha1_CatalogSourceStatus(a.(*operators.CatalogSourceStatus), b.(*CatalogSourceStatus), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*ClusterServiceVersion)(nil), (*operators.ClusterServiceVersion)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_ClusterServiceVersion_To_operators_ClusterServiceVersion(a.(*ClusterServiceVersion), b.(*operators.ClusterServiceVersion), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.ClusterServiceVersion)(nil), (*ClusterServiceVersion)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_ClusterServiceVersion_To_v1alpha1_ClusterServiceVersion(a.(*operators.ClusterServiceVersion), b.(*ClusterServiceVersion), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*ClusterServiceVersionCondition)(nil), (*operators.ClusterServiceVersionCondition)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_ClusterServiceVersionCondition_To_operators_ClusterServiceVersionCondition(a.(*ClusterServiceVersionCondition), b.(*operators.ClusterServiceVersionCondition), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.ClusterServiceVersionCondition)(nil), (*ClusterServiceVersionCondition)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_ClusterServiceVersionCondition_To_v1alpha1_ClusterServiceVersionCondition(a.(*operators.ClusterServiceVersionCondition), b.(*ClusterServiceVersionCondition), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*ClusterServiceVersionList)(nil), (*operators.ClusterServiceVersionList)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_ClusterServiceVersionList_To_operators_ClusterServiceVersionList(a.(*ClusterServiceVersionList), b.(*operators.ClusterServiceVersionList), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.ClusterServiceVersionList)(nil), (*ClusterServiceVersionList)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_ClusterServiceVersionList_To_v1alpha1_ClusterServiceVersionList(a.(*operators.ClusterServiceVersionList), b.(*ClusterServiceVersionList), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*ClusterServiceVersionSpec)(nil), (*operators.ClusterServiceVersionSpec)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_ClusterServiceVersionSpec_To_operators_ClusterServiceVersionSpec(a.(*ClusterServiceVersionSpec), b.(*operators.ClusterServiceVersionSpec), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.ClusterServiceVersionSpec)(nil), (*ClusterServiceVersionSpec)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_ClusterServiceVersionSpec_To_v1alpha1_ClusterServiceVersionSpec(a.(*operators.ClusterServiceVersionSpec), b.(*ClusterServiceVersionSpec), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*ClusterServiceVersionStatus)(nil), (*operators.ClusterServiceVersionStatus)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_ClusterServiceVersionStatus_To_operators_ClusterServiceVersionStatus(a.(*ClusterServiceVersionStatus), b.(*operators.ClusterServiceVersionStatus), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.ClusterServiceVersionStatus)(nil), (*ClusterServiceVersionStatus)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_ClusterServiceVersionStatus_To_v1alpha1_ClusterServiceVersionStatus(a.(*operators.ClusterServiceVersionStatus), b.(*ClusterServiceVersionStatus), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*ConfigMapResourceReference)(nil), (*operators.ConfigMapResourceReference)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_ConfigMapResourceReference_To_operators_ConfigMapResourceReference(a.(*ConfigMapResourceReference), b.(*operators.ConfigMapResourceReference), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.ConfigMapResourceReference)(nil), (*ConfigMapResourceReference)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_ConfigMapResourceReference_To_v1alpha1_ConfigMapResourceReference(a.(*operators.ConfigMapResourceReference), b.(*ConfigMapResourceReference), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*CustomResourceDefinitions)(nil), (*operators.CustomResourceDefinitions)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_CustomResourceDefinitions_To_operators_CustomResourceDefinitions(a.(*CustomResourceDefinitions), b.(*operators.CustomResourceDefinitions), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.CustomResourceDefinitions)(nil), (*CustomResourceDefinitions)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_CustomResourceDefinitions_To_v1alpha1_CustomResourceDefinitions(a.(*operators.CustomResourceDefinitions), b.(*CustomResourceDefinitions), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*DependentStatus)(nil), (*operators.DependentStatus)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_DependentStatus_To_operators_DependentStatus(a.(*DependentStatus), b.(*operators.DependentStatus), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.DependentStatus)(nil), (*DependentStatus)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_DependentStatus_To_v1alpha1_DependentStatus(a.(*operators.DependentStatus), b.(*DependentStatus), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*Icon)(nil), (*operators.Icon)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_Icon_To_operators_Icon(a.(*Icon), b.(*operators.Icon), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.Icon)(nil), (*Icon)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_Icon_To_v1alpha1_Icon(a.(*operators.Icon), b.(*Icon), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*InstallMode)(nil), (*operators.InstallMode)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_InstallMode_To_operators_InstallMode(a.(*InstallMode), b.(*operators.InstallMode), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.InstallMode)(nil), (*InstallMode)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_InstallMode_To_v1alpha1_InstallMode(a.(*operators.InstallMode), b.(*InstallMode), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*InstallPlan)(nil), (*operators.InstallPlan)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_InstallPlan_To_operators_InstallPlan(a.(*InstallPlan), b.(*operators.InstallPlan), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.InstallPlan)(nil), (*InstallPlan)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_InstallPlan_To_v1alpha1_InstallPlan(a.(*operators.InstallPlan), b.(*InstallPlan), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*InstallPlanCondition)(nil), (*operators.InstallPlanCondition)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_InstallPlanCondition_To_operators_InstallPlanCondition(a.(*InstallPlanCondition), b.(*operators.InstallPlanCondition), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.InstallPlanCondition)(nil), (*InstallPlanCondition)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_InstallPlanCondition_To_v1alpha1_InstallPlanCondition(a.(*operators.InstallPlanCondition), b.(*InstallPlanCondition), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*InstallPlanList)(nil), (*operators.InstallPlanList)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_InstallPlanList_To_operators_InstallPlanList(a.(*InstallPlanList), b.(*operators.InstallPlanList), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.InstallPlanList)(nil), (*InstallPlanList)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_InstallPlanList_To_v1alpha1_InstallPlanList(a.(*operators.InstallPlanList), b.(*InstallPlanList), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*InstallPlanReference)(nil), (*operators.InstallPlanReference)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_InstallPlanReference_To_operators_InstallPlanReference(a.(*InstallPlanReference), b.(*operators.InstallPlanReference), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.InstallPlanReference)(nil), (*InstallPlanReference)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_InstallPlanReference_To_v1alpha1_InstallPlanReference(a.(*operators.InstallPlanReference), b.(*InstallPlanReference), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*InstallPlanSpec)(nil), (*operators.InstallPlanSpec)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_InstallPlanSpec_To_operators_InstallPlanSpec(a.(*InstallPlanSpec), b.(*operators.InstallPlanSpec), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.InstallPlanSpec)(nil), (*InstallPlanSpec)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_InstallPlanSpec_To_v1alpha1_InstallPlanSpec(a.(*operators.InstallPlanSpec), b.(*InstallPlanSpec), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*InstallPlanStatus)(nil), (*operators.InstallPlanStatus)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_InstallPlanStatus_To_operators_InstallPlanStatus(a.(*InstallPlanStatus), b.(*operators.InstallPlanStatus), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.InstallPlanStatus)(nil), (*InstallPlanStatus)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_InstallPlanStatus_To_v1alpha1_InstallPlanStatus(a.(*operators.InstallPlanStatus), b.(*InstallPlanStatus), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*Maintainer)(nil), (*operators.Maintainer)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_Maintainer_To_operators_Maintainer(a.(*Maintainer), b.(*operators.Maintainer), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.Maintainer)(nil), (*Maintainer)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_Maintainer_To_v1alpha1_Maintainer(a.(*operators.Maintainer), b.(*Maintainer), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*NamedInstallStrategy)(nil), (*operators.NamedInstallStrategy)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_NamedInstallStrategy_To_operators_NamedInstallStrategy(a.(*NamedInstallStrategy), b.(*operators.NamedInstallStrategy), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.NamedInstallStrategy)(nil), (*NamedInstallStrategy)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_NamedInstallStrategy_To_v1alpha1_NamedInstallStrategy(a.(*operators.NamedInstallStrategy), b.(*NamedInstallStrategy), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*RegistryServiceStatus)(nil), (*operators.RegistryServiceStatus)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_RegistryServiceStatus_To_operators_RegistryServiceStatus(a.(*RegistryServiceStatus), b.(*operators.RegistryServiceStatus), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.RegistryServiceStatus)(nil), (*RegistryServiceStatus)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_RegistryServiceStatus_To_v1alpha1_RegistryServiceStatus(a.(*operators.RegistryServiceStatus), b.(*RegistryServiceStatus), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*RequirementStatus)(nil), (*operators.RequirementStatus)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_RequirementStatus_To_operators_RequirementStatus(a.(*RequirementStatus), b.(*operators.RequirementStatus), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.RequirementStatus)(nil), (*RequirementStatus)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_RequirementStatus_To_v1alpha1_RequirementStatus(a.(*operators.RequirementStatus), b.(*RequirementStatus), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*SpecDescriptor)(nil), (*operators.SpecDescriptor)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_SpecDescriptor_To_operators_SpecDescriptor(a.(*SpecDescriptor), b.(*operators.SpecDescriptor), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.SpecDescriptor)(nil), (*SpecDescriptor)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_SpecDescriptor_To_v1alpha1_SpecDescriptor(a.(*operators.SpecDescriptor), b.(*SpecDescriptor), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*StatusDescriptor)(nil), (*operators.StatusDescriptor)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_StatusDescriptor_To_operators_StatusDescriptor(a.(*StatusDescriptor), b.(*operators.StatusDescriptor), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.StatusDescriptor)(nil), (*StatusDescriptor)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_StatusDescriptor_To_v1alpha1_StatusDescriptor(a.(*operators.StatusDescriptor), b.(*StatusDescriptor), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*Step)(nil), (*operators.Step)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_Step_To_operators_Step(a.(*Step), b.(*operators.Step), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.Step)(nil), (*Step)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_Step_To_v1alpha1_Step(a.(*operators.Step), b.(*Step), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*StepResource)(nil), (*operators.StepResource)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_StepResource_To_operators_StepResource(a.(*StepResource), b.(*operators.StepResource), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.StepResource)(nil), (*StepResource)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_StepResource_To_v1alpha1_StepResource(a.(*operators.StepResource), b.(*StepResource), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*Subscription)(nil), (*operators.Subscription)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_Subscription_To_operators_Subscription(a.(*Subscription), b.(*operators.Subscription), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.Subscription)(nil), (*Subscription)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_Subscription_To_v1alpha1_Subscription(a.(*operators.Subscription), b.(*Subscription), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*SubscriptionList)(nil), (*operators.SubscriptionList)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_SubscriptionList_To_operators_SubscriptionList(a.(*SubscriptionList), b.(*operators.SubscriptionList), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.SubscriptionList)(nil), (*SubscriptionList)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_SubscriptionList_To_v1alpha1_SubscriptionList(a.(*operators.SubscriptionList), b.(*SubscriptionList), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*SubscriptionSpec)(nil), (*operators.SubscriptionSpec)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_SubscriptionSpec_To_operators_SubscriptionSpec(a.(*SubscriptionSpec), b.(*operators.SubscriptionSpec), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.SubscriptionSpec)(nil), (*SubscriptionSpec)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_SubscriptionSpec_To_v1alpha1_SubscriptionSpec(a.(*operators.SubscriptionSpec), b.(*SubscriptionSpec), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*SubscriptionStatus)(nil), (*operators.SubscriptionStatus)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_v1alpha1_SubscriptionStatus_To_operators_SubscriptionStatus(a.(*SubscriptionStatus), b.(*operators.SubscriptionStatus), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\tif err := s.AddGeneratedConversionFunc((*operators.SubscriptionStatus)(nil), (*SubscriptionStatus)(nil), func(a, b interface{}, scope conversion.Scope) error {\n\t\treturn Convert_operators_SubscriptionStatus_To_v1alpha1_SubscriptionStatus(a.(*operators.SubscriptionStatus), b.(*SubscriptionStatus), scope)\n\t}); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "44cc2286cb38930a7dc1d803a3c15085", "score": "0.5168679", "text": "func RegisterConfigAPI(r *shttp.Server) {\n\tc := &configAPI{\n\t\tcfg: config.GetConfig(),\n\t}\n\n\tc.registerEndpoints(r)\n}", "title": "" }, { "docid": "13e2b3d9f41a6b5d110562cd5b833827", "score": "0.51628226", "text": "func (api PipelineAPI) Register(container *restful.Container) {\n\tws := new(restful.WebService)\n\n\tws.Path(\"/pipelines\").\n\t\tConsumes(restful.MIME_JSON).\n\t\tProduces(restful.MIME_JSON)\n\n\tws.Route(ws.GET(\"/{id}\").To(api.findPipeline).\n\t\tOperation(\"findPipeline\").\n\t\tParam(ws.PathParameter(\"id\", \"id of pipeline\").DataType(\"int\")).\n\t\tWrites(Pipeline{}))\n\n\tws.Route(ws.POST(\"\").To(api.createPipeline).\n\t\tOperation(\"createPipeline\").\n\t\tReads(Pipeline{}))\n\n\tcontainer.Add(ws)\n}", "title": "" }, { "docid": "a71ac3ead5027f3e90d55dbb52aaf461", "score": "0.5161116", "text": "func (a *API) Register(r *mux.Router) {\n\twrap := func(f http.HandlerFunc) http.HandlerFunc {\n\t\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t\tsetCORS(w)\n\t\t\tf(w, r)\n\t\t})\n\t}\n\t// Prometheus golang metrics\n\tr.Handle(\"/metrics\", promhttp.Handler()).Methods(\"GET\")\n\tr.Handle(\"/\", wrap(a.index)).Methods(\"GET\")\n\tr.Handle(\"/status\", wrap(a.status)).Methods(\"GET\")\n\t// Cloud endpoints\n\tr.Handle(\"/clouds/{provider}\", wrap(a.registerCloud)).Methods(\"POST\")\n\tr.Handle(\"/clouds\", wrap(a.listClouds)).Methods(\"GET\")\n\tr.Handle(\"/clouds/{id:[a-z 0-9]+}\", wrap(a.unregisterCloud)).Methods(\"DELETE\")\n\tr.Handle(\"/clouds/{id:[a-z 0-9]+}\", wrap(a.updateCloud)).Methods(\"PUT\")\n\n\t// Scaler endpoints\n\tr.Handle(\"/scalers/{provider_id:[a-z 0-9]+}\", wrap(a.createScaler)).Methods(\"POST\")\n\tr.Handle(\"/scalers/{provider_id:[a-z 0-9]+}\", wrap(a.listScalers)).Methods(\"GET\")\n\tr.Handle(\"/scalers/{provider_id:[a-z 0-9]+}/{id:[a-z 0-9]+}\",\n\t\twrap(a.deleteScaler)).Methods(\"DELETE\")\n\tr.Handle(\"/scalers/{provider_id:[a-z 0-9]+}/{id:[a-z 0-9]+}\",\n\t\twrap(a.updateScaler)).Methods(\"PUT\")\n\tr.Handle(\"/scalers/activate/{provider_id:[a-z 0-9]+}/{id:[a-z 0-9]+}\",\n\t\twrap(a.activateScaler)).Methods(\"POST\")\n\tr.Handle(\"/scalers/deactivate/{provider_id:[a-z 0-9]+}/{id:[a-z 0-9]+}\",\n\t\twrap(a.deactivateScaler)).Methods(\"POST\")\n\n\t// Name Resolver endpoints\n\tr.Handle(\"/nresolvers\", wrap(a.listNResolvers)).Methods(\"GET\")\n\n\t// Healer endpoints\n\tr.Handle(\"/healers/{provider_id:[a-z 0-9]+}\", wrap(a.createHealer)).Methods(\"POST\")\n\tr.Handle(\"/healers/{provider_id:[a-z 0-9]+}\", wrap(a.listHealers)).Methods(\"GET\")\n\tr.Handle(\"/healers/{provider_id:[a-z 0-9]+}/{id:[a-z 0-9]+}\",\n\t\twrap(a.deleteHealer)).Methods(\"DELETE\")\n\n\t// Silences endpoints\n\tr.Handle(\"/silences/{provider_id:[a-z 0-9]+}\", wrap(a.createSilence)).Methods(\"POST\")\n\tr.Handle(\"/silences/{provider_id:[a-z 0-9]+}\", wrap(a.listSilences)).Methods(\"GET\")\n\tr.Handle(\"/silences/{provider_id:[a-z 0-9]+}/{id:[a-z 0-9]+}\", wrap(a.expireSilence)).Methods(\"DELETE\")\n\n\t// Profiling endpoints\n\tcfg := config.Get().GlobalConfig\n\tif cfg.EnableProfiling {\n\t\tr.Handle(\"/debug/pprof/\", http.HandlerFunc(pprof.Index))\n\t\tr.Handle(\"/debug/pprof/{profile}\", http.DefaultServeMux)\n\t}\n}", "title": "" }, { "docid": "e9c3515911bfae63392e9ec9f3a225f8", "score": "0.5155021", "text": "func (a *API) Register() {\n http.Handle(\"/\", a.router)\n glog.Infoln(\"Rest api handler registered\")\n}", "title": "" }, { "docid": "a176e2db768f0802ee3c43011bf37fcc", "score": "0.51472235", "text": "func Register(tv *app.TokenVendor, prefix string) error {\n\n\tlog.Debug(\"mounting API V1 at \", prefix)\n\n\th := NewHandlerContext(tv)\n\n\thttp.HandleFunc(path.Join(prefix, \"public-key.read\"), h.publicKeyReadHandler)\n\thttp.HandleFunc(path.Join(prefix, \"public-key.publish\"), h.publicKeyPublishHandler)\n\thttp.HandleFunc(path.Join(prefix, \"token.oauth2\"), h.tokenOAuth2Handler)\n\thttp.HandleFunc(path.Join(prefix, \"token.verify\"), h.verifyTokenHandler)\n\n\treturn nil\n}", "title": "" }, { "docid": "b0a3d7d757f104238a99c68cf6fbea3f", "score": "0.5146799", "text": "func (a *Auth) FabricateAPI(engine provider.APIEngine) {\n\tengine.InjectAPI(api.NewRequestOTP(a))\n\tengine.InjectAPI(api.NewLogin(a))\n\tengine.InjectAPI(api.NewLogout(a))\n}", "title": "" }, { "docid": "b5fedd8cd53d123d598ae41dbb4cf162", "score": "0.51428545", "text": "func (rcv *swaggerResource) Register(container *restful.Container) {\n\tcontainer.Add(restfulspec.NewOpenAPIService(\n\t\trestfulspec.Config{\n\t\t\tWebServices: container.RegisteredWebServices(), // you control what services are visible\n\t\t\tWebServicesURL: rcv.sebServicesURL,\n\t\t\tAPIPath: \"/swagger/apidocs.json\",\n\t\t\tPostBuildSwaggerObjectHandler: func(s *spec.Swagger) {\n\t\t\t\ts.Info = &spec.Info{\n\t\t\t\t\tInfoProps: spec.InfoProps{\n\t\t\t\t\t\tTitle: \"MongoDB Navigator\",\n\t\t\t\t\t\tDescription: \"MongoDB Navigator backend JSON API\",\n\t\t\t\t\t\tVersion: \"0.0.1\",\n\t\t\t\t\t},\n\t\t\t\t}\n\t\t\t},\n\t\t},\n\t))\n}", "title": "" }, { "docid": "93a20cabc49292707fe22eca89265330", "score": "0.51384", "text": "func RegisterHandlers(router runtime.EchoRouter, si ServerInterface) {\n\n\twrapper := ServerInterfaceWrapper{\n\t\tHandler: si,\n\t}\n\n\trouter.GET(\"/v1/\", wrapper.TestV1)\n\n}", "title": "" }, { "docid": "61c155fc6b69558cf025bd7b9fd85f9b", "score": "0.5131657", "text": "func Register(reg Registry) {\n\treg.Add(\"aws:iam_access_key\", reflect.TypeOf(&AccessKey{}))\n\treg.Add(\"aws:iam_account_alias\", reflect.TypeOf(&AccountAlias{}))\n\treg.Add(\"aws:iam_group\", reflect.TypeOf(&Group{}))\n\treg.Add(\"aws:iam_instance_profile\", reflect.TypeOf(&InstanceProfile{}))\n\treg.Add(\"aws:iam_login_profile\", reflect.TypeOf(&LoginProfile{}))\n\treg.Add(\"aws:iam_open_id_connect_provider\", reflect.TypeOf(&OpenIDConnectProvider{}))\n\treg.Add(\"aws:iam_policy\", reflect.TypeOf(&Policy{}))\n\treg.Add(\"aws:iam_policy_version\", reflect.TypeOf(&PolicyVersion{}))\n\treg.Add(\"aws:iam_role\", reflect.TypeOf(&Role{}))\n\treg.Add(\"aws:iam_saml_provider\", reflect.TypeOf(&SAMLProvider{}))\n\treg.Add(\"aws:iam_service_linked_role\", reflect.TypeOf(&ServiceLinkedRole{}))\n\treg.Add(\"aws:iam_service_specific_credential\", reflect.TypeOf(&ServiceSpecificCredential{}))\n\treg.Add(\"aws:iam_user\", reflect.TypeOf(&User{}))\n\treg.Add(\"aws:iam_virtual_mfa_device\", reflect.TypeOf(&VirtualMFADevice{}))\n}", "title": "" }, { "docid": "da6e3a9e690b13881f9e1cfb2c5c9923", "score": "0.5130832", "text": "func APITypes(at APIType) Option { return func(o *options) { o.apiType = at } }", "title": "" }, { "docid": "e33081afea80b2f23be0d77991afc50e", "score": "0.5120526", "text": "func registerAPIRouter(router *mux.Router) {\n\t// Initialize API.\n\tapi := objectAPIHandlers{\n\t\tObjectAPI: newObjectLayerFn,\n\t\tCacheAPI: newCachedObjectLayerFn,\n\t}\n\n\t// API Router\n\tapiRouter := router.PathPrefix(SlashSeparator).Subrouter()\n\n\tvar routers []*mux.Router\n\tfor _, domainName := range globalDomainNames {\n\t\tif IsKubernetes() {\n\t\t\trouters = append(routers, apiRouter.MatcherFunc(func(r *http.Request, match *mux.RouteMatch) bool {\n\t\t\t\thost, _, err := net.SplitHostPort(getHost(r))\n\t\t\t\tif err != nil {\n\t\t\t\t\thost = r.Host\n\t\t\t\t}\n\t\t\t\t// Make sure to skip matching minio.<domain>` this is\n\t\t\t\t// specifically meant for operator/k8s deployment\n\t\t\t\t// The reason we need to skip this is for a special\n\t\t\t\t// usecase where we need to make sure that\n\t\t\t\t// minio.<namespace>.svc.<cluster_domain> is ignored\n\t\t\t\t// by the bucketDNS style to ensure that path style\n\t\t\t\t// is available and honored at this domain.\n\t\t\t\t//\n\t\t\t\t// All other `<bucket>.<namespace>.svc.<cluster_domain>`\n\t\t\t\t// makes sure that buckets are routed through this matcher\n\t\t\t\t// to match for `<bucket>`\n\t\t\t\treturn host != minioReservedBucket+\".\"+domainName\n\t\t\t}).Host(\"{bucket:.+}.\"+domainName).Subrouter())\n\t\t} else {\n\t\t\trouters = append(routers, apiRouter.Host(\"{bucket:.+}.\"+domainName).Subrouter())\n\t\t}\n\t}\n\trouters = append(routers, apiRouter.PathPrefix(\"/{bucket}\").Subrouter())\n\n\tgz := func(h http.HandlerFunc) http.HandlerFunc {\n\t\treturn h\n\t}\n\n\twrapper, err := gzhttp.NewWrapper(gzhttp.MinSize(1000), gzhttp.CompressionLevel(gzip.BestSpeed))\n\tif err == nil {\n\t\tgz = func(h http.HandlerFunc) http.HandlerFunc {\n\t\t\treturn wrapper(h).(http.HandlerFunc)\n\t\t}\n\t}\n\n\tfor _, router := range routers {\n\t\t// Register all rejected object APIs\n\t\tfor _, r := range rejectedObjAPIs {\n\t\t\tt := router.Methods(r.methods...).\n\t\t\t\tHandlerFunc(collectAPIStats(r.api, httpTraceAll(notImplementedHandler))).\n\t\t\t\tQueries(r.queries...)\n\t\t\tt.Path(r.path)\n\t\t}\n\n\t\t// Object operations\n\t\t// HeadObject\n\t\trouter.Methods(http.MethodHead).Path(\"/{object:.+}\").HandlerFunc(\n\t\t\tcollectAPIStats(\"headobject\", maxClients(gz(httpTraceAll(api.HeadObjectHandler)))))\n\t\t// CopyObjectPart\n\t\trouter.Methods(http.MethodPut).Path(\"/{object:.+}\").\n\t\t\tHeadersRegexp(xhttp.AmzCopySource, \".*?(\\\\/|%2F).*?\").\n\t\t\tHandlerFunc(collectAPIStats(\"copyobjectpart\", maxClients(gz(httpTraceAll(api.CopyObjectPartHandler))))).\n\t\t\tQueries(\"partNumber\", \"{partNumber:[0-9]+}\", \"uploadId\", \"{uploadId:.*}\")\n\t\t// PutObjectPart\n\t\trouter.Methods(http.MethodPut).Path(\"/{object:.+}\").HandlerFunc(\n\t\t\tcollectAPIStats(\"putobjectpart\", maxClients(gz(httpTraceHdrs(api.PutObjectPartHandler))))).Queries(\"partNumber\", \"{partNumber:[0-9]+}\", \"uploadId\", \"{uploadId:.*}\")\n\t\t// ListObjectParts\n\t\trouter.Methods(http.MethodGet).Path(\"/{object:.+}\").HandlerFunc(\n\t\t\tcollectAPIStats(\"listobjectparts\", maxClients(gz(httpTraceAll(api.ListObjectPartsHandler))))).Queries(\"uploadId\", \"{uploadId:.*}\")\n\t\t// CompleteMultipartUpload\n\t\trouter.Methods(http.MethodPost).Path(\"/{object:.+}\").HandlerFunc(\n\t\t\tcollectAPIStats(\"completemutipartupload\", maxClients(gz(httpTraceAll(api.CompleteMultipartUploadHandler))))).Queries(\"uploadId\", \"{uploadId:.*}\")\n\t\t// NewMultipartUpload\n\t\trouter.Methods(http.MethodPost).Path(\"/{object:.+}\").HandlerFunc(\n\t\t\tcollectAPIStats(\"newmultipartupload\", maxClients(gz(httpTraceAll(api.NewMultipartUploadHandler))))).Queries(\"uploads\", \"\")\n\t\t// AbortMultipartUpload\n\t\trouter.Methods(http.MethodDelete).Path(\"/{object:.+}\").HandlerFunc(\n\t\t\tcollectAPIStats(\"abortmultipartupload\", maxClients(gz(httpTraceAll(api.AbortMultipartUploadHandler))))).Queries(\"uploadId\", \"{uploadId:.*}\")\n\t\t// GetObjectACL - this is a dummy call.\n\t\trouter.Methods(http.MethodGet).Path(\"/{object:.+}\").HandlerFunc(\n\t\t\tcollectAPIStats(\"getobjectacl\", maxClients(gz(httpTraceHdrs(api.GetObjectACLHandler))))).Queries(\"acl\", \"\")\n\t\t// PutObjectACL - this is a dummy call.\n\t\trouter.Methods(http.MethodPut).Path(\"/{object:.+}\").HandlerFunc(\n\t\t\tcollectAPIStats(\"putobjectacl\", maxClients(gz(httpTraceHdrs(api.PutObjectACLHandler))))).Queries(\"acl\", \"\")\n\t\t// GetObjectTagging\n\t\trouter.Methods(http.MethodGet).Path(\"/{object:.+}\").HandlerFunc(\n\t\t\tcollectAPIStats(\"getobjecttagging\", maxClients(gz(httpTraceHdrs(api.GetObjectTaggingHandler))))).Queries(\"tagging\", \"\")\n\t\t// PutObjectTagging\n\t\trouter.Methods(http.MethodPut).Path(\"/{object:.+}\").HandlerFunc(\n\t\t\tcollectAPIStats(\"putobjecttagging\", maxClients(gz(httpTraceHdrs(api.PutObjectTaggingHandler))))).Queries(\"tagging\", \"\")\n\t\t// DeleteObjectTagging\n\t\trouter.Methods(http.MethodDelete).Path(\"/{object:.+}\").HandlerFunc(\n\t\t\tcollectAPIStats(\"deleteobjecttagging\", maxClients(gz(httpTraceHdrs(api.DeleteObjectTaggingHandler))))).Queries(\"tagging\", \"\")\n\t\t// SelectObjectContent\n\t\trouter.Methods(http.MethodPost).Path(\"/{object:.+}\").HandlerFunc(\n\t\t\tcollectAPIStats(\"selectobjectcontent\", maxClients(gz(httpTraceHdrs(api.SelectObjectContentHandler))))).Queries(\"select\", \"\").Queries(\"select-type\", \"2\")\n\t\t// GetObjectRetention\n\t\trouter.Methods(http.MethodGet).Path(\"/{object:.+}\").HandlerFunc(\n\t\t\tcollectAPIStats(\"getobjectretention\", maxClients(gz(httpTraceAll(api.GetObjectRetentionHandler))))).Queries(\"retention\", \"\")\n\t\t// GetObjectLegalHold\n\t\trouter.Methods(http.MethodGet).Path(\"/{object:.+}\").HandlerFunc(\n\t\t\tcollectAPIStats(\"getobjectlegalhold\", maxClients(gz(httpTraceAll(api.GetObjectLegalHoldHandler))))).Queries(\"legal-hold\", \"\")\n\t\t// GetObject - note gzip compression is *not* added due to Range requests.\n\t\trouter.Methods(http.MethodGet).Path(\"/{object:.+}\").HandlerFunc(\n\t\t\tcollectAPIStats(\"getobject\", maxClients(httpTraceHdrs(api.GetObjectHandler))))\n\t\t// CopyObject\n\t\trouter.Methods(http.MethodPut).Path(\"/{object:.+}\").HeadersRegexp(xhttp.AmzCopySource, \".*?(\\\\/|%2F).*?\").HandlerFunc(\n\t\t\tcollectAPIStats(\"copyobject\", maxClients(gz(httpTraceAll(api.CopyObjectHandler)))))\n\t\t// PutObjectRetention\n\t\trouter.Methods(http.MethodPut).Path(\"/{object:.+}\").HandlerFunc(\n\t\t\tcollectAPIStats(\"putobjectretention\", maxClients(gz(httpTraceAll(api.PutObjectRetentionHandler))))).Queries(\"retention\", \"\")\n\t\t// PutObjectLegalHold\n\t\trouter.Methods(http.MethodPut).Path(\"/{object:.+}\").HandlerFunc(\n\t\t\tcollectAPIStats(\"putobjectlegalhold\", maxClients(gz(httpTraceAll(api.PutObjectLegalHoldHandler))))).Queries(\"legal-hold\", \"\")\n\n\t\t// PutObject with auto-extract support for zip\n\t\trouter.Methods(http.MethodPut).Path(\"/{object:.+}\").HeadersRegexp(xhttp.AmzSnowballExtract, \"true\").HandlerFunc(\n\t\t\tcollectAPIStats(\"putobject\", maxClients(gz(httpTraceHdrs(api.PutObjectExtractHandler)))))\n\n\t\t// PutObject\n\t\trouter.Methods(http.MethodPut).Path(\"/{object:.+}\").HandlerFunc(\n\t\t\tcollectAPIStats(\"putobject\", maxClients(gz(httpTraceHdrs(api.PutObjectHandler)))))\n\n\t\t// DeleteObject\n\t\trouter.Methods(http.MethodDelete).Path(\"/{object:.+}\").HandlerFunc(\n\t\t\tcollectAPIStats(\"deleteobject\", maxClients(gz(httpTraceAll(api.DeleteObjectHandler)))))\n\n\t\t// PostRestoreObject\n\t\trouter.Methods(http.MethodPost).Path(\"/{object:.+}\").HandlerFunc(\n\t\t\tcollectAPIStats(\"restoreobject\", maxClients(gz(httpTraceAll(api.PostRestoreObjectHandler))))).Queries(\"restore\", \"\")\n\n\t\t/// Bucket operations\n\t\t// GetBucketLocation\n\t\trouter.Methods(http.MethodGet).HandlerFunc(\n\t\t\tcollectAPIStats(\"getbucketlocation\", maxClients(gz(httpTraceAll(api.GetBucketLocationHandler))))).Queries(\"location\", \"\")\n\t\t// GetBucketPolicy\n\t\trouter.Methods(http.MethodGet).HandlerFunc(\n\t\t\tcollectAPIStats(\"getbucketpolicy\", maxClients(gz(httpTraceAll(api.GetBucketPolicyHandler))))).Queries(\"policy\", \"\")\n\t\t// GetBucketLifecycle\n\t\trouter.Methods(http.MethodGet).HandlerFunc(\n\t\t\tcollectAPIStats(\"getbucketlifecycle\", maxClients(gz(httpTraceAll(api.GetBucketLifecycleHandler))))).Queries(\"lifecycle\", \"\")\n\t\t// GetBucketEncryption\n\t\trouter.Methods(http.MethodGet).HandlerFunc(\n\t\t\tcollectAPIStats(\"getbucketencryption\", maxClients(gz(httpTraceAll(api.GetBucketEncryptionHandler))))).Queries(\"encryption\", \"\")\n\t\t// GetBucketObjectLockConfig\n\t\trouter.Methods(http.MethodGet).HandlerFunc(\n\t\t\tcollectAPIStats(\"getbucketobjectlockconfiguration\", maxClients(gz(httpTraceAll(api.GetBucketObjectLockConfigHandler))))).Queries(\"object-lock\", \"\")\n\t\t// GetBucketReplicationConfig\n\t\trouter.Methods(http.MethodGet).HandlerFunc(\n\t\t\tcollectAPIStats(\"getbucketreplicationconfiguration\", maxClients(gz(httpTraceAll(api.GetBucketReplicationConfigHandler))))).Queries(\"replication\", \"\")\n\t\t// GetBucketVersioning\n\t\trouter.Methods(http.MethodGet).HandlerFunc(\n\t\t\tcollectAPIStats(\"getbucketversioning\", maxClients(gz(httpTraceAll(api.GetBucketVersioningHandler))))).Queries(\"versioning\", \"\")\n\t\t// GetBucketNotification\n\t\trouter.Methods(http.MethodGet).HandlerFunc(\n\t\t\tcollectAPIStats(\"getbucketnotification\", maxClients(gz(httpTraceAll(api.GetBucketNotificationHandler))))).Queries(\"notification\", \"\")\n\t\t// ListenNotification\n\t\trouter.Methods(http.MethodGet).HandlerFunc(\n\t\t\tcollectAPIStats(\"listennotification\", maxClients(gz(httpTraceAll(api.ListenNotificationHandler))))).Queries(\"events\", \"{events:.*}\")\n\n\t\t// Dummy Bucket Calls\n\t\t// GetBucketACL -- this is a dummy call.\n\t\trouter.Methods(http.MethodGet).HandlerFunc(\n\t\t\tcollectAPIStats(\"getbucketacl\", maxClients(gz(httpTraceAll(api.GetBucketACLHandler))))).Queries(\"acl\", \"\")\n\t\t// PutBucketACL -- this is a dummy call.\n\t\trouter.Methods(http.MethodPut).HandlerFunc(\n\t\t\tcollectAPIStats(\"putbucketacl\", maxClients(gz(httpTraceAll(api.PutBucketACLHandler))))).Queries(\"acl\", \"\")\n\t\t// GetBucketCors - this is a dummy call.\n\t\trouter.Methods(http.MethodGet).HandlerFunc(\n\t\t\tcollectAPIStats(\"getbucketcors\", maxClients(gz(httpTraceAll(api.GetBucketCorsHandler))))).Queries(\"cors\", \"\")\n\t\t// GetBucketWebsiteHandler - this is a dummy call.\n\t\trouter.Methods(http.MethodGet).HandlerFunc(\n\t\t\tcollectAPIStats(\"getbucketwebsite\", maxClients(gz(httpTraceAll(api.GetBucketWebsiteHandler))))).Queries(\"website\", \"\")\n\t\t// GetBucketAccelerateHandler - this is a dummy call.\n\t\trouter.Methods(http.MethodGet).HandlerFunc(\n\t\t\tcollectAPIStats(\"getbucketaccelerate\", maxClients(gz(httpTraceAll(api.GetBucketAccelerateHandler))))).Queries(\"accelerate\", \"\")\n\t\t// GetBucketRequestPaymentHandler - this is a dummy call.\n\t\trouter.Methods(http.MethodGet).HandlerFunc(\n\t\t\tcollectAPIStats(\"getbucketrequestpayment\", maxClients(gz(httpTraceAll(api.GetBucketRequestPaymentHandler))))).Queries(\"requestPayment\", \"\")\n\t\t// GetBucketLoggingHandler - this is a dummy call.\n\t\trouter.Methods(http.MethodGet).HandlerFunc(\n\t\t\tcollectAPIStats(\"getbucketlogging\", maxClients(gz(httpTraceAll(api.GetBucketLoggingHandler))))).Queries(\"logging\", \"\")\n\t\t// GetBucketTaggingHandler\n\t\trouter.Methods(http.MethodGet).HandlerFunc(\n\t\t\tcollectAPIStats(\"getbuckettagging\", maxClients(gz(httpTraceAll(api.GetBucketTaggingHandler))))).Queries(\"tagging\", \"\")\n\t\t//DeleteBucketWebsiteHandler\n\t\trouter.Methods(http.MethodDelete).HandlerFunc(\n\t\t\tcollectAPIStats(\"deletebucketwebsite\", maxClients(gz(httpTraceAll(api.DeleteBucketWebsiteHandler))))).Queries(\"website\", \"\")\n\t\t// DeleteBucketTaggingHandler\n\t\trouter.Methods(http.MethodDelete).HandlerFunc(\n\t\t\tcollectAPIStats(\"deletebuckettagging\", maxClients(gz(httpTraceAll(api.DeleteBucketTaggingHandler))))).Queries(\"tagging\", \"\")\n\n\t\t// ListMultipartUploads\n\t\trouter.Methods(http.MethodGet).HandlerFunc(\n\t\t\tcollectAPIStats(\"listmultipartuploads\", maxClients(gz(httpTraceAll(api.ListMultipartUploadsHandler))))).Queries(\"uploads\", \"\")\n\t\t// ListObjectsV2M\n\t\trouter.Methods(http.MethodGet).HandlerFunc(\n\t\t\tcollectAPIStats(\"listobjectsv2M\", maxClients(gz(httpTraceAll(api.ListObjectsV2MHandler))))).Queries(\"list-type\", \"2\", \"metadata\", \"true\")\n\t\t// ListObjectsV2\n\t\trouter.Methods(http.MethodGet).HandlerFunc(\n\t\t\tcollectAPIStats(\"listobjectsv2\", maxClients(gz(httpTraceAll(api.ListObjectsV2Handler))))).Queries(\"list-type\", \"2\")\n\t\t// ListObjectVersions\n\t\trouter.Methods(http.MethodGet).HandlerFunc(\n\t\t\tcollectAPIStats(\"listobjectversions\", maxClients(gz(httpTraceAll(api.ListObjectVersionsHandler))))).Queries(\"versions\", \"\")\n\t\t// GetBucketPolicyStatus\n\t\trouter.Methods(http.MethodGet).HandlerFunc(\n\t\t\tcollectAPIStats(\"getpolicystatus\", maxClients(gz(httpTraceAll(api.GetBucketPolicyStatusHandler))))).Queries(\"policyStatus\", \"\")\n\t\t// PutBucketLifecycle\n\t\trouter.Methods(http.MethodPut).HandlerFunc(\n\t\t\tcollectAPIStats(\"putbucketlifecycle\", maxClients(gz(httpTraceAll(api.PutBucketLifecycleHandler))))).Queries(\"lifecycle\", \"\")\n\t\t// PutBucketReplicationConfig\n\t\trouter.Methods(http.MethodPut).HandlerFunc(\n\t\t\tcollectAPIStats(\"putbucketreplicationconfiguration\", maxClients(gz(httpTraceAll(api.PutBucketReplicationConfigHandler))))).Queries(\"replication\", \"\")\n\t\t// PutBucketEncryption\n\t\trouter.Methods(http.MethodPut).HandlerFunc(\n\t\t\tcollectAPIStats(\"putbucketencryption\", maxClients(gz(httpTraceAll(api.PutBucketEncryptionHandler))))).Queries(\"encryption\", \"\")\n\n\t\t// PutBucketPolicy\n\t\trouter.Methods(http.MethodPut).HandlerFunc(\n\t\t\tcollectAPIStats(\"putbucketpolicy\", maxClients(gz(httpTraceAll(api.PutBucketPolicyHandler))))).Queries(\"policy\", \"\")\n\n\t\t// PutBucketObjectLockConfig\n\t\trouter.Methods(http.MethodPut).HandlerFunc(\n\t\t\tcollectAPIStats(\"putbucketobjectlockconfig\", maxClients(gz(httpTraceAll(api.PutBucketObjectLockConfigHandler))))).Queries(\"object-lock\", \"\")\n\t\t// PutBucketTaggingHandler\n\t\trouter.Methods(http.MethodPut).HandlerFunc(\n\t\t\tcollectAPIStats(\"putbuckettagging\", maxClients(gz(httpTraceAll(api.PutBucketTaggingHandler))))).Queries(\"tagging\", \"\")\n\t\t// PutBucketVersioning\n\t\trouter.Methods(http.MethodPut).HandlerFunc(\n\t\t\tcollectAPIStats(\"putbucketversioning\", maxClients(gz(httpTraceAll(api.PutBucketVersioningHandler))))).Queries(\"versioning\", \"\")\n\t\t// PutBucketNotification\n\t\trouter.Methods(http.MethodPut).HandlerFunc(\n\t\t\tcollectAPIStats(\"putbucketnotification\", maxClients(gz(httpTraceAll(api.PutBucketNotificationHandler))))).Queries(\"notification\", \"\")\n\t\t// ResetBucketReplicationState - MinIO extension API\n\t\trouter.Methods(http.MethodPut).HandlerFunc(\n\t\t\tcollectAPIStats(\"resetbucketreplicationstate\", maxClients(gz(httpTraceAll(api.ResetBucketReplicationStateHandler))))).Queries(\"replication-reset\", \"\")\n\t\t// PutBucket\n\t\trouter.Methods(http.MethodPut).HandlerFunc(\n\t\t\tcollectAPIStats(\"putbucket\", maxClients(gz(httpTraceAll(api.PutBucketHandler)))))\n\t\t// HeadBucket\n\t\trouter.Methods(http.MethodHead).HandlerFunc(\n\t\t\tcollectAPIStats(\"headbucket\", maxClients(gz(httpTraceAll(api.HeadBucketHandler)))))\n\t\t// PostPolicy\n\t\trouter.Methods(http.MethodPost).HeadersRegexp(xhttp.ContentType, \"multipart/form-data*\").HandlerFunc(\n\t\t\tcollectAPIStats(\"postpolicybucket\", maxClients(gz(httpTraceHdrs(api.PostPolicyBucketHandler)))))\n\t\t// DeleteMultipleObjects\n\t\trouter.Methods(http.MethodPost).HandlerFunc(\n\t\t\tcollectAPIStats(\"deletemultipleobjects\", maxClients(gz(httpTraceAll(api.DeleteMultipleObjectsHandler))))).Queries(\"delete\", \"\")\n\t\t// DeleteBucketPolicy\n\t\trouter.Methods(http.MethodDelete).HandlerFunc(\n\t\t\tcollectAPIStats(\"deletebucketpolicy\", maxClients(gz(httpTraceAll(api.DeleteBucketPolicyHandler))))).Queries(\"policy\", \"\")\n\t\t// DeleteBucketReplication\n\t\trouter.Methods(http.MethodDelete).HandlerFunc(\n\t\t\tcollectAPIStats(\"deletebucketreplicationconfiguration\", maxClients(gz(httpTraceAll(api.DeleteBucketReplicationConfigHandler))))).Queries(\"replication\", \"\")\n\t\t// DeleteBucketLifecycle\n\t\trouter.Methods(http.MethodDelete).HandlerFunc(\n\t\t\tcollectAPIStats(\"deletebucketlifecycle\", maxClients(gz(httpTraceAll(api.DeleteBucketLifecycleHandler))))).Queries(\"lifecycle\", \"\")\n\t\t// DeleteBucketEncryption\n\t\trouter.Methods(http.MethodDelete).HandlerFunc(\n\t\t\tcollectAPIStats(\"deletebucketencryption\", maxClients(gz(httpTraceAll(api.DeleteBucketEncryptionHandler))))).Queries(\"encryption\", \"\")\n\t\t// DeleteBucket\n\t\trouter.Methods(http.MethodDelete).HandlerFunc(\n\t\t\tcollectAPIStats(\"deletebucket\", maxClients(gz(httpTraceAll(api.DeleteBucketHandler)))))\n\n\t\t// MinIO extension API for replication.\n\t\t//\n\t\t// GetBucketReplicationMetrics\n\t\trouter.Methods(http.MethodGet).HandlerFunc(\n\t\t\tcollectAPIStats(\"getbucketreplicationmetrics\", maxClients(gz(httpTraceAll(api.GetBucketReplicationMetricsHandler))))).Queries(\"replication-metrics\", \"\")\n\n\t\t// Register rejected bucket APIs\n\t\tfor _, r := range rejectedBucketAPIs {\n\t\t\trouter.Methods(r.methods...).\n\t\t\t\tHandlerFunc(collectAPIStats(r.api, httpTraceAll(notImplementedHandler))).\n\t\t\t\tQueries(r.queries...)\n\t\t}\n\n\t\t// S3 ListObjectsV1 (Legacy)\n\t\trouter.Methods(http.MethodGet).HandlerFunc(\n\t\t\tcollectAPIStats(\"listobjectsv1\", maxClients(gz(httpTraceAll(api.ListObjectsV1Handler)))))\n\t}\n\n\t/// Root operation\n\n\t// ListenNotification\n\tapiRouter.Methods(http.MethodGet).Path(SlashSeparator).HandlerFunc(\n\t\tcollectAPIStats(\"listennotification\", maxClients(gz(httpTraceAll(api.ListenNotificationHandler))))).Queries(\"events\", \"{events:.*}\")\n\n\t// ListBuckets\n\tapiRouter.Methods(http.MethodGet).Path(SlashSeparator).HandlerFunc(\n\t\tcollectAPIStats(\"listbuckets\", maxClients(gz(httpTraceAll(api.ListBucketsHandler)))))\n\n\t// S3 browser with signature v4 adds '//' for ListBuckets request, so rather\n\t// than failing with UnknownAPIRequest we simply handle it for now.\n\tapiRouter.Methods(http.MethodGet).Path(SlashSeparator + SlashSeparator).HandlerFunc(\n\t\tcollectAPIStats(\"listbuckets\", maxClients(gz(httpTraceAll(api.ListBucketsHandler)))))\n\n\t// If none of the routes match add default error handler routes\n\tapiRouter.NotFoundHandler = collectAPIStats(\"notfound\", httpTraceAll(errorResponseHandler))\n\tapiRouter.MethodNotAllowedHandler = collectAPIStats(\"methodnotallowed\", httpTraceAll(methodNotAllowedHandler(\"S3\")))\n\n}", "title": "" }, { "docid": "eb60123e876fb1178ffef1d181bac0db", "score": "0.5120343", "text": "func NewAPI() (*API, error) {\n\tlinks := NewLinksResource()\n\n\tapi := &API{\n\t\tLinks: links,\n\t}\n\treturn api, nil\n}", "title": "" }, { "docid": "f9d53db67260d24f2c9fb38b10655ef6", "score": "0.5108366", "text": "func RegisterInterface(obj interface{}) {\n\taminoCodec.RegisterInterface(obj, &amino.InterfaceOptions{AlwaysDisambiguate: true})\n}", "title": "" }, { "docid": "347b4dcf6127eaa860f6774dec106469", "score": "0.5098537", "text": "func RegisterSwaggerAPI(_ client.Context, rtr *mux.Router, swaggerEnabled bool) error {\n\tif !swaggerEnabled {\n\t\treturn nil\n\t}\n\n\troot, err := fs.Sub(docs.SwaggerUI, \"swagger-ui\")\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tstaticServer := http.FileServer(http.FS(root))\n\trtr.PathPrefix(\"/swagger/\").Handler(http.StripPrefix(\"/swagger/\", staticServer))\n\n\treturn nil\n}", "title": "" }, { "docid": "92b3f2ef911e0e2432c5225b2e8afe7e", "score": "0.50947183", "text": "func (a AppModuleBasic) RegisterInterfaces(reg codectypes.InterfaceRegistry) {\n\ttypes.RegisterInterfaces(reg)\n}", "title": "" }, { "docid": "df9c093a1183c24d4e7a5deb9542c908", "score": "0.50934714", "text": "func NewAPI(store Store) API {\n\treturn API{store}\n}", "title": "" }, { "docid": "4cb818eaccabff246d49f3579ac1e698", "score": "0.5083244", "text": "func NewAPI(opts APIOpts) API {\n\tapi := &api{\n\t\tuniversal: opts.UniversalAPI,\n\t\tchannels: opts.Channels,\n\t\tdirectMessaging: opts.DirectMessaging,\n\t\tpubsubAdapter: opts.PubsubAdapter,\n\t\tsendToOutputBindingFn: opts.SendToOutputBindingFn,\n\t\ttracingSpec: opts.TracingSpec,\n\t\tmaxRequestBodySize: opts.MaxRequestBodySize,\n\t}\n\n\tmetadataEndpoints := api.constructMetadataEndpoints()\n\thealthEndpoints := api.constructHealthzEndpoints()\n\n\tapi.endpoints = append(api.endpoints, api.constructStateEndpoints()...)\n\tapi.endpoints = append(api.endpoints, api.constructSecretEndpoints()...)\n\tapi.endpoints = append(api.endpoints, api.constructPubSubEndpoints()...)\n\tapi.endpoints = append(api.endpoints, api.constructActorEndpoints()...)\n\tapi.endpoints = append(api.endpoints, api.constructDirectMessagingEndpoints()...)\n\tapi.endpoints = append(api.endpoints, metadataEndpoints...)\n\tapi.endpoints = append(api.endpoints, api.constructShutdownEndpoints()...)\n\tapi.endpoints = append(api.endpoints, api.constructBindingsEndpoints()...)\n\tapi.endpoints = append(api.endpoints, api.constructConfigurationEndpoints()...)\n\tapi.endpoints = append(api.endpoints, api.constructSubtleCryptoEndpoints()...)\n\tapi.endpoints = append(api.endpoints, api.constructCryptoEndpoints()...)\n\tapi.endpoints = append(api.endpoints, healthEndpoints...)\n\tapi.endpoints = append(api.endpoints, api.constructDistributedLockEndpoints()...)\n\tapi.endpoints = append(api.endpoints, api.constructWorkflowEndpoints()...)\n\n\tapi.publicEndpoints = append(api.publicEndpoints, metadataEndpoints...)\n\tapi.publicEndpoints = append(api.publicEndpoints, healthEndpoints...)\n\n\treturn api\n}", "title": "" }, { "docid": "a7274ee364179348fddd92c6b7267308", "score": "0.5068812", "text": "func NewAPI(options ...Option) (*API, error) {\n\tpd := &API{\n\t\tlogURL: func(u string) {},\n\t\tafterInit: make([]Option, 0),\n\t}\n\n\tfor _, option := range options {\n\t\terr := option(pd)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tfor _, initF := range pd.afterInit {\n\t\terr := initF(pd)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn pd, nil\n}", "title": "" }, { "docid": "26fec22a0226d14ce6dc3c007bc89200", "score": "0.5063338", "text": "func NewAPI(c client.Client) API {\n\treturn api{c}\n}", "title": "" }, { "docid": "26fec22a0226d14ce6dc3c007bc89200", "score": "0.5063338", "text": "func NewAPI(c client.Client) API {\n\treturn api{c}\n}", "title": "" }, { "docid": "abd6f92c01e14b91d3daea7b9c4d0f4f", "score": "0.5057326", "text": "func (AppModuleBasic) RegisterInterfaces(registry codectypes.InterfaceRegistry) {\r\n\ttypes.RegisterInterfaces(registry)\r\n}", "title": "" }, { "docid": "a0cd668c7a43bd3e0d4f3f9d9c6c0f69", "score": "0.50571066", "text": "func NewAPI(log *util.Logger, identity *Identity, brand, country string) *API {\n\tv := &API{\n\t\tHelper: request.NewHelper(log),\n\t\tidentity: identity,\n\t\tbrand: brand,\n\t\tcountry: country,\n\t}\n\treturn v\n}", "title": "" }, { "docid": "684210865279cfecfc98fd879dd62e37", "score": "0.50508606", "text": "func RegisterMetric(svc *graphql.Service, impl graphql.InterfaceTypeResolver) {\n\tsvc.RegisterInterface(_InterfaceTypeMetricDesc, impl)\n}", "title": "" }, { "docid": "b5592967e7230e633bd5d0dfecae0659", "score": "0.504745", "text": "func RegisterHandler(w http.ResponseWriter, r *http.Request) {\n\tvar httpMethod string\n\ta := API{}\n\terr := json.NewDecoder(r.Body).Decode(&a)\n\tif err != nil {\n\t\tlog.Print(err)\n\n\t\tRenderJSON(w, http.StatusBadRequest, NewResponse(err.Error()))\n\t\treturn\n\t}\n\n\tif httpMethod, err = getAllowedMethod(a.HTTPMethod); err != nil {\n\t\tlog.Print(err)\n\n\t\tRenderJSON(w, http.StatusBadRequest, NewResponse(err.Error()))\n\t\treturn\n\t}\n\n\teKey := getCacheKeys(a.Endpoint, httpMethod)\n\tstore.Set(eKey, a, maxItemTime)\n\tRenderJSON(w, http.StatusOK, NewResponse(\"cool\"))\n}", "title": "" }, { "docid": "43bcc761798999c73e4480f45c3fdaab", "score": "0.5046337", "text": "func Register(mgr manager.Manager) {\n\tserver := mgr.GetWebhookServer()\n\t// MetricsTrait\n\tserver.Register(\"/validate-standard-oam-dev-v1alpha1-metricstrait\",\n\t\t&webhook.Admission{Handler: &metrics.ValidatingHandler{}})\n\tserver.Register(\"/mutate-standard-oam-dev-v1alpha1-metricstrait\",\n\t\t&webhook.Admission{Handler: &metrics.MutatingHandler{}})\n\t// Containerized\n\tserver.Register(\"/validate-standard-oam-dev-v1alpha1-containerized\",\n\t\t&webhook.Admission{Handler: &containerized.ValidatingHandler{}})\n\tserver.Register(\"/mutate-standard-oam-dev-v1alpha1-containerized\",\n\t\t&webhook.Admission{Handler: &containerized.MutatingHandler{}})\n}", "title": "" }, { "docid": "f2e2d020263f955e21d0dbd04defc328", "score": "0.50407404", "text": "func Register(obj interface{}, name string) error {\n\treturn DefaultRegistry.Register(objects.New(obj, name))\n}", "title": "" }, { "docid": "5b8892270b31a843e5f8ace7d53dee9a", "score": "0.50406855", "text": "func (b AppModuleBasic) RegisterInterfaces(registry cdctypes.InterfaceRegistry) {\n\tsdkslashingtypes.RegisterInterfaces(registry)\n}", "title": "" }, { "docid": "8ba20fbee7c8c627e767dc671992075e", "score": "0.5039522", "text": "func (a *AnnotationRegistry) RegisterInterfaceType(annotation string, generator InterfaceAnnotationGenerator) {\n\tannotation = strings.TrimPrefix(annotation, \"@\")\n\ta.ml.Lock()\n\t{\n\t\ta.interfaceAnnotations[annotation] = generator\n\t}\n\ta.ml.Unlock()\n}", "title": "" }, { "docid": "253a6105b7858f8e437e06a05dc8bea9", "score": "0.5037893", "text": "func Register(typ DirverType, h creatorHandler) error {\n\n\tif _, ok := drivers[typ]; ok {\n\t\treturn fmt.Errorf(\"creator for driver: %s is existed.\", typ)\n\t}\n\tdrivers[typ] = h\n\treturn nil\n}", "title": "" }, { "docid": "197d4c9bc1e065df81533f29ec0fb93b", "score": "0.50364596", "text": "func Register(perOS OsInterface) error {\n\tif perOS == nil {\n\t\treturn errors.New(\"perOS cannot be nil\")\n\t}\n\n\trunningImplementations[perOS.OS()] = perOS\n\treturn nil\n}", "title": "" }, { "docid": "f8d5624dfac4a2de3a7a8a66282ac836", "score": "0.50363666", "text": "func (a AppModuleBasic) RegisterInterfaces(reg cdctypes.InterfaceRegistry) {\n\ttypes.RegisterInterfaces(reg)\n}", "title": "" }, { "docid": "7527f4ac02e61e7a4df1c998de37a0e1", "score": "0.50279766", "text": "func (AppModuleBasic) RegisterInterfaces(registry codectypes.InterfaceRegistry) {\n\ttmlightclient.RegisterInterfaces(registry)\n\tsolomachine.RegisterInterfaces(registry)\n\tlocalhost.RegisterInterfaces(registry)\n}", "title": "" } ]
91733eccdef02a225b768c44e320a1cd
/ Returns the value of the ::spacing property.
[ { "docid": "8caca91379644115356063122b91234c", "score": "0.6466817", "text": "func (self *TraitIconView) GetSpacing() (return__ int) {\n\tvar __cgo__return__ C.gint\n\t__cgo__return__ = C.gtk_icon_view_get_spacing(self.CPointer)\n\treturn__ = int(__cgo__return__)\n\treturn\n}", "title": "" } ]
[ { "docid": "75b304ebb5c7b56e7f257350aede02a7", "score": "0.66803247", "text": "func (self *TraitBox) GetSpacing() (return__ int) {\n\tvar __cgo__return__ C.gint\n\t__cgo__return__ = C.gtk_box_get_spacing(self.CPointer)\n\treturn__ = int(__cgo__return__)\n\treturn\n}", "title": "" }, { "docid": "9007d993bbc4e902f272cca6da23a520", "score": "0.6556035", "text": "func (self *TraitCellAreaBox) GetSpacing() (return__ int) {\n\tvar __cgo__return__ C.gint\n\t__cgo__return__ = C.gtk_cell_area_box_get_spacing(self.CPointer)\n\treturn__ = int(__cgo__return__)\n\treturn\n}", "title": "" }, { "docid": "ed63e0c9df698a1af66a8041249f153a", "score": "0.63764095", "text": "func (self *TraitExpander) GetSpacing() (return__ int) {\n\tvar __cgo__return__ C.gint\n\t__cgo__return__ = C.gtk_expander_get_spacing(self.CPointer)\n\treturn__ = int(__cgo__return__)\n\treturn\n}", "title": "" }, { "docid": "2580f084bdfbd226f7b5fff8cafec801", "score": "0.6337137", "text": "func (s *Style) BoxSpace() float32 {\n\treturn s.Layout.Margin.Dots + s.Border.Width.Dots + s.Layout.Padding.Dots\n}", "title": "" }, { "docid": "61f5b54265a58dd2b7262adfbfe2d9db", "score": "0.6088146", "text": "func (m *Menu) Spacing() (int, int, int) {\n\tvar desc, row, col C.int\n\tC.menu_spacing(m.menu, (*C.int)(&desc), (*C.int)(&row),\n\t\t(*C.int)(&col))\n\n\treturn int(desc), int(row), int(col)\n}", "title": "" }, { "docid": "55391a3a4e89feb4463f9a60c2416264", "score": "0.58460927", "text": "func (v *TreeViewColumn) GetSpacing() int {\n\treturn int(C.gtk_tree_view_column_get_spacing(v.native()))\n}", "title": "" }, { "docid": "59730d6f140e602fce9ab6769c2bbe62", "score": "0.56875896", "text": "func (o *LabelRelationElement1) GetSpace() string {\n\tif o == nil || o.Space == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Space\n}", "title": "" }, { "docid": "224be73240b5d37f127085c11618181f", "score": "0.53928965", "text": "func (_this *HTMLObjectElement) Hspace() uint {\n\tvar ret uint\n\tvalue := _this.Value_JS.Get(\"hspace\")\n\tret = (uint)((value).Int())\n\treturn ret\n}", "title": "" }, { "docid": "80e362531015e3473d00ac4bf01c1d01", "score": "0.523867", "text": "func (f *Font) LineSpacing() float64 {\n\n\treturn f.lineSpacing\n}", "title": "" }, { "docid": "b18c52feb27920c0dd98cc4170c0105c", "score": "0.5225309", "text": "func (o *UpdateClusterResponse) GetSpace() string {\n\tif o == nil || o.Space == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Space\n}", "title": "" }, { "docid": "47a37021cf29ba54df8010cf284f5ec9", "score": "0.50645256", "text": "func (self *TraitFlowBox) GetColumnSpacing() (return__ uint) {\n\tvar __cgo__return__ C.guint\n\t__cgo__return__ = C.gtk_flow_box_get_column_spacing(self.CPointer)\n\treturn__ = uint(__cgo__return__)\n\treturn\n}", "title": "" }, { "docid": "f1d8f4e8eb35b6a48fdc77912fb9115b", "score": "0.5025843", "text": "func GetWordSpacing(view View, subviewID string) SizeUnit {\n\tif subviewID != \"\" {\n\t\tview = ViewByID(view, subviewID)\n\t}\n\tif view != nil {\n\t\tif result, ok := sizeStyledProperty(view, WordSpacing); ok {\n\t\t\treturn result\n\t\t}\n\t\tif parent := view.Parent(); parent != nil {\n\t\t\treturn GetWordSpacing(parent, \"\")\n\t\t}\n\t}\n\treturn AutoSize()\n}", "title": "" }, { "docid": "6c8760c7f59d7d5cc96772dc2fc0e74c", "score": "0.5014013", "text": "func paneSpace(height int) int {\n\treturn height - fontHeight - padPx*2\n}", "title": "" }, { "docid": "1c4aa2b283420da428e060bf2b7ef72a", "score": "0.4978008", "text": "func (self *TraitIconView) GetColumnSpacing() (return__ int) {\n\tvar __cgo__return__ C.gint\n\t__cgo__return__ = C.gtk_icon_view_get_column_spacing(self.CPointer)\n\treturn__ = int(__cgo__return__)\n\treturn\n}", "title": "" }, { "docid": "9a64947cbe710d830a0d8a5d94753719", "score": "0.49467948", "text": "func (self *TraitIconView) SetSpacing(spacing int) {\n\tC.gtk_icon_view_set_spacing(self.CPointer, C.gint(spacing))\n\treturn\n}", "title": "" }, { "docid": "efc463aad84a6e6662a49b85160ffa92", "score": "0.49214625", "text": "func (c *Constraint) Space() *Space {\n\treturn goSpace(C.cpConstraintGetSpace(c.c))\n}", "title": "" }, { "docid": "cc8969ef8e95575e010a208b15ef330e", "score": "0.49078265", "text": "func (self *TraitFlowBox) GetRowSpacing() (return__ uint) {\n\tvar __cgo__return__ C.guint\n\t__cgo__return__ = C.gtk_flow_box_get_row_spacing(self.CPointer)\n\treturn__ = uint(__cgo__return__)\n\treturn\n}", "title": "" }, { "docid": "a642e2a7bad25fa4542f6474af5697ec", "score": "0.4879799", "text": "func (win *Window) Spacing(cols int) {\n\tfor i := 0; i < cols; i++ {\n\t\twin.widget()\n\t}\n}", "title": "" }, { "docid": "2b294af70814f112ed535af779973a8f", "score": "0.4867999", "text": "func (gnr *gridNodeRenderer) padding() fyne.Size {\n\treturn fyne.NewSize(theme.Padding()*1, theme.Padding()*1)\n}", "title": "" }, { "docid": "2b866d2291e4c1f1961ce088cf0f916f", "score": "0.48611438", "text": "func (_this *HTMLObjectElement) Vspace() uint {\n\tvar ret uint\n\tvalue := _this.Value_JS.Get(\"vspace\")\n\tret = (uint)((value).Int())\n\treturn ret\n}", "title": "" }, { "docid": "62b0e7ea1b21b18d8b0cdcec8c226e1c", "score": "0.48477086", "text": "func (me TxsdKeycapFunction) IsSpace() bool { return me == \"space\" }", "title": "" }, { "docid": "9724d21139a4dd60ebc73daf34eef511", "score": "0.4831971", "text": "func (a *account) GetSpaceID() string {\n\treturn a.SpaceID\n}", "title": "" }, { "docid": "473812c375c818ca313b126df5d5d8fa", "score": "0.48303306", "text": "func (v *Misc) GetPadding() (xpad, ypad int) {\n\tvar x, y C.gint\n\tC.gtk_misc_get_padding(v.native(), &x, &y)\n\treturn int(x), int(y)\n}", "title": "" }, { "docid": "199d7dffc6b25cfb22fd58a45f526665", "score": "0.48105094", "text": "func (v *Alignment) GetPadding() (top, bottom, left, right uint) {\n\tvar ctop, cbottom, cleft, cright C.guint\n\tC.gtk_alignment_get_padding(v.native(), &ctop, &cbottom, &cleft,\n\t\t&cright)\n\treturn uint(ctop), uint(cbottom), uint(cleft), uint(cright)\n}", "title": "" }, { "docid": "23d0efeefa3b7e2e2d4d78f72b0e2e62", "score": "0.48001084", "text": "func (p *PlayerColor) TokenSpaceIndex() int {\n\treturn p.spaceIndexForInstance(p.Token())\n}", "title": "" }, { "docid": "b82aad3aad64c0eeab98f89c0de3d698", "score": "0.4796266", "text": "func printSpacing(printedInt int) {\n\tif printedInt/100 > 0 {\n\t\tfmt.Printf(\" \")\n\t} else if printedInt/10 > 0 {\n\t\tfmt.Printf(\" \")\n\t} else {\n\t\tfmt.Printf(\" \")\n\t}\n}", "title": "" }, { "docid": "bb96261891550bd4f53334dec78baca4", "score": "0.47907272", "text": "func PixelSpacing(stride int) interface {\n\tDatasetIOOption\n\tBandIOOption\n} {\n\treturn pixelSpacingOpt{stride}\n}", "title": "" }, { "docid": "e46ef06c6f834a519f78e5b03069f37e", "score": "0.47877482", "text": "func (e *Element) namespacePrefix() string {\n\treturn e.Space\n}", "title": "" }, { "docid": "4a67a56048ae8550c4636992847ee683", "score": "0.47825286", "text": "func (self *TraitIconView) GetRowSpacing() (return__ int) {\n\tvar __cgo__return__ C.gint\n\t__cgo__return__ = C.gtk_icon_view_get_row_spacing(self.CPointer)\n\treturn__ = int(__cgo__return__)\n\treturn\n}", "title": "" }, { "docid": "e3346312c37fba1e0828298833d9abf0", "score": "0.47742808", "text": "func (m *NSManager) GetNameSpace() *NameSpace {\n\treturn m.ns\n}", "title": "" }, { "docid": "b4bf01c1f12e56b3741ce46746ec02bf", "score": "0.47503856", "text": "func spaces(n int) string {\n\tif n > 10 {\n\t\tn = 10\n\t}\n\treturn \" \"[:2*n]\n}", "title": "" }, { "docid": "e63e83aff9a0d0df86d9e9800402ed48", "score": "0.47467092", "text": "func (recv *GutterRenderer) GetPadding() (int32, int32) {\n\tvar c_xpad C.gint\n\n\tvar c_ypad C.gint\n\n\tC.gtk_source_gutter_renderer_get_padding((*C.GtkSourceGutterRenderer)(recv.native), &c_xpad, &c_ypad)\n\n\txpad := (int32)(c_xpad)\n\n\typad := (int32)(c_ypad)\n\n\treturn xpad, ypad\n}", "title": "" }, { "docid": "1c2d2f3cb2e5889ca7aae0d46145e51e", "score": "0.47275096", "text": "func (v *FlowBox) GetColumnSpacing() uint {\n\tc := C.gtk_flow_box_get_column_spacing(v.native())\n\treturn uint(c)\n}", "title": "" }, { "docid": "475deb02778bff0c333b62891ad4c061", "score": "0.47212058", "text": "func (n *Node) NS() uint64 {\n\treturn n.ns\n}", "title": "" }, { "docid": "02d945f2efdc57b51b0baf9679d8abbe", "score": "0.47012722", "text": "func (me TxsdItemizedlistSpacing) String() string { return xsdt.Token(me).String() }", "title": "" }, { "docid": "9f970ad4c7a632a8b2cbf77d2ed0893c", "score": "0.46947753", "text": "func (p Space) TableName() string {\n\treturn \"spaces\"\n}", "title": "" }, { "docid": "8245f31a7d6800a43a92e62c3b6ce1af", "score": "0.46799052", "text": "func (e *Impl) GetPadding() util.AbsoluteQuantity { return e.Padding }", "title": "" }, { "docid": "44b86a3727d8cccde77fc0b2e907270b", "score": "0.46657556", "text": "func (this *KeyspaceRef) Namespace() string {\n\treturn this.namespace\n}", "title": "" }, { "docid": "31a82cd71c20c6c9f06eb40d21e9c62f", "score": "0.4652926", "text": "func NilSpace() Space {\n\treturn SpaceBase(0)\n}", "title": "" }, { "docid": "0bc44a47d72c5827f5cd7b2662f2716c", "score": "0.46398184", "text": "func (i *InstanceScope) Namespace() string {\n\treturn i.KKInstance.Namespace\n}", "title": "" }, { "docid": "5e6340dae1a432220174f9cd15227364", "score": "0.46126246", "text": "func (s *ScreenSize) Separator() int64 {\n\treturn s.width / 2\n}", "title": "" }, { "docid": "46a52e6395740814893c9906fa2f2d26", "score": "0.46096706", "text": "func (tg *ThreadGroup) PIDNamespace() *PIDNamespace {\n\treturn tg.pidns\n}", "title": "" }, { "docid": "51a54741bdca139a1150b828716c8dd8", "score": "0.46066916", "text": "func (env Env) Namespace() string {\n\treturn env.namespace\n}", "title": "" }, { "docid": "4f4cde648ebc082028cf4da3687bd626", "score": "0.4593647", "text": "func (o *IpamNetwork6DataData) GetSpaceName() string {\n\tif o == nil || o.SpaceName == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.SpaceName\n}", "title": "" }, { "docid": "725747593ca071ab393cd3b9150a4221", "score": "0.45925495", "text": "func (v *TreeViewColumn) SetSpacing(spacing int) {\n\tC.gtk_tree_view_column_set_spacing(v.native(), C.gint(spacing))\n}", "title": "" }, { "docid": "3e145d1cdc3844029a29f321fde285f5", "score": "0.4584495", "text": "func (o *LabelRelationElement1) SetSpace(v string) {\n\to.Space = &v\n}", "title": "" }, { "docid": "2ff790a95fa673e1b48daba9ad339d30", "score": "0.4573133", "text": "func (printer *DenseRowMajor) GetColumnSpacing() int {\n\treturn printer.columnSpacing\n}", "title": "" }, { "docid": "6ae65620fe39b3f614ce94ce9d38cf95", "score": "0.45641837", "text": "func (v *FlowBox) GetRowSpacing() uint {\n\tc := C.gtk_flow_box_get_row_spacing(v.native())\n\treturn uint(c)\n}", "title": "" }, { "docid": "58805ec04e4e0c5d7345d83787ad6d0c", "score": "0.45556512", "text": "func (s *PanelConfiguration) SetGutterSpacing(v string) *PanelConfiguration {\n\ts.GutterSpacing = &v\n\treturn s\n}", "title": "" }, { "docid": "6ccd0f316e20c6e5507c54d26231065b", "score": "0.45538235", "text": "func (o *LabelRelationElement1) HasSpace() bool {\n\tif o != nil && o.Space != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "c1c95f3c23e2e087c515e3d31af8e300", "score": "0.45315674", "text": "func (o SecretOutput) Namespace() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *Secret) pulumi.StringPtrOutput { return v.Namespace }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "69c726f219459ab934743709e179cca3", "score": "0.45307696", "text": "func (t *Task) PIDNamespace() *PIDNamespace {\n\treturn t.tg.pidns\n}", "title": "" }, { "docid": "1b94d5030172c7e3854d497a6a2d5721", "score": "0.45254645", "text": "func NewSpace() *Space {\n\tw := &Space{}\n\tw.Wrapper = w\n\treturn w\n}", "title": "" }, { "docid": "28d5bda36a48a3c2178eec264f280232", "score": "0.4517036", "text": "func (this *KeyspaceRef) Keyspace() string {\n\treturn this.keyspace\n}", "title": "" }, { "docid": "2ada0cf2bc0baea80aad39f9434aaa9e", "score": "0.45136973", "text": "func (self Context) TextLetterSpacing(spacing float64) {\n\tC.nvgTextLetterSpacing(self.cbase, C.float(spacing))\n}", "title": "" }, { "docid": "7769cdeffe4a50ce9f8fbbe82b72a583", "score": "0.4504735", "text": "func (m *MetricsHandler) Namespace() string {\n\treturn m.namespace\n}", "title": "" }, { "docid": "8068e3d42a8b771a4ebf444f20abeddb", "score": "0.44956398", "text": "func IsSpace(c byte) bool { return spaceTable[c] == 1 }", "title": "" }, { "docid": "3141b34f8aae7fc682bbb8ba36cdd764", "score": "0.44826093", "text": "func (o IntegrationMetricStatsToSyncOutput) Namespace() pulumi.StringOutput {\n\treturn o.ApplyT(func(v IntegrationMetricStatsToSync) string { return v.Namespace }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "a142e74a9fe4e9a76293c38f72325032", "score": "0.44764197", "text": "func (ns *namespace) Namespace() string {\n\treturn ns.namespace\n}", "title": "" }, { "docid": "8da4fba76d9a51cb05b862586b40b9d5", "score": "0.447504", "text": "func (m *ClusterScope) Namespace() string {\n\treturn m.HcloudCluster.Namespace\n}", "title": "" }, { "docid": "92c999084e236c678df7a7073a1453a2", "score": "0.44722793", "text": "func (ns *NullString) TrimSpace() NullString {\n\tif !ns.Valid {\n\t\treturn *ns\n\t}\n\treturn NullString{Valid: true, String: strings.TrimSpace(ns.String)}\n}", "title": "" }, { "docid": "8f74675bfb9692958ec12c1456e69c2b", "score": "0.44653612", "text": "func (self *TraitIconView) GetMargin() (return__ int) {\n\tvar __cgo__return__ C.gint\n\t__cgo__return__ = C.gtk_icon_view_get_margin(self.CPointer)\n\treturn__ = int(__cgo__return__)\n\treturn\n}", "title": "" }, { "docid": "74ace0bd2d1e38bdd3c749a7835208af", "score": "0.4455318", "text": "func (o TriggerDestinationGkePtrOutput) Namespace() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *TriggerDestinationGke) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.Namespace\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "eee6b12c49ad44bfcb5ded370d363973", "score": "0.44375587", "text": "func getWhitespaceString() string {\n\n\t_, file, line, ok := runtime.Caller(1)\n\tif !ok {\n\t\treturn \"\"\n\t}\n\tparts := strings.Split(file, \"/\")\n\tfile = parts[len(parts)-1]\n\n\treturn strings.Repeat(\" \", len(fmt.Sprintf(\"%s:%d: \", file, line)))\n\n}", "title": "" }, { "docid": "ea6b95e6a703ef473be1f8346ac750ce", "score": "0.44295368", "text": "func (o TriggerDestinationGkeOutput) Namespace() pulumi.StringOutput {\n\treturn o.ApplyT(func(v TriggerDestinationGke) string { return v.Namespace }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "f3e656717a95d58181aac3cbaec609b6", "score": "0.44186765", "text": "func (self *TraitStyleContext) GetPadding(state C.GtkStateFlags) (padding C.GtkBorder) {\n\tC.gtk_style_context_get_padding(self.CPointer, state, &padding)\n\treturn\n}", "title": "" }, { "docid": "d136a673dcfc5faeae9035afc68cc501", "score": "0.44170702", "text": "func (recv *Gutter) GetPadding(xpad int32, ypad int32) {\n\tc_xpad := (C.gint)(xpad)\n\n\tc_ypad := (C.gint)(ypad)\n\n\tC.gtk_source_gutter_get_padding((*C.GtkSourceGutter)(recv.native), &c_xpad, &c_ypad)\n\n\treturn\n}", "title": "" }, { "docid": "ba169658ef0acec94d6a83136b43dda2", "score": "0.44151956", "text": "func (instance *ComponentInstance) GetNamespace() string {\n\treturn object.SystemNS\n}", "title": "" }, { "docid": "b16af44321b559155fce582c6e9e0fd4", "score": "0.440761", "text": "func (t Type) AddressSpace() uint32 {\n\treturn uint32(C.clang_getAddressSpace(t.c))\n}", "title": "" }, { "docid": "8dff5ec8f4adc52409f9dc367400bdab", "score": "0.4405909", "text": "func (self *TraitWidget) GetMarginBottom() (return__ int) {\n\tvar __cgo__return__ C.gint\n\t__cgo__return__ = C.gtk_widget_get_margin_bottom(self.CPointer)\n\treturn__ = int(__cgo__return__)\n\treturn\n}", "title": "" }, { "docid": "adb2443ec4fbb991e22c4e2e5d695f42", "score": "0.4386787", "text": "func BandSpacing(stride int) interface {\n\tDatasetIOOption\n} {\n\treturn bandSpacingOpt{stride}\n}", "title": "" }, { "docid": "e58faa1a8d415400efb5200503ced771", "score": "0.4377986", "text": "func isSpace(r rune) bool {\n\treturn unicode.Is(unicode.Zs, r) || r == '\\t'\n}", "title": "" }, { "docid": "44c88d3bedf5145bffbdeaffa3973688", "score": "0.4350315", "text": "func GetLetterSpacing(view View, subviewID string) SizeUnit {\n\tif subviewID != \"\" {\n\t\tview = ViewByID(view, subviewID)\n\t}\n\tif view != nil {\n\t\tif result, ok := sizeStyledProperty(view, LetterSpacing); ok {\n\t\t\treturn result\n\t\t}\n\t\tif parent := view.Parent(); parent != nil {\n\t\t\treturn GetLetterSpacing(parent, \"\")\n\t\t}\n\t}\n\treturn AutoSize()\n}", "title": "" }, { "docid": "de6d695985397600936fbf8dc3374f7b", "score": "0.43460324", "text": "func (recv *PrintCompositor) GetBottomMargin(unit gtk.Unit) float64 {\n\tc_unit := (C.GtkUnit)(unit)\n\n\tretC := C.gtk_source_print_compositor_get_bottom_margin((*C.GtkSourcePrintCompositor)(recv.native), c_unit)\n\tretGo := (float64)(retC)\n\n\treturn retGo\n}", "title": "" }, { "docid": "cd76499d4bf2094aa0664bba44faa9f6", "score": "0.4337265", "text": "func (o *LabelRelationElement1) GetSpaceOk() (*string, bool) {\n\tif o == nil || o.Space == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Space, true\n}", "title": "" }, { "docid": "a1009fe450f4f3b6e9172c69ebad024d", "score": "0.4334023", "text": "func (ctx *Context) TextLetterSpacing(spacing float32) {\n\tC.nvgTextLetterSpacing(ctx.c(), C.float(spacing))\n}", "title": "" }, { "docid": "6128224ece002e047f41ab0182de062e", "score": "0.4329278", "text": "func (p *Pod) GetNamespace() string { return p.namespace }", "title": "" }, { "docid": "fe15a633a9543d12f3a371cb81e3e795", "score": "0.4327305", "text": "func writeSpace(n int64) int64 {\n\tn = n + 16 // 16 is the oid length.\n\treturn alignSize(n, grainSize)\n}", "title": "" }, { "docid": "2b498a97838b65c72512b1989f973064", "score": "0.4326613", "text": "func (s Spacing) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "13a0ae2ec423b6868dcab155246ce9d8", "score": "0.4318301", "text": "func isSpace(b byte) bool {\n\tif b < 128 {\n\t\treturn (spaceSet[b/32] & (1 << (b % 32))) != 0\n\t}\n\treturn b == '\\x85' || b == '\\xA0'\n}", "title": "" }, { "docid": "29c7d3899b9adc320ee4a3898b17162b", "score": "0.43166423", "text": "func (c *Config) Namespace() string {\n\treturn c.namespace\n}", "title": "" }, { "docid": "40c7c1c744358d649ddbfc41ace6e874", "score": "0.43143725", "text": "func (o SecretImpersonatedAccountOutput) Namespace() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *SecretImpersonatedAccount) pulumi.StringPtrOutput { return v.Namespace }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "0ecbc891ce603a2f2580dc8e5975a3c2", "score": "0.42960396", "text": "func (t *Table) calculateSpacing() (width, height int) {\n\tborderWidth := 0\n\tpaddingWidth := (len(t.cols) - 1) * t.padding\n\tmarginWidth := 2 * t.margin\n\n\twidth = marginWidth + paddingWidth\n\n\tfor _, r := range t.borderRunes {\n\t\tborderWidth = util.MaxInt(borderWidth, runewidth.RuneWidth(r))\n\t}\n\n\tif t.borderMask.Has(BorderColumn) {\n\t\t// If we have vertical borders we need to have double the padding: left\n\t\t// and right from the border.\n\t\twidth += paddingWidth + ((len(t.cols) - 1) * borderWidth)\n\t}\n\n\tif t.borderMask.Has(BorderLeft) {\n\t\twidth += t.padding + borderWidth\n\t}\n\n\tif t.borderMask.Has(BorderRight) {\n\t\twidth += t.padding + borderWidth\n\t}\n\n\tif t.borderMask.Has(BorderTop) {\n\t\theight++\n\t}\n\n\tif t.borderMask.Has(BorderRow) {\n\t\theight += len(t.rows) - 1\n\t}\n\n\tif t.borderMask.Has(BorderBottom) {\n\t\theight++\n\t}\n\n\treturn width, height\n}", "title": "" }, { "docid": "a3466735d92314004721f2a20d39cad6", "score": "0.42924282", "text": "func (o SecretBackendSignOutput) Namespace() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *SecretBackendSign) pulumi.StringPtrOutput { return v.Namespace }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "e2056f457a00f63d03c7e892cbfb8203", "score": "0.42886633", "text": "func (m PrefixMap) Namespace(prefix string) string { return m[prefix] }", "title": "" }, { "docid": "aa8b790d373d3d619f990fbd33855894", "score": "0.42849845", "text": "func (o NomadSecretRoleOutput) Namespace() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *NomadSecretRole) pulumi.StringPtrOutput { return v.Namespace }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "1cc49f66c1abe979e3a82343a470fe77", "score": "0.4282703", "text": "func (self *TraitStyleContext) GetMargin(state C.GtkStateFlags) (margin C.GtkBorder) {\n\tC.gtk_style_context_get_margin(self.CPointer, state, &margin)\n\treturn\n}", "title": "" }, { "docid": "499490219cefc37147f9c1a92c8d0b93", "score": "0.42802086", "text": "func (o CheInstallationSpecCheOperatorSpecOutput) Namespace() pulumi.StringOutput {\n\treturn o.ApplyT(func(v CheInstallationSpecCheOperatorSpec) string { return v.Namespace }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "829be35e7e793b4eae2f0f1603c8430b", "score": "0.42770234", "text": "func (_this *WorkerGlobalScope) AddressSpace() corsrfc1918.AddressSpace {\n\tvar ret corsrfc1918.AddressSpace\n\tvalue := _this.Value_JS.Get(\"addressSpace\")\n\tret = corsrfc1918.AddressSpaceFromJS(value)\n\treturn ret\n}", "title": "" }, { "docid": "f3815d04e198a94afe095499ff60cbd1", "score": "0.42729166", "text": "func (o KlusterletStatusGenerationsOutput) Namespace() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v KlusterletStatusGenerations) *string { return v.Namespace }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "b59e4ee4a5ddcad17cc87759241320d4", "score": "0.42725086", "text": "func space(number int) string {\n\n\tvar noOfSpace string\n\n\tfor i := 0; i < number; i++ {\n\t\tnoOfSpace += \" \"\n\t}\n\n\treturn noOfSpace\n}", "title": "" }, { "docid": "1d434497fb28df53db166aae0e626d25", "score": "0.42637828", "text": "func (recv *GutterRenderer) GetAlignment() (float32, float32) {\n\tvar c_xalign C.gfloat\n\n\tvar c_yalign C.gfloat\n\n\tC.gtk_source_gutter_renderer_get_alignment((*C.GtkSourceGutterRenderer)(recv.native), &c_xalign, &c_yalign)\n\n\txalign := (float32)(c_xalign)\n\n\tyalign := (float32)(c_yalign)\n\n\treturn xalign, yalign\n}", "title": "" }, { "docid": "94264ce53e26a4493ae35fc6506ba1eb", "score": "0.4260197", "text": "func (w *Text) padding(t *theme.Theme) int {\n\treturn t.Pixels(unit.Ems(0.5)).Ceil()\n}", "title": "" }, { "docid": "385fefefa18269d1fb9ef97ad2418efa", "score": "0.42556754", "text": "func (r DistributionResult) Namespace() string {\n\treturn r.Key.Namespace\n}", "title": "" }, { "docid": "c8d20f0598144ca14aa43385415aef15", "score": "0.42555207", "text": "func (o *IpamNetwork6DataData) GetSpaceId() string {\n\tif o == nil || o.SpaceId == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.SpaceId\n}", "title": "" }, { "docid": "25be8a8c2dfd36031171e2df0c1b0f1a", "score": "0.42536327", "text": "func (p *parser) parseSpace() error {\n\tif !isSpace(p.Get()) {\n\t\treturn p.error(fmt.Errorf(\"expected space\"))\n\t}\n\tp.skipSpace()\n\treturn nil\n}", "title": "" }, { "docid": "76e9995e9780a402e574cbaa2ee5eb00", "score": "0.42525575", "text": "func LineSpacing(stride int) interface {\n\tDatasetIOOption\n\tBandIOOption\n} {\n\treturn lineSpacingOpt{stride}\n}", "title": "" }, { "docid": "aa703a509ea8d79e0a570d9df7d1ef01", "score": "0.42458525", "text": "func (t *Table) GetNamespace() string {\n\treturn t.namespace\n}", "title": "" }, { "docid": "8e7ebf0303e338cb39b2213f76786276", "score": "0.42448696", "text": "func GetNameSpace(namespaceName string) (*PmemNameSpace, error) {\n\tnamespace := &PmemNameSpace{}\n\tnamespaceList := []*PmemNameSpace{}\n\tgetRegionCmd := fmt.Sprintf(\"%s ndctl list -n %s\", NsenterCmd, namespaceName)\n\tregionOut, err := utils.Run(getRegionCmd)\n\tif err != nil {\n\t\treturn namespace, err\n\t}\n\terr = json.Unmarshal(([]byte)(regionOut), &namespaceList)\n\tif err != nil {\n\t\treturn namespace, err\n\t}\n\tif len(namespaceList) == 1 {\n\t\treturn namespaceList[0], nil\n\t}\n\treturn namespace, fmt.Errorf(\"namespace found error\")\n}", "title": "" }, { "docid": "2ba4613a170b3ba3429ae8f7bb419de9", "score": "0.42448303", "text": "func (r CounterResult) Namespace() string {\n\treturn r.Key.Namespace\n}", "title": "" } ]
e3c6d0876ca6cecea9a351e73d475df2
Tx returns an `ent.Tx` for mutations that were executed in transactions; it returns an error otherwise.
[ { "docid": "e63f0c52e941f440b60829915565f618", "score": "0.0", "text": "func (m PositionMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" } ]
[ { "docid": "3fc5cf7a376dbb3b34a142932477605a", "score": "0.7497651", "text": "func (m StatusCheckInMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "39cc2f8680f2ab95bd860a4b871e703f", "score": "0.7493593", "text": "func (m DentalexpenseMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "1fe77e386bb27d38e204a29464922584", "score": "0.734638", "text": "func (m DentistMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "1fe77e386bb27d38e204a29464922584", "score": "0.734638", "text": "func (m DentistMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "047bfb45d0a46a678d5024a932497fa1", "score": "0.73259383", "text": "func (m RentalMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, errors.New(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "a0b43d6be13b017e14e26f39d6469372", "score": "0.73235935", "text": "func (m StatusMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "91a6eb5d63518853169c89967f50bc09", "score": "0.73159033", "text": "func (m CheckInMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "b49319826634a2f698e67392b5807967", "score": "0.73058206", "text": "func (m InsuranceMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "d8c9decb59b2179f45e730eef504749c", "score": "0.72939813", "text": "func (m StatusOpinionMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "03a39c23fb095115f8607c775cf21a63", "score": "0.72775143", "text": "func (m GraphMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "fcfb5f9591afa07a93f2ee1c38900af5", "score": "0.7268979", "text": "func (m GameServerMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "41e477e37bcb52b143421d30afa62dc3", "score": "0.7241601", "text": "func (m OAuthConnectionMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "7ca716f0e82a77300ec33bb3a6cab082", "score": "0.7234888", "text": "func (m AmountpaidMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "8c707d731e9edb2b1c8ce1452ff4541e", "score": "0.7229955", "text": "func (m StatusReserveMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "c400b48b926fe7c77b8c8fa3c7ce3806", "score": "0.72296405", "text": "func (m ConstructionMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "c1c0ef4a48e571fa018f847b05f79c14", "score": "0.7224384", "text": "func (m MoneytransferMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "737f983b976de1dfc38bd192f74d9af5", "score": "0.721284", "text": "func (m StockManagerMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "00dd9cedc690d7c60e0e0eb6d9132d86", "score": "0.72114223", "text": "func (m SexMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "c939f983460454f8d8cbad7a80d49a0e", "score": "0.7189739", "text": "func (m CheckoutMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "d63066dc77b44dcc36dd2d92ab8f624d", "score": "0.7187222", "text": "func (m MedicalfileMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "668aa5af218a7f6776ee3f02f930e9da", "score": "0.71834236", "text": "func (m RecordinsuranceMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "5bbde450914d8b94b915dd9a478916a8", "score": "0.7177702", "text": "func (m ExpertMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "a989e80f33c2d6f048ff3888bc752dcc", "score": "0.7173621", "text": "func (m MetadataMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, errors.New(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "6f0141809d29f356655daf2cfccee076", "score": "0.7171364", "text": "func (m MedicalTypeMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "a629dfdb37fbcf94e0f657ad17cc0c07", "score": "0.71631926", "text": "func (m SystemequipmentMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "03019a0ca6fc5d996079990d67d6a062", "score": "0.71602887", "text": "func (m FurnitureMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "4dd66ed87be75e0864ec201165ab66d7", "score": "0.7159899", "text": "func (m MedicalCareMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "4dd66ed87be75e0864ec201165ab66d7", "score": "0.7159899", "text": "func (m MedicalCareMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "64ef5bbfe2567b30382992716696dcca", "score": "0.71578455", "text": "func (m GroupOfAgeMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "2a0a06856ade475848d4b2f4a1668afd", "score": "0.7145654", "text": "func (m InfoMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, errors.New(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "b24809be234ae34c80908ce525caa502", "score": "0.71429926", "text": "func (m BookingMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "bbead14107a842619b7f4e7fa12e398a", "score": "0.7142392", "text": "func (m MetadataMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "c8cca003b5defe041df497c2bdd56f7d", "score": "0.7135946", "text": "func (m PermissionMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"models: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "0fe4e715a68f967ded18d7855637907b", "score": "0.71305966", "text": "func (m LessonplanMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "864f338905fbaccee43ba334a2a95c5e", "score": "0.71267474", "text": "func (m CollectionMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "39b1e6adb34212f6d2aed573b19c6f04", "score": "0.71180236", "text": "func (m WorkspaceMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"models: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "c14cdb7caf941d310a06e595541d7eb0", "score": "0.71180165", "text": "func (m ItemMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "2a47c2a6733bef31ee4b5b33cc754483", "score": "0.7116554", "text": "func (m AppointmentMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "a1974bc3d765648ca694f7379a17a70f", "score": "0.7115714", "text": "func (m CityMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "49cce30f0f0e5df3ee9b984ca45db835", "score": "0.7113457", "text": "func (m StateMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "f6fda7f0dff97e433c9b7c8aa8f8f808", "score": "0.7107069", "text": "func (m PaybackMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "15e958fe1599acf7833d7c4dd45b3fee", "score": "0.71049154", "text": "func (m PetMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, errors.New(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "15e958fe1599acf7833d7c4dd45b3fee", "score": "0.71049154", "text": "func (m PetMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, errors.New(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "cf688e7a9bbea0b37483adfdaf2f17eb", "score": "0.7099634", "text": "func (m VoteMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "fd74e9c5a200aee66274c0347721e2bd", "score": "0.70992404", "text": "func (m PromotionMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "9a92fa1eaf5df4d7f0aadf38786d8791", "score": "0.7095586", "text": "func (m BankMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "b16074b69bfaae6658090268aaebdf5e", "score": "0.70911616", "text": "func (m ContactParentsMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "78bcede795790e40a44017c882235647", "score": "0.7091077", "text": "func (m FurnitureTypeMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "fc6f446c71140e3c535e32f8bb343ae2", "score": "0.70834786", "text": "func (m NodeMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, errors.New(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "cc6b7ecd3d30209033197040cfd12661", "score": "0.7076955", "text": "func (m VehicleMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "e371aefe2871496e5b5621d90e862ae1", "score": "0.7072541", "text": "func (m MemberMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "e371aefe2871496e5b5621d90e862ae1", "score": "0.7072541", "text": "func (m MemberMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "fd05fa215f9513ca46caacfbd524fd5d", "score": "0.7072075", "text": "func (m OperatingSystemMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "50c7efd67e33849191fcbf470238a1a6", "score": "0.707116", "text": "func (m DeathMannerMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "7e30c58b3a740e6396b27e6841448cac", "score": "0.70619905", "text": "func (m GithubEventMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, errors.New(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "8ae6ac58045c18de1e04921c86788b62", "score": "0.7051332", "text": "func (m OfficerMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "e2f57180c924ab705323362d32c08f2a", "score": "0.70493937", "text": "func (m GithubGistMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, errors.New(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "c4e65cc702028dbbb45e4bbaa5e77836", "score": "0.7042939", "text": "func (m VehicleMakeMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "e242a6436d6125022e23cc696503afe4", "score": "0.7041602", "text": "func (m PersonMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "06801eef4b59314c66a1968bf26e7355", "score": "0.70385003", "text": "func (m MedicalEquipmentMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "98aa207b90c6b0c87456d903c840d845", "score": "0.7038217", "text": "func (m OperationroomMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "022f942f05d7b5cba8dc24865ad64997", "score": "0.70366603", "text": "func (m PostMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, errors.New(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "022f942f05d7b5cba8dc24865ad64997", "score": "0.70366603", "text": "func (m PostMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, errors.New(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "7b65270078243f8bb36c3e62af896c33", "score": "0.7036531", "text": "func (m VehicleModelMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "92446f8e50530bbc635f4360bc99781b", "score": "0.7031888", "text": "func (m DeliveryMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "6f51a6b764737ccb6bd0f50b20f2338a", "score": "0.7030775", "text": "func (m TagMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "901b66539c9976b8d20514bfd5876f50", "score": "0.7029995", "text": "func (m CompanyMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "501685771b0cb4a99fb348c41333b29c", "score": "0.70281523", "text": "func (m VehicleClassMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "466df79b3e8a55fd04ab1478e9762536", "score": "0.7027261", "text": "func (m PaymentMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "90cc42b689414b0a62217fe4618fffc4", "score": "0.7026671", "text": "func (m DiseaseMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "90cc42b689414b0a62217fe4618fffc4", "score": "0.7026671", "text": "func (m DiseaseMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "90cc42b689414b0a62217fe4618fffc4", "score": "0.7026671", "text": "func (m DiseaseMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "7035736ae51808ab11e5bb7c6bb831a5", "score": "0.7024476", "text": "func (m DeathPlaceMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "27b82b8a0841163b9d7221690c76dbf1", "score": "0.70223236", "text": "func (m PlayerIdentifierMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "7e722314f8ed320e7924eb85b46eabf0", "score": "0.7017476", "text": "func (m SystemmemberMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "31303e91adda0094c3a4b5b565fd7362", "score": "0.70171744", "text": "func (m AdminMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "ef986825c99a26d29ae9d17ff20085c0", "score": "0.70164186", "text": "func (m MetricsMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "c498ddc93e52b4861f4c79282c4da9f6", "score": "0.7016354", "text": "func (m CounterMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "ceb2a6ed7bdcefb24672ae6028dc5de1", "score": "0.7016081", "text": "func (m FoodMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "9d70c95433f931d9e68b429de14f5183", "score": "0.70154476", "text": "func (m PatientMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "9d70c95433f931d9e68b429de14f5183", "score": "0.70154476", "text": "func (m PatientMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "9d70c95433f931d9e68b429de14f5183", "score": "0.70154476", "text": "func (m PatientMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "9d70c95433f931d9e68b429de14f5183", "score": "0.70154476", "text": "func (m PatientMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "9d70c95433f931d9e68b429de14f5183", "score": "0.70154476", "text": "func (m PatientMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "2f970dace71704b9e550334ae7d47931", "score": "0.70129144", "text": "func (m MmedicineMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "7a6eccc95667e929e3614bcd7d63f750", "score": "0.7012783", "text": "func (m CarMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, errors.New(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "cc77562828fad2f3c1abf18aa48d0f5f", "score": "0.70083404", "text": "func (m DegreeMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "88e5c8f2b3539dbfb8916d6be90f47a2", "score": "0.70030826", "text": "func (m StatusRoomMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "c47f9e50256b6ab7effa99d85777f2e7", "score": "0.7002039", "text": "func (m ApplicationMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "ff5ffb82ddb1fe40ecb35c738d4687d9", "score": "0.6990825", "text": "func (m QccEnterpriseDataMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "1f6d158b1a458584e4bc0b81665bcea5", "score": "0.69881487", "text": "func (m NurseMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "6c96e278a70c618598827fb522826b14", "score": "0.6987506", "text": "func (m BookMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "d1ceb1c2bfba559721714208c7566389", "score": "0.69776154", "text": "func (m DoctorMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "d1ceb1c2bfba559721714208c7566389", "score": "0.69776154", "text": "func (m DoctorMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "f343262e79f0743fa2de229d79627a25", "score": "0.6975067", "text": "func (m DeathCertifierMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "2f7e1b85dc05e418eed8fece58de9f4b", "score": "0.69737476", "text": "func (m CounterStaffMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "780c2cc8e3bdc9e6ff536b88cc381510", "score": "0.69722253", "text": "func (m OrderItemMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "84a93ecedc8e0bbbd879816f100f7835", "score": "0.6960996", "text": "func (m UserMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, errors.New(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "84a93ecedc8e0bbbd879816f100f7835", "score": "0.6960996", "text": "func (m UserMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, errors.New(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "84a93ecedc8e0bbbd879816f100f7835", "score": "0.6960996", "text": "func (m UserMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, errors.New(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" }, { "docid": "f48d394b81c33ac4f71f17b27a5e740a", "score": "0.69597334", "text": "func (m GaugeMutation) Tx() (*Tx, error) {\n\tif _, ok := m.driver.(*txDriver); !ok {\n\t\treturn nil, fmt.Errorf(\"ent: mutation is not running in a transaction\")\n\t}\n\ttx := &Tx{config: m.config}\n\ttx.init()\n\treturn tx, nil\n}", "title": "" } ]
e872398d33ab7a4bde4674538f6f04cd
Close underlying zmq socket To be used with defer
[ { "docid": "002937bb296807d362aacfff62e4e404", "score": "0.68488157", "text": "func (r *RouterZmq) Close() {\n\tr.socket.Close()\n\treturn\n}", "title": "" } ]
[ { "docid": "dc058a0bbd9e1adb8572d1207354f49e", "score": "0.68864197", "text": "func (s *SubscriberZmq) Close(poller *zmq.Poller) {\n\tpoller.RemoveBySocket(s.Socket())\n\ts.socket.Close()\n}", "title": "" }, { "docid": "d3d04683b3c392439043d7d16da7e123", "score": "0.66810644", "text": "func (d *DealerZmq) Close() {\n\td.socket.Close()\n\treturn\n}", "title": "" }, { "docid": "ae720039456d743850d5aee475646674", "score": "0.6568721", "text": "func (this *udpEndpoint) Close() {\n this.socket.Close()\n}", "title": "" }, { "docid": "c3612353f4265f95055a7685bcb95312", "score": "0.59873354", "text": "func (router *routerSocket) Close() error {\n\treturn router.sck.Close()\n}", "title": "" }, { "docid": "054cdb29e17a03cc6f8a22f280971fc6", "score": "0.5916195", "text": "func (client *clientData) closeSocket() error {\n\tclient.Lock()\n\tdefer client.Unlock()\n\n\tif nil == client.socket {\n\t\treturn nil\n\t}\n\n\t// if already connected, disconnect first\n\tif \"\" != client.address {\n\t\tclient.socket.Disconnect(client.address)\n\t}\n\n\t// close sockets\n\terr := client.socket.Close()\n\tclient.socket = nil\n\tif nil != client.monitorShutdown {\n\t\tclient.monitorShutdown.SendMessage(\"stop\")\n\t\tclient.monitorShutdown.Close()\n\t\tclient.monitorShutdown = nil\n\t\t// small delay to allow any background socket closing\n\t\t// and to restrict rate of reconnection\n\t\ttime.Sleep(5 * time.Millisecond)\n\t}\n\n\treturn err\n}", "title": "" }, { "docid": "3ea677496508fefc15e1f8586eba633a", "score": "0.58229846", "text": "func (e *endpoint) Close() {\n\tnotify := func() bool {\n\t\te.mu.Lock()\n\t\tdefer e.mu.Unlock()\n\n\t\tswitch state := e.net.State(); state {\n\t\tcase transport.DatagramEndpointStateInitial:\n\t\tcase transport.DatagramEndpointStateClosed:\n\t\t\treturn false\n\t\tcase transport.DatagramEndpointStateBound, transport.DatagramEndpointStateConnected:\n\t\t\tinfo := e.net.Info()\n\t\t\tinfo.ID.LocalPort = e.ident\n\t\t\te.stack.UnregisterTransportEndpoint([]tcpip.NetworkProtocolNumber{info.NetProto}, e.transProto, info.ID, e, ports.Flags{}, tcpip.NICID(e.ops.GetBindToDevice()))\n\t\tdefault:\n\t\t\tpanic(fmt.Sprintf(\"unhandled state = %s\", state))\n\t\t}\n\n\t\te.net.Shutdown()\n\t\te.net.Close()\n\n\t\te.rcvMu.Lock()\n\t\tdefer e.rcvMu.Unlock()\n\t\te.rcvClosed = true\n\t\te.rcvBufSize = 0\n\t\tfor !e.rcvList.Empty() {\n\t\t\tp := e.rcvList.Front()\n\t\t\te.rcvList.Remove(p)\n\t\t\tp.data.DecRef()\n\t\t}\n\n\t\treturn true\n\t}()\n\n\tif notify {\n\t\te.waiterQueue.Notify(waiter.EventHUp | waiter.EventErr | waiter.ReadableEvents | waiter.WritableEvents)\n\t}\n}", "title": "" }, { "docid": "1b9c34a0a0e5307b6f1dc3a35abd15dc", "score": "0.57218224", "text": "func (s *Socket) Close(ctx context.Context) error {\n\tclose(s.shutdown)\n\tif s.conn != nil {\n\t\treturn s.conn.Close()\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5d7811018a1d10316416a9cf0709f6b2", "score": "0.5710931", "text": "func (sock *RouterSocket) Close() error {\n\treturn sock.conn.Close()\n}", "title": "" }, { "docid": "c790b31d3e6cf3f01de17f455ca9ff39", "score": "0.56655985", "text": "func (sock *socket) Close() error {\n\n\tfin := time.Now().Add(sock.linger)\n\n\tDrainChannel(sock.uwq, fin)\n\n\tsock.Lock()\n\tif sock.closing {\n\t\tsock.Unlock()\n\t\treturn ErrClosed\n\t}\n\tsock.closing = true\n\tclose(sock.closeq)\n\n\tfor _, l := range sock.listeners {\n\t\tl.l.Close()\n\t}\n\tpipes := append([]*pipe{}, sock.pipes...)\n\tsock.Unlock()\n\n\t// A second drain, just to be sure. (We could have had device or\n\t// forwarded messages arrive since the last one.)\n\tDrainChannel(sock.uwq, fin)\n\n\t// And tell the protocol to shutdown and drain its pipes too.\n\tsock.proto.Shutdown(fin)\n\n\tfor _, p := range pipes {\n\t\tp.Close()\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "9b3a1c9cced40926dd7d172801070a15", "score": "0.5639986", "text": "func (v *VirtioSocketListener) Close() error {\n\tv.closeOnce.Do(func() {\n\t\tC.VZVirtioSocketDevice_removeSocketListenerForPort(\n\t\t\tobjc.Ptr(v.vsockDevice),\n\t\t\tv.vsockDevice.dispatchQueue,\n\t\t\tC.uint32_t(v.port),\n\t\t)\n\t\tv.handler.Delete()\n\t})\n\treturn nil\n}", "title": "" }, { "docid": "60a419b65066874c006ff84a37ed07b9", "score": "0.5594062", "text": "func (xsk *Socket) Close() error {\n\tallErrors := []error{}\n\tvar err error\n\n\tif xsk.fd != -1 {\n\t\tif err = unix.Close(xsk.fd); err != nil {\n\t\t\tallErrors = append(allErrors, fmt.Errorf(\"failed to close XDP socket: %v\", err))\n\t\t}\n\t\txsk.fd = -1\n\n\t\tvar sh *reflect.SliceHeader\n\n\t\tsh = (*reflect.SliceHeader)(unsafe.Pointer(&xsk.completionRing.Descs))\n\t\tsh.Data = uintptr(0)\n\t\tsh.Len = 0\n\t\tsh.Cap = 0\n\n\t\tsh = (*reflect.SliceHeader)(unsafe.Pointer(&xsk.txRing.Descs))\n\t\tsh.Data = uintptr(0)\n\t\tsh.Len = 0\n\t\tsh.Cap = 0\n\n\t\tsh = (*reflect.SliceHeader)(unsafe.Pointer(&xsk.rxRing.Descs))\n\t\tsh.Data = uintptr(0)\n\t\tsh.Len = 0\n\t\tsh.Cap = 0\n\n\t\tsh = (*reflect.SliceHeader)(unsafe.Pointer(&xsk.fillRing.Descs))\n\t\tsh.Data = uintptr(0)\n\t\tsh.Len = 0\n\t\tsh.Cap = 0\n\t}\n\n\tif xsk.umem != nil {\n\t\tif err := syscall.Munmap(xsk.umem); err != nil {\n\t\t\tallErrors = append(allErrors, fmt.Errorf(\"failed to unmap the UMEM: %v\", err))\n\t\t}\n\t\txsk.umem = nil\n\t}\n\n\tif len(allErrors) > 0 {\n\t\treturn allErrors[0]\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "688d73e1a64d7c4e3a87c88f660a63c8", "score": "0.55666286", "text": "func (e *endpoint) Close() {\n\te.mu.Lock()\n\te.disableLocked()\n\te.addressableEndpointState.Cleanup()\n\te.mu.Unlock()\n\n\te.protocol.forgetEndpoint(e.nic.ID())\n}", "title": "" }, { "docid": "054ded8932ae86993e9d07117a385143", "score": "0.555506", "text": "func (Protocol) Close() {}", "title": "" }, { "docid": "4d0432900047c5529fc8f4c1c44ba8d9", "score": "0.5547048", "text": "func (c *client) shutdown() {\n\tc.closeLock.Lock()\n\tdefer c.closeLock.Unlock()\n\n\tif c.closed {\n\t\treturn\n\t}\n\tc.closed = true\n\tclose(c.closedCh)\n\n\tif c.ipv4conn != nil {\n\t\tc.ipv4conn.Close()\n\t}\n\tif c.ipv6conn != nil {\n\t\tc.ipv6conn.Close()\n\t}\n}", "title": "" }, { "docid": "89fd95078d69a8d4509149faec591fbe", "score": "0.5535978", "text": "func (s *SocketWorker) Close() error {\n\tif s.closed {\n\t\treturn ErrClosed\n\t}\n\ts.ro.Lock()\n\ts.closed = true\n\tclose(s.closer)\n\ts.ro.Unlock()\n\treturn s.wo.Conn.Close()\n}", "title": "" }, { "docid": "1a5b13ddfad05de2689bd9f01d3c021d", "score": "0.55106366", "text": "func (n *MsgSignal) close() {\n\tn.setClose(true)\n\tn.closeConn()\n\tn.removeProcessRecvData()\n}", "title": "" }, { "docid": "84c8c2bb7a98fe9c592b466c9ade5d0f", "score": "0.5503849", "text": "func (a *ebpfAttachment) Close() {\n\tif a.socketFD != -1 {\n\t\tsyscall.Close(a.socketFD)\n\t\ta.socketFD = -1\n\t}\n}", "title": "" }, { "docid": "92cd3232345dce01709c2490863c8de7", "score": "0.5471293", "text": "func (e *Endpoint) Close() {\n\te.mu.Lock()\n\tdefer e.mu.Unlock()\n\n\tif e.State() == transport.DatagramEndpointStateClosed {\n\t\treturn\n\t}\n\n\tfor mem := range e.multicastMemberships {\n\t\te.stack.LeaveGroup(e.netProto, mem.nicID, mem.multicastAddr)\n\t}\n\te.multicastMemberships = nil\n\n\tif e.connectedRoute != nil {\n\t\te.connectedRoute.Release()\n\t\te.connectedRoute = nil\n\t}\n\n\te.setEndpointState(transport.DatagramEndpointStateClosed)\n}", "title": "" }, { "docid": "2aef703c7fac5e90bd0d0bd099ba38e4", "score": "0.5467748", "text": "func (c *Client) Close() error {}", "title": "" }, { "docid": "5fd19f8d0a9e25865f1a982b14411422", "score": "0.5462857", "text": "func (*endpoint) Close() {\n\tlog.Printf(\"udp's Close has not implemented yet\\n\")\n}", "title": "" }, { "docid": "776fe9f7e65709ba049bbc594968b21d", "score": "0.54580635", "text": "func (c *Conn) Close() error { return c.Socket.Close() }", "title": "" }, { "docid": "4bad2c6a31cc012f325d767068fa205f", "score": "0.54573405", "text": "func (t Transport) Close() {\n\tt.listen.Close()\n}", "title": "" }, { "docid": "93aae7dc0cd64b7808df337fc1efe095", "score": "0.5455554", "text": "func (p *process) closeIO() {\n\tp.Lock()\n\tdefer p.Unlock()\n\n\tp.relay.closeIO()\n}", "title": "" }, { "docid": "9c810c3232b6857b1f2f7c8b89e2d3e3", "score": "0.5437636", "text": "func (cf *ClientFramework) Close() {\n\terr := cf.unsubscribeEvents(cf.corrID)\n\tif err != nil {\n\t\tLogger.WithFields(logrus.Fields{\n\t\t\t\"correlationID\": cf.corrID,\n\t\t}).Errorf(\"failed to unsubscribe events: %v\", err)\n\t}\n\tclose(cf.signal)\n\tcf.zmqConn.Close()\n}", "title": "" }, { "docid": "f4b09c5df2fc5b90d9552715f9adc8e4", "score": "0.5406803", "text": "func (w *response) Close() error {\n\t// Can't close the udp conn, as that is actually the listener.\n\tif w.tcp != nil {\n\t\te := w.tcp.Close()\n\t\tw.tcp = nil\n\t\treturn e\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4e34f6827f2436ea2fe23f43592cad07", "score": "0.5390619", "text": "func (p *webSocketPeer) Close() error {\n\tp.mu.Lock()\n\tif p.closed {\n\t\tp.mu.Unlock()\n\t\treturn nil\n\t}\n\tif p.conn == nil {\n\t\tp.mu.Unlock()\n\t\treturn nil\n\t}\n\n\t// mark closed, localize conn, close chans\n\tp.closed = true\n\tconn := p.conn\n\tclose(p.in)\n\tclose(p.out)\n\n\tp.mu.Unlock()\n\n\t// try to be nice\n\tcloseMsg := websocket.FormatCloseMessage(websocket.CloseNormalClosure, \"goodbye\")\n\terr := conn.WriteControl(websocket.CloseMessage, closeMsg, time.Now().Add(5*time.Second))\n\tif err != nil {\n\t\tlog.Printf(\"Unable to send \\\"MessageGoodbye\\\": %s\", err)\n\t}\n\n\t// terminate!\n\treturn conn.Close()\n}", "title": "" }, { "docid": "4dc047eeee6278892029321c3aa6f1b2", "score": "0.5318205", "text": "func (n *ConnNotifee) ListenClose(network inet.Network, addr ma.Multiaddr) {\n\n}", "title": "" }, { "docid": "3380340baa47e417b1e8c09b01953fce", "score": "0.53173053", "text": "func (m MockUDP) Close() {\n\tclose(m.ctrl)\n\t_ = m.conn.Close()\n}", "title": "" }, { "docid": "e5772b5d6d58ad874c690cf7607dd1d4", "score": "0.5299726", "text": "func (r *rmqstreamRequester) Teardown() error {\n\tif err := r.producer.Close(); err != nil {\n\t\treturn err\n\t}\n\tif err := r.consumer.Close(); err != nil {\n\t\treturn err\n\t}\n\tif err := r.env.DeleteStream(r.stream); err != nil {\n\t\treturn err\n\t}\n\tif err := r.env.Close(); err != nil {\n\t\treturn err\n\t}\n\tr.consumer = nil\n\tr.producer = nil\n\tr.env = nil\n\tr.inbound = nil\n\treturn nil\n}", "title": "" }, { "docid": "015d3a73ee2866faf27b6e28527ac510", "score": "0.5292355", "text": "func (s *stream) closeForShutdown(err error) {\n\ts.sendStream.closeForShutdown(err)\n\ts.receiveStream.closeForShutdown(err)\n}", "title": "" }, { "docid": "dd4db1bc5f178a10a93b7c4ac9215125", "score": "0.5290211", "text": "func (self *Socket) Close() (err error) {\n\tself.open = false\n\treturn syscall.Close(self.fd)\n}", "title": "" }, { "docid": "6233f7fde762994861395ca5066651d4", "score": "0.52870584", "text": "func (p *Producer) Close() {\n\tp.lock.Lock()\n\tdefer p.lock.Unlock()\n\tp.socket.Close()\n}", "title": "" }, { "docid": "da5efa51a3fe0824f38b7f93aed1c449", "score": "0.5276089", "text": "func (s *SocketServer) Close() error {\n\ts.instruments.Log(octo.LOGINFO, s.info.UUID, \"websocket.SocketServer.Close\", \"Start\")\n\tif !s.isRunning() {\n\t\treturn nil\n\t}\n\n\ts.rl.Lock()\n\t{\n\t\ts.running = false\n\t\ts.doClose = true\n\t\ts.wg.Done()\n\t}\n\ts.rl.Unlock()\n\n\tif err := s.server.Close(); err != nil {\n\t\ts.instruments.Log(octo.LOGERROR, s.info.UUID, \"websocket.SocketServer.Close\", \"Completed : %+q\", err.Error())\n\t}\n\n\t// Close all clients connections.\n\ts.base.Close()\n\n\ts.instruments.Log(octo.LOGINFO, s.info.UUID, \"websocket.SocketServer.Close\", \"Completed\")\n\treturn nil\n}", "title": "" }, { "docid": "268ef9e19cecf8c5a70009c82a9ddf76", "score": "0.5252757", "text": "func (b *bolt4) Close(ctx context.Context) {\n\tb.log.Infof(log.Bolt4, b.logId, \"Close\")\n\tif b.state != bolt4_dead {\n\t\tb.queue.appendGoodbye()\n\t\tb.queue.send(ctx)\n\t}\n\tif err := b.conn.Close(); err != nil {\n\t\tb.log.Warnf(log.Driver, b.serverName, \"could not close underlying socket\")\n\t}\n\tb.state = bolt4_dead\n}", "title": "" }, { "docid": "dc72443b0c570a556104ab4bd4494b79", "score": "0.52501714", "text": "func (l *websocketImpl) Close() {\n\tl.safeStop.Do(func() {\n\t\tclose(l.stop)\n\t\t_ = l.write(websocket.CloseMessage, websocket.FormatCloseMessage(websocket.CloseNormalClosure, \"\"))\n\t\t_ = l.socket.Close()\n\t})\n}", "title": "" }, { "docid": "7d291ff812aa10ee6a9063292ee9a4b2", "score": "0.52494514", "text": "func (q *Queue) close() {\r\n\tsyscall.Close(q.interruptFd)\r\n}", "title": "" }, { "docid": "4fedba35f2e7cdf30ac97abcfdc1123d", "score": "0.5241431", "text": "func (mb *tcpTransporter) close() (err error) {\n\tif mb.conn != nil {\n\t\terr = mb.conn.Close()\n\t\tmb.conn = nil\n\t}\n\treturn\n}", "title": "" }, { "docid": "c1ed7e37017ad7db225ad6ee9b0a97be", "score": "0.52319777", "text": "func (cee *ChannelEngineEndpoint) Close() {\n}", "title": "" }, { "docid": "171bbc1506ca0b0e8db433ccdc5630b3", "score": "0.52173585", "text": "func (v *vessel) Close() error {\n\tif v.transport == nil {\n\t\treturn ErrNotConnected\n\t}\n\n\tif err := v.transport.Close(); err != nil {\n\t\treturn err\n\t}\n\n\t// Kill the dispatcher.\n\tv.shutdown <- true\n\n\treturn nil\n}", "title": "" }, { "docid": "f7c9782d3c060eed60cb93f7053e9966", "score": "0.52167827", "text": "func (p *PushCli) Close() error {\n\tp.mutex.Lock()\n\tdefer p.mutex.Unlock()\n\tif p.status == pushClosed {\n\t\treturn ErrAleradyClosed\n\t}\n\tp.status = pushClosed\n\tp.resolver.Close()\n\treturn p.conn.Close()\n}", "title": "" }, { "docid": "2d4b1e13d4a0bd7a776321bc5dd8fd69", "score": "0.52141505", "text": "func (p *TCPPublisher) Close() {\n\tclose(p.msg)\n\tp.closer.Close()\n}", "title": "" }, { "docid": "857e9fc6b1569853d862ee16ba88aa6d", "score": "0.52127963", "text": "func (s *UDPSession) Close() error {\n\tvar once bool\n\ts.dieOnce.Do(func() {\n\t\tclose(s.die)\n\t\tonce = true\n\t})\n\n\tif once {\n\t\tif s.kcp != nil && s.kcp.snmp != nil {\n\t\t\tatomic.AddUint64(&s.kcp.snmp.CurrEstab, ^uint64(0))\n\t\t}\n\n\t\t// TODO: is necessary? possibly remove & replace with basic Close\n\n\t\t// try best to send all queued messages\n\t\ts.mu.Lock()\n\t\ts.kcp.flush(false)\n\t\ts.uncork()\n\t\t// release pending segments\n\t\ts.kcp.ReleaseTX()\n\t\tif s.fecDecoder != nil {\n\t\t\ts.fecDecoder.release()\n\t\t}\n\t\ts.mu.Unlock()\n\n\t\treturn nil\n\t} else {\n\t\treturn errors.WithStack(io.ErrClosedPipe)\n\t}\n}", "title": "" }, { "docid": "df192184074369a9ca7c56611c3ff54b", "score": "0.5186349", "text": "func (xport *transport) close() {\n\tclose(xport.sendChan)\n\txport.wg.Wait()\n}", "title": "" }, { "docid": "f0e87e56a3109b85a61b5a76158cd071", "score": "0.5171385", "text": "func (exchange *SecuritiesExchange) Close() { exchange.mqChannel.Close() }", "title": "" }, { "docid": "f990795da989d1184f8d5e5d577d4cf4", "score": "0.5171237", "text": "func (chManager *channelManager) shutdown() {\n\tchManager.channelMux.Lock()\n\tdefer chManager.channelMux.Unlock()\n\tif chManager.running {\n\t\tdefer chManager.conn.Close()\n\t\tdefer chManager.channel.Close()\n\t\tchManager.running = false\n\t\tclose(chManager.done)\n\t}\n}", "title": "" }, { "docid": "581383d68dd67e7cd8ff3ad79f7436c0", "score": "0.5171178", "text": "func (poller *fdPoller) close() {\n\tif poller.pipe[1] != -1 {\n\t\tunix.Close(poller.pipe[1])\n\t}\n\tif poller.pipe[0] != -1 {\n\t\tunix.Close(poller.pipe[0])\n\t}\n\tif poller.epfd != -1 {\n\t\tunix.Close(poller.epfd)\n\t}\n}", "title": "" }, { "docid": "f4cee3df7893f46af44118ab2ba6bce7", "score": "0.5162242", "text": "func (s *BaseSocketServer) Close() error {\n\ts.instruments.Log(octo.LOGINFO, s.info.UUID, \"websocket.BaseSocketServer.Close\", \"Started\")\n\n\ts.cl.Lock()\n\tdefer s.cl.Unlock()\n\n\tfor _, client := range s.clients {\n\t\tgo client.Close()\n\t}\n\n\ts.instruments.Log(octo.LOGINFO, s.info.UUID, \"websocket.BaseSocketServer.Close\", \"Completed\")\n\treturn nil\n}", "title": "" }, { "docid": "ab6da991cb06303f1a1989c951490fcf", "score": "0.5159407", "text": "func (s *NetlinkSocket) Close() {\n\tsyscall.Close(s.fd)\n}", "title": "" }, { "docid": "6aeb8ba1e9dfec0ce3559d3ab4e7f6c1", "score": "0.5145757", "text": "func (socket *Socketcast) Close() error {\n\tif socket.closed {\n\t\treturn errors.New(\"Already Closed\")\n\t}\n\n\tclose(socket.close)\n\tsocket.closed = true\n\n\tsocket.wg.Wait()\n\n\treturn nil\n}", "title": "" }, { "docid": "3fc809a70aeaaa4999d0b33b9e5580a0", "score": "0.5138507", "text": "func (pc mockPeerConn) Close() error {\n\treturn nil\n}", "title": "" }, { "docid": "d8b92df66201b9b53099f300ac0e8384", "score": "0.5134385", "text": "func (mb *TCPTransporter) close() (err error) {\n\tif mb.conn != nil {\n\t\terr = mb.conn.Close()\n\t\tmb.conn = nil\n\t}\n\treturn\n}", "title": "" }, { "docid": "296265a184be9e215faade64fe8310e4", "score": "0.5121273", "text": "func (t *TrapListener) Close() {\n\t// Prevent concurrent calls to Close\n\tif atomic.CompareAndSwapInt32(&t.finish, 0, 1) {\n\t\t// TODO there's bugs here\n\t\tif t.conn == nil {\n\t\t\treturn\n\t\t}\n\t\tif t.conn.LocalAddr().Network() == udp {\n\t\t\tt.conn.Close()\n\t\t}\n\t\t<-t.done\n\t}\n}", "title": "" }, { "docid": "36ffb720bea519fcbfd0a533aec5df4f", "score": "0.5111077", "text": "func (c *connect) free() {\n\tc.stream.CloseSend()\n\tc.cliconn.Close()\n}", "title": "" }, { "docid": "86f16710bcbed7c11016d29c1189f05e", "score": "0.51108056", "text": "func (c *client) Close() error { return c.c.Close() }", "title": "" }, { "docid": "80407ae485211efe24c4ac3db6f18c51", "score": "0.51074004", "text": "func mimicFinalClient(socketURL string) {\n log.Println(\"Creating a mimic client to terminate socket accept thread\")\n conn, err := net.Dial(\"unix\", socketURL)\n if err != nil {\n log.Fatalf(\"Failed to open the final client connection to Garnet\")\n }\n conn.Close()\n}", "title": "" }, { "docid": "0e64b54e6d92419c0f209c42289aa734", "score": "0.5092185", "text": "func (worker *Worker) Close() {\r\n\tclose(worker.messages)\r\n\r\n\tworker.client.Close()\r\n}", "title": "" }, { "docid": "caaa001d69be3ed0f5d798684a05b145", "score": "0.50904125", "text": "func (c *Client) Close() {\n}", "title": "" }, { "docid": "caaa001d69be3ed0f5d798684a05b145", "score": "0.50904125", "text": "func (c *Client) Close() {\n}", "title": "" }, { "docid": "44f7a4e3c9c5a10cde1f2b6027df3ce1", "score": "0.50848585", "text": "func (sw *SocketWriter) Close() error {\n\tif sw.Conn == nil {\n\t\treturn nil\n\t}\n\terr := sw.Conn.Close()\n\tsw.Conn = nil\n\treturn err\n}", "title": "" }, { "docid": "5511cbecae2609c361629ca3586463a8", "score": "0.508412", "text": "func (worker *WorkerClient) Close() {\n\tif worker.workerConn != nil {\n\t\tworker.workerConn.Close()\n\t}\n\tif worker.workerOOBConn != nil {\n\t\tworker.workerOOBConn.Close()\n\t}\n}", "title": "" }, { "docid": "c37f07e7c1a2fe5f3415dc8cbbab5253", "score": "0.50823706", "text": "func (s *remoteCNIserver) close() {\n\ts.cleanupVswitchConnectivity()\n\ts.ctxCancelFunc()\n\tclose(s.dhcpNotif)\n}", "title": "" }, { "docid": "91f84acd582e6f44dd961c3b11dcb820", "score": "0.5081139", "text": "func (p *messagePipeline) close() {\n\tgo func() {\n\t\tp.shutdownCh <- struct{}{}\n\t}()\n}", "title": "" }, { "docid": "1635723e6b7a1daafe427cd3ca6cdf4f", "score": "0.5078793", "text": "func (t *http2Client) Close(err error) {\n\tt.mu.Lock()\n\t// Make sure we only close once.\n\tif t.state == closing {\n\t\tt.mu.Unlock()\n\t\treturn\n\t}\n\tif logger.V(logLevel) {\n\t\tlogger.Infof(\"transport: closing: %v\", err)\n\t}\n\t// Call t.onClose ASAP to prevent the client from attempting to create new\n\t// streams.\n\tif t.state != draining {\n\t\tt.onClose(GoAwayInvalid)\n\t}\n\tt.state = closing\n\tstreams := t.activeStreams\n\tt.activeStreams = nil\n\tif t.kpDormant {\n\t\t// If the keepalive goroutine is blocked on this condition variable, we\n\t\t// should unblock it so that the goroutine eventually exits.\n\t\tt.kpDormancyCond.Signal()\n\t}\n\tt.mu.Unlock()\n\tt.controlBuf.finish()\n\tt.cancel()\n\tt.conn.Close()\n\tchannelz.RemoveEntry(t.channelzID)\n\t// Append info about previous goaways if there were any, since this may be important\n\t// for understanding the root cause for this connection to be closed.\n\t_, goAwayDebugMessage := t.GetGoAwayReason()\n\n\tvar st *status.Status\n\tif len(goAwayDebugMessage) > 0 {\n\t\tst = status.Newf(codes.Unavailable, \"closing transport due to: %v, received prior goaway: %v\", err, goAwayDebugMessage)\n\t\terr = st.Err()\n\t} else {\n\t\tst = status.New(codes.Unavailable, err.Error())\n\t}\n\n\t// Notify all active streams.\n\tfor _, s := range streams {\n\t\tt.closeStream(s, err, false, http2.ErrCodeNo, st, nil, false)\n\t}\n\tfor _, sh := range t.statsHandlers {\n\t\tconnEnd := &stats.ConnEnd{\n\t\t\tClient: true,\n\t\t}\n\t\tsh.HandleConn(t.ctx, connEnd)\n\t}\n}", "title": "" }, { "docid": "8891d5f388c54ce75a7268b493a292e1", "score": "0.50783896", "text": "func (p *TCPProxy) Close() {\n\tif p.listner != nil {\n\t\tp.listner.Close()\n\t}\n}", "title": "" }, { "docid": "7d36720b727ef2eca6fedea65ec80908", "score": "0.5078283", "text": "func (conn *Conn) Close() error {\n\tconn.outLck.Lock()\n\tif conn.closed {\n\t\t// inWorker calls Close on read error, the read error may\n\t\t// be caused by another caller calling Close to shutdown the\n\t\t// dbus connection, a double-close scenario we prevent here.\n\t\tconn.outLck.Unlock()\n\t\treturn nil\n\t}\n\tclose(conn.out)\n\tconn.closed = true\n\tconn.outLck.Unlock()\n\n\tif term, ok := conn.signalHandler.(Terminator); ok {\n\t\tterm.Terminate()\n\t}\n\n\tif term, ok := conn.handler.(Terminator); ok {\n\t\tterm.Terminate()\n\t}\n\n\tconn.eavesdroppedLck.Lock()\n\tif conn.eavesdropped != nil {\n\t\tclose(conn.eavesdropped)\n\t}\n\tconn.eavesdroppedLck.Unlock()\n\n\treturn conn.transport.Close()\n}", "title": "" }, { "docid": "ba11fa02ad49340fa3e7d21204fb3ec6", "score": "0.50676495", "text": "func ShutdownPullSocket() {\n\tshutdownChannel <- true\n}", "title": "" }, { "docid": "58de6df1eb7ededd1a738b32f5c8749e", "score": "0.5066793", "text": "func (fd *pollFD) destroy() error {\r\n\t// Poller may want to unregister fd in readiness notification mechanism,\r\n\t// so this must be executed before CloseFunc.\r\n\tfd.pd.close()\r\n\terr := syscall.Close(fd.sysfd)\r\n\tfd.sysfd = -1\r\n\truntime_Semrelease(&fd.csema)\r\n\treturn err\r\n}", "title": "" }, { "docid": "197c694f37b15d9dfaf382cd6c8c7f58", "score": "0.5066466", "text": "func (s *Socket) Close() error {\n\tmanage.Logger <- sink.Wrap(\"Connections\", fmt.Sprintf(\"closing connection to %s at %s\\n\", s.URL, time.Now()))\n\ts.StayAlive = false\n\terr := s.Conn.WriteMessage(websocket.CloseMessage, []byte{})\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"Issue closing ws %s:\", s.URL)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "035c692b09e13f036e6443b36c0b4893", "score": "0.50663054", "text": "func (q *NFQueue) Close() {\n\tq.sendAll(\n\t\tq.nfqRequestConfigCmd(NFQNL_CFG_CMD_UNBIND, q.queue, 0),\n\t)\n\tq.nls.Close()\n}", "title": "" }, { "docid": "2fd928ea543147cc88e63e36aafd2542", "score": "0.50636953", "text": "func (m *mockListener) Close() error {\n\tclose(m.provideConn)\n\treturn nil\n}", "title": "" }, { "docid": "d8583dbc3c907d4e199969ba88d52d5e", "score": "0.50597", "text": "func (t *UdpClient) Close() error {\n\tclose(t.requestQueue)\n\terr := t.conn.Close()\n\treturn err\n}", "title": "" }, { "docid": "cf7db6e6fd2142898fa09370d1ded79a", "score": "0.50577754", "text": "func (fd *pollFD) destroy() error {\r\n\t// Poller may want to unregister fd in readiness notification mechanism,\r\n\t// so this must be executed before CloseFunc.\r\n\tfd.pd.close()\r\n\terr := syscall.Close(fd.sysfd)\r\n\tfd.sysfd = -1\r\n\treturn err\r\n}", "title": "" }, { "docid": "d8a90886551ad5119c72ecfefc5a6011", "score": "0.5051159", "text": "func (sock *TunnelSocket) Close() error {\n\treturn sock.conn.Close()\n}", "title": "" }, { "docid": "c48ad87a55ae9c75c3e4e6d05b9ca48e", "score": "0.5050167", "text": "func (p *process) close() {\n\tp.closeOnce.Do(func() {\n\t\tp.relay.close()\n\n\t\t// Free any waiters\n\t\tclose(p.waitBlock)\n\t})\n}", "title": "" }, { "docid": "3309aafb579fd150a9aa3a8f8f355e45", "score": "0.5042164", "text": "func ClientConnClose(cc *httputil.ClientConn,) error", "title": "" }, { "docid": "3510e68eaaa11a6306dfeea6053192e9", "score": "0.50375897", "text": "func Close(conn *grpc.ClientConn){\n conn.Close()\n}", "title": "" }, { "docid": "cd4191429538b894a22dd794882c23ca", "score": "0.5036608", "text": "func (d *DummyRelay) Close() {}", "title": "" }, { "docid": "c7032d55042ef6999aab51c93d6b5208", "score": "0.50155234", "text": "func (_m *Server) CloseAsync(_a0 func(error)) {\n\t_m.Called(_a0)\n}", "title": "" }, { "docid": "594c8ae1ee270a3983144255b1ca6fcf", "score": "0.50141275", "text": "func (*MockClient) Close() error { return nil }", "title": "" }, { "docid": "8032d252f4dbabcad35beaa45de19d90", "score": "0.50129247", "text": "func (session *Session) close() {\n\tsession.stopPing()\n\tsession.stopSend()\n\tsession.pingWaitGroup.Wait()\n\tsession.sendWaitGroup.Wait()\n\n\tif session.tcpconn != nil {\n\t\tsession.tcpconn.Close()\n\t}\n\n\tsession.stopRead()\n\tsession.readWaitGroup.Wait()\n\n\t// notify that the connection is gracefully closed\n\tif session.updatesState == nil {\n\t\tsession.notify(SessionDiscarded{\n\t\t\tsession.connID,\n\t\t\tsession.sessionID,\n\t\t\t&PredUpdatesState{}})\n\t} else {\n\t\tsession.notify(SessionDiscarded{\n\t\t\tsession.connID,\n\t\t\tsession.sessionID,\n\t\t\tsession.updatesState})\n\t}\n\tsession.listeners = nil\n}", "title": "" }, { "docid": "87efe3b92c94a78495acc6df5fa4bd83", "score": "0.5010585", "text": "func (s *runningServer) Close() {\n if s.conn != nil {\n s.conn.Close()\n s.conn = nil\n }\n}", "title": "" }, { "docid": "cf7654140dbc1bfb20da6bbbab3af6c4", "score": "0.5002694", "text": "func (c *FDClient) close(conn *net.UnixConn) error {\n\tvar err error\n\tif conn != nil {\n\t\terr = conn.Close()\n\t}\n\treturn err\n}", "title": "" }, { "docid": "95b4c22c210c118efd1c267e3e926708", "score": "0.4999481", "text": "func (s *Socket) Close() {\n\ts.conn.Close()\n}", "title": "" }, { "docid": "ae39bc7c85aa991246e82c47f3c4db95", "score": "0.49920282", "text": "func (e *Endpoints) closeListener(kind kind) error {\n\tlistener := e.listeners[kind]\n\tif listener == nil {\n\t\treturn nil\n\t}\n\tdelete(e.listeners, kind)\n\n\tlevel.Info(e.logger).Log(\"msg\", \" - closing socket\", \"address\", listener.Addr())\n\n\treturn listener.Close()\n}", "title": "" }, { "docid": "088d32b33b393af5287f30ec5d6a6c42", "score": "0.4986296", "text": "func (v *VirtioSocketConnection) Close() error {\n\treturn v.rawConn.Close()\n}", "title": "" }, { "docid": "e6df8d0fa5a528192e5ed4766e474b53", "score": "0.49856877", "text": "func (s *lwipStack) Close() error {\r\n\t// Stop firing timer events.\r\n\ts.cancel()\r\n\r\n\t// Abort and close all TCP and UDP connections.\r\n\ttcpConns.Range(func(_, c interface{}) bool {\r\n\t\tc.(*tcpConn).Abort()\r\n\t\treturn true\r\n\t})\r\n\tudpConns.Range(func(_, c interface{}) bool {\r\n\t\t// This only closes UDP connections in the core,\r\n\t\t// UDP connections in the handler will wait till\r\n\t\t// timeout, they are not closed immediately for\r\n\t\t// now.\r\n\t\tc.(*udpConn).Close()\r\n\t\treturn true\r\n\t})\r\n\r\n\t// Remove callbacks and close listening pcbs.\r\n\tlwipMutex.Lock()\r\n\tC.tcp_accept(s.tpcb, nil)\r\n\tC.udp_recv(s.upcb, nil, nil)\r\n\tC.tcp_close(s.tpcb) // FIXME handle error\r\n\tC.udp_remove(s.upcb)\r\n\tlwipMutex.Unlock()\r\n\r\n\treturn nil\r\n}", "title": "" }, { "docid": "9513fccb910bb6bb41a969ffe48d6ae1", "score": "0.49791288", "text": "func ServerConnClose(sc *httputil.ServerConn,) error", "title": "" }, { "docid": "3f91b4b08a3c4783543aa83555f01134", "score": "0.4974955", "text": "func (c *SimulatedBackendClient) Close() {}", "title": "" }, { "docid": "076531030a75c147251b0131f1ea5120", "score": "0.49733815", "text": "func (s *Socket) Close() error {\n\tclose(s.shutdown)\n\n\t// wait for shutdown of run process\n\tdone := make(chan struct{})\n\tgo func() {\n\t\ts.wg.Wait()\n\t\tclose(done)\n\t}()\n\n\tselect {\n\tcase <-done:\n\tcase <-time.NewTimer(150 * time.Millisecond).C:\n\t\treturn s.terminate()\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ecc0af9898016a24de8182c1182ded21", "score": "0.49725762", "text": "func (r *gqtpResponse) Close() error {\n\tif r.closed {\n\t\treturn nil\n\t}\n\tvar err error\n\tif _, e := io.CopyBuffer(ioutil.Discard, r, r.conn.buf); e != nil {\n\t\tr.conn.broken = true\n\t\terr = NewError(NetworkError, \"io.CopyBuffer failed.\", map[string]interface{}{\n\t\t\t\"error\": e.Error(),\n\t\t})\n\t}\n\tr.closed = true\n\tif !r.conn.broken {\n\t\tr.conn.ready = true\n\t}\n\tif r.conn.client != nil {\n\t\t// Broken connections are closed.\n\t\tif r.conn.broken {\n\t\t\tif e := r.conn.Close(); e != nil && err != nil {\n\t\t\t\terr = e\n\t\t\t}\n\t\t}\n\t\tselect {\n\t\tcase r.conn.client.idleConns <- r.conn:\n\t\tdefault:\n\t\t\tif e := r.conn.Close(); e != nil && err != nil {\n\t\t\t\terr = e\n\t\t\t}\n\t\t}\n\t}\n\treturn err\n}", "title": "" }, { "docid": "e9898698f09fbc02a3e5ddf0e074bc06", "score": "0.49691418", "text": "func (client *Client) destroy() {\n\t// allow destroy() to execute at most once\n\tclient.stateMutex.Lock()\n\tisDestroyed := client.isDestroyed\n\tclient.isDestroyed = true\n\tclient.stateMutex.Unlock()\n\tif isDestroyed {\n\t\treturn\n\t}\n\n\tclient.server.logger.Debug(\"quit\", fmt.Sprintf(\"%s is no longer on the server\", client.nick))\n\n\t// send quit/error message to client if they haven't been sent already\n\tclient.Quit(\"Connection closed\")\n\n\tclient.server.whoWas.Append(client)\n\tfriends := client.Friends()\n\tfriends.Remove(client)\n\n\t// remove from connection limits\n\tipaddr := client.IP()\n\t// this check shouldn't be required but eh\n\tif ipaddr != nil {\n\t\tclient.server.connectionLimiter.RemoveClient(ipaddr)\n\t}\n\n\t// alert monitors\n\tclient.server.monitorManager.AlertAbout(client, false)\n\t// clean up monitor state\n\tclient.server.monitorManager.RemoveAll(client)\n\n\t// clean up channels\n\tfor _, channel := range client.Channels() {\n\t\tchannel.Quit(client)\n\t\tfor _, member := range channel.Members() {\n\t\t\tfriends.Add(member)\n\t\t}\n\t}\n\n\t// clean up server\n\tclient.server.clients.Remove(client)\n\n\t// clean up self\n\tif client.idletimer != nil {\n\t\tclient.idletimer.Stop()\n\t}\n\n\tclient.socket.Close()\n\n\t// send quit messages to friends\n\tfor friend := range friends {\n\t\tif client.quitMessage == \"\" {\n\t\t\tclient.quitMessage = \"Exited\"\n\t\t}\n\t\tfriend.Send(nil, client.nickMaskString, \"QUIT\", client.quitMessage)\n\t}\n\tif !client.exitedSnomaskSent {\n\t\tclient.server.snomasks.Send(sno.LocalQuits, fmt.Sprintf(ircfmt.Unescape(\"%s$r exited the network\"), client.nick))\n\t}\n}", "title": "" }, { "docid": "165ca7416ad2cb1b20ee2d87e1a833be", "score": "0.49613214", "text": "func (MockClientPool) Close() error {\n\treturn nil\n}", "title": "" }, { "docid": "91c5b4c4ec5b373ff0a0029fc5a62182", "score": "0.49588004", "text": "func CloseTCPServer() {\n\tsocketOpenFlag = false\n\tfmt.Println(\"close tcp server\")\n\tif conn != nil {\n\t\tconn.Close()\n\t}\n\tif server != nil {\n\t\tserver.Close()\n\t}\n\n}", "title": "" }, { "docid": "076ddd8a694a9bbf9deffc13077555cc", "score": "0.49575523", "text": "func (s *Socket) Close() error {\n\treturn s.Conn.Close()\n}", "title": "" }, { "docid": "459549cb6f68b7e1dc83d323115385e4", "score": "0.49514017", "text": "func (this *udpSrv) Stop() {\n this.mutex.Lock()\n this.closing = true\n this.mutex.Unlock()\n\n this.socket.Close()\n\n udpPerfs.Add(PERF_UDP_SERVERS, -1)\n}", "title": "" }, { "docid": "2ea114ac8f4699d3f283dfdc8da02369", "score": "0.4943148", "text": "func TestServer_CloseNotify_After_StreamError(t *testing.T) {\n\ttestServerPostUnblock(t, blockUntilClosed, func(st *serverTester) {\n\t\t// data longer than declared Content-Length => stream error\n\t\tst.writeData(1, []byte(\"12345\"), true)\n\t}, nil, \"content-length\", \"3\")\n}", "title": "" }, { "docid": "d20caedad6b917577974487875326c28", "score": "0.49417645", "text": "func (q *Queue) Close() {\n close(q.C)\n close(q.events)\n close(q.closed)\n}", "title": "" }, { "docid": "c9a92e27ed3a9a6dfe51ef824969d960", "score": "0.49368846", "text": "func (s *Shaker) Close() error {\n\ts.Lock()\n\tdefer s.Unlock()\n\tif s.epollFd > 0 {\n\t\terr := syscall.Close(s.epollFd)\n\t\ts.epollFd = 0\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "44ea788d19c19ca74f354cf2286a6eea", "score": "0.4931352", "text": "func (m *Manager) Close() error {\n\t// Shutdown strategy:\n\t// 1. All Conn close by closing their underlying Conn.\n\t// 2. A Mux stops this chain. It won't close the underlying\n\t// Conn if one of the endpoints is closed down. To\n\t// continue the chain the Mux has to be closed.\n\n\t// Close SCTP. This should close the data channels, SCTP, and DTLS\n\tvar errSCTP, errMux error\n\tif m.sctpAssociation != nil {\n\t\terrSCTP = m.sctpAssociation.Close()\n\t}\n\n\t// Close the Mux. This should close the Mux and ICE.\n\tif m.mux != nil {\n\t\terrMux = m.mux.Close()\n\t}\n\n\t// TODO: better way to combine/handle errors?\n\tif errSCTP != nil ||\n\t\terrMux != nil {\n\t\treturn fmt.Errorf(\"Failed to close: %v, %v\", errSCTP, errMux)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "e5114294f3b9f5c4516a6ad0cffae56a", "score": "0.4931134", "text": "func (protocol *IOProtocol) Close(\n\tparams *io.CloseParams,\n) <-chan *io.CloseResult {\n\tresultChan := make(chan *io.CloseResult)\n\tcommand := NewCommand(protocol.Socket, \"IO.close\", params)\n\tresult := &io.CloseResult{}\n\n\tgo func() {\n\t\tresponse := <-protocol.Socket.SendCommand(command)\n\t\tif nil != response.Error && 0 != response.Error.Code {\n\t\t\tresult.Err = response.Error\n\t\t}\n\t\tresultChan <- result\n\t\tclose(resultChan)\n\t}()\n\n\treturn resultChan\n}", "title": "" } ]
efc2f556996fc6c24bb35d2112448568
PlatformParametersToProto converts an attest.PlatformParameters to its protobuf representation.
[ { "docid": "6bf26f6adc19bb38cecd74feb605a566", "score": "0.8721448", "text": "func PlatformParametersToProto(in *attest.PlatformParameters) *devicepb.TPMPlatformParameters {\n\tif in == nil {\n\t\treturn nil\n\t}\n\treturn &devicepb.TPMPlatformParameters{\n\t\tEventLog: in.EventLog,\n\t\tQuotes: quotesToProto(in.Quotes),\n\t\tPcrs: pcrsToProto(in.PCRs),\n\t}\n}", "title": "" } ]
[ { "docid": "10fa46c0ac6b87180a5722ddc9bbeaeb", "score": "0.75053495", "text": "func PlatformParametersFromProto(in *devicepb.TPMPlatformParameters) *attest.PlatformParameters {\n\tif in == nil {\n\t\treturn nil\n\t}\n\treturn &attest.PlatformParameters{\n\t\tTPMVersion: attest.TPMVersion20,\n\t\tQuotes: quotesFromProto(in.Quotes),\n\t\tPCRs: pcrsFromProto(in.Pcrs),\n\t\tEventLog: in.EventLog,\n\t}\n}", "title": "" }, { "docid": "b5afba4a2bdc9eff3032b074ce98a11e", "score": "0.6754212", "text": "func AttestationParametersToProto(in attest.AttestationParameters) *devicepb.TPMAttestationParameters {\n\treturn &devicepb.TPMAttestationParameters{\n\t\tPublic: in.Public,\n\t\tCreateData: in.CreateData,\n\t\tCreateAttestation: in.CreateAttestation,\n\t\tCreateSignature: in.CreateSignature,\n\t}\n}", "title": "" }, { "docid": "47cd76a9f1301747c5995207fcde596c", "score": "0.6340634", "text": "func PlatformAttestationToProto(in *attest.PlatformParameters, nonce []byte) *devicepb.TPMPlatformAttestation {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tplatParams := PlatformParametersToProto(in)\n\treturn &devicepb.TPMPlatformAttestation{\n\t\tPlatformParameters: platParams,\n\t\tNonce: nonce,\n\t}\n}", "title": "" }, { "docid": "88f262d49bb79a15da53bb971a986e82", "score": "0.6202978", "text": "func PlatformAttestationFromProto(in *devicepb.TPMPlatformAttestation) (platParams *attest.PlatformParameters, nonce []byte) {\n\tif in == nil {\n\t\treturn nil, nil\n\t}\n\treturn PlatformParametersFromProto(in.PlatformParameters), in.Nonce\n}", "title": "" }, { "docid": "a4797fb3327ee89b5231115fd9abd4d8", "score": "0.55214095", "text": "func (kp *KubernetesPlatform) PlatformParams() platform.PlatformConfig {\n\treturn kp.PlatformConfig\n}", "title": "" }, { "docid": "e9dc2df1c9d52b9ecad4de9a69a07591", "score": "0.54501647", "text": "func AttestationParametersFromProto(in *devicepb.TPMAttestationParameters) attest.AttestationParameters {\n\tif in == nil {\n\t\treturn attest.AttestationParameters{}\n\t}\n\treturn attest.AttestationParameters{\n\t\tPublic: in.Public,\n\t\tCreateData: in.CreateData,\n\t\tCreateAttestation: in.CreateAttestation,\n\t\tCreateSignature: in.CreateSignature,\n\t}\n}", "title": "" }, { "docid": "5c27b6f14f33c259a3622da708c58ec9", "score": "0.54413515", "text": "func MonitoringAlphaDashboardGridLayoutToProto(o *alpha.DashboardGridLayout) *alphapb.MonitoringAlphaDashboardGridLayout {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &alphapb.MonitoringAlphaDashboardGridLayout{}\n\tp.SetColumns(dcl.ValueOrEmptyInt64(o.Columns))\n\tsWidgets := make([]*alphapb.MonitoringAlphaDashboardGridLayoutWidgets, len(o.Widgets))\n\tfor i, r := range o.Widgets {\n\t\tsWidgets[i] = MonitoringAlphaDashboardGridLayoutWidgetsToProto(&r)\n\t}\n\tp.SetWidgets(sWidgets)\n\treturn p\n}", "title": "" }, { "docid": "396c4cc97318f13a1ac51aee51ec6f68", "score": "0.54392153", "text": "func (params *PrivacypolicyParams) ToRequestParameters() communicator.RequestParams {\n\treqParams := communicator.RequestParams{}\n\n\tif params.Locale != nil {\n\t\tparam, _ := communicator.NewRequestParam(\"locale\", *params.Locale)\n\t\treqParams = append(reqParams, *param)\n\t}\n\tif params.PaymentProductID != nil {\n\t\tparam, _ := communicator.NewRequestParam(\"paymentProductId\", strconv.FormatInt(int64(*params.PaymentProductID), 10))\n\t\treqParams = append(reqParams, *param)\n\t}\n\n\treturn reqParams\n}", "title": "" }, { "docid": "588b39fafe3625f6059c746052b41e5a", "score": "0.5193972", "text": "func (s *BackendService) SerializedParameters() (string, error) {\n\treturn serializeTemplateConfig(s.wkld.parser, s)\n}", "title": "" }, { "docid": "8971a10b9420758eb1e997ecdc2a7d78", "score": "0.5171184", "text": "func EnvironmentToProto(resource *beta.Environment) *betapb.ComposerBetaEnvironment {\n\tp := &betapb.ComposerBetaEnvironment{\n\t\tName: dcl.ValueOrEmptyString(resource.Name),\n\t\tConfig: ComposerBetaEnvironmentConfigToProto(resource.Config),\n\t\tUuid: dcl.ValueOrEmptyString(resource.Uuid),\n\t\tState: ComposerBetaEnvironmentStateEnumToProto(resource.State),\n\t\tCreateTime: dcl.ValueOrEmptyString(resource.CreateTime),\n\t\tUpdateTime: dcl.ValueOrEmptyString(resource.UpdateTime),\n\t\tProject: dcl.ValueOrEmptyString(resource.Project),\n\t\tLocation: dcl.ValueOrEmptyString(resource.Location),\n\t}\n\n\treturn p\n}", "title": "" }, { "docid": "389efc7b4868cf1886d1b2c3c85295a0", "score": "0.5164807", "text": "func BigqueryBetaTableEncryptionConfigurationToProto(o *beta.TableEncryptionConfiguration) *betapb.BigqueryBetaTableEncryptionConfiguration {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.BigqueryBetaTableEncryptionConfiguration{}\n\tp.SetKmsKeyName(dcl.ValueOrEmptyString(o.KmsKeyName))\n\treturn p\n}", "title": "" }, { "docid": "a23d29797fd7c34d87ceb549b7a94b20", "score": "0.51109266", "text": "func (p PolicyParameters) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"backupDatasourceParametersList\", p.BackupDatasourceParametersList)\n\tpopulate(objectMap, \"dataStoreParametersList\", p.DataStoreParametersList)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "528191b270cf3d95fa589960e610a45c", "score": "0.5101141", "text": "func MarshalParams(p Params) ([]byte, error) {\n\tswitch p := p.(type) {\n\tcase *bb1params:\n\t\tret := make([]byte, 0, headerSize+marshaledBB1ParamsSize)\n\t\t// g and gHat are the generators, do not need to be marshaled.\n\t\tfor _, field := range [][]byte{\n\t\t\twriteHeader(typeBB1Params),\n\t\t\tp.g1.Marshal(),\n\t\t\tp.h.Marshal(),\n\t\t\tp.g1Hat.Marshal(),\n\t\t\tp.hHat.Marshal(),\n\t\t\tp.v.Marshal(),\n\t\t} {\n\t\t\tret = append(ret, field...)\n\t\t}\n\t\treturn ret, nil\n\tcase *bb2params:\n\t\tret := make([]byte, 0, headerSize+marshaledBB2ParamsSize)\n\t\tfor _, field := range [][]byte{\n\t\t\twriteHeader(typeBB2Params),\n\t\t\tp.X.Marshal(),\n\t\t\tp.Y.Marshal(),\n\t\t\tp.v.Marshal(),\n\t\t} {\n\t\t\tret = append(ret, field...)\n\t\t}\n\t\treturn ret, nil\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"MarshalParams for %T for implemented yet\", p)\n\t}\n}", "title": "" }, { "docid": "78aa67dcbefa683c1352d0e4d358e57c", "score": "0.50958693", "text": "func (r Parameters) ToYAML() ([]byte, error) {\n\treturn yaml.Marshal(r)\n}", "title": "" }, { "docid": "4bacf9b1a1a4f8f24a012e317eb34852", "score": "0.5093853", "text": "func (*Qos_QueueSchedulerTemplate_Queue4CosMappings_Queue4CosMapping_Parameters_Parameter) Descriptor() ([]byte, []int) {\n\treturn file_huaweiV8R12_qos_proto_rawDescGZIP(), []int{0, 1, 5, 0, 0, 0}\n}", "title": "" }, { "docid": "b991cb05bc528f99ce7135ef6143215d", "score": "0.5091718", "text": "func VertexaiBetaMetadataStoreEncryptionSpecToProto(o *beta.MetadataStoreEncryptionSpec) *betapb.VertexaiBetaMetadataStoreEncryptionSpec {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.VertexaiBetaMetadataStoreEncryptionSpec{}\n\tp.SetKmsKeyName(dcl.ValueOrEmptyString(o.KmsKeyName))\n\treturn p\n}", "title": "" }, { "docid": "f702a2d36a527b1088f6000cef410769", "score": "0.5073071", "text": "func ComposerBetaEnvironmentConfigEncryptionConfigToProto(o *beta.EnvironmentConfigEncryptionConfig) *betapb.ComposerBetaEnvironmentConfigEncryptionConfig {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.ComposerBetaEnvironmentConfigEncryptionConfig{\n\t\tKmsKeyName: dcl.ValueOrEmptyString(o.KmsKeyName),\n\t}\n\treturn p\n}", "title": "" }, { "docid": "efb62a0c35aabf33b5b8f23b311edef6", "score": "0.50335383", "text": "func (p PolicyParameters) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tpopulate(objectMap, \"dataStoreParametersList\", p.DataStoreParametersList)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "9d28e0044b77d54fc17db3962c224ab8", "score": "0.501232", "text": "func OAuthIdpConfigToProto(resource *identitytoolkit.OAuthIdpConfig) *identitytoolkitpb.IdentitytoolkitOAuthIdpConfig {\n\tp := &identitytoolkitpb.IdentitytoolkitOAuthIdpConfig{}\n\tp.SetName(dcl.ValueOrEmptyString(resource.Name))\n\tp.SetClientId(dcl.ValueOrEmptyString(resource.ClientId))\n\tp.SetIssuer(dcl.ValueOrEmptyString(resource.Issuer))\n\tp.SetDisplayName(dcl.ValueOrEmptyString(resource.DisplayName))\n\tp.SetEnabled(dcl.ValueOrEmptyBool(resource.Enabled))\n\tp.SetClientSecret(dcl.ValueOrEmptyString(resource.ClientSecret))\n\tp.SetResponseType(IdentitytoolkitOAuthIdpConfigResponseTypeToProto(resource.ResponseType))\n\tp.SetProject(dcl.ValueOrEmptyString(resource.Project))\n\n\treturn p\n}", "title": "" }, { "docid": "f718cb65ce7c70a46850352a90ea0230", "score": "0.5012157", "text": "func Convert_unversioned_Parameters_To_v1beta1_Parameters(in *unversioned.Parameters, out *Parameters, s conversion.Scope) error {\n\treturn autoConvert_unversioned_Parameters_To_v1beta1_Parameters(in, out, s)\n}", "title": "" }, { "docid": "30900a5bcee589026d41ba07641e9ae7", "score": "0.50046927", "text": "func MonitoringAlphaDashboardGridLayoutWidgetsBlankToProto(o *alpha.DashboardGridLayoutWidgetsBlank) *alphapb.MonitoringAlphaDashboardGridLayoutWidgetsBlank {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &alphapb.MonitoringAlphaDashboardGridLayoutWidgetsBlank{}\n\treturn p\n}", "title": "" }, { "docid": "1a03998b3343faa27f4f7b62d1cc8bea", "score": "0.4965072", "text": "func Convert_v1beta1_Parameters_To_unversioned_Parameters(in *Parameters, out *unversioned.Parameters, s conversion.Scope) error {\n\treturn autoConvert_v1beta1_Parameters_To_unversioned_Parameters(in, out, s)\n}", "title": "" }, { "docid": "52207c7a55ef8d9289edc56b23dcddc3", "score": "0.4964037", "text": "func NetworkservicesBetaHttpRouteRulesMatchesQueryParametersToProto(o *beta.HttpRouteRulesMatchesQueryParameters) *betapb.NetworkservicesBetaHttpRouteRulesMatchesQueryParameters {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.NetworkservicesBetaHttpRouteRulesMatchesQueryParameters{}\n\tp.SetQueryParameter(dcl.ValueOrEmptyString(o.QueryParameter))\n\tp.SetExactMatch(dcl.ValueOrEmptyString(o.ExactMatch))\n\tp.SetRegexMatch(dcl.ValueOrEmptyString(o.RegexMatch))\n\tp.SetPresentMatch(dcl.ValueOrEmptyBool(o.PresentMatch))\n\treturn p\n}", "title": "" }, { "docid": "8ba4071353bab692daf9e09ef33537a6", "score": "0.49530208", "text": "func (tr *EventHub) GetParameters() (map[string]interface{}, error) {\n\tp, err := json.TFParser.Marshal(tr.Spec.ForProvider)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbase := map[string]interface{}{}\n\treturn base, json.TFParser.Unmarshal(p, &base)\n}", "title": "" }, { "docid": "a8c7fa6ffc6081db0a044e68d4fb1305", "score": "0.49356663", "text": "func (s *WorkerService) SerializedParameters() (string, error) {\n\treturn serializeTemplateConfig(s.wkld.parser, s)\n}", "title": "" }, { "docid": "794378c5ecc2e271e6565087b74cb918", "score": "0.49265963", "text": "func (p *Paper) ToProto() *protocol.Paper {\n\ttags := make([]int64, 0)\n\tjson.Unmarshal([]byte(p.Tags), &tags)\n\n\tpaper := &protocol.Paper{\n\t\tId: p.Id,\n\t\tDifficulty: int64(p.Difficulty),\n\t\tTags: tags,\n\t\tProblemNum: int64(p.ProblemNum),\n\t}\n\n\tfor _, problem := range p.ProblemsDetail {\n\t\tpaper.Problems = append(paper.Problems, problem.TurnMinProto())\n\t}\n\n\treturn paper\n}", "title": "" }, { "docid": "14bb76616e25d657c312164a2794e9b7", "score": "0.49261698", "text": "func ComposerBetaEnvironmentConfigDatabaseConfigToProto(o *beta.EnvironmentConfigDatabaseConfig) *betapb.ComposerBetaEnvironmentConfigDatabaseConfig {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.ComposerBetaEnvironmentConfigDatabaseConfig{\n\t\tMachineType: dcl.ValueOrEmptyString(o.MachineType),\n\t}\n\treturn p\n}", "title": "" }, { "docid": "a94aa2aa1f1279fd73bc4320447673aa", "score": "0.49040383", "text": "func GeneratePolicyParameters(in *iampmv1.Policy) (*v1alpha1.PolicyParameters, error) {\n\to := &v1alpha1.PolicyParameters{\n\t\tType: reference.FromPtrValue(in.Type),\n\t\tSubjects: GenerateCRSubjects(in.Subjects),\n\t\tRoles: GenerateCRRoles(in.Roles),\n\t\tResources: GenerateCRResources(in.Resources),\n\t\tDescription: in.Description,\n\t}\n\treturn o, nil\n}", "title": "" }, { "docid": "bcb5831fbca69a1e8c9d5b27c268b679", "score": "0.48861316", "text": "func PrivatecaBetaCertificateConfigPublicKeyToProto(o *beta.CertificateConfigPublicKey) *betapb.PrivatecaBetaCertificateConfigPublicKey {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.PrivatecaBetaCertificateConfigPublicKey{}\n\tp.SetKey(dcl.ValueOrEmptyString(o.Key))\n\tp.SetFormat(PrivatecaBetaCertificateConfigPublicKeyFormatEnumToProto(o.Format))\n\treturn p\n}", "title": "" }, { "docid": "42c53be719f020427151a8c5c1d2e80d", "score": "0.48722738", "text": "func ApigeeOrganizationAddonsConfigMonetizationConfigToProto(o *apigee.OrganizationAddonsConfigMonetizationConfig) *apigeepb.ApigeeOrganizationAddonsConfigMonetizationConfig {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &apigeepb.ApigeeOrganizationAddonsConfigMonetizationConfig{}\n\tp.SetEnabled(dcl.ValueOrEmptyBool(o.Enabled))\n\treturn p\n}", "title": "" }, { "docid": "a9becaa7028a9214175a240b90989a5a", "score": "0.48696852", "text": "func (s *Server) EncodedParameters() cryptotools.CiphersuiteEncoding {\n\treturn s.Crypto.Parameters.Encode()\n}", "title": "" }, { "docid": "4c454efaadb7ea665bba3a8cdfa0d424", "score": "0.48669007", "text": "func BigqueryBetaTableExternalDataConfigurationParquetOptionsToProto(o *beta.TableExternalDataConfigurationParquetOptions) *betapb.BigqueryBetaTableExternalDataConfigurationParquetOptions {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.BigqueryBetaTableExternalDataConfigurationParquetOptions{}\n\tp.SetEnumAsString(dcl.ValueOrEmptyBool(o.EnumAsString))\n\tp.SetEnableListInference(dcl.ValueOrEmptyBool(o.EnableListInference))\n\treturn p\n}", "title": "" }, { "docid": "bbd3e13410f44b52a78fe9487752b75d", "score": "0.4866746", "text": "func (*Qos_QueueSchedulerTemplate_FlowMappings_FlowMapping_Parameters_Parameter) Descriptor() ([]byte, []int) {\n\treturn file_huaweiV8R12_qos_proto_rawDescGZIP(), []int{0, 1, 2, 0, 0, 0}\n}", "title": "" }, { "docid": "152b4774d099f685f15aa3e2a34c303b", "score": "0.4856481", "text": "func WorkforcePoolProviderToProto(resource *iam.WorkforcePoolProvider) *iampb.IamWorkforcePoolProvider {\n\tp := &iampb.IamWorkforcePoolProvider{}\n\tp.SetName(dcl.ValueOrEmptyString(resource.Name))\n\tp.SetDisplayName(dcl.ValueOrEmptyString(resource.DisplayName))\n\tp.SetDescription(dcl.ValueOrEmptyString(resource.Description))\n\tp.SetState(IamWorkforcePoolProviderStateEnumToProto(resource.State))\n\tp.SetDisabled(dcl.ValueOrEmptyBool(resource.Disabled))\n\tp.SetAttributeCondition(dcl.ValueOrEmptyString(resource.AttributeCondition))\n\tp.SetSaml(IamWorkforcePoolProviderSamlToProto(resource.Saml))\n\tp.SetOidc(IamWorkforcePoolProviderOidcToProto(resource.Oidc))\n\tp.SetLocation(dcl.ValueOrEmptyString(resource.Location))\n\tp.SetWorkforcePool(dcl.ValueOrEmptyString(resource.WorkforcePool))\n\tmAttributeMapping := make(map[string]string, len(resource.AttributeMapping))\n\tfor k, r := range resource.AttributeMapping {\n\t\tmAttributeMapping[k] = r\n\t}\n\tp.SetAttributeMapping(mAttributeMapping)\n\n\treturn p\n}", "title": "" }, { "docid": "d749ecac886404560bc2f2ce8feb4e62", "score": "0.48294577", "text": "func ComposerBetaEnvironmentConfigWebServerConfigToProto(o *beta.EnvironmentConfigWebServerConfig) *betapb.ComposerBetaEnvironmentConfigWebServerConfig {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.ComposerBetaEnvironmentConfigWebServerConfig{\n\t\tMachineType: dcl.ValueOrEmptyString(o.MachineType),\n\t}\n\treturn p\n}", "title": "" }, { "docid": "0b40eef4a8963594d803c422c895f098", "score": "0.48138073", "text": "func MonitoringAlphaDashboardGridLayoutWidgetsToProto(o *alpha.DashboardGridLayoutWidgets) *alphapb.MonitoringAlphaDashboardGridLayoutWidgets {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &alphapb.MonitoringAlphaDashboardGridLayoutWidgets{}\n\tp.SetTitle(dcl.ValueOrEmptyString(o.Title))\n\tp.SetXyChart(MonitoringAlphaDashboardGridLayoutWidgetsXyChartToProto(o.XyChart))\n\tp.SetScorecard(MonitoringAlphaDashboardGridLayoutWidgetsScorecardToProto(o.Scorecard))\n\tp.SetText(MonitoringAlphaDashboardGridLayoutWidgetsTextToProto(o.Text))\n\tp.SetBlank(MonitoringAlphaDashboardGridLayoutWidgetsBlankToProto(o.Blank))\n\tp.SetLogsPanel(MonitoringAlphaDashboardGridLayoutWidgetsLogsPanelToProto(o.LogsPanel))\n\treturn p\n}", "title": "" }, { "docid": "62bcf1132052bed8d6dc6d029f8e39e5", "score": "0.48078725", "text": "func (m *TlsParameters) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tif _, ok := TlsParameters_TlsProtocol_name[int32(m.GetTlsMinimumProtocolVersion())]; !ok {\n\t\treturn TlsParametersValidationError{\n\t\t\tfield: \"TlsMinimumProtocolVersion\",\n\t\t\treason: \"value must be one of the defined enum values\",\n\t\t}\n\t}\n\n\tif _, ok := TlsParameters_TlsProtocol_name[int32(m.GetTlsMaximumProtocolVersion())]; !ok {\n\t\treturn TlsParametersValidationError{\n\t\t\tfield: \"TlsMaximumProtocolVersion\",\n\t\t\treason: \"value must be one of the defined enum values\",\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "e87765b4677d5bda2a637fad361bd7bf", "score": "0.4802855", "text": "func setPlatformSpecificParameters(mtaStr *mta.MTA, platform string) {\n\t//TODO move to configuration\n\tif platform == \"neo\" {\n\t\tif mtaStr.Parameters == nil {\n\t\t\tmtaStr.Parameters = make(map[string]interface{})\n\t\t}\n\t\tif mtaStr.Parameters[\"hcp-deployer-version\"] == nil {\n\t\t\tmtaStr.Parameters[\"hcp-deployer-version\"] = \"1.1.0\"\n\t\t}\n\n\t\tfor _, m := range mtaStr.Modules {\n\t\t\tif m.Parameters == nil {\n\t\t\t\tm.Parameters = make(map[string]interface{})\n\t\t\t}\n\t\t\tif m.Parameters[\"name\"] == nil {\n\t\t\t\tm.Parameters[\"name\"] = adjustNeoAppName(m.Name)\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "e17f49345c60a2ed168a64f73619d9b1", "score": "0.4797047", "text": "func ComposerBetaEnvironmentConfigMaintenanceWindowToProto(o *beta.EnvironmentConfigMaintenanceWindow) *betapb.ComposerBetaEnvironmentConfigMaintenanceWindow {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.ComposerBetaEnvironmentConfigMaintenanceWindow{\n\t\tStartTime: dcl.ValueOrEmptyString(o.StartTime),\n\t\tEndTime: dcl.ValueOrEmptyString(o.EndTime),\n\t\tRecurrence: dcl.ValueOrEmptyString(o.Recurrence),\n\t}\n\treturn p\n}", "title": "" }, { "docid": "24f557b2b637f46e9258c0f2d9986402", "score": "0.47958633", "text": "func (wtv *WorkflowTemplateVersion) LoadParametersFromBytes() ([]Parameter, error) {\n\tloadedParameters := make([]Parameter, 0)\n\n\terr := json.Unmarshal(wtv.ParametersBytes, &loadedParameters)\n\tif err != nil {\n\t\treturn wtv.Parameters, err\n\t}\n\n\t// It might be nil because the value \"null\" is stored in db if there are no parameters.\n\t// for consistency, we return an empty array.\n\tif loadedParameters == nil {\n\t\tloadedParameters = make([]Parameter, 0)\n\t}\n\n\twtv.Parameters = loadedParameters\n\n\treturn wtv.Parameters, err\n}", "title": "" }, { "docid": "7b24c880661c901c7737f98747a9fe8c", "score": "0.4776104", "text": "func (a AccountPropertiesUpdateParameters) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tpopulate(objectMap, \"accessTier\", a.AccessTier)\n\tpopulate(objectMap, \"allowBlobPublicAccess\", a.AllowBlobPublicAccess)\n\tpopulate(objectMap, \"allowCrossTenantReplication\", a.AllowCrossTenantReplication)\n\tpopulate(objectMap, \"allowSharedKeyAccess\", a.AllowSharedKeyAccess)\n\tpopulate(objectMap, \"allowedCopyScope\", a.AllowedCopyScope)\n\tpopulate(objectMap, \"azureFilesIdentityBasedAuthentication\", a.AzureFilesIdentityBasedAuthentication)\n\tpopulate(objectMap, \"customDomain\", a.CustomDomain)\n\tpopulate(objectMap, \"dnsEndpointType\", a.DNSEndpointType)\n\tpopulate(objectMap, \"defaultToOAuthAuthentication\", a.DefaultToOAuthAuthentication)\n\tpopulate(objectMap, \"supportsHttpsTrafficOnly\", a.EnableHTTPSTrafficOnly)\n\tpopulate(objectMap, \"encryption\", a.Encryption)\n\tpopulate(objectMap, \"immutableStorageWithVersioning\", a.ImmutableStorageWithVersioning)\n\tpopulate(objectMap, \"isLocalUserEnabled\", a.IsLocalUserEnabled)\n\tpopulate(objectMap, \"isSftpEnabled\", a.IsSftpEnabled)\n\tpopulate(objectMap, \"keyPolicy\", a.KeyPolicy)\n\tpopulate(objectMap, \"largeFileSharesState\", a.LargeFileSharesState)\n\tpopulate(objectMap, \"minimumTlsVersion\", a.MinimumTLSVersion)\n\tpopulate(objectMap, \"networkAcls\", a.NetworkRuleSet)\n\tpopulate(objectMap, \"publicNetworkAccess\", a.PublicNetworkAccess)\n\tpopulate(objectMap, \"routingPreference\", a.RoutingPreference)\n\tpopulate(objectMap, \"sasPolicy\", a.SasPolicy)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "f8d0f6b9d8dbc89923fb6cc1fd69cf71", "score": "0.47720394", "text": "func ApikeysKeyRestrictionsAndroidKeyRestrictionsAllowedApplicationsToProto(o *apikeys.KeyRestrictionsAndroidKeyRestrictionsAllowedApplications) *apikeyspb.ApikeysKeyRestrictionsAndroidKeyRestrictionsAllowedApplications {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &apikeyspb.ApikeysKeyRestrictionsAndroidKeyRestrictionsAllowedApplications{}\n\tp.SetSha1Fingerprint(dcl.ValueOrEmptyString(o.Sha1Fingerprint))\n\tp.SetPackageName(dcl.ValueOrEmptyString(o.PackageName))\n\treturn p\n}", "title": "" }, { "docid": "4c1d60c6824be9973994eac5f3937e86", "score": "0.47683606", "text": "func MonitoringAlphaDashboardColumnLayoutColumnsToProto(o *alpha.DashboardColumnLayoutColumns) *alphapb.MonitoringAlphaDashboardColumnLayoutColumns {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &alphapb.MonitoringAlphaDashboardColumnLayoutColumns{}\n\tp.SetWeight(dcl.ValueOrEmptyInt64(o.Weight))\n\tsWidgets := make([]*alphapb.MonitoringAlphaDashboardColumnLayoutColumnsWidgets, len(o.Widgets))\n\tfor i, r := range o.Widgets {\n\t\tsWidgets[i] = MonitoringAlphaDashboardColumnLayoutColumnsWidgetsToProto(&r)\n\t}\n\tp.SetWidgets(sWidgets)\n\treturn p\n}", "title": "" }, { "docid": "1fd8906887c666d9952b8f120c4ca646", "score": "0.4768316", "text": "func (r Parameters) MarshalJSON() ([]byte, error) {\n\treturn json.Marshal(struct {\n\t\tOtherParameters\n\t\tResourceType string `json:\"resourceType\"`\n\t}{\n\t\tOtherParameters: OtherParameters(r),\n\t\tResourceType: \"Parameters\",\n\t})\n}", "title": "" }, { "docid": "fbc0f618d105dc8bfe04632144497027", "score": "0.47673124", "text": "func ContainerawsBetaClusterMonitoringConfigToProto(o *beta.ClusterMonitoringConfig) *betapb.ContainerawsBetaClusterMonitoringConfig {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.ContainerawsBetaClusterMonitoringConfig{}\n\tp.SetManagedPrometheusConfig(ContainerawsBetaClusterMonitoringConfigManagedPrometheusConfigToProto(o.ManagedPrometheusConfig))\n\treturn p\n}", "title": "" }, { "docid": "033fec288d285f48b625dbe6051ff5f7", "score": "0.47598028", "text": "func CompareParameters(l, r any) *ParameterChanges {\n\n\tvar changes []*Change\n\tvar props []*PropertyCheck\n\n\tpc := new(ParameterChanges)\n\tvar lSchema *base.SchemaProxy\n\tvar rSchema *base.SchemaProxy\n\tvar lext, rext map[low.KeyReference[string]]low.ValueReference[any]\n\n\tif reflect.TypeOf(&v2.Parameter{}) == reflect.TypeOf(l) && reflect.TypeOf(&v2.Parameter{}) == reflect.TypeOf(r) {\n\t\tlParam := l.(*v2.Parameter)\n\t\trParam := r.(*v2.Parameter)\n\n\t\t// perform hash check to avoid further processing\n\t\tif low.AreEqual(lParam, rParam) {\n\t\t\treturn nil\n\t\t}\n\n\t\tprops = append(props, addSwaggerParameterProperties(lParam, rParam, &changes)...)\n\t\tprops = append(props, addCommonParameterProperties(lParam, rParam, &changes)...)\n\n\t\t// extract schema\n\t\tif lParam != nil {\n\t\t\tlSchema = lParam.Schema.Value\n\t\t\tlext = lParam.Extensions\n\t\t}\n\t\tif rParam != nil {\n\t\t\trext = rParam.Extensions\n\t\t\trSchema = rParam.Schema.Value\n\t\t}\n\n\t\t// items\n\t\tif !lParam.Items.IsEmpty() && !rParam.Items.IsEmpty() {\n\t\t\tif lParam.Items.Value.Hash() != rParam.Items.Value.Hash() {\n\t\t\t\tpc.ItemsChanges = CompareItems(lParam.Items.Value, rParam.Items.Value)\n\t\t\t}\n\t\t}\n\t\tif lParam.Items.IsEmpty() && !rParam.Items.IsEmpty() {\n\t\t\tCreateChange(&changes, ObjectAdded, v3.ItemsLabel,\n\t\t\t\tnil, rParam.Items.ValueNode, true, nil,\n\t\t\t\trParam.Items.Value)\n\t\t}\n\t\tif !lParam.Items.IsEmpty() && rParam.Items.IsEmpty() {\n\t\t\tCreateChange(&changes, ObjectRemoved, v3.ItemsLabel,\n\t\t\t\tlParam.Items.ValueNode, nil, true, lParam.Items.Value,\n\t\t\t\tnil)\n\t\t}\n\n\t\t// enum\n\t\tif len(lParam.Enum.Value) > 0 || len(rParam.Enum.Value) > 0 {\n\t\t\tExtractRawValueSliceChanges(lParam.Enum.Value, rParam.Enum.Value, &changes, v3.EnumLabel, true)\n\t\t}\n\t}\n\n\t// OpenAPI\n\tif reflect.TypeOf(&v3.Parameter{}) == reflect.TypeOf(l) && reflect.TypeOf(&v3.Parameter{}) == reflect.TypeOf(r) {\n\n\t\tlParam := l.(*v3.Parameter)\n\t\trParam := r.(*v3.Parameter)\n\n\t\t// perform hash check to avoid further processing\n\t\tif low.AreEqual(lParam, rParam) {\n\t\t\treturn nil\n\t\t}\n\n\t\tprops = append(props, addOpenAPIParameterProperties(lParam, rParam, &changes)...)\n\t\tprops = append(props, addCommonParameterProperties(lParam, rParam, &changes)...)\n\t\tif lParam != nil {\n\t\t\tlext = lParam.Extensions\n\t\t\tlSchema = lParam.Schema.Value\n\t\t}\n\t\tif rParam != nil {\n\t\t\trext = rParam.Extensions\n\t\t\trSchema = rParam.Schema.Value\n\t\t}\n\n\t\t// example\n\t\tcheckParameterExample(lParam.Example, rParam.Example, changes)\n\n\t\t// examples\n\t\tpc.ExamplesChanges = CheckMapForChanges(lParam.Examples.Value, rParam.Examples.Value,\n\t\t\t&changes, v3.ExamplesLabel, CompareExamples)\n\n\t\t// content\n\t\tpc.ContentChanges = CheckMapForChanges(lParam.Content.Value, rParam.Content.Value,\n\t\t\t&changes, v3.ContentLabel, CompareMediaTypes)\n\t}\n\tCheckProperties(props)\n\n\tif lSchema != nil && rSchema != nil {\n\t\tpc.SchemaChanges = CompareSchemas(lSchema, rSchema)\n\t}\n\tif lSchema != nil && rSchema == nil {\n\t\tCreateChange(&changes, ObjectRemoved, v3.SchemaLabel,\n\t\t\tlSchema.GetValueNode(), nil, true, lSchema,\n\t\t\tnil)\n\t}\n\n\tif lSchema == nil && rSchema != nil {\n\t\tCreateChange(&changes, ObjectAdded, v3.SchemaLabel,\n\t\t\tnil, rSchema.GetValueNode(), true, nil,\n\t\t\trSchema)\n\t}\n\n\tpc.PropertyChanges = NewPropertyChanges(changes)\n\tpc.ExtensionChanges = CompareExtensions(lext, rext)\n\treturn pc\n}", "title": "" }, { "docid": "2f78527a1b72cae86e7deeddb8e3e27a", "score": "0.47426763", "text": "func ComputeReservationSpecificReservationInstancePropertiesToProto(o *compute.ReservationSpecificReservationInstanceProperties) *computepb.ComputeReservationSpecificReservationInstanceProperties {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &computepb.ComputeReservationSpecificReservationInstanceProperties{\n\t\tMachineType: dcl.ValueOrEmptyString(o.MachineType),\n\t\tMinCpuPlatform: dcl.ValueOrEmptyString(o.MinCpuPlatform),\n\t}\n\tfor _, r := range o.GuestAccelerators {\n\t\tp.GuestAccelerators = append(p.GuestAccelerators, ComputeReservationSpecificReservationInstancePropertiesGuestAcceleratorsToProto(&r))\n\t}\n\tfor _, r := range o.LocalSsds {\n\t\tp.LocalSsds = append(p.LocalSsds, ComputeReservationSpecificReservationInstancePropertiesLocalSsdsToProto(&r))\n\t}\n\treturn p\n}", "title": "" }, { "docid": "bc549eb0489530056ae2e266a225c52d", "score": "0.47413185", "text": "func MonitoringAlphaDashboardGridLayoutWidgetsTextToProto(o *alpha.DashboardGridLayoutWidgetsText) *alphapb.MonitoringAlphaDashboardGridLayoutWidgetsText {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &alphapb.MonitoringAlphaDashboardGridLayoutWidgetsText{}\n\tp.SetContent(dcl.ValueOrEmptyString(o.Content))\n\tp.SetFormat(MonitoringAlphaDashboardGridLayoutWidgetsTextFormatEnumToProto(o.Format))\n\treturn p\n}", "title": "" }, { "docid": "793b1455485181848199e2201b8edf9a", "score": "0.4740851", "text": "func (t *Token) ConvertToProto() *TokenProto {\n\treturn &TokenProto{\n\t\tMid: t.Mid,\n\t\tAppID: t.AppID,\n\t\tToken: hex.EncodeToString(t.Token),\n\t\tExpires: t.Expires,\n\t\tType: t.Type,\n\t}\n}", "title": "" }, { "docid": "76ba9cdc6f728a4ba843419eaf775208", "score": "0.47351158", "text": "func BigqueryBetaTableExternalDataConfigurationToProto(o *beta.TableExternalDataConfiguration) *betapb.BigqueryBetaTableExternalDataConfiguration {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.BigqueryBetaTableExternalDataConfiguration{}\n\tp.SetSchema(BigqueryBetaTableExternalDataConfigurationSchemaToProto(o.Schema))\n\tp.SetSourceFormat(dcl.ValueOrEmptyString(o.SourceFormat))\n\tp.SetMaxBadRecords(dcl.ValueOrEmptyInt64(o.MaxBadRecords))\n\tp.SetAutodetect(dcl.ValueOrEmptyBool(o.Autodetect))\n\tp.SetIgnoreUnknownValues(dcl.ValueOrEmptyBool(o.IgnoreUnknownValues))\n\tp.SetCompression(dcl.ValueOrEmptyString(o.Compression))\n\tp.SetCsvOptions(BigqueryBetaTableExternalDataConfigurationCsvOptionsToProto(o.CsvOptions))\n\tp.SetBigtableOptions(BigqueryBetaTableExternalDataConfigurationBigtableOptionsToProto(o.BigtableOptions))\n\tp.SetGoogleSheetsOptions(BigqueryBetaTableExternalDataConfigurationGoogleSheetsOptionsToProto(o.GoogleSheetsOptions))\n\tp.SetHivePartitioningOptions(BigqueryBetaTableExternalDataConfigurationHivePartitioningOptionsToProto(o.HivePartitioningOptions))\n\tp.SetConnectionId(dcl.ValueOrEmptyString(o.ConnectionId))\n\tp.SetValueConversionModes(BigqueryBetaTableExternalDataConfigurationValueConversionModesToProto(o.ValueConversionModes))\n\tp.SetAvroOptions(BigqueryBetaTableExternalDataConfigurationAvroOptionsToProto(o.AvroOptions))\n\tp.SetJsonExtension(BigqueryBetaTableExternalDataConfigurationJsonExtensionEnumToProto(o.JsonExtension))\n\tp.SetParquetOptions(BigqueryBetaTableExternalDataConfigurationParquetOptionsToProto(o.ParquetOptions))\n\tsSourceUris := make([]string, len(o.SourceUris))\n\tfor i, r := range o.SourceUris {\n\t\tsSourceUris[i] = r\n\t}\n\tp.SetSourceUris(sSourceUris)\n\tsMaxBadRecordsAlternative := make([]int64, len(o.MaxBadRecordsAlternative))\n\tfor i, r := range o.MaxBadRecordsAlternative {\n\t\tsMaxBadRecordsAlternative[i] = r\n\t}\n\tp.SetMaxBadRecordsAlternative(sMaxBadRecordsAlternative)\n\tsDecimalTargetTypes := make([]betapb.BigqueryBetaTableExternalDataConfigurationDecimalTargetTypesEnum, len(o.DecimalTargetTypes))\n\tfor i, r := range o.DecimalTargetTypes {\n\t\tsDecimalTargetTypes[i] = betapb.BigqueryBetaTableExternalDataConfigurationDecimalTargetTypesEnum(betapb.BigqueryBetaTableExternalDataConfigurationDecimalTargetTypesEnum_value[string(r)])\n\t}\n\tp.SetDecimalTargetTypes(sDecimalTargetTypes)\n\treturn p\n}", "title": "" }, { "docid": "3811eb90e1bd76ee8440bc361a52114a", "score": "0.47346058", "text": "func BigqueryBetaTableExternalDataConfigurationSchemaToProto(o *beta.TableExternalDataConfigurationSchema) *betapb.BigqueryBetaTableExternalDataConfigurationSchema {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.BigqueryBetaTableExternalDataConfigurationSchema{}\n\tsFields := make([]*betapb.BigqueryBetaTableGooglecloudbigqueryv2Tablefieldschema, len(o.Fields))\n\tfor i, r := range o.Fields {\n\t\tsFields[i] = BigqueryBetaTableGooglecloudbigqueryv2TablefieldschemaToProto(&r)\n\t}\n\tp.SetFields(sFields)\n\treturn p\n}", "title": "" }, { "docid": "4f0a4937a7d9da354c8b85869e4a1db5", "score": "0.4722649", "text": "func (p *partition) ToProto() (proto.Message, error) {\n\treturn &ProtoPartition{\n\t\tSegmentKeys: p.SegmentKeys,\n\t}, nil\n}", "title": "" }, { "docid": "9c32f95249a3fe334e9d707e5b960b14", "score": "0.4712685", "text": "func (tr *EventHubNamespace) GetParameters() (map[string]interface{}, error) {\n\tp, err := json.TFParser.Marshal(tr.Spec.ForProvider)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbase := map[string]interface{}{}\n\treturn base, json.TFParser.Unmarshal(p, &base)\n}", "title": "" }, { "docid": "c057ce6fa2850352d1876e13278780cd", "score": "0.47083274", "text": "func (in *GCPPlatformSpec) DeepCopy() *GCPPlatformSpec {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(GCPPlatformSpec)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "title": "" }, { "docid": "5d74942c0d30475ef0cb4e348812b8ab", "score": "0.47060177", "text": "func VmwareAlphaPrivateCloudNetworkConfigToProto(o *alpha.PrivateCloudNetworkConfig) *alphapb.VmwareAlphaPrivateCloudNetworkConfig {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &alphapb.VmwareAlphaPrivateCloudNetworkConfig{}\n\tp.SetManagementCidr(dcl.ValueOrEmptyString(o.ManagementCidr))\n\tp.SetVmwareEngineNetwork(dcl.ValueOrEmptyString(o.VmwareEngineNetwork))\n\tp.SetVmwareEngineNetworkCanonical(dcl.ValueOrEmptyString(o.VmwareEngineNetworkCanonical))\n\tp.SetManagementIpAddressLayoutVersion(dcl.ValueOrEmptyInt64(o.ManagementIPAddressLayoutVersion))\n\treturn p\n}", "title": "" }, { "docid": "479795dc574e6fdd4343eb5bbe0a65fb", "score": "0.47011447", "text": "func ComposerBetaEnvironmentConfigSoftwareConfigToProto(o *beta.EnvironmentConfigSoftwareConfig) *betapb.ComposerBetaEnvironmentConfigSoftwareConfig {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.ComposerBetaEnvironmentConfigSoftwareConfig{\n\t\tImageVersion: dcl.ValueOrEmptyString(o.ImageVersion),\n\t\tPythonVersion: dcl.ValueOrEmptyString(o.PythonVersion),\n\t}\n\tp.AirflowConfigOverrides = make(map[string]string)\n\tfor k, r := range o.AirflowConfigOverrides {\n\t\tp.AirflowConfigOverrides[k] = r\n\t}\n\tp.PypiPackages = make(map[string]string)\n\tfor k, r := range o.PypiPackages {\n\t\tp.PypiPackages[k] = r\n\t}\n\tp.EnvVariables = make(map[string]string)\n\tfor k, r := range o.EnvVariables {\n\t\tp.EnvVariables[k] = r\n\t}\n\treturn p\n}", "title": "" }, { "docid": "f879bdb29d2e637b7ba6f511ab652c7a", "score": "0.46925938", "text": "func MonitoringAlphaDashboardGridLayoutWidgetsScorecardThresholdsToProto(o *alpha.DashboardGridLayoutWidgetsScorecardThresholds) *alphapb.MonitoringAlphaDashboardGridLayoutWidgetsScorecardThresholds {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &alphapb.MonitoringAlphaDashboardGridLayoutWidgetsScorecardThresholds{}\n\tp.SetLabel(dcl.ValueOrEmptyString(o.Label))\n\tp.SetValue(dcl.ValueOrEmptyDouble(o.Value))\n\tp.SetColor(MonitoringAlphaDashboardGridLayoutWidgetsScorecardThresholdsColorEnumToProto(o.Color))\n\tp.SetDirection(MonitoringAlphaDashboardGridLayoutWidgetsScorecardThresholdsDirectionEnumToProto(o.Direction))\n\treturn p\n}", "title": "" }, { "docid": "972880648336d8e1853a22afc26ea127", "score": "0.46912256", "text": "func ComposerBetaEnvironmentConfigToProto(o *beta.EnvironmentConfig) *betapb.ComposerBetaEnvironmentConfig {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.ComposerBetaEnvironmentConfig{\n\t\tGkeCluster: dcl.ValueOrEmptyString(o.GkeCluster),\n\t\tDagGcsPrefix: dcl.ValueOrEmptyString(o.DagGcsPrefix),\n\t\tNodeCount: dcl.ValueOrEmptyInt64(o.NodeCount),\n\t\tSoftwareConfig: ComposerBetaEnvironmentConfigSoftwareConfigToProto(o.SoftwareConfig),\n\t\tNodeConfig: ComposerBetaEnvironmentConfigNodeConfigToProto(o.NodeConfig),\n\t\tPrivateEnvironmentConfig: ComposerBetaEnvironmentConfigPrivateEnvironmentConfigToProto(o.PrivateEnvironmentConfig),\n\t\tWebServerNetworkAccessControl: ComposerBetaEnvironmentConfigWebServerNetworkAccessControlToProto(o.WebServerNetworkAccessControl),\n\t\tDatabaseConfig: ComposerBetaEnvironmentConfigDatabaseConfigToProto(o.DatabaseConfig),\n\t\tWebServerConfig: ComposerBetaEnvironmentConfigWebServerConfigToProto(o.WebServerConfig),\n\t\tEncryptionConfig: ComposerBetaEnvironmentConfigEncryptionConfigToProto(o.EncryptionConfig),\n\t\tAirflowUri: dcl.ValueOrEmptyString(o.AirflowUri),\n\t\tMaintenanceWindow: ComposerBetaEnvironmentConfigMaintenanceWindowToProto(o.MaintenanceWindow),\n\t}\n\treturn p\n}", "title": "" }, { "docid": "0cf729fd768a062281bbd2d6fa27565f", "score": "0.4688173", "text": "func DashboardToProto(resource *alpha.Dashboard) *alphapb.MonitoringAlphaDashboard {\n\tp := &alphapb.MonitoringAlphaDashboard{}\n\tp.SetName(dcl.ValueOrEmptyString(resource.Name))\n\tp.SetDisplayName(dcl.ValueOrEmptyString(resource.DisplayName))\n\tp.SetGridLayout(MonitoringAlphaDashboardGridLayoutToProto(resource.GridLayout))\n\tp.SetMosaicLayout(MonitoringAlphaDashboardMosaicLayoutToProto(resource.MosaicLayout))\n\tp.SetRowLayout(MonitoringAlphaDashboardRowLayoutToProto(resource.RowLayout))\n\tp.SetColumnLayout(MonitoringAlphaDashboardColumnLayoutToProto(resource.ColumnLayout))\n\tp.SetProject(dcl.ValueOrEmptyString(resource.Project))\n\tp.SetEtag(dcl.ValueOrEmptyString(resource.Etag))\n\n\treturn p\n}", "title": "" }, { "docid": "af7a5b29554c03bfd2c0542d4382888d", "score": "0.46864426", "text": "func (params *GetParams) ToRequestParameters() communicator.RequestParams {\n\treqParams := communicator.RequestParams{}\n\n\tif params.CountryCode != nil {\n\t\tparam, _ := communicator.NewRequestParam(\"countryCode\", *params.CountryCode)\n\t\treqParams = append(reqParams, *param)\n\t}\n\tif params.CurrencyCode != nil {\n\t\tparam, _ := communicator.NewRequestParam(\"currencyCode\", *params.CurrencyCode)\n\t\treqParams = append(reqParams, *param)\n\t}\n\tif params.Locale != nil {\n\t\tparam, _ := communicator.NewRequestParam(\"locale\", *params.Locale)\n\t\treqParams = append(reqParams, *param)\n\t}\n\tif params.Amount != nil {\n\t\tparam, _ := communicator.NewRequestParam(\"amount\", strconv.FormatInt(*params.Amount, 10))\n\t\treqParams = append(reqParams, *param)\n\t}\n\tif params.IsRecurring != nil {\n\t\tparam, _ := communicator.NewRequestParam(\"isRecurring\", strconv.FormatBool(*params.IsRecurring))\n\t\treqParams = append(reqParams, *param)\n\t}\n\tfor _, hideElement := range params.Hide {\n\t\tparam, _ := communicator.NewRequestParam(\"hide\", hideElement)\n\t\treqParams = append(reqParams, *param)\n\t}\n\tif params.ForceBasicFlow != nil {\n\t\tparam, _ := communicator.NewRequestParam(\"forceBasicFlow\", strconv.FormatBool(*params.ForceBasicFlow))\n\t\treqParams = append(reqParams, *param)\n\t}\n\n\treturn reqParams\n}", "title": "" }, { "docid": "7fc039ec3ec34cbb99257a6e31007b5c", "score": "0.46838138", "text": "func ApigeeOrganizationAddonsConfigToProto(o *apigee.OrganizationAddonsConfig) *apigeepb.ApigeeOrganizationAddonsConfig {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &apigeepb.ApigeeOrganizationAddonsConfig{}\n\tp.SetAdvancedApiOpsConfig(ApigeeOrganizationAddonsConfigAdvancedApiOpsConfigToProto(o.AdvancedApiOpsConfig))\n\tp.SetMonetizationConfig(ApigeeOrganizationAddonsConfigMonetizationConfigToProto(o.MonetizationConfig))\n\treturn p\n}", "title": "" }, { "docid": "279b472680e0a786f5e5d97c9157f391", "score": "0.46771201", "text": "func (tr *ConsumerGroup) GetParameters() (map[string]interface{}, error) {\n\tp, err := json.TFParser.Marshal(tr.Spec.ForProvider)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbase := map[string]interface{}{}\n\treturn base, json.TFParser.Unmarshal(p, &base)\n}", "title": "" }, { "docid": "f91ce201320eafcc7eedd73f5e7ef6c5", "score": "0.46690995", "text": "func MonitoringAlphaDashboardGridLayoutWidgetsXyChartChartOptionsToProto(o *alpha.DashboardGridLayoutWidgetsXyChartChartOptions) *alphapb.MonitoringAlphaDashboardGridLayoutWidgetsXyChartChartOptions {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &alphapb.MonitoringAlphaDashboardGridLayoutWidgetsXyChartChartOptions{}\n\tp.SetMode(MonitoringAlphaDashboardGridLayoutWidgetsXyChartChartOptionsModeEnumToProto(o.Mode))\n\treturn p\n}", "title": "" }, { "docid": "b6e08754e75ccc4cbad54ee956ac1beb", "score": "0.46639043", "text": "func ContainerazureAlphaAzureClusterControlPlaneSshConfigToProto(o *alpha.AzureClusterControlPlaneSshConfig) *alphapb.ContainerazureAlphaAzureClusterControlPlaneSshConfig {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &alphapb.ContainerazureAlphaAzureClusterControlPlaneSshConfig{\n\t\tAuthorizedKey: dcl.ValueOrEmptyString(o.AuthorizedKey),\n\t}\n\treturn p\n}", "title": "" }, { "docid": "dcb24873e1563030d0d4ba4775eb530a", "score": "0.4663433", "text": "func tmToProto(tmPk tmMultisig) (*LegacyAminoPubKey, error) {\n\tvar err error\n\tpks := make([]*types.Any, len(tmPk.PubKeys))\n\tfor i, pk := range tmPk.PubKeys {\n\t\tpks[i], err = types.NewAnyWithValue(pk)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn &LegacyAminoPubKey{\n\t\tThreshold: uint32(tmPk.K),\n\t\tPubKeys: pks,\n\t}, nil\n}", "title": "" }, { "docid": "5982bc6eb77cb50c8ad9af7839a53d8b", "score": "0.4662769", "text": "func (a AccountPropertiesCreateParameters) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tpopulate(objectMap, \"accessTier\", a.AccessTier)\n\tpopulate(objectMap, \"allowBlobPublicAccess\", a.AllowBlobPublicAccess)\n\tpopulate(objectMap, \"allowCrossTenantReplication\", a.AllowCrossTenantReplication)\n\tpopulate(objectMap, \"allowSharedKeyAccess\", a.AllowSharedKeyAccess)\n\tpopulate(objectMap, \"allowedCopyScope\", a.AllowedCopyScope)\n\tpopulate(objectMap, \"azureFilesIdentityBasedAuthentication\", a.AzureFilesIdentityBasedAuthentication)\n\tpopulate(objectMap, \"customDomain\", a.CustomDomain)\n\tpopulate(objectMap, \"dnsEndpointType\", a.DNSEndpointType)\n\tpopulate(objectMap, \"defaultToOAuthAuthentication\", a.DefaultToOAuthAuthentication)\n\tpopulate(objectMap, \"supportsHttpsTrafficOnly\", a.EnableHTTPSTrafficOnly)\n\tpopulate(objectMap, \"isNfsV3Enabled\", a.EnableNfsV3)\n\tpopulate(objectMap, \"encryption\", a.Encryption)\n\tpopulate(objectMap, \"immutableStorageWithVersioning\", a.ImmutableStorageWithVersioning)\n\tpopulate(objectMap, \"isHnsEnabled\", a.IsHnsEnabled)\n\tpopulate(objectMap, \"isLocalUserEnabled\", a.IsLocalUserEnabled)\n\tpopulate(objectMap, \"isSftpEnabled\", a.IsSftpEnabled)\n\tpopulate(objectMap, \"keyPolicy\", a.KeyPolicy)\n\tpopulate(objectMap, \"largeFileSharesState\", a.LargeFileSharesState)\n\tpopulate(objectMap, \"minimumTlsVersion\", a.MinimumTLSVersion)\n\tpopulate(objectMap, \"networkAcls\", a.NetworkRuleSet)\n\tpopulate(objectMap, \"publicNetworkAccess\", a.PublicNetworkAccess)\n\tpopulate(objectMap, \"routingPreference\", a.RoutingPreference)\n\tpopulate(objectMap, \"sasPolicy\", a.SasPolicy)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "d390474e8573963d6f8c623a9de3ad0d", "score": "0.46610266", "text": "func (in *PlatformSpec) DeepCopy() *PlatformSpec {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(PlatformSpec)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "title": "" }, { "docid": "d390474e8573963d6f8c623a9de3ad0d", "score": "0.46610266", "text": "func (in *PlatformSpec) DeepCopy() *PlatformSpec {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(PlatformSpec)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "title": "" }, { "docid": "c24389d5687008c764b369ad91a3e12c", "score": "0.46554273", "text": "func EncryptedCredentialToProto(in *attest.EncryptedCredential) *devicepb.TPMEncryptedCredential {\n\tif in == nil {\n\t\treturn nil\n\t}\n\treturn &devicepb.TPMEncryptedCredential{\n\t\tCredentialBlob: in.Credential,\n\t\tSecret: in.Secret,\n\t}\n}", "title": "" }, { "docid": "f42f5ffee00c945dfb1251bf32e6c6b5", "score": "0.4651381", "text": "func fromYAMLToProto(yml string, pb proto.Message) error {\n\tjs, err := yaml.YAMLToJSON([]byte(yml))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = protojson.Unmarshal(js, pb)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d1b06cc98d038195fdf3624d8cf978c9", "score": "0.4648744", "text": "func IamWorkforcePoolProviderOidcToProto(o *iam.WorkforcePoolProviderOidc) *iampb.IamWorkforcePoolProviderOidc {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &iampb.IamWorkforcePoolProviderOidc{}\n\tp.SetIssuerUri(dcl.ValueOrEmptyString(o.IssuerUri))\n\tp.SetClientId(dcl.ValueOrEmptyString(o.ClientId))\n\tp.SetJwksJson(dcl.ValueOrEmptyString(o.JwksJson))\n\tp.SetWebSsoConfig(IamWorkforcePoolProviderOidcWebSsoConfigToProto(o.WebSsoConfig))\n\tp.SetClientSecret(IamWorkforcePoolProviderOidcClientSecretToProto(o.ClientSecret))\n\treturn p\n}", "title": "" }, { "docid": "ddd59522d21169ab1c18cee46d100575", "score": "0.46424145", "text": "func BigqueryBetaTableExternalDataConfigurationAvroOptionsToProto(o *beta.TableExternalDataConfigurationAvroOptions) *betapb.BigqueryBetaTableExternalDataConfigurationAvroOptions {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.BigqueryBetaTableExternalDataConfigurationAvroOptions{}\n\tp.SetUseAvroLogicalTypes(dcl.ValueOrEmptyBool(o.UseAvroLogicalTypes))\n\treturn p\n}", "title": "" }, { "docid": "34c8bc0e6b6d838ab01e18a20bfca924", "score": "0.46256796", "text": "func (p *Params) Bytes() []byte {\n\tb, err := encodeCanonical(p)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn b\n}", "title": "" }, { "docid": "5434f596a17f9d6e2927db63c1d7f3dd", "score": "0.4625649", "text": "func PrivatecaBetaCertificateConfigX509ConfigAdditionalExtensionsToProto(o *beta.CertificateConfigX509ConfigAdditionalExtensions) *betapb.PrivatecaBetaCertificateConfigX509ConfigAdditionalExtensions {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.PrivatecaBetaCertificateConfigX509ConfigAdditionalExtensions{}\n\tp.SetObjectId(PrivatecaBetaCertificateConfigX509ConfigAdditionalExtensionsObjectIdToProto(o.ObjectId))\n\tp.SetCritical(dcl.ValueOrEmptyBool(o.Critical))\n\tp.SetValue(dcl.ValueOrEmptyString(o.Value))\n\treturn p\n}", "title": "" }, { "docid": "bd00448a1b738642a4c6bac74c46dc50", "score": "0.4624442", "text": "func ContainerawsBetaClusterLoggingConfigToProto(o *beta.ClusterLoggingConfig) *betapb.ContainerawsBetaClusterLoggingConfig {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.ContainerawsBetaClusterLoggingConfig{}\n\tp.SetComponentConfig(ContainerawsBetaClusterLoggingConfigComponentConfigToProto(o.ComponentConfig))\n\treturn p\n}", "title": "" }, { "docid": "8496a80aa57b930b78f3749dda253524", "score": "0.46233025", "text": "func BigqueryBetaTableExternalDataConfigurationBigtableOptionsToProto(o *beta.TableExternalDataConfigurationBigtableOptions) *betapb.BigqueryBetaTableExternalDataConfigurationBigtableOptions {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.BigqueryBetaTableExternalDataConfigurationBigtableOptions{}\n\tp.SetIgnoreUnspecifiedColumnFamilies(dcl.ValueOrEmptyBool(o.IgnoreUnspecifiedColumnFamilies))\n\tp.SetReadRowkeyAsString(dcl.ValueOrEmptyBool(o.ReadRowkeyAsString))\n\tsColumnFamilies := make([]*betapb.BigqueryBetaTableExternalDataConfigurationBigtableOptionsColumnFamilies, len(o.ColumnFamilies))\n\tfor i, r := range o.ColumnFamilies {\n\t\tsColumnFamilies[i] = BigqueryBetaTableExternalDataConfigurationBigtableOptionsColumnFamiliesToProto(&r)\n\t}\n\tp.SetColumnFamilies(sColumnFamilies)\n\treturn p\n}", "title": "" }, { "docid": "bc1dc5a682c1027efe8bf622eef7a8f1", "score": "0.46224394", "text": "func ContainerawsBetaClusterControlPlaneSshConfigToProto(o *beta.ClusterControlPlaneSshConfig) *betapb.ContainerawsBetaClusterControlPlaneSshConfig {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.ContainerawsBetaClusterControlPlaneSshConfig{}\n\tp.SetEc2KeyPair(dcl.ValueOrEmptyString(o.Ec2KeyPair))\n\treturn p\n}", "title": "" }, { "docid": "b3d2d38a893ae1c5359ed8c5d1a2760d", "score": "0.4619741", "text": "func convertToProto(p *repository.Payment) (*desc.Payment, error) {\n\ta, err := balance.ConvertFromCents(p.Amount)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\td, err := direction.ConvertCurrencyToProto(p.Direction)\n\n\treturn &desc.Payment{\n\t\tID: p.ID,\n\t\tAmount: a,\n\t\tAccountFrom: p.AccountFrom,\n\t\tAccountTo: p.AccountTo,\n\t\tDirection: d,\n\t}, nil\n}", "title": "" }, { "docid": "4cfe081b26a3ddeb50af59264ebbd3b5", "score": "0.46151444", "text": "func OsconfigBetaOSPolicyAssignmentOSPoliciesResourceGroupsInventoryFiltersToProto(o *beta.OSPolicyAssignmentOSPoliciesResourceGroupsInventoryFilters) *betapb.OsconfigBetaOSPolicyAssignmentOSPoliciesResourceGroupsInventoryFilters {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.OsconfigBetaOSPolicyAssignmentOSPoliciesResourceGroupsInventoryFilters{}\n\tp.SetOsShortName(dcl.ValueOrEmptyString(o.OSShortName))\n\tp.SetOsVersion(dcl.ValueOrEmptyString(o.OSVersion))\n\treturn p\n}", "title": "" }, { "docid": "d1951a26d48cc91ccfd7ba3485a90d0d", "score": "0.46142536", "text": "func MonitoringAlphaDashboardColumnLayoutToProto(o *alpha.DashboardColumnLayout) *alphapb.MonitoringAlphaDashboardColumnLayout {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &alphapb.MonitoringAlphaDashboardColumnLayout{}\n\tsColumns := make([]*alphapb.MonitoringAlphaDashboardColumnLayoutColumns, len(o.Columns))\n\tfor i, r := range o.Columns {\n\t\tsColumns[i] = MonitoringAlphaDashboardColumnLayoutColumnsToProto(&r)\n\t}\n\tp.SetColumns(sColumns)\n\treturn p\n}", "title": "" }, { "docid": "5abcdea2997772f1537722a3421a4b94", "score": "0.4614144", "text": "func OrgpolicyPolicySpecRulesValuesToProto(o *orgpolicy.PolicySpecRulesValues) *orgpolicypb.OrgpolicyPolicySpecRulesValues {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &orgpolicypb.OrgpolicyPolicySpecRulesValues{}\n\tsAllowedValues := make([]string, len(o.AllowedValues))\n\tfor i, r := range o.AllowedValues {\n\t\tsAllowedValues[i] = r\n\t}\n\tp.SetAllowedValues(sAllowedValues)\n\tsDeniedValues := make([]string, len(o.DeniedValues))\n\tfor i, r := range o.DeniedValues {\n\t\tsDeniedValues[i] = r\n\t}\n\tp.SetDeniedValues(sDeniedValues)\n\treturn p\n}", "title": "" }, { "docid": "466e2a1cf147a749b92fee2488e7779f", "score": "0.46138853", "text": "func MonitoringAlphaDashboardGridLayoutWidgetsScorecardToProto(o *alpha.DashboardGridLayoutWidgetsScorecard) *alphapb.MonitoringAlphaDashboardGridLayoutWidgetsScorecard {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &alphapb.MonitoringAlphaDashboardGridLayoutWidgetsScorecard{}\n\tp.SetTimeSeriesQuery(MonitoringAlphaDashboardGridLayoutWidgetsScorecardTimeSeriesQueryToProto(o.TimeSeriesQuery))\n\tp.SetGaugeView(MonitoringAlphaDashboardGridLayoutWidgetsScorecardGaugeViewToProto(o.GaugeView))\n\tp.SetSparkChartView(MonitoringAlphaDashboardGridLayoutWidgetsScorecardSparkChartViewToProto(o.SparkChartView))\n\tsThresholds := make([]*alphapb.MonitoringAlphaDashboardGridLayoutWidgetsScorecardThresholds, len(o.Thresholds))\n\tfor i, r := range o.Thresholds {\n\t\tsThresholds[i] = MonitoringAlphaDashboardGridLayoutWidgetsScorecardThresholdsToProto(&r)\n\t}\n\tp.SetThresholds(sThresholds)\n\treturn p\n}", "title": "" }, { "docid": "7afe509b78cf355784fe8442a3363d3f", "score": "0.46069193", "text": "func (tk *ThresholdKey) Marshal() ([]byte, error) {\n\tlocalPreParams := &pb.LocalPartySaveData_LocalPreParams{\n\t\tPaillierSK: &pb.LocalPartySaveData_LocalPreParams_PrivateKey{\n\t\t\tPublicKey: tk.LocalPreParams.PaillierSK.PublicKey.N.Bytes(),\n\t\t\tLambdaN: tk.LocalPreParams.PaillierSK.LambdaN.Bytes(),\n\t\t\tPhiN: tk.LocalPreParams.PaillierSK.PhiN.Bytes(),\n\t\t},\n\t\tNTilde: tk.LocalPreParams.NTildei.Bytes(),\n\t\tH1I: tk.LocalPreParams.H1i.Bytes(),\n\t\tH2I: tk.LocalPreParams.H2i.Bytes(),\n\t\tAlpha: tk.LocalPreParams.Alpha.Bytes(),\n\t\tBeta: tk.LocalPreParams.Beta.Bytes(),\n\t\tP: tk.LocalPreParams.P.Bytes(),\n\t\tQ: tk.LocalPreParams.Q.Bytes(),\n\t}\n\n\tlocalSecrets := &pb.LocalPartySaveData_LocalSecrets{\n\t\tXi: tk.LocalSecrets.Xi.Bytes(),\n\t\tShareID: tk.LocalSecrets.ShareID.Bytes(),\n\t}\n\n\tmarshalBigIntSlice := func(bigInts []*big.Int) [][]byte {\n\t\tbytesSlice := make([][]byte, len(bigInts))\n\t\tfor i, bigInt := range bigInts {\n\t\t\tbytesSlice[i] = bigInt.Bytes()\n\t\t}\n\t\treturn bytesSlice\n\t}\n\n\tbigXj := make([]*pb.LocalPartySaveData_ECPoint, len(tk.BigXj))\n\tfor i, bigX := range tk.BigXj {\n\t\tbigXj[i] = &pb.LocalPartySaveData_ECPoint{\n\t\t\tX: bigX.X().Bytes(),\n\t\t\tY: bigX.Y().Bytes(),\n\t\t}\n\t}\n\n\tpaillierPKs := make([][]byte, len(tk.PaillierPKs))\n\tfor i, paillierPK := range tk.PaillierPKs {\n\t\tpaillierPKs[i] = paillierPK.N.Bytes()\n\t}\n\n\tecdsaPub := &pb.LocalPartySaveData_ECPoint{\n\t\tX: tk.ECDSAPub.X().Bytes(),\n\t\tY: tk.ECDSAPub.Y().Bytes(),\n\t}\n\n\treturn (&pb.LocalPartySaveData{\n\t\tLocalPreParams: localPreParams,\n\t\tLocalSecrets: localSecrets,\n\t\tKs: marshalBigIntSlice(tk.Ks),\n\t\tNTildej: marshalBigIntSlice(tk.NTildej),\n\t\tH1J: marshalBigIntSlice(tk.H1j),\n\t\tH2J: marshalBigIntSlice(tk.H2j),\n\t\tBigXj: bigXj,\n\t\tPaillierPKs: paillierPKs,\n\t\tEcdsaPub: ecdsaPub,\n\t}).Marshal()\n}", "title": "" }, { "docid": "f70657d10d97a700c853159b25fad0b3", "score": "0.45990127", "text": "func OsconfigBetaOSPolicyAssignmentOSPoliciesResourceGroupsToProto(o *beta.OSPolicyAssignmentOSPoliciesResourceGroups) *betapb.OsconfigBetaOSPolicyAssignmentOSPoliciesResourceGroups {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.OsconfigBetaOSPolicyAssignmentOSPoliciesResourceGroups{}\n\tsInventoryFilters := make([]*betapb.OsconfigBetaOSPolicyAssignmentOSPoliciesResourceGroupsInventoryFilters, len(o.InventoryFilters))\n\tfor i, r := range o.InventoryFilters {\n\t\tsInventoryFilters[i] = OsconfigBetaOSPolicyAssignmentOSPoliciesResourceGroupsInventoryFiltersToProto(&r)\n\t}\n\tp.SetInventoryFilters(sInventoryFilters)\n\tsResources := make([]*betapb.OsconfigBetaOSPolicyAssignmentOSPoliciesResourceGroupsResources, len(o.Resources))\n\tfor i, r := range o.Resources {\n\t\tsResources[i] = OsconfigBetaOSPolicyAssignmentOSPoliciesResourceGroupsResourcesToProto(&r)\n\t}\n\tp.SetResources(sResources)\n\treturn p\n}", "title": "" }, { "docid": "419d7c1f6209f328465f81a67da725cf", "score": "0.45985386", "text": "func ContainerawsBetaClusterControlPlaneConfigEncryptionToProto(o *beta.ClusterControlPlaneConfigEncryption) *betapb.ContainerawsBetaClusterControlPlaneConfigEncryption {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.ContainerawsBetaClusterControlPlaneConfigEncryption{}\n\tp.SetKmsKeyArn(dcl.ValueOrEmptyString(o.KmsKeyArn))\n\treturn p\n}", "title": "" }, { "docid": "a48458b87ff7ff76b602e0be322162a2", "score": "0.45979202", "text": "func (p *Proposal) ToProto() *tmproto.Proposal {\n\tif p == nil {\n\t\treturn &tmproto.Proposal{}\n\t}\n\tpb := new(tmproto.Proposal)\n\n\tpb.BlockID = p.BlockID.ToProto()\n\tpb.Type = p.Type\n\tpb.Height = p.Height\n\tpb.Round = p.Round\n\tpb.PolRound = p.POLRound\n\tpb.Timestamp = p.Timestamp\n\tpb.Signature = p.Signature\n\n\treturn pb\n}", "title": "" }, { "docid": "7672a09d7892e48a5796320d5fafa95a", "score": "0.4583928", "text": "func MonitoringAlphaDashboardMosaicLayoutToProto(o *alpha.DashboardMosaicLayout) *alphapb.MonitoringAlphaDashboardMosaicLayout {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &alphapb.MonitoringAlphaDashboardMosaicLayout{}\n\tp.SetColumns(dcl.ValueOrEmptyInt64(o.Columns))\n\tsTiles := make([]*alphapb.MonitoringAlphaDashboardMosaicLayoutTiles, len(o.Tiles))\n\tfor i, r := range o.Tiles {\n\t\tsTiles[i] = MonitoringAlphaDashboardMosaicLayoutTilesToProto(&r)\n\t}\n\tp.SetTiles(sTiles)\n\treturn p\n}", "title": "" }, { "docid": "20b7f60502fdaa3ed773779191c31c03", "score": "0.4580682", "text": "func MonitoringAlphaDashboardGridLayoutWidgetsLogsPanelToProto(o *alpha.DashboardGridLayoutWidgetsLogsPanel) *alphapb.MonitoringAlphaDashboardGridLayoutWidgetsLogsPanel {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &alphapb.MonitoringAlphaDashboardGridLayoutWidgetsLogsPanel{}\n\tp.SetFilter(dcl.ValueOrEmptyString(o.Filter))\n\tsResourceNames := make([]string, len(o.ResourceNames))\n\tfor i, r := range o.ResourceNames {\n\t\tsResourceNames[i] = r\n\t}\n\tp.SetResourceNames(sResourceNames)\n\treturn p\n}", "title": "" }, { "docid": "51e4f4c31d84ac961f43cb09f346a149", "score": "0.4573242", "text": "func (b *Converter) YAMLToProto(contents []byte) (proto.Message, error) {\n\tjs, err := yaml.YAMLToJSON(contents)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn b.JSONToProto(js)\n}", "title": "" }, { "docid": "54bec017f78ab4a245dd1e2234a2a64c", "score": "0.4573041", "text": "func ContainerawsAlphaNodePoolConfigSshConfigToProto(o *alpha.NodePoolConfigSshConfig) *alphapb.ContainerawsAlphaNodePoolConfigSshConfig {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &alphapb.ContainerawsAlphaNodePoolConfigSshConfig{}\n\tp.SetEc2KeyPair(dcl.ValueOrEmptyString(o.Ec2KeyPair))\n\treturn p\n}", "title": "" }, { "docid": "42ebead72029ae88a64e6fad357b6d2f", "score": "0.457084", "text": "func (w WorkflowParameter) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"description\", w.Description)\n\tpopulateAny(objectMap, \"metadata\", w.Metadata)\n\tpopulate(objectMap, \"type\", w.Type)\n\tpopulateAny(objectMap, \"value\", w.Value)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "082692e15f019a17fb8aa3abdc489cfb", "score": "0.4564633", "text": "func GkemulticloudBetaAwsClusterControlPlaneSshConfigToProto(o *beta.AwsClusterControlPlaneSshConfig) *betapb.GkemulticloudBetaAwsClusterControlPlaneSshConfig {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.GkemulticloudBetaAwsClusterControlPlaneSshConfig{\n\t\tEc2KeyPair: dcl.ValueOrEmptyString(o.Ec2KeyPair),\n\t}\n\treturn p\n}", "title": "" }, { "docid": "30be641434136a15a7cc8da9b4ef83a6", "score": "0.45579493", "text": "func StorageDefaultObjectAccessControlProjectTeamToProto(o *storage.DefaultObjectAccessControlProjectTeam) *storagepb.StorageDefaultObjectAccessControlProjectTeam {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &storagepb.StorageDefaultObjectAccessControlProjectTeam{\n\t\tProjectNumber: dcl.ValueOrEmptyString(o.ProjectNumber),\n\t\tTeam: StorageDefaultObjectAccessControlProjectTeamTeamEnumToProto(o.Team),\n\t}\n\treturn p\n}", "title": "" }, { "docid": "a706fdbc6617aad508a5fe19a668eb86", "score": "0.4556559", "text": "func (s *StaticSite) SerializedParameters() (string, error) {\n\treturn serializeTemplateConfig(s.wkld.parser, s)\n}", "title": "" }, { "docid": "9842ee1307850913d8c985b8df68f244", "score": "0.45557383", "text": "func MonitoringAlphaDashboardColumnLayoutColumnsWidgetsBlankToProto(o *alpha.DashboardColumnLayoutColumnsWidgetsBlank) *alphapb.MonitoringAlphaDashboardColumnLayoutColumnsWidgetsBlank {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &alphapb.MonitoringAlphaDashboardColumnLayoutColumnsWidgetsBlank{}\n\treturn p\n}", "title": "" }, { "docid": "94e5aa1c54993d5c39e4479d1df87bbe", "score": "0.45432144", "text": "func IamWorkforcePoolProviderSamlToProto(o *iam.WorkforcePoolProviderSaml) *iampb.IamWorkforcePoolProviderSaml {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &iampb.IamWorkforcePoolProviderSaml{}\n\tp.SetIdpMetadataXml(dcl.ValueOrEmptyString(o.IdpMetadataXml))\n\treturn p\n}", "title": "" }, { "docid": "57106d3d2f72eba5085993fe8fd5a4fa", "score": "0.45394278", "text": "func VertexaiAlphaModelDeploymentDedicatedResourcesMachineSpecToProto(o *alpha.ModelDeploymentDedicatedResourcesMachineSpec) *alphapb.VertexaiAlphaModelDeploymentDedicatedResourcesMachineSpec {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &alphapb.VertexaiAlphaModelDeploymentDedicatedResourcesMachineSpec{}\n\tp.SetMachineType(dcl.ValueOrEmptyString(o.MachineType))\n\treturn p\n}", "title": "" }, { "docid": "96cddbe5371bd73c58340b7148b116bd", "score": "0.45392847", "text": "func BigqueryBetaTableExternalDataConfigurationGoogleSheetsOptionsToProto(o *beta.TableExternalDataConfigurationGoogleSheetsOptions) *betapb.BigqueryBetaTableExternalDataConfigurationGoogleSheetsOptions {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.BigqueryBetaTableExternalDataConfigurationGoogleSheetsOptions{}\n\tp.SetSkipLeadingRows(dcl.ValueOrEmptyString(o.SkipLeadingRows))\n\tp.SetRange(dcl.ValueOrEmptyString(o.Range))\n\treturn p\n}", "title": "" }, { "docid": "f923b6c430d2640eb73bfcb94671a2b5", "score": "0.4539122", "text": "func (vm *VM) toARMParameters() *armParameters {\n\tout := &armParameters{\n\t\tAdminUsername: &armParameter{vm.SSHCreds.SSHUser},\n\t\tAdminPassword: &armParameter{vm.SSHCreds.SSHPassword},\n\t\tImageOffer: &armParameter{vm.ImageOffer},\n\t\tImagePublisher: &armParameter{vm.ImagePublisher},\n\t\tImageSku: &armParameter{vm.ImageSku},\n\t\tNetworkSecurityGroup: &armParameter{vm.NetworkSecurityGroup},\n\t\tNicName: &armParameter{vm.Nic},\n\t\tOSFileName: &armParameter{vm.OsFile},\n\t\tPublicIPName: &armParameter{vm.PublicIP},\n\t\tSSHAuthorizedKey: &armParameter{vm.SSHPublicKey},\n\t\tStorageAccountName: &armParameter{vm.StorageAccount},\n\t\tStorageContainerName: &armParameter{vm.StorageContainer},\n\t\tSubnetName: &armParameter{vm.Subnet},\n\t\tVirtualNetworkName: &armParameter{vm.VirtualNetwork},\n\t\tVMSize: &armParameter{vm.Size},\n\t\tVMName: &armParameter{vm.Name},\n\t\tDiskSize: &armParameter{strconv.Itoa(vm.DiskSize)},\n\t\tDiskFile: &armParameter{vm.DiskFile},\n\t\tAdditionalDisk: &armParameter{\"false\"},\n\t}\n\n\tif vm.DiskSize > 0 {\n\t\tout.AdditionalDisk = &armParameter{\"true\"}\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "65fc7a772d052035cd11af287d41cee6", "score": "0.4537846", "text": "func OrganizationToProto(resource *apigee.Organization) *apigeepb.ApigeeOrganization {\n\tp := &apigeepb.ApigeeOrganization{}\n\tp.SetName(dcl.ValueOrEmptyString(resource.Name))\n\tp.SetDisplayName(dcl.ValueOrEmptyString(resource.DisplayName))\n\tp.SetDescription(dcl.ValueOrEmptyString(resource.Description))\n\tp.SetCreatedAt(dcl.ValueOrEmptyInt64(resource.CreatedAt))\n\tp.SetLastModifiedAt(dcl.ValueOrEmptyInt64(resource.LastModifiedAt))\n\tp.SetExpiresAt(dcl.ValueOrEmptyInt64(resource.ExpiresAt))\n\tp.SetAnalyticsRegion(dcl.ValueOrEmptyString(resource.AnalyticsRegion))\n\tp.SetAuthorizedNetwork(dcl.ValueOrEmptyString(resource.AuthorizedNetwork))\n\tp.SetRuntimeType(ApigeeOrganizationRuntimeTypeEnumToProto(resource.RuntimeType))\n\tp.SetSubscriptionType(ApigeeOrganizationSubscriptionTypeEnumToProto(resource.SubscriptionType))\n\tp.SetBillingType(ApigeeOrganizationBillingTypeEnumToProto(resource.BillingType))\n\tp.SetAddonsConfig(ApigeeOrganizationAddonsConfigToProto(resource.AddonsConfig))\n\tp.SetCaCertificate(dcl.ValueOrEmptyString(resource.CaCertificate))\n\tp.SetRuntimeDatabaseEncryptionKeyName(dcl.ValueOrEmptyString(resource.RuntimeDatabaseEncryptionKeyName))\n\tp.SetProjectId(dcl.ValueOrEmptyString(resource.ProjectId))\n\tp.SetState(ApigeeOrganizationStateEnumToProto(resource.State))\n\tp.SetProject(dcl.ValueOrEmptyString(resource.Project))\n\tsEnvironments := make([]string, len(resource.Environments))\n\tfor i, r := range resource.Environments {\n\t\tsEnvironments[i] = r\n\t}\n\tp.SetEnvironments(sEnvironments)\n\tmProperties := make(map[string]string, len(resource.Properties))\n\tfor k, r := range resource.Properties {\n\t\tmProperties[k] = r\n\t}\n\tp.SetProperties(mProperties)\n\n\treturn p\n}", "title": "" } ]
63586c373ffdb9b0e0050045e5bf5c79
/ FindOne function: used to try and find the account that the user is trying to login to and returns a JWT back to the user if successfull
[ { "docid": "d2acac975728602bcd53a85587431f4c", "score": "0.7912372", "text": "func FindOne(email, password string) map[string]interface{} {\n\tuser := &models.User{}\n\n\t// Check to see if the email provided exists in the database\n\terr := database.Where(\"Email = ?\", email).First(user).Error\n\tif err != nil {\n\t\tresp := map[string]interface{}{\"status\": false, \"message\": \"Email address not found\"}\n\t\treturn resp\n\t}\n\n\texpiresAt := time.Now().Add(time.Minute * 100000).Unix()\n\n\t// Check to see if the password matches the one stored in the databse\n\terr = bcrypt.CompareHashAndPassword([]byte(user.Password), []byte(password))\n\tif err != nil && err == bcrypt.ErrMismatchedHashAndPassword {\n\t\tresp := map[string]interface{}{\"satus\": false, \"message\": \"Incorrect Password\"}\n\t\treturn resp\n\t}\n\n\t// Create a JWT that the user can use to authenticate without loggin in all the time\n\ttk := &models.Token{\n\t\tUserID: user.ID,\n\t\tName: user.Name,\n\t\tEmail: user.Email,\n\t\tStandardClaims: &jwt.StandardClaims{\n\t\t\tExpiresAt: expiresAt,\n\t\t},\n\t}\n\n\ttoken := jwt.NewWithClaims(jwt.GetSigningMethod(\"HS256\"), tk)\n\n\ttokenString, err := token.SignedString([]byte(\"secret\"))\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\n\t// Return the token and a successfull login message\n\tresp := map[string]interface{}{\"status\": true, \"message\": \"Successfully logged in\"}\n\tresp[\"token\"] = tokenString\n\tresp[\"user\"] = user\n\n\treturn resp\n}", "title": "" } ]
[ { "docid": "ef63c2869752e999e9eb6e45b1be489f", "score": "0.6819155", "text": "func FindOneUser(c echo.Context) error {\n\tif c.Request().Header().Get(\"Authorization\") != \"\" {\n\t\tr, _ := regexp.Compile(\"((Bearer )*)\")\n\t\tvar token = r.ReplaceAllString(c.Request().Header().Get(\"Authorization\"), \"\")\n\t\tauth, err := servicesJWT.RequiresAuth(token)\n\t\tif err != nil {\n\t\t\treturn c.JSON(409, err)\n\t\t}\n\t\tif auth {\n\t\t\tuser := servicesUser.FindOneUser(c.Param(\"username\"))\n\t\t\treturn c.JSON(200, user)\n\t\t}\n\t\treturn c.JSON(409, \"Error\")\n\t}\n\treturn c.JSON(409, \"Error\")\n}", "title": "" }, { "docid": "e6d073a028ad982ef665e283115b56be", "score": "0.6661359", "text": "func (s *Store) FindOne(ctx context.Context, id string) (*User, error) {\n\treturn s.FindOneTx(ctx, nil, id, false)\n}", "title": "" }, { "docid": "9d56c82816f176fda00f096ce2e3f32c", "score": "0.6523342", "text": "func (store UsersStore) FindOne(cond ...interface{}) (*User, error) {\n\tvar user *User\n\tif err := store.Find(cond...).One(&user); err != nil {\n\t\treturn nil, err\n\t}\n\treturn user, nil\n}", "title": "" }, { "docid": "23b42f4bf76e180666fd45d48933e970", "score": "0.6431144", "text": "func (db *DB) Login(user *User) (*User, error) {\n\tjwtAuth, err := InitJWTAuth()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Get user with given email from the database\n\tdbUser, err := db.GetUserWithEmail(user.Email)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Check if this is the first time a use is logging in\n\tfirstLogin := dbUser.LastLogin.Valid == false\n\n\tif dbUser == nil {\n\t\treturn nil, errors.New(\"User with that email does not exist\")\n\t}\n\n\t// Check email and password are the same\n\tif jwtAuth.Authenticate(dbUser, user) {\n\t\t// Generate JWT and respond with User object\n\t\ttoken, err := jwtAuth.GenerateToken(dbUser)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t} else {\n\t\t\tdbUser.Token = token\n\t\t\tdbUser.Password = \"\" // don't want to send the password back to the client\n\n\t\t\t// Update last login time\n\t\t\tdbUser.LastLogin = Now()\n\t\t\terr = db.UpdateUserExcludePassword(dbUser)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\n\t\t\tif firstLogin {\n\t\t\t\tdbUser.LastLogin = mysql.NullTime{}\n\t\t\t}\n\n\t\t\treturn dbUser, nil\n\t\t}\n\t}\n\n\treturn nil, errors.New(\"Unauthorized: \" + user.Email)\n}", "title": "" }, { "docid": "f95e0b99965b52a06aea81d5a08283f7", "score": "0.63286", "text": "func (s *UserStore) FindOne(q *UserQuery) (*User, error) {\n\tq.Limit(1)\n\tq.Offset(0)\n\trs, err := s.Find(q)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif !rs.Next() {\n\t\treturn nil, kallax.ErrNotFound\n\t}\n\n\trecord, err := rs.Get()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif err := rs.Close(); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn record, nil\n}", "title": "" }, { "docid": "e8b4d77f5baaf8af2133e7bbee68a47d", "score": "0.6233648", "text": "func (pr *AccountRepo) FindOne(ctx context.Context, filter interface{},\n\topts ...*options.FindOneOptions) *mongo.SingleResult {\n\treturn pr.collection.FindOne(ctx, filter, opts...)\n}", "title": "" }, { "docid": "1e45082ef291078ed0509480d3ba7590", "score": "0.6184037", "text": "func (user *User) FindOne() error {\n\t// Query\n\terr := db.QueryRow(\"SELECT * FROM users WHERE id_user = ? LIMIT 1\", user.IDUser).Scan(&user.IDUser, &user.Username, &user.FirstName, &user.LastName)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "ae46c90c49a77b61a6982ac3bd9017f8", "score": "0.6138742", "text": "func (o usersService) FindUserByJWT(email string, provider string, userID string) (*models.User, error) {\n\treturn o.userRepo.FindUserByJWT(email, provider, userID)\n}", "title": "" }, { "docid": "90c267972346eebf4b0bf6a77c763862", "score": "0.61314076", "text": "func (c *AuthController) Find(w http.ResponseWriter, r *http.Request) {\n\tid, code, err := c.ValidateId(r)\n\n\tif err != nil {\n\t\trender.Render(w, r, helper.ResponseError(code, err))\n\t\treturn\n\t}\n\n\tuser, err := services.GetUserByID(id)\n\n\tif err != nil {\n\t\trender.Render(w, r, helper.ResponseError(http.StatusInternalServerError, err))\n\t\treturn\n\t}\n\n\trender.Render(w, r, helper.ResponseSuccess(user))\n}", "title": "" }, { "docid": "53f3f6ed616286be726a89f132b9608f", "score": "0.5985113", "text": "func (o *Oauth) Find(provider, oid string) error {\n\tif dbuser, ok := users[provider]; ok {\n\t\tif dbuser.oid == oid {\n\t\t\t// found user from db\n\t\t\to.AccountId = dbuser.account\n\t\t\to.Provider = provider\n\t\t\to.Oid = oid\n\t\t\treturn nil\n\t\t}\n\t}\n\treturn errors.New(\"User not found\")\n}", "title": "" }, { "docid": "2d2843abd5a2e4bdd9c5198c16b71a17", "score": "0.59754986", "text": "func (handler AuthHandler) Login(w http.ResponseWriter, r *http.Request) {\n\tvar attempt models.User\n\tjson.NewDecoder(r.Body).Decode(&attempt)\n\n\tvar user models.User\n\n\tif err := handler.DB.Where(\"username = ?\", attempt.Username).First(&user).Error; err != nil {\n\t\tresponse.JSON(w, response.Result{Error: \"Could not login\"}, http.StatusNotFound)\n\t\treturn\n\t}\n\n\t// check that hashes match\n\tif err := bcrypt.CompareHashAndPassword([]byte(user.Password), []byte(attempt.Password)); err != nil {\n\t\tresponse.JSON(w, response.Result{Error: \"Could not login\"}, http.StatusNotFound)\n\t\treturn\n\t}\n\n\t// Create a new token object, specifying signing method and the claims\n\t// you would like it to contain.\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, multus.CustomClaims{\n\t\tuser.Email,\n\t\tjwt.StandardClaims{\n\t\t\tId: fmt.Sprint(user.ID),\n\t\t\tExpiresAt: time.Now().Add(time.Hour * 24).Unix(),\n\t\t},\n\t})\n\n\t// Sign and get the complete encoded token as a string using the secret\n\ttokenString, err := token.SignedString(handler.Config.SecretKey)\n\n\tif err != nil {\n\t\tresponse.JSON(w, response.Result{Error: \"Coult not login\"}, http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tresponse.JSON(w, response.LoginResult{Token: tokenString}, http.StatusOK)\n}", "title": "" }, { "docid": "e3bafdf2e8715f5126178a9b40ce8dd4", "score": "0.5964506", "text": "func (c companyDo) FindOne() (result map[string]interface{}) {\n\tvar generateSQL string\n\tgenerateSQL += \"select * from users limit 1\"\n\n\tresult = make(map[string]interface{})\n\t_ = c.UnderlyingDB().Raw(generateSQL).Take(result)\n\treturn\n}", "title": "" }, { "docid": "f7d16bc0356eee8e04074932a072e8f9", "score": "0.5958286", "text": "func Login(w http.ResponseWriter, r *http.Request) {\n\n\tw.Header().Add(\"content-type\", \"application/json\")\n\n\tvar user models.User\n\n\terr := json.NewDecoder(r.Body).Decode(&user)\n\n\tif err != nil {\n\t\thttp.Error(w, \"Usuario / Contraseña inválidos\"+err.Error(), 400)\n\t\treturn\n\t}\n\n\tif len(user.Email) == 0 {\n\t\thttp.Error(w, \"El email del usuario es requerido\", 400)\n\t\treturn\n\t}\n\n\tdocument, exists := db.TryLogin(user.Email, user.Password)\n\n\tif exists == false {\n\t\thttp.Error(w, \"Credenciales inválidas\", 400)\n\t\treturn\n\t}\n\n\t//create the jwt\n\tjwtKey, err := jwt.GenerateJWT(document)\n\n\tif err != nil {\n\t\thttp.Error(w, \"Error de token \"+err.Error(), 400)\n\t\treturn\n\t}\n\n\t//storing JWT on model\n\tresp := models.LoginResponse{\n\t\tToken: jwtKey,\n\t}\n\n\t//set jwt to headers\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t//200 OR 201\n\tw.WriteHeader(http.StatusCreated)\n\t//encoding response\n\t// this always return on login (the JWT )\n\tjson.NewEncoder(w).Encode(resp)\n\n\t//make a Cookie for JWT\n\texpirationTime := time.Now().Add(24 * time.Hour)\n\thttp.SetCookie(w, &http.Cookie{\n\t\tName: \"token\",\n\t\tValue: jwtKey,\n\t\tExpires: expirationTime,\n\t})\n\n}", "title": "" }, { "docid": "303f69cfaf292665a4c77d27d1b8c55a", "score": "0.59581184", "text": "func (fn *roleService) FindOne(Role *models.Role, RoleID uint) (response *gorm.DB) {\n\tresponse = database.DB.Find(&Role, RoleID)\n\treturn response\n}", "title": "" }, { "docid": "ea1b542b669f937b0c8ea882af8a6162", "score": "0.59546804", "text": "func (dao UserDao) FindOne (entity model.Entity) error {\n\tuser := entity.(*model.EstimaUser)\n\tusers, err := dao.FindAll (NewFilter().Filter(\"name\", \"==\", user.Name), 0, 0)\n\tmodel.CheckErr (err)\n\tif len(users) != 1 {\n\t\treturn nil\n\t}\n\n\t*user = *(users[0].(*model.EstimaUser))\n\treturn nil\n}", "title": "" }, { "docid": "f6b87b0302c0b0fcecbce489666aabdd", "score": "0.5950933", "text": "func (a *API) Login(w http.ResponseWriter, r *http.Request) {\n\tvar user *model.User\n\tvar loginDetails model.LoginDetails\n\tvar userDetails model.UserDetails\n\n\terr := decodeJSONBody(nil, r.Body, &loginDetails)\n\n\tif err != nil {\n\t\tWriteErrorResponse(w, http.StatusBadRequest, err)\n\t\treturn\n\t}\n\n\tif loginDetails.Email == \"\" {\n\t\tWriteErrorResponse(w, http.StatusBadRequest, errors.New(\"email field is empty\"))\n\t\treturn\n\t}\n\n\tif loginDetails.Password == \"\" {\n\t\tWriteErrorResponse(w, http.StatusBadRequest, errors.New(\"password field is empty\"))\n\t\treturn\n\t}\n\t// check if it is a valid email\n\terr = checkmail.ValidateFormat(loginDetails.Email)\n\n\t// If error is not equals to nil, then it must be a username\n\tif err != nil {\n\t\tuser, err = a.Deps.DAL.UserDAL.FindUserByUsername(loginDetails.Email)\n\t} else {\n\t\t//Find user by email\n\t\tuser, err = a.Deps.DAL.UserDAL.FindUserByEmail(loginDetails.Email)\n\t\tlog.Info(\"Retrieving user details\")\n\t}\n\n\tif err == nil {\n\t\tif !loginDetails.SocialLogin {\n\t\t\tif !comparePasswords(user.Password, []byte(loginDetails.Password)) {\n\t\t\t\tWriteErrorResponse(w, http.StatusBadRequest, errors.New(\"user details do not match\"))\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\n\t\tjwtSecretKey := []byte(a.Config.TokenSecret)\n\t\ttokenString, tokenErr := GenerateToken(jwtSecretKey, loginDetails.Email)\n\n\t\tif tokenErr != nil {\n\t\t\tWriteJSONPayload(w, &ServerResponse{\n\t\t\t\tErr: \"Error while validating user\",\n\t\t\t\tMessage: \"failed\",\n\t\t\t\tStatusCode: http.StatusInternalServerError,\n\t\t\t\tPayload: loginDetails,\n\t\t\t})\n\t\t\treturn\n\t\t}\n\n\t\tres := &model.AuthResponse{\n\t\t\tModel: gorm.Model{\n\t\t\t\tID: user.ID,\n\t\t\t\tCreatedAt: user.CreatedAt,\n\t\t\t\tUpdatedAt: user.UpdatedAt,\n\t\t\t\tDeletedAt: user.DeletedAt,\n\t\t\t},\n\t\t\tFirstname: user.Firstname,\n\t\t\tLastname: user.Lastname,\n\t\t\tUsername: user.Username,\n\t\t\tEmail: user.Email,\n\t\t\tPicSrc: user.PicSrc,\n\t\t}\n\t\tuserDetails.Token = tokenString\n\t\tuserDetails.UserInfo = res\n\t\tWriteJSONPayload(w, &ServerResponse{\n\t\t\tMessage: \"Login successful\",\n\t\t\tStatusCode: http.StatusOK,\n\t\t\tPayload: userDetails,\n\t\t})\n\t\treturn\n\t}\n\n\tWriteErrorResponse(w, http.StatusBadRequest, errors.New(\"user not found\"))\n}", "title": "" }, { "docid": "00ef6727f9e808d42537bd856a496dff", "score": "0.5936244", "text": "func (c *client) Login(res http.ResponseWriter, req *http.Request) (*model.User, error) {\n\tconfig := c.newConfig(httputil.GetURL(req))\n\n\t// get the OAuth errors\n\tif err := req.FormValue(\"error\"); err != \"\" {\n\t\treturn nil, &remote.AuthError{\n\t\t\tErr: err,\n\t\t\tDescription: req.FormValue(\"error_description\"),\n\t\t\tURI: req.FormValue(\"error_uri\"),\n\t\t}\n\t}\n\n\t// get the OAuth code\n\tcode := req.FormValue(\"code\")\n\tif len(code) == 0 {\n\t\t// TODO(bradrydzewski) we really should be using a random value here and\n\t\t// storing in a cookie for verification in the next stage of the workflow.\n\n\t\thttp.Redirect(res, req, config.AuthCodeURL(\"drone\"), http.StatusSeeOther)\n\t\treturn nil, nil\n\t}\n\n\ttoken, err := config.Exchange(c.newContext(), code)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tclient, ctx := c.newClientToken(token.AccessToken)\n\tuser, _, err := client.Users.Get(ctx, \"\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\temails, _, err := client.Users.ListEmails(ctx, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\temail := matchingEmail(emails, c.API)\n\tif email == nil {\n\t\treturn nil, fmt.Errorf(\"No verified Email address for GitHub account\")\n\t}\n\n\treturn &model.User{\n\t\tLogin: *user.Login,\n\t\tEmail: *email.Email,\n\t\tToken: token.AccessToken,\n\t\tAvatar: *user.AvatarURL,\n\t}, nil\n}", "title": "" }, { "docid": "b96ef8dd637f816e077e2fd0b9bbf1d2", "score": "0.5921631", "text": "func (uc *userController) GetOne(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tid, err := utils.Params(r, \"id\", false)\n\tif err != nil {\n\t\treturn\n\t}\n\tvar user = &models.User{}\n\tuser, errOne := us.GetOne(id.(string))\n\tif errOne != nil {\n\t\tlog.Printf(\"ERROR: %s CODE: %d\", errOne.Msg, errOne.StatusCode)\n\t\treturn\n\t}\n\tif err := utils.ToJSON(w, user); err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "8d5c3d1be13ac997e8666030de97dd11", "score": "0.58998156", "text": "func Login(db *gorm.DB) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tuser := &models.User{}\n\t\terr := json.NewDecoder(r.Body).Decode(user)\n\t\tif err != nil {\n\t\t\tvar resp = models.AuthResponse{Message: \"Invalid request\"}\n\t\t\tjson.NewEncoder(w).Encode(resp)\n\t\t\treturn\n\t\t}\n\t\tresp := findOne(db, user.Name, user.Password)\n\t\tjson.NewEncoder(w).Encode(resp)\n\t}\n}", "title": "" }, { "docid": "4d54e03d6ebf4233b799fd8a781eeed8", "score": "0.5883153", "text": "func (s *MongoUserStorage) Login(ctx context.Context, c models.Credentials) (*models.User, error) {\n\tmodel := mongoUser{}\n\terr := s.collection.Find(bson.M{\"username\": c.Username}).One(&model)\n\terr = s.hash.Compare(model.Password, c.Password)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn model.toModel(), nil\n}", "title": "" }, { "docid": "6814fe0d7ff56c42b0bf13b7916e6155", "score": "0.5878108", "text": "func (s *UserService) Find(email string) (coin.User, error) {\n\tj, err := s.client.Load(UserCollection, email)\n\tif err != nil {\n\t\treturn coin.User{}, err\n\t}\n\n\tu := coin.User{}\n\tjson.Unmarshal(j, &u)\n\n\treturn u, nil\n}", "title": "" }, { "docid": "40c9932c98b4b253328aba17dd1c7019", "score": "0.58682775", "text": "func (l DB) GetByUsername(string) (Login, error) { return Login{}, errors.New(\"stub\") }", "title": "" }, { "docid": "c1a77cadb93dca56890ef4f120678ef1", "score": "0.5768916", "text": "func Login(ctx *gin.Context) {\n\tvar (\n\t\tauthUser usermodels.Auth\n\t\tuser usermodels.User\n\t\terr error\n\t)\n\n\terr = ctx.Bind(&authUser)\n\tif err != nil {\n\t\tctx.JSON(http.StatusInternalServerError, gin.H{\n\t\t\t\"message\": \"Error while decoding\",\n\t\t})\n\t\treturn\n\t}\n\tsession, err := db.GetMongoSession()\n\tif err != nil {\n\t\tctx.JSON(http.StatusInternalServerError, gin.H{\n\t\t\t\"message\": \"Error while getting mongo session\",\n\t\t})\n\t\treturn\n\t}\n\tdefer session.Close()\n\tc := session.DB(\"dataImpact\").C(\"users\")\n\terr = c.Find(bson.M{\"email\": authUser.Email}).One(&user)\n\tif err != nil {\n\t\tctx.JSON(http.StatusUnauthorized, gin.H{\n\t\t\t\"message\": \"Error account with this email doesn't exist\",\n\t\t})\n\t\treturn\n\t}\n\t//CHECK PASSWORD\n\terr = bcrypt.CompareHashAndPassword([]byte(user.Password), []byte(authUser.Password))\n\tif err != nil {\n\t\tctx.JSON(http.StatusUnauthorized, gin.H{\n\t\t\t\"message\": \"Error: incorrect password has been inserted\",\n\t\t})\n\t\treturn\n\t}\n\t//account exist\n\tvalidToken, err := getJWT()\n\t//Note: it is not really nessesary to save the token but can be cool to keep it if I want to avoid sending ID in request in order to get/delete/update my user\n\tuser.Token = validToken\n\t//update\n\terr = c.Update(bson.M{\"email\": authUser.Email}, user)\n\tif err != nil {\n\t\tctx.JSON(http.StatusBadRequest, gin.H{\n\t\t\t\"message\": \"Error: while saving token\",\n\t\t})\n\t\treturn\n\t}\n\tctx.JSON(http.StatusOK, gin.H{\n\t\t\"token\": user.Token,\n\t})\n}", "title": "" }, { "docid": "6c41a1e6594830168b86df1e68a7d625", "score": "0.576172", "text": "func find_user(p string) mongo_user {\r\n\tclient, ctx, cancel := connect()\r\n\tcol := client.Database(\"Insta\").Collection(\"User\")\r\n\tvar result mongo_user\r\n\tfilter := find{\r\n\t\tFieldid: p,\r\n\t}\r\n\terr := col.FindOne(ctx, filter).Decode(&result)\r\n\tCheckError(err)\r\n\tfmt.Println(\"User Found \", result.Fieldid)\r\n\tclose(client, ctx, cancel)\r\n\treturn result\r\n}", "title": "" }, { "docid": "9b31fe1d1d1329d63a38ea9d463c4d61", "score": "0.57583445", "text": "func FindOneUser(condition interface{}) (User, error) {\n\tdb := common.GetDB()\n\tvar model User\n\terr := db.Where(condition).First(&model).Error\n\treturn model, err\n}", "title": "" }, { "docid": "dc39b9423ff349d611e540619f6fa962", "score": "0.5739378", "text": "func (s *UserStore) MustFindOne(q *UserQuery) *User {\n\trecord, err := s.FindOne(q)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn record\n}", "title": "" }, { "docid": "eb562a2b403a55b1eb68c2cc9be7aefa", "score": "0.5739258", "text": "func (up *userPersistence) Find(ctx context.Context, email, password string) (*model.User, error) {\n\tparam := map[string]interface{}{\n\t\t\"email\": email,\n\t\t\"password\": password,\n\t\t\"status\": state.UserActiveAccount,\n\t}\n\tquery, args, _ := sqlx.Named(query.SelectUserByEmail, param)\n\tquery = up.db.Slave.Rebind(query)\n\n\tuser := new(model.User)\n\terr := up.db.Slave.GetContext(ctx, user, query, args...)\n\tif err == sql.ErrNoRows {\n\t\terr = nil\n\t}\n\treturn user, err\n}", "title": "" }, { "docid": "6f85ce63e785eb157360e7d848c5b077", "score": "0.5730363", "text": "func (i *Interactor) Login(user usecases.User) (string, utils.Error) {\n\tvar jwt string\n\n\texpPassword, err := i.UserRepository.FindPasswordByUsername(context.Background(), user.Username)\n\tif err != nil {\n\t\t// TODO: can't compare this error\n\t\tif err.Error() == \"no values in result set\" {\n\t\t\ti.Logger.Log(\"Login: cannot find user: %v\", err)\n\t\t\treturn jwt, utils.NewError(fmt.Errorf(\"user does not exist\"), \"E_NO_AUTH\", 401)\n\t\t}\n\t\ti.Logger.Log(\"Login: cannot find password: %v\", err)\n\t\treturn jwt, utils.NewError(err, \"E_GENERIC\", 500)\n\t}\n\n\tif toHexHash(user.Password) != expPassword {\n\t\ti.Logger.Log(\"Login: wrong password\")\n\t\treturn jwt, utils.NewError(fmt.Errorf(\"wrong password\"), \"E_NO_AUTH\", 401)\n\t}\n\n\tjwt, err = generateJWT(user.Username)\n\tif err != nil {\n\t\ti.Logger.Log(\"Login: cannot generate JWT: %v\", err)\n\t\treturn jwt, utils.NewError(err, \"E_GENERIC\", 500)\n\t}\n\n\treturn jwt, utils.NewNilError()\n}", "title": "" }, { "docid": "57e413572b87ed6beabb7d95628b0cde", "score": "0.57275164", "text": "func (u User) Authenticate(w http.ResponseWriter, r *http.Request, params httprouter.Params) {\n\tuserModel := model.User{}\n\terr := json.NewDecoder(r.Body).Decode(&userModel)\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tuserModel.Password, err = OneTimeEnc(userModel.Password)\n\tif err != nil {\n\t\tlog.Error(\"Authenticate.password.enc \", err.Error())\n\t\thttp.Error(w, \"sorry, something went wrong.\", http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tlog.Info(\"passoword \", userModel.Password)\n\t_, err = u.userService.Exist(r.Context(), &user.ExistRequest{\n\t\tEmail: userModel.Email,\n\t\tPassword: userModel.Password,\n\t})\n\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tuser, err := u.userService.Get(r.Context(), &user.GetRequest{\n\t\tEmail: userModel.Email,\n\t})\n\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusNotFound)\n\t\treturn\n\t}\n\n\tuserID := strconv.FormatInt(user.Id, 10)\n\ttoken, err := EncJWT(AppJWTClaims{\n\t\tRole: user.GetRole(),\n\t\tLogin: jwt.StandardClaims{\n\t\t\tAudience: userModel.Email,\n\t\t\tExpiresAt: time.Now().Add((24 * 30) * time.Hour).Unix(),\n\t\t\tId: userID,\n\t\t\tIssuedAt: time.Now().Unix(),\n\t\t\tIssuer: \"sellerapp.bidding.backend\",\n\t\t\tSubject: \"login token\",\n\t\t},\n\t})\n\n\tif err != nil {\n\t\tlog.Error(\"authenticate.jwt.error \", err.Error())\n\t\thttp.Error(w, \"sorry, something went wrong.\", http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tRenderJSON(w, Response{\n\t\tStatusText: http.StatusText(http.StatusOK),\n\t\tStatus: http.StatusOK,\n\t\tMessage: \"loggedIn successfull\",\n\t\tToken: token,\n\t})\n}", "title": "" }, { "docid": "1ff99d99c4f6a580bc682ac99bd6c949", "score": "0.5696922", "text": "func Login(username, password string, db gogios.Database) map[string]interface{} {\n\tuser, err := db.GetUser(username)\n\tif err != nil {\n\t\tvar resp = map[string]interface{}{\"status\": false, \"message\": \"Username not found\"}\n\t\treturn resp\n\t}\n\n\texpiresAt := time.Now().Add(time.Minute * 100000).Unix()\n\n\terr = bcrypt.CompareHashAndPassword([]byte(user.Password), []byte(password))\n\tif err != nil && err == bcrypt.ErrMismatchedHashAndPassword {\n\t\tvar resp = map[string]interface{}{\"status\": false, \"message\": \"Invalid username and password combo\"}\n\t\treturn resp\n\t}\n\n\ttk := Token{\n\t\tUserID: user.ID,\n\t\tName: user.Name,\n\t\tStandardClaims: &jwt.StandardClaims{\n\t\t\tExpiresAt: expiresAt,\n\t\t},\n\t}\n\ttoken := jwt.NewWithClaims(jwt.GetSigningMethod(\"HS256\"), tk)\n\n\ttokenString, err := token.SignedString([]byte(\"secret\"))\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\n\tvar resp = map[string]interface{}{\"status\": true, \"message\": \"Authentication success\"}\n\tresp[\"token\"] = tokenString\n\tresp[\"user\"] = user\n\n\treturn resp\n}", "title": "" }, { "docid": "a74b90b9409a5b922f1db95ca48e2532", "score": "0.5686997", "text": "func UserLogin(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-type\", \"application/json\")\n\n\tvar user User\n\tvar dbUser User\n\n\tjson.NewDecoder(r.Body).Decode(&user)\n\tctx, _ := context.WithTimeout(context.Background(), 10*time.Second)\n\terr := userCollection.FindOne(ctx, bson.M{\"email\": user.Email}).Decode(&dbUser)\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tw.Write([]byte(`{\"message\":\"+` + err.Error() + `\"}`))\n\t\treturn\n\t}\n\n\tuserPass := []byte(user.Password)\n\tdbPass := []byte(dbUser.Password)\n\n\tpassErr := bcrypt.CompareHashAndPassword(dbPass, userPass)\n\tif passErr != nil {\n\t\tlog.Println(passErr)\n\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\tw.Write([]byte(`{\"response\":\"Wrong password!\"}`))\n\t\treturn\n\t}\n\n\tjwtToken, err := GenerateJWT()\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tw.Write([]byte(`{\"message\":\"` + err.Error() + `\"}`))\n\t\treturn\n\t}\n\n\tw.Write([]byte(`{\"token\":\"` + jwtToken + `\"}`))\n}", "title": "" }, { "docid": "0f341fe43a4c0752100b46781ec545b3", "score": "0.56839675", "text": "func (l DB) GetByID(string) (Login, error) { return Login{}, errors.New(\"stub\") }", "title": "" }, { "docid": "de282041879236ed3ed0e75ec10298f5", "score": "0.5680671", "text": "func FindOneByEmail(db postgresql.Ext, email string) (*User, error) {\n\tu := User{}\n\n\terr := db.Get(&u, `SELECT\n\t\tu.\"id\", u.\"email\", u.\"password\", u.\"created_at\"\n\tFROM\n\t\t\"Users\" u\n\tWHERE\n\t\temail = $1\n\tLIMIT 1`, strings.ToLower(email))\n\n\treturn &u, err\n}", "title": "" }, { "docid": "ebbc0c99f0abaf5d2a7b768e2b45cea3", "score": "0.56800914", "text": "func Login(id string, password string) ( *User, error) {\r\n\torm.Debug = true\r\n\tmsg := \"No result found\"\r\n\to := orm.NewOrm()\r\n\to.Using(\"default\")\r\n\t// Read User Data & If User ID is not in DB, No result found \r\n\treadTarget := User{ID: id}\r\n\terr := o.Read(&readTarget)\r\n\tif err == orm.ErrNoRows {\r\n\t\tlog.Println(\"No ID\")\r\n\t\treturn &User{readTarget.ID, readTarget.Password, readTarget.Email}, errors.New(msg)\t\r\n\t} \r\n\t// If password is not matched with DB, No result found \r\n\tif password != readTarget.Password {\r\n\t\tbeego.Info(\"No result found.\")\r\n\t\treturn &User{readTarget.ID, readTarget.Password, readTarget.Email}, errors.New(msg)\t\r\n\t} else {\r\n\t\tbeego.Info(\"Login Success\")\r\n\t\treturn &User{readTarget.ID, readTarget.Password, readTarget.Email}, nil\r\n\t}\t\r\n\r\n}", "title": "" }, { "docid": "1c6456200e70a051e9a9f7c3e187ba4a", "score": "0.5666373", "text": "func (r userRepo) Find(id string) (*User, error) {\n\tconst Query = `\n\t\tSELECT id,\n\t\t\t first_name,\n\t\t\t last_name,\n\t\t\t username,\n\t\t\t role,\n\t\t\t last_login\n\t\tFROM challenge_user\n\t\tWHERE id = $1;`\n\tvar u User\n\terr := r.dao.\n\t\tQueryRow(Query, id).\n\t\tScan(\n\t\t\t&u.ID,\n\t\t\t&u.FirstName,\n\t\t\t&u.LastName,\n\t\t\t&u.Username,\n\t\t\t&u.Role,\n\t\t\t&u.LastLogin,\n\t\t)\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"failed to retrieve user\")\n\t}\n\treturn &u, nil\n}", "title": "" }, { "docid": "bfada27f5320d0f51ea0d9b44d35ba4c", "score": "0.5664246", "text": "func (p *PawnController) FindOne(c *gin.Context) {\n\tid := c.Param(\"id\")\n\tpawn, err := p.model.FindOne(id)\n\tif err != nil {\n\t\tlog.Panic(err)\n\t}\n\tc.IndentedJSON(http.StatusOK, pawn)\n}", "title": "" }, { "docid": "5227d33eedaba92e5edbd775d19a094b", "score": "0.56631774", "text": "func (r *Repo) Login(user, pass, session, userIP string) models.User {\n\tstart := time.Now()\n\thash := md5.Sum([]byte(pass))\n\tpassmd5 := hex.EncodeToString(hash[:])\n\tcoluser := db.Collection(\"addons_users\")\n\n\tlog.Debugf(\"login:%s - %s\", user, passmd5)\n\tvar result models.User\n\terr := coluser.FindOne(ctx, bson.M{\"user\": user, \"password\": passmd5}).Decode(&result)\n\tr.QueryCount++\n\tc3mcommon.CheckError(\"error query user\", err)\n\tlog.Debugf(\"user result %+v\", result)\n\t//if result.Name != \"\" {\n\t//\tcoluserlogin := db.Collection(\"addons_userlogin\")\n\t//\tvar userlogin models.UserLogin\n\t//\terr := coluserlogin.FindOne(ctx, bson.M{\"userid\": result.ID}).Decode(&userlogin)\n\t//\tr.QueryCount++\n\t//\tif c3mcommon.CheckError(\"Login FindOne\", err) {\n\t//\t\tuserlogin.UserId = result.ID\n\t//\n\t//\t\tuserlogin.LastLogin = time.Now().UTC()\n\t//\t\tuserlogin.LoginIP = userIP\n\t//\t\tuserlogin.Session = session\n\t//\n\t//\t\topts := options.Update().SetUpsert(true)\n\t//\t\tfilter := bson.M{\"userid\": userlogin.UserId}\n\t//\t\tupdate := bson.M{\"$set\": bson.M{\n\t//\t\t\t\"last\": userlogin.LastLogin,\n\t//\t\t\t\"ip\": userlogin.LoginIP,\n\t//\t\t\t\"session\": userlogin.Session,\n\t//\t\t}}\n\t//\n\t//\t\t_, err := coluserlogin.UpdateOne(ctx, filter, update, opts)\n\t//\t\tr.QueryCount++\n\t//\t\tc3mcommon.CheckError(\"Upsert login\", err)\n\t//\t}\n\t//\n\t//}\n\tr.QueryTime += time.Since(start)\n\treturn result\n}", "title": "" }, { "docid": "cbb0828f44bfe8862e8e3f4e036ad053", "score": "0.56456816", "text": "func (p *GitHubProvider) Login(ctx context.Context, state, code string) (*db.UserModel, error) {\n\t// check if the state is one this API sent out.\n\tif _, ok := p.cache.Get(state); !ok {\n\t\treturn nil, ErrStateMismatch\n\t}\n\n\t// Exchange the code for a token, this makes an API call to GitHub.\n\ttoken, err := p.oaconf.Exchange(ctx, code)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"failed to perform OAuth2 token exchange\")\n\t}\n\n\t// Use the token to create a GitHub client and request the user's account.\n\tclient := github.NewClient(oauth2.NewClient(ctx, oauth2.StaticTokenSource(&oauth2.Token{AccessToken: token.AccessToken})))\n\tgithubUser, _, err := client.Users.Get(ctx, \"\")\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"failed to get GitHub user data\")\n\t}\n\n\temail := githubUser.GetEmail()\n\tif email == \"\" {\n\t\t// this should probably never happen!\n\t\treturn nil, errors.New(\"email missing from GitHub account data\")\n\t}\n\n\t// Attempt to find a user via their associated GitHub profile\n\tif usergh, err := p.db.GitHub.FindOne(\n\t\tdb.GitHub.Email.Equals(email),\n\t).With(\n\t\tdb.GitHub.User.Fetch(),\n\t).Exec(ctx); err == nil {\n\t\tu := usergh.User()\n\t\treturn &u, err\n\t}\n\n\t// Check if this request came from a user who was already logged in. If they\n\t// are, get their existing account. If not, create a new account.\n\tvar user db.UserModel\n\tif existing, ok := GetAuthenticationInfoFromContext(ctx); ok && existing.Authenticated {\n\t\tuser, err = p.db.User.FindOne(\n\t\t\tdb.User.ID.Equals(existing.Cookie.UserID),\n\t\t).Exec(ctx)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"failed to find user account\")\n\t\t}\n\t} else {\n\t\t// Create a new account with the authentication method set to \"GitHub\"\n\t\tuser, err = p.db.User.CreateOne(\n\t\t\tdb.User.Email.Set(fmt.Sprint(email)),\n\t\t\tdb.User.AuthMethod.Set(db.AuthMethodGITHUB),\n\t\t\tdb.User.Name.Set(githubUser.GetLogin()),\n\t\t).Exec(ctx)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"failed to create user account\")\n\t\t}\n\t}\n\n\t// Create their GitHub record and link it to the newly created user account\n\t_, err = p.db.GitHub.CreateOne(\n\t\tdb.GitHub.User.Link(db.User.ID.Equals(user.ID)),\n\t\tdb.GitHub.AccountID.Set(fmt.Sprint(githubUser.GetID())),\n\t\tdb.GitHub.Username.Set(githubUser.GetLogin()),\n\t\tdb.GitHub.Email.Set(email),\n\t).Exec(ctx)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"failed to create user GitHub relationship\")\n\t}\n\n\tif err := p.mw.Enqueue(\n\t\tgithubUser.GetName(),\n\t\tgithubUser.GetEmail(),\n\t\t\"Welcome to open.mp!\",\n\t\tmailreg.TemplateID(\"welcome\"),\n\t\tstruct{}{},\n\t); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &user, nil\n}", "title": "" }, { "docid": "766c6e430dab200515a11c13753350cd", "score": "0.5644525", "text": "func (istruct *UserInfrastructure) GetSingleByToken(token string) (models.User, error) {\n\tif isDbUpdated(istruct.rows, istruct.lastUpdate) {\n\t\tfor _, user := range istruct.userDb {\n\t\t\tif token == user.Token.String {\n\t\t\t\treturn user, nil\n\t\t\t}\n\t\t}\n\t\treturn models.User{}, fmt.Errorf(\"User with given token not found\")\n\t}\n\n\tdb, err := openDb()\n\tif err != nil {\n\t\treturn models.User{}, err\n\t}\n\tdefer db.Close()\n\n\tstatement, err := db.Prepare(fmt.Sprintf(\"SELECT * FROM %s WHERE token = ?;\", istruct.tableName))\n\tif err != nil {\n\t\treturn models.User{}, err\n\t}\n\tdefer statement.Close()\n\n\trow := statement.QueryRow(token)\n\n\tvar user models.User\n\terr = row.Scan(&user.ID, &user.Token, &user.User, &user.Password, &user.Name, &user.Surname, &user.Email, &user.Phone, &user.Level)\n\tif err == nil {\n\t\treturn user, nil\n\t}\n\treturn models.User{}, err\n}", "title": "" }, { "docid": "43cd0b0ae52f96622923832f7a0955b1", "score": "0.5643977", "text": "func (su *SrvUsers) GetOne(id string) (*model.User, error) {\n\tvar user model.User\n\terr := su.DB.One(\"Email\", id, &user)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"coul not find user %s: %v\", id, err)\n\t}\n\treturn &user, nil\n}", "title": "" }, { "docid": "99c6de4873f15505a4d4d6ef1e1bfd5a", "score": "0.5636201", "text": "func Login(r *http.Request,ctx *Params, username, password string) (u *User, err error) {\n\n c := appengine.NewContext(r)\n q := datastore.NewQuery(\"User\").Ancestor(userbookKey(c)).Filter(\"Username =\", username).Limit(1)\n users := make([]User, 0, 2)\n _, err = q.GetAll(c, &users)\n //err = ctx.C(\"users\").Find(bson.M{\"username\": username}).One(&u)\n if err != nil {\n return nil, err\n }\n // query done without problems\n if len(users) < 1 {\n //return nil, errors.New(\"Incorrect Username or password.\")\n return nil, errors.New(\"Username not found!\")\n }\n //retreives something, now check\n\n u = &User { \n Username : users[0].Username,\n Password: users[0].Password,\n }\n reportValue(\"Login\",u)\n err = bcrypt.CompareHashAndPassword(u.Password, []byte(password))\n \n if err != nil {\n return nil, errors.New(\"Password not found!\")\n }\n return\n}", "title": "" }, { "docid": "02f822e8485adbc619f8b519f59bbdef", "score": "0.5630031", "text": "func (o *OneLogin) Get_Token()(*OneLogin_Token, error) {\n if o.Token == nil {\n o.Token = &OneLogin_Token{\n Endpoint : o.GetUrl(\"\"),\n Client_id : o.Client_id,\n Client_secret: o.Client_secret,\n }\n err := o.Token.Get() ; if err != nil {\n return nil, ErrorOcurred(err)\n }\n }\n\n logger.Debugf(\"Token: %s\", o.Token)\n return o.Token, nil\n}", "title": "" }, { "docid": "b5dd7e0a1abc6a7f0f587e894c864543", "score": "0.56245375", "text": "func (m *DatabaseService) FindOrCreate(username string, password string, email string, isAdmin bool) error {\n\tvar user db.User\n\tif config.Config.IsUnitTest {\n\t\treturn mockFindOrCreate(username, password, email, isAdmin)\n\t}\n\terr := m.getUserCollection().Find(bson.M{\"username\": username}).One(&user)\n\tif err != nil {\n\t\tuser.Id = bson.NewObjectId()\n\t\tuser.Username = username\n\t\tuser.Password = password\n\t\tuser.Email = email\n\t\tuser.Verified = true\n\t\tif isAdmin {\n\t\t\tuser.Admin = true\n\t\t} else {\n\t\t\tuser.Admin = false\n\t\t}\n\t\terr := m.getUserCollection().Insert(&user)\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ac0a7044253f363c834c53d3df23c5dc", "score": "0.5617069", "text": "func login(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tvar result database.User\n\tvar user logn\n\tbody, _ := ioutil.ReadAll(r.Body)\n\terr := json.Unmarshal(body, &user)\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tw.Write([]byte(`{\"error\": \"body not parsed\"}`))\n\t\treturn\n\t}\n\tok := database.Findfromuserdb(cl, user.Email, user.Pass)\n\tif ok {\n\t\tu := database.Finddb(cl, user.Email)\n\t\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, jwt.MapClaims{\n\t\t\t\"name\": u.Name,\n\t\t\t\"email\": u.Email,\n\t\t})\n\n\t\ttokenString, err := token.SignedString([]byte(\"secret\"))\n\n\t\tif err != nil {\n\t\t\tw.WriteHeader(http.StatusBadRequest)\n\t\t\tw.Write([]byte(`{\"error\": \"error in token string\"}`))\n\t\t\treturn\n\t\t}\n\t\tresult.Token = tokenString\n\t\tresult.PasswordHash = \"\"\n\t\ttkn := database.UpdateToken(cl, u.Email, tokenString)\n\t\tif tkn {\n\t\t\tjson.NewEncoder(w).Encode(result)\n\t\t\tw.WriteHeader(http.StatusCreated)\n\t\t\tw.Write([]byte(`{\"success\": \"created token successfully\"}`))\n\t\t\treturn\n\t\t}\n\t}\n\tw.WriteHeader(http.StatusNotFound)\n\tw.Write([]byte(`{\"error\": \"not created\"}`))\n}", "title": "" }, { "docid": "148e96272605fc09d67ec35d00891d4a", "score": "0.5615882", "text": "func FindOneUser(username string) (types.User, error) {\n\n\tfilter := bson.M{\"username\": username}\n\n\tvar result types.User\n\n\tif err := noteBoxDB.Collection(\"users\").FindOne(context.TODO(), filter).Decode(&result); err != nil {\n\t\treturn result, err\n\t}\n\n\treturn result, nil\n}", "title": "" }, { "docid": "399f48bc614b2a7d3c6a46c53f4d25d4", "score": "0.5611032", "text": "func FindUser(c *gin.Context) {\n\tdb := c.MustGet(\"db\").(*gorm.DB)\n\n\t// Get model if exist\n\tvar User models.User\n\tif err := db.Where(\"id = ?\", c.PostForm(\"id\")).First(&User).Error; err != nil {\n\t\tc.JSON(http.StatusBadRequest, gin.H{\"error\": \"Record not found!\"})\n\t\treturn\n\t}\n\n\tc.JSON(http.StatusOK, User)\n}", "title": "" }, { "docid": "36e6e160df6b30edf108281e0548aede", "score": "0.5603214", "text": "func (s *JSONModelStore) FindOne(q *JSONModelQuery) (*JSONModel, error) {\n\tq.Limit(1)\n\tq.Offset(0)\n\trs, err := s.Find(q)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif !rs.Next() {\n\t\treturn nil, kallax.ErrNotFound\n\t}\n\n\trecord, err := rs.Get()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif err := rs.Close(); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn record, nil\n}", "title": "" }, { "docid": "9ec64a153d6fd4cf09151b062525aa27", "score": "0.560281", "text": "func Login(w http.ResponseWriter, r *http.Request) {\n\tctx, _ := context.WithTimeout(context.Background(), 10*time.Second)\n\n\tvar u User\n\tdecodeError := json.NewDecoder(r.Body).Decode(&u)\n\tif decodeError != nil {\n\t\tlog.Fatal(decodeError)\n\t\thttp.Error(w, decodeError.Error(), http.StatusBadRequest)\n\t}\n\n\tvar retrievedUser User\n\n\tfindError := UsersCollection.FindOne(ctx, bson.M{\"username\": u.Username}).Decode(&retrievedUser)\n\n\tif findError != nil {\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tloginIsValid := comparePassword(retrievedUser.Password, u.Password)\n\n\tif loginIsValid {\n\t\ttokenString := utils.GetJwt()\n\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.Write([]byte(tokenString))\n\t} else {\n\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "ea803448cf3a27a7721f79d4358deb16", "score": "0.5587387", "text": "func (fn *usersServiceRedis) FindOne(ctx *fiber.Ctx) (response *redis.StringCmd) {\n\tresponse = database.Redis.Get(ctx.Context(), \"keys\")\n\treturn\n}", "title": "" }, { "docid": "fb31e2f921bab81f474d72723ffb0b2e", "score": "0.5586479", "text": "func OneUser(cl *mongo.Collection, id primitive.ObjectID) User {\n\t//initialize the model to decoded the mongo data\n\tuser := User{}\n\t//creates a context with a timeout of 3 seconds\n\tctx, cancel := context.WithTimeout(context.Background(), 3*time.Second)\n\t//cancel de ctx, all jobs done\n\tdefer cancel()\n\t//gets the patient related to id and decode to the pointe patient model\n\terr := cl.FindOne(ctx, bson.M{\"_id\": id}).Decode(&user)\n\tif err != nil {\n\t\tcancel()\n\t\treturn user\n\t}\n\t//returns the patient\n\treturn user\n}", "title": "" }, { "docid": "c5d7aa7593909a3a1cf805fadcbb3d70", "score": "0.5554998", "text": "func (customer *CustomerRepository) FindOne(query bson.M) (*Customer, error) {\n\tvar cus Customer\n\n\tctx, cancel := initContext()\n\tdefer cancel()\n\n\tif err := customer.collection.FindOne(ctx, query).Decode(&cus); err != nil {\n\t\treturn nil, err\n\t}\n\treturn &cus, nil\n}", "title": "" }, { "docid": "a1943acb3208c73b741a4d439d940167", "score": "0.55526376", "text": "func (auth *AuthService) Login(email, pass string) (*domain.User, error) {\n\tvar authUser *domain.User\n\tuser, err := auth.UserReader.FindByEmail(email)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif CompareHash(pass, user.Password) {\n\t\tauthUser, err = auth.UserReader.FindByID(user.ID)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tauthUser.Token = GenerateToken(*authUser)\n\t} else {\n\t\terr = errors.New(\"hash not equal\")\n\t\treturn nil, err\n\t}\n\n\treturn authUser, nil\n\n}", "title": "" }, { "docid": "6eac9f14b44f74dfaaecc22ac374934e", "score": "0.55498993", "text": "func Login(db *gorp.DbMap, email string, password string) (user *models.User, err error) {\n\terr = db.SelectOne(&user, \"select * from users where Email=:Email\",\n\t\tmap[string]interface{}{\n\t\t\t\"Email\": email,\n\t\t})\n\tif err != nil {\n\t\tlog.Errorf(\"Failed to find user\")\n\t\treturn nil, err\n\t}\n\n\terr = bcrypt.CompareHashAndPassword(user.PasswordHash, []byte(password))\n\tif err != nil {\n\t\tlog.Info(\"Password hash did not match\")\n\t\treturn nil, err\n\t}\n\treturn user, nil\n}", "title": "" }, { "docid": "07d10d5ea1ea371b9428c380f5f19b3d", "score": "0.5547552", "text": "func (a *AuthKeeper) Login(mongoSession *mgo.Session, r *LoginRequest,\n) (*LoginResponse, error) {\n\tuser, err := a.Users.FindOneByEmail(mongoSession, r.Email)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif err := user.Authenticate(r.Code); err != nil {\n\t\treturn nil, err\n\t}\n\n\tuser.LogIn()\n\tif err := a.Users.UpdateDoc(mongoSession, user); err != nil {\n\t\treturn nil, err\n\t}\n\n\t_, tokenString, err := a.JWTAuth.Encode(\n\t\tjwtauth.Claims{\"sub\": user.ID.Hex(), \"exp\": time.Now().Add(exp).Unix()},\n\t)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &LoginResponse{AuthToken: tokenString}, nil\n}", "title": "" }, { "docid": "55a5d74356613a408b4af403cadad818", "score": "0.55424446", "text": "func Login(w http.ResponseWriter, r *http.Request) *Error.Exception {\n\tinput := loginInput{}\n\n\terr := json.NewDecoder(r.Body).Decode(&input)\n\tif err != nil {\n\t\treturn &Error.Exception{\n\t\t\tCode: 400,\n\t\t\tMessage: \"Invalid JSON schema\",\n\t\t\tReason: \"INVALID_JSON_SCHEMA\",\n\t\t}\n\t}\n\n\texistingUsers := []Person{}\n\tuserRepository.Where(\"email = ?\", input.Email).Find(&existingUsers)\n\n\tif len(existingUsers) == 0 {\n\t\treturn &Error.Exception{\n\t\t\tCode: 400,\n\t\t\tMessage: \"Invalid username\",\n\t\t\tReason: \"INVALID_USERNAME\",\n\t\t}\n\t}\n\n\texistingUser := existingUsers[0]\n\n\tif input.Password != existingUser.Password {\n\t\treturn &Error.Exception{\n\t\t\tCode: 400,\n\t\t\tMessage: \"Invalid Password\",\n\t\t\tReason: \"INVALID_PASSWORD\",\n\t\t}\n\t}\n\n\tauthModule := authentication.AuthModule{}\n\n\tauthToken, catch := authModule.Create(existingUser.Model.ID, \"user\")\n\n\tif catch != nil {\n\t\treturn &Error.Exception{\n\t\t\tCode: 400,\n\t\t\tMessage: \"Error while token creation\",\n\t\t\tReason: \"ERROR_TOKEN_CREATION\",\n\t\t}\n\t}\n\n\tresp := loginResponse{\n\t\tMessage: \"Logged in successfully\",\n\t\tToken: authToken,\n\t\tID: existingUser.Model.ID,\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusOK)\n\tjson.NewEncoder(w).Encode(resp)\n\treturn nil\n}", "title": "" }, { "docid": "76778850ee37ac59087049850d7fa40f", "score": "0.5541997", "text": "func Login(requestUser *model.LoginInfo) (*model.Profile, error) {\n\tauthBackend, err := authentication.GetJWTAuthenticationBackend()\n\tif err != nil {\n\t\tlog.Println(err)\n\t\treturn nil, err\n\t}\n\n\tuser, err := authBackend.Authenticate(requestUser)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\treturn nil, err\n\t}\n\n\ttoken, err := authBackend.GenerateToken(user.Email)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\treturn nil, err\n\t}\n\n\treturn &model.Profile{user.Name, user.Email, user.RoleValue, token}, nil\n}", "title": "" }, { "docid": "1265d0112392a4e03ef96342ea017aa3", "score": "0.5534773", "text": "func (u UserRepository) Login(email, password string) (models.User, error) {\n\tvar user models.User\n\n\tif resp := u.db.DB.First(&user, \"email = ?\", email).Error; resp != nil {\n\t\tnotFound := errors.New(\"email not found\")\n\t\treturn user, notFound\n\t}\n\n\tif err := bcrypt.CompareHashAndPassword([]byte(user.Password), []byte(password)); err != nil {\n\t\tinvalidPassword := errors.New(\"invalid password\")\n\t\treturn user, invalidPassword\n\t}\n\treturn user, nil\n\n}", "title": "" }, { "docid": "e79c7cbec9f6604963725f4a3e431afd", "score": "0.5532118", "text": "func Login(service *services.Service, email string, password string) (*userModel.Profile, error) {\n\tlog.Startedf(service.UserID, \"Login\", \"email[%s]\", email)\n\n\tvar user userModel.User\n\tf := func(collection *mgo.Collection) error {\n\t\tqueryMap := bson.M{\"email\": email, \"password\": password}\n\n\t\tlog.Trace(service.UserID, \"Login\", \"MGO : db.%s.find(%s,{\\\"profile\\\": 1}).limit(1)\", Config.Collection, mongo.ToString(queryMap))\n\t\treturn collection.Find(queryMap).Select(bson.M{\"profile\": 1}).One(&user)\n\t}\n\n\tif err := service.DBAction(Config.Database, Config.Collection, f); err != nil {\n\t\tif err != mgo.ErrNotFound {\n\t\t\tlog.CompletedError(err, \"Login\", \"Database find failed\")\n\t\t} else {\n\t\t\tlog.CompletedError(err, \"Login\", \"User not found!\")\n\t\t}\n\t\treturn nil, err\n\t}\n\n\tlog.Completedf(service.UserID, \"Login\", \"user profile: %+v\", &user.Profile)\n\treturn &user.Profile, nil\n}", "title": "" }, { "docid": "d98702faba5986f77b1b576b9cf9a00a", "score": "0.5531531", "text": "func LoginUser(user *User) (User, string, error) {\n\tvar dbUser User\n\tjwtSecretByte := []byte(os.Getenv(\"JWT_SECRET\"))\n\texpiresAt := time.Now().Add(1200 * time.Minute)\n\tif err := config.DB.Model(&user).Where(&User{Email: user.Email}).First(&dbUser).Error; err != nil {\n\t\treturn User{}, \"\", err\n\t}\n\t//compare db password hash and password provided\n\tresp := security.VerifyHash([]byte(dbUser.Password), []byte(user.Password))\n\tif !resp {\n\t\treturn User{}, \"\", nil\n\t}\n\tclaims := &security.Claims{\n\t\tUserID: user.ID,\n\t\tIsAdmin: user.IsAdmin,\n\t\tStandardClaims: jwt.StandardClaims{\n\t\t\t// In JWT, the expiry time is expressed as unix milliseconds\n\t\t\tExpiresAt: expiresAt.Unix(),\n\t\t},\n\t}\n\t// Declare the token with the algorithm used for signing, and the claims\n\ttokens := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\n\t// Create the JWT string\n\ttokenString, errs := tokens.SignedString(jwtSecretByte)\n\tif errs != nil {\n\t\treturn User{}, \"\", errs\n\t}\n\treturn dbUser, tokenString, nil\n\n}", "title": "" }, { "docid": "f535b90563241ae852c7fa32c99eed49", "score": "0.5531333", "text": "func Authenticate(email string, password string) interface{} {\n\tuser := database.User{}\n\n\tif err := database.Db.Where(&database.User{Email: email}).First(&user).Error; err != nil {\n\t\treturn nil\n\t}\n\n\tif !isPasswordValid(password, user.Password) {\n\t\treturn nil\n\t}\n\n\treturn user.ID\n}", "title": "" }, { "docid": "24c19410b9ecda394ba2e69a894b5699", "score": "0.55277365", "text": "func FindFirstUserForAccountID(db *apsql.DB, accountID int64) (*User, error) {\n\tuser := User{}\n\terr := db.Get(&user,\n\t\t`SELECT id, name, email, admin, confirmed, last_login FROM users\n\t\t WHERE account_id = ? ORDER BY id LIMIT 1;`,\n\t\taccountID)\n\treturn &user, err\n}", "title": "" }, { "docid": "4a9d26a18cc2e0f6778282630b7497d4", "score": "0.5522533", "text": "func (service *AuthService) Login(username string, password string) (model.User, string, error) {\n\tuser := service.delegate.Login(username, password)\n\tif user == nil {\n\t\tservice.userDAO.DeactivateIfExists(user.Username)\n\t\treturn model.User{}, \"\", errors.New(\"Bad credentials\")\n\t}\n\tuserData, err := service.userDAO.GetOrCreateUser(*user)\n\tif err != nil {\n\t\tfmt.Println(\"error getting/creating user:\", err)\n\t\treturn model.User{}, \"\", err\n\t}\n\tfmt.Println(\"Got userId\", userData.UserId)\n\ttoken, err := generateToken(userData.UserId, service.key)\n\tif err != nil {\n\t\tfmt.Println(\"error generating token:\", err)\n\t\treturn model.User{}, \"\", err\n\t}\n\treturn userData, token, nil\n}", "title": "" }, { "docid": "e933fd2c88c21e41f7e880d0585c786c", "score": "0.5519533", "text": "func GetFirstUser(checkVerified bool) (*models.User, error) {\n\tvar user models.User\n\tres := db.Get().First(&user)\n\tif checkVerified && res.Error == nil && !user.Verified && time.Duration((time.Now().Unix()-user.CreatedAt.Unix()))-3600*configuration.GetResp().Token.ExpiryTime.ValidationToken > 0 {\n\t\tif err := DeleteUser(&user); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, gorm.ErrRecordNotFound\n\t}\n\treturn &user, res.Error\n}", "title": "" }, { "docid": "179218e7ac2b30d50d0b026f6db3537c", "score": "0.55116415", "text": "func (userRepositoryImpl UserRepositoryImpl) Login(ctx context.Context, user models.UserLoginRequest) (userData models.User, err error) {\n\tdbConn := userRepositoryImpl.dbConn\n\terr = dbConn.Where(\"email=?\", user.Email).First(&userData).Error\n\tif err != nil {\n\t\treturn userData, errors.New(\"Invalid login details\")\n\t}\n\treturn userData, nil\n\n}", "title": "" }, { "docid": "f112a3b65fdbb2d5616a022e712c4687", "score": "0.54942596", "text": "func GetOneUser(id int) (models.User, error) {\n\tvar user models.User\n\tif err := config.DB.Find(&user, \"id=?\", id).Error; err != nil {\n\t\treturn user, err\n\t}\n\treturn user, nil\n}", "title": "" }, { "docid": "d8d7303728edc0dee6b722c67279b01e", "score": "0.54853123", "text": "func DeviceLoginHandler(w http.ResponseWriter, r *http.Request) {\n var devClaims DevClaims\n json.NewDecoder(r.Body).Decode(&devClaims)\n email_tbl := strings.Replace(devClaims.Email,\"@\",\"_\",-1)\n email_tbl = strings.Replace(email_tbl,\".\",\"_\",-1)\n hash, err := devEnv.db.GetDevPwd(\"devices_\"+email_tbl, devClaims.DevName)\n if err != nil {\n log.Println(err)\n }\n match := CheckPasswordHash(devClaims.Pwd, hash)\n // Create token, TODO :check user policies\n if match == true {\n token := jwt.NewWithClaims(jwt.SigningMethodHS256, jwt.MapClaims{\n \"email\": devClaims.Email,\n \"devName\": devClaims.DevName,\n \"pwd\": devClaims.Pwd,\n })\n tokenString, err := token.SignedString([]byte(jwtPassword)) // TODO : replace in production through init \n if err != nil {\n log.Println(err)\n }\n json.NewEncoder(w).Encode(JWToken{Token: tokenString})\n }\n}", "title": "" }, { "docid": "f9f46ceb5884ffcd243e53e2bcfea3a7", "score": "0.54825634", "text": "func (o *JWT) GetUser(token, password, clientid string) (bool, error) {\n\treturn o.checker.GetUser(token)\n}", "title": "" }, { "docid": "d7669a9f6171c566104435415c29f2eb", "score": "0.54769444", "text": "func AuthLogin(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\n\tvar user models.User\n\n\tdecoder := json.NewDecoder(r.Body)\n\n\terr := decoder.Decode(&user)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\t// create a cookie\n\tfound, record := user.FindUser()\n\n\tif found {\n\t\tw.WriteHeader(http.StatusOK)\n\t\tjson.NewEncoder(w).Encode(&record)\n\t}\n\n\tw.WriteHeader(http.StatusNotFound)\n\tjson.NewEncoder(w).Encode(nil)\n\t// set cookie\n}", "title": "" }, { "docid": "466a4ca8d04cf88e8089150e85fed13f", "score": "0.54763407", "text": "func (user *User) ReadOne() {\n\tdb := GetDB()\n\tif err := db.First(user).Error; err != nil {\n\t\tlog.Fatal(err)\n\t}\n}", "title": "" }, { "docid": "dd49e187a8b7a40d9fc0da284610f417", "score": "0.54719144", "text": "func (userApi *UserApi) FindByID(c *gin.Context) {\n\tid, err := strconv.Atoi(c.Param(\"id\"))\n\tif err != nil {\n\t\tc.JSON(http.StatusInternalServerError, gin.H{\"message\": err})\n\t\treturn\n\t}\n\tuser, err := userApi.userService.GetByID(id)\n\tif err != nil {\n\t\tc.JSON(http.StatusNotFound, gin.H{\"message\": err.Error()})\n\t\treturn\n\t}\n\tc.JSON(http.StatusOK, gin.H{\"user\": user})\n}", "title": "" }, { "docid": "ff142dd2f7b38a5afb627aca6aa48e2d", "score": "0.5464944", "text": "func (s *service) Login(username string, password string) (string, error) {\n\tuser, err := s.userService.FindUserByUsernameAndPassword(username, password)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tclaims := jwt.MapClaims{}\n\tclaims[\"authorized\"] = true\n\tclaims[\"id\"] = user.ID\n\tclaims[\"exp\"] = time.Now().Add(time.Hour * 1).Unix() //Token expires after 1 hour\n\tclaims[\"name\"] = user.Firstname\n\tclaims[\"role\"] = user.Role\n\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\n\n\treturn token.SignedString([]byte(os.Getenv(\"JWT_SECRET\")))\n}", "title": "" }, { "docid": "5a10e79b29b2d6a280dad57357c759db", "score": "0.54631877", "text": "func (this *UserService) CreateOne(request *mrequest.UserCreate) (*models.User, *mresponse.ErrorResponse) {\n\n\t// validate request\n\te := errors.ValidateRequest(request)\n\tif e != nil {\n\t\treturn nil, e\n\t}\n\n\tres, err := this.userRepository.CreateOne(request)\n\n\tif err != nil {\n\t\terrR := errors.HandleErrorResponse(errors.SERVICE_UNAVAILABLE, nil, err.Error())\n\t\treturn nil, errR\n\t}\n\n\tid := res.InsertedID.(objectid.ObjectID)\n\tu := models.User{\n\t\tID: id.Hex(),\n\t\tUsername: request.Username,\n\t\tEmail: request.Email,\n\t}\n\n\tu.Roles = make([]*models.Role, len(request.Roles))\n\tcopy(u.Roles, request.Roles)\n\n\treturn &u, nil\n}", "title": "" }, { "docid": "6bfce91ea574ec583fd987d9a0a6a6c7", "score": "0.5457394", "text": "func AuthCreate(c buffalo.Context) error {\n\tuser := &models.User{}\n\tcurrentUser := &models.User{}\n\tif err := c.Bind(user); err != nil {\n\t\treturn errors.WithStack(err)\n\t}\n\n\ttx, ok := c.Value(\"tx\").(*pop.Connection)\n\tif !ok {\n\t\treturn errors.WithStack(errors.New(\"No Transection found\"))\n\t}\n\n\t// find a user with the email\n\terr := tx.Eager().Where(\"email = ?\", strings.ToLower(user.Email)).Order(\"created_at desc\").First(currentUser)\n\n\t// helper func to handle bad attemts\n\tbad := func() error {\n\t\tc.Set(\"currentUser\", currentUser)\n\t\tverrs := validate.NewErrors()\n\t\tverrs.Add(\"email\", \"invalid email/password\")\n\t\treturn c.Render(433, r.JSON(verrs))\n\t}\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\t// couldn't find an user with the supplied emaiil address\n\t\t\treturn bad()\n\t\t}\n\t\treturn errors.WithStack(err)\n\t}\n\n\t// confirm that the given password matches the hashed password from the db\n\tif err = bcrypt.CompareHashAndPassword([]byte(currentUser.PasswordHash), []byte(user.Password)); err != nil {\n\t\treturn bad()\n\t}\n\tclaims := struct {\n\t\tFirstName string `json:\"first_name\"`\n\t\tjwt.StandardClaims\n\t}{\n\t\tFirstName: currentUser.FirstName,\n\t\tStandardClaims: jwt.StandardClaims{\n\t\t\tExpiresAt: time.Now().Add(oneWeek()).Unix(),\n\t\t\tIssuer: fmt.Sprintf(\"%s.api.ocm-key.it\", envy.Get(\"GO_ENV\", \"development\")),\n\t\t\tId: currentUser.ID.String(),\n\t\t},\n\t}\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\n\n\tsigningKey := []byte(envy.Get(\"JWT_SECRET\", \"secret\"))\n\t// signingKey, err := ioutil.ReadFile(envy.Get(\"JWT_SECRET\", \"../ocm-key-ecdsa.key\"))\n\t// if err != nil {\n\t// \treturn fmt.Errorf(\"could not open jwt key, %v\", err)\n\t// }\n\ttokenString, err := token.SignedString(signingKey)\n\n\tif err != nil {\n\t\treturn fmt.Errorf(\"could not sign token, %v\", err)\n\t}\n\n\treturn c.Render(http.StatusOK, r.JSON(map[string]interface{}{\"token\": tokenString, \"current_user\": currentUser}))\n}", "title": "" }, { "docid": "9561deee80af7b3e3b59506ff0353741", "score": "0.5456337", "text": "func UserLogin(w http.ResponseWriter, r *http.Request) {\n\tuser := models.User{}\n\terr := json.NewDecoder(r.Body).Decode(&user)\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n\n\tlog.Println(user)\n\tlog.Printf(\"%+v\", user)\n\n\tuser2, err := user.Get(config.Get(), user.Email)\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n\n\terr = bcrypt.CompareHashAndPassword(user2.Password, []byte(user.P))\n\tif err != nil {\n\t\tlog.Println(err)\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\tjson.NewEncoder(w).Encode(messages.ErrWrongPassword)\n\t}\n\tuser.P = \"\"\n\n\tresponse, err := GenerateJWT(user2)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tjson.NewEncoder(w).Encode(messages.ErrInternalServer)\n\t\treturn\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusOK)\n\tjson.NewEncoder(w).Encode(response)\n}", "title": "" }, { "docid": "c041a78d5df0f2735ed5e87869254639", "score": "0.5452792", "text": "func (s UserRepository) Find(id string) (*models.User, int, error) {\n\n\terr := s.db.DB.Set(\"gorm:auto_preload\", true).Where(library.GetBusiness()).Where(\"id = ?\", id).First(&s.obj).Error\n\n\tif err != nil {\n\t\tlogrus.Error(err)\n\t\ts.r.StatusCode = http.StatusInternalServerError\n\t\treturn nil, s.r.StatusCode, err\n\t}\n\n\treturn &s.obj, s.r.StatusCode, nil\n}", "title": "" }, { "docid": "f83771a5f557dde904d6e46b88fca2a5", "score": "0.5449985", "text": "func (storage *MongoStorage) FindAccount(name string) (*Account, error) {\n\tvar account Account\n\terr := storage.accounts().FindId(name).One(&account)\n\tif err == mgo.ErrNotFound {\n\t\treturn nil, nil\n\t}\n\treturn &account, err\n}", "title": "" }, { "docid": "d59953828dd20f532f3163fb5da60f28", "score": "0.5448818", "text": "func (uc UserController) GetOne(c echo.Context) error {\n\t// your solution here\n\tid, err := strconv.Atoi(c.Param(\"id\"))\n\tif err != nil {\n\t\treturn c.String(http.StatusBadRequest, \"invalid id\")\n\t}\n\tuser, err := uc.model.GetOne(id)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif user.ID == 0 {\n\t\treturn c.String(http.StatusNotFound, \"id not found\")\n\t}\n\treturn c.JSON(http.StatusOK, user)\n}", "title": "" }, { "docid": "af7fcd5abeaac558b972d827eab8bcee", "score": "0.54449975", "text": "func (s *UsersService) Login(request dto.LoginRequest) (*dto.User, *errors.RestError) {\n\tuser := &dto.User{\n\t\tEmail: request.Email,\n\t\tPassword: crypto.GetMD5(request.Password),\n\t}\n\tif err := s.userDao.FindByEmailAndPassword(user); err != nil {\n\t\treturn nil, err\n\t}\n\treturn user, nil\n}", "title": "" }, { "docid": "e79b5d1f4ec6d696043a5a86cf222ab2", "score": "0.54404885", "text": "func (u *UserRepository) FindByID(ctx context.Context, id string) (*domain.User, error) {\n\tdomainUser := domain.User{ID: id}\n\tuserMongo := mongoUser(&domainUser)\n\t// now := time.Now().Unix()\n\n\tres := u.userCollection.FindOne(ctx, userMongo)\n\n\terr := res.Decode(&userMongo)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfmt.Println(userMongo.ID.Hex())\n\treturn userMongo.Domain(), nil\n}", "title": "" }, { "docid": "2b73548abd7c5235c62b3d91a572b6ca", "score": "0.5435033", "text": "func (user User) Login(db *gorm.DB) (User, error) {\n\tpassword := user.Password\n\tuser, err := user.GetByEmail(db)\n\tif err != nil {\n\t\treturn user, err\n\t}\n\tif !CompareHash(user.Digest, password) {\n\t\treturn user, errors.New(\"wrong username or password\")\n\t}\n\treturn user, nil\n}", "title": "" }, { "docid": "5202e6cbeef6680913f8315be1f8bdab", "score": "0.5418153", "text": "func (h *dbHelper) findOne(config DBConfig, query, selector, result interface{}) {\n\tsession, c := connect(config)\n\tdefer session.Close()\n\n\tif err := c.Find(query).Select(selector).One(result); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "ddf2057baa88df9effa16d113bf8bb61", "score": "0.54070723", "text": "func Login(c *fiber.Ctx) error {\n\tvar data map[string]string\n\n\terr := c.BodyParser(&data)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tvar user models.User\n\n\tdatabase.DB.Where(\"email = ?\", data[\"email\"]).First(&user)\n\n\tif user.ID == 0 {\n\t\tc.Status(404)\n\t\treturn c.JSON(fiber.Map{\n\t\t\t\"messgae\": \"User not found.\",\n\t\t})\n\t}\n\n\terr = bcrypt.CompareHashAndPassword(user.Password, []byte(data[\"password\"]))\n\n\tif err != nil {\n\t\tc.Status(400)\n\t\treturn c.JSON(fiber.Map{\n\t\t\t\"messgae\": \"Incorrect password\",\n\t\t})\n\t}\n\n\t// We use userID as the issuer\n\tclaims := jwt.StandardClaims{\n\t\tIssuer: strconv.Itoa(int(user.ID)),\n\t\tExpiresAt: time.Now().Add(time.Hour * 24).Unix(),\n\t}\n\n\tsigned := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\n\n\ttoken, err := signed.SignedString([]byte(\"mysecretkey\"))\n\n\tif err != nil {\n\t\treturn c.JSON(fiber.Map{\n\t\t\t\"message\": \"Internal Server Error\",\n\t\t})\n\t}\n\n\tcookie := fiber.Cookie{\n\t\tName: \"token\",\n\t\tValue: token,\n\t\tExpires: time.Now().Add(time.Hour * 24),\n\t\tHTTPOnly: true,\n\t}\n\n\tc.Cookie(&cookie)\n\n\t// return c.JSON(user)\n\treturn c.JSON(fiber.Map{\n\t\t\"message\": \"Login successful\",\n\t\t\"token\": token,\n\t})\n}", "title": "" }, { "docid": "4313fa772ff3a0cfcf5c65db6abd573d", "score": "0.54047066", "text": "func (s *Store) FindOneBySubject(ctx context.Context, providerID, subjectID string) (*User, error) {\n\terr := permission.LimitCheckAny(ctx, permission.Admin)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\terr = validate.Many(\n\t\tvalidate.SubjectID(\"ProviderID\", providerID),\n\t\tvalidate.SubjectID(\"SubjectID\", subjectID),\n\t)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\trow := s.findOneBySubject.QueryRowContext(ctx, providerID, subjectID)\n\tvar u User\n\terr = u.scanFrom(row.Scan)\n\tif errors.Is(err, sql.ErrNoRows) {\n\t\treturn nil, nil\n\t}\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &u, nil\n}", "title": "" }, { "docid": "1eaf174866b55841e6104ddee804baeb", "score": "0.5404082", "text": "func findUser(instagramUsername string) (*core.User, error) {\n\tctx, cancel := rpc.DefaultContext()\n\tdefer cancel()\n\n\tres, err := api.UserClient.ReadUser(ctx, &core.ReadUserRequest{\n\t\tInstagramUsername: instagramUsername,\n\t})\n\n\tif res == nil {\n\t\treturn nil, err\n\t}\n\treturn res.User, err\n}", "title": "" }, { "docid": "d70b631e0b632adac27824da05336463", "score": "0.5402185", "text": "func (c *Controller) Login(w http.ResponseWriter, r *http.Request) {\n\tloginUser := new(model.LoginUser)\n\terr := json.NewDecoder(r.Body).Decode(loginUser)\n\tif err != nil {\n\t\tlog.Printf(\"error while trying to marshal user %v\\n\", err)\n\t\terrMsg := util.NewBadRequest(\"not a valid login credentials\")\n\t\tutil.ResponseError(w, errMsg)\n\t\treturn\n\t}\n\tuser, errMsg := c.service.GetUser(loginUser)\n\tif errMsg != nil {\n\t\tlog.Println(errMsg)\n\t\tutil.ResponseError(w, errMsg)\n\t\treturn\n\t}\n\tisValid, err := util.ComparePassword(user.Password, loginUser.Password)\n\tif err != nil || !isValid {\n\t\tlog.Println(\"not valid password\", err)\n\t\terrMsg := util.NewAuthenticationError(\"not a valid password\")\n\t\tutil.ResponseError(w, errMsg)\n\t\treturn\n\t}\n\tsessionId := uuid.New().String()\n\ttoken, err := util.GenerateToken(\"secret\", sessionId, user.Email)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\terrMsg := util.NewInternalServerError(\"error while generating token\")\n\t\tutil.ResponseError(w, errMsg)\n\t\treturn\n\t}\n\n\tcookie := http.Cookie{\n\t\tName: \"session-id\",\n\t\tValue: token,\n\t\tHttpOnly: true,\n\t}\n\thttp.SetCookie(w, &cookie)\n\tutil.ResponseJson(w, http.StatusOK, user)\n}", "title": "" }, { "docid": "4305356de88137343a8e95e41e2c1f62", "score": "0.54007155", "text": "func (rs *UserResultSet) One() (*User, error) {\n\tif !rs.Next() {\n\t\treturn nil, kallax.ErrNotFound\n\t}\n\n\trecord, err := rs.Get()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif err := rs.Close(); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn record, nil\n}", "title": "" }, { "docid": "df08870e79cd919c5822b683aeb9726e", "score": "0.5399083", "text": "func TryLogin(suite *ApiTestSuite, json_payload string) (int, string) {\n\t// This is actually setting the router up to handle this and only this request type\n\tsuite.Router.POST(LoginRoute, suite.AuthMiddleware.LoginHandler)\n\n\t// Serve the single request to the router (gin.Engine)\n\tsuite.Router.ServeHTTP(suite.Recorder, GetRequest(http.MethodPost, LoginRoute, json_payload))\n\n\t// Get the response\n\tresp := suite.Recorder.Result()\n\tresp_body, err := ioutil.ReadAll(resp.Body)\n\tassert.Nil(suite.T(), err, \"Response body decoding shoud not return an error.\")\n\n\t// Make sure the content type is set correctly\n\tassert.Equal(suite.T(), ContentTypeJSON, resp.Header.Get(\"Content-Type\"), \"Content-Type in response should be JSON.\")\n\n\t// Store the JWT here\n\tvar token string\n\n\tif resp.StatusCode == 200 {\n\t\tdata := new(datatypes.HttpLoginResponseJSON)\n\t\terr = json.Unmarshal([]byte(resp_body), data)\n\t\tassert.Nil(suite.T(), err, \"Got 200 from login, should be able to unmarshal the response body.\")\n\t\tif err == nil {\n\t\t\ttoken = data.Token\n\t\t}\n\t}\n\n\treturn resp.StatusCode, token\n}", "title": "" }, { "docid": "b1775e1fb5ba41c48c77ece33fd51564", "score": "0.5396044", "text": "func (us *UserService) Login(idToken string) (uint, bool, error) {\n\tinfo, err := us.gauthservice.VerifyIDToken(idToken)\n\tif err != nil {\n\t\treturn uint(0), false, err\n\t}\n\tif !info.VerifiedEmail {\n\t\treturn uint(0), false, ErrEmailNotVerified\n\t}\n\tfname, _ := us.jwtService.GetInfoFromToken(\n\t\tidToken, \"given_name\",\n\t)\n\tlname, _ := us.jwtService.GetInfoFromToken(\n\t\tidToken, \"family_name\",\n\t)\n\tavatar, _ := us.jwtService.GetInfoFromToken(\n\t\tidToken, \"picture\",\n\t)\n\tuser := User{\n\t\tFirstName: fname,\n\t\tEmail: info.Email,\n\t\tGoogleID: info.UserId,\n\t\tLastName: lname,\n\t\tAvatar: avatar,\n\t}\n\tuserExists, err := us.UserExists(&user)\n\tif err != nil {\n\t\treturn uint(0), false, err\n\t}\n\tisNewUser := false\n\tif !userExists {\n\t\tglog.Info(\"User does not exists\")\n\t\t// Creating a new user\n\t\terr := us.Create(&user)\n\t\tif err != nil {\n\t\t\treturn uint(0), false, err\n\t\t}\n\t\tglog.Info(\"New user created for \", user.Email)\n\t\tisNewUser = true\n\t}\n\tglog.Info(\"User login \", user.Email)\n\treturn user.ID, isNewUser, nil\n}", "title": "" }, { "docid": "574b57ef61d2b5c4d7598353ceb83309", "score": "0.539245", "text": "func (c *Client) Login(email, password string) (*User, error) {\n\tparameters := fmt.Sprintf(`{\"email\": \"%s\", \"password\": \"%s\"}`, email, password)\n\tresp, err := c.makeRequest(c.publicURL, http.MethodPost, \"/api/v1/users/login\", []byte(parameters), false)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"error trying to log into CWS API\")\n\t}\n\tdefer closeBody(resp)\n\n\tswitch resp.StatusCode {\n\tcase http.StatusOK:\n\t\tbody, err := ioutil.ReadAll(resp.Body)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"error trying to log into CWS API\")\n\t\t}\n\t\tvar user *User\n\t\terr = json.Unmarshal(body, &user)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"error trying to log into CWS API\")\n\t\t}\n\t\tc.headers[HeaderAuthorization] = fmt.Sprintf(\"%s %s\", AuthorizationBearer, resp.Header.Get(SessionHeader))\n\t\treturn user, nil\n\t}\n\treturn nil, readAPIError(resp)\n}", "title": "" }, { "docid": "40acacc337eabe5e2bc01907b1056b71", "score": "0.538997", "text": "func (c *Collection) FindOne(filter interface{}, opts ...*options.FindOneOptions) *mongo.SingleResult {\r\n\tctx, cancel := context.WithTimeout(context.Background(), c.timeout)\r\n\t//c.mutex.Lock()\r\n\t//defer c.mutex.Unlock()\r\n\tdefer cancel()\r\n\treturn c.coll.FindOne(ctx, filter, opts...)\r\n}", "title": "" }, { "docid": "bd9597e566ae703627e75a2f289b7b07", "score": "0.5377914", "text": "func FindUserById(w http.ResponseWriter, r *http.Request) {\n\n\tpathParameters := mux.Vars(r)\n\tid, error := strconv.ParseUint(pathParameters[\"id\"], 10, 64)\n\tif error != nil {\n\t\tresponses.ErrorResponse(w, http.StatusBadRequest, error)\n\t\treturn\n\t}\n\n\tdb, error := database.Connect()\n\tif error != nil {\n\t\tresponses.ErrorResponse(w, http.StatusInternalServerError, error)\n\t\treturn\n\t}\n\tdefer db.Close()\n\n\trepository := persistence.NewUserRepository(db)\n\tuser, error := repository.GetUserById(id)\n\tif error != nil {\n\t\tresponses.ErrorResponse(w, http.StatusInternalServerError, error)\n\t\treturn\n\t}\n\n\tif user.ID != 0 {\n\t\tresponses.JsonResponse(w, http.StatusOK, user)\n\t} else {\n\t\tresponses.JsonResponse(w, http.StatusNotFound, nil)\n\t}\n\n}", "title": "" }, { "docid": "760d8a68b19cc41119643f94671988e8", "score": "0.5376188", "text": "func (c *Collection) FindOne(ctx context.Context, filter bson.M, result interface{}, opts ...*options.FindOneOptions) error {\n\tif c.fieldsConfig.SoftDeletable() {\n\t\texcludeSoftDeletedItems(c.fieldsConfig.DeleteTimeBsonField, filter)\n\t}\n\treturn c.Collection.FindOne(ctx, filter, opts...).Decode(result)\n}", "title": "" }, { "docid": "aa32285cd3ca53a1648bee8e7f5efd07", "score": "0.53728145", "text": "func (e *Email) FindOne() error {\n\tdbh := db.GetDb()\n\tobjID, _ := primitive.ObjectIDFromHex(e.ID)\n\terr := dbh.Collection.FindOne(*dbh.Ctx, bson.M{\"_id\": objID}).Decode(&e)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "6f9b1c2f15c2055dd9a16929278c0465", "score": "0.5368373", "text": "func (s *UserQueryStrategy) GetOne(id string) (core.Model, error) {\n\tvar u user\n\tu.ID = id\n\tif err := s.DB.Model(&u).WherePK().First(); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &u, nil\n}", "title": "" }, { "docid": "a5112a5fb5a5b736d9133adf4e7b5af9", "score": "0.5366665", "text": "func Login(dbMap *gorp.DbMap, email string, password string) (*models.User, error) {\n\tvar user models.User\n\terr := dbMap.SelectOne(&user, \"SELECT * FROM Users WHERE Email = ?\", email)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\terr = bcrypt.CompareHashAndPassword(user.Password, []byte(password))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &user, err\n}", "title": "" }, { "docid": "46752a58d3d148a8c48813d538382529", "score": "0.5365991", "text": "func (v JWTValidator) GetUser(ctx context.Context) (storage.User, error) {\n\tclaims, err := v.getClaims(ctx)\n\tif err != nil {\n\t\treturn storage.User{}, err\n\t}\n\n\tif claims.Subject != SubjectUser {\n\t\treturn storage.User{}, errors.New(\"subject must be user\")\n\t}\n\n\tif claims.UserID != 0 {\n\t\treturn storage.GetUser(ctx, v.db, claims.UserID)\n\t}\n\n\tif claims.Username != \"\" {\n\t\treturn storage.GetUserByEmail(ctx, v.db, claims.Username)\n\t}\n\n\treturn storage.User{}, errors.New(\"no username or user_id in claims\")\n}", "title": "" }, { "docid": "ef4468f7e26355b134667abbf70fb1d3", "score": "0.5357484", "text": "func (q accountTokenQuery) One() (*AccountToken, error) {\n\to := &AccountToken{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"public: failed to execute a one query for account_token\")\n\t}\n\n\tif err := o.doAfterSelectHooks(queries.GetExecutor(q.Query)); err != nil {\n\t\treturn o, err\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "8dad6bc6333615c846a3d95612ce3c1a", "score": "0.5357088", "text": "func (p *Payment) FindOne(id string, client *Client) (*Payment, error) {\n\tresp, err := client.Get(p.Endpoint() + \"/\" + id)\n\n\tobj, err := sendResp(resp, err, p)\n\treturn obj.(*Payment), err\n}", "title": "" }, { "docid": "d9f80133590873e02052a1356fe69c2e", "score": "0.5357084", "text": "func Login(requestUser *models.User) (int, []byte) {\n\t//Inicializa o backend do JWT\n\tauthBackend := authentication.InitJWTAuthenticationBackend()\n\t//verifica login e senha\n\tif authBackend.Authenticate(requestUser) {\n\t\t//gera o token\n\t\ttoken, err := authBackend.GenerateToken(requestUser.UUID)\n\t\tif err != nil {\n\t\t\treturn http.StatusInternalServerError, []byte(\"\")\n\t\t}\n\t\tresponse, _ := json.Marshal(parameters.TokenAuthentication{token})\n\t\treturn http.StatusOK, response\n\t}\n\n\treturn http.StatusUnauthorized, []byte(\"\")\n}", "title": "" }, { "docid": "4dbcffe640f731d9c174d39e7c6bbd6b", "score": "0.535623", "text": "func Login(w http.ResponseWriter, r *http.Request) {\n\tvar user User\n\terr := json.NewDecoder(r.Body).Decode(&user)\n\tif err != nil {\n\t\tJSONErrorWriter(w, \"Internal Error\", http.StatusNoContent)\n\t\treturn\n\t}\n\n\tif user.UserName == \"\" {\n\t\tJSONErrorWriter(w, \"UserName empty\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tif user.Password == \"\" {\n\t\tJSONErrorWriter(w, \"Password Empty\", http.StatusBadRequest)\n\t\treturn\n\t}\n\tpassword := user.Password\n\tstmt := \"select user_id, password from user_details where username=$1;\"\n\trow := Dbhandler.db.QueryRow(stmt, user.UserName)\n\terr = row.Scan(&user.UserID, &user.Password)\n\tfmt.Println(user)\n\n\tif err != nil {\n\t\tJSONErrorWriter(w, \"User Name not found in database\", http.StatusBadRequest)\n\t\treturn\n\t}\n\terr = bcrypt.CompareHashAndPassword([]byte(user.Password), []byte(password))\n\tif err != nil {\n\t\tJSONErrorWriter(w, \"Password Incorrect\", http.StatusBadRequest)\n\t\treturn\n\t}\n\ttoken, err := Gentoken(user, false)\n\tif err != nil {\n\t\tJSONErrorWriter(w, \"Failed to generate key\", http.StatusInternalServerError)\n\t\treturn\n\t}\n\tvar jwttoken JwtToken\n\tjwttoken.Token = token\n\tw.WriteHeader(http.StatusOK)\n\tjson.NewEncoder(w).Encode(jwttoken)\n\t// cookie := http.Cookie{\n\t// \tName: \"token\",\n\t// \tValue: token,\n\t// \tExpires: time.Now().AddDate(0, 0, 1),\n\t// }\n\t// http.SetCookie(w, &cookie)\n\t// return\n}", "title": "" } ]
834fc02e4cd34cca94d20ed5456f1ec4
/SafeAdd safely add the given message to the list name: the name of the peer newMsg: the new message
[ { "docid": "b3b608148fb6887c344d3e43c6fb306f", "score": "0.72183603", "text": "func (p *SafePast) SafeAdd(name string, newMsg *messages.RumorMessage) {\n\tp.mux.Lock()\n\tp.messagesList[name] = append(p.messagesList[name], newMsg)\n\tp.mux.Unlock()\n}", "title": "" } ]
[ { "docid": "7d95eeff65bb9ec4da1311be4e2f86e8", "score": "0.66223884", "text": "func messageAddNew(msg string) (Message, error) {\n\t//Initialize temp structure to be able to use append function\n\ttmpMessage := Message{}\n\n\tlastId += 1\n\ttmpMessage.Id = lastId\n\ttmpMessage.Message = msg\n\n\tmessages = append(messages, tmpMessage)\n\n\treturn tmpMessage, nil\n}", "title": "" }, { "docid": "881e0ed1395a22fba6383a2f20c684f4", "score": "0.6328166", "text": "func (pmm *PrivateMsgMap) AddMsg(origin string, msg string) {\n\tpmm.Lock()\n\tvalue, _ := pmm.messages[origin]\n\tpmm.messages[origin] = append(value, msg)\n\tpmm.Unlock()\n}", "title": "" }, { "docid": "f303133bd1e5770b05b431c67e3331da", "score": "0.61568767", "text": "func (c *Store) AddMessage(msg *messages.JSONMessage, refresh updateFunc) {\n\tc.Lock.Lock()\n\tdefer c.Lock.Unlock()\n\n\tmessageFrom := msg.From.Fingerprint\n\taddress := fmt.Sprintf(\"%s/%s\", messageFrom, msg.Name)\n\n\texpiry := c.getMessageExpiration(msg)\n\n\tretrieved := time.Now()\n\n\trecord := &MessageRecord{\n\t\tJSONMessage: msg,\n\t\tPublic: msg.Public,\n\t\tUpdater: refresh,\n\t\trecord: record{\n\t\t\tRetrieved: retrieved,\n\t\t\tExpires: expiry,\n\t\t},\n\t}\n\n\t// Update Latest\n\tif retrieved.After(c.Latest) {\n\t\tc.Latest = retrieved\n\t}\n\n\tc.Named[address] = record\n\n\t// Add the message to the public list (for profile viewing) if\n\t// necessary.\n\tif msg.Public {\n\t\tc.Public[messageFrom] = append(c.Public[messageFrom], record)\n\t}\n}", "title": "" }, { "docid": "a72c07eb3bcf75b775e385ae98cfc09a", "score": "0.59284365", "text": "func (p *PlayScreen) AddMessage(msg string) {\n\tp.msgList = append(p.msgList, msg)\n}", "title": "" }, { "docid": "022d76e0822ba006e57df1c51692d232", "score": "0.5850727", "text": "func (p3 *Proto3) AddMessage(name string, fs map[string]Field) {\n\tm := &Message{\n\t\tt: TypeMessage,\n\t\tname: name,\n\t}\n\tvar wire uint64\n\tfor _, f := range fs {\n\t\twire += 1\n\t\tm.AddField(f.types, f.varName, wire)\n\t}\n\tp3.msgs = append(p3.msgs, *m)\n}", "title": "" }, { "docid": "390c36bdbb499e2400e34e44d495044a", "score": "0.5846851", "text": "func (d *Dao) MessageAddSnFile(messageID int64, fileList []string) (message *model.Message, err error) {\n\tvar (\n\t\tchange = mgo.Change{\n\t\t\tUpdate: bson.M{\"$push\": bson.M{\"snfile\": fileList}},\n\t\t\tUpsert: false,\n\t\t\tReturnNew: true,\n\t\t}\n\t)\n\tsession := d.MongoSession.Copy()\n\tdefer session.Close()\n\t_, err = d.GetCollection(session, messageCollection).Find(bson.M{\"_id\": messageID}).Apply(change, &message)\n\treturn message, err\n}", "title": "" }, { "docid": "c8fb0a2ee35a6340000b7a21f8f1b9b0", "score": "0.5820826", "text": "func handleNewMessage(msg *arbor.ProtocolMessage, recents *RecentList, store *arbor.Store, broadcaster *Broadcaster) {\n\terr := msg.ChatMessage.AssignID()\n\tif err != nil {\n\t\tlog.Println(\"Error creating new message\", err)\n\t}\n\trecents.Add(msg.ChatMessage)\n\tstore.Add(msg.ChatMessage)\n\tbroadcaster.Send(msg)\n}", "title": "" }, { "docid": "886df90e1b4b0e66bee288350cf38a31", "score": "0.5746661", "text": "func add_message(uname string, new_message string) (string, bool) {\n\tfilename := uname + \".txt\"\n\tcreate_and_lock(filename) // lock user message file for editing\n\tdefer lock_for_files_map[filename].Unlock()\n\n\tmessage_file, open_err := os.OpenFile(filename, os.O_APPEND|os.O_CREATE|os.O_WRONLY, 0600)\n\tdefer message_file.Close()\n\tif open_err != nil {\n\t\treturn fmt.Sprintf(\"error: Server open error%s\\n\", END_TAG), false\n\t}\n\n\t//write new message to file\n\tnewline := \"\\r\\n\"\n\ttext_to_write := new_message + newline + USER_MESSAGE_SEPERATOR + newline\n\tif _, write_err := message_file.WriteString(text_to_write); write_err != nil {\n\t\treturn fmt.Sprintf(\"error: server failed to write.%s\\n\", END_TAG), false\n\t} else {\n\t\treturn fmt.Sprintf(\"success: added message for %s.%s\\n\", uname, END_TAG), true\n\t}\n\n}", "title": "" }, { "docid": "01bebf1c3e8dce326604ceb16e69e70c", "score": "0.5715099", "text": "func AddMessage(db *sql.DB, senderId int, recipientId int, title string, text string, status int) {\n\tnow := time.Now()\n\tquery := `INSERT INTO private_messages (sender_id, recipient_id, message_title, message_text, message_status, sended_on) VALUES (?, ?, ?, ?, ?, ?)`\n\tdb.Exec(query, senderId, recipientId, title, text, status, now)\n}", "title": "" }, { "docid": "5c492163117b7806bb6fc8edd3ddc5b0", "score": "0.56977427", "text": "func (State *DiscordState) AddMessage(Message *discordgo.Message) {\n\t//Do not add if Amount <= 0\n\tif State.MaxMessages <= 0 {\n\t\treturn\n\t}\n\n\t//Remove First Message if next message is going to increase length past MessageAmount\n\tif len(State.Messages) == State.MaxMessages {\n\t\tState.Messages = append(State.Messages[:0], State.Messages[1:]...)\n\t}\n\n\tState.Messages = append(State.Messages, Message)\n}", "title": "" }, { "docid": "c74b1dc8ac5453db6c3fc4b52953ab77", "score": "0.5685656", "text": "func (m *MessageDB) AddMessage(message model.Message) int {\n\tmaxID := messageList[len(messageList)-1].ID\n\tmessage.ID = maxID + 1\n\tmessageList = append(messageList, &message)\n\treturn message.ID\n}", "title": "" }, { "docid": "13f28599671e890519452ace39850d58", "score": "0.56838554", "text": "func (ml *MessageLog) SendMessage(message string) {\n\t// Prepend the message onto the messageLog slice\n\tif len(ml.messages) >= ml.MaxLength {\n\t\t// Throw away any messages that exceed our total queue size\n\t\tml.messages = ml.messages[:len(ml.messages)-1]\n\t}\n\tml.messages = append([]string{message}, ml.messages...)\n}", "title": "" }, { "docid": "9d555d4b3efa19576929fe01eec99f30", "score": "0.566823", "text": "func (ms *MessageSet) AddMessage(hdr linux.NetlinkMessageHeader) *Message {\n\thdr.Seq = ms.Seq\n\thdr.PortID = uint32(ms.PortID)\n\tif ms.Multi {\n\t\thdr.Flags |= linux.NLM_F_MULTI\n\t}\n\n\tm := NewMessage(hdr)\n\tms.Messages = append(ms.Messages, m)\n\treturn m\n}", "title": "" }, { "docid": "98de52610722ec82c0506e5b9aa1c9a0", "score": "0.5652752", "text": "func putNewMessageIntoClientBuffer(s *server, message Message) {\n\t// if list is empty, just insert\n\t// if the last one has a seq smaller than the message, insert back\n\t// then insert in front of the first one bigger than message\n\tif s.clientMap[message.ConnID].clientBufferQueue.Len() == 0 {\n\t\ts.clientMap[message.ConnID].clientBufferQueue.PushBack(message)\n\t} else if s.clientMap[message.ConnID].clientBufferQueue.Back().Value.(Message).SeqNum < message.SeqNum {\n\t\ts.clientMap[message.ConnID].clientBufferQueue.PushBack(message)\n\t} else {\n\t\tfor e := s.clientMap[message.ConnID].clientBufferQueue.Front(); e != nil; e = e.Next() {\n\t\t\tif message.SeqNum < e.Value.(Message).SeqNum {\n\t\t\t\ts.clientMap[message.ConnID].clientBufferQueue.InsertBefore(message, e)\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "b65c22501b0a8877574ca0816d3fe08e", "score": "0.56128263", "text": "func (t *Task) AddMessage(msg *Message) error {\n\tif !t.isUniqueName(msg.Name) {\n\t\treturn ErrDuplicate\n\t}\n\n\tmsg.TaskName = t.opt.Name\n\tmsg.Task = t\n\treturn t.queue.Add(msg)\n}", "title": "" }, { "docid": "08948a2a6f8285c2032ed3883aabacb0", "score": "0.5610914", "text": "func (r *ChatMessagesCollectionRequest) Add(ctx context.Context, reqObj *ChatMessage) (resObj *ChatMessage, err error) {\n\terr = r.JSONRequest(ctx, \"POST\", \"\", reqObj, &resObj)\n\treturn\n}", "title": "" }, { "docid": "bcb14893b9b5aea34f4e77f318e4fe05", "score": "0.55867493", "text": "func AddMessage(w http.ResponseWriter, r *http.Request) {\n\terr := r.ParseForm()\n\tif err != nil {\n\t\tfmt.Printf(\"Parse form error\\n%v\", err)\n\t\thttp.NotFound(w, r)\n\t\treturn\n\t}\n\tmessage := r.Form.Get(\"message\")\n\tif message == \"\" {\n\t\thttp.Redirect(w, r, \"/\", http.StatusTemporaryRedirect)\n\t\treturn\n\t}\n\n\tCookie, err := GetCookieValue(r)\n\tif err != nil {\n\t\thttp.Error(w, \"Cookieの解析に失敗しました。\", http.StatusBadRequest)\n\t\tlog.Printf(\"Cookieの解析に失敗しました。\\n%v\\n\", err)\n\t\treturn\n\t}\n\n\tAccounts, err := ReadAccounts()\n\tif err != nil {\n\t\thttp.Error(w, \"アカウントデータの読み込みに失敗しました。\", http.StatusBadRequest)\n\t\tlog.Printf(\"アカウントデータの読み込みに失敗しました。\\n%v\\n\", err)\n\t\treturn\n\t}\n\n\tname := Accounts[Cookie[\"id\"]].Name\n\n\tvar newMessage Message = Message{\n\t\tText: message,\n\t\tName: name,\n\t\tTime: time.Now(),\n\t}\n\n\tMessages = append(Messages, newMessage)\n\n\tdata, err := json.MarshalIndent(Messages, \"\", \"\t \")\n\tif err != nil {\n\t\tfmt.Printf(\"Json marshal error\\n%v\", err)\n\t\thttp.Error(w, \"500 Internal server error\", http.StatusInternalServerError)\n\t\treturn\n\t}\n\tExportFile(MessageFilePath, data)\n\thttp.Redirect(w, r, \"/\", http.StatusTemporaryRedirect)\n\treturn\n}", "title": "" }, { "docid": "df9e66efc5d5d05e53d47dbcc2ed4765", "score": "0.5539236", "text": "func (s Scaffolder) AddMessage(\n\tctx context.Context,\n\ttracer *placeholder.Tracer,\n\tmoduleName,\n\tmsgName string,\n\tfields,\n\tresFields []string,\n\toptions ...MessageOption,\n) (sm xgenny.SourceModification, err error) {\n\t// Create the options\n\tscaffoldingOpts := newMessageOptions(msgName)\n\tfor _, apply := range options {\n\t\tapply(&scaffoldingOpts)\n\t}\n\n\t// If no module is provided, we add the type to the app's module\n\tif moduleName == \"\" {\n\t\tmoduleName = s.modpath.Package\n\t}\n\tmfName, err := multiformatname.NewName(moduleName, multiformatname.NoNumber)\n\tif err != nil {\n\t\treturn sm, err\n\t}\n\tmoduleName = mfName.LowerCase\n\n\tname, err := multiformatname.NewName(msgName)\n\tif err != nil {\n\t\treturn sm, err\n\t}\n\n\tif err := checkComponentValidity(s.path, moduleName, name, false); err != nil {\n\t\treturn sm, err\n\t}\n\n\t// Check and parse provided fields\n\tif err := checkCustomTypes(ctx, s.path, moduleName, fields); err != nil {\n\t\treturn sm, err\n\t}\n\tparsedMsgFields, err := field.ParseFields(fields, checkForbiddenMessageField)\n\tif err != nil {\n\t\treturn sm, err\n\t}\n\n\t// Check and parse provided response fields\n\tif err := checkCustomTypes(ctx, s.path, moduleName, resFields); err != nil {\n\t\treturn sm, err\n\t}\n\tparsedResFields, err := field.ParseFields(resFields, checkGoReservedWord)\n\tif err != nil {\n\t\treturn sm, err\n\t}\n\n\tmfSigner, err := multiformatname.NewName(scaffoldingOpts.signer)\n\tif err != nil {\n\t\treturn sm, err\n\t}\n\n\tvar (\n\t\tg *genny.Generator\n\t\topts = &message.Options{\n\t\t\tAppName: s.modpath.Package,\n\t\t\tAppPath: s.path,\n\t\t\tModulePath: s.modpath.RawPath,\n\t\t\tModuleName: moduleName,\n\t\t\tOwnerName: owner(s.modpath.RawPath),\n\t\t\tMsgName: name,\n\t\t\tFields: parsedMsgFields,\n\t\t\tResFields: parsedResFields,\n\t\t\tMsgDesc: scaffoldingOpts.description,\n\t\t\tMsgSigner: mfSigner,\n\t\t}\n\t)\n\n\t// Check and support MsgServer convention\n\tvar gens []*genny.Generator\n\tgens, err = supportMsgServer(\n\t\tgens,\n\t\ttracer,\n\t\ts.path,\n\t\t&modulecreate.MsgServerOptions{\n\t\t\tModuleName: opts.ModuleName,\n\t\t\tModulePath: opts.ModulePath,\n\t\t\tAppName: opts.AppName,\n\t\t\tAppPath: opts.AppPath,\n\t\t\tOwnerName: opts.OwnerName,\n\t\t},\n\t)\n\tif err != nil {\n\t\treturn sm, err\n\t}\n\n\t// Scaffold\n\tg, err = message.NewStargate(tracer, opts)\n\tif err != nil {\n\t\treturn sm, err\n\t}\n\tgens = append(gens, g)\n\tsm, err = xgenny.RunWithValidation(tracer, gens...)\n\tif err != nil {\n\t\treturn sm, err\n\t}\n\treturn sm, finish(opts.AppPath, s.modpath.RawPath)\n}", "title": "" }, { "docid": "105d0c001afbe53dfb7065045cee0698", "score": "0.55083096", "text": "func (batch *Batch) Add(message Message) {\n\tbatch.mutex.Lock()\n\tdefer batch.mutex.Unlock()\n\n\tbatch.messages = append(batch.messages, message)\n}", "title": "" }, { "docid": "da1a6364219ef5391f02b529c824d044", "score": "0.5504704", "text": "func (q *messageQueue) putMessage(msg Message, recipients []int) {\n\tq.q = append(q.q, newPreparedMessage(msg, recipients, TTL))\n}", "title": "" }, { "docid": "828caa8077f3b4b6fa735a6693a3855e", "score": "0.5498363", "text": "func (d *Dao) AddMsgPubLock(c context.Context, mid, color, rnd int64, mode, fontsize int32, ip, msg string) (err error) {\n\tconn := d.dmMC.Get(c)\n\titem := memcache.Item{\n\t\tKey: keyMsgPubLock(mid, color, rnd, mode, fontsize, ip, msg),\n\t\tValue: _lockvalue,\n\t\tExpiration: 300,\n\t\tFlags: memcache.FlagRAW,\n\t}\n\tif err = conn.Set(&item); err != nil {\n\t\tlog.Error(\"mc.Set(%v) error(%v)\", item, err)\n\t}\n\tconn.Close()\n\treturn\n}", "title": "" }, { "docid": "a4e81882a06130f6acae1f2c53c847de", "score": "0.5496793", "text": "func AddMessage(text string, category string, sender Sender) *Message {\n\tnewMessage := &Message{\n\t\tId: generateId(),\n\t\tSender: sender,\n\t\tText: text,\n\t\tDateTime: time.Now(),\n\t\tCategory: category,\n\t}\n\tmockMessages = append(mockMessages, newMessage)\n\n\treturn newMessage\n}", "title": "" }, { "docid": "06c70c0356d3025c92c718da5d696eea", "score": "0.5495813", "text": "func Add(name string, root *Node) {\n\tmsgDir[name] = root\n}", "title": "" }, { "docid": "2f66f9fbcc508b6bbb6c7f6f95dc17da", "score": "0.5483885", "text": "func (bb *BlockBuilder) AddMessage(msg *types.SignedMessage, rcpt *types.MessageReceipt) {\n\tbb.block.Messages = append(bb.block.Messages, msg)\n\tbb.block.MessageReceipts = append(bb.block.MessageReceipts, rcpt)\n}", "title": "" }, { "docid": "10748f8b827cf655ed78e93321cb1a26", "score": "0.54762566", "text": "func (s *storage) add(m mqtt.Message, messageid uint16) {\n\ts.mux.Lock()\n\ts.sto[messageid] = m\n\ts.mux.Unlock()\n}", "title": "" }, { "docid": "65e6c8712955c196d2bcdf9f1c65cfd4", "score": "0.54289323", "text": "func (server *ChatServer) AddMessage(message model.Message) {\n\tserver.NewMessage <- &message\n\tif message.Username != nil {\n\t\tif message.UserID != 0 {\n\t\t\tuid := chat.CheckUserExist(*message.Username)\n\t\t\tif uid != nil {\n\t\t\t\tmessage.UserID = *uid\n\n\t\t\t}\n\t\t}\n\t\tchat.CreateNewMessage(&message)\n\t}\n}", "title": "" }, { "docid": "5a81daa4ae60e01803ee499778a410d3", "score": "0.5421585", "text": "func (m *memoryMailBox) AddMessage(msg lnwire.Message) error {\n\t// First, we'll lock the condition, and add the message to the end of\n\t// the wire message inbox.\n\tm.wireCond.L.Lock()\n\tm.wireMessages = append(m.wireMessages, msg)\n\tm.wireCond.L.Unlock()\n\n\t// With the message added, we signal to the mailCourier that there are\n\t// additional messages to deliver.\n\tm.wireCond.Signal()\n\n\treturn nil\n}", "title": "" }, { "docid": "24619df631eda9168406fa4902514930", "score": "0.5419039", "text": "func (p *Program) AddMessage(message string) bool {\n\tif message == \"\" {\n\t\treturn false\n\t}\n\n\tp.messages = append(p.messages, message)\n\n\t// Compactizarion warnings stack\n\tif len(p.messages) > 1 {\n\t\tvar (\n\t\t\tnew = len(p.messages) - 1\n\t\t\tlast = len(p.messages) - 2\n\t\t)\n\t\t// Warning collapsing for minimize warnings\n\t\twarning := \"// Warning\"\n\t\tif strings.HasPrefix(p.messages[last], warning) {\n\t\t\tl := p.messages[last][len(warning):]\n\t\t\tif strings.HasSuffix(p.messages[new], l) {\n\t\t\t\tp.messages[last] = p.messages[new]\n\t\t\t\tp.messages = p.messages[0:new]\n\t\t\t}\n\t\t}\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "6447bb1f5ea39c9ea0913cbb8116f282", "score": "0.54003614", "text": "func (db *firestoreDB) AddMessage(gameID string, playerID string, message model.Message) (*model.Game, error) {\n\tgame, err := db.LookupGameByID(gameID)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tplayer, err := db.LookupPlayer(playerID)\n\tmessage.Player = *player\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfmt.Println(\"Adding a new Message\")\n\tgame.Messages = append(game.Messages, message)\n\terr = db.SaveGame(*game)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn game, nil\n}", "title": "" }, { "docid": "9f7cf9d8bffee585375c403f197b2955", "score": "0.5368786", "text": "func (g *Game) addMessage(text string) {\n\tg.Messages.PushMessage(text)\n}", "title": "" }, { "docid": "da5380d8f3e742a64e4ddb114ee5591e", "score": "0.5356306", "text": "func (ma *MessageAccumulator) Add(msg string) {\n\tma.initialize()\n\t*ma.msgs = append(*ma.msgs, ma.prefix+msg)\n}", "title": "" }, { "docid": "b94160b0884460451c2632c0d8fb9cbb", "score": "0.53529453", "text": "func(peers *PeerList) Add(addr string, id int32) {\n\tpeers.mux.Lock()\n\tdefer peers.mux.Unlock()\n\tpeers.peerMap[addr] = id\n\tfmt.Println(\"After adding:\", peers.peerMap)\n}", "title": "" }, { "docid": "be2e4d315e9b1ae2e3a69e1125d220d5", "score": "0.5334081", "text": "func (c *CappedList) Add(input string) {\n\t// add new element\n\terr := c.client.LPush(c.name, input).Err()\n\tif err != nil {\n\t\tsetup.LogCommon(err).WithField(\"input\", input).Error(\"Failed LPush\")\n\t}\n\t// remove old elements\n\terr = c.client.LTrim(c.name, 0, c.size-1).Err()\n\tif err != nil {\n\t\tsetup.LogCommon(err).WithField(\"input\", input).Error(\"Failed LTrim\")\n\t}\n}", "title": "" }, { "docid": "40e165d3ff110ebba05b54d134d0b702", "score": "0.53277", "text": "func (mq *MessageQueue) Push(msg string) {\n\t// *mq = append(*mq, msg)\n}", "title": "" }, { "docid": "dd5a51ba7f5a31d788fdde221e53d1f6", "score": "0.52997094", "text": "func (q Queue) Add(message entity.NotifierMessage) {\n\tq.addCh <- struct{}{}\n\n\tgo func(message entity.NotifierMessage) {\n\t\tq.addMessage <- message\n\t}(message)\n}", "title": "" }, { "docid": "0d1cee606059942b870ed5c624484eac", "score": "0.52944916", "text": "func (r *Raft) sendMsg(m pb.Message) {\n\tr.msgs = append(r.msgs, m)\n}", "title": "" }, { "docid": "6a9fedb1799b6889786865426549366d", "score": "0.5277884", "text": "func sendMsgAddAdmin(\n\tr *rand.Rand, app *baseapp.BaseApp, ak authkeeper.AccountKeeper, bk bankkeeper.Keeper,\n\tmsg *types.MsgAddAdmin, ctx sdk.Context, chainID string, privkeys []cryptotypes.PrivKey,\n) error {\n\taddr, _ := sdk.AccAddressFromBech32(msg.Owner)\n\taccount := ak.GetAccount(ctx, addr)\n\tcoins := bk.SpendableCoins(ctx, account.GetAddress())\n\n\tfees, err := simtypes.RandomFees(r, ctx, coins)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ttxGen := simappparams.MakeTestEncodingConfig().TxConfig\n\ttx, err := helpers.GenTx(\n\t\ttxGen,\n\t\t[]sdk.Msg{msg},\n\t\tfees,\n\t\tDefaultGasValue,\n\t\tchainID,\n\t\t[]uint64{account.GetAccountNumber()},\n\t\t[]uint64{account.GetSequence()},\n\t\tprivkeys...,\n\t)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t_, _, err = app.Deliver(txGen.TxEncoder(), tx)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "4c733ace3ec4fca400eb916060fdb069", "score": "0.5277047", "text": "func (l *Locker) StoreMessage(message string) {\n\tvar msg []string\n\n\tif len(message) < 1 {\n\t\treturn\n\t}\n\n\ttmp, ok := l.data.LoadAndDelete(_Messages)\n\tif ok {\n\t\tmsg = tmp.([]string)\n\t}\n\n\tmsg = append(msg, message)\n\n\tl.Set(_Messages, msg)\n}", "title": "" }, { "docid": "6a907d58a3375690e2c1ff59747f41c9", "score": "0.5269505", "text": "func (s *Transaction) MatchAddMessageToCurrentDeal(id string, message protocol.Message) (err error) {\n\tdefer func() {\n\t\tif err != nil {\n\t\t\ts.errors = append(s.errors, err)\n\t\t}\n\n\t\ts.matchNotifications = append(s.matchNotifications, store.MatchNotification{ID: id})\n\t}()\n\n\tm := s.inMemoryCopy.Match(id)\n\tif m == nil {\n\t\treturn store.DontExistError(fmt.Sprintf(`The match %s doesn't exist`, id))\n\t}\n\n\tdeal := &m.Deals[len(m.Deals)-1]\n\tdeal.Messages = append(deal.Messages, message)\n\n\treturn\n}", "title": "" }, { "docid": "868c0205cf6936295a5046bc1ead84e7", "score": "0.5237053", "text": "func (room *Room) AddMessage(message string) {\n\troom.queue <- message\n}", "title": "" }, { "docid": "731d4da1567fb7e908acc76be7ccd717", "score": "0.5232308", "text": "func (m *Maildir) Add(data string) (*lib.Message, error) {\n\tmsg, err := lib.NewMessage(m.path)\n\tif err != nil {\n\t\treturn nil, errors.New(\"failed to create message\")\n\t}\n\terr = msg.Write(data)\n\tif err != nil {\n\t\treturn nil, errors.New(\"failed to write message\")\n\t}\n\n\treturn msg, nil\n}", "title": "" }, { "docid": "c6c6ce021224daa9acdc060aa51b0f1f", "score": "0.52111495", "text": "func (s *Smr) addVoteMsg(msg *chainedbft_pb.ChainedBftVoteMessage) error {\n\t// check msg sign\n\tproposalMsg, err := s.externalCons.CallProposalMsgWithProposalID(msg.GetProposalId())\n\tif err != nil {\n\t\ts.slog.Error(\"addVoteMsg CallProposalMsgWithProposalID error\", \"error\", err)\n\t\treturn err\n\t}\n\tok, err := utils.VerifyVoteMsgSign(s.cryptoClient, msg.GetSignature(), proposalMsg)\n\tif !ok || err != nil {\n\t\ts.slog.Error(\"addVoteMsg VerifyVoteMsgSign error\", \"ok\", ok, \"error\", err)\n\t\treturn errors.New(\"addVoteMsg VerifyVoteMsgSign error\")\n\t}\n\t// check in ValidateSets\n\tif !utils.IsInValidateSets(s.validates, msg.GetSignature().GetAddress()) {\n\t\ts.slog.Error(\"addVoteMsg IsInValidateSets error\")\n\t\treturn errors.New(\"addVoteMsg IsInValidateSets error\")\n\t}\n\n\t// add vote msg\n\tv, ok := s.qcVoteMsgs.Load(string(msg.GetProposalId()))\n\tif !ok {\n\t\tvoteMsgs := &chainedbft_pb.QCSignInfos{}\n\t\tvoteMsgs.QCSignInfos = append(voteMsgs.QCSignInfos, msg.GetSignature())\n\t\ts.qcVoteMsgs.Store(string(msg.GetProposalId()), voteMsgs)\n\t\treturn nil\n\t}\n\n\tvoteMsgs := v.(*chainedbft_pb.QCSignInfos)\n\tif utils.CheckIsVoted(voteMsgs, msg.GetSignature()) {\n\t\ts.slog.Error(\"addVoteMsg CheckIsVoted error, this address have voted\")\n\t\treturn errors.New(\"addVoteMsg CheckIsVoted error\")\n\t}\n\tvoteMsgs.QCSignInfos = append(voteMsgs.QCSignInfos, msg.GetSignature())\n\ts.qcVoteMsgs.Store(string(msg.GetProposalId()), voteMsgs)\n\treturn nil\n}", "title": "" }, { "docid": "1c2d87df34dd2b6bddd91155676569a4", "score": "0.52044356", "text": "func (s *Message) Add(m *models.Message) error {\n\t_, getErr := s.One(m.UserID, m.QueueName, m.Index)\n\tlog.DB.Infof(\"Get(%d.%s.%d) Error: %v, time: %v\\n\", m.UserID, m.QueueName, m.Index, getErr, time.Now())\n\n\tif getErr == errors.DataNotFound {\n\t\terr := s.db.Put(models.MessageKey(m.UserID, m.QueueName, m.Index), m.Content)\n\t\tif err != nil {\n\t\t\treturn errors.NewInternalErrorf(err.Error())\n\t\t}\n\n\t\treturn nil\n\t}\n\n\tif getErr != nil {\n\t\treturn getErr\n\t}\n\n\treturn errors.DuplicateMessage\n}", "title": "" }, { "docid": "50fc2f9f09a1b2770a28bc1879eac666", "score": "0.51883066", "text": "func (r *ChatMembersCollectionRequest) Add(ctx context.Context, reqObj *ConversationMember) (resObj *ConversationMember, err error) {\n\terr = r.JSONRequest(ctx, \"POST\", \"\", reqObj, &resObj)\n\treturn\n}", "title": "" }, { "docid": "76f248ca6867693df83d95df03a9c4de", "score": "0.5152677", "text": "func (g *Game) addChatMessage(player *Player, text string) {\n\tc := ChatMessage{Player: player, Text: text}\n\tfor _, p := range g.Players {\n\t\tp.ChatMessages.Push(c)\n\t}\n}", "title": "" }, { "docid": "d3b306cdc4d0fad041c6004b60bb6f8d", "score": "0.5137735", "text": "func (joinSession *JoinSession) pushMaliciousInfo(missedPeers []uint32) {\n\n\tjoinSession.mu.Lock()\n\tdefer joinSession.mu.Unlock()\n\tlog.Debug(\"Number malicious\", len(missedPeers))\n\tmalicious := &pb.MaliciousPeers{}\n\tfor _, Id := range missedPeers {\n\t\tjoinSession.removePeer(Id)\n\t}\n\tmalicious.PeerIds = missedPeers\n\n\tif len(joinSession.Peers) == 0 {\n\t\tlog.Info(\"All peers not sending data in time, join session terminates\")\n\t\treturn\n\t}\n\n\t// Re-generate the session id and peer id\n\tmalicious.SessionId = GenId()\n\tnewPeers := make(map[uint32]*PeerInfo, 0)\n\tlog.Debug(\"Remaining peers in join session: \", joinSession.Peers)\n\tif len(joinSession.Peers) > 0 {\n\t\tfor _, peer := range joinSession.Peers {\n\t\t\tmalicious.PeerId = GenId()\n\t\t\t// Update new id generated.\n\t\t\tpeer.ResetData(malicious.PeerId, malicious.SessionId)\n\t\t\tdata, _ := proto.Marshal(malicious)\n\t\t\tpeer.TmpData = data\n\t\t\tnewPeers[peer.Id] = peer\n\t\t}\n\t}\n\tjoinSession.Peers = newPeers\n\tjoinSession.JoinedTx = nil\n\tjoinSession.PeersMsgInfo = []*pb.PeerInfo{}\n\tjoinSession.Id = malicious.SessionId\n\tjoinSession.State = StateKeyExchange\n\tjoinSession.TotalMsg = 0\n\n\t// After all change updated, inform clients for malicious information.\n\tlog.Debug(\"len of joinSession.Peers to push malicious \", len(joinSession.Peers))\n\tfor _, peer := range joinSession.Peers {\n\t\tmsg := messages.NewMessage(messages.S_MALICIOUS_PEERS, peer.TmpData).ToBytes()\n\t\tpeer.writeChan <- msg\n\t}\n\n\tlog.Debug(\"Remaining peers in join session after updated: \", joinSession.Peers)\n}", "title": "" }, { "docid": "11d9e4783b519ee6c5adb3fb17a5dfd8", "score": "0.51233566", "text": "func add(s *discordgo.Session, m *discordgo.MessageCreate) error {\n\t// Double-check that the author can manage channels\n\tif ok, err := checkAuthorCanManageChannels(s, m); !ok {\n\t\treturn err\n\t}\n\n\tif ok, err := checkArgRange(s, m, 0, ARGS_NO_LIMIT); !ok {\n\t\treturn err\n\t}\n\n\t// Get chamber data and exit early if channel not a chamber.\n\tchamber, ok := Chambers[m.ChannelID]\n\tif !ok {\n\t\t_, err := s.ChannelMessageSend(m.ChannelID, MSG_NOT_A_CHAMBER)\n\t\treturn err\n\t}\n\n\t// Add users and build the end response.\n\tresponse := \"\"\n\tfor _, user := range m.Mentions {\n\t\terr := s.GuildMemberRoleAdd(m.GuildID, user.ID, chamber.MemberRole)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tresponse += \"Added \" + user.Username + \" to the chamber.\\n\"\n\t}\n\n\t// Send response and exit\n\t_, err := s.ChannelMessageSend(m.ChannelID, response)\n\treturn err\n}", "title": "" }, { "docid": "45ba5a1b85a56b050a7eb1091b5e58d9", "score": "0.51190567", "text": "func (t *Types) AddMessage(msg proto.Message) (Type, bool) {\n\ttyp := reflect.TypeOf(msg).Elem()\n\tname := proto.MessageName(msg)\n\treturn t.add(msg, name, typ)\n}", "title": "" }, { "docid": "2736dd1a96db68d09fe99cd2ef88d43b", "score": "0.50996464", "text": "func AddPeer(w http.ResponseWriter, r *http.Request) {\n\t// Connect to the peer\n\tvar newPeers peerStr\n\n\terr := json.NewDecoder(r.Body).Decode(&newPeers)\n\tif err != nil {\n\t\tlog.Println(\"AddPeer: could not decode peer\")\n\t}\n\tlog.Println(newPeers)\n\tlog.Printf(\"AddPeer: adding=%s\", newPeers.Peer)\n\n\tConnectToPeers(newPeers.Peer)\n}", "title": "" }, { "docid": "9a8df858528cfa40411fa8c4d101145d", "score": "0.50874406", "text": "func (svc *MsgSvc) CreateMessage(body string) (*Message, error) {\n\tnewMsg := &Message{\n\t\tID: uuid.NewV4(),\n\t\tBody: body,\n\t\tCreatedAt: time.Now(),\n\t}\n\n\tsvc.Database = append(svc.Database, newMsg)\n\treturn newMsg, nil\n}", "title": "" }, { "docid": "2295138974833bd6970776cce3bc86a3", "score": "0.5086054", "text": "func newMsg(t string) ([]byte, error) {\n\tswitch t {\n\tcase \"version\":\n\t\treturn newVersion()\n\tcase \"verack\":\n\t\treturn newVerack()\n\tcase \"getheaders\":\n\t\treturn newHeadersReq()\n\tcase \"getaddr\":\n\t\treturn newGetAddr()\n\n\tdefault:\n\t\treturn nil, errors.New(\"Unknown message type\")\n\t}\n}", "title": "" }, { "docid": "49db221dd3da10c78c42cfa18a9a5186", "score": "0.5079283", "text": "func (log *PbftLog) AddMessage(msg *PbftMessage) {\n\tlog.messages.Add(msg)\n}", "title": "" }, { "docid": "51c4c8622e8e88f8505c55dc5f4e8d5e", "score": "0.50732934", "text": "func (q *TransmitLimitedQueue) addItem(cur *limitedBroadcast) {\n\t_ = q.tq.ReplaceOrInsert(cur)\n\tif cur.name != \"\" {\n\t\tq.tm[cur.name] = cur\n\t}\n}", "title": "" }, { "docid": "cb4f52b823fca5d39542c3cca1c9c38f", "score": "0.5066359", "text": "func addPeer(peer Peer) {\n\t// iterate to find empty slot\n\tpeerListLock.Lock()\n\tfor i := 0; i < MaxPeers; i++ {\n\t\t// if peer IS dead\n\t\tif peerList[i].expirationTimer == 0 {\n\t\t\t// ensure proper port by generating again\n\t\t\tpeer.addr.Port = listeningPort\n\n\t\t\t// ensure expiration timer is reset\n\t\t\tpeer.expirationTimer = expirationDefault\n\n\t\t\t// put new peer in that slot and return\n\t\t\tpeerList[i] = peer\n\t\t\tpeerListLock.Unlock()\n\t\t\treturn\n\t\t}\n\t}\n\tpeerListLock.Unlock()\n}", "title": "" }, { "docid": "4f68329fd7c9ab8bb46e0c7ab5cc3751", "score": "0.5063818", "text": "func (m *Manager) AddPeers(peers peer.Peers) error {\n\tm.mutex.Lock()\n\tdefer m.mutex.Unlock()\n\tadded := false\n\tfor _, peer := range peers {\n\t\tif !peer.IsAllowed() {\n\t\t\terr := errors.New(\"denied\")\n\t\t\tlog.Println(err)\n\t\t\tcontinue\n\t\t}\n\t\tadded = added || m.peers.Add(peer)\n\t}\n\tif !added {\n\t\treturn nil\n\t}\n\treturn m.self.WritePeers(m.peers)\n}", "title": "" }, { "docid": "9797bfa9e841c4c6f9b9e15d4a3f1f22", "score": "0.5050391", "text": "func (s *Smr) addViewMsg(msg *chainedbft_pb.ChainedBftPhaseMessage) error {\n\t// check msg sign\n\tok, err := utils.VerifyPhaseMsgSign(s.cryptoClient, msg)\n\tif !ok || err != nil {\n\t\ts.slog.Error(\"addViewMsg VerifyPhaseMsgSign error\", \"ok\", ok, \"error\", err)\n\t\treturn errors.New(\"addViewMsg VerifyPhaseMsgSign error\")\n\t}\n\t// check whether view outdate\n\tif msg.GetViewNumber() < s.votedView {\n\t\ts.slog.Error(\"addViewMsg view outdate\", \"votedView\", s.votedView, \"viewRecivied\", msg.GetViewNumber())\n\t\treturn errors.New(\"addViewMsg view outdate\")\n\t}\n\n\t// check in ValidateSets\n\tif !utils.IsInValidateSets(s.validates, msg.GetSignature().GetAddress()) {\n\t\ts.slog.Error(\"addViewMsg checkValidateSets error\")\n\t\treturn errors.New(\"addViewMsg checkValidateSets error\")\n\t}\n\t// add JustifyQC\n\tif msg.GetJustifyQC() != nil {\n\t\ts.slog.Info(\"addViewMsg GetJustifyQC not nil\", \"GetJustifyQC.SignInfos\", msg.GetJustifyQC().GetSignInfos())\n\t\ts.qcVoteMsgs.LoadOrStore(string(msg.GetJustifyQC().GetProposalId()), msg.GetJustifyQC().GetSignInfos())\n\t}\n\n\t// add View msg\n\tv, ok := s.newViewMsgs.Load(msg.GetViewNumber())\n\tif !ok {\n\t\tviewMsgs := []*chainedbft_pb.ChainedBftPhaseMessage{}\n\t\tviewMsgs = append(viewMsgs, msg)\n\t\ts.newViewMsgs.Store(msg.GetViewNumber(), viewMsgs)\n\t\treturn nil\n\t}\n\n\tviewMsgs := v.([]*chainedbft_pb.ChainedBftPhaseMessage)\n\tviewMsgs = append(viewMsgs, msg)\n\ts.newViewMsgs.Store(msg.GetViewNumber(), viewMsgs)\n\treturn nil\n}", "title": "" }, { "docid": "5cfdfb080e29b80c37d9cefc3aaf92a7", "score": "0.5044181", "text": "func (t *EchoMsgMain) AddMessage(senderId string, msg types.Message) error {\n\tt.mu.Lock()\n\tdefer t.mu.Unlock()\n\n\teMsg, ok := msg.(EchoMessage)\n\tif !ok {\n\t\treturn ErrNotEchoMsg\n\t}\n\n\thash, err := t.echoHash(eMsg)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif hash == nil {\n\t\treturn t.MessageMain.AddMessage(senderId, msg)\n\t}\n\n\t// Init echo messages\n\tmsgType := msg.GetMessageType()\n\techoMsg, ok := t.echoMsgs[msgType]\n\tif !ok {\n\t\techoMsg = make(map[string]*echoMessage)\n\t\tt.echoMsgs[msgType] = echoMsg\n\t}\n\tmsgId := msg.GetId()\n\t// Broadcast to other peers for the first message\n\tm, ok := echoMsg[msgId]\n\tif !ok {\n\t\tfor _, id := range t.pm.PeerIDs() {\n\t\t\tif msgId != id {\n\t\t\t\tgo t.pm.MustSend(id, eMsg.GetEchoMessage())\n\t\t\t}\n\t\t}\n\t\techoMsg[msgId] = &echoMessage{\n\t\t\thash: hash,\n\t\t}\n\t\tm = echoMsg[msgId]\n\t\tm.originalMsg = msg\n\t} else if !bytes.Equal(m.hash, hash) {\n\t\treturn ErrDifferentHash\n\t}\n\n\tm.count++\n\tif m.count == int(t.pm.NumPeers()) {\n\t\tdelete(t.echoMsgs[msgType], msgId)\n\t\treturn t.MessageMain.AddMessage(m.originalMsg.GetId(), m.originalMsg)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "3945ae0791ed86ce7443c3a45f65f73c", "score": "0.5039382", "text": "func handleMessage(ip string, msg string) {\n\t// use \"ip\" to get \"id\" from \"peers\"\n\t// if \"ip\" does not exist in \"peers\", ignore the \"msg\"\n\t// display \"id\" and \"msg\" on the UI (i.e use ui.AddMessage)\n}", "title": "" }, { "docid": "788cc4b44c7882d0d64e5c868becbb6e", "score": "0.5035712", "text": "func (er *ExecutionResult) AddMessage(m ...string) {\n\ter.Message = append(er.Message, m...)\n}", "title": "" }, { "docid": "2c7024d798cb4fc184ae8607b8741c63", "score": "0.50110334", "text": "func (p *nodeProcessor) initNewMessage(msg Message, netSize, curCounter int) (exists bool) {\n\texistingID := func(msgId int) bool {\n\t\tfor _, val := range p.msgIDs {\n\t\t\tif val == msgId {\n\t\t\t\treturn true\n\t\t\t}\n\t\t}\n\t\treturn false\n\t}\n\n\tgetDestList := func() []int {\n\t\tres := make([]int, 0, len(p.neighbours))\n\t\tfor key := range p.neighbours {\n\t\t\tres = append(res, key)\n\t\t}\n\t\treturn res\n\t}\n\n\tmsgId := msg.ID\n\tif !existingID(msgId) { // If such msgId is already known to this node then error is generated\n\t\t // but it doesn't garantee that there are no such msgId in the whole Net.\n\t\t // If it's already exists it will be ignored by nodes or can be processed\n\t\t // incorrectly.\n\t\tp.m.Lock()\n\t\tp.acks[msgId] = make([]bool, netSize)\n\t\tp.acks[msgId][p.myID] = true\n\t\tp.msgIDs = append(p.msgIDs, msgId)\n\t\tp.msgQueue.putMessage(msg, getDestList())\n\t\tp.waiting[msgId] = curCounter\n\t\tp.m.Unlock()\n\t\tlogger.Printf(\"[NODE %d] new message inited: %s\", p.myID, msg)\n\t\treturn false\n\t}\n\treturn true\n}", "title": "" }, { "docid": "911b003e42664a904ee44635be17697a", "score": "0.500082", "text": "func (mc *MsgCache) WriteMsg(msg *Msg) bool {\n\n\tif mc.cache == nil {\n\t\tmc.cache = make([]*Msg, 0, 8)\n\t}\n\n\tmin := sort.Search(len(mc.cache), func(mid int) bool {\n\t\treturn mc.comparator(msg.key, mc.cache[mid].key) <= 0\n\t})\n\t//if cache contain the key. replace it\n\tif min != len(mc.cache) && mc.comparator(msg.key, mc.cache[min].key) == 0 {\n\t\tmc.cache[min].value = msg.value\n\t\tmc.cache[min].msgType = msg.msgType\n\t\tmc.size += (msg.Size() - mc.cache[min].Size())\n\t\treturn false\n\t} else {\n\t\t//insert value to slice\n\t\tmc.cache = append(mc.cache, nil)\n\t\tcopy(mc.cache[min+1:], mc.cache[min:])\n\t\tmc.cache[min] = msg\n\t\tmc.size += msg.Size()\n\t\treturn true\n\t}\n}", "title": "" }, { "docid": "3ffff80dd2739c8daa4cac2f4ae6dcdf", "score": "0.49977618", "text": "func (sp *StreamPool) SendMessage(ctx context.Context, msg *p2pPb.AmperMessage, peers []peer.ID) error {\n\twg := sync.WaitGroup{}\n\tfor _, p := range peers {\n\t\twg.Add(1)\n\t\tgo func(p peer.ID) {\n\t\t\tdefer wg.Done()\n\t\t\terr := sp.sendMessage(ctx, msg, p)\n\t\t\tif err != nil {\n\t\t\t\tsp.log.Error(\"StreamPool SendMessage error\", \"peer\", p.Pretty())\n\t\t\t}\n\t\t}(p)\n\t}\n\twg.Wait()\n\treturn nil\n}", "title": "" }, { "docid": "8c4138c00c61e4d430dc58e79a146c97", "score": "0.49851727", "text": "func (s *Service) AddLike(c context.Context, addMsg json.RawMessage) (err error) {\n\tvar (\n\t\tlikeObj = new(l.Item)\n\t)\n\tif err = json.Unmarshal(addMsg, likeObj); err != nil {\n\t\tlog.Error(\"AddLike json.Unmarshal(%s) error(%+v)\", addMsg, err)\n\t\treturn\n\t}\n\tif err = s.actRPC.LikeUp(c, &actmdl.ArgLikeUp{Lid: likeObj.ID}); err != nil {\n\t\tlog.Error(\"s.actRPC.LikeUp(%d) error(%+v)\", likeObj.ID, err)\n\t\treturn\n\t}\n\tif err = s.actRPC.AddLikeCtimeCache(c, &actmdl.ArgLikeUp{Lid: likeObj.ID}); err != nil {\n\t\tlog.Error(\"s.actRPC.AddLikeCtimeCache(%d) error(%+v)\", likeObj.ID, err)\n\t\treturn\n\t}\n\tlog.Info(\"AddLike success s.actRPC.LikeUp(%d)\", likeObj.ID)\n\treturn\n}", "title": "" }, { "docid": "726a5a3d972834b764724366e0a1cc61", "score": "0.49828827", "text": "func (ru *RoomUpdate) AddMessageIDs(ids ...uuid.UUID) *RoomUpdate {\n\tru.mutation.AddMessageIDs(ids...)\n\treturn ru\n}", "title": "" }, { "docid": "509b217865eed2aa79e8d4c1dc500d25", "score": "0.4963591", "text": "func handleMsgAddUser(ctx sdk.Context, keeper Keeper, msg MsgAddUser) sdk.Result {\n\tif !keeper.IsNamePresent(ctx, msg.OrgName) { // Checks if the the org name already exists or not\n\t\treturn types.ErrNameDoesNotExist(types.DefaultCodeSpace).Result()\n\t}\n\tif !msg.OrgOwner.Equals(keeper.GetOwner(ctx, msg.OrgName)) {\n\t\treturn sdk.ErrUnauthorized(\"Incorrect Owner\").Result()\n\t}\n\n\tkeeper.AddUser(ctx, msg.OrgName, msg)\n\treturn sdk.Result{}\n}", "title": "" }, { "docid": "66cf92aa8ba686399cd507a559aa2d09", "score": "0.49632543", "text": "func (ruo *RoomUpdateOne) AddMessageIDs(ids ...uuid.UUID) *RoomUpdateOne {\n\truo.mutation.AddMessageIDs(ids...)\n\treturn ruo\n}", "title": "" }, { "docid": "3272862e67fcac0e508ade9658bfff2b", "score": "0.49550402", "text": "func (m *Manager) AddPeer(peer *peer.Peer) error {\n\tm.mutex.Lock()\n\tdefer m.mutex.Unlock()\n\tif !peer.IsAllowed() {\n\t\terrr := errors.New(\"denied\")\n\t\tlog.Println(errr)\n\t\treturn errr\n\t}\n\tif !peer.IsAllowed() || !m.peers.Add(peer) {\n\t\treturn nil\n\t}\n\treturn m.self.WritePeers(m.peers)\n}", "title": "" }, { "docid": "4f02c0c874fb893f3e2cff419dc6b9c0", "score": "0.49504903", "text": "func (m *MembershipList) Add(node OtherNode) error {\n\tif m.Contains(node.NodeID) >= 0 {\n\t\treturn nil\n\t}\n\tnode.LastHeartbeat = uint64(time.Now().UnixNano() / 1000000) // Set the last heartbeat to give a small buffer\n\tm.L.Lock()\n\tm.Members = append(m.Members, node)\n\tm.L.Unlock()\n\tm.Sort()\n\n\tfmt.Printf(\"Added new member: (%d) New membership list:\\n\", node.NodeID)\n\tfor i := 0; i < len(m.Members); i++ {\n\t\tfmt.Printf(\"Node %d (ID=%d)\\n\", m.Members[i].TCPPort-10000, m.Members[i].NodeID)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "96100a39cc0ac81212ff2d27c35264a8", "score": "0.4948601", "text": "func messageCreate(s *discordgo.Session, m *discordgo.MessageCreate) {\n\tif strings.Contains(m.Content, \"?\") {\n\t\t// Ignore all messages created by the bot itself\n\t\t// chann, errorChan := s.Channel(m.ChannelID)\n\t\t// if errorChan != nil {\n\t\t// \tfmt.Println(errorChan)\n\t\t// }\n\t\tif m.Author.ID == \"400927402106028034\" && EmbeeFilter{\n\t\t\t_, _ = s.ChannelMessageSend(m.ChannelID, \"please stop Bothering me ! :angry:\")\n\t\t}else if m.Author.ID == \"210801951552700416\" && strings.Contains(m.Content,\"?Embee\"){\n\t\t\tif EmbeeFilter {\n\t\t\t\tEmbeeFilter = false\n\t\t\t\t_, _ = s.ChannelMessageSend(m.ChannelID, \"<@400927402106028034> has been freed\")\n\t\t\t}else{\n\t\t\t\tEmbeeFilter = true\n\t\t\t\t_, _ = s.ChannelMessageSend(m.ChannelID, \"<@400927402106028034> has been blocked\")\n\t\t\t}\n\t\t}else if strings.Contains(m.Content,\"?update\") && m.Author.ID == \"210801951552700416\" {\n\t\t\tout, err := exec.Command(\"git\", \"pull\").Output()\n\t\t\tif err != nil {\n\t\t\t\tprint(err.Error())\n\t\t\t}\n\t\t\t_, _ = s.ChannelMessageSend(m.ChannelID, string(out))\n\n\t\t}else if strings.Contains(m.Content,\"?add\") && m.Author.ID == \"210801951552700416\" {\n\t\t\tvar GuildeMembers []string\n\t\t\tvar profile SwarfarmResponseProfile\n\t\t\tsplittedString := strings.TrimPrefix(m.Content, \"?add \")\n\t\t\tjsonFile, err := os.Open(\"guilde.json\")\n\t\t\tif err != nil {\n\t\t\t\tfmt.Println(err)\n\t\t\t}\n\t\t\tdefer jsonFile.Close()\n\t\t\tbyteValue, _ := ioutil.ReadAll(jsonFile)\n\t\t\tjson.Unmarshal(byteValue, &GuildeMembers)\n\t\t\terrJson := getJson(\"https://swarfarm.com\"+\"/api/v2/profiles/\"+splittedString, &profile)\n\t\t\tif errJson != nil {\n\t\t\t\t_, _ = s.ChannelMessageSend(m.ChannelID, splittedString+\" profile does not exist\")\n\t\t\t}else if !stringInSlice(splittedString, GuildeMembers){\n\t\t\t\tGuildeMembers = append(GuildeMembers, splittedString)\n\t\t\t\tfmt.Println(GuildeMembers)\n\t\t\t\tfile,errorJson := json.Marshal(GuildeMembers)\n\t\t\t\terroFile := ioutil.WriteFile(\"./guilde.json\",file,0644)\n\t\t\t\tif erroFile != nil{\n\t\t\t\t\tfmt.Println(erroFile)\n\t\t\t\t}\n\t\t\t\tif errorJson != nil{\n\t\t\t\t\tfmt.Println(errorJson)\n\t\t\t\t}\n\t\t\t\t_, _ = s.ChannelMessageSend(m.ChannelID, splittedString+\" successfuly added !\")\n\t\t\t}else{\n\t\t\t\t_, _ = s.ChannelMessageSend(m.ChannelID, splittedString+\" already in base !\")\n\t\t\t}\n\t\t}else if strings.Contains(m.Content,\"?monster\"){\n\t\t\tvar monsters Monster\n\t\t\tjsonFile, err := os.Open(\"monsters.json\")\n\t\t\t// if we os.Open returns an error then handle it\n\t\t\tif err != nil {\n\t\t\t\tfmt.Println(err)\n\t\t\t}\n\t\t\t// defer the closing of our jsonFile so that we can parse it later on\n\t\t\tdefer jsonFile.Close()\n\t\t\tbyteValue, _ := ioutil.ReadAll(jsonFile)\n\t\t\tjson.Unmarshal(byteValue, &MonstersList)\n\t\t\t//splittedString := strings.Split(m.Content, \" \")\n\t\t\turl := \"https://swarfarm.com/api/v2/monsters/\"\n\t\t\tsplittedString := strings.TrimPrefix(m.Content, \"?monster \")\n\t\t\tfor key, value := range MonstersList {\n\t\t\t\tif value[0] == splittedString {\n\t\t\t\t\terrJson := getJson(url+strconv.Itoa(key), &monsters)\n\t\t\t\t\tif errJson != nil {\n\t\t\t\t\t\tfmt.Println(errJson)\n\t\t\t\t\t}\n\t\t\t\t\tfields := make(map[string]string)\n\t\t\t\t\t//for key, value := range monsters.Skills {\n\t\t\t\t\t//\tskill, errSkill := GetSkill(value)\n\t\t\t\t\t//\tif errSkill != nil{\n\t\t\t\t\t//\t\tfmt.Println(errSkill)\n\t\t\t\t\t//\t}else {\n\t\t\t\t\t//\t\tfields[\"Skill \"+strconv.Itoa(key+1)] = skill.Print()\n\t\t\t\t\t//\t}\n\t\t\t\t\t//}\n\t\t\t\t\tfields[\"Principales\"] =\"**HP:** \"+strconv.Itoa(monsters.HP)+\n\t\t\t\t\t\t\"\\n **ATK:** \"+ strconv.Itoa(monsters.ATK)+\n\t\t\t\t\t\t\"\\n **DEF:** \"+strconv.Itoa(monsters.DEF)+\n\t\t\t\t\t\t\"\\n **SPD:** \"+strconv.Itoa(monsters.SPD)\n\t\t\t\t\tfields[\"Secondaires\"] =\"**CR:** \"+strconv.Itoa(monsters.CR)+\n\t\t\t\t\t\t\"\\n **CD:** \"+strconv.Itoa(monsters.CD)+\n\t\t\t\t\t\t\"\\n **RES:** \"+strconv.Itoa(monsters.RES)+\n\t\t\t\t\t\t\"\\n **ACC:** \"+strconv.Itoa(monsters.ACC)\n\n\t\t\t\t\tToSend := CreateAnEmbed(\" Nat \"+strconv.Itoa(monsters.NaturalStars),fields,monsters.Name,MonstersList[monsters.Id][1], \"monsters\")\n\t\t\t\t\t_, _ = s.ChannelMessageSendEmbed(m.ChannelID, ToSend)\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t//for i:=0;i<len(monsters.Results) ;i++ {\n\t\t\t//\tif monsters.Results[i].Name == splittedString {\n\t\t\t//\t\t_, _ = s.ChannelMessageSend(m.ChannelID, monsters.Results[i].PrintMonster())\n\t\t\t//\t}else{\n\t\t\t//\t\t//_, _ = s.ChannelMessageSend(m.ChannelID, \"Je n'ai pas trouvé \"+splittedString[1])\n\t\t\t//\t}\n\t\t\t//}\n\n\t\t}else if strings.Contains(m.Content, \"?gibsette\"){\n\t\t\tgif := \"https://tenor.com/view/ncis-slap-silly-scold-gibbs-gif-13523518\"\n\t\t\t_, _ = s.ChannelMessageSend(m.ChannelID, gif)\n\t\t} else if strings.Contains(m.Content, \"?sf\"){\n\t\t\t///api/v2/profiles/{user_pk}/monsters/\n\t\t\t//splittedString := strings.Split(m.Content, \" \")\n\t\t\tsplittedString := strings.TrimPrefix(m.Content, \"?sf \")\n\t\t\tuserName := strings.Split(splittedString,\" \")\n\t\t\tif len(userName) >= 2{\n\t\t\t\tmonstersHit := GetMonsters(url.QueryEscape(strings.TrimPrefix(splittedString, userName[0]+\" \")), userName[0])\n\t\t\t\tIsMultiple := false\n\t\t\t\tif len(monstersHit) == 0 {\n\t\t\t\t\t_, _ = s.ChannelMessageSend(m.ChannelID, userName[0]+ \" has no \"+ url.QueryEscape(strings.TrimPrefix(splittedString, userName[0]+\" \")))\n\t\t\t\t}else {\n\t\t\t\t\tfields, _, stars, level := monstersHit[0].FormatPrint()\n\t\t\t\t\tToAdd := \"\"\n\t\t\t\t\tif len(monstersHit) > 1 {\n\t\t\t\t\t\tToAdd = \" 1/\"+strconv.Itoa(len(monstersHit))\n\t\t\t\t\t\tIsMultiple = true\n\t\t\t\t\t}\n\t\t\t\t\tToSend := CreateAnEmbed(\"Monster \"+url.QueryEscape(strings.TrimPrefix(splittedString, userName[0]+\" \"))+ ToAdd +\" Lvl \"+level+\" \"+stars+\"*\",fields,userName[0],MonstersList[monstersHit[0].Id][1],\"monsters\")\n\t\t\t\t\tmessage, _ := s.ChannelMessageSendEmbed(m.ChannelID, ToSend)\n\t\t\t\t\tif IsMultiple {\n\t\t\t\t\t\terrorAddEmoji := s.MessageReactionAdd(m.ChannelID, message.ID,\"⬅\")\n\t\t\t\t\t\terrorAddEmoji = s.MessageReactionAdd(m.ChannelID, message.ID,\"➡\")\n\t\t\t\t\t\tif errorAddEmoji != nil {\n\t\t\t\t\t\t\tfmt.Println(errorAddEmoji)\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\n\t\t\t\t}\n\t\t\t}\n\t\t}else if strings.Contains(m.Content, \"?building\"){\n\t\t\tsplittedString := strings.TrimPrefix(m.Content, \"?building \")\n\t\t\tuserName := strings.Split(splittedString,\" \")\n\t\t\tbuildings,errorBuild := getBuildings(userName[0])\n\t\t\tif errorBuild != nil {\n\t\t\t\tfmt.Println(errorBuild)\n\t\t\t}\n\t\t\tfields, _, _ := buildings.FormatPrint()\n\t\t\tToSend := CreateAnEmbed(\"Buildings\",fields,userName[0],\"\",\"monsters\")\n\t\t\t_, _ = s.ChannelMessageSendEmbed(m.ChannelID, ToSend)\n\n\t\t}else if strings.Contains(m.Content, \"skill\"){\n\t\t\t//_, _ = s.ChannelMessageSend(m.ChannelID, \"Command under maintenance\")\n\t\t\t///api/v2/profiles/{user_pk}/monsters/\n\t\t\t//splittedString := strings.Split(m.Content, \" \")\n\t\t\tif strings.Contains(m.Content,\"1\") {\n\t\t\t\tsplittedString := strings.TrimPrefix(m.Content, \"?skill1 \")\n\t\t\t\tmonster , errorMonster :=GetMonster(splittedString)\n\t\t\t\tif errorMonster != nil{\n\t\t\t\t\t_, _ = s.ChannelMessageSend(m.ChannelID, errorMonster.Error())\n\t\t\t\t}else{\n\t\t\t\t\tfmt.Println(monster.LeaderSkill)\n\t\t\t\t\tskill, errSkill := GetSkill(monster.Skills[0])\n\t\t\t\t\tif errSkill != nil{\n\t\t\t\t\t\tfmt.Println(monster.Skills[0])\n\t\t\t\t\t\tfmt.Println(errSkill)\n\t\t\t\t\t}\n\t\t\t\t\t_, _ = s.ChannelMessageSendEmbed(m.ChannelID, skill.Print())\n\t\t\t\t}\n\n\n\t\t\t}else if strings.Contains(m.Content,\"2\") {\n\t\t\t\tsplittedString := strings.TrimPrefix(m.Content, \"?skill2 \")\n\t\t\t\tmonster , errorMonster :=GetMonster(splittedString)\n\t\t\t\tif errorMonster != nil{\n\t\t\t\t\t_, _ = s.ChannelMessageSend(m.ChannelID, errorMonster.Error())\n\t\t\t\t}else{\n\t\t\t\t\tskill, errSkill := GetSkill(monster.Skills[1])\n\t\t\t\t\tif errSkill != nil{\n\t\t\t\t\t\tfmt.Println(errSkill)\n\t\t\t\t\t}\n\t\t\t\t\t_, _ = s.ChannelMessageSendEmbed(m.ChannelID, skill.Print())\n\t\t\t\t}\n\n\t\t\t}else if strings.Contains(m.Content,\"3\") {\n\t\t\t\tsplittedString := strings.TrimPrefix(m.Content, \"?skill3 \")\n\t\t\t\tmonster , errorMonster :=GetMonster(splittedString)\n\t\t\t\tif errorMonster != nil{\n\t\t\t\t\t_, _ = s.ChannelMessageSend(m.ChannelID, errorMonster.Error())\n\t\t\t\t}else{\n\t\t\t\t\tskill, errSkill := GetSkill(monster.Skills[2])\n\t\t\t\t\tfmt.Println(skill)\n\t\t\t\t\tif errSkill != nil{\n\t\t\t\t\t\t_, _ = s.ChannelMessageSend(m.ChannelID, errorMonster.Error())\n\t\t\t\t\t}\n\t\t\t\t\tfmt.Println(\"will print skill\")\n\t\t\t\t\ttoto, tutu := s.ChannelMessageSendEmbed(m.ChannelID, skill.Print())\n\t\t\t\t\tfmt.Println(toto)\n\t\t\t\t\tfmt.Println(tutu)\n\t\t\t\t}\n\n\t\t\t}else if strings.Contains(m.Content,\"4\") {\n\t\t\t\tsplittedString := strings.TrimPrefix(m.Content, \"?skill4 \")\n\t\t\t\tmonster , errorMonster :=GetMonster(splittedString)\n\t\t\t\tif errorMonster != nil{\n\t\t\t\t\t_, _ = s.ChannelMessageSend(m.ChannelID, errorMonster.Error())\n\t\t\t\t}else{\n\t\t\t\t\tfmt.Println(len(monster.Skills))\n\t\t\t\t\tskill, errSkill := GetSkill(monster.Skills[3])\n\t\t\t\t\tif errSkill != nil{\n\t\t\t\t\t\tfmt.Println(errSkill)\n\t\t\t\t\t}\n\t\t\t\t\t_, _ = s.ChannelMessageSendEmbed(m.ChannelID, skill.Print())\n\t\t\t\t}\n\n\t\t\t}else if strings.Contains(m.Content,\"leader\") {\n\t\t\t\tsplittedString := strings.TrimPrefix(m.Content, \"?leaderskill \")\n\t\t\t\tmonster , errorMonster :=GetMonster(splittedString)\n\t\t\t\tif errorMonster != nil{\n\t\t\t\t\t_, _ = s.ChannelMessageSend(m.ChannelID, errorMonster.Error())\n\t\t\t\t}else{\n\t\t\t\t\tvar newLeader LeaderSkill\n\t\t\t\t\tif monster.LeaderSkill == newLeader{\n\t\t\t\t\t\t_, _ = s.ChannelMessageSend(m.ChannelID, splittedString+\" has no leader skill\")\n\n\t\t\t\t\t}else{\n\t\t\t\t\t\tfmt.Println(monster.LeaderSkill)\n\t\t\t\t\t\t_, _ = s.ChannelMessageSend(m.ChannelID, monster.LeaderSkill.Print())\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t}\n\t\t}\n\t}\n\n}", "title": "" }, { "docid": "110049ced26ba04a8ef9f11185c11ff1", "score": "0.49364704", "text": "func (i Insert) AppendWireMessage([]byte) ([]byte, error) {\n\tpanic(\"not implemented\")\n}", "title": "" }, { "docid": "a57bcd6029506338625c35c682590c09", "score": "0.49291018", "text": "func (s *server) addPeer(p *peer) {\n\tif p == nil {\n\t\treturn\n\t}\n\n\t// Ignore new peers if we're shutting down.\n\tif atomic.LoadInt32(&s.shutdown) != 0 {\n\t\tp.Disconnect()\n\t\treturn\n\t}\n\n\t// Track the new peer in our indexes so we can quickly look it up either\n\t// according to its public key, or it's peer ID.\n\t// TODO(roasbeef): pipe all requests through to the\n\t// queryHandler/peerManager\n\ts.peersMtx.Lock()\n\n\tpubStr := string(p.addr.IdentityKey.SerializeCompressed())\n\n\ts.peersByID[p.id] = p\n\ts.peersByPub[pubStr] = p\n\n\tif p.inbound {\n\t\ts.inboundPeers[pubStr] = p\n\t} else {\n\t\ts.outboundPeers[pubStr] = p\n\t}\n\n\ts.peersMtx.Unlock()\n\n\t// Launch a goroutine to watch for the termination of this peer so we\n\t// can ensure all resources are properly cleaned up and if need be\n\t// connections are re-established.\n\tgo s.peerTerminationWatcher(p)\n\n\t// Once the peer has been added to our indexes, send a message to the\n\t// channel router so we can synchronize our view of the channel graph\n\t// with this new peer.\n\tgo s.discoverSrv.SynchronizeNode(p.addr.IdentityKey)\n}", "title": "" }, { "docid": "fa6dc2d9dc44219720367256dd263863", "score": "0.4915648", "text": "func (block *SimpleQueueBlock) add(ctx context.Context, message []byte,\n\texternalID int64, externalDt int64, source string, segment int64,\n\tidGen *mft.G, saveMode cn.SaveMode) (id int64, chWait chan bool, err *mft.Error) {\n\tif !block.mx.TryLock(ctx) {\n\t\treturn id, nil, GenerateError(10010001)\n\t}\n\n\tif block.IsUnload {\n\t\tblock.mx.Unlock()\n\t\treturn id, nil, GenerateError(10010007)\n\t}\n\n\tid = idGen.RvGetPart()\n\n\tif externalID == 0 {\n\t\texternalID = id\n\t}\n\n\tmsg := &SimpleQueueMessage{\n\t\tID: id,\n\t\tExternalID: externalID,\n\t\tExternalDt: externalDt,\n\t\tMessage: message,\n\t\tSource: source,\n\t\tSegment: segment,\n\t\tDt: time.Now(),\n\t}\n\n\tblock.Data = append(block.Data, msg)\n\tblock.Len += len(message)\n\tblock.ChangesRv = msg.ID\n\tblock.LastGet = time.Now()\n\n\tif saveMode == cn.SaveWaitSaveMode {\n\t\tchWait = make(chan bool, 1)\n\t\tblock.SaveWait = append(block.SaveWait, chWait)\n\t}\n\n\tblock.mx.Unlock()\n\treturn id, chWait, nil\n}", "title": "" }, { "docid": "f42664bc0ba352580a3c520e69f1ff74", "score": "0.4910047", "text": "func addUniquePeer(peers []net.Addr, peer net.Addr) []net.Addr {\n\tif peerExists(peers, peer) {\n\t\treturn peers\n\t} else {\n\t\treturn append(peers, peer)\n\t}\n}", "title": "" }, { "docid": "b5c6fffcebbe156c3221e5e16a245e98", "score": "0.49096668", "text": "func AddMessage(ctx context.Context, channelName string, message string) (bool, error) {\n\tchannel := getChannel(channelName)\n\tmsg := types.Message{\n\t\tID: utils.NewID(),\n\t\tText: message,\n\t\tTimestamp: time.Now(),\n\t}\n\n\tchannel.History.Write(&msg)\n\n\treceived := false\n\tfor _, listener := range channel.Listeners {\n\t\tselect {\n\t\tcase listener.Channel <- &msg:\n\t\t\treceived = true\n\t\t}\n\t}\n\n\treturn received, nil\n}", "title": "" }, { "docid": "7316b31925efb555b48271afe5de36dc", "score": "0.4909153", "text": "func (msg *Message) append(a *MessageArg) {\n\tmsg.Body = append(msg.Body, a.Body...)\n}", "title": "" }, { "docid": "81b0cc0553d15ef79c60abce02f3a255", "score": "0.49088132", "text": "func (c Channel) InsertMessage(msg string, fromCh int) {\n\t//Check the type of the message and add in the sender id index\n\tif msg == \"ALIVE\" {\n\t\tc.aliveMsg[fromCh] = 1\n\t} else {\n\t\tc.startMsg[fromCh] = 1\n\t}\n}", "title": "" }, { "docid": "a6051d9eb94bac74faa79ec6113be11f", "score": "0.48989263", "text": "func addErrMessage(errMsg *[]string, isValid bool, formatStr string, args ...interface{}) {\n\tif isValid {\n\t\treturn\n\t}\n\t*errMsg = append(*errMsg, fmt.Sprintf(formatStr, args...))\n}", "title": "" }, { "docid": "2c4e9a4fa36d21b2881d55cf46b8fba4", "score": "0.489632", "text": "func addWorker(addr string) {\n\tmodels.PushMsgToList(\"FreeWorkerList\", addr)\n\tfreeWorkerList <- addr\n}", "title": "" }, { "docid": "e6b04e617f24ff6683174403aa302637", "score": "0.48879546", "text": "func (p *Pool) Add(e *payload.Extensible) (bool, error) {\n\tif ok, err := p.verify(e); err != nil || !ok {\n\t\treturn ok, err\n\t}\n\n\tp.lock.Lock()\n\tdefer p.lock.Unlock()\n\n\th := e.Hash()\n\tif _, ok := p.verified[h]; ok {\n\t\treturn false, nil\n\t}\n\n\tlst, ok := p.senders[e.Sender]\n\tif ok && lst.Len() >= p.singleCap {\n\t\tvalue := lst.Remove(lst.Front())\n\t\tdelete(p.verified, value.(*payload.Extensible).Hash())\n\t} else if !ok {\n\t\tlst = list.New()\n\t\tp.senders[e.Sender] = lst\n\t}\n\n\tp.verified[h] = lst.PushBack(e)\n\treturn true, nil\n}", "title": "" }, { "docid": "99af442acb9bf4d15cf8044f26bf8562", "score": "0.48818707", "text": "func (r *room) addPeer(p *peer) {\n\tr.Lock()\n\tdefer r.Unlock()\n\tr.peers[p.uid] = p\n}", "title": "" }, { "docid": "244d931965f7afe8f4e9cbe5ac9c22f5", "score": "0.48758024", "text": "func (m *MessageService) CreateMessage(message *Message) error {\n\tmsgs, ok := m.messagesInChannel[message.Channel.Id]\n\tif !ok {\n\t\tmsgs = make([]*Message, 0, 10)\n\t\tm.messagesInChannel[message.Channel.Id] = msgs\n\t}\n\tmsgs = append(msgs, message)\n\tm.messagesInChannel[message.Channel.Id] = msgs\n\treturn nil\n}", "title": "" }, { "docid": "e0e6fe96b71e7b2883dd0bdb313f4225", "score": "0.48580134", "text": "func (n *Notifier) SendMessage(msg string) {\n\tn.notificationMessages <- msg\n}", "title": "" }, { "docid": "ccc50f23b9ca6916aa082a0bef8ea374", "score": "0.4854483", "text": "func (bb *BlockBuilder) AddMessages(secpmsgs []*types.SignedMessage, blsMsgs []*types.Message) {\n\tctx := context.Background()\n\n\tmeta, err := bb.messages.StoreMessages(ctx, secpmsgs, blsMsgs)\n\trequire.NoError(bb.t, err)\n\n\tbb.block.Messages = meta\n}", "title": "" }, { "docid": "ea742d79be21435179cbb4ec1e5380a5", "score": "0.4852659", "text": "func (r *room) addPeer(p *Peer) {\n\tr.Lock()\n\tdefer r.Unlock()\n\tr.peers[p.uid] = p\n}", "title": "" }, { "docid": "0042ab59fd1484827d5ba613e16768d2", "score": "0.48487476", "text": "func Add(p *pool.Pool, key int, m *dns.Msg, duration time.Duration) error {\n\t// SETEX key duration m\n\tconn, err := p.Get()\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer p.Put(conn)\n\n\tresp := conn.Cmd(\"SETEX\", strconv.Itoa(key), int(duration.Seconds()), ToString(m))\n\n\treturn resp.Err\n}", "title": "" }, { "docid": "a70b00b6fc0a96569b41150a7e930a5b", "score": "0.48191988", "text": "func (ps *PeerStore) Add(p *Peer) {\n\tps.lock.Lock()\n\tdefer ps.lock.Unlock()\n\tps.peers[p.ListenAddr] = p\n}", "title": "" }, { "docid": "1cdbbe5a71d4a6f0f730cd150927e7f8", "score": "0.48168656", "text": "func (w *Watcher) Add(name string) error { return w.AddWith(name) }", "title": "" }, { "docid": "705e17ef86d0aa663ed74ed642e04047", "score": "0.48166907", "text": "func createNewPrivateMessage(origin string, msg string, dest *string) *core.PrivateMessage {\n\tdefaultID := uint32(0) // to enforce NOT sequencing\n\tdefaultHopLimit := uint32(10)\n\tprivateMsg := core.PrivateMessage{Origin: origin, ID: defaultID, Text: msg, Destination: *dest, HopLimit: defaultHopLimit}\n\treturn &privateMsg\n}", "title": "" }, { "docid": "5d515bf8929400fa7a0f9ee5018b19c7", "score": "0.481363", "text": "func (m *Manager) SendMessage(msgData []byte, to ...identity.ID) {\n\tmsg := &pb.Message{Data: msgData}\n\tm.send(marshal(msg), to...)\n}", "title": "" }, { "docid": "709387415475386eac5a13ae0b7f431c", "score": "0.48054233", "text": "func syncNewPeer(nodeMessage NodeMessage) NodeMessage {\n\tlog.Printf(\"Received new peer %v:%v\", nodeMessage.IpAddress, nodeMessage.Port)\n\tnewPeer := repository.Peer {\n\t\tIpAddress: nodeMessage.IpAddress,\n\t\tPort: nodeMessage.Port,\n\t}\n\tsavePeer(newPeer)\n\treturn nodeMessage\n}", "title": "" }, { "docid": "d4e79504d856f521ca22f6f01081d944", "score": "0.48028678", "text": "func (state *State) addRumorMessage(rumor *RumorMessage, sender_addr_string string) (bool, bool) {\n\tminNotPresent := state.db.GetMinNotPresent(rumor.Origin)\n\tisIdGreater := rumor.ID >= minNotPresent\n\tif minNotPresent == rumor.ID && !state.db.PossessRumorMessage(rumor) {\n\t\tstate.db.InsertRumorMessage(rumor)\n\n\t\tif rumor.Text != \"\" {\n\t\t\tfor _, c := range state.addMessageChannels {\n\t\t\t\tc <- Message{Rumor: *rumor, Address: sender_addr_string}\n\t\t\t}\n\t\t}\n\t\treturn true, isIdGreater\n\t} else {\n\t\treturn false, isIdGreater\n\t}\n}", "title": "" }, { "docid": "fc8d2a0be6d4ac742a9d3c207c3f10c7", "score": "0.48023534", "text": "func (ul *usernameList) addUsername(id int, name string) error {\n\tul.Lock()\n\tdefer ul.Unlock()\n\n\t_, exists := ul.idToUsername[id]\n\tif exists {\n\t\treturn errors.New(\"connection already has a username\")\n\t}\n\n\t_, exists = ul.usernameToID[name]\n\tif exists {\n\t\treturn errors.New(\"username already exists\")\n\t}\n\n\tul.idToUsername[id] = name\n\tul.usernameToID[name] = id\n\treturn nil\n}", "title": "" }, { "docid": "12c3dd5d954e6d4e3c109b9df43dbb8c", "score": "0.47937053", "text": "func (k Keeper) AppendMessage(\n\tctx sdk.Context,\n\tmessage types.Message,\n) uint64 {\n\t// Create the message\n\tcount := k.GetMessageCount(ctx)\n\n\t// Set the ID of the appended value\n\tmessage.Id = count\n\n\tstore := prefix.NewStore(ctx.KVStore(k.storeKey), types.KeyPrefix(types.MessageKey))\n\tappendedValue := k.cdc.MustMarshalBinaryBare(&message)\n\tstore.Set(GetMessageIDBytes(message.Id), appendedValue)\n\n\t// Update message count\n\tk.SetMessageCount(ctx, count+1)\n\n\treturn count\n}", "title": "" }, { "docid": "e79ad00ef97eda3d399f9c55ca205d1e", "score": "0.47917393", "text": "func (list *RecentlyUsedList) Add(item string) {\n if item == \"\" { return }\n size := uint(len(list.items))\n foundAt := list.find(item)\n restAt := foundAt + 1\n if restAt > size { restAt = size }\n beforeFound := list.items[0:foundAt]\n aterFound := list.items[restAt:]\n list.items = append([]string {item},\n append(beforeFound, aterFound...)...)\n}", "title": "" }, { "docid": "8eb899bd3cac0274003419664db7a154", "score": "0.4791326", "text": "func messageCreate(spaghetti *discordgo.Session, m *discordgo.MessageCreate) {\n\n\t\t// If the message has a spotify link, add it to a playlist\n\t\tif(getSongId(m.Content)!=\"\") {\n\t\t\taddSongToPlaylist(configuration.SpotifyPlaylistId,getSongId(m.Content))\n\t\t\tspaghetti.MessageReactionAdd(m.ChannelID, m.ID, \"🎵\")\n\t\t}\n\n\t\t// Returns the playlist that the bot has been adding to\n\t\tif(m.Content==\"!playlist\"){\n\t\t\tspaghetti.ChannelMessageSend(m.ChannelID, \"https://open.spotify.com/user/\"+configuration.UserID+\"/playlist/\"+configuration.SpotifyPlaylistId)\n\t\t}\n}", "title": "" }, { "docid": "5363f23553a8cb294334ad25c368cd4b", "score": "0.47880772", "text": "func (e *AlreadyUsedName) SetMsg(msg string) {\n\te.Msg = msg\n}", "title": "" }, { "docid": "59e1189d709693bc424663b2c25a9bb1", "score": "0.47759315", "text": "func (q *Queue) push(ctx context.Context, m Message, creds *auth.Credentials, pid int32) error {\n\tif m.Type <= 0 {\n\t\treturn linuxerr.EINVAL\n\t}\n\n\tq.mu.Lock()\n\tdefer q.mu.Unlock()\n\n\tif !q.obj.CheckPermissions(creds, vfs.MayWrite) {\n\t\t// The calling process does not have write permission on the message\n\t\t// queue, and does not have the CAP_IPC_OWNER capability in the user\n\t\t// namespace that governs its IPC namespace.\n\t\treturn linuxerr.EACCES\n\t}\n\n\t// Queue was removed while the process was waiting.\n\tif q.dead {\n\t\treturn linuxerr.EIDRM\n\t}\n\n\t// Check if sufficient space is available (the queue isn't full.) From\n\t// the man pages:\n\t//\n\t// \"A message queue is considered to be full if either of the following\n\t// conditions is true:\n\t//\n\t// • Adding a new message to the queue would cause the total number\n\t// of bytes in the queue to exceed the queue's maximum size (the\n\t// msg_qbytes field).\n\t//\n\t// • Adding another message to the queue would cause the total\n\t// number of messages in the queue to exceed the queue's maximum\n\t// size (the msg_qbytes field). This check is necessary to\n\t// prevent an unlimited number of zero-length messages being\n\t// placed on the queue. Although such messages contain no data,\n\t// they nevertheless consume (locked) kernel memory.\"\n\t//\n\t// The msg_qbytes field in our implementation is q.maxBytes.\n\tif m.Size+q.byteCount > q.maxBytes || q.messageCount+1 > q.maxBytes {\n\t\treturn linuxerr.EWOULDBLOCK\n\t}\n\n\t// Copy the message into the queue.\n\tq.messages.PushBack(&m)\n\n\tq.byteCount += m.Size\n\tq.messageCount++\n\tq.sendPID = pid\n\tq.sendTime = ktime.NowFromContext(ctx)\n\n\t// Notify receivers about the new message.\n\tq.receivers.Notify(waiter.EventIn)\n\n\treturn nil\n}", "title": "" }, { "docid": "2e069156108bf03df1978be5c6080bb7", "score": "0.4775456", "text": "func (sm *SyncManager) handleNewPeerMsg(peer *peer.Peer) {\n\t// Ignore if in the process of shutting down.\n\tif atomic.LoadInt32(&sm.shutdown) != 0 {\n\t\treturn\n\t}\n\n\tlog.Infof(\"New valid peer %s\", peer)\n\n\t// Initialize the peer state\n\tisSyncCandidate := sm.isSyncCandidate(peer)\n\tsm.peerStates[peer] = &peerSyncState{\n\t\tsyncCandidate: isSyncCandidate,\n\t\trequestedTxns: make(map[common.Uint256]struct{}),\n\t\trequestedBlocks: make(map[common.Uint256]struct{}),\n\t\tfpRate: fprate.NewFpRate(),\n\t}\n\n\tif isSyncCandidate {\n\t\t// Update bloom filter for the candidate peer.\n\t\tsm.pushBloomFilter(peer)\n\n\t\t// Start syncing by choosing the best candidate if needed.\n\t\tif sm.syncPeer == nil {\n\t\t\tsm.startSync()\n\t\t}\n\t}\n}", "title": "" }, { "docid": "134c66d15ddd8914bd54c670f52e20b5", "score": "0.47739065", "text": "func MessageAppendArg(vm *VM, target, locals Interface, msg *Message) Interface {\n\tm := target.(*Message)\n\tr, ok := CheckStop(msg.EvalArgAt(vm, locals, 0), LoopStops)\n\tif !ok {\n\t\treturn r\n\t}\n\tnm, ok := r.(*Message)\n\tif !ok {\n\t\treturn vm.RaiseException(\"argument 0 to appendArg must be Message, not \" + vm.TypeName(r))\n\t}\n\tm.Args = append(m.Args, nm)\n\treturn target\n}", "title": "" }, { "docid": "a2cb29cea1cae1efd0cee28e8f7ae5a3", "score": "0.477292", "text": "func messageCreate(s *discordgo.Session, m *discordgo.MessageCreate) {\n\n\t// Ignore all messages created by the bot itself\n\t// This isn't required in this specific example but it's a good practice.\n\tif m.Author.ID == s.State.User.ID {\n\t\treturn\n\t}\n\n\tmsg := strings.ToLower(m.Content)\n\n\tfmt.Printf(\"%s: %s\\n\", m.Author.ID, msg)\n\n\tif strings.Contains(msg, \"alice\") || rand.Intn(1000) == 173 {\n\t\tmsg = strings.TrimPrefix(msg, \"alice\")\n\t\tmsg = strings.TrimLeft(msg, \":, \")\n\n\t\tfd, err := net.Dial(\"unix\", \"/tmp/alice\")\n\t\tif err != nil {\n\t\t\tfmt.Printf(\"unix socket connect failed\\n\")\n\t\t\treturn\n\t\t}\n\n\t\tbuf := m.Author.ID + \"\\007\" + msg\n\t\t_, err = fd.Write([]byte(buf))\n\t\tif err != nil {\n\t\t\tfmt.Printf(\"write failed\\n\")\n\t\t\treturn\n\t\t}\n\n\t\tout := make([]byte, 8192)\n\t\tn, err := fd.Read(out)\n\t\tif err != nil {\n\t\t\tfmt.Printf(\"read failed\\n\")\n\t\t\treturn\n\t\t}\n\n\t\tfmt.Printf(\"me: %s\\n\", string(out[:n]))\n\n\t\ts.ChannelMessageSend(m.ChannelID, string(out[:n]))\n\n\t\tfd.Close()\n\t}\n}", "title": "" } ]
545752ebb0cd43f76a8e4bdd7aa45dff
NewDocumentsService creates a new initialized instance of the DocumentsService.
[ { "docid": "296e5f85c615cdbdaa24e20e3ad8d151", "score": "0.7540742", "text": "func NewDocumentsService(apiClient *api.Client) *DocumentsService {\n\ts := &DocumentsService{client: apiClient}\n\n\ts.common.client = apiClient\n\n\ts.DocumentAttachments = (*DocumentAttachmentsEndpoint)(&s.common)\n\ts.DocumentCategories = (*DocumentCategoriesEndpoint)(&s.common)\n\ts.DocumentFolders = (*DocumentFoldersEndpoint)(&s.common)\n\ts.Documents = (*DocumentsEndpoint)(&s.common)\n\ts.DocumentTypeCategories = (*DocumentTypeCategoriesEndpoint)(&s.common)\n\ts.DocumentTypeFolders = (*DocumentTypeFoldersEndpoint)(&s.common)\n\ts.DocumentTypes = (*DocumentTypesEndpoint)(&s.common)\n\n\treturn s\n}", "title": "" } ]
[ { "docid": "1f3371752556c0091024334b1ce4e7cc", "score": "0.6982555", "text": "func NewDocumentService(client *httpc.Client) DocumentService {\n\treturn &documentService{\n\t\tClient: client,\n\t}\n}", "title": "" }, { "docid": "f07d60614cf481b8479e751b90185e09", "score": "0.6893216", "text": "func New() *Service {\n\treturn &Service{\n\t\tIndex: make(Index),\n\t\tDocuments: new(bst.Tree),\n\t}\n}", "title": "" }, { "docid": "c6edabc3b5f3d41a743c230ea4258134", "score": "0.6791734", "text": "func NewDocumentService(documentstorage storage.DocumentStorage) DocumentService {\n\tmyDocumentStorage = documentstorage\n\treturn &documentService{}\n}", "title": "" }, { "docid": "bc783e0d84a15115721b3738425b5476", "score": "0.67715365", "text": "func newService(\n\tdocService documents.Service,\n\tidentityService identity.Service,\n\tethClient ethereum.Client,\n\tqueue queue.TaskQueuer,\n\tjobsMan jobs.Manager) Service {\n\treturn &service{\n\t\tdocService: docService,\n\t\tidentityService: identityService,\n\t\tethClient: ethClient,\n\t\tqueue: queue,\n\t\tjobsManager: jobsMan,\n\t}\n}", "title": "" }, { "docid": "6265747de8071cf5164aaee443e53d41", "score": "0.654825", "text": "func NewDoc(client *Client) *DocService {\n\treturn &DocService{\n\t\tclient: client,\n\t}\n}", "title": "" }, { "docid": "4078f9f3e36a1fc404b46cd02aae27a4", "score": "0.61141664", "text": "func newIdentityDocuments(c *IdentityV1alpha1Client) *identityDocuments {\n\treturn &identityDocuments{\n\t\tclient: c.RESTClient(),\n\t}\n}", "title": "" }, { "docid": "03576e053b68c84e24d25b7f45ab5f42", "score": "0.61049944", "text": "func NewService(docSrv documents.Service, jobsSrv jobs.Manager, nftSrv nft.Service, accountsSrv config.Service) Service {\n\treturn Service{\n\t\tdocSrv: docSrv,\n\t\tjobsSrv: jobsSrv,\n\t\tnftSrv: nftSrv,\n\t\taccountsSrv: accountsSrv,\n\t}\n}", "title": "" }, { "docid": "df3906d633a837bd10d3cf91e29679b7", "score": "0.59039766", "text": "func NewDocument(ctx *pulumi.Context,\n\tname string, args *DocumentArgs, opts ...pulumi.ResourceOption) (*Document, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.BranchId == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'BranchId'\")\n\t}\n\tif args.CollectionId == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'CollectionId'\")\n\t}\n\tif args.DataStoreId == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'DataStoreId'\")\n\t}\n\tif args.DocumentId == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'DocumentId'\")\n\t}\n\treplaceOnChanges := pulumi.ReplaceOnChanges([]string{\n\t\t\"branchId\",\n\t\t\"collectionId\",\n\t\t\"dataStoreId\",\n\t\t\"documentId\",\n\t\t\"location\",\n\t\t\"project\",\n\t})\n\topts = append(opts, replaceOnChanges)\n\topts = internal.PkgResourceDefaultOpts(opts)\n\tvar resource Document\n\terr := ctx.RegisterResource(\"google-native:discoveryengine/v1beta:Document\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "0271bc81b6795a83182ef38756158dc1", "score": "0.58694124", "text": "func NewService(callbacks Callbacks) *Service {\n\treturn &Service{\n\t\tcallbacks: callbacks,\n\t\tfileDescriptors: map[int64]*fileDescriptor{},\n\t}\n}", "title": "" }, { "docid": "1752ca451ba68e3b97efc5aad0cd1fb3", "score": "0.5854032", "text": "func NewServices() *Services {\n\treturn &Services{\n\t\tstore: make([]*baker.Service, 0),\n\t}\n}", "title": "" }, { "docid": "77b0bbc256fc9ee3b3e430ef52b99ef0", "score": "0.581133", "text": "func NewService(q storage.Queryable) *Service {\n\ts := NewStorage(q)\n\tservice := &Service{\n\t\tq: q,\n\t\ts: s,\n\t}\n\treturn service\n}", "title": "" }, { "docid": "0146db243348ff0834ffb451217d37cc", "score": "0.5803162", "text": "func NewDocumentsClient(cc grpc.ClientConnInterface) DocumentsClient {\n\treturn src.NewDocumentsClient(cc)\n}", "title": "" }, { "docid": "fbeb9c025c4de889178f0b47a4885589", "score": "0.57455426", "text": "func New(client *http.Client) (*Service, error) {\n\tif client == nil {\n\t\treturn nil, errors.New(\"client is nil\")\n\t}\n\ts := &Service{client: client, BasePath: basePath}\n\ts.Folders = NewFoldersService(s)\n\ts.Organizations = NewOrganizationsService(s)\n\ts.Projects = NewProjectsService(s)\n\treturn s, nil\n}", "title": "" }, { "docid": "77bf0141b77bf5f81b71e4a330e673da", "score": "0.57289106", "text": "func newService(name string) (Service, error) {\n\tsvc, err := openService(name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t// close service handle until we need it later\n\tsvc.Close()\n\treturn &windows{name}, nil\n}", "title": "" }, { "docid": "4cdb4be299501349f6764e015d442508", "score": "0.5728261", "text": "func NewService() Service {\n\treturn service{}\n}", "title": "" }, { "docid": "4e8a34f146ddd390ffba944a50305a5a", "score": "0.5722247", "text": "func NewService(store Storage) Service {\n\treturn service{store}\n}", "title": "" }, { "docid": "d44e741ecac6c9d4aae03c114ce92848", "score": "0.5703033", "text": "func (c PGClient) NewService(name string, host string, uri string, typeService string, runSTR string, projects []string, owner string) (err error) {\n\t_, err = db.Query(\"select new_service_function\", name, host, uri, typeService, runSTR, pg.Array(projects), owner)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn err\n}", "title": "" }, { "docid": "ad78476589a838263c49f130fa38168d", "score": "0.5698697", "text": "func NewService(config *config) *Service {\n\treturn &Service{\n\t\tconfig: config,\n\t\tsearcher: catalog.NewSearcher(),\n\t\tworkers: worker.NewPool(),\n\t}\n}", "title": "" }, { "docid": "0b305c9dbd2c794bbada89a2845561a0", "score": "0.56877327", "text": "func NewService() Service {\n\treturn Service{}\n}", "title": "" }, { "docid": "0b305c9dbd2c794bbada89a2845561a0", "score": "0.56877327", "text": "func NewService() Service {\n\treturn Service{}\n}", "title": "" }, { "docid": "0e23e9ebfc26f3c4776c31db077bbc76", "score": "0.5682053", "text": "func NewService() *Service {\n\ts := &Service{\n\t\tService: copier.NewService(),\n\t}\n\ts.Service.TSDBStore = &s.TSDBStore\n\n\treturn s\n}", "title": "" }, { "docid": "ead1ecdc8949e924106616a3e5ba73ff", "score": "0.56716156", "text": "func NewService() *Service {\n\treturn &Service{\n\t\tName: \"\",\n\t\tUrl: \"\",\n\t\tFile: \"\",\n\t\tPackage: \"\",\n\t\tOrg: \"\",\n\t\tDesign: \"\",\n\t\tDoc: \"\",\n\t\tApi: false,\n\t\tExamples: make([]*Example, 0),\n\t\tRpcs: make([]*Rpc, 0)}\n}", "title": "" }, { "docid": "1b2cb6b4fc35f6774eb55ff570abcaf1", "score": "0.56527996", "text": "func NewService(config Config) (Service, error) {\n\treturn &service{\n\t\tl: config.Logger,\n\t\tcatalog: config.Catalog,\n\t\tdataStore: config.Catalog.DataStores()[0],\n\t}, nil\n}", "title": "" }, { "docid": "b602508c749a0e1160b41cddf8ab8a59", "score": "0.56511277", "text": "func New() (*Service, error) {\n\tclient, err := db.GetClient()\n\tctx := context.Background()\n\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"clinet error %v\", err)\n\t}\n\n\treturn &Service{\n\t\tclient,\n\t\tctx,\n\t}, nil\n}", "title": "" }, { "docid": "a6d5ec8e4f3d85598d17845656470b67", "score": "0.5648639", "text": "func New(db *database.Database) *Service {\n\treturn &Service{\n\t\tdb: db,\n\t}\n}", "title": "" }, { "docid": "56baec3c583539f2c39fce8c5d72a4f8", "score": "0.5647891", "text": "func NewDocument() *Document {\n\treturn &Document{}\n}", "title": "" }, { "docid": "a3b6eda8ae786b313c30d1bf2a2bdec6", "score": "0.56474364", "text": "func NewService(config *api.APIConfig, databaseClient database.Client) Service {\n\treturn &service{\n\t\tconfig: config,\n\t\tdatabaseClient: databaseClient,\n\t}\n}", "title": "" }, { "docid": "e79c5acf585b0b99c0a7b102348e09ee", "score": "0.5643985", "text": "func NewService(apiKey string) *Service {\n\treturn &Service{\n\t\tclient: &http.Client{},\n\t\tapiKey: apiKey,\n\t}\n}", "title": "" }, { "docid": "eaa0c34f94c045b4771cb8586bdb14be", "score": "0.56318754", "text": "func NewService(s Storage) *Service {\n\treturn &Service{s}\n}", "title": "" }, { "docid": "eaa0c34f94c045b4771cb8586bdb14be", "score": "0.56318754", "text": "func NewService(s Storage) *Service {\n\treturn &Service{s}\n}", "title": "" }, { "docid": "c5930e7a65d629dbd9bdc1cd129866b4", "score": "0.5631796", "text": "func New(client *http.Client) (*Service, error) {\n\tif client == nil {\n\t\treturn nil, errors.New(\"client is nil\")\n\t}\n\ts := &Service{client: client, BasePath: basePath}\n\ts.Projects = NewProjectsService(s)\n\treturn s, nil\n}", "title": "" }, { "docid": "c5930e7a65d629dbd9bdc1cd129866b4", "score": "0.5631796", "text": "func New(client *http.Client) (*Service, error) {\n\tif client == nil {\n\t\treturn nil, errors.New(\"client is nil\")\n\t}\n\ts := &Service{client: client, BasePath: basePath}\n\ts.Projects = NewProjectsService(s)\n\treturn s, nil\n}", "title": "" }, { "docid": "c5930e7a65d629dbd9bdc1cd129866b4", "score": "0.5631796", "text": "func New(client *http.Client) (*Service, error) {\n\tif client == nil {\n\t\treturn nil, errors.New(\"client is nil\")\n\t}\n\ts := &Service{client: client, BasePath: basePath}\n\ts.Projects = NewProjectsService(s)\n\treturn s, nil\n}", "title": "" }, { "docid": "c5930e7a65d629dbd9bdc1cd129866b4", "score": "0.5631796", "text": "func New(client *http.Client) (*Service, error) {\n\tif client == nil {\n\t\treturn nil, errors.New(\"client is nil\")\n\t}\n\ts := &Service{client: client, BasePath: basePath}\n\ts.Projects = NewProjectsService(s)\n\treturn s, nil\n}", "title": "" }, { "docid": "c5930e7a65d629dbd9bdc1cd129866b4", "score": "0.5631796", "text": "func New(client *http.Client) (*Service, error) {\n\tif client == nil {\n\t\treturn nil, errors.New(\"client is nil\")\n\t}\n\ts := &Service{client: client, BasePath: basePath}\n\ts.Projects = NewProjectsService(s)\n\treturn s, nil\n}", "title": "" }, { "docid": "c5930e7a65d629dbd9bdc1cd129866b4", "score": "0.5631796", "text": "func New(client *http.Client) (*Service, error) {\n\tif client == nil {\n\t\treturn nil, errors.New(\"client is nil\")\n\t}\n\ts := &Service{client: client, BasePath: basePath}\n\ts.Projects = NewProjectsService(s)\n\treturn s, nil\n}", "title": "" }, { "docid": "c5930e7a65d629dbd9bdc1cd129866b4", "score": "0.5631796", "text": "func New(client *http.Client) (*Service, error) {\n\tif client == nil {\n\t\treturn nil, errors.New(\"client is nil\")\n\t}\n\ts := &Service{client: client, BasePath: basePath}\n\ts.Projects = NewProjectsService(s)\n\treturn s, nil\n}", "title": "" }, { "docid": "c5930e7a65d629dbd9bdc1cd129866b4", "score": "0.5631796", "text": "func New(client *http.Client) (*Service, error) {\n\tif client == nil {\n\t\treturn nil, errors.New(\"client is nil\")\n\t}\n\ts := &Service{client: client, BasePath: basePath}\n\ts.Projects = NewProjectsService(s)\n\treturn s, nil\n}", "title": "" }, { "docid": "c5930e7a65d629dbd9bdc1cd129866b4", "score": "0.5631796", "text": "func New(client *http.Client) (*Service, error) {\n\tif client == nil {\n\t\treturn nil, errors.New(\"client is nil\")\n\t}\n\ts := &Service{client: client, BasePath: basePath}\n\ts.Projects = NewProjectsService(s)\n\treturn s, nil\n}", "title": "" }, { "docid": "c5930e7a65d629dbd9bdc1cd129866b4", "score": "0.5631796", "text": "func New(client *http.Client) (*Service, error) {\n\tif client == nil {\n\t\treturn nil, errors.New(\"client is nil\")\n\t}\n\ts := &Service{client: client, BasePath: basePath}\n\ts.Projects = NewProjectsService(s)\n\treturn s, nil\n}", "title": "" }, { "docid": "c5930e7a65d629dbd9bdc1cd129866b4", "score": "0.5631796", "text": "func New(client *http.Client) (*Service, error) {\n\tif client == nil {\n\t\treturn nil, errors.New(\"client is nil\")\n\t}\n\ts := &Service{client: client, BasePath: basePath}\n\ts.Projects = NewProjectsService(s)\n\treturn s, nil\n}", "title": "" }, { "docid": "c5930e7a65d629dbd9bdc1cd129866b4", "score": "0.5631796", "text": "func New(client *http.Client) (*Service, error) {\n\tif client == nil {\n\t\treturn nil, errors.New(\"client is nil\")\n\t}\n\ts := &Service{client: client, BasePath: basePath}\n\ts.Projects = NewProjectsService(s)\n\treturn s, nil\n}", "title": "" }, { "docid": "c5930e7a65d629dbd9bdc1cd129866b4", "score": "0.5631796", "text": "func New(client *http.Client) (*Service, error) {\n\tif client == nil {\n\t\treturn nil, errors.New(\"client is nil\")\n\t}\n\ts := &Service{client: client, BasePath: basePath}\n\ts.Projects = NewProjectsService(s)\n\treturn s, nil\n}", "title": "" }, { "docid": "c5930e7a65d629dbd9bdc1cd129866b4", "score": "0.5631796", "text": "func New(client *http.Client) (*Service, error) {\n\tif client == nil {\n\t\treturn nil, errors.New(\"client is nil\")\n\t}\n\ts := &Service{client: client, BasePath: basePath}\n\ts.Projects = NewProjectsService(s)\n\treturn s, nil\n}", "title": "" }, { "docid": "c5930e7a65d629dbd9bdc1cd129866b4", "score": "0.5631796", "text": "func New(client *http.Client) (*Service, error) {\n\tif client == nil {\n\t\treturn nil, errors.New(\"client is nil\")\n\t}\n\ts := &Service{client: client, BasePath: basePath}\n\ts.Projects = NewProjectsService(s)\n\treturn s, nil\n}", "title": "" }, { "docid": "c5930e7a65d629dbd9bdc1cd129866b4", "score": "0.5631796", "text": "func New(client *http.Client) (*Service, error) {\n\tif client == nil {\n\t\treturn nil, errors.New(\"client is nil\")\n\t}\n\ts := &Service{client: client, BasePath: basePath}\n\ts.Projects = NewProjectsService(s)\n\treturn s, nil\n}", "title": "" }, { "docid": "c5930e7a65d629dbd9bdc1cd129866b4", "score": "0.5631796", "text": "func New(client *http.Client) (*Service, error) {\n\tif client == nil {\n\t\treturn nil, errors.New(\"client is nil\")\n\t}\n\ts := &Service{client: client, BasePath: basePath}\n\ts.Projects = NewProjectsService(s)\n\treturn s, nil\n}", "title": "" }, { "docid": "dfa5e611970a773a4dfe8cfce2dc5caa", "score": "0.5628241", "text": "func NewService(r Repo) Service { // HL\n\treturn basicService{r}\n}", "title": "" }, { "docid": "2b9167b41aa38b7b7f0a83d32528abff", "score": "0.5624023", "text": "func NewService(sessions session.Repository, users user.Repository) Service {\n\treturn &service{\n\t\tsessions: sessions,\n\t\tusers: users,\n\t}\n}", "title": "" }, { "docid": "818cfd66aa7bf8d8883878d569461119", "score": "0.56152993", "text": "func New(client *http.Client) (*Service, error) {\n\tif client == nil {\n\t\treturn nil, errors.New(\"client is nil\")\n\t}\n\ts := &Service{client: client, BasePath: basePath}\n\ts.Organizations = NewOrganizationsService(s)\n\ts.Projects = NewProjectsService(s)\n\treturn s, nil\n}", "title": "" }, { "docid": "818cfd66aa7bf8d8883878d569461119", "score": "0.56152993", "text": "func New(client *http.Client) (*Service, error) {\n\tif client == nil {\n\t\treturn nil, errors.New(\"client is nil\")\n\t}\n\ts := &Service{client: client, BasePath: basePath}\n\ts.Organizations = NewOrganizationsService(s)\n\ts.Projects = NewProjectsService(s)\n\treturn s, nil\n}", "title": "" }, { "docid": "8906f828fff7da68e62fa91b104239f0", "score": "0.5614209", "text": "func NewService() *service {\n\treturn &service{db: NewDB()}\n}", "title": "" }, { "docid": "c7d3ec967734c1cb6b0751568ed52d7e", "score": "0.5605908", "text": "func NewService(storage storage) Service {\n\treturn &service{\n\t\tstorage: storage,\n\t}\n}", "title": "" }, { "docid": "de100aac12754936b6088a4ec9803180", "score": "0.5600792", "text": "func NewDocument(id, title, path string, size int64) *Document {\n\treturn &Document{\n\t\tID: id,\n\t\tTitle: title,\n\t\tPath: path,\n\t\tSize: size,\n\t\tTime: time.Now(),\n\t}\n}", "title": "" }, { "docid": "0d79192a67c7dae84b88b5c8e1c2d120", "score": "0.55955404", "text": "func NewDocument(name string, dataSets []models.DataSet) Document {\n\treturn Document{\n\t\tname: name,\n\t\tdataSets: dataSets,\n\t}\n}", "title": "" }, { "docid": "282743f43b4e9af12e9c8ccc2a1e4962", "score": "0.55932593", "text": "func NewService(repo Repository, logger log.Logger) Service {\n\treturn service{repo, logger, validation.New()}\n}", "title": "" }, { "docid": "349be2b8ca20d45d5ecd85e06be650ef", "score": "0.5586488", "text": "func NewService(\n\tschema map[string]SchemaItem,\n\tconfig map[string]ConfigItem,\n\tinstances map[string]map[string]interface{},\n\tinfo map[string]string) *Service {\n\treturn &Service{Schema: schema, Config: config, Instances: instances, Info: info}\n}", "title": "" }, { "docid": "c727d234db34618e80248695d08cff9b", "score": "0.55791014", "text": "func NewService(as AuthorDataStore, bs BookDataStore) Service {\n\treturn Service{\n\t\tauthStore: as,\n\t\tbookStore: bs,\n\t}\n}", "title": "" }, { "docid": "8c33e42ce04ae832b9915413487b32f1", "score": "0.5577472", "text": "func ServiceNew(homeDirectory string, org string, dconfig string) {\n\n\t// Verify that env vars are set properly and determine the working directory.\n\tdir, err := VerifyEnvironment(homeDirectory, false, false, \"\")\n\tif err != nil {\n\t\tcliutils.Fatal(cliutils.CLI_INPUT_ERROR, \"'%v %v' %v\", SERVICE_COMMAND, SERVICE_CREATION_COMMAND, err)\n\t}\n\n\tif org == \"\" && os.Getenv(DEVTOOL_HZN_ORG) == \"\" {\n\t\tcliutils.Fatal(cliutils.CLI_INPUT_ERROR, \"'%v %v' must specify either --org or set the %v environment variable.\", SERVICE_COMMAND, SERVICE_CREATION_COMMAND, DEVTOOL_HZN_ORG)\n\t}\n\n\t// Make sure that the input deployment config type is supported.\n\tif !plugin_registry.DeploymentConfigPlugins.HasPlugin(dconfig) {\n\t\tcliutils.Fatal(cliutils.CLI_INPUT_ERROR, \"'%v %v' %v\", SERVICE_COMMAND, SERVICE_CREATION_COMMAND, fmt.Sprintf(\"unsupported deployment config type: %v\", dconfig))\n\t}\n\n\t// Create the working directory.\n\tif err := CreateWorkingDir(dir); err != nil {\n\t\tcliutils.Fatal(cliutils.CLI_INPUT_ERROR, \"'%v %v' %v\", SERVICE_COMMAND, SERVICE_CREATION_COMMAND, err)\n\t}\n\n\t// If there are any horizon metadata files already in the directory then we wont create any files.\n\tcmd := fmt.Sprintf(\"%v %v\", SERVICE_COMMAND, SERVICE_CREATION_COMMAND)\n\tFileNotExist(dir, cmd, USERINPUT_FILE, UserInputExists)\n\tFileNotExist(dir, cmd, SERVICE_DEFINITION_FILE, ServiceDefinitionExists)\n\n\tif org == \"\" {\n\t\torg = os.Getenv(DEVTOOL_HZN_ORG)\n\t}\n\n\t// Create the metadata files.\n\tif err := CreateUserInputs(dir, org); err != nil {\n\t\tcliutils.Fatal(cliutils.CLI_GENERAL_ERROR, \"'%v %v' %v\", SERVICE_COMMAND, SERVICE_CREATION_COMMAND, err)\n\t} else if err := CreateServiceDefinition(dir, org, dconfig); err != nil {\n\t\tcliutils.Fatal(cliutils.CLI_GENERAL_ERROR, \"'%v %v' %v\", SERVICE_COMMAND, SERVICE_CREATION_COMMAND, err)\n\t}\n\n\tfmt.Printf(\"Created horizon metadata files in %v. Edit these files to define and configure your new %v.\\n\", dir, SERVICE_COMMAND)\n}", "title": "" }, { "docid": "1da4639638cd924ed086da0e63f671f9", "score": "0.5572092", "text": "func New(client *http.Client) (*Service, error) {\n\tif client == nil {\n\t\treturn nil, errors.New(\"client is nil\")\n\t}\n\ts := &Service{client: client, BasePath: basePath}\n\ts.About = NewAboutService(s)\n\ts.Changes = NewChangesService(s)\n\ts.Channels = NewChannelsService(s)\n\ts.Comments = NewCommentsService(s)\n\ts.Drives = NewDrivesService(s)\n\ts.Files = NewFilesService(s)\n\ts.Permissions = NewPermissionsService(s)\n\ts.Replies = NewRepliesService(s)\n\ts.Revisions = NewRevisionsService(s)\n\ts.Teamdrives = NewTeamdrivesService(s)\n\treturn s, nil\n}", "title": "" }, { "docid": "16a363cdc9bb3bf12fef0bb81870f100", "score": "0.556655", "text": "func NewService(ctx gousu.IContext) gousu.IService {\n\treturn &Service{\n\t\tsubscribers: make(map[string](chan *kafka.Message)),\n\t\tsubscriberDone: make(chan kafkaDoneEvent),\n\t\tlog: logger.GetLogger(\"service.kafka\"),\n\t\trunning: false,\n\t}\n}", "title": "" }, { "docid": "9d4a4396cec2577ef29f5f60b34797b8", "score": "0.55609953", "text": "func newService(\n\tcfg Config,\n\tidentityService identity.Service,\n\tethClient ethereum.Client,\n\tqueue queue.TaskQueuer,\n\tdocSrv documents.Service,\n\tbindCallerContract func(address common.Address, abi abi.ABI, client ethereum.Client) *bind.BoundContract,\n\tjobsMan jobs.Manager,\n\tapi API,\n\tblockHeightFunc func() (uint64, error)) *service {\n\treturn &service{\n\t\tcfg: cfg,\n\t\tidentityService: identityService,\n\t\tethClient: ethClient,\n\t\tqueue: queue,\n\t\tdocSrv: docSrv,\n\t\tbindCallerContract: bindCallerContract,\n\t\tjobsManager: jobsMan,\n\t\tblockHeightFunc: blockHeightFunc,\n\t\tapi: api,\n\t}\n}", "title": "" }, { "docid": "2533e39beb894e5ba146a763cc26a96b", "score": "0.5557523", "text": "func NewService(r Repository) Service {\n\treturn &service{\n\t\tstore: r,\n\t}\n}", "title": "" }, { "docid": "c77acfbd46b07106653ec9d49b48cd80", "score": "0.5550986", "text": "func newService() (srvc *Service, err error) {\n\tsrvc = &Service{\n\t\tpen: make(map[uint32]chan<- res),\n\t}\n\tsrvc.lis, err = util.DefaultNet.Listen(\"tcp\", \"localhost:0\")\n\treturn\n}", "title": "" }, { "docid": "2ed0b836c7d2871e3672692ef1f66f8b", "score": "0.55507493", "text": "func NewService(config ServiceConfig) (Service, error) {\n\t// Dependencies.\n\tif config.StorageCollection == nil {\n\t\treturn nil, maskAnyf(invalidConfigError, \"storage collection must not be empty\")\n\t}\n\n\tnewService := &service{\n\t\t// Dependencies.\n\t\tstorage: config.StorageCollection,\n\n\t\t// Internals.\n\t\tbootOnce: sync.Once{},\n\t\tcloser: make(chan struct{}, 1),\n\t\tshutdownOnce: sync.Once{},\n\t}\n\n\treturn newService, nil\n}", "title": "" }, { "docid": "9f11ce9fe050f2f94d3100d68ac39c07", "score": "0.55497706", "text": "func NewService(r Repository, c Crawler, cfg Configuration, ns *Notifiers) (ps *Service) {\n\tps = &Service{r, c, cfg, ns}\n\tgo ps.refreshProducts()\n\treturn\n}", "title": "" }, { "docid": "99c3cc367908faf965e07334c5c21432", "score": "0.55483156", "text": "func NewService(\n\tstore Store,\n\tkm keys.Manager,\n\tfc *client.Client,\n\twp *jobs.WorkerPool,\n\ttxs *transactions.Service,\n\ttes *templates.Service,\n) *Service {\n\tcfg := ParseConfig()\n\treturn &Service{store, km, fc, wp, txs, tes, cfg}\n}", "title": "" }, { "docid": "dcf7fdd912b583571321d4b9ed2b2dec", "score": "0.5542386", "text": "func newRootService(sling *sling.Sling) *RootService {\n\treturn &RootService{\n\t\tsling: sling,\n\t}\n}", "title": "" }, { "docid": "7a5932ec9eeb3dfaaa7e5bef062bdb40", "score": "0.55384994", "text": "func New(fs afs.Service, registry task.Registry) Service {\n\treturn &service{fs: fs, registry: registry}\n}", "title": "" }, { "docid": "2a48e8aa13eb602f2e5c98f8fc868c5f", "score": "0.5536382", "text": "func NewService(master Repository) (Service, error) {\n\ts := service{master}\n\treturn &s, nil\n}", "title": "" }, { "docid": "f3664e06880252f1c963c09ffe765b9c", "score": "0.5531811", "text": "func NewService(logger *zerolog.Logger, storage rule.StorageGetter) Service {\n\treturn &service{\n\t\tlogger: logger,\n\t\tstorage: storage,\n\t}\n}", "title": "" }, { "docid": "2d1d1c5d9ad731c4b994f7f57e81297a", "score": "0.55314124", "text": "func NewServices() *Services {\n\treturn &Services{\n\t\tlock: sync.RWMutex{},\n\t\tidNameMap: make(map[string]string),\n\t\tservicesMap: make(map[string][]brisk.ServerInfo),\n\t}\n}", "title": "" }, { "docid": "4690e2e78e562f2180fcc95a1c0498b0", "score": "0.55307066", "text": "func NewNotesService(st store.Store, lg *zap.Logger, ) NotesService {\n\treturn NotesService{\n\t\tlogger: lg,\n\t\tstore: st,\n\t}\n}", "title": "" }, { "docid": "763acd14b47716cc24f8fffdc1d57091", "score": "0.5526432", "text": "func NewService(repo Repository) Service {\n\treturn service{repo}\n}", "title": "" }, { "docid": "d667e5192badc84ef23bcdb5bdfdabf6", "score": "0.5526247", "text": "func NewService() (Service, error) {\n\tservice := &service{}\n\treturn service, nil\n}", "title": "" }, { "docid": "e05e7b3564a6ff26cf2cd3c05fa144ff", "score": "0.55245835", "text": "func New(store Storage) *Service {\n\ts := &Service{\n\t\tstorage: store,\n\t}\n\treturn s\n}", "title": "" }, { "docid": "2016de1b71101fa70ffcff924462defd", "score": "0.5524192", "text": "func NewService(root webdav.FileSystem, us users.Service) notification.Service {\n\treturn &service{\n\t\tfs: root,\n\t\tusers: us,\n\t\tchs: make(map[struct {\n\t\t\tCtx context.Context\n\t\t\tUser users.UserSpec\n\t\t}]chan<- []notification.Notification),\n\t}\n}", "title": "" }, { "docid": "cd8d171c132ca115803f6a7df346d675", "score": "0.55209225", "text": "func NewService(s Store) Service {\n\treturn &service{s: s}\n}", "title": "" }, { "docid": "cd8d171c132ca115803f6a7df346d675", "score": "0.55209225", "text": "func NewService(s Store) Service {\n\treturn &service{s: s}\n}", "title": "" }, { "docid": "d83983ef255d4a311ca8ff7a681b6aea", "score": "0.5518775", "text": "func NewService(\n\tgenericClusters Store,\n\tclusterManager ClusterManager,\n\tnodePools NodePoolStore,\n\tnodePoolManager NodePoolManager,\n\tnodePoolProcessor NodePoolProcessor,\n\tnodePoolValidator NodePoolValidator,\n) Service {\n\treturn service{\n\t\tgenericClusters: genericClusters,\n\t\tclusterManager: clusterManager,\n\t\tnodePools: nodePools,\n\t\tnodePoolManager: nodePoolManager,\n\t\tnodePoolProcessor: nodePoolProcessor,\n\t\tnodePoolValidator: nodePoolValidator,\n\t}\n}", "title": "" }, { "docid": "20d776185ec9c4b3969b5fce94b244de", "score": "0.5515216", "text": "func NewService(rstCfg api.Config) *Service {\n\tsvc := Service{\n\t\tConfig: rstCfg,\n\t\tClient: rstCfg.New(),\n\t}\n\treturn &svc\n}", "title": "" }, { "docid": "246a6fa74a9644bc6a1fd565e2b30cf4", "score": "0.551225", "text": "func New() endly.Service {\n\tvar result = &service{\n\t\tAbstractService: endly.NewAbstractService(ServiceID),\n\t}\n\tresult.AbstractService.Service = result\n\tresult.registerRoutes()\n\treturn result\n}", "title": "" }, { "docid": "246a6fa74a9644bc6a1fd565e2b30cf4", "score": "0.5512159", "text": "func New() endly.Service {\n\tvar result = &service{\n\t\tAbstractService: endly.NewAbstractService(ServiceID),\n\t}\n\tresult.AbstractService.Service = result\n\tresult.registerRoutes()\n\treturn result\n}", "title": "" }, { "docid": "246a6fa74a9644bc6a1fd565e2b30cf4", "score": "0.5512159", "text": "func New() endly.Service {\n\tvar result = &service{\n\t\tAbstractService: endly.NewAbstractService(ServiceID),\n\t}\n\tresult.AbstractService.Service = result\n\tresult.registerRoutes()\n\treturn result\n}", "title": "" }, { "docid": "b496107068d954a2367a8e680107fe43", "score": "0.5508064", "text": "func NewService(repo Repository, logger log.Logger) Service {\n\treturn service{repo, logger}\n}", "title": "" }, { "docid": "0af2686a25a0fa51846af59a08784276", "score": "0.550349", "text": "func NewService(repos *repository.Repositories) *Service {\n\ts := &Service{\n\t\tdefaultQueueName: config.Get(\"queue_default\"),\n\t\tqueue: repos.Queue,\n\t\trouting: repos.Routing,\n\t\trunningQueues: make(map[string]RunningQueue),\n\t}\n\ts.queueW = newConfigWatcher(\n\t\ts.queue.Revision,\n\t\ts.reloadQueues,\n\t)\n\ts.routingW = newConfigWatcher(\n\t\ts.routing.Revision,\n\t\ts.reloadRoutings,\n\t)\n\n\ts.mu.Lock()\n\tdefer s.mu.Unlock()\n\n\ts.muJob.Lock()\n\tdefer s.muJob.Unlock()\n\n\ts.startup()\n\ts.queueW.start(configRefreshInterval())\n\ts.routingW.start(configRefreshInterval())\n\n\treturn s\n}", "title": "" }, { "docid": "4dd7b0e607ccba2f4d5d20938555a87b", "score": "0.5498303", "text": "func New(client *http.Client) (*Service, error) {\n\tif client == nil {\n\t\treturn nil, errors.New(\"client is nil\")\n\t}\n\ts := &Service{client: client, BasePath: basePath}\n\ts.Searchanalytics = NewSearchanalyticsService(s)\n\ts.Sitemaps = NewSitemapsService(s)\n\ts.Sites = NewSitesService(s)\n\ts.UrlTestingTools = NewUrlTestingToolsService(s)\n\treturn s, nil\n}", "title": "" }, { "docid": "2954b15e8e8a9982972a2425b64bc403", "score": "0.5492896", "text": "func newService(name string) *service {\n\tr := &service{\n\t\tObject: js.Global.Get(\"Object\").New(),\n\t}\n\tr.name = name\n\n\treturn r\n}", "title": "" }, { "docid": "56c8096697f7a4b1dc5cb5b8bc162eae", "score": "0.5491954", "text": "func NewService(datas data.DataRepository) Service {\n\treturn &service{\n\t\tdatas: datas,\n\t}\n}", "title": "" }, { "docid": "252c984b2e9c72e3fd5448d5ecb2da76", "score": "0.54917765", "text": "func NewService(controller Controller, logger *logrus.Logger) Service {\n\treturn Service{controller: controller, logger: logger}\n}", "title": "" }, { "docid": "7771706421ce8ffdaee1427ab8184bfa", "score": "0.5482013", "text": "func New(client *http.Client) (*Service, error) {\n\tif client == nil {\n\t\treturn nil, errors.New(\"client is nil\")\n\t}\n\ts := &Service{client: client, BasePath: basePath}\n\ts.Sheets = NewSheetsService(s)\n\treturn s, nil\n}", "title": "" }, { "docid": "472b10b449452186e22bbf85fc95b7c8", "score": "0.54799193", "text": "func NewService(store shortly.LinkRepository) Service {\n\treturn &service{\n\t\tstore: store,\n\t}\n}", "title": "" }, { "docid": "b7d1bd6c1658972b37d2f3930da8eee8", "score": "0.5478665", "text": "func New() *Service {\n\treturn &Service{}\n}", "title": "" }, { "docid": "b7d1bd6c1658972b37d2f3930da8eee8", "score": "0.5478665", "text": "func New() *Service {\n\treturn &Service{}\n}", "title": "" }, { "docid": "b7d1bd6c1658972b37d2f3930da8eee8", "score": "0.5478665", "text": "func New() *Service {\n\treturn &Service{}\n}", "title": "" }, { "docid": "a8124685df4e71c6f50ac6e851ba289c", "score": "0.5475351", "text": "func newConsoleServices(c *AdminV1beta1Client, namespace string) *consoleServices {\n\treturn &consoleServices{\n\t\tclient: c.RESTClient(),\n\t\tns: namespace,\n\t}\n}", "title": "" }, { "docid": "6b03b5f87538034d0c9957e37f685850", "score": "0.5474373", "text": "func GetNewService(projectName string, name string) *Service {\n\tservice := &Service{}\n\tservice.ProjectName = projectName\n\tservice.Name = name\n\tservice.Config = &container.Config{}\n\tservice.HostConfig = &container.HostConfig{}\n\tservice.NetworkingConfig = &network.NetworkingConfig{}\n\treturn service\n}", "title": "" }, { "docid": "79a64c58c9445a9da08a838d48f24861", "score": "0.5468222", "text": "func New(db *sql.DB, ls *pq.Listener) *Service {\n\treturn &Service{\n\t\tdb: db,\n\t\tlistener: ls,\n\t}\n}", "title": "" }, { "docid": "0633ee76dc716acb0b36cf82e6ee5292", "score": "0.5462939", "text": "func New(client *http.Client) (*Service, error) {\n\tif client == nil {\n\t\treturn nil, errors.New(\"client is nil\")\n\t}\n\ts := &Service{client: client, BasePath: basePath}\n\ts.Accounts = NewAccountsService(s)\n\ts.Operations = NewOperationsService(s)\n\ts.Products = NewProductsService(s)\n\treturn s, nil\n}", "title": "" }, { "docid": "0d19ac877abcebdc9e85b81dc419a131", "score": "0.5460803", "text": "func NewService(ctx context.Context, opts ...option.ClientOption) (*Service, error) {\n\tscopesOption := internaloption.WithDefaultScopes(\n\t\t\"https://www.googleapis.com/auth/cloud_search\",\n\t\t\"https://www.googleapis.com/auth/cloud_search.debug\",\n\t\t\"https://www.googleapis.com/auth/cloud_search.indexing\",\n\t\t\"https://www.googleapis.com/auth/cloud_search.query\",\n\t\t\"https://www.googleapis.com/auth/cloud_search.settings\",\n\t\t\"https://www.googleapis.com/auth/cloud_search.settings.indexing\",\n\t\t\"https://www.googleapis.com/auth/cloud_search.settings.query\",\n\t\t\"https://www.googleapis.com/auth/cloud_search.stats\",\n\t\t\"https://www.googleapis.com/auth/cloud_search.stats.indexing\",\n\t)\n\t// NOTE: prepend, so we don't override user-specified scopes.\n\topts = append([]option.ClientOption{scopesOption}, opts...)\n\topts = append(opts, internaloption.WithDefaultEndpoint(basePath))\n\topts = append(opts, internaloption.WithDefaultMTLSEndpoint(mtlsBasePath))\n\tclient, endpoint, err := htransport.NewClient(ctx, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\ts, err := New(client)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif endpoint != \"\" {\n\t\ts.BasePath = endpoint\n\t}\n\treturn s, nil\n}", "title": "" } ]
3f3c87b8eff143009a83a69af202470d
GetQueueCountViaExpire Get Queue via Expire
[ { "docid": "5bdd8910f95565a1f5cc83003d9dece9", "score": "0.8403338", "text": "func GetQueueCountViaExpire(iExpire int) int64 {\n\tn, _ := Engine.Where(\"expire = ?\", iExpire).Count(&Queue{Expire: iExpire})\n\treturn n\n}", "title": "" } ]
[ { "docid": "3e08d49f734263de3be6be1ae0450bb3", "score": "0.6659602", "text": "func GetQueueViaExpire(iExpire int) (*Queue, error) {\n\tvar _Queue = &Queue{Expire: iExpire}\n\thas, err := Engine.Get(_Queue)\n\tif has {\n\t\treturn _Queue, err\n\t} else {\n\t\treturn nil, err\n\t}\n}", "title": "" }, { "docid": "95560f39d83382ba01d914e349689b82", "score": "0.6520479", "text": "func GetQueueCountViaCreated(iCreated int) int64 {\n\tn, _ := Engine.Where(\"created = ?\", iCreated).Count(&Queue{Created: iCreated})\n\treturn n\n}", "title": "" }, { "docid": "bef45becdd878273380fb8e69613ee39", "score": "0.6274319", "text": "func GetCacheEntityCountViaExpire(iExpire int) int64 {\n\tn, _ := Engine.Where(\"expire = ?\", iExpire).Count(&CacheEntity{Expire: iExpire})\n\treturn n\n}", "title": "" }, { "docid": "356221eed74c72c2c8ad5b512e6044c7", "score": "0.6201146", "text": "func GetQueuesViaExpire(offset int, limit int, Expire_ int, field string) (*[]*Queue, error) {\n\tvar _Queue = new([]*Queue)\n\terr := Engine.Table(\"queue\").Where(\"expire = ?\", Expire_).Limit(limit, offset).Desc(field).Find(_Queue)\n\treturn _Queue, err\n}", "title": "" }, { "docid": "f74498eeeb90724f9a63c83d03a1fc58", "score": "0.6118525", "text": "func DeleteQueueViaExpire(iExpire int) (err error) {\n\tvar has bool\n\tvar _Queue = &Queue{Expire: iExpire}\n\tif has, err = Engine.Get(_Queue); (has == true) && (err == nil) {\n\t\tif row, err := Engine.Where(\"expire = ?\", iExpire).Delete(new(Queue)); (err != nil) || (row <= 0) {\n\t\t\treturn err\n\t\t} else {\n\t\t\treturn nil\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "1e9f5bb7e2943675fbb8579b2df1a2d4", "score": "0.60794103", "text": "func PutQueueViaExpire(Expire_ int, iQueue *Queue) (int64, error) {\n\trow, err := Engine.Update(iQueue, &Queue{Expire: Expire_})\n\treturn row, err\n}", "title": "" }, { "docid": "c7051fd1ae583afc9512e1790182ca3c", "score": "0.60700315", "text": "func HasQueueViaExpire(iExpire int) bool {\n\tif has, err := Engine.Where(\"expire = ?\", iExpire).Get(new(Queue)); err != nil {\n\t\treturn false\n\t} else {\n\t\tif has {\n\t\t\treturn true\n\t\t}\n\t\treturn false\n\t}\n}", "title": "" }, { "docid": "b584010e493f0dc7da714095ba7c2403", "score": "0.60129935", "text": "func GetQueueCountViaName(iName string) int64 {\n\tn, _ := Engine.Where(\"name = ?\", iName).Count(&Queue{Name: iName})\n\treturn n\n}", "title": "" }, { "docid": "245751c7f3ffd868c18b471f187a7403", "score": "0.587801", "text": "func (q expirationQueue[K, V]) Len() int {\n\treturn len(q)\n}", "title": "" }, { "docid": "76a41100c42301325fced5c3306b9179", "score": "0.58676314", "text": "func (tq *TimeQueue) Count() uint64 {\n\treturn tq.count\n}", "title": "" }, { "docid": "ebe31e0a225445ae6b6030a84b40ee41", "score": "0.58192843", "text": "func GetCacheConfigCountViaExpire(iExpire int) int64 {\n\tn, _ := Engine.Where(\"expire = ?\", iExpire).Count(&CacheConfig{Expire: iExpire})\n\treturn n\n}", "title": "" }, { "docid": "4148607a19be01b3d1e36ca2eb9b4ecd", "score": "0.58161217", "text": "func GetCacheDefaultCountViaExpire(iExpire int) int64 {\n\tn, _ := Engine.Where(\"expire = ?\", iExpire).Count(&CacheDefault{Expire: iExpire})\n\treturn n\n}", "title": "" }, { "docid": "07233994506ac6fc71e8c58a7f9275d2", "score": "0.58140254", "text": "func GetQueueCountViaItemId(iItemId int64) int64 {\n\tn, _ := Engine.Where(\"item_id = ?\", iItemId).Count(&Queue{ItemId: iItemId})\n\treturn n\n}", "title": "" }, { "docid": "876c75bb55753726f3045e044f213d43", "score": "0.577052", "text": "func (e *Endpoint) NumQueued() int {\n\treturn e.q.Num()\n}", "title": "" }, { "docid": "6f2f45e9a733458ef28cd62ff5457dab", "score": "0.57595444", "text": "func (q *Queue) Count() int {\n\treturn q.count\n}", "title": "" }, { "docid": "bec2c80ebe7ae3ab769acea6a3c7e8f5", "score": "0.57509285", "text": "func (rs *Requests) Queue() int {\n\treturn len(rs.queue)\n}", "title": "" }, { "docid": "1d8262e60cf8e46b72f86cdab95bb6ff", "score": "0.5745293", "text": "func GetQueueCountViaData(iData []byte) int64 {\n\tn, _ := Engine.Where(\"data = ?\", iData).Count(&Queue{Data: iData})\n\treturn n\n}", "title": "" }, { "docid": "7ee51fe0fa33ff37b2c59c72bf31c368", "score": "0.5712601", "text": "func GetQueue() (amboy.Queue, error) { return servicesCache.getQueue() }", "title": "" }, { "docid": "8b98cdaa3a960dea72fd3738acaa479e", "score": "0.5655012", "text": "func (sb *ServiceBusHelper) CheckQueue(name string) (ServiceBusResponse, error) {\n\n\tl1, err := sb.qMgr.List(context.Background())\n\tif err != nil {\n\t\tlog.Fatal(\"BOOM on queue\")\n\t}\n\n\tresp := ServiceBusResponse{}\n\tresp.AllCountDetails = make(map[string]*servicebus.CountDetails)\n\n\tif name != \"\" {\n\t\tfor _, i := range l1 {\n\t\t\tif i.Name == name {\n\t\t\t\tresp.AllCountDetails[i.Name] = i.CountDetails\n\t\t\t}\n\t\t}\n\t} else {\n\t\tfor _, i := range l1 {\n\t\t\tresp.AllCountDetails[i.Name] = i.CountDetails\n\t\t}\n\t}\n\n\tfmt.Printf(\"RES SIZE %d\\n\", len(resp.AllCountDetails))\n\treturn resp, nil\n}", "title": "" }, { "docid": "049f7c32bd50d43a2289e8c70be1af1f", "score": "0.5623457", "text": "func (c *Client) GetQueueCount() int {\n\treturn len(c.work)\n}", "title": "" }, { "docid": "82199fdaf5255b4fb9e65fd3ceeff9fb", "score": "0.55978173", "text": "func GetCacheDynamicPageCacheCountViaExpire(iExpire int) int64 {\n\tn, _ := Engine.Where(\"expire = ?\", iExpire).Count(&CacheDynamicPageCache{Expire: iExpire})\n\treturn n\n}", "title": "" }, { "docid": "5368fd41de720768a540e392262689f3", "score": "0.5596192", "text": "func (channel MessageQueue) GetNumQueued() int {\n\treturn len(channel)\n}", "title": "" }, { "docid": "624b0541ef13ca271a03fb0ef5de6a36", "score": "0.559096", "text": "func (q *eventQueueMem) getQueueSizeInEvents() int {\n\t// eventSize is the memory footprint per event in bytes. This is NOT the\n\t// size of a single event, but the overall impact in memory consumption to\n\t// each cached event (defined by experimentation)\n\teventSize := 1024\n\n\tkbToB := func(amountInKB int) int {\n\t\treturn amountInKB * 1024\n\t}\n\tmbToKB := func(amountInMB int) int {\n\t\treturn amountInMB * 1024\n\t}\n\tgbToMB := func(amountInGB int) int {\n\t\treturn amountInGB * 1024\n\t}\n\tamountOfEvents := func(amountInMB int) int {\n\t\treturn mbToKB(kbToB(amountInMB)) / eventSize\n\t}\n\n\t// EventsCacheMemSize was provided, return exact amount of events for it\n\tif q.eventsCacheMemSizeMB > 0 {\n\t\treturn amountOfEvents(q.eventsCacheMemSizeMB)\n\t}\n\n\tswitch {\n\tcase q.eventsCacheMemSizeMB <= gbToMB(1): // up to 1GB, cache = ~256MB in events #\n\t\treturn amountOfEvents(256)\n\tcase q.eventsCacheMemSizeMB <= gbToMB(4): // up to 4GB, cache = ~512MB in events #\n\t\treturn amountOfEvents(512)\n\tcase q.eventsCacheMemSizeMB <= gbToMB(8): // up to 8GB, cache = ~1GB in events #\n\t\treturn amountOfEvents(gbToMB(1))\n\tcase q.eventsCacheMemSizeMB <= gbToMB(16): // up to 16GB, cache = ~2GB in events #\n\t\treturn amountOfEvents(gbToMB(2))\n\t}\n\n\t// bigger hosts, cache = ~4GB in events #\n\treturn amountOfEvents(gbToMB(4))\n}", "title": "" }, { "docid": "283d4163318dc37e3333bff16578d694", "score": "0.5573447", "text": "func (c ConcurrentQueue) Count() int {\n\tc.lock.Lock()\n\tdefer c.lock.Unlock()\n\treturn c.container.Len()\n}", "title": "" }, { "docid": "e2a7a8c59497f660897f7a9a6c50f535", "score": "0.55655074", "text": "func (q *queue) expire(timeout time.Duration, pendPool map[string]*fetchRequest, taskQueue *prque.Prque, timeoutMeter metrics.Meter) map[string]int {\n\t// Iterate over the expired requests and return each to the queue\n\texpiries := make(map[string]int)\n\tfor id, request := range pendPool {\n\t\tif time.Since(request.Time) > timeout {\n\t\t\t// Update the metrics with the timeout\n\t\t\ttimeoutMeter.Mark(1)\n\n\t\t\t// Return any non satisfied requests to the pool\n\t\t\tif request.From > 0 {\n\t\t\t\ttaskQueue.Push(request.From, -float32(request.From))\n\t\t\t}\n\t\t\tfor _, header := range request.Headers {\n\t\t\t\ttaskQueue.Push(header, -float32(header.Number.Uint64()))\n\t\t\t}\n\t\t\t// Add the peer to the expiry report along the the number of failed requests\n\t\t\texpiries[id] = len(request.Headers)\n\t\t}\n\t}\n\t// Remove the expired requests from the pending pool\n\tfor id := range expiries {\n\t\tdelete(pendPool, id)\n\t}\n\treturn expiries\n}", "title": "" }, { "docid": "483756c675c6f49f45bab08004f4159a", "score": "0.54715407", "text": "func SetQueueViaExpire(iExpire int, queue *Queue) (int64, error) {\n\tqueue.Expire = iExpire\n\treturn Engine.Insert(queue)\n}", "title": "" }, { "docid": "80bf803480b60c8418fb30a84fea200f", "score": "0.5374327", "text": "func (m *NodeKeeperMock) GetClaimQueueMinimockCounter() uint64 {\n\treturn atomic.LoadUint64(&m.GetClaimQueueCounter)\n}", "title": "" }, { "docid": "fa7e095fdaba26148dcf4e33f6ae883f", "score": "0.53703386", "text": "func (m memoryQueue) Size() (int, error) {\n\treturn len(m.caches), nil\n}", "title": "" }, { "docid": "aa98b169f833ecdc126fe0ad12e57a7d", "score": "0.5364566", "text": "func (tq *TaskQueue) Size() int {\n\ttq.lock.Lock()\n\tdefer tq.lock.Unlock()\n\n\tvar ret int\n\n\tfor _, q := range tq.queues {\n\t\tret += q.Size()\n\t}\n\n\treturn ret\n}", "title": "" }, { "docid": "bad24880acc7a425374393c9f6a11c8b", "score": "0.5324025", "text": "func (this *ActionSet) GetCount() int {\n\treturn len(this.queue)\n}", "title": "" }, { "docid": "a75514a1e794962430b53317f26e99be", "score": "0.5322553", "text": "func GetQueueViaCreated(iCreated int) (*Queue, error) {\n\tvar _Queue = &Queue{Created: iCreated}\n\thas, err := Engine.Get(_Queue)\n\tif has {\n\t\treturn _Queue, err\n\t} else {\n\t\treturn nil, err\n\t}\n}", "title": "" }, { "docid": "936a48b241ff06585664a8b58f2b4b85", "score": "0.53182304", "text": "func (c *JobQueue) Len() (int, error) {\n\tr := c.pool.Get()\n\tdefer r.Close()\n\tl, err := redis.Int(r.Do(\"HLEN\", c.Queue+\":payload\"))\n\tif err == redis.ErrNil {\n\t\treturn 0, nil\n\t}\n\treturn l, err\n}", "title": "" }, { "docid": "0873aed4dbd1ef11cfa07f2c3f9c9680", "score": "0.5295739", "text": "func (t *TaskQueue) Len() int { return t.queue.Len() }", "title": "" }, { "docid": "db29a86012544a1a037981dc45837ecc", "score": "0.528628", "text": "func (q *Queue[T]) Size() uint {\n\treturn q.container.Size()\n}", "title": "" }, { "docid": "59095fd34224685e5a489426305009c4", "score": "0.5242995", "text": "func (q *TSQueue) Size() int {\n\tq.mu.Lock()\n\tdefer q.mu.Unlock()\n\treturn len(q.q)\n}", "title": "" }, { "docid": "00a4f5c5d2cefbd8715b3576ec3b51ac", "score": "0.5224321", "text": "func (r *NatsController) GetCount() int32 {\n\tsub, err := r.Client.SubscribeSync(r.Config.Queue)\n\tif err != nil {\n\t\treturn -1\n\t}\n\tcount, _, err := sub.Pending()\n\tif err != nil {\n\t\treturn -1\n\t}\n\treturn int32(count)\n}", "title": "" }, { "docid": "dac93f576725e07819ddbf4c326dcf67", "score": "0.5205129", "text": "func (b *PQueue) Size(priority int) (int, error) {\n\tp, err := getBucketName(priority)\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\tcount := 0\n\terr = b.conn.View(func(tx *bolt.Tx) error {\n\t\tbucket := tx.Bucket(p)\n\t\tvar err error\n\t\tcount, err = countBucket(bucket)\n\t\treturn err\n\t})\n\treturn count, err\n}", "title": "" }, { "docid": "9bb1055bc1c8b622b046727f653d6229", "score": "0.5193297", "text": "func (q *Queue) Size() int {\n\tq.mu.Lock()\n\tdefer q.mu.Unlock()\n\n\treturn q.count\n}", "title": "" }, { "docid": "9140a61ce94046afbde03ff26e834f8b", "score": "0.519166", "text": "func GetQueuesByExpireAndCreated(offset int, limit int, Expire_ int, Created_ int) (*[]*Queue, error) {\n\tvar _Queue = new([]*Queue)\n\terr := Engine.Table(\"queue\").Where(\"expire = ? and created = ?\", Expire_, Created_).Limit(limit, offset).Find(_Queue)\n\treturn _Queue, err\n}", "title": "" }, { "docid": "156cf4cceda41824f19658f7769fde34", "score": "0.5187069", "text": "func (mq *MessageQueue) Size() int64 {\n\tmq.lk.RLock()\n\tdefer mq.lk.RUnlock()\n\n\tvar l int64\n\tfor _, q := range mq.queues {\n\t\tl += int64(len(q))\n\t}\n\treturn l\n}", "title": "" }, { "docid": "6a5f37736eaf70446c76776d61136603", "score": "0.5180471", "text": "func (s *TaskScheduler) QueueLen() int {\n\ts.queueMtx.RLock()\n\tdefer s.queueMtx.RUnlock()\n\treturn len(s.queue)\n}", "title": "" }, { "docid": "6dc6df83734ef71c67c732dbd839feef", "score": "0.5173878", "text": "func (b *PQueue) Len(topic string, priority int) (int, error) {\n\tif priority < 0 || priority > 255 {\n\t\treturn 0, fmt.Errorf(\"Invalid priority %d for Size()\", priority)\n\t}\n\ttx, err := b.conn.Begin(false)\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\tdefer tx.Rollback()\n\tbtopic := append([]byte(topic), byte(uint8(priority)))\n\tbucket := tx.Bucket(btopic)\n\tif bucket == nil {\n\t\treturn 0, nil\n\t}\n\tcount := bucket.Stats().KeyN\n\treturn count, nil\n}", "title": "" }, { "docid": "d9fb0fd8b97b08dff851c4a4ba3fc291", "score": "0.51487505", "text": "func (q *UnsafeBytesQueue) Quantity() uint32 {\n\tif q.putPos >= q.getPos {\n\t\treturn q.putPos - q.getPos\n\t}\n\treturn q.capMod + (q.putPos - q.getPos)\n}", "title": "" }, { "docid": "f41a9e9f856a5a864e1bada7b2323dfd", "score": "0.5138187", "text": "func (client *Client) QueueSize(dbName string) (int, error) {\n\n\tc := client.Pool.Get()\n\n\tdefer c.Close()\n\n\treturn redis.Int(c.Do(\"LLEN\", dbName))\n}", "title": "" }, { "docid": "e309ba325fab58ff5ba429968a5971f5", "score": "0.5137751", "text": "func (this *MyQueue) Peek() int {\n\tif len(this.List) == 0 {\n\t\treturn 0\n\t}\n\n\tvalue := this.List[0]\n\treturn value\n}", "title": "" }, { "docid": "a8f6d3b4e9b574eeaa11bd55a069a7c7", "score": "0.5133778", "text": "func (st *Queue) Len() int {\n st.Lock()\n defer st.Unlock()\n\n return len(st.queue)\n}", "title": "" }, { "docid": "7beec8b494507f855c1f9880f3cb4222", "score": "0.512287", "text": "func (q *ticketQueue) Length() int32 {\n\treturn atomic.LoadInt32(&q.queueLen)\n}", "title": "" }, { "docid": "4ceecab4b88f0f837b4859dd3572d3d1", "score": "0.5116118", "text": "func (s *delayedTransmissionEventStorage) Count(before time.Time) int {\n\ts.mu.RLock()\n\tdefer s.mu.RUnlock()\n\n\terr := s.readCache()\n\tif err != nil {\n\t\ts.logger.Errorf(\"Error '%s', while reading event cache.\", err)\n\t}\n\n\tif s.cache.LastSubmittedAt.Add(s.interval).Before(before) || len(s.cache.Events) >= s.capacity {\n\t\treturn len(s.cache.Events)\n\t}\n\n\treturn 0\n}", "title": "" }, { "docid": "59f9836804727975a6630ad6da74b8ee", "score": "0.50954664", "text": "func (pq *PriorityQueue) Len() int { return pq.queue.Len() }", "title": "" }, { "docid": "d95357fa80f6b1e7cb7da516caeb48e0", "score": "0.50886965", "text": "func GetQueuesByNameAndExpire(offset int, limit int, Name_ string, Expire_ int) (*[]*Queue, error) {\n\tvar _Queue = new([]*Queue)\n\terr := Engine.Table(\"queue\").Where(\"name = ? and expire = ?\", Name_, Expire_).Limit(limit, offset).Find(_Queue)\n\treturn _Queue, err\n}", "title": "" }, { "docid": "f41d572a2a579114c908678751a4b531", "score": "0.5077435", "text": "func (s *Scheduler) IssuerQueueSize(issuerID identity.ID) int {\n\ts.evictionMutex.RLock()\n\tdefer s.evictionMutex.RUnlock()\n\ts.bufferMutex.RLock()\n\tdefer s.bufferMutex.RUnlock()\n\n\tissuerQueue := s.buffer.IssuerQueue(issuerID)\n\tif issuerQueue == nil {\n\t\treturn 0\n\t}\n\n\treturn issuerQueue.Size()\n}", "title": "" }, { "docid": "57d7a9af0fd6f9417fd429a5d8b18a7d", "score": "0.5071671", "text": "func (k *Kuzzle) QueueTTL() time.Duration {\n\treturn k.queueTTL\n}", "title": "" }, { "docid": "692e8f246f61b528a2c68bae2df7f9d7", "score": "0.506464", "text": "func (s *KeyValueBucketStatus) TTL() time.Duration { return s.nfo.Config.MaxAge }", "title": "" }, { "docid": "eff0c22415e64980901286a1f18062d4", "score": "0.5060879", "text": "func (q *Queue) Size() (int, error) {\n\treturn q.storage.QueueSize()\n}", "title": "" }, { "docid": "9239019bdefe2dcc0669b9dac0fd0c70", "score": "0.50605726", "text": "func (st *Queue) GetCap() int {\n st.Lock()\n\n defer st.Unlock()\n\n return cap(st.queue)\n}", "title": "" }, { "docid": "b1ef38b7ef7b461e62bbd7c5308d4fde", "score": "0.5060361", "text": "func (GetLastCommand) GetQueue() string {\n\treturn \"cy_rubik_getlast\"\n}", "title": "" }, { "docid": "e982795201b8dbe0a21f1c594882e007", "score": "0.50537527", "text": "func (q *Queue) Size() int {\n\treturn len(*q)\n}", "title": "" }, { "docid": "618c47f3f86a77ca42c0d1818fb0518d", "score": "0.5051161", "text": "func (q *Queue) Len() int {\n\tq.mu.RLock()\n\tl := q.cnt\n\tq.mu.RUnlock()\n\treturn l\n}", "title": "" }, { "docid": "6d6adaa5837ff01100c246ed36ae4ca9", "score": "0.5042583", "text": "func (q *Queueimpl6) Len() int { return q.len }", "title": "" }, { "docid": "c2cc8e1865333370af03794c919841db", "score": "0.5026084", "text": "func (q *Queue) Size() int {\n\treturn q.size\n}", "title": "" }, { "docid": "c2cc8e1865333370af03794c919841db", "score": "0.5026084", "text": "func (q *Queue) Size() int {\n\treturn q.size\n}", "title": "" }, { "docid": "c2cc8e1865333370af03794c919841db", "score": "0.5026084", "text": "func (q *Queue) Size() int {\n\treturn q.size\n}", "title": "" }, { "docid": "b5b49574c9684bbce7230619fa6732eb", "score": "0.5022826", "text": "func (q *Queue) Len() int {\n\treturn q.count\n}", "title": "" }, { "docid": "d5e576479bb6704f0f1b4703d104ba6a", "score": "0.50212747", "text": "func (q *Queue) Dequeue() int {\n\ttoRemove := q.items[0]\n\tq.items = q.items[1:]\n\treturn toRemove\n}", "title": "" }, { "docid": "d5e576479bb6704f0f1b4703d104ba6a", "score": "0.50212747", "text": "func (q *Queue) Dequeue() int {\n\ttoRemove := q.items[0]\n\tq.items = q.items[1:]\n\treturn toRemove\n}", "title": "" }, { "docid": "d5e576479bb6704f0f1b4703d104ba6a", "score": "0.50212747", "text": "func (q *Queue) Dequeue() int {\n\ttoRemove := q.items[0]\n\tq.items = q.items[1:]\n\treturn toRemove\n}", "title": "" }, { "docid": "d6abed7eac0e83b1d9e3c9bb0d0af78b", "score": "0.50186735", "text": "func (rs *RedisStorage) Count(bucketName string) (int, error) {\n\tcount, err := rs.Client.Get(bucketName).Int64()\n\treturn int(count), err\n}", "title": "" }, { "docid": "236fec101d3a3abba658dc8a19135868", "score": "0.5018573", "text": "func (tq *TimeQueue) Done() uint64 {\n\ttq.count -= 1\n\treturn tq.count\n}", "title": "" }, { "docid": "3564d51b773a9eace95d457d8e34eb3b", "score": "0.5018338", "text": "func (q *Queue) Len() int { return len(q.buf) - q.off }", "title": "" }, { "docid": "0158b206eac427141bd4791205eb704a", "score": "0.50124246", "text": "func (m *Manager) size() int {\n\tvar result int\n\tfor _, q := range m.queues {\n\t\tresult += q.Size()\n\t}\n\n\treturn result\n}", "title": "" }, { "docid": "c85902cef84626db4326517a697c37af", "score": "0.5004598", "text": "func (q *CQueue) Size() int {\n\treturn len(q.q)\n}", "title": "" }, { "docid": "58df116fbc5396d4dd21eb29b7b6add0", "score": "0.5000534", "text": "func (q *Queue) Get() string {\n\tid := <-q.queue\n\n\tq.Lock()\n\tdefer q.Unlock()\n\tdelete(q.pos, id)\n\tq.decrementPos()\n\n\tmetrics.SearchQueue.Dec()\n\n\treturn id\n}", "title": "" }, { "docid": "388a549d1bcdd8814abf0e1c42e96099", "score": "0.49987727", "text": "func (q *Queue) Dqueue() int {\n\ttoRemove := q.items[0]\n\tq.items = q.items[1:]\n\treturn toRemove\n}", "title": "" }, { "docid": "44d49c2e749c29d22f1fd18f4f03df4c", "score": "0.49956608", "text": "func (m *MessageBase) Expire(s interfaces.IState) (rtn bool) {\n\tnow := s.GetTimestamp().GetTimeMilli()\n\tif m.expire == 0 {\n\t\tm.expire = now\n\t}\n\tif now-m.expire > 180*1000 { // Keep messages for some length before giving up.\n\t\trtn = true\n\t}\n\treturn\n}", "title": "" }, { "docid": "f785c5d3bdcfd6a69a8022d9c4c782d4", "score": "0.4994414", "text": "func (q *Queue) Peek() int {\n\tif len(q.Items) == 0 {\n\t\tlog.Fatal(\"stack is empty\")\n\t}\n\treturn q.Items[0]\n}", "title": "" }, { "docid": "db89a5031879a35d3b24265856c121fd", "score": "0.49896494", "text": "func (q *Queue) Size() int {\n\tq.mu.RLock()\n\ts := q.size\n\tq.mu.RUnlock()\n\treturn s\n}", "title": "" }, { "docid": "8fe1de8e11673923581c0fac4fa3b86c", "score": "0.49843082", "text": "func (q *PriorityQueue) Size() int {\n\tq.locker.RLock()\n\tdefer q.locker.RUnlock()\n\n\treturn q.holder.Len()\n}", "title": "" }, { "docid": "218a145ac592dfadd4ed3f1a18f60876", "score": "0.4979226", "text": "func (q *Queue) Dequeue() int {\n\tremoved := q.Peek()\n\tq.Items = q.Items[1:]\n\tq.Len--\n\treturn removed\n}", "title": "" }, { "docid": "7c0f6b6e4f2097d39d26c00cb384be7e", "score": "0.49769747", "text": "func (c *SimpleCache) Len(checkExpired bool) int {\n\tc.mu.RLock()\n\tdefer c.mu.RUnlock()\n\tif !checkExpired {\n\t\treturn len(c.items)\n\t}\n\tvar length int\n\tnow := time.Now()\n\tfor k := range c.items {\n\t\tif c.has(k, &now) {\n\t\t\tlength++\n\t\t}\n\t}\n\treturn length\n}", "title": "" }, { "docid": "f94afdbf3e2292980703a2452ccfde7e", "score": "0.49751514", "text": "func (c *Expiring) Len() int {\n\tc.mu.RLock()\n\tdefer c.mu.RUnlock()\n\treturn len(c.cache)\n}", "title": "" }, { "docid": "60a4ca592375aec4d0da6b104056e28c", "score": "0.4974085", "text": "func (q *queue) ExpireHeaders(timeout time.Duration) map[string]int {\n\tq.lock.Lock()\n\tdefer q.lock.Unlock()\n\n\treturn q.expire(timeout, q.headerPendPool, q.headerTaskQueue, headerTimeoutMeter)\n}", "title": "" }, { "docid": "852e730a5fa6094c20c3de8ac1774146", "score": "0.49706224", "text": "func (qu *Queue) Size() int {\n\treturn len(qu.Items)\n}", "title": "" }, { "docid": "ea5fd2c7e329cfb3b4f6bbb7ad8cf365", "score": "0.49544376", "text": "func (q *Queue) Size() int {\n\treturn q.s.Size()\n}", "title": "" }, { "docid": "426b547dbbee63845baa15c2b396c872", "score": "0.49517068", "text": "func (q *LimitedPriorityHashListQueue) Length() int {\n\treturn q.count\n}", "title": "" }, { "docid": "9d690c1b8a07125491173853aa88919a", "score": "0.4944878", "text": "func (a *App) GetMessageCount() (int, error) {\n\tqueue := a.Queue\n\n\tl := a.Logger.With(\n\t\tzap.String(\"operation\", \"GetMessageCount\"),\n\t\tzap.Object(\"queue\", queue),\n\t)\n\n\tlog.D(l, \"Getting message count...\")\n\n\ttotal, err := a.Client.LLen(queue).Result()\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\n\tmessageCount := int(total)\n\tlog.D(l, \"Message count retrieved successfully.\", func(cm log.CM) {\n\t\tcm.Write(zap.Int(\"messageCount\", messageCount))\n\t})\n\n\treturn messageCount, nil\n}", "title": "" }, { "docid": "97d8bdeb7ef5bc78891267d8e585b628", "score": "0.49438167", "text": "func (s *Queue) Size() int {\n\treturn len(s.items)\n}", "title": "" }, { "docid": "8c21e3db81a167bcf79c961cf73b61e7", "score": "0.49408558", "text": "func (q *Queue) Pending() (int64, error) {\n\tc, managed := q.conn()\n\tif managed {\n\t\tdefer c.Close()\n\t}\n\treturn redis.Int64(c.Do(\"ZCARD\", q.Name))\n}", "title": "" }, { "docid": "3ed50237ca8b0aa2fd80ef9b58f2d80b", "score": "0.49350828", "text": "func (t *MyQueue) Peek() int {\n\tfor len(t.stack) != 0 {\n\t\tval := t.stack[len(t.stack)-1]\n\t\tt.stack = t.stack[:len(t.stack)-1]\n\t\tt.back = append(t.back, val)\n\t}\n\tif len(t.back) == 0 {\n\t\treturn 0\n\t}\n\tval := t.back[len(t.back)-1]\n\treturn val\n}", "title": "" }, { "docid": "85c0d5bab8ff8014d5292f5775f372c5", "score": "0.4933802", "text": "func GetAutoAddOrderInfoFromQueue() *model.DelayerReq {\n\tvar message *model.DelayerReq\n\t_ = utils.ReTryFunc(10, func() (bool, error) {\n\t\tret, err := global.RedisClient.LPop(global.Topic).Result()\n\t\tif err != nil {\n\t\t\tif strings.Contains(err.Error(), \"nil\") {\n\t\t\t\treturn true, err\n\t\t\t}\n\t\t\tmsg := fmt.Sprintf(\"GetAutoAddOrderInfoFromQueue: %+v\", err.Error())\n\t\t\tlogger.Warn(msg)\n\t\t\treturn false, err\n\t\t}\n\t\t_ = jsoniter.UnmarshalFromString(ret, &message)\n\t\treturn false, nil\n\t})\n\tif message != nil {\n\t\tif global.GetCurrentTime().Sub(message.PqTime).Seconds() >= 10 {\n\t\t\treturn message\n\t\t}\n\t\tPushDelayerInfoToQueue(message)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "b9b4f6005281f9004966a16699a70503", "score": "0.49296105", "text": "func (c *Cache) Size() int {\n\treturn len(c.msgs)\n}", "title": "" }, { "docid": "53a3d49b962f0547c56984135f4f8bff", "score": "0.4929468", "text": "func (s *ItemQueue) Size() int {\n\treturn len(s.items)\n}", "title": "" }, { "docid": "425fd769bbcdcf4e0c34a5926bbc6c3b", "score": "0.4928203", "text": "func (r *RedisStore) Length(q string) (int, error) {\n\tconn := r.pool.Get()\n\tdefer conn.Close()\n\n\tvar queue string\n\tswitch q {\n\tcase \"waiting\":\n\t\tqueue = r.queue()\n\tcase \"working\":\n\t\tqueue = r.workingQueue()\n\tdefault:\n\t\treturn 0, fmt.Errorf(\"unknown queue %s\", q)\n\t}\n\n\treturn redis.Int(conn.Do(\"LLEN\", queue))\n}", "title": "" }, { "docid": "3de37aff981123e83b573466ea50fd5e", "score": "0.49202362", "text": "func (q *ExpireQueue) GetExpiredKeys() (bool, []string) {\n\n\tvar item *StorageKey\n\texpiredKeys := make([]string, 0)\n\tcheckTime := time.Now().UnixNano()\n\tfor {\n\t\tif q.Len() < 1 {\n\t\t\tbreak\n\t\t}\n\n\t\t// get element\n\t\titem = heap.Pop(q).(*StorageKey)\n\t\tif item.Expire < checkTime {\n\t\t\texpiredKeys = append(expiredKeys, item.Key)\n\t\t} else {\n\t\t\t// insert active key back\n\t\t\theap.Push(q, item)\n\t\t\tbreak\n\t\t}\n\t}\n\n\t// do not return empty lists\n\tif len(expiredKeys) > 0 {\n\t\treturn true, expiredKeys\n\t}\n\treturn false, nil\n}", "title": "" }, { "docid": "71233814f389f20e0ca52b96479b2465", "score": "0.48995814", "text": "func (q *BytesQueue) Len() int {\n\treturn q.count\n}", "title": "" }, { "docid": "f4dfbe057471f1c5ee6debb9fc9b6ade", "score": "0.48966464", "text": "func (q *QueueStack) Dequeue() int {\n\tif q.deque.Size() == 0 {\n\t\tfor q.elems.Size() > 0 {\n\t\t\tq.deque.Push(q.elems.Pop())\n\t\t}\n\t}\n\treturn q.deque.Pop().(int)\n}", "title": "" }, { "docid": "a8650cf6c49e4c86a259f74de5986242", "score": "0.48913735", "text": "func HasQueueViaCreated(iCreated int) bool {\n\tif has, err := Engine.Where(\"created = ?\", iCreated).Get(new(Queue)); err != nil {\n\t\treturn false\n\t} else {\n\t\tif has {\n\t\t\treturn true\n\t\t}\n\t\treturn false\n\t}\n}", "title": "" }, { "docid": "5bf5136edfb12e4c7f786cf0a7ffffde", "score": "0.48913306", "text": "func (this *MyQueue) Peek() int {\n\tif ! this.Empty() {\n\t\tq := this.stack[0]\n\t\treturn q\n\t}\n\treturn 0\n}", "title": "" }, { "docid": "49f60f3161357633b15f9effc651ea4a", "score": "0.4889835", "text": "func (c *Cache) Expire(q dns.Question) {\n\tc.expirationChan <- cacheKey{q}\n}", "title": "" }, { "docid": "bcd29a979d8b82d556e1e5980ae1a67b", "score": "0.48897702", "text": "func (q *Queue) Len() int {\n\treturn q.items.Len()\n}", "title": "" }, { "docid": "bcd29a979d8b82d556e1e5980ae1a67b", "score": "0.48897702", "text": "func (q *Queue) Len() int {\n\treturn q.items.Len()\n}", "title": "" } ]
7b24857e515e53347b269376a3a53c63
Networks returns the Network interface of the Host
[ { "docid": "611ca2f8f60d1326eb129390a08a51a7", "score": "0.56118745", "text": "func (m mockHost) Network() inet.Network {\n\treturn nil\n}", "title": "" } ]
[ { "docid": "f3984177865dd3fdb892c6c270815ec4", "score": "0.74151665", "text": "func GetNetworks() (networks []Network) {\n\tinterfaces, err := net.Interfaces()\n\tif err == nil {\n\t\tfor _, inf := range interfaces {\n\t\t\tinterfac := inf\n\t\t\taddresses, err := interfac.Addrs()\n\t\t\tif err == nil {\n\t\t\t\tfor _, addr := range addresses {\n\n\t\t\t\t\tif addr.String() == \"127.0.0.1/8\" || len(interfac.HardwareAddr.String()) > 18 {\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tif addr.String()[:4] == \"169.\" { //DHCP that has not been assigned.\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\n\t\t\t\t\tip, _, err := net.ParseCIDR(addr.String())\n\t\t\t\t\tif err == nil {\n\n\t\t\t\t\t\tones, _ := ip.DefaultMask().Size()\n\n\t\t\t\t\t\tif ip.To4() == nil {\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\tvar n Network\n\t\t\t\t\t\tn.Address = ip.String()\n\t\t\t\t\t\tn.Subnet = ip.DefaultMask().String()\n\t\t\t\t\t\tn.CIDR = addr.String()\n\t\t\t\t\t\tn.Name = interfac.Name\n\t\t\t\t\t\tn.MAC = interfac.HardwareAddr.String()\n\n\t\t\t\t\t\tn.StatusInt = int(interfac.Flags)\n\t\t\t\t\t\tn.Status = interfac.Flags.String()\n\t\t\t\t\t\tn.AvailableAddresses = math.Pow(2, float64(32-ones))\n\n\t\t\t\t\t\tnetworks = append(networks, n)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\t// session_functions.Log(\"Networks\", fmt.Sprintf(\"%+v\", networks))\n\treturn\n}", "title": "" }, { "docid": "27be28ac59ffac540beac0b813f8a74e", "score": "0.7052146", "text": "func (cfg *Ctx) GetNetworks() []string { return cfg.networks }", "title": "" }, { "docid": "b77f31c9f54003766809cc9577ba1def", "score": "0.67829335", "text": "func (*NetworkInterfaceNetworks) GetPath() string { return \"/api/objects/network/interface_network/\" }", "title": "" }, { "docid": "fc5b29745f15a93668d7b3c2c48dac6a", "score": "0.6633588", "text": "func ListNetworks() ([]HostComputeNetwork, error) {\n\thcnQuery := defaultQuery()\n\tnetworks, err := ListNetworksQuery(hcnQuery)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn networks, nil\n}", "title": "" }, { "docid": "8922acd5a107247b75fcf2fb2659c03c", "score": "0.6559486", "text": "func getNetworkInterfaces() ([]*model.Network, error) {\n\tlog.Trace(\">>>>> getNetworkInterfaces\")\n\tdefer log.Trace(\"<<<<< getNetworkInterfaces\")\n\n\t// Start with an empty array of NICs to return\n\tvar nics []*model.Network\n\n\t// Enumerate the system's network interfaces\n\tnetInterfaces, err := net.Interfaces()\n\tif err != nil {\n\t\tlog.Error(err)\n\t\treturn nil, err\n\t}\n\n\t// Enumerate the system's network adapters\n\tadapters, err := getAdaptersInfo()\n\tif err != nil {\n\t\tif err == windows.ERROR_NO_DATA {\n\t\t\t// Windows returns ERROR_NO_DATA, for the GetAdaptersInfo Win32 API, if no NICs were\n\t\t\t// found on the local computer. If we let that error propagate up, the error message\n\t\t\t// recorded is \"The pipe is being closed.\" Instead, we more accurately return an\n\t\t\t// empty array of NICs with no error to indicate no NICs were found on this host.\n\t\t\treturn nics, nil\n\t\t}\n\t\treturn nil, err\n\t}\n\n\t// Enumerate the iSCSI initiators on this host\n\tiscsiInitiators, err := wmi.GetMSiSCSIPortalInfoClass()\n\tif err != nil {\n\t\t// It's possible that the host has NICs but the iSCSI service has not been configured yet.\n\t\t// In this case, we simply log the event but allow NIC enumeration to continue.\n\t\tlog.Tracef(\"Unable to enumerate iSCSI initiators, continuing with NIC enumeration, err=%v\", err)\n\t\terr = nil\n\t}\n\n\t// Enumerate the cluster IPs on this host\n\tclusterIPs, _ := wmi.GetClusterIPs()\n\n\t// Loop through each network interface\n\tfor _, netInterface := range netInterfaces {\n\n\t\t// Find the adapter for the network interface. Skip any network interface that doesn't have\n\t\t// an applicable adapter (e.g. getAdaptersInfo doesn't support loopback adapters).\n\t\tadapter, ok := adapters[netInterface.Index]\n\t\tif !ok {\n\t\t\tcontinue\n\t\t}\n\n\t\t// Loop through the adapter's IpAddressList\n\t\tfor ipl := &adapter.IpAddressList; ipl != nil; ipl = ipl.Next {\n\n\t\t\t// Get the IPv4 address and mask\n\t\t\tipAddress := strings.TrimRight(string(ipl.IpAddress.String[:]), \"\\x00\")\n\t\t\tipMask := strings.TrimRight(string(ipl.IpMask.String[:]), \"\\x00\")\n\n\t\t\t// Skip any 0.0.0.0 IP address\n\t\t\tif ipAddress == \"0.0.0.0\" {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\t// Is this a cluster IP?\n\t\t\tisClusterIP := false\n\t\t\tfor _, clusterIP := range clusterIPs {\n\t\t\t\tif (clusterIP.PrivateProperties != nil) && (clusterIP.PrivateProperties.Address == ipAddress) {\n\t\t\t\t\tisClusterIP = true\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t// Skip any cluster IP\n\t\t\tif isClusterIP {\n\t\t\t\tlog.Tracef(\"Ignoring cluster IP %v\", ipAddress)\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\t// Traverse the list of enumerated ISCSI_PortalInfo objects to find the one that mathces\n\t\t\t// the current network adapter.\n\t\t\tvar matchingPortal *wmi.ISCSI_PortalInfo\n\t\t\tif iscsiInitiators != nil {\n\t\t\t\tfor _, portal := range iscsiInitiators.PortalInformation {\n\t\t\t\t\t// Skip portal if not IPv4\n\t\t\t\t\tif (portal.IPAddr.Type != wmi.ISCSI_IP_ADDRESS_IPV4) || (portal.IPAddr.IpV4Address == 0) {\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\n\t\t\t\t\t// Convert the IPv4 uint32 into an IP object\n\t\t\t\t\ta := make([]byte, 4)\n\t\t\t\t\tbinary.LittleEndian.PutUint32(a, portal.IPAddr.IpV4Address)\n\t\t\t\t\tipv4 := net.IPv4(a[0], a[1], a[2], a[3])\n\n\t\t\t\t\t// Exclude link local interfaces (IPANA AIPA addresses 169.254.0-255.0-255)\n\t\t\t\t\t// Link local addresses are also used by Microsoft Clusters as 'Microsoft Failover Cluster Virtual Adapter addresses'\n\t\t\t\t\tif (a[0] == 169) && (a[1] == 254) {\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\n\t\t\t\t\t// Found ISCSI_PortalInfo match for the current network adapter?\n\t\t\t\t\tif ipv4.String() == ipAddress {\n\t\t\t\t\t\tmatchingPortal = portal\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t// Append this interface/adapter to the return list of NICs\n\t\t\tnic := &model.Network{\n\t\t\t\tName: netInterface.Name,\n\t\t\t\tAddressV4: ipAddress,\n\t\t\t\tMaskV4: ipMask,\n\t\t\t\tMac: netInterface.HardwareAddr.String(),\n\t\t\t\tMtu: int64(netInterface.MTU),\n\t\t\t\tUp: true,\n\t\t\t}\n\n\t\t\t// If we were able to enumerate the ISCSI_PortalInfo object, for the current network\n\t\t\t// adapter, populate the Windows specific NetworkPrivate object\n\t\t\tif matchingPortal != nil {\n\t\t\t\tnic.Private = &model.NetworkPrivate{\n\t\t\t\t\tInitiatorInstance: iscsiInitiators.InstanceName,\n\t\t\t\t\tInitiatorPortNumber: matchingPortal.Index,\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t// Append network object to array of enumerated network objects\n\t\t\tnics = append(nics, nic)\n\t\t}\n\t}\n\n\treturn nics, err\n}", "title": "" }, { "docid": "0f4ebaa7799838e3f7c1ccfb6457b74a", "score": "0.6548162", "text": "func (o MachineConfigV2VsphereConfigPtrOutput) Networks() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v *MachineConfigV2VsphereConfig) []string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Networks\n\t}).(pulumi.StringArrayOutput)\n}", "title": "" }, { "docid": "2739b81f26d6a0779c2f615745130d1d", "score": "0.6493722", "text": "func (o NodeTemplateHetznerConfigPtrOutput) Networks() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *NodeTemplateHetznerConfig) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Networks\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "0b58c863ca5721eaecc74c6c201f816c", "score": "0.6461008", "text": "func (o NodeTemplateHetznerConfigOutput) Networks() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v NodeTemplateHetznerConfig) *string { return v.Networks }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "16f44f731ef84623ad09834b2168361f", "score": "0.635576", "text": "func (c *libcni) Networks() []*Network {\n\tc.RLock()\n\tdefer c.RUnlock()\n\treturn append([]*Network{}, c.networks...)\n}", "title": "" }, { "docid": "453e68abf04a37dfcddd34c1cc143061", "score": "0.63435495", "text": "func (net *GetNetworksInput) GetNetworks() (GetNetworksResponse, error) {\n\n\tif status := support.DoesCloudSupports(strings.ToLower(net.Cloud.Name)); status != true {\n\t\treturn GetNetworksResponse{}, fmt.Errorf(common.DefaultCloudResponse + \"GetNetworks\")\n\t}\n\n\tswitch strings.ToLower(net.Cloud.Name) {\n\tcase \"aws\":\n\n\t\t// Gets the established session so that it can carry out the process in cloud.\n\t\tsess := (net.Cloud.Client).(*session.Session)\n\n\t\t//authorizing to request further\n\t\tauthinpt := auth.EstablishConnectionInput{Region: net.Cloud.Region, Resource: \"ec2\", Session: sess}\n\n\t\t// Fetching all the networks across cloud aws\n\t\tnetworkin := awsnetwork.GetNetworksInput{}\n\t\tnetworkin.VpcIds = net.NetworkID\n\t\tnetworkin.GetRaw = net.Cloud.GetRaw\n\t\tresponse, netErr := networkin.GetNetwork(authinpt)\n\t\tif netErr != nil {\n\t\t\treturn GetNetworksResponse{}, netErr\n\t\t}\n\t\treturn GetNetworksResponse{AwsResponse: response}, nil\n\n\tcase \"azure\":\n\t\treturn GetNetworksResponse{}, fmt.Errorf(common.DefaultAzResponse)\n\tcase \"gcp\":\n\n\t\tfmt.Fprintf(os.Stdout, \"%v\\n\", \"This is an alpha resource of Google Cloud so do the support, watchout for the output\")\n\t\tgetCluster := new(gcp.GetNetworkInput)\n\t\tgetCluster.ProjectID = net.ProjectID\n\t\tgetCluster.NetworkID = net.NetworkID[0]\n\t\tresp, err := getCluster.GetNetwork(net.Cloud.Client)\n\t\tif err != nil {\n\t\t\treturn GetNetworksResponse{}, err\n\t\t}\n\t\treturn GetNetworksResponse{GCPResponse: resp}, nil\n\n\tcase \"openstack\":\n\t\treturn GetNetworksResponse{}, fmt.Errorf(common.DefaultOpResponse)\n\tdefault:\n\t\treturn GetNetworksResponse{}, fmt.Errorf(common.DefaultCloudResponse + \"GetNetworks\")\n\t}\n}", "title": "" }, { "docid": "110d38b345107f7c28bb6667485987fb", "score": "0.63162404", "text": "func (o MachineConfigV2VsphereConfigOutput) Networks() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v MachineConfigV2VsphereConfig) []string { return v.Networks }).(pulumi.StringArrayOutput)\n}", "title": "" }, { "docid": "e13272bdd44f7f775cc53cbe1ea82830", "score": "0.6252357", "text": "func (net GetNetworksInput) GetAllNetworks() ([]GetNetworksResponse, error) {\n\n\tif status := support.DoesCloudSupports(strings.ToLower(net.Cloud.Name)); status != true {\n\t\treturn nil, fmt.Errorf(common.DefaultCloudResponse + \"GetAllNetworks\")\n\t}\n\n\tswitch strings.ToLower(net.Cloud.Name) {\n\tcase \"aws\":\n\n\t\t// Gets the established session so that it can carry out the process in cloud.\n\t\tsess := (net.Cloud.Client).(*session.Session)\n\n\t\t//authorizing to request further\n\t\tauthinpt := auth.EstablishConnectionInput{Region: net.Cloud.Region, Resource: \"ec2\", Session: sess}\n\n\t\t// calls GetAllNetworks of interface and get the things done\n\t\t// Fetching all the regions from the cloud aws\n\t\tregionin := awsnetwork.CommonInput{}\n\t\tregions, regerr := regionin.GetRegions(authinpt)\n\t\tif regerr != nil {\n\t\t\treturn nil, regerr\n\t\t}\n\n\t\tnetworkResponse := make([]GetNetworksResponse, 0)\n\t\tfor _, region := range regions.Regions {\n\t\t\t//authorizing to request further\n\t\t\tauthinpt := auth.EstablishConnectionInput{Region: region, Resource: \"ec2\", Session: sess}\n\n\t\t\tnetworkin := awsnetwork.GetNetworksInput{GetRaw: net.Cloud.GetRaw}\n\t\t\tresponse, netErr := networkin.GetAllNetworks(authinpt)\n\t\t\tif netErr != nil {\n\t\t\t\treturn nil, netErr\n\t\t\t}\n\t\t\tnetworkResponse = append(networkResponse, GetNetworksResponse{AwsResponse: response})\n\t\t}\n\t\treturn networkResponse, nil\n\n\tcase \"azure\":\n\t\treturn nil, fmt.Errorf(common.DefaultAzResponse)\n\tcase \"gcp\":\n\n\t\tfmt.Fprintf(os.Stdout, \"%v\\n\", \"This is an alpha resource of Google Cloud so do the support, watchout for the output\")\n\t\tgetCluster := new(gcp.GetNetworkInput)\n\t\tgetCluster.ProjectID = net.ProjectID\n\t\tresp, err := getCluster.GetNetworks(net.Cloud.Client)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tnetworkResponse := make([]GetNetworksResponse, 0)\n\t\treturn append(networkResponse, GetNetworksResponse{GCPResponse: resp}), nil\n\n\tcase \"openstack\":\n\t\treturn nil, fmt.Errorf(common.DefaultOpResponse)\n\tdefault:\n\t\treturn nil, fmt.Errorf(common.DefaultCloudResponse + \"GetAllNetworks\")\n\t}\n}", "title": "" }, { "docid": "50fce0864f0f113acff8b8407ca2cf36", "score": "0.6251831", "text": "func (daemon *DockerDaemon) Networks() ([]dockerTypes.NetworkResource, error) {\n\treturn networks(daemon.client)\n}", "title": "" }, { "docid": "7f7f15af753d46a55193c2e64338032b", "score": "0.6237946", "text": "func (c *ContainerContext) Networks() string {\n\tif c.c.NetworkSettings == nil {\n\t\treturn \"\"\n\t}\n\n\tnetworks := []string{}\n\tfor k := range c.c.NetworkSettings.Networks {\n\t\tnetworks = append(networks, k)\n\t}\n\n\treturn strings.Join(networks, \",\")\n}", "title": "" }, { "docid": "c1eb96b2bd90220d647a679c62d8d8c5", "score": "0.62273926", "text": "func (o NodeTemplateVsphereConfigPtrOutput) Networks() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v *NodeTemplateVsphereConfig) []string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Networks\n\t}).(pulumi.StringArrayOutput)\n}", "title": "" }, { "docid": "6b23b90e48702fcda033302127d95822", "score": "0.6220766", "text": "func (c *localController) ListNetworks() ([]*libcni.NetworkConfig, error) {\n\treturn c.ds.GetNetworks()\n}", "title": "" }, { "docid": "34e79672f5c3e28fdbf85889eaace3e8", "score": "0.6167988", "text": "func (ns Networks) AsRegistryNetworks(publicIp string) registry.NetworksSettings {\n\tnetworksSettings := registry.NetworksSettings{}\n\n\tfor netName, network := range ns {\n\t\tnetworksSettings[netName] = network.AsRegistryNetwork(publicIp)\n\t}\n\treturn networksSettings\n}", "title": "" }, { "docid": "8215fe5a514ee8b2a13ad0c4991f0364", "score": "0.6161492", "text": "func (os *OpenStack) ListNetworks(tenantID string) ([]*provider.Network, error) {\n\tvar results []*provider.Network\n\tvar opts networks.ListOpts\n\tif tenantID == \"\" {\n\t\topts = networks.ListOpts{}\n\t} else {\n\t\topts = networks.ListOpts{TenantID: tenantID}\n\t}\n\tpager := networks.List(os.network, opts)\n\terr := pager.EachPage(func(page pagination.Page) (bool, error) {\n\t\tnetworkList, err := networks.ExtractNetworks(page)\n\t\tif err != nil {\n\t\t\tglog.Errorf(\"Get openstack networks error: %v\", err)\n\t\t\treturn false, err\n\t\t}\n\t\tfor _, n := range networkList {\n\t\t\tnetwork, err := os.GetNetworkByID(n.ID)\n\t\t\tif err != nil {\n\t\t\t\tglog.Errorf(\"Get openstack subnet failed: %v\", err)\n\t\t\t\treturn false, err\n\t\t\t}\n\t\t\tresults = append(results, network)\n\t\t}\n\t\treturn true, err\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn results, nil\n}", "title": "" }, { "docid": "04e08f2318244acdf6a3190546a4ed05", "score": "0.61328495", "text": "func GetNetworkInHost(vm *VM) ([]map[string]string, error) {\n\tvar hsMo mo.HostSystem\n\n\t// set up session to vcenter server\n\tif err := SetupSession(vm); err != nil {\n\t\treturn nil, err\n\t}\n\n\tdc, err := GetDatacenter(vm)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Get the cluster resource and its host, network and datastore\n\tcrMo, err := findClusterComputeResource(vm, dc, vm.Destination.DestinationName)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// find the host in Destination.HostSystem\n\tfor _, host := range crMo.Host {\n\t\terr = vm.collector.RetrieveOne(vm.ctx, host, []string{\"name\", \"network\"}, &hsMo)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif hsMo.Name == vm.Destination.HostSystem {\n\t\t\tbreak\n\t\t}\n\t}\n\n\treturn getNetworks(vm, hsMo.Network)\n}", "title": "" }, { "docid": "1b62fb8a3754494104fb882e2c7138d6", "score": "0.61142623", "text": "func (c *EveNgClient) GetNetworks(labPath string) (Networks, error) {\n\tif !c.isValid() {\n\t\treturn nil, &NotValidError{}\n\t}\n\tresponse, err := c.request(\"GET\", endpointPath+\"labs/\"+labPath+\"/networks\", \"\", nil, nil)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"error during http get request\")\n\t}\n\tvar networks Networks\n\terr = c.unmarshalDataIntoStruct(response.Body(), &networks)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn networks, nil\n}", "title": "" }, { "docid": "efebf6afd83669f17e1de53363adc7fe", "score": "0.6107117", "text": "func (cfg *Ctx) GetNetworkInstances() []string { return cfg.networkInstances }", "title": "" }, { "docid": "d9bc176d3a509cee4679375174a0a6f7", "score": "0.60983443", "text": "func (dmc *DomainContainer) Network() ([]byte, error) {\n\t// if status, err := dmc.domain.Status\n\tres, err := dmc.domain.Run(qmp.Command{\n\t\tExecute: \"query-vnc\",\n\t})\n\n\treturn res, err\n}", "title": "" }, { "docid": "6a00d6d7419404196f428237f77a20f6", "score": "0.6093421", "text": "func (a *Addr) Network() string { return network }", "title": "" }, { "docid": "dee072ee975ba9454f1e303bab4f9c03", "score": "0.6064301", "text": "func IPNetNetwork(n *net.IPNet,) string", "title": "" }, { "docid": "72bc758c5ce2593a13dd6279fe5cbc4d", "score": "0.60560286", "text": "func listNetworks() ([]string, error) {\n\tb, err := sh.Command(common.DockerBin(), \"network\", \"ls\", \"--format\", \"{{ .Name }}\").Output()\n\toutput := strings.TrimSpace(string(b[:]))\n\n\tnetworks := []string{}\n\tif err != nil {\n\t\tcommon.LogVerboseQuiet(output)\n\t\treturn networks, err\n\t}\n\n\tnetworks = strings.Split(output, \"\\n\")\n\treturn networks, nil\n}", "title": "" }, { "docid": "ea2a3cc0883d12a2baa754522fdb7b4a", "score": "0.6048377", "text": "func (o NodeTemplateVsphereConfigOutput) Networks() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v NodeTemplateVsphereConfig) []string { return v.Networks }).(pulumi.StringArrayOutput)\n}", "title": "" }, { "docid": "ccafdb8e195af137c6ad6c7807b77cc1", "score": "0.6041702", "text": "func (o InstanceFromMachineImageOutput) NetworkInterfaces() InstanceFromMachineImageNetworkInterfaceArrayOutput {\n\treturn o.ApplyT(func(v *InstanceFromMachineImage) InstanceFromMachineImageNetworkInterfaceArrayOutput {\n\t\treturn v.NetworkInterfaces\n\t}).(InstanceFromMachineImageNetworkInterfaceArrayOutput)\n}", "title": "" }, { "docid": "74741ca3587c0714e8833b02c9e094fe", "score": "0.6007781", "text": "func (ns Networks) AsNetworkConfiguration() vm.Networks {\n\n\tvar openPorts []vm.Rule\n\n\tnetworks := []vm.NetworkConfiguration{}\n\tfor _, n := range ns {\n\t\tfor _, port := range n.CloudProperties.OpenPorts {\n\t\t\topenPorts = append(openPorts, vm.Rule{PortFrom: port.PortFrom, PortTo: port.PortTo, Source: port.Source})\n\t\t}\n\t\tnetworks = append(networks, vm.NetworkConfiguration{\n\t\t\tOpenPorts: openPorts,\n\t\t\tPrivateNetworkId: ns.First().CloudProperties.PrivateNetWorkId,\n\t\t\tPolicyName: ns.First().CloudProperties.PolicyName,\n\t\t})\n\t}\n\treturn networks\n}", "title": "" }, { "docid": "4d53e39ed1fc1d291be5cc9870c0f321", "score": "0.6007587", "text": "func (w WpaSupplicant) ConfiguredNetworks () (nets []WirelessNetwork) {\n stdout, _, err := w.Run(\"list_networks\")\n if err != nil {\n return\n }\n\n for _, line := range stdout {\n if strings.HasPrefix(line, \"network id\") { continue }\n if len(line) == 0 { continue }\n\n t := strings.Split(line, \"\\t\")\n\n var network = new(WirelessNetwork)\n network.Id, err = strconv.Atoi(t[0])\n if err != nil {\n continue\n }\n network.Ssid = t[1]\n if t[3] == \"[CURRENT]\" {\n network.Connected = true\n }\n\n nets = append(nets, *network)\n }\n\n return\n}", "title": "" }, { "docid": "8bf8b31eeeb80f879dc2349f08722538", "score": "0.5989235", "text": "func (w WpaSupplicant) GetUsableNetworks () (nets []WirelessNetwork, err error) {\n available_networks, err := w.AvailableNetworks()\n if err != nil {\n return\n }\n\n configured_networks := w.ConfiguredNetworks()\n\n for _, available := range available_networks {\n for _, configured := range configured_networks {\n if available.Ssid == configured.Ssid {\n available.Id = configured.Id\n available.Connected = configured.Connected\n nets = append(nets, available)\n break\n }\n }\n }\n\n return\n}", "title": "" }, { "docid": "41e286dbdc13f9c4b6f7b3fe0428c9dc", "score": "0.5980572", "text": "func GetNetworkInterface() []net.Interface{\n\n\tvar ifaces []net.Interface;\n\tifaces, err := net.Interfaces();\n\tif err != nil {\n\t\tpanic(err);\n\t}\n\t\n\treturn ifaces;\n}", "title": "" }, { "docid": "b98444860abfd88e7ceed6d26d4cd34d", "score": "0.5977599", "text": "func Interfaces() ([]net.Interface, error)", "title": "" }, { "docid": "bda50ebabde908e31fe34924d3fa59ec", "score": "0.59493476", "text": "func (o NetworkProfileOutput) NetworkInterfaces() IpAddressArrayOutput {\n\treturn o.ApplyT(func(v NetworkProfile) []IpAddress { return v.NetworkInterfaces }).(IpAddressArrayOutput)\n}", "title": "" }, { "docid": "28ce378ad6f8b89e86ee842d8a1fbe0f", "score": "0.5946419", "text": "func (do *Docker) NetworkGet(name string) *CmdRes {\n\treturn do.execCmd(fmt.Sprintf(\"docker network inspect %s\", name))\n}", "title": "" }, { "docid": "ca6eb60ec06b5d7ed386e10b10e6d640", "score": "0.59281397", "text": "func (s stack) ListNetworks(ctx context.Context) ([]*abstract.Network, fail.Error) {\n\tif valid.IsNil(s) {\n\t\treturn nil, fail.InvalidInstanceError()\n\t}\n\n\t// Retrieve a pager (i.e. a paginated collection)\n\tvar netList []*abstract.Network\n\txerr := stacks.RetryableRemoteCall(ctx,\n\t\tfunc() error {\n\t\t\tinnerErr := networks.List(s.NetworkClient, networks.ListOpts{}).EachPage(\n\t\t\t\tfunc(page pagination.Page) (bool, error) {\n\t\t\t\t\tnetworkList, err := networks.ExtractNetworks(page)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn false, err\n\t\t\t\t\t}\n\n\t\t\t\t\tfor _, n := range networkList {\n\t\t\t\t\t\tif n.ID == s.ProviderNetworkID {\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\tnewNet := abstract.NewNetwork()\n\t\t\t\t\t\tnewNet.ID = n.ID\n\t\t\t\t\t\tnewNet.Name = n.Name\n\n\t\t\t\t\t\tnetList = append(netList, newNet)\n\t\t\t\t\t}\n\t\t\t\t\treturn true, nil\n\t\t\t\t},\n\t\t\t)\n\t\t\treturn innerErr\n\t\t},\n\t\tNormalizeError,\n\t)\n\tif xerr != nil {\n\t\treturn nil, xerr\n\t}\n\n\treturn netList, nil\n}", "title": "" }, { "docid": "399e480a3447870370ac3dc2572d7886", "score": "0.59214526", "text": "func networkRange(network *net.IPNet) (net.IP, net.IP) {\n\tnetIP := network.IP.To4()\n\tlastIP := net.IPv4zero.To4()\n\tif netIP == nil {\n\t\tnetIP = network.IP.To16()\n\t\tlastIP = net.IPv6zero.To16()\n\t}\n\tfirstIP := netIP.Mask(network.Mask)\n\t// intermediate network mask with max 16 bits for hosts\n\t// We need a mask with max 16 bits since libvirt only supports 65535) IP's per subnet\n\t// 2^16 = 65536 (minus broadcast and .1)\n\tintMask := getNetMaskWithMax16Bits(network.Mask)\n\n\tfor i := 0; i < len(lastIP); i++ {\n\t\tlastIP[i] = netIP[i] | ^intMask[i]\n\t}\n\treturn firstIP, lastIP\n}", "title": "" }, { "docid": "12e06cdd3e35f39ecfffc56e358d186d", "score": "0.5903015", "text": "func (c Clusters) Networks() []string {\n\treturn c.ByNetwork().Networks()\n}", "title": "" }, { "docid": "6a44f118c754a9381ef2a3e920c8044a", "score": "0.5898713", "text": "func (a *ipv6Addr) Network() string {\n\treturn string(a.netID)\n}", "title": "" }, { "docid": "8b1946d2e2ec2a49083a6612e422317c", "score": "0.58607966", "text": "func Networks(namespace Namespace, networks networkMap, servicesNetworks map[string]struct{}) (map[string]types.NetworkCreate, []string) {\n\tif networks == nil {\n\t\tnetworks = make(map[string]composetypes.NetworkConfig)\n\t}\n\n\texternalNetworks := []string{}\n\tresult := make(map[string]types.NetworkCreate)\n\tfor internalName := range servicesNetworks {\n\t\tnetwork := networks[internalName]\n\t\tif network.External.External {\n\t\t\texternalNetworks = append(externalNetworks, network.Name)\n\t\t\tcontinue\n\t\t}\n\n\t\tcreateOpts := types.NetworkCreate{\n\t\t\tLabels: AddStackLabel(namespace, network.Labels),\n\t\t\tDriver: network.Driver,\n\t\t\tOptions: network.DriverOpts,\n\t\t\tInternal: network.Internal,\n\t\t\tAttachable: network.Attachable,\n\t\t}\n\n\t\tif network.Ipam.Driver != \"\" || len(network.Ipam.Config) > 0 {\n\t\t\tcreateOpts.IPAM = &networktypes.IPAM{}\n\t\t}\n\n\t\tif network.Ipam.Driver != \"\" {\n\t\t\tcreateOpts.IPAM.Driver = network.Ipam.Driver\n\t\t}\n\t\tfor _, ipamConfig := range network.Ipam.Config {\n\t\t\tconfig := networktypes.IPAMConfig{\n\t\t\t\tSubnet: ipamConfig.Subnet,\n\t\t\t}\n\t\t\tcreateOpts.IPAM.Config = append(createOpts.IPAM.Config, config)\n\t\t}\n\n\t\tnetworkName := namespace.Scope(internalName)\n\t\tif network.Name != \"\" {\n\t\t\tnetworkName = network.Name\n\t\t}\n\t\tresult[networkName] = createOpts\n\t}\n\n\treturn result, externalNetworks\n}", "title": "" }, { "docid": "384bcfac37f60fce8f9525665950286c", "score": "0.58510154", "text": "func (wpa *WpaCfg) ConfiguredNetworks() string {\n\tnetOut, err := exec.Command(\"wpa_cli\", \"-i\", \"wlan1\", \"scan\").Output()\n\tif err != nil {\n\t\twpa.Log.Fatal(err)\n\t}\n\n\treturn string(netOut)\n}", "title": "" }, { "docid": "721a03b07fbac757f4d80beaf75101cb", "score": "0.58350515", "text": "func GetNetworks(ctx context.Context, authURL, region string, credentials *resources.OpenstackCredentials, caBundle *x509.CertPool) ([]NetworkWithExternalExt, error) {\n\tauthClient, err := getNetClient(ctx, authURL, region, credentials, caBundle)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"couldn't get auth client: %w\", err)\n\t}\n\n\tnetworks, err := getAllNetworks(authClient, osnetworks.ListOpts{})\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"couldn't get networks: %w\", err)\n\t}\n\n\treturn networks, nil\n}", "title": "" }, { "docid": "27e5c794e7ffa0ce22c852ad839871ac", "score": "0.5827473", "text": "func ListNetwork(name string) []*Network {\n\tnetList := make([]*Network, 0)\n\n\tfor _, net := range netCtrl.networkDb {\n\t\tnetList = append(netList, net)\n\t}\n\n\treturn netList\n}", "title": "" }, { "docid": "ce13c19a57d63134823a9c9063aef0a4", "score": "0.58233595", "text": "func (a *NetAddr) Network() string {\n\treturn a.AddrNetwork\n}", "title": "" }, { "docid": "a5c152ecb12169aa32b43537f5149314", "score": "0.5822767", "text": "func GetLinuxNetworks() (networks []LinuxNetworkFile, err error) {\n\tif extensions.DoesFileExist(NETWORK_PATH+\"/interfaces.d/eth0\") == false {\n\t\textensions.WriteToFile(\"auto eth0\\niface eth0 inet static\\naddress 192.168.1.254\\nnetmask 255.255.255.0\\ngateway 192.168.1.1\", NETWORK_PATH+\"/interfaces.d/eth0\", 777)\n\t}\n\n\tif extensions.DoesFileExist(NETWORK_PATH+\"/interfaces.d/eth1\") == false {\n\t\textensions.WriteToFile(\"auto eth1\\niface eth1 inet dhcp\", NETWORK_PATH+\"/interfaces.d/eth1\", 777)\n\t}\n\n\tdata0, err := extensions.ReadFile(NETWORK_PATH + \"/interfaces.d/eth0\")\n\tif err != nil {\n\t\tsession_functions.Log(\"Error\", \"Failed to read /etc/network/interfaces.d/eth0: \"+err.Error())\n\t\treturn\n\t}\n\n\tdata1, err := extensions.ReadFile(NETWORK_PATH + \"/interfaces.d/eth1\")\n\tif err != nil {\n\t\tsession_functions.Log(\"Error\", \"Failed to read /etc/network/interfaces.d/eth1: \"+err.Error())\n\t\treturn\n\t}\n\n\tnetwork0, err := ParseNetworkFileWPA(data0)\n\tif err != nil {\n\t\tsession_functions.Log(\"Error\", \"Failed to parse network 0: \"+err.Error())\n\t\treturn\n\t}\n\n\tnetwork1, err := ParseNetworkFileWPA(data1)\n\tif err != nil {\n\t\tsession_functions.Log(\"Error\", \"Failed to parse network 1: \"+err.Error())\n\t\treturn\n\t}\n\n\tnetworks = append(networks, network0)\n\tnetworks = append(networks, network1)\n\treturn\n}", "title": "" }, { "docid": "c81c240f2f1e545da92bf871c5189f59", "score": "0.5820641", "text": "func NetworkList() (networks []types.NetworkResource, err error) {\n\terr = mgr.Do(func(ctx context.Context, cli *client.Client) (err error) {\n\t\tnetworks, err = cli.NetworkList(ctx, types.NetworkListOptions{})\n\t\tif err == nil {\n\t\t\tsort.Slice(networks, func(i, j int) bool {\n\t\t\t\treturn networks[i].Name < networks[j].Name\n\t\t\t})\n\t\t}\n\t\treturn\n\t})\n\treturn\n}", "title": "" }, { "docid": "15620268a88a3a0d2181f665512a9f86", "score": "0.58111477", "text": "func (c *RedfishClient) GetNetworkInterfaces(systemID string) ([]model.NetworkInterface, error) {\n\tvar ret []model.NetworkInterface\n\tret = append(ret, *randNetworkInterface(\"NetworkInterface0\"))\n\tret = append(ret, *randNetworkInterface(\"NetworkInterface1\"))\n\tmockDelay()\n\treturn ret, nil\n}", "title": "" }, { "docid": "520f602d9414f60da77840319b08b168", "score": "0.58104676", "text": "func (o NetworkInterfaceOutput) Network() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v NetworkInterface) *string { return v.Network }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "8200ba42bc3885827afe54872175db4a", "score": "0.57853836", "text": "func (device *Device) GetNetworkInterfaces() (NetworkInterfaces, error) {\n\t// Create SOAP\n\tsoap := SOAP{\n\t\tBody: \"<tds:GetNetworkInterfaces/>\",\n\t\tXMLNs: deviceXMLNs,\n\t\tUser: device.User,\n\t\tPassword: device.Password,\n\t}\n\n\t// Send SOAP request\n\tresponse, err := soap.SendRequest(device.XAddr)\n\tif err != nil {\n\t\treturn NetworkInterfaces{}, err\n\t}\n\n\t// Parse response to interface\n\tnetworkInfo, err := response.ValueForPath(\"Envelope.Body.GetNetworkInterfacesResponse.NetworkInterfaces\")\n\tif err != nil {\n\t\treturn NetworkInterfaces{}, err\n\t}\n\n\tnetworkInfoAsJSON, _ := json.MarshalIndent(networkInfo, \"\", \" \")\n\tvar ni NetworkInterfaces\n\tif err = json.Unmarshal(networkInfoAsJSON, &ni); err != nil {\n\t\treturn NetworkInterfaces{}, err\n\t}\n\n\treturn ni, nil\n}", "title": "" }, { "docid": "710c7e87bd5d6553c3f3a6a8b928d253", "score": "0.57842773", "text": "func ActionNetworks() carapace.Action {\n\treturn carapace.ActionCallback(func(c carapace.Context) carapace.Action {\n\t\treturn carapace.ActionExecCommand(\"docker\", \"network\", \"ls\", \"--format\", \"{{.Name}}\\n{{.Driver}}/{{.Scope}}\")(func(output []byte) carapace.Action {\n\t\t\tvals := strings.Split(string(output), \"\\n\")\n\t\t\treturn carapace.ActionValuesDescribed(vals[:len(vals)-1]...).Style(styles.Docker.Network)\n\t\t})\n\t}).Tag(\"networks\")\n}", "title": "" }, { "docid": "fc4359384b135e731571dfc6da123c03", "score": "0.578257", "text": "func (o *VirtualizationIweHostInterface) GetNetwork() VirtualizationIweNetworkRelationship {\n\tif o == nil || o.Network == nil {\n\t\tvar ret VirtualizationIweNetworkRelationship\n\t\treturn ret\n\t}\n\treturn *o.Network\n}", "title": "" }, { "docid": "67288798dda3b0a5d05c56daf608b0f5", "score": "0.5760885", "text": "func (ep *Endpoint) GetNetwork() string {\n\treturn ep.Interface.IPAddress + \"/\" + strconv.Itoa(ep.Interface.PrefixLen)\n}", "title": "" }, { "docid": "340f69d841eaaa4759323ed2abb7b241", "score": "0.5756838", "text": "func GetNetwork(ic *interop.Context) error {\n\tm := ic.Chain.GetConfig().Magic\n\tic.VM.Estack().PushItem(stackitem.NewBigInteger(big.NewInt(int64(m))))\n\treturn nil\n}", "title": "" }, { "docid": "70ef4faa671b168398c6990d0ed3bc76", "score": "0.5756178", "text": "func (s *server) Network() string {\n\treturn config.GetString(\"server.network\")\n}", "title": "" }, { "docid": "1efc20f247c71617164d3515ee804b16", "score": "0.5748318", "text": "func (a *torv3Addr) Network() string {\n\treturn string(a.netID)\n}", "title": "" }, { "docid": "ef0d59ec7e02857a1aa468d89b78888b", "score": "0.57399917", "text": "func (sm *VcenterSysModel) Networks(tenant string) *objects.NetworkCollection {\n\tsnc := objects.NetworkCollection{}\n\tnws, err := sm.CfgModel.ListNetwork(tenant)\n\tif err != nil {\n\t\tlog.Errorf(\"Error listing networks %v\", err)\n\t\treturn nil\n\t}\n\tfor _, sn := range nws {\n\t\tsnc.AddSubnet(&objects.Network{Name: getVcenterNetworkName(sn), VeniceNetwork: sn})\n\t}\n\n\treturn &snc\n}", "title": "" }, { "docid": "0a43df9c4797113e13e2011f64e12715", "score": "0.5738527", "text": "func printNetworkInterfaces() {\n\tifaces, err := net.Interfaces()\n\tif(err != nil) { log.Fatal(err) }\n\n\tif len(ifaces)<1 {\n\t\tlog.Println(\"No network interfaces found.\")\n\t\treturn\n\t}\n\n\thostname, _ := os.Hostname()\n\tlog.Println( \"Network interfaces for \" + hostname )\n\n\tfor _, iface := range ifaces {\n\t\taddrs, err := iface.Addrs()\n\t\tif(err != nil) { log.Fatal(err) }\n\n\t\tif len(addrs) < 1 { continue }\n\n\t\tlog.Println(\"-\", iface.Name, iface.HardwareAddr)\n\n\t\tfor _, addr := range addrs {\n\t\t\tswitch v := addr.(type) {\n\t\t\t\tcase *net.IPNet:\n\t\t\t\t\tfmt.Printf(\" IPNet: IP=%s, mask=%s, network=%s, %s\",\n\t\t\t\t\t\tv.IP, v.Mask, v.Network(), v.String())\n\n\t\t\t\tcase *net.IPAddr:\n\t\t\t\t\tfmt.Printf(\" IPAddr: IP=%s, zone=%s, network=%s, %s\",\n\t\t\t\t\t\tv.IP, v.Zone, v.Network(), v.String())\n\n\t\t\t\tdefault:\n\t\t\t\t\tfmt.Println(\"<unknown>\")\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "6210998f1daeeaa8c521a4d32c24ab60", "score": "0.5734553", "text": "func (o ManagedZonePrivateVisibilityConfigPtrOutput) Networks() ManagedZonePrivateVisibilityConfigNetworkArrayOutput {\n\treturn o.ApplyT(func(v *ManagedZonePrivateVisibilityConfig) []ManagedZonePrivateVisibilityConfigNetwork {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Networks\n\t}).(ManagedZonePrivateVisibilityConfigNetworkArrayOutput)\n}", "title": "" }, { "docid": "b1a3087d541d6225249a67c05a5c8eec", "score": "0.572468", "text": "func (o VirtualMachineConfigOutput) Network() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v VirtualMachineConfig) *string { return v.Network }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "d4e6e1ce9c36f75a409bdd9560cb0beb", "score": "0.57225126", "text": "func (server *Server) Network() string {\n\tval, err := server.support.Get(\"network\")\n\tif err != nil {\n\t\treturn server.Hostname()\n\t}\n\treturn val\n}", "title": "" }, { "docid": "1a2638ef78e0a624455207c3a032b2b5", "score": "0.56909573", "text": "func (o VirtualMachineConfigPtrOutput) Network() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *VirtualMachineConfig) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Network\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "dfc6fe139fb900825a69a101bee0fba0", "score": "0.5674184", "text": "func GetK8SNetworks(shoot *gardenv1beta1.Shoot) (*gardenv1beta1.K8SNetworks, error) {\n\tcloudProvider, err := DetermineCloudProviderInShoot(shoot.Spec.Cloud)\n\tif err != nil {\n\t\treturn &gardenv1beta1.K8SNetworks{}, err\n\t}\n\n\tswitch cloudProvider {\n\tcase gardenv1beta1.CloudProviderAWS:\n\t\treturn &shoot.Spec.Cloud.AWS.Networks.K8SNetworks, nil\n\tcase gardenv1beta1.CloudProviderAzure:\n\t\treturn &shoot.Spec.Cloud.Azure.Networks.K8SNetworks, nil\n\tcase gardenv1beta1.CloudProviderGCP:\n\t\treturn &shoot.Spec.Cloud.GCP.Networks.K8SNetworks, nil\n\tcase gardenv1beta1.CloudProviderOpenStack:\n\t\treturn &shoot.Spec.Cloud.OpenStack.Networks.K8SNetworks, nil\n\tcase gardenv1beta1.CloudProviderAlicloud:\n\t\treturn &shoot.Spec.Cloud.Alicloud.Networks.K8SNetworks, nil\n\tcase gardenv1beta1.CloudProviderPacket:\n\t\treturn &shoot.Spec.Cloud.Packet.Networks.K8SNetworks, nil\n\t}\n\treturn &gardenv1beta1.K8SNetworks{}, nil\n}", "title": "" }, { "docid": "8050e9df0f8416bff51bdb477658249f", "score": "0.5668346", "text": "func (o HaVpnGatewayOutput) Network() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *HaVpnGateway) pulumi.StringOutput { return v.Network }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "f2ba71cf4c68ace5247b28f0f3a41511", "score": "0.56437755", "text": "func (o HostVirtualSwitchOutput) NetworkAdapters() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v *HostVirtualSwitch) pulumi.StringArrayOutput { return v.NetworkAdapters }).(pulumi.StringArrayOutput)\n}", "title": "" }, { "docid": "f5e456e8ea2d8d6708620245a2cb2a72", "score": "0.5640657", "text": "func (*NetworkNetworks) GetPath() string { return \"/api/objects/network/network/\" }", "title": "" }, { "docid": "e5f22ad4191eec93c7e1fef7f43cc4bc", "score": "0.56379825", "text": "func (networkApi *NetworkApi) List() ([]Network, error) {\n\treturn networkApi.ListWithOptions(map[string]string{})\n}", "title": "" }, { "docid": "56639247a49708ce7a28385cce0d867c", "score": "0.5636242", "text": "func (w WpaSupplicant) AvailableNetworks () (nets []WirelessNetwork, err error) {\n stdout, _, err := w.Run(\"scan_results\")\n if err != nil {\n return\n }\n\n for _, line := range stdout {\n if strings.HasPrefix(line, \"bssid\") { continue }\n if len(line) == 0 { continue }\n\n t := strings.Split(line, \"\\t\")\n\n var network = new(WirelessNetwork)\n network.Ssid = t[4]\n network.Frequency, err = strconv.Atoi(t[1])\n if err != nil {\n err = errors.New(\"Failed to parse frequency for \" + t[4] + \": \" + err.Error())\n continue\n }\n network.Signal, err = strconv.Atoi(t[2])\n if err != nil {\n continue\n }\n\n nets = append(nets, *network)\n }\n\n return\n}", "title": "" }, { "docid": "1d3271113b98ddbe7c7075e4c807aa7f", "score": "0.56225175", "text": "func NetworkInterfaceNames(ctx context.Context) ([]string, error) {\n\tout, err := BootstrapCommand(ctx, \"/system/bin/ls\", \"/sys/class/net/\").Output()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Filter out non-arc android net interfaces\n\tvar ifnames []string\n\tfor _, ifname := range strings.Fields(string(out)) {\n\t\tif !strings.HasPrefix(ifname, clatPrefix) &&\n\t\t\t!strings.HasPrefix(ifname, vpnPrefix) &&\n\t\t\tifname != Loopback {\n\t\t\tifnames = append(ifnames, ifname)\n\t\t}\n\t}\n\n\treturn ifnames, nil\n}", "title": "" }, { "docid": "1d3271113b98ddbe7c7075e4c807aa7f", "score": "0.56225175", "text": "func NetworkInterfaceNames(ctx context.Context) ([]string, error) {\n\tout, err := BootstrapCommand(ctx, \"/system/bin/ls\", \"/sys/class/net/\").Output()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Filter out non-arc android net interfaces\n\tvar ifnames []string\n\tfor _, ifname := range strings.Fields(string(out)) {\n\t\tif !strings.HasPrefix(ifname, clatPrefix) &&\n\t\t\t!strings.HasPrefix(ifname, vpnPrefix) &&\n\t\t\tifname != Loopback {\n\t\t\tifnames = append(ifnames, ifname)\n\t\t}\n\t}\n\n\treturn ifnames, nil\n}", "title": "" }, { "docid": "2d560597b78bf1c276fe0e0ca463f8cc", "score": "0.5619793", "text": "func (l *Log) Net() []string {\n\ts := make([]string, 0, len(l.Networks))\n\tfor _, network := range l.Networks {\n\t\ts = append(s, fmt.Sprintf(\"%v/%v\", ipnil(network.IP), masktoip(network.Mask)))\n\t}\n\treturn s\n}", "title": "" }, { "docid": "c7014152f1b6c6ba615bb6f05843e061", "score": "0.561067", "text": "func LocalIPNetworks() (blocks []net.IPNet, err error) {\n\tifaces, err := net.Interfaces()\n\tif err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\tfor _, iface := range ifaces {\n\t\taddrs, err := iface.Addrs()\n\t\tif err != nil {\n\t\t\treturn nil, trace.Wrap(err)\n\t\t}\n\t\tfor _, addr := range addrs {\n\t\t\tswitch block := addr.(type) {\n\t\t\tcase *net.IPNet:\n\t\t\t\tblocks = append(blocks, *block)\n\t\t\t}\n\t\t}\n\t}\n\treturn blocks, nil\n}", "title": "" }, { "docid": "29e06d0de95793a80e879d7e3086950a", "score": "0.5608468", "text": "func (o NetworkProfilePtrOutput) NetworkInterfaces() IpAddressArrayOutput {\n\treturn o.ApplyT(func(v *NetworkProfile) []IpAddress {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.NetworkInterfaces\n\t}).(IpAddressArrayOutput)\n}", "title": "" }, { "docid": "1f157fd5e558bf5bf15dcaf26eb6ff4d", "score": "0.56056434", "text": "func (o DeploymentOutput) NetworkInterfaces() DeploymentNetworkInterfaceArrayOutput {\n\treturn o.ApplyT(func(v *Deployment) DeploymentNetworkInterfaceArrayOutput { return v.NetworkInterfaces }).(DeploymentNetworkInterfaceArrayOutput)\n}", "title": "" }, { "docid": "b0696d1a29efa01e2a67440ac1e07cf5", "score": "0.5605132", "text": "func (a *torv2Addr) Network() string {\n\treturn string(a.netID)\n}", "title": "" }, { "docid": "d6596255307fe556555b319cb38395a3", "score": "0.5603957", "text": "func (c *DefaultClient) GetNetworks(ctx context.Context, datacenterMOID string) ([]*models.VSphereNetwork, error) {\n\tresults := []*models.VSphereNetwork{}\n\tclient := c.vmomiClient\n\tif client == nil {\n\t\treturn results, errors.New(\"uninitialized vmomi client\")\n\t}\n\n\tvar networks []mo.Network\n\n\tviewTypes := []string{TypeNetwork}\n\n\tdcRef := TypeDatacenter + \":\" + datacenterMOID\n\n\tview, err := c.createContainerView(context.Background(), dcRef, viewTypes)\n\tif err != nil {\n\t\treturn results, errors.Wrap(err, \"error creating container view\")\n\t}\n\n\terr = view.Retrieve(ctx, viewTypes, []string{\"name\"}, &networks)\n\tif err != nil {\n\t\treturn results, errors.Wrap(err, \"failed to get networks\")\n\t}\n\n\tfor i := range networks {\n\t\tmanagedObject := models.VSphereNetwork{Name: networks[i].Name, Moid: networks[i].Reference().Value}\n\t\tresults = append(results, &managedObject)\n\t}\n\treturn results, nil\n}", "title": "" }, { "docid": "beff76e4c46709a888a0e54648ba6a1c", "score": "0.55980027", "text": "func NetworkList(cli *client.Client) []types.NetworkResource {\n\n\tnetworks, err := cli.NetworkList(context.Background(), types.NetworkListOptions{})\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn networks\n}", "title": "" }, { "docid": "52ece84d1990cfe07391849a412f1092", "score": "0.5596988", "text": "func (wpa *WpaCfg) ScanNetworks() (map[string]WpaNetwork, error) {\n\twpaNetworks := make(map[string]WpaNetwork, 0)\n\n\tscanOut, err := exec.Command(\"wpa_cli\", \"-i\", \"wlan1\", \"scan\").Output()\n\tif err != nil {\n\t\twpa.Log.Fatal(err)\n\t\treturn wpaNetworks, err\n\t}\n\tscanOutClean := strings.TrimSpace(string(scanOut))\n\n\t// wait one second for results\n\ttime.Sleep(1 * time.Second)\n\n\tif scanOutClean == \"OK\" {\n\t\tnetworkListOut, err := exec.Command(\"wpa_cli\", \"-i\", \"wlan1\", \"scan_results\").Output()\n\t\tif err != nil {\n\t\t\twpa.Log.Fatal(err)\n\t\t\treturn wpaNetworks, err\n\t\t}\n\n\t\tnetworkListOutArr := strings.Split(string(networkListOut), \"\\n\")\n\t\tfor _, netRecord := range networkListOutArr[1:] {\n\t\t\tif strings.Contains(netRecord, \"[P2P]\") {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tfields := strings.Fields(netRecord)\n\n\t\t\tif len(fields) > 4 {\n\t\t\t\tssid := strings.Join(fields[4:], \" \")\n\t\t\t\twpaNetworks[ssid] = WpaNetwork{\n\t\t\t\t\tBssid: fields[0],\n\t\t\t\t\tFrequency: fields[1],\n\t\t\t\t\tSignalLevel: fields[2],\n\t\t\t\t\tFlags: fields[3],\n\t\t\t\t\tSsid: ssid,\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t}\n\n\treturn wpaNetworks, nil\n}", "title": "" }, { "docid": "50909714599dc8ddaed28d28d252bd60", "score": "0.55742747", "text": "func GetNetworkList() (NetworkList, error) {\n\tvar netList NetworkList\n\tifaceList, _ := utils.ScanDir(netSysfsDir, filterIface)\n\tfor _, iface := range ifaceList {\n\t\tnet, err := newNetwork(netSysfsDir, iface)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tnetList = append(netList, net)\n\t}\n\treturn netList, nil\n}", "title": "" }, { "docid": "e5d9f3776ae3ec8ba7cfef3db956756b", "score": "0.5567033", "text": "func (addr MultiAddr) Network() string {\n\ts := make([]string, len(addr))\n\tfor i, a := range addr {\n\t\ts[i] = a.Network()\n\t}\n\treturn strings.Join(s, \",\")\n}", "title": "" }, { "docid": "9f9e65b337e6019b399d6cd86660c55f", "score": "0.5565598", "text": "func (a *ipv4Addr) Network() string {\n\treturn string(a.netID)\n}", "title": "" }, { "docid": "60bd84adde40ea066a8eed987d6a11e1", "score": "0.55634767", "text": "func (d *Docker) NetworkList(ctx context.Context) (networks []types.NetworkResource, err error) {\n\terr = d.call(func(c *client.Client) (err error) {\n\t\tnetworks, err = c.NetworkList(ctx, types.NetworkListOptions{})\n\t\tif err == nil {\n\t\t\tsort.Slice(networks, func(i, j int) bool {\n\t\t\t\treturn networks[i].Name < networks[j].Name\n\t\t\t})\n\t\t}\n\t\treturn\n\t})\n\treturn\n}", "title": "" }, { "docid": "db96cad532e44b606027ceeeb6df0ce5", "score": "0.55571234", "text": "func (o *VirtualizationIweHostInterface) GetNetworkOk() (*VirtualizationIweNetworkRelationship, bool) {\n\tif o == nil || o.Network == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Network, true\n}", "title": "" }, { "docid": "fa30091da467dd90b4551f1dcdc8c145", "score": "0.555701", "text": "func TestGetAllNetworkInterfaces(t *testing.T) {\n\tmockCtrl := gomock.NewController(t)\n\tdefer mockCtrl.Finish()\n\n\tmocknetwrapper := mock_netwrapper.NewMockNetWrapper(mockCtrl)\n\tnetUtils := &networkUtils{netWrapper: mocknetwrapper}\n\n\texpectedIface := make([]net.Interface, 1)\n\n\texpectedIface[0] = net.Interface{\n\t\tIndex: interfaceIndex,\n\t\tHardwareAddr: make([]byte, 0),\n\t}\n\n\tmocknetwrapper.EXPECT().GetAllNetworkInterfaces().Return(\n\t\texpectedIface, nil,\n\t)\n\n\tiface, err := netUtils.GetAllNetworkInterfaces()\n\n\tassert.NoError(t, err)\n\tassert.Equal(t, expectedIface, iface)\n}", "title": "" }, { "docid": "4d4f89ddd2fcb68d10e0eb2b8d831b5e", "score": "0.55556095", "text": "func (networkImpl) GetNetInterface() ([]net.Interface, error) {\n\tif netInfo.netError == nil {\n\t\treturn netInfo.netInterface, nil\n\t}\n\treturn nil, netInfo.netError\n}", "title": "" }, { "docid": "b7c477d6e55a20fb8b3f7dfbb52fba23", "score": "0.5553201", "text": "func (n *CloudNetworks) GetNetwork(name string) (*NetworkSpec, error) {\n\n\tfor _, spec := range n.Network {\n\t\tif spec.Name == name {\n\t\t\treturn &spec, nil\n\t\t}\n\t}\n\n\treturn nil, &NetworkNotFound{errMsg: name}\n}", "title": "" }, { "docid": "2b7f255d0a7e31a87e774cc7bca90fe5", "score": "0.5542414", "text": "func (addr *Addr) Network() string {\n\treturn addr.network\n}", "title": "" }, { "docid": "5b350fefca0c8e570aa2566b467ca156", "score": "0.5541007", "text": "func (c *configuration) GetNetworkString() string {\n\treturn c.GetString(\"centrifugeNetwork\")\n}", "title": "" }, { "docid": "a32a84b7351951fc1159bf47a1bff14a", "score": "0.55349827", "text": "func (s *ManagedClusterScope) Network() *infrav1.Network {\n\treturn &s.GCPManagedCluster.Status.Network\n}", "title": "" }, { "docid": "7852841a77cc01b759fb363423e8f86e", "score": "0.5530726", "text": "func (o ManagedZonePrivateVisibilityConfigOutput) Networks() ManagedZonePrivateVisibilityConfigNetworkArrayOutput {\n\treturn o.ApplyT(func(v ManagedZonePrivateVisibilityConfig) []ManagedZonePrivateVisibilityConfigNetwork {\n\t\treturn v.Networks\n\t}).(ManagedZonePrivateVisibilityConfigNetworkArrayOutput)\n}", "title": "" }, { "docid": "c0257e4ce0943d61a785acf42da4c31c", "score": "0.5525947", "text": "func NetworkRange(network *net.IPNet) (net.IP, net.IP) {\n\tvar (\n\t\tnetIP = network.IP.To4()\n\t\tfirstIP = netIP.Mask(network.Mask)\n\t\tlastIP = net.IPv4(0, 0, 0, 0).To4()\n\t)\n\n\tfor i := 0; i < len(lastIP); i++ {\n\t\tlastIP[i] = netIP[i] | ^network.Mask[i]\n\t}\n\treturn firstIP, lastIP\n}", "title": "" }, { "docid": "2abb0d928f73fa9ff91fb2d494fdefea", "score": "0.5509632", "text": "func networkRange(network *net.IPNet) (net.IP, net.IP) {\n\tnetIP := network.IP.To4()\n\tfirstIP := netIP.Mask(network.Mask)\n\tlastIP := net.IPv4(0, 0, 0, 0).To4()\n\tfor i := 0; i < len(lastIP); i++ {\n\t\tlastIP[i] = netIP[i] | ^network.Mask[i]\n\t}\n\treturn firstIP, lastIP\n}", "title": "" }, { "docid": "2abb0d928f73fa9ff91fb2d494fdefea", "score": "0.5509632", "text": "func networkRange(network *net.IPNet) (net.IP, net.IP) {\n\tnetIP := network.IP.To4()\n\tfirstIP := netIP.Mask(network.Mask)\n\tlastIP := net.IPv4(0, 0, 0, 0).To4()\n\tfor i := 0; i < len(lastIP); i++ {\n\t\tlastIP[i] = netIP[i] | ^network.Mask[i]\n\t}\n\treturn firstIP, lastIP\n}", "title": "" }, { "docid": "7bac43f9f620a9318f8bd1e8120453e9", "score": "0.550312", "text": "func (o NetworkProfileResponseOutput) NetworkInterfaces() IpAddressResponseArrayOutput {\n\treturn o.ApplyT(func(v NetworkProfileResponse) []IpAddressResponse { return v.NetworkInterfaces }).(IpAddressResponseArrayOutput)\n}", "title": "" }, { "docid": "e88daad0f6abe88f67cfacd662e05c32", "score": "0.5502911", "text": "func (o FirewallOutput) Network() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *Firewall) pulumi.StringOutput { return v.Network }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "dc1ade530552284f6d95dcee99280238", "score": "0.5502504", "text": "func (a Addr) Network() string {\n\treturn a.network\n}", "title": "" }, { "docid": "75eb0b9c9308624011b7b81822790ef4", "score": "0.549274", "text": "func (vm *virtManager) discoverNetworks() error {\n\n\tvar healthValue string\n\tvirtMap, err := getVirtualInterfaceList()\n\tif err != nil {\n\t\tglog.Errorf(\"Error. No Virtual network device found\")\n\t\treturn err\n\t}\n\tfor name, addr := range virtMap {\n\t\tif IsNetlinkStatusUp(name) {\n\t\t\thealthValue = pluginapi.Healthy\n\t\t} else {\n\t\t\thealthValue = \"Unhealthy\"\n\t\t}\n\t\tvm.devices[addr] = pluginapi.Device{ID: addr, Health: healthValue}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d6dad09eb77b0a6834c560637faef2ea", "score": "0.54903656", "text": "func (s *Server) Network() string {\n\treturn s.conf.Network\n}", "title": "" }, { "docid": "72667915259587346923effba6489e80", "score": "0.5482482", "text": "func (o NetworkConfigOutput) Network() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v NetworkConfig) *string { return v.Network }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "72667915259587346923effba6489e80", "score": "0.5482482", "text": "func (o NetworkConfigOutput) Network() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v NetworkConfig) *string { return v.Network }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "72667915259587346923effba6489e80", "score": "0.5482482", "text": "func (o NetworkConfigOutput) Network() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v NetworkConfig) *string { return v.Network }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "4d7c7a8bcc14ea473f27a48646c6b0da", "score": "0.5479723", "text": "func GetNetworkStatus(\n\tctx context.Context,\n\tclient *vim25.Client,\n\tmoRef types.ManagedObjectReference) ([]NetworkStatus, error) {\n\tvar (\n\t\tobj mo.VirtualMachine\n\n\t\tpc = property.DefaultCollector(client)\n\t\tprops = []string{\n\t\t\t\"config.hardware.device\",\n\t\t\t\"guest.net\",\n\t\t}\n\t)\n\n\tif err := pc.RetrieveOne(ctx, moRef, props, &obj); err != nil {\n\t\treturn nil, errors.Wrapf(err, \"unable to fetch props %v for vm %v\", props, moRef)\n\t}\n\tif obj.Config == nil {\n\t\treturn nil, errors.New(\"config.hardware.device is nil\")\n\t}\n\n\tvar allNetStatus []NetworkStatus\n\n\tfor _, device := range obj.Config.Hardware.Device {\n\t\tif dev, ok := device.(types.BaseVirtualEthernetCard); ok {\n\t\t\tnic := dev.GetVirtualEthernetCard()\n\t\t\tnetStatus := NetworkStatus{\n\t\t\t\tMACAddr: nic.MacAddress,\n\t\t\t}\n\t\t\tif obj.Guest != nil {\n\t\t\t\tfor _, i := range obj.Guest.Net {\n\t\t\t\t\tif strings.EqualFold(nic.MacAddress, i.MacAddress) {\n\t\t\t\t\t\tnetStatus.IPAddrs = i.IpAddress\n\t\t\t\t\t\tnetStatus.NetworkName = i.Network\n\t\t\t\t\t\tnetStatus.Connected = i.Connected\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t\tallNetStatus = append(allNetStatus, netStatus)\n\t\t}\n\t}\n\n\treturn allNetStatus, nil\n}", "title": "" } ]
c86e3f366b40b6a8e570ffe6362b34fc
IngressGateway lazily initialize Ingress Gateway
[ { "docid": "2edd102477beb2812f907e6783e72186", "score": "0.51466995", "text": "func (k *KubeInfo) IngressGateway() (string, error) {\n\treturn k.doGetIngress(istioIngressGatewayServiceName, istioIngressGatewayLabel,\n\t\t&k.ingressGatewayLock, &k.ingressGateway, &k.ingressGatewayErr)\n}", "title": "" } ]
[ { "docid": "7ade93ec52a76cd472f5faf03353d4b4", "score": "0.60121334", "text": "func Gateway(c *canaryv1.CanaryApp) *istiogov1alpha3.Gateway {\n\tds := &istiogov1alpha3.Gateway{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tKind: \"Gateway\",\n\t\t\tAPIVersion: \"networking.istio.io/v1alpha3\",\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: c.Name,\n\t\t\tNamespace: c.Namespace,\n\t\t},\n\t\tSpec: istiov1alpha3.Gateway{\n\t\t\tSelector: map[string]string{\"istio\": \"ingressgateway\"},\n\t\t\tServers: []*istiov1alpha3.Server{{\n\t\t\t\tHosts: []string{\"*\"},\n\t\t\t\tPort: &istiov1alpha3.Port{\n\t\t\t\t\tNumber: 80,\n\t\t\t\t\tName: \"http\",\n\t\t\t\t\tProtocol: \"HTTP\",\n\t\t\t\t},\n\t\t\t}},\n\t\t},\n\t}\n\treturn ds\n}", "title": "" }, { "docid": "2ef1d6435537c2394b53c59d8e293476", "score": "0.58369887", "text": "func newTLSGateway(t test.Failer, ctx resource.Context, clientNamespace namespace.Instance, to echo.Instances) {\n\targs := map[string]any{\"to\": to}\n\n\tgateway := `\napiVersion: networking.istio.io/v1beta1\nkind: Gateway\nmetadata:\n name: istio-egressgateway-sds\nspec:\n selector:\n istio: egressgateway\n servers:\n - port:\n number: 443\n name: https-sds\n protocol: HTTPS\n hosts:\n - {{ .to.Config.ClusterLocalFQDN }}\n tls:\n mode: ISTIO_MUTUAL\n---\napiVersion: networking.istio.io/v1beta1\nkind: DestinationRule\nmetadata:\n name: egressgateway-for-server-sds\nspec:\n host: istio-egressgateway.istio-system.svc.cluster.local\n subsets:\n - name: server\n trafficPolicy:\n portLevelSettings:\n - port:\n number: 443\n tls:\n mode: ISTIO_MUTUAL\n sni: {{ .to.Config.ClusterLocalFQDN }}\n`\n\tvs := `\napiVersion: networking.istio.io/v1beta1\nkind: VirtualService\nmetadata:\n name: route-via-egressgateway-sds\nspec:\n hosts:\n - {{ .to.Config.ClusterLocalFQDN }}\n gateways:\n - istio-egressgateway-sds\n - mesh\n http:\n - match:\n - gateways:\n - mesh # from sidecars, route to egress gateway service\n port: 80\n route:\n - destination:\n host: istio-egressgateway.istio-system.svc.cluster.local\n subset: server\n port:\n number: 443\n weight: 100\n - match:\n - gateways:\n - istio-egressgateway-sds\n port: 443\n route:\n - destination:\n host: {{ .to.Config.ClusterLocalFQDN }}\n port:\n number: 443\n weight: 100\n headers:\n request:\n add:\n handled-by-egress-gateway: \"true\"\n`\n\tctx.ConfigIstio().Eval(clientNamespace.Name(), args, gateway, vs).ApplyOrFail(t)\n}", "title": "" }, { "docid": "a7350c9f8d2d886b79c4ca2bece11503", "score": "0.55122757", "text": "func newSiaGateway(host string) (GatewayLayer, error) {\n\tsia := &siaObjects{\n\t\tPurgeCacheAfterSec: 24 * 60 * 60,\n\t\tSiadAddress: host,\n\t\tCacheDir: \".sia_cache\",\n\t\tDbFile: \".sia.db\",\n\t\tDebugMode: false,\n\t}\n\n\tsia.loadSiaEnv()\n\n\t// If host is specified on command line, override the ENV\n\tif host != \"\" {\n\t\tsia.SiadAddress = host\n\t}\n\n\t// If SiadAddress not provided on command line or ENV, default to:\n if sia.SiadAddress == \"\" {\n \tsia.SiadAddress = \"127.0.0.1:9980\"\n }\n\n\t// Create the filesystem layer\n\tf, err := newFSObjectLayer(sia.CacheDir)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t// Create the Sia cache layer\n\tsia.Cache, err = newSiaCacheLayer(sia.SiadAddress, sia.CacheDir, sia.DbFile, sia.DebugMode)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfmt.Printf(\"\\nSia Gateway Configuration:\\n\")\n\tfmt.Printf(\" Debug Mode: %v\\n\", sia.DebugMode)\n\tfmt.Printf(\" Sia Daemon API Address: %s\\n\", sia.SiadAddress)\n\tfmt.Printf(\" Cache Directory: %s\\n\", sia.CacheDir)\n\tfmt.Printf(\" Purge Cache After: %ds\\n\", sia.PurgeCacheAfterSec)\n\tfmt.Printf(\" Cache Database File: %s\\n\", sia.DbFile)\n\tfmt.Printf(\" Cache Manager Delay: %ds\\n\", sia.Cache.ManagerDelaySec)\n\tfmt.Printf(\" Cache Max Size: %d bytes\\n\", sia.Cache.MaxCacheSizeBytes)\n\tfmt.Printf(\" Upload Check Frequency: %dms\\n\", sia.Cache.UploadCheckFreqMs)\n\tfmt.Printf(\" Background Uploading: %v\\n\\n\", sia.Cache.BackgroundUpload)\n\n\t// Start the Sia cache layer\n\tsiaErr := sia.Cache.Start()\n\tif siaErr != nil {\n\t\tpanic(siaErr)\n\t}\n\n\tfso, ok := f.(*fsObjects)\n\tif !ok {\n\t\treturn nil, errors.New(\"Invalid type\")\n\t}\n\tsia.Fs = fso\n\n\treturn sia, nil\n}", "title": "" }, { "docid": "9267f52335ce15e8f956a37e33b99e0c", "score": "0.55121106", "text": "func newGateway(opts *Options) (*srvGateway, error) {\n\tgateway := &srvGateway{\n\t\tname: opts.Gateway.Name,\n\t\tout: make(map[string]*client),\n\t\touto: make([]*client, 0, 4),\n\t\tin: make(map[uint64]*client),\n\t\tremotes: make(map[string]*gatewayCfg),\n\t\tURLs: make(map[string]struct{}),\n\t\trqs: make(map[string]*subscription),\n\t\tresolver: opts.Gateway.resolver,\n\t\trunknown: opts.Gateway.RejectUnknown,\n\t}\n\tgateway.Lock()\n\tdefer gateway.Unlock()\n\n\tif gateway.resolver == nil {\n\t\tgateway.resolver = netResolver(net.DefaultResolver)\n\t}\n\n\tif opts.Gateway.TLSConfig != nil && opts.Gateway.TLSTimeout == 0 {\n\t\topts.Gateway.TLSTimeout = float64(TLS_TIMEOUT) / float64(time.Second)\n\t}\n\n\t// Copy default permissions (works if DefaultPermissions is nil)\n\tgateway.defPerms = opts.Gateway.DefaultPermissions.clone()\n\n\t// Create remote gateways\n\tfor _, rgo := range opts.Gateway.Gateways {\n\t\t// Ignore if there is a remote gateway with our name.\n\t\tif rgo.Name == gateway.name {\n\t\t\tcontinue\n\t\t}\n\t\tcfg := &gatewayCfg{\n\t\t\tRemoteGatewayOpts: rgo.clone(),\n\t\t\turls: make(map[string]*url.URL, len(rgo.URLs)),\n\t\t}\n\t\tif opts.Gateway.TLSConfig != nil && cfg.TLSConfig == nil {\n\t\t\tcfg.TLSConfig = opts.Gateway.TLSConfig.Clone()\n\t\t}\n\t\tif cfg.TLSTimeout == 0 {\n\t\t\tcfg.TLSTimeout = opts.Gateway.TLSTimeout\n\t\t}\n\t\tfor _, u := range rgo.URLs {\n\t\t\t// For TLS, look for a hostname that we can use for TLSConfig.ServerName\n\t\t\tcfg.saveTLSHostname(u)\n\t\t\tcfg.urls[u.Host] = u\n\t\t}\n\t\tgateway.remotes[cfg.Name] = cfg\n\t}\n\n\tgateway.sqbsz = opts.Gateway.sendQSubsBufSize\n\tif gateway.sqbsz == 0 {\n\t\tgateway.sqbsz = maxBufSize\n\t}\n\n\tgateway.enabled = opts.Gateway.Name != \"\" && opts.Gateway.Port != 0\n\treturn gateway, nil\n}", "title": "" }, { "docid": "d053344d4330fa203c58dafb1cf46de0", "score": "0.54797804", "text": "func newNetworkGateways(env *Environment) *NetworkGateways {\n\t// Generate the a snapshot of the state of gateways by merging the contents of\n\t// MeshNetworks and the ServiceRegistries.\n\tgatewayMap := make(map[NetworkID]map[ClusterID][]*NetworkGateway)\n\n\taddGateway := func(gateway *NetworkGateway) {\n\t\t// Get (or create) an entry for the network.\n\t\tgatewaysByCluster := gatewayMap[gateway.Network]\n\t\tif gatewaysByCluster == nil {\n\t\t\tgatewaysByCluster = make(map[ClusterID][]*NetworkGateway)\n\t\t\tgatewayMap[gateway.Network] = gatewaysByCluster\n\t\t}\n\n\t\tgatewaysByCluster[gateway.Cluster] = append(gatewaysByCluster[gateway.Cluster], gateway)\n\t\tif gateway.Cluster != noCluster {\n\t\t\t// Also make sure this gateway appears in the global list of all gateways for the network.\n\t\t\tgatewaysByCluster[noCluster] = append(gatewaysByCluster[noCluster], gateway)\n\t\t}\n\t}\n\n\t// First, load gateways from the static MeshNetworks config.\n\tmeshNetworks := env.Networks()\n\tif meshNetworks != nil {\n\t\tfor network, networkConf := range meshNetworks.Networks {\n\t\t\tgws := networkConf.Gateways\n\t\t\tfor _, gw := range gws {\n\t\t\t\tif gwIP := net.ParseIP(gw.GetAddress()); gwIP != nil {\n\t\t\t\t\taddGateway(&NetworkGateway{\n\t\t\t\t\t\tCluster: noCluster, /* TODO(nmittler): Add Cluster to the API */\n\t\t\t\t\t\tNetwork: NetworkID(network),\n\t\t\t\t\t\tAddr: gw.GetAddress(),\n\t\t\t\t\t\tPort: gw.Port,\n\t\t\t\t\t})\n\t\t\t\t} else {\n\t\t\t\t\tlog.Warnf(\"Failed parsing gateway address %s in MeshNetworks config. \"+\n\t\t\t\t\t\t\"Hostnames are not supported for gateways\",\n\t\t\t\t\t\tgw.GetAddress())\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\t// Second, load registry-specific gateways.\n\tfor _, gateway := range env.NetworkGateways() {\n\t\t// - the internal map of label gateways - these get deleted if the service is deleted, updated if the ip changes etc.\n\t\t// - the computed map from meshNetworks (triggered by reloadNetworkLookup, the ported logic from getGatewayAddresses)\n\t\taddGateway(gateway)\n\t}\n\n\treturn &NetworkGateways{\n\t\tgateways: gatewayMap,\n\t}\n}", "title": "" }, { "docid": "926cc9a0c553066b3c94159937df1cea", "score": "0.5303129", "text": "func newGateway(ctx context.Context, serverPort int) (http.Handler, error) {\n\tlogrus.Info(\"Instantiating gRPC Gateway\")\n\n\t// gRPC dial up options\n\topts := []grpc.DialOption{\n\t\t//grpc.WithBlock(),\n\t\tgrpc.WithInsecure(),\n\t}\n\t// Create gRPC connection\n\tconn, err := grpc.Dial(fmt.Sprintf(\"%s:%d\", grpcServerAddr, serverPort), opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Changes json serializer to include empty fields with default values\n\tgwMux := runtime.NewServeMux(\n\t\truntime.WithMarshalerOption(runtime.MIMEWildcard, &runtime.JSONPb{OrigName: true, EmitDefaults: true}),\n\t\truntime.WithProtoErrorHandler(runtime.DefaultHTTPProtoErrorHandler),\n\t)\n\n\t// Register Gateway endpoints\n\t// If Rancher adapter enabled\n\tif viper.GetBool(common.EnvApphcAdaptersRancherEnabled) {\n\t\t// Register Application manager service\n\t\tlogrus.Info(\"Registering HTTP handlers for service AppManager\")\n\t\tif err := pbappmgr.RegisterAppManagerHandler(ctx, gwMux, conn); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\t// Register AppHoster Controller manager service\n\tif err := apphcmanager.RegisterApphcManagerHandler(ctx, gwMux, conn); err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Register AppHoster Cluster manager service\n\tif err := clustermanager.RegisterClusterManagerHandler(ctx, gwMux, conn); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn gwMux, nil\n}", "title": "" }, { "docid": "d6f5629c135f2b28a13e598053b3adb9", "score": "0.5290421", "text": "func NewGateway(ctx context.Context, env env.Core, baseLog, accessLog *logrus.Entry, dbGateway database.Gateway, httpsl, httpl, httpHealthl net.Listener, acrResourceID, gatewayDomains string, m metrics.Emitter) (Runnable, error) {\n\tvar domains []string\n\tif gatewayDomains != \"\" {\n\t\tdomains = strings.Split(gatewayDomains, \",\")\n\t}\n\n\tfor _, rawurl := range []string{\n\t\tenv.Environment().ActiveDirectoryEndpoint, // e.g. login.microsoftonline.com\n\t\tenv.Environment().ResourceManagerEndpoint, // e.g. management.azure.com\n\t} {\n\t\tu, err := url.Parse(rawurl)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tif u.Hostname() == \"\" {\n\t\t\treturn nil, errors.New(\"missing required domain. Ensure the environment has both ActiveDirectoryEndpoint and ResourceManagerEndpoint\")\n\t\t}\n\n\t\tdomains = append(domains, u.Hostname())\n\t}\n\n\tif acrResourceID != \"\" {\n\t\tacrResource, err := azure.ParseResourceID(acrResourceID)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tdomains = append(domains,\n\t\t\tacrResource.ResourceName+\".\"+env.Environment().ContainerRegistryDNSSuffix, // e.g. arosvc.azurecr.io\n\t\t\tacrResource.ResourceName+\".\"+env.Location()+\".data.\"+env.Environment().ContainerRegistryDNSSuffix, // e.g. arosvc.eastus.data.azurecr.io\n\t\t)\n\t}\n\n\tallowList := make(map[string]struct{}, len(domains))\n\tfor _, domain := range domains {\n\t\tallowList[strings.ToLower(domain)] = struct{}{}\n\t}\n\n\tg := &gateway{\n\t\tenv: env,\n\t\tlog: baseLog,\n\t\taccessLog: accessLog,\n\n\t\tgateways: map[string]*api.Gateway{},\n\n\t\tdbGateway: dbGateway,\n\n\t\t// httpsl and httpl are wrapped with proxyproto.Listener so that we can\n\t\t// later pick out the private endpoint ID of the incoming connection via\n\t\t// Azure's haproxy protocol support\n\t\t// (https://docs.microsoft.com/en-us/azure/private-link/private-link-service-overview#getting-connection-information-using-tcp-proxy-v2).\n\t\thttpsl: &proxyproto.Listener{\n\t\t\tListener: httpsl,\n\t\t},\n\t\thttpl: &proxyproto.Listener{\n\t\t\tListener: httpl,\n\t\t},\n\t\thttpHealthl: &proxyproto.Listener{\n\t\t\tListener: httpHealthl,\n\t\t},\n\t\tserver: &http.Server{\n\t\t\tReadTimeout: 10 * time.Second,\n\t\t\tIdleTimeout: 2 * time.Minute,\n\t\t\tErrorLog: log.New(baseLog.Writer(), \"\", 0),\n\t\t\tBaseContext: func(net.Listener) context.Context { return ctx },\n\t\t\tConnContext: func(ctx context.Context, c net.Conn) context.Context {\n\t\t\t\t// expose the underlying net.Conn of the HTTP request in flight\n\t\t\t\t// via the contextKeyConnection key. This allows us to pick out\n\t\t\t\t// the private endpoint ID from the context of the HTTP request.\n\t\t\t\treturn context.WithValue(ctx, contextKeyConnection, c)\n\t\t\t},\n\t\t},\n\t\thealthServer: &http.Server{\n\t\t\tReadTimeout: 10 * time.Second,\n\t\t\tIdleTimeout: 2 * time.Minute,\n\t\t\tErrorLog: log.New(baseLog.Writer(), \"\", 0),\n\t\t\tBaseContext: func(net.Listener) context.Context { return ctx },\n\t\t},\n\n\t\tallowList: allowList,\n\t\tm: m,\n\t}\n\n\tpanicMiddleware := middleware.Panic(baseLog)\n\n\tchiRouter := chi.NewMux()\n\tchiRouter.Use(panicMiddleware)\n\n\tchiRouter.Get(\"/healthz/ready\", http.HandlerFunc(g.checkReady))\n\tchiRouter.Connect(\"/*\", http.HandlerFunc(g.handleConnect))\n\n\tg.server.Handler = chiRouter\n\tg.healthServer.Handler = chiRouter\n\n\tg.ready.Store(true)\n\n\treturn g, nil\n}", "title": "" }, { "docid": "e2afb4b7abf776aa2a6ba2f299f14a3b", "score": "0.52557915", "text": "func (m *modelEight) NewGateway(i int) NodeRunnerInterface {\n\trgwy := m.newGatewayEight(i)\n\trgwy.rptr = rgwy // realobject\n\tbids := NewGatewayBidQueue(rgwy)\n\trgwy.bids = bids\n\treturn rgwy\n}", "title": "" }, { "docid": "2f72e8e3f93b9f31e0edaac58a44e68e", "score": "0.5193585", "text": "func (g *Gateway) Start() error {\n\terr := g.connector.Start()\n\tif err != nil {\n\t\treturn err\n\t}\n\tgo func() {\n\t\tmodel := make(map[string]interface{})\n\t\tmodel[\"name\"] = g.Name\n\t\tmodel[\"kind\"] = g.Kind\n\t\tmodel[\"mode\"] = g.Mode\n\t\tmodel[\"owner\"] = g.Account\n\t\tmodel[\"host\"] = g.Host\n\t\tmodel[\"port\"] = g.Port\n\t\tmodel[\"data\"] = g.Data\n\t\tmodel[\"action\"] = g.Action\n\n\t\tfirst := true\n\t\tfor {\n\t\t\tsensors := make([]interface{}, 0)\n\t\t\tfor _, w := range g.Things {\n\t\t\t\tsensors = append(sensors, w.thing)\n\t\t\t}\n\t\t\tmodel[\"sensors\"] = sensors\n\t\t\tjsonData, _ := json.Marshal(model)\n\n\t\t\turl := fmt.Sprintf(\"%s%s\", g.deviotServer, \"/api/v1/gateways\")\n\t\t\treq, err := http.NewRequest(\"POST\", url, bytes.NewBuffer(jsonData))\n\t\t\treq.Header.Set(\"Content-Type\", \"application/json\")\n\n\t\t\tclient := &http.Client{}\n\t\t\tresp, err := client.Do(req)\n\n\t\t\tif err != nil {\n\t\t\t\tif first || g.IsRegistered() {\n\t\t\t\t\tg.Logger.Printf(\"Failed to register gateway service %s - %v\", g.Name, err)\n\t\t\t\t}\n\t\t\t\tg.setRegistered(false)\n\t\t\t} else {\n\t\t\t\tresp.Body.Close()\n\t\t\t\tif resp.StatusCode >= 200 && resp.StatusCode < 400 {\n\t\t\t\t\tif first || !g.IsRegistered() {\n\t\t\t\t\t\tg.Logger.Printf(\"Registered gateway service to %s\", g.deviotServer)\n\t\t\t\t\t}\n\t\t\t\t\tg.setRegistered(true)\n\t\t\t\t} else {\n\t\t\t\t\tif first || g.IsRegistered() {\n\t\t\t\t\t\tg.Logger.Printf(\"Failed to register gateway service %s - %v\", g.Name, resp.Status)\n\t\t\t\t\t}\n\t\t\t\t\tg.setRegistered(false)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tfirst = false\n\t\t\ttime.Sleep(1 * time.Minute)\n\t\t}\n\t}()\n\tg.Logger.Printf(\"gateway service %s started\", g.Name)\n\treturn err\n}", "title": "" }, { "docid": "3ccf4e239d7f34ce4a056a6446151608", "score": "0.51840883", "text": "func (e *Engine) Initiate(writer http.ResponseWriter, request *http.Request) {\n\trouteURL := e.getURL()\n\n\te.limiter.Take()\n\n\tif e.LoadBalancingStrategy == LeastConnections {\n\t\tl.Lock()\n\t\te.leastConnectionMap[routeURL]++\n\t\tl.Unlock()\n\t}\n\n\te.blacklist(writer, request)\n\n\trevProxy := httputil.NewSingleHostReverseProxy(routeURL)\n\te.proxy = revProxy\n\te.setupReverseProxy(routeURL)\n\n\trevProxy.ServeHTTP(writer, request)\n\n\tif e.LoadBalancingStrategy == LeastConnections {\n\t\tl.Lock()\n\t\te.leastConnectionMap[routeURL]--\n\t\tl.Unlock()\n\t}\n}", "title": "" }, { "docid": "df5f1569453af60cd55669957118d388", "score": "0.51830804", "text": "func runGateway() {\n\tendpoint := \"localhost:9090\"\n\tctx := context.Background()\n\tctx, cancel := context.WithCancel(ctx)\n\tdefer cancel()\n\n\tmux := runtime.NewServeMux()\n\topts := []grpc.DialOption{grpc.WithInsecure()}\n\n\terr := gwpb.RegisterBookingServiceHandlerFromEndpoint(ctx, mux, endpoint, opts)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\thttp.ListenAndServe(\":8080\", mux)\n}", "title": "" }, { "docid": "52ed3ec988224829b42e50910adb9c28", "score": "0.51738787", "text": "func (b *InmemHuron) Init(state *state.State, service *service.Service) error {\n\tb.logger.Debug(\"INIT\")\n\n\tb.ethState = state\n\tb.ethService = service\n\n\trealConfig := b.config.ToRealHuronConfig()\n\trealConfig.Proxy = NewInmemProxy(state, service, service.GetSubmitCh(), b.logger)\n\n\thuron := _huron.NewHuron(realConfig)\n\n\terr := huron.Init()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tb.huron = huron\n\n\treturn nil\n}", "title": "" }, { "docid": "39f92c12184794abcdf0957b23116f14", "score": "0.51271814", "text": "func NewIngress() *IngressBuilder {\n\treturn &IngressBuilder{}\n}", "title": "" }, { "docid": "a7b216bbc7906b421739ce1d7a407153", "score": "0.50862926", "text": "func (s *Server) createGateway(cfg *gatewayCfg, url *url.URL, conn net.Conn) {\n\t// Snapshot server options.\n\topts := s.getOpts()\n\n\tc := &client{srv: s, nc: conn, typ: GATEWAY}\n\n\t// Are we creating the gateway based on the configuration\n\tsolicit := cfg != nil\n\tvar tlsRequired bool\n\tif solicit {\n\t\ttlsRequired = cfg.TLSConfig != nil\n\t} else {\n\t\ttlsRequired = opts.Gateway.TLSConfig != nil\n\t}\n\n\t// Generate INFO to send\n\ts.gateway.RLock()\n\t// Make a copy\n\tinfo := *s.gateway.info\n\tinfo.GatewayURLs = s.gateway.getURLs()\n\ts.gateway.RUnlock()\n\tb, _ := json.Marshal(&info)\n\tinfoJSON := []byte(fmt.Sprintf(InfoProto, b))\n\n\t// Perform some initialization under the client lock\n\tc.mu.Lock()\n\tc.initClient()\n\tc.gw = &gateway{}\n\tc.in.pacache = make(map[string]*perAccountCache, maxPerAccountCacheSize)\n\tif solicit {\n\t\t// This is an outbound gateway connection\n\t\tc.gw.outbound = true\n\t\tc.gw.name = cfg.Name\n\t\tc.gw.cfg = cfg\n\t\tcfg.bumpConnAttempts()\n\t\t// Since we are delaying the connect until after receiving\n\t\t// the remote's INFO protocol, save the URL we need to connect to.\n\t\tc.gw.connectURL = url\n\t\tc.gw.infoJSON = infoJSON\n\t\tc.Noticef(\"Creating outbound gateway connection to %q\", cfg.Name)\n\t} else {\n\t\t// Inbound gateway connection\n\t\tc.Noticef(\"Processing inbound gateway connection\")\n\t}\n\n\t// Check for TLS\n\tif tlsRequired {\n\t\tvar timeout float64\n\t\t// If we solicited, we will act like the client, otherwise the server.\n\t\tif solicit {\n\t\t\tc.Debugf(\"Starting TLS gateway client handshake\")\n\t\t\tcfg.RLock()\n\t\t\ttlsName := cfg.tlsName\n\t\t\ttlsConfig := cfg.TLSConfig\n\t\t\ttimeout = cfg.TLSTimeout\n\t\t\tcfg.RUnlock()\n\t\t\t// If the given url is a hostname, use this hostname for the\n\t\t\t// ServerName. If it is an IP, use the cfg's tlsName. If none\n\t\t\t// is available, resort to current IP.\n\t\t\thost := url.Hostname()\n\t\t\tif tlsName != \"\" && net.ParseIP(host) != nil {\n\t\t\t\thost = tlsName\n\t\t\t}\n\t\t\ttlsConfig.ServerName = host\n\t\t\tc.nc = tls.Client(c.nc, tlsConfig)\n\t\t} else {\n\t\t\tc.Debugf(\"Starting TLS gateway server handshake\")\n\t\t\tc.nc = tls.Server(c.nc, opts.Gateway.TLSConfig)\n\t\t\ttimeout = opts.Gateway.TLSTimeout\n\t\t}\n\n\t\tconn := c.nc.(*tls.Conn)\n\n\t\t// Setup the timeout\n\t\tttl := secondsToDuration(timeout)\n\t\ttime.AfterFunc(ttl, func() { tlsTimeout(c, conn) })\n\t\tconn.SetReadDeadline(time.Now().Add(ttl))\n\n\t\tc.mu.Unlock()\n\t\tif err := conn.Handshake(); err != nil {\n\t\t\tc.Errorf(\"TLS gateway handshake error: %v\", err)\n\t\t\tc.sendErr(\"Secure Connection - TLS Required\")\n\t\t\tc.closeConnection(TLSHandshakeError)\n\t\t\treturn\n\t\t}\n\t\t// Reset the read deadline\n\t\tconn.SetReadDeadline(time.Time{})\n\n\t\t// Re-Grab lock\n\t\tc.mu.Lock()\n\n\t\t// Verify that the connection did not go away while we released the lock.\n\t\tif c.nc == nil {\n\t\t\tc.mu.Unlock()\n\t\t\treturn\n\t\t}\n\t}\n\n\t// Do final client initialization\n\n\t// Register in temp map for now until gateway properly registered\n\t// in out or in gateways.\n\tif !s.addToTempClients(c.cid, c) {\n\t\tc.mu.Unlock()\n\t\tc.closeConnection(ServerShutdown)\n\t\treturn\n\t}\n\n\t// Only send if we accept a connection. Will send CONNECT+INFO as an\n\t// outbound only after processing peer's INFO protocol.\n\tif !solicit {\n\t\tc.sendInfo(infoJSON)\n\t}\n\n\t// Spin up the read loop.\n\ts.startGoRoutine(c.readLoop)\n\n\t// Spin up the write loop.\n\ts.startGoRoutine(c.writeLoop)\n\n\tif tlsRequired {\n\t\tc.Debugf(\"TLS handshake complete\")\n\t\tcs := c.nc.(*tls.Conn).ConnectionState()\n\t\tc.Debugf(\"TLS version %s, cipher suite %s\", tlsVersion(cs.Version), tlsCipher(cs.CipherSuite))\n\t}\n\n\t// Set the Ping timer after sending connect and info.\n\tc.setPingTimer()\n\n\tc.mu.Unlock()\n}", "title": "" }, { "docid": "e419f982b10b0a6a62909fd8511719e4", "score": "0.50669765", "text": "func createAndStartIngress(t *testing.T, inbound cloudevents.Client, decouple DecoupleSink) (h *handler, cleanup func()) {\n\tctx := context.Background()\n\th, err := NewHandler(ctx,\n\t\tWithInboundClient(inbound),\n\t\tWithDecoupleSink(decouple))\n\tif err != nil {\n\t\tt.Fatalf(\"Failed to create ingress handler: %+v\", err)\n\t}\n\tgo h.Start(ctx)\n\tcleanup = func() {\n\t\t// Any cleanup steps should go here. For now none.\n\t}\n\treturn h, cleanup\n}", "title": "" }, { "docid": "03555a5dcce9a770cce17e72d19ea4af", "score": "0.50442946", "text": "func Gateway(ctx context.Context, cli client.Client, gw *gatewayv1alpha1.Gateway) error {\n\tvar errs []error\n\n\tif _, err := objgc.Get(ctx, cli, gw.Spec.GatewayClassName); err != nil {\n\t\terrs = append(errs, fmt.Errorf(\"failed to get gatewayclass for gateway %s/%s: %w\", gw.Namespace,\n\t\t\tgw.Name, err))\n\t}\n\tif err := gatewayListeners(gw); err != nil {\n\t\terrs = append(errs, fmt.Errorf(\"failed to validate listeners for gateway %s/%s: %w\", gw.Namespace,\n\t\t\tgw.Name, err))\n\t}\n\tif err := gatewayAddresses(gw); err != nil {\n\t\terrs = append(errs, fmt.Errorf(\"failed to validate addresses for gateway %s/%s: %w\", gw.Namespace,\n\t\t\tgw.Name, err))\n\t}\n\tif len(errs) != 0 {\n\t\treturn retryable.NewMaybeRetryableAggregate(errs)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d633295465e60d65fcd148bb7cb591ec", "score": "0.50280684", "text": "func APIGatewayClient(endpoint string) *apigatewaymanagementapi.ApiGatewayManagementApi {\n\tsess := session.Must(session.NewSessionWithOptions(session.Options{\n\t\tSharedConfigState: session.SharedConfigEnable,\n\t}))\n\tconfig := aws.NewConfig().WithEndpoint(endpoint)\n\n\treturn apigatewaymanagementapi.New(sess, config)\n}", "title": "" }, { "docid": "ec57e1df20ad1b1183e57dd1358a732f", "score": "0.5025034", "text": "func (b *Backend) EnableGateway() error {\n\tb.logger.Info(\"Enabling gateway networking\")\n\tif err := b.network.EnableNetwork(context.Background(), false); err != nil {\n\t\treturn err\n\t}\n\t// Networking enabled, resume all scheduled dials\n\tprof, err := b.Profile()\n\tif err != nil {\n\t\treturn nil // No profile is fine\n\t}\n\tb.dialer.reinit(*prof.KeyRing)\n\n\tb.lock.RLock()\n\tfor _, client := range b.joined {\n\t\tclient.Resume()\n\t}\n\tb.lock.RUnlock()\n\treturn nil\n}", "title": "" }, { "docid": "546e1f4e76177e28ee93a4b90155e18c", "score": "0.49870038", "text": "func NewBaseIngressReconciler(ctx context.Context, controllerAgentName string, cmw configmap.Watcher) *BaseIngressReconciler {\n\tvirtualServiceInformer := virtualserviceinformer.Get(ctx)\n\tgatewayInformer := gatewayinformer.Get(ctx)\n\tsecretInformer := secretinformer.Get(ctx)\n\n\tbase := &BaseIngressReconciler{\n\t\tBase: reconciler.NewBase(ctx, controllerAgentName, cmw),\n\t\tVirtualServiceLister: virtualServiceInformer.Lister(),\n\t\tGatewayLister: gatewayInformer.Lister(),\n\t\tSecretLister: secretInformer.Lister(),\n\t}\n\treturn base\n}", "title": "" }, { "docid": "933945fd599524d8efee8002729910c6", "score": "0.498582", "text": "func (s *BaseVerilogParserListener) EnterGate_instantiation(ctx *Gate_instantiationContext) {}", "title": "" }, { "docid": "929590079a4023c1d2c74e6b16b6d36b", "score": "0.49835145", "text": "func (p *Provider) loadConfigurationFromGateway(ctx context.Context, client Client) *dynamic.Configuration {\n\tlogger := log.FromContext(ctx)\n\n\tgatewayClassNames := map[string]struct{}{}\n\n\tgatewayClasses, err := client.GetGatewayClasses()\n\tif err != nil {\n\t\tlogger.Errorf(\"Cannot find GatewayClasses: %v\", err)\n\t\treturn &dynamic.Configuration{\n\t\t\tUDP: &dynamic.UDPConfiguration{\n\t\t\t\tRouters: map[string]*dynamic.UDPRouter{},\n\t\t\t\tServices: map[string]*dynamic.UDPService{},\n\t\t\t},\n\t\t\tTCP: &dynamic.TCPConfiguration{\n\t\t\t\tRouters: map[string]*dynamic.TCPRouter{},\n\t\t\t\tServices: map[string]*dynamic.TCPService{},\n\t\t\t},\n\t\t\tHTTP: &dynamic.HTTPConfiguration{\n\t\t\t\tRouters: map[string]*dynamic.Router{},\n\t\t\t\tMiddlewares: map[string]*dynamic.Middleware{},\n\t\t\t\tServices: map[string]*dynamic.Service{},\n\t\t\t},\n\t\t\tTLS: &dynamic.TLSConfiguration{},\n\t\t}\n\t}\n\n\tfor _, gatewayClass := range gatewayClasses {\n\t\tif gatewayClass.Spec.ControllerName == \"traefik.io/gateway-controller\" {\n\t\t\tgatewayClassNames[gatewayClass.Name] = struct{}{}\n\n\t\t\terr := client.UpdateGatewayClassStatus(gatewayClass, metav1.Condition{\n\t\t\t\tType: string(v1alpha2.GatewayClassConditionStatusAccepted),\n\t\t\t\tStatus: metav1.ConditionTrue,\n\t\t\t\tReason: \"Handled\",\n\t\t\t\tMessage: \"Handled by Traefik controller\",\n\t\t\t\tLastTransitionTime: metav1.Now(),\n\t\t\t})\n\t\t\tif err != nil {\n\t\t\t\tlogger.Errorf(\"Failed to update %s condition: %v\", v1alpha2.GatewayClassConditionStatusAccepted, err)\n\t\t\t}\n\t\t}\n\t}\n\n\tcfgs := map[string]*dynamic.Configuration{}\n\n\t// TODO check if we can only use the default filtering mechanism\n\tfor _, gateway := range client.GetGateways() {\n\t\tctxLog := log.With(ctx, log.Str(\"gateway\", gateway.Name), log.Str(\"namespace\", gateway.Namespace))\n\t\tlogger := log.FromContext(ctxLog)\n\n\t\tif _, ok := gatewayClassNames[string(gateway.Spec.GatewayClassName)]; !ok {\n\t\t\tcontinue\n\t\t}\n\n\t\tcfg, err := p.createGatewayConf(ctxLog, client, gateway)\n\t\tif err != nil {\n\t\t\tlogger.Error(err)\n\t\t\tcontinue\n\t\t}\n\n\t\tcfgs[gateway.Name+gateway.Namespace] = cfg\n\t}\n\n\tconf := provider.Merge(ctx, cfgs)\n\n\tconf.TLS = &dynamic.TLSConfiguration{}\n\n\tfor _, cfg := range cfgs {\n\t\tif conf.TLS == nil {\n\t\t\tconf.TLS = &dynamic.TLSConfiguration{}\n\t\t}\n\n\t\tconf.TLS.Certificates = append(conf.TLS.Certificates, cfg.TLS.Certificates...)\n\n\t\tfor name, options := range cfg.TLS.Options {\n\t\t\tif conf.TLS.Options == nil {\n\t\t\t\tconf.TLS.Options = map[string]tls.Options{}\n\t\t\t}\n\n\t\t\tconf.TLS.Options[name] = options\n\t\t}\n\n\t\tfor name, store := range cfg.TLS.Stores {\n\t\t\tif conf.TLS.Stores == nil {\n\t\t\t\tconf.TLS.Stores = map[string]tls.Store{}\n\t\t\t}\n\n\t\t\tconf.TLS.Stores[name] = store\n\t\t}\n\t}\n\n\treturn conf\n}", "title": "" }, { "docid": "4e7899d4ef42956d0beb00a929e930cf", "score": "0.49772522", "text": "func LateInitializeIG(in *v1beta1.InternetGatewayParameters, ig *ec2types.InternetGateway) { // nolint:gocyclo\n\tif ig == nil {\n\t\treturn\n\t}\n\tif ig.Attachments != nil && len(ig.Attachments) > 0 {\n\t\tin.VPCID = awsclients.LateInitializeStringPtr(in.VPCID, ig.Attachments[0].VpcId)\n\t}\n\tif len(in.Tags) == 0 && len(ig.Tags) != 0 {\n\t\tin.Tags = v1beta1.BuildFromEC2Tags(ig.Tags)\n\t}\n}", "title": "" }, { "docid": "39e5a689b6f0c7d6b819818fd525bd88", "score": "0.49698326", "text": "func initNegroni(handler http.Handler) *negroni.Negroni {\n\tn := negroni.New()\n\tn.Use(negroni.NewRecovery())\n\tn.Use(negroni.NewLogger())\n\tn.Use(ContentTypeMiddleware())\n\tn.UseHandler(handler)\n\treturn n\n}", "title": "" }, { "docid": "8065f20c6d5791ed1469a2cf1171c1a9", "score": "0.4963546", "text": "func (s *Server) gossipGatewaysToInboundGateway(gwName string, c *client) {\n\tgw := s.gateway\n\tgw.RLock()\n\tdefer gw.RUnlock()\n\tfor gwCfgName, cfg := range gw.remotes {\n\t\t// Skip the gateway that we just created\n\t\tif gwCfgName == gwName {\n\t\t\tcontinue\n\t\t}\n\t\tinfo := Info{\n\t\t\tID: s.info.ID,\n\t\t\tGatewayCmd: gatewayCmdGossip,\n\t\t}\n\t\turls := cfg.getURLsAsStrings()\n\t\tif len(urls) > 0 {\n\t\t\tinfo.Gateway = gwCfgName\n\t\t\tinfo.GatewayURLs = urls\n\t\t\tb, _ := json.Marshal(&info)\n\t\t\tc.mu.Lock()\n\t\t\tc.sendProto([]byte(fmt.Sprintf(InfoProto, b)), true)\n\t\t\tc.mu.Unlock()\n\t\t}\n\t}\n}", "title": "" }, { "docid": "d5e3cbfb9f56b28aaf8cc23c06eda7a7", "score": "0.49565792", "text": "func withProxyMode(sks *nv1a1.ServerlessService) {\n\tWithProxyMode(sks)\n\tsks.Status.MarkActivatorEndpointsPopulated()\n}", "title": "" }, { "docid": "c0cb2ced55909a39e1deaffe2c9a41f5", "score": "0.49272168", "text": "func NewGatewayWithIntents(token string, intents ...Intents) (*Gateway, error) {\n\tg, err := NewGateway(token)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfor _, intent := range intents {\n\t\tg.AddIntent(intent)\n\t}\n\n\treturn g, nil\n}", "title": "" }, { "docid": "5a750a8a307e95645fa1c7defdd45197", "score": "0.49164733", "text": "func NewGateway() *Gateway {\n\trouter := fasthttprouter.New()\n\n\treturn &Gateway{\n\t\tRouter: router,\n\t\tResponseMarshaler: PrintJSON,\n\t\tResponseStreamMarshaler: PrintJSONStream,\n\t\tMarshalErrorHandler: DefaultMarshalErrorHandler,\n\t\tResponseErrorHandler: DefaultResponseErrorHandler,\n\t}\n}", "title": "" }, { "docid": "a7709d2c0c845122156f81fbc3f8b4f2", "score": "0.48925987", "text": "func (g *GCS) NewGatewayLayer(creds auth.Credentials) (minio.ObjectLayer, error) {\n\tctx := context.Background()\n\n\tvar err error\n\tif g.projectID == \"\" {\n\t\t// If project ID is not provided on command line, we figure it out\n\t\t// from the credentials.json file.\n\t\tg.projectID, err = gcsParseProjectID(os.Getenv(\"GOOGLE_APPLICATION_CREDENTIALS\"))\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\t// Initialize a GCS client.\n\t// Send user-agent in this format for Google to obtain usage insights while participating in the\n\t// Google Cloud Technology Partners (https://cloud.google.com/partners/)\n\tclient, err := storage.NewClient(ctx, option.WithUserAgent(fmt.Sprintf(\"MinIO/%s (GPN:MinIO;)\", minio.Version)))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tgcs := &gcsGateway{\n\t\tclient: client,\n\t\tprojectID: g.projectID,\n\t}\n\n\t// Start background process to cleanup old files in minio.sys.tmp\n\tgo gcs.CleanupGCSMinioSysTmp(ctx)\n\treturn gcs, nil\n}", "title": "" }, { "docid": "ca4804eefe81b2f77e0ee0b720f0d98a", "score": "0.4889042", "text": "func (_ERC20 *ERC20TransactorSession) AddGateway(_gateway common.Address) (*types.Transaction, error) {\n\treturn _ERC20.Contract.AddGateway(&_ERC20.TransactOpts, _gateway)\n}", "title": "" }, { "docid": "5ebade3115a9953deafcb1acc5a68934", "score": "0.48886204", "text": "func NewGateway(ctx context.Context, dataDir string) *Gateway {\n\tlogger := log.FromContext(ctx)\n\tgtw := &Gateway{\n\t\tctx: ctx,\n\t\tdataDir: dataDir,\n\t\tdefaultUser: \"root\",\n\t\tcommandUser: \"gateway\",\n\t\tcommandDispatcher: make(cmd.Dispatcher),\n\t}\n\tif db, err := geoip.Open(filepath.Join(dataDir, \"GeoIP2-City.mmdb\")); err == nil {\n\t\tgtw.geoIPDB = db\n\t\tlogger.Info(\"Loaded GeoIP City database\")\n\t} else if db, err := geoip.Open(filepath.Join(dataDir, \"GeoLite2-City.mmdb\")); err == nil {\n\t\tgtw.geoIPDB = db\n\t\tlogger.Info(\"Loaded GeoLite City database\")\n\t}\n\tif err := gtw.geoIPDB.AddASN(filepath.Join(dataDir, \"GeoIP2-ASN.mmdb\")); err == nil {\n\t\tlogger.Info(\"Loaded GeoIP ASN database\")\n\t} else if err := gtw.geoIPDB.AddASN(filepath.Join(dataDir, \"GeoLite2-ASN.mmdb\")); err == nil {\n\t\tlogger.Info(\"Loaded GeoLite ASN database\")\n\t}\n\treturn gtw\n}", "title": "" }, { "docid": "ac7bf9ae78147c54964586ac5ad78a8b", "score": "0.4875901", "text": "func (g *Irods) NewGatewayLayer(creds auth.Credentials) (minio.ObjectLayer, error) {\n\n\tcolPool := make(chan *gorods.Collection, irodsConPoolSize)\n\tfor i := 0; i < cap(colPool); i++ {\n\t\trodsCon, conErr := gorods.NewConnection(&gorods.ConnectionOptions{\n\t\t\tType: gorods.UserDefined,\n\n\t\t\tHost: g.host,\n\t\t\tPort: g.port,\n\t\t\tZone: g.zone,\n\n\t\t\tUsername: creds.AccessKey,\n\t\t\tPassword: creds.SecretKey,\n\t\t})\n\t\tif conErr != nil {\n\t\t\treturn nil, conErr\n\t\t}\n\n\t\tcol, err := rodsCon.Collection(gorods.CollectionOptions{\n\t\t\tPath: g.colPath,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tcolPool <- col\n\t}\n\n\treturn &irodsObjects{\n\t\tcolPool: colPool,\n\t}, nil\n}", "title": "" }, { "docid": "1a539bd34cccf4a610e3f13c48df860d", "score": "0.48584107", "text": "func NewGatewayClient(cfg IndexGatewayClientConfig, r prometheus.Registerer, logger log.Logger) (*GatewayClient, error) {\n\tlatency := prometheus.NewHistogramVec(prometheus.HistogramOpts{\n\t\tNamespace: \"loki\",\n\t\tName: \"index_gateway_request_duration_seconds\",\n\t\tHelp: \"Time (in seconds) spent serving requests when using the index gateway\",\n\t\tBuckets: instrument.DefBuckets,\n\t}, []string{\"operation\", \"status_code\"})\n\tif r != nil {\n\t\terr := r.Register(latency)\n\t\tif err != nil {\n\t\t\talreadyErr, ok := err.(prometheus.AlreadyRegisteredError)\n\t\t\tif !ok {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tlatency = alreadyErr.ExistingCollector.(*prometheus.HistogramVec)\n\t\t}\n\t}\n\n\tsgClient := &GatewayClient{\n\t\tcfg: cfg,\n\t\tstoreGatewayClientRequestDuration: latency,\n\t\tring: cfg.Ring,\n\t}\n\n\tdialOpts, err := cfg.GRPCClientConfig.DialOption(grpcclient.Instrument(sgClient.storeGatewayClientRequestDuration))\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"index gateway grpc dial option\")\n\t}\n\n\tif sgClient.cfg.Mode == indexgateway.RingMode {\n\t\tfactory := func(addr string) (ring_client.PoolClient, error) {\n\t\t\tigPool, err := NewIndexGatewayGRPCPool(addr, dialOpts)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, errors.Wrap(err, \"new index gateway grpc pool\")\n\t\t\t}\n\n\t\t\treturn igPool, nil\n\t\t}\n\n\t\tsgClient.pool = clientpool.NewPool(cfg.PoolConfig, sgClient.ring, factory, logger)\n\t} else {\n\t\tsgClient.conn, err = grpc.Dial(cfg.Address, dialOpts...)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"index gateway grpc dial\")\n\t\t}\n\n\t\tsgClient.grpcClient = logproto.NewIndexGatewayClient(sgClient.conn)\n\t}\n\n\treturn sgClient, nil\n}", "title": "" }, { "docid": "c16db29cf7d9d7548149f40fb6898549", "score": "0.48344985", "text": "func newGateway(ctx context.Context, opts ...runtime.ServeMuxOption) (http.Handler, error) {\n\tmux := runtime.NewServeMux(opts...)\n\t//dialOpts := []grpc.DialOption{grpc.WithInsecure()}\n\t//err := osopb3.RegisterSimpleManageServiceHandlerFromEndpoint(ctx, mux, \"localhost:8086\", dialOpts)\n\t//if err != nil {\n\t//\treturn nil, err\n\t//}\n\t//err = osopb3.RegisterStreamServiceHandlerFromEndpoint(ctx, mux, *abeEndpoint, dialOpts)\n\t//if err != nil {\n\t//\treturn nil, err\n\t//}\n\t//err = examplepb.RegisterABitOfEverythingServiceHandlerFromEndpoint(ctx, mux, *abeEndpoint, dialOpts)\n\t//if err != nil {\n\t//\treturn nil, err\n\t//}\n\t//err = examplepb.RegisterFlowCombinationHandlerFromEndpoint(ctx, mux, *flowEndpoint, dialOpts)\n\t//if err != nil {\n\t//\treturn nil, err\n\t//}\n\treturn mux, nil\n}", "title": "" }, { "docid": "3f577ce8a5448ad29bd3f428e2112131", "score": "0.4812589", "text": "func NewGateway() *Gateway {\n\n\treturn &Gateway{\n\t\tZFBMatchAttribute: \"NONE\",\n\t\tGatewayConnected: false,\n\t\tPersonality: \"VRSG\",\n\t}\n}", "title": "" }, { "docid": "1e1cfbebc37afce3b00b9b29cefd491e", "score": "0.48063767", "text": "func init() {\n\t// stdout and stderr are sent to AWS CloudWatch Logs\n\tlog.Printf(\"Gin cold start\")\n\tr := CreateServer()\n\tginLambda = ginadapter.New(r)\n}", "title": "" }, { "docid": "b752c46d1d45da301eb4aeac41de8944", "score": "0.48051018", "text": "func (rp *reverseProxy) init() {\n\tcfg := cmn.GCO.Get()\n\trp.cloud = &httputil.ReverseProxy{\n\t\tDirector: func(r *http.Request) {},\n\t\tTransport: cmn.NewTransport(cmn.TransportArgs{\n\t\t\tUseHTTPS: cfg.Net.HTTP.UseHTTPS,\n\t\t\tSkipVerify: cfg.Net.HTTP.SkipVerify,\n\t\t}),\n\t}\n}", "title": "" }, { "docid": "110b21174f57ac1a6e44dc0854ca407c", "score": "0.4794832", "text": "func Router() {\n\tclientMap := make(map[string]int64)\n\tvar mu sync.RWMutex\n\troutes := func(ctx *fasthttp.RequestCtx) {\n\t\treq := new(request.CacheRequest)\n\t\tpath := ctx.Path()\n\t\tcmd := string(path[1:])\n\t\tbody := ctx.PostBody()\n\t\tclientIP := ctx.RemoteIP().String()\n\t\tmu.Lock()\n\t\t_ , isIPPresent := clientMap[clientIP]\n\t\tif !isIPPresent {\n\t\t\tclientMap[clientIP] = 1\n\t\t} else {\n\t\t\tclientMap[clientIP]++\n\t\t}\n\t\tmu.Unlock()\n\t\tif err := json.Unmarshal(body, &req); err != nil {\n\t\t\tlog.Println(err)\n\t\t\tctx.Request.Header.Set(\"Content-Type\", \"application/json; charset=UTF-8\")\n\t\t\tctx.SetStatusCode(422)\n\t\t\tif err := json.NewEncoder(ctx).Encode(err); err != nil {\n\t\t\t\tpanic(err)\n\t\t\t}\n\t\t}\n\n\t\tvar res response.CacheResponse\n\t\t// Handle SysMet\n\t\tif cmd == \"getSysMetrics\" {\n\t\t\tres = systemmonitor.GetSysMetrics()\n\t\t} else if cmd == \"ping\" {\n\t\t\tres = response.NewPingResponse()\n\t\t} else if cmd == \"getActiveConnections\" {\n\t\t\tres = response.NewCountConnectionsResponse(len(clientMap))\n\t\t}else {\n\t\t\tres = store.Execute(cmd, *req)\n\t\t}\n\n\t\tctx.Response.Header.Set(\"Content-Type\", \"application/json; charset=UTF-8\")\n\t\tctx.SetStatusCode(http.StatusOK)\n\n\t\tif err := json.NewEncoder(ctx).Encode(res); err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t\tmu.Lock()\n\t\tclientMap[clientIP]--\n\t\tif clientMap[clientIP] == 0 {\n\t\t\tdelete(clientMap,clientIP)\n\t\t}\n\t\tmu.Unlock()\n\t}\n\terr := fasthttp.ListenAndServe(\":7991\", routes)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n}", "title": "" }, { "docid": "fe476d7e6845ee88a108344ff96e978e", "score": "0.47932822", "text": "func createIngressHandlers(lbc *LoadBalancerController) cache.ResourceEventHandlerFuncs {\n\treturn cache.ResourceEventHandlerFuncs{\n\t\tAddFunc: func(obj interface{}) {\n\t\t\tingress := obj.(*networking.Ingress)\n\t\t\tglog.V(3).Infof(\"Adding Ingress: %v\", ingress.Name)\n\t\t\tlbc.AddSyncQueue(obj)\n\t\t},\n\t\tDeleteFunc: func(obj interface{}) {\n\t\t\tingress, isIng := obj.(*networking.Ingress)\n\t\t\tif !isIng {\n\t\t\t\tdeletedState, ok := obj.(cache.DeletedFinalStateUnknown)\n\t\t\t\tif !ok {\n\t\t\t\t\tglog.V(3).Infof(\"Error received unexpected object: %v\", obj)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tingress, ok = deletedState.Obj.(*networking.Ingress)\n\t\t\t\tif !ok {\n\t\t\t\t\tglog.V(3).Infof(\"Error DeletedFinalStateUnknown contained non-Ingress object: %v\", deletedState.Obj)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t}\n\t\t\tglog.V(3).Infof(\"Removing Ingress: %v\", ingress.Name)\n\t\t\tlbc.AddSyncQueue(obj)\n\t\t},\n\t\tUpdateFunc: func(old, current interface{}) {\n\t\t\tc := current.(*networking.Ingress)\n\t\t\to := old.(*networking.Ingress)\n\t\t\tif hasChanges(o, c) {\n\t\t\t\tglog.V(3).Infof(\"Ingress %v changed, syncing\", c.Name)\n\t\t\t\tlbc.AddSyncQueue(c)\n\t\t\t}\n\t\t},\n\t}\n}", "title": "" }, { "docid": "f973d4fc2229c8618d03a53395e18727", "score": "0.47926688", "text": "func init() {\n\tgin.SetMode(gin.ReleaseMode)\n\tgRouter = gin.Default()\n\tgRouter.Use(globalRecover)\n\tgRouter.Use(logUrl)\n}", "title": "" }, { "docid": "54fe9a32592996d2fc7a8a8619d4a822", "score": "0.47883683", "text": "func NewGateway() *Gateway {\n\n\treturn &Gateway{\n\t\tPersonality: \"VRSG\",\n\t}\n}", "title": "" }, { "docid": "86c8fa1b5c062b302055a3d35896dc0b", "score": "0.47818384", "text": "func (configgen *ConfigGeneratorImpl) buildGatewayInboundHTTPRouteConfig(\n\tenv model.Environment,\n\tnode model.Proxy,\n\tsvcs map[model.Hostname]*model.Service,\n\tgateways map[string]bool,\n\tservers []*networking.Server,\n\trouteName string) *xdsapi.RouteConfiguration {\n\n\tgatewayHosts := make(map[model.Hostname]bool)\n\ttlsRedirect := make(map[model.Hostname]bool)\n\n\tfor _, server := range servers {\n\t\tfor _, host := range server.Hosts {\n\t\t\tgatewayHosts[model.Hostname(host)] = true\n\t\t\tif server.Tls != nil && server.Tls.HttpsRedirect {\n\t\t\t\ttlsRedirect[model.Hostname(host)] = true\n\t\t\t}\n\t\t}\n\t}\n\n\tport := int(servers[0].Port.Number)\n\t// NOTE: WE DO NOT SUPPORT two gateways on same workload binding to same virtual service\n\tvirtualServices := env.VirtualServices(gateways)\n\tvirtualHosts := make([]route.VirtualHost, 0, len(virtualServices))\n\tfor _, v := range virtualServices {\n\t\tvs := v.Spec.(*networking.VirtualService)\n\t\tmatchingHosts := pickMatchingGatewayHosts(gatewayHosts, vs.Hosts)\n\t\tif len(matchingHosts) == 0 {\n\t\t\tlog.Debugf(\"omitting virtual service %q because its hosts don't match gateways %v server %d\", v.Name, gateways, port)\n\t\t\tcontinue\n\t\t}\n\t\troutes, err := istio_route.BuildHTTPRoutesForVirtualService(v, svcs, port, nil, gateways, env.IstioConfigStore)\n\t\tif err != nil {\n\t\t\tlog.Debugf(\"omitting routes for service %v due to error: %v\", v, err)\n\t\t\tcontinue\n\t\t}\n\n\t\tfor vsvcHost, gatewayHost := range matchingHosts {\n\t\t\thost := route.VirtualHost{\n\t\t\t\tName: fmt.Sprintf(\"%s:%d\", v.Name, port),\n\t\t\t\tDomains: []string{vsvcHost},\n\t\t\t\tRoutes: routes,\n\t\t\t}\n\n\t\t\tif tlsRedirect[gatewayHost] {\n\t\t\t\thost.RequireTls = route.VirtualHost_ALL\n\t\t\t}\n\t\t\tvirtualHosts = append(virtualHosts, host)\n\t\t}\n\t}\n\n\tif len(virtualHosts) == 0 {\n\t\tlog.Debugf(\"constructed http route config for port %d with no vhosts; Setting up a default 404 vhost\", port)\n\t\tvirtualHosts = append(virtualHosts, route.VirtualHost{\n\t\t\tName: fmt.Sprintf(\"blackhole:%d\", port),\n\t\t\tDomains: []string{\"*\"},\n\t\t\tRoutes: []route.Route{\n\t\t\t\t{\n\t\t\t\t\tMatch: route.RouteMatch{\n\t\t\t\t\t\tPathSpecifier: &route.RouteMatch_Prefix{Prefix: \"/\"},\n\t\t\t\t\t},\n\t\t\t\t\tAction: &route.Route_DirectResponse{\n\t\t\t\t\t\tDirectResponse: &route.DirectResponseAction{\n\t\t\t\t\t\t\tStatus: 404,\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t}\n\tutil.SortVirtualHosts(virtualHosts)\n\n\tout := &xdsapi.RouteConfiguration{\n\t\tName: routeName,\n\t\tVirtualHosts: virtualHosts,\n\t\tValidateClusters: boolFalse,\n\t}\n\t// call plugins\n\tfor _, p := range configgen.Plugins {\n\t\tin := &plugin.InputParams{\n\t\t\tListenerProtocol: plugin.ListenerProtocolHTTP,\n\t\t\tEnv: &env,\n\t\t\tNode: &node,\n\t\t}\n\t\tp.OnOutboundRouteConfiguration(in, out)\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "6fb92d15964cdc5fc5bdbcb224d2b457", "score": "0.47811738", "text": "func InstallStandardInstances(c *gin.Context) {\n\n}", "title": "" }, { "docid": "6a1be902e803ed2b28c544afd18ec02b", "score": "0.47629276", "text": "func (oc *DefaultNetworkController) generateCacheForEgressIP() (map[string]egressIPCacheEntry, error) {\n\tegressIPCache := make(map[string]egressIPCacheEntry)\n\tegressIPs, err := oc.watchFactory.GetEgressIPs()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor _, egressIP := range egressIPs {\n\t\tegressIPCache[egressIP.Name] = egressIPCacheEntry{\n\t\t\tegressLocalPods: make(map[string]sets.Set[string]),\n\t\t\tegressRemotePods: make(map[string]sets.Set[string]),\n\t\t\tgatewayRouterIPs: sets.New[string](), // can be transit switchIPs for interconnect multizone setup\n\t\t\tegressIPs: map[string]string{},\n\t\t\tegressLocalNodes: sets.New[string](),\n\t\t}\n\t\tfor _, status := range egressIP.Status.Items {\n\t\t\tvar nextHopIP string\n\t\t\tisEgressIPv6 := utilnet.IsIPv6String(status.EgressIP)\n\t\t\t_, isLocalZoneEgressNode := oc.localZoneNodes.Load(status.Node)\n\t\t\tif isLocalZoneEgressNode {\n\t\t\t\tgatewayRouterIP, err := oc.eIPC.getGatewayRouterJoinIP(status.Node, isEgressIPv6)\n\t\t\t\tif err != nil {\n\t\t\t\t\tklog.Errorf(\"Unable to retrieve gateway IP for node: %s, protocol is IPv6: %v, err: %v\", status.Node, isEgressIPv6, err)\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tnextHopIP = gatewayRouterIP.String()\n\t\t\t\tegressIPCache[egressIP.Name].egressLocalNodes.Insert(status.Node)\n\t\t\t} else {\n\t\t\t\tnextHopIP, err = oc.eIPC.getTransitIP(status.Node, isEgressIPv6)\n\t\t\t\tif err != nil {\n\t\t\t\t\tklog.Errorf(\"Unable to fetch transit switch IP for node %s: %v\", status.Node, err)\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t}\n\t\t\tegressIPCache[egressIP.Name].gatewayRouterIPs.Insert(nextHopIP)\n\t\t\tegressIPCache[egressIP.Name].egressIPs[status.EgressIP] = status.Node\n\t\t}\n\t\tnamespaces, err := oc.watchFactory.GetNamespacesBySelector(egressIP.Spec.NamespaceSelector)\n\t\tif err != nil {\n\t\t\tklog.Errorf(\"Error building egress IP sync cache, cannot retrieve namespaces for EgressIP: %s, err: %v\", egressIP.Name, err)\n\t\t\tcontinue\n\t\t}\n\t\tfor _, namespace := range namespaces {\n\t\t\tpods, err := oc.watchFactory.GetPodsBySelector(namespace.Name, egressIP.Spec.PodSelector)\n\t\t\tif err != nil {\n\t\t\t\tklog.Errorf(\"Error building egress IP sync cache, cannot retrieve pods for namespace: %s and egress IP: %s, err: %v\", namespace.Name, egressIP.Name, err)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tfor _, pod := range pods {\n\t\t\t\tif util.PodCompleted(pod) {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tif len(egressIPCache[egressIP.Name].egressLocalNodes) == 0 && !oc.isPodScheduledinLocalZone(pod) {\n\t\t\t\t\tcontinue // don't process anything on master's that have nothing to do with the pod\n\t\t\t\t}\n\t\t\t\t// FIXME(trozet): potential race where pod is not yet added in the cache by the pod handler\n\t\t\t\tlogicalPort, err := oc.logicalPortCache.get(pod, types.DefaultNetworkName)\n\t\t\t\tif err != nil {\n\t\t\t\t\tklog.Errorf(\"Error getting logical port %s, err: %v\", util.GetLogicalPortName(pod.Namespace, pod.Name), err)\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tpodKey := getPodKey(pod)\n\t\t\t\tif oc.isPodScheduledinLocalZone(pod) {\n\t\t\t\t\t_, ok := egressIPCache[egressIP.Name].egressLocalPods[podKey]\n\t\t\t\t\tif !ok {\n\t\t\t\t\t\tegressIPCache[egressIP.Name].egressLocalPods[podKey] = sets.New[string]()\n\t\t\t\t\t}\n\t\t\t\t\tfor _, ipNet := range logicalPort.ips {\n\t\t\t\t\t\tegressIPCache[egressIP.Name].egressLocalPods[podKey].Insert(ipNet.IP.String())\n\t\t\t\t\t}\n\t\t\t\t} else if len(egressIPCache[egressIP.Name].egressLocalNodes) > 0 {\n\t\t\t\t\t// it means this controller has at least one egressNode that is in localZone but matched pod is remote\n\t\t\t\t\t_, ok := egressIPCache[egressIP.Name].egressRemotePods[podKey]\n\t\t\t\t\tif !ok {\n\t\t\t\t\t\tegressIPCache[egressIP.Name].egressRemotePods[podKey] = sets.New[string]()\n\t\t\t\t\t}\n\t\t\t\t\tfor _, ipNet := range logicalPort.ips {\n\t\t\t\t\t\tegressIPCache[egressIP.Name].egressRemotePods[podKey].Insert(ipNet.IP.String())\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\treturn egressIPCache, nil\n}", "title": "" }, { "docid": "25b21bf4e7841c166680de0220319efa", "score": "0.4762612", "text": "func (s *Server) startGateways() {\n\t// Spin up the accept loop\n\tch := make(chan struct{})\n\tgo s.gatewayAcceptLoop(ch)\n\t<-ch\n\n\t// Delay start of creation of gateways to give a chance\n\t// to the local cluster to form.\n\ts.startGoRoutine(func() {\n\t\tdefer s.grWG.Done()\n\n\t\tdur := s.getOpts().gatewaysSolicitDelay\n\t\tif dur == 0 {\n\t\t\tdur = defaultSolicitGatewaysDelay\n\t\t}\n\n\t\tselect {\n\t\tcase <-time.After(dur):\n\t\t\ts.solicitGateways()\n\t\tcase <-s.quitCh:\n\t\t\treturn\n\t\t}\n\t})\n}", "title": "" }, { "docid": "aceae7109ee1d7993448290ff36852ba", "score": "0.47621042", "text": "func NewGateway(drv driver.Driver) *Gateway {\n\treturn &Gateway{\n\t\tdriver: drv,\n\t\tconn: &gatewayConn{driver: drv},\n\t}\n}", "title": "" }, { "docid": "01c9a114fa8d5fcb3516dd522720a92e", "score": "0.47571996", "text": "func (k *IstioGateway) Ensure(ctx context.Context, id router.InstanceID, o router.EnsureBackendOpts) error {\n\tcli, err := k.getClient()\n\tif err != nil {\n\t\treturn err\n\t}\n\tnamespace, err := k.getAppNamespace(ctx, id.AppName)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdefaultTarget, err := k.getDefaultBackendTarget(o.Prefixes)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tgateway := &networking.Gateway{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: id.AppName,\n\t\t},\n\t\tSpec: apiNetworking.Gateway{\n\t\t\tServers: []*apiNetworking.Server{\n\t\t\t\t{\n\t\t\t\t\tPort: &apiNetworking.Port{\n\t\t\t\t\t\tNumber: 80,\n\t\t\t\t\t\tName: \"http2\",\n\t\t\t\t\t\tProtocol: \"HTTP2\",\n\t\t\t\t\t},\n\t\t\t\t\tHosts: []string{\"*\"},\n\t\t\t\t},\n\t\t\t},\n\t\t\tSelector: k.GatewaySelector,\n\t\t},\n\t}\n\n\tk.updateObjectMeta(&gateway.ObjectMeta, id.AppName, o.Opts)\n\n\t_, err = cli.Gateways(namespace).Create(ctx, gateway, metav1.CreateOptions{})\n\tisAlreadyExists := false\n\tif k8sErrors.IsAlreadyExists(err) {\n\t\tisAlreadyExists = true\n\t} else if err != nil {\n\t\treturn err\n\t}\n\n\texistingSvc := true\n\tvirtualSvc, err := k.getVS(ctx, cli, id)\n\n\tif err != nil && !k8sErrors.IsNotFound(err) {\n\t\treturn err\n\t}\n\n\tif k8sErrors.IsNotFound(err) {\n\t\texistingSvc = false\n\t\tvirtualSvc = &networking.VirtualService{\n\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\tName: k.vsName(id),\n\t\t\t},\n\t\t\tSpec: apiNetworking.VirtualService{\n\t\t\t\tGateways: []string{\"mesh\"},\n\t\t\t},\n\t\t}\n\t}\n\n\tk.updateObjectMeta(&virtualSvc.ObjectMeta, id.AppName, o.Opts)\n\n\twebService, err := k.getWebService(ctx, id.AppName, *defaultTarget)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tk.updateVirtualService(virtualSvc, id, webService.Name)\n\tvirtualSvc.Labels[appBaseServiceNamespaceLabel] = defaultTarget.Namespace\n\tvirtualSvc.Labels[appBaseServiceNameLabel] = defaultTarget.Service\n\n\texistingCNames := hostsFromAnnotation(virtualSvc.Annotations)\n\tcnamesToAdd, cnamesToRemove := diffCNames(existingCNames, o.CNames)\n\tfor _, cname := range cnamesToAdd {\n\t\tvsAddHost(virtualSvc, cname)\n\t}\n\tfor _, cname := range cnamesToRemove {\n\t\tvsRemoveHost(virtualSvc, cname)\n\t}\n\n\tif existingSvc {\n\t\t_, err = cli.VirtualServices(namespace).Update(ctx, virtualSvc, metav1.UpdateOptions{})\n\t} else {\n\t\t_, err = cli.VirtualServices(namespace).Create(ctx, virtualSvc, metav1.CreateOptions{})\n\t}\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif isAlreadyExists {\n\t\treturn router.ErrIngressAlreadyExists\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "bc4d5ee25e81bfde1dfa3c0ad9f87d05", "score": "0.47529358", "text": "func init() {\n\tingestion.Register(firestoreTryJobIngester, newModularTryjobProcessor)\n}", "title": "" }, { "docid": "d2fc6941b2625332cceb89a4957663af", "score": "0.47486815", "text": "func (s *serverImpl) initNegroni(handler http.Handler) *negroni.Negroni {\n\tn := negroni.New()\n\t// n.Use(negroni.NewStatic(http.Dir(\"./client\")))\n\tn.Use(negroni.NewRecovery())\n\tn.Use(negroni.NewLogger())\n\tn.Use(s.contentTypeMiddleware())\n\tn.UseHandler(handler)\n\treturn n\n}", "title": "" }, { "docid": "85549477a66b5d194b9ef31cb56ff4f2", "score": "0.47453517", "text": "func (k *KubeInfo) IstioIngressGatewayService() string {\n\treturn istioIngressGatewayServiceName\n}", "title": "" }, { "docid": "5df1ccfb27890a3fa42b7aea55162f51", "score": "0.47449893", "text": "func (n *NGINXController) syncIngress(interface{}) error {\n\tn.syncRateLimiter.Accept()\n\n\tif n.syncQueue.IsShuttingDown() {\n\t\treturn nil\n\t}\n\n\t// Sort ingress rules using the ResourceVersion field\n\tings := n.store.ListIngresses()\n\tsort.SliceStable(ings, func(i, j int) bool {\n\t\tir := ings[i].ResourceVersion\n\t\tjr := ings[j].ResourceVersion\n\t\treturn ir < jr\n\t})\n\n\tupstreams, servers := n.getBackendServers(ings)\n\tvar passUpstreams []*ingress.SSLPassthroughBackend\n\n\tfor _, server := range servers {\n\t\tif !server.SSLPassthrough {\n\t\t\tcontinue\n\t\t}\n\n\t\tfor _, loc := range server.Locations {\n\t\t\tif loc.Path != rootLocation {\n\t\t\t\tglog.Warningf(\"ignoring path %v of ssl passthrough host %v\", loc.Path, server.Hostname)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tpassUpstreams = append(passUpstreams, &ingress.SSLPassthroughBackend{\n\t\t\t\tBackend: loc.Backend,\n\t\t\t\tHostname: server.Hostname,\n\t\t\t\tService: loc.Service,\n\t\t\t\tPort: loc.Port,\n\t\t\t})\n\t\t\tbreak\n\t\t}\n\t}\n\n\tpcfg := ingress.Configuration{\n\t\tBackends: upstreams,\n\t\tServers: servers,\n\t\tTCPEndpoints: n.getStreamServices(n.cfg.TCPConfigMapName, apiv1.ProtocolTCP),\n\t\tUDPEndpoints: n.getStreamServices(n.cfg.UDPConfigMapName, apiv1.ProtocolUDP),\n\t\tPassthroughBackends: passUpstreams,\n\t}\n\n\tif !n.isForceReload() && n.runningConfig.Equal(&pcfg) {\n\t\tglog.V(3).Infof(\"skipping backend reload (no changes detected)\")\n\t\treturn nil\n\t} else if !n.isForceReload() && n.IsDynamicallyConfigurable(&pcfg) {\n\t\tglog.Warningf(\"BACKEND RECONFIGURATION: Dynamic Reload\")\n\t\terr := n.ConfigureDynamically(&pcfg)\n\t\tif err == nil {\n\t\t\tglog.Infof(\"dynamic reconfiguration succeeded, skipping reload\")\n\t\t\tn.runningConfig = &pcfg\n\t\t\treturn nil\n\t\t}\n\n\t\tglog.Warningf(\"falling back to reload, could not dynamically reconfigure: %v\", err)\n\t}\n\n\tglog.Warningf(\"BACKEND RECONFIGURATION: File config Reload\")\n\n\terr := n.OnUpdate(pcfg)\n\tif err != nil {\n\t\tincReloadErrorCount()\n\t\tglog.Errorf(\"unexpected failure restarting the backend: \\n%v\", err)\n\t\treturn err\n\t}\n\n\tglog.Infof(\"ingress backend successfully reloaded...\")\n\tincReloadCount()\n\tsetSSLExpireTime(servers)\n\n\tif n.isForceReload() {\n\t\tgo func() {\n\t\t\t// it takes time for Nginx to start listening on the port\n\t\t\ttime.Sleep(1 * time.Second)\n\t\t\terr := n.ConfigureDynamically(&pcfg)\n\t\t\tif err == nil {\n\t\t\t\tglog.Infof(\"dynamic reconfiguration succeeded\")\n\t\t\t} else {\n\t\t\t\tglog.Warningf(\"could not dynamically reconfigure: %v\", err)\n\t\t\t}\n\t\t}()\n\t}\n\n\tn.runningConfig = &pcfg\n\tn.SetForceReload(false)\n\n\treturn nil\n}", "title": "" }, { "docid": "8a2ea2eb5ea80ba6b89a0016dd9a9e64", "score": "0.47387007", "text": "func (n *NGINXController) getDefaultUpstream() *ingress.Backend {\n\tupstream := &ingress.Backend{\n\t\tName: defUpstreamName,\n\t}\n\tsvcKey := n.cfg.DefaultService\n\tsvc, err := n.store.GetService(svcKey)\n\tif err != nil {\n\t\tglog.Warningf(\"unexpected error searching the default backend %v: %v\", n.cfg.DefaultService, err)\n\t\tupstream.Endpoints = append(upstream.Endpoints, n.DefaultEndpoint())\n\t\treturn upstream\n\t}\n\n\tendps := n.getEndpoints(svc, &svc.Spec.Ports[0], apiv1.ProtocolTCP, &healthcheck.Config{})\n\tif len(endps) == 0 {\n\t\tglog.Warningf(\"service %v does not have any active endpoints\", svcKey)\n\t\tendps = []ingress.Endpoint{n.DefaultEndpoint()}\n\t}\n\n\tupstream.Service = svc\n\tupstream.Endpoints = append(upstream.Endpoints, endps...)\n\treturn upstream\n}", "title": "" }, { "docid": "2139b00d25e881bdbcf87fabbf2d5fbd", "score": "0.4736027", "text": "func (a AppModuleBasic) RegisterGRPCGatewayRoutes(_ client.Context, _ *runtime.ServeMux) {}", "title": "" }, { "docid": "1098836ff575a1e3f1c402df4b89a6c7", "score": "0.4730763", "text": "func NewGateway(c GatewayConfig, D *Daemon) *Gateway {\n\treturn &Gateway{\n\t\tConfig: c,\n\t\tdrpc: RPC{},\n\t\tvrpc: visor.RPC{},\n\t\td: D,\n\t\tv: D.Visor.v,\n\t\trequests: make(chan func(), c.BufferSize),\n\t}\n}", "title": "" }, { "docid": "aaa53be202c8d9e9f9de84ba5b8d09c2", "score": "0.47201794", "text": "func constructor(source IEndpointService) {\nsuper(source, ServiceTypes.Endpoint);\n}", "title": "" }, { "docid": "18c080a6fca6f0c748ee11845fbe78a1", "score": "0.47141165", "text": "func newGateway(ctx context.Context, opts ...runtime.ServeMuxOption) (http.Handler, error) {\n\tmux := runtime.NewServeMux(opts...)\n\n\tcreds, err := credentials.NewClientTLSFromFile(server.GetCertFile(), \"\")\n\tif err != nil {\n\t\treturn mux, fmt.Errorf(\"TLS creation failed: %v\", err)\n\t}\n\n\t// If using TLS\n\tdialOpts := []grpc.DialOption{grpc.WithTransportCredentials(creds)}\n\n\t// If not using TLS\n\t// dialOpts := []grpc.DialOption{grpc.WithInsecure()}\n\n\tif err := things.RegisterThingsHandlerFromEndpoint(ctx, mux, server.Addr, dialOpts); err != nil {\n\t\treturn nil, err\n\t}\n\treturn mux, nil\n}", "title": "" }, { "docid": "7eef4c5d844f062b21658ba8b6ae4803", "score": "0.47084117", "text": "func (instance *Subnet) InspectGateway(primary bool) (_ resources.Host, xerr fail.Error) {\n\tdefer fail.OnPanic(&xerr)\n\n\tif instance == nil || instance.IsNull() {\n\t\treturn HostNullValue(), fail.InvalidInstanceError()\n\t}\n\n\tinstance.lock.Lock()\n\tdefer instance.lock.Unlock()\n\n\treturn instance.unsafeInspectGateway(primary)\n}", "title": "" }, { "docid": "5792de670ff58ab563d53f3f8332250e", "score": "0.4701174", "text": "func (lbc *LoadBalancerController) setIngressInformer() {\n\tlog.Info(\"setting up Ingress informer\")\n\n\tingressHandler := framework.ResourceEventHandlerFuncs{\n\t\tAddFunc: func(o interface{}) {\n\t\t\ting := o.(*extensions.Ingress)\n\t\t\tif lbc.ingressFilterChecksNeeded && !ingAnnotations(ing.ObjectMeta.Annotations).filterClass(lbc.ingressFilter) {\n\t\t\t\tlog.Infof(\"ignoring add for ingress '%v' based on class annotation filtering\", ing.Name)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tlbc.recorder.Eventf(ing, api.EventTypeNormal, \"create\", fmt.Sprintf(\"%s/%s\", ing.Namespace, ing.Name))\n\t\t\tlbc.ingQueue.enqueue(o)\n\t\t\tlbc.syncQueue.enqueue(o)\n\t\t},\n\t\tDeleteFunc: func(o interface{}) {\n\t\t\ting := o.(*extensions.Ingress)\n\t\t\tif lbc.ingressFilterChecksNeeded && !ingAnnotations(ing.ObjectMeta.Annotations).filterClass(lbc.ingressFilter) {\n\t\t\t\tlog.Infof(\"ignoring delete for ingress %v based on class annotation filtering\", ing.Name)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tlbc.recorder.Eventf(ing, api.EventTypeNormal, \"delete\", fmt.Sprintf(\"%s/%s\", ing.Namespace, ing.Name))\n\t\t\tlbc.syncQueue.enqueue(o)\n\t\t},\n\t\tUpdateFunc: func(old, cur interface{}) {\n\t\t\ting := cur.(*extensions.Ingress)\n\t\t\tif lbc.ingressFilterChecksNeeded && !ingAnnotations(ing.ObjectMeta.Annotations).filterClass(lbc.ingressFilter) {\n\t\t\t\tlog.Infof(\"ignoring update for ingress %v based on class annotation filtering\", ing.Name)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tif !reflect.DeepEqual(old, cur) {\n\t\t\t\tlbc.recorder.Eventf(ing, api.EventTypeNormal, \"update\", fmt.Sprintf(\"%s/%s\", ing.Namespace, ing.Name))\n\t\t\t\tlbc.ingQueue.enqueue(cur)\n\t\t\t\tlbc.syncQueue.enqueue(cur)\n\t\t\t}\n\t\t},\n\t}\n\n\tlistFunc := func(lo api.ListOptions) (runtime.Object, error) {\n\t\tlog.V(2).Info(\"listing ingresses\")\n\t\treturn lbc.client.Extensions().Ingress(lbc.namespace).List(lo)\n\t}\n\n\twatchFunc := func(lo api.ListOptions) (watch.Interface, error) {\n\t\tlog.V(2).Info(\"watching ingresses\")\n\t\treturn lbc.client.Extensions().Ingress(lbc.namespace).Watch(lo)\n\t}\n\n\tlw := &cache.ListWatch{\n\t\tListFunc: listFunc,\n\t\tWatchFunc: watchFunc,\n\t}\n\n\tlbc.ingressStore, lbc.ingController = framework.NewInformer(lw, &extensions.Ingress{}, lbc.resyncPeriod, ingressHandler)\n}", "title": "" }, { "docid": "12ff4263a4f1d18dc54e0d08f1129b8f", "score": "0.47004732", "text": "func NewGraphBaseServiceClient(requestAdapter i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RequestAdapter, backingStore ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStoreFactory)(*GraphBaseServiceClient) {\n m := &GraphBaseServiceClient{\n BaseRequestBuilder: *i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.NewBaseRequestBuilder(requestAdapter, \"{+baseurl}\", map[string]string{}),\n }\n i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RegisterDefaultSerializer(func() i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.SerializationWriterFactory { return i25911dc319edd61cbac496af7eab5ef20b6069a42515e22ec6a9bc97bf598488.NewJsonSerializationWriterFactory() })\n i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RegisterDefaultSerializer(func() i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.SerializationWriterFactory { return i7294a22093d408fdca300f11b81a887d89c47b764af06c8b803e2323973fdb83.NewTextSerializationWriterFactory() })\n i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RegisterDefaultSerializer(func() i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.SerializationWriterFactory { return i4bcdc892e61ac17e2afc10b5e2b536b29f4fd6c1ad30f4a5a68df47495db3347.NewFormSerializationWriterFactory() })\n i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RegisterDefaultSerializer(func() i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.SerializationWriterFactory { return i56887720f41ac882814261620b1c8459c4a992a0207af547c4453dd39fabc426.NewMultipartSerializationWriterFactory() })\n i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RegisterDefaultDeserializer(func() i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.ParseNodeFactory { return i25911dc319edd61cbac496af7eab5ef20b6069a42515e22ec6a9bc97bf598488.NewJsonParseNodeFactory() })\n i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RegisterDefaultDeserializer(func() i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.ParseNodeFactory { return i7294a22093d408fdca300f11b81a887d89c47b764af06c8b803e2323973fdb83.NewTextParseNodeFactory() })\n i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RegisterDefaultDeserializer(func() i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.ParseNodeFactory { return i4bcdc892e61ac17e2afc10b5e2b536b29f4fd6c1ad30f4a5a68df47495db3347.NewFormParseNodeFactory() })\n if m.BaseRequestBuilder.RequestAdapter.GetBaseUrl() == \"\" {\n m.BaseRequestBuilder.RequestAdapter.SetBaseUrl(\"https://graph.microsoft.com/v1.0\")\n }\n m.BaseRequestBuilder.PathParameters[\"baseurl\"] = m.BaseRequestBuilder.RequestAdapter.GetBaseUrl()\n m.BaseRequestBuilder.RequestAdapter.EnableBackingStore(backingStore);\n return m\n}", "title": "" }, { "docid": "3cf9712b131e35b5885741c3b6d5e831", "score": "0.4699041", "text": "func init() {\n\tlog.Println(\"Getting config from Config Server...\")\n\n\t// Get the profile environment variable\n\tprofile, found := os.LookupEnv(\"profile\")\n\tif !found {\n\t\t// Try to get the uppercase environment variable name\n\t\tprofileUpper, foundUpper := os.LookupEnv(\"PROFILE\")\n\t\tif !foundUpper {\n\t\t\tlog.Println(\"Profile environment variable hasn´t been found. Setting profile to dev.\")\n\t\t\tprofile = \"dev\"\n\t\t} else {\n\t\t\tprofile = profileUpper\n\t\t}\n\t}\n\n\t// Build config URL\n\turl := \"http://localhost:9000/gateway-\" + strings.ToLower(profile) + \".json\"\n\n\t// Create Http client with 5s timeout\n\tvar netClient = &http.Client{\n\t\tTimeout: time.Second * 5,\n\t}\n\tresp, err := netClient.Get(url)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\tlog.Fatalln(\"Error obtaining config from ConfigServer!\")\n\t\tos.Exit(1)\n\t}\n\tdefer resp.Body.Close()\n\n\tvar endpoints endpoint\n\tjson.NewDecoder(resp.Body).Decode(&endpoints)\n\n\tgatewayMap = endpoints.Endpoints\n\n\tlog.Println(\"Config obtained!\")\n}", "title": "" }, { "docid": "a892a9b381e6486fbdc5b85d97a39e84", "score": "0.46915787", "text": "func (manager *Manager) Gateway(w http.ResponseWriter, r *http.Request) {\n\tRenderTemplate(w, r, \"gateway.html\", nil)\n\tw.WriteHeader(http.StatusOK)\n}", "title": "" }, { "docid": "5e6a92bc8b3aff4bb1880c4c18a3b5bf", "score": "0.46910948", "text": "func (_ERC20 *ERC20Transactor) AddGateway(opts *bind.TransactOpts, _gateway common.Address) (*types.Transaction, error) {\n\treturn _ERC20.contract.Transact(opts, \"addGateway\", _gateway)\n}", "title": "" }, { "docid": "f40851782d19474a5ffa195e4b8bb4cd", "score": "0.4688679", "text": "func InitRouter() *gin.Engine {\n\tfibs.InitCache()\n\trouter := gin.New()\n\trouter.Use(gin.Logger())\n\trouter.Use(gin.Recovery())\n\n\tp := ginprometheus.NewPrometheus(\"fibsrv\")\n\t// Reduce the cardinality of the path part of the URL for Promtheus\n\tp.ReqCntURLLabelMappingFn = func(c *gin.Context) string {\n\t\turl := c.Request.URL.String()\n\t\tfor _, p := range c.Params {\n\t\t\tif p.Key == \"num\" {\n\t\t\t\turl = strings.Replace(url, p.Value, \":num\", 1)\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\treturn url\n\t}\n\tp.Use(router)\n\n\t// Under 94, we get extremely fast lookups. Over the 94th number, there\n\t// is still some benefit to having precalculated the start of the sequence\n\trouter.GET(\"/api/fibonacci/:num\", func(c *gin.Context) {\n\t\tn := c.Param(\"num\")\n\t\tfNum, _ := strconv.Atoi(n)\n\t\tif fNum > 94 {\n\t\t\tans, _ := fibs.BigFib(fNum)\n\t\t\tc.String(http.StatusOK, ans.String())\n\t\t} else {\n\t\t\tans, _ := fibs.LookupFib(fNum)\n\t\t\tc.String(http.StatusOK, fmt.Sprintf(\"%d\", ans))\n\t\t}\n\t})\n\n\treturn router\n}", "title": "" }, { "docid": "dd77bb15b118d668e2117e571bbdfced", "score": "0.46817824", "text": "func (AppModuleBasic) RegisterGRPCGatewayRoutes(_ client.Context, _ *runtime.ServeMux) {}", "title": "" }, { "docid": "4d8c1684b8e181140ba33a6a7057a239", "score": "0.46795902", "text": "func (client *Client) CreateGateway(req model.GatewayRequest) (*model.Host, error) {\n\t// Ensure network exists\n\tif req.Network == nil {\n\t\tpanic(\"req.Network is nil!\")\n\t}\n\tgwname := req.Name\n\tif gwname == \"\" {\n\t\tgwname = \"gw-\" + req.Network.Name\n\t}\n\thostReq := model.HostRequest{\n\t\tImageID: req.ImageID,\n\t\tKeyPair: req.KeyPair,\n\t\tResourceName: gwname,\n\t\tTemplateID: req.TemplateID,\n\t\tNetworks: []*model.Network{req.Network},\n\t\tPublicIP: true,\n\t}\n\thost, err := client.CreateHost(hostReq)\n\tif err != nil {\n\t\tlog.Errorf(\"Error creating gateway: creating host: %+v\", err)\n\t\treturn nil, errors.Wrap(err, fmt.Sprintf(\"Error creating gateway : %s\", ProviderErrorToString(err)))\n\t}\n\n\t// delete the host when found problem starting from here\n\tdefer func() {\n\t\tif err != nil {\n\t\t\tderr := client.DeleteHost(host.ID)\n\t\t\tif derr != nil {\n\t\t\t\tlog.Errorf(\"failed to delete host '%s': %v\", host.Name, derr)\n\t\t\t}\n\t\t}\n\t}()\n\n\t// Updates Host Property propsv1.HostSizing\n\thostSizingV1 := propsv1.NewHostSizing()\n\terr = host.Properties.Get(HostProperty.SizingV1, hostSizingV1)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, fmt.Sprintf(\"Error creating gateway : %s\", ProviderErrorToString(err)))\n\t}\n\thostSizingV1.Template = req.TemplateID\n\terr = host.Properties.Set(HostProperty.SizingV1, hostSizingV1)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, fmt.Sprintf(\"Error creating gateway : %s\", ProviderErrorToString(err)))\n\t}\n\treturn host, nil\n}", "title": "" }, { "docid": "0944b6bffc18c818f9c1e854ed34885e", "score": "0.46769604", "text": "func (c AppGwIngressController) MutateAppGateway(event events.Event, appGw *n.ApplicationGateway, cbCtx *appgw.ConfigBuilderContext) error {\n\tvar err error\n\texistingConfigJSON, _ := dumpSanitizedJSON(appGw, false, to.StringPtr(\"-- Existing App Gwy Config --\"))\n\tklog.V(5).Info(\"Existing App Gateway config: \", string(existingConfigJSON))\n\n\t// Prepare k8s resources Phase //\n\t// --------------------------- //\n\tif cbCtx.EnvVariables.EnableBrownfieldDeployment {\n\t\tprohibitedTargets := c.k8sContext.ListAzureProhibitedTargets()\n\t\tif len(prohibitedTargets) > 0 {\n\t\t\tcbCtx.ProhibitedTargets = prohibitedTargets\n\t\t\tvar prohibitedTargetsList []string\n\t\t\tfor _, target := range *brownfield.GetTargetBlacklist(prohibitedTargets) {\n\t\t\t\ttargetJSON, _ := json.Marshal(target)\n\t\t\t\tprohibitedTargetsList = append(prohibitedTargetsList, string(targetJSON))\n\t\t\t}\n\t\t\tklog.V(3).Infof(\"[brownfield] Prohibited targets: %s\", strings.Join(prohibitedTargetsList, \", \"))\n\t\t} else {\n\t\t\tklog.Warning(\"Brownfield Deployment is enabled, but AGIC did not find any AzureProhibitedTarget CRDs; Disabling brownfield deployment feature.\")\n\t\t\tcbCtx.EnvVariables.EnableBrownfieldDeployment = false\n\t\t}\n\t}\n\n\tif cbCtx.EnvVariables.EnableIstioIntegration {\n\t\tistioServices := c.k8sContext.ListIstioVirtualServices()\n\t\tistioGateways := c.k8sContext.ListIstioGateways()\n\t\tif len(istioGateways) > 0 && len(istioServices) > 0 {\n\t\t\tcbCtx.IstioGateways = istioGateways\n\t\t\tcbCtx.IstioVirtualServices = istioServices\n\t\t} else {\n\t\t\tklog.Warning(\"Istio Integration is enabled, but AGIC needs Istio Gateways and Virtual Services; Disabling Istio integration.\")\n\t\t\tcbCtx.EnvVariables.EnableIstioIntegration = false\n\t\t}\n\t}\n\n\tcbCtx.IngressList = c.PruneIngress(appGw, cbCtx)\n\n\tif cbCtx.EnvVariables.EnableIstioIntegration {\n\t\tvar gatewaysInfo []string\n\t\tfor _, gateway := range cbCtx.IstioGateways {\n\t\t\tgatewaysInfo = append(gatewaysInfo, fmt.Sprintf(\"%s/%s\", gateway.Namespace, gateway.Name))\n\t\t}\n\t\tklog.V(5).Infof(\"Istio Gateways: %+v\", strings.Join(gatewaysInfo, \",\"))\n\t}\n\n\t// Generate App Gateway Phase //\n\t// -------------------------- //\n\t// Create a configbuilder based on current appgw config\n\tconfigBuilder := appgw.NewConfigBuilder(c.k8sContext, &c.appGwIdentifier, appGw, c.recorder, realClock{})\n\n\t// Run validations on the Kubernetes resources which can suggest misconfiguration.\n\tif err = configBuilder.PreBuildValidate(cbCtx); err != nil {\n\t\terrorLine := fmt.Sprint(\"ConfigBuilder PostBuildValidate returned error:\", err)\n\t\tklog.Error(errorLine)\n\t\tif c.agicPod != nil {\n\t\t\tc.recorder.Event(c.agicPod, v1.EventTypeWarning, events.ReasonValidatonError, errorLine)\n\t\t}\n\t}\n\n\tvar generatedAppGw *n.ApplicationGateway\n\t// Replace the current appgw config with the generated one\n\tif generatedAppGw, err = configBuilder.Build(cbCtx); err != nil {\n\t\terrorLine := fmt.Sprint(\"ConfigBuilder Build returned error:\", err)\n\t\tklog.Error(errorLine)\n\t\tif c.agicPod != nil {\n\t\t\tc.recorder.Event(c.agicPod, v1.EventTypeWarning, events.ReasonValidatonError, errorLine)\n\t\t}\n\t\treturn err\n\t}\n\n\t// Run post validations to report errors in the config generation.\n\tif err = configBuilder.PostBuildValidate(cbCtx); err != nil {\n\t\terrorLine := fmt.Sprint(\"ConfigBuilder PostBuildValidate returned error:\", err)\n\t\tklog.Error(errorLine)\n\t\tif c.agicPod != nil {\n\t\t\tc.recorder.Event(c.agicPod, v1.EventTypeWarning, events.ReasonValidatonError, errorLine)\n\t\t}\n\t}\n\t// -------------------------- //\n\n\t// Post Compare Phase //\n\t// ------------------ //\n\t// if this is not a reconciliation task\n\t// then compare the generated state with cached state\n\tif event.Type != events.PeriodicReconcile {\n\t\tif c.configIsSame(appGw) {\n\t\t\tklog.V(3).Info(\"cache: Config has NOT changed! No need to connect to ARM.\")\n\t\t\treturn nil\n\t\t}\n\t}\n\t// ------------------ //\n\n\t// Deployment Phase //\n\t// ---------------- //\n\n\tconfigJSON, _ := dumpSanitizedJSON(appGw, cbCtx.EnvVariables.EnableSaveConfigToFile, nil)\n\tklog.V(5).Infof(\"Generated config:\\n%s\", string(configJSON))\n\n\t// Initiate deployment\n\tklog.V(3).Info(\"BEGIN AppGateway deployment\")\n\tdefer klog.V(3).Info(\"END AppGateway deployment\")\n\terr = c.azClient.UpdateGateway(generatedAppGw)\n\tif err != nil {\n\t\t// Reset cache\n\t\tc.configCache = nil\n\t\treturn err\n\t}\n\tklog.V(1).Infof(\"Applied generated Application Gateway configuration\")\n\t// ----------------- //\n\n\t// Cache Phase //\n\t// ----------- //\n\tif err != nil {\n\t\t// Reset cache\n\t\tc.configCache = nil\n\t\treturn controllererrors.NewErrorWithInnerErrorf(\n\t\t\tcontrollererrors.ErrorDeployingAppGatewayConfig,\n\t\t\terr,\n\t\t\t\"unable to get specified AppGateway %s\", c.appGwIdentifier.AppGwName,\n\t\t)\n\t}\n\n\tklog.V(3).Info(\"cache: Updated with latest applied config.\")\n\tc.updateCache(appGw)\n\t// ----------- //\n\n\treturn nil\n}", "title": "" }, { "docid": "7d8cb1a6e4e6c10caee1c670b2453e49", "score": "0.46757174", "text": "func (s *Server) registerInboundGatewayConnection(cid uint64, gwc *client) {\n\ts.gateway.Lock()\n\ts.gateway.in[cid] = gwc\n\ts.gateway.Unlock()\n}", "title": "" }, { "docid": "093384b4505189d183c0d03d3aa99a24", "score": "0.46741185", "text": "func makeNewIngress(ingress *v1alpha1.Ingress, ingressClass string) *v1alpha1.Ingress {\n\toriginal := ingress.DeepCopy()\n\tsplits := make([]v1alpha1.IngressBackendSplit, 0, 1)\n\tsplits = append(splits, v1alpha1.IngressBackendSplit{\n\t\tIngressBackend: v1alpha1.IngressBackend{\n\t\t\tServiceName: kmeta.ChildName(ingress.Name, asyncSuffix),\n\t\t\tServiceNamespace: original.Namespace,\n\t\t\tServicePort: intstr.FromInt(80),\n\t\t},\n\t\tPercent: int(100),\n\t})\n\ttheRules := []v1alpha1.IngressRule{}\n\tfor _, rule := range original.Spec.Rules {\n\t\tnewRule := rule\n\t\tnewPaths := make([]v1alpha1.HTTPIngressPath, 0)\n\t\tif ingress.Annotations[AsyncModeAnnotationKey] == asyncAlwaysMode {\n\t\t\tfor _, path := range rule.HTTP.Paths {\n\t\t\t\tdefaultPath := path\n\t\t\t\tdefaultPath.Splits = splits\n\t\t\t\tdefaultPath.AppendHeaders = map[string]string{\n\t\t\t\t\tasyncOriginalHostHeader: network.GetServiceHostname(ingress.Name, ingress.Namespace),\n\t\t\t\t}\n\t\t\t\tdefaultPath.RewriteHost = network.GetServiceHostname(producerServiceName, system.Namespace())\n\t\t\t\tif path.Headers == nil {\n\t\t\t\t\tpath.Headers = map[string]v1alpha1.HeaderMatch{preferHeaderField: {Exact: preferSyncValue}}\n\t\t\t\t} else {\n\t\t\t\t\tpath.Headers[preferHeaderField] = v1alpha1.HeaderMatch{Exact: preferSyncValue}\n\t\t\t\t}\n\t\t\t\tnewPaths = append(newPaths, path, defaultPath)\n\t\t\t\tnewRule.HTTP.Paths = newPaths\n\t\t\t\ttheRules = append(theRules, newRule)\n\t\t\t}\n\t\t} else {\n\t\t\tnewPaths = append(newPaths, v1alpha1.HTTPIngressPath{\n\t\t\t\tHeaders: map[string]v1alpha1.HeaderMatch{preferHeaderField: {Exact: preferAsyncValue}},\n\t\t\t\tSplits: splits,\n\t\t\t\tAppendHeaders: map[string]string{\n\t\t\t\t\tasyncOriginalHostHeader: network.GetServiceHostname(ingress.Name, ingress.Namespace),\n\t\t\t\t},\n\t\t\t\tRewriteHost: network.GetServiceHostname(producerServiceName, system.Namespace()),\n\t\t\t})\n\t\t\tnewPaths = append(newPaths, newRule.HTTP.Paths...)\n\t\t\tnewRule.HTTP.Paths = newPaths\n\t\t\ttheRules = append(theRules, newRule)\n\t\t}\n\t}\n\treturn &v1alpha1.Ingress{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: original.Name + newSuffix,\n\t\t\tNamespace: original.Namespace,\n\t\t\tAnnotations: kmeta.FilterMap(kmeta.UnionMaps(map[string]string{\n\t\t\t\tnetworking.IngressClassAnnotationKey: ingressClass,\n\t\t\t}), func(key string) bool {\n\t\t\t\treturn key == corev1.LastAppliedConfigAnnotation\n\t\t\t}),\n\t\t\tLabels: original.Labels,\n\t\t\tOwnerReferences: original.OwnerReferences,\n\t\t},\n\t\tSpec: v1alpha1.IngressSpec{\n\t\t\tRules: theRules,\n\t\t},\n\t}\n}", "title": "" }, { "docid": "3841ff5d0a903a0844db8550b766f3d0", "score": "0.4657401", "text": "func init() {\n\tallocators[\"thermomech\"] = func() Model { return new(Thermomech) }\n}", "title": "" }, { "docid": "198c1b4e248ba9e1a33b594ebbb518c2", "score": "0.46558142", "text": "func LoadGateway(configuration []byte) (*Gateway, error) {\n\tgw := &Gateway{}\n\tmashed := &types.Microgateway{}\n\tgw.SchemaVersion = Version\n\tvar flogoJSON []byte\n\tkey, err := files.ChecksumContents(configuration)\n\tif err != nil {\n\t\treturn gw, err\n\t}\n\tif cache.Enabled && cache.Cache.InCache(key) {\n\t\tflogoJSON, err = cache.Cache.LoadFromCache(key)\n\t\tif err != nil {\n\t\t\treturn gw, err\n\t\t}\n\t\terr = json.Unmarshal(configuration, mashed)\n\t\tif err != nil {\n\t\t\treturn gw, err\n\t\t}\n\t\tlog.Println(\"[mashling] Post processed configuration contents found in cache\")\n\t} else {\n\t\tlog.Println(\"[mashling] Post processed configuration contents *not* found in cache, processing now...\")\n\t\terr = schema.Validate(configuration)\n\t\tif err != nil {\n\t\t\treturn gw, err\n\t\t}\n\n\t\terr = json.Unmarshal(configuration, mashed)\n\t\tif err != nil {\n\t\t\treturn gw, err\n\t\t}\n\n\t\t// Cycle through and change refs to definitions\n\t\tfor index, handler := range mashed.Gateway.EventHandlers {\n\t\t\tif handler.Reference != \"\" {\n\t\t\t\taction, ferr := LoadFlogoFlow(handler.Reference)\n\t\t\t\tif ferr != nil {\n\t\t\t\t\treturn gw, ferr\n\t\t\t\t}\n\t\t\t\thandler.Definition = action\n\t\t\t\thandler.Reference = \"\"\n\t\t\t\tmashed.Gateway.EventHandlers[index] = handler\n\t\t\t}\n\t\t}\n\t\tgerrs, perr := validateConfigurationContents(mashed)\n\t\tif len(gerrs) > 0 {\n\t\t\tgw.ErrorDetails = gerrs\n\t\t\treturn gw, errors.New(\"error validating contents of configuration\")\n\t\t}\n\t\tif perr != nil {\n\t\t\treturn gw, perr\n\t\t}\n\t\tflogoJSON, err = Translate(mashed)\n\t\tif err != nil {\n\t\t\treturn gw, err\n\t\t}\n\t\tif cache.Enabled {\n\t\t\terr = cache.Cache.WriteToCache(key, flogoJSON)\n\t\t\tif err != nil {\n\t\t\t\treturn gw, err\n\t\t\t}\n\t\t\tlog.Println(\"[mashling] Post processed configuration contents written to cache\")\n\t\t}\n\t}\n\tgw.MashlingConfig = *mashed\n\tjsonParser := json.NewDecoder(bytes.NewReader(flogoJSON))\n\tgw.FlogoApp = app.Config{}\n\terr = jsonParser.Decode(&gw.FlogoApp)\n\tif err != nil {\n\t\treturn gw, err\n\t}\n\n\tgw.FlogoEngine, err = engine.New(&gw.FlogoApp)\n\tif err != nil {\n\t\treturn gw, err\n\t}\n\treturn gw, nil\n}", "title": "" }, { "docid": "befe33f33ec4b87a157a029868d7b949", "score": "0.46554524", "text": "func (b *IngressBuilder) Build() (object *Ingress, err error) {\n\tobject = new(Ingress)\n\tobject.id = b.id\n\tobject.href = b.href\n\tobject.bitmap_ = b.bitmap_\n\tobject.dnsName = b.dnsName\n\tobject.default_ = b.default_\n\tobject.listening = b.listening\n\tif b.routeSelectors != nil {\n\t\tobject.routeSelectors = make(map[string]string)\n\t\tfor k, v := range b.routeSelectors {\n\t\t\tobject.routeSelectors[k] = v\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "2b3e567803b505fad1c92562791aaa52", "score": "0.46366632", "text": "func (_ERC20 *ERC20Session) AddGateway(_gateway common.Address) (*types.Transaction, error) {\n\treturn _ERC20.Contract.AddGateway(&_ERC20.TransactOpts, _gateway)\n}", "title": "" }, { "docid": "0793f3b3e04843a47fca035df615aacc", "score": "0.46332085", "text": "func NewGateway(device *skyWallet.Device) *Gateway {\n\treturn &Gateway{\n\t\tdevice,\n\t}\n}", "title": "" }, { "docid": "614cb1aa87e7cb8c057eb7693757b06f", "score": "0.4630581", "text": "func RegisterToGateway(conf config.ApiConfig, route *gin.Engine) {\n\troutesInfos := route.Routes()\n\tvar lstRoutes ListRoutes\n\tfor _, route := range routesInfos {\n\t\tname := strings.Split(route.Handler, \".\")\n\t\tlstRoutes.ListRoutes = append(lstRoutes.ListRoutes, RouteInfo{Path: route.Path, Method: route.Method, Name: name[len(name)-1]})\n\t}\n\tlstRoutes.AppName = conf.Name\n\tlstRoutes.Host = conf.Gateway.HostAPI\n\tlstRoutes.Port = conf.Port\n\tstrRoutes, err := json.Marshal(lstRoutes)\n\tif err != nil {\n\t\tlog.Errorf(\"Error when creating list of routes\", err.Error())\n\t}\n\tsecret, err := bcrypt.GenerateFromPassword([]byte(conf.Gateway.RegisterKey), 8)\n\tif err != nil {\n\t\tlog.Errorf(\"Error when creating secret\", err.Error())\n\t}\n\trequest, err := http.NewRequest(\"POST\", \"http://\"+conf.Gateway.Host+\":\"+conf.Gateway.Port+\"/v1/register\", bytes.NewBuffer(strRoutes))\n\trequest.Header.Set(\"Content-type\", \"application/json\")\n\trequest.Header.Set(\"Authorization\", \"Bearer \"+string(secret))\n\tclient := http.Client{Timeout: time.Duration(5 * time.Second)}\n\tresp, err := client.Do(request)\n\tif err != nil {\n\t\tlog.Errorf(\"Error when register to GW, %s\", err.Error())\n\t\treturn\n\t}\n\tif resp.StatusCode == 200 {\n\t\tlog.Info(\"registered\")\n\t} else {\n\t\tlog.Info(\"Not registered\")\n\n\t}\n}", "title": "" }, { "docid": "92b62233ff02fb79fdd66f7a0be24534", "score": "0.4623961", "text": "func (s *Server) getInboundGatewayConnections(a *[]*client) {\n\ts.gateway.RLock()\n\tfor _, gwc := range s.gateway.in {\n\t\t*a = append(*a, gwc)\n\t}\n\ts.gateway.RUnlock()\n}", "title": "" }, { "docid": "f7c6b323b6e3c8002b95cbe2f9f43615", "score": "0.46198624", "text": "func (s *Server) solicitGateways() {\n\tgw := s.gateway\n\tgw.RLock()\n\tdefer gw.RUnlock()\n\tfor _, cfg := range gw.remotes {\n\t\t// Since we delay the creation of gateways, it is\n\t\t// possible that server starts to receive inbound from\n\t\t// other clusters and in turn create outbounds. So here\n\t\t// we create only the ones that are configured.\n\t\tif !cfg.isImplicit() {\n\t\t\tcfg := cfg // Create new instance for the goroutine.\n\t\t\ts.startGoRoutine(func() {\n\t\t\t\ts.solicitGateway(cfg)\n\t\t\t\ts.grWG.Done()\n\t\t\t})\n\t\t}\n\t}\n}", "title": "" }, { "docid": "20973c96b81d10773829b33e62cc12fe", "score": "0.46170777", "text": "func InitRoute() *gin.Engine {\n\tmode := utils.EnvVar(\"GIN_MODE\")\n\tif mode == \"release\" {\n\t\tgin.SetMode(gin.ReleaseMode)\n\n\t}\n\n\trouter := gin.New()\n\trouter.Use(cors.Middleware(cors.Config{\n\t\tOrigins: \"*\",\n\t\tMethods: \"GET, PUT, POST, DELETE\",\n\t\tRequestHeaders: \"Origin, Authorization, Content-Type\",\n\t\tExposedHeaders: \"Authorization\",\n\t\tMaxAge: 50 * time.Second,\n\t\tCredentials: true,\n\t\tValidateHeaders: false,\n\t}))\n\n\trouter.Use(gin.Logger())\n\trouter.Use(gin.Recovery())\n\n\tauthRoute(router)\n\tuserRoute(router)\n\tglobalroute(router)\n\treturn router\n}", "title": "" }, { "docid": "863035f9639557293bf93ca12945da96", "score": "0.461646", "text": "func GatewayRoute_FromGatewayRouteAttributes(scope constructs.Construct, id *string, attrs *GatewayRouteAttributes) IGatewayRoute {\n\t_init_.Initialize()\n\n\tvar returns IGatewayRoute\n\n\t_jsii_.StaticInvoke(\n\t\t\"monocdk.aws_appmesh.GatewayRoute\",\n\t\t\"fromGatewayRouteAttributes\",\n\t\t[]interface{}{scope, id, attrs},\n\t\t&returns,\n\t)\n\n\treturn returns\n}", "title": "" }, { "docid": "afb5bfa867661dbae1d76ee1a1d628f9", "score": "0.4612481", "text": "func getRouter(withRouter bool) *gin.Engine {\n\tg = gin.New()\n\tif withRouter {\n\t\tloadRouters(\n\t\t\tg,\n\n\t\t\tmiddleware.Logging(),\n\t\t\tmiddleware.RequestId(),\n\t\t)\n\t}\n\treturn g\n}", "title": "" }, { "docid": "c10a27ec6df34561a4dc2d8968359e7c", "score": "0.46053243", "text": "func newAwsApiGatewayBasePathMappings(c *TrussleV1Client, namespace string) *awsApiGatewayBasePathMappings {\n\treturn &awsApiGatewayBasePathMappings{\n\t\tclient: c.RESTClient(),\n\t\tns: namespace,\n\t}\n}", "title": "" }, { "docid": "07b2b4edd2ccc7d198161bbcb8d51f07", "score": "0.45881313", "text": "func (g *jsiiProxy_GatewayRouteSpec) Bind(scope awscdk.Construct) *GatewayRouteSpecConfig {\n\tvar returns *GatewayRouteSpecConfig\n\n\t_jsii_.Invoke(\n\t\tg,\n\t\t\"bind\",\n\t\t[]interface{}{scope},\n\t\t&returns,\n\t)\n\n\treturn returns\n}", "title": "" }, { "docid": "b43d87cd5ca65e667116777d4d6cf217", "score": "0.45877448", "text": "func InitRouter() *gin.Engine {\n\n\tr := gin.New()\n\n\treturn r\n}", "title": "" }, { "docid": "d930c50273d0dcc0060cff90edf28fda", "score": "0.45841953", "text": "func (d *EgressDirector) AddRouteToGateway(routingID string,routingName string, tableName string,sourceIPs []string, destinationIP, egressGateway string) error {\n\n\t// Create Routing Table\n\terr := d.creatingRoutingTable(routingID,routingName)\n\tif err != nil {\n\t\treturn errors.New(\"Failed to create routing table \" + routingName + \" due to %\" + err.Error())\n\t}\n\n // create IPset for the set of sourceIP's\n set, err := ipset.New(tableName, \"hash:ip\", &ipset.Params{})\n if err != nil {\n return errors.New(\"Failed to create ipset with name \" + tableName + \" due to %\" + err.Error())\n }\n glog.Infof(\"Created ipset name: %s\", tableName)\n\n\tlistRule, err := d.ipt.List(\"mangle\",\"PREROUTING\")\n\tif err != nil {\n return errors.New(\"Failed to list mangle PREROUTING\" + err.Error())\n\t}\n for _, ruleSpec := range listRule {\n if strings.Contains(string(ruleSpec),tableName) {\n\t\t\truleDelSpec := d.getRuleSpec(ruleSpec)\n ip := strings.Split(ruleDelSpec[1],\"/\")[0]\n if !strings.Contains(strings.Join(sourceIPs,\" \"),ip) {\n\t\t\t\terr = d.ipt.Delete(\"mangle\", \"PREROUTING\", ruleDelSpec...)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn errors.New(\"Failed to delete rule in PREROUTING chain of mangle table to fwmark egress traffic that needs static egress IP\" + err.Error())\n\t\t\t\t}\n\t\t\t}\n }\n }\n\n listRule, err = d.ipt.List(\"nat\",bypassCNIMasquradeChainName)\n if err != nil {\n return errors.New(\"Failed to list nat \" + bypassCNIMasquradeChainName + err.Error())\n }\n for _, ruleSpec := range listRule {\n if strings.Contains(string(ruleSpec),tableName) {\n\t\t\truleDelSpec := d.getRuleSpec(ruleSpec)\n ip := strings.Split(ruleDelSpec[1],\"/\")[0]\n if !strings.Contains(strings.Join(sourceIPs,\" \"),ip) {\n\t\t\t\terr = d.ipt.Delete(\"nat\", bypassCNIMasquradeChainName, ruleDelSpec...)\n\t\t\t}\n\t\t}\n\t}\n\t\n // add IP's that need to be part of the ipset\n for _, ip := range sourceIPs {\n err = set.Add(ip, 0)\n if err != nil {\n return errors.New(\"Failed to add an ip \" + ip + \" into ipset with name \" + tableName + \" due to %\" + err.Error())\n }\n \tglog.Infof(\"Added ips %v to the ipset name: %s\", sourceIPs, tableName)\n\n\t\t// create iptables rule in mangle table PREROUTING chain to match src to ipset created and destination\n\t\t// matching destinationIP then fwmark the packets\n\t\truleSpec := []string{\"-m\", \"set\", \"--set\", tableName, \"src\", \"-s\", ip, \"-j\", \"MARK\", \"--set-mark\", routingID}\n\t\thasRule, err := d.ipt.Exists(\"mangle\", \"PREROUTING\", ruleSpec...)\n\t\tif err != nil {\n\t\t\treturn errors.New(\"Failed to verify rule exists in PREROUTING chain of mangle table to fwmark egress traffic that needs static egress IP\" + err.Error())\n\t\t}\n\t\tif !hasRule {\n\t\t\terr = d.ipt.Insert(\"mangle\", \"PREROUTING\", 1, ruleSpec...)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.New(\"Failed to add rule in PREROUTING chain of mangle table to fwmark egress traffic that needs static egress IP\" + err.Error())\n\t\t\t}\n\t\t\tglog.Infof(\"added rule in PREROUTING chain of mangle table to fwmark egress traffic that needs static egress IP\")\n\t\t}\n\t\tglog.Infof(\"iptables rule in mangle table PREROUTING chain to match src to ipset\")\n\n\t\truleSpec = []string{\"-m\", \"set\", \"--set\", tableName, \"src\", \"-s\", ip, \"-j\", \"ACCEPT\"}\n\t\thasRule, err = d.ipt.Exists(\"nat\", bypassCNIMasquradeChainName, ruleSpec...)\n\t\tif err != nil {\n\t\t\treturn errors.New(\"Failed to verify rule exists in BYPASS_CNI_MASQURADE chain of nat table to bypass the CNI masqurade\" + err.Error())\n\t\t}\n\t\tif !hasRule {\n\t\t\terr = d.ipt.Append(\"nat\", bypassCNIMasquradeChainName, ruleSpec...)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.New(\"Failed to run iptables command to add a rule to ACCEPT traffic in BYPASS_CNI_MASQURADE chain\" + err.Error())\n\t\t\t}\n\t\t}\n\t}\n\n\t// add routing entry in custom routing table to forward destinationIP to egressGateway\n\tout, err := exec.Command(\"ip\", \"route\", \"list\", \"table\", routingName).Output()\n\tif err != nil {\n\t\treturn errors.New(\"Failed to verify required default route to gateway exists. \" + err.Error())\n\t}\n \n\tif !strings.Contains(string(out), strings.Replace(destinationIP,\"0.0.0.0/0\",\"default\",1)) && strings.Contains(egressGateway,\".\") {\n\t\tglog.Infof(\"Adding routing ip route add %s via %s table %s\",destinationIP,egressGateway,routingName)\n\t\tif err = exec.Command(\"ip\", \"route\", \"add\", destinationIP, \"via\", egressGateway, \"table\", routingName).Run(); err != nil {\n\t \t\treturn errors.New(\"Failed to add route in custom route table due to: \" + err.Error())\n\t\t}\n\t}\n\n\tglog.Infof(\"added routing entry in custom routing table to forward destinationIP to egressGateway\")\n\n\treturn nil\n}", "title": "" }, { "docid": "4002b0699c9221787a1d1e3bee3efa8c", "score": "0.45691344", "text": "func getRouter(withRouter bool) *gin.Engine {\n\tg = gin.New()\n\tif withRouter {\n\t\tloadRouters(\n\t\t\t// Cores.\n\t\t\tg,\n\n\t\t\t// Middlwares.\n\t\t\tmiddleware.Logging(),\n\t\t\tmiddleware.RequestId(),\n\t\t)\n\t}\n\treturn g\n}", "title": "" }, { "docid": "6cf89f4ac9a1fa149b7386d8c6f50588", "score": "0.45593557", "text": "func serveHTTPGateway(node *core.IpfsNode, cfg *config.Config) (<-chan error, error) {\n\tlisteners, err := sockets.TakeListeners(\"io.ipfs.gateway\")\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"serveHTTPGateway: socket activation failed: %s\", err)\n\t}\n\n\tlistenerAddrs := make(map[string]bool, len(listeners))\n\tfor _, listener := range listeners {\n\t\tlistenerAddrs[string(listener.Multiaddr().Bytes())] = true\n\t}\n\n\tgatewayAddrs := cfg.Addresses.Gateway\n\tfor _, addr := range gatewayAddrs {\n\t\tgatewayMaddr, err := ma.NewMultiaddr(addr)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"serveHTTPGateway: invalid gateway address: %q (err: %s)\", addr, err)\n\t\t}\n\n\t\tif listenerAddrs[string(gatewayMaddr.Bytes())] {\n\t\t\tcontinue\n\t\t}\n\n\t\tgwLis, err := manet.Listen(gatewayMaddr)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"serveHTTPGateway: manet.Listen(%s) failed: %s\", gatewayMaddr, err)\n\t\t}\n\t\tlistenerAddrs[string(gatewayMaddr.Bytes())] = true\n\t\tlisteners = append(listeners, gwLis)\n\t}\n\n\tfor _, listener := range listeners {\n\t\tfmt.Printf(\"Gateway (%s) server listening on %s\\n\", \"readonly\", listener.Multiaddr())\n\t}\n\n\tvar opts = []corehttp.ServeOption{\n\t\tcorehttp.MetricsCollectionOption(\"gateway\"),\n\t\tcorehttp.IPNSHostnameOption(),\n\t\tcorehttp.GatewayOption(false, \"/ipfs\", \"/ipns\"),\n\t\tcorehttp.VersionOption(),\n\t\tcorehttp.CheckVersionOption(),\n\t}\n\n\tif cfg.Experimental.P2pHttpProxy {\n\t\topts = append(opts, corehttp.ProxyOption())\n\t}\n\n\tif len(cfg.Gateway.RootRedirect) > 0 {\n\t\topts = append(opts, corehttp.RedirectOption(\"\", cfg.Gateway.RootRedirect))\n\t}\n\n\terrc := make(chan error)\n\tvar wg sync.WaitGroup\n\tfor _, lis := range listeners {\n\t\twg.Add(1)\n\t\tgo func(lis manet.Listener) {\n\t\t\tdefer wg.Done()\n\t\t\terrc <- corehttp.Serve(node, manet.NetListener(lis), opts...)\n\t\t}(lis)\n\t}\n\n\tgo func() {\n\t\twg.Wait()\n\t\tclose(errc)\n\t}()\n\n\treturn errc, nil\n}", "title": "" }, { "docid": "a384229cd02dc84bff3f24ca8a00ed01", "score": "0.45581838", "text": "func (adapter Interface) SetGateWay(ip net.IP) {\n\tadapter.Set(\"gateway\", ip)\n}", "title": "" }, { "docid": "e4814126f22d5c4e86b2e4865a0ae3e6", "score": "0.4556871", "text": "func init() {\n\tprocessors[\"guerrillaredisdb\"] = func() Decorator {\n\t\treturn GuerrillaDbRedis()\n\t}\n}", "title": "" }, { "docid": "98b8330aa17f31bd097a8d76a98923d9", "score": "0.45558357", "text": "func newReconciler(mgr manager.Manager) reconcile.Reconciler {\n\treturn &ReconcileNginxIngress{client: mgr.GetClient(), scheme: mgr.GetScheme()}\n}", "title": "" }, { "docid": "2118b758520397c320690c7bee90e3d0", "score": "0.45545295", "text": "func (s *Server) gatewayAcceptLoop(ch chan struct{}) {\n\tdefer func() {\n\t\tif ch != nil {\n\t\t\tclose(ch)\n\t\t}\n\t}()\n\n\t// Snapshot server options.\n\topts := s.getOpts()\n\n\tport := opts.Gateway.Port\n\tif port == -1 {\n\t\tport = 0\n\t}\n\n\thp := net.JoinHostPort(opts.Gateway.Host, strconv.Itoa(port))\n\tl, e := net.Listen(\"tcp\", hp)\n\tif e != nil {\n\t\ts.Fatalf(\"Error listening on gateway port: %d - %v\", opts.Gateway.Port, e)\n\t\treturn\n\t}\n\ts.Noticef(\"Gateway name is %s\", s.getGatewayName())\n\ts.Noticef(\"Listening for gateways connections on %s\",\n\t\tnet.JoinHostPort(opts.Gateway.Host, strconv.Itoa(l.Addr().(*net.TCPAddr).Port)))\n\n\ts.mu.Lock()\n\ttlsReq := opts.Gateway.TLSConfig != nil\n\tauthRequired := opts.Gateway.Username != \"\"\n\tinfo := &Info{\n\t\tID: s.info.ID,\n\t\tVersion: s.info.Version,\n\t\tAuthRequired: authRequired,\n\t\tTLSRequired: tlsReq,\n\t\tTLSVerify: tlsReq,\n\t\tMaxPayload: s.info.MaxPayload,\n\t\tGateway: opts.Gateway.Name,\n\t}\n\t// If we have selected a random port...\n\tif port == 0 {\n\t\t// Write resolved port back to options.\n\t\topts.Gateway.Port = l.Addr().(*net.TCPAddr).Port\n\t}\n\t// Keep track of actual listen port. This will be needed in case of\n\t// config reload.\n\ts.gatewayActualPort = opts.Gateway.Port\n\t// Possibly override Host/Port based on Gateway.Advertise\n\tif err := s.setGatewayInfoHostPort(info, opts); err != nil {\n\t\ts.Fatalf(\"Error setting gateway INFO with Gateway.Advertise value of %s, err=%v\", opts.Gateway.Advertise, err)\n\t\tl.Close()\n\t\ts.mu.Unlock()\n\t\treturn\n\t}\n\t// Setup state that can enable shutdown\n\ts.gatewayListener = l\n\ts.mu.Unlock()\n\n\t// Let them know we are up\n\tclose(ch)\n\tch = nil\n\n\ttmpDelay := ACCEPT_MIN_SLEEP\n\n\tfor s.isRunning() {\n\t\tconn, err := l.Accept()\n\t\tif err != nil {\n\t\t\ttmpDelay = s.acceptError(\"Gateway\", err, tmpDelay)\n\t\t\tcontinue\n\t\t}\n\t\ttmpDelay = ACCEPT_MIN_SLEEP\n\t\ts.startGoRoutine(func() {\n\t\t\ts.createGateway(nil, nil, conn)\n\t\t\ts.grWG.Done()\n\t\t})\n\t}\n\ts.Debugf(\"Gateway accept loop exiting..\")\n\ts.done <- true\n}", "title": "" }, { "docid": "e58b06846185476a7fcdd4bd5a214bc0", "score": "0.45499885", "text": "func InitRouter() *gin.Engine {\n\tr := gin.New()\n\tr.Use(gin.Logger())\n\tr.Use(gin.Recovery())\n\n\tr.StaticFS(\"/export\", http.Dir(export.GetExcelFullPath()))\n\tr.StaticFS(\"/upload/images\", http.Dir(upload.GetImageFullPath()))\n\tr.StaticFS(\"/qrcode\", http.Dir(qrcode.GetQrCodeFullPath()))\n\n\tr.GET(\"/auth\", api.GetAuth)\n\tr.GET(\"/swagger/*any\", ginSwagger.WrapHandler(swaggerFiles.Handler))\n\tr.POST(\"/upload\", api.UploadImage)\n\n\tr.GET(\"/login\", v1.GetLogin)\n\tr.GET(\"/azure/callback\", v1.GetCallback)\n\n\tapiv1 := r.Group(\"/api/v1\")\n\tapiv1.Use(jwt.JWT())\n\t{\n\t\tapiv1.GET(\"/tags\", v1.GetTags)\n\t\tapiv1.POST(\"/tags\", v1.AddTag)\n\t\tapiv1.PUT(\"/tags/:id\", v1.EditTag)\n\t\tapiv1.DELETE(\"/tags/:id\", v1.DeleteTag)\n\t\tr.POST(\"/tags/export\", v1.ExportTag)\n\t\tr.POST(\"/tags/import\", v1.ImportTag)\n\n\t\tapiv1.GET(\"/articles\", v1.GetArticles)\n\t\tapiv1.GET(\"/articles/:id\", v1.GetArticle)\n\t\tapiv1.POST(\"/articles\", v1.AddArticle)\n\t\tapiv1.PUT(\"/articles/:id\", v1.EditArticle)\n\t\tapiv1.DELETE(\"/articles/:id\", v1.DeleteArticle)\n\t\tapiv1.POST(\"/articles/poster/generate\", v1.GenerateArticlePoster)\n\t}\n\n\treturn r\n}", "title": "" }, { "docid": "e650727922b61fd9aa4ad62bb6addae8", "score": "0.4546796", "text": "func irodsGatewayMain(ctx *cli.Context) {\n\t// Validate gateway arguments.\n\thost := ctx.Args().First()\n\tport, _ := strconv.Atoi(ctx.Args().Get(1))\n\tzone := ctx.Args().Get(2)\n\tcolPath := ctx.Args().Get(3)\n\n\tminio.StartGateway(ctx, &Irods{host: host, port: port, zone: zone, colPath: colPath})\n}", "title": "" }, { "docid": "68d57c084d362fafa3873cd4698bf920", "score": "0.4542812", "text": "func (c AppGwIngressController) GetAppGw() (*n.ApplicationGateway, *appgw.ConfigBuilderContext, error) {\n\t// Get current application gateway config\n\tappGw, err := c.azClient.GetGateway()\n\tc.MetricStore.IncArmAPICallCounter()\n\tif err != nil {\n\t\te := controllererrors.NewErrorWithInnerErrorf(\n\t\t\tcontrollererrors.ErrorFetchingAppGatewayConfig,\n\t\t\terr,\n\t\t\t\"unable to get specified AppGateway [%v], check AppGateway identifier\", c.appGwIdentifier.AppGwName,\n\t\t)\n\t\tklog.Errorf(e.Error())\n\t\tif c.agicPod != nil {\n\t\t\tc.recorder.Event(c.agicPod, v1.EventTypeWarning, events.ReasonUnableToFetchAppGw, e.Error())\n\t\t}\n\t\treturn nil, nil, e\n\t}\n\n\tcbCtx := &appgw.ConfigBuilderContext{\n\t\tServiceList: c.k8sContext.ListServices(),\n\t\tIngressList: c.k8sContext.ListHTTPIngresses(),\n\t\tEnvVariables: environment.GetEnv(),\n\n\t\tDefaultAddressPoolID: to.StringPtr(c.appGwIdentifier.AddressPoolID(appgw.DefaultBackendAddressPoolName)),\n\t\tDefaultHTTPSettingsID: to.StringPtr(c.appGwIdentifier.HTTPSettingsID(appgw.DefaultBackendHTTPSettingsName)),\n\n\t\tExistingPortsByNumber: make(map[appgw.Port]n.ApplicationGatewayFrontendPort),\n\t}\n\n\tfor _, port := range *appGw.FrontendPorts {\n\t\tcbCtx.ExistingPortsByNumber[appgw.Port(*port.Port)] = port\n\t}\n\n\treturn &appGw, cbCtx, nil\n}", "title": "" }, { "docid": "167f723b3b1ec0f39e91fdc9d8d02247", "score": "0.45420608", "text": "func newTransport(apiDef apiDefinition) *transport {\n\ttransportConf := config.Config.Gateway.Transport\n\ttr := &http.Transport{\n\t\tDial: func(network, addr string) (net.Conn, error) {\n\t\t\tlogger.Debug(\"dialing to upstream backend api service\")\n\t\t\taddr = strings.Split(addr, \":\")[0]\n\t\t\ttmp := strings.Split(addr, \"/\")\n\t\t\tif len(tmp) != 3 {\n\t\t\t\treturn nil, ErrInvalidService\n\t\t\t}\n\n\t\t\treturn LoadBalance(network, tmp[0], tmp[1], apiDef)\n\t\t},\n\t\tDisableKeepAlives: transportConf.DisableKeepAlives,\n\t\tDisableCompression: transportConf.DisableCompression,\n\t\tResponseHeaderTimeout: time.Duration(transportConf.ResponseHeaderTimeout) * time.Second,\n\t\tMaxIdleConns: transportConf.MaxIdleConnections,\n\t\tMaxIdleConnsPerHost: transportConf.MaxIdleConnsPerHost,\n\t\tIdleConnTimeout: time.Duration(transportConf.MaxIdleConnsPerHost) * time.Second,\n\t\tTLSHandshakeTimeout: time.Duration(transportConf.TLSHandshakeTimeout) * time.Second,\n\t\tExpectContinueTimeout: time.Duration(transportConf.ExpectContinueTimeout) * time.Second,\n\t}\n\treturn &transport{tr: tr, apiDef: apiDef}\n}", "title": "" }, { "docid": "b1d8b25b5eb609c629c752f001c8b5bf", "score": "0.45410398", "text": "func NewInstructorRoute(\n controller controller.InstructorController,\n handler infrastructure.GinRouter,\n\n) InstructorRoute {\n return InstructorRoute{\n Controller: controller,\n Handler: handler,\n }\n}", "title": "" }, { "docid": "9ba3ae5ceb793d8a733c0c1650156fe7", "score": "0.45403913", "text": "func (instance *Subnet) unsafeInspectGateway(primary bool) (_ resources.Host, xerr fail.Error) {\n\tdefer fail.OnPanic(&xerr)\n\n\tgwIdx := 0\n\tif !primary {\n\t\tgwIdx = 1\n\t}\n\tout := instance.gateways[gwIdx]\n\tif out == nil {\n\t\txerr = instance.updateCachedInformation()\n\t\tif xerr != nil {\n\t\t\treturn nil, xerr\n\t\t}\n\t}\n\tout = instance.gateways[gwIdx]\n\tif out == nil {\n\t\treturn nil, fail.NotFoundError(\"failed to find gateway\")\n\t}\n\n\treturn out, nil\n}", "title": "" }, { "docid": "b47933f6875b478f31df1003d268fd43", "score": "0.45301932", "text": "func (h *Handler) init(cfg config.Configuration) error {\n\tif cfg.Sampler != nil && cfg.Sampler.SamplingServerURL == \"\" {\n\t\tcfg.Sampler.SamplingServerURL = h.samplingServerURL\n\t}\n\tif cfg.Reporter != nil && cfg.Reporter.LocalAgentHostPort == \"\" {\n\t\tcfg.Reporter.LocalAgentHostPort = h.agentHostPort\n\t}\n\ttracer, _, err := cfg.New(common.DefaultTracerServiceName)\n\tif err != nil {\n\t\treturn err\n\t}\n\th.tracers[cfg.Sampler.Type] = tracer\n\treturn nil\n}", "title": "" }, { "docid": "f37b5dcb56799d31b75c7a72a7902a17", "score": "0.45298743", "text": "func InitRouter(engine *gin.Engine) http.Handler {\n\tindex(engine)\n\n\t// Gin Examples\n\tsomejson(engine)\n\txml(engine)\n\tyaml(engine)\n\tprotobuf(engine)\n\tformpost(engine)\n\tupload(engine)\n\tdownload(engine)\n\tauth(engine)\n\n\treturn engine\n}", "title": "" }, { "docid": "02768102f1c3e101296e5dfe3a674794", "score": "0.45222977", "text": "func (r ResourceURI) AddGateway(id string) ResourceURI {\n\tr.path = fmt.Sprintf(\"%v/gateways/%v\", r.path, id)\n\treturn r\n}", "title": "" }, { "docid": "301361c46566c0eba1daf83f7d1f275a", "score": "0.4514081", "text": "func NewAgent() *Agent {\n var network string\n if test {\n chainID = big.NewInt(3)\n if RPC == \"\" {\n RPC = \"https://ropsten.infura.io\"\n }\n network = \"ropsten test network\"\n } else {\n chainID = big.NewInt(1)\n if RPC == \"\" {\n RPC = \"https://mainnet.infura.io\"\n }\n network = \"mainnet\"\n }\n client, _ := client.Dial(RPC)\n tokens := make(map[string]Token)\n passwds := make(map[*accounts.Account]Passphrase)\n queue := make(map[string]Transaction)\n ks := keystore.NewKeyStore(\"keys/\", keystore.StandardScryptN, keystore.StandardScryptP)\n a := Agent{ks, client, tokens, passwds, queue}\n go a.gcLoop()\n log.Println(\"agent initialized on \" + network)\n time.Sleep(time.Millisecond*100)\n return &a\n}", "title": "" }, { "docid": "3b6e01923ffbb63aafa9e2ea6b375010", "score": "0.45124677", "text": "func (gm *GatewayManager) AddGateway(pg PaymentGateway) {\n\tgm.mtx.Lock()\n\tgm.paymentGateways[pg.Name] = pg.URL\n\tgm.mtx.Unlock()\n}", "title": "" }, { "docid": "e9aee25292a4b16b2ea2fd3a0b640b33", "score": "0.45099828", "text": "func init() {\n\tgo webhook.ProcessRouteStatus(controller)\n}", "title": "" } ]
bece075c6cd657ebe5ecb1f7aebf2199
New returns a new instance of Filesystem
[ { "docid": "8f32758bd652a147cf22e6901cf30d57", "score": "0.8439261", "text": "func New() Filesystem {\n\treturn localFilesystem{}\n}", "title": "" } ]
[ { "docid": "f9cdb925b281391fd981b5f89bafea2c", "score": "0.8406834", "text": "func New(path string) fs.FS {\n\treturn &filesystem{path}\n}", "title": "" }, { "docid": "124f0b748f13b7b5f5f2ce6d855bb383", "score": "0.7495978", "text": "func New(fs http.FileSystem) *FS {\n\treturn &FS{\n\t\tfs: fs,\n\t}\n}", "title": "" }, { "docid": "45e3b3d57ed54db2def5f1904c021a19", "score": "0.7474769", "text": "func New(path string) *Fs {\n\treturn &Fs{\n\t\tdir: filepath.Clean(path),\n\t\tNameFunc: NameFunc,\n\t\tHashFunc: HashFunc,\n\t}\n}", "title": "" }, { "docid": "08fcf4d8832fa54a2dac20f86861f548", "score": "0.74172384", "text": "func New(rootPath string) (Filesystem, *probe.Error) {\n\tsetFSBucketsConfigPath(filepath.Join(rootPath, \"$buckets.json\"))\n\tsetFSMultipartsConfigPath(filepath.Join(rootPath, \"$multiparts-session.json\"))\n\n\tvar err *probe.Error\n\t// load multiparts session from disk\n\tvar multiparts *Multiparts\n\tmultiparts, err = loadMultipartsSession()\n\tif err != nil {\n\t\tif os.IsNotExist(err.ToGoError()) {\n\t\t\tmultiparts = &Multiparts{\n\t\t\t\tVersion: \"1\",\n\t\t\t\tActiveSession: make(map[string]*MultipartSession),\n\t\t\t}\n\t\t\tif err := saveMultipartsSession(multiparts); err != nil {\n\t\t\t\treturn Filesystem{}, err.Trace()\n\t\t\t}\n\t\t} else {\n\t\t\treturn Filesystem{}, err.Trace()\n\t\t}\n\t}\n\tvar buckets *Buckets\n\tbuckets, err = loadBucketsMetadata()\n\tif err != nil {\n\t\tif os.IsNotExist(err.ToGoError()) {\n\t\t\tbuckets = &Buckets{\n\t\t\t\tVersion: \"1\",\n\t\t\t\tMetadata: make(map[string]*BucketMetadata),\n\t\t\t}\n\t\t\tif err := saveBucketsMetadata(buckets); err != nil {\n\t\t\t\treturn Filesystem{}, err.Trace()\n\t\t\t}\n\t\t} else {\n\t\t\treturn Filesystem{}, err.Trace()\n\t\t}\n\t}\n\tfs := Filesystem{lock: new(sync.Mutex)}\n\tfs.path = rootPath\n\tfs.multiparts = multiparts\n\tfs.buckets = buckets\n\t/// Defaults\n\n\t// maximum buckets to be listed from list buckets.\n\tfs.maxBuckets = 1000\n\t// minium free disk required for i/o operations to succeed.\n\tfs.minFreeDisk = 10\n\n\t// Start list goroutine.\n\tif err = fs.listObjectsService(); err != nil {\n\t\treturn Filesystem{}, err.Trace(rootPath)\n\t}\n\t// Return here.\n\treturn fs, nil\n}", "title": "" }, { "docid": "73fded1cb0dadab9a88071874f4002b3", "score": "0.7381636", "text": "func New(fs fs.FS) *FS {\n\treturn &FS{\n\t\tfs: fs,\n\t\thash: make(map[string]string),\n\t\tbase: make(map[string]string),\n\t}\n}", "title": "" }, { "docid": "8db24994cda43111f990f2cb6743e654", "score": "0.72990185", "text": "func NewFilesystem(params FilesystemParams) *Filesystem {\n\tvar fs = afero.NewMemMapFs()\n\n\treturn &Filesystem{\n\t\troot: params.root,\n\t\twebRoot: params.webRoot,\n\t\tlogger: params.logger,\n\t\tfs: &afero.Afero{Fs: fs},\n\t}\n}", "title": "" }, { "docid": "80b0d925e972d762b4b54ed788cce9a9", "score": "0.7277648", "text": "func New(ctx context.Context, opts *Options) (storage.Storage, error) {\n\tvar err error\n\n\tif _, err = os.Stat(opts.Path); err != nil {\n\t\treturn nil, fmt.Errorf(\"cannot access storage path: %v\", err)\n\t}\n\n\tr := &fsStorage{\n\t\tOptions: *opts,\n\t}\n\n\treturn r, nil\n}", "title": "" }, { "docid": "9d0484b3ea3e29162dcc94f713bdd5d4", "score": "0.7165604", "text": "func newFS(diskPath string) (ObjectAPI, *probe.Error) {\n\tfs := &Filesystem{\n\t\trwLock: &sync.RWMutex{},\n\t}\n\tfs.diskPath = diskPath\n\n\t/// Defaults\n\t// Minium free disk required for i/o operations to succeed.\n\tfs.minFreeDisk = 5\n\n\t// Initialize list object map.\n\tfs.listObjectMap = make(map[listObjectParams][]*treeWalker)\n\tfs.listObjectMapMutex = &sync.Mutex{}\n\n\t// Initialize list multipart map.\n\tfs.listMultipartObjectMap = make(map[listMultipartObjectParams][]<-chan multipartObjectInfo)\n\tfs.listMultipartObjectMapMutex = &sync.Mutex{}\n\n\t// Return here.\n\treturn fs, nil\n}", "title": "" }, { "docid": "7bbd01e9b45d11ad646146c3b4acb178", "score": "0.71238786", "text": "func New(iostater ...ios.IOStater) {\n\tmfs = &MountedFS{fsIDs: make(map[cos.FsID]string, 10), checkFsID: true}\n\tif len(iostater) > 0 {\n\t\tmfs.ios = iostater[0]\n\t} else {\n\t\tmfs.ios = ios.NewIostatContext()\n\t}\n}", "title": "" }, { "docid": "104ba849210c680ef1beb8e8ce5dc8cc", "score": "0.70121014", "text": "func NewFS(args Args) *FS {\n\treturn &FS{\n\t\tCryptFS: cryptfs.NewCryptFS(args.Masterkey, args.OpenSSL, args.PlaintextNames, args.GCMIV128),\n\t\tFileSystem: pathfs.NewLoopbackFileSystem(args.Cipherdir),\n\t\targs: args,\n\t}\n}", "title": "" }, { "docid": "ab8f1c6f096886283811453e4825c3f9", "score": "0.6999913", "text": "func NewFilesystem() afero.Fs {\n\treturn afero.NewOsFs()\n}", "title": "" }, { "docid": "1d1e153bb49b80188f46a554d57679cf", "score": "0.69516736", "text": "func New(driver Driver, opts *Options) Driver {\n\tif opts.Timeout < minInt {\n\t\tlog.Panicf(\"non-positive Timeout\")\n\t}\n\n\tif opts.MaxConn < 0 {\n\t\tlog.Panicf(\"non-positive MaxConn\")\n\t}\n\n\treturn &fileSystem{\n\t\tdriver: driver,\n\t\topts: opts,\n\t\tdone: make(chan struct{}),\n\t\tqueue: make(chan struct{}, opts.MaxConn),\n\t}\n}", "title": "" }, { "docid": "0b593d1cce4b7dd040684fc4a6a47220", "score": "0.6950914", "text": "func New(root string) (*FileSystem, error) {\n\tarchivedDir := filepath.Join(root, \"archived\")\n\n\tif _, err := os.Stat(root); os.IsNotExist(err) {\n\t\terr := os.Mkdir(root, 0755)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\terr = os.Mkdir(archivedDir, 0755)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn &FileSystem{root: root, archivedDir: archivedDir}, nil\n}", "title": "" }, { "docid": "aeceef79598781bb9d452f218bd1eaee", "score": "0.69123405", "text": "func NewFileSystem() *FileSystem {\n\treturn &FileSystem{}\n}", "title": "" }, { "docid": "aeceef79598781bb9d452f218bd1eaee", "score": "0.69123405", "text": "func NewFileSystem() *FileSystem {\n\treturn &FileSystem{}\n}", "title": "" }, { "docid": "c1d5be2ee4fddfe7d32fb74a4a9d74be", "score": "0.6871741", "text": "func New(base http.FileSystem) http.FileSystem {\n\tnfs := &NoListFileSystem{\n\t\tbase: base,\n\t}\n\treturn nfs\n}", "title": "" }, { "docid": "0d7ca328a468caf313250da2f8684666", "score": "0.68059695", "text": "func New(ctx context.Context, opts *Options) (blob.Storage, error) {\n\tvar err error\n\n\tif _, err = os.Stat(opts.Path); err != nil {\n\t\treturn nil, errors.Wrap(err, \"cannot access storage path\")\n\t}\n\n\treturn &fsStorage{\n\t\tsharded.Storage{\n\t\t\tImpl: &fsImpl{Options: *opts},\n\t\t\tRootPath: opts.Path,\n\t\t\tSuffix: fsStorageChunkSuffix,\n\t\t\tShards: opts.shards(),\n\t\t},\n\t}, nil\n}", "title": "" }, { "docid": "76b48e4f74c5c4f9a3d69ee42ec28535", "score": "0.67996824", "text": "func NewFileSystem(ipfs *core.IpfsNode, sk ci.PrivKey, ipfspath string) (*FileSystem, error) {\n\troot, err := CreateRoot(ipfs, []ci.PrivKey{sk}, ipfspath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &FileSystem{Ipfs: ipfs, RootNode: root}, nil\n}", "title": "" }, { "docid": "2c6d729601ea5c7b77c16f69593b2bc9", "score": "0.67633355", "text": "func New(fs afero.Fs, opts ...Option) storage.Store {\n\tif fs == nil {\n\t\tfs = afero.NewBasePathFs(afero.NewOsFs(), filepath.Join(\".datamon\", \"objects\"))\n\t}\n\tlocal := &localFS{\n\t\tfs: fs,\n\t\tglob: make(map[string][]string),\n\t\tretry: true,\n\t}\n\n\tif local.l == nil {\n\t\tlocal.l, _ = dlogger.GetLogger(\"info\")\n\t}\n\n\tfor _, apply := range opts {\n\t\tapply(local)\n\t}\n\treturn local\n}", "title": "" }, { "docid": "02864786098885bf283f8543476b9065", "score": "0.6756901", "text": "func New(num int, allowSharedDisksAndNoDisks bool) {\n\tif allowSharedDisksAndNoDisks {\n\t\tnlog.Warningln(\"allowed: (I) disk sharing by multiple mountpaths and (II) mountpaths with no disks\")\n\t}\n\tmfs = &MountedFS{fsIDs: make(map[cos.FsID]string, 10), allowSharedDisksAndNoDisks: allowSharedDisksAndNoDisks}\n\tmfs.ios = ios.New(num)\n}", "title": "" }, { "docid": "087303e0f7bab7aba527976c025d1117", "score": "0.67499626", "text": "func NewFs(name, root string, m configmap.Mapper) (fs.Fs, error) {\n if titre_fonction == true{\n fmt.Println(\"Using the newfs function \")\n }\n\n ctx := context.Background()\n\n\t// Parse config into Options struct\n\topt := new(Options)\n\terr := configstruct.Set(m, opt)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n if opt.Path_xroot == \"\" {\n\t\topt.Path_xroot = \"root\"\n\t}\n\n if opt.Port == \"\" {\n\t\topt.Port = \"1094\"\n\t}\n\n\tif opt.User == \"\" {\n\t\topt.User = \"localhost\"\n\t}\n\n if opt.Path_to_file == \"\" {\n\t\topt.Path_to_file = \"/\"\n\t}\n\n url := opt.Path_xroot + \"://\" + opt.User + \":\" + opt.Port + \"/\" + opt.Path_to_file +\"/\" + root\n\n f := &Fs{\n name: name,\n root: root,\n opt: *opt,\n //m: m,\n url: url,\n //pacer: fs.NewPacer(pacer.NewDefault(pacer.MinSleep(minSleep), pacer.MaxSleep(maxSleep), pacer.DecayConstant(decayConstant))),\n }\n\n\n\tf.features = (&fs.Features{\n CanHaveEmptyDirectories: true,\n }).Fill(f)\n\n cli,path,err := f.xrdremote(url, ctx)\n if err != nil {\n return nil, errors.Wrap(err, \"NewFs\")\n }\n defer cli.Close()\n\n\n if root != \"\" {\n\t\t// Check to see if the root actually an existing file\n\t\tremote := filepath.Base(path)\n\t\tf.root = filepath.Dir(path)\n\t\tif f.root == \".\" {\n\t\t\tf.root = \"\"\n\t\t}\n\t\t_, err := f.NewObject(ctx, remote)\n\t\tif err != nil {\n\t\t\tif err == fs.ErrorObjectNotFound || errors.Cause(err) == fs.ErrorNotAFile {\n\t\t\t\t// File doesn't exist so return old f\n\n\t\t\t\tf.root = path\n\t\t\t\treturn f, nil\n\t\t\t}\n\t\t\treturn nil, err\n\t\t}\n\t\t// return an error with an fs which points to the parent\n\t\treturn f, fs.ErrorIsFile\n\t}\n return f, nil\n}", "title": "" }, { "docid": "476cb4d5bc6e53c94a8c369ee0cc0f6b", "score": "0.67371076", "text": "func NewFilesystem(vfsObj *vfs.VirtualFilesystem) (*vfs.Filesystem, error) {\n\tdevMinor, err := vfsObj.GetAnonBlockDevMinor()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfs := &filesystem{\n\t\tdevMinor: devMinor,\n\t}\n\tfs.Filesystem.VFSFilesystem().Init(vfsObj, filesystemType{}, fs)\n\treturn fs.Filesystem.VFSFilesystem(), nil\n}", "title": "" }, { "docid": "63d609a489bc9d5f17c97d4ed2b5aa49", "score": "0.6715784", "text": "func New(basepath string, logger log.Factory) (*FileCache, error) {\n\n\tif basepath == \"\" {\n\t\treturn nil, fmt.Errorf(\"basepath must not be empty\")\n\t}\n\tfc := &FileCache{\n\t\tBasepath: basepath,\n\t\tmutex: &sync.Mutex{},\n\t\tlog: logger,\n\t}\n\n\tif err := os.MkdirAll(basepath, os.ModePerm); err != nil {\n\t\treturn nil, err\n\t}\n\tfmt.Printf(\"New Filecache initialized in %s\\n\", basepath)\n\treturn fc, nil\n\n}", "title": "" }, { "docid": "49e8728e9512a2835953c7730e4da4e0", "score": "0.6663741", "text": "func New(fs billy.Filesystem, base string) billy.Filesystem {\n\treturn &subdirFs{fs, base}\n}", "title": "" }, { "docid": "cceab4ea212cd99c36eace6d79cefa1c", "score": "0.660587", "text": "func New() (*meta.Set, error) {\n\tsingleton.once.Do(func() {\n\t\tsingleton.set, singleton.err = NewFS(files)\n\t})\n\treturn singleton.set, singleton.err\n}", "title": "" }, { "docid": "ea11106049526179bb3af3ce26a49103", "score": "0.65989333", "text": "func New(path string, bus message.Bus, silent, ttl bool) *File {\n\treturn &File{\n\t\tPath: path,\n\t\tBus: bus,\n\t\tSilent: silent,\n\t\tTTL: ttl,\n\t}\n}", "title": "" }, { "docid": "e961926d9032c182a7db944011e4cbad", "score": "0.6591287", "text": "func NewFS(reads []string, writes []string) AltFS {\n\tif reads == nil {\n\t\treads = make([]string, 0)\n\t}\n\n\tif writes == nil {\n\t\twrites = make([]string, 0)\n\t}\n\n\treturn AltFS{reads, writes}\n}", "title": "" }, { "docid": "067eab8537410e7f5ff49f970f91e81e", "score": "0.6583776", "text": "func newFSStorage(dataPath string) (FSStorage, error) {\n\tstorage := FSStorage{\n\t\tdataPath: dataPath,\n\t}\n\tif _, err := os.Stat(storage.dataPath); os.IsNotExist(err) {\n\t\terr = os.MkdirAll(storage.dataPath, 0777)\n\t\tif err != nil {\n\t\t\tlog.Log().Error.Println(err)\n\t\t\treturn FSStorage{}, err\n\t\t}\n\t}\n\treturn storage, nil\n}", "title": "" }, { "docid": "46cafc66eba1498b0e8eda73746081d6", "score": "0.65830576", "text": "func NewFileSystem() *FileSystem {\n\treturn &FileSystem{options: NewOptions()}\n}", "title": "" }, { "docid": "c4cafaa188b2587c8a13c7c3e878e58c", "score": "0.6575061", "text": "func NewFs(ctx context.Context, name, root string, m configmap.Mapper) (fs.Fs, error) {\n\t// Parse config into Options struct\n\topt := new(Options)\n\terr := configstruct.Set(m, opt)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\troot = strings.Trim(root, \"/\")\n\n\tf := &Fs{\n\t\tname: name,\n\t\topt: *opt,\n\t\tctx: ctx,\n\t\troot: root,\n\t}\n\tf.features = (&fs.Features{\n\t\tCaseInsensitive: opt.CaseInsensitive,\n\t\tCanHaveEmptyDirectories: true,\n\t\tBucketBased: true,\n\t}).Fill(ctx, f)\n\n\tf.pacer = fs.NewPacer(ctx, pacer.NewDefault(pacer.MinSleep(minSleep), pacer.MaxSleep(maxSleep), pacer.DecayConstant(decayConstant)))\n\t// set the pool drainer timer going\n\tif opt.IdleTimeout > 0 {\n\t\tf.drain = time.AfterFunc(time.Duration(opt.IdleTimeout), func() { _ = f.drainPool(ctx) })\n\t}\n\n\t// test if the root exists as a file\n\tshare, dir := f.split(\"\")\n\tif share == \"\" || dir == \"\" {\n\t\treturn f, nil\n\t}\n\tcn, err := f.getConnection(ctx, share)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tstat, err := cn.smbShare.Stat(f.toSambaPath(dir))\n\tf.putConnection(&cn)\n\tif err != nil {\n\t\t// ignore stat error here\n\t\treturn f, nil\n\t}\n\tif !stat.IsDir() {\n\t\tf.root, err = path.Dir(root), fs.ErrorIsFile\n\t}\n\tfs.Debugf(f, \"Using root directory %q\", f.root)\n\treturn f, err\n}", "title": "" }, { "docid": "d0ca935bd6a97264e29eac3ca8d21217", "score": "0.6537397", "text": "func New(opts ...Option) (*MemFS, error) {\n\tma := &memAttrs{\n\t\tidm: dummyidm.NotImplementedIdm,\n\t\tfeature: avfs.FeatBasicFs |\n\t\t\tavfs.FeatChroot |\n\t\t\tavfs.FeatHardlink |\n\t\t\tavfs.FeatSymlink,\n\t\tumask: int32(vfsutils.UMask.Get()),\n\t}\n\n\tvfs := &MemFS{\n\t\trootNode: &dirNode{\n\t\t\tbaseNode: baseNode{\n\t\t\t\tmtime: time.Now().UnixNano(),\n\t\t\t\tmode: os.ModeDir | 0o755,\n\t\t\t\tuid: 0,\n\t\t\t\tgid: 0,\n\t\t\t},\n\t\t},\n\t\tmemAttrs: ma,\n\t\tuser: dummyidm.NotImplementedUser,\n\t\tcurDir: string(avfs.PathSeparator),\n\t}\n\n\tfor _, opt := range opts {\n\t\terr := opt(vfs)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tif !vfs.HasFeature(avfs.FeatMainDirs) {\n\t\treturn vfs, nil\n\t}\n\n\tum := ma.umask\n\tma.umask = 0\n\n\tu := vfs.user\n\tif !u.IsRoot() {\n\t\tvfs.user = dummyidm.RootUser\n\t}\n\n\terr := vfsutils.CreateBaseDirs(vfs, \"\")\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tvfs.user = u\n\tvfs.curDir = avfs.RootDir\n\n\tma.umask = um\n\n\treturn vfs, nil\n}", "title": "" }, { "docid": "d5315274bef7c5b83d08afce51dd9296", "score": "0.65313756", "text": "func New(path string, opts ...Option) (*File, error) {\n\tf := newFile(path, opts)\n\n\tif err := f.mkdir(); err != nil {\n\t\treturn nil, err\n\t}\n\n\tif err := f.openNewFile(); err != nil {\n\t\treturn nil, err\n\t}\n\n\tgo f.runCleanTask()\n\treturn f, nil\n}", "title": "" }, { "docid": "b31223aa64877b6b2029dfadcd5472c5", "score": "0.6529523", "text": "func NewFs(ctx context.Context, name, root string, m configmap.Mapper) (fs.Fs, error) {\n\t// pacer is not used in NewFs()\n\t_mapper = m\n\n\t// Parse config into Options struct\n\topt := new(Options)\n\terr := configstruct.Set(m, opt)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif opt.Password != \"\" {\n\t\tvar err error\n\t\topt.Password, err = obscure.Reveal(opt.Password)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"couldn't decrypt password: %w\", err)\n\t\t}\n\t}\n\n\tci := fs.GetConfig(ctx)\n\n\troot = strings.Trim(root, \"/\")\n\n\tf := &Fs{\n\t\tname: name,\n\t\troot: root,\n\t\topt: *opt,\n\t\tci: ci,\n\t\tpacer: fs.NewPacer(ctx, pacer.NewDefault(pacer.MinSleep(minSleep), pacer.MaxSleep(maxSleep), pacer.DecayConstant(decayConstant))),\n\t}\n\n\tf.features = (&fs.Features{\n\t\tReadMimeType: true,\n\t\tCanHaveEmptyDirectories: true,\n\t\t/* can't have multiple threads downloading\n\t\tThe raw file is split into equally-sized (currently 4MB, but it might change in the future, say to 8MB, 16MB, etc.) blocks, except the last one which might be smaller than 4MB.\n\t\tEach block is encrypted separately, where the size and sha1 after the encryption is performed on the block is added to the metadata of the block, but the original block size and sha1 is not in the metadata.\n\t\tWe can make assumption and implement the chunker, but for now, we would rather be safe about it, and let the block being concurrently downloaded and decrypted in the background, to speed up the download operation!\n\t\t*/\n\t\tNoMultiThreading: true,\n\t}).Fill(ctx, f)\n\n\tprotonDrive, err := newProtonDrive(ctx, f, opt, m)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tf.protonDrive = protonDrive\n\n\troot = f.sanitizePath(root)\n\tf.dirCache = dircache.New(\n\t\troot, /* root folder path */\n\t\tprotonDrive.MainShare.LinkID, /* real root ID is the root folder, since we can't go past this folder */\n\t\tf,\n\t)\n\terr = f.dirCache.FindRoot(ctx, false)\n\tif err != nil {\n\t\t// if the root directory is not found, the initialization will still work\n\t\t// but if it's other kinds of error, then we raise it\n\t\tif err != fs.ErrorDirNotFound {\n\t\t\treturn nil, fmt.Errorf(\"couldn't initialize a new root remote: %w\", err)\n\t\t}\n\n\t\t// Assume it is a file (taken and modified from box.go)\n\t\tnewRoot, remote := dircache.SplitPath(root)\n\t\ttempF := *f\n\t\ttempF.dirCache = dircache.New(newRoot, protonDrive.MainShare.LinkID, &tempF)\n\t\ttempF.root = newRoot\n\t\t// Make new Fs which is the parent\n\t\terr = tempF.dirCache.FindRoot(ctx, false)\n\t\tif err != nil {\n\t\t\t// No root so return old f\n\t\t\treturn f, nil\n\t\t}\n\t\t_, err := tempF.newObjectWithLink(ctx, remote, nil)\n\t\tif err != nil {\n\t\t\tif err == fs.ErrorObjectNotFound {\n\t\t\t\t// File doesn't exist so return old f\n\t\t\t\treturn f, nil\n\t\t\t}\n\t\t\treturn nil, err\n\t\t}\n\t\tf.features.Fill(ctx, &tempF)\n\t\t// XXX: update the old f here instead of returning tempF, since\n\t\t// `features` were already filled with functions having *f as a receiver.\n\t\t// See https://github.com/rclone/rclone/issues/2182\n\t\tf.dirCache = tempF.dirCache\n\t\tf.root = tempF.root\n\t\t// return an error with an fs which points to the parent\n\t\treturn f, fs.ErrorIsFile\n\t}\n\n\treturn f, nil\n}", "title": "" }, { "docid": "f5dd3f52951f1b959532b780425d0d4f", "score": "0.6517869", "text": "func NewFileSystem() *FileSystem {\n\tfs := &FileSystem{}\n\tfs = fs.WithContext(context.Background())\n\treturn fs\n}", "title": "" }, { "docid": "4bb80cb03b297323274cc1e19177f1d9", "score": "0.6502639", "text": "func New(ctx context.Context, u *url.URL) (*File, error) {\n\twd, err := os.Getwd()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfb := &File{}\n\tpath := u.Host + u.Path\n\tif strings.HasPrefix(path, \"/\") {\n\t\tfb.basedOnRootPath = true\n\t}\n\tif !strings.HasSuffix(wd, \"/\") {\n\t\twd += \"/\"\n\t}\n\tfb.wd = wd\n\tfb.wdLen = len(wd)\n\treturn fb, nil\n}", "title": "" }, { "docid": "eaa45e4b4b3b6f0190ede3ed7510893a", "score": "0.6490205", "text": "func New(opts *Options) (mfs *MemFS, err error) {\n\tlogp := \"New\"\n\n\tmfs = &MemFS{\n\t\tOpts: opts,\n\t}\n\n\terr = mfs.Init()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"%s: %w\", logp, err)\n\t}\n\n\treturn mfs, nil\n}", "title": "" }, { "docid": "15a13e5bd97e419b775ac0b86eaaeece", "score": "0.6478684", "text": "func New(fname string) (Buf, error) {\n\tfd, err := os.Open(fname)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfi, err := fd.Stat()\n\tif err != nil || fi.Mode().IsDir() {\n\t\treturn nil, fmt.Errorf(\"not readable: %s\", fname)\n\t}\n\treturn &fbuf{Name: fname, fd: fd, size: fi.Size()}, nil\n}", "title": "" }, { "docid": "d38535f8a1883f3b78131e6cc722ac72", "score": "0.64365506", "text": "func New(config Config) (provider.Storage, error) {\n\trootDirectory := strings.TrimSuffix(strings.TrimSpace(*config.directory), \"/\")\n\n\tif len(rootDirectory) == 0 {\n\t\treturn nil, errors.New(\"no directory provided\")\n\t}\n\n\tinfo, err := os.Stat(rootDirectory)\n\tif err != nil {\n\t\treturn nil, convertError(err)\n\t}\n\n\tif !info.IsDir() {\n\t\treturn nil, fmt.Errorf(\"path %s is not a directory\", rootDirectory)\n\t}\n\n\tlogger.Info(\"Serving file from %s\", rootDirectory)\n\n\treturn &app{\n\t\trootDirectory: rootDirectory,\n\t\trootDirname: info.Name(),\n\t}, nil\n}", "title": "" }, { "docid": "6becba4fe4b4b888e9e54fbb44e69979", "score": "0.64156353", "text": "func newStorage(path string) (*storage, error) {\n\tf, err := os.OpenFile(path, os.O_RDONLY, 0)\n\tif err != nil && !os.IsNotExist(err) {\n\t\treturn nil, err\n\t}\n\treturn &storage{f: f, path: path}, nil\n}", "title": "" }, { "docid": "0f0d9dd2fd2874610d1d160eebbf4c1f", "score": "0.6379465", "text": "func New(serial, root string) (storage.Storage, error) {\n\tconst op = \"storage/disk.New\"\n\n\tpath := filepath.Join(root, serial)\n\n\tlog.Info.Printf(\"creating data root: %v\", root)\n\n\tif err := os.MkdirAll(root, os.ModePerm); err != nil {\n\t\treturn nil, err\n\t}\n\n\t// setup freshly formated LTFS tape\n\tif err := fsutil.CopyDir(\"../bltfs/testdata/ltfs-volume.golden\", path); err != nil {\n\t\treturn nil, err\n\t}\n\n\tbackend, err := filedebug.Open(path)\n\tif err != nil {\n\t\treturn nil, errors.E(op, err)\n\t}\n\n\tpol := bltfs.RecoveryPolicy{\n\t\tFullIndexInterval: 1 * time.Hour,\n\t\tDifferentialAfter: 10632560640, // 10 GB\n\t\tIncrementalAfter: 1073741824, // 1 GB\n\t}\n\n\t// open bltfs store\n\tbltfsStore, err := bltfs.Open(backend,\n\t\t// we'll use the file debug backend\n\t\tbltfs.WithFileDebug(),\n\n\t\t// set the recovery policy\n\t\tbltfs.WithRecoveryPolicy(pol),\n\t)\n\n\tif err != nil {\n\t\treturn nil, errors.E(op, err)\n\t}\n\n\treturn &storageImpl{\n\t\tstore: bltfsStore,\n\t}, nil\n}", "title": "" }, { "docid": "f96a8eed744c08fd0cface030b87be74", "score": "0.63731545", "text": "func New(path string, mode os.FileMode) (*File, error) {\n\tf, err := ioutil.TempFile(filepath.Dir(path), filepath.Base(path))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif err := os.Chmod(f.Name(), mode); err != nil {\n\t\tf.Close()\n\t\tos.Remove(f.Name())\n\t\treturn nil, err\n\t}\n\treturn &File{File: f, path: path}, nil\n}", "title": "" }, { "docid": "3fc69f4a92730daf4bb910664ede900a", "score": "0.6287269", "text": "func New() *FileManager {\n\treturn &FileManager{\n\t\tfilenameToData: make(map[string]([]byte)),\n\t\ttidToConnInfo: make(map[int]*connInfo)}\n}", "title": "" }, { "docid": "a250cc28b2fe793a6d75f3a216765a10", "score": "0.62755156", "text": "func New(c Config) *stor {\n\tfullPath := path.Join(path.Clean(c.Path), folder)\n\tif err := mkDirIfNotExists(fullPath); err != nil {\n\t\treturn nil\n\t}\n\ts := stor{\n\t\tpath: fullPath,\n\t\tlogFn: log.EmptyLogFn,\n\t\terrFn: log.EmptyLogFn,\n\t}\n\tif c.ErrFn != nil {\n\t\ts.errFn = c.ErrFn\n\t}\n\tif c.LogFn != nil {\n\t\ts.logFn = c.LogFn\n\t}\n\treturn &s\n}", "title": "" }, { "docid": "8617bad0876d25770848dd5aa76338cd", "score": "0.62699884", "text": "func New(opts ...Option) (s *Storage, err error) {\n\to := newOptions(opts...)\n\to.dirname, err = filepath.Abs(o.dirname)\n\tif err != nil {\n\t\treturn\n\t}\n\treturn &Storage{\n\t\topts: o,\n\t\tcache: &storageCache{\n\t\t\tcomponents: cache.New(o.cacheExpiration, o.cleanupInterval),\n\t\t\ttemplates: cache.New(o.cacheExpiration, o.cleanupInterval),\n\t\t\tfiles: cache.New(o.cacheExpiration, o.cleanupInterval),\n\t\t},\n\t}, nil\n}", "title": "" }, { "docid": "7f31627826cfd49b525546083ac1e37d", "score": "0.6257764", "text": "func (c *Client) Create(ctx context.Context, path ...string) (*File, error) {\n\tfid, err := c.allocFid(ctx, c.root)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdir := path[0 : len(path)-1]\n\t_, err = c.session.Walk(ctx, fid, fid, dir...)\n\tif err != nil {\n\t\tlog.Println(\"Failed to Walk to\", path, err)\n\t\tc.freeFid(ctx, fid)\n\t\treturn nil, err\n\t}\n\t_, _, err = c.session.Create(ctx, fid, path[len(path)-1], fileperm, p9p.ORDWR)\n\tif err != nil {\n\t\tlog.Println(\"Failed to Create\", path, err)\n\t\treturn nil, err\n\t}\n\tvar m sync.Mutex\n\treturn &File{fid: fid, c: c, m: &m, open: true}, nil\n}", "title": "" }, { "docid": "94e76a55d1f42b041cf9317be53f3109", "score": "0.6235128", "text": "func New(s string) URI {\n\tif u, err := url.PathUnescape(s); err == nil {\n\t\ts = u\n\t}\n\n\tif strings.HasPrefix(s, FileScheme+hierPart) {\n\t\treturn URI(s)\n\t}\n\n\treturn File(s)\n}", "title": "" }, { "docid": "d94bd021f88c5a2c29d92f06ea22b744", "score": "0.6195401", "text": "func New(\n\tsess *session.Session,\n\tbucket string,\n\topts ...func(*S3FileSystem),\n) vfs.FileSystem {\n\n\ts3Client := s3.New(sess)\n\ts3FileSystem := &S3FileSystem{\n\t\ts3: s3Client,\n\t\tdownloader: s3manager.NewDownloaderWithClient(s3Client),\n\t\tuploader: s3manager.NewUploaderWithClient(s3Client),\n\t\ttmpDir: os.TempDir(),\n\t\tbucket: aws.String(bucket),\n\t}\n\tfor _, opt := range opts {\n\t\topt(s3FileSystem)\n\t}\n\treturn s3FileSystem\n}", "title": "" }, { "docid": "aa9b248ece0f02a834848c08a908a273", "score": "0.6174141", "text": "func NewFs(ctx context.Context, name, root string, m configmap.Mapper) (fs.Fs, error) {\n\t// Parse config into Options struct\n\topt := new(Options)\n\terr := configstruct.Set(m, opt)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\terr = checkUploadChunkSize(opt.ChunkSize)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"swift: chunk size: %w\", err)\n\t}\n\n\tc, err := swiftConnection(ctx, opt, name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn NewFsWithConnection(ctx, opt, name, root, c, false)\n}", "title": "" }, { "docid": "286a7e90a4adfe998b7ddea946da2a26", "score": "0.61713284", "text": "func Create(home string, addr string) *FileSystem {\n\tme := new(FileSystem)\n\tme.node = chord.Create(addr)\n\tif me.node == nil {\n\t\treturn nil\n\t}\n\tme.home = home\n\tme.mirror = fmt.Sprintf(\"%s/mirrored\", home)\n\tme.addr = addr\n\t//make directories\n\terr := os.MkdirAll(me.home, 0755)\n\terr = os.MkdirAll(me.mirror, 0755)\n\tfmt.Printf(\"made directory %s.\\n\", me.home)\n\tif err != nil {\n\t\tcheckError(err)\n\t\treturn nil\n\t}\n\n\tme.node.Register(code, me)\n\t//experimental\n\tme.malicious = false\n\tme.cache = make(map[string]bool)\n\treturn me\n}", "title": "" }, { "docid": "5e76d1fc7d57251ced49427da536d8a7", "score": "0.61548084", "text": "func New(raw string, algorithm string) (afero.Fs, error) {\n\tfn := decodeAlgorithm(algorithm)\n\tif fn != nil {\n\t\treturn fn(raw)\n\t}\n\treturn nil, sbi.ErrUnknowAlgorithm\n}", "title": "" }, { "docid": "19427a2bd23f516304ac1315410d4182", "score": "0.61479086", "text": "func newFsDir(remote string) fs.Fs {\n\tf, err := cache.Get(context.Background(), remote)\n\tif err != nil {\n\t\terr = fs.CountError(err)\n\t\tlog.Fatalf(\"Failed to create file system for %q: %v\", remote, err)\n\t}\n\tcache.Pin(f) // pin indefinitely since it was on the CLI\n\treturn f\n}", "title": "" }, { "docid": "dd392a85c2e82f83b1f1f1173149290c", "score": "0.6124087", "text": "func newFileStore(path string) (fileStore, error) {\n\tfs := fileStore{}\n\treturn fs, fs.getState(path)\n}", "title": "" }, { "docid": "3b620a3e60e121276b0ecfb8b9c44a7d", "score": "0.6123387", "text": "func New(s string) (noder.Noder, error) {\n\treturn decodeDir([]byte(s), root)\n}", "title": "" }, { "docid": "eb6c712c53e8fb897745d2b02163f346", "score": "0.61124337", "text": "func New(root vfs.FileSystem) http.Handler {\n\t// TODO: Use vfs.FileSystem.\n\treturn &rawFileServer{httpfs.New(root)}\n}", "title": "" }, { "docid": "3d62a8a671067623905307a2901b4650", "score": "0.6111735", "text": "func New(t testingT, dir string, modifiers ...func(*fakecontext.Fake) error) Fake {\n\tctx := fakecontext.New(t, dir, modifiers...)\n\tif testEnv.LocalDaemon() {\n\t\treturn newLocalFakeStorage(t, ctx)\n\t}\n\treturn newRemoteFileServer(t, ctx)\n}", "title": "" }, { "docid": "2dd2a565179860f31288f2724b813c95", "score": "0.60877866", "text": "func New(filename ...string) middleware.FsWriter {\n\tvar (\n\t\tfsw *impl\n\t\tfnm string\n\t\ttmp []string\n\t)\n\n\tfsw = new(impl)\n\ttmp = strings.Split(os.Args[0], string(os.PathSeparator))\n\tif len(tmp) > 0 {\n\t\tfsw.SetFilename(tmp[len(tmp)-1] + `.log`)\n\t} else {\n\t\tfsw.SetFilename(os.Args[0] + `.log`)\n\t}\n\tfor _, fnm = range filename {\n\t\tfsw.SetFilename(fnm)\n\t}\n\tfsw.Formater = f.New()\n\tfsw.TplText = _DefaultTextFORMAT\n\n\treturn fsw\n}", "title": "" }, { "docid": "24b1088d447c303b1c20467506397156", "score": "0.6085101", "text": "func NewFs(projectDirPath string) (*Fs, error) {\n\tvar fs afero.Fs\n\n\tif flag.Lookup(\"test.v\") == nil {\n\t\tfs = afero.NewOsFs()\n\t} else {\n\t\tfs = MockFs\n\t}\n\treturn newFs(fs, projectDirPath)\n}", "title": "" }, { "docid": "b720d1a5526165a967a916770a3892d3", "score": "0.60845864", "text": "func NewTree(srv *Server) *File {\n\treturn &File{\n\t\tsrv: srv,\n\t\tname: \"/\",\n\t\tdir: true,\n\t\tChildren: make([]*File, 0, maxChildren),\n\t}\n}", "title": "" }, { "docid": "95ce8036dfacf3d9b6b6ac5d6224ad1b", "score": "0.608309", "text": "func newFileManager() *FileManager {\r\n\r\n\tfileManager := new(FileManager)\r\n\r\n\t// Set the root to the application root path...\r\n\tfileManager.root = GetServer().GetConfigurationManager().GetApplicationDirectoryPath()\r\n\tfileManager.loadMimeType()\r\n\r\n\treturn fileManager\r\n}", "title": "" }, { "docid": "0baaae560f522e8b6fcf1e04f7d34967", "score": "0.60650784", "text": "func NewFileManager() (*FileManager, error) {\n\treturn NewFileManagerAt(\"\")\n}", "title": "" }, { "docid": "9fa2bff69ad4a96c99826eb927315df5", "score": "0.6063249", "text": "func NewMock(options ...MockOptions) FileSystem {\n\t// Default values\n\tfs := mockFileSystem{\n\t\texists: func(_ string) bool { return false },\n\t\toutput: new(bytes.Buffer),\n\t}\n\n\t// Apply options\n\tfor _, option := range options {\n\t\toption(&fs)\n\t}\n\n\treturn fs\n}", "title": "" }, { "docid": "765f72e972bf41a0a2c4f2d0f0ae0cc2", "score": "0.60603666", "text": "func (s SecureFileEmpty) construct() SecureFileClass { return &s }", "title": "" }, { "docid": "dcec6985762c85b5340be8f93cf9d52c", "score": "0.60556626", "text": "func New(file *os.File) *LockableFile {\n\tlfile := &LockableFile{\n\t\tFile: file,\n\t\tblocking: true,\n\t}\n\tlfile.UseFLOCK()\n\treturn lfile\n}", "title": "" }, { "docid": "61826a86fdca2842015b39408c74648c", "score": "0.60360694", "text": "func New(pn string, pp string, pd string, fn string, fp string, cp string, rp string, logger *zap.Logger) *ZFSManager {\n\tpool := getCreatePool(pn, pd, pp, logger)\n\tfs := getCreateFilesystem(pool, fn, fp, logger)\n\n\tzm := &ZFSManager{\n\t\tl: logger,\n\t\tpoolName: pn,\n\t\tfsName: fn,\n\t\tcastPath: cp,\n\t\treplicaPath: rp,\n\t\tfs: fs,\n\t\tcasts: make(map[string]*cast),\n\t}\n\n\tlogger.Debug(\"initialized zfsmanager\", zap.String(\"device\", pd), zap.String(\"pool\", pn), zap.String(\"filesystem\", fn))\n\n\treturn zm\n}", "title": "" }, { "docid": "978d525e9685df8a4294b3d9ee5dc2c2", "score": "0.6033549", "text": "func NewFs(name, root string) (fs.Fs, error) {\n\tif uploadChunkSize > maxUploadChunkSize {\n\t\treturn nil, errors.Errorf(\"chunk size too big, must be < %v\", maxUploadChunkSize)\n\t}\n\tdb, err := newDropbox(name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tf := &Fs{\n\t\tname: name,\n\t\tdb: db,\n\t}\n\tf.setRoot(root)\n\n\t// Read the token from the config file\n\ttoken := fs.ConfigFileGet(name, \"token\")\n\n\t// Set our custom context which enables our custom transport for timeouts etc\n\tdb.SetContext(oauthutil.Context())\n\n\t// Authorize the client\n\tdb.SetAccessToken(token)\n\n\t// See if the root is actually an object\n\tentry, err := f.db.Metadata(f.slashRoot, false, false, \"\", \"\", metadataLimit)\n\tif err == nil && !entry.IsDir {\n\t\tnewRoot := path.Dir(f.root)\n\t\tif newRoot == \".\" {\n\t\t\tnewRoot = \"\"\n\t\t}\n\t\tf.setRoot(newRoot)\n\t\t// return an error with an fs which points to the parent\n\t\treturn f, fs.ErrorIsFile\n\t}\n\n\treturn f, nil\n}", "title": "" }, { "docid": "4dea5b96b99874111ee81c7d7e1d1c4b", "score": "0.6021283", "text": "func New(root string) *Storage {\n\treturn &Storage{\n\t\troot: root,\n\t}\n}", "title": "" }, { "docid": "b59c460c26968b1d13bbd60148ce0b92", "score": "0.6016333", "text": "func FileSystem(dir string) *fileSystem {\n\treturn &fileSystem{root: dir}\n}", "title": "" }, { "docid": "55fb6bf80d8e24a52265e524568c8d40", "score": "0.6000072", "text": "func New(filename string) (*Store, error) {\n\tdb, err := bolt.Open(filename, os.FileMode(0600), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tctx, cancel := context.WithCancel(context.Background())\n\n\tgo stat(ctx, db)\n\n\treturn &Store{\n\t\tdb: db,\n\t\tclose: cancel,\n\t}, nil\n}", "title": "" }, { "docid": "11188a97c74bd9da49ebeb9db48f4bc9", "score": "0.5997047", "text": "func NewFs() Fs {\n\treturn &realFs{}\n}", "title": "" }, { "docid": "998483ac0fc0ce27410959a344cc796b", "score": "0.5993273", "text": "func NewFsFile(remote string) (fs.Fs, string) {\n\t_, fsPath, err := fspath.SplitFs(remote)\n\tif err != nil {\n\t\terr = fs.CountError(err)\n\t\tlog.Fatalf(\"Failed to create file system for %q: %v\", remote, err)\n\t}\n\tf, err := cache.Get(context.Background(), remote)\n\tswitch err {\n\tcase fs.ErrorIsFile:\n\t\tcache.Pin(f) // pin indefinitely since it was on the CLI\n\t\treturn f, path.Base(fsPath)\n\tcase nil:\n\t\tcache.Pin(f) // pin indefinitely since it was on the CLI\n\t\treturn f, \"\"\n\tdefault:\n\t\terr = fs.CountError(err)\n\t\tlog.Fatalf(\"Failed to create file system for %q: %v\", remote, err)\n\t}\n\treturn nil, \"\"\n}", "title": "" }, { "docid": "2a15b902ffd3c5a0fc22e71a5c6a8aff", "score": "0.598931", "text": "func NewFileSystem(fs http.FileSystem, extension string) *Engine {\n\tengine := &Engine{\n\t\tEngine: core.Engine{\n\t\t\tDirectory: \"/\",\n\t\t\tFileSystem: fs,\n\t\t\tExtension: extension,\n\t\t\tLayoutName: \"embed\",\n\t\t\tFuncmap: make(map[string]interface{}),\n\t\t},\n\t}\n\treturn engine\n}", "title": "" }, { "docid": "786d3e981bf53e5e84d3af85c55b7684", "score": "0.59832186", "text": "func New(linkPath, openPath, closedPath, coffeePath, firePath string) Backend {\n\treturn &fileBackend{\n\t\tlinkPath: linkPath,\n\t\topenPath: openPath,\n\t\tclosedPath: closedPath,\n\t\tcoffeePath: coffeePath,\n\t\tfirePath: firePath,\n\t}\n}", "title": "" }, { "docid": "746018bbd26f3a86378863ae13e4a251", "score": "0.59748274", "text": "func (DiskFree) New(state *quobar.State) (quobar.Drawer, error) {\n\tpath := os.Getenv(\"HOME\")\n\tif path == \"\" {\n\t\treturn nil, errors.New(\"HOME not set in environment\")\n\t}\n\tp := &diskFree{\n\t\tstate: state,\n\t\tpath: path,\n\t\tchart: sparkline.New(limit, state.Config.Foreground, trafficLights),\n\t}\n\t// seed with a baseline so the graph draws high, to begin with\n\tp.chart.Add(0.0)\n\t// TODO shutdown mechanism\n\tgo p.update()\n\treturn p, nil\n}", "title": "" }, { "docid": "43d23ab63c7d4c3414e563f3cf411d07", "score": "0.59550846", "text": "func newFile(pkg string, path string) (File, error) {\n\tf := File{\n\t\tPackage: pkg,\n\t\tName: filepath.Base(path),\n\t\tPath: path,\n\t}\n\n\tfuncs, err := f.GetFunctions()\n\n\tif err != nil {\n\t\treturn File{}, err\n\t}\n\n\tf.Funcs = funcs\n\treturn f, nil\n}", "title": "" }, { "docid": "0df2ac1dac26743126a54942b1a82ca2", "score": "0.5952918", "text": "func (s SecureFile) construct() SecureFileClass { return &s }", "title": "" }, { "docid": "0b4dbbb3ec6ef1d4a87bccebba3c0a37", "score": "0.5951847", "text": "func New(r io.Reader) (fs.FS, error) {\n\ttr := tar.NewReader(r)\n\ttfs := &tarfs{make(map[string]*entry), make([]fs.DirEntry, 0, 10), nil}\n\n\tfor {\n\t\th, err := tr.Next()\n\t\tif err == io.EOF {\n\t\t\tbreak\n\t\t}\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tname := filepath.Clean(h.Name)\n\n\t\tbuf := bytes.NewBuffer(make([]byte, 0, int(h.Size)))\n\t\tif _, err := io.Copy(buf, tr); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\te := &entry{h, buf.Bytes(), nil}\n\n\t\ttfs.files[name] = e\n\n\t\tdir := filepath.Dir(name)\n\t\tif dir == \".\" {\n\t\t\ttfs.rootEntries = append(tfs.rootEntries, e)\n\t\t} else {\n\t\t\tif parent, ok := tfs.files[filepath.Dir(name)]; ok {\n\t\t\t\tparent.entries = append(parent.entries, e)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn tfs, nil\n}", "title": "" }, { "docid": "44c962b123ceb18fab3b09b0369657a8", "score": "0.5932711", "text": "func NewFilesystemCollector(constLabels labels, settings model.CollectorSettings) (Collector, error) {\n\n\t// Define default filters (if no already present) to avoid collecting metrics about exotic filesystems.\n\tif _, ok := settings.Filters[\"fstype\"]; !ok {\n\t\tif settings.Filters == nil {\n\t\t\tsettings.Filters = filter.New()\n\t\t}\n\n\t\tsettings.Filters.Add(\"fstype\", filter.Filter{Include: `^(ext3|ext4|xfs|btrfs)$`})\n\t\terr := settings.Filters.Compile()\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn &filesystemCollector{\n\t\tbytes: newBuiltinTypedDesc(\n\t\t\tdescOpts{\"node\", \"filesystem\", \"bytes\", \"Number of bytes of filesystem by usage.\", 0},\n\t\t\tprometheus.GaugeValue,\n\t\t\t[]string{\"device\", \"mountpoint\", \"fstype\", \"usage\"}, constLabels,\n\t\t\tsettings.Filters,\n\t\t),\n\t\tbytesTotal: newBuiltinTypedDesc(\n\t\t\tdescOpts{\"node\", \"filesystem\", \"bytes_total\", \"Total number of bytes of filesystem capacity.\", 0},\n\t\t\tprometheus.GaugeValue,\n\t\t\t[]string{\"device\", \"mountpoint\", \"fstype\"}, constLabels,\n\t\t\tsettings.Filters,\n\t\t),\n\t\tfiles: newBuiltinTypedDesc(\n\t\t\tdescOpts{\"node\", \"filesystem\", \"files\", \"Number of files (inodes) of filesystem by usage.\", 0},\n\t\t\tprometheus.GaugeValue,\n\t\t\t[]string{\"device\", \"mountpoint\", \"fstype\", \"usage\"}, constLabels,\n\t\t\tsettings.Filters,\n\t\t),\n\t\tfilesTotal: newBuiltinTypedDesc(\n\t\t\tdescOpts{\"node\", \"filesystem\", \"files_total\", \"Total number of files (inodes) of filesystem capacity.\", 0},\n\t\t\tprometheus.GaugeValue,\n\t\t\t[]string{\"device\", \"mountpoint\", \"fstype\"}, constLabels,\n\t\t\tsettings.Filters,\n\t\t),\n\t}, nil\n}", "title": "" }, { "docid": "c7ab981a6d197c64812ac23a6e0933a2", "score": "0.5923744", "text": "func New(o Options) *Diskv {\n\tif o.BasePath == \"\" {\n\t\to.BasePath = defaultBasePath\n\t}\n\tif o.Transform == nil {\n\t\to.Transform = defaultTransform\n\t}\n\tif o.PathPerm == 0 {\n\t\to.PathPerm = defaultPathPerm\n\t}\n\tif o.FilePerm == 0 {\n\t\to.FilePerm = defaultFilePerm\n\t}\n\n\td := &Diskv{\n\t\tOptions: o,\n\t\tcache: map[string][]byte{},\n\t\tdirty:\t map[string]bool{},\n\t\tcacheSize: 0,\n\t}\n\n\tif d.Index != nil && d.IndexLess != nil {\n\t\td.Index.Initialize(d.IndexLess, d.Keys(nil))\n\t}\n\n\treturn d\n}", "title": "" }, { "docid": "4770666a77a51acd37e5b024b9bd9ce4", "score": "0.591537", "text": "func New(f *os.File) *Lock {\n\treturn &Lock{\n\t\tf: f,\n\t\tfd: f.Fd(),\n\t}\n}", "title": "" }, { "docid": "244df31c8287d96524a5d0482c1b6159", "score": "0.59128416", "text": "func (FileNode) New(base NodeBase, _ *Codec) (Node, error) {\n\treturn &FileNode{NodeBase: base}, nil\n}", "title": "" }, { "docid": "aee60e726d7355079d583f301d44b3b6", "score": "0.5912613", "text": "func New(fsys fs.FS, root string) *Walker {\n\tinfo, err := fs.Stat(fsys, root)\n\treturn &Walker{\n\t\tfsys: fsys,\n\t\tcur: visit{err: errUsage},\n\t\tstack: []visit{{root, infoDirEntry{info}, err, 0, 0}},\n\t}\n}", "title": "" }, { "docid": "0135b39a6954bdd598bb8e53fbefd55f", "score": "0.5893693", "text": "func (s *Path) New() *Path {\n\ts.items = []Pair{}\n\treturn s\n}", "title": "" }, { "docid": "8c91035adc30c2fb7b606bde0812765e", "score": "0.58934075", "text": "func New() (*OomParser, error) {\n\tsystemFile, err := getSystemFile()\n\tif err != nil {\n\t\treturn trySystemd()\n\t}\n\tfile, err := os.Open(systemFile)\n\tif err != nil {\n\t\treturn trySystemd()\n\t}\n\treturn &OomParser{\n\t\tioreader: bufio.NewReader(file),\n\t}, nil\n}", "title": "" }, { "docid": "c8c2a83e58a2d55defa4bc315c541d45", "score": "0.589048", "text": "func New(cfg Config) (*FSS3, error) {\n\tcreds := credentials.NewStaticV4(cfg.AccessKeyID, cfg.SecretAccessKey, \"\")\n\tclient, err := minio.New(cfg.Endpoint, &minio.Options{\n\t\tCreds: creds,\n\t\tSecure: cfg.UseSSL,\n\t\tRegion: cfg.Region,\n\t})\n\tif cfg.DirFileName == \"\" {\n\t\tcfg.DirFileName = \".\"\n\t}\n\tdirFileName = cfg.DirFileName\n\tfss3 := FSS3{\n\t\tclient: client,\n\t\tcfg: &cfg,\n\t}\n\treturn &fss3, err\n}", "title": "" }, { "docid": "b743e449e3f006d5cf17e926753188d5", "score": "0.5882541", "text": "func New(devPath string) (*KeyLogger, error) {\n\tk := &KeyLogger{}\n\tif !k.IsRoot() {\n\t\treturn nil, errors.New(\"Must be run as root\")\n\t}\n\tfd, err := os.Open(devPath)\n\tk.fd = fd\n\treturn k, err\n}", "title": "" }, { "docid": "741bc77a47769a7b3cdec2dc36d81515", "score": "0.5880909", "text": "func New(d *deps.Deps) *Namespace {\n\tvar readFileFs afero.Fs\n\n\t// The docshelper script does not have or need all the dependencies set up.\n\tif d.PathSpec != nil {\n\t\treadFileFs = overlayfs.New(overlayfs.Options{\n\t\t\tFss: []afero.Fs{\n\t\t\t\td.PathSpec.BaseFs.Work,\n\t\t\t\td.PathSpec.BaseFs.Content.Fs,\n\t\t\t},\n\t\t})\n\t}\n\n\treturn &Namespace{\n\t\treadFileFs: readFileFs,\n\t\tFilters: &images.Filters{},\n\t\tcache: map[string]image.Config{},\n\t\tdeps: d,\n\t}\n}", "title": "" }, { "docid": "3eeab7287ffd691c0b14c36a3ab5e011", "score": "0.58688074", "text": "func New(dir, prefix, suffix string) (*os.File, error) {\n\tfor index := 1; index < 10000; index++ {\n\t\tpath := filepath.Join(dir, fmt.Sprintf(\"%s%03d%s\", prefix, index, suffix))\n\t\tif _, err := os.Stat(path); err != nil {\n\t\t\treturn os.Create(path)\n\t\t}\n\t}\n\t// Give up\n\treturn nil, fmt.Errorf(\"could not create file of the form %s%03d%s\", prefix, 1, suffix)\n}", "title": "" }, { "docid": "d3606d1d26f0286ca8e3b459a8d65e9b", "score": "0.58556914", "text": "func NewFileSystemMapper() *FSMapper {\n\treturn &FSMapper{\n\t\tparsers: []Parser{},\n\t}\n}", "title": "" }, { "docid": "e5431eb2e2865d5ea87528b6a0d126c8", "score": "0.5851505", "text": "func New(opt *ServerOptions) (http.Handler, error) {\n\tif opt.RootDir == \"\" {\n\t\t// set root to current directory if its empty\n\t\topt.RootDir = \".\"\n\t}\n\n\t// clean root\n\topt.RootDir = filepath.Clean(opt.RootDir)\n\n\tdefaultDir := filepath.Join(opt.RootDir, defaultDir)\n\n\t// allowed directories\n\tallowedDirs := make([]string, 0, len(opt.AllowedDirs)+1)\n\tallowedDirs = append(allowedDirs, defaultDir)\n\tfor _, dir := range opt.AllowedDirs {\n\t\tallowedDirs = append(allowedDirs, filepath.Clean(dir))\n\t}\n\n\ttestFile := filepath.Join(defaultDir, uuid.New().String()+\".txt\")\n\n\t// create simple file in default directory to check that it exitst\n\tf, err := os.Create(testFile)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// delete the file later\n\tdefer os.Remove(testFile)\n\n\t// close the file\n\tdefer f.Close()\n\n\tif opt.NotFoundHandler == nil {\n\t\t// set not found to be http not found\n\t\topt.NotFoundHandler = http.NotFoundHandler()\n\t}\n\n\tif opt.DB == nil {\n\t\tuseDB = false\n\t}\n\n\tif useDB {\n\t\t// perform automigration\n\t\topt.DB.AutoMigrate(&fs.FileData{}, &fs.FileInfo{})\n\t}\n\n\t// hash function\n\thashFn := sha256.New()\n\n\treturn &fsHandler{\n\t\troot: opt.RootDir,\n\t\tallowedDirs: allowedDirs,\n\t\tdefaultDir: defaultDir,\n\t\tnotFoundHandler: opt.NotFoundHandler,\n\t\thashFn: hashFn,\n\t\tdb: opt.DB,\n\t\tuseDB: useDB,\n\t\tmaxUploadSize: maxUploadSize,\n\t}, nil\n}", "title": "" }, { "docid": "d6fa7b2eee4d345d4463e04127bf25ab", "score": "0.58263534", "text": "func NewFs(ctx context.Context, name, root string, m configmap.Mapper) (ff fs.Fs, err error) {\n\topt := new(Options)\n\terr = configstruct.Set(m, opt)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsetProviderDefaults(opt)\n\treturn NewFsFromOptions(ctx, name, root, opt)\n}", "title": "" }, { "docid": "07564ad6721556a2dfb336a37f218b5e", "score": "0.5823629", "text": "func New() *Set {\n\treturn &Set{files: make(map[string]*file)}\n}", "title": "" }, { "docid": "525485e2838ce67308c4e4bd5087053f", "score": "0.581954", "text": "func New(name string, size int64, body *bytes.Reader, dirs ...os.FileInfo) *DodFile {\n\treturn &DodFile{\n\t\tDirs: dirs,\n\t\tReader: body,\n\t\tInfo: &DodInfo{\n\t\t\tFileName: name,\n\t\t\tFileSize: size,\n\t\t},\n\t}\n}", "title": "" }, { "docid": "ef845e5aabf38aacb87e01811816a6ff", "score": "0.58144695", "text": "func New() *Guardian {\n\tmut := &sync.RWMutex{}\n\tfiles := make(map[string]*File)\n\tgr := &Guardian{mut, files}\n\treturn gr\n}", "title": "" }, { "docid": "5ce1a4cf40b38fc1e7aa92d19df5ecb5", "score": "0.581442", "text": "func New(rootDirectory filename.System, datatype string, sizeThreshold bytecount.ByteCount, ageThreshold time.Duration, uploader uploader.Uploader) (*TarCache, chan<- filename.System) {\n\tif !strings.HasSuffix(string(rootDirectory), \"/\") {\n\t\trootDirectory = filename.System(string(rootDirectory) + \"/\")\n\t}\n\t// By giving the channel a large buffer, we attempt to decouple file\n\t// discovery event response times from any file processing times.\n\tfileChannel := make(chan filename.System, 1000000)\n\ttarCache := &TarCache{\n\t\tfileChannel: fileChannel,\n\t\ttimeoutChannel: make(chan string),\n\t\trootDirectory: rootDirectory,\n\t\tcurrentTarfile: make(map[string]tarfile.Tarfile),\n\t\tsizeThreshold: sizeThreshold,\n\t\tageThreshold: ageThreshold,\n\t\tuploader: uploader,\n\t\tdatatype: datatype,\n\t}\n\treturn tarCache, fileChannel\n}", "title": "" }, { "docid": "af08229b9b060caf7acbdaebfc9daea8", "score": "0.58126634", "text": "func (vfs *VirtualFilesystem) NewMount(ctx context.Context, creds *auth.Credentials, source string, target *PathOperation, fsTypeName string, opts *NewFilesystemOptions) error {\n\tfsType := vfs.getFilesystemType(fsTypeName)\n\tif fsType == nil {\n\t\treturn syserror.ENODEV\n\t}\n\tfs, root, err := fsType.NewFilesystem(ctx, creds, source, *opts)\n\tif err != nil {\n\t\treturn err\n\t}\n\t// We can't hold vfs.mountMu while calling FilesystemImpl methods due to\n\t// lock ordering.\n\tvd, err := vfs.GetDentryAt(ctx, creds, target, &GetDentryOptions{})\n\tif err != nil {\n\t\troot.decRef(fs)\n\t\tfs.decRef()\n\t\treturn err\n\t}\n\tvfs.mountMu.Lock()\n\tfor {\n\t\tif vd.dentry.IsDisowned() {\n\t\t\tvfs.mountMu.Unlock()\n\t\t\tvd.DecRef()\n\t\t\troot.decRef(fs)\n\t\t\tfs.decRef()\n\t\t\treturn syserror.ENOENT\n\t\t}\n\t\t// vd might have been mounted over between vfs.GetDentryAt() and\n\t\t// vfs.mountMu.Lock().\n\t\tif !vd.dentry.isMounted() {\n\t\t\tbreak\n\t\t}\n\t\tnextmnt := vfs.mounts.Lookup(vd.mount, vd.dentry)\n\t\tif nextmnt == nil {\n\t\t\tbreak\n\t\t}\n\t\tnextmnt.incRef()\n\t\tnextmnt.root.incRef(nextmnt.fs)\n\t\tvd.DecRef()\n\t\tvd = VirtualDentry{\n\t\t\tmount: nextmnt,\n\t\t\tdentry: nextmnt.root,\n\t\t}\n\t}\n\t// TODO: Linux requires that either both the mount point and the mount root\n\t// are directories, or neither are, and returns ENOTDIR if this is not the\n\t// case.\n\tmntns := vd.mount.ns\n\tmnt := &Mount{\n\t\tfs: fs,\n\t\troot: root,\n\t\tns: mntns,\n\t\trefs: 1,\n\t}\n\tmnt.storeKey(vd.mount, vd.dentry)\n\tatomic.AddUint32(&vd.dentry.mounts, 1)\n\tmntns.mountpoints[vd.dentry] = struct{}{}\n\tvfsmpmounts, ok := vfs.mountpoints[vd.dentry]\n\tif !ok {\n\t\tvfsmpmounts = make(map[*Mount]struct{})\n\t\tvfs.mountpoints[vd.dentry] = vfsmpmounts\n\t}\n\tvfsmpmounts[mnt] = struct{}{}\n\tvfs.mounts.Insert(mnt)\n\tvfs.mountMu.Unlock()\n\treturn nil\n}", "title": "" }, { "docid": "161efdec5de651e9b18235e9ea0c5269", "score": "0.58000225", "text": "func New(dir string) *Storage {\n\topts := badger.DefaultOptions\n\topts.Dir = dir\n\topts.ValueDir = dir\n\treturn &Storage{\n\t\tdb: nil,\n\t\topts: opts,\n\t}\n}", "title": "" }, { "docid": "1bf52ed1d98379fb31ed844a3cf22899", "score": "0.579805", "text": "func NewFs(dirs dirtree.DirTree) Fs {\n\treturn Fs(dirs)\n}", "title": "" }, { "docid": "8fa1dc82e0d48653aed56e1f353cb1e5", "score": "0.5791669", "text": "func (f *Fs) NewFile() (*File, error) {\n\treturn f.Store()\n}", "title": "" }, { "docid": "c741e4322b1b17f893f0ad110a049877", "score": "0.57796276", "text": "func New(t *storageprovider.Topology) *Fake {\n\treturn &Fake{\n\t\tTopology: t,\n\t\tCurrentUtilization: 50,\n\t}\n}", "title": "" }, { "docid": "9ad1389544c36074342990b57d4b70ae", "score": "0.576526", "text": "func newUpspinFS(config upspin.Config, mountpoint string, cacheDir string, cacheSize int64) *upspinFS {\n\tsep := string(filepath.Separator)\n\tif !strings.HasSuffix(mountpoint, sep) {\n\t\tmountpoint = mountpoint + sep\n\t}\n\tf := &upspinFS{\n\t\tmountpoint: mountpoint,\n\t\tconfig: config,\n\t\tclient: client.New(config),\n\t\tuid: os.Getuid(),\n\t\tgid: os.Getgid(),\n\t\tuserDirs: make(map[string]bool),\n\t\tnodeMap: make(map[upspin.PathName]*node),\n\t\tenoentMap: make(map[upspin.PathName]time.Time),\n\t}\n\tf.cache = newCache(config, cacheDir+\"/fscache\", cacheSize)\n\tf.watched = newWatchedDirs(f)\n\n\t// Preallocate root node.\n\tf.root = f.allocNode(nil, \"\", 0500|os.ModeDir, 0, time.Now())\n\treturn f\n}", "title": "" } ]
f804b7696be5d3ce23718b6603717b3b
Whether this container has a readonly root filesystem. Default is false.
[ { "docid": "7e3531021d167237033a99230f44d388", "score": "0.7016199", "text": "func (o ThanosRulerSpecContainersSecurityContextPtrOutput) ReadOnlyRootFilesystem() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *ThanosRulerSpecContainersSecurityContext) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.ReadOnlyRootFilesystem\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" } ]
[ { "docid": "720b83a79e6ac1e09639550f4c366b1f", "score": "0.73518157", "text": "func (o PrometheusSpecInitContainersSecurityContextOutput) ReadOnlyRootFilesystem() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v PrometheusSpecInitContainersSecurityContext) *bool { return v.ReadOnlyRootFilesystem }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "03396d6663fbc3e52405898f4dcd7317", "score": "0.7249752", "text": "func (o PrometheusSpecInitContainersSecurityContextPtrOutput) ReadOnlyRootFilesystem() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *PrometheusSpecInitContainersSecurityContext) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.ReadOnlyRootFilesystem\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "b2ac2a1ba169af6b0465fadfe8553916", "score": "0.7232122", "text": "func (o AlertmanagerSpecInitContainersSecurityContextOutput) ReadOnlyRootFilesystem() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v AlertmanagerSpecInitContainersSecurityContext) *bool { return v.ReadOnlyRootFilesystem }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "abc3fdd8b9547d5fbc093a6c6a462889", "score": "0.72275966", "text": "func (o PrometheusSpecContainersSecurityContextOutput) ReadOnlyRootFilesystem() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v PrometheusSpecContainersSecurityContext) *bool { return v.ReadOnlyRootFilesystem }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "4a62b5d7bca60c1d8bd18306341415c1", "score": "0.7220877", "text": "func (o ThanosRulerSpecInitContainersSecurityContextOutput) ReadOnlyRootFilesystem() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v ThanosRulerSpecInitContainersSecurityContext) *bool { return v.ReadOnlyRootFilesystem }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "22166e2e7e5103a248bff0c4afbf01aa", "score": "0.7154559", "text": "func (o ThanosRulerSpecInitContainersSecurityContextPtrOutput) ReadOnlyRootFilesystem() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *ThanosRulerSpecInitContainersSecurityContext) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.ReadOnlyRootFilesystem\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "9520ed180627a0a5923cd519c4c1354c", "score": "0.7141893", "text": "func (o AlertmanagerSpecInitContainersSecurityContextPtrOutput) ReadOnlyRootFilesystem() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *AlertmanagerSpecInitContainersSecurityContext) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.ReadOnlyRootFilesystem\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "aff0242a611e0d93f8c56b3a7a8b59b2", "score": "0.7139013", "text": "func (o AlertmanagerSpecContainersSecurityContextOutput) ReadOnlyRootFilesystem() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v AlertmanagerSpecContainersSecurityContext) *bool { return v.ReadOnlyRootFilesystem }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "d240a2bbbe9ac03c20609f8eb114be66", "score": "0.7119513", "text": "func (o PrometheusSpecContainersSecurityContextPtrOutput) ReadOnlyRootFilesystem() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *PrometheusSpecContainersSecurityContext) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.ReadOnlyRootFilesystem\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "c958f4c46bda740ca2a7617d9b540d30", "score": "0.7087479", "text": "func ReadOnlyRootPartition() (bool, error) {\n\tvar st unix.Statfs_t\n\tif err := unix.Statfs(\"/\", &st); err != nil {\n\t\treturn false, err\n\t}\n\treturn st.Flags&unix.ST_RDONLY != 0, nil\n}", "title": "" }, { "docid": "8119d09dbeeb20d75d2c717075ac25e8", "score": "0.70674455", "text": "func (c *container) ReadOnly(serverIsReadOnly bool) bool {\n\tif c.config.GetLinux().GetSecurityContext().GetReadonlyRootfs() {\n\t\treturn true\n\t}\n\treturn serverIsReadOnly\n}", "title": "" }, { "docid": "ae27ddb11d355a5c286f963874915d2e", "score": "0.705497", "text": "func (o ThanosRulerSpecContainersSecurityContextOutput) ReadOnlyRootFilesystem() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v ThanosRulerSpecContainersSecurityContext) *bool { return v.ReadOnlyRootFilesystem }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "0e97155beff34ef496626b6b3cd57d7a", "score": "0.70509064", "text": "func (o AlertmanagerSpecContainersSecurityContextPtrOutput) ReadOnlyRootFilesystem() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *AlertmanagerSpecContainersSecurityContext) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.ReadOnlyRootFilesystem\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "6cdc79d807fa52e69f27af96b51851ff", "score": "0.67196625", "text": "func (o ThanosRulerSpecInitContainersVolumeMountsOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v ThanosRulerSpecInitContainersVolumeMounts) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "6123e84108777370d878ab664f0949ce", "score": "0.66971296", "text": "func (r *runner) rootReadonly() error {\n\treturn syscall.Mount(\"\", \"/\", \"\", syscall.MS_REMOUNT|syscall.MS_RDONLY, \"\")\n}", "title": "" }, { "docid": "4a1cd879c60cafb85e7fc57e85d821f3", "score": "0.6635757", "text": "func (o AlertmanagerSpecInitContainersVolumeMountsOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v AlertmanagerSpecInitContainersVolumeMounts) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "ab7d490cbfa36145edb6a337328ee7f4", "score": "0.6597966", "text": "func (o PrometheusSpecInitContainersVolumeMountsOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v PrometheusSpecInitContainersVolumeMounts) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "333573f46e7fa01dd02ecdbfe92682eb", "score": "0.6565646", "text": "func (o ThanosRulerSpecContainersVolumeMountsOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v ThanosRulerSpecContainersVolumeMounts) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "28f830a561a5f4f93220cf09dbda67e4", "score": "0.651315", "text": "func (fs *StatVFS) Readonly() bool {\n\treturn fs.Flag&vfsFlagReadonly != 0\n}", "title": "" }, { "docid": "cb467eb5a295e9ad4124b72abe1d5cf8", "score": "0.64891785", "text": "func (o AlertmanagerSpecContainersVolumeMountsOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v AlertmanagerSpecContainersVolumeMounts) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "55d6ab16c5b9485591cacc4330877296", "score": "0.6420229", "text": "func (o AlertmanagerSpecVolumeMountsOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v AlertmanagerSpecVolumeMounts) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "8f3fe3e7475360ea1fa7dc65b7aa2961", "score": "0.63954157", "text": "func (o PrometheusSpecContainersVolumeMountsOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v PrometheusSpecContainersVolumeMounts) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "13e809f9d59d785e5af4cae802b6c9af", "score": "0.62635034", "text": "func (md *RootMetadata) IsReadable() bool {\n\treturn md.ID.IsPublic() || md.data.Dir.IsInitialized()\n}", "title": "" }, { "docid": "d831ecebe00d66c0324bd046a6cda4ca", "score": "0.6166332", "text": "func (o ThanosRulerSpecVolumesStorageosOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v ThanosRulerSpecVolumesStorageos) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "b9ac7a4ada65429cbe1d8a0be4c9ac84", "score": "0.61120856", "text": "func (o ThanosRulerSpecVolumesAwsElasticBlockStoreOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v ThanosRulerSpecVolumesAwsElasticBlockStore) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "e0b0cd458de554156827bdd657cf9112", "score": "0.609429", "text": "func (r *Container) ReadOnly() pulumi.BoolOutput {\n\treturn (pulumi.BoolOutput)(r.s.State[\"readOnly\"])\n}", "title": "" }, { "docid": "9ff75256738fc21a218a91d4d7121409", "score": "0.60876334", "text": "func (o AlertmanagerSpecVolumesStorageosOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v AlertmanagerSpecVolumesStorageos) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "ac12eac98526b1c5eaefcf2e46b73d11", "score": "0.6047944", "text": "func (o AlertmanagerSpecVolumesNfsOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v AlertmanagerSpecVolumesNfs) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "4074010e7b57f1e6170723d14c8d9358", "score": "0.6020247", "text": "func (o ThanosRulerSpecVolumesNfsOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v ThanosRulerSpecVolumesNfs) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "70d1d9e93d8431d3463c751d714615c3", "score": "0.60196894", "text": "func UnixMountIsReadonly(mount_entry *C.GUnixMountEntry) (return__ bool) {\n\tvar __cgo__return__ C.gboolean\n\t__cgo__return__ = C.g_unix_mount_is_readonly(mount_entry)\n\treturn__ = __cgo__return__ == C.gboolean(1)\n\treturn\n}", "title": "" }, { "docid": "b638f3c7b9f203aaf2a258280b2c071f", "score": "0.5991867", "text": "func (o PrometheusSpecVolumesStorageosOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v PrometheusSpecVolumesStorageos) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "5e2631d32774f8dfdaad8f467491eb8e", "score": "0.59821683", "text": "func (o PrometheusSpecVolumesNfsOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v PrometheusSpecVolumesNfs) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "0165c251cd8e7d85ce3f586288b842cc", "score": "0.595447", "text": "func (*CgroupfsManager) IsSystemd() bool {\n\treturn false\n}", "title": "" }, { "docid": "760b06280c873266e2c1c74c7e840e8d", "score": "0.59444904", "text": "func (o PrometheusSpecVolumesAwsElasticBlockStoreOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v PrometheusSpecVolumesAwsElasticBlockStore) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "f8d11b7112eabbde93b0bc87ad3268c0", "score": "0.5912601", "text": "func (o AlertmanagerSpecVolumesGlusterfsOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v AlertmanagerSpecVolumesGlusterfs) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "9f738a1a96cc730056e7adb7eba422c7", "score": "0.5906706", "text": "func (o AlertmanagerSpecVolumesNfsPtrOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *AlertmanagerSpecVolumesNfs) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.ReadOnly\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "ab1ac63a72f1bf775f73f6325dcf7cd2", "score": "0.59065074", "text": "func (o ThanosRulerSpecVolumesGlusterfsOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v ThanosRulerSpecVolumesGlusterfs) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "dd1ba50305c3af6095123681ecf2896f", "score": "0.59054375", "text": "func (o ThanosRulerSpecVolumesAwsElasticBlockStorePtrOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *ThanosRulerSpecVolumesAwsElasticBlockStore) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.ReadOnly\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "8158070aeb67fad076226be58d1fc544", "score": "0.59053737", "text": "func (o AlertmanagerSpecVolumesStorageosPtrOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *AlertmanagerSpecVolumesStorageos) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.ReadOnly\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "4277dc337857da4ef43622f929ff01da", "score": "0.5899838", "text": "func (o AlertmanagerSpecVolumesGcePersistentDiskOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v AlertmanagerSpecVolumesGcePersistentDisk) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "7cd7d9a06de712071b6d1e401d49b894", "score": "0.5885699", "text": "func (o ThanosRulerSpecVolumesStorageosPtrOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *ThanosRulerSpecVolumesStorageos) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.ReadOnly\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "c7210ef90b63f30c48dd16906f010615", "score": "0.5879085", "text": "func (o AlertmanagerSpecVolumesAwsElasticBlockStoreOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v AlertmanagerSpecVolumesAwsElasticBlockStore) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "07f5da24ebfa9b3449052ca3a736adf3", "score": "0.5875668", "text": "func (o ThanosRulerSpecVolumesGcePersistentDiskOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v ThanosRulerSpecVolumesGcePersistentDisk) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "6f8b921a037235ae1967d91b8329f03f", "score": "0.58712244", "text": "func (o PrometheusSpecVolumesNfsPtrOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *PrometheusSpecVolumesNfs) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.ReadOnly\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "1b43a6c631678133c13205eed800b62a", "score": "0.58592206", "text": "func (o PrometheusSpecVolumesGcePersistentDiskOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v PrometheusSpecVolumesGcePersistentDisk) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "0534cf2df5d175f0abe17f866eb57fe8", "score": "0.5856805", "text": "func (o AlertmanagerSpecVolumesCephfsOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v AlertmanagerSpecVolumesCephfs) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "11062cb1aefe6fa955ca916375585d0f", "score": "0.5845992", "text": "func (i *Image) HasRootFs() bool {\n\tfor _, p := range i.Partitions {\n\t\tif p.Name == RootFs {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "eced37ce391bee53fe0b731b491440a1", "score": "0.5844377", "text": "func (o PrometheusSpecVolumesStorageosPtrOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *PrometheusSpecVolumesStorageos) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.ReadOnly\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "86cf9797b99826a1ecbba38d73bdd2a8", "score": "0.58432984", "text": "func (container *Container) canMountFS() bool {\n\treturn true\n}", "title": "" }, { "docid": "9762a5b057d44fbf06954b2c9a7729e5", "score": "0.58266455", "text": "func (o PrometheusSpecVolumesAzureFilePtrOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *PrometheusSpecVolumesAzureFile) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.ReadOnly\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "cedc71d8f59abb52d0dad204b6089c3b", "score": "0.5817518", "text": "func (o PrometheusSpecVolumesAwsElasticBlockStorePtrOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *PrometheusSpecVolumesAwsElasticBlockStore) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.ReadOnly\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "df26f2b00f4a450c7b4e3d09a2aa4787", "score": "0.581492", "text": "func (k *KeyLogger) IsRoot() bool {\n\treturn syscall.Getuid() == 0 && syscall.Geteuid() == 0\n}", "title": "" }, { "docid": "f4534f6d9f4800b6c567d2bf2809ce74", "score": "0.58135635", "text": "func (o ThanosRulerSpecVolumesNfsPtrOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *ThanosRulerSpecVolumesNfs) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.ReadOnly\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "600d384ea810fff216695a032a04ed20", "score": "0.5802996", "text": "func (*filesystem) AllowUserMount() bool {\n\treturn false\n}", "title": "" }, { "docid": "bbf783f45f0f6cdc3dde304c1b512449", "score": "0.57963145", "text": "func (o AlertmanagerSpecVolumesGlusterfsPtrOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *AlertmanagerSpecVolumesGlusterfs) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.ReadOnly\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "b6c7265e432b5225412e8b51b0a36378", "score": "0.5795231", "text": "func (o PrometheusSpecVolumesCephfsOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v PrometheusSpecVolumesCephfs) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "72cd56bef0ee359773dad25a4e6820b4", "score": "0.578997", "text": "func (o PrometheusSpecVolumesGlusterfsOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v PrometheusSpecVolumesGlusterfs) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "02f37800d5876496daa814f6a07b3a44", "score": "0.5781734", "text": "func (o AlertmanagerSpecVolumesRbdOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v AlertmanagerSpecVolumesRbd) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "e4e4c6e346a56a671d7917f053928b66", "score": "0.57775867", "text": "func (o ThanosRulerSpecVolumesCephfsOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v ThanosRulerSpecVolumesCephfs) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "97bb953c6051ef7bd13b8f66a149e3a3", "score": "0.5773494", "text": "func (o ThanosRulerSpecVolumesCinderOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v ThanosRulerSpecVolumesCinder) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "1919c4e404035b586613c28bcc5bba79", "score": "0.576489", "text": "func (*FlushPrivileges) IsReadOnly() bool {\n\treturn false\n}", "title": "" }, { "docid": "ebbe78307b18d2fd46e2cbcfba56c0a4", "score": "0.5757774", "text": "func (o AlertmanagerSpecVolumesAwsElasticBlockStorePtrOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *AlertmanagerSpecVolumesAwsElasticBlockStore) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.ReadOnly\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "172931ce805fb700b44f54185b22e753", "score": "0.5753591", "text": "func (o PrometheusSpecVolumesAzureFileOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v PrometheusSpecVolumesAzureFile) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "32ebe17f6308f4728dd9590e52fc3b17", "score": "0.57501", "text": "func (o PrometheusSpecVolumesAzureDiskOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v PrometheusSpecVolumesAzureDisk) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "d8897811a032a0a2f0178f739c131b6c", "score": "0.5746148", "text": "func (o ThanosRulerSpecVolumesRbdOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v ThanosRulerSpecVolumesRbd) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "1088df2dbf75ff29d0bc58e5faa0d95e", "score": "0.57448864", "text": "func (o AlertmanagerSpecVolumesCinderOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v AlertmanagerSpecVolumesCinder) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "f9a3a8846c36d5a4e8c3a7b61819c8a2", "score": "0.57388085", "text": "func (o AlertmanagerSpecVolumesRbdPtrOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *AlertmanagerSpecVolumesRbd) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.ReadOnly\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "efd006c5567e040475dd52bd3d6aa7ee", "score": "0.57151884", "text": "func (o AlertmanagerSpecVolumesAzureDiskOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v AlertmanagerSpecVolumesAzureDisk) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "5103246b7bffb6bd8863b8ada4bfbf1a", "score": "0.57127684", "text": "func (o AlertmanagerSpecVolumesAzureFilePtrOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *AlertmanagerSpecVolumesAzureFile) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.ReadOnly\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "08b63cc50b980bb882bdc2a4d8867e76", "score": "0.5710779", "text": "func (o ThanosRulerSpecVolumesGlusterfsPtrOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *ThanosRulerSpecVolumesGlusterfs) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.ReadOnly\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "4a5a4c8eada9bf27de25675bc956f61f", "score": "0.5697247", "text": "func (o PrometheusSpecVolumesAzureDiskPtrOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *PrometheusSpecVolumesAzureDisk) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.ReadOnly\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "318c6b321780d9ffb66a8c0ea735eec4", "score": "0.569634", "text": "func (o AlertmanagerSpecVolumesCephfsPtrOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *AlertmanagerSpecVolumesCephfs) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.ReadOnly\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "f541d40b6c041c3615637bd19ecc03d8", "score": "0.5692615", "text": "func (o AlertmanagerSpecVolumesGcePersistentDiskPtrOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *AlertmanagerSpecVolumesGcePersistentDisk) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.ReadOnly\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "4fd790f1d32f17955ee9d3cd0f4ef718", "score": "0.5689835", "text": "func IsRoot() bool {\r\n\treturn isRoot()\r\n}", "title": "" }, { "docid": "9da8c7eb826a9914c43681b7aeff92e1", "score": "0.56871927", "text": "func (o ThanosRulerSpecVolumesAzureFilePtrOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *ThanosRulerSpecVolumesAzureFile) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.ReadOnly\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "cd0222d67990564e02bbb08992c897d4", "score": "0.56867445", "text": "func (o PrometheusSpecVolumesCephfsPtrOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *PrometheusSpecVolumesCephfs) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.ReadOnly\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "949b22eb3254f5a430ee7a30ccd158be", "score": "0.56772166", "text": "func (o PrometheusSpecVolumesGlusterfsPtrOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *PrometheusSpecVolumesGlusterfs) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.ReadOnly\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "1f3aa41a21fe7a6db31f30c579d2375a", "score": "0.56725276", "text": "func (o PrometheusSpecVolumesRbdOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v PrometheusSpecVolumesRbd) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "07522002785c4045e4bccf2fc94f923d", "score": "0.56652486", "text": "func (o AlertmanagerSpecVolumesAzureFileOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v AlertmanagerSpecVolumesAzureFile) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "af8a805edcf09634fddaa020d13d4c86", "score": "0.56620437", "text": "func (o PrometheusSpecVolumesCinderOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v PrometheusSpecVolumesCinder) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "5e67ad1874daf22dd66f85930308e735", "score": "0.56616867", "text": "func (o ThanosRulerSpecVolumesAzureFileOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v ThanosRulerSpecVolumesAzureFile) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "7361cbd75a1d6c2d70e8f7d2d961aef4", "score": "0.56596994", "text": "func (u *User) IsRoot() bool {\n\treturn u.uid == 0 || u.gid == 0\n}", "title": "" }, { "docid": "090a6232818eed0f5504e582d819c98f", "score": "0.5656132", "text": "func IsRoot() (r bool) {\n\tr = syscall.Getuid() == 0\n\treturn\n}", "title": "" }, { "docid": "28cf22fdfbb981858b07bdf353ae2900", "score": "0.56487775", "text": "func (o AlertmanagerSpecVolumesScaleIOOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v AlertmanagerSpecVolumesScaleIO) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "71c1652f5777b396964096fd5212b017", "score": "0.5647877", "text": "func (o PrometheusSpecVolumesGcePersistentDiskPtrOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *PrometheusSpecVolumesGcePersistentDisk) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.ReadOnly\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "92caeeb4edd5be44fd9a9422e95e476a", "score": "0.56453145", "text": "func ReadOnly() MountOption {\n\treturn func(conf *MountConfig) error {\n\t\tconf.options[\"ro\"] = \"\"\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "f433cde16084269e885bd5090e823522", "score": "0.5642207", "text": "func (o PrometheusSpecVolumesRbdPtrOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *PrometheusSpecVolumesRbd) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.ReadOnly\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "1f5cf8c6edb8376e5cbd031053f90e9e", "score": "0.5639438", "text": "func (o ThanosRulerSpecVolumesAzureDiskOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v ThanosRulerSpecVolumesAzureDisk) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "0b732911396dd623b56c4c853b30d7cf", "score": "0.56392956", "text": "func IsFileSystemMinioDisabled(kotsadmNamespace string) (bool, error) {\n\tclientset, err := k8sutil.GetClientset()\n\tif err != nil {\n\t\treturn false, errors.Wrap(err, \"failed to get kubernetes clientset\")\n\t}\n\n\t//Minio disabled is detected based on two cases\n\t// 1. minio image is not present in the cluster\n\t// 2. disableS3 flag is enabled\n\tminioImage, err := image.GetMinioImage(clientset, kotsadmNamespace)\n\tif err != nil {\n\t\treturn false, errors.Wrap(err, \"failed to check minio image\")\n\t}\n\tif minioImage == \"\" {\n\t\treturn true, nil\n\t}\n\n\t// Get minio snapshot migration status v1.48.0\n\tkostadmConfig, err := clientset.CoreV1().ConfigMaps(kotsadmNamespace).Get(context.TODO(), \"kotsadm-confg\", metav1.GetOptions{})\n\tif err != nil {\n\t\tif kuberneteserrors.IsNotFound(err) {\n\t\t\t// TODO (dans) this behavior needs to change when this feature is opt-out.\n\t\t\treturn false, nil\n\t\t}\n\t\treturn false, errors.Wrap(err, \"failed to get kotsadm-config map\")\n\t}\n\tvar minioEnabled bool\n\tif v, ok := kostadmConfig.Data[\"minio-enabled-snapshots\"]; ok {\n\t\tminioEnabled, err = strconv.ParseBool(v)\n\t\tif err != nil {\n\t\t\treturn false, errors.Wrap(err, \"failed to parse minio-enabled-snapshots from kotsadm-confg\")\n\t\t}\n\t\treturn !minioEnabled, nil\n\t}\n\n\treturn false, nil\n}", "title": "" }, { "docid": "6e4ae4b96ada3d866e8613d7ac27af5c", "score": "0.5636395", "text": "func (*Filesystem) AllowUserMount() bool {\n\treturn false\n}", "title": "" }, { "docid": "c4759edd30c95796b09090c617a31698", "score": "0.5633285", "text": "func (o ThanosRulerSpecVolumesRbdPtrOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *ThanosRulerSpecVolumesRbd) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.ReadOnly\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "cf3fefa2b4982e55be2926fc30288b71", "score": "0.5631238", "text": "func (o ThanosRulerSpecVolumesFcOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v ThanosRulerSpecVolumesFc) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "04fd370052d34d699f5f8d0a9d68e47e", "score": "0.5624605", "text": "func (o AlertmanagerSpecVolumesFcPtrOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *AlertmanagerSpecVolumesFc) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.ReadOnly\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "cdbaef1febfc745fa5c434dd7a8c9682", "score": "0.5623882", "text": "func (o ThanosRulerSpecVolumesScaleIOOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v ThanosRulerSpecVolumesScaleIO) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "45856f09d25990bcedd397ce6c9670b5", "score": "0.5622426", "text": "func (o AlertmanagerSpecVolumesFcOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v AlertmanagerSpecVolumesFc) *bool { return v.ReadOnly }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "6ae696cd0adaf330917ba11fb9351f6f", "score": "0.5617844", "text": "func (o AlertmanagerSpecVolumesAzureDiskPtrOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *AlertmanagerSpecVolumesAzureDisk) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.ReadOnly\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "6ff5f88b5f3c154c5ecd761d693426b4", "score": "0.5612363", "text": "func (*filesystem) AllowUserMount() bool {\n\treturn true\n}", "title": "" }, { "docid": "bc45c608a5887ce91e3661983fb475b4", "score": "0.5607955", "text": "func (o AlertmanagerSpecVolumesScaleIOPtrOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *AlertmanagerSpecVolumesScaleIO) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.ReadOnly\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "999d8e2281be670d6a800c5de4cf87d6", "score": "0.56066483", "text": "func (store *MemJWTStore) IsReadOnly() bool {\n\treturn store.readonly\n}", "title": "" }, { "docid": "c519c8cba7e2e6a1ee03792f61451250", "score": "0.55933595", "text": "func (o ThanosRulerSpecVolumesGcePersistentDiskPtrOutput) ReadOnly() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *ThanosRulerSpecVolumesGcePersistentDisk) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.ReadOnly\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" } ]
27ab1a4a60f2ff9b6df2148ceeacedc6
Uint64sIntsF creates a new slice with the results of calling the provided function on every element in the given array. If the given function returns an error, the element will be ignored.
[ { "docid": "fd93d92cf6c733e06da44c7f408893db", "score": "0.7713827", "text": "func Uint64sIntsF(s []uint64, f func(s uint64) (int, error)) ints.Ints {\n\tm := ints.Ints(make([]int, 0, len(s)))\n\tvar (\n\t\tx int\n\t\terr error\n\t)\n\tfor _, v := range s {\n\t\tx, err = f(v)\n\t\tif err != nil {\n\t\t\tcontinue\n\t\t}\n\t\tm = append(m, x)\n\t}\n\treturn m\n}", "title": "" } ]
[ { "docid": "4aa94d95d10e91acae4156d5330ca8af", "score": "0.75276124", "text": "func Uint64sInt64sF(s []uint64, f func(s uint64) (int64, error)) int64s.Int64s {\n\tm := int64s.Int64s(make([]int64, 0, len(s)))\n\tvar (\n\t\tx int64\n\t\terr error\n\t)\n\tfor _, v := range s {\n\t\tx, err = f(v)\n\t\tif err != nil {\n\t\t\tcontinue\n\t\t}\n\t\tm = append(m, x)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "d1df23ea77e8f7c379d2d35d38126cb7", "score": "0.710524", "text": "func Uint64sInts(s []uint64, f func(s uint64) int) ints.Ints {\n\tm := ints.Ints(make([]int, len(s)))\n\tfor i, v := range s {\n\t\tm[i] = f(v)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "003c810904fd9501e05e51c4bb1d789c", "score": "0.6801481", "text": "func Uint64sUintsF(s []uint64, f func(s uint64) (uint, error)) uints.Uints {\n\tm := uints.Uints(make([]uint, 0, len(s)))\n\tvar (\n\t\tx uint\n\t\terr error\n\t)\n\tfor _, v := range s {\n\t\tx, err = f(v)\n\t\tif err != nil {\n\t\t\tcontinue\n\t\t}\n\t\tm = append(m, x)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "b8c7cc3228c3b1f6e95aae5249c61271", "score": "0.6799534", "text": "func Uint64sInterfacesF(s []uint64, f func(s uint64) (interface{}, error)) interfaces.Interfaces {\n\tm := interfaces.Interfaces(make([]interface{}, 0, len(s)))\n\tvar (\n\t\tx interface{}\n\t\terr error\n\t)\n\tfor _, v := range s {\n\t\tx, err = f(v)\n\t\tif err != nil {\n\t\t\tcontinue\n\t\t}\n\t\tm = append(m, x)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "d2d62fb359a6a13fda39448648d24d83", "score": "0.6779995", "text": "func Uint64sInt64s(s []uint64, f func(s uint64) int64) int64s.Int64s {\n\tm := int64s.Int64s(make([]int64, len(s)))\n\tfor i, v := range s {\n\t\tm[i] = f(v)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "1baface352d8881b230cb3b8aaca0be6", "score": "0.6625637", "text": "func Uint64sIntsE(s []uint64, f func(s uint64) (int, error)) (ints.Ints, error) {\n\tm := ints.Ints(make([]int, len(s)))\n\tvar err error\n\tfor i, v := range s {\n\t\tm[i], err = f(v)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn m, nil\n}", "title": "" }, { "docid": "f916d5a0bba1c0b1af61e13b21c9e334", "score": "0.65363246", "text": "func Uint64sInt32sF(s []uint64, f func(s uint64) (int32, error)) int32s.Int32s {\n\tm := int32s.Int32s(make([]int32, 0, len(s)))\n\tvar (\n\t\tx int32\n\t\terr error\n\t)\n\tfor _, v := range s {\n\t\tx, err = f(v)\n\t\tif err != nil {\n\t\t\tcontinue\n\t\t}\n\t\tm = append(m, x)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "28fc7a106397afa6f6e4a43603872478", "score": "0.6500797", "text": "func (a arrayUInt64) MapInt64(f func(uint64) int64) arrayInt64 {\n\tvar r = make(arrayInt64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayInt64(r)\n}", "title": "" }, { "docid": "6feedb0b4dac602cb516ee8455b1834c", "score": "0.6443072", "text": "func Uint64sInt64sE(s []uint64, f func(s uint64) (int64, error)) (int64s.Int64s, error) {\n\tm := int64s.Int64s(make([]int64, len(s)))\n\tvar err error\n\tfor i, v := range s {\n\t\tm[i], err = f(v)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn m, nil\n}", "title": "" }, { "docid": "c6b03cf0817e533717886046ad5cda74", "score": "0.6418677", "text": "func Uint64sInt8sF(s []uint64, f func(s uint64) (int8, error)) int8s.Int8s {\n\tm := int8s.Int8s(make([]int8, 0, len(s)))\n\tvar (\n\t\tx int8\n\t\terr error\n\t)\n\tfor _, v := range s {\n\t\tx, err = f(v)\n\t\tif err != nil {\n\t\t\tcontinue\n\t\t}\n\t\tm = append(m, x)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "aff5cd584417aa53cb25b45fb5217e24", "score": "0.63785934", "text": "func (a arrayUInt) MapInt64(f func(uint) int64) arrayInt64 {\n\tvar r = make(arrayInt64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayInt64(r)\n}", "title": "" }, { "docid": "3c2b56112ff20d51f63739a1ddf06da8", "score": "0.63514936", "text": "func (a arrayUInt8) MapInt64(f func(uint8) int64) arrayInt64 {\n\tvar r = make(arrayInt64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayInt64(r)\n}", "title": "" }, { "docid": "b08b8b4a480f2dde6d4bf40afaa60633", "score": "0.62818277", "text": "func Uint64sUintptrsF(s []uint64, f func(s uint64) (uintptr, error)) uintptrs.Uintptrs {\n\tm := uintptrs.Uintptrs(make([]uintptr, 0, len(s)))\n\tvar (\n\t\tx uintptr\n\t\terr error\n\t)\n\tfor _, v := range s {\n\t\tx, err = f(v)\n\t\tif err != nil {\n\t\t\tcontinue\n\t\t}\n\t\tm = append(m, x)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "498a06e312e941aa40e8621e89cb7205", "score": "0.6264603", "text": "func Uint64sUint32sF(s []uint64, f func(s uint64) (uint32, error)) uint32s.Uint32s {\n\tm := uint32s.Uint32s(make([]uint32, 0, len(s)))\n\tvar (\n\t\tx uint32\n\t\terr error\n\t)\n\tfor _, v := range s {\n\t\tx, err = f(v)\n\t\tif err != nil {\n\t\t\tcontinue\n\t\t}\n\t\tm = append(m, x)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "958ce885987911fa02a4f10d82e24f0d", "score": "0.62508756", "text": "func (a arrayInt64) MapInt64(f func(int64) int64) arrayInt64 {\n\tvar r = make(arrayInt64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayInt64(r)\n}", "title": "" }, { "docid": "4380bd28e150a8c8bef4611b2d63f433", "score": "0.6235454", "text": "func Uint64sBytesF(s []uint64, f func(s uint64) (byte, error)) bytes.Bytes {\n\tm := bytes.Bytes(make([]byte, 0, len(s)))\n\tvar (\n\t\tx byte\n\t\terr error\n\t)\n\tfor _, v := range s {\n\t\tx, err = f(v)\n\t\tif err != nil {\n\t\t\tcontinue\n\t\t}\n\t\tm = append(m, x)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "717af797e76e2bda3e7e391bc8645f95", "score": "0.6222264", "text": "func (a arrayUintPtr) MapInt64(f func(uintptr) int64) arrayInt64 {\n\tvar r = make(arrayInt64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayInt64(r)\n}", "title": "" }, { "docid": "961a1a30a5544b7a8341446961e7a52f", "score": "0.6217125", "text": "func (a arrayInt64) MapUInt64(f func(int64) uint64) arrayUInt64 {\n\tvar r = make(arrayUInt64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayUInt64(r)\n}", "title": "" }, { "docid": "9d8fd119a57925c46a8f2bfde99d3cce", "score": "0.6207193", "text": "func (a arrayUInt32) MapInt64(f func(uint32) int64) arrayInt64 {\n\tvar r = make(arrayInt64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayInt64(r)\n}", "title": "" }, { "docid": "ce4e19eff0c6ce20a41c6b597d0bba69", "score": "0.61543405", "text": "func (a arrayInt8) MapInt64(f func(int8) int64) arrayInt64 {\n\tvar r = make(arrayInt64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayInt64(r)\n}", "title": "" }, { "docid": "8b897fe13406647661e23efd25830dbc", "score": "0.6138128", "text": "func Uint64sRunesF(s []uint64, f func(s uint64) (rune, error)) runes.Runes {\n\tm := runes.Runes(make([]rune, 0, len(s)))\n\tvar (\n\t\tx rune\n\t\terr error\n\t)\n\tfor _, v := range s {\n\t\tx, err = f(v)\n\t\tif err != nil {\n\t\t\tcontinue\n\t\t}\n\t\tm = append(m, x)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "a3daf8bd3e6bea1c8cbef458689a8902", "score": "0.6127559", "text": "func Uint64sInt16sF(s []uint64, f func(s uint64) (int16, error)) int16s.Int16s {\n\tm := int16s.Int16s(make([]int16, 0, len(s)))\n\tvar (\n\t\tx int16\n\t\terr error\n\t)\n\tfor _, v := range s {\n\t\tx, err = f(v)\n\t\tif err != nil {\n\t\t\tcontinue\n\t\t}\n\t\tm = append(m, x)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "d1ed515b455248a379e381bd06643a40", "score": "0.6103195", "text": "func Uint64sInterfaces(s []uint64, f func(s uint64) interface{}) interfaces.Interfaces {\n\tm := interfaces.Interfaces(make([]interface{}, len(s)))\n\tfor i, v := range s {\n\t\tm[i] = f(v)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "3c7f7d19b2317adea3fa1c0d481bddd9", "score": "0.6099423", "text": "func (a arrayInt8) MapUInt64(f func(int8) uint64) arrayUInt64 {\n\tvar r = make(arrayUInt64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayUInt64(r)\n}", "title": "" }, { "docid": "1c1758c03945a720d1907ae4a80ff5eb", "score": "0.60907656", "text": "func (a arrayUInt64) MapUInt64(f func(uint64) uint64) arrayUInt64 {\n\tvar r = make(arrayUInt64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayUInt64(r)\n}", "title": "" }, { "docid": "9fe81c47151bebfcbe98c524679abcb2", "score": "0.6088654", "text": "func Int64Slice(src []int64) []*int64 {\n\tdst := make([]*int64, len(src))\n\tfor i := range src {\n\t\tdst[i] = &(src[i])\n\t}\n\treturn dst\n}", "title": "" }, { "docid": "5e170da86cd8e185f492d7171ec70727", "score": "0.6079931", "text": "func (a arrayFloat64) MapInt64(f func(float64) int64) arrayInt64 {\n\tvar r = make(arrayInt64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayInt64(r)\n}", "title": "" }, { "docid": "c47485c0249ce4ca9d52aaeafa073862", "score": "0.6079728", "text": "func (a arrayInt) MapInt64(f func(int) int64) arrayInt64 {\n\tvar r = make(arrayInt64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayInt64(r)\n}", "title": "" }, { "docid": "1165553e694020730db5550c93fe9459", "score": "0.60707724", "text": "func Uint64sUints(s []uint64, f func(s uint64) uint) uints.Uints {\n\tm := uints.Uints(make([]uint, len(s)))\n\tfor i, v := range s {\n\t\tm[i] = f(v)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "ce3bc1c283d37fffde3b176be668a0d4", "score": "0.6067356", "text": "func forEachInSlice(slice []uint64, fn func(uint64)) {\n\tfor _, val := range slice {\n\t\tfn(val)\n\t}\n}", "title": "" }, { "docid": "9ac58770c158436b2e8db3114efdc6ca", "score": "0.6065454", "text": "func (a arrayUInt64) MapInt(f func(uint64) int) arrayInt {\n\tvar r = make(arrayInt, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayInt(r)\n}", "title": "" }, { "docid": "196e17a908208536874700b7f43cfc40", "score": "0.60512275", "text": "func (a arrayInt) MapUInt64(f func(int) uint64) arrayUInt64 {\n\tvar r = make(arrayUInt64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayUInt64(r)\n}", "title": "" }, { "docid": "2229f4e365167f1d5f558eed652880e1", "score": "0.600419", "text": "func FilterUint64(f func(uint64, int) bool, input []uint64) (output []uint64) {\n\toutput = make([]uint64, 0)\n\tfor idx, data := range input {\n\t\tif f(data, idx) {\n\t\t\toutput = append(output, data)\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "5359f2adaec65d7187630dc6946f6acb", "score": "0.60026056", "text": "func (a arrayInt32) MapUInt64(f func(int32) uint64) arrayUInt64 {\n\tvar r = make(arrayUInt64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayUInt64(r)\n}", "title": "" }, { "docid": "e791b5ac78d90c50ae64c463f5ad60d5", "score": "0.5971689", "text": "func Uint64sUint8sF(s []uint64, f func(s uint64) (uint8, error)) uint8s.Uint8s {\n\tm := uint8s.Uint8s(make([]uint8, 0, len(s)))\n\tvar (\n\t\tx uint8\n\t\terr error\n\t)\n\tfor _, v := range s {\n\t\tx, err = f(v)\n\t\tif err != nil {\n\t\t\tcontinue\n\t\t}\n\t\tm = append(m, x)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "bb46c89f3646b68cb71a75987f0b978b", "score": "0.5957285", "text": "func (a arrayByte) MapInt64(f func(byte) int64) arrayInt64 {\n\tvar r = make(arrayInt64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayInt64(r)\n}", "title": "" }, { "docid": "64303a99b175b2235e66ae707bf20339", "score": "0.59239215", "text": "func (a arrayUInt8) MapUInt64(f func(uint8) uint64) arrayUInt64 {\n\tvar r = make(arrayUInt64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayUInt64(r)\n}", "title": "" }, { "docid": "4198676324544518a058952be1b7ee88", "score": "0.59218884", "text": "func Int64s(key string, vs []int64) Field {\n\treturn Array(key,int64s(vs))\n}", "title": "" }, { "docid": "5a19e7136a62f6afd76f65aee0c6a63c", "score": "0.59080344", "text": "func (a arrayFloat64) MapUInt64(f func(float64) uint64) arrayUInt64 {\n\tvar r = make(arrayUInt64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayUInt64(r)\n}", "title": "" }, { "docid": "fdb9c57a6fe052d35b2127514f829395", "score": "0.58998066", "text": "func (a arrayInt16) MapInt64(f func(int16) int64) arrayInt64 {\n\tvar r = make(arrayInt64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayInt64(r)\n}", "title": "" }, { "docid": "120081b56d33244d793a123ef9ab0584", "score": "0.58948094", "text": "func (a arrayUInt16) MapInt64(f func(uint16) int64) arrayInt64 {\n\tvar r = make(arrayInt64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayInt64(r)\n}", "title": "" }, { "docid": "42fcfae43a31094999266474e21765be", "score": "0.5888549", "text": "func (a arrayInt32) MapInt64(f func(int32) int64) arrayInt64 {\n\tvar r = make(arrayInt64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayInt64(r)\n}", "title": "" }, { "docid": "36851a1d540740a5b1930a04d0f6cb84", "score": "0.58673716", "text": "func Uint64sFloat64sF(s []uint64, f func(s uint64) (float64, error)) float64s.Float64s {\n\tm := float64s.Float64s(make([]float64, 0, len(s)))\n\tvar (\n\t\tx float64\n\t\terr error\n\t)\n\tfor _, v := range s {\n\t\tx, err = f(v)\n\t\tif err != nil {\n\t\t\tcontinue\n\t\t}\n\t\tm = append(m, x)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "d398eaefa7d27e23a6e82a06e1222b72", "score": "0.58609027", "text": "func (a arrayUInt32) MapUInt64(f func(uint32) uint64) arrayUInt64 {\n\tvar r = make(arrayUInt64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayUInt64(r)\n}", "title": "" }, { "docid": "8f3ab3bc8c93ab885da0651934d1b2db", "score": "0.58484787", "text": "func FilterInt64(f func(int64, int) bool, input []int64) (output []int64) {\n\toutput = make([]int64, 0)\n\tfor idx, data := range input {\n\t\tif f(data, idx) {\n\t\t\toutput = append(output, data)\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "d9ca56fca6431374343d8e2a409e4f90", "score": "0.5845295", "text": "func ToSliceByUint64(items []uint64) []interface{} {\n\tvar result = make([]interface{}, 0, len(items))\n\tfor _, item := range items {\n\t\tresult = append(result, item)\n\t}\n\treturn result\n}", "title": "" }, { "docid": "e7a83fd32c5618ebc1fe32b3584667b1", "score": "0.5838521", "text": "func (a arrayUInt) MapUInt64(f func(uint) uint64) arrayUInt64 {\n\tvar r = make(arrayUInt64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayUInt64(r)\n}", "title": "" }, { "docid": "c52305a41a84e732b10d5207e4bb81a8", "score": "0.5820912", "text": "func Uint64sBoolsF(s []uint64, f func(s uint64) (bool, error)) bools.Bools {\n\tm := bools.Bools(make([]bool, 0, len(s)))\n\tvar (\n\t\tx bool\n\t\terr error\n\t)\n\tfor _, v := range s {\n\t\tx, err = f(v)\n\t\tif err != nil {\n\t\t\tcontinue\n\t\t}\n\t\tm = append(m, x)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "f48c5d92df56e460f5d4a2faee1d88c8", "score": "0.5787962", "text": "func (a arrayFloat32) MapInt64(f func(float32) int64) arrayInt64 {\n\tvar r = make(arrayInt64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayInt64(r)\n}", "title": "" }, { "docid": "b574cd8bff161f43a38bd81da6b8ac8a", "score": "0.57834166", "text": "func (a arrayComplex64) MapInt64(f func(complex64) int64) arrayInt64 {\n\tvar r = make(arrayInt64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayInt64(r)\n}", "title": "" }, { "docid": "ebed3774bbf2cc2bd6a94372617e4adb", "score": "0.57701296", "text": "func (a arrayInt64) MapFloat64(f func(int64) float64) arrayFloat64 {\n\tvar r = make(arrayFloat64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayFloat64(r)\n}", "title": "" }, { "docid": "ff99cd14b0793f7bf67436d190dce9a1", "score": "0.5757332", "text": "func GenInt64Array(min int64, max int64) []int64 {\n\tvar a []int64\n\tfor i := min; i <= max; i++ {\n\t\ta = append(a, i)\n\t}\n\treturn a\n}", "title": "" }, { "docid": "93c27da020729b7105f31155ac6db19e", "score": "0.5745487", "text": "func Uint64sInt32s(s []uint64, f func(s uint64) int32) int32s.Int32s {\n\tm := int32s.Int32s(make([]int32, len(s)))\n\tfor i, v := range s {\n\t\tm[i] = f(v)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "3b236bd83717b121e30e6abb44bde7c2", "score": "0.57445234", "text": "func Uint64sComplex64sF(s []uint64, f func(s uint64) (complex64, error)) complex64s.Complex64s {\n\tm := complex64s.Complex64s(make([]complex64, 0, len(s)))\n\tvar (\n\t\tx complex64\n\t\terr error\n\t)\n\tfor _, v := range s {\n\t\tx, err = f(v)\n\t\tif err != nil {\n\t\t\tcontinue\n\t\t}\n\t\tm = append(m, x)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "d75ca2cf1e9337f940404efdc5fc33ca", "score": "0.57339776", "text": "func ToSliceByInt64(items []int64) []interface{} {\n\tvar result = make([]interface{}, 0, len(items))\n\tfor _, item := range items {\n\t\tresult = append(result, item)\n\t}\n\treturn result\n}", "title": "" }, { "docid": "a5af9761c56e67d20dbf1ee8953ee54f", "score": "0.5732077", "text": "func Int64ValueSlice(src []*int64) []int64 {\n\tdst := make([]int64, len(src))\n\tfor i := range src {\n\t\tif src[i] != nil {\n\t\t\tdst[i] = *(src[i])\n\t\t}\n\t}\n\treturn dst\n}", "title": "" }, { "docid": "e3443a8a5fe51a38c1a7284aacb5a890", "score": "0.5719392", "text": "func (a arrayFloat32) MapUInt64(f func(float32) uint64) arrayUInt64 {\n\tvar r = make(arrayUInt64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayUInt64(r)\n}", "title": "" }, { "docid": "36684424f38bba8d0d872b38cb4edaa8", "score": "0.5718751", "text": "func Uint64sInt8s(s []uint64, f func(s uint64) int8) int8s.Int8s {\n\tm := int8s.Int8s(make([]int8, len(s)))\n\tfor i, v := range s {\n\t\tm[i] = f(v)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "84833f211541b7265b5823eabaf0f51a", "score": "0.5716648", "text": "func (a arrayInt) MapFloat64(f func(int) float64) arrayFloat64 {\n\tvar r = make(arrayFloat64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayFloat64(r)\n}", "title": "" }, { "docid": "f92e8b7ad7688eb40b0dc15c0383f371", "score": "0.57108694", "text": "func (a arrayUintPtr) MapUInt64(f func(uintptr) uint64) arrayUInt64 {\n\tvar r = make(arrayUInt64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayUInt64(r)\n}", "title": "" }, { "docid": "674bca40dd52e5c8f0d87ff2a0c901e2", "score": "0.5700993", "text": "func (a arrayUInt64) MapFloat64(f func(uint64) float64) arrayFloat64 {\n\tvar r = make(arrayFloat64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayFloat64(r)\n}", "title": "" }, { "docid": "c23ee3a8cac6f37780b578f6d23b0280", "score": "0.569779", "text": "func (a arrayString) MapInt64(f func(string) int64) arrayInt64 {\n\tvar r = make(arrayInt64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayInt64(r)\n}", "title": "" }, { "docid": "48d1d626611906d40fe3fed0713f4ba2", "score": "0.5688772", "text": "func (a arrayComplex64) MapUInt64(f func(complex64) uint64) arrayUInt64 {\n\tvar r = make(arrayUInt64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayUInt64(r)\n}", "title": "" }, { "docid": "4b137cf4d5ac99e41dd58179b4e012ea", "score": "0.5687543", "text": "func Uint64SliceToInt64Slice(vals []uint64) []int64 {\n\treturn *(*[]int64)(unsafe.Pointer(&reflect.SliceHeader{\n\t\tData: uintptr(unsafe.Pointer(&vals[0])),\n\t\tLen: len(vals),\n\t\tCap: cap(vals),\n\t}))\n}", "title": "" }, { "docid": "a10cc6275de79eceaf61cd4866af23c0", "score": "0.56819814", "text": "func (a arrayInt64) MapInt(f func(int64) int) arrayInt {\n\tvar r = make(arrayInt, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayInt(r)\n}", "title": "" }, { "docid": "4ea4dcb66ae2d1d26fbbf1a666278edd", "score": "0.56727624", "text": "func Uint64sUintsE(s []uint64, f func(s uint64) (uint, error)) (uints.Uints, error) {\n\tm := uints.Uints(make([]uint, len(s)))\n\tvar err error\n\tfor i, v := range s {\n\t\tm[i], err = f(v)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn m, nil\n}", "title": "" }, { "docid": "121e73fa2108ce7f5ea1154af506cb2b", "score": "0.5658559", "text": "func (a arrayByte) MapUInt64(f func(byte) uint64) arrayUInt64 {\n\tvar r = make(arrayUInt64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayUInt64(r)\n}", "title": "" }, { "docid": "24ada75191a8577ec864a126ebd58b3e", "score": "0.56542647", "text": "func Uint64sStringsF(s []uint64, f func(s uint64) (string, error)) strings.Strings {\n\tm := strings.Strings(make([]string, 0, len(s)))\n\tvar (\n\t\tx string\n\t\terr error\n\t)\n\tfor _, v := range s {\n\t\tx, err = f(v)\n\t\tif err != nil {\n\t\t\tcontinue\n\t\t}\n\t\tm = append(m, x)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "92cddafa85ea33c13ed356db4457223e", "score": "0.56364495", "text": "func (a arrayBool) MapInt64(f func(bool) int64) arrayInt64 {\n\tvar r = make(arrayInt64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayInt64(r)\n}", "title": "" }, { "docid": "9ce1e22bcd97d369bd84407da239890a", "score": "0.5636338", "text": "func FilterInt64s(x []int64, filter func(int64) bool) []int64 {\n\ty := x[:0]\n\tfor _, v := range x {\n\t\tif filter(v) {\n\t\t\ty = append(y, v)\n\t\t}\n\t}\n\treturn y\n}", "title": "" }, { "docid": "9551f4199a41167bf5e0af58e7a8c9c5", "score": "0.5625557", "text": "func (a arrayComplex128) MapInt64(f func(complex128) int64) arrayInt64 {\n\tvar r = make(arrayInt64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayInt64(r)\n}", "title": "" }, { "docid": "5a3c7f302d98a51163030256f04bbce7", "score": "0.56229526", "text": "func (a arrayInt16) MapUInt64(f func(int16) uint64) arrayUInt64 {\n\tvar r = make(arrayUInt64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayUInt64(r)\n}", "title": "" }, { "docid": "a15573b945c067f5b96c66f79999efd2", "score": "0.5607618", "text": "func (a arrayUInt) MapFloat64(f func(uint) float64) arrayFloat64 {\n\tvar r = make(arrayFloat64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayFloat64(r)\n}", "title": "" }, { "docid": "0d3031591b8ac2a1d83acbee64669a49", "score": "0.5597171", "text": "func (a arrayInt64) MapUInt(f func(int64) uint) arrayUInt {\n\tvar r = make(arrayUInt, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayUInt(r)\n}", "title": "" }, { "docid": "369dbf4bdf529647a85ad3687b1ac65a", "score": "0.5595091", "text": "func Uint64sBytes(s []uint64, f func(s uint64) byte) bytes.Bytes {\n\tm := bytes.Bytes(make([]byte, len(s)))\n\tfor i, v := range s {\n\t\tm[i] = f(v)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "097ef20e22edcf49a4c5374da40d516b", "score": "0.5592286", "text": "func (a arrayUInt64) ReduceInt64(f func(uint64, int, ArrayUInt64) int64, initial int64) int64 {\n\tvar r int64 = initial\n\tfor i, e := range a { \n\t\tr = f(e, i, a)\n\t}\n\treturn r\n}", "title": "" }, { "docid": "80fdc3740d88cbda1186d6f06362a224", "score": "0.5583354", "text": "func Int64SliceToUint64Slice(vals []int64) []uint64 {\n\treturn *(*[]uint64)(unsafe.Pointer(&reflect.SliceHeader{\n\t\tData: uintptr(unsafe.Pointer(&vals[0])),\n\t\tLen: len(vals),\n\t\tCap: cap(vals),\n\t}))\n}", "title": "" }, { "docid": "02acf16c0c4c09e8049db4ae6a2b4223", "score": "0.5583035", "text": "func (a arrayUInt64) Each(f func(uint64)) {\n\tfor _, e := range a { f(e) }\n}", "title": "" }, { "docid": "3b9d3591984a06ce43e96e62ff950259", "score": "0.55771315", "text": "func FromStdInt64Slice(s []int64) []Int64 {\n\treturn *((*[]Int64)(unsafe.Pointer(&s)))\n}", "title": "" }, { "docid": "f44a5916281373ab5971d7744db9651b", "score": "0.5571241", "text": "func (a arrayUInt) ReduceInt64(f func(uint, int, ArrayUInt) int64, initial int64) int64 {\n\tvar r int64 = initial\n\tfor i, e := range a { \n\t\tr = f(e, i, a)\n\t}\n\treturn r\n}", "title": "" }, { "docid": "380b70778def0ce170e1f7baddd9601b", "score": "0.5562569", "text": "func Float64s(slice []float64, fn func(v float64) bool) []float64 {\n\tb := slice[:0]\n\tfor _, v := range slice {\n\t\tif fn(v) {\n\t\t\tb = append(b, v)\n\t\t}\n\t}\n\treturn b\n}", "title": "" }, { "docid": "ff2781455462dc0eebea63559df699d0", "score": "0.5555443", "text": "func FuncIOSliceUint32Length[T any, S ~*[]T](r IO, x S, f func(IO, *T)) {\n\tcount := uint32(len(*x))\n\tr.Uint32(&count)\n\tFuncIOSliceOfLen(r, count, x, f)\n}", "title": "" }, { "docid": "7a1fbf7c110da23283290e41418eaffc", "score": "0.555485", "text": "func Uint64sUint16sF(s []uint64, f func(s uint64) (uint16, error)) uint16s.Uint16s {\n\tm := uint16s.Uint16s(make([]uint16, 0, len(s)))\n\tvar (\n\t\tx uint16\n\t\terr error\n\t)\n\tfor _, v := range s {\n\t\tx, err = f(v)\n\t\tif err != nil {\n\t\t\tcontinue\n\t\t}\n\t\tm = append(m, x)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "97a1e66f8c285ecffa4981f07720790a", "score": "0.55541575", "text": "func UnsafeToInt64Slice(ptr unsafe.Pointer, sz uint64) []int64 {\n\treturn *(*[]int64)(unsafe.Pointer(&reflect.SliceHeader{\n\t\tData: uintptr(ptr),\n\t\tLen: int(sz),\n\t\tCap: int(sz),\n\t}))\n}", "title": "" }, { "docid": "ccaa81b18ed8ed6fdea57a311155f344", "score": "0.5552268", "text": "func (a arrayUInt8) ReduceInt64(f func(uint8, int, ArrayUInt8) int64, initial int64) int64 {\n\tvar r int64 = initial\n\tfor i, e := range a { \n\t\tr = f(e, i, a)\n\t}\n\treturn r\n}", "title": "" }, { "docid": "cfa4343a54b5bb612059ae5b80f37f77", "score": "0.5531058", "text": "func Int64s(key string, val []int64) Field {\n\treturn Field{Key: key, Val: Int64sValue(val)}\n}", "title": "" }, { "docid": "1c411c7bf9607ed3c0179fe32131cf77", "score": "0.5530329", "text": "func CreateInt64SliceOfSize(n int) []int64 {\n\ta := make([]int64, n)\n\tfor i := 0; i < n; i++ {\n\t\tfmt.Scan(&a[i])\n\t}\n\treturn a\n}", "title": "" }, { "docid": "2bd9d71bb97a0317ba97bebe3fed2d1c", "score": "0.552978", "text": "func (a arrayString) MapUInt64(f func(string) uint64) arrayUInt64 {\n\tvar r = make(arrayUInt64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayUInt64(r)\n}", "title": "" }, { "docid": "a05ff417f41045604bfd3271263a6f55", "score": "0.5519314", "text": "func Uint64sFloat64s(s []uint64, f func(s uint64) float64) float64s.Float64s {\n\tm := float64s.Float64s(make([]float64, len(s)))\n\tfor i, v := range s {\n\t\tm[i] = f(v)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "99c665147dc0a1fd8e5ab967c74e6689", "score": "0.5497635", "text": "func Uint64sInterfacesE(s []uint64, f func(s uint64) (interface{}, error)) (interfaces.Interfaces, error) {\n\tm := interfaces.Interfaces(make([]interface{}, len(s)))\n\tvar err error\n\tfor i, v := range s {\n\t\tm[i], err = f(v)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn m, nil\n}", "title": "" }, { "docid": "a935f55d8ebea6f509ad2964398bb245", "score": "0.54931664", "text": "func (a arrayBool) MapUInt64(f func(bool) uint64) arrayUInt64 {\n\tvar r = make(arrayUInt64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayUInt64(r)\n}", "title": "" }, { "docid": "a1814aab2e65968d7b41f6736f2cd4dc", "score": "0.54834", "text": "func TryToInt64Slice(i interface{}) (r []int64, err error) {\n\tswitch v := i.(type) {\n\tcase []int:\n\t\tr = make([]int64, len(v))\n\t\tfor index, value := range v {\n\t\t\tr[index] = int64(value)\n\t\t}\n\tcase []int32:\n\t\tr = make([]int64, len(v))\n\t\tfor index, value := range v {\n\t\t\tr[index] = int64(value)\n\t\t}\n\tcase []int64:\n\t\tr = v\n\tcase *[]int64:\n\t\tr = *v\n\tcase []string:\n\t\tr = make([]int64, len(v))\n\t\tfor index, value := range v {\n\t\t\tr[index], err = TryToInt64(value)\n\t\t\tif err != nil {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\tdefault:\n\t\terr = castError(i, \"[]int64\")\n\t}\n\treturn\n}", "title": "" }, { "docid": "eadc0e3d5c94fc9c110276492b10871c", "score": "0.5471733", "text": "func (a arrayInt64) Each(f func(int64)) {\n\tfor _, e := range a { f(e) }\n}", "title": "" }, { "docid": "6d519b9bf9a72cd3f4dad97b36f79d0f", "score": "0.54717", "text": "func Uint64sInt16s(s []uint64, f func(s uint64) int16) int16s.Int16s {\n\tm := int16s.Int16s(make([]int16, len(s)))\n\tfor i, v := range s {\n\t\tm[i] = f(v)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "619b9f38ce240e0d5063cbc80048c218", "score": "0.54715085", "text": "func (a arrayUInt64) MapUInt(f func(uint64) uint) arrayUInt {\n\tvar r = make(arrayUInt, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayUInt(r)\n}", "title": "" }, { "docid": "df67854fe0ded4da9aaa64368d150d87", "score": "0.54695433", "text": "func Uint64sUintptrs(s []uint64, f func(s uint64) uintptr) uintptrs.Uintptrs {\n\tm := uintptrs.Uintptrs(make([]uintptr, len(s)))\n\tfor i, v := range s {\n\t\tm[i] = f(v)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "eaa7095a4bc2ebf53f02388bbd646f3c", "score": "0.54670405", "text": "func (a arrayUInt32) ReduceInt64(f func(uint32, int, ArrayUInt32) int64, initial int64) int64 {\n\tvar r int64 = initial\n\tfor i, e := range a { \n\t\tr = f(e, i, a)\n\t}\n\treturn r\n}", "title": "" }, { "docid": "7c738a3666484b40063955bb16ebfa51", "score": "0.54647964", "text": "func (a arrayInt8) MapFloat64(f func(int8) float64) arrayFloat64 {\n\tvar r = make(arrayFloat64, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayFloat64(r)\n}", "title": "" }, { "docid": "9442cd4beb61e41c54e99c905127a60a", "score": "0.5463364", "text": "func (c *Context) Int64Slice(name string) []int64 {\n\treturn lookupInt64Slice(name, c.flagSet)\n}", "title": "" }, { "docid": "54f698b3641d4db36f6a817c31e3050d", "score": "0.5462383", "text": "func (a arrayFloat64) MapInt(f func(float64) int) arrayInt {\n\tvar r = make(arrayInt, len(a))\n\tfor i, e := range a { r[i] = f(e) }\n\treturn arrayInt(r)\n}", "title": "" } ]
6445cd68c4afa70f2384077c8e071042
Load and parse the mime.types file
[ { "docid": "fd9ef57a25291a009412b1e1b1cdfbc9", "score": "0.567305", "text": "func ParseMIME(MIMEPath string) (MIMEMap map[string]string, err error) {\n\t//panic(\"todo - ParseMIME\")\n\n\tMIMEMap = make(map[string]string)\n\tfile, err := os.Open(MIMEPath)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tdefer file.Close()\n\tscanner := bufio.NewScanner(file)\n\tscanner.Split(bufio.ScanLines)\n\tfor scanner.Scan(){\n\t\tparts := strings.Split(scanner.Text(),\" \")\n\t\tMIMEMap[parts[0]] = parts[1]\n\t}\n\treturn MIMEMap,err\n}", "title": "" } ]
[ { "docid": "3bb9958cb7a563383d46d1c0dc3dc958", "score": "0.62076855", "text": "func (m *Matcher) LoadFileType(ft string) error {\n\tft = strings.ToLower(ft) + \".json\"\n\tfor _, rt := range m.config.Syntax() {\n\t\tpath := filepath.Join(rt, ft)\n\t\tif m.fileExists(path) {\n\t\t\treturn m.LoadFile(path)\n\t\t}\n\t}\n\treturn fmt.Errorf(\"Matcher.LoadFileType: Not found %v\", ft)\n}", "title": "" }, { "docid": "209efea2388ccb3468c097dcb698ab34", "score": "0.6150714", "text": "func ValidateMimeTypes(data []byte, mimeTypes []string) bool {\n\tmimeType := http.DetectContentType(data)\n\tfor _, value := range mimeTypes {\n\t\tif mimeType == value {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "6e70eca914f556a2a3e17c256fb70bea", "score": "0.6102275", "text": "func getMIMEType(p string, cts MIMETypes) string {\n\text := filepath.Ext(p)\n\tswitch ext {\n\tcase \".aac\":\n\t\treturn \"audio/aac\"\n\tcase \".avi\":\n\t\treturn \"video/x-msvideo\"\n\tcase \".bmp\":\n\t\treturn \"image/bmp\"\n\tcase \".css\":\n\t\treturn \"text/css\"\n\tcase \".csv\":\n\t\treturn \"text/csv\"\n\tcase \".gif\":\n\t\treturn \"image/gif\"\n\tcase \".html\", \".htm\":\n\t\treturn \"text/html\"\n\tcase \".jpeg\", \".jpg\":\n\t\treturn \"image/jpeg\"\n\tcase \".js\":\n\t\treturn \"text/javascript\"\n\tcase \".json\":\n\t\treturn \"text/json\"\n\tcase \".mpeg\":\n\t\treturn \"video/mpeg\"\n\tcase \".png\":\n\t\treturn \"image/png\"\n\tcase \".pdf\":\n\t\treturn \"application/pdf\"\n\tcase \".svg\":\n\t\treturn \"image/svg+xml\"\n\tcase \".txt\":\n\t\treturn \"text/plain\"\n\tcase \".xhtml\":\n\t\treturn \"application/xhtml-xml\"\n\tcase \".xml\":\n\t\treturn \"application/xml\"\n\tcase \".zip\":\n\t\treturn \"application/zip\"\n\t}\n\n\t// Load custom content type if it exists\n\tif val, ok := cts.ResponseTypes[p]; ok {\n\t\treturn val\n\t}\n\n\t// Default Content-Type is octet-stream\n\treturn \"application/octet-stream\"\n}", "title": "" }, { "docid": "93a2bbd88f7298cdcb25aef1606c0aeb", "score": "0.60588944", "text": "func ResolveContentType(path string) string {\n\tswitch filepath.Ext(path) {\n\tcase \".aac\":\n\t\treturn \"audio/aac\"\n\tcase \".abw\":\n\t\treturn \"application/x-abiword\"\n\tcase \".arc\":\n\t\treturn \"application/x-freearc\"\n\tcase \".avi\":\n\t\treturn \"video/x-msvideo\"\n\tcase \".azw\":\n\t\treturn \"application/vnd.amazon.ebook\"\n\tcase \".bin\":\n\t\treturn \"application/octet-stream\"\n\tcase \".bmp\":\n\t\treturn \"image/bmp\"\n\tcase \".bz\":\n\t\treturn \"application/x-bzip\"\n\tcase \".bz2\":\n\t\treturn \"application/x-bzip2\"\n\tcase \".csh\":\n\t\treturn \"application/x-csh\"\n\tcase \".csv\":\n\t\treturn \"text/csv\"\n\tcase \".doc\":\n\t\treturn \"application/msword\"\n\tcase \".docx\":\n\t\treturn \"application/vnd.openxmlformats-officedocument.wordprocessingml.document\"\n\tcase \".eot\":\n\t\treturn \"application/vnd.ms-fontobject\"\n\tcase \".epub\":\n\t\treturn \"application/epub+zip\"\n\tcase \".gz\":\n\t\treturn \"application/gzip\"\n\tcase \".gif\":\n\t\treturn \"image/gif\"\n\tcase \".htm\":\n\t\treturn \"text/html\"\n\tcase \".html\":\n\t\treturn \"text/html\"\n\tcase \".ico\":\n\t\treturn \"image/vnd.microsoft.icon\"\n\tcase \".ics\":\n\t\treturn \"text/calendar\"\n\tcase \".jar\":\n\t\treturn \"application/java-archive\"\n\tcase \".jpg\", \".jpeg\":\n\t\treturn \"image/jpeg\"\n\tcase \".jsonld\":\n\t\treturn \"application/ld+json\"\n\tcase \".midi\", \".mid\":\n\t\treturn \"audio/midi\"\n\tcase \".mp3\":\n\t\treturn \"audio/mpeg\"\n\tcase \".mpeg\":\n\t\treturn \"video/mpeg\"\n\tcase \".mpkg\":\n\t\treturn \"application/vnd.apple.installer+xml\"\n\tcase \".odp\":\n\t\treturn \"application/vnd.oasis.opendocument.presentation\"\n\tcase \".ods\":\n\t\treturn \"application/vnd.oasis.opendocument.spreadsheet\"\n\tcase \".odt\":\n\t\treturn \"application/vnd.oasis.opendocument.text\"\n\tcase \".oga\":\n\t\treturn \"audio/ogg\"\n\tcase \".ogv\":\n\t\treturn \"video/ogg\"\n\tcase \".ogx\":\n\t\treturn \"application/ogg\"\n\tcase \".opus\":\n\t\treturn \"audio/opus\"\n\tcase \".otf\":\n\t\treturn \"font/otf\"\n\tcase \".png\":\n\t\treturn \"image/png\"\n\tcase \".pdf\":\n\t\treturn \"application/pdf\"\n\tcase \".php\":\n\t\treturn \"application/x-httpd-php\"\n\tcase \".ppt\":\n\t\treturn \"application/vnd.ms-powerpoint\"\n\tcase \".pptx\":\n\t\treturn \"application/vnd.openxmlformats-officedocument.presentationml.presentation\"\n\tcase \".rar\":\n\t\treturn \"application/vnd.rar\"\n\tcase \".rtf\":\n\t\treturn \"application/rtf\"\n\tcase \".sh\":\n\t\treturn \"application/x-sh\"\n\tcase \".svg\":\n\t\treturn \"image/svg+xml\"\n\tcase \".swf\":\n\t\treturn \"application/x-shockwave-flash\"\n\tcase \".tar\":\n\t\treturn \"application/x-tar\"\n\tcase \".tiff\", \".tif\":\n\t\treturn \"image/tiff\"\n\tcase \".ts\":\n\t\treturn \"video/mp2t\"\n\tcase \".ttf\":\n\t\treturn \"font/ttf\"\n\tcase \".vsd\":\n\t\treturn \"application/vnd.visio\"\n\tcase \".wav\":\n\t\treturn \"audio/wav\"\n\tcase \".weba\":\n\t\treturn \"audio/webm\"\n\tcase \".webm\":\n\t\treturn \"video/webm\"\n\tcase \".webp\":\n\t\treturn \"image/webp\"\n\tcase \".woff\":\n\t\treturn \"font/woff\"\n\tcase \".woff2\":\n\t\treturn \"font/woff2\"\n\tcase \".xhtml\":\n\t\treturn \"application/xhtml+xml\"\n\tcase \".xls\":\n\t\treturn \"application/vnd.ms-excel\"\n\tcase \".xlsx\":\n\t\treturn \"application/vnd.openxmlformats-officedocument.spreadsheetml.sheet\"\n\tcase \".xml\":\n\t\treturn \"application/xml\"\n\tcase \".xul\":\n\t\treturn \"application/vnd.mozilla.xul+xml\"\n\tcase \".zip\":\n\t\treturn \"application/zip\"\n\tcase \".3gp\":\n\t\treturn \"video/3gpp\"\n\tcase \".3g2\":\n\t\treturn \"video/3gpp2\"\n\tcase \".7z\":\n\t\treturn \"application/x-7z-compressed\"\n\tcase \".js\", \".mjs\":\n\t\treturn \"text/javascript; charset=UTF-8\"\n\tcase \".css\":\n\t\treturn \"text/css; charset=UTF-8\"\n\tcase \".json\":\n\t\treturn \"application/json; charset=UTF-8\"\n\tcase \".txt\":\n\t\treturn \"text/plain; charset=UTF-8\"\n\tdefault:\n\t\treturn \"text/html; charset=UTF-8\"\n\t}\n}", "title": "" }, { "docid": "b97a9871dac11c95550c11ce27834a90", "score": "0.6058022", "text": "func ValidMimeTypes() []string {\n\treturn validMimeTypesList\n}", "title": "" }, { "docid": "9a2b2af1a7cd05d9d989e31cf3d96e4d", "score": "0.5984281", "text": "func ParseMIME(MIMEPath string) (MIMEMap map[string]string, err error) {\n\tmime_map, err := os.Open(MIMEPath)\n\tif err != nil {\n\t\tfmt.Println(mime_map)\n\t}\n\tscanner := bufio.NewScanner(mime_map)\n\tscanner.Split(bufio.ScanLines)\n\tvar txtlines []string\n\tfor scanner.Scan(){\n\t\ttxtlines = append(txtlines,scanner.Text())\n\t}\n\terr = scanner.Err()\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tdefer func(){\n\t\tif err = mime_map.Close();err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t}()\n\tmime := make(map[string]string)\n\tfor _, line := range txtlines{\n\t\tnew_line := strings.Fields(line)\n\t\tmime[new_line[0]] = new_line[1]\n\t\t//fmt.Println(new_line)\n\t}\n\treturn mime,nil\n}", "title": "" }, { "docid": "c34fdd98ed0b9feefd71303fee72f465", "score": "0.59797096", "text": "func MatchMimeType(mimeType string) chroma.Lexer { return internal.MatchMimeType(mimeType) }", "title": "" }, { "docid": "e7e1b06782e06a561d0bba9834587901", "score": "0.59764725", "text": "func mimeType(data []byte) string {\n\treturn strings.Split(mimetype.Detect(data).String(), \";\")[0]\n}", "title": "" }, { "docid": "e5624d76c3223622a6db0c0d371a48d1", "score": "0.5791364", "text": "func loadTypes() {\n\tif err := types.LoadTypes(typeinfo); err != nil {\n\t\tfmt.Println(\"No 'types' file provided. Please add type information to this file from 'supportInfo' script command output.\")\n\t\texit = true\n\t}\n}", "title": "" }, { "docid": "df3674db1f7b5fc7102642501d361e8d", "score": "0.5762375", "text": "func guessMimeType(path string) string {\r\n\toctetMime := \"application/octet-stream\"\r\n\tlastIndex := strings.LastIndex(path, \".\")\r\n\tif lastIndex == -1 {\r\n\t\treturn octetMime\r\n\t}\r\n\textension := path[lastIndex:]\r\n\tresolved, ok := mimeMap[extension]\r\n\tif !ok {\r\n\t\treturn octetMime\r\n\t}\r\n\treturn resolved\r\n}", "title": "" }, { "docid": "93bd8d97204252708c41526ec0c78556", "score": "0.5758795", "text": "func UnmarshalFileType(data json.RawMessage) (FileType, error) {\n\tvar meta meta\n\n\terr := json.Unmarshal(data, &meta)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tswitch meta.Type {\n\tcase TypeFileTypeNone:\n\t\treturn UnmarshalFileTypeNone(data)\n\n\tcase TypeFileTypeAnimation:\n\t\treturn UnmarshalFileTypeAnimation(data)\n\n\tcase TypeFileTypeAudio:\n\t\treturn UnmarshalFileTypeAudio(data)\n\n\tcase TypeFileTypeDocument:\n\t\treturn UnmarshalFileTypeDocument(data)\n\n\tcase TypeFileTypePhoto:\n\t\treturn UnmarshalFileTypePhoto(data)\n\n\tcase TypeFileTypeProfilePhoto:\n\t\treturn UnmarshalFileTypeProfilePhoto(data)\n\n\tcase TypeFileTypeSecret:\n\t\treturn UnmarshalFileTypeSecret(data)\n\n\tcase TypeFileTypeSecretThumbnail:\n\t\treturn UnmarshalFileTypeSecretThumbnail(data)\n\n\tcase TypeFileTypeSecure:\n\t\treturn UnmarshalFileTypeSecure(data)\n\n\tcase TypeFileTypeSticker:\n\t\treturn UnmarshalFileTypeSticker(data)\n\n\tcase TypeFileTypeThumbnail:\n\t\treturn UnmarshalFileTypeThumbnail(data)\n\n\tcase TypeFileTypeUnknown:\n\t\treturn UnmarshalFileTypeUnknown(data)\n\n\tcase TypeFileTypeVideo:\n\t\treturn UnmarshalFileTypeVideo(data)\n\n\tcase TypeFileTypeVideoNote:\n\t\treturn UnmarshalFileTypeVideoNote(data)\n\n\tcase TypeFileTypeVoiceNote:\n\t\treturn UnmarshalFileTypeVoiceNote(data)\n\n\tcase TypeFileTypeWallpaper:\n\t\treturn UnmarshalFileTypeWallpaper(data)\n\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"Error unmarshaling. Unknown type: \" + meta.Type)\n\t}\n}", "title": "" }, { "docid": "f8576c75d6b805a08d63ec6c7fcfa145", "score": "0.5750591", "text": "func DetectContentType(filePath string) (ct string, err error) {\n\tf, err := os.Open(filePath)\n\tif err != nil {\n\t\treturn\n\t}\n\tdefer f.Close()\n\t// Only the first 512 bytes are used to sniff the content type.\n\tbuffer := make([]byte, 512)\n\t_, err = f.Read(buffer)\n\tif err != nil {\n\t\treturn\n\t}\n\tct = http.DetectContentType(buffer)\n\treturn\n}", "title": "" }, { "docid": "a892a82300c92da4297102f0a48ae6da", "score": "0.5744049", "text": "func AcceptFileType(file *multipart.FileHeader, exts ...string) bool {\n\tfilename := file.Filename\n\tfileExtension := filepath.Ext(filename)\n\tfor _, ext := range exts {\n\t\tif ext == fileExtension[1:] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "718beb5a7433f6b21de51f8e3a181b54", "score": "0.5665547", "text": "func MIMETypeFromReader(r io.Reader) (mime string, reader io.Reader) {\n\tif r == nil {\n\t\treturn \"\", nil\n\t}\n\tvar buf bytes.Buffer\n\t_, err := io.Copy(&buf, io.LimitReader(r, 1024))\n\tmt, _ := filetype.Match(buf.Bytes())\n\tmime = mt.MIME.Type + \"/\" + mt.MIME.Subtype\n\tif err != nil {\n\t\treturn mime, io.MultiReader(bytes.NewReader(buf.Bytes()), errReader{err})\n\t}\n\treturn mime, io.MultiReader(bytes.NewReader(buf.Bytes()), r)\n}", "title": "" }, { "docid": "98d0c7aee93cd5a54b9b5d438fb7228b", "score": "0.56386846", "text": "func ImportTypes(f *zip.File) *models.ZipTypes {\n\tfmt.Printf(\"%+v\\n\", f.FileHeader.Name)\n\n\tzipFile, zfErr := f.Open()\n\tif zfErr != nil {\n\t\tfmt.Println(\"f.Open():\", zfErr)\n\t\treturn nil\n\t}\n\n\tdecoder := yaml.NewDecoder(zipFile)\n\tjsonData := make(models.RawTypes)\n\tunmErr := decoder.Decode(&jsonData)\n\tif unmErr != nil {\n\t\tfmt.Println(\"Unmarshal:\", unmErr)\n\t\treturn nil\n\t}\n\n\tresult := make(models.ZipTypes)\n\n\tfor key, value := range jsonData {\n\t\tresult[key] = models.ZipType{\n\t\t\tID: key,\n\t\t\tGroupID: value.GroupID,\n\t\t\tName: value.Names[\"en\"],\n\t\t\tPortionSize: value.PortionSize,\n\t\t\tPublished: value.Published,\n\t\t\tVolume: value.Volume,\n\t\t}\n\t}\n\n\treturn &result\n\n}", "title": "" }, { "docid": "d3be376c7ed843451c65bcca7802f0af", "score": "0.56368", "text": "func (rp *RevelContainer) LoadMimeConfig() (err error) {\n\trp.MimeConfig, err = config.LoadContext(\"mime-types.conf\", rp.ConfPaths)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to load mime type config: %s %w\", \"error\", err)\n\t}\n\treturn\n}", "title": "" }, { "docid": "e5497bd7ee8c11ab6cf857f031c926ca", "score": "0.5621514", "text": "func (*Server) registerCustomMimeTypes() error {\n\treturn mime.AddExtensionType(\".vue\", \"text/html; charset=utf-8\")\n}", "title": "" }, { "docid": "59a197428b9155d76aa321c184af55b4", "score": "0.5569323", "text": "func guessImageMimeTypes(r io.Reader) string {\n\tformat, _ := guessImageFormat(r)\n\tif format == \"\" {\n\t\treturn \"\"\n\t}\n\treturn mime.TypeByExtension(\".\" + format)\n}", "title": "" }, { "docid": "5770fd34782b0dec5a7a0dcb00edf15a", "score": "0.55557734", "text": "func GuessFileType(file string) (string, error) {\n\tbuff := make([]byte, 512)\n\tf, err := os.Open(file)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tdefer f.Close()\n\t_, err = f.Read(buff)\n\tif err != nil {\n\t\t// ignore end of file\n\t\tif err == io.EOF {\n\t\t\treturn \"\", nil\n\t\t}\n\t\treturn \"\", err\n\t}\n\treturn http.DetectContentType(buff), nil\n}", "title": "" }, { "docid": "fca520f69bcb821871e1b29b2e6a7652", "score": "0.55237526", "text": "func Extensions(mime string) []string {\n\n\tmime = strings.ToLower(mime)\n\n\tif val, ok := bdMap.mimeToExt[mime]; ok {\n\t\treturn val\n\t}\n\n\treturn []string{}\n}", "title": "" }, { "docid": "6bde2e7e4c70bb3090ce83fbacd90c23", "score": "0.5457079", "text": "func (f *Media) findMimeType() error {\n\tif f.MimeType != \"\"{\n\t\treturn nil\n\t}\n\tlog.Debug(\"finding file extension for '\", f.Path, \"'\")\n\text := filepath.Ext(f.Path)\n\tlog.Debug(fmt.Sprintf(\"file has extension '%s'\", ext))\n\tf.MimeType = MediaTypeMapping[ext]\n\tif f.MimeType == \"\" {\n\t\treturn fmt.Errorf(\"upsupported media type, please refer '%s/api/media'\", FacebookSupportUrl)\n\t}\n\tlog.Debug(fmt.Sprintf(\"file has mime-type '%s'\", f.MimeType))\n\treturn nil\n}", "title": "" }, { "docid": "586ee43df0a71884c76c24bbed2060a5", "score": "0.5454354", "text": "func (_this *Navigator) MimeTypes() *MimeTypeArray {\n\tvar ret *MimeTypeArray\n\tvalue := _this.Value_JS.Get(\"mimeTypes\")\n\tret = MimeTypeArrayFromJS(value)\n\treturn ret\n}", "title": "" }, { "docid": "de9bddf5b572ce5c64b64e429316cbfe", "score": "0.54484427", "text": "func Unmarshal(data []byte, v interface{}, contentType string) error {\n\tif mFunc, ok := unmarshalMap[contentType]; ok {\n\t\treturn mFunc(data, v)\n\t}\n\n\tct, err := mime.ParseMediaType(contentType)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif mFunc, ok := unmarshalMap[ct]; ok {\n\t\treturn mFunc(data, v)\n\t}\n\n\treturn fmt.Errorf(\"unsupported content type: %s, %s\", contentType, ct)\n}", "title": "" }, { "docid": "504ee81d032d5b083287736cd7e4c7db", "score": "0.5441199", "text": "func MatchMime(_ string, data []byte) string {\n\tmt, _ := filetype.Match(data)\n\treturn mt.MIME.Type + \"/\" + mt.MIME.Subtype\n}", "title": "" }, { "docid": "685f8133f3104ff339951d20dafe1039", "score": "0.5440227", "text": "func MimeFromExt(name string) (fileType string, err kv.Error) {\n\tswitch filepath.Ext(name) {\n\tcase \".gzip\", \".gz\":\n\t\treturn \"application/x-gzip\", nil\n\tcase \".zip\":\n\t\treturn \"application/zip\", nil\n\tcase \".tgz\": // Non standard extension as a result of studioml python code\n\t\treturn \"application/bzip2\", nil\n\tcase \".tb2\", \".tbz\", \".tbz2\", \".bzip2\", \".bz2\": // Standard bzip2 extensions\n\t\treturn \"application/bzip2\", nil\n\tcase \".tar\":\n\t\treturn \"application/tar\", nil\n\tcase \".bin\":\n\t\treturn \"application/octet-stream\", nil\n\tdefault:\n\t\tfileType, errGo := DetectFileType(name)\n\t\tif errGo != nil {\n\t\t\t// Fill in a default value even if there is an error\n\t\t\treturn \"application/octet-stream\", errGo\n\t\t}\n\t\treturn fileType, nil\n\t}\n}", "title": "" }, { "docid": "51e9a26e8bcd85dd919de32320ca2abc", "score": "0.5435822", "text": "func DetectContentType(data []byte) SniffedType {\n\tif len(data) == 0 {\n\t\treturn SniffedType{\"text/unknown\"}\n\t}\n\n\tct := http.DetectContentType(data)\n\n\tif len(data) > sniffLen {\n\t\tdata = data[:sniffLen]\n\t}\n\n\t// SVG is unsupported by http.DetectContentType, https://github.com/golang/go/issues/15888\n\n\tdetectByHTML := strings.Contains(ct, \"text/plain\") || strings.Contains(ct, \"text/html\")\n\tdetectByXML := strings.Contains(ct, \"text/xml\")\n\tif detectByHTML || detectByXML {\n\t\tdataProcessed := svgComment.ReplaceAll(data, nil)\n\t\tdataProcessed = bytes.TrimSpace(dataProcessed)\n\t\tif detectByHTML && svgTagRegex.Match(dataProcessed) ||\n\t\t\tdetectByXML && svgTagInXMLRegex.Match(dataProcessed) {\n\t\t\tct = SvgMimeType\n\t\t}\n\t}\n\n\tif strings.HasPrefix(ct, \"audio/\") && bytes.HasPrefix(data, []byte(\"ID3\")) {\n\t\t// The MP3 detection is quite inaccurate, any content with \"ID3\" prefix will result in \"audio/mpeg\".\n\t\t// So remove the \"ID3\" prefix and detect again, if result is text, then it must be text content.\n\t\t// This works especially because audio files contain many unprintable/invalid characters like `0x00`\n\t\tct2 := http.DetectContentType(data[3:])\n\t\tif strings.HasPrefix(ct2, \"text/\") {\n\t\t\tct = ct2\n\t\t}\n\t}\n\n\tif ct == \"application/ogg\" {\n\t\tdataHead := data\n\t\tif len(dataHead) > 256 {\n\t\t\tdataHead = dataHead[:256] // only need to do a quick check for the file header\n\t\t}\n\t\tif bytes.Contains(dataHead, []byte(\"theora\")) || bytes.Contains(dataHead, []byte(\"dirac\")) {\n\t\t\tct = \"video/ogg\" // ogg is only used for some video formats, and it's not popular\n\t\t} else {\n\t\t\tct = \"audio/ogg\" // for most cases, it is used as an audio container\n\t\t}\n\t}\n\treturn SniffedType{ct}\n}", "title": "" }, { "docid": "669874ad9b657a45dcc0a52a60ec7019", "score": "0.5422429", "text": "func getContentType(file string) string {\n\text := path.Ext(file)\n\tmType := mime.TypeByExtension(ext)\n\tif mType == \"\" {\n\t\treturn \"application/octet-stream\"\n\t}\n\treturn mType\n}", "title": "" }, { "docid": "b3c677f8fbbf8e9623f2a558336af71f", "score": "0.5383224", "text": "func UnmarshalFileTypeUnknown(data json.RawMessage) (*FileTypeUnknown, error) {\n\tvar response FileTypeUnknown\n\n\terr := json.Unmarshal(data, &response)\n\n\treturn &response, err\n}", "title": "" }, { "docid": "ad0ef6df421d754a8f2159ce41d12f1f", "score": "0.53613764", "text": "func MimeTypeByExtensionExt(name string) string {\n\text := strings.ToLower(filepath.Ext(name))\n\tresult := mime.TypeByExtension(ext)\n\n\tif result == \"\" {\n\t\tresult = extraMimeTypes[ext]\n\t}\n\n\tif result == \"\" {\n\t\tresult = \"text/plain; charset=utf-8\"\n\t}\n\n\treturn result\n}", "title": "" }, { "docid": "c6e04eb24505ec0622d7a337ed83c81f", "score": "0.5342322", "text": "func UnmarshalFileTypeDocument(data json.RawMessage) (*FileTypeDocument, error) {\n\tvar response FileTypeDocument\n\n\terr := json.Unmarshal(data, &response)\n\n\treturn &response, err\n}", "title": "" }, { "docid": "b7dae0fec7b9f2c612ac7e337ff185b2", "score": "0.53359675", "text": "func getFileContentType(file *os.File) (string, error) {\n\t// Using the first 512 bytes to detect the content type.\n\tbuffer := make([]byte, 512)\n\t_, err := file.Read(buffer)\n\t// Reset the file pointer\n\tfile.Seek(0, io.SeekStart)\n\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn http.DetectContentType(buffer), nil\n}", "title": "" }, { "docid": "2f86e9d0026b93eefecfc7758cd91141", "score": "0.53299534", "text": "func imageFileExtFromMimeType(t string) (string, error) {\n\n\tm := make(map[string]string)\n\n\tm[\"image/png\"] = \"png\"\n\tm[\"image/jpeg\"] = \"jpg\"\n\tm[\"image/gif\"] = \"gif\"\n\tm[\"image/tiff\"] = \"tiff\"\n\tm[\"image/bmp\"] = \"bmp\"\n\tm[\"image/webp\"] = \"webp\"\n\tm[\"image/svg+xml\"] = \"svg\"\n\n\tif v, ok := m[t]; ok {\n\t\treturn v, nil\n\t}\n\n\terr := errors.New(\"Mime type does not exist\")\n\n\treturn \"\", err\n\n}", "title": "" }, { "docid": "30d357e113658e8570c518a00b8ac1a8", "score": "0.5329027", "text": "func LoadContentType(dataType string, data interface{}, safe ...bool) (*Json, error) {\n\tcontent := gconv.Bytes(data)\n\tif len(content) == 0 {\n\t\treturn New(nil, safe...), nil\n\t}\n\t// ignore UTF8-BOM\n\tif content[0] == 0xEF && content[1] == 0xBB && content[2] == 0xBF {\n\t\tcontent = content[3:]\n\t}\n\toption := Options{}\n\tif len(safe) > 0 && safe[0] {\n\t\toption.Safe = true\n\t}\n\treturn doLoadContentWithOptions(dataType, content, option)\n}", "title": "" }, { "docid": "6970f07272d8dff320af3f5848db7204", "score": "0.53273654", "text": "func detect_file_type(path string) string {\n\treturn \"\"\n}", "title": "" }, { "docid": "dc04d8a079f7ddf9588a7a149fe9b3e6", "score": "0.5322849", "text": "func FormFileDetectContentType(L *lua.LState) int {\n\t// Get form file\n\tformFile := getFormFileObject(L)\n\n\t// Push file content type\n\tL.Push(lua.LString(http.DetectContentType(formFile.File)))\n\n\treturn 1\n}", "title": "" }, { "docid": "e4c95af8a411b228a675528f58cbee36", "score": "0.5321583", "text": "func Type(name string) error {\n\tf, err := os.Open(name)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"type cannot open the named file: %w: %s\", err, name)\n\t}\n\tdefer f.Close()\n\tdst := &bytes.Buffer{}\n\tinf, err := f.Stat()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"type cannot stat the named file: %w: %s\", err, name)\n\t}\n\t// DetectContentType only needs the first 512B of a file\n\tconst maxSize = int64(512)\n\tn := maxSize\n\tif inf.Size() < maxSize {\n\t\tn = inf.Size()\n\t}\n\tif _, err = io.CopyN(dst, f, n); err != nil {\n\t\treturn fmt.Errorf(\"type cannot copy the first %dB of the named file: %w: %s\", n, err, name)\n\t}\n\tmime := http.DetectContentType(dst.Bytes())\n\ts := strings.Split(mime, \"/\")\n\tif len(s) == 0 {\n\t\treturn fmt.Errorf(\"type cannot copy the named file: %w: %s\", err, name)\n\t}\n\tconst fallback = \"application/octet-stream\"\n\tif mime == fallback {\n\t\t// fallback is often returned by ANSI encoded files etc\n\t\treturn nil\n\t}\n\tif t := s[0]; t == \"text\" {\n\t\treturn nil\n\t}\n\treturn fmt.Errorf(\"%w: %s: %s\", ErrType, mime, name)\n}", "title": "" }, { "docid": "dc507bf3bd6c0ece8fdf34b67b67beb4", "score": "0.53106123", "text": "func ValidateMimes(data []byte, mimes []string) bool {\n\tmimeTypes := make([]string, len(mimes))\n\tfor i, mime := range mimes {\n\t\tif val, ok := Mimes[mime]; ok {\n\t\t\tmimeTypes[i] = Mimes[val]\n\t\t} else {\n\t\t\tpanic(fmt.Sprintf(\"validator: Mimes unsupport Type %s\", mime))\n\t\t}\n\t}\n\n\treturn ValidateMimeTypes(data, mimeTypes)\n}", "title": "" }, { "docid": "c3a03f456bf07d3909b2674ff62188a3", "score": "0.53067744", "text": "func get_content_type(str string) int {\n\tjson_template := make(map[string]interface{})\n\terr := json.Unmarshal([]byte(str), &json_template)\n\n\tif err == nil {\n\t\treturn CONTENT_TYPE_JSON\n\t}\n\treturn CONTENT_TYPE_OTHER\n}", "title": "" }, { "docid": "48e6e55f9485a29f96dd413ba5f67c68", "score": "0.53063065", "text": "func (m *Magic) TypeByFile(filePath string) (string, error) {\n\tpath := C.CString(filePath)\n\tdefer C.free(unsafe.Pointer(path))\n\tout := C.magic_file(m.db, path)\n\tif out == nil {\n\t\treturn \"\", errors.New(C.GoString(C.magic_error(m.db)))\n\t}\n\treturn C.GoString(out), nil\n}", "title": "" }, { "docid": "ae41cf37651cfadb4a593e403eaf4f89", "score": "0.5303847", "text": "func ContentTypeGuess(filename string, data []byte, data_size int64) (result_uncertain bool, return__ string) {\n\t__cgo__filename := (*C.gchar)(unsafe.Pointer(C.CString(filename)))\n\t__header__data := (*reflect.SliceHeader)(unsafe.Pointer(&data))\n\tvar __cgo__result_uncertain C.gboolean\n\tvar __cgo__return__ *C.gchar\n\t__cgo__return__ = C.g_content_type_guess(__cgo__filename, (*C.guchar)(unsafe.Pointer(__header__data.Data)), C.gsize(data_size), &__cgo__result_uncertain)\n\tC.free(unsafe.Pointer(__cgo__filename))\n\tresult_uncertain = __cgo__result_uncertain == C.gboolean(1)\n\treturn__ = C.GoString((*C.char)(unsafe.Pointer(__cgo__return__)))\n\treturn\n}", "title": "" }, { "docid": "e34732358842ad0373e4f16ecdbdd2c2", "score": "0.5299702", "text": "func MimeValid(s string) bool {\n\t_, ok := validMimeTypesMap[s]\n\treturn ok\n}", "title": "" }, { "docid": "fecead13cecb69f60d347f6faaed1d96", "score": "0.5295159", "text": "func ValidMime(data []byte) bool {\n\n\tmime := http.DetectContentType(data)\n\n\tif strings.Contains(mime, \"image\") || strings.Contains(mime, \"video\") {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "25043e10386462b305d8d3a436cd20cb", "score": "0.5290779", "text": "func TestContentTypes(t *testing.T) {\n\ttests := []string{\n\t\t\"text/foo\",\n\t\t\"text/foo; charset=UTF-8\",\n\t\t\"text/plain\",\n\t\t\"text/plain; charset=UTF-8\",\n\t\t\"application/json\",\n\t\t\"application/json; charset=UTF-8\",\n\t\t\"application/javascript\",\n\t\t\"application/javascript; charset=UTF-8\",\n\t\t\"application/font-woff\",\n\t\t\"application/font-woff; charset=UTF-8\",\n\t\t\"application/xml\",\n\t\t\"application/xml; charset=UTF-8\",\n\t\t\"vendor/vendor.foo+json\",\n\t\t\"vendor/vendor.foo+json; charset=UTF-8\",\n\t\t\"vendor/vendor.foo+xml\",\n\t\t\"vendor/vendor.foo+xml; charset=UTF-8\",\n\t}\n\n\tfor _, tt := range tests {\n\t\ttt := tt // capture loop var\n\t\tt.Run(tt, func(t *testing.T) {\n\t\t\tif !contentTypes.MatchString(tt) {\n\t\t\t\tt.Fatalf(\"%q does not match content types regexp\", tt)\n\t\t\t}\n\t\t})\n\t}\n}", "title": "" }, { "docid": "5ad446f11de199b5d4458578dee8d588", "score": "0.52690667", "text": "func getFileType(b []byte) (string) {\n m := http.DetectContentType(b)\n sl := strings.Split(m, \"/\")\n\n return sl[len(sl)-1]\n}", "title": "" }, { "docid": "f56d78e3f7e452996852f5e7bd321cf4", "score": "0.5262159", "text": "func Extensions( mime string ) []string {\n\t\n\tmime = strings.ToLower( mime )\n var return_list []string\n\n\tfor _, item := range *List_items {\n\t\tif item.Mime == mime {\n\t\t\treturn_list = append( return_list, item.Extension )\n\t\t}\n\t}\n\n\treturn return_list\n}", "title": "" }, { "docid": "7245f2d63ca9195a36a0c8f18585c776", "score": "0.52415055", "text": "func UnmarshalFileTypeSticker(data json.RawMessage) (*FileTypeSticker, error) {\n\tvar response FileTypeSticker\n\n\terr := json.Unmarshal(data, &response)\n\n\treturn &response, err\n}", "title": "" }, { "docid": "11398fdfe02371446237618a3a85e746", "score": "0.52413374", "text": "func FixContentType(body []byte, contentType, fileName string) string {\n\tswitch contentType {\n\tcase \"application/x-zip-compressed\":\n\t\treturn \"application/zip\"\n\tcase \"application/x-rar-compressed\":\n\t\treturn \"application/rar\"\n\tcase \"\", \"application/octet-stream\", \"application/pdf\", \"application/x-as400attachment\", \"application/save-as\":\n\t\t//log.Printf(\"body=%s\", body)\n\t\tif nct := mimemagic.Match(contentType, body); nct != \"\" {\n\t\t\treturn nct\n\t\t}\n\t}\n\tif GetConverter(contentType, nil) == nil { // no converter for this\n\t\tif nct := mimemagic.Match(contentType, body); nct != \"\" {\n\t\t\treturn nct\n\t\t}\n\t}\n\tif fileName != \"\" &&\n\t\t(contentType == \"\" || contentType == \"application/octet-stream\" ||\n\t\t\tGetConverter(contentType, nil) == nil) {\n\t\tif i := strings.LastIndex(fileName, \".\"); i >= 0 {\n\t\t\tif nct, ok := ExtContentType[fileName[i+1:]]; ok {\n\t\t\t\treturn nct\n\t\t\t}\n\t\t\tif nct := mime.TypeByExtension(fileName[i:]); nct != \"\" {\n\t\t\t\treturn nct\n\t\t\t}\n\t\t}\n\t}\n\t//log.Printf(\"ct=%s ==> %s\", ct, contentType)\n\treturn contentType\n}", "title": "" }, { "docid": "47249b92a2f4a451028b18db25bb1b8e", "score": "0.5236412", "text": "func ContentTypes(types []string) Option {\n\treturn func(c *Config) {\n\t\tc.contentTypes = nil\n\t\tfor _, v := range types {\n\t\t\tmediaType, params, err := mime.ParseMediaType(v)\n\t\t\tif err == nil {\n\t\t\t\tc.contentTypes = append(c.contentTypes, parsedContentType{mediaType, params})\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "26e3449db56ca64b1005ecb5b26aec3b", "score": "0.5234882", "text": "func ParseMIMEType(value string) (mime MIMEType, acceptOptions Options) {\n\ttypeEnd := strings.IndexRune(value, '/')\n\tif typeEnd == -1 {\n\t\treturn MIMEType{}, nil\n\t}\n\tmime.Type = value[:typeEnd]\n\tvalue = value[typeEnd+1:]\n\tsubTypeEnd := strings.IndexRune(value, ';')\n\tif subTypeEnd == -1 {\n\t\tmime.SubType = value\n\t\treturn mime, nil\n\t}\n\tmime.SubType = value[:subTypeEnd]\n\tmime.Options = make(Options)\n\tstart := subTypeEnd + 1\n\toptions := strings.FieldsFunc(value[start:], isOptionSplit)\n\tqFound := false\n\tfor _, option := range options {\n\t\tnameEnd := strings.IndexRune(option, '=')\n\t\tif nameEnd == -1 {\n\t\t\tmime.Options.Add(option, \"\")\n\t\t\tcontinue\n\t\t}\n\t\t// Note: the 'q' option is required to have a value, so we\n\t\t// don't need to check for it until we know that this option\n\t\t// has an '='.\n\t\tname, value := option[:nameEnd], option[nameEnd+1:]\n\t\tif !qFound && strings.TrimSpace(name) == \"q\" {\n\t\t\tacceptOptions = make(Options)\n\t\t\tqFound = true\n\t\t}\n\t\tif qFound {\n\t\t\tacceptOptions.Add(name, value)\n\t\t\tcontinue\n\t\t}\n\t\tmime.Options.Add(option[:nameEnd], option[nameEnd+1:])\n\t}\n\treturn mime, acceptOptions\n}", "title": "" }, { "docid": "c5aec304833494efabfe94bc589feaf1", "score": "0.52183396", "text": "func (i *FileInfo) detectType(modify, saveContent, readHeader bool) error {\n\tif IsNamedPipe(i.Mode) {\n\t\ti.Type = \"blob\"\n\t\treturn nil\n\t}\n\t// failing to detect the type should not return error.\n\t// imagine the situation where a file in a dir with thousands\n\t// of files couldn't be opened: we'd have immediately\n\t// a 500 even though it doesn't matter. So we just log it.\n\n\tmimetype := mime.TypeByExtension(i.Extension)\n\n\tvar buffer []byte\n\tif readHeader {\n\t\tbuffer = i.readFirstBytes()\n\n\t\tif mimetype == \"\" {\n\t\t\tmimetype = http.DetectContentType(buffer)\n\t\t}\n\t}\n\n\tswitch {\n\tcase strings.HasPrefix(mimetype, \"video\"):\n\t\ti.Type = \"video\"\n\t\ti.detectSubtitles()\n\t\treturn nil\n\tcase strings.HasPrefix(mimetype, \"audio\"):\n\t\ti.Type = \"audio\"\n\t\treturn nil\n\tcase strings.HasPrefix(mimetype, \"image\"):\n\t\ti.Type = \"image\"\n\t\treturn nil\n\tcase strings.HasSuffix(mimetype, \"pdf\"):\n\t\ti.Type = \"pdf\"\n\t\treturn nil\n\tcase (strings.HasPrefix(mimetype, \"text\") || !isBinary(buffer)) && i.Size <= 10*1024*1024: // 10 MB\n\t\ti.Type = \"text\"\n\n\t\tif !modify {\n\t\t\ti.Type = \"textImmutable\"\n\t\t}\n\n\t\tif saveContent {\n\t\t\tafs := &afero.Afero{Fs: i.Fs}\n\t\t\tcontent, err := afs.ReadFile(i.Path)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\ti.Content = string(content)\n\t\t}\n\t\treturn nil\n\tdefault:\n\t\ti.Type = \"blob\"\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "cdca45402ebaf068688a5374ad2d1ad1", "score": "0.5200249", "text": "func DetectFileType(fn string) (typ string, err kv.Error) {\n\tfile, errOs := os.Open(filepath.Clean(fn))\n\tif errOs != nil {\n\t\treturn \"\", kv.Wrap(errOs).With(\"filename\", fn).With(\"stack\", stack.Trace().TrimRuntime())\n\t}\n\tdefer file.Close()\n\n\t// Only the first 512 bytes are used to sniff the content type.\n\tbuffer := make([]byte, 512)\n\tif _, errOs = file.Read(buffer); errOs != nil && errOs != io.EOF {\n\t\treturn \"\", kv.Wrap(errOs).With(\"filename\", fn).With(\"stack\", stack.Trace().TrimRuntime())\n\t}\n\n\t// Always returns a valid content-type and \"application/octet-stream\" if no others seemed to match.\n\treturn http.DetectContentType(buffer), nil\n}", "title": "" }, { "docid": "2bc8988f057c8cd103762daca6d700e4", "score": "0.5199202", "text": "func GetFileContentsOfType(file string, extension string) (string, error) {\r\n\tfilename, err := GetValidatedFileName(file, extension)\r\n\tif err != nil {\r\n\t\treturn \"\", err\r\n\t}\r\n\r\n\tbody, err := GetFileContents(filename)\r\n\tif err != nil {\r\n\t\treturn \"\", err\r\n\t}\r\n\treturn body, nil\r\n}", "title": "" }, { "docid": "8b525f1cb1639b4b9b07440bbe87d657", "score": "0.5163922", "text": "func contentTypes() []string {\n\treturn []string{\"posts\", \"media\", \"users\", \"categories\", \"tags\"}\n}", "title": "" }, { "docid": "1d09d465560d22bd1da26e9e4f339f4e", "score": "0.51545966", "text": "func Detect(r io.Reader) FileType {\n\tbr := bufio.NewReader(r)\n\tswitch {\n\tcase hasPrefix(br, []byte{0xed, 0xab, 0xee, 0xdb}):\n\t\treturn FileTypeRPM\n\tcase hasPrefix(br, []byte(\"!<arch>\\ndebian\")):\n\t\treturn FileTypeDEB\n\tcase hasPrefix(br, []byte(\"-----BEGIN PGP\")):\n\t\treturn FileTypePGP\n\tcase contains(br, []byte{0x06, 0x09, 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x0A, 0x01}, 256):\n\t\t// OID certTrustList\n\t\treturn FileTypeCAT\n\tcase contains(br, []byte{0x06, 0x09, 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x02}, 256):\n\t\t// OID signedData\n\t\treturn FileTypePKCS7\n\tcase isTar(br):\n\t\treturn detectTar(br)\n\tcase hasPrefix(br, []byte(\"MZ\")):\n\t\tif blob, _ := br.Peek(0x3e); len(blob) == 0x3e {\n\t\t\treloc := binary.LittleEndian.Uint16(blob[0x3c:0x3e])\n\t\t\tif blob, err := br.Peek(int(reloc) + 4); err == nil {\n\t\t\t\tif bytes.Equal(blob[reloc:reloc+4], []byte(\"PE\\x00\\x00\")) {\n\t\t\t\t\treturn FileTypePECOFF\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\tcase hasPrefix(br, []byte{0xd0, 0xcf}):\n\t\treturn FileTypeMSI\n\tcase hasPrefix(br, []byte(\"MSCF\")):\n\t\treturn FileTypeCAB\n\tcase contains(br, []byte(\"<assembly\"), 256),\n\t\tcontains(br, []byte(\":assembly\"), 256):\n\t\treturn FileTypeAppManifest\n\tcase hasPrefix(br, []byte{0xcf, 0xfa, 0xed, 0xfe}), hasPrefix(br, []byte{0xce, 0xfa, 0xed, 0xfe}):\n\t\treturn FileTypeMachO\n\tcase hasPrefix(br, []byte{0xca, 0xfe, 0xba, 0xbe}):\n\t\treturn FileTypeMachOFat\n\tcase hasPrefix(br, []byte{0x78, 0x61, 0x72, 0x21}):\n\t\treturn FileTypeXAR\n\tcase hasPrefix(br, []byte{0x89}), hasPrefix(br, []byte{0xc2}), hasPrefix(br, []byte{0xc4}):\n\t\treturn FileTypePGP\n\t}\n\treturn FileTypeUnknown\n}", "title": "" }, { "docid": "36e678091bc0f8de1865a3d6038ea0f1", "score": "0.5149509", "text": "func MimeType(extention string) (string, error) {\n\tconst op errors.Op = \"types.MimeType\"\n\n\tif mime, ok := Extentions[extention]; ok {\n\t\treturn mime, nil\n\t}\n\treturn \"\", errors.E(op, \"content type not supported\")\n}", "title": "" }, { "docid": "8a7fc48097332b875842659351847e2d", "score": "0.5138454", "text": "func detectFileType(header []string) FileType {\n\tfor _, fileType := range fileTypesOrder {\n\t\tif hasFields(header, FileTypeFields[fileType]) {\n\t\t\treturn fileType\n\t\t}\n\t}\n\n\treturn UnknownType\n}", "title": "" }, { "docid": "0d9fd60cfcd22d00a226b6bb4378baf4", "score": "0.51331353", "text": "func getFileType(path string) SourceType {\n\tfragments := strings.Split(path, \".\")\n\tif len(fragments) == 0 {\n\t\treturn SourceTypeUnknown\n\t}\n\n\textension := strings.TrimSpace(fragments[len(fragments)-1])\n\tswitch strings.ToLower(extension) {\n\tcase \"json\":\n\t\treturn SourceTypeJson\n\tcase \"grafonnet\":\n\t\treturn SourceTypeJsonnet\n\tcase \"jsonnet\":\n\t\treturn SourceTypeJsonnet\n\tcase \"yaml\":\n\t\treturn SourceTypeYaml\n\tdefault:\n\t\treturn SourceTypeUnknown\n\t}\n}", "title": "" }, { "docid": "0c8f5199c4295105d854bbc9483bf091", "score": "0.5127504", "text": "func mimeFromIncipit(incipit []byte) string {\n\tincipitStr := string(incipit)\n\tfor magic, mime := range magicTable {\n\t\tif strings.HasPrefix(incipitStr, magic) {\n\t\t\treturn mime\n\t\t}\n\t}\n\n\treturn \"\"\n}", "title": "" }, { "docid": "bebfa942f218203e339a0f9f8ded941d", "score": "0.5124257", "text": "func NormalizedMIMEType(input string) string {\n\tswitch input {\n\t// \"application/json\" is a valid v2s1 value per https://github.com/docker/distribution/blob/master/docs/spec/manifest-v2-1.md .\n\t// This works for now, when nothing else seems to return \"application/json\"; if that were not true, the mapping/detection might\n\t// need to happen within the ImageSource.\n\tcase \"application/json\":\n\t\treturn DockerV2Schema1SignedMediaType\n\tcase DockerV2Schema1MediaType, DockerV2Schema1SignedMediaType,\n\t\timgspecv1.MediaTypeImageManifest,\n\t\tDockerV2Schema2MediaType,\n\t\tDockerV2ListMediaType:\n\t\treturn input\n\tdefault:\n\t\t// If it's not a recognized manifest media type, or we have failed determining the type, we'll try one last time\n\t\t// to deserialize using v2s1 as per https://github.com/docker/distribution/blob/master/manifests.go#L108\n\t\t// and https://github.com/docker/distribution/blob/master/manifest/schema1/manifest.go#L50\n\t\t//\n\t\t// Crane registries can also return \"text/plain\", or pretty much anything else depending on a file extension “recognized” in the tag.\n\t\t// This makes no real sense, but it happens\n\t\t// because requests for manifests are\n\t\t// redirected to a content distribution\n\t\t// network which is configured that way. See https://bugzilla.redhat.com/show_bug.cgi?id=1389442\n\t\treturn DockerV2Schema1SignedMediaType\n\t}\n}", "title": "" }, { "docid": "35929c85296f5031199cf76f54e4c6bf", "score": "0.5122286", "text": "func (f *cachedFile) Type() string {\n\treturn mime.TypeByExtension(filepath.Ext(f.name))\n\n\t// var buf [1024]byte\n\t// n, _ := io.ReadFull(content, buf[:])\n\t// b := buf[:n]\n\t// ctype = DetectContentType(b)\n\t// _, err := content.Seek(0, os.SEEK_SET)\n}", "title": "" }, { "docid": "b3e27948c4488ae0bdf8e0e6bf466ec9", "score": "0.5122197", "text": "func (d *Resource) MimeType() string {\n\treturn d.JSON.GetS(\"hasMimeType\")\n}", "title": "" }, { "docid": "d48a7b91051333c1fe451a086b8247c0", "score": "0.51146895", "text": "func GetMIME(file string) (string, error) {\n\tbuffMIME, err := os.Open(file)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tbuff := make([]byte, 512)\n\t// why 512 bytes ? see http://golang.org/pkg/net/http/#DetectContentType\n\t_, err = buffMIME.Read(buff)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tfileType := http.DetectContentType(buff)\n\tbuffMIME.Close()\n\treturn fileType, nil\n}", "title": "" }, { "docid": "ddbb9c22b92eb3e0f4cfb671c1f6be3c", "score": "0.5110298", "text": "func UnmarshalFileTypeSecure(data json.RawMessage) (*FileTypeSecure, error) {\n\tvar response FileTypeSecure\n\n\terr := json.Unmarshal(data, &response)\n\n\treturn &response, err\n}", "title": "" }, { "docid": "4d50738eae7077e8085a3d47c6e1df7e", "score": "0.5100215", "text": "func ValidateMIME(contentType string) *core.Error {\n\n\t//contentType := r.Header.Get(\"Content-Type\")\n\n\tif len(strings.TrimSpace(contentType)) == 0 {\n\t\te := core.MakeError(http.StatusUnsupportedMediaType)\n\t\te.Code = \"d24289\"\n\t\te.Title = \"Missing media type\"\n\t\te.Detail = \"Clients MUST send all JSON:API data in request documents with the header `Content-Type: application/vnd.api+json` without any media type parameters\"\n\t\treturn e\n\t}\n\n\tmediatype, params, err := mime.ParseMediaType(contentType)\n\tif err != nil {\n\t\te := core.MakeError(http.StatusInternalServerError)\n\t\te.Code = \"811c93\"\n\t\te.Title = \"Encountered internal error while parsing media type\"\n\t\te.Detail = err.Error()\n\t\treturn e\n\t} else if mediatype != \"application/vnd.api+json\" || len(params) != 0 {\n\t\te := core.MakeError(http.StatusUnsupportedMediaType)\n\t\te.Code = \"d24289\"\n\t\te.Title = \"Invalid media type\"\n\t\te.Detail = \"Clients MUST send all JSON:API data in request documents with the header `Content-Type: application/vnd.api+json` without any media type parameters\"\n\t\treturn e\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "b0a682edbd8971bd98ea060a88aca752", "score": "0.50934947", "text": "func DetectMimeType(data []byte) string {\n\t// svg needs a specific check because the algorithm\n\t// implemented by http.DetectContentType doesn't detect svg\n\tif svg.IsSVG(data) {\n\t\treturn \"image/svg+xml\"\n\t}\n\treturn http.DetectContentType(data)\n}", "title": "" }, { "docid": "cfc9ad2ec03af583abb79d4ae85ae3d7", "score": "0.50931007", "text": "func (recv *FileChooserRequest) GetMimeTypes() []string {\n\tretC := C.webkit_file_chooser_request_get_mime_types((*C.WebKitFileChooserRequest)(recv.native))\n\tretGo := []string{}\n\tfor p := retC; *p != nil; p = (**C.char)(C.gpointer((uintptr(C.gpointer(p)) + uintptr(C.sizeof_gpointer)))) {\n\t\ts := C.GoString(*p)\n\t\tretGo = append(retGo, s)\n\t}\n\n\treturn retGo\n}", "title": "" }, { "docid": "168baf0d0949460b0dcc626d277b5c61", "score": "0.5072224", "text": "func FileType(types ...string) Rule {\n\treturn func(errs Errors, form *multipart.Form, key string) {\n\t\tif form == nil && form.File == nil {\n\t\t\treturn\n\t\t}\n\t\tfor _, file := range form.File[key] {\n\t\t\tct, err := fileType(file)\n\t\t\tif err != nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif !sliceContainsString(types, ct) {\n\t\t\t\terrs.Add(key, &Error{Error: ErrBadFileType, Args: stringsToInterfaces(types)})\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "3c927b06515a17931ce008ed9d0fcb56", "score": "0.5069844", "text": "func fileType(file io.Reader) (FileFormat, error) {\n\tbuf := make([]byte, tiff.HeaderSize)\n\tif _, err := io.ReadFull(file, buf); err != nil {\n\t\treturn 0, err\n\t}\n\tif jseg.IsJPEGHeader(buf) {\n\t\treturn FileJPEG, nil\n\t}\n\tif validTIFF, _, _ := tiff.GetHeader(buf); validTIFF {\n\t\treturn FileTIFF, nil\n\t}\n\treturn 0, errors.New(\"File doesn't have a TIFF or JPEG header\")\n}", "title": "" }, { "docid": "229763734ebfc469f5681aa5008a8bc4", "score": "0.50547737", "text": "func UnmarshalFileTypePhoto(data json.RawMessage) (*FileTypePhoto, error) {\n\tvar response FileTypePhoto\n\n\terr := json.Unmarshal(data, &response)\n\n\treturn &response, err\n}", "title": "" }, { "docid": "1fdfd25d9b419d0cc5c1c675986c1430", "score": "0.50544035", "text": "func ContentType(r io.Reader, name string) (ctype string, bufferedContent io.Reader, err error) {\n\tctype = mime.TypeByExtension(filepath.Ext(name))\n\tif ctype == \"\" && r != nil {\n\t\t// read a chunk to decide between utf-8 text and binary\n\t\tvar buf [sniffLen]byte\n\t\tvar n int\n\t\tif readSeeker, ok := r.(io.Seeker); ok {\n\t\t\tn, _ = io.ReadFull(r, buf[:])\n\t\t\t_, err = readSeeker.Seek(0, io.SeekStart) // rewind to output whole file\n\t\t\tif err != nil {\n\t\t\t\terr = errors.New(\"seeker can't seek\")\n\t\t\t\treturn \"\", r, err\n\t\t\t}\n\t\t} else {\n\t\t\tcontentBuffer := bufio.NewReader(r)\n\t\t\tsniffed, err := contentBuffer.Peek(sniffLen)\n\t\t\tif err != nil {\n\t\t\t\terr = errors.New(\"reader can't read\")\n\t\t\t\treturn \"\", contentBuffer, err\n\t\t\t}\n\t\t\tn = copy(buf[:], sniffed)\n\t\t\tr = contentBuffer\n\t\t}\n\t\tctype = http.DetectContentType(buf[:n])\n\t}\n\treturn ctype, r, nil\n}", "title": "" }, { "docid": "48bbad005fc75f0246d601981b89503c", "score": "0.5052384", "text": "func (o *Object) MimeType(ctx context.Context) string {\n\terr := o.readEntryAndSetMetadata(ctx)\n\tif err != nil {\n\t\treturn \"\"\n\t}\n\treturn o.file.ContentType\n}", "title": "" }, { "docid": "290b2e73247d9d8bfbcbfb5e432063d9", "score": "0.50507194", "text": "func (l *ListFormat) AddMimeType() {\n\tl.AppendOutput(func(entry *ListJSONItem) string {\n\t\treturn entry.MimeType\n\t})\n}", "title": "" }, { "docid": "d58b7a5b5adab1f97ab1afdbb405e1ec", "score": "0.50468135", "text": "func (self Route) matchesContentType(mimeTypes string) bool {\n\tparts := strings.Split(mimeTypes, \",\")\n\tfor _, each := range parts {\n\t\tfor _, other := range self.Consumes {\n\t\t\tif other == \"*/*\" || other == each {\n\t\t\t\treturn true\n\t\t\t}\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "491bbf1822f552dcdee7c0fb53c98b75", "score": "0.5033866", "text": "func (ct SniffedType) GetMimeType() string {\n\treturn strings.SplitN(ct.contentType, \";\", 2)[0]\n}", "title": "" }, { "docid": "8c6a83d41597fd72d5496f6ab41bc9ea", "score": "0.5033508", "text": "func IsFileType(b bundle.Bundle, def *definition.Schema) bool {\n\treturn SupportsFileParameters(b) &&\n\t\tdef.Type == \"string\" && def.ContentEncoding == \"base64\"\n}", "title": "" }, { "docid": "248bbe445aef2af44e3254fcb9c47830", "score": "0.50252557", "text": "func parseFileCaptureType(filter string) (config.FileCaptureType, error) {\n\tfilterFlag, ok := captureFileTypeStringToFlag[filter]\n\tif ok {\n\t\treturn filterFlag, nil\n\t}\n\treturn 0, fmt.Errorf(\"unsupported file type filter value for capture - %s\", filter)\n}", "title": "" }, { "docid": "8df0bfa13976c856e64818007d7aeedf", "score": "0.5021067", "text": "func isSupportedFileType(path string) bool {\n\tif filepath.Base(path) == \"OWNERS\" {\n\t\treturn true\n\t}\n\tsupportedExtensions := []string{\n\t\t\".c\",\n\t\t\".cc\",\n\t\t\".cmake\",\n\t\t\".cpp\",\n\t\t\".dart\",\n\t\t\".fidl\",\n\t\t\".gn\",\n\t\t\".gni\",\n\t\t\".go\",\n\t\t\".golden\",\n\t\t\".md\",\n\t\t\".pb\",\n\t\t\".png\",\n\t\t\".proto\",\n\t\t\".py\",\n\t\t\".rs\",\n\t\t\".rst\",\n\t\t\".sh\",\n\t\t\".template\",\n\t\t\".tmpl\",\n\t\t\".yaml\",\n\t}\n\textension := filepath.Ext(path)\n\treturn contains(supportedExtensions, extension)\n}", "title": "" }, { "docid": "e6635d04892f349b64a5fb46dc363403", "score": "0.5016181", "text": "func parse_file(path string, extension string) {\n\n\t// Open file\n\tfile, err := os.Open(path)\n\tif err != nil {\n\t\tignored_files = append(ignored_files, ignored{path, \"couldn't open file\"})\n\t\treturn\n\t}\n\tdefer file.Close()\n\n\t// init of useful storage for check functions\n\t// (see `check_hexstring()` for an example)\n\tstorage_string = make(map[string]string)\n\tstorage_bool = make(map[string]bool)\n\tstorage_int = make(map[string]int)\n\n\t// file is read line by line\n\tline_number = 0\n\tscanner := bufio.NewScanner(file)\n\tfor scanner.Scan() {\n\t\tline := scanner.Text()\n\t\tline_number++\n\n\t\t// is weird binary stuff in here?\n\t\t// note: this might really slow down... so commented for now\n\t\t/*\n\t\t\tif !utf8.Valid([]byte(line)) {\n\t\t\t\tignored_files = append(ignored_files, ignored{path, \"binary file\"})\n\t\t\t\treturn\n\t\t\t}\n\t\t*/\n\n\t\t// ignore line if it's a comment\n\t\tif isComment(line, extension) {\n\t\t\tcontinue\n\t\t}\n\n\t\t// ignore line if it's an array entry\n\t\tif isArrayEntry(line, extension) {\n\t\t\tcontinue\n\t\t}\n\n\t\tif len(line) > LINE_TOO_LONG {\n\t\t\tcontinue\n\t\t}\n\n\t\t//\n\t\t// EXTENSION-SPECIFIC CHECKS\n\t\t//\n\t\tvar check_temp *[]checker = nil\n\n\t\tif extension == \".go\" {\n\t\t\tcheck_temp = &checker_go\n\t\t} else if extension == \".c\" || extension == \".h\" || extension == \".cpp\" || extension == \".hpp\" || extension == \".c.inc\" || extension == \".cpp\" {\n\t\t\tcheck_temp = &checker_c\n\t\t} else if extension == \".java\" {\n\t\t\tcheck_temp = &checker_java\n\t\t} else if extension == \".erl\" || extension == \".hrl\" {\n\t\t\tcheck_temp = &checker_erlang\n\t\t} else if extension == \".rb\" {\n\t\t\tcheck_temp = &checker_ruby\n\t\t} else if extension == \".ml\" {\n\t\t\tcheck_temp = &checker_ocaml\n\t\t}\n\n\t\tif check_temp != nil {\n\t\t\tfor _, checker := range *check_temp {\n\n\t\t\t\tif checker.level < *level {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\tif result, reason := checker.checker(line); result != \"\" {\n\t\t\t\t\tfmt.Printf(\"\\n%s line %d:\\n\", path, line_number)\n\t\t\t\t\tfmt.Println(\" - severity:\", severity_str[checker.level])\n\t\t\t\t\tif reason != \"\" {\n\t\t\t\t\t\tfmt.Println(\" - reason:\", reason, \"\\n\")\n\t\t\t\t\t} else {\n\t\t\t\t\t\tfmt.Println(\"\")\n\t\t\t\t\t}\n\t\t\t\t\tfmt.Println(result)\n\t\t\t\t\tfmt.Println(\"\\n----------------------\")\n\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\t//\n\t\t// COMMON CHECKS\n\t\t//\n\n\t\tfor _, checker := range checker_list {\n\n\t\t\tif checker.level < *level {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tif result, reason := checker.checker(line); result != \"\" {\n\t\t\t\tfmt.Printf(\"\\n%s line %d:\\n\", path, line_number)\n\t\t\t\tfmt.Println(\" - severity:\", severity_str[checker.level])\n\t\t\t\tif reason != \"\" {\n\t\t\t\t\tfmt.Println(\" - reason:\", reason, \"\\n\")\n\t\t\t\t} else {\n\t\t\t\t\tfmt.Println(\"\")\n\t\t\t\t}\n\t\t\t\tfmt.Println(result)\n\t\t\t\tfmt.Println(\"\\n----------------------\")\n\n\t\t\t}\n\t\t}\n\n\t\t// END\n\t\tprevious_line = line\n\t}\n\n\t// error?\n\tif err := scanner.Err(); err != nil {\n\t\tignored_files = append(ignored_files, ignored{path, \"error while reading file\"})\n\t\treturn\n\t}\n\n\t//\n\treturn\n}", "title": "" }, { "docid": "fc9191d1800a78f4551883a7835e6d21", "score": "0.50085133", "text": "func DetectContentTypeFromReader(r io.Reader) (SniffedType, error) {\n\tbuf := make([]byte, sniffLen)\n\tn, err := util.ReadAtMost(r, buf)\n\tif err != nil {\n\t\treturn SniffedType{}, fmt.Errorf(\"DetectContentTypeFromReader io error: %w\", err)\n\t}\n\tbuf = buf[:n]\n\n\treturn DetectContentType(buf), nil\n}", "title": "" }, { "docid": "fca0e958aba967a739274060d836bfd0", "score": "0.5006759", "text": "func LoadDefinition() error {\n\t//Load contenttype.json into ContentTypeDefinition\n\tvar def map[string]ContentType\n\terr := util.UnmarshalData(util.ConfigPath()+\"/contenttype.json\", &def)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfor identifier, _ := range def {\n\t\tcDef := def[identifier]\n\t\tcDef.Init()\n\t\tdef[identifier] = cDef\n\t}\n\tcontentTypeDefinition = map[string]map[string]ContentType{\"default\": def}\n\n\t//todo: use config or scan folder.\n\t//todo nb: the translation can be add later but listener should be there\n\tloadTranslations([]string{\"nor-NO\", \"eng-GB\"})\n\n\treturn nil\n}", "title": "" }, { "docid": "c20c42eb631234eabf10d2e1b170bc6e", "score": "0.5001608", "text": "func UnmarshalFileTypeSecret(data json.RawMessage) (*FileTypeSecret, error) {\n\tvar response FileTypeSecret\n\n\terr := json.Unmarshal(data, &response)\n\n\treturn &response, err\n}", "title": "" }, { "docid": "8c3d275a406103fe8b39048a354e2d7d", "score": "0.49998224", "text": "func (g *Generator) generateMediaTypes(pkgDir string, funcs template.FuncMap) (err error) {\n\tfuncs[\"decodegotyperef\"] = decodeGoTypeRef\n\tfuncs[\"decodegotypename\"] = decodeGoTypeName\n\ttypeDecodeTmpl := template.Must(template.New(\"typeDecode\").Funcs(funcs).Parse(typeDecodeTmpl))\n\tvar (\n\t\tmtFile string\n\t\tmtWr *genapp.MediaTypesWriter\n\t)\n\t{\n\t\tmtFile = filepath.Join(pkgDir, \"media_types.go\")\n\t\tmtWr, err = genapp.NewMediaTypesWriter(mtFile)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\t}\n\tdefer func() {\n\t\tmtWr.Close()\n\t\tif err == nil {\n\t\t\terr = mtWr.FormatCode()\n\t\t}\n\t}()\n\ttitle := fmt.Sprintf(\"%s: Application Media Types\", g.API.Context())\n\timports := []*codegen.ImportSpec{\n\t\tcodegen.SimpleImport(\"github.com/goadesign/goa\"),\n\t\tcodegen.SimpleImport(\"fmt\"),\n\t\tcodegen.SimpleImport(\"net/http\"),\n\t\tcodegen.SimpleImport(\"time\"),\n\t\tcodegen.SimpleImport(\"unicode/utf8\"),\n\t\tcodegen.NewImport(\"uuid\", \"github.com/goadesign/goa/uuid\"),\n\t}\n\tfor _, v := range g.API.MediaTypes {\n\t\timports = codegen.AttributeImports(v.AttributeDefinition, imports, nil)\n\t}\n\tif err = mtWr.WriteHeader(title, g.Target, imports); err != nil {\n\t\treturn err\n\t}\n\tg.genfiles = append(g.genfiles, mtFile)\n\terr = g.API.IterateMediaTypes(func(mt *design.MediaTypeDefinition) error {\n\t\tif (mt.Type.IsObject() || mt.Type.IsArray()) && !mt.IsError() {\n\t\t\tif err := mtWr.Execute(mt); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t\terr := mt.IterateViews(func(view *design.ViewDefinition) error {\n\t\t\tp, _, err := mt.Project(view.Name)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\treturn typeDecodeTmpl.Execute(mtWr.SourceFile, p)\n\t\t})\n\t\treturn err\n\t})\n\treturn\n}", "title": "" }, { "docid": "ba1f9f3012d7ca139b3f2e9b177d264c", "score": "0.4986363", "text": "func getMediaType(ext string) (mt string) {\n\n\tswitch ext {\n\tcase \".mp3\":\n\t\tmt = \"audio/mpeg\"\n\tcase \".aac\":\n\t\tmt = \"audio/aac\"\n\tcase \".opus\":\n\t\tmt = \"audio/ogg\"\n\tcase \".wav\":\n\t\tmt = \"audio/wav\"\n\tcase \".jpeg\":\n\t\tmt = \"image/jpeg\"\n\tcase \".jpg\":\n\t\tmt = \"image/jpeg\"\n\tcase \".png\":\n\t\tmt = \"image/png\"\n\tcase \".gif\":\n\t\tmt = \"image/gif\"\n\tcase \".webp\":\n\t\tmt = \"image/webp\"\n\tcase \".json\":\n\t\tmt = \"application/json\"\n\tcase \".html\":\n\t\tmt = \"text/html\"\n\tcase \".css\":\n\t\tmt = \"text/css\"\n\tcase \".js\":\n\t\tmt = \"application/javascript\"\n\tcase \".epub\":\n\t\tmt = \"application/epub+zip\"\n\tcase \".pdf\":\n\t\tmt = \"application/pdf\"\n\t}\n\treturn\n}", "title": "" }, { "docid": "44208e338f8fc504b893840c92dcca89", "score": "0.49774864", "text": "func ContentTypeFromMimeType(mime_type string) (return__ string) {\n\t__cgo__mime_type := (*C.gchar)(unsafe.Pointer(C.CString(mime_type)))\n\tvar __cgo__return__ *C.gchar\n\t__cgo__return__ = C.g_content_type_from_mime_type(__cgo__mime_type)\n\tC.free(unsafe.Pointer(__cgo__mime_type))\n\treturn__ = C.GoString((*C.char)(unsafe.Pointer(__cgo__return__)))\n\treturn\n}", "title": "" }, { "docid": "79aad5bcc36ea84b56791997b3951be1", "score": "0.49697182", "text": "func (list *Schema2ListPublic) MIMEType() string {\n\treturn list.MediaType\n}", "title": "" }, { "docid": "df5f697cfd858fda42dfc38ca44760c1", "score": "0.4963877", "text": "func ContentType(filename string, filesize int64, contbuffer []byte, csizebuffer int) (conttype string, err error) {\n\n\tconttype = mime.TypeByExtension(filepath.Ext(filename))\n\n\tif conttype == \"\" && filesize >= 512 {\n\n\t\tconttype = http.DetectContentType(contbuffer[:csizebuffer])\n\t\treturn conttype, err\n\n\t}\n\n\treturn conttype, err\n\n}", "title": "" }, { "docid": "8b001165c5d359300d45ce4f89f7a542", "score": "0.4950874", "text": "func Extension( mime string ) (error, string) {\n\n\tmime = strings.ToLower( mime )\n\n\tfor _, item := range *List_items {\n\t\tif item.Mime == mime {\n\t\t\treturn nil, item.Extension\n\t\t}\n\t}\n\n\treturn errors.New(\"Not found\"), \"\"\n}", "title": "" }, { "docid": "f8815b2689f40694bd1b623b2602dfaa", "score": "0.49503246", "text": "func FileMIME(f *os.File) (string, error) {\n\t// store location\n\tpos, err := f.Seek(0, io.SeekCurrent)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\t// determine mime\n\tb := make([]byte, 512) // all that's needed for mime per doco\n\t_, err = f.Read(b)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\t// reset file pointer\n\t_, err = f.Seek(pos, io.SeekStart)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn http.DetectContentType(b), nil\n}", "title": "" }, { "docid": "a838793a2d5a65e6ec046e9e5123399d", "score": "0.49470782", "text": "func DetectMediaType(fs afero.Fs, path string) (string, error) {\n\tf, err := fs.Open(path)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tdefer f.Close()\n\n\tsniffBuf := make([]byte, 512)\n\tif _, err := io.ReadFull(f, sniffBuf); err != nil {\n\t\t// We don't want to fail when the file is smaller than the 512 bytes needed to sniff\n\t\t// its media type. This can happen with non-binary content (eg. a small Python script).\n\t\tif err != io.ErrUnexpectedEOF {\n\t\t\treturn \"\", err\n\t\t}\n\t}\n\treturn http.DetectContentType(sniffBuf), nil\n}", "title": "" }, { "docid": "338dc407f62b15409c53af3de2d4e049", "score": "0.49451295", "text": "func matchesContentType(contentType, expectedType string) bool {\n\tmimetype, _, err := mime.ParseMediaType(contentType)\n\tif err != nil {\n\t\tlogrus.Errorf(\"Error parsing media type: %s error: %v\", contentType, err)\n\t}\n\treturn err == nil && mimetype == expectedType\n}", "title": "" }, { "docid": "32389dc986d6bbe303d924733af30723", "score": "0.49312797", "text": "func (m *memfile) MIMEType() string {\n\treturn m.mime\n}", "title": "" }, { "docid": "dd6e9b34c96e6655ed68f3e14c7c69af", "score": "0.49267262", "text": "func UnmarshalFileTypeAudio(data json.RawMessage) (*FileTypeAudio, error) {\n\tvar response FileTypeAudio\n\n\terr := json.Unmarshal(data, &response)\n\n\treturn &response, err\n}", "title": "" }, { "docid": "0a014f62ada81b0794f6ed436a397144", "score": "0.49242058", "text": "func validateContent(resp *http.Response) (mime string, body []byte, err error) {\n\tmime = resp.Header.Get(\"Content-Type\")\n\tif mime == \"\" {\n\t\tmime = \"application/octet-stream\"\n\t}\n\tif i := strings.Index(mime, \";\"); i >= 0 {\n\t\tmime = mime[:i]\n\t}\n\n\tif !strings.HasPrefix(mime, \"text\") {\n\t\t// If this is not a text document there is no point reading the body\n\t\treturn mime, nil, nil\n\t}\n\n\tbuf := bytes.Buffer{}\n\t// TODO this should be limited to a sane max length\n\tif _, err := buf.ReadFrom(resp.Body); err != nil {\n\t\treturn \"\", nil, err\n\t}\n\n\treturn mime, buf.Bytes(), nil\n}", "title": "" }, { "docid": "9fd1804b85bdc6074051f8be928dfead", "score": "0.4923288", "text": "func loadConfigFlags() (file string, fileType config.FileType, err error) {\n\tt := *configType\n\tf := *configFile\n\n\t// if file type is not provided, load file type from file\n\tif t == \"\" {\n\t\textSlice := strings.Split(f, \".\")\n\t\tlenExt := len(extSlice)\n\t\tif lenExt == 0 {\n\t\t\treturn \"\", \"\", ErrorInvalidFileType\n\t\t}\n\n\t\tt = extSlice[lenExt-1]\n\t}\n\n\tt = strings.ToLower(t)\n\n\tswitch t {\n\tcase \"yaml\":\n\t\treturn f, config.FileTypeYAML, nil\n\tcase \"json\":\n\t\treturn f, config.FileTypeJSON, nil\n\tdefault:\n\t\treturn \"\", \"\", ErrorInvalidFileType\n\t}\n}", "title": "" }, { "docid": "2b71cc8989d72619c7f8b732ed5e8dd3", "score": "0.4902891", "text": "func (recv *Plugin) GetMimeInfoList() *glib.List {\n\tretC := C.webkit_plugin_get_mime_info_list((*C.WebKitPlugin)(recv.native))\n\tretGo := glib.ListNewFromC(unsafe.Pointer(retC))\n\n\treturn retGo\n}", "title": "" }, { "docid": "64abc92f87896719d4530c04ac5c3c86", "score": "0.48966113", "text": "func UnmarshalFileTypeNone(data json.RawMessage) (*FileTypeNone, error) {\n\tvar response FileTypeNone\n\n\terr := json.Unmarshal(data, &response)\n\n\treturn &response, err\n}", "title": "" }, { "docid": "56f5777de799162d2717300e9f9be334", "score": "0.48964956", "text": "func UnmarshalFileTypeWallpaper(data json.RawMessage) (*FileTypeWallpaper, error) {\n\tvar response FileTypeWallpaper\n\n\terr := json.Unmarshal(data, &response)\n\n\treturn &response, err\n}", "title": "" }, { "docid": "9745cb313503b97850a75383bf430fe8", "score": "0.4893108", "text": "func validateMIMETypeBasedOnRoute(req *http.Request) error {\n\tif strings.Contains(req.URL.Path, routes.APIv2Keys) {\n\t\tif reqContentType, expectedContentType := req.Header.Get(constants.ContentTypeHeader), string(corecomms.Key); strings.Compare(reqContentType, expectedContentType) != 0 {\n\t\t\treturn errors.New(http.StatusText(http.StatusBadRequest) + \": invalid content-type provided\")\n\t\t}\n\t}\n\n\tif reqContentType, expectedContentType := req.Header.Get(constants.ContentTypeHeader), string(corecomms.Secret); strings.Compare(reqContentType, expectedContentType) != 0 {\n\t\treturn errors.New(http.StatusText(http.StatusBadRequest) + \": invalid content-type provided\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "afc1af049a86e1afa8c169dec86951f4", "score": "0.48784873", "text": "func (o *Object) MimeType(ctx context.Context) string {\n\terr := o.readMetaData(ctx)\n\tif err != nil {\n\t\tfs.Logf(o, \"Failed to read metadata: %v\", err)\n\t\treturn \"\"\n\t}\n\treturn o.mimeType\n}", "title": "" }, { "docid": "17210be71ab7ce5acc5f30b3fd50315f", "score": "0.48717135", "text": "func (s *Service) loadTypes() {\n\tvar (\n\t\tresp *arccli.TypesReply\n\t\terr error\n\t)\n\tif resp, err = s.arcClient.Types(ctx, &arccli.NoArgRequest{}); err != nil {\n\t\tlog.Error(\"arcRPC loadType Error %v\", err)\n\t\treturn\n\t}\n\ts.arcTypes = resp.Types\n}", "title": "" } ]
a9d03e074ccb8a66f99a5aa7e1e72ff7
Reset sets the tween state variables back to there starting points
[ { "docid": "726d17aa70490336a5e396fd57cbe8f1", "score": "0.62225527", "text": "func (tweener *Tweener) Reset() {\n\ttweener.started = false\n\ttweener.repeatCount = 0\n}", "title": "" } ]
[ { "docid": "16ec61e10a52687f3eae5335e2115da6", "score": "0.68742394", "text": "func (t *Toboggan) Reset() {\n\tt.PosX = 0\n\tt.PosY = 0\n}", "title": "" }, { "docid": "09d552422cbd79af166758959fe2ed5d", "score": "0.6798739", "text": "func (a *TrackAnimation) Reset() {\n\ta.forEachTrack(func(track *Track) {\n\t\ttrack.Seek(0)\n\t})\n\n\ta.runTime = 0\n\ta.frame = 0\n}", "title": "" }, { "docid": "cc258104f8fa0c998c5794515341e8aa", "score": "0.6794636", "text": "func (a *Animation) Reset() {\n\ta.paused = false\n\ta.LoopCompleted = false\n\ta.frameCount = 0\n\ta.currFrame = 0\n}", "title": "" }, { "docid": "335e2c58b5c0b4f1526681b78fd37835", "score": "0.6773935", "text": "func (olympics *reindeerOlympics) reset() {\n\tfor ii := range olympics.points {\n\t\tolympics.points[ii] = 0\n\t\tolympics.travelled[ii] = 0\n\t}\n\tolympics.time = 0\n}", "title": "" }, { "docid": "0393e4a520bbdf6d9d0371e25a3050f0", "score": "0.6612557", "text": "func (p *DrawProps) Reset() {\r\n\tp.fontSize.Undefine()\r\n\tp.fontColor.Undefine()\r\n\tp.align.Undefine()\r\n}", "title": "" }, { "docid": "5cc22f0e58d4fcf80df8320ae3001f50", "score": "0.6581687", "text": "func Reset() {\n\tcenter = complex(0, 0)\n\tradius = 2.0\n\tdepth = 256\n}", "title": "" }, { "docid": "6830b1d1ce703793505af0f137e6a235", "score": "0.64305836", "text": "func (self *QuadTree) Reset(x int, y int, width int, height int) {\n self.Object.Call(\"reset\", x, y, width, height)\n}", "title": "" }, { "docid": "08665d85470ff073a6ebf330002b466d", "score": "0.6402976", "text": "func (sprite *Sprite) Reset() {\n\tcurrentAnimation := sprite.Animations[sprite.CurrentAnimation]\n\tcurrentAnimation.CurrentStep = currentAnimation.FirstStep\n}", "title": "" }, { "docid": "4291938dfb55cd228eafa7baca4b43a0", "score": "0.63406295", "text": "func (in *inflights) reset() {\n\tin.count = 0\n\tin.start = 0\n}", "title": "" }, { "docid": "52c7657c55fdfa83cbc0af77deebba82", "score": "0.6319294", "text": "func (sw *SlidingWindow) Reset() {\n\tsw.Lock()\n\tdefer sw.Unlock()\n\n\tsw.pos, sw.size = 0, 0\n\tfor i := range sw.samples {\n\t\tsw.samples[i] = 0\n\t}\n}", "title": "" }, { "docid": "980fd421cfd19bd4dffacbe09386f176", "score": "0.6310574", "text": "func (thr *Throat) Reset() {\n\tthr.Y = 0.0\n}", "title": "" }, { "docid": "4cad78b65f7184f9af773d260457181f", "score": "0.6243311", "text": "func (in *Inflights) reset() {\n\tin.start = 0\n\tin.count = 0\n\tin.bytes = 0\n}", "title": "" }, { "docid": "c651c5ade18049f80b52be4d92ae5d77", "score": "0.6202109", "text": "func Reset() {\n\tcanvas.width, canvas.height = term.Size()\n\tcanvas.clipX, canvas.clipY = 0, 0\n\tcanvas.clipW, canvas.clipH = canvas.width, canvas.height\n\tcanvas.textColor = ColorWhite\n\tcanvas.backColor = ColorBlack\n\n\tcanvas.attrStack = make([]attr, 0)\n\tcanvas.clipStack = make([]rect, 0)\n}", "title": "" }, { "docid": "8b97d9162f6274438726458125a15893", "score": "0.6166145", "text": "func (d *Dispatcher) Reset() {\n\tfor i := range d.triggers {\n\t\td.triggers[i] = nil\n\t}\n\td.currentIndex = 0\n}", "title": "" }, { "docid": "ff99bb3879f6e94f5290bba7e16e7af9", "score": "0.61615574", "text": "func (p *Player) Reset() {\n\tp.enabledShrine1 = false\n\tp.enabledShrine2 = false\n\tp.enabledShrine3 = false\n\tp.enabledLastShrine = false\n\tp.talkedToEvil = false\n\tp.x = 160\n\tp.y = 120\n}", "title": "" }, { "docid": "b3089bac497fcc44682fdafcf474bed6", "score": "0.611212", "text": "func (t *Transformer) Reset() {\n\tt.actions = t.actions[:0]\n}", "title": "" }, { "docid": "2b2196736d4d6e6e9d9d51296bf9797f", "score": "0.60998863", "text": "func (f *Freeway) Reset() {\n\tf.randomizeCars(true)\n\tf.position = 9\n\tf.moveTimer = playerSpeed\n\tf.terminateTimer = timeLimit\n\tf.terminal = false\n}", "title": "" }, { "docid": "f2722b7ac786574d2c01e97ea91f963a", "score": "0.6092582", "text": "func (instance *Instance) Reset() {\n\tinstance.Target = InitialState\n}", "title": "" }, { "docid": "13617b65ea067d398aad438aada20019", "score": "0.6077124", "text": "func (ws *WarpSync) reset() {\n\tws.StartTime = time.Time{}\n\tws.InitMilestone = 0\n\tws.TargetMilestone = 0\n\tws.PreviousCheckpoint = 0\n\tws.CurrentCheckpoint = 0\n\tws.referencedBlocksTotal = 0\n}", "title": "" }, { "docid": "f450cfbfa55196016c20aac69f8c94b2", "score": "0.6068743", "text": "func (n *Nodes) Reset() {\n\tn.curr = nil\n\tn.pos = 0\n\tn.iter = n.nodes.MapRange()\n}", "title": "" }, { "docid": "46fef5bf093574736fc1d964903556ea", "score": "0.60582954", "text": "func (s *MagKalState) Reset() {\n\ts.K1, s.K2, s.K3 = Big, Big, Big\n\ts.L1, s.L2, s.L3 = 0, 0, 0\n\n\ts.T = 0 // Time when state last updated\n\n\ts.logMap = make(map[string]interface{})\n}", "title": "" }, { "docid": "87e32ffa0c092dab74b336462cfd604d", "score": "0.60063815", "text": "func (c *Cubic) Reset() {\n\tc.epoch = time.Time{}\n\tc.lastMaxCongestionWindow = 0\n\tc.ackedBytesCount = 0\n\tc.estimatedTCPcongestionWindow = 0\n\tc.originPointCongestionWindow = 0\n\tc.timeToOriginPoint = 0\n\tc.lastTargetCongestionWindow = 0\n}", "title": "" }, { "docid": "4d294aa689214e7cffb35f25c1af6f5f", "score": "0.5979133", "text": "func (n *Number) Reset() {\n\tfor _, d := range *n {\n\t\td.currentIndex = 0\n\t}\n}", "title": "" }, { "docid": "01ce0a21879309f0ad52fbff0eb177a1", "score": "0.5970473", "text": "func (v *Voronoi) Reset() {\n\tv.EventQueue = NewEventQueue(v.Sites)\n\tv.ParabolaTree = nil\n\tv.SweepLine = 0\n\tv.DCEL = dcel.NewDCEL()\n}", "title": "" }, { "docid": "d9e06d7b953668280f04f1930e2d197f", "score": "0.5965253", "text": "func (g *Graphemes) Reset() {\n\tg.start, g.end, g.pos, g.state = 0, 0, 0, grAny\n\tg.Next() // Parse ahead again.\n}", "title": "" }, { "docid": "955696674e33a5f5d5b0d747414f8b79", "score": "0.5963376", "text": "func (b *Buffer) Reset() {\n\tb.top, b.bottom = 0, 0\n}", "title": "" }, { "docid": "acc295246f7dc69e046c8b495fc2ea41", "score": "0.5935534", "text": "func (g *Game) Reset() {\n g.Board.Reset()\n g.sequence.Resize(0,0)\n}", "title": "" }, { "docid": "3e2dbc39b6826163086b0a4a4669f3c5", "score": "0.5921383", "text": "func (p *Exponent) Reset() {\n\tfor i := 0; i < len(p.coefficients); i++ {\n\t\tp.coefficients[i].Set(ristretto.NewIdentityElement())\n\t}\n}", "title": "" }, { "docid": "1d3f79df9f78055abe1c3b856a0a895b", "score": "0.5915507", "text": "func (w *Waveform) Reset() {\n}", "title": "" }, { "docid": "5b6357f586aaec02bdb8dba8d527678c", "score": "0.5903911", "text": "func (s *SublayerCalculator) reset(n int) {\n\tif n > len(s.spanStates) {\n\t\ts.spanStates = make([]spanState, n)\n\t\ts.timestamps = make([]timestamp, 2*n)\n\t}\n\tfor i := 0; i < n; i++ {\n\t\ts.spanStates[i].open = false\n\t\ts.spanStates[i].nOpenChildren = 0\n\t\ts.spanStates[i].active = false\n\t\ts.spanStates[i].execDuration = 0\n\t}\n}", "title": "" }, { "docid": "6d48d678e96a81696d5478e3f2f05306", "score": "0.58960444", "text": "func (sc *Scroller) Reset() {\n\tsc.textPos = sc.start\n}", "title": "" }, { "docid": "6a3ccb5e4d9b269f1a14cbbc8fd40e09", "score": "0.58912593", "text": "func (e *Impl) ResetPosition() {\n\t// Set the min and max to nil\n\te.min = nil\n\te.max = nil\n}", "title": "" }, { "docid": "d9fd4ff9821b7eff8de3bd9beb233e43", "score": "0.5886744", "text": "func (p *Parser) Reset() {\n\tp.state = dateState\n\tp.start, p.end = 0, 0\n}", "title": "" }, { "docid": "5a6be058ce24a26d68ef323f8797ed59", "score": "0.5864279", "text": "func ResetDrawStack() {\n\tGlobalDrawStack = initialDrawStack.Copy()\n}", "title": "" }, { "docid": "2d43f6049c12f9fc475bbd5023b25081", "score": "0.5857542", "text": "func (e *Impl) Reset() {\n\t// Reset the position\n\te.ResetPosition()\n\t// Reset the background\n\te.Bkg.Reset()\n\t// Reset the width and height\n\te.width = nil\n\te.height = nil\n}", "title": "" }, { "docid": "ae518627b0cb119534049bdb599ac384", "score": "0.5852912", "text": "func (b *Backoff) Reset() {\n\tb.x = 0\n}", "title": "" }, { "docid": "fa5d9a46aead6f55201ad3fbc3f394ed", "score": "0.5841669", "text": "func (poly *Polynomial) Reset() {\n\tfor i := 0; i < len(poly.coeff); i++ {\n\t\tpoly.coeff[i].SetInt64(0)\n\t}\n}", "title": "" }, { "docid": "5cf1d5ac84cdd1bb4ae0dbd9d64300f6", "score": "0.5839844", "text": "func (self *QuadTree) Reset1O(x int, y int, width int, height int, maxObjects int) {\n self.Object.Call(\"reset\", x, y, width, height, maxObjects)\n}", "title": "" }, { "docid": "c9eec58855390dbd77b627c7993bfdd0", "score": "0.5825119", "text": "func reset() {\n\tinitialized = false\n\tallMetrics = makeMetricSet()\n\temitter.Reset()\n}", "title": "" }, { "docid": "a9bd66cd998c8720c56af14b16e2a82c", "score": "0.5818037", "text": "func (c *Cubic) Reset() {\n\tc.epoch = time.Time{}\n\tc.appLimitedStartTime = time.Time{}\n\tc.lastUpdateTime = time.Time{}\n\tc.lastCongestionWindow = 0\n\tc.lastMaxCongestionWindow = 0\n\tc.ackedPacketsCount = 0\n\tc.estimatedTCPcongestionWindow = 0\n\tc.originPointCongestionWindow = 0\n\tc.timeToOriginPoint = 0\n\tc.lastTargetCongestionWindow = 0\n}", "title": "" }, { "docid": "f681270048f31818689278a83566aa19", "score": "0.5814881", "text": "func (s *sstack) Reset() {\n\t*s = *newSstack(s.setIndex)\n}", "title": "" }, { "docid": "13fcf1328d57707dbee3af222dc94de6", "score": "0.5800183", "text": "func (s *Stats) Reset() {\n\ts.Duration = 0\n\ts.Nodes = 0\n}", "title": "" }, { "docid": "5c4c9d91dbc75f06d7a1a6a9789f5b1a", "score": "0.580002", "text": "func (s *Spinner) Reset() {\n\ts.mu.Lock()\n\tdefer s.mu.Unlock()\n\ts.pos = 0\n}", "title": "" }, { "docid": "9de41472a55d0c12bfdf154702dc2858", "score": "0.5795866", "text": "func (r *Rollsum32Base) Reset() {\n\tr.a, r.b = 0, 0\n}", "title": "" }, { "docid": "fb62056bb316f86c940c0b18ae9aa308", "score": "0.57777226", "text": "func (b *Buffer) Reset() {\n\tb.start = 0\n\tb.end = 0\n}", "title": "" }, { "docid": "3c7151be01a228e16358b746e50fdfc0", "score": "0.57698464", "text": "func resetTransforms(ev *event.Event) {\n\tlog.Println(\"Reset\")\n\tengine.Camera2d.ResetTransform()\n}", "title": "" }, { "docid": "b76eed475b45d8f5fc01a8b2481b410e", "score": "0.5764164", "text": "func (labeller *Labeller) Reset() {\n\tlabeller.index = 0\n}", "title": "" }, { "docid": "3b11958f0457729c6e58ca643744e698", "score": "0.57548964", "text": "func (ps *Prep) Reset() {\n\t*ps = (*ps)[0:0]\n}", "title": "" }, { "docid": "bb1d81260935f125687909fb1f01584b", "score": "0.57434165", "text": "func (element *Element) Reset() {\n\telement.Target = InitialState\n\n\t// reset all clusters\n\tclusterNames, _ := element.ListClusters()\n\tfor _, clusterName := range clusterNames {\n\t\tcluster, _ := element.GetCluster(clusterName)\n\n\t\tcluster.Reset()\n\t}\n}", "title": "" }, { "docid": "107de8c4acc6852b235bb9762127a2fd", "score": "0.57392776", "text": "func (g *Gauge) Reset() {\n\tg.v = math.NaN()\n}", "title": "" }, { "docid": "0dcbc3485019ff5d1a13109a7400630d", "score": "0.5732895", "text": "func (rb *RingBuffer[V]) Reset() {\n\tatomic.StoreUint64(&rb.queue, 0)\n\tatomic.StoreUint64(&rb.dequeue, 0)\n\n\tvar zero V\n\tfor idx, n := range rb.nodes {\n\t\tn.data = zero\n\t\tn.position = uint64(idx)\n\t}\n}", "title": "" }, { "docid": "9cf50e3378b572ef11686683348d0f2f", "score": "0.5732212", "text": "func Reset() {\n\tpointerIndex = 0\n}", "title": "" }, { "docid": "2dbf6711589d0e7625b48ac084a95791", "score": "0.57312727", "text": "func (d *Pile) Reset() {\n\td.offset = 0\n}", "title": "" }, { "docid": "9e512800f147a56e604b02f769aebe47", "score": "0.5722144", "text": "func (r *RingBuffer) Reset() {\n\tr.written = 0\n\tr.ringMode = false\n\tr.pos = 0\n}", "title": "" }, { "docid": "194b1bfedcd71d50785d589082b5ab8f", "score": "0.5703655", "text": "func (gn *Gen) Reset() {\n}", "title": "" }, { "docid": "48a9d959881b4c32e75b20df8fa8a68a", "score": "0.5700686", "text": "func (bt *batchTraces) reset() {\n\tbt.traceData = pdata.NewTraces()\n\tbt.spanCount = 0\n}", "title": "" }, { "docid": "edc2aaec8c300da3534e35ca3ecf3a12", "score": "0.5687876", "text": "func (dc *Context) ResetClip() {\n\tdc.mask = nil\n}", "title": "" }, { "docid": "f8cb16be267cdd772f8a1c7e2d4489de", "score": "0.5686713", "text": "func (p *Parser) Reset() {\n\tp.tree = nil\n\tp.head = nil\n\tp.done = false\n}", "title": "" }, { "docid": "3de153bd711bb34f394e8e1560ad9240", "score": "0.56805444", "text": "func (d *DepthFirst) Reset() {\n\td.s.Clear()\n\td.visits = d.visits[:0]\n}", "title": "" }, { "docid": "29a882d5b0f0d136cceccdc75b2a13fa", "score": "0.56791455", "text": "func (tr *Trace) Reset() {\n\t*tr = Trace{}\n\ttr.Stacks = make(map[uint64]Stack)\n\ttr.Strings = make(map[uint64]string)\n}", "title": "" }, { "docid": "aa855b8c2307a30a8e7180c8a4bff4eb", "score": "0.5658932", "text": "func (p *Portfolio) Reset() {\n\tp.cash = 0\n\tp.holdings = nil\n\tp.transactions = nil\n}", "title": "" }, { "docid": "49c35d8e3b842476bd4c9f3cd96fe3a6", "score": "0.56525826", "text": "func (b *Buffer) Reset() {\n\tb.wpos = 0\n\tb.rpos = 0\n}", "title": "" }, { "docid": "46981d3aeb5497b2e3c270aac419c9e5", "score": "0.56512535", "text": "func (s *Stopwatch) Reset() {\n\ts.start = time.Now()\n\ts.lastMarkDuration = 0\n}", "title": "" }, { "docid": "1a260695aa975e7392aea94813193be5", "score": "0.56438184", "text": "func (s *Stats) reset() {\n\ts.calls = 0\n\ts.failures = 0\n\ts.successes = 0\n\ts.continuousFailures = 0\n\ts.continuousSuccesses = 0\n}", "title": "" }, { "docid": "f415dd1c20b6312a890788d98c636b5c", "score": "0.5641496", "text": "func (s *Segment) Reset() {\n\ts.offset = 0\n}", "title": "" }, { "docid": "bb3708aae6e1b55882a9b2bc9ca70eec", "score": "0.5616139", "text": "func (nc *NoughtCross) Reset() {\n\tnc.board = newBoard()\n\tnc.winner = none\n\tnc.player = Cross\n}", "title": "" }, { "docid": "b230c5a636e1deb5be6fb787edd75cea", "score": "0.559666", "text": "func (s *ScreenReader) Reset(next geom.Vec2) {\n\ts.start = next\n\ts.next = next\n\ts.numRead = 0\n}", "title": "" }, { "docid": "8ca1905d00f1bc94105f4a7dfa97066d", "score": "0.55954", "text": "func (m *Mouse) Reset(screen Screen) {\n\tm.posX = screen.width / 2\n\tm.posY = screen.height / 2\n\tm.LeftButtonUp()\n\tm.RightButtonUp()\n\tif m.wheel.State() > defaultSettingValue {\n\t\tfor m.wheel.State() != defaultSettingValue {\n\t\t\tm.wheel.ScrollDown()\n\t\t}\n\t} else if m.wheel.State() < defaultSettingValue {\n\t\tfor m.wheel.State() != defaultSettingValue {\n\t\t\tm.wheel.ScrollUp()\n\t\t}\n\t}\n\tm.Sensitivity(minSettingValue)\n}", "title": "" }, { "docid": "60ff5f6358a470912c24781f048b773b", "score": "0.5587773", "text": "func (converter Converter) Reset() {\n\tC.g_converter_reset(converter.native())\n}", "title": "" }, { "docid": "966d634f59a6cb692fc9d3cdd946584e", "score": "0.558631", "text": "func (s *sliceEmitter) Reset() {\n\t*s = nil\n}", "title": "" }, { "docid": "18b69297c5f6b654fd9510337212dfe4", "score": "0.5583092", "text": "func (s *Solution) ResetFrom(index uint) error {\r\n\t// Set all the vertex next to the start index as unassign\r\n\tfor i := index; i < s.Vertex+1; i++ {\r\n\t\ts.vPosition[s.Order[i]] = 0\r\n\t}\r\n\r\n\terr := s.OrderVertexes(index)\r\n\treturn err\r\n}", "title": "" }, { "docid": "d19b254ca24947eef1bc113a2aeac9e0", "score": "0.5576976", "text": "func (v *View) reset() {\n\tfor _, vt := range v.types {\n\t\tvt.reset()\n\t}\n\n\tfor _, vv := range v.vars {\n\t\tvv.reset()\n\t}\n\n\tv.dv = nil\n}", "title": "" }, { "docid": "a9582c4253958f5ba6e266c6899d6e22", "score": "0.5567364", "text": "func (a *App) Reset(sz size.Event) {\n\tif sz.PixelsPerPt == 0 || sz.HeightPt == 0 || sz.WidthPt == 0 {\n\t\treturn\n\t}\n\ta.ctrl.x = float32(sz.WidthPt)/2 - ctrlSize/2\n\ta.ctrl.y = 3*float32(sz.HeightPt)/4 - ctrlSize/2\n\ta.ctrl.midx = a.ctrl.x + ctrlSize/2\n\ta.ctrl.midy = a.ctrl.y + ctrlSize/2\n\ta.stick.x = float32(sz.WidthPt)/2 - ctrlStickSize/2\n\ta.stick.y = 3*float32(sz.HeightPt)/4 - ctrlStickSize/2\n\ta.calcStickMids()\n\ta.bot.x = float32(sz.WidthPt)/2 - botSize/2\n\ta.bot.y = float32(sz.HeightPt)/3 - botSize/2\n}", "title": "" }, { "docid": "48dfe1f886a5310dcbe2eedfb89f0398", "score": "0.5565746", "text": "func (p *Proxy) reset() {\r\n\tp.service.Reset()\r\n}", "title": "" }, { "docid": "e088f799426dbc6086f1ad0f1aa427a1", "score": "0.5558393", "text": "func (o *Ops) Reset() {\n\to.stackDepth = 0\n\t// Leave references to the GC.\n\tfor i := range o.refs {\n\t\to.refs[i] = nil\n\t}\n\to.data = o.data[:0]\n\to.refs = o.refs[:0]\n\to.version++\n}", "title": "" }, { "docid": "6729c3b6629fa68ec5d648a38ecf4fd8", "score": "0.5557863", "text": "func (p *Player) Reset() {\n\tp.current = 1\n}", "title": "" }, { "docid": "8dd351028651283a569bbd74234e3b27", "score": "0.55328393", "text": "func (this *Solution) Reset() []int {\n return this.Origin\n}", "title": "" }, { "docid": "6ad088af744463415af52fd43df58845", "score": "0.55247426", "text": "func (c *Clise) Reset() {\n\tc.Lock()\n\tc.last = 0\n\tc.over = false\n\tc.Unlock()\n}", "title": "" }, { "docid": "46c79a1890e2154d0db91b4d71ac3e07", "score": "0.5523223", "text": "func (t *Text) reset() {\n\tt.content = nil\n\tt.wrapped = nil\n\tt.scroll = newScrollTracker(t.opts)\n\tt.lastWidth = 0\n\tt.contentChanged = true\n}", "title": "" }, { "docid": "222d19c3365a736933a1807c601f9cde", "score": "0.55202603", "text": "func Reset() {\n\tDefaultTransport.Reset()\n}", "title": "" }, { "docid": "c8fb413673c646ec0df5049d7c117093", "score": "0.55146176", "text": "func (gif *GifImage) Reset() {\n\tgif.currentFrame = 0\n\tgif.lastFrameTime = 0\n}", "title": "" }, { "docid": "47c9b9dee776fafca667a2a06ae59439", "score": "0.550897", "text": "func (p *Position)Reset(robots *[4][2]uint) {\n\tp.board.Reset(robots)\n\tp.move = p.move[0:1]\n\tfindRobots(p)\n}", "title": "" }, { "docid": "c51b37d1d2cd26ccf65292c1a984c577", "score": "0.55074865", "text": "func (p *Pipe) Reset() {\n\tp.mu.Lock()\n\tdefer p.mu.Unlock()\n\tp.cmds = nil\n}", "title": "" }, { "docid": "9cdf7ab2115cfeb6e5f1e5fdf9f61ad9", "score": "0.5507022", "text": "func (mock *Mock) Reset() {\n\tmock.mappings = []*InvocationStub{}\n\tmock.invocations = []Invocation{}\n\tmock.currentMappingIndex = 0\n}", "title": "" }, { "docid": "93441e203bd79f331d61028c378bb57e", "score": "0.55017835", "text": "func (b *batch) Reset() {\n\tb.b.Reset()\n\tb.size = 0\n}", "title": "" }, { "docid": "9855d849e0ba73efa92352216ffb966d", "score": "0.54914176", "text": "func (self *QuadTree) Reset2O(x int, y int, width int, height int, maxObjects int, maxLevels int) {\n self.Object.Call(\"reset\", x, y, width, height, maxObjects, maxLevels)\n}", "title": "" }, { "docid": "0d98068f0f68ee56b1350a0e80e35b94", "score": "0.548974", "text": "func (self *Image) Reset(x int, y int) *DisplayObject{\n return &DisplayObject{self.Object.Call(\"reset\", x, y)}\n}", "title": "" }, { "docid": "73ec26d353cc7c68d687375846750f5a", "score": "0.54766816", "text": "func (t *Throttle) Reset() {\n\tt.v.Store(0)\n}", "title": "" }, { "docid": "12696a86e8e1a65bce818b9361e1d021", "score": "0.5467677", "text": "func (o *Observer) Reset() {\n\to.mutex.Lock()\n\tdefer o.mutex.Unlock()\n\to.pos = map[expiry.ShardID]expiry.SequenceNumber{}\n}", "title": "" }, { "docid": "7c305e01206689bf31f1f34d9d90c1cf", "score": "0.5464831", "text": "func (c *Chain) Reset() {\n\tc.d = make(map[string][]Cell)\n\tc.totalRecords = 0\n}", "title": "" }, { "docid": "5047c8ce962fb6b05434324cba33e623", "score": "0.54618007", "text": "func (t *ChildrenTraverser) reset() {\n\n\tt.discovered = make(map[iotago.BlockID]struct{})\n\tt.stack = list.New()\n}", "title": "" }, { "docid": "8eaf3ea57c8cacfa40b83699103fe75c", "score": "0.54544777", "text": "func (s *Solver) Reset() {\n\ts.ctx.do(func() {\n\t\tC.Z3_solver_reset(s.ctx.c, s.c)\n\t})\n\truntime.KeepAlive(s)\n}", "title": "" }, { "docid": "e65d8009427f3d66757b1fee153934f5", "score": "0.5451742", "text": "func (p *Portfolio) Reset() error {\n\tp.cash = 0\n\tp.holdings = nil\n\tp.transactions = nil\n\treturn nil\n}", "title": "" }, { "docid": "f3de79a328f38113841588657e09c74b", "score": "0.5448525", "text": "func (cl *CumulativeLogger) Reset() {\n\tfor i := range cl.plots {\n\t\tcl.plots[i] = newCumulativePlot()\n\t}\n}", "title": "" }, { "docid": "a69abbc365e2fd3c8c3091bf97f75ea8", "score": "0.5444691", "text": "func (s *Stopwatch) Reset(offset time.Duration, active bool) {\n\tnow := time.Now()\n\ts.start = now.Add(-offset)\n\tif active {\n\t\ts.stop = time.Time{}\n\t} else {\n\t\ts.stop = now\n\t}\n\ts.mark = 0\n\ts.laps = nil\n}", "title": "" }, { "docid": "1653096b14898676a9c85527941bc829", "score": "0.543717", "text": "func (c0bb *Channel0BroadcastBuffer) reset() {\n\tc0bb.clear()\n\tc0bb.position.clear()\n}", "title": "" }, { "docid": "afd97134c51659ef4fbba168a8d76b5b", "score": "0.5432983", "text": "func (node *treeNode) reset(prefix string) {\n\tnode.prefix = prefix\n\tnode.data = nil\n\tnode.parameter = nil\n\tnode.wildcard = nil\n\tnode.kind = 0\n\tnode.startIndex = 0\n\tnode.endIndex = 0\n\tnode.indices = nil\n\tnode.children = nil\n}", "title": "" }, { "docid": "6d7383b52f7a58808fe2c2183a5d17e0", "score": "0.543252", "text": "func (b *Buffer) Reset() {\n\tb.filePos = 0\n\tb.es = nil\n\tb.cur = nil\n\tb.trunc = 0\n}", "title": "" }, { "docid": "d2e686012d2186df762813be3f3d6f35", "score": "0.5423979", "text": "func resetStates(states []file.State) []file.State {\n\tfor key, state := range states {\n\t\tstate.Finished = true\n\t\t// Set ttl to -2 to easily spot which states are not managed by a input\n\t\tstate.TTL = -2\n\t\tstates[key] = state\n\t}\n\treturn states\n}", "title": "" }, { "docid": "32a94e0b543929f6ef95e8b73ce8cf4d", "score": "0.5423076", "text": "func (t *Tree) Reset() {\n\tt.head = nil\n\tt.currentIndex = 0\n\tt.proofIndex = 0\n\tt.proofSet = nil\n}", "title": "" } ]
d1c5a1412dfd8ec257bb609cc97b2d5d
newUpdateInstanceUpdateRequest creates a request for an Instance resource's update update type by filling in the update fields based on the intended state of the resource.
[ { "docid": "bb599d86f025bea5a8b94b2ccc9c26a9", "score": "0.76654357", "text": "func newUpdateInstanceUpdateRequest(ctx context.Context, f *Instance, c *Client) (map[string]interface{}, error) {\n\treq := map[string]interface{}{}\n\n\treturn req, nil\n}", "title": "" } ]
[ { "docid": "503252dc8ff31be9cf1e2bd03e217400", "score": "0.77257013", "text": "func newUpdateInstanceUpdateInstanceRequest(ctx context.Context, f *Instance, c *Client) (map[string]interface{}, error) {\n\treq := map[string]interface{}{}\n\tres := f\n\t_ = res\n\n\tif v := f.EnableStackdriverLogging; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"enableStackdriverLogging\"] = v\n\t}\n\tif v := f.EnableStackdriverMonitoring; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"enableStackdriverMonitoring\"] = v\n\t}\n\tif v := f.Labels; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"labels\"] = v\n\t}\n\tif v := f.Version; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"version\"] = v\n\t}\n\tif v := f.DataprocServiceAccount; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"dataprocServiceAccount\"] = v\n\t}\n\treturn req, nil\n}", "title": "" }, { "docid": "181a4e32166e3f5e45c1090a099b6817", "score": "0.6026471", "text": "func (rm *resourceManager) newUpdateRequestPayload(\n\tctx context.Context,\n\tr *resource,\n) (*svcsdk.UpdateEndpointInput, error) {\n\tres := &svcsdk.UpdateEndpointInput{}\n\n\tif r.ko.Spec.EndpointConfigName != nil {\n\t\tres.SetEndpointConfigName(*r.ko.Spec.EndpointConfigName)\n\t}\n\tif r.ko.Spec.EndpointName != nil {\n\t\tres.SetEndpointName(*r.ko.Spec.EndpointName)\n\t}\n\tres.SetRetainAllVariantProperties(true)\n\n\treturn res, nil\n}", "title": "" }, { "docid": "bb009da98327af4655373f3fc6e2bbd3", "score": "0.59009373", "text": "func (client *ManagedInstancesClient) updateCreateRequest(ctx context.Context, resourceGroupName string, managedInstanceName string, parameters ManagedInstanceUpdate, options *ManagedInstancesClientBeginUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Sql/managedInstances/{managedInstanceName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif managedInstanceName == \"\" {\n\t\treturn nil, errors.New(\"parameter managedInstanceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{managedInstanceName}\", url.PathEscape(managedInstanceName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-05-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, parameters)\n}", "title": "" }, { "docid": "c9f86907704b8b7b410a54bacf020c2b", "score": "0.58865523", "text": "func (c *VPCClient) NewUpdateNATGWRequest() *UpdateNATGWRequest {\n\treq := &UpdateNATGWRequest{}\n\n\t// setup request with client config\n\tc.Client.SetupRequest(req)\n\n\t// setup retryable with default retry policy (retry for non-create action and common error)\n\treq.SetRetryable(true)\n\treturn req\n}", "title": "" }, { "docid": "a4200e4ded026cf48a60d3adb150de4c", "score": "0.57319516", "text": "func marshalUpdateInstanceUpdateInstanceRequest(c *Client, m map[string]interface{}) ([]byte, error) {\n\n\treturn json.Marshal(m)\n}", "title": "" }, { "docid": "40108636069b52e8a11d648908faf3e4", "score": "0.57227886", "text": "func newUpdateFunctionUpdateRequest(ctx context.Context, f *Function, c *Client) (map[string]interface{}, error) {\n\treq := map[string]interface{}{}\n\tres := f\n\t_ = res\n\n\tif v := f.Description; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"description\"] = v\n\t}\n\tif v := f.Runtime; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"runtime\"] = v\n\t}\n\tif v := f.Timeout; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"timeout\"] = v\n\t}\n\tif v := f.AvailableMemoryMb; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"availableMemoryMb\"] = v\n\t}\n\tif v := f.Labels; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"labels\"] = v\n\t}\n\tif v := f.EnvironmentVariables; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"environmentVariables\"] = v\n\t}\n\tif v := f.MaxInstances; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"maxInstances\"] = v\n\t}\n\tif v := f.VPCConnector; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"vpcConnector\"] = v\n\t}\n\tif v := f.VPCConnectorEgressSettings; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"vpcConnectorEgressSettings\"] = v\n\t}\n\tif v := f.IngressSettings; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"ingressSettings\"] = v\n\t}\n\treturn req, nil\n}", "title": "" }, { "docid": "5f3e2b5c08310fc85174250cf012c794", "score": "0.5583198", "text": "func (c *restClient) UpdateInstance(ctx context.Context, req *baremetalsolutionpb.UpdateInstanceRequest, opts ...gax.CallOption) (*UpdateInstanceOperation, error) {\n\tm := protojson.MarshalOptions{AllowPartial: true, UseEnumNumbers: true}\n\tbody := req.GetInstance()\n\tjsonReq, err := m.Marshal(body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbaseUrl, err := url.Parse(c.endpoint)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbaseUrl.Path += fmt.Sprintf(\"/v2/%v\", req.GetInstance().GetName())\n\n\tparams := url.Values{}\n\tparams.Add(\"$alt\", \"json;enum-encoding=int\")\n\tif req.GetUpdateMask() != nil {\n\t\tupdateMask, err := protojson.Marshal(req.GetUpdateMask())\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tparams.Add(\"updateMask\", string(updateMask[1:len(updateMask)-1]))\n\t}\n\n\tbaseUrl.RawQuery = params.Encode()\n\n\t// Build HTTP headers from client and context metadata.\n\thds := []string{\"x-goog-request-params\", fmt.Sprintf(\"%s=%v\", \"instance.name\", url.QueryEscape(req.GetInstance().GetName()))}\n\n\thds = append(c.xGoogHeaders, hds...)\n\thds = append(hds, \"Content-Type\", \"application/json\")\n\theaders := gax.BuildHeaders(ctx, hds...)\n\tunm := protojson.UnmarshalOptions{AllowPartial: true, DiscardUnknown: true}\n\tresp := &longrunningpb.Operation{}\n\te := gax.Invoke(ctx, func(ctx context.Context, settings gax.CallSettings) error {\n\t\tif settings.Path != \"\" {\n\t\t\tbaseUrl.Path = settings.Path\n\t\t}\n\t\thttpReq, err := http.NewRequest(\"PATCH\", baseUrl.String(), bytes.NewReader(jsonReq))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\thttpReq = httpReq.WithContext(ctx)\n\t\thttpReq.Header = headers\n\n\t\thttpRsp, err := c.httpClient.Do(httpReq)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdefer httpRsp.Body.Close()\n\n\t\tif err = googleapi.CheckResponse(httpRsp); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tbuf, err := io.ReadAll(httpRsp.Body)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif err := unm.Unmarshal(buf, resp); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\treturn nil\n\t}, opts...)\n\tif e != nil {\n\t\treturn nil, e\n\t}\n\n\toverride := fmt.Sprintf(\"/v2/%s\", resp.GetName())\n\treturn &UpdateInstanceOperation{\n\t\tlro: longrunning.InternalNewOperation(*c.LROClient, resp),\n\t\tpollPath: override,\n\t}, nil\n}", "title": "" }, { "docid": "cd8508d4190e74db0b642f12089c5d00", "score": "0.5526666", "text": "func NewUpdateVnicParams() *UpdateVnicParams {\n\tvar ()\n\treturn &UpdateVnicParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "title": "" }, { "docid": "bce4555cd0adaa25b247cacf5d19f4fb", "score": "0.54633695", "text": "func marshalUpdateInstanceUpdateRequest(c *Client, m map[string]interface{}) ([]byte, error) {\n\n\treturn json.Marshal(m)\n}", "title": "" }, { "docid": "bd27e51335a671ae88d09c253a7413b7", "score": "0.5461719", "text": "func NewUpdate(version uint64, update *pb.ServerUpdate) *Update {\n\treturn &Update{version, update}\n}", "title": "" }, { "docid": "d5e9d9535b2a41604d2e02d3fdd6a02c", "score": "0.545949", "text": "func (c *RestClient) InstanceUpdateState(ctx context.Context,\n\tinstanceId string, req *specs.LcmInstantiateRequest) (*response.InstanceUpdate, error) {\n\n\tif c == nil {\n\t\treturn nil, fmt.Errorf(\"unutilized client\")\n\t}\n\n\tvar (\n\t\tresp *resty.Response\n\t\terr error\n\t)\n\n\tc.GetClient()\n\tif req != nil {\n\t\tresp, err = c.Client.R().SetContext(ctx).\n\t\t\tSetBody(req).Post(c.BaseURL + fmt.Sprintf(TcaVmwareVnflcmUpdate, instanceId))\n\t} else {\n\t\tresp, err = c.Client.R().SetContext(ctx).SetBody(\"{}\").Post(c.BaseURL + fmt.Sprintf(TcaVmwareVnflcmUpdate, instanceId))\n\t}\n\n\tif err != nil {\n\t\tglog.Error(err)\n\t\treturn nil, err\n\t}\n\n\tif c.isTrace && resp != nil {\n\t\tfmt.Println(string(resp.Body()))\n\t}\n\n\tif !resp.IsSuccess() {\n\t\treturn nil, c.checkErrors(resp)\n\t}\n\n\tvar updateReplay response.InstanceUpdate\n\tif err := json.Unmarshal(resp.Body(), &updateReplay); err != nil {\n\t\tglog.Errorf(\"Failed parse servers respond. %v\", err)\n\t\treturn nil, err\n\t}\n\n\treturn &updateReplay, nil\n}", "title": "" }, { "docid": "e3980f18a9752599afad1d70e274656d", "score": "0.54158264", "text": "func newUpdateApplicationUpdateApplicationRequest(ctx context.Context, f *Application, c *Client) (map[string]interface{}, error) {\n\treq := map[string]interface{}{}\n\n\tif v := f.AuthDomain; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"authDomain\"] = v\n\t}\n\tif v := f.BlockedAddresses; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"blockedAddresses\"] = v\n\t}\n\tif v, err := expandApplicationFeatureSettings(c, f.FeatureSettings); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding FeatureSettings into featureSettings: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"featureSettings\"] = v\n\t}\n\tif v := f.ServingStatus; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"servingStatus\"] = v\n\t}\n\treturn req, nil\n}", "title": "" }, { "docid": "cf78c8ac29fd52d50c610dd6172e3fa0", "score": "0.53927547", "text": "func (client *VirtualMachineScaleSetsClient) updateInstancesCreateRequest(ctx context.Context, resourceGroupName string, vmScaleSetName string, vmInstanceIDs VirtualMachineScaleSetVMInstanceRequiredIDs, options *VirtualMachineScaleSetsClientBeginUpdateInstancesOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/virtualMachineScaleSets/{vmScaleSetName}/manualupgrade\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif vmScaleSetName == \"\" {\n\t\treturn nil, errors.New(\"parameter vmScaleSetName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{vmScaleSetName}\", url.PathEscape(vmScaleSetName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPost, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-11-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, vmInstanceIDs)\n}", "title": "" }, { "docid": "7fee5457bccdbd732d7dc055013a698e", "score": "0.5381236", "text": "func NewCreateUpdateRequest(metadata *ResourceMetadata) (*Request, error) {\n\n\trequest, err := NewCreateRequest(metadata)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// get the current time\n\tnow := TimestampProvider.Now().Time\n\n\trequest.version = 1\n\trequest.period, err = getNextPeriod(metadata.StartTime.Time, now, metadata.Frequency)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn request, nil\n}", "title": "" }, { "docid": "7568a2f920119cd3045102cd4f6d2098", "score": "0.5347153", "text": "func (c *ULBClient) NewUpdateVServerAttributeRequest() *UpdateVServerAttributeRequest {\n\tcfg := c.client.GetConfig()\n\n\treturn &UpdateVServerAttributeRequest{\n\t\tCommonBase: request.CommonBase{\n\t\t\tRegion: cfg.Region,\n\t\t\tProjectId: cfg.ProjectId,\n\t\t},\n\t}\n}", "title": "" }, { "docid": "5ba152fb62e8099a6b4d3708175b6382", "score": "0.531366", "text": "func newUpdateUptimeCheckConfigUpdateUptimeCheckConfigRequest(ctx context.Context, f *UptimeCheckConfig, c *Client) (map[string]interface{}, error) {\n\treq := map[string]interface{}{}\n\tres := f\n\t_ = res\n\n\tif v := f.DisplayName; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"displayName\"] = v\n\t}\n\tif v, err := expandUptimeCheckConfigHttpCheck(c, f.HttpCheck, res); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding HttpCheck into httpCheck: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"httpCheck\"] = v\n\t}\n\tif v, err := expandUptimeCheckConfigTcpCheck(c, f.TcpCheck, res); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding TcpCheck into tcpCheck: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"tcpCheck\"] = v\n\t}\n\tif v := f.Period; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"period\"] = v\n\t}\n\tif v := f.Timeout; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"timeout\"] = v\n\t}\n\tif v, err := expandUptimeCheckConfigContentMatchersSlice(c, f.ContentMatchers, res); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding ContentMatchers into contentMatchers: %w\", err)\n\t} else if v != nil {\n\t\treq[\"contentMatchers\"] = v\n\t}\n\tif v := f.SelectedRegions; v != nil {\n\t\treq[\"selectedRegions\"] = v\n\t}\n\treq[\"name\"] = fmt.Sprintf(\"projects/%s/uptimeCheckConfigs/%s\", *f.Project, *f.Name)\n\n\treturn req, nil\n}", "title": "" }, { "docid": "c694fc6d48fa28dc61e67b9d20aa558f", "score": "0.5305741", "text": "func newUpdateFirewallPolicyRulePatchRuleRequest(ctx context.Context, f *FirewallPolicyRule, c *Client) (map[string]interface{}, error) {\n\treq := map[string]interface{}{}\n\n\tif v := f.Description; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"description\"] = v\n\t}\n\tif v, err := expandFirewallPolicyRuleMatch(c, f.Match); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding Match into match: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"match\"] = v\n\t}\n\tif v := f.Action; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"action\"] = v\n\t}\n\tif v := f.Direction; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"direction\"] = v\n\t}\n\tif v := f.TargetResources; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"targetResources\"] = v\n\t}\n\tif v := f.EnableLogging; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"enableLogging\"] = v\n\t}\n\tif v := f.RuleTupleCount; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"ruleTupleCount\"] = v\n\t}\n\tif v := f.TargetServiceAccounts; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"targetServiceAccounts\"] = v\n\t}\n\tif v := f.TargetSecureLabels; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"targetSecureLabels\"] = v\n\t}\n\tif v := f.Disabled; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"disabled\"] = v\n\t}\n\treturn req, nil\n}", "title": "" }, { "docid": "fea49f836c68dd757bd956cc5e620477", "score": "0.528784", "text": "func NewUpdate(appName string) *commander.CommandWrapper {\n\tctx := context.Background()\n\tclient, err := google.DefaultClient(ctx, dm.NdevCloudmanScope)\n\thandle.Error(err)\n\tu := Update{client: client, ctx: ctx}\n\treturn &commander.CommandWrapper{\n\t\tHandler: &u,\n\t\tHelp: &commander.CommandDescriptor{\n\t\t\tName: \"update\",\n\t\t\tShortDescription: \"Update updates a Google Deployment\",\n\t\t\tLongDescription: `Using a pre-configured yaml file, update a collection of resources using Deployment Manager Service.`,\n\t\t\tArguments: \"custom-config [-y]\",\n\t\t\tExamples: []string{\"\", \"custom-config\"},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "59cf16ffe6f18e0c4cfc5b2895aff80c", "score": "0.52351373", "text": "func (d *AwsDriver) Update_Instance(params map[string]interface{}) (interface{}, error) {\n\tinput := &ec2.ModifyInstanceAttributeInput{}\n\n\t// Required params\n\tsetField(params[\"id\"], input, \"InstanceId\")\n\n\t// Extra params\n\tif _, ok := params[\"lock\"]; ok {\n\t\tsetField(params[\"lock\"], input, \"DisableApiTermination\")\n\t}\n\tif _, ok := params[\"group\"]; ok {\n\t\tsetField(params[\"group\"], input, \"Groups\")\n\t}\n\tif _, ok := params[\"type\"]; ok {\n\t\tsetField(params[\"type\"], input, \"InstanceType\")\n\t}\n\n\tstart := time.Now()\n\toutput, err := d.ec2.ModifyInstanceAttribute(input)\n\tif err != nil {\n\t\td.logger.Errorf(\"update instance error: %s\", err)\n\t\treturn nil, err\n\t}\n\toutput = output\n\td.logger.ExtraVerbosef(\"ec2.ModifyInstanceAttribute call took %s\", time.Since(start))\n\td.logger.Verbose(\"update instance done\")\n\treturn output, nil\n}", "title": "" }, { "docid": "177d819032dd3eb2a0322a034a9d9e47", "score": "0.5222871", "text": "func newUpdateBucketUpdateRequest(ctx context.Context, f *Bucket, c *Client) (map[string]interface{}, error) {\n\treq := map[string]interface{}{}\n\tres := f\n\t_ = res\n\n\tif v, err := expandBucketCorsSlice(c, f.Cors, res); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding Cors into cors: %w\", err)\n\t} else if v != nil {\n\t\treq[\"cors\"] = v\n\t}\n\tif v, err := expandBucketLifecycle(c, f.Lifecycle, res); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding Lifecycle into lifecycle: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"lifecycle\"] = v\n\t}\n\tif v, err := expandBucketLogging(c, f.Logging, res); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding Logging into logging: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"logging\"] = v\n\t}\n\tif v := f.StorageClass; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"storageClass\"] = v\n\t}\n\tif v, err := expandBucketVersioning(c, f.Versioning, res); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding Versioning into versioning: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"versioning\"] = v\n\t}\n\tif v, err := expandBucketWebsite(c, f.Website, res); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding Website into website: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"website\"] = v\n\t}\n\treturn req, nil\n}", "title": "" }, { "docid": "16ffe490d5ece3bda3a3d8d4f6850b05", "score": "0.52072287", "text": "func (c *VPCClient) NewUpdateSubnetAttributeRequest() *UpdateSubnetAttributeRequest {\n\tcfg := c.client.GetConfig()\n\n\treturn &UpdateSubnetAttributeRequest{\n\t\tCommonBase: request.CommonBase{\n\t\t\tRegion: cfg.Region,\n\t\t\tProjectId: cfg.ProjectId,\n\t\t},\n\t}\n}", "title": "" }, { "docid": "2e061882e4797d717e09bd1f16bef882", "score": "0.5181579", "text": "func (rm *resourceManager) newUpdateRequestPayload(\n\tctx context.Context,\n\tr *resource,\n) (*svcsdk.ModifyClientVpnEndpointInput, error) {\n\tres := &svcsdk.ModifyClientVpnEndpointInput{}\n\n\tif r.ko.Spec.ClientConnectOptions != nil {\n\t\tf0 := &svcsdk.ClientConnectOptions{}\n\t\tif r.ko.Spec.ClientConnectOptions.Enabled != nil {\n\t\t\tf0.SetEnabled(*r.ko.Spec.ClientConnectOptions.Enabled)\n\t\t}\n\t\tif r.ko.Spec.ClientConnectOptions.LambdaFunctionARN != nil {\n\t\t\tf0.SetLambdaFunctionArn(*r.ko.Spec.ClientConnectOptions.LambdaFunctionARN)\n\t\t}\n\t\tres.SetClientConnectOptions(f0)\n\t}\n\tif r.ko.Status.ClientVPNEndpointID != nil {\n\t\tres.SetClientVpnEndpointId(*r.ko.Status.ClientVPNEndpointID)\n\t}\n\tif r.ko.Spec.ConnectionLogOptions != nil {\n\t\tf2 := &svcsdk.ConnectionLogOptions{}\n\t\tif r.ko.Spec.ConnectionLogOptions.CloudwatchLogGroup != nil {\n\t\t\tf2.SetCloudwatchLogGroup(*r.ko.Spec.ConnectionLogOptions.CloudwatchLogGroup)\n\t\t}\n\t\tif r.ko.Spec.ConnectionLogOptions.CloudwatchLogStream != nil {\n\t\t\tf2.SetCloudwatchLogStream(*r.ko.Spec.ConnectionLogOptions.CloudwatchLogStream)\n\t\t}\n\t\tif r.ko.Spec.ConnectionLogOptions.Enabled != nil {\n\t\t\tf2.SetEnabled(*r.ko.Spec.ConnectionLogOptions.Enabled)\n\t\t}\n\t\tres.SetConnectionLogOptions(f2)\n\t}\n\tif r.ko.Spec.Description != nil {\n\t\tres.SetDescription(*r.ko.Spec.Description)\n\t}\n\tif r.ko.Spec.DNSServers != nil {\n\t\tf4 := &svcsdk.DnsServersOptionsModifyStructure{}\n\t\tif r.ko.Spec.DNSServers.CustomDNSServers != nil {\n\t\t\tf4f0 := []*string{}\n\t\t\tfor _, f4f0iter := range r.ko.Spec.DNSServers.CustomDNSServers {\n\t\t\t\tvar f4f0elem string\n\t\t\t\tf4f0elem = *f4f0iter\n\t\t\t\tf4f0 = append(f4f0, &f4f0elem)\n\t\t\t}\n\t\t\tf4.SetCustomDnsServers(f4f0)\n\t\t}\n\t\tif r.ko.Spec.DNSServers.Enabled != nil {\n\t\t\tf4.SetEnabled(*r.ko.Spec.DNSServers.Enabled)\n\t\t}\n\t\tres.SetDnsServers(f4)\n\t}\n\tif r.ko.Spec.DryRun != nil {\n\t\tres.SetDryRun(*r.ko.Spec.DryRun)\n\t}\n\tif r.ko.Spec.SecurityGroupIDs != nil {\n\t\tf6 := []*string{}\n\t\tfor _, f6iter := range r.ko.Spec.SecurityGroupIDs {\n\t\t\tvar f6elem string\n\t\t\tf6elem = *f6iter\n\t\t\tf6 = append(f6, &f6elem)\n\t\t}\n\t\tres.SetSecurityGroupIds(f6)\n\t}\n\tif r.ko.Spec.SelfServicePortal != nil {\n\t\tres.SetSelfServicePortal(*r.ko.Spec.SelfServicePortal)\n\t}\n\tif r.ko.Spec.ServerCertificateARN != nil {\n\t\tres.SetServerCertificateArn(*r.ko.Spec.ServerCertificateARN)\n\t}\n\tif r.ko.Spec.SplitTunnel != nil {\n\t\tres.SetSplitTunnel(*r.ko.Spec.SplitTunnel)\n\t}\n\tif r.ko.Spec.VPCID != nil {\n\t\tres.SetVpcId(*r.ko.Spec.VPCID)\n\t}\n\tif r.ko.Spec.VPNPort != nil {\n\t\tres.SetVpnPort(*r.ko.Spec.VPNPort)\n\t}\n\n\treturn res, nil\n}", "title": "" }, { "docid": "b7cbd9c66fa1607cc78e4235550d57c1", "score": "0.5179642", "text": "func NewUpdateRequest(payload *log.Log) *logpb.UpdateRequest {\n\tmessage := &logpb.UpdateRequest{}\n\tif payload.ID != nil {\n\t\tmessage.Id = int32(*payload.ID)\n\t}\n\tif payload.CreatedAt != nil {\n\t\tmessage.CreatedAt = *payload.CreatedAt\n\t}\n\tif payload.UpdatedAt != nil {\n\t\tmessage.UpdatedAt = *payload.UpdatedAt\n\t}\n\tif payload.Name != nil {\n\t\tmessage.Name = *payload.Name\n\t}\n\tif payload.Size != nil {\n\t\tmessage.Size = *payload.Size\n\t}\n\tif payload.FireID != nil {\n\t\tmessage.FireId = int32(*payload.FireID)\n\t}\n\tif payload.AddedAt != nil {\n\t\tmessage.AddedAt = *payload.AddedAt\n\t}\n\tif payload.Weather != nil {\n\t\tmessage.Weather = svcLogWeatherToLogpbWeather(payload.Weather)\n\t}\n\treturn message\n}", "title": "" }, { "docid": "90c89499a48189fee85624cabf7ee9c7", "score": "0.5175288", "text": "func (c *SSM) UpdateInstanceInformationRequest(input *UpdateInstanceInformationInput) (req *request.Request, output *UpdateInstanceInformationOutput) {\n\top := &request.Operation{\n\t\tName: opUpdateInstanceInformation,\n\t\tHTTPMethod: \"POST\",\n\t\tHTTPPath: \"/\",\n\t}\n\n\tif input == nil {\n\t\tinput = &UpdateInstanceInformationInput{}\n\t}\n\n\treq = c.newRequest(op, input, output)\n\toutput = &UpdateInstanceInformationOutput{}\n\treq.Data = output\n\treturn\n}", "title": "" }, { "docid": "dfcaf762b05646824ce9400f131e6e22", "score": "0.5161657", "text": "func (x *fastReflection_MsgUpdateParams) New() protoreflect.Message {\n\treturn new(fastReflection_MsgUpdateParams)\n}", "title": "" }, { "docid": "36278f8ebe2196874ed331b22335ca96", "score": "0.51470387", "text": "func (r *InstancesService) Update(project string, zone string, instance string, instance2 *Instance) *InstancesUpdateCall {\n\tc := &InstancesUpdateCall{s: r.s, urlParams_: make(gensupport.URLParams)}\n\tc.project = project\n\tc.zone = zone\n\tc.instance = instance\n\tc.instance2 = instance2\n\treturn c\n}", "title": "" }, { "docid": "f986f35e077a39411a8f0713d543dbd0", "score": "0.5141124", "text": "func NewUpdate(adminGroup IBXAdminGroup, returnFields []string) *api.BaseAPI {\n\treference := \"/\" + adminGroup.Reference + \"?_return_fields=\" + strings.Join(returnFields, \",\")\n\tupdateAdminGroupAPI := api.NewBaseAPI(http.MethodPut, wapiVersion+reference, adminGroup, new(IBXAdminGroup))\n\treturn updateAdminGroupAPI\n}", "title": "" }, { "docid": "f771b430d2e5804eadee8dd6f75ce0bb", "score": "0.5103747", "text": "func (client *ImagesClient) updateCreateRequest(ctx context.Context, resourceGroupName string, labPlanName string, imageName string, body ImageUpdate, options *ImagesClientUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.LabServices/labPlans/{labPlanName}/images/{imageName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif labPlanName == \"\" {\n\t\treturn nil, errors.New(\"parameter labPlanName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{labPlanName}\", url.PathEscape(labPlanName))\n\tif imageName == \"\" {\n\t\treturn nil, errors.New(\"parameter imageName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{imageName}\", url.PathEscape(imageName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-08-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, body)\n}", "title": "" }, { "docid": "97bbb43373c165a250cf59e6c62215c0", "score": "0.51029897", "text": "func NewUpdateRoutingInstanceUsingPATCHParams() *UpdateRoutingInstanceUsingPATCHParams {\n\tvar ()\n\treturn &UpdateRoutingInstanceUsingPATCHParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "title": "" }, { "docid": "408b8b347573ae4e600352355a726259", "score": "0.5096932", "text": "func NewUpdateResource(ctx *middleware.Context, handler UpdateResourceHandler) *UpdateResource {\n\treturn &UpdateResource{Context: ctx, Handler: handler}\n}", "title": "" }, { "docid": "4331e073e85cfaadc55646f62594f1cd", "score": "0.50771296", "text": "func newUpdateRouterPeerUpdateRequest(ctx context.Context, f *RouterPeer, c *Client) (map[string]interface{}, error) {\n\treq := map[string]interface{}{}\n\n\tif v := f.Name; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"name\"] = v\n\t}\n\tif v := f.InterfaceName; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"interfaceName\"] = v\n\t}\n\tif v := f.IPAddress; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"ipAddress\"] = v\n\t}\n\tif v := f.PeerIPAddress; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"peerIpAddress\"] = v\n\t}\n\tif v := f.PeerAsn; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"peerAsn\"] = v\n\t}\n\tif v := f.AdvertisedRoutePriority; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"advertisedRoutePriority\"] = v\n\t}\n\tif v := f.AdvertiseMode; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"advertiseMode\"] = v\n\t}\n\tif v := f.AdvertisedGroups; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"advertisedGroups\"] = v\n\t}\n\tif v, err := expandRouterPeerAdvertisedIPRangesSlice(c, f.AdvertisedIPRanges); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding AdvertisedIPRanges into advertisedIpRanges: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"advertisedIpRanges\"] = v\n\t}\n\tif v := f.Region; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"region\"] = v\n\t}\n\treturn req, nil\n}", "title": "" }, { "docid": "f47d086e2a1c76eeedae7990b15399f5", "score": "0.5063528", "text": "func (d *Ec2Driver) Update_Instance(ctx driver.Context, params map[string]interface{}) (interface{}, error) {\n\tinput := &ec2.ModifyInstanceAttributeInput{}\n\tvar err error\n\n\t// Required params\n\terr = setFieldWithType(params[\"id\"], input, \"InstanceId\", awsstr, ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Extra params\n\tif _, ok := params[\"type\"]; ok {\n\t\terr = setFieldWithType(params[\"type\"], input, \"InstanceType.Value\", awsstr, ctx)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\tif _, ok := params[\"lock\"]; ok {\n\t\terr = setFieldWithType(params[\"lock\"], input, \"DisableApiTermination\", awsboolattribute, ctx)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tstart := time.Now()\n\tvar output *ec2.ModifyInstanceAttributeOutput\n\toutput, err = d.ModifyInstanceAttribute(input)\n\toutput = output\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"update instance: %s\", err)\n\t}\n\td.logger.ExtraVerbosef(\"ec2.ModifyInstanceAttribute call took %s\", time.Since(start))\n\td.logger.Info(\"update instance done\")\n\treturn output, nil\n}", "title": "" }, { "docid": "aba23ba82903c21246656e8713d365b4", "score": "0.5053143", "text": "func NewUpdateTableRequest() *UpdateTableRequest {\n req := new(UpdateTableRequest)\n req.Host.Service = \"dynamodb\"\n req.Host.Region = \"\"\n req.Host.Domain = \"amazonaws.com\"\n req.Key.AccessKeyId = \"\"\n req.Key.SecretAccessKey = \"\"\n req.Headers = make(map[string]string)\n req.Headers[\"X-Amz-Target\"] = UpdateTableTarget\n req.RequestMethod = \"POST\"\n req.CanonicalUri = \"/\"\n return req\n}", "title": "" }, { "docid": "dc9a10f1fdad7b84d06144ba8ec3dfc4", "score": "0.50349706", "text": "func (client *InternalNetworksClient) updateCreateRequest(ctx context.Context, resourceGroupName string, l3IsolationDomainName string, internalNetworkName string, body InternalNetworkPatch, options *InternalNetworksClientBeginUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedNetworkFabric/l3IsolationDomains/{l3IsolationDomainName}/internalNetworks/{internalNetworkName}\"\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif l3IsolationDomainName == \"\" {\n\t\treturn nil, errors.New(\"parameter l3IsolationDomainName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{l3IsolationDomainName}\", url.PathEscape(l3IsolationDomainName))\n\tif internalNetworkName == \"\" {\n\t\treturn nil, errors.New(\"parameter internalNetworkName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{internalNetworkName}\", url.PathEscape(internalNetworkName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-06-15\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, body)\n}", "title": "" }, { "docid": "807a0e4253cb5fdb967a6429a34062b2", "score": "0.50038093", "text": "func NewUpdate(offset int64) UpdateConfig {\n\treturn UpdateConfig{\n\t\tOffset: offset,\n\t\tLimit: 0,\n\t\tTimeout: 0,\n\t}\n}", "title": "" }, { "docid": "1460882a826c75604832e5c21140b7ec", "score": "0.49950987", "text": "func (client *ResourcePoolsClient) updateCreateRequest(ctx context.Context, resourceGroupName string, resourcePoolName string, body ResourcePatch, options *ResourcePoolsClientUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ConnectedVMwarevSphere/resourcePools/{resourcePoolName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif resourcePoolName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourcePoolName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourcePoolName}\", url.PathEscape(resourcePoolName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-01-10-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, body)\n}", "title": "" }, { "docid": "4794d0e75bb181c8094e9c601925bc47", "score": "0.4994925", "text": "func NewModelConfigurationUpdateRequest(server string, id int, body ModelConfigurationUpdateJSONRequestBody) (*http.Request, error) {\n\tvar bodyReader io.Reader\n\tbuf, err := json.Marshal(body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbodyReader = bytes.NewReader(buf)\n\treturn NewModelConfigurationUpdateRequestWithBody(server, id, \"application/json\", bodyReader)\n}", "title": "" }, { "docid": "a1f72b8137982f0bce805f8d37ebf0a9", "score": "0.49926025", "text": "func NewUpdate(n sql.Node, updateExprs []sql.Expression) *Update {\n\treturn &Update{n, updateExprs}\n}", "title": "" }, { "docid": "b5921eeb77508a2e00fc25553f8a0a24", "score": "0.49909568", "text": "func NewUpdate(offset int) UpdateConfig {\n\treturn UpdateConfig{\n\t\tOffset: offset,\n\t\tLimit: 0,\n\t\tTimeout: 0,\n\t}\n}", "title": "" }, { "docid": "49042b71e74902a3964c2c9fa3a3e411", "score": "0.49828765", "text": "func (client *InputsClient) updateCreateRequest(ctx context.Context, resourceGroupName string, jobName string, inputName string, input Input, options *InputsUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourcegroups/{resourceGroupName}/providers/Microsoft.StreamAnalytics/streamingjobs/{jobName}/inputs/{inputName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif jobName == \"\" {\n\t\treturn nil, errors.New(\"parameter jobName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{jobName}\", url.PathEscape(jobName))\n\tif inputName == \"\" {\n\t\treturn nil, errors.New(\"parameter inputName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{inputName}\", url.PathEscape(inputName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2017-04-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\tif options != nil && options.IfMatch != nil {\n\t\treq.Raw().Header.Set(\"If-Match\", *options.IfMatch)\n\t}\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, runtime.MarshalAsJSON(req, input)\n}", "title": "" }, { "docid": "b8c90bc0dc019f1682ce59be1bf216cd", "score": "0.49722502", "text": "func newUpdateTopicUpdateRequest(ctx context.Context, f *Topic, c *Client) (map[string]interface{}, error) {\n\treq := map[string]interface{}{}\n\n\tif v := f.KmsKeyName; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"kmsKeyName\"] = v\n\t}\n\tif v := f.Labels; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"labels\"] = v\n\t}\n\tif v, err := expandTopicMessageStoragePolicy(c, f.MessageStoragePolicy); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding MessageStoragePolicy into messageStoragePolicy: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"messageStoragePolicy\"] = v\n\t}\n\treturn req, nil\n}", "title": "" }, { "docid": "ca517666f9aa591580bf5911000f2568", "score": "0.49548054", "text": "func (r *InstancesService) Update(project string, instance string, databaseinstance *DatabaseInstance) *InstancesUpdateCall {\n\tc := &InstancesUpdateCall{s: r.s, urlParams_: make(gensupport.URLParams)}\n\tc.project = project\n\tc.instance = instance\n\tc.databaseinstance = databaseinstance\n\treturn c\n}", "title": "" }, { "docid": "3abb3b3d298a1ec2d0b020cb2587e6ba", "score": "0.4948689", "text": "func NewUpdate(n sql.Node, updateExprs []sql.Expression) *Update {\n\treturn &Update{\n\t\tUnaryNode: UnaryNode{NewUpdateSource(\n\t\t\tn,\n\t\t\tupdateExprs,\n\t\t)}}\n}", "title": "" }, { "docid": "c8f7dca90bbe8f98f63d66904a09c75b", "score": "0.49431464", "text": "func CreateUpdateInstanceIpWhiteListRequest() (request *UpdateInstanceIpWhiteListRequest) {\n\trequest = &UpdateInstanceIpWhiteListRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"hitsdb\", \"2020-06-15\", \"UpdateInstanceIpWhiteList\", \"hitsdb\", \"openAPI\")\n\trequest.Method = requests.POST\n\treturn\n}", "title": "" }, { "docid": "e608b7327d794f9563b8c88dd8bae14d", "score": "0.49399984", "text": "func NewUpdateBindingConfigurationRequest(server string, bindingId string, body UpdateBindingConfigurationJSONRequestBody) (*http.Request, error) {\n\tvar bodyReader io.Reader\n\tbuf, err := json.Marshal(body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbodyReader = bytes.NewReader(buf)\n\treturn NewUpdateBindingConfigurationRequestWithBody(server, bindingId, \"application/json\", bodyReader)\n}", "title": "" }, { "docid": "6466e7ac6d4620c95c13fc3321f9a1fd", "score": "0.4937008", "text": "func (x *fastReflection_MsgUpdateParamsResponse) New() protoreflect.Message {\n\treturn new(fastReflection_MsgUpdateParamsResponse)\n}", "title": "" }, { "docid": "40bfbd63029d6f73ded00b7863319dee", "score": "0.4933924", "text": "func (client *ClustersClient) updateCreateRequest(ctx context.Context, resourceGroupName string, clusterName string, body ResourcePatch, options *ClustersClientUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ConnectedVMwarevSphere/clusters/{clusterName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif clusterName == \"\" {\n\t\treturn nil, errors.New(\"parameter clusterName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{clusterName}\", url.PathEscape(clusterName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-01-10-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, body)\n}", "title": "" }, { "docid": "cbd30cc244ff502c3c79c7da8f7e9220", "score": "0.4921349", "text": "func (r *testResourcePatchNoPanic) NewUpdatePatch(ctx context.Context, obj, currentState, desiredState interface{}) (*Patch, error) {\n\treturn nil, nil\n}", "title": "" }, { "docid": "c6116ac714ac56a5ad00b5eb3333e033", "score": "0.4915139", "text": "func (c *Client) NewUpdateGameRequest(ctx context.Context, path string, payload *GamePayload, contentType string) (*http.Request, error) {\n\tvar body bytes.Buffer\n\tif contentType == \"\" {\n\t\tcontentType = \"*/*\" // Use default encoder\n\t}\n\terr := c.Encoder.Encode(payload, &body, contentType)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to encode body: %s\", err)\n\t}\n\tscheme := c.Scheme\n\tif scheme == \"\" {\n\t\tscheme = \"http\"\n\t}\n\tu := url.URL{Host: c.Host, Scheme: scheme, Path: path}\n\treq, err := http.NewRequest(\"PUT\", u.String(), &body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\theader := req.Header\n\tif contentType == \"*/*\" {\n\t\theader.Set(\"Content-Type\", \"application/json\")\n\t} else {\n\t\theader.Set(\"Content-Type\", contentType)\n\t}\n\treturn req, nil\n}", "title": "" }, { "docid": "bc4b7f6927efbde713ee3fac98b8b76a", "score": "0.489338", "text": "func NewParameterTuningJobUpdateRequest(server string, id int, body ParameterTuningJobUpdateJSONRequestBody) (*http.Request, error) {\n\tvar bodyReader io.Reader\n\tbuf, err := json.Marshal(body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbodyReader = bytes.NewReader(buf)\n\treturn NewParameterTuningJobUpdateRequestWithBody(server, id, \"application/json\", bodyReader)\n}", "title": "" }, { "docid": "31a7ad1828f66edbab5996ec70f06e42", "score": "0.48928604", "text": "func NewUpdate(appName string) *commander.CommandWrapper {\n\treturn &commander.CommandWrapper{\n\t\tHandler: &Update{},\n\t\tHelp: &commander.CommandDescriptor{\n\t\t\tName: \"update\",\n\t\t\tShortDescription: \"Update a stack\",\n\t\t\tLongDescription: `Update a stack with new parameters.`,\n\t\t\tArguments: \"custom-config\",\n\t\t\tExamples: []string{\"\", \"custom-config\"},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "47466e1253d76b4e4ac97fe0156df16b", "score": "0.48928535", "text": "func newUpdateOAuthIdpConfigUpdateConfigRequest(ctx context.Context, f *OAuthIdpConfig, c *Client) (map[string]interface{}, error) {\n\treq := map[string]interface{}{}\n\tres := f\n\t_ = res\n\n\tif v := f.Name; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"name\"] = v\n\t}\n\tif v := f.ClientId; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"clientId\"] = v\n\t}\n\tif v := f.Issuer; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"issuer\"] = v\n\t}\n\tif v := f.DisplayName; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"displayName\"] = v\n\t}\n\tif v := f.Enabled; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"enabled\"] = v\n\t}\n\tif v := f.ClientSecret; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"clientSecret\"] = v\n\t}\n\tif v, err := expandOAuthIdpConfigResponseType(c, f.ResponseType, res); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding ResponseType into responseType: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"responseType\"] = v\n\t}\n\treturn req, nil\n}", "title": "" }, { "docid": "b8e717f66e5154bbcba12d32a2b1ca05", "score": "0.48829657", "text": "func (b *CHCBrokerLogic) Update(request *osb.UpdateInstanceRequest, c *broker.RequestContext) (*broker.UpdateInstanceResponse, error) {\n\tlogrus.Infof(\"get request from Update: %s\\n\", toJson(request))\n\tb.Lock()\n\tdefer b.Unlock()\n\n\tif !request.AcceptsIncomplete {\n\t\treturn nil, asyncRequiredError\n\t}\n\n\tif request.Parameters == nil {\n\t\treturn &broker.UpdateInstanceResponse{\n\t\t\tUpdateInstanceResponse: osb.UpdateInstanceResponse{\n\t\t\t\tAsync: false,\n\t\t\t\tOperationKey: &[]osb.OperationKey{UpdateOperation}[0],\n\t\t\t},\n\t\t}, nil\n\t}\n\n\tinstance, ok := b.instances[request.InstanceID]\n\tif !ok {\n\t\treturn nil, osb.HTTPStatusCodeError{\n\t\t\tStatusCode: http.StatusNotFound,\n\t\t}\n\t}\n\tinstance.Params = request.Parameters\n\n\tnamespace, ok := request.Context[InstanceNamespace].(string)\n\tif ok && namespace != instance.Namespace {\n\t\terrMsg := \"can not change namespace\"\n\t\treturn nil, osb.HTTPStatusCodeError{\n\t\t\tErrorMessage: &errMsg,\n\t\t\tStatusCode: http.StatusBadRequest,\n\t\t}\n\t}\n\n\terr := b.doUpdate(instance)\n\tif err != nil {\n\t\tdescription := err.Error()\n\t\treturn nil, osb.HTTPStatusCodeError{\n\t\t\tStatusCode: http.StatusBadRequest,\n\t\t\tDescription: &description,\n\t\t}\n\t}\n\tb.instances[request.InstanceID] = instance\n\n\tresponse := broker.UpdateInstanceResponse{\n\t\tUpdateInstanceResponse: osb.UpdateInstanceResponse{\n\t\t\tAsync: true,\n\t\t\tOperationKey: &[]osb.OperationKey{UpdateOperation}[0],\n\t\t},\n\t}\n\tresponse.Async = true\n\treturn &response, nil\n}", "title": "" }, { "docid": "1ed978ea87effcb2e0b2cb6d331e7020", "score": "0.48747465", "text": "func (client *VirtualMachineRunCommandsClient) updateCreateRequest(ctx context.Context, resourceGroupName string, vmName string, runCommandName string, runCommand VirtualMachineRunCommandUpdate, options *VirtualMachineRunCommandsBeginUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/virtualMachines/{vmName}/runCommands/{runCommandName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif vmName == \"\" {\n\t\treturn nil, errors.New(\"parameter vmName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{vmName}\", url.PathEscape(vmName))\n\tif runCommandName == \"\" {\n\t\treturn nil, errors.New(\"parameter runCommandName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{runCommandName}\", url.PathEscape(runCommandName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-07-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json, text/json\")\n\treturn req, runtime.MarshalAsJSON(req, runCommand)\n}", "title": "" }, { "docid": "63067a011f124da77d4725856cd5a559", "score": "0.487285", "text": "func (client *WorkflowsClient) updateCreateRequest(ctx context.Context, resourceGroupName string, workflowName string, options *WorkflowsUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Logic/workflows/{workflowName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif workflowName == \"\" {\n\t\treturn nil, errors.New(\"parameter workflowName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{workflowName}\", url.PathEscape(workflowName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2019-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "title": "" }, { "docid": "3ae5b82cd0c14452c7b365fa5281e155", "score": "0.48476887", "text": "func newUpdateClusterUpdateClusterRequest(ctx context.Context, f *Cluster, c *Client) (map[string]interface{}, error) {\n\treq := map[string]interface{}{}\n\n\tif v := f.Labels; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"labels\"] = v\n\t}\n\treturn req, nil\n}", "title": "" }, { "docid": "457584658b869f6cd17e708b12ef5d41", "score": "0.4837645", "text": "func (srv *NetService) UpdateAvailableIPInstance(ipinst *types.IPInst) error {\n\tstarted := time.Now()\n\t//check ip instance path first, only focus on available ip instance\n\tinstpath := filepath.Join(defaultPoolInfoPath, ipinst.Cluster, ipinst.Pool, \"available\", ipinst.IPAddr)\n\tif exist, _ := srv.store.Exist(instpath); !exist {\n\t\tblog.Errorf(\"Update Available ip instance failed, no instance data: %s\", instpath)\n\t\treportMetrics(\"updateAvailableIPInstance\", stateNonExistFailure, started)\n\t\treturn fmt.Errorf(\"lost available ip instance %s\", ipinst.IPAddr)\n\t}\n\t//get ip instance data\n\tdata, instErr := srv.store.Get(instpath)\n\tif instErr != nil {\n\t\tblog.Errorf(\"Get no ip instance data from path %s failed, %s\", instpath, instErr)\n\t\treportMetrics(\"updateAvailableIPInstance\", stateStorageFailure, started)\n\t\treturn fmt.Errorf(\"got instance data failed, %s\", instErr)\n\t}\n\toldInst := &types.IPInst{}\n\tif err := json.Unmarshal(data, oldInst); err != nil {\n\t\tblog.Errorf(\"UpdateAvailableIPInstance decode ip instance %s failed, %s\", instpath, err)\n\t\treportMetrics(\"updateAvailableIPInstance\", stateJSONFailure, started)\n\t\treturn fmt.Errorf(\"ip instance data format err: %s\", err)\n\t}\n\t//update ip instance data\n\tif ipinst.MacAddr != \"\" {\n\t\toldInst.MacAddr = ipinst.MacAddr\n\t}\n\tif ipinst.App != \"\" {\n\t\toldInst.App = ipinst.App\n\t}\n\toldInst.Update = time.Now().Format(\"2006-01-02 15:04:05\")\n\t//format json data\n\tnewData, _ := json.Marshal(oldInst)\n\tif err := srv.store.Add(instpath, newData); err != nil {\n\t\tblog.Errorf(\"UpdatAvailable ip instance %s failed, %v\", instpath, err)\n\t\treportMetrics(\"updateAvailableIPInstance\", stateStorageFailure, started)\n\t\treturn fmt.Errorf(\"update ip instance failed: %s\", err.Error())\n\t}\n\tblog.Info(\"UpdateAvailable ip instance %s success.\", instpath)\n\treportMetrics(\"updateAvailableIPInstance\", stateSuccess, started)\n\treturn nil\n}", "title": "" }, { "docid": "481e83e621022f0e4cc8351eb42da2dc", "score": "0.48286048", "text": "func newUpdateAuthorizationPolicyUpdateAuthorizationPolicyRequest(ctx context.Context, f *AuthorizationPolicy, c *Client) (map[string]interface{}, error) {\n\treq := map[string]interface{}{}\n\n\tif v := f.Description; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"description\"] = v\n\t}\n\tif v := f.Labels; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"labels\"] = v\n\t}\n\tif v := f.Action; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"action\"] = v\n\t}\n\tif v, err := expandAuthorizationPolicyRulesSlice(c, f.Rules); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding Rules into rules: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"rules\"] = v\n\t}\n\treturn req, nil\n}", "title": "" }, { "docid": "61535b4ab9fa95f1b2d9303d1735ff69", "score": "0.48257783", "text": "func (c *Client) UpdateInstance(ctx context.Context, req *baremetalsolutionpb.UpdateInstanceRequest, opts ...gax.CallOption) (*UpdateInstanceOperation, error) {\n\treturn c.internalClient.UpdateInstance(ctx, req, opts...)\n}", "title": "" }, { "docid": "34c06e61729ddd2dace437729dfa4306", "score": "0.48167846", "text": "func NewUpdate(table string, updates map[string]interface{}, wheres map[string]interface{}) PreparedQuery {\n\tvar cols []string\n\tvar upds []string\n\tvar vals []interface{}\n\tfor upd, value := range updates {\n\t\tupds = append(upds, fmt.Sprintf(\"%s = ?\", upd))\n\t\tvals = append(vals, value)\n\t}\n\tfor col, where := range wheres {\n\t\tcols = append(cols, fmt.Sprintf(\"%s = ?\", col))\n\t\tvals = append(vals, where)\n\t}\n\treturn NewPreparedQuery(fmt.Sprintf(\"UPDATE %s SET %s WHERE %s\", table, strings.Join(upds, \", \"), strings.Join(cols, \" AND \")), vals...)\n}", "title": "" }, { "docid": "cae33dbd687de679a6d6663b6e60dd67", "score": "0.4809788", "text": "func (client *MonitorsClient) updateCreateRequest(ctx context.Context, resourceGroupName string, monitorName string, resource MonitorResourceUpdate, options *MonitorsClientUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Dynatrace.Observability/monitors/{monitorName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif monitorName == \"\" {\n\t\treturn nil, errors.New(\"parameter monitorName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{monitorName}\", url.PathEscape(monitorName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-04-27\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\tif err := runtime.MarshalAsJSON(req, resource); err != nil {\n\t\treturn nil, err\n\t}\n\treturn req, nil\n}", "title": "" }, { "docid": "a0d8dad55d7ce6af94d2f748a0a4ab9a", "score": "0.48095414", "text": "func CreateUpdateIngressRequest() (request *UpdateIngressRequest) {\n\trequest = &UpdateIngressRequest{\n\t\tRoaRequest: &requests.RoaRequest{},\n\t}\n\trequest.InitWithApiInfo(\"sae\", \"2019-05-06\", \"UpdateIngress\", \"/pop/v1/sam/ingress/Ingress\", \"serverless\", \"openAPI\")\n\trequest.Method = requests.PUT\n\treturn\n}", "title": "" }, { "docid": "6969c2f2ae456617625d4fdb8a329b96", "score": "0.48032904", "text": "func (c *Client) NewUpdateClassesRequest(ctx context.Context, path string, payload *UpdateClassesPayload, contentType string) (*http.Request, error) {\n\tvar body bytes.Buffer\n\tif contentType == \"\" {\n\t\tcontentType = \"*/*\" // Use default encoder\n\t}\n\terr := c.Encoder.Encode(payload, &body, contentType)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to encode body: %s\", err)\n\t}\n\tscheme := c.Scheme\n\tif scheme == \"\" {\n\t\tscheme = \"http\"\n\t}\n\tu := url.URL{Host: c.Host, Scheme: scheme, Path: path}\n\treq, err := http.NewRequest(\"PUT\", u.String(), &body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\theader := req.Header\n\tif contentType == \"*/*\" {\n\t\theader.Set(\"Content-Type\", \"application/json\")\n\t} else {\n\t\theader.Set(\"Content-Type\", contentType)\n\t}\n\tif c.JWTSecSigner != nil {\n\t\tif err := c.JWTSecSigner.Sign(req); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn req, nil\n}", "title": "" }, { "docid": "5028355b55c332840b0a5db04b7b8bf8", "score": "0.47997552", "text": "func (client *DashboardsClient) updateCreateRequest(ctx context.Context, resourceGroupName string, dashboardName string, dashboard PatchableDashboard, options *DashboardsClientUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Portal/dashboards/{dashboardName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif dashboardName == \"\" {\n\t\treturn nil, errors.New(\"parameter dashboardName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{dashboardName}\", url.PathEscape(dashboardName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2020-09-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, dashboard)\n}", "title": "" }, { "docid": "95e1e8ae33eea71d59bad2b2f03c9609", "score": "0.4782583", "text": "func (m *ServiceInstanceUpdateRequest) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validatePreviousValues(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateServiceID(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0f5f333e2abc7a553c93bc9031bdf6fa", "score": "0.47769412", "text": "func (client *ManagedInstancesClient) createOrUpdateCreateRequest(ctx context.Context, resourceGroupName string, managedInstanceName string, parameters ManagedInstance, options *ManagedInstancesClientBeginCreateOrUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Sql/managedInstances/{managedInstanceName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif managedInstanceName == \"\" {\n\t\treturn nil, errors.New(\"parameter managedInstanceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{managedInstanceName}\", url.PathEscape(managedInstanceName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPut, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-05-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, parameters)\n}", "title": "" }, { "docid": "e95b2ccd7d82b2413d113516500189a1", "score": "0.47709346", "text": "func (client *GalleryImageVersionsClient) updateCreateRequest(ctx context.Context, resourceGroupName string, galleryName string, galleryImageName string, galleryImageVersionName string, galleryImageVersion GalleryImageVersionUpdate, options *GalleryImageVersionsClientBeginUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/galleries/{galleryName}/images/{galleryImageName}/versions/{galleryImageVersionName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif galleryName == \"\" {\n\t\treturn nil, errors.New(\"parameter galleryName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{galleryName}\", url.PathEscape(galleryName))\n\tif galleryImageName == \"\" {\n\t\treturn nil, errors.New(\"parameter galleryImageName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{galleryImageName}\", url.PathEscape(galleryImageName))\n\tif galleryImageVersionName == \"\" {\n\t\treturn nil, errors.New(\"parameter galleryImageVersionName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{galleryImageVersionName}\", url.PathEscape(galleryImageVersionName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-03-03\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, galleryImageVersion)\n}", "title": "" }, { "docid": "40946d179327a66e3e55c6680c875037", "score": "0.47551015", "text": "func (client *DashboardsClient) updateCreateRequest(ctx context.Context, resourceGroupName string, dashboardName string, dashboard PatchableDashboard, options *DashboardsClientUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Portal/dashboards/{dashboardName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif dashboardName == \"\" {\n\t\treturn nil, errors.New(\"parameter dashboardName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{dashboardName}\", url.PathEscape(dashboardName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2020-09-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, runtime.MarshalAsJSON(req, dashboard)\n}", "title": "" }, { "docid": "900e0315d3e6563151c88c71b4ee870d", "score": "0.47545686", "text": "func newUpdateDomainMappingUpdateDomainMappingRequest(ctx context.Context, f *DomainMapping, c *Client) (map[string]interface{}, error) {\n\treq := map[string]interface{}{}\n\n\tif v, err := expandDomainMappingSslSettings(c, f.SslSettings); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding SslSettings into sslSettings: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"sslSettings\"] = v\n\t}\n\treturn req, nil\n}", "title": "" }, { "docid": "26d6305ce313b295bf15b7f39be7b645", "score": "0.47510168", "text": "func updateInstanceStatus(obj *ibmcloudv1alpha1.EsIndex, state string, msg string, generation int64) {\n\tobj.Status.State = state\n\tobj.Status.Message = msg\n\tobj.Status.Generation = generation\n}", "title": "" }, { "docid": "0ad21c80fe51071552406da1078613b4", "score": "0.4746691", "text": "func (client *PhpWorkloadsClient) updateCreateRequest(ctx context.Context, resourceGroupName string, phpWorkloadName string, resourcePatchRequestBody PatchResourceRequestBody, options *PhpWorkloadsClientUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Workloads/phpWorkloads/{phpWorkloadName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif phpWorkloadName == \"\" {\n\t\treturn nil, errors.New(\"parameter phpWorkloadName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{phpWorkloadName}\", url.PathEscape(phpWorkloadName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-12-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, resourcePatchRequestBody)\n}", "title": "" }, { "docid": "f3c89e011852f090a1314a782f456ced", "score": "0.47315836", "text": "func (a Tasks) UpdateTaskInstance(taskInstanceId string, taskInstanceUpdateItem TaskInstanceUpdateItem) (*InlineResponse200, *APIResponse, error) {\n\n\tvar httpMethod = \"Patch\"\n\t// create path and map variables\n\tpath := a.Configuration.BasePath + \"/task_instances/{task_instance_id}\"\n\tpath = strings.Replace(path, \"{\"+\"task_instance_id\"+\"}\", fmt.Sprintf(\"%v\", taskInstanceId), -1)\n\n\n\theaderParams := make(map[string]string)\n\tqueryParams := url.Values{}\n\tformParams := make(map[string]string)\n\tvar postBody interface{}\n\tvar fileName string\n\tvar fileBytes []byte\n\t// authentication '(PasswordGrant)' required\n\t// oauth required\n\tif a.Configuration.AccessToken != \"\"{\n\t\theaderParams[\"Authorization\"] = \"Bearer \" + a.Configuration.AccessToken\n\t}\n\t// add default headers if any\n\tfor key := range a.Configuration.DefaultHeader {\n\t\theaderParams[key] = a.Configuration.DefaultHeader[key]\n\t}\n\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{ \"application/vnd.api+json\", }\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := a.Configuration.APIClient.SelectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\theaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\n\t\t\"application/vnd.api+json\",\n\t}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := a.Configuration.APIClient.SelectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\theaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\t// body params\n\tpostBody = &taskInstanceUpdateItem\n\n\tvar successPayload = new(InlineResponse200)\n\thttpResponse, err := a.Configuration.APIClient.CallAPI(path, httpMethod, postBody, headerParams, queryParams, formParams, fileName, fileBytes)\n\tif err != nil {\n\t\treturn successPayload, NewAPIResponse(httpResponse.RawResponse), err\n\t}\n\terr = json.Unmarshal(httpResponse.Body(), &successPayload)\n\treturn successPayload, NewAPIResponse(httpResponse.RawResponse), err\n}", "title": "" }, { "docid": "75b208ded7e578fde005b4f3e670d833", "score": "0.47265962", "text": "func (client *ClustersClient) updateCreateRequest(ctx context.Context, resourceGroupName string, clusterName string, cluster Cluster, options *ClustersClientBeginUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.StreamAnalytics/clusters/{clusterName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif clusterName == \"\" {\n\t\treturn nil, errors.New(\"parameter clusterName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{clusterName}\", url.PathEscape(clusterName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2020-03-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\tif options != nil && options.IfMatch != nil {\n\t\treq.Raw().Header.Set(\"If-Match\", *options.IfMatch)\n\t}\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, runtime.MarshalAsJSON(req, cluster)\n}", "title": "" }, { "docid": "ce075202cbb296e333dad03036f855b8", "score": "0.47219393", "text": "func NewProjectUpdateRequest(server string, id int, body ProjectUpdateJSONRequestBody) (*http.Request, error) {\n\tvar bodyReader io.Reader\n\tbuf, err := json.Marshal(body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbodyReader = bytes.NewReader(buf)\n\treturn NewProjectUpdateRequestWithBody(server, id, \"application/json\", bodyReader)\n}", "title": "" }, { "docid": "68f45efe49efe0ec9e41fe539a7798a0", "score": "0.4716061", "text": "func (client *CapacityReservationsClient) updateCreateRequest(ctx context.Context, resourceGroupName string, capacityReservationGroupName string, capacityReservationName string, parameters CapacityReservationUpdate, options *CapacityReservationsClientBeginUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/capacityReservationGroups/{capacityReservationGroupName}/capacityReservations/{capacityReservationName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif capacityReservationGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter capacityReservationGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{capacityReservationGroupName}\", url.PathEscape(capacityReservationGroupName))\n\tif capacityReservationName == \"\" {\n\t\treturn nil, errors.New(\"parameter capacityReservationName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{capacityReservationName}\", url.PathEscape(capacityReservationName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-11-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, parameters)\n}", "title": "" }, { "docid": "f2d85207cc1aed3732fd848148e185fc", "score": "0.47155738", "text": "func (c *Client) NewUpdateWorkflowRequest(ctx context.Context, path string) (*http.Request, error) {\n\tscheme := c.Scheme\n\tif scheme == \"\" {\n\t\tscheme = \"http\"\n\t}\n\tu := url.URL{Host: c.Host, Scheme: scheme, Path: path}\n\treq, err := http.NewRequest(\"PUT\", u.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn req, nil\n}", "title": "" }, { "docid": "1ce643876534085bd1dcf33bba50801b", "score": "0.471416", "text": "func NewUpdateDatabaseAccountRequest(server string, clusterType ClusterType, clusterUuid string, uuid string, body UpdateDatabaseAccountJSONRequestBody) (*http.Request, error) {\n\tvar bodyReader io.Reader\n\tbuf, err := json.Marshal(body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbodyReader = bytes.NewReader(buf)\n\treturn NewUpdateDatabaseAccountRequestWithBody(server, clusterType, clusterUuid, uuid, \"application/json\", bodyReader)\n}", "title": "" }, { "docid": "4c5fd2bafd745e580f813472bcf85b3c", "score": "0.4704585", "text": "func (client *ServicesClient) updateCreateRequest(ctx context.Context, resourceGroupName string, peeringServiceName string, tags ResourceTags, options *ServicesClientUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Peering/peeringServices/{peeringServiceName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif peeringServiceName == \"\" {\n\t\treturn nil, errors.New(\"parameter peeringServiceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{peeringServiceName}\", url.PathEscape(peeringServiceName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-01-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, tags)\n}", "title": "" }, { "docid": "324abaed1acca2ccb60a1e96fae98ba4", "score": "0.47016916", "text": "func (client *ServersClient) updateCreateRequest(ctx context.Context, resourceGroupName string, serverName string, parameters ServerUpdate, options *ServersBeginUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Sql/servers/{serverName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif serverName == \"\" {\n\t\treturn nil, errors.New(\"parameter serverName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{serverName}\", url.PathEscape(serverName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-02-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, runtime.MarshalAsJSON(req, parameters)\n}", "title": "" }, { "docid": "30740ab872fa8143b357db1edf5f4c09", "score": "0.46937948", "text": "func (u *UpdateJob) InstanceCount(inst int32) *UpdateJob {\n\tu.req.InstanceCount = inst\n\treturn u\n}", "title": "" }, { "docid": "30740ab872fa8143b357db1edf5f4c09", "score": "0.46937948", "text": "func (u *UpdateJob) InstanceCount(inst int32) *UpdateJob {\n\tu.req.InstanceCount = inst\n\treturn u\n}", "title": "" }, { "docid": "92f8307baba7cdfd08ffa3be6c7f9577", "score": "0.4689276", "text": "func NewUpdateRequestBody(p *roles.Role) *UpdateRequestBody {\n\tbody := &UpdateRequestBody{\n\t\tDescription: p.Description,\n\t}\n\treturn body\n}", "title": "" }, { "docid": "015173504fe625e104d76e3757d1dff1", "score": "0.46873787", "text": "func (client *DiskPoolsClient) updateCreateRequest(ctx context.Context, resourceGroupName string, diskPoolName string, diskPoolUpdatePayload DiskPoolUpdate, options *DiskPoolsClientBeginUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.StoragePool/diskPools/{diskPoolName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif diskPoolName == \"\" {\n\t\treturn nil, errors.New(\"parameter diskPoolName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{diskPoolName}\", url.PathEscape(diskPoolName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-08-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, runtime.MarshalAsJSON(req, diskPoolUpdatePayload)\n}", "title": "" }, { "docid": "ae7456c632c63fb0df106df08d1931a7", "score": "0.4676793", "text": "func (client *ReplicationvCentersClient) updateCreateRequest(ctx context.Context, resourceName string, resourceGroupName string, fabricName string, vcenterName string, updateVCenterRequest UpdateVCenterRequest, options *ReplicationvCentersClientBeginUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.RecoveryServices/vaults/{resourceName}/replicationFabrics/{fabricName}/replicationvCenters/{vcenterName}\"\n\tif resourceName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceName}\", url.PathEscape(resourceName))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif fabricName == \"\" {\n\t\treturn nil, errors.New(\"parameter fabricName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{fabricName}\", url.PathEscape(fabricName))\n\tif vcenterName == \"\" {\n\t\treturn nil, errors.New(\"parameter vcenterName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{vcenterName}\", url.PathEscape(vcenterName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-10-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, updateVCenterRequest)\n}", "title": "" }, { "docid": "1877c36c9acf03d3260a96ae843130f6", "score": "0.4676095", "text": "func (client *PoliciesClient) updateCreateRequest(ctx context.Context, resourceGroupName string, policyName string, cdnWebApplicationFirewallPolicyPatchParameters WebApplicationFirewallPolicyPatchParameters, options *PoliciesClientBeginUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Cdn/cdnWebApplicationFirewallPolicies/{policyName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif policyName == \"\" {\n\t\treturn nil, errors.New(\"parameter policyName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{policyName}\", url.PathEscape(policyName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-06-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, cdnWebApplicationFirewallPolicyPatchParameters)\n}", "title": "" }, { "docid": "d1fec57cae5595bbedd86c70be8f0ff1", "score": "0.46711147", "text": "func NewUpdateThingRequest(server string, thingUID string, params *UpdateThingParams, body UpdateThingJSONRequestBody) (*http.Request, error) {\n\tvar bodyReader io.Reader\n\tbuf, err := json.Marshal(body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbodyReader = bytes.NewReader(buf)\n\treturn NewUpdateThingRequestWithBody(server, thingUID, params, \"application/json\", bodyReader)\n}", "title": "" }, { "docid": "537fc45f62fb4a620330633d79eb852a", "score": "0.46706468", "text": "func (client *AutoScaleVCoresClient) updateCreateRequest(ctx context.Context, resourceGroupName string, vcoreName string, vCoreUpdateParameters AutoScaleVCoreUpdateParameters, options *AutoScaleVCoresClientUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.PowerBIDedicated/autoScaleVCores/{vcoreName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif vcoreName == \"\" {\n\t\treturn nil, errors.New(\"parameter vcoreName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{vcoreName}\", url.PathEscape(vcoreName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-01-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, vCoreUpdateParameters)\n}", "title": "" }, { "docid": "7dcc8fb2ff1c424bbd90e778de0c0032", "score": "0.46585315", "text": "func (c *restClient) UpdateInstanceOperation(name string) *UpdateInstanceOperation {\n\toverride := fmt.Sprintf(\"/v2/%s\", name)\n\treturn &UpdateInstanceOperation{\n\t\tlro: longrunning.InternalNewOperation(*c.LROClient, &longrunningpb.Operation{Name: name}),\n\t\tpollPath: override,\n\t}\n}", "title": "" }, { "docid": "da8df7eef879079c099efad72516ecd0", "score": "0.4657414", "text": "func NewUpdateUserRequest(server string, params *UpdateUserParams, body UpdateUserJSONRequestBody) (*http.Request, error) {\n\tvar bodyReader io.Reader\n\tbuf, err := json.Marshal(body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbodyReader = bytes.NewReader(buf)\n\treturn NewUpdateUserRequestWithBody(server, params, \"application/json\", bodyReader)\n}", "title": "" }, { "docid": "2215efdf594c6bfdf197746ff01c7d3a", "score": "0.46565285", "text": "func (*UpdateInstanceRequest) Descriptor() ([]byte, []int) {\n\treturn file_google_cloud_alloydb_v1beta_service_proto_rawDescGZIP(), []int{19}\n}", "title": "" }, { "docid": "94232c49c556ced5ec47512d6db1a4eb", "score": "0.46540084", "text": "func NewUpdateSnapshotRequest(permissionsToCreateVolume PermissionsOnResourceCreation, snapshotId string) *UpdateSnapshotRequest {\n\tthis := UpdateSnapshotRequest{}\n\tthis.PermissionsToCreateVolume = permissionsToCreateVolume\n\tthis.SnapshotId = snapshotId\n\treturn &this\n}", "title": "" }, { "docid": "76d3ba732ea73c87edeaccf95bb4c9cc", "score": "0.46509698", "text": "func (pc proxyclient) UpdateInstance(r *osb.UpdateInstanceRequest) (*osb.UpdateInstanceResponse, error) {\n\tglog.V(9).Info(\"OSBClientProxy UpdateInstance()\")\n\tresponse, err := pc.realOSBClient.UpdateInstance(r)\n\tpc.updateMetrics(updateInstance, err)\n\treturn response, err\n}", "title": "" }, { "docid": "660ed0e9326a13dfa9b9d94f3d4a7220", "score": "0.4646677", "text": "func NewParameterTuningJobPartialUpdateRequest(server string, id int, body ParameterTuningJobPartialUpdateJSONRequestBody) (*http.Request, error) {\n\tvar bodyReader io.Reader\n\tbuf, err := json.Marshal(body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbodyReader = bytes.NewReader(buf)\n\treturn NewParameterTuningJobPartialUpdateRequestWithBody(server, id, \"application/json\", bodyReader)\n}", "title": "" }, { "docid": "bad04dbadc40b0ceba1874f55088023c", "score": "0.46439743", "text": "func NewEvaluationConfigUpdateRequest(server string, id int, body EvaluationConfigUpdateJSONRequestBody) (*http.Request, error) {\n\tvar bodyReader io.Reader\n\tbuf, err := json.Marshal(body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbodyReader = bytes.NewReader(buf)\n\treturn NewEvaluationConfigUpdateRequestWithBody(server, id, \"application/json\", bodyReader)\n}", "title": "" }, { "docid": "4713936295c6da735669c5be4db2397e", "score": "0.46348187", "text": "func CreateUpgradeLindormInstanceRequest() (request *UpgradeLindormInstanceRequest) {\n\trequest = &UpgradeLindormInstanceRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"hitsdb\", \"2020-06-15\", \"UpgradeLindormInstance\", \"hitsdb\", \"openAPI\")\n\trequest.Method = requests.POST\n\treturn\n}", "title": "" }, { "docid": "917d2db8036b35602cf7ede225d29e91", "score": "0.4632163", "text": "func (client *GlobalRulestackClient) updateCreateRequest(ctx context.Context, globalRulestackName string, properties GlobalRulestackResourceUpdate, options *GlobalRulestackClientUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/providers/PaloAltoNetworks.Cloudngfw/globalRulestacks/{globalRulestackName}\"\n\tif globalRulestackName == \"\" {\n\t\treturn nil, errors.New(\"parameter globalRulestackName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{globalRulestackName}\", url.PathEscape(globalRulestackName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-08-29\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, properties)\n}", "title": "" }, { "docid": "9eb7d6108307bcbd82a1f5c30c19c368", "score": "0.46312317", "text": "func NewUpdateRuleRequest(server string, ruleUID string, body UpdateRuleJSONRequestBody) (*http.Request, error) {\n\tvar bodyReader io.Reader\n\tbuf, err := json.Marshal(body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbodyReader = bytes.NewReader(buf)\n\treturn NewUpdateRuleRequestWithBody(server, ruleUID, \"application/json\", bodyReader)\n}", "title": "" }, { "docid": "c5e831a47d7a7d9ff51c8e5145d28b10", "score": "0.46298212", "text": "func NewUpdateJob(job *Job) *UpdateJob {\n\n\treq := aurora.NewJobUpdateRequest()\n\treq.TaskConfig = job.jobConfig.TaskConfig\n\treq.Settings = aurora.NewJobUpdateSettings()\n\n\t// Mirrors defaults set by Pystachio\n\treq.Settings.UpdateOnlyTheseInstances = make(map[*aurora.Range]bool)\n\treq.Settings.UpdateGroupSize = 1\n\treq.Settings.WaitForBatchCompletion = false\n\treq.Settings.MinWaitInInstanceRunningMs = 45000 // Deprecated\n\treq.Settings.MaxPerInstanceFailures = 0\n\treq.Settings.MaxFailedInstances = 0\n\treq.Settings.RollbackOnFailure = true\n\treq.Settings.WaitForBatchCompletion = false\n\n\t//TODO(rdelvalle): Deep copy job struct to avoid unexpected behavior\n\treturn &UpdateJob{job, req}\n}", "title": "" }, { "docid": "d7d091726ef0294b9ee4f1b9871cefd3", "score": "0.46269062", "text": "func (client *VirtualNetworkRulesClient) updateCreateRequest(ctx context.Context, resourceGroupName string, accountName string, virtualNetworkRuleName string, options *VirtualNetworkRulesClientUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.DataLakeStore/accounts/{accountName}/virtualNetworkRules/{virtualNetworkRuleName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif accountName == \"\" {\n\t\treturn nil, errors.New(\"parameter accountName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{accountName}\", url.PathEscape(accountName))\n\tif virtualNetworkRuleName == \"\" {\n\t\treturn nil, errors.New(\"parameter virtualNetworkRuleName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{virtualNetworkRuleName}\", url.PathEscape(virtualNetworkRuleName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2016-11-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\tif options != nil && options.Parameters != nil {\n\t\treturn req, runtime.MarshalAsJSON(req, *options.Parameters)\n\t}\n\treturn req, nil\n}", "title": "" }, { "docid": "cf2325327c5e8b311bb649d4b8fe5927", "score": "0.46262088", "text": "func NewUpdateEndpoint(s Service) goa.Endpoint {\n\treturn func(ctx context.Context, req interface{}) (interface{}, error) {\n\t\tp := req.(*UpdatePayload)\n\t\treturn nil, s.Update(ctx, p)\n\t}\n}", "title": "" } ]
5df01f6986a32bf1645cf466aaf34335
Read p fully, returns n read bytes. len(p) == n always if err == nil
[ { "docid": "5206dc34163099c2695f17f53c9b81be", "score": "0.0", "text": "func (dr *DecodingReader) Read(p []byte) (int, error) {\n\tif len(p) == 0 {\n\t\treturn 0, nil\n\t}\n\tif n, err := dr.checkedIndexUpdate(uint64(len(p))); err != nil {\n\t\treturn n, err\n\t}\n\tn := 0\n\tfor n < len(p) {\n\t\tv, err := dr.input.Read(p[n:])\n\t\tn += v\n\t\tif err != nil {\n\t\t\treturn n, err\n\t\t}\n\t}\n\treturn n, nil\n}", "title": "" } ]
[ { "docid": "75bfffdd5b27c4b22ff1d4c6fc4fddc8", "score": "0.75301886", "text": "func libc_pread(fd int32, buf *byte, count uint, offset int64) int", "title": "" }, { "docid": "57945a5e4e1be4b050067c11ef8a3089", "score": "0.72558844", "text": "func (r *Reader) Read(p []byte) (n int, err error) {\n\tif len(p) == 0 {\n\t\treturn 0, nil\n\t}\n\n\tif r.buf == nil {\n\t\tif r.err != nil {\n\t\t\treturn 0, r.readErr()\n\t\t}\n\n\t\treturn r.rd.Read(p)\n\t}\n\n\t// copy as much as we can\n\tn = copy(p, r.buf)\n\tr.buf = nilIfEmpty(r.buf[n:])\n\treturn n, nil\n}", "title": "" }, { "docid": "1e4b33a29f67f2ee1e514c6568e929a9", "score": "0.71241575", "text": "func (u *unreader) Read(p []byte) (n int, err error) {\n\t// either return the bytes we can from the buffer, or use underlying reader\n\t// for simplicity. Don't attempt to maximize bytes returned.\n\tn = len(p)\n\tif n == 0 {\n\t\treturn 0, nil\n\t}\n\n\t// read from reader\n\tif u.cursor == u.bytesRead {\n\t\tn, err = u.rd.Read(p)\n\t\tu.cb.Write(p[:n])\n\t\tu.bytesRead += int64(n)\n\t\tu.cursor += int64(n)\n\t\treturn n, err\n\t}\n\n\tb := u.cb.Bytes()\n\tn = copy(p, b[int64(len(b))-(u.bytesRead-u.cursor):])\n\tu.cursor += int64(n)\n\treturn n, nil\n}", "title": "" }, { "docid": "9b1c511012a46599dafec099357f848f", "score": "0.7074651", "text": "func read(fd int32, p unsafe.Pointer, n int32) int32", "title": "" }, { "docid": "42d7099e8388ca11915e60b59f16da47", "score": "0.7056547", "text": "func readn(s io.Reader, b []byte) (int, error) {\n // behaves similar to io.ReadFull, but simpler and allowing EOF<len(b)\n p := 0\n n := len(b)\n for p < n {\n z, err := s.Read(b[p:])\n p += z\n if err != nil {\n return p, err\n }\n }\n return p, nil\n}", "title": "" }, { "docid": "a21d286deadd76326f171abfcce3147b", "score": "0.7014476", "text": "func (b *Reader) Read(p []byte) (n int, err error) {\n\tn = len(p)\n\tif n == 0 {\n\t\treturn 0, b.readErr()\n\t}\n\tif b.r == b.w {\n\t\tif b.err != nil {\n\t\t\treturn 0, b.readErr()\n\t\t}\n\t\tif len(p) >= len(b.buf) {\n\t\t\t// Large read, empty buffer.\n\t\t\t// Read directly into p to avoid copy.\n\t\t\tn, b.err = b.rd.Read(p)\n\t\t\tif n < 0 {\n\t\t\t\tpanic(errNegativeRead)\n\t\t\t}\n\t\t\treturn n, b.readErr()\n\t\t}\n\t\t// One read.\n\t\t// Do not use b.fill, which will loop.\n\t\tb.r = 0\n\t\tb.w = 0\n\t\tn, b.err = b.rd.Read(b.buf)\n\t\tif n < 0 {\n\t\t\tpanic(errNegativeRead)\n\t\t}\n\t\tif n == 0 {\n\t\t\treturn 0, b.readErr()\n\t\t}\n\t\tb.w += n\n\t}\n\n\t// copy as much as we can\n\tn = copy(p, b.buf[b.r:b.w])\n\tb.r += n\n\tb.rp += int64(n)\n\treturn n, nil\n}", "title": "" }, { "docid": "8f8d39b006a217b3e7d523ebe7625165", "score": "0.70104074", "text": "func (pt *PassThru) Read(p []byte) (int, error) {\n\tn, err := pt.Reader.Read(p)\n\tif err == nil {\n\t\tpt.total += int64(n)\n\t}\n\tif pt.total > pt.byteLimit {\n\t\terr = fmt.Errorf(\"too many bytes\")\n\t}\n\n\treturn n, err\n}", "title": "" }, { "docid": "d7ebaa7ecf65f6be83bf85e256b9408e", "score": "0.69667065", "text": "func (f *File) pread(b []byte, off int64) (n int, err error) {\n\tn, e := fixCount(syscall.Pread(f.fd, b, off))\n\tif n == 0 && len(b) > 0 && e == nil {\n\t\treturn 0, io.EOF\n\t}\n\treturn n, e\n}", "title": "" }, { "docid": "c5d8b30e23f83ab4593e2ea5cbe4102e", "score": "0.6918756", "text": "func (c *chunkedData) Read(p []byte) (n int, err error) {\n\tto := c.head + int(rand.Int31n(int32(c.chunkSize))+1)\n\n\t// copy does not copy more data then p can consume\n\tn = copy(p, c.data[c.head:to])\n\tc.head = c.head + n\n\tif c.head >= len(c.data) {\n\t\terr = io.EOF\n\t}\n\treturn n, err\n}", "title": "" }, { "docid": "8cd9fafeca1755d13d68b386c74d282f", "score": "0.6918364", "text": "func (b *Buffer) Read(p []byte) (n int, err error) {\n\tn = copy(p, *b)\n\t*b = (*b)[n:]\n\tif len(*b) == 0 {\n\t\treturn n, io.EOF\n\t}\n\treturn n, nil\n}", "title": "" }, { "docid": "f1c516886b49b6c90a3646fab0acbf61", "score": "0.6902337", "text": "func (rb *Reader) Read(p []byte) (n int, err error) {\n\tif rb.overflow {\n\t\treturn rb.reader.Read(p)\n\t}\n\tif rb.r < rb.w {\n\t\tn = copy(p, rb.buf[rb.r:rb.w])\n\t\trb.r += n\n\t\treturn\n\t}\n\tn, err = rb.reader.Read(p)\n\tbn := copy(rb.buf[rb.w:], p[:n])\n\trb.w, rb.r = rb.w+bn, rb.w+n\n\tif bn < n {\n\t\trb.overflow = true\n\t}\n\treturn\n}", "title": "" }, { "docid": "c10f5a05d6480fe2e09fc68521b85754", "score": "0.6887024", "text": "func (b *Buffer) Read(p []byte) (n int, err error) {\n\tif b.off >= len(b.buf) {\n\t\t// Buffer is empty, reset to recover space.\n\t\tb.Truncate(0)\n\t\tif len(p) == 0 {\n\t\t\treturn\n\t\t}\n\t\treturn 0, io.EOF\n\t}\n\tn = copy(p, b.buf[b.off:])\n\tb.off += n\n\treturn\n}", "title": "" }, { "docid": "eab4ae7de457d7f56967c7d1b19ff3d4", "score": "0.68636245", "text": "func (r *Reader) Read(p []byte) (n int, err error) {\n\t//if we had a previous error stored, return it and clear the store\n\tif r.err != nil {\n\t\treturn 0, r.Err()\n\t}\n\n\tn, err = r.r.Read(p)\n\n\t//error and data returned, store error for next call\n\tif n != 0 && err != nil {\n\t\tr.err = err\n\t\treturn n, nil\n\t}\n\n\t//otherwise just return\n\treturn n, err\n}", "title": "" }, { "docid": "5eee4d1b2fe30302613ffc413aa3c53b", "score": "0.685027", "text": "func (b *Reader) Read(p []byte) (n int, e error) {\n n = len(p)\n\n if n == 0 {\n return 0, nil\n }\n\n if b.w == b.r {\n // read request is larger then current window size\n if n >= len(b.buf) {\n log.Println(\"Read directly from IO\")\n return b.rd.Read(p)\n }\n\n if e = b.fill(); e != nil {\n return 0, e\n }\n }\n\n // drain buffer\n if n > b.w-b.r {\n n = b.w - b.r\n }\n\n copy(p[0:n], b.buf[b.r:])\n b.r += n\n return n, nil\n}", "title": "" }, { "docid": "6cca9031285729fa13668a29ee6a00e3", "score": "0.6839889", "text": "func (d *Driver) Read(p []byte) (n int, err error) {\n\tif len(p) == 0 {\n\t\treturn 0, nil\n\t}\n\tnextw := d.waitRxData()\n\tnextr := int(d.nextr)\n\tif nextw == nextr {\n\t\treturn 0, ErrTimeout\n\t}\n\tif nextr <= nextw {\n\t\tn = copy(p, d.rxbuf[nextr:nextw])\n\t} else {\n\t\tn = copy(p, d.rxbuf[nextr:])\n\t\tif n < len(p) {\n\t\t\tn += copy(p[n:], d.rxbuf[:nextw])\n\t\t}\n\t}\n\treturn n, d.markDataRead(nextr + n)\n}", "title": "" }, { "docid": "3b8d4953a5e39a8886a592aa55b61aea", "score": "0.6828469", "text": "func (e EndlessReader) Read(p []byte) (int, error) {\n\treturn len(p), nil\n}", "title": "" }, { "docid": "9803d876bdc217f2351756de1e515d72", "score": "0.6827176", "text": "func (bbs *BBS) Read(p []byte) (n int, err error) {\n\tl := len(p)\n\tcopy(p, bbs.Bytes(l))\n\treturn l, nil\n}", "title": "" }, { "docid": "756527a75d64694594c7b3d58b8326b5", "score": "0.6821474", "text": "func (r *BytesReader) Read(p []byte) (n int, err error) {\n\tif to := r.cursor + len(p); to < r.length {\n\t\tn = copy(p, r.data[r.cursor:to])\n\t\tr.cursor += n\n\t} else {\n\t\tif r.cursor < r.length {\n\t\t\tn = copy(p, r.data[r.cursor:])\n\t\t\tr.cursor += n\n\t\t}\n\t\terr = io.EOF\n\t}\n\treturn\n}", "title": "" }, { "docid": "e16112fbdec40519a222659f39b8afc2", "score": "0.681678", "text": "func (l *LimitedReader) Read(p []byte) (n int, err error) {\n\tif l.N <= 0 {\n\t\treturn 0, ErrReadSizeLimitExceeded\n\t}\n\tif len(p) > l.N {\n\t\tp = p[0:l.N]\n\t}\n\tn, err = l.R.Read(p)\n\tl.N -= n\n\treturn\n}", "title": "" }, { "docid": "0dc6af55c774aa8540126c45ee45ae0f", "score": "0.6809912", "text": "func (r *Reader) Read(p []byte) (int, error) {\n\tn, err := r.src.Read(p)\n\tread := atomic.AddInt64(r.read, int64(n))\n\tr.progress(read)\n\n\treturn n, err\n}", "title": "" }, { "docid": "e4a7437354c15aebe83f9bef4e219d42", "score": "0.67918044", "text": "func (r *Random) Read(p []byte) (int, error) {\n\tbytesToWrite := len(p)\n\tbytesWritten := 0\n\tfor bytesToWrite > 0 {\n\t\tif r.bytes <= 0 {\n\t\t\tr.Randomise()\n\t\t}\n\t\tchunkSize := bytesToWrite\n\t\tif bytesToWrite >= r.bytes {\n\t\t\tchunkSize = r.bytes\n\t\t}\n\t\tcopy(p[bytesWritten:bytesWritten+chunkSize], r.Data[r.pos:r.pos+chunkSize])\n\t\tbytesWritten += chunkSize\n\t\tbytesToWrite -= chunkSize\n\t\tr.pos += chunkSize\n\t\tr.bytes -= chunkSize\n\t}\n\treturn bytesWritten, nil\n}", "title": "" }, { "docid": "309af8fac96e0d14b4b4fd65600448f0", "score": "0.6791348", "text": "func (l *LimitedReader) Read(p []byte) (n int, err error) {\n\tif l.N <= 0 {\n\t\treturn 0, io.EOF\n\t}\n\tlmt := l.N\n\tif lmt > int64(cap(p)) {\n\t\tlmt = int64(cap(p))\n\t}\n\tn, err = l.R.Read(p[:lmt])\n\tif n == 0 || err == io.EOF {\n\t\tl.N = -1\n\t}\n\tl.N -= int64(n)\n\treturn n, err\n}", "title": "" }, { "docid": "f6aa3a950f87d7b43d4a0292835b540f", "score": "0.6759156", "text": "func (r *Reader) Read(p []byte) (n int, err error) {\n\n\tif r.Reader != nil {\n\t\treturn r.Reader.Read(p)\n\t}\n\n\treturn 0, nil\n}", "title": "" }, { "docid": "2a014cfc6b2e7621f70cb7a0cc3397b9", "score": "0.6752753", "text": "func (s *stream) Read(p []byte) (int, error) {\n\tif atomic.LoadInt32(&s.eof) != 0 {\n\t\treturn 0, io.EOF\n\t}\n\n\tbytesRead := 0\n\tfor bytesRead < len(p) {\n\t\ts.mutex.Lock()\n\t\tframe := s.frameQueue.Head()\n\n\t\tif frame == nil && bytesRead > 0 {\n\t\t\ts.mutex.Unlock()\n\t\t\treturn bytesRead, s.err\n\t\t}\n\n\t\tvar err error\n\t\tfor {\n\t\t\t// Stop waiting on errors\n\t\t\tif s.err != nil {\n\t\t\t\terr = s.err\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tif frame != nil {\n\t\t\t\ts.readPosInFrame = int(s.readOffset - frame.Offset)\n\t\t\t\tbreak\n\t\t\t}\n\t\t\ts.newFrameOrErrCond.Wait()\n\t\t\tframe = s.frameQueue.Head()\n\t\t}\n\t\ts.mutex.Unlock()\n\t\t// Here, either frame != nil xor err != nil\n\n\t\tif frame == nil {\n\t\t\tatomic.StoreInt32(&s.eof, 1)\n\t\t\t// We have an err and no data, return the error\n\t\t\treturn bytesRead, err\n\t\t}\n\n\t\tm := utils.Min(len(p)-bytesRead, int(frame.DataLen())-s.readPosInFrame)\n\n\t\tif bytesRead > len(p) {\n\t\t\treturn bytesRead, fmt.Errorf(\"BUG: bytesRead (%d) > len(p) (%d) in stream.Read\", bytesRead, len(p))\n\t\t}\n\t\tif s.readPosInFrame > int(frame.DataLen()) {\n\t\t\treturn bytesRead, fmt.Errorf(\"BUG: readPosInFrame (%d) > frame.DataLen (%d) in stream.Read\", s.readPosInFrame, frame.DataLen())\n\t\t}\n\t\tcopy(p[bytesRead:], frame.Data[s.readPosInFrame:])\n\n\t\ts.readPosInFrame += m\n\t\tbytesRead += m\n\t\ts.readOffset += protocol.ByteCount(m)\n\n\t\ts.flowControlManager.AddBytesRead(s.streamID, protocol.ByteCount(m))\n\t\ts.onData() // so that a possible WINDOW_UPDATE is sent\n\n\t\tif s.readPosInFrame >= int(frame.DataLen()) {\n\t\t\tfin := frame.FinBit\n\t\t\ts.mutex.Lock()\n\t\t\ts.frameQueue.Pop()\n\t\t\ts.mutex.Unlock()\n\t\t\tif fin {\n\t\t\t\tatomic.StoreInt32(&s.eof, 1)\n\t\t\t\treturn bytesRead, io.EOF\n\t\t\t}\n\t\t}\n\t}\n\n\treturn bytesRead, nil\n}", "title": "" }, { "docid": "398423eb0205da3a7f24114239983cec", "score": "0.6750345", "text": "func (b *PieceBuffer) Read(p []byte) (n int, err error) {\n\tdefer b.cond.Broadcast()\n\tb.cond.L.Lock()\n\tdefer b.cond.L.Unlock()\n\n\tfor b.empty() {\n\t\tif b.err != nil {\n\t\t\treturn 0, b.err\n\t\t}\n\t\tb.cond.Wait()\n\t}\n\n\tif b.rpos >= b.wpos {\n\t\tnn := copy(p, b.buf[b.rpos:])\n\t\tn += nn\n\t\tb.rpos = (b.rpos + nn) % len(b.buf)\n\t\tp = p[nn:]\n\t}\n\n\tif b.rpos < b.wpos {\n\t\tnn := copy(p, b.buf[b.rpos:b.wpos])\n\t\tn += nn\n\t\tb.rpos += nn\n\t}\n\n\tif n > 0 {\n\t\tb.full = false\n\t}\n\n\treturn n, nil\n}", "title": "" }, { "docid": "fb1a4c9e1ce6c1b7f82cfc6829a1ec3f", "score": "0.6736237", "text": "func (rr *Rereader) Read(p []byte) (n int, err error) {\n\tif rr.useBuffer.Load() {\n\t\treturn rr.bufReader.Read(p)\n\t}\n\n\trr.hasReadFromSrc.Store(true)\n\tn, err = rr.src.Read(p)\n\tif n > 0 {\n\t\tif n, err := rr.buf.Write(p[:n]); err != nil {\n\t\t\treturn n, err\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "7ac1a0378dbcf5c22785a12140c5619c", "score": "0.6734386", "text": "func (b *Buffer) Read(p []byte) (n int, err error) {\n\tif b.empty() {\n\t\t// 读的时候不调用Reset()方法,这样才有机会通过SetOffset()重置进度\n\t\t//// Buffer is empty, reset to recover space.\n\t\t//b.Reset()\n\t\tif len(p) == 0 {\n\t\t\treturn 0, nil\n\t\t}\n\t\treturn 0, io.EOF\n\t}\n\n\tn = copy(p, b.buf[b.off:])\n\tb.off += n\n\treturn n, nil\n}", "title": "" }, { "docid": "c8d12bc9c07e9bb913614f3b030ca4e0", "score": "0.6716375", "text": "func (t *targetGenerator) Read(p []byte) (n int, err error) {\n\tlenOut := len(p)\n\tlenOut64 := int64(lenOut)\n\tfor lenOut64 > int64(len(t.data))-t.readIndex {\n\t\tt.pushTargetBuffer()\n\t}\n\tcopy(p, t.data[t.readIndex:])\n\tt.readIndex += lenOut64\n\treturn lenOut, nil\n}", "title": "" }, { "docid": "ead3ba2035d45a36ba040ad4ae8febde", "score": "0.67097545", "text": "func (r *Rand) Read(p []byte) (n int, err error) {}", "title": "" }, { "docid": "319a86f2216db29d7a3ffe8de1fa3a86", "score": "0.6705087", "text": "func (r *Reader) Read(p []byte) (n int, err error) {\n\tbuf := &r.buf\n\n\t// return previously decoded data first\n\tbacklog := copy(p[n:], r.out)\n\tr.out = r.out[backlog:]\n\tn += backlog\n\tif len(p) == n {\n\t\treturn\n\t}\n\n\tif x := EncodedLen(len(p)); r.err == nil {\n\t\t// refill on data\n\t\t_, r.err = io.CopyN(buf, r.src, int64(x+1))\n\t}\n\n\tif r.err != nil && buf.Len() == 0 {\n\t\t// underlying Reader gives no data,\n\t\t// buffer is also empty, we're done\n\t\treturn n, r.err\n\t}\n\n\t// decoding buffer\n\tw := make([]byte, 2)\n\n\t// no error yet, we have some data to decode;\n\t// decoding until the only byte is left in buffer\n\tfor buf.Len() > 1 && n < len(p) {\n\t\tb, _ := buf.ReadByte()\n\t\twid, end, err := r.unpack(w, b)\n\t\tif err != nil {\n\t\t\treturn n, err\n\t\t}\n\n\t\tif end && !r.IgnoreFiller {\n\t\t\terr = ErrBadBCD\n\t\t}\n\n\t\t// fmt.Printf(\"copying '%c' '%c' - %d bytes\\n\", w[0], w[1], wid)\n\t\tcp := copy(p[n:], w[:wid])\n\t\tr.out = append(r.out, w[cp:wid]...)\n\t\tn += cp\n\n\t\tif err != nil {\n\t\t\treturn n, err\n\t\t}\n\t}\n\n\t// last breath\n\tif buf.Len() == 1 && r.err != nil {\n\t\tb, _ := buf.ReadByte()\n\t\twid, _, err := r.unpack(w, b)\n\t\tif err != nil {\n\t\t\treturn n, err\n\t\t}\n\n\t\t// fmt.Printf(\"copying '%c' '%c' - %d bytes\\n\", w[0], w[1], wid)\n\t\tcp := copy(p[n:], w[:wid])\n\t\tr.out = append(r.out, w[cp:wid]...)\n\t\tn += cp\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "2e4787bb0ebef81a19a6709ee9fe7aa8", "score": "0.67002", "text": "func (r *pipe) Read(p []byte) (n int, err error) {\n\tr.c.L.Lock()\n\tdefer r.c.L.Unlock()\n\tfor r.b.Len() == 0 && !r.b.closed {\n\t\tr.c.Wait()\n\t}\n\treturn r.b.Read(p)\n}", "title": "" }, { "docid": "06c794ff41a8b0e33a79c01652536d45", "score": "0.66948915", "text": "func (pt *PassThru) Read(p []byte) (int, error) {\n\tn, err := pt.Reader.Read(p)\n\n\tif n > 0 {\n\t\tpt.pb.Add64(int64(n))\n\t}\n\n\treturn n, err\n}", "title": "" }, { "docid": "acecfc63fae73450571d204284bc1358", "score": "0.6694626", "text": "func (r *fakeRandReader) Read(p []byte) (int, error) {\n\tn := r.n\n\tif n > len(p) {\n\t\tn = len(p)\n\t}\n\treturn n, r.err\n}", "title": "" }, { "docid": "acecfc63fae73450571d204284bc1358", "score": "0.6694626", "text": "func (r *fakeRandReader) Read(p []byte) (int, error) {\n\tn := r.n\n\tif n > len(p) {\n\t\tn = len(p)\n\t}\n\treturn n, r.err\n}", "title": "" }, { "docid": "c1c001a61c225f7483743d9b5b5bce93", "score": "0.6694014", "text": "func (r *SlowReader) Read(p []byte) (n int, err error) {\n\t<-r.throttle\n\tif len(p) == 0 {\n\t\treturn 0, nil\n\t}\n\tb := make([]byte, 1)\n\tn, err = r.r.Read(b)\n\tif err != nil {\n\t\treturn\n\t}\n\tcopy(p, b)\n\treturn\n}", "title": "" }, { "docid": "8bbefaaf1ad5bd00f588b2cd3523d556", "score": "0.66820455", "text": "func (b *BufioReader) Read(p []byte) (int, error) {\n\tif b.limit <= 0 {\n\t\treturn 0, io.EOF\n\t}\n\tif int64(len(p)) > b.limit {\n\t\tp = p[0:b.limit]\n\t}\n\tn, err := b.reader.Read(p)\n\tcount := int64(n)\n\tb.count += count\n\tb.limit -= count\n\treturn n, err\n}", "title": "" }, { "docid": "de56b21da27d263aa89d93eb76e7cfdc", "score": "0.66754854", "text": "func (c *Conn) read(n int) (p []byte, err error) {\n\t//p = make([]byte, n)\n\t//actual := 0\n\t//actual, err = c.bufRD.Read(p)\n\t//if err == io.EOF {\n\t//\terr = ErrUnexpectedEOF\n\t//\treturn nil, err\n\t//}\n\t//return p[:actual], err\n\tp, err = c.bufRD.Peek(n)\n\tif err == io.EOF {\n\t\terr = ErrUnexpectedEOF\n\t\treturn nil, err\n\t}\n\t_, _ = c.bufRD.Discard(len(p))\n\treturn p, err\n}", "title": "" }, { "docid": "f01c47918a2f63784e06c35c53485e18", "score": "0.6638122", "text": "func (f *DataChunkFile) Read(p []byte) (n int, err error) {\n\tlog.Tracef(\"DataChunkFile.Read() - start\")\n\tdefer log.Tracef(\"DataChunkFile.Read() - end\")\n\n\tif len(f.recvBuf) == 0 {\n\t\t// No buffered data available, need to get some\n\t\tf.recvDataChunkIntoBuf()\n\t}\n\n\tn = 0\n\tif len(f.recvBuf) > 0 {\n\t\t// Have some buffered data, copy it out\n\t\tn = copy(p, f.recvBuf)\n\t\tf.recvBuf = f.recvBuf[n:]\n\t}\n\n\tif len(f.recvBuf) > 0 {\n\t\t// Still have some data in recvBuf for next read, so not even EOF should be reported right now\n\t\treturn n, nil\n\t}\n\n\t// No more data in recvBuf left\n\treturn n, f.recvErr\n}", "title": "" }, { "docid": "c2aaad0d60650b8e0aa317c2824c15b0", "score": "0.66356385", "text": "func (r *TimeoutReader) Read(p []byte) (n int, err error) {\n\tch := make(chan readResult, 1)\n\tgo func() {\n\t\tpp := make([]byte, len(p))\n\t\t_, err := r.r.Read(pp)\n\t\tch <- readResult{pp, err}\n\t}()\n\tselect {\n\tcase <-time.After(r.timeout):\n\t\treturn 0, ErrTimeout\n\tcase res := <-ch:\n\t\tcopy(p, res.b)\n\t\treturn len(res.b), res.err\n\t}\n}", "title": "" }, { "docid": "e4637cbe171d1828b0e7a5fc7b4166c1", "score": "0.66288817", "text": "func (b *ReadSeekBuffer) Read(p []byte) (n int, err error) {\n\tif b.off >= int64(len(b.buf)) {\n\t\tif len(p) == 0 {\n\t\t\treturn\n\t\t}\n\t\treturn 0, io.EOF\n\t}\n\tn = copy(p, b.buf[b.off:])\n\tb.off += int64(n)\n\treturn\n}", "title": "" }, { "docid": "284d235109d6d4b21b794178e1158a29", "score": "0.6622479", "text": "func (ch *Chunk) Read(p []byte) (n int, err error) {\n\tif ch == nil || ch.R == nil {\n\t\treturn 0, errors.New(\"nil chunk/reader pointer\")\n\t}\n\tn, err = ch.R.Read(p)\n\tch.Pos += n\n\treturn n, err\n}", "title": "" }, { "docid": "b55e844dc1a1f4c8705674c358d120a7", "score": "0.65963113", "text": "func (r *reader) Read(p []byte) (n int, err error) {\n\tif r.err != nil {\n\t\treturn 0, r.err\n\t}\n\treturn r.dec.Read(p)\n}", "title": "" }, { "docid": "5cc8c6e943fa16277cea70474f59d0a5", "score": "0.659305", "text": "func (r *RingBuffer) Read(p []byte) (n int, err error) {\n\tif len(p) == 0 {\n\t\treturn 0, nil\n\t}\n\tif r.isEmpty {\n\t\treturn 0, ErrIsEmpty\n\t}\n\tn = len(p)\n\tif r.w > r.r {\n\t\tif n > r.w-r.r {\n\t\t\tn = r.w - r.r\n\t\t}\n\t\tcopy(p, r.buf[r.r:r.r+n])\n\t\t// move readPtr\n\t\tr.r = (r.r + n) % r.size\n\t\tif r.r == r.w {\n\t\t\tr.isEmpty = true\n\t\t}\n\t\treturn\n\t}\n\tif n > r.size-r.r+r.w {\n\t\tn = r.size - r.r + r.w\n\t}\n\tif r.r+n <= r.size {\n\t\tcopy(p, r.buf[r.r:r.r+n])\n\t} else {\n\t\t// head\n\t\tcopy(p, r.buf[r.r:r.size])\n\t\t// tail\n\t\tcopy(p[r.size-r.r:], r.buf[0:n-r.size+r.r])\n\t}\n\n\t// move readPtr\n\tr.r = (r.r + n) % r.size\n\tif r.r == r.w {\n\t\tr.isEmpty = true\n\t}\n\treturn\n}", "title": "" }, { "docid": "ef2d2b87e3c46a56a701e32d961eb47c", "score": "0.6589498", "text": "func (b *SafeBuffer) Read(p []byte) (n int, err error) {\n\tb.mu.Lock()\n\tdefer b.mu.Unlock()\n\treturn b.b.Read(p)\n}", "title": "" }, { "docid": "2296c942d9ff1bc7f5e8ab899027abea", "score": "0.65884376", "text": "func (nb *nbuffer) Read(p []byte) (int, error) {\n\treturn nb.buf.Read(p)\n}", "title": "" }, { "docid": "b3008763209e848d40f3fb0f2f4461e7", "score": "0.6583354", "text": "func (s *Buffer) Read(p []byte) (int, error) {\n\tif len(p) == 0 {\n\t\treturn 0, nil\n\t}\n\tif len(*s) == 0 {\n\t\treturn 0, io.EOF\n\t}\n\tn := copy(p, *s)\n\t*s = (*s)[n:]\n\treturn n, nil\n}", "title": "" }, { "docid": "49ab0975ecd0267ec0654d71492d3aed", "score": "0.65815705", "text": "func Read(r io.Reader, p []byte) ([]byte, error) {\n\tp = p[:cap(p)]\n\tn, err := r.Read(p)\n\tif p != nil {\n\t\tp = p[:n]\n\t}\n\treturn p, err\n}", "title": "" }, { "docid": "3e4ce9ce4bbaf1d336d92884505c6025", "score": "0.65805304", "text": "func (r *Reader) Read(p []byte) (n int, err error) {\n\tr.readMu.Lock()\n\tdefer r.readMu.Unlock()\n\treturn r.read(p, &r.readOff)\n}", "title": "" }, { "docid": "34eeca220ef2247d7af936484641e55f", "score": "0.65659386", "text": "func (f *FakeFile) Read(p []byte) (n int, err error) {\n\treturn len(p), nil\n}", "title": "" }, { "docid": "64dbd2b7a67c644c8ec7388c49e903d7", "score": "0.65644675", "text": "func (b *ReadCloser) Read(p []byte) (n int, err error) {\n\tn = copy(p, b.content[b.index:])\n\tb.index += n\n\tif b.index >= len(b.content) {\n\t\t// Make it repeatable reading.\n\t\tif b.repeatable {\n\t\t\tb.index = 0\n\t\t}\n\t\treturn n, io.EOF\n\t}\n\treturn n, nil\n}", "title": "" }, { "docid": "02fe5f552a68d157edccd177cc2f1905", "score": "0.6547445", "text": "func (r readerFun) Read(p []byte) (n int, err error) { return r(p) }", "title": "" }, { "docid": "f11fd8d20a5b6156baef6765d783c97e", "score": "0.6529066", "text": "func (r *noBufReader) Read(p []byte) (int, error) {\n\treturn r.r.Read(p)\n}", "title": "" }, { "docid": "71e8a69486aadb2dc4e5fbbc289e59c9", "score": "0.6527214", "text": "func (s *AzBlockBlob) Read(p []byte) (n int, err error) {\n\tif s.blockBlobURL == nil {\n\t\treturn 0, errReadNotOpened\n\t}\n\n\tif s.fileSize > 0 && s.offset >= s.fileSize {\n\t\treturn 0, io.EOF\n\t}\n\n\tcount := int64(len(p))\n\tresp, err := s.blockBlobURL.Download(s.ctx, s.offset, count, azblob.BlobAccessConditions{}, false)\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\tif s.fileSize < 0 {\n\t\ts.fileSize = resp.ContentLength()\n\t}\n\n\ttoRead := s.fileSize - s.offset\n\tif toRead > count {\n\t\ttoRead = count\n\t}\n\n\tbody := resp.Body(azblob.RetryReaderOptions{})\n\tbytesRead, err := io.ReadFull(body, p[:toRead])\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\n\ts.offset += int64(bytesRead)\n\n\treturn bytesRead, nil\n}", "title": "" }, { "docid": "2684bec1dc263fe1e129a79ec766cc6d", "score": "0.65230584", "text": "func (s *SharedMemory) Read(p []byte) (int, error) {\n\tif p == nil {\n\t\treturn 0, errors.New(\"slice p is nil\")\n\t}\n\tif s.addr == 0 {\n\t\treturn 0, errors.New(\"memory is not attached\")\n\t}\n\tn := len(p)\n\tif n == 0 {\n\t\treturn 0, nil\n\t}\n\tmaxReadSize := min(s.actualSize-s.seek, uint64(n))\n\tif maxReadSize == 0 {\n\t\treturn 0, io.EOF\n\t}\n\tvar i uint64 = 0\n\tfor i = 0; i < maxReadSize; i++ {\n\t\tp[i] = *(*byte)(unsafe.Pointer(s.addr + uintptr(s.seek)))\n\t\ts.seek++\n\t}\n\treturn int(maxReadSize), nil\n}", "title": "" }, { "docid": "b9c108bf6bf22b9c1d4e07b7e82b972b", "score": "0.6513664", "text": "func (r *EndlessReader) Read(p []byte) (n int, err error) {\n\tr.Reader.Read(p)\n\treturn 0, nil\n}", "title": "" }, { "docid": "f2c47aa8c56831bf1187820e205de492", "score": "0.6461895", "text": "func (r *Cryptographical) Read(p []byte) (n int, err error) {\n\treturn io.ReadFull(rand.Reader, p)\n}", "title": "" }, { "docid": "d3826453392d7ad127fbd0c924ac0c99", "score": "0.6460183", "text": "func (r *reader) Read(p []byte) (n int, err error) {\n\tn, err = r.Reader.Read(p)\n\tif err != nil {\n\t\treturn\n\t}\n\n\terr = r.Limiter.Count(n)\n\treturn\n}", "title": "" }, { "docid": "59a491ee0ac7ea81752168bf2f9cfa44", "score": "0.6459829", "text": "func (s *SyncedReadCloser) Read(p []byte) (n int, err error) {\n\t// If the data fits in the buffer blocks awaiting the sync instruction\n\tif s.p+int64(len(p)) >= s.length && s.enableBlocking {\n\t\t<-s.openGate\n\t}\n\tn = copy(p, s.data[s.p:])\n\ts.p += int64(n)\n\tif s.p == s.length {\n\t\terr = io.EOF\n\t}\n\treturn n, err\n}", "title": "" }, { "docid": "d81d44f038c6f6cd6c5b0345817b6c64", "score": "0.6436288", "text": "func (sr SecureReader) Read(p []byte) (n int, err error) {\n\tvar out []byte\n\n\tif len(p) == 0 {\n\t\treturn 0, errors.New(\"secureReader.Read() received 0 length buffer\")\n\t}\n\n\tdata := make([]byte, len(p))\n\tif n, err = sr.r.Read(data); err != nil {\n\t\treturn\n\t}\n\n\tif out, err = unpack(sr.priv, sr.pub, n, data); err != nil {\n\t\treturn\n\t}\n\n\tif n = copy(p, out); n < len(out) {\n\t\treturn n, errors.New(\"secureReader.Read() had \" + string(len(out)-n) + \" more bytes than buffer\")\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "4e2996a2629e43adff419d1ae3eca687", "score": "0.6433552", "text": "func (f *fileInMemory) Read(p []byte) (n int, err error) {\n\treturn len(p), nil\n}", "title": "" }, { "docid": "6fc4647eea0939f3e86988aadec844d2", "score": "0.64282924", "text": "func (r *PRing) Read(b []byte) (int, error) {\n\tif len(b) < r.dataAvailable() {\n\t\treturn 0, fmt.Errorf(\"Insufficient read buffer size (want %d, have %d)\",\n\t\t\tr.dataAvailable(), len(b))\n\t}\n\tr.mutex.Lock()\n\tfor r.dataAvailable() == 0 {\n\t\tr.readable.Wait()\n\t}\n\tn := r.read(b)\n\tr.writeable.Signal()\n\tr.mutex.Unlock()\n\treturn n, nil\n}", "title": "" }, { "docid": "19f1a7a8e59f7fba7253790ef05124a0", "score": "0.64258087", "text": "func (s *sBuffer) Read(p []byte) (n int, err error) {\n\tfor {\n\t\ts.mu.Lock()\n\t\tif s.Len() >= len(p) {\n\t\t\tn, err = s.Buffer.Read(p)\n\t\t\ts.mu.Unlock()\n\t\t\treturn\n\t\t}\n\t\tselect {\n\t\tcase <-s.newdata:\n\t\tdefault:\n\t\t}\n\t\ts.mu.Unlock()\n\n\t\tselect {\n\t\tcase <-s.newdata:\n\t\tcase <-s.closing:\n\t\t\treturn 0, io.EOF\n\t\t}\n\t}\n}", "title": "" }, { "docid": "1400acaeff4e5b9b11b2b06aee976a4b", "score": "0.64157915", "text": "func (vr *VerifyReader) Read(p []byte) (n int, err error) {\n\tif vr.err != nil {\n\t\treturn 0, vr.err\n\t}\n\n\tn, err = vr.base.Read(p)\n\tif err != nil {\n\t\tif err == io.EOF && vr.base.N > 0 {\n\t\t\terr = io.ErrUnexpectedEOF\n\t\t}\n\t\tvr.err = err\n\t}\n\treturn\n}", "title": "" }, { "docid": "4ca7c0b145c65ad07915569421b23ff0", "score": "0.6415315", "text": "func (r *Reader) Read(p []byte) (n int, err error) {\n\treturn r.rd.Read(p)\n}", "title": "" }, { "docid": "11115437cd2a20a11d579f41a9e271e8", "score": "0.64133453", "text": "func (d *Decoder) Read(p []byte) (int, error) {\n\tif d.err != nil {\n\t\treturn 0, d.err\n\t}\n\tvar n int\n\tn, d.err = d.r.Read(p)\n\td.n += n\n\tif d.n > MaxObjectSize {\n\t\td.err = ErrObjectTooLarge(d.n)\n\t}\n\treturn n, d.err\n}", "title": "" }, { "docid": "fb78224b0008d9c1686529812fba4fc2", "score": "0.64114076", "text": "func (r *Reader) Read(p []byte) (n int, err error) {\n\tn, err = r.Reader.Read(p)\n\tr.totalProgress += n\n\treturn\n}", "title": "" }, { "docid": "3431f3e63008f38ea233168bd51147a6", "score": "0.64067966", "text": "func (r *reader) Read(p []byte) (int, error) {\n\tif len(p) == 0 {\n\t\treturn 0, nil\n\t}\n\n\tif r.rem < 0 {\n\t\t// Set remaining length\n\t\trem, err := r.rs.Seek(0, io.SeekEnd)\n\t\tif err != nil {\n\t\t\treturn 0, err\n\t\t}\n\t\tr.rem = rem\n\t}\n\n\t// offset r.rem\n\t// | |\n\t// |<-- len(p) -->|\n\t// | |\n\t// | |\n\t// | |\n\t// v v\n\t// ############################## r.rs\n\t// [ ] p\n\t// [ ] q\n\n\tq := p[0:]\n\toffset := r.rem - int64(len(p))\n\n\tif offset < 0 {\n\t\tq = p[-offset:]\n\t\toffset = 0\n\t}\n\n\tif _, err := r.rs.Seek(offset, io.SeekStart); err != nil {\n\t\treturn 0, err\n\t}\n\n\tif _, err := io.ReadFull(r.rs, q); err != nil {\n\t\treturn 0, err\n\t}\n\n\t// Reverse the contents of p\n\tfor i := 0; i < len(p)/2; i++ {\n\t\tj := len(p) - 1 - i\n\t\tp[i], p[j] = p[j], p[i]\n\t}\n\n\tr.rem = offset\n\n\tif r.rem == 0 {\n\t\treturn len(q), io.EOF\n\t}\n\n\treturn len(q), nil\n}", "title": "" }, { "docid": "9a755f77bd4711875dd8642c5c48c7fe", "score": "0.63995326", "text": "func (z *ZSeek) Read(p []byte) (n int, err error) {\n\tif z.err != nil {\n\t\treturn 0, z.err\n\t}\n\n\tif z.read.Len() == 0 && len(p) != 0 {\n\t\terr = z.fill()\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\t}\n\tn, err = z.read.Read(p)\n\tz.pos.virt += int64(n)\n\treturn\n}", "title": "" }, { "docid": "f59fddbf666993c062844b14fdaa54e5", "score": "0.63985777", "text": "func (r *Reader) Read(p []byte) (n int, err error) {\n\treturn r.output.Read(p)\n}", "title": "" }, { "docid": "726d137a34538a14f6023364d0674d4a", "score": "0.6390913", "text": "func (pr *ProgressReader) Read(p []byte) (n int, err error) {\n\tn, err = pr.file.Read(p)\n\tatomic.AddInt64(&pr.read, int64(n))\n\treturn n, err\n}", "title": "" }, { "docid": "26af2c9a3bbd8a86e412bcef66a63a8f", "score": "0.63717806", "text": "func (r *Reader) Read(p []byte) (int, error) {\n\tif r.err != nil {\n\t\treturn 0, r.err\n\t}\n\n\tif err := r.fill(); err != nil {\n\t\treturn 0, err\n\t}\n\n\tn := copy(p, r.decoded[r.i:r.j])\n\tr.i += n\n\treturn n, nil\n}", "title": "" }, { "docid": "9fc8ba4efbe56da3b89a4021541b650d", "score": "0.636774", "text": "func (r *reader) Read(p []byte) (n int, err error) {\n\tif r.Buffer.Len() > 0 {\n\t\tn, _ = r.Buffer.Read(p)\n\t} else {\n\t\tn, err = r.Reader.Read(p)\n\t}\n\tr.updatePos(p[0:n])\n\treturn\n}", "title": "" }, { "docid": "cdc6e3d68cfea9034aac6a595c0f0192", "score": "0.63634646", "text": "func (r *reader) Read(p []byte) (n int, err error) {\n\tif r.pr == nil {\n\t\treturn 0, errors.ErrStorageReaderNotOpened\n\t}\n\n\treturn r.pr.Read(p)\n}", "title": "" }, { "docid": "d2de2b9e79ca0427cbb2934cde60c0ac", "score": "0.6359096", "text": "func (i *rwImage) Read(p []byte) (n int, err error) {\n\ti.mux.RLock()\n\tdefer i.mux.RUnlock()\n\n\tif !i.gen.Valid() {\n\t\treturn 0, io.EOF\n\t}\n\n\tif len(p) == 0 {\n\t\treturn 0, nil\n\t}\n\n\tfor {\n\t\tif !i.gen.Valid() {\n\t\t\treturn n, io.EOF\n\t\t}\n\t\tif n >= len(p) {\n\t\t\treturn\n\t\t}\n\n\t\tpoint := i.gen.Current()\n\t\tbuff, nBytesRead := i.prw.Read(i.byteCursor, i.img.At(point.X, point.Y), point)\n\n\t\tif len(p)-n >= nBytesRead {\n\t\t\tcopy(p[n:], buff[:nBytesRead])\n\t\t\tn += nBytesRead\n\t\t\ti.gen.Next()\n\t\t\ti.byteCursor = 0\n\t\t} else {\n\t\t\tend := nBytesRead - len(p) + n\n\t\t\tcopy(p[n:], buff[:end])\n\t\t\tn += end\n\t\t\ti.byteCursor = end + 1\n\t\t\treturn\n\t\t}\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "eccfa4db8948f2759dcf18b0e7e020a2", "score": "0.6349171", "text": "func (r *cachingReadCloser) Read(p []byte) (n int, err error) {\n\tn, err = r.R.Read(p)\n\tr.buf.Write(p[:n])\n\tif err == io.EOF || n < len(p) {\n\t\tr.OnEOF(bytes.NewReader(r.buf.Bytes()))\n\t}\n\treturn n, err\n}", "title": "" }, { "docid": "8c3c49e34aea78f8fcd54d5d9337cd4e", "score": "0.6345788", "text": "func (r *Reader) Read(p []byte) (n int, err error) {\n\tif r.I >= int64(len(r.S)) {\n\t\treturn 0, io.EOF\n\t}\n\tn = copy(p, r.S[r.I:])\n\tr.I += int64(n)\n\treturn n, nil\n}", "title": "" }, { "docid": "b3fa1a3492ec08c6b5f1f284d8ae3fcd", "score": "0.6336484", "text": "func (r *readSeeker) Read(p []byte) (int, error.Error) {\n\tr.Lock()\n\tdefer r.Unlock()\n\n\t// Let the cloner know how much we intend to read.\n\tr.buf = p\n\n\t// Noify the cloner.\n\tr.readCh <- struct{}{}\n\n\t// Wait for data to become ready.\n\t<-r.readyCh\n\tp = r.buf\n\n\t// Return number of bytes and error if any.\n\treturn r.n, r.e\n}", "title": "" }, { "docid": "fe8a812437a69c32ea752cad0a247a6c", "score": "0.6333261", "text": "func (i *Input) Read(p []byte) (n int, err error) {\n\ti.Mutex.Lock()\n\tdefer i.Mutex.Unlock()\n\tif i.src == nil {\n\t\treturn 0, io.EOF\n\t}\n\treturn i.src.Read(p)\n}", "title": "" }, { "docid": "5db848a11c6f985a60866d8c5642b6e7", "score": "0.63291013", "text": "func (r Reader) Read(p []byte) (n int, err error) {\n\tbuff := make([]byte, maxBuffer)\n\tn, err = r.rd.Read(buff)\n\tif err != nil {\n\t\treturn n, err\n\t}\n\tem := buff[:n]\n\tdm, err := r.bx.Decrypt(em)\n\tif err != nil {\n\t\treturn n, err\n\t}\n\tn = copy(p, dm[:])\n\treturn n, nil\n}", "title": "" }, { "docid": "6434221e819076821d03fc646bd8fc54", "score": "0.6328964", "text": "func (s *ByteReader) Read(p []byte) (n int, err error) {\n\t// If len p == 0, error\n\tif len(p) == 0 {\n\t\terr = errors.New(\"Must initialize byte slice with len > 0\")\n\t}\n\t// while len(p) > 0,\n\t// if n < lim and unparsed len byte slice > 0\n\t// or if s.limit is -1 and len unparsed > 0\n\t// parse one byte from s.str,\n\t// increment n and offset\n\t// else return\n\tfor len(p) > 0 {\n\t\tif n < s.limit && s.Len() > 0 || s.limit == -1 && s.Len() > 0 {\n\t\t\tp = append(p, s.str[s.offset])\n\t\t\tn += 1\n\t\t\ts.offset += 1\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "ef9b25ab8b4a06a5b7160985125f7560", "score": "0.63266915", "text": "func (r *Reader) Read(p []byte) (int, error) {\n\treturn r.r.Read(p)\n}", "title": "" }, { "docid": "71075fc5a26a652779a6aa98346a21bd", "score": "0.6325231", "text": "func (this *RingBuffer) read(p []byte) (n int, err error) {\n\tif len(p) == 0 {\n\t\treturn 0, nil\n\t}\n\n\tif this.isEmpty {\n\t\treturn 0, ErrIsEmpty\n\t}\n\tn = len(p)\n\n\tif this.wIdx > this.rIdx {\n\t\t/*\n\t\t \t _ _ _ _ _\n\t\t \t|x|&|@|_|_|\n\t\t 0 1 2 3 4\n\t\t \trIdx==0; wIdx==3\n\t\t*/\n\t\tif n > this.wIdx-this.rIdx {\n\t\t\tn = this.wIdx - this.rIdx\n\t\t}\n\t\tcopy(p, this.buf[this.rIdx:this.rIdx+n])\n\t\t// move readPtr\n\t\tthis.rIdx = (this.rIdx + n) % this.cap\n\t\tif this.rIdx == this.wIdx {\n\t\t\tthis.isEmpty = true\n\t\t}\n\t\treturn\n\t}\n\t//如果需要读取的数据大于缓存中有的数据,调整n大小等于缓存中的数据长度\n\tif n > this.cap-this.rIdx+this.wIdx {\n\t\tn = this.cap - this.rIdx + this.wIdx\n\t}\n\tif this.rIdx+n <= this.cap {\n\t\t/*\n\t\t \t _ _ _ _ _\n\t\t \t|x|&|@|*|_|\n\t\t 0 1 2 3 4\n\t\t \trIdx==0; wIdx==4; if n==1 -->\n\t\t*/\n\t\tcopy(p, this.buf[this.rIdx:this.rIdx+n])\n\t} else {\n\t\t// copy head\n\t\tcopy(p, this.buf[this.rIdx:this.cap])\n\t\t// copy tail\n\t\tcopy(p[this.cap-this.rIdx:], this.buf[0:n-this.cap+this.rIdx])\n\t}\n\n\t//move read index pointer\n\tthis.rIdx = (this.rIdx + n) % this.cap\n\tif this.rIdx == this.wIdx {\n\t\tthis.isEmpty = true\n\t}\n\treturn\n}", "title": "" }, { "docid": "1ebcdbef2535d61f5ef146d25cc655b9", "score": "0.6318802", "text": "func (f *File) Read(p []byte) (n int, err error) {\n\treturn f.internal.Read(p)\n}", "title": "" }, { "docid": "f67d6d6939fd28c1af63eb5bc5c3fb33", "score": "0.6317534", "text": "func (f *FileSystem) Read(p []byte) (int, error) { return f.OpenCall.Returns.Data.Read(p) }", "title": "" }, { "docid": "ece0f2ecb0cd13fa36c3e74f308af4dd", "score": "0.6306252", "text": "func (l *LimitedReadCloser) Read(p []byte) (n int, err error) {\n\treturn l.lr.Read(p)\n}", "title": "" }, { "docid": "c67734f6daf70243131f35ca2953cbd4", "score": "0.630307", "text": "func (this *Reader) Read(p []byte) (n int, err error) {\n\t// checks for when we have no data\n\tfor this.writePos == 0 || this.readPos == this.writePos {\n\t\t// if we have an error / EOF, just return it\n\t\tif this.err != nil {\n\t\t\treturn n, this.err\n\t\t}\n\n\t\t// else, fill our buffer\n\t\tthis.fillBuffer()\n\t}\n\n\t// TODO: checks for when we have less data than len(p)\n\n\t// we should have an appropriate amount of data, convert it into the given buffer\n\tbytesRead, bytesWritten, err := this.converter.Convert(this.buffer[this.readPos:this.writePos], p)\n\n\t// adjust byte counters\n\tthis.readPos += bytesRead\n\tn += bytesWritten\n\n\t// if we experienced an iconv error, check it\n\tif err != nil {\n\t\t// E2BIG errors can be ignored (we'll get them often) as long\n\t\t// as at least 1 byte was written. If we experienced an E2BIG\n\t\t// and no bytes were written then the buffer is too small for\n\t\t// even the next character\n\t\tif err != syscall.E2BIG || bytesWritten == 0 {\n\t\t\t// track anything else\n\t\t\tthis.err = err\n\t\t}\n\t}\n\n\t// return our results\n\treturn n, this.err\n}", "title": "" }, { "docid": "a241872301adad9a3a0d065a4d8813ff", "score": "0.6301843", "text": "func Read(b []byte) (n int, err error) {\n\treturn io.ReadFull(Reader, b)\n}", "title": "" }, { "docid": "ebb5616c59847ef95b97b163fee4542d", "score": "0.6298034", "text": "func (r *cachingReadCloser) Read(p []byte) (n int, err error) {\n\tn, err = r.R.Read(p)\n\tr.buf.Write(p[:n])\n\tif err == io.EOF {\n\t\tr.OnEOF(bytes.NewReader(r.buf.Bytes()))\n\t}\n\treturn n, err\n}", "title": "" }, { "docid": "1a10499948c3aaf1c78dccfb8cabea22", "score": "0.62974876", "text": "func (s *S3File) Read(p []byte) (n int, err error) {\n\tif s.fileSize > 0 && s.offset >= s.fileSize {\n\t\treturn 0, io.EOF\n\t}\n\n\tdefer func() {\n\t\tif err != nil {\n\t\t\ts.closeSocket()\n\t\t}\n\t}()\n\n\tif s.socket == nil {\n\t\terr = s.openSocket(int64(len(p)))\n\t\tif err != nil {\n\t\t\treturn 0, err\n\t\t}\n\t}\n\tn, err = s.socket.Read(p)\n\t// Because the chunk size is not infinite, we might hit the end of the socket while\n\t// there's still data in the file. In this case, we close the socket so that the next\n\t// read call will request a new one, and we return a nil error so that the caller\n\t// will not think the file is done.\n\tif err == io.EOF {\n\t\terr = nil\n\t\ts.closeSocket()\n\t}\n\ts.offset += int64(n)\n\n\treturn n, err\n}", "title": "" }, { "docid": "25ac2c1e044ee48674230f8fe55df7ee", "score": "0.6287889", "text": "func libc_read(fd int32, buf *byte, count uint) int", "title": "" }, { "docid": "16aa5a058d082862b5ad73667b0cfa9e", "score": "0.62840134", "text": "func (r *FakeSeeker) Read(p []byte) (n int, err error) {\n\tif r.readErr != nil {\n\t\treturn 0, r.readErr\n\t}\n\tif !r.read && r.offset != 0 {\n\t\treturn 0, errors.New(\"FakeSeeker: not at start: can't read\")\n\t}\n\tn, err = r.in.Read(p)\n\tif n != 0 {\n\t\tr.read = true\n\t}\n\tif err != nil {\n\t\tr.readErr = err\n\t}\n\treturn n, err\n}", "title": "" }, { "docid": "fcf8b2fe4637ec88d7c0e465289c8858", "score": "0.6283598", "text": "func (fd *FD) Pread(b []byte, off int64) (int, error) {\n\t// Call incref, not readLock, because since pread specifies the\n\t// offset it is independent from other reads.\n\tif err := fd.incref(); err != nil {\n\t\treturn 0, err\n\t}\n\tdefer fd.decref()\n\n\tif len(b) > maxRW {\n\t\tb = b[:maxRW]\n\t}\n\n\tfd.l.Lock()\n\tdefer fd.l.Unlock()\n\tcuroffset, e := syscall.Seek(fd.Sysfd, 0, io.SeekCurrent)\n\tif e != nil {\n\t\treturn 0, e\n\t}\n\tdefer syscall.Seek(fd.Sysfd, curoffset, io.SeekStart)\n\to := syscall.Overlapped{\n\t\tOffsetHigh: uint32(off >> 32),\n\t\tOffset: uint32(off),\n\t}\n\tvar done uint32\n\te = syscall.ReadFile(fd.Sysfd, b, &done, &o)\n\tif e != nil {\n\t\tdone = 0\n\t\tif e == syscall.ERROR_HANDLE_EOF {\n\t\t\te = io.EOF\n\t\t}\n\t}\n\tif len(b) != 0 {\n\t\te = fd.eofError(int(done), e)\n\t}\n\treturn int(done), e\n}", "title": "" }, { "docid": "fce0fbaa6e4ee7434cd891a0f73df9b8", "score": "0.6282094", "text": "func (v *Buffers) Read(p []byte) (n int, err error) {\n\tfor len(p) > 0 && len(*v) > 0 {\n\t\tn0 := copy(p, (*v)[0])\n\t\tv.consume(int64(n0))\n\t\tp = p[n0:]\n\t\tn += n0\n\t}\n\tif len(*v) == 0 {\n\t\terr = io.EOF\n\t}\n\treturn\n}", "title": "" }, { "docid": "c966431fc1b378414ef100128c3caddc", "score": "0.626325", "text": "func (r *ChunkReader) Read(p []byte) (int, error) {\n\tif len(r.chunks) == 0 {\n\t\treturn 0, io.EOF\n\t}\n\tlast := r.r.LastChunk()\n\tif vOffset(last.End) >= vOffset(r.chunks[0].End) {\n\t\treturn 0, io.EOF\n\t}\n\n\t// Ensure the byte slice does not extend beyond the end of\n\t// the current chunk. We do not need to consider reading\n\t// beyond the end of the block because the bgzf.Reader is in\n\t// blocked mode and so will stop there anyway.\n\twant := int(r.chunks[0].End.Block)\n\tif r.chunks[0].End.Block == 0 && r.chunks[0].End.File > last.End.File {\n\t\t// Special case for when the current end block offset\n\t\t// is zero.\n\t\twant = r.r.BlockLen()\n\t}\n\tvar cursor int\n\tif last.End.File == r.chunks[0].End.File {\n\t\t// Our end is in the same block as the last chunk end\n\t\t// so set the cursor to the chunk block end to prevent\n\t\t// reading past the end of the chunk.\n\t\tcursor = int(last.End.Block)\n\t}\n\tn, err := r.r.Read(p[:min(len(p), want-cursor)])\n\tif err != nil {\n\t\tif n != 0 && err == io.EOF {\n\t\t\terr = nil\n\t\t}\n\t\treturn n, err\n\t}\n\n\t// Check whether we are at or past the end of the current\n\t// chunk or we have not made progress for reasons other than\n\t// zero length p.\n\tthis := r.r.LastChunk()\n\tif (len(p) != 0 && this == last) || vOffset(this.End) >= vOffset(r.chunks[0].End) {\n\t\tr.chunks = r.chunks[1:]\n\t\tif len(r.chunks) == 0 {\n\t\t\treturn n, io.EOF\n\t\t}\n\t\terr = r.r.Seek(r.chunks[0].Begin)\n\t}\n\n\treturn n, err\n}", "title": "" }, { "docid": "cd25c5ae40b9b720d5f4f5ef86feea02", "score": "0.6254186", "text": "func Read(p []byte) (n int, err error) { return globalRand.Read(p) }", "title": "" }, { "docid": "f60abb3809b51c73193f511fc465da53", "score": "0.62459683", "text": "func (h *reOpen) Read(p []byte) (n int, err error) {\n\th.mu.Lock()\n\tdefer h.mu.Unlock()\n\tif h.err != nil {\n\t\t// return a previous error if there is one\n\t\treturn n, h.err\n\t}\n\tn, err = h.rc.Read(p)\n\tif err != nil {\n\t\th.err = err\n\t}\n\th.read += int64(n)\n\tif err != nil && err != io.EOF {\n\t\t// close underlying stream\n\t\th.opened = false\n\t\t_ = h.rc.Close()\n\t\t// reopen stream, clearing error if successful\n\t\tfs.Debugf(h.src, \"Reopening on read failure after %d bytes: retry %d/%d: %v\", h.read, h.tries, h.maxTries, err)\n\t\tif h.open() == nil {\n\t\t\terr = nil\n\t\t}\n\t}\n\treturn n, err\n}", "title": "" }, { "docid": "a09d8754af3a99a03b85c542cc9fcc68", "score": "0.6243852", "text": "func (c *httpClient) Read(p []byte) (n int, err error) {\n\tvar resp *http.Response\n\n\tif !c.canRead {\n\t\tresp = <-c.resp\n\t} else {\n\t\tresp = c.remainResp\n\t}\n\n\tn, err = resp.Body.Read(p)\n\tif err != nil {\n\t\tdefer resp.Body.Close()\n\t\tc.canRead = false\n\t} else {\n\t\tc.remainResp = resp\n\t\tc.canRead = true\n\t}\n\n\treturn n, err\n}", "title": "" }, { "docid": "a9bb1580c1af792945e4b5d176c37fba", "score": "0.62396526", "text": "func ReadNWithProgress(r io.Reader, n int64, bytesRead *int64) ([]byte, error) {\n\tvar totalRead int64\n\tbytes := make([]byte, n)\n\n\tvar err error\n\tfor totalRead < n && err == nil {\n\t\tvar read int\n\t\tread, err = r.Read(bytes[totalRead:])\n\n\t\tif err != nil && err != io.EOF {\n\t\t\tbreak\n\t\t}\n\n\t\ttotalRead += int64(read)\n\n\t\tif bytesRead != nil {\n\t\t\tatomic.StoreInt64(bytesRead, totalRead)\n\t\t}\n\n\t\tif err == io.EOF {\n\t\t\terr = nil\n\t\t\tif totalRead != n {\n\t\t\t\terr = io.ErrUnexpectedEOF\n\t\t\t}\n\t\t}\n\t}\n\n\treturn bytes[:totalRead], err\n}", "title": "" }, { "docid": "4c496d424142e807150c378cad64348d", "score": "0.6231764", "text": "func (r *RoundRobin) Read(p []byte) (n int, err error) {\n\tif r.buf.Len() == 0 {\n\t\tif len(r.rs) == 0 {\n\t\t\t// Neither buffer nor readers to read from.\n\t\t\tlog.Println(\"Read: successfully read from all readers\")\n\t\t\treturn 0, io.EOF\n\t\t}\n\t\t// There are still active readers.\n\t\tvar i int\n\t\tfor {\n\t\t\tif i == r.maxRetry {\n\t\t\t\treturn 0, fmt.Errorf(\"max retries (%d) exceeded\", r.maxRetry)\n\t\t\t}\n\t\t\ti++\n\t\t\tif err := r.fill(); err != nil {\n\t\t\t\tif err != ErrTimeout {\n\t\t\t\t\treturn 0, err\n\t\t\t\t}\n\t\t\t\t// Timeout: Switch to next reader.\n\t\t\t\tlog.Printf(\"switching to next reader ...\")\n\t\t\t\tr.cur = (r.cur + 1) % len(r.rs)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tbreak\n\t\t}\n\t}\n\tb, err := ioutil.ReadAll(io.LimitReader(&r.buf, int64(len(p))))\n\tif err != nil {\n\t\treturn len(b), err\n\t}\n\tcopy(p, b)\n\treturn len(b), nil\n}", "title": "" }, { "docid": "97e06cba0ede6dc0b8f54a64cf136c08", "score": "0.6227773", "text": "func (r MockedReader) Read(p []byte) (n int, err error) {\n\tif r.infinite {\n\t\treturn\n\t}\n\tn, err = r.buf.Read(p)\n\treturn\n}", "title": "" }, { "docid": "0541a9116b6659af2098c94ff2dabd80", "score": "0.6226615", "text": "func (r *Reader) Read(p []byte) (int, error) {\n\tvar n int\n\tfor {\n\t\tbuffer := make([]byte, config.DefaultChunkSize)\n\t\tbytesRead, err := r.reader.Read(buffer)\n\t\tif err == io.EOF {\n\t\t\t// done...\n\t\t\tr.buf.Reset()\n\t\t\treturn n, io.EOF\n\t\t} else if err != nil {\n\t\t\terr = stacktrace.Propagate(err, \"encryptor could not finish reading due to failure of underlying io.reader\")\n\t\t\tfmt.Printf(\"err + %v\\n\", err)\n\t\t\treturn n, err\n\t\t}\n\t\tr.encrypt(buffer[:bytesRead])\n\t\tr.stateLock.Lock()\n\t\tnn, err := r.buf.Read(p)\n\t\tif err != nil {\n\t\t\terr = stacktrace.Propagate(err, \"encryptor could not finish reading due to failure of underlying io.reader\")\n\t\t\tfmt.Printf(\"err + %v\\n\", err)\n\t\t\treturn n, err\n\t\t}\n\t\tn += nn\n\t\tr.stateLock.Unlock()\n\t}\n}", "title": "" } ]
4c0c2ded5bfeb1d204591f97c6d6bb6f
RecvMsg mocks base method.
[ { "docid": "056530f4d5eeac723da8c5b93ed7ff79", "score": "0.7635093", "text": "func (m_2 *MockWerftService_StartLocalJobServer) RecvMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"RecvMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" } ]
[ { "docid": "4c19876e1c0a145698b46df6e9f1ef12", "score": "0.7866866", "text": "func (m_2 *MockWerftService_ListenServer) RecvMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"RecvMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "7dd3da7de5d08263225c544c530ec809", "score": "0.77826136", "text": "func (m_2 *MockWerftService_ListenClient) RecvMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"RecvMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "eb6f94c7b0a22122477080f516274b7c", "score": "0.7753781", "text": "func (m *MockAergoRPCService_ListBlockStreamServer) RecvMsg(arg0 interface{}) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"RecvMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "c28baa538e74d663d1e59563a0e65b7a", "score": "0.77359897", "text": "func (m *MockNodeAttestor_FetchAttestationDataClient) RecvMsg(arg0 interface{}) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"RecvMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "e18fc32cd047bb2e1351feebc2f7a9e9", "score": "0.7721001", "text": "func (m_2 *MockAgentSecure_WorkloadmetaStreamEntitiesServer) RecvMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"RecvMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "a06f8b9175e017477050e69909a3d8c3", "score": "0.77000624", "text": "func (m_2 *MockPdfService_RasterizePdfServer) RecvMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"RecvMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "7c30d989d46fc47b0d482c47f1993e29", "score": "0.76731735", "text": "func (m_2 *MockPdfService_InternalRasterizePdfServer) RecvMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"RecvMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "8b632193e30d7f38817769814bb3171f", "score": "0.7656711", "text": "func (m *MockBasic_PrimeServer) RecvMsg(arg0 interface{}) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"RecvMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "4d943d52abef059b060e0181965b4a89", "score": "0.7653558", "text": "func (m_2 *MockAgentSecure_WorkloadmetaStreamEntitiesClient) RecvMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"RecvMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "0f93407f4551e757780a200389c01c7e", "score": "0.764935", "text": "func (m *MockMachine_ExecuteServer) RecvMsg(arg0 interface{}) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"RecvMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "c23318fed4ac81d1a725af3662530ce6", "score": "0.76167554", "text": "func (m_2 *MockPdfService_RasterizePdfClient) RecvMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"RecvMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "bea324617621bcdb7c2744292473610c", "score": "0.76013565", "text": "func (m *MockProvisioner_ProvisionResourceServer) RecvMsg(arg0 interface{}) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"RecvMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "b51a29d3bba5ba8ec90d63188ba642f5", "score": "0.7599674", "text": "func (m_2 *MockConfigAdminService_ListSnapshotsServer) RecvMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"RecvMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "666f1999f27817a83edebcf0f351ca5e", "score": "0.7592482", "text": "func (m_2 *MockPdfService_InternalRasterizePdfClient) RecvMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"RecvMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "3069fcf6996d927c2703ac2d5fe06017", "score": "0.756075", "text": "func (m *MockArgusd_GetWatchStateClient) RecvMsg(arg0 interface{}) error {\n\tret := m.ctrl.Call(m, \"RecvMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "46284579a61afb05927fb0c535598b22", "score": "0.75583553", "text": "func (m_2 *MockWerftService_StartLocalJobClient) RecvMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"RecvMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "7c3a455872e2ec0ace252fc31ccd8ae2", "score": "0.75487274", "text": "func (m_2 *MockTopo_WatchServer) RecvMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"RecvMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "3e055054af182cff13794161aa2a496c", "score": "0.7544061", "text": "func (m *MockBasic_PrimeClient) RecvMsg(arg0 interface{}) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"RecvMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "e03cb3f65c9b9232cb8d8edc49d227e0", "score": "0.7543058", "text": "func (m *MockMachine_ExecuteClient) RecvMsg(arg0 interface{}) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"RecvMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "10538ec364948ee91be7f55ffc75a8cc", "score": "0.7523002", "text": "func (m_2 *MockConfigAdminService_ListSnapshotsClient) RecvMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"RecvMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "1a873c2a2622c6e7db7922718bb845d2", "score": "0.75135", "text": "func (m *MockArgusd_RecordMetricsClient) RecvMsg(arg0 interface{}) error {\n\tret := m.ctrl.Call(m, \"RecvMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "71fbd923b69787036df8ea2860d9d0cf", "score": "0.75133103", "text": "func (m *MockMServiceControlPlane_DataClient) RecvMsg(arg0 interface{}) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"RecvMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "65bd6fe50d85fb5a76b874c995fa08a1", "score": "0.75082564", "text": "func (m *MockProvisioner_ProvisionResourceClient) RecvMsg(arg0 interface{}) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"RecvMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "07a04d1baa05590f0a2087ab4b29af05", "score": "0.75068533", "text": "func (m_2 *MockAgentSecure_TaggerStreamEntitiesServer) RecvMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"RecvMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "696b176459b7fe46eeb9e647c58a5a16", "score": "0.7491586", "text": "func (m_2 *MockConfigAdminService_ListRegisteredModelsServer) RecvMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"RecvMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "9d17be51e06adfa2d1734b1480110827", "score": "0.74821883", "text": "func (m *MockMessages_MessagesChatClient) RecvMsg(arg0 interface{}) error {\n\tret := m.ctrl.Call(m, \"RecvMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "8900af45d541ee05f9391ddb93777b0c", "score": "0.7476486", "text": "func (m_2 *MockTopo_WatchClient) RecvMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"RecvMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "6f965e293dc79b04a8b4cf3ae768201f", "score": "0.74482596", "text": "func (m *MockAggregatedDiscoveryService_StreamAggregatedResourcesClient) RecvMsg(arg0 interface{}) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"RecvMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "b69f255dd08f55b381c620a1effc7277", "score": "0.7428285", "text": "func (m_2 *MockConfigAdminService_ListRegisteredModelsClient) RecvMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"RecvMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "63f35704ad2c5fa35420501a21186e71", "score": "0.7409806", "text": "func (m_2 *MockAgentSecure_TaggerStreamEntitiesClient) RecvMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"RecvMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "817cf7462ae5b764b91c925b726b0e57", "score": "0.73949456", "text": "func (m_2 *MockConfigAdminService_UploadRegisterModelServer) RecvMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"RecvMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "13dfe91d04a227caa4e133b278614d82", "score": "0.7300592", "text": "func (m_2 *MockWerftService_SubscribeServer) RecvMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"RecvMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "ef5be0f74966c053f70a237bfec91392", "score": "0.72909105", "text": "func (m_2 *MockConfigAdminService_UploadRegisterModelClient) RecvMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"RecvMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "593406ef51932f4cec46a107eb94c4ac", "score": "0.72053736", "text": "func (m_2 *MockWerftService_SubscribeClient) RecvMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"RecvMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "858e94cc027678ba971c00f67a29057d", "score": "0.71873593", "text": "func (m_2 *MockMessageBus_SubscribeServer) RecvMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"RecvMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "6b4cdea1ec4d9828c06bd4a460c3daf2", "score": "0.7164501", "text": "func (m_2 *MockMessageBus_SubscribeClient) RecvMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"RecvMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "259a92d9b569abebd0f0d09135780b49", "score": "0.7121973", "text": "func (m *MockMessages_MessagesChatClient) Recv() (*messages.ServerMessage, error) {\n\tret := m.ctrl.Call(m, \"Recv\")\n\tret0, _ := ret[0].(*messages.ServerMessage)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "4a84404c6fb5e09c479f1ad406bcb9a3", "score": "0.6892172", "text": "func (m *MockEarlyConnection) ReceiveMessage() ([]byte, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"ReceiveMessage\")\n\tret0, _ := ret[0].([]byte)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "42b39833df1aa9a095a1512b736eb988", "score": "0.6825438", "text": "func (tc *TestClient) SendRecvTestMessage(t *testing.T,\n\tinMsg interface{},\n\texpectFailure bool,\n\texpectDiffResponse bool) []byte {\n\tmsg := tc.prepareMessage(inMsg)\n\twErr := tc.Send(msg)\n\tif wErr != nil && !expectFailure {\n\t\tt.Errorf(\"Unexpected error while sending message %v, error %v\", msg, wErr)\n\t\treturn nil\n\t}\n\trMsg, err := tc.ReadMessage()\n\tif err != nil {\n\t\tif !expectFailure {\n\t\t\tt.Errorf(\"Unexpected error while reading message %v\", err)\n\t\t}\n\t\treturn nil\n\t}\n\tif !bytes.Equal(rMsg.Data, msg.Data) {\n\t\tif !expectDiffResponse {\n\t\t\tt.Errorf(\"received message different than what was sent. \"+\n\t\t\t\t\"Expected %v, Found %v\", msg, rMsg)\n\t\t}\n\t}\n\tif rMsg.MessageType != msg.MessageType {\n\t\tt.Errorf(\"Message type failed, Expected %v, Found %v\", msg.MessageType, rMsg.MessageType)\n\t}\n\treturn rMsg.Data\n}", "title": "" }, { "docid": "09ab5cbeec79eb042a261f17656649e4", "score": "0.68182135", "text": "func (_m *MockDataRegistryService_CreateOrUpdateMetricsServer) RecvMsg(m interface{}) error {\n\tret := _m.Called(m)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(interface{}) error); ok {\n\t\tr0 = rf(m)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "5e58c078538d6ca147c90d787a50dd61", "score": "0.6787996", "text": "func (_m *MockDataReceiverService_PutMetricServer) RecvMsg(m interface{}) error {\n\tret := _m.Called(m)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(interface{}) error); ok {\n\t\tr0 = rf(m)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "a73cb1a4234136ce31cf723a99375e0a", "score": "0.67765766", "text": "func (m_2 *MockWerftService_ListenClient) SendMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"SendMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "26f0010908451c186367d01f5dd6d6f4", "score": "0.67656314", "text": "func (m_2 *MockWerftService_ListenServer) SendMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"SendMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "65bf7a50190b3d504b722cc442e1a376", "score": "0.67525744", "text": "func (m *MockServer) ReceiveMessage() <-chan handler.Message {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"ReceiveMessage\")\n\tret0, _ := ret[0].(<-chan handler.Message)\n\treturn ret0\n}", "title": "" }, { "docid": "344d6c96a8eef04610ff0de9f438bf75", "score": "0.6740681", "text": "func (_m *MockDataReceiverService_PutMetricClient) RecvMsg(m interface{}) error {\n\tret := _m.Called(m)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(interface{}) error); ok {\n\t\tr0 = rf(m)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "8a87f9665b94ae6eae1a6faf5f6f4867", "score": "0.6615723", "text": "func (m *MockWerftService_ListenClient) Recv() (*v1.ListenResponse, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Recv\")\n\tret0, _ := ret[0].(*v1.ListenResponse)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "d54b5512a23f35833885e57fa91e1c99", "score": "0.6613086", "text": "func (m *MockConnI) ReadMessage() (int, []byte, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"ReadMessage\")\n\tret0, _ := ret[0].(int)\n\tret1, _ := ret[1].([]byte)\n\tret2, _ := ret[2].(error)\n\treturn ret0, ret1, ret2\n}", "title": "" }, { "docid": "91afaa747d590b375ef7d3295025e870", "score": "0.6589438", "text": "func (m *MockSQSAPI) ReceiveMessage(arg0 *sqs.ReceiveMessageInput) (*sqs.ReceiveMessageOutput, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"ReceiveMessage\", arg0)\n\tret0, _ := ret[0].(*sqs.ReceiveMessageOutput)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "29b95ea00dc2fec4899363d4384d13a4", "score": "0.655425", "text": "func (m *MockArgusd_GetWatchStateClient) SendMsg(arg0 interface{}) error {\n\tret := m.ctrl.Call(m, \"SendMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "439724e0f66d51c0e39981d911ac2c58", "score": "0.6524538", "text": "func (m *MockSQSAPI) ReceiveMessageRequest(arg0 *sqs.ReceiveMessageInput) (*request.Request, *sqs.ReceiveMessageOutput) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"ReceiveMessageRequest\", arg0)\n\tret0, _ := ret[0].(*request.Request)\n\tret1, _ := ret[1].(*sqs.ReceiveMessageOutput)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "68aaee30ef4d5335de4e50a85a120087", "score": "0.6515119", "text": "func (m_2 *MockPdfService_RasterizePdfServer) SendMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"SendMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "5a07638a94aaf0f902db6843ea19efd9", "score": "0.65076715", "text": "func (m_2 *MockPdfService_InternalRasterizePdfServer) SendMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"SendMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "98f0d1059a9d3ddc669c59f65eb08f41", "score": "0.64984816", "text": "func (m *MockMServiceControlPlane_DataClient) Recv() (*mservice.DataChunk, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Recv\")\n\tret0, _ := ret[0].(*mservice.DataChunk)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "4bd635597727c5111e129b08491d83e1", "score": "0.6481825", "text": "func (m_2 *MockPdfService_RasterizePdfClient) SendMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"SendMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "d154e3e9b70536efbffdc7f6a1b3567c", "score": "0.64598477", "text": "func (m_2 *MockPdfService_InternalRasterizePdfClient) SendMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"SendMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "6d517558c0fa39da12751be29c59050a", "score": "0.6449252", "text": "func (m *MockNodeAttestor_FetchAttestationDataClient) SendMsg(arg0 interface{}) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "b570df236e82ea5861d47671f05261a5", "score": "0.6423531", "text": "func (m_2 *MockConfigAdminService_ListSnapshotsClient) SendMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"SendMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "2a42a645d90c82332c8fcb66edcfdeb1", "score": "0.64123535", "text": "func (m *MockAgentSecure_WorkloadmetaStreamEntitiesClient) Recv() (*core.WorkloadmetaStreamResponse, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Recv\")\n\tret0, _ := ret[0].(*core.WorkloadmetaStreamResponse)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "093c09d06b9c3a2a64c5cf95b9eaced4", "score": "0.64070415", "text": "func (m *MockArgusd_RecordMetricsClient) Recv() (*golang.ArgusdMetricsHandle, error) {\n\tret := m.ctrl.Call(m, \"Recv\")\n\tret0, _ := ret[0].(*golang.ArgusdMetricsHandle)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "d11e4a6fc206ef0ebc4b6bdca39ddaab", "score": "0.6400848", "text": "func (m *MockBasic_PrimeClient) Recv() (*pb.Resp, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Recv\")\n\tret0, _ := ret[0].(*pb.Resp)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "f2d6d69258e8115c461a76d4c441dc78", "score": "0.6394056", "text": "func (m_2 *MockConfigAdminService_ListSnapshotsServer) SendMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"SendMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "fcaf0e806981e76e93b46096ab59af37", "score": "0.63561547", "text": "func (m *MockMachine_ExecuteClient) Recv() (*machine.Result, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Recv\")\n\tret0, _ := ret[0].(*machine.Result)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "528dd90bd1fac02f0b694ba91398fdb3", "score": "0.6344791", "text": "func (m *MockArgusd_RecordMetricsClient) SendMsg(arg0 interface{}) error {\n\tret := m.ctrl.Call(m, \"SendMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "521bcdcd2376664e51b173498feacb30", "score": "0.6340044", "text": "func (m_2 *MockWerftService_StartLocalJobClient) SendMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"SendMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "1e4af4881efe635f781e312b51cd5467", "score": "0.6322511", "text": "func (m *MockMachine_ExecuteServer) Recv() (*machine.Instruction, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Recv\")\n\tret0, _ := ret[0].(*machine.Instruction)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "774e69df8ff6db4d98f3ab9759c05789", "score": "0.6316248", "text": "func (m_2 *MockWerftService_StartLocalJobServer) SendMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"SendMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "bcf3f775568080d13da520b6d228bb9e", "score": "0.63114494", "text": "func (m_2 *MockWerftService_SubscribeServer) SendMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"SendMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "35d4fa52c37fd3359899b112d8b084f6", "score": "0.6308799", "text": "func (m_2 *MockTopo_WatchClient) SendMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"SendMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "ba9fbad1024cfe3e6a5392150a7b3985", "score": "0.6301745", "text": "func (m_2 *MockTopo_WatchServer) SendMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"SendMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "1e75c8b927907462a2b2c6118f7d0967", "score": "0.62843746", "text": "func (m_2 *MockConfigAdminService_ListRegisteredModelsClient) SendMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"SendMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "5746f0c0539991b65f568658512d6ff3", "score": "0.6268319", "text": "func (m_2 *MockWerftService_SubscribeClient) SendMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"SendMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "46ae310793aa8ce4f491030c19ed848e", "score": "0.6254973", "text": "func (m *MockConfigAdminService_UploadRegisterModelServer) Recv() (*Chunk, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Recv\")\n\tret0, _ := ret[0].(*Chunk)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "73d858c5bbe6cbd07c7a0ce495f40630", "score": "0.6254702", "text": "func (m_2 *MockConfigAdminService_ListRegisteredModelsServer) SendMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"SendMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "fd669567175ccf64f6c4c9cb108845ad", "score": "0.62528336", "text": "func (m *MockMServiceControlPlane_DataClient) SendMsg(arg0 interface{}) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "53a877e06db3331e907021e9aee2a045", "score": "0.6234984", "text": "func (m *MockNodeAttestor_FetchAttestationData_Stream) Recv() (*nodeattestor.FetchAttestationDataResponse, error) {\n\tret := m.ctrl.Call(m, \"Recv\")\n\tret0, _ := ret[0].(*nodeattestor.FetchAttestationDataResponse)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "90fa039f25b2508b709812794ab0352c", "score": "0.62331825", "text": "func (m *MockMessageBus_SubscribeClient) Recv() (*proto.SubscribeResponse, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Recv\")\n\tret0, _ := ret[0].(*proto.SubscribeResponse)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "d4f51806b799cfba37039c26d7caf115", "score": "0.6232417", "text": "func (m *MockProvisioner_ProvisionResourceClient) SendMsg(arg0 interface{}) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "cfd5c2e1df38f4e6e78fbdfed0174b16", "score": "0.62232697", "text": "func (m_2 *MockAgentSecure_WorkloadmetaStreamEntitiesClient) SendMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"SendMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "553db2c39914d3882898ee746534f588", "score": "0.62155396", "text": "func (m *MockProvisioner_ProvisionResourceServer) SendMsg(arg0 interface{}) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "f60a03dd1a197b39c5583228ef051f02", "score": "0.62070924", "text": "func (m *MockNodeAttestor_FetchAttestationDataClient) Recv() (*nodeattestor.FetchAttestationDataResponse, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Recv\")\n\tret0, _ := ret[0].(*nodeattestor.FetchAttestationDataResponse)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "4f28f4675ced2c8d3ea27237c0a35918", "score": "0.6201633", "text": "func (m *MockArgusd_GetWatchStateClient) Recv() (*golang.ArgusdHandle, error) {\n\tret := m.ctrl.Call(m, \"Recv\")\n\tret0, _ := ret[0].(*golang.ArgusdHandle)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "ed6a2474de13c18a593da76efad403ea", "score": "0.6197399", "text": "func (m_2 *MockAgentSecure_WorkloadmetaStreamEntitiesServer) SendMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"SendMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "8c9c92abe37cf791723ce46c661e811b", "score": "0.6195866", "text": "func (m *MockAergoRPCService_ListBlockStreamServer) SendMsg(arg0 interface{}) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "4f263c9f27a0b5e4408812f962f40a7a", "score": "0.6191154", "text": "func (m *MockWerftService_StartLocalJobServer) Recv() (*v1.StartLocalJobRequest, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Recv\")\n\tret0, _ := ret[0].(*v1.StartLocalJobRequest)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "5da919d589ab4b0750f53cbf88cdd7c4", "score": "0.6178339", "text": "func (m *MockMachine_ExecuteClient) SendMsg(arg0 interface{}) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "2aa3e7b7064a1bb41ff8963a4d032dcb", "score": "0.615389", "text": "func (m *MockBasic_PrimeClient) SendMsg(arg0 interface{}) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "9c2a1290b4e4139b987c7b5276d8e7c0", "score": "0.61505973", "text": "func (m_2 *MockMessageBus_SubscribeClient) SendMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"SendMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "d71e8aca0e10bc7a388a049f6778dfdf", "score": "0.6144173", "text": "func (m *MockBasic_PrimeServer) SendMsg(arg0 interface{}) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "da258d1c64f02684a003f74247900af6", "score": "0.6142827", "text": "func (m *MockFullNode) StateWaitMsg(arg0 context.Context, arg1 cid.Cid, arg2 uint64) (*types0.MsgLookup, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"StateWaitMsg\", arg0, arg1, arg2)\n\tret0, _ := ret[0].(*types0.MsgLookup)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "90aea1b200589682b0e3e7de2c7c1135", "score": "0.6141982", "text": "func (m *MockMachine_ExecuteServer) SendMsg(arg0 interface{}) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "c8e735a73d67b6bba1f53ccaf873b150", "score": "0.613811", "text": "func (m_2 *MockMessageBus_SubscribeServer) SendMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"SendMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "65cdb696ff1d057e739dd8ffe975ca31", "score": "0.61376387", "text": "func (m *MockAgentSecure_TaggerStreamEntitiesClient) Recv() (*core.StreamTagsResponse, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Recv\")\n\tret0, _ := ret[0].(*core.StreamTagsResponse)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "d94fe3cbd03a238333f3022171121efe", "score": "0.61136323", "text": "func (ws *WSClient) recv(t *testing.T, message string) {\n\tif err := ws.SetReadDeadline(time.Now().Add(time.Second * 10)); err != nil {\n\t\tt.Fatalf(\"SetReadDeadline: %v\", err)\n\t}\n\t_, p, err := ws.ReadMessage()\n\tif err != nil {\n\t\tt.Fatalf(\"ReadMessage: %v\", err)\n\t}\n\tif string(p) != message {\n\t\tt.Fatalf(\"message=%s, want %s\", p, message)\n\t}\n}", "title": "" }, { "docid": "dcef043aaa86ee10554eb33d766ca9f8", "score": "0.61020786", "text": "func (mc *MockConn) MockRead() wire.Message {\n\tif mc.closed {\n\t\treturn nil\n\t}\n\n\tvar header, body []byte\n\tselect {\n\tcase <-mc.done:\n\t\treturn nil\n\tcase header = <-mc.sendChan:\n\t}\n\n\tselect {\n\tcase <-mc.done:\n\t\treturn nil\n\tcase body = <-mc.sendChan:\n\t}\n\n\tb := make([]byte, len(header)+len(body))\n\n\ti := 0\n\tfor j := 0; j < len(header); j++ {\n\t\tb[i] = header[j]\n\t\ti++\n\t}\n\tfor j := 0; j < len(body); j++ {\n\t\tb[i] = body[j]\n\t\ti++\n\t}\n\n\tmsg, _, _ := wire.ReadMessage(bytes.NewReader(b), wire.MainNet)\n\treturn msg\n}", "title": "" }, { "docid": "5605560ad07a1be26cc5597a847ab26f", "score": "0.60981107", "text": "func (m *MockRemotePeer) SendMessage(msg p2pcommon.MsgOrder) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"SendMessage\", msg)\n}", "title": "" }, { "docid": "b4bca2aaafc9d952db2391811d2a7414", "score": "0.6084919", "text": "func (_m *MockDataRegistryService_CreateOrUpdateMetricsServer) SendMsg(m interface{}) error {\n\tret := _m.Called(m)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(interface{}) error); ok {\n\t\tr0 = rf(m)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "a0634c9290e690f528b6b6b8076af40c", "score": "0.6077525", "text": "func (m *MockAggregatedDiscoveryService_StreamAggregatedResourcesClient) SendMsg(arg0 interface{}) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "e679ee235afc16a7f98bd16142e08ea8", "score": "0.60488516", "text": "func (m *MockTopo_WatchClient) Recv() (*topo.WatchResponse, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Recv\")\n\tret0, _ := ret[0].(*topo.WatchResponse)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "9601245eded8b711e0aa41de9635a7aa", "score": "0.6046232", "text": "func (m *MockProvisioner_ProvisionResourceClient) Recv() (*tfplugin5.ProvisionResource_Response, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Recv\")\n\tret0, _ := ret[0].(*tfplugin5.ProvisionResource_Response)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "958bcef2c233a4b98ad503f833a44870", "score": "0.6038119", "text": "func (m_2 *MockConfigAdminService_UploadRegisterModelClient) SendMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"SendMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" } ]
e95bdb841db5a49eb726413e58c7e661
ConvertToARM converts from a Kubernetes CRD object to an ARM object
[ { "docid": "975cb706ec4fa747a622f1c55b065158", "score": "0.70054865", "text": "func (certificate *VaultCertificate) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif certificate == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &VaultCertificate_ARM{}\n\n\t// Set property \"CertificateStore\":\n\tif certificate.CertificateStore != nil {\n\t\tcertificateStore := *certificate.CertificateStore\n\t\tresult.CertificateStore = &certificateStore\n\t}\n\n\t// Set property \"CertificateUrl\":\n\tif certificate.CertificateUrl != nil {\n\t\tcertificateUrl := *certificate.CertificateUrl\n\t\tresult.CertificateUrl = &certificateUrl\n\t}\n\treturn result, nil\n}", "title": "" } ]
[ { "docid": "dc1c14449074656a5bd0ee39b94f4f35", "score": "0.75126815", "text": "func (resource *SqlContainerResource) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif resource == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &SqlContainerResource_ARM{}\n\n\t// Set property \"AnalyticalStorageTtl\":\n\tif resource.AnalyticalStorageTtl != nil {\n\t\tanalyticalStorageTtl := *resource.AnalyticalStorageTtl\n\t\tresult.AnalyticalStorageTtl = &analyticalStorageTtl\n\t}\n\n\t// Set property \"ConflictResolutionPolicy\":\n\tif resource.ConflictResolutionPolicy != nil {\n\t\tconflictResolutionPolicy_ARM, err := (*resource.ConflictResolutionPolicy).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tconflictResolutionPolicy := *conflictResolutionPolicy_ARM.(*ConflictResolutionPolicy_ARM)\n\t\tresult.ConflictResolutionPolicy = &conflictResolutionPolicy\n\t}\n\n\t// Set property \"DefaultTtl\":\n\tif resource.DefaultTtl != nil {\n\t\tdefaultTtl := *resource.DefaultTtl\n\t\tresult.DefaultTtl = &defaultTtl\n\t}\n\n\t// Set property \"Id\":\n\tif resource.Id != nil {\n\t\tid := *resource.Id\n\t\tresult.Id = &id\n\t}\n\n\t// Set property \"IndexingPolicy\":\n\tif resource.IndexingPolicy != nil {\n\t\tindexingPolicy_ARM, err := (*resource.IndexingPolicy).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tindexingPolicy := *indexingPolicy_ARM.(*IndexingPolicy_ARM)\n\t\tresult.IndexingPolicy = &indexingPolicy\n\t}\n\n\t// Set property \"PartitionKey\":\n\tif resource.PartitionKey != nil {\n\t\tpartitionKey_ARM, err := (*resource.PartitionKey).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tpartitionKey := *partitionKey_ARM.(*ContainerPartitionKey_ARM)\n\t\tresult.PartitionKey = &partitionKey\n\t}\n\n\t// Set property \"UniqueKeyPolicy\":\n\tif resource.UniqueKeyPolicy != nil {\n\t\tuniqueKeyPolicy_ARM, err := (*resource.UniqueKeyPolicy).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tuniqueKeyPolicy := *uniqueKeyPolicy_ARM.(*UniqueKeyPolicy_ARM)\n\t\tresult.UniqueKeyPolicy = &uniqueKeyPolicy\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "15173e3ae4f47b68c04b2a084ef932ec", "score": "0.72829914", "text": "func (config *ApiManagementConfig) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif config == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &ApiManagementConfig_ARM{}\n\n\t// Set property \"Id\":\n\tif config.Reference != nil {\n\t\treferenceARMID, err := resolved.ResolvedReferences.Lookup(*config.Reference)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treference := referenceARMID\n\t\tresult.Id = &reference\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "6b56a62090e8234b0e72a1b558da2f5e", "score": "0.714883", "text": "func (container *DatabaseAccounts_SqlDatabases_Container_Spec) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif container == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &DatabaseAccounts_SqlDatabases_Container_Spec_ARM{}\n\n\t// Set property \"Location\":\n\tif container.Location != nil {\n\t\tlocation := *container.Location\n\t\tresult.Location = &location\n\t}\n\n\t// Set property \"Name\":\n\tresult.Name = resolved.Name\n\n\t// Set property \"Properties\":\n\tif container.Options != nil || container.Resource != nil {\n\t\tresult.Properties = &SqlContainerCreateUpdateProperties_ARM{}\n\t}\n\tif container.Options != nil {\n\t\toptions_ARM, err := (*container.Options).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\toptions := *options_ARM.(*CreateUpdateOptions_ARM)\n\t\tresult.Properties.Options = &options\n\t}\n\tif container.Resource != nil {\n\t\tresource_ARM, err := (*container.Resource).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresource := *resource_ARM.(*SqlContainerResource_ARM)\n\t\tresult.Properties.Resource = &resource\n\t}\n\n\t// Set property \"Tags\":\n\tif container.Tags != nil {\n\t\tresult.Tags = make(map[string]string, len(container.Tags))\n\t\tfor key, value := range container.Tags {\n\t\t\tresult.Tags[key] = value\n\t\t}\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "21b50be43fdc3c2514d2ea0557869ec9", "score": "0.71211046", "text": "func (diagnostics *BootDiagnostics) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif diagnostics == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &BootDiagnostics_ARM{}\n\n\t// Set property \"Enabled\":\n\tif diagnostics.Enabled != nil {\n\t\tenabled := *diagnostics.Enabled\n\t\tresult.Enabled = &enabled\n\t}\n\n\t// Set property \"StorageUri\":\n\tif diagnostics.StorageUri != nil {\n\t\tstorageUri := *diagnostics.StorageUri\n\t\tresult.StorageUri = &storageUri\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "98c8eb4ed6614528a8b7b0bfd7407a15", "score": "0.7112114", "text": "func (mapping *InputSchemaMapping) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif mapping == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &InputSchemaMapping_ARM{}\n\n\t// Set property \"Json\":\n\tif mapping.Json != nil {\n\t\tjson_ARM, err := (*mapping.Json).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tjson := *json_ARM.(*JsonInputSchemaMapping_ARM)\n\t\tresult.Json = &json\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "769e45229b5b6335715cde21eb505b36", "score": "0.710277", "text": "func (reference *ImageDiskReference) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif reference == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &ImageDiskReference_ARM{}\n\n\t// Set property \"Id\":\n\tif reference.Reference != nil {\n\t\treferenceARMID, err := resolved.ResolvedReferences.Lookup(*reference.Reference)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treference1 := referenceARMID\n\t\tresult.Id = &reference1\n\t}\n\n\t// Set property \"Lun\":\n\tif reference.Lun != nil {\n\t\tlun := *reference.Lun\n\t\tresult.Lun = &lun\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "11a4163b69e7d85454397bb34b5d0a4b", "score": "0.7096085", "text": "func (vault *Vault_Spec) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif vault == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &Vault_Spec_ARM{}\n\n\t// Set property \"Location\":\n\tif vault.Location != nil {\n\t\tlocation := *vault.Location\n\t\tresult.Location = &location\n\t}\n\n\t// Set property \"Name\":\n\tresult.Name = resolved.Name\n\n\t// Set property \"Properties\":\n\tif vault.Properties != nil {\n\t\tproperties_ARM, err := (*vault.Properties).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tproperties := *properties_ARM.(*VaultProperties_ARM)\n\t\tresult.Properties = &properties\n\t}\n\n\t// Set property \"Tags\":\n\tif vault.Tags != nil {\n\t\tresult.Tags = make(map[string]string, len(vault.Tags))\n\t\tfor key, value := range vault.Tags {\n\t\t\tresult.Tags[key] = value\n\t\t}\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "8e4c38234974a8099c9f6faab39d78d3", "score": "0.7086702", "text": "func (partitionKey *ContainerPartitionKey) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif partitionKey == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &ContainerPartitionKey_ARM{}\n\n\t// Set property \"Kind\":\n\tif partitionKey.Kind != nil {\n\t\tkind := *partitionKey.Kind\n\t\tresult.Kind = &kind\n\t}\n\n\t// Set property \"Paths\":\n\tfor _, item := range partitionKey.Paths {\n\t\tresult.Paths = append(result.Paths, item)\n\t}\n\n\t// Set property \"Version\":\n\tif partitionKey.Version != nil {\n\t\tversion := *partitionKey.Version\n\t\tresult.Version = &version\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "bc06355955db336dcd0816f5597d81e3", "score": "0.708286", "text": "func toCRDObject(object *types.CustomResourceObject, crd *apiextensionsv1.CustomResourceDefinition) {\n\tobject.TypeMeta.Kind = api.ResourceKind(crd.Name)\n\tcrdSubresources := crd.Spec.Versions[0].Subresources\n\tobject.TypeMeta.Scalable = crdSubresources != nil && crdSubresources.Scale != nil\n}", "title": "" }, { "docid": "67e57ca0a5ddcb35ae294dea1f53f1e3", "score": "0.7037902", "text": "func (reference *KeyVaultKeyReference) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif reference == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &KeyVaultKeyReference_ARM{}\n\n\t// Set property \"KeyUrl\":\n\tif reference.KeyUrl != nil {\n\t\tkeyUrl := *reference.KeyUrl\n\t\tresult.KeyUrl = &keyUrl\n\t}\n\n\t// Set property \"SourceVault\":\n\tif reference.SourceVault != nil {\n\t\tsourceVault_ARM, err := (*reference.SourceVault).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tsourceVault := *sourceVault_ARM.(*SubResource_ARM)\n\t\tresult.SourceVault = &sourceVault\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "b4916ad2548019bc9ebd8a132a489c85", "score": "0.70187604", "text": "func (vault *SourceVault) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif vault == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &SourceVault_ARM{}\n\n\t// Set property \"Id\":\n\tif vault.Reference != nil {\n\t\treferenceARMID, err := resolved.ResolvedReferences.Lookup(*vault.Reference)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treference := referenceARMID\n\t\tresult.Id = &reference\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "f23635f716b943e2fbc0d3d880b63fb4", "score": "0.6998782", "text": "func (domain *Domain_Spec) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif domain == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &Domain_Spec_ARM{}\n\n\t// Set property \"Location\":\n\tif domain.Location != nil {\n\t\tlocation := *domain.Location\n\t\tresult.Location = &location\n\t}\n\n\t// Set property \"Name\":\n\tresult.Name = resolved.Name\n\n\t// Set property \"Properties\":\n\tif domain.InboundIpRules != nil ||\n\t\tdomain.InputSchema != nil ||\n\t\tdomain.InputSchemaMapping != nil ||\n\t\tdomain.PublicNetworkAccess != nil {\n\t\tresult.Properties = &DomainProperties_ARM{}\n\t}\n\tfor _, item := range domain.InboundIpRules {\n\t\titem_ARM, err := item.ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresult.Properties.InboundIpRules = append(result.Properties.InboundIpRules, *item_ARM.(*InboundIpRule_ARM))\n\t}\n\tif domain.InputSchema != nil {\n\t\tinputSchema := *domain.InputSchema\n\t\tresult.Properties.InputSchema = &inputSchema\n\t}\n\tif domain.InputSchemaMapping != nil {\n\t\tinputSchemaMapping_ARM, err := (*domain.InputSchemaMapping).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tinputSchemaMapping := *inputSchemaMapping_ARM.(*InputSchemaMapping_ARM)\n\t\tresult.Properties.InputSchemaMapping = &inputSchemaMapping\n\t}\n\tif domain.PublicNetworkAccess != nil {\n\t\tpublicNetworkAccess := *domain.PublicNetworkAccess\n\t\tresult.Properties.PublicNetworkAccess = &publicNetworkAccess\n\t}\n\n\t// Set property \"Tags\":\n\tif domain.Tags != nil {\n\t\tresult.Tags = make(map[string]string, len(domain.Tags))\n\t\tfor key, value := range domain.Tags {\n\t\t\tresult.Tags[key] = value\n\t\t}\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "6502aaf15bd076b4dac25e7ad7cb0ed6", "score": "0.69950247", "text": "func (forCmk *IdentityForCmk) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif forCmk == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &IdentityForCmk_ARM{}\n\n\t// Set property \"UserAssignedIdentity\":\n\tif forCmk.UserAssignedIdentity != nil {\n\t\tuserAssignedIdentity := *forCmk.UserAssignedIdentity\n\t\tresult.UserAssignedIdentity = &userAssignedIdentity\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "dc7dc403050a22a526c77515a9cfdef4", "score": "0.6979857", "text": "func (encryption *Encryption) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif encryption == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &Encryption_ARM{}\n\n\t// Set property \"DiskEncryptionSetId\":\n\tif encryption.DiskEncryptionSetReference != nil {\n\t\tdiskEncryptionSetReferenceARMID, err := resolved.ResolvedReferences.Lookup(*encryption.DiskEncryptionSetReference)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tdiskEncryptionSetReference := diskEncryptionSetReferenceARMID\n\t\tresult.DiskEncryptionSetId = &diskEncryptionSetReference\n\t}\n\n\t// Set property \"Type\":\n\tif encryption.Type != nil {\n\t\ttypeVar := *encryption.Type\n\t\tresult.Type = &typeVar\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "7e8da9b63f7509e8a43e6137a3020210", "score": "0.6949532", "text": "func (workspace *Workspace_Spec) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif workspace == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &Workspace_Spec_ARM{}\n\n\t// Set property \"Identity\":\n\tif workspace.Identity != nil {\n\t\tidentity_ARM, err := (*workspace.Identity).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tidentity := *identity_ARM.(*Identity_ARM)\n\t\tresult.Identity = &identity\n\t}\n\n\t// Set property \"Location\":\n\tif workspace.Location != nil {\n\t\tlocation := *workspace.Location\n\t\tresult.Location = &location\n\t}\n\n\t// Set property \"Name\":\n\tresult.Name = resolved.Name\n\n\t// Set property \"Properties\":\n\tif workspace.AllowPublicAccessWhenBehindVnet != nil ||\n\t\tworkspace.ApplicationInsightsReference != nil ||\n\t\tworkspace.ContainerRegistryReference != nil ||\n\t\tworkspace.Description != nil ||\n\t\tworkspace.DiscoveryUrl != nil ||\n\t\tworkspace.Encryption != nil ||\n\t\tworkspace.FriendlyName != nil ||\n\t\tworkspace.HbiWorkspace != nil ||\n\t\tworkspace.ImageBuildCompute != nil ||\n\t\tworkspace.KeyVaultReference != nil ||\n\t\tworkspace.PrimaryUserAssignedIdentityReference != nil ||\n\t\tworkspace.PublicNetworkAccess != nil ||\n\t\tworkspace.ServiceManagedResourcesSettings != nil ||\n\t\tworkspace.SharedPrivateLinkResources != nil ||\n\t\tworkspace.StorageAccountReference != nil {\n\t\tresult.Properties = &WorkspaceProperties_ARM{}\n\t}\n\tif workspace.AllowPublicAccessWhenBehindVnet != nil {\n\t\tallowPublicAccessWhenBehindVnet := *workspace.AllowPublicAccessWhenBehindVnet\n\t\tresult.Properties.AllowPublicAccessWhenBehindVnet = &allowPublicAccessWhenBehindVnet\n\t}\n\tif workspace.ApplicationInsightsReference != nil {\n\t\tapplicationInsightsARMID, err := resolved.ResolvedReferences.Lookup(*workspace.ApplicationInsightsReference)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tapplicationInsights := applicationInsightsARMID\n\t\tresult.Properties.ApplicationInsights = &applicationInsights\n\t}\n\tif workspace.ContainerRegistryReference != nil {\n\t\tcontainerRegistryARMID, err := resolved.ResolvedReferences.Lookup(*workspace.ContainerRegistryReference)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tcontainerRegistry := containerRegistryARMID\n\t\tresult.Properties.ContainerRegistry = &containerRegistry\n\t}\n\tif workspace.Description != nil {\n\t\tdescription := *workspace.Description\n\t\tresult.Properties.Description = &description\n\t}\n\tif workspace.DiscoveryUrl != nil {\n\t\tdiscoveryUrl := *workspace.DiscoveryUrl\n\t\tresult.Properties.DiscoveryUrl = &discoveryUrl\n\t}\n\tif workspace.Encryption != nil {\n\t\tencryption_ARM, err := (*workspace.Encryption).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tencryption := *encryption_ARM.(*EncryptionProperty_ARM)\n\t\tresult.Properties.Encryption = &encryption\n\t}\n\tif workspace.FriendlyName != nil {\n\t\tfriendlyName := *workspace.FriendlyName\n\t\tresult.Properties.FriendlyName = &friendlyName\n\t}\n\tif workspace.HbiWorkspace != nil {\n\t\thbiWorkspace := *workspace.HbiWorkspace\n\t\tresult.Properties.HbiWorkspace = &hbiWorkspace\n\t}\n\tif workspace.ImageBuildCompute != nil {\n\t\timageBuildCompute := *workspace.ImageBuildCompute\n\t\tresult.Properties.ImageBuildCompute = &imageBuildCompute\n\t}\n\tif workspace.KeyVaultReference != nil {\n\t\tkeyVaultARMID, err := resolved.ResolvedReferences.Lookup(*workspace.KeyVaultReference)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tkeyVault := keyVaultARMID\n\t\tresult.Properties.KeyVault = &keyVault\n\t}\n\tif workspace.PrimaryUserAssignedIdentityReference != nil {\n\t\tprimaryUserAssignedIdentityARMID, err := resolved.ResolvedReferences.Lookup(*workspace.PrimaryUserAssignedIdentityReference)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tprimaryUserAssignedIdentity := primaryUserAssignedIdentityARMID\n\t\tresult.Properties.PrimaryUserAssignedIdentity = &primaryUserAssignedIdentity\n\t}\n\tif workspace.PublicNetworkAccess != nil {\n\t\tpublicNetworkAccess := *workspace.PublicNetworkAccess\n\t\tresult.Properties.PublicNetworkAccess = &publicNetworkAccess\n\t}\n\tif workspace.ServiceManagedResourcesSettings != nil {\n\t\tserviceManagedResourcesSettings_ARM, err := (*workspace.ServiceManagedResourcesSettings).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tserviceManagedResourcesSettings := *serviceManagedResourcesSettings_ARM.(*ServiceManagedResourcesSettings_ARM)\n\t\tresult.Properties.ServiceManagedResourcesSettings = &serviceManagedResourcesSettings\n\t}\n\tfor _, item := range workspace.SharedPrivateLinkResources {\n\t\titem_ARM, err := item.ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresult.Properties.SharedPrivateLinkResources = append(result.Properties.SharedPrivateLinkResources, *item_ARM.(*SharedPrivateLinkResource_ARM))\n\t}\n\tif workspace.StorageAccountReference != nil {\n\t\tstorageAccountARMID, err := resolved.ResolvedReferences.Lookup(*workspace.StorageAccountReference)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tstorageAccount := storageAccountARMID\n\t\tresult.Properties.StorageAccount = &storageAccount\n\t}\n\n\t// Set property \"Sku\":\n\tif workspace.Sku != nil {\n\t\tsku_ARM, err := (*workspace.Sku).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tsku := *sku_ARM.(*Sku_ARM)\n\t\tresult.Sku = &sku\n\t}\n\n\t// Set property \"SystemData\":\n\tif workspace.SystemData != nil {\n\t\tsystemData_ARM, err := (*workspace.SystemData).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tsystemData := *systemData_ARM.(*SystemData_ARM)\n\t\tresult.SystemData = &systemData\n\t}\n\n\t// Set property \"Tags\":\n\tif workspace.Tags != nil {\n\t\tresult.Tags = make(map[string]string, len(workspace.Tags))\n\t\tfor key, value := range workspace.Tags {\n\t\t\tresult.Tags[key] = value\n\t\t}\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "8f4c1d48f70dfd02703f158ce913df60", "score": "0.6941806", "text": "func (rule *IPRule) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif rule == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &IPRule_ARM{}\n\n\t// Set property \"Value\":\n\tif rule.Value != nil {\n\t\tvalue := *rule.Value\n\t\tresult.Value = &value\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "4e33a05ae7b39c5a610d28ffeed9868a", "score": "0.6938208", "text": "func (reference *KeyVaultAndKeyReference) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif reference == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &KeyVaultAndKeyReference_ARM{}\n\n\t// Set property \"KeyUrl\":\n\tif reference.KeyUrl != nil {\n\t\tkeyUrl := *reference.KeyUrl\n\t\tresult.KeyUrl = &keyUrl\n\t}\n\n\t// Set property \"SourceVault\":\n\tif reference.SourceVault != nil {\n\t\tsourceVault_ARM, err := (*reference.SourceVault).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tsourceVault := *sourceVault_ARM.(*SourceVault_ARM)\n\t\tresult.SourceVault = &sourceVault\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "12996901784570de8e68e3e9890d0541", "score": "0.69258446", "text": "func (reference *NetworkInterfaceReference) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif reference == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &NetworkInterfaceReference_ARM{}\n\n\t// Set property \"Id\":\n\tif reference.Reference != nil {\n\t\treferenceARMID, err := resolved.ResolvedReferences.Lookup(*reference.Reference)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treference1 := referenceARMID\n\t\tresult.Id = &reference1\n\t}\n\n\t// Set property \"Properties\":\n\tif reference.DeleteOption != nil || reference.Primary != nil {\n\t\tresult.Properties = &NetworkInterfaceReferenceProperties_ARM{}\n\t}\n\tif reference.DeleteOption != nil {\n\t\tdeleteOption := *reference.DeleteOption\n\t\tresult.Properties.DeleteOption = &deleteOption\n\t}\n\tif reference.Primary != nil {\n\t\tprimary := *reference.Primary\n\t\tresult.Properties.Primary = &primary\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "7dcaca0d7de83f68ff801db8e5613da9", "score": "0.69095874", "text": "func (reference *KeyVaultAndSecretReference) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif reference == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &KeyVaultAndSecretReference_ARM{}\n\n\t// Set property \"SecretUrl\":\n\tif reference.SecretUrl != nil {\n\t\tsecretUrl := *reference.SecretUrl\n\t\tresult.SecretUrl = &secretUrl\n\t}\n\n\t// Set property \"SourceVault\":\n\tif reference.SourceVault != nil {\n\t\tsourceVault_ARM, err := (*reference.SourceVault).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tsourceVault := *sourceVault_ARM.(*SourceVault_ARM)\n\t\tresult.SourceVault = &sourceVault\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "c53c1ef2c60c41cdf86215b62c6f4f04", "score": "0.6875695", "text": "func (diskSku *DiskSku) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif diskSku == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &DiskSku_ARM{}\n\n\t// Set property \"Name\":\n\tif diskSku.Name != nil {\n\t\tname := *diskSku.Name\n\t\tresult.Name = &name\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "a2247ed24b93a19dba01223cabdcb0fb", "score": "0.68756044", "text": "func (disk *OSDisk) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif disk == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &OSDisk_ARM{}\n\n\t// Set property \"Caching\":\n\tif disk.Caching != nil {\n\t\tcaching := *disk.Caching\n\t\tresult.Caching = &caching\n\t}\n\n\t// Set property \"CreateOption\":\n\tif disk.CreateOption != nil {\n\t\tcreateOption := *disk.CreateOption\n\t\tresult.CreateOption = &createOption\n\t}\n\n\t// Set property \"DeleteOption\":\n\tif disk.DeleteOption != nil {\n\t\tdeleteOption := *disk.DeleteOption\n\t\tresult.DeleteOption = &deleteOption\n\t}\n\n\t// Set property \"DiffDiskSettings\":\n\tif disk.DiffDiskSettings != nil {\n\t\tdiffDiskSettings_ARM, err := (*disk.DiffDiskSettings).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tdiffDiskSettings := *diffDiskSettings_ARM.(*DiffDiskSettings_ARM)\n\t\tresult.DiffDiskSettings = &diffDiskSettings\n\t}\n\n\t// Set property \"DiskSizeGB\":\n\tif disk.DiskSizeGB != nil {\n\t\tdiskSizeGB := *disk.DiskSizeGB\n\t\tresult.DiskSizeGB = &diskSizeGB\n\t}\n\n\t// Set property \"EncryptionSettings\":\n\tif disk.EncryptionSettings != nil {\n\t\tencryptionSettings_ARM, err := (*disk.EncryptionSettings).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tencryptionSettings := *encryptionSettings_ARM.(*DiskEncryptionSettings_ARM)\n\t\tresult.EncryptionSettings = &encryptionSettings\n\t}\n\n\t// Set property \"Image\":\n\tif disk.Image != nil {\n\t\timage_ARM, err := (*disk.Image).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\timage := *image_ARM.(*VirtualHardDisk_ARM)\n\t\tresult.Image = &image\n\t}\n\n\t// Set property \"ManagedDisk\":\n\tif disk.ManagedDisk != nil {\n\t\tmanagedDisk_ARM, err := (*disk.ManagedDisk).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tmanagedDisk := *managedDisk_ARM.(*ManagedDiskParameters_ARM)\n\t\tresult.ManagedDisk = &managedDisk\n\t}\n\n\t// Set property \"Name\":\n\tif disk.Name != nil {\n\t\tname := *disk.Name\n\t\tresult.Name = &name\n\t}\n\n\t// Set property \"OsType\":\n\tif disk.OsType != nil {\n\t\tosType := *disk.OsType\n\t\tresult.OsType = &osType\n\t}\n\n\t// Set property \"Vhd\":\n\tif disk.Vhd != nil {\n\t\tvhd_ARM, err := (*disk.Vhd).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tvhd := *vhd_ARM.(*VirtualHardDisk_ARM)\n\t\tresult.Vhd = &vhd\n\t}\n\n\t// Set property \"WriteAcceleratorEnabled\":\n\tif disk.WriteAcceleratorEnabled != nil {\n\t\twriteAcceleratorEnabled := *disk.WriteAcceleratorEnabled\n\t\tresult.WriteAcceleratorEnabled = &writeAcceleratorEnabled\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "40fb023eec8c41b205db922b0570d760", "score": "0.6866095", "text": "func (mapping *JsonInputSchemaMapping) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif mapping == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &JsonInputSchemaMapping_ARM{}\n\n\t// Set property \"InputSchemaMappingType\":\n\tif mapping.InputSchemaMappingType != nil {\n\t\tresult.InputSchemaMappingType = *mapping.InputSchemaMappingType\n\t}\n\n\t// Set property \"Properties\":\n\tif mapping.DataVersion != nil ||\n\t\tmapping.EventTime != nil ||\n\t\tmapping.EventType != nil ||\n\t\tmapping.Id != nil ||\n\t\tmapping.Subject != nil ||\n\t\tmapping.Topic != nil {\n\t\tresult.Properties = &JsonInputSchemaMappingProperties_ARM{}\n\t}\n\tif mapping.DataVersion != nil {\n\t\tdataVersion_ARM, err := (*mapping.DataVersion).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tdataVersion := *dataVersion_ARM.(*JsonFieldWithDefault_ARM)\n\t\tresult.Properties.DataVersion = &dataVersion\n\t}\n\tif mapping.EventTime != nil {\n\t\teventTime_ARM, err := (*mapping.EventTime).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\teventTime := *eventTime_ARM.(*JsonField_ARM)\n\t\tresult.Properties.EventTime = &eventTime\n\t}\n\tif mapping.EventType != nil {\n\t\teventType_ARM, err := (*mapping.EventType).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\teventType := *eventType_ARM.(*JsonFieldWithDefault_ARM)\n\t\tresult.Properties.EventType = &eventType\n\t}\n\tif mapping.Id != nil {\n\t\tid_ARM, err := (*mapping.Id).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tid := *id_ARM.(*JsonField_ARM)\n\t\tresult.Properties.Id = &id\n\t}\n\tif mapping.Subject != nil {\n\t\tsubject_ARM, err := (*mapping.Subject).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tsubject := *subject_ARM.(*JsonFieldWithDefault_ARM)\n\t\tresult.Properties.Subject = &subject\n\t}\n\tif mapping.Topic != nil {\n\t\ttopic_ARM, err := (*mapping.Topic).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ttopic := *topic_ARM.(*JsonField_ARM)\n\t\tresult.Properties.Topic = &topic\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "a1cad937e2b197281f461918a971a913", "score": "0.6858262", "text": "func (multichannel *Multichannel) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif multichannel == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &Multichannel_ARM{}\n\n\t// Set property \"Enabled\":\n\tif multichannel.Enabled != nil {\n\t\tenabled := *multichannel.Enabled\n\t\tresult.Enabled = &enabled\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "bc03213de841465c77553830812ab500", "score": "0.68516546", "text": "func (embedded *VirtualNetworkTapSpec_NetworkInterface_SubResourceEmbedded) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif embedded == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &VirtualNetworkTapSpec_NetworkInterface_SubResourceEmbedded_ARM{}\n\n\t// Set property \"Id\":\n\tif embedded.Reference != nil {\n\t\treferenceARMID, err := resolved.ResolvedReferences.Lookup(*embedded.Reference)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treference := referenceARMID\n\t\tresult.Id = &reference\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "1444e96c20c4084ba9a8cc27326d249c", "score": "0.6848141", "text": "func (embedded *BackendAddressPool_NetworkInterface_SubResourceEmbedded) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif embedded == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &BackendAddressPool_NetworkInterface_SubResourceEmbedded_ARM{}\n\n\t// Set property \"Id\":\n\tif embedded.Reference != nil {\n\t\treferenceARMID, err := resolved.ResolvedReferences.Lookup(*embedded.Reference)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treference := referenceARMID\n\t\tresult.Id = &reference\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "a289471715ace37786412da01cd5072c", "score": "0.68383074", "text": "func (embedded *ApplicationSecurityGroupSpec_NetworkInterface_SubResourceEmbedded) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif embedded == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &ApplicationSecurityGroupSpec_NetworkInterface_SubResourceEmbedded_ARM{}\n\n\t// Set property \"Id\":\n\tif embedded.Reference != nil {\n\t\treferenceARMID, err := resolved.ResolvedReferences.Lookup(*embedded.Reference)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treference := referenceARMID\n\t\tresult.Id = &reference\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "57bcbf17fe111be35ac63cecc21db213", "score": "0.6837735", "text": "func (embedded *InboundNatRule_NetworkInterface_SubResourceEmbedded) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif embedded == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &InboundNatRule_NetworkInterface_SubResourceEmbedded_ARM{}\n\n\t// Set property \"Id\":\n\tif embedded.Reference != nil {\n\t\treferenceARMID, err := resolved.ResolvedReferences.Lookup(*embedded.Reference)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treference := referenceARMID\n\t\tresult.Id = &reference\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "4a285c27c1dcbe99e7061aaf663ce98e", "score": "0.6836841", "text": "func (embedded *Subnet_NetworkInterface_SubResourceEmbedded) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif embedded == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &Subnet_NetworkInterface_SubResourceEmbedded_ARM{}\n\n\t// Set property \"Id\":\n\tif embedded.Reference != nil {\n\t\treferenceARMID, err := resolved.ResolvedReferences.Lookup(*embedded.Reference)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treference := referenceARMID\n\t\tresult.Id = &reference\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "40dd31f3c59e0b3bdff8357871775933", "score": "0.68249196", "text": "func (reference *KeyVaultSecretReference) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif reference == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &KeyVaultSecretReference_ARM{}\n\n\t// Set property \"SecretUrl\":\n\tif reference.SecretUrl != nil {\n\t\tsecretUrl := *reference.SecretUrl\n\t\tresult.SecretUrl = &secretUrl\n\t}\n\n\t// Set property \"SourceVault\":\n\tif reference.SourceVault != nil {\n\t\tsourceVault_ARM, err := (*reference.SourceVault).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tsourceVault := *sourceVault_ARM.(*SubResource_ARM)\n\t\tresult.SourceVault = &sourceVault\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "cf7e5e8df7af8df53f7ed8a0808d2207", "score": "0.6808139", "text": "func (disk *VirtualHardDisk) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif disk == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &VirtualHardDisk_ARM{}\n\n\t// Set property \"Uri\":\n\tif disk.Uri != nil {\n\t\turi := *disk.Uri\n\t\tresult.Uri = &uri\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "e89eeaf6553418b3c5777f6c69840367", "score": "0.68030274", "text": "func (rule *VirtualNetworkRule) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif rule == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &VirtualNetworkRule_ARM{}\n\n\t// Set property \"Id\":\n\tif rule.Reference != nil {\n\t\treferenceARMID, err := resolved.ResolvedReferences.Lookup(*rule.Reference)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treference := referenceARMID\n\t\tresult.Id = &reference\n\t}\n\n\t// Set property \"IgnoreMissingVnetServiceEndpoint\":\n\tif rule.IgnoreMissingVnetServiceEndpoint != nil {\n\t\tignoreMissingVnetServiceEndpoint := *rule.IgnoreMissingVnetServiceEndpoint\n\t\tresult.IgnoreMissingVnetServiceEndpoint = &ignoreMissingVnetServiceEndpoint\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "36d23dbdda455da7d78b4deb1f41af0a", "score": "0.6800661", "text": "func (embedded *PublicIPAddressSpec_NetworkInterface_SubResourceEmbedded) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif embedded == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &PublicIPAddressSpec_NetworkInterface_SubResourceEmbedded_ARM{}\n\n\t// Set property \"Id\":\n\tif embedded.Reference != nil {\n\t\treferenceARMID, err := resolved.ResolvedReferences.Lookup(*embedded.Reference)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treference := referenceARMID\n\t\tresult.Id = &reference\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "7fd45d3e9a193e2e23acabbe70afc16f", "score": "0.6793933", "text": "func (settings *ServiceManagedResourcesSettings) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif settings == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &ServiceManagedResourcesSettings_ARM{}\n\n\t// Set property \"CosmosDb\":\n\tif settings.CosmosDb != nil {\n\t\tcosmosDb_ARM, err := (*settings.CosmosDb).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tcosmosDb := *cosmosDb_ARM.(*CosmosDbSettings_ARM)\n\t\tresult.CosmosDb = &cosmosDb\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "26aa38710600bc238cfea779b052d249", "score": "0.67907935", "text": "func (plan *Plan) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif plan == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &Plan_ARM{}\n\n\t// Set property \"Name\":\n\tif plan.Name != nil {\n\t\tname := *plan.Name\n\t\tresult.Name = &name\n\t}\n\n\t// Set property \"Product\":\n\tif plan.Product != nil {\n\t\tproduct := *plan.Product\n\t\tresult.Product = &product\n\t}\n\n\t// Set property \"PromotionCode\":\n\tif plan.PromotionCode != nil {\n\t\tpromotionCode := *plan.PromotionCode\n\t\tresult.PromotionCode = &promotionCode\n\t}\n\n\t// Set property \"Publisher\":\n\tif plan.Publisher != nil {\n\t\tpublisher := *plan.Publisher\n\t\tresult.Publisher = &publisher\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "2b11a90096d9aad7288684a534783d65", "score": "0.6788676", "text": "func (group *VaultSecretGroup) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif group == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &VaultSecretGroup_ARM{}\n\n\t// Set property \"SourceVault\":\n\tif group.SourceVault != nil {\n\t\tsourceVault_ARM, err := (*group.SourceVault).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tsourceVault := *sourceVault_ARM.(*SubResource_ARM)\n\t\tresult.SourceVault = &sourceVault\n\t}\n\n\t// Set property \"VaultCertificates\":\n\tfor _, item := range group.VaultCertificates {\n\t\titem_ARM, err := item.ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresult.VaultCertificates = append(result.VaultCertificates, *item_ARM.(*VaultCertificate_ARM))\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "4f7493c860bd69345a308ce7e783485e", "score": "0.67820543", "text": "func (settings *DiffDiskSettings) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif settings == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &DiffDiskSettings_ARM{}\n\n\t// Set property \"Option\":\n\tif settings.Option != nil {\n\t\toption := *settings.Option\n\t\tresult.Option = &option\n\t}\n\n\t// Set property \"Placement\":\n\tif settings.Placement != nil {\n\t\tplacement := *settings.Placement\n\t\tresult.Placement = &placement\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "dde389816fc1fd0ca2b128966647f963", "score": "0.677963", "text": "func (path *CompositePath) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif path == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &CompositePath_ARM{}\n\n\t// Set property \"Order\":\n\tif path.Order != nil {\n\t\torder := *path.Order\n\t\tresult.Order = &order\n\t}\n\n\t// Set property \"Path\":\n\tif path.Path != nil {\n\t\tpath1 := *path.Path\n\t\tresult.Path = &path1\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "525865eac3aff434099a58f5a1bbc436", "score": "0.67793065", "text": "func (component *Component_Spec) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif component == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &Component_Spec_ARM{}\n\n\t// Set property \"Etag\":\n\tif component.Etag != nil {\n\t\tetag := *component.Etag\n\t\tresult.Etag = &etag\n\t}\n\n\t// Set property \"Kind\":\n\tif component.Kind != nil {\n\t\tkind := *component.Kind\n\t\tresult.Kind = &kind\n\t}\n\n\t// Set property \"Location\":\n\tif component.Location != nil {\n\t\tlocation := *component.Location\n\t\tresult.Location = &location\n\t}\n\n\t// Set property \"Name\":\n\tresult.Name = resolved.Name\n\n\t// Set property \"Properties\":\n\tif component.Application_Type != nil ||\n\t\tcomponent.DisableIpMasking != nil ||\n\t\tcomponent.DisableLocalAuth != nil ||\n\t\tcomponent.Flow_Type != nil ||\n\t\tcomponent.ForceCustomerStorageForProfiler != nil ||\n\t\tcomponent.HockeyAppId != nil ||\n\t\tcomponent.ImmediatePurgeDataOn30Days != nil ||\n\t\tcomponent.IngestionMode != nil ||\n\t\tcomponent.PublicNetworkAccessForIngestion != nil ||\n\t\tcomponent.PublicNetworkAccessForQuery != nil ||\n\t\tcomponent.Request_Source != nil ||\n\t\tcomponent.RetentionInDays != nil ||\n\t\tcomponent.SamplingPercentage != nil ||\n\t\tcomponent.WorkspaceResourceReference != nil {\n\t\tresult.Properties = &ApplicationInsightsComponentProperties_ARM{}\n\t}\n\tif component.Application_Type != nil {\n\t\tapplicationType := *component.Application_Type\n\t\tresult.Properties.Application_Type = &applicationType\n\t}\n\tif component.DisableIpMasking != nil {\n\t\tdisableIpMasking := *component.DisableIpMasking\n\t\tresult.Properties.DisableIpMasking = &disableIpMasking\n\t}\n\tif component.DisableLocalAuth != nil {\n\t\tdisableLocalAuth := *component.DisableLocalAuth\n\t\tresult.Properties.DisableLocalAuth = &disableLocalAuth\n\t}\n\tif component.Flow_Type != nil {\n\t\tflowType := *component.Flow_Type\n\t\tresult.Properties.Flow_Type = &flowType\n\t}\n\tif component.ForceCustomerStorageForProfiler != nil {\n\t\tforceCustomerStorageForProfiler := *component.ForceCustomerStorageForProfiler\n\t\tresult.Properties.ForceCustomerStorageForProfiler = &forceCustomerStorageForProfiler\n\t}\n\tif component.HockeyAppId != nil {\n\t\thockeyAppId := *component.HockeyAppId\n\t\tresult.Properties.HockeyAppId = &hockeyAppId\n\t}\n\tif component.ImmediatePurgeDataOn30Days != nil {\n\t\timmediatePurgeDataOn30Days := *component.ImmediatePurgeDataOn30Days\n\t\tresult.Properties.ImmediatePurgeDataOn30Days = &immediatePurgeDataOn30Days\n\t}\n\tif component.IngestionMode != nil {\n\t\tingestionMode := *component.IngestionMode\n\t\tresult.Properties.IngestionMode = &ingestionMode\n\t}\n\tif component.PublicNetworkAccessForIngestion != nil {\n\t\tpublicNetworkAccessForIngestion := *component.PublicNetworkAccessForIngestion\n\t\tresult.Properties.PublicNetworkAccessForIngestion = &publicNetworkAccessForIngestion\n\t}\n\tif component.PublicNetworkAccessForQuery != nil {\n\t\tpublicNetworkAccessForQuery := *component.PublicNetworkAccessForQuery\n\t\tresult.Properties.PublicNetworkAccessForQuery = &publicNetworkAccessForQuery\n\t}\n\tif component.Request_Source != nil {\n\t\trequestSource := *component.Request_Source\n\t\tresult.Properties.Request_Source = &requestSource\n\t}\n\tif component.RetentionInDays != nil {\n\t\tretentionInDays := *component.RetentionInDays\n\t\tresult.Properties.RetentionInDays = &retentionInDays\n\t}\n\tif component.SamplingPercentage != nil {\n\t\tsamplingPercentage := *component.SamplingPercentage\n\t\tresult.Properties.SamplingPercentage = &samplingPercentage\n\t}\n\tif component.WorkspaceResourceReference != nil {\n\t\tworkspaceResourceIdARMID, err := resolved.ResolvedReferences.Lookup(*component.WorkspaceResourceReference)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tworkspaceResourceId := workspaceResourceIdARMID\n\t\tresult.Properties.WorkspaceResourceId = &workspaceResourceId\n\t}\n\n\t// Set property \"Tags\":\n\tif component.Tags != nil {\n\t\tresult.Tags = make(map[string]string, len(component.Tags))\n\t\tfor key, value := range component.Tags {\n\t\t\tresult.Tags[key] = value\n\t\t}\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "dd4f9dc9e1b17d52f97e459ad1a33e0b", "score": "0.6775019", "text": "func (sku *Sku) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif sku == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &Sku_ARM{}\n\n\t// Set property \"Name\":\n\tif sku.Name != nil {\n\t\tname := *sku.Name\n\t\tresult.Name = &name\n\t}\n\n\t// Set property \"Tier\":\n\tif sku.Tier != nil {\n\t\ttier := *sku.Tier\n\t\tresult.Tier = &tier\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "a5cad47bcc9a05725eceb2b2f9e52ebe", "score": "0.67743325", "text": "func (profile *DiagnosticsProfile) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif profile == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &DiagnosticsProfile_ARM{}\n\n\t// Set property \"BootDiagnostics\":\n\tif profile.BootDiagnostics != nil {\n\t\tbootDiagnostics_ARM, err := (*profile.BootDiagnostics).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tbootDiagnostics := *bootDiagnostics_ARM.(*BootDiagnostics_ARM)\n\t\tresult.BootDiagnostics = &bootDiagnostics\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "b08360ea3a79cce43d51fec3c8897b7b", "score": "0.6756277", "text": "func (ipTag *VirtualMachineIpTag) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif ipTag == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &VirtualMachineIpTag_ARM{}\n\n\t// Set property \"IpTagType\":\n\tif ipTag.IpTagType != nil {\n\t\tipTagType := *ipTag.IpTagType\n\t\tresult.IpTagType = &ipTagType\n\t}\n\n\t// Set property \"Tag\":\n\tif ipTag.Tag != nil {\n\t\ttag := *ipTag.Tag\n\t\tresult.Tag = &tag\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "8ab66eb21a9362ea43576e107ec210e8", "score": "0.6748529", "text": "func (embedded *NetworkSecurityGroupSpec_NetworkInterface_SubResourceEmbedded) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif embedded == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &NetworkSecurityGroupSpec_NetworkInterface_SubResourceEmbedded_ARM{}\n\n\t// Set property \"Id\":\n\tif embedded.Reference != nil {\n\t\treferenceARMID, err := resolved.ResolvedReferences.Lookup(*embedded.Reference)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treference := referenceARMID\n\t\tresult.Id = &reference\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "5c4db30981030c9d9a1f0269180e1acc", "score": "0.6734476", "text": "func (disk *Disk_Spec) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif disk == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &Disk_Spec_ARM{}\n\n\t// Set property \"ExtendedLocation\":\n\tif disk.ExtendedLocation != nil {\n\t\textendedLocation_ARM, err := (*disk.ExtendedLocation).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\textendedLocation := *extendedLocation_ARM.(*ExtendedLocation_ARM)\n\t\tresult.ExtendedLocation = &extendedLocation\n\t}\n\n\t// Set property \"Location\":\n\tif disk.Location != nil {\n\t\tlocation := *disk.Location\n\t\tresult.Location = &location\n\t}\n\n\t// Set property \"Name\":\n\tresult.Name = resolved.Name\n\n\t// Set property \"Properties\":\n\tif disk.BurstingEnabled != nil ||\n\t\tdisk.CreationData != nil ||\n\t\tdisk.DiskAccessReference != nil ||\n\t\tdisk.DiskIOPSReadOnly != nil ||\n\t\tdisk.DiskIOPSReadWrite != nil ||\n\t\tdisk.DiskMBpsReadOnly != nil ||\n\t\tdisk.DiskMBpsReadWrite != nil ||\n\t\tdisk.DiskSizeGB != nil ||\n\t\tdisk.Encryption != nil ||\n\t\tdisk.EncryptionSettingsCollection != nil ||\n\t\tdisk.HyperVGeneration != nil ||\n\t\tdisk.MaxShares != nil ||\n\t\tdisk.NetworkAccessPolicy != nil ||\n\t\tdisk.OsType != nil ||\n\t\tdisk.PurchasePlan != nil ||\n\t\tdisk.Tier != nil {\n\t\tresult.Properties = &DiskProperties_ARM{}\n\t}\n\tif disk.BurstingEnabled != nil {\n\t\tburstingEnabled := *disk.BurstingEnabled\n\t\tresult.Properties.BurstingEnabled = &burstingEnabled\n\t}\n\tif disk.CreationData != nil {\n\t\tcreationData_ARM, err := (*disk.CreationData).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tcreationData := *creationData_ARM.(*CreationData_ARM)\n\t\tresult.Properties.CreationData = &creationData\n\t}\n\tif disk.DiskAccessReference != nil {\n\t\tdiskAccessIdARMID, err := resolved.ResolvedReferences.Lookup(*disk.DiskAccessReference)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tdiskAccessId := diskAccessIdARMID\n\t\tresult.Properties.DiskAccessId = &diskAccessId\n\t}\n\tif disk.DiskIOPSReadOnly != nil {\n\t\tdiskIOPSReadOnly := *disk.DiskIOPSReadOnly\n\t\tresult.Properties.DiskIOPSReadOnly = &diskIOPSReadOnly\n\t}\n\tif disk.DiskIOPSReadWrite != nil {\n\t\tdiskIOPSReadWrite := *disk.DiskIOPSReadWrite\n\t\tresult.Properties.DiskIOPSReadWrite = &diskIOPSReadWrite\n\t}\n\tif disk.DiskMBpsReadOnly != nil {\n\t\tdiskMBpsReadOnly := *disk.DiskMBpsReadOnly\n\t\tresult.Properties.DiskMBpsReadOnly = &diskMBpsReadOnly\n\t}\n\tif disk.DiskMBpsReadWrite != nil {\n\t\tdiskMBpsReadWrite := *disk.DiskMBpsReadWrite\n\t\tresult.Properties.DiskMBpsReadWrite = &diskMBpsReadWrite\n\t}\n\tif disk.DiskSizeGB != nil {\n\t\tdiskSizeGB := *disk.DiskSizeGB\n\t\tresult.Properties.DiskSizeGB = &diskSizeGB\n\t}\n\tif disk.Encryption != nil {\n\t\tencryption_ARM, err := (*disk.Encryption).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tencryption := *encryption_ARM.(*Encryption_ARM)\n\t\tresult.Properties.Encryption = &encryption\n\t}\n\tif disk.EncryptionSettingsCollection != nil {\n\t\tencryptionSettingsCollection_ARM, err := (*disk.EncryptionSettingsCollection).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tencryptionSettingsCollection := *encryptionSettingsCollection_ARM.(*EncryptionSettingsCollection_ARM)\n\t\tresult.Properties.EncryptionSettingsCollection = &encryptionSettingsCollection\n\t}\n\tif disk.HyperVGeneration != nil {\n\t\thyperVGeneration := *disk.HyperVGeneration\n\t\tresult.Properties.HyperVGeneration = &hyperVGeneration\n\t}\n\tif disk.MaxShares != nil {\n\t\tmaxShares := *disk.MaxShares\n\t\tresult.Properties.MaxShares = &maxShares\n\t}\n\tif disk.NetworkAccessPolicy != nil {\n\t\tnetworkAccessPolicy := *disk.NetworkAccessPolicy\n\t\tresult.Properties.NetworkAccessPolicy = &networkAccessPolicy\n\t}\n\tif disk.OsType != nil {\n\t\tosType := *disk.OsType\n\t\tresult.Properties.OsType = &osType\n\t}\n\tif disk.PurchasePlan != nil {\n\t\tpurchasePlan_ARM, err := (*disk.PurchasePlan).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tpurchasePlan := *purchasePlan_ARM.(*PurchasePlan_ARM)\n\t\tresult.Properties.PurchasePlan = &purchasePlan\n\t}\n\tif disk.Tier != nil {\n\t\ttier := *disk.Tier\n\t\tresult.Properties.Tier = &tier\n\t}\n\n\t// Set property \"Sku\":\n\tif disk.Sku != nil {\n\t\tsku_ARM, err := (*disk.Sku).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tsku := *sku_ARM.(*DiskSku_ARM)\n\t\tresult.Sku = &sku\n\t}\n\n\t// Set property \"Tags\":\n\tif disk.Tags != nil {\n\t\tresult.Tags = make(map[string]string, len(disk.Tags))\n\t\tfor key, value := range disk.Tags {\n\t\t\tresult.Tags[key] = value\n\t\t}\n\t}\n\n\t// Set property \"Zones\":\n\tfor _, item := range disk.Zones {\n\t\tresult.Zones = append(result.Zones, item)\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "fd24faf263db8580f309234c9698685c", "score": "0.6730452", "text": "func (uniqueKey *UniqueKey) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif uniqueKey == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &UniqueKey_ARM{}\n\n\t// Set property \"Paths\":\n\tfor _, item := range uniqueKey.Paths {\n\t\tresult.Paths = append(result.Paths, item)\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "969bd82fa0dd69d59438f12511b29479", "score": "0.67172444", "text": "func (data *CreationData) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif data == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &CreationData_ARM{}\n\n\t// Set property \"CreateOption\":\n\tif data.CreateOption != nil {\n\t\tcreateOption := *data.CreateOption\n\t\tresult.CreateOption = &createOption\n\t}\n\n\t// Set property \"GalleryImageReference\":\n\tif data.GalleryImageReference != nil {\n\t\tgalleryImageReference_ARM, err := (*data.GalleryImageReference).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tgalleryImageReference := *galleryImageReference_ARM.(*ImageDiskReference_ARM)\n\t\tresult.GalleryImageReference = &galleryImageReference\n\t}\n\n\t// Set property \"ImageReference\":\n\tif data.ImageReference != nil {\n\t\timageReference_ARM, err := (*data.ImageReference).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\timageReference := *imageReference_ARM.(*ImageDiskReference_ARM)\n\t\tresult.ImageReference = &imageReference\n\t}\n\n\t// Set property \"LogicalSectorSize\":\n\tif data.LogicalSectorSize != nil {\n\t\tlogicalSectorSize := *data.LogicalSectorSize\n\t\tresult.LogicalSectorSize = &logicalSectorSize\n\t}\n\n\t// Set property \"SourceResourceId\":\n\tif data.SourceResourceReference != nil {\n\t\tsourceResourceReferenceARMID, err := resolved.ResolvedReferences.Lookup(*data.SourceResourceReference)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tsourceResourceReference := sourceResourceReferenceARMID\n\t\tresult.SourceResourceId = &sourceResourceReference\n\t}\n\n\t// Set property \"SourceUri\":\n\tif data.SourceUri != nil {\n\t\tsourceUri := *data.SourceUri\n\t\tresult.SourceUri = &sourceUri\n\t}\n\n\t// Set property \"StorageAccountId\":\n\tif data.StorageAccountId != nil {\n\t\tstorageAccountId := *data.StorageAccountId\n\t\tresult.StorageAccountId = &storageAccountId\n\t}\n\n\t// Set property \"UploadSizeBytes\":\n\tif data.UploadSizeBytes != nil {\n\t\tuploadSizeBytes := *data.UploadSizeBytes\n\t\tresult.UploadSizeBytes = &uploadSizeBytes\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "70a6c50b22887b3bd6610f38cb891601", "score": "0.67162865", "text": "func (embedded *ApplicationGatewayBackendAddressPool_NetworkInterface_SubResourceEmbedded) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif embedded == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &ApplicationGatewayBackendAddressPool_NetworkInterface_SubResourceEmbedded_ARM{}\n\n\t// Set property \"Id\":\n\tif embedded.Reference != nil {\n\t\treferenceARMID, err := resolved.ResolvedReferences.Lookup(*embedded.Reference)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treference := referenceARMID\n\t\tresult.Id = &reference\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "d1596c350ee664e887a92fdeda674a5b", "score": "0.6712001", "text": "func (service *PrivateLinkServiceSpec) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif service == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &PrivateLinkServiceSpec_ARM{}\n\n\t// Set property \"Id\":\n\tif service.Reference != nil {\n\t\treferenceARMID, err := resolved.ResolvedReferences.Lookup(*service.Reference)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treference := referenceARMID\n\t\tresult.Id = &reference\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "2ec9fc9cdc33b2048554dca89b3e3dcf", "score": "0.6703685", "text": "func (networkInterface *NetworkInterface_Spec) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif networkInterface == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &NetworkInterface_Spec_ARM{}\n\n\t// Set property \"ExtendedLocation\":\n\tif networkInterface.ExtendedLocation != nil {\n\t\textendedLocation_ARM, err := (*networkInterface.ExtendedLocation).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\textendedLocation := *extendedLocation_ARM.(*ExtendedLocation_ARM)\n\t\tresult.ExtendedLocation = &extendedLocation\n\t}\n\n\t// Set property \"Location\":\n\tif networkInterface.Location != nil {\n\t\tlocation := *networkInterface.Location\n\t\tresult.Location = &location\n\t}\n\n\t// Set property \"Name\":\n\tresult.Name = resolved.Name\n\n\t// Set property \"Properties\":\n\tif networkInterface.DnsSettings != nil ||\n\t\tnetworkInterface.EnableAcceleratedNetworking != nil ||\n\t\tnetworkInterface.EnableIPForwarding != nil ||\n\t\tnetworkInterface.IpConfigurations != nil ||\n\t\tnetworkInterface.NetworkSecurityGroup != nil ||\n\t\tnetworkInterface.NicType != nil ||\n\t\tnetworkInterface.PrivateLinkService != nil {\n\t\tresult.Properties = &NetworkInterfacePropertiesFormat_ARM{}\n\t}\n\tif networkInterface.DnsSettings != nil {\n\t\tdnsSettings_ARM, err := (*networkInterface.DnsSettings).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tdnsSettings := *dnsSettings_ARM.(*NetworkInterfaceDnsSettings_ARM)\n\t\tresult.Properties.DnsSettings = &dnsSettings\n\t}\n\tif networkInterface.EnableAcceleratedNetworking != nil {\n\t\tenableAcceleratedNetworking := *networkInterface.EnableAcceleratedNetworking\n\t\tresult.Properties.EnableAcceleratedNetworking = &enableAcceleratedNetworking\n\t}\n\tif networkInterface.EnableIPForwarding != nil {\n\t\tenableIPForwarding := *networkInterface.EnableIPForwarding\n\t\tresult.Properties.EnableIPForwarding = &enableIPForwarding\n\t}\n\tfor _, item := range networkInterface.IpConfigurations {\n\t\titem_ARM, err := item.ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresult.Properties.IpConfigurations = append(result.Properties.IpConfigurations, *item_ARM.(*NetworkInterfaceIPConfiguration_NetworkInterface_SubResourceEmbedded_ARM))\n\t}\n\tif networkInterface.NetworkSecurityGroup != nil {\n\t\tnetworkSecurityGroup_ARM, err := (*networkInterface.NetworkSecurityGroup).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tnetworkSecurityGroup := *networkSecurityGroup_ARM.(*NetworkSecurityGroupSpec_NetworkInterface_SubResourceEmbedded_ARM)\n\t\tresult.Properties.NetworkSecurityGroup = &networkSecurityGroup\n\t}\n\tif networkInterface.NicType != nil {\n\t\tnicType := *networkInterface.NicType\n\t\tresult.Properties.NicType = &nicType\n\t}\n\tif networkInterface.PrivateLinkService != nil {\n\t\tprivateLinkService_ARM, err := (*networkInterface.PrivateLinkService).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tprivateLinkService := *privateLinkService_ARM.(*PrivateLinkServiceSpec_ARM)\n\t\tresult.Properties.PrivateLinkService = &privateLinkService\n\t}\n\n\t// Set property \"Tags\":\n\tif networkInterface.Tags != nil {\n\t\tresult.Tags = make(map[string]string, len(networkInterface.Tags))\n\t\tfor key, value := range networkInterface.Tags {\n\t\t\tresult.Tags[key] = value\n\t\t}\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "5ac1d03e22a750430e567f3ae7023435", "score": "0.66963756", "text": "func (info *ApiDefinitionInfo) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif info == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &ApiDefinitionInfo_ARM{}\n\n\t// Set property \"Url\":\n\tif info.Url != nil {\n\t\turl := *info.Url\n\t\tresult.Url = &url\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "d38cbd86d74c829ac3cafd4aae570496", "score": "0.6692785", "text": "func (configuration *VirtualMachineNetworkInterfaceConfiguration) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif configuration == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &VirtualMachineNetworkInterfaceConfiguration_ARM{}\n\n\t// Set property \"Name\":\n\tif configuration.Name != nil {\n\t\tname := *configuration.Name\n\t\tresult.Name = &name\n\t}\n\n\t// Set property \"Properties\":\n\tif configuration.DeleteOption != nil ||\n\t\tconfiguration.DnsSettings != nil ||\n\t\tconfiguration.DscpConfiguration != nil ||\n\t\tconfiguration.EnableAcceleratedNetworking != nil ||\n\t\tconfiguration.EnableFpga != nil ||\n\t\tconfiguration.EnableIPForwarding != nil ||\n\t\tconfiguration.IpConfigurations != nil ||\n\t\tconfiguration.NetworkSecurityGroup != nil ||\n\t\tconfiguration.Primary != nil {\n\t\tresult.Properties = &VirtualMachineNetworkInterfaceConfigurationProperties_ARM{}\n\t}\n\tif configuration.DeleteOption != nil {\n\t\tdeleteOption := *configuration.DeleteOption\n\t\tresult.Properties.DeleteOption = &deleteOption\n\t}\n\tif configuration.DnsSettings != nil {\n\t\tdnsSettings_ARM, err := (*configuration.DnsSettings).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tdnsSettings := *dnsSettings_ARM.(*VirtualMachineNetworkInterfaceDnsSettingsConfiguration_ARM)\n\t\tresult.Properties.DnsSettings = &dnsSettings\n\t}\n\tif configuration.DscpConfiguration != nil {\n\t\tdscpConfiguration_ARM, err := (*configuration.DscpConfiguration).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tdscpConfiguration := *dscpConfiguration_ARM.(*SubResource_ARM)\n\t\tresult.Properties.DscpConfiguration = &dscpConfiguration\n\t}\n\tif configuration.EnableAcceleratedNetworking != nil {\n\t\tenableAcceleratedNetworking := *configuration.EnableAcceleratedNetworking\n\t\tresult.Properties.EnableAcceleratedNetworking = &enableAcceleratedNetworking\n\t}\n\tif configuration.EnableFpga != nil {\n\t\tenableFpga := *configuration.EnableFpga\n\t\tresult.Properties.EnableFpga = &enableFpga\n\t}\n\tif configuration.EnableIPForwarding != nil {\n\t\tenableIPForwarding := *configuration.EnableIPForwarding\n\t\tresult.Properties.EnableIPForwarding = &enableIPForwarding\n\t}\n\tfor _, item := range configuration.IpConfigurations {\n\t\titem_ARM, err := item.ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresult.Properties.IpConfigurations = append(result.Properties.IpConfigurations, *item_ARM.(*VirtualMachineNetworkInterfaceIPConfiguration_ARM))\n\t}\n\tif configuration.NetworkSecurityGroup != nil {\n\t\tnetworkSecurityGroup_ARM, err := (*configuration.NetworkSecurityGroup).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tnetworkSecurityGroup := *networkSecurityGroup_ARM.(*SubResource_ARM)\n\t\tresult.Properties.NetworkSecurityGroup = &networkSecurityGroup\n\t}\n\tif configuration.Primary != nil {\n\t\tprimary := *configuration.Primary\n\t\tresult.Properties.Primary = &primary\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "a44c7aaab494cc1202343437e645a83e", "score": "0.66798884", "text": "func (experiments *Experiments) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif experiments == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &Experiments_ARM{}\n\n\t// Set property \"RampUpRules\":\n\tfor _, item := range experiments.RampUpRules {\n\t\titem_ARM, err := item.ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresult.RampUpRules = append(result.RampUpRules, *item_ARM.(*RampUpRule_ARM))\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "21ab760242a27dba7f8310cc4ff931f1", "score": "0.66624254", "text": "func (properties *KeyVaultProperties) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif properties == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &KeyVaultProperties_ARM{}\n\n\t// Set property \"IdentityClientId\":\n\tif properties.IdentityClientId != nil {\n\t\tidentityClientId := *properties.IdentityClientId\n\t\tresult.IdentityClientId = &identityClientId\n\t}\n\n\t// Set property \"KeyIdentifier\":\n\tif properties.KeyIdentifier != nil {\n\t\tkeyIdentifier := *properties.KeyIdentifier\n\t\tresult.KeyIdentifier = &keyIdentifier\n\t}\n\n\t// Set property \"KeyVaultArmId\":\n\tif properties.KeyVaultArmId != nil {\n\t\tkeyVaultArmId := *properties.KeyVaultArmId\n\t\tresult.KeyVaultArmId = &keyVaultArmId\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "56d251df647b778e872acf326ba5e541", "score": "0.6656143", "text": "func (configuration *WinRMConfiguration) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif configuration == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &WinRMConfiguration_ARM{}\n\n\t// Set property \"Listeners\":\n\tfor _, item := range configuration.Listeners {\n\t\titem_ARM, err := item.ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresult.Listeners = append(result.Listeners, *item_ARM.(*WinRMListener_ARM))\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "761942f57d361edd498197d1174288e6", "score": "0.6652485", "text": "func (rule *FlexibleServers_FirewallRule_Spec) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif rule == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &FlexibleServers_FirewallRule_Spec_ARM{}\n\n\t// Set property \"Name\":\n\tresult.Name = resolved.Name\n\n\t// Set property \"Properties\":\n\tif rule.EndIpAddress != nil || rule.StartIpAddress != nil {\n\t\tresult.Properties = &FirewallRuleProperties_ARM{}\n\t}\n\tif rule.EndIpAddress != nil {\n\t\tendIpAddress := *rule.EndIpAddress\n\t\tresult.Properties.EndIpAddress = &endIpAddress\n\t}\n\tif rule.StartIpAddress != nil {\n\t\tstartIpAddress := *rule.StartIpAddress\n\t\tresult.Properties.StartIpAddress = &startIpAddress\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "3715c1ba2501db73e1a61f4f41b70769", "score": "0.6643969", "text": "func (disk *DataDisk) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif disk == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &DataDisk_ARM{}\n\n\t// Set property \"Caching\":\n\tif disk.Caching != nil {\n\t\tcaching := *disk.Caching\n\t\tresult.Caching = &caching\n\t}\n\n\t// Set property \"CreateOption\":\n\tif disk.CreateOption != nil {\n\t\tcreateOption := *disk.CreateOption\n\t\tresult.CreateOption = &createOption\n\t}\n\n\t// Set property \"DeleteOption\":\n\tif disk.DeleteOption != nil {\n\t\tdeleteOption := *disk.DeleteOption\n\t\tresult.DeleteOption = &deleteOption\n\t}\n\n\t// Set property \"DetachOption\":\n\tif disk.DetachOption != nil {\n\t\tdetachOption := *disk.DetachOption\n\t\tresult.DetachOption = &detachOption\n\t}\n\n\t// Set property \"DiskSizeGB\":\n\tif disk.DiskSizeGB != nil {\n\t\tdiskSizeGB := *disk.DiskSizeGB\n\t\tresult.DiskSizeGB = &diskSizeGB\n\t}\n\n\t// Set property \"Image\":\n\tif disk.Image != nil {\n\t\timage_ARM, err := (*disk.Image).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\timage := *image_ARM.(*VirtualHardDisk_ARM)\n\t\tresult.Image = &image\n\t}\n\n\t// Set property \"Lun\":\n\tif disk.Lun != nil {\n\t\tlun := *disk.Lun\n\t\tresult.Lun = &lun\n\t}\n\n\t// Set property \"ManagedDisk\":\n\tif disk.ManagedDisk != nil {\n\t\tmanagedDisk_ARM, err := (*disk.ManagedDisk).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tmanagedDisk := *managedDisk_ARM.(*ManagedDiskParameters_ARM)\n\t\tresult.ManagedDisk = &managedDisk\n\t}\n\n\t// Set property \"Name\":\n\tif disk.Name != nil {\n\t\tname := *disk.Name\n\t\tresult.Name = &name\n\t}\n\n\t// Set property \"ToBeDetached\":\n\tif disk.ToBeDetached != nil {\n\t\ttoBeDetached := *disk.ToBeDetached\n\t\tresult.ToBeDetached = &toBeDetached\n\t}\n\n\t// Set property \"Vhd\":\n\tif disk.Vhd != nil {\n\t\tvhd_ARM, err := (*disk.Vhd).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tvhd := *vhd_ARM.(*VirtualHardDisk_ARM)\n\t\tresult.Vhd = &vhd\n\t}\n\n\t// Set property \"WriteAcceleratorEnabled\":\n\tif disk.WriteAcceleratorEnabled != nil {\n\t\twriteAcceleratorEnabled := *disk.WriteAcceleratorEnabled\n\t\tresult.WriteAcceleratorEnabled = &writeAcceleratorEnabled\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "849a5fde6950798a4d9b3aeec4554de9", "score": "0.6639758", "text": "func (sku *Sku) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif sku == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &Sku_ARM{}\n\n\t// Set property \"Family\":\n\tif sku.Family != nil {\n\t\tfamily := *sku.Family\n\t\tresult.Family = &family\n\t}\n\n\t// Set property \"Name\":\n\tif sku.Name != nil {\n\t\tname := *sku.Name\n\t\tresult.Name = &name\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "3bd2c6f1aa271c5f3841d338b5efff6a", "score": "0.6587942", "text": "func (service *StorageAccounts_FileService_Spec) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif service == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &StorageAccounts_FileService_Spec_ARM{}\n\n\t// Set property \"Name\":\n\tresult.Name = resolved.Name\n\n\t// Set property \"Properties\":\n\tif service.Cors != nil ||\n\t\tservice.ProtocolSettings != nil ||\n\t\tservice.ShareDeleteRetentionPolicy != nil {\n\t\tresult.Properties = &StorageAccounts_FileService_Properties_Spec_ARM{}\n\t}\n\tif service.Cors != nil {\n\t\tcors_ARM, err := (*service.Cors).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tcors := *cors_ARM.(*CorsRules_ARM)\n\t\tresult.Properties.Cors = &cors\n\t}\n\tif service.ProtocolSettings != nil {\n\t\tprotocolSettings_ARM, err := (*service.ProtocolSettings).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tprotocolSettings := *protocolSettings_ARM.(*ProtocolSettings_ARM)\n\t\tresult.Properties.ProtocolSettings = &protocolSettings\n\t}\n\tif service.ShareDeleteRetentionPolicy != nil {\n\t\tshareDeleteRetentionPolicy_ARM, err := (*service.ShareDeleteRetentionPolicy).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tshareDeleteRetentionPolicy := *shareDeleteRetentionPolicy_ARM.(*DeleteRetentionPolicy_ARM)\n\t\tresult.Properties.ShareDeleteRetentionPolicy = &shareDeleteRetentionPolicy\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "b7242bf161fd4e9a835b818a4b3d1dd1", "score": "0.65848774", "text": "func (info *ConnStringInfo) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif info == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &ConnStringInfo_ARM{}\n\n\t// Set property \"ConnectionString\":\n\tif info.ConnectionString != nil {\n\t\tconnectionString := *info.ConnectionString\n\t\tresult.ConnectionString = &connectionString\n\t}\n\n\t// Set property \"Name\":\n\tif info.Name != nil {\n\t\tname := *info.Name\n\t\tresult.Name = &name\n\t}\n\n\t// Set property \"Type\":\n\tif info.Type != nil {\n\t\ttypeVar := *info.Type\n\t\tresult.Type = &typeVar\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "e0da96a881800d059dca6ebd2dd5757d", "score": "0.6583242", "text": "func (rule *InboundIpRule) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif rule == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &InboundIpRule_ARM{}\n\n\t// Set property \"Action\":\n\tif rule.Action != nil {\n\t\taction := *rule.Action\n\t\tresult.Action = &action\n\t}\n\n\t// Set property \"IpMask\":\n\tif rule.IpMask != nil {\n\t\tipMask := *rule.IpMask\n\t\tresult.IpMask = &ipMask\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "ffce1b3b22c2f38e848c570909c80022", "score": "0.65743405", "text": "func (parameters *ManagedDiskParameters) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif parameters == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &ManagedDiskParameters_ARM{}\n\n\t// Set property \"DiskEncryptionSet\":\n\tif parameters.DiskEncryptionSet != nil {\n\t\tdiskEncryptionSet_ARM, err := (*parameters.DiskEncryptionSet).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tdiskEncryptionSet := *diskEncryptionSet_ARM.(*SubResource_ARM)\n\t\tresult.DiskEncryptionSet = &diskEncryptionSet\n\t}\n\n\t// Set property \"Id\":\n\tif parameters.Reference != nil {\n\t\treferenceARMID, err := resolved.ResolvedReferences.Lookup(*parameters.Reference)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treference := referenceARMID\n\t\tresult.Id = &reference\n\t}\n\n\t// Set property \"SecurityProfile\":\n\tif parameters.SecurityProfile != nil {\n\t\tsecurityProfile_ARM, err := (*parameters.SecurityProfile).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tsecurityProfile := *securityProfile_ARM.(*VMDiskSecurityProfile_ARM)\n\t\tresult.SecurityProfile = &securityProfile\n\t}\n\n\t// Set property \"StorageAccountType\":\n\tif parameters.StorageAccountType != nil {\n\t\tstorageAccountType := *parameters.StorageAccountType\n\t\tresult.StorageAccountType = &storageAccountType\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "fa57264c512921cf75392210d043cb05", "score": "0.65705675", "text": "func (profile *StorageProfile) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif profile == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &StorageProfile_ARM{}\n\n\t// Set property \"DataDisks\":\n\tfor _, item := range profile.DataDisks {\n\t\titem_ARM, err := item.ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresult.DataDisks = append(result.DataDisks, *item_ARM.(*DataDisk_ARM))\n\t}\n\n\t// Set property \"ImageReference\":\n\tif profile.ImageReference != nil {\n\t\timageReference_ARM, err := (*profile.ImageReference).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\timageReference := *imageReference_ARM.(*ImageReference_ARM)\n\t\tresult.ImageReference = &imageReference\n\t}\n\n\t// Set property \"OsDisk\":\n\tif profile.OsDisk != nil {\n\t\tosDisk_ARM, err := (*profile.OsDisk).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tosDisk := *osDisk_ARM.(*OSDisk_ARM)\n\t\tresult.OsDisk = &osDisk\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "72b46c6f7165a8c6aee4c44c631e17de", "score": "0.6537487", "text": "func (machine *VirtualMachine_Spec) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif machine == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &VirtualMachine_Spec_ARM{}\n\n\t// Set property \"ExtendedLocation\":\n\tif machine.ExtendedLocation != nil {\n\t\textendedLocation_ARM, err := (*machine.ExtendedLocation).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\textendedLocation := *extendedLocation_ARM.(*ExtendedLocation_ARM)\n\t\tresult.ExtendedLocation = &extendedLocation\n\t}\n\n\t// Set property \"Identity\":\n\tif machine.Identity != nil {\n\t\tidentity_ARM, err := (*machine.Identity).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tidentity := *identity_ARM.(*VirtualMachineIdentity_ARM)\n\t\tresult.Identity = &identity\n\t}\n\n\t// Set property \"Location\":\n\tif machine.Location != nil {\n\t\tlocation := *machine.Location\n\t\tresult.Location = &location\n\t}\n\n\t// Set property \"Name\":\n\tresult.Name = resolved.Name\n\n\t// Set property \"Plan\":\n\tif machine.Plan != nil {\n\t\tplan_ARM, err := (*machine.Plan).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tplan := *plan_ARM.(*Plan_ARM)\n\t\tresult.Plan = &plan\n\t}\n\n\t// Set property \"Properties\":\n\tif machine.AdditionalCapabilities != nil ||\n\t\tmachine.ApplicationProfile != nil ||\n\t\tmachine.AvailabilitySet != nil ||\n\t\tmachine.BillingProfile != nil ||\n\t\tmachine.CapacityReservation != nil ||\n\t\tmachine.DiagnosticsProfile != nil ||\n\t\tmachine.EvictionPolicy != nil ||\n\t\tmachine.ExtensionsTimeBudget != nil ||\n\t\tmachine.HardwareProfile != nil ||\n\t\tmachine.Host != nil ||\n\t\tmachine.HostGroup != nil ||\n\t\tmachine.LicenseType != nil ||\n\t\tmachine.NetworkProfile != nil ||\n\t\tmachine.OsProfile != nil ||\n\t\tmachine.PlatformFaultDomain != nil ||\n\t\tmachine.Priority != nil ||\n\t\tmachine.ProximityPlacementGroup != nil ||\n\t\tmachine.ScheduledEventsProfile != nil ||\n\t\tmachine.SecurityProfile != nil ||\n\t\tmachine.StorageProfile != nil ||\n\t\tmachine.UserData != nil ||\n\t\tmachine.VirtualMachineScaleSet != nil {\n\t\tresult.Properties = &VirtualMachineProperties_ARM{}\n\t}\n\tif machine.AdditionalCapabilities != nil {\n\t\tadditionalCapabilities_ARM, err := (*machine.AdditionalCapabilities).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tadditionalCapabilities := *additionalCapabilities_ARM.(*AdditionalCapabilities_ARM)\n\t\tresult.Properties.AdditionalCapabilities = &additionalCapabilities\n\t}\n\tif machine.ApplicationProfile != nil {\n\t\tapplicationProfile_ARM, err := (*machine.ApplicationProfile).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tapplicationProfile := *applicationProfile_ARM.(*ApplicationProfile_ARM)\n\t\tresult.Properties.ApplicationProfile = &applicationProfile\n\t}\n\tif machine.AvailabilitySet != nil {\n\t\tavailabilitySet_ARM, err := (*machine.AvailabilitySet).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tavailabilitySet := *availabilitySet_ARM.(*SubResource_ARM)\n\t\tresult.Properties.AvailabilitySet = &availabilitySet\n\t}\n\tif machine.BillingProfile != nil {\n\t\tbillingProfile_ARM, err := (*machine.BillingProfile).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tbillingProfile := *billingProfile_ARM.(*BillingProfile_ARM)\n\t\tresult.Properties.BillingProfile = &billingProfile\n\t}\n\tif machine.CapacityReservation != nil {\n\t\tcapacityReservation_ARM, err := (*machine.CapacityReservation).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tcapacityReservation := *capacityReservation_ARM.(*CapacityReservationProfile_ARM)\n\t\tresult.Properties.CapacityReservation = &capacityReservation\n\t}\n\tif machine.DiagnosticsProfile != nil {\n\t\tdiagnosticsProfile_ARM, err := (*machine.DiagnosticsProfile).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tdiagnosticsProfile := *diagnosticsProfile_ARM.(*DiagnosticsProfile_ARM)\n\t\tresult.Properties.DiagnosticsProfile = &diagnosticsProfile\n\t}\n\tif machine.EvictionPolicy != nil {\n\t\tevictionPolicy := *machine.EvictionPolicy\n\t\tresult.Properties.EvictionPolicy = &evictionPolicy\n\t}\n\tif machine.ExtensionsTimeBudget != nil {\n\t\textensionsTimeBudget := *machine.ExtensionsTimeBudget\n\t\tresult.Properties.ExtensionsTimeBudget = &extensionsTimeBudget\n\t}\n\tif machine.HardwareProfile != nil {\n\t\thardwareProfile_ARM, err := (*machine.HardwareProfile).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\thardwareProfile := *hardwareProfile_ARM.(*HardwareProfile_ARM)\n\t\tresult.Properties.HardwareProfile = &hardwareProfile\n\t}\n\tif machine.Host != nil {\n\t\thost_ARM, err := (*machine.Host).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\thost := *host_ARM.(*SubResource_ARM)\n\t\tresult.Properties.Host = &host\n\t}\n\tif machine.HostGroup != nil {\n\t\thostGroup_ARM, err := (*machine.HostGroup).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\thostGroup := *hostGroup_ARM.(*SubResource_ARM)\n\t\tresult.Properties.HostGroup = &hostGroup\n\t}\n\tif machine.LicenseType != nil {\n\t\tlicenseType := *machine.LicenseType\n\t\tresult.Properties.LicenseType = &licenseType\n\t}\n\tif machine.NetworkProfile != nil {\n\t\tnetworkProfile_ARM, err := (*machine.NetworkProfile).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tnetworkProfile := *networkProfile_ARM.(*NetworkProfile_ARM)\n\t\tresult.Properties.NetworkProfile = &networkProfile\n\t}\n\tif machine.OsProfile != nil {\n\t\tosProfile_ARM, err := (*machine.OsProfile).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tosProfile := *osProfile_ARM.(*OSProfile_ARM)\n\t\tresult.Properties.OsProfile = &osProfile\n\t}\n\tif machine.PlatformFaultDomain != nil {\n\t\tplatformFaultDomain := *machine.PlatformFaultDomain\n\t\tresult.Properties.PlatformFaultDomain = &platformFaultDomain\n\t}\n\tif machine.Priority != nil {\n\t\tpriority := *machine.Priority\n\t\tresult.Properties.Priority = &priority\n\t}\n\tif machine.ProximityPlacementGroup != nil {\n\t\tproximityPlacementGroup_ARM, err := (*machine.ProximityPlacementGroup).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tproximityPlacementGroup := *proximityPlacementGroup_ARM.(*SubResource_ARM)\n\t\tresult.Properties.ProximityPlacementGroup = &proximityPlacementGroup\n\t}\n\tif machine.ScheduledEventsProfile != nil {\n\t\tscheduledEventsProfile_ARM, err := (*machine.ScheduledEventsProfile).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tscheduledEventsProfile := *scheduledEventsProfile_ARM.(*ScheduledEventsProfile_ARM)\n\t\tresult.Properties.ScheduledEventsProfile = &scheduledEventsProfile\n\t}\n\tif machine.SecurityProfile != nil {\n\t\tsecurityProfile_ARM, err := (*machine.SecurityProfile).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tsecurityProfile := *securityProfile_ARM.(*SecurityProfile_ARM)\n\t\tresult.Properties.SecurityProfile = &securityProfile\n\t}\n\tif machine.StorageProfile != nil {\n\t\tstorageProfile_ARM, err := (*machine.StorageProfile).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tstorageProfile := *storageProfile_ARM.(*StorageProfile_ARM)\n\t\tresult.Properties.StorageProfile = &storageProfile\n\t}\n\tif machine.UserData != nil {\n\t\tuserData := *machine.UserData\n\t\tresult.Properties.UserData = &userData\n\t}\n\tif machine.VirtualMachineScaleSet != nil {\n\t\tvirtualMachineScaleSet_ARM, err := (*machine.VirtualMachineScaleSet).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tvirtualMachineScaleSet := *virtualMachineScaleSet_ARM.(*SubResource_ARM)\n\t\tresult.Properties.VirtualMachineScaleSet = &virtualMachineScaleSet\n\t}\n\n\t// Set property \"Tags\":\n\tif machine.Tags != nil {\n\t\tresult.Tags = make(map[string]string, len(machine.Tags))\n\t\tfor key, value := range machine.Tags {\n\t\t\tresult.Tags[key] = value\n\t\t}\n\t}\n\n\t// Set property \"Zones\":\n\tfor _, item := range machine.Zones {\n\t\tresult.Zones = append(result.Zones, item)\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "cb5833bc11ebba34d217cd0d7818be13", "score": "0.6528927", "text": "func (settings *CosmosDbSettings) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif settings == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &CosmosDbSettings_ARM{}\n\n\t// Set property \"CollectionsThroughput\":\n\tif settings.CollectionsThroughput != nil {\n\t\tcollectionsThroughput := *settings.CollectionsThroughput\n\t\tresult.CollectionsThroughput = &collectionsThroughput\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "f590cb68a27810c219636727718b1fa7", "score": "0.65152544", "text": "func (profile *CapacityReservationProfile) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif profile == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &CapacityReservationProfile_ARM{}\n\n\t// Set property \"CapacityReservationGroup\":\n\tif profile.CapacityReservationGroup != nil {\n\t\tcapacityReservationGroup_ARM, err := (*profile.CapacityReservationGroup).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tcapacityReservationGroup := *capacityReservationGroup_ARM.(*SubResource_ARM)\n\t\tresult.CapacityReservationGroup = &capacityReservationGroup\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "9e61a2f08a8bb3d5df670949f02198b0", "score": "0.6514062", "text": "func (database *Servers_Database_Spec) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif database == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &Servers_Database_Spec_ARM{}\n\n\t// Set property \"Name\":\n\tresult.Name = resolved.Name\n\n\t// Set property \"Properties\":\n\tif database.Charset != nil || database.Collation != nil {\n\t\tresult.Properties = &DatabaseProperties_ARM{}\n\t}\n\tif database.Charset != nil {\n\t\tcharset := *database.Charset\n\t\tresult.Properties.Charset = &charset\n\t}\n\tif database.Collation != nil {\n\t\tcollation := *database.Collation\n\t\tresult.Properties.Collation = &collation\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "be90f1489d53e820ec6579bf5f2b3b50", "score": "0.6502579", "text": "func (identity *Identity) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif identity == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &Identity_ARM{}\n\n\t// Set property \"Type\":\n\tif identity.Type != nil {\n\t\ttypeVar := *identity.Type\n\t\tresult.Type = &typeVar\n\t}\n\n\t// Set property \"UserAssignedIdentities\":\n\tresult.UserAssignedIdentities = make(map[string]UserAssignedIdentityDetails_ARM, len(identity.UserAssignedIdentities))\n\tfor _, ident := range identity.UserAssignedIdentities {\n\t\tidentARMID, err := resolved.ResolvedReferences.Lookup(ident.Reference)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tkey := identARMID\n\t\tresult.UserAssignedIdentities[key] = UserAssignedIdentityDetails_ARM{}\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "db0b43ae866e31b55e3146c5dad5f00d", "score": "0.6497096", "text": "func (ruleSet *NetworkRuleSet) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif ruleSet == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &NetworkRuleSet_ARM{}\n\n\t// Set property \"Bypass\":\n\tif ruleSet.Bypass != nil {\n\t\tbypass := *ruleSet.Bypass\n\t\tresult.Bypass = &bypass\n\t}\n\n\t// Set property \"DefaultAction\":\n\tif ruleSet.DefaultAction != nil {\n\t\tdefaultAction := *ruleSet.DefaultAction\n\t\tresult.DefaultAction = &defaultAction\n\t}\n\n\t// Set property \"IpRules\":\n\tfor _, item := range ruleSet.IpRules {\n\t\titem_ARM, err := item.ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresult.IpRules = append(result.IpRules, *item_ARM.(*IPRule_ARM))\n\t}\n\n\t// Set property \"VirtualNetworkRules\":\n\tfor _, item := range ruleSet.VirtualNetworkRules {\n\t\titem_ARM, err := item.ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresult.VirtualNetworkRules = append(result.VirtualNetworkRules, *item_ARM.(*VirtualNetworkRule_ARM))\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "ba48458da94c442a82ad572a02e85b7d", "score": "0.6496085", "text": "func (trigger *RequestsBasedTrigger) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif trigger == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &RequestsBasedTrigger_ARM{}\n\n\t// Set property \"Count\":\n\tif trigger.Count != nil {\n\t\tcount := *trigger.Count\n\t\tresult.Count = &count\n\t}\n\n\t// Set property \"TimeInterval\":\n\tif trigger.TimeInterval != nil {\n\t\ttimeInterval := *trigger.TimeInterval\n\t\tresult.TimeInterval = &timeInterval\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "a43bc670f490799bee79084a291125f5", "score": "0.6495446", "text": "func (entry *AccessPolicyEntry) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif entry == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &AccessPolicyEntry_ARM{}\n\n\t// Set property \"ApplicationId\":\n\tif entry.ApplicationId != nil {\n\t\tapplicationId := *entry.ApplicationId\n\t\tresult.ApplicationId = &applicationId\n\t}\n\tif entry.ApplicationIdFromConfig != nil {\n\t\tapplicationIdValue, err := resolved.ResolvedConfigMaps.Lookup(*entry.ApplicationIdFromConfig)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"looking up configmap for property ApplicationId\")\n\t\t}\n\t\tapplicationId := applicationIdValue\n\t\tresult.ApplicationId = &applicationId\n\t}\n\n\t// Set property \"ObjectId\":\n\tif entry.ObjectId != nil {\n\t\tobjectId := *entry.ObjectId\n\t\tresult.ObjectId = &objectId\n\t}\n\tif entry.ObjectIdFromConfig != nil {\n\t\tobjectIdValue, err := resolved.ResolvedConfigMaps.Lookup(*entry.ObjectIdFromConfig)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"looking up configmap for property ObjectId\")\n\t\t}\n\t\tobjectId := objectIdValue\n\t\tresult.ObjectId = &objectId\n\t}\n\n\t// Set property \"Permissions\":\n\tif entry.Permissions != nil {\n\t\tpermissions_ARM, err := (*entry.Permissions).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tpermissions := *permissions_ARM.(*Permissions_ARM)\n\t\tresult.Permissions = &permissions\n\t}\n\n\t// Set property \"TenantId\":\n\tif entry.TenantId != nil {\n\t\ttenantId := *entry.TenantId\n\t\tresult.TenantId = &tenantId\n\t}\n\tif entry.TenantIdFromConfig != nil {\n\t\ttenantIdValue, err := resolved.ResolvedConfigMaps.Lookup(*entry.TenantIdFromConfig)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"looking up configmap for property TenantId\")\n\t\t}\n\t\ttenantId := tenantIdValue\n\t\tresult.TenantId = &tenantId\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "2c90f558e78bfcb2c0fa3ae5ae09d706", "score": "0.6472145", "text": "func (embedded *ApplicationSecurityGroupSpec_NetworkSecurityGroups_SecurityRule_SubResourceEmbedded) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif embedded == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &ApplicationSecurityGroupSpec_NetworkSecurityGroups_SecurityRule_SubResourceEmbedded_ARM{}\n\n\t// Set property \"Id\":\n\tif embedded.Reference != nil {\n\t\treferenceARMID, err := resolved.ResolvedReferences.Lookup(*embedded.Reference)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treference := referenceARMID\n\t\tresult.Id = &reference\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "51019095f73987f7b644b86f68dcdfec", "score": "0.64720273", "text": "func (rules *AutoHealRules) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif rules == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &AutoHealRules_ARM{}\n\n\t// Set property \"Actions\":\n\tif rules.Actions != nil {\n\t\tactions_ARM, err := (*rules.Actions).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tactions := *actions_ARM.(*AutoHealActions_ARM)\n\t\tresult.Actions = &actions\n\t}\n\n\t// Set property \"Triggers\":\n\tif rules.Triggers != nil {\n\t\ttriggers_ARM, err := (*rules.Triggers).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ttriggers := *triggers_ARM.(*AutoHealTriggers_ARM)\n\t\tresult.Triggers = &triggers\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "e185d824e7591c3cf498e97f1264bda7", "score": "0.6457643", "text": "func (field *JsonField) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif field == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &JsonField_ARM{}\n\n\t// Set property \"SourceField\":\n\tif field.SourceField != nil {\n\t\tsourceField := *field.SourceField\n\t\tresult.SourceField = &sourceField\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "2e0c2207c29949086b2701fd36fb5428", "score": "0.64529824", "text": "func (policy *ConflictResolutionPolicy) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif policy == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &ConflictResolutionPolicy_ARM{}\n\n\t// Set property \"ConflictResolutionPath\":\n\tif policy.ConflictResolutionPath != nil {\n\t\tconflictResolutionPath := *policy.ConflictResolutionPath\n\t\tresult.ConflictResolutionPath = &conflictResolutionPath\n\t}\n\n\t// Set property \"ConflictResolutionProcedure\":\n\tif policy.ConflictResolutionProcedure != nil {\n\t\tconflictResolutionProcedure := *policy.ConflictResolutionProcedure\n\t\tresult.ConflictResolutionProcedure = &conflictResolutionProcedure\n\t}\n\n\t// Set property \"Mode\":\n\tif policy.Mode != nil {\n\t\tmode := *policy.Mode\n\t\tresult.Mode = &mode\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "81764617c96b0f5d8a32c11c6081a3ad", "score": "0.6451055", "text": "func (listener *WinRMListener) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif listener == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &WinRMListener_ARM{}\n\n\t// Set property \"CertificateUrl\":\n\tif listener.CertificateUrl != nil {\n\t\tcertificateUrl := *listener.CertificateUrl\n\t\tresult.CertificateUrl = &certificateUrl\n\t}\n\n\t// Set property \"Protocol\":\n\tif listener.Protocol != nil {\n\t\tprotocol := *listener.Protocol\n\t\tresult.Protocol = &protocol\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "908377a73d8c73f55998c39207b6cef6", "score": "0.64490044", "text": "func (identity *ManagedServiceIdentity) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif identity == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &ManagedServiceIdentity_ARM{}\n\n\t// Set property \"Type\":\n\tif identity.Type != nil {\n\t\ttypeVar := *identity.Type\n\t\tresult.Type = &typeVar\n\t}\n\n\t// Set property \"UserAssignedIdentities\":\n\tresult.UserAssignedIdentities = make(map[string]UserAssignedIdentityDetails_ARM, len(identity.UserAssignedIdentities))\n\tfor _, ident := range identity.UserAssignedIdentities {\n\t\tidentARMID, err := resolved.ResolvedReferences.Lookup(ident.Reference)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tkey := identARMID\n\t\tresult.UserAssignedIdentities[key] = UserAssignedIdentityDetails_ARM{}\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "c2ff9258865d0fd076369e16f20d2154", "score": "0.6446174", "text": "func (settings *PatchSettings) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif settings == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &PatchSettings_ARM{}\n\n\t// Set property \"AssessmentMode\":\n\tif settings.AssessmentMode != nil {\n\t\tassessmentMode := *settings.AssessmentMode\n\t\tresult.AssessmentMode = &assessmentMode\n\t}\n\n\t// Set property \"AutomaticByPlatformSettings\":\n\tif settings.AutomaticByPlatformSettings != nil {\n\t\tautomaticByPlatformSettings_ARM, err := (*settings.AutomaticByPlatformSettings).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tautomaticByPlatformSettings := *automaticByPlatformSettings_ARM.(*WindowsVMGuestPatchAutomaticByPlatformSettings_ARM)\n\t\tresult.AutomaticByPlatformSettings = &automaticByPlatformSettings\n\t}\n\n\t// Set property \"EnableHotpatching\":\n\tif settings.EnableHotpatching != nil {\n\t\tenableHotpatching := *settings.EnableHotpatching\n\t\tresult.EnableHotpatching = &enableHotpatching\n\t}\n\n\t// Set property \"PatchMode\":\n\tif settings.PatchMode != nil {\n\t\tpatchMode := *settings.PatchMode\n\t\tresult.PatchMode = &patchMode\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "19632d71038d981913be3862e5542be0", "score": "0.64453316", "text": "func (data *SystemData) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif data == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &SystemData_ARM{}\n\n\t// Set property \"CreatedAt\":\n\tif data.CreatedAt != nil {\n\t\tcreatedAt := *data.CreatedAt\n\t\tresult.CreatedAt = &createdAt\n\t}\n\n\t// Set property \"CreatedBy\":\n\tif data.CreatedBy != nil {\n\t\tcreatedBy := *data.CreatedBy\n\t\tresult.CreatedBy = &createdBy\n\t}\n\n\t// Set property \"CreatedByType\":\n\tif data.CreatedByType != nil {\n\t\tcreatedByType := *data.CreatedByType\n\t\tresult.CreatedByType = &createdByType\n\t}\n\n\t// Set property \"LastModifiedAt\":\n\tif data.LastModifiedAt != nil {\n\t\tlastModifiedAt := *data.LastModifiedAt\n\t\tresult.LastModifiedAt = &lastModifiedAt\n\t}\n\n\t// Set property \"LastModifiedBy\":\n\tif data.LastModifiedBy != nil {\n\t\tlastModifiedBy := *data.LastModifiedBy\n\t\tresult.LastModifiedBy = &lastModifiedBy\n\t}\n\n\t// Set property \"LastModifiedByType\":\n\tif data.LastModifiedByType != nil {\n\t\tlastModifiedByType := *data.LastModifiedByType\n\t\tresult.LastModifiedByType = &lastModifiedByType\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "6efdc2eed0522674bb7cf63dee1f1bdc", "score": "0.6443504", "text": "func (embedded *NetworkInterfaceIPConfiguration_NetworkInterface_SubResourceEmbedded) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif embedded == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &NetworkInterfaceIPConfiguration_NetworkInterface_SubResourceEmbedded_ARM{}\n\n\t// Set property \"Name\":\n\tif embedded.Name != nil {\n\t\tname := *embedded.Name\n\t\tresult.Name = &name\n\t}\n\n\t// Set property \"Properties\":\n\tif embedded.ApplicationGatewayBackendAddressPools != nil ||\n\t\tembedded.ApplicationSecurityGroups != nil ||\n\t\tembedded.LoadBalancerBackendAddressPools != nil ||\n\t\tembedded.LoadBalancerInboundNatRules != nil ||\n\t\tembedded.Primary != nil ||\n\t\tembedded.PrivateIPAddress != nil ||\n\t\tembedded.PrivateIPAddressVersion != nil ||\n\t\tembedded.PrivateIPAllocationMethod != nil ||\n\t\tembedded.PublicIPAddress != nil ||\n\t\tembedded.Subnet != nil ||\n\t\tembedded.VirtualNetworkTaps != nil {\n\t\tresult.Properties = &NetworkInterfaceIPConfigurationPropertiesFormat_ARM{}\n\t}\n\tfor _, item := range embedded.ApplicationGatewayBackendAddressPools {\n\t\titem_ARM, err := item.ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresult.Properties.ApplicationGatewayBackendAddressPools = append(result.Properties.ApplicationGatewayBackendAddressPools, *item_ARM.(*ApplicationGatewayBackendAddressPool_NetworkInterface_SubResourceEmbedded_ARM))\n\t}\n\tfor _, item := range embedded.ApplicationSecurityGroups {\n\t\titem_ARM, err := item.ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresult.Properties.ApplicationSecurityGroups = append(result.Properties.ApplicationSecurityGroups, *item_ARM.(*ApplicationSecurityGroupSpec_NetworkInterface_SubResourceEmbedded_ARM))\n\t}\n\tfor _, item := range embedded.LoadBalancerBackendAddressPools {\n\t\titem_ARM, err := item.ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresult.Properties.LoadBalancerBackendAddressPools = append(result.Properties.LoadBalancerBackendAddressPools, *item_ARM.(*BackendAddressPool_NetworkInterface_SubResourceEmbedded_ARM))\n\t}\n\tfor _, item := range embedded.LoadBalancerInboundNatRules {\n\t\titem_ARM, err := item.ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresult.Properties.LoadBalancerInboundNatRules = append(result.Properties.LoadBalancerInboundNatRules, *item_ARM.(*InboundNatRule_NetworkInterface_SubResourceEmbedded_ARM))\n\t}\n\tif embedded.Primary != nil {\n\t\tprimary := *embedded.Primary\n\t\tresult.Properties.Primary = &primary\n\t}\n\tif embedded.PrivateIPAddress != nil {\n\t\tprivateIPAddress := *embedded.PrivateIPAddress\n\t\tresult.Properties.PrivateIPAddress = &privateIPAddress\n\t}\n\tif embedded.PrivateIPAddressVersion != nil {\n\t\tprivateIPAddressVersion := *embedded.PrivateIPAddressVersion\n\t\tresult.Properties.PrivateIPAddressVersion = &privateIPAddressVersion\n\t}\n\tif embedded.PrivateIPAllocationMethod != nil {\n\t\tprivateIPAllocationMethod := *embedded.PrivateIPAllocationMethod\n\t\tresult.Properties.PrivateIPAllocationMethod = &privateIPAllocationMethod\n\t}\n\tif embedded.PublicIPAddress != nil {\n\t\tpublicIPAddress_ARM, err := (*embedded.PublicIPAddress).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tpublicIPAddress := *publicIPAddress_ARM.(*PublicIPAddressSpec_NetworkInterface_SubResourceEmbedded_ARM)\n\t\tresult.Properties.PublicIPAddress = &publicIPAddress\n\t}\n\tif embedded.Subnet != nil {\n\t\tsubnet_ARM, err := (*embedded.Subnet).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tsubnet := *subnet_ARM.(*Subnet_NetworkInterface_SubResourceEmbedded_ARM)\n\t\tresult.Properties.Subnet = &subnet\n\t}\n\tfor _, item := range embedded.VirtualNetworkTaps {\n\t\titem_ARM, err := item.ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresult.Properties.VirtualNetworkTaps = append(result.Properties.VirtualNetworkTaps, *item_ARM.(*VirtualNetworkTapSpec_NetworkInterface_SubResourceEmbedded_ARM))\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "b6dcfe203f0f616ecfb91b491bb70c97", "score": "0.6437802", "text": "func (identity *VirtualMachineIdentity) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif identity == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &VirtualMachineIdentity_ARM{}\n\n\t// Set property \"Type\":\n\tif identity.Type != nil {\n\t\ttypeVar := *identity.Type\n\t\tresult.Type = &typeVar\n\t}\n\n\t// Set property \"UserAssignedIdentities\":\n\tresult.UserAssignedIdentities = make(map[string]UserAssignedIdentityDetails_ARM, len(identity.UserAssignedIdentities))\n\tfor _, ident := range identity.UserAssignedIdentities {\n\t\tidentARMID, err := resolved.ResolvedReferences.Lookup(ident.Reference)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tkey := identARMID\n\t\tresult.UserAssignedIdentities[key] = UserAssignedIdentityDetails_ARM{}\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "a0477c6d5a4b2979add3f290b213dc34", "score": "0.6418908", "text": "func (directory *VirtualDirectory) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif directory == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &VirtualDirectory_ARM{}\n\n\t// Set property \"PhysicalPath\":\n\tif directory.PhysicalPath != nil {\n\t\tphysicalPath := *directory.PhysicalPath\n\t\tresult.PhysicalPath = &physicalPath\n\t}\n\n\t// Set property \"VirtualPath\":\n\tif directory.VirtualPath != nil {\n\t\tvirtualPath := *directory.VirtualPath\n\t\tresult.VirtualPath = &virtualPath\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "c71ef97d48c607e09351c8298f43d03a", "score": "0.64177024", "text": "func (configuration *VirtualMachinePublicIPAddressDnsSettingsConfiguration) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif configuration == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &VirtualMachinePublicIPAddressDnsSettingsConfiguration_ARM{}\n\n\t// Set property \"DomainNameLabel\":\n\tif configuration.DomainNameLabel != nil {\n\t\tdomainNameLabel := *configuration.DomainNameLabel\n\t\tresult.DomainNameLabel = &domainNameLabel\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "1e5ff527b01039b0a54a302aaf810a4a", "score": "0.6412692", "text": "func (resource *SharedPrivateLinkResource) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif resource == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &SharedPrivateLinkResource_ARM{}\n\n\t// Set property \"Name\":\n\tif resource.Name != nil {\n\t\tname := *resource.Name\n\t\tresult.Name = &name\n\t}\n\n\t// Set property \"Properties\":\n\tif resource.GroupId != nil ||\n\t\tresource.PrivateLinkResourceReference != nil ||\n\t\tresource.RequestMessage != nil ||\n\t\tresource.Status != nil {\n\t\tresult.Properties = &SharedPrivateLinkResourceProperty_ARM{}\n\t}\n\tif resource.GroupId != nil {\n\t\tgroupId := *resource.GroupId\n\t\tresult.Properties.GroupId = &groupId\n\t}\n\tif resource.PrivateLinkResourceReference != nil {\n\t\tprivateLinkResourceIdARMID, err := resolved.ResolvedReferences.Lookup(*resource.PrivateLinkResourceReference)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tprivateLinkResourceId := privateLinkResourceIdARMID\n\t\tresult.Properties.PrivateLinkResourceId = &privateLinkResourceId\n\t}\n\tif resource.RequestMessage != nil {\n\t\trequestMessage := *resource.RequestMessage\n\t\tresult.Properties.RequestMessage = &requestMessage\n\t}\n\tif resource.Status != nil {\n\t\tstatus := *resource.Status\n\t\tresult.Properties.Status = &status\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "7b7c9f13355f18fead3c0e3d7de148af", "score": "0.64015365", "text": "func (addressSku *PublicIPAddressSku) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif addressSku == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &PublicIPAddressSku_ARM{}\n\n\t// Set property \"Name\":\n\tif addressSku.Name != nil {\n\t\tname := *addressSku.Name\n\t\tresult.Name = &name\n\t}\n\n\t// Set property \"Tier\":\n\tif addressSku.Tier != nil {\n\t\ttier := *addressSku.Tier\n\t\tresult.Tier = &tier\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "589193599a13de1399d1a4671b000a95", "score": "0.6398747", "text": "func (endpoint *DnsResolvers_OutboundEndpoint_Spec) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif endpoint == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &DnsResolvers_OutboundEndpoint_Spec_ARM{}\n\n\t// Set property \"Location\":\n\tif endpoint.Location != nil {\n\t\tlocation := *endpoint.Location\n\t\tresult.Location = &location\n\t}\n\n\t// Set property \"Name\":\n\tresult.Name = resolved.Name\n\n\t// Set property \"Properties\":\n\tif endpoint.Subnet != nil {\n\t\tresult.Properties = &OutboundEndpointProperties_ARM{}\n\t}\n\tif endpoint.Subnet != nil {\n\t\tsubnet_ARM, err := (*endpoint.Subnet).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tsubnet := *subnet_ARM.(*DnsresolverSubResource_ARM)\n\t\tresult.Properties.Subnet = &subnet\n\t}\n\n\t// Set property \"Tags\":\n\tif endpoint.Tags != nil {\n\t\tresult.Tags = make(map[string]string, len(endpoint.Tags))\n\t\tfor key, value := range endpoint.Tags {\n\t\t\tresult.Tags[key] = value\n\t\t}\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "5711e6ed08f6c4492815b5eada2f165f", "score": "0.6395439", "text": "func (configuration *WindowsConfiguration) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif configuration == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &WindowsConfiguration_ARM{}\n\n\t// Set property \"AdditionalUnattendContent\":\n\tfor _, item := range configuration.AdditionalUnattendContent {\n\t\titem_ARM, err := item.ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresult.AdditionalUnattendContent = append(result.AdditionalUnattendContent, *item_ARM.(*AdditionalUnattendContent_ARM))\n\t}\n\n\t// Set property \"EnableAutomaticUpdates\":\n\tif configuration.EnableAutomaticUpdates != nil {\n\t\tenableAutomaticUpdates := *configuration.EnableAutomaticUpdates\n\t\tresult.EnableAutomaticUpdates = &enableAutomaticUpdates\n\t}\n\n\t// Set property \"PatchSettings\":\n\tif configuration.PatchSettings != nil {\n\t\tpatchSettings_ARM, err := (*configuration.PatchSettings).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tpatchSettings := *patchSettings_ARM.(*PatchSettings_ARM)\n\t\tresult.PatchSettings = &patchSettings\n\t}\n\n\t// Set property \"ProvisionVMAgent\":\n\tif configuration.ProvisionVMAgent != nil {\n\t\tprovisionVMAgent := *configuration.ProvisionVMAgent\n\t\tresult.ProvisionVMAgent = &provisionVMAgent\n\t}\n\n\t// Set property \"TimeZone\":\n\tif configuration.TimeZone != nil {\n\t\ttimeZone := *configuration.TimeZone\n\t\tresult.TimeZone = &timeZone\n\t}\n\n\t// Set property \"WinRM\":\n\tif configuration.WinRM != nil {\n\t\twinRM_ARM, err := (*configuration.WinRM).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\twinRM := *winRM_ARM.(*WinRMConfiguration_ARM)\n\t\tresult.WinRM = &winRM\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "bbd62095b748955c84f1f7a3ee0feb31", "score": "0.639276", "text": "func (action *AutoHealCustomAction) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif action == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &AutoHealCustomAction_ARM{}\n\n\t// Set property \"Exe\":\n\tif action.Exe != nil {\n\t\texe := *action.Exe\n\t\tresult.Exe = &exe\n\t}\n\n\t// Set property \"Parameters\":\n\tif action.Parameters != nil {\n\t\tparameters := *action.Parameters\n\t\tresult.Parameters = &parameters\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "78735a4acc361355d74c9370808efc50", "score": "0.63899827", "text": "func (settings *CorsSettings) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif settings == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &CorsSettings_ARM{}\n\n\t// Set property \"AllowedOrigins\":\n\tfor _, item := range settings.AllowedOrigins {\n\t\tresult.AllowedOrigins = append(result.AllowedOrigins, item)\n\t}\n\n\t// Set property \"SupportCredentials\":\n\tif settings.SupportCredentials != nil {\n\t\tsupportCredentials := *settings.SupportCredentials\n\t\tresult.SupportCredentials = &supportCredentials\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "ba6584c41cf2f4d3ada3fa55d8a7133e", "score": "0.63700217", "text": "func (spatial *SpatialSpec) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif spatial == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &SpatialSpec_ARM{}\n\n\t// Set property \"Path\":\n\tif spatial.Path != nil {\n\t\tpath := *spatial.Path\n\t\tresult.Path = &path\n\t}\n\n\t// Set property \"Types\":\n\tfor _, item := range spatial.Types {\n\t\tresult.Types = append(result.Types, item)\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "cbc7bf9d36480ad2d6ced8acb34efcac", "score": "0.6357369", "text": "func (profile *ScheduledEventsProfile) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif profile == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &ScheduledEventsProfile_ARM{}\n\n\t// Set property \"TerminateNotificationProfile\":\n\tif profile.TerminateNotificationProfile != nil {\n\t\tterminateNotificationProfile_ARM, err := (*profile.TerminateNotificationProfile).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tterminateNotificationProfile := *terminateNotificationProfile_ARM.(*TerminateNotificationProfile_ARM)\n\t\tresult.TerminateNotificationProfile = &terminateNotificationProfile\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "75afe8f69772c6b0d3f8d19f74a4bf9f", "score": "0.63218343", "text": "func (configuration *VirtualMachineNetworkInterfaceDnsSettingsConfiguration) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif configuration == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &VirtualMachineNetworkInterfaceDnsSettingsConfiguration_ARM{}\n\n\t// Set property \"DnsServers\":\n\tfor _, item := range configuration.DnsServers {\n\t\tresult.DnsServers = append(result.DnsServers, item)\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "7c65fd01721e673a6c0d1a47e1b00984", "score": "0.63150394", "text": "func (reference *ImageReference) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif reference == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &ImageReference_ARM{}\n\n\t// Set property \"CommunityGalleryImageId\":\n\tif reference.CommunityGalleryImageId != nil {\n\t\tcommunityGalleryImageId := *reference.CommunityGalleryImageId\n\t\tresult.CommunityGalleryImageId = &communityGalleryImageId\n\t}\n\n\t// Set property \"Id\":\n\tif reference.Reference != nil {\n\t\treferenceARMID, err := resolved.ResolvedReferences.Lookup(*reference.Reference)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treference1 := referenceARMID\n\t\tresult.Id = &reference1\n\t}\n\n\t// Set property \"Offer\":\n\tif reference.Offer != nil {\n\t\toffer := *reference.Offer\n\t\tresult.Offer = &offer\n\t}\n\n\t// Set property \"Publisher\":\n\tif reference.Publisher != nil {\n\t\tpublisher := *reference.Publisher\n\t\tresult.Publisher = &publisher\n\t}\n\n\t// Set property \"SharedGalleryImageId\":\n\tif reference.SharedGalleryImageId != nil {\n\t\tsharedGalleryImageId := *reference.SharedGalleryImageId\n\t\tresult.SharedGalleryImageId = &sharedGalleryImageId\n\t}\n\n\t// Set property \"Sku\":\n\tif reference.Sku != nil {\n\t\tsku := *reference.Sku\n\t\tresult.Sku = &sku\n\t}\n\n\t// Set property \"Version\":\n\tif reference.Version != nil {\n\t\tversion := *reference.Version\n\t\tresult.Version = &version\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "5a1e6b5ea114387ed4063efe51adb0b9", "score": "0.6314237", "text": "func (plan *PurchasePlan) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif plan == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &PurchasePlan_ARM{}\n\n\t// Set property \"Name\":\n\tif plan.Name != nil {\n\t\tname := *plan.Name\n\t\tresult.Name = &name\n\t}\n\n\t// Set property \"Product\":\n\tif plan.Product != nil {\n\t\tproduct := *plan.Product\n\t\tresult.Product = &product\n\t}\n\n\t// Set property \"PromotionCode\":\n\tif plan.PromotionCode != nil {\n\t\tpromotionCode := *plan.PromotionCode\n\t\tresult.PromotionCode = &promotionCode\n\t}\n\n\t// Set property \"Publisher\":\n\tif plan.Publisher != nil {\n\t\tpublisher := *plan.Publisher\n\t\tresult.Publisher = &publisher\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "db75548dcbda7efb8b9991d064a34684", "score": "0.6307229", "text": "func (settings *NetworkInterfaceDnsSettings) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif settings == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &NetworkInterfaceDnsSettings_ARM{}\n\n\t// Set property \"DnsServers\":\n\tfor _, item := range settings.DnsServers {\n\t\tresult.DnsServers = append(result.DnsServers, item)\n\t}\n\n\t// Set property \"InternalDnsNameLabel\":\n\tif settings.InternalDnsNameLabel != nil {\n\t\tinternalDnsNameLabel := *settings.InternalDnsNameLabel\n\t\tresult.InternalDnsNameLabel = &internalDnsNameLabel\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "4e33999e5f060ecb6a38b4d82caa1f36", "score": "0.6287309", "text": "func (settings *LinuxPatchSettings) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif settings == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &LinuxPatchSettings_ARM{}\n\n\t// Set property \"AssessmentMode\":\n\tif settings.AssessmentMode != nil {\n\t\tassessmentMode := *settings.AssessmentMode\n\t\tresult.AssessmentMode = &assessmentMode\n\t}\n\n\t// Set property \"AutomaticByPlatformSettings\":\n\tif settings.AutomaticByPlatformSettings != nil {\n\t\tautomaticByPlatformSettings_ARM, err := (*settings.AutomaticByPlatformSettings).ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tautomaticByPlatformSettings := *automaticByPlatformSettings_ARM.(*LinuxVMGuestPatchAutomaticByPlatformSettings_ARM)\n\t\tresult.AutomaticByPlatformSettings = &automaticByPlatformSettings\n\t}\n\n\t// Set property \"PatchMode\":\n\tif settings.PatchMode != nil {\n\t\tpatchMode := *settings.PatchMode\n\t\tresult.PatchMode = &patchMode\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "9837bc58ac9458ada90b194d4e07dc2c", "score": "0.6287305", "text": "func (path *ExcludedPath) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif path == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &ExcludedPath_ARM{}\n\n\t// Set property \"Path\":\n\tif path.Path != nil {\n\t\tpath1 := *path.Path\n\t\tresult.Path = &path1\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "28e6fac5ba0143cd3943cc7ffc9da535", "score": "0.6259895", "text": "func (capabilities *AdditionalCapabilities) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif capabilities == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &AdditionalCapabilities_ARM{}\n\n\t// Set property \"HibernationEnabled\":\n\tif capabilities.HibernationEnabled != nil {\n\t\thibernationEnabled := *capabilities.HibernationEnabled\n\t\tresult.HibernationEnabled = &hibernationEnabled\n\t}\n\n\t// Set property \"UltraSSDEnabled\":\n\tif capabilities.UltraSSDEnabled != nil {\n\t\tultraSSDEnabled := *capabilities.UltraSSDEnabled\n\t\tresult.UltraSSDEnabled = &ultraSSDEnabled\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "f5e9d2697f73fac6e71468697355bcf7", "score": "0.625581", "text": "func (indexes *Indexes) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif indexes == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &Indexes_ARM{}\n\n\t// Set property \"DataType\":\n\tif indexes.DataType != nil {\n\t\tdataType := *indexes.DataType\n\t\tresult.DataType = &dataType\n\t}\n\n\t// Set property \"Kind\":\n\tif indexes.Kind != nil {\n\t\tkind := *indexes.Kind\n\t\tresult.Kind = &kind\n\t}\n\n\t// Set property \"Precision\":\n\tif indexes.Precision != nil {\n\t\tprecision := *indexes.Precision\n\t\tresult.Precision = &precision\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "68d5035373d6e582176c683e72064085", "score": "0.6241582", "text": "func (withDefault *JsonFieldWithDefault) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif withDefault == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &JsonFieldWithDefault_ARM{}\n\n\t// Set property \"DefaultValue\":\n\tif withDefault.DefaultValue != nil {\n\t\tdefaultValue := *withDefault.DefaultValue\n\t\tresult.DefaultValue = &defaultValue\n\t}\n\n\t// Set property \"SourceField\":\n\tif withDefault.SourceField != nil {\n\t\tsourceField := *withDefault.SourceField\n\t\tresult.SourceField = &sourceField\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "5cb34a5bdd8bccea4aeee9a6f855ccf2", "score": "0.6241482", "text": "func (rule *NetworkSecurityGroups_SecurityRule_Spec) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif rule == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &NetworkSecurityGroups_SecurityRule_Spec_ARM{}\n\n\t// Set property \"Name\":\n\tresult.Name = resolved.Name\n\n\t// Set property \"Properties\":\n\tif rule.Access != nil ||\n\t\trule.Description != nil ||\n\t\trule.DestinationAddressPrefix != nil ||\n\t\trule.DestinationAddressPrefixes != nil ||\n\t\trule.DestinationApplicationSecurityGroups != nil ||\n\t\trule.DestinationPortRange != nil ||\n\t\trule.DestinationPortRanges != nil ||\n\t\trule.Direction != nil ||\n\t\trule.Priority != nil ||\n\t\trule.Protocol != nil ||\n\t\trule.SourceAddressPrefix != nil ||\n\t\trule.SourceAddressPrefixes != nil ||\n\t\trule.SourceApplicationSecurityGroups != nil ||\n\t\trule.SourcePortRange != nil ||\n\t\trule.SourcePortRanges != nil {\n\t\tresult.Properties = &SecurityRulePropertiesFormat_NetworkSecurityGroups_SecurityRule_SubResourceEmbedded_ARM{}\n\t}\n\tif rule.Access != nil {\n\t\taccess := *rule.Access\n\t\tresult.Properties.Access = &access\n\t}\n\tif rule.Description != nil {\n\t\tdescription := *rule.Description\n\t\tresult.Properties.Description = &description\n\t}\n\tif rule.DestinationAddressPrefix != nil {\n\t\tdestinationAddressPrefix := *rule.DestinationAddressPrefix\n\t\tresult.Properties.DestinationAddressPrefix = &destinationAddressPrefix\n\t}\n\tfor _, item := range rule.DestinationAddressPrefixes {\n\t\tresult.Properties.DestinationAddressPrefixes = append(result.Properties.DestinationAddressPrefixes, item)\n\t}\n\tfor _, item := range rule.DestinationApplicationSecurityGroups {\n\t\titem_ARM, err := item.ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresult.Properties.DestinationApplicationSecurityGroups = append(result.Properties.DestinationApplicationSecurityGroups, *item_ARM.(*ApplicationSecurityGroupSpec_NetworkSecurityGroups_SecurityRule_SubResourceEmbedded_ARM))\n\t}\n\tif rule.DestinationPortRange != nil {\n\t\tdestinationPortRange := *rule.DestinationPortRange\n\t\tresult.Properties.DestinationPortRange = &destinationPortRange\n\t}\n\tfor _, item := range rule.DestinationPortRanges {\n\t\tresult.Properties.DestinationPortRanges = append(result.Properties.DestinationPortRanges, item)\n\t}\n\tif rule.Direction != nil {\n\t\tdirection := *rule.Direction\n\t\tresult.Properties.Direction = &direction\n\t}\n\tif rule.Priority != nil {\n\t\tpriority := *rule.Priority\n\t\tresult.Properties.Priority = &priority\n\t}\n\tif rule.Protocol != nil {\n\t\tprotocol := *rule.Protocol\n\t\tresult.Properties.Protocol = &protocol\n\t}\n\tif rule.SourceAddressPrefix != nil {\n\t\tsourceAddressPrefix := *rule.SourceAddressPrefix\n\t\tresult.Properties.SourceAddressPrefix = &sourceAddressPrefix\n\t}\n\tfor _, item := range rule.SourceAddressPrefixes {\n\t\tresult.Properties.SourceAddressPrefixes = append(result.Properties.SourceAddressPrefixes, item)\n\t}\n\tfor _, item := range rule.SourceApplicationSecurityGroups {\n\t\titem_ARM, err := item.ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresult.Properties.SourceApplicationSecurityGroups = append(result.Properties.SourceApplicationSecurityGroups, *item_ARM.(*ApplicationSecurityGroupSpec_NetworkSecurityGroups_SecurityRule_SubResourceEmbedded_ARM))\n\t}\n\tif rule.SourcePortRange != nil {\n\t\tsourcePortRange := *rule.SourcePortRange\n\t\tresult.Properties.SourcePortRange = &sourcePortRange\n\t}\n\tfor _, item := range rule.SourcePortRanges {\n\t\tresult.Properties.SourcePortRanges = append(result.Properties.SourcePortRanges, item)\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "6bcdeef4ddff95f22772b653bf96941f", "score": "0.6235299", "text": "func (application *VirtualApplication) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif application == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &VirtualApplication_ARM{}\n\n\t// Set property \"PhysicalPath\":\n\tif application.PhysicalPath != nil {\n\t\tphysicalPath := *application.PhysicalPath\n\t\tresult.PhysicalPath = &physicalPath\n\t}\n\n\t// Set property \"PreloadEnabled\":\n\tif application.PreloadEnabled != nil {\n\t\tpreloadEnabled := *application.PreloadEnabled\n\t\tresult.PreloadEnabled = &preloadEnabled\n\t}\n\n\t// Set property \"VirtualDirectories\":\n\tfor _, item := range application.VirtualDirectories {\n\t\titem_ARM, err := item.ConvertToARM(resolved)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresult.VirtualDirectories = append(result.VirtualDirectories, *item_ARM.(*VirtualDirectory_ARM))\n\t}\n\n\t// Set property \"VirtualPath\":\n\tif application.VirtualPath != nil {\n\t\tvirtualPath := *application.VirtualPath\n\t\tresult.VirtualPath = &virtualPath\n\t}\n\treturn result, nil\n}", "title": "" } ]
7b369521ef660009a994fb1e689bd739
HasForUser returns a boolean if a field has been set.
[ { "docid": "882ce72442697da037ea064da0355886", "score": "0.7271462", "text": "func (o *ActivityActivity) HasForUser() bool {\n\tif o != nil && o.ForUser != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" } ]
[ { "docid": "ba2503f870f134afc205d8ba41feab7c", "score": "0.69567895", "text": "func (o *IdentityVerificationCreateRequest) HasUser() bool {\n\tif o != nil && o.User.IsSet() {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "93a1761038a910b75a83ce6dada3ef7d", "score": "0.67999256", "text": "func (o *ViewLockdown) HasUser() bool {\n\tif o != nil && o.User != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "ff1f142c1a626dced69ea1822debd64e", "score": "0.67698103", "text": "func (o *IamLocalUserPasswordAllOf) HasUser() bool {\n\tif o != nil && o.User != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "f9d4267c12876481ba58e90017eed483", "score": "0.67665166", "text": "func (o *User) HasUserId() bool {\n\tif o != nil && o.UserId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "83037a30a03c16ff88d732c65766ed89", "score": "0.6738816", "text": "func (o *IncomeVerificationStatusWebhook) HasUserId() bool {\n\tif o != nil && o.UserId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "aca096256db5bcaeaf164c8322ddaec5", "score": "0.67247474", "text": "func (o *BotAllOf) HasUserId() bool {\n\tif o != nil && o.UserId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "8f10ba49e6af322ef60fe4e368c9d4d6", "score": "0.67144644", "text": "func (o *InlineObject79) HasUserId() bool {\n\tif o != nil && o.UserId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "7f875887fb76a1bcf7d568b1657683a2", "score": "0.6617112", "text": "func (o *ActivityActivity) HasForUserId() bool {\n\tif o != nil && o.ForUserId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "a41cb3b08147d91a4bd0e797f1c55c6b", "score": "0.6518111", "text": "func (o *UserBase) HasUserId() bool {\n\tif o != nil && o.UserId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "6784d8317d001a515388f30616d2a678", "score": "0.6486103", "text": "func (o *ViewLockdown) HasUserID() bool {\n\tif o != nil && o.UserID != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "2bacb02dc43bc9068bbcca251ccc05b3", "score": "0.6483912", "text": "func (o *EventResponse) HasUser() bool {\n\tif o != nil && o.User != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "da0bb266142d10ad4430d0f953a1b4a9", "score": "0.6458553", "text": "func (m *model) hasUser() bool {\n\treturn len(m.getAllUsers()) > 0\n}", "title": "" }, { "docid": "6db955f1df6ff03c82ec2eccb048309c", "score": "0.6431088", "text": "func (c *Config) HasUser() bool {\n\treturn c.User != nil && c.User.Email != \"\" && c.User.Password != \"\"\n}", "title": "" }, { "docid": "5137bfbdb534d7168cd150151990010c", "score": "0.6421639", "text": "func (o *VulnUpdateNotificationPayload) HasUserId() bool {\n\tif o != nil && o.UserId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "4dd244a6a7a95a13a3c6bd83df31aeb8", "score": "0.637941", "text": "func (u *Users) Has(user *User) bool {\n\treturn u.HasName(user.Nickname)\n}", "title": "" }, { "docid": "8f92f67493afc6c2a696136723965c82", "score": "0.6332239", "text": "func (o *ImageDetail) HasUserId() bool {\n\tif o != nil && o.UserId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "5d2eff693c92cfe85abbf7f412e54569", "score": "0.6311109", "text": "func (o *AnchoreImage) HasUserId() bool {\n\tif o != nil && o.UserId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "10b960e81b18c42ed2d3fb7f348e2456", "score": "0.6282018", "text": "func HasUser() predicate.Template {\n\treturn predicate.Template(func(s *sql.Selector) {\n\t\tstep := sqlgraph.NewStep(\n\t\t\tsqlgraph.From(Table, FieldID),\n\t\t\tsqlgraph.To(UserTable, FieldID),\n\t\t\tsqlgraph.Edge(sqlgraph.M2M, true, UserTable, UserPrimaryKey...),\n\t\t)\n\t\tsqlgraph.HasNeighbors(s, step)\n\t})\n}", "title": "" }, { "docid": "9a93e1b3be168741cedc298c733a71d3", "score": "0.6273317", "text": "func (this *UserService) HasUser(user *user.User, username string) bool {\n\tvar err error\n\tqs := orm.NewOrm()\n\tif strings.IndexRune(username, '@') == -1 {\n\t\tuser.Username = username\n\t\terr = qs.Read(user, \"Username\", \"Deleted\")\n\t} else {\n\t\tuser.Email = username\n\t\terr = qs.Read(user, \"Email\", \"Deleted\")\n\t}\n\tif err == nil {\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "93c8ee237100b4f893c9c259b01760d2", "score": "0.6249317", "text": "func (o *ActivityActivity) HasForUserName() bool {\n\tif o != nil && o.ForUserName != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "e1e39468d665b8d6f95aafd33cbefd7d", "score": "0.6232285", "text": "func (o *LegacyAuthorizationPostRequestAllOf) HasUserID() bool {\n\tif o != nil && o.UserID != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "86446ac5ecb2a49406746f0b4a1e9722", "score": "0.6229653", "text": "func (o *EmojiReactionBaseAllOf) HasUserId() bool {\n\tif o != nil && o.UserId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "3424a53732d55b51c09a7ebe675e0f09", "score": "0.622789", "text": "func (o *WorkflowCatalogItemDefinitionAllOf) HasUserIdOrEmail() bool {\n\tif o != nil && o.UserIdOrEmail != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "29b16c89401a029cd038b4f75173987b", "score": "0.61928517", "text": "func HasUser() predicate.Tweet {\n\treturn predicate.Tweet(func(s *sql.Selector) {\n\t\tstep := sqlgraph.NewStep(\n\t\t\tsqlgraph.From(Table, FieldID),\n\t\t\tsqlgraph.Edge(sqlgraph.M2M, true, UserTable, UserPrimaryKey...),\n\t\t)\n\t\tsqlgraph.HasNeighbors(s, step)\n\t})\n}", "title": "" }, { "docid": "f84071ce69ad9abf9d66155ae625f020", "score": "0.6185819", "text": "func HasUser() predicate.Request {\n\treturn predicate.Request(func(s *sql.Selector) {\n\t\tstep := sqlgraph.NewStep(\n\t\t\tsqlgraph.From(Table, FieldID),\n\t\t\tsqlgraph.Edge(sqlgraph.M2O, false, UserTable, UserColumn),\n\t\t)\n\t\tsqlgraph.HasNeighbors(s, step)\n\t})\n}", "title": "" }, { "docid": "ddb6f6900025fe68a46161ca2a1de647", "score": "0.6162812", "text": "func (u *User) Has(scope permission.UserScope, p permission.Token, d int64) (permission.UserScope, bool) {\n\tpermission.Registered(p)\n\tperm := string(p)\n\tif !scope.IsValid() {\n\t\treturn permission.ScopeSelf, false\n\t}\n\tu.setUserPermissions(d)\n\tvar (\n\t\trScope = permission.ScopeSelf\n\t\tpermGranted bool\n\t)\n\tswitch scope {\n\tcase permission.ScopeSelf:\n\t\tif u.resource[permission.ScopeSelf][perm] {\n\t\t\trScope = permission.ScopeSelf\n\t\t\tpermGranted = true\n\t\t}\n\t\tfallthrough\n\tcase permission.ScopeGlobal:\n\t\tif u.resource[permission.ScopeGlobal][perm] {\n\t\t\trScope = permission.ScopeGlobal\n\t\t\tpermGranted = true\n\t\t}\n\t\tfallthrough\n\tcase permission.ScopeSuperGlobal:\n\t\tif u.resource[permission.ScopeSuperGlobal][perm] {\n\t\t\trScope = permission.ScopeSuperGlobal\n\t\t\tpermGranted = true\n\t\t}\n\n\t}\n\n\treturn rScope, permGranted\n}", "title": "" }, { "docid": "44edad56feb14b739ae1868305fca3d0", "score": "0.6103609", "text": "func (au *AuthUser) Exists() bool {\n\treturn au._exists\n}", "title": "" }, { "docid": "3e4c6e92cb28551d25488fecc158d50e", "score": "0.60936654", "text": "func (u *User) HasAuthed() bool {\n\treturn u.name != \"\"\n}", "title": "" }, { "docid": "d25d5af8f2a789d33310f1a13883e579", "score": "0.60931873", "text": "func (u *User) Exists() bool {\n\treturn u._exists\n}", "title": "" }, { "docid": "cd512fb88ee9973c0618fc6b50ceefba", "score": "0.6079116", "text": "func HasUser() predicate.Drug {\n\treturn predicate.Drug(func(s *sql.Selector) {\n\t\tstep := sqlgraph.NewStep(\n\t\t\tsqlgraph.From(Table, FieldID),\n\t\t\tsqlgraph.To(UserTable, FieldID),\n\t\t\tsqlgraph.Edge(sqlgraph.M2O, true, UserTable, UserColumn),\n\t\t)\n\t\tsqlgraph.HasNeighbors(s, step)\n\t})\n}", "title": "" }, { "docid": "a6a71970eb3ef77ab9a3ec353271d66e", "score": "0.60745186", "text": "func (o *SupportMessage) HasUser() bool {\n\tif o != nil && o.User != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "33f8ec827ca2197e5ffac25479a9f9fe", "score": "0.6072186", "text": "func HasUser() predicate.UserStatus {\n\treturn predicate.UserStatus(func(s *sql.Selector) {\n\t\tstep := sqlgraph.NewStep(\n\t\t\tsqlgraph.From(Table, FieldID),\n\t\t\tsqlgraph.To(UserTable, FieldID),\n\t\t\tsqlgraph.Edge(sqlgraph.M2O, true, UserTable, UserColumn),\n\t\t)\n\t\tsqlgraph.HasNeighbors(s, step)\n\t})\n}", "title": "" }, { "docid": "ffc6a5ad676d5e0909b46fe706d09eec", "score": "0.60543054", "text": "func (o *PeopleJsonPerson) HasUserGoogleplus() bool {\n\tif o != nil && o.UserGoogleplus != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "1c5d29f49bf4ee7649912eae118238a6", "score": "0.604173", "text": "func (o *ActivityActivity) HasUserId() bool {\n\tif o != nil && o.UserId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "5592f2d3bf6017ea62020441ad4be8e7", "score": "0.6041597", "text": "func (o *TableWebhook) HasUseUserFieldNames() bool {\n\tif o != nil && !IsNil(o.UseUserFieldNames) {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "4bec7a67e7236a61171c18645833d96a", "score": "0.6038127", "text": "func (o *LinkTokenCreateRequest) HasUserToken() bool {\n\tif o != nil && o.UserToken != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "c88ad082f969ba6408b6c7ad3f349bf0", "score": "0.60288376", "text": "func (o *EmojiReactionBaseAllOf) HasUser() bool {\n\tif o != nil && o.User != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "9910de7fb87599125fb14dd9d2e0d727", "score": "0.59662116", "text": "func HasUser(usernameOrEmail string) bool {\n\tusers := Users()\n\tif strings.IndexRune(usernameOrEmail, '@') == -1 {\n\t\treturn users.Filter(\"UserName\", usernameOrEmail).Exist()\n\t}\n\treturn users.Filter(\"Email\", strings.ToLower(usernameOrEmail)).Exist()\n}", "title": "" }, { "docid": "1dfe77e08bc685f81192d0e709e51e98", "score": "0.5892971", "text": "func (o *Comment) HasUser() bool {\n\tif o != nil && o.User != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "c35497071416aca3b86af0faa672e5e3", "score": "0.58746994", "text": "func (g *Getter) Has(name string) bool {\n\t_, ok := g.getSafely(name)\n\treturn ok\n}", "title": "" }, { "docid": "8d48f9bddb9a51e3ba9b221a3dab8214", "score": "0.5872595", "text": "func (o *PeopleSpecificPerson) HasUserInvited() bool {\n\tif o != nil && o.UserInvited != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "089e32be30d86e80566d4a8fe101689a", "score": "0.5865394", "text": "func (db *data) GetTeamHasUser(params *model.TeamUserParams) bool {\n\tteam, _ := db.GetTeam(params.Team)\n\tuser, _ := db.GetUser(params.User)\n\n\tres := db.Model(\n\t\tteam,\n\t).Association(\n\t\t\"Users\",\n\t).Find(\n\t\tuser,\n\t).Error\n\n\treturn res == nil\n}", "title": "" }, { "docid": "220a005d92f52ee96d18eedf8d2c6f4e", "score": "0.5832916", "text": "func (o *User) HasId() bool {\n\tif o != nil && o.Id != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "5868fb38861cc32d54f11ecedc2b8b12", "score": "0.5832155", "text": "func (o *PeopleSpecificPerson) HasUserName() bool {\n\tif o != nil && o.UserName != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "27386982d4e32f3fa73891f2db3a00f2", "score": "0.5821383", "text": "func (o *PeopleJsonPerson) HasGetUserDetails() bool {\n\tif o != nil && o.GetUserDetails != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "f663c63e1fc28c3216fc132093c0714d", "score": "0.580737", "text": "func (f AuthenticatorDataFlags) UserPresent() bool {\n\treturn (f & AuthenticatorDataFlagUserPresent) == AuthenticatorDataFlagUserPresent\n}", "title": "" }, { "docid": "8c1151637d7675e482cd0457231d29b4", "score": "0.5805983", "text": "func (o *ResponseUser) HasId() bool {\n\tif o != nil && o.Id != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "b65c4f67b80464a3c72c20d7ec5ecff9", "score": "0.5799007", "text": "func (o *InlineObject13) HasUsers() bool {\n\tif o != nil && o.Users != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "55dd06124db236cb11be4e7607efb347", "score": "0.5796124", "text": "func (o *RealmExport) HasActingUserId() bool {\n\tif o != nil && o.ActingUserId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "73c1596969239c73fcd22cd65e30294b", "score": "0.5795661", "text": "func HasUser() predicate.AdminSession {\n\treturn predicate.AdminSession(func(s *sql.Selector) {\n\t\tstep := sqlgraph.NewStep(\n\t\t\tsqlgraph.From(Table, FieldID),\n\t\t\tsqlgraph.To(UserTable, FieldID),\n\t\t\tsqlgraph.Edge(sqlgraph.M2O, true, UserTable, UserColumn),\n\t\t)\n\t\tsqlgraph.HasNeighbors(s, step)\n\t})\n}", "title": "" }, { "docid": "d06db5af2dfebd480945635e8c2cd590", "score": "0.57930267", "text": "func (wu *WsubUser) Exists() bool {\n\treturn wu._exists\n}", "title": "" }, { "docid": "d0b2c1f676046acd6b399968745ec640", "score": "0.5784858", "text": "func HasTweetUser() predicate.Tweet {\n\treturn predicate.Tweet(func(s *sql.Selector) {\n\t\tstep := sqlgraph.NewStep(\n\t\t\tsqlgraph.From(Table, FieldID),\n\t\t\tsqlgraph.Edge(sqlgraph.O2M, true, TweetUserTable, TweetUserColumn),\n\t\t)\n\t\tsqlgraph.HasNeighbors(s, step)\n\t})\n}", "title": "" }, { "docid": "6363702138ab95b64353d5bbbca64c5d", "score": "0.5780423", "text": "func (o *ViewNotebook) HasCreatedByUserID() bool {\n\tif o != nil && o.CreatedByUserID != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "2bfffe4cad09df30c728d984cff6c4b6", "score": "0.57795143", "text": "func (o *ActivityActivity) HasUser() bool {\n\tif o != nil && o.User != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "5ab3ead5f1293648b036c20f0189e336", "score": "0.57651144", "text": "func (o *PeopleJsonPerson) HasUserFacebook() bool {\n\tif o != nil && o.UserFacebook != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "6f7fb803bab3256322dc7e19413fffb9", "score": "0.5755082", "text": "func (o *User) HasUserName() bool {\n\tif o != nil && o.UserName != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "d87cb235bf757a65f6d1179572fe3c76", "score": "0.57524383", "text": "func (u *User) Exists() (exists bool, err error) {\n\tclient := u.client\n\tif client == nil {\n\t\tclient = GetClient()\n\t}\n\tresult := &User{}\n\terr = client.Where(u).First(result).Error\n\tif err != nil && err != gorm.ErrRecordNotFound {\n\t\treturn\n\t}\n\terr = nil\n\tif result.ID != 0 {\n\t\texists = true\n\t}\n\treturn\n}", "title": "" }, { "docid": "393698cf89cbc053cbd81847e6483678", "score": "0.5748561", "text": "func (o *User) HasLimit() bool {\n\tif o != nil && o.Limit != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "885db45d5451e60214a41e5654b7b17d", "score": "0.57483584", "text": "func (o *PeopleJsonPerson) HasUserWebsite() bool {\n\tif o != nil && o.UserWebsite != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "55ec3d8d57ca76aee8fc618b2bc90046", "score": "0.57374954", "text": "func (User) IsUserAndStatus() {}", "title": "" }, { "docid": "6e4060b0dabf83ffb9c8f1e3b68b59a1", "score": "0.5722915", "text": "func (o *ViewCalendarEvent) HasCreatedByUserId() bool {\n\tif o != nil && o.CreatedByUserId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "c7df982c4487a75cb9856a9f99db86b5", "score": "0.5707186", "text": "func (o *Branchrestriction) HasUsers() bool {\n\tif o != nil && o.Users != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "b7f9b99f1f63084eb090e47f097c137c", "score": "0.5691349", "text": "func (user *User) HasMFA() bool {\n\tif user.MFAs == nil {\n\t\treturn false\n\t}\n\tfor _, item := range user.MFAs {\n\t\tif item.IsValid() {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "d090e180c97f035a201475f49b23c94f", "score": "0.5681734", "text": "func (repo userRepository) Exists(email string) bool {\n\tmodel := new(models.User)\n\trepo.Store.Where(\"email = ?\", email).Find(&model)\n\n\tif model.ID > 0 {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "9d968ad7d2fa34a958088f93fa9e1583", "score": "0.56650853", "text": "func (m *MockupUserProvider) Exists(email string) (bool, derrors.Error) {\n\tm.Lock()\n\tdefer m.Unlock()\n\treturn m.unsafeExists(email), nil\n}", "title": "" }, { "docid": "ca5453d7ed26d088187dddac6eba060f", "score": "0.5655563", "text": "func HasCreatedBy() predicate.UserStatus {\n\treturn predicate.UserStatus(func(s *sql.Selector) {\n\t\tstep := sqlgraph.NewStep(\n\t\t\tsqlgraph.From(Table, FieldID),\n\t\t\tsqlgraph.To(CreatedByTable, FieldID),\n\t\t\tsqlgraph.Edge(sqlgraph.M2O, false, CreatedByTable, CreatedByColumn),\n\t\t)\n\t\tsqlgraph.HasNeighbors(s, step)\n\t})\n}", "title": "" }, { "docid": "912c411ffdbffe51c3ea747a87cb2275", "score": "0.5649966", "text": "func (o *InlineResponse200116MessageReplies) HasUserDisplayPostedDate() bool {\n\tif o != nil && o.UserDisplayPostedDate != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "f07082a9f557d3c7d01e03ed947a4931", "score": "0.56489843", "text": "func (o *DeferredResultboolean) HasSetOrExpired() bool {\n\tif o != nil && o.SetOrExpired != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "ddcad793ff4a2f2356d047b98b20cfdc", "score": "0.56479466", "text": "func (db *dbClient) UserExists(id string) (bool, error) {\n\tres, err := db.GetKeySet(\"user-*-*-\" + id)\n\tif err != nil {\n\t\treturn false, errors.Wrap(err, \"GetKeySet\")\n\t}\n\n\tif len(res) == 0 {\n\t\treturn false, nil\n\t}\n\n\treturn true, nil\n}", "title": "" }, { "docid": "1d37798db1cb516ee583f0f5a7aeef6f", "score": "0.56446266", "text": "func (u *SQLUser) Exists() bool {\n\tif u.exists {\n\t\treturn true\n\t}\n\tvar count int\n\terr := u.Db.QueryRow(`SELECT COUNT(*) FROM \"users\" WHERE \"username\" = $1`, u.Username).Scan(&count)\n\n\tif err != nil {\n\t\tlog.Println(err)\n\t\tif err == sql.ErrNoRows {\n\t\t\treturn false\n\t\t}\n\t\treturn false\n\t}\n\tu.exists = count > 0\n\treturn count > 0\n}", "title": "" }, { "docid": "9e763cf95d33e1ba46eaa4ba39a8d7c1", "score": "0.56429255", "text": "func (up *UserProfile) Exists() bool {\n\treturn up._exists\n}", "title": "" }, { "docid": "9584c4417da708fc23d1a916782d8015", "score": "0.5642738", "text": "func (o *MfaDevice) HasUserDisplayName() bool {\n\tif o != nil && o.UserDisplayName != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "9bb94b4d6244fdd7297c69db728c143a", "score": "0.5639002", "text": "func (o *PeopleJsonPerson) HasUserLinkedin() bool {\n\tif o != nil && o.UserLinkedin != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "3c41210ed050f3857c13cd1c192884fa", "score": "0.56324774", "text": "func (o *MicrosoftGraphSharedDriveItem) HasCreatedByUser() bool {\n\tif o != nil && o.CreatedByUser != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "70e8c94138bc083a7beeebfa4b134cb6", "score": "0.56129885", "text": "func (o *PeopleSpecificPerson) HasUserType() bool {\n\tif o != nil && o.UserType != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "9314fa636d55d51250819f31827e00fd", "score": "0.5610258", "text": "func (o *UserApp) HasPersonal() bool {\n\tif o != nil && o.Personal != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "c5788b5c64d06abeef12bd733b6ad1b2", "score": "0.5603723", "text": "func (m *IRCMessage) HasUser() bool {\n\treturn m.line.Nick != \"\"\n}", "title": "" }, { "docid": "02fadd41d12311a4c69d13176886989b", "score": "0.5602623", "text": "func IsUserExists(q Queryer, id string) (bool, error) {\n\tvar cnt int64\n\terr := q.QueryRow(`select count(*) from users where id = $1`, id).Scan(&cnt)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\treturn cnt > 0, nil\n}", "title": "" }, { "docid": "8240e3109dccd4e16ec15431fd9261c4", "score": "0.55952275", "text": "func (repo *UserRepo) Exists(id uint64) bool {\n\tdb := infraestructure.PostgresSession()\n\tvar user domain.User\n\tdb.(&user, id)\n\treturn &user != nil\n}", "title": "" }, { "docid": "d7f26b7261c25b1867160634b955219d", "score": "0.5594119", "text": "func (o *FileversionResponseIncluded) HasUsers() bool {\n\tif o != nil && o.Users != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "1101465269a8ab0bfacbbf4a79fc07ac", "score": "0.5586751", "text": "func (o *ComputeProjectVmCreate) HasUserMetadata() bool {\n\tif o != nil && o.UserMetadata != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "0ee1b7a3b7538fd17fa28be14fabd47a", "score": "0.5586164", "text": "func (o *InlineResponse200116MessageReplies) HasUserDisplayPostedTime() bool {\n\tif o != nil && o.UserDisplayPostedTime != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "0e1b854c818b2447d37d5dedd7a3a0d6", "score": "0.5580219", "text": "func (*userImpl) HasPassword(p graphql.ResolveParams) (bool, error) {\n\tuser := p.Source.(*corev2.User)\n\treturn len(user.Password) > 0, nil\n}", "title": "" }, { "docid": "61e4a7074b72144389ce0eb97b5740b9", "score": "0.55733", "text": "func (o *ResponseUser) HasUsername() bool {\n\tif o != nil && o.Username != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "17e994bedf29c6f4204286ad64e616ae", "score": "0.5557759", "text": "func (o *ResponseUser) HasEmail() bool {\n\tif o != nil && o.Email != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "2a89368ef95dcd8efa8d3049c5dad2dd", "score": "0.5546639", "text": "func (o *AssigneeFormAssigneesResponseIncluded) HasUsers() bool {\n\tif o != nil && o.Users != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "3ecbd2f35afb02775af74a3ce8b391be", "score": "0.5545529", "text": "func (o *User) HasPhone() bool {\n\tif o != nil && o.Phone != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "e83dd03ddfc1a4f67947f40806f0d1d2", "score": "0.55451113", "text": "func (o *PeopleJsonPerson) HasUserTwitterName() bool {\n\tif o != nil && o.UserTwitterName != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "832dd185ce360840a70120aaeb412661", "score": "0.5542816", "text": "func UserHasEmail(userID uint) (bool, error) {\n\tuser := User{}\n\n\terr := db.\n\t\tNew().\n\t\tWhere(\"id = ?\", userID).\n\t\tFind(&user).\n\t\tError\n\n\tif err != nil {\n\t\treturn false, err\n\t}\n\n\treturn user.Email != \"\", nil\n}", "title": "" }, { "docid": "2b8a174fac01b75e8d425397f682332f", "score": "0.5539931", "text": "func (o *PeopleSpecificPerson) HasIsClientUser() bool {\n\tif o != nil && o.IsClientUser != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "377fb978cfb93844cc5b2fd17903a0f0", "score": "0.55299777", "text": "func isUserAuthed(ctx *gin.Context) bool {\n\t_, ok := userClients.Get(getSessId(ctx))\n\treturn ok\n}", "title": "" }, { "docid": "c0dc624178b9ee133f77e528e6bad7aa", "score": "0.55285126", "text": "func (o *IamUserUpdate) HasPhone() bool {\n\tif o != nil && o.Phone != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "4706acab0d73a64f8052cc6704ec09ac", "score": "0.5523895", "text": "func(f *Form) Has(field string, r *http.Request) bool{\n\tx:= r.Form.Get(field)\n\tif x==\"\"{\n\t\treturn false\n\t}\n\treturn true\n}", "title": "" }, { "docid": "ad851d9dfb20bc43bce7e38e959ee4ea", "score": "0.55238", "text": "func (_Pool *PoolCaller) HasUserLimit(opts *bind.CallOpts) (bool, error) {\n\tvar out []interface{}\n\terr := _Pool.contract.Call(opts, &out, \"hasUserLimit\")\n\n\tif err != nil {\n\t\treturn *new(bool), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(bool)).(*bool)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "7b2169092f00e5e439be6c2cf31b4274", "score": "0.55221856", "text": "func HasUserWith(preds ...predicate.User) predicate.UserStatus {\n\treturn predicate.UserStatus(func(s *sql.Selector) {\n\t\tstep := sqlgraph.NewStep(\n\t\t\tsqlgraph.From(Table, FieldID),\n\t\t\tsqlgraph.To(UserInverseTable, FieldID),\n\t\t\tsqlgraph.Edge(sqlgraph.M2O, true, UserTable, UserColumn),\n\t\t)\n\t\tsqlgraph.HasNeighborsWith(s, step, func(s *sql.Selector) {\n\t\t\tfor _, p := range preds {\n\t\t\t\tp(s)\n\t\t\t}\n\t\t})\n\t})\n}", "title": "" }, { "docid": "b8699d1366dc633611346451c253f79b", "score": "0.55153674", "text": "func (o *IncomeVerificationPrecheckUser) HasLastName() bool {\n\tif o != nil && o.LastName.IsSet() {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "7bba9a7f7141adb43a75d6715b7d1d30", "score": "0.5514013", "text": "func (group *Group) HasMember(userID UserID) bool {\n\treturn group.FindMember(userID) != nil\n}", "title": "" }, { "docid": "e3a12c00caff67a2be6477b7f65a165f", "score": "0.55119", "text": "func (o *ViewAudit) HasField() bool {\n\tif o != nil && o.Field != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "68aac079a875afa213d8ee856040639c", "score": "0.5509067", "text": "func (o *User) HasState() bool {\n\tif o != nil && o.State != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "1570d4fa0c47573d2e00859411ecc104", "score": "0.5506513", "text": "func (q userQuery) Exists(ctx context.Context, exec boil.ContextExecutor) (bool, error) {\n\tvar count int64\n\n\tqueries.SetSelect(q.Query, nil)\n\tqueries.SetCount(q.Query)\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Query.QueryRowContext(ctx, exec).Scan(&count)\n\tif err != nil {\n\t\treturn false, errors.Wrap(err, \"dal: failed to check if user exists\")\n\t}\n\n\treturn count > 0, nil\n}", "title": "" } ]
b6ce0a1ba6c4b99c1c78fd126ac494e0
GetVcode by email/phone Returns empty string if not found or empty string
[ { "docid": "028e17c508b03420467dd072549e6346", "score": "0.59674984", "text": "func GetVcode(lgn string) (string, int, error) {\n\tvcode := \"\"\n\tretry := 0\n\n\t// *SliceCmd\n\t// []interface{}\n\tarr, err := pool.HMGet(lgn, \"vcode\", \"retry\").Result()\n\n\t// 127.0.0.1:6379> HMGET asdf \"vcode\" \"retry\"\n\t// 1) \"41576\"\n\t// 2) (nil)\n\n\tif err != nil{\n\t\treturn vcode, retry, err\n\t\t// if err == redis.Nil {\n\t\t// \t// return empty string\t\t\t\n\t\t// \treturn \"\", nil\n\n\t\t// \t// need to check later: can not be nil or empty string\n\t\t// }\n\n\t\t// return \"\", err\n\t}\n\n\t// For every field that does not exist in the hash, a nil value is returned. Because a non-existing keys are treated as empty hashes, running HMGET against a non-existing key will return a list of nil values\n\n\tif arr[0] == nil {\n\t\treturn vcode, retry, ErrLgnNotFound\n\t}\n\t\n\tvcode = arr[0].(string)\n\n\tvar retryStr string\n\tif arr[1] == nil {\n\t\tretryStr = \"0\"\n\t} else {\n\t\tretryStr = arr[1].(string)\n\t}\n\n\tretry, errConv := strconv.Atoi(retryStr)\n\n\tif errConv != nil { return vcode, retry, errConv }\n\t\n\t//fmt.Println(\"vcode\", vcode, retry)\n\t\n\treturn vcode, retry, nil\n}", "title": "" } ]
[ { "docid": "77b1814e5dd5cb91e519b3c776d74bbc", "score": "0.5558814", "text": "func (gate LoginGate) GetVRCode(cookies []*http.Cookie, token string) {\n\tgateURL, err := url.Parse(gate.GateURL)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treq, _ := http.NewRequest(\"GET\", gateURL.Scheme+\"://\"+gateURL.Hostname()+\"/CheckCode.aspx\", nil)\n\tfor _, v := range cookies {\n\t\treq.AddCookie(v)\n\t}\n\t// 获取验证码\n\t// var verifyCode string\n\tc := &http.Client{}\n\tres, err := c.Do(req)\n\tif err != nil {\n\t\tos.Exit(1)\n\t}\n\tfile, er := os.Create(\"./example/\" + token + \".gif\")\n\tif er != nil {\n\t\tos.Exit(1)\n\t}\n\tio.Copy(file, res.Body)\n}", "title": "" }, { "docid": "c0adcb59c39f8c4a4b832b29eb65514b", "score": "0.55391884", "text": "func GetSignupCode(ctx context.Context, email string) (string, error) {\n\tvar theSignup Signup\n\tclient, err := datastore.NewClient(ctx, config.ProjectID)\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"could not create datastore client: %v\", err)\n\t}\n\n\tquery := datastore.NewQuery(\"Signup\").\n\t\tFilter(\"email =\", email)\n\n\tit := client.Run(ctx, query)\n\tfor {\n\t\t_, err := it.Next(&theSignup)\n\t\tif err == iterator.Done {\n\t\t\tbreak\n\t\t}\n\t\tif err != nil {\n\t\t\treturn \"\", fmt.Errorf(\"signup not in DB: %v\", err)\n\t\t}\n\t\treturn theSignup.VerificationCode, nil\n\t}\n\treturn \"\", fmt.Errorf(\"signup not in DB: %v\", err)\n}", "title": "" }, { "docid": "39b0c0d3ab9369bb39a39df89751554c", "score": "0.53495324", "text": "func GetMobileVerificationCode(req dto.NewMobileVerificationRequest, id string) *dto.ErrResponce {\n\tvar response dto.ErrResponce\n\tif req.Mobile == \"\" {\n\t\treturn &dto.ErrResponce{\n\t\t\tMessage: \"Enter all required fields\",\n\t\t\tStatus: false,\n\t\t}\n\t}\n\tif utils.MobileNumberValidation(req.Mobile) == false {\n\t\treturn &dto.ErrResponce{\n\t\t\tMessage: \"Your mobile number is invalid\",\n\t\t\tStatus: false,\n\t\t}\n\t}\n\tmbReq := dto.NewMobileVerificationRequest{\n\t\tMobile: req.Mobile,\n\t}\n\terr := dbhandler.SendMobileVerificationCode(mbReq.Mobile, id)\n\tif err != nil {\n\t\tresponse = dto.ErrResponce{\n\t\t\tMessage: err.Message,\n\t\t\tStatus: false,\n\t\t}\n\t} else {\n\t\tresponse = dto.ErrResponce{\n\t\t\tMessage: \"Please enter OTP sent to your mobile number to verify\",\n\t\t\tStatus: true,\n\t\t}\n\t}\n\treturn &response\n}", "title": "" }, { "docid": "e14cc33e4becd532ec21104ba7a8fa2e", "score": "0.52870905", "text": "func GetByEmail(name string) GITSVNUser {\n\treturn getData(\"email\", name)\n}", "title": "" }, { "docid": "195ad5ac99806c1dbbfb719ba27bd82e", "score": "0.52407664", "text": "func (d *Dao) PhoneVerification(c context.Context, phone string, requestNo int64, ts time.Time) (msg string, err error) {\n\tparam := url.Values{}\n\tparam.Set(\"appkey\", _unicomAppKey)\n\tparam.Set(\"apptx\", strconv.FormatInt(requestNo, 10))\n\tparam.Set(\"method\", _unicomMethodNumber)\n\tparam.Set(\"timestamp\", ts.Format(\"2006-01-02 15:04:05\"))\n\tparam.Set(\"usernumber\", phone)\n\turlVal := d.urlParams(param)\n\turlVal = urlVal + \"&\" + d.sign(urlVal)\n\tvar res struct {\n\t\tCode string `json:\"respcode\"`\n\t\tMsg string `json:\"respdesc\"`\n\t}\n\tif err = d.unicomHTTPGet(c, d.unicomFlowExchangeURL+\"?\"+urlVal, nil, &res); err != nil {\n\t\tlog.Error(\"unicom phone url(%v) error(%v)\", d.unicomFlowExchangeURL+\"?\"+urlVal, err)\n\t\treturn\n\t}\n\tb, _ := json.Marshal(&res)\n\tlog.Info(\"unicom phone url(%v) response(%s)\", d.unicomFlowExchangeURL+\"?\"+urlVal, b)\n\tmsg = res.Msg\n\tif res.Code != \"0000\" {\n\t\terr = ecode.String(res.Code)\n\t\tlog.Error(\"unicom phone url(%v) code(%v) msg(%v)\", d.unicomFlowExchangeURL+\"?\"+urlVal, res.Code, res.Msg)\n\t\treturn\n\t}\n\treturn\n}", "title": "" }, { "docid": "028ce32e09dc18dfec3b2bf56febedca", "score": "0.51924354", "text": "func Phone(code string) string {\n\tc, err := GetCountry(code)\n\tif err != nil {\n\t\treturn \"\"\n\t}\n\treturn c.Phone\n}", "title": "" }, { "docid": "0715d6ac55eb6eaf5dbda4afc051c264", "score": "0.5109649", "text": "func getCountry(phone string) string {\n\t//regexp.Match return bool and error. If phone number match regular expression then return true\n\tcameroon, _ := regexp.Match(`237[2368]\\d{7,8}$`, []byte(phone))\n\tethiopia, _ := regexp.Match(`251[1-59]\\d{8}$`, []byte(phone))\n\tmorocco, _ := regexp.Match(`212[5-9]\\d{8}$`, []byte(phone))\n\tmozambique, _ := regexp.Match(`258[28]\\d{7,8}$`, []byte(phone))\n\tuganda, _ := regexp.Match(`256\\d{9}$`, []byte(phone))\n\n\t//case true return country value\n\tswitch {\n\tcase cameroon:\n\t\treturn \"Cameroon\"\n\tcase ethiopia:\n\t\treturn \"Ethiopia\"\n\tcase morocco:\n\t\treturn \"Morocco\"\n\tcase mozambique:\n\t\treturn \"Mozambique\"\n\tcase uganda:\n\t\treturn \"Uganda\"\n\t}\n\n\t//empty if no match\n\treturn \"\"\n}", "title": "" }, { "docid": "3c45a56f9160b29e07edfd311adaf931", "score": "0.5069132", "text": "func (h *Handler) findUserByPhone(phone string) (*pb.User, error) {\n\t// Validate request\n\tif len(phone) == 0 {\n\t\treturn nil, errors.BadRequest(\"dev.viqchat.users.service\", \"Missing Phone\")\n\t}\n\n\t//Get the records\n\t// recs, err := h.store.Read(\"\", store.ReadWhere(&store.Fields{\n\t// \"phone\": phone,\n\t// }))\n\trecs, err := h.store.Read(\"\", store.ReadPrefix())\n\tif err != nil {\n\t\treturn nil, errors.InternalServerError(\"dev.viqchat.users.service\", \"Could not read from store: %v\", err)\n\t}\n\tif len(recs) == 0 {\n\t\treturn nil, errors.NotFound(\"dev.viqchat.users.service\", \"Users not found\")\n\t}\n\n\t// Decode the user\n\tvar json = jsoniter.ConfigCompatibleWithStandardLibrary\n\tfor _, r := range recs {\n\t\tvar user *pb.User\n\t\tif err := json.Unmarshal(r.Value, &user); err != nil {\n\t\t\treturn nil, errors.InternalServerError(\"dev.viqchat.users.service\", \"Could not unmarshal user: %v\", err)\n\t\t}\n\t\tif user.Phone == phone {\n\t\t\treturn user, nil\n\t\t}\n\t}\n\n\treturn nil, errors.NotFound(\"dev.viqchat.users.service\", \"User not found\")\n}", "title": "" }, { "docid": "5f0dad70a8b8ae549769e514b12c7630", "score": "0.50381476", "text": "func GetCompanyCode(stub shim.ChaincodeStubInterface, erpsystem string, cc string) (CompanyCode, string) {\r\n\tccRecord, _ := db.TableStruct{Stub: stub, TableName: util.TAB_COMPANYCODE, PrimaryKeys: []string{erpsystem, cc}, Data: \"\"}.Get()\r\n\tvar companyCode CompanyCode\r\n\terr := json.Unmarshal([]byte(ccRecord), &companyCode)\r\n\tif err != nil {\r\n\t\tmyLogger.Debugf(\"ERROR in parsing input company code:\", err, ccRecord)\r\n\t\treturn companyCode, \"ERROR in parsing input company code\"\r\n\t}\r\n\treturn companyCode, \"\"\r\n}", "title": "" }, { "docid": "9e08dedcd4b4b01587f5b748ab294f0c", "score": "0.4858071", "text": "func (s *QueryServer) GetEvmCode(contract string) ([]byte, error) {\n\tcontractAddr, err := loom.ParseAddress(contract)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tsnapshot := s.StateProvider.ReadOnlyState()\n\tdefer snapshot.Release()\n\n\tvm := levm.NewLoomVm(snapshot, nil, nil, nil, false)\n\treturn vm.GetCode(contractAddr)\n}", "title": "" }, { "docid": "e0b1683324e0fcc009655abd337c0da9", "score": "0.4811091", "text": "func (m *ParticipantInfo) GetCountryCode()(*string) {\n return m.countryCode\n}", "title": "" }, { "docid": "1474fb75a54e2ea71bab4e1451589c19", "score": "0.4808386", "text": "func LookupVAT(code string) int {\n\tc, found := LookupVATCountry(code)\n\tif found {\n\t\treturn c.VAT\n\t}\n\n\treturn 0\n}", "title": "" }, { "docid": "de5732a5bf33798dcf3cf72e49993010", "score": "0.4784558", "text": "func SearchEmailMIT(email string, client *http.Client) (*openpgp.Entity, error) {\n\tresults, err := doSearch(email, client)\n\tif err != nil || len(results) < 1 {\n\t\treturn nil, err\n\t}\n\tbestGuessKeyURL := results[0]\n\tkey, err := fetchKey(bestGuessKeyURL, client)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor _, i := range key.Identities {\n\t\tif i.UserId.Email == email {\n\t\t\treturn key, nil\n\t\t}\n\t}\n\treturn nil, errors.New(\"Identity mismatch\")\n}", "title": "" }, { "docid": "9e0801dd8554efaddf8b9f7f3163096d", "score": "0.47666663", "text": "func (m *VendorModel) GetByPincode(pincode, pincodeRange int) ([]*models.Vendor, error) {\n\tstmt := `SELECT vendor_id, vendor_name, vendor_pincode, vendor_gps_lat, vendor_gps_long, vendor_email, vendor_address, vendor_phone\n\tFROM vendors\n\tWHERE vendor_pincode > ?\n\tAND vendor_pincode < ?`\n\n\trows, err := m.DB.Query(stmt, pincode-pincodeRange, pincode+pincodeRange)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer rows.Close()\n\n\tvendors := []*models.Vendor{}\n\n\tfor rows.Next() {\n\t\tv := &models.Vendor{}\n\t\terr = rows.Scan(&v.ID, &v.Name, &v.Pincode, &v.GpsLat, &v.GpsLong, &v.Email, &v.Address, &v.Phone)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tvendors = append(vendors, v)\n\t}\n\treturn vendors, nil\n}", "title": "" }, { "docid": "3e3e1fd0508f0d6eecc6dd84957ad055", "score": "0.47447914", "text": "func (m *accountVerify) UserPhone() *string {\n\treturn m.userPhoneField\n}", "title": "" }, { "docid": "b62a9aa77150b1d8c145f0ec3536ce5b", "score": "0.47369418", "text": "func (o *ChargebackPaymentByExternalKeyNotFound) Code() int {\n\treturn 404\n}", "title": "" }, { "docid": "f916013db913604d4025ddec9eff7ae8", "score": "0.47315374", "text": "func (a *Auth) VerifyEmailVer(client *firestore.Client) http.HandlerFunc {\n\treturn func(res http.ResponseWriter, req *http.Request) {\n\t\tvar payload struct {\n\t\t\tEmail string\n\t\t\tCode string\n\t\t}\n\n\t\terr := json.NewDecoder(req.Body).Decode(&payload)\n\t\tif err != nil {\n\t\t\tutils.ResError(res, http.StatusInternalServerError, err)\n\t\t\treturn\n\t\t}\n\n\t\tdb := NewDBRepo(client)\n\t\tresult, err := db.FindOneByField(\"emailver\", \"Email\", payload.Email)\n\t\tif err != nil {\n\t\t\tutils.ResError(res, http.StatusInternalServerError, err)\n\t\t\treturn\n\t\t}\n\n\t\tverified := strconv.FormatInt(result[\"Code\"].(int64), 10) == payload.Code\n\n\t\tif verified == true {\n\t\t\terr = db.DeleteByID(\"emailver\", result[\"ID\"].(string))\n\t\t\tif err != nil {\n\t\t\t\tutils.ResError(res, http.StatusInternalServerError, err)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tres.Write([]byte(fmt.Sprint(verified)))\n\t\t} else {\n\t\t\tres.Write([]byte(fmt.Sprint(verified)))\n\t\t}\n\t}\n}", "title": "" }, { "docid": "a54ade204e0ecab3fe5cecdf2af5ac31", "score": "0.4718245", "text": "func (m *ServiceProvisioningResourceErrorDetail) GetCode()(*string) {\n val, err := m.GetBackingStore().Get(\"code\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*string)\n }\n return nil\n}", "title": "" }, { "docid": "38e5613cce9afe6f95d853ec8b2ac0f5", "score": "0.47104847", "text": "func (d *Dao) VIPActive(c context.Context, subID int) (msg string, err error) {\n\tparams := url.Values{}\n\tparams.Set(\"subId\", strconv.Itoa(subID))\n\tvar res struct {\n\t\tCode int `json:\"code\"`\n\t\tData string `json:\"data\"`\n\t}\n\tif err = d.client.Get(c, d.vipActiveURL, \"\", params, &res); err != nil {\n\t\treturn\n\t}\n\tif res.Code != ecode.OK.Code() {\n\t\terr = errors.Wrap(ecode.Int(res.Code), d.vipActiveURL+\"?\"+params.Encode())\n\t\treturn\n\t}\n\tmsg = res.Data\n\treturn\n}", "title": "" }, { "docid": "d74328a8fc8b3aa1059122c0b72fa421", "score": "0.47027633", "text": "func (client *XenClient) VIFGetByUuid(uuid string) (result string, err error) {\n\tobj, err := client.APICall(\"VIF.get_by_uuid\", uuid)\n\tif err != nil {\n\t\treturn\n\t}\n\tresult = obj.(string)\n\treturn\n}", "title": "" }, { "docid": "3f3ad4248a5a72e3c840bb69b4bdbfa0", "score": "0.4698351", "text": "func (t *SimpleChaincode) update_vin(stub shim.ChaincodeStubInterface, v Claim, caller string, caller_affiliation string, new_value string) ([]byte, error) {\r\n\r\n\tnew_vin, err := strconv.Atoi(string(new_value)) \t\t // will return an error if the new vin contains non numerical chars\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tif err != nil || len(string(new_value)) != 15 { return nil, errors.New(\"Invalid value passed for new VIN\") }\r\n\r\n\tif \t\t//v.Status\t\t\t== STATE_MANUFACTURE\t&&\r\n\t\t\tv.Owner\t\t\t\t== caller\t\t\t\t&&\r\n\t\t\t//caller_affiliation\t== MANUFACTURER\t\t\t&&\r\n\t\t\t//v.VIN\t\t\t\t== 0\t\t\t\t\t&&\t\t\t// Can't change the VIN after its initial assignment\r\n\t\t\tv.Settled\t\t\t== false\t\t\t\t{\r\n\r\n\t\t\t\t\tv.VIN = new_vin\t\t\t\t\t// Update to the new value\r\n\t} else {\r\n\r\n return nil, errors.New(fmt.Sprintf(\"Permission denied. update_vin %v %v %v %v %v\", v.Status, STATE_IDENTITY_INSPECTION , v.Owner, caller, v.VIN, v.Settled))\r\n\r\n\t}\r\n\r\n\t_, err = t.save_changes(stub, v)\t\t\t\t\t\t// Save the changes in the blockchain\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tif err != nil { fmt.Printf(\"UPDATE_VIN: Error saving changes: %s\", err); return nil, errors.New(\"Error saving changes\") }\r\n\r\n\treturn nil, nil\r\n\r\n}", "title": "" }, { "docid": "1e8f36ab72cd0adb685a9a80096cf324", "score": "0.46776265", "text": "func GetCountryNameFromPhone(phoneNumber string) (countryName string, err error) {\n\t//strip + from starting\n\tphoneNumber = strings.TrimSpace(phoneNumber)\n\tphoneNumber = strings.TrimLeft(phoneNumber, \"+\")\n\n\t//check minimum length\n\tif len(phoneNumber) < 7 {\n\t\treturn \"\", errors.New(\"Minimum length of a number should be atleast 7 digit\")\n\t}\n\n\t//handle special cases\n\tswitch phoneNumber[0:1] {\n\tcase \"1\":\n\t\tc, ok := phoneMap[phoneNumber[0:4]]\n\t\tif ok {\n\t\t\treturn c, nil\n\t\t}\n\t\treturn \"\", fmt.Errorf(\"No country found with country code %s\", phoneNumber[0:4])\n\n\tcase \"3\":\n\t\tif phoneNumber[0:2] == \"39\" && phoneNumber[0:5] == \"39066\" {\n\t\t\treturn phoneMap[\"39066\"], nil\n\t\t}\n\n\tcase \"4\":\n\t\t//Guernsey\n\t\tif phoneNumber[0:6] == \"441481\" || phoneNumber[0:6] == \"447839\" ||\n\t\t\tphoneNumber[0:6] == \"447911\" {\n\t\t\treturn phoneMap[\"39066\"], nil\n\t\t}\n\t\t//Isle of Man\n\t\tif phoneNumber[0:6] == \"441624\" || phoneNumber[0:6] == \"447524\" ||\n\t\t\tphoneNumber[0:6] == \"447624\" || phoneNumber[0:6] == \"447924\" {\n\t\t\treturn phoneMap[\"447924\"], nil\n\t\t}\n\t\t//Jersey\n\t\tif phoneNumber[0:6] == \"441534\" || phoneNumber[0:6] == \"447509\" ||\n\t\t\tphoneNumber[0:6] == \"447797\" || phoneNumber[0:6] == \"447937\" ||\n\t\t\tphoneNumber[0:6] == \"447700\" || phoneNumber[0:6] == \"447829\" {\n\t\t\treturn phoneMap[\"447829\"], nil\n\t\t}\n\tcase \"6\":\n\t\tif phoneNumber[0:4] == \"6721\" {\n\t\t\treturn phoneMap[\"6721\"], nil\n\t\t}\n\t\tif phoneNumber[0:4] == \"6723\" {\n\t\t\treturn phoneMap[\"6723\"], nil\n\t\t}\n\t\t//Christmas Island\n\t\tif phoneNumber[0:7] == \"6189162\" {\n\t\t\treturn phoneMap[\"6189162\"], nil\n\t\t}\n\t\t//Christmas Island\n\t\tif phoneNumber[0:7] == \"6189164\" {\n\t\t\treturn phoneMap[\"6189164\"], nil\n\t\t}\n\tcase \"7\":\n\t\tif phoneNumber[0:2] == \"76\" || phoneNumber[0:2] == \"77\" {\n\t\t\treturn phoneMap[phoneNumber[0:2]], nil\n\t\t}\n\t\treturn phoneMap[\"7\"], nil\n\t}\n\tc, ok := phoneMap[phoneNumber[0:2]]\n\tif ok {\n\t\treturn c, nil\n\t}\n\tc, ok = phoneMap[phoneNumber[0:3]]\n\tif ok {\n\t\treturn c, nil\n\t}\n\treturn \"\", fmt.Errorf(\"No country code found for %s\", phoneNumber)\n}", "title": "" }, { "docid": "9873af958d82aa646f7e44abed4c16f9", "score": "0.46723923", "text": "func (o *BookingReservationModel) GetExternalCodeOk() (*string, bool) {\n\tif o == nil || o.ExternalCode == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ExternalCode, true\n}", "title": "" }, { "docid": "7921b45f4daaa548fbc8bf62a283a5bf", "score": "0.46460336", "text": "func CaptchaByPhoneAndCode(db XODB, phone, code string) (*Captcha, error) {\n\tvar err error\n\n\t// sql query\n\tconst sqlstr = `SELECT ` +\n\t\t`id, phone, code ` +\n\t\t`FROM news.captchas ` +\n\t\t`WHERE phone = ? AND code = ?`\n\n\t// run query\n\tXOLog(sqlstr, phone, code)\n\tc := Captcha{\n\t\t_exists: true,\n\t}\n\n\terr = db.QueryRow(sqlstr, phone, code).Scan(&c.ID, &c.Phone, &c.Code)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &c, nil\n}", "title": "" }, { "docid": "6b59649474056ee3288cbf17c3e8000b", "score": "0.46180576", "text": "func (m *User) GetPostalCode()(*string) {\n val, err := m.GetBackingStore().Get(\"postalCode\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*string)\n }\n return nil\n}", "title": "" }, { "docid": "c45ce0de0c68390d60a85b1a3d4f223a", "score": "0.4599709", "text": "func (fs *FireStore) VerifyCode(ctx context.Context, attrs *domain.RegistrationAttrs) (bool, error) {\n\tdoc := fmt.Sprintf(\"musers/%s\", attrs.MobileNumber)\n\tmuser := fs.Doc(doc)\n\n\terr := fs.RunTransaction(ctx, func(ctx context.Context, tx *firestore.Transaction) error {\n\t\tdoc, err := tx.Get(muser)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tcode, err := doc.DataAt(\"verification_code\")\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tpin, err := doc.DataAt(\"pin\")\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tverified, err := doc.DataAt(\"first_verified_on\")\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tblocked, err := doc.DataAt(\"blocked\")\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tok := code == attrs.VerificationCode && pin == attrs.Pin && blocked == false\n\t\tif ok {\n\t\t\tif verified == nil {\n\t\t\t\treturn tx.Update(muser, []firestore.Update{\n\t\t\t\t\t{Path: \"verified\", Value: true},\n\t\t\t\t\t{Path: \"first_verified_on\", Value: time.Now()},\n\t\t\t\t\t{Path: \"last_verified_on\", Value: time.Now()},\n\t\t\t\t})\n\t\t\t} else {\n\t\t\t\treturn tx.Update(muser, []firestore.Update{\n\t\t\t\t\t{Path: \"verified\", Value: true},\n\t\t\t\t\t{Path: \"last_verified_on\", Value: time.Now()},\n\t\t\t\t})\n\t\t\t}\n\t\t}\n\t\treturn errors.New(\"incorrect code or status\")\n\t})\n\n\tif err != nil {\n\t\treturn false, err\n\t}\n\n\treturn true, nil\n}", "title": "" }, { "docid": "e1336e5cbb6d38f9043d6e019ea197c7", "score": "0.45916367", "text": "func (s *Service) VerifyMagicLink(ctx context.Context, email, code string, username *string) (AuthOutput, error) {\n\tvar auth AuthOutput\n\n\temail = strings.TrimSpace(email)\n\temail = strings.ToLower(email)\n\tif !reEmail.MatchString(email) {\n\t\treturn auth, ErrInvalidEmail\n\t}\n\n\tif !reUUID.MatchString(code) {\n\t\treturn auth, ErrInvalidVerificationCode\n\t}\n\n\tif username != nil && !reUsername.MatchString(*username) {\n\t\treturn auth, ErrInvalidUsername\n\t}\n\n\terr := crdb.ExecuteTx(ctx, s.DB, nil, func(tx *sql.Tx) error {\n\t\tvar createdAt time.Time\n\t\tquery := \"SELECT created_at FROM email_verification_codes WHERE email = $1 AND code = $2\"\n\t\trow := tx.QueryRowContext(ctx, query, email, code)\n\t\terr := row.Scan(&createdAt)\n\t\tif err == sql.ErrNoRows {\n\t\t\treturn ErrVerificationCodeNotFound\n\t\t}\n\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"could not sql query select verification code: %w\", err)\n\t\t}\n\n\t\tif isVerificationCodeExpired(createdAt) {\n\t\t\treturn ErrExpiredToken\n\t\t}\n\n\t\tvar avatar sql.NullString\n\t\tquery = \"SELECT id, username, avatar FROM users WHERE email = $1\"\n\t\trow = tx.QueryRowContext(ctx, query, email)\n\t\terr = row.Scan(&auth.User.ID, &auth.User.Username, &avatar)\n\t\tif err == sql.ErrNoRows {\n\t\t\tif username == nil {\n\t\t\t\treturn ErrUserNotFound\n\t\t\t}\n\n\t\t\tquery := \"INSERT INTO users (email, username) VALUES ($1, $2) RETURNING id\"\n\t\t\trow := tx.QueryRowContext(ctx, query, email, username)\n\t\t\terr := row.Scan(&auth.User.ID)\n\t\t\tif isUniqueViolation(err) {\n\t\t\t\tif strings.Contains(err.Error(), \"email\") {\n\t\t\t\t\treturn ErrEmailTaken\n\t\t\t\t}\n\n\t\t\t\tif strings.Contains(err.Error(), \"username\") {\n\t\t\t\t\treturn ErrUsernameTaken\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"could not sql insert user at magic link: %w\", err)\n\t\t\t}\n\n\t\t\tauth.User.Username = *username\n\n\t\t\treturn nil\n\t\t}\n\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"could not sql query select user from verification code email: %w\", err)\n\t\t}\n\n\t\tauth.User.AvatarURL = s.avatarURL(avatar)\n\n\t\treturn nil\n\t})\n\tif err != nil {\n\t\treturn auth, err\n\t}\n\n\tauth.ExpiresAt = time.Now().Add(authTokenTTL)\n\tauth.Token, err = s.codec().EncodeToString(auth.User.ID)\n\tif err != nil {\n\t\treturn auth, fmt.Errorf(\"could not create auth token: %w\", err)\n\t}\n\n\tgo func() {\n\t\t_, err := s.DB.Exec(\"DELETE FROM email_verification_codes WHERE email = $1 AND code = $2\", email, code)\n\t\tif err != nil {\n\t\t\t_ = s.Logger.Log(\"error\", fmt.Errorf(\"could not delete verification code: %w\", err))\n\t\t\treturn\n\t\t}\n\t}()\n\n\treturn auth, nil\n}", "title": "" }, { "docid": "a50526046005a690143ab5d2ae724d28", "score": "0.4590852", "text": "func (o AdConnectorOfficeSiteOutput) VerifyCode() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *AdConnectorOfficeSite) pulumi.StringPtrOutput { return v.VerifyCode }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "948577e4bd29e13f7dd604b0378b69a9", "score": "0.45871267", "text": "func (d *Dao) SendSmsCode(c context.Context, phone string) (msg string, err error) {\n\tvar (\n\t\tkey = []byte(_broadbandPass)\n\t\tphoneByte = []byte(phone)\n\t\tuserid string\n\t)\n\tuserid, err = d.desEncrypt(phoneByte, key)\n\tif err != nil {\n\t\tlog.Error(\"d.desEncrypt error(%v)\", err)\n\t\treturn\n\t}\n\tparams := url.Values{}\n\tparams.Set(\"cpid\", _cpid)\n\tparams.Set(\"userid\", string(userid))\n\tparams.Set(\"apptype\", _apptype)\n\tvar res struct {\n\t\tCode string `json:\"resultcode\"`\n\t\tMsg string `json:\"errorinfo\"`\n\t}\n\tif err = d.unicomHTTPGet(c, d.sendsmscodeURL, params, &res); err != nil {\n\t\tlog.Error(\"unicom sendsmscode url(%v) error(%v)\", d.sendsmscodeURL+\"?\"+params.Encode(), err)\n\t\treturn\n\t}\n\tb, _ := json.Marshal(&res)\n\tlog.Info(\"unicom sendsmscode url(%v) response(%s)\", d.sendsmscodeURL+\"?\"+params.Encode(), b)\n\tif res.Code != \"0\" {\n\t\terr = ecode.String(res.Code)\n\t\tmsg = res.Msg\n\t\tlog.Error(\"unicom sendsmscode url(%v) code(%s) Msg(%s)\", d.sendsmscodeURL+\"?\"+params.Encode(), res.Code, res.Msg)\n\t\treturn\n\t}\n\treturn\n}", "title": "" }, { "docid": "e5ebce664915bb5472c6fd34b55fe521", "score": "0.45870617", "text": "func ZBRPRNGetSDKVsn() (success SuccessReturn) {\n panic(\"ZBRPRNGetSDKVsn not implemented\")\n ret, _, _ := zBRPRNGetSDKVsn.Call(\n )\n return SuccessReturn(ret)\n}", "title": "" }, { "docid": "6dc7a1fa309dd98abe7b76487ce75d1c", "score": "0.45860103", "text": "func VerfiyConfirmCode(userHandler service.UserHandlerer) echo.HandlerFunc {\n\treturn func(c echo.Context) error {\n\t\t// Get the nickname for the token.\n\t\tvar confirm = struct {\n\t\t\tEmail string `json:\"email\"`\n\t\t\tCode string `json:\"code\"`\n\t\t}{}\n\t\terr := c.Bind(&confirm)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif confirm.Email == \"\" || confirm.Code == \"\" {\n\t\t\treturn c.JSON(http.StatusBadRequest, map[string]string{\n\t\t\t\t\"message\": \"invalid email or code\",\n\t\t\t})\n\t\t}\n\n\t\tuser := models.User{Email: confirm.Email, ConfirmCode: confirm.Code}\n\t\tif ok, err := userHandler.IsRegistered(user); !ok {\n\t\t\treturn c.JSON(http.StatusBadRequest, map[string]string{\n\t\t\t\t\"message\": \"User not found\",\n\t\t\t})\n\t\t} else if err != nil {\n\t\t\treturn c.JSON(http.StatusInternalServerError, map[string]string{\n\t\t\t\t\"error\": err.Error(),\n\t\t\t})\n\t\t}\n\t\tif ok, err := userHandler.VerifyConfirmCode(user); err != nil {\n\t\t\tapiError := config.APIError(\"error while confirming link\", http.StatusBadRequest, err)\n\t\t\treturn c.JSON(http.StatusBadRequest, apiError)\n\t\t} else if ok {\n\t\t\treturn c.NoContent(http.StatusOK)\n\t\t}\n\t\treturn c.NoContent(http.StatusBadRequest)\n\t}\n}", "title": "" }, { "docid": "3973bcbc7623e645d9521a7597ff6bf2", "score": "0.45816272", "text": "func (o *ChargebackReversalPaymentByExternalKeyNotFound) Code() int {\n\treturn 404\n}", "title": "" }, { "docid": "640010c33cc3b156a4e31ac04f1df2f9", "score": "0.45704737", "text": "func (o *BookingReservationModel) GetExternalCode() string {\n\tif o == nil || o.ExternalCode == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.ExternalCode\n}", "title": "" }, { "docid": "5b1cc7cf46ee013df3ae64bdd54d627f", "score": "0.45679608", "text": "func search(vehicle map[string]string)(map[string]string, error){\n var fname, lname, pnumber string\n // call readInput function\n license, err := readInput(\"Enter a license plate to search: \")\n if err != nil {\n return nil, fmt.Errorf(\"Error with license plate search!\")\n }\n \n // split first name, last name and phone number if it's already exist\n if _, ok := vehicle[license]; ok { \n vecInfo := strings.Split(vehicle[license], \", \")\n for i := 0; i < 3; i++ { \n fname = vecInfo[0]\n lname = vecInfo[1]\n pnumber = vecInfo[2] \n }\n fmt.Printf(\"\\n%s\\n%s\\n%s\\n\\n\", fname, lname, pnumber) \n } else { \n fmt.Println(\"\\nThe license plate number does not exist!\\n\\n\")\n }\n \n return vehicle, err\n}", "title": "" }, { "docid": "2c1c1ef0b2824f1de68a3bbf8ef56413", "score": "0.45650047", "text": "func (o *PartnersResponsePartners) GetCode() string {\n\tif o == nil || o.Code.Get() == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn *o.Code.Get()\n}", "title": "" }, { "docid": "d3cc59d37b28f46c09f0a03b987205f8", "score": "0.4559884", "text": "func Code(v string) predicate.Sample {\n\treturn predicate.Sample(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldCode), v))\n\t})\n}", "title": "" }, { "docid": "e46e9e603cdd61f3dd6b694ae61ea1a8", "score": "0.45573556", "text": "func (p *FakePhone) ExchangeCode() string {\n\treturn random.PickString(p.ExchangeCodes)\n}", "title": "" }, { "docid": "e7a59909b1c2894bf7f570f4b546e73e", "score": "0.45523024", "text": "func (p *para) getDownloadCode(res *http.Response) error {\r\n\tbody, _ := ioutil.ReadAll(res.Body)\r\n\trFilename := regexp.MustCompile(`confirm\\=([\\w\\s\\S]+?)\"`)\r\n\tmatches := rFilename.FindAllStringSubmatch(string(body), -1)\r\n\tif len(matches) == 0 {\r\n\t\treturn fmt.Errorf(\"file ID [ %s ] cannot be downloaded\", p.ID)\r\n\t}\r\n\tp.Code = matches[0][1]\r\n\treturn nil\r\n}", "title": "" }, { "docid": "747e0c40d51594c979ff038ee799e471", "score": "0.4534837", "text": "func (u ContractCodeEntryBody) GetCode() (result []byte, ok bool) {\n\tarmName, _ := u.ArmForSwitch(int32(u.BodyType))\n\n\tif armName == \"Code\" {\n\t\tresult = *u.Code\n\t\tok = true\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "ed1b62bc08368a16a7bd173480572e06", "score": "0.4532314", "text": "func (a VoicemailApi) GetVoicemailSearch(q64 string, expand []string) (*Voicemailssearchresponse, *APIResponse, error) {\n\tvar httpMethod = \"GET\"\n\t// create path and map variables\n\tpath := a.Configuration.BasePath + \"/api/v2/voicemail/search\"\n\tdefaultReturn := new(Voicemailssearchresponse)\n\tif true == false {\n\t\treturn defaultReturn, nil, errors.New(\"This message brought to you by the laws of physics being broken\")\n\t}\n\n\t// verify the required parameter 'q64' is set\n\tif &q64 == nil {\n\t\t// false\n\t\treturn defaultReturn, nil, errors.New(\"Missing required parameter 'q64' when calling VoicemailApi->GetVoicemailSearch\")\n\t}\n\n\theaderParams := make(map[string]string)\n\tqueryParams := make(map[string]string)\n\tformParams := url.Values{}\n\tvar postBody interface{}\n\tvar postFileName string\n\tvar fileBytes []byte\n\t// authentication (PureCloud OAuth) required\n\n\t// oauth required\n\tif a.Configuration.AccessToken != \"\"{\n\t\theaderParams[\"Authorization\"] = \"Bearer \" + a.Configuration.AccessToken\n\t}\n\t// add default headers if any\n\tfor key := range a.Configuration.DefaultHeader {\n\t\theaderParams[key] = a.Configuration.DefaultHeader[key]\n\t}\n\t\n\tqueryParams[\"q64\"] = a.Configuration.APIClient.ParameterToString(q64, \"\")\n\t\n\tqueryParams[\"expand\"] = a.Configuration.APIClient.ParameterToString(expand, \"multi\")\n\t\n\n\t// Find an replace keys that were altered to avoid clashes with go keywords \n\tcorrectedQueryParams := make(map[string]string)\n\tfor k, v := range queryParams {\n\t\tif k == \"varType\" {\n\t\t\tcorrectedQueryParams[\"type\"] = v\n\t\t\tcontinue\n\t\t}\n\t\tcorrectedQueryParams[k] = v\n\t}\n\tqueryParams = correctedQueryParams\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{ \"application/json\", }\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := a.Configuration.APIClient.SelectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\theaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\n\t\t\"application/json\",\n\t}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := a.Configuration.APIClient.SelectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\theaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\tvar successPayload *Voicemailssearchresponse\n\tresponse, err := a.Configuration.APIClient.CallAPI(path, httpMethod, postBody, headerParams, queryParams, formParams, postFileName, fileBytes)\n\tif err != nil {\n\t\t// Nothing special to do here, but do avoid processing the response\n\t} else if err == nil && response.Error != nil {\n\t\terr = errors.New(response.ErrorMessage)\n\t} else if response.HasBody {\n\t\tif \"Voicemailssearchresponse\" == \"string\" {\n\t\t\tcopy(response.RawBody, &successPayload)\n\t\t} else {\n\t\t\terr = json.Unmarshal(response.RawBody, &successPayload)\n\t\t}\n\t}\n\treturn successPayload, response, err\n}", "title": "" }, { "docid": "fafc6d134a9edfc25554353d27dc8b24", "score": "0.4531312", "text": "func (c *PersonAPI) Phone(value string, webhook *Webhook) (*PersonResponse, error) {\n\treturn c.search(\"phone\", value, webhook)\n}", "title": "" }, { "docid": "1a098860ce33ea4f0a8618ff46fc3c28", "score": "0.45287335", "text": "func CodeEQ(v string) predicate.Sample {\n\treturn predicate.Sample(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldCode), v))\n\t})\n}", "title": "" }, { "docid": "6ce4ddb0b42ff1197446a783212cc610", "score": "0.4517523", "text": "func UUID() (string, error) {\n\tre, err := regexp.Compile(\"window.QRLogin.code = (\\\\d+); window.QRLogin.uuid = \\\"(\\\\S+?)\\\"\")\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tqueryParams := url.Values{}\n\tqueryParams.Add(\"appid\", appid)\n\tqueryParams.Add(\"fun\", \"new\")\n\tqueryParams.Add(\"lang\", \"en_US\")\n\tqueryParams.Add(\"_\", strconv.FormatInt(time.Now().Unix(), 10))\n\tqueryString := queryParams.Encode()\n\n\trequest, err := http.NewRequest(\"GET\", endpointUUID+\"?\"+queryString, nil)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tresponse, err := clientManager.client.Do(withDefaultHeader(request))\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tdefer response.Body.Close()\n\n\tbody, err := ioutil.ReadAll(response.Body)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tmatches := re.FindAllStringSubmatch(string(body), -1)\n\tlog.Printf(\"Get regex match result: %v\", matches)\n\tif matches != nil && len(matches[0]) == 3 && matches[0][1] == \"200\" {\n\t\treturn matches[0][2], nil\n\t}\n\treturn \"\", fmt.Errorf(\"Received code %s\", matches[0][1])\n}", "title": "" }, { "docid": "b560b882a0df8dda212a4e7d4b7f5c60", "score": "0.45133182", "text": "func getUserAuthCode() (authCode string) {\n\n\tfmt.Printf(\"Auth code: \")\n\tfmt.Scanf(\"%s\", &authCode)\n\treturn authCode\n}", "title": "" }, { "docid": "f84630f5385d1a55c286d656f4cc9268", "score": "0.4512798", "text": "func VerifyEmail(w http.ResponseWriter, r *http.Request, ps map[string]string) {\n\tw.Header().Set(\"Content-Type\", \"application/javascript\")\n\n\tuserId := validateNumeric(w, ps[\"id\"])\n\tif userId <= 0 {\n\t\treturn\n\t}\n\n\tif jwt, ok := user.VerifyEmail(userId, ps[\"code\"]); ok {\n\t\tsendJson(w, misc.Jwt{jwt}, http.StatusOK)\n\t} else {\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t}\n}", "title": "" }, { "docid": "9bada5906a784456ee2d79f211802003", "score": "0.4509015", "text": "func (m *CustomerAddressMutation) Phone() (r string, exists bool) {\n\tv := m.phone\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "title": "" }, { "docid": "60ceafe4d903ab5ffc22c43d36abebee", "score": "0.45076013", "text": "func (rpc *MoacRPC) MoacGetCode(address, block string) (string, error) {\n\tvar code string\n\n\terr := rpc.call(\"mc_getCode\", &code, address, block)\n\treturn code, err\n}", "title": "" }, { "docid": "acd85166d98700b77351f0d387f1d602", "score": "0.45021504", "text": "func (t *TokenStore) GetByCode(ctx context.Context, code string) (oauth2.TokenInfo, error) {\n\tif code == \"\" {\n\t\treturn nil, nil\n\t}\n\n\tvar item struct{ Data string }\n\terr := t.db.Table(t.tableName).Select(\"data\").Where(\"code = ?\", code).Scan(&item).Error\n\tif err != nil {\n\t\tif gorm.IsRecordNotFoundError(err) {\n\t\t\treturn nil, nil\n\t\t}\n\t\treturn nil, err\n\t}\n\n\treturn t.parseTokenData(item.Data)\n}", "title": "" }, { "docid": "1d902068108b4604bc52d43178e597e5", "score": "0.44807217", "text": "func (m *User) GetMobilePhone()(*string) {\n val, err := m.GetBackingStore().Get(\"mobilePhone\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*string)\n }\n return nil\n}", "title": "" }, { "docid": "25cca4e8e8c4af188cbefaaa41aff0c2", "score": "0.44800594", "text": "func (client *XenClient) VIFGetUuid(self string) (result string, err error) {\n\tobj, err := client.APICall(\"VIF.get_uuid\", self)\n\tif err != nil {\n\t\treturn\n\t}\n\tresult = obj.(string)\n\treturn\n}", "title": "" }, { "docid": "6fdf0995d4e0b898478c2a191242e5e4", "score": "0.44790688", "text": "func (o *OptVIVC) Code() OptionCode {\n\treturn OptionVendorIdentifyingVendorClass\n}", "title": "" }, { "docid": "7d5755826b4327cb637a6fedada3de6a", "score": "0.4472454", "text": "func (t *RoamingSolutionChaincode) VPMNQuery(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\r\n var key, jsonResp string\r\n var err error\r\n\r\n if len(args) != 2 {\r\n return nil, errors.New(\"Incorrect number of arguments. Expecting 2 argument\")\r\n }\r\n\r\n key = args[0]+args[1]\r\n valAsbytes, err := stub.GetState(key)\r\n if err != nil {\r\n jsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + key + \"\\\"}\"\r\n return nil, errors.New(jsonResp)\r\n } else if len(valAsbytes) == 0{\r\n\t jsonResp = \"{\\\"Error\\\":\\\"Failed to get Query for \" + key + \"\\\"}\"\r\n return nil, errors.New(jsonResp)\r\n\t}\r\n\r\n\tfmt.Println(\"Query VPMN Call Event Written confirmation ... end\") \r\n return valAsbytes, nil \r\n\r\n}", "title": "" }, { "docid": "a6cd035361979c13376657e7223cacb2", "score": "0.446856", "text": "func (d *Dao) SmsNumber(c context.Context, phone string, code int) (usermob string, msg string, err error) {\n\tvar (\n\t\tkey = []byte(_broadbandPass)\n\t\tphoneByte = []byte(phone)\n\t\tuserid string\n\t)\n\tuserid, err = d.desEncrypt(phoneByte, key)\n\tif err != nil {\n\t\tlog.Error(\"d.desEncrypt error(%v)\", err)\n\t\treturn\n\t}\n\tparams := url.Values{}\n\tparams.Set(\"cpid\", _cpid)\n\tparams.Set(\"userid\", userid)\n\tparams.Set(\"vcode\", strconv.Itoa(code))\n\tparams.Set(\"apptype\", _apptype)\n\tvar res struct {\n\t\tCode string `json:\"resultcode\"`\n\t\tUsermob string `json:\"userid\"`\n\t\tMsg string `json:\"errorinfo\"`\n\t}\n\tif err = d.unicomHTTPGet(c, d.smsNumberURL, params, &res); err != nil {\n\t\tlog.Error(\"unicom smsNumberURL url(%v) error(%v)\", d.smsNumberURL+\"?\"+params.Encode(), err)\n\t\treturn\n\t}\n\tb, _ := json.Marshal(&res)\n\tlog.Info(\"unicom sendsmsnumber url(%v) response(%s)\", d.smsNumberURL+\"?\"+params.Encode(), b)\n\tif res.Code != \"0\" {\n\t\terr = ecode.String(res.Code)\n\t\tmsg = res.Msg\n\t\tlog.Error(\"unicom sendsmsnumber url(%v) code(%s) Msg(%s)\", d.smsNumberURL+\"?\"+params.Encode(), res.Code, res.Msg)\n\t\treturn\n\t}\n\tusermob = res.Usermob\n\treturn\n}", "title": "" }, { "docid": "5e3b2dc2f7209a62585544e6450d3f22", "score": "0.44628388", "text": "func (t *SimpleChaincode) Search(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\tvar key string\n\n\tfmt.Println(\"running Search()\")\n\tif len(args) != 1 {\n\t\treturn shim.Error(\"Incorrect number of arguments. Expecting 1\")\n\t}\n\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\tfmt.Println(\"Recovered in Search\", r)\n\t\t}\n\t}()\n\n\tkey = args[0] // ProdID\n\t//co.Timestamp = makeTimestamp()\n\t//mo.Timestamp = makeTimestamp()\n\n\t//Check if ProdID exist\n\tmatchAsBytes, err := stub.GetState(key)\n\tif err != nil {\n\t\treturn shim.Error(\"Failed to get record\")\n\t}\n\n\t// get string list of chaincode arguments.\n\t/*data := stub.GetStringArgs()\n\tfor z := range data {\n\t\tfmt.Println(\"in the chain: \", data[z])\n\t}*/\n\t\n\tmo := &ManufRetail{}\n\n\t//Find match between records\n\tjson.Unmarshal(matchAsBytes, &co)\n\t//json.Unmarshal(matchAsBytes, &mo)\n\n\t//msg := string(co.ProdID) + \" \" + string(mo.ID)\n\t//fmt.Println(msg)\n\t//fmt.Println(key)\n\tif mo.ID == key {\n\t\tfmt.Println(\"Product ID match found in customer & manufacture records, given search key:\" + key)\n\t\tjsonmsg := string(matchAsBytes)\n\n\t\tfmt.Println(\"Manufacture record\", jsonmsg)\n\t\treturn shim.Error(\"Match found between product ID's\")\n\t}\n\tfmt.Println(\"Match not found between product ID's\")\n\tfmt.Println(mo.ID)\n\n\treturn shim.Error(\"Received unknown search function invocation\")\n}", "title": "" }, { "docid": "25bd4233049bf8c1eec1ab4bd0ab893f", "score": "0.44617286", "text": "func (e Endpoints) Verify(ctx context.Context, phone string, code string) (message string, status string, data interface{}, err error) {\n\trequest := VerifyRequest{\n\t\tCode: code,\n\t\tPhone: phone,\n\t}\n\tresponse, err := e.VerifyEndpoint(ctx, request)\n\tif err != nil {\n\t\treturn\n\t}\n\treturn response.(VerifyResponse).Message, response.(VerifyResponse).Status, response.(VerifyResponse).Data, response.(VerifyResponse).Err\n}", "title": "" }, { "docid": "53a27ae7b74831ae00b2368d94d63be0", "score": "0.44611236", "text": "func (u *UserRepo) FindByReferralCode(referralCode string) (*model.ReferralCodeVerifyResponse, error) {\n\tvar user = new(model.ReferralCodeVerifyResponse)\n\tsql := `SELECT \"user\".\"first_name\", \"user\".\"last_name\", \"user\".\"referral_code\", \"user\".\"username\"\n\tFROM \"users\" AS \"user\" \n\tWHERE (\"user\".\"referral_code\" = ? and deleted_at is null)`\n\t_, err := u.db.QueryOne(user, sql, referralCode)\n\tif err != nil {\n\t\tu.log.Warn(\"UserRepo Error\", zap.Error(err))\n\t\treturn nil, apperr.New(http.StatusNotFound, \"400 not found\")\n\t}\n\treturn user, nil\n}", "title": "" }, { "docid": "521642e0525e6cba15c534a098d0a5ec", "score": "0.4460855", "text": "func (v *goVoxGlue) SearchHostNetworkInterfaceByName(hostIface string) (string, error) {\n if len(hostIface) == 0 {\n return \"\", errors.Errorf(\"[ERR] empty host interface input\")\n }\n var (\n cHostIface = C.CString(hostIface)\n cNameFound *C.char = nil\n nameFound string = \"\"\n )\n\n result := C.VBoxHostSearchNetworkInterfaceByName(v.cvboxglue, cHostIface, &cNameFound)\n if result != VBGlue_Ok {\n return \"\", errors.Errorf(\"[ERR] unable to host interface for %s. Reason : %v\", hostIface, C.GoString(C.VBoxGetErrorMessage(v.cvboxglue)))\n }\n\n nameFound = C.GoString(cNameFound)\n C.free(unsafe.Pointer(cHostIface))\n if cNameFound != nil {\n C.free(unsafe.Pointer(cNameFound))\n }\n\n return nameFound, nil\n}", "title": "" }, { "docid": "81c9a9d352c9fb90beaab25524a19e08", "score": "0.4458444", "text": "func (m *CustomerMutation) Phone() (r string, exists bool) {\n\tv := m.phone\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "title": "" }, { "docid": "153fe8179d27dcca1fe24750cec7b79a", "score": "0.44569743", "text": "func (u *User) FindByEmail(email string) (code int, err error) {\n mConn := mymongo.Conn()\n defer mConn.Close()\n\n c := mConn.DB(\"\").C(DBTableUser)\n\n err = c.Find(bson.M{\"email\": email}).One(u)\n if err != nil {\n if err == mgo.ErrNotFound {\n code = ErrNotFound\n } else {\n code = ErrDatabase\n }\n } else {\n code = 0\n }\n return\n}", "title": "" }, { "docid": "6aecece8000255384c22e72f29531796", "score": "0.44518352", "text": "func Telephonenumber(v string) predicate.Doctorinfo {\n\treturn predicate.Doctorinfo(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldTelephonenumber), v))\n\t})\n}", "title": "" }, { "docid": "c88464719ccf4f44a517f22845b0f994", "score": "0.44512078", "text": "func VerifyMobile(req dto.MobileVerifyCode, id string) *dto.ErrResponce {\n\tvar response dto.ErrResponce\n\tif req.Code == \"\" || req.Mobile == \"\" {\n\t\treturn &dto.ErrResponce{\n\t\t\tMessage: \"Enter all required fields\",\n\t\t\tStatus: false,\n\t\t}\n\t}\n\tverify := domain.MobileVerification{\n\t\tMobileNumber: req.Mobile,\n\t\tCode: req.Code,\n\t\tUserId: id,\n\t}\n\terr := dbhandler.VerifyMobileNo(verify)\n\tif err != nil {\n\t\tresponse = dto.ErrResponce{\n\t\t\tMessage: err.Message,\n\t\t\tStatus: false,\n\t\t}\n\t} else {\n\t\tresponse = dto.ErrResponce{\n\t\t\tMessage: \"Mobile Verification Successfull\",\n\t\t\tStatus: true,\n\t\t}\n\t}\n\treturn &response\n}", "title": "" }, { "docid": "b2d02800c222527b922d424fd06b0153", "score": "0.44504055", "text": "func (o *GetInvoiceNotFound) Code() int {\n\treturn 404\n}", "title": "" }, { "docid": "1f05fe361a100d70063a10343bfec154", "score": "0.44477898", "text": "func GetEmailVerification(id string) (userUUID int, email string, err error) {\n\trows, err := db.Query(\"SELECT useruuid, email FROM email WHERE uuid=?\", id)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tdefer rows.Close()\n\n\trows.Next()\n\terr = rows.Scan(&userUUID, &email)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tif userUUID != 0 && email != \"\" {\n\t\t_, err = db.Exec(\"DELETE FROM email WHERE uuid=?\", id)\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "024d81e744addabcce64c8371ec513fe", "score": "0.44444463", "text": "func (pck *RedirectPacket) findValue(key string) string {\n\tredirectAddr := strings.ToUpper(pck.redirectAddr)\n\tstart := strings.Index(redirectAddr, key)\n\tif start < 0 {\n\t\treturn \"\"\n\t}\n\tend := strings.Index(redirectAddr[start:], \")\")\n\tif end < 0 {\n\t\treturn \"\"\n\t}\n\tend = start + end\n\tsubstr := pck.redirectAddr[start:end]\n\twords := strings.Split(substr, \"=\")\n\tif len(words) == 2 {\n\t\treturn strings.TrimSpace(words[1])\n\t} else {\n\t\treturn \"\"\n\t}\n}", "title": "" }, { "docid": "be60e403fab0cb163f320ed75e6b0e9e", "score": "0.44414145", "text": "func (ga *GoogleAuth) GetQrcode(user, secret, stype string) string {\n return fmt.Sprintf(\"otpauth://totp/%s:%s?issuer=%s&secret=%s\", stype, user, stype, secret)\n}", "title": "" }, { "docid": "d41ce4db456f9d08eacac5136e119643", "score": "0.44368887", "text": "func (c *Client) GetUserByPhoneNumber(ctx context.Context, phone string) (*UserRecord, error) {\n\tif err := validatePhone(phone); err != nil {\n\t\treturn nil, err\n\t}\n\trequest := &identitytoolkit.IdentitytoolkitRelyingpartyGetAccountInfoRequest{\n\t\tPhoneNumber: []string{phone},\n\t}\n\treturn c.getUser(ctx, request)\n}", "title": "" }, { "docid": "d41ce4db456f9d08eacac5136e119643", "score": "0.44368887", "text": "func (c *Client) GetUserByPhoneNumber(ctx context.Context, phone string) (*UserRecord, error) {\n\tif err := validatePhone(phone); err != nil {\n\t\treturn nil, err\n\t}\n\trequest := &identitytoolkit.IdentitytoolkitRelyingpartyGetAccountInfoRequest{\n\t\tPhoneNumber: []string{phone},\n\t}\n\treturn c.getUser(ctx, request)\n}", "title": "" }, { "docid": "2141e112d7887c3c0f2f3897b5477e0b", "score": "0.44300172", "text": "func (m *BookingCustomerInformation) GetPhone()(*string) {\n return m.phone\n}", "title": "" }, { "docid": "7c4ed778873d42b562b37c7deae08165", "score": "0.4427293", "text": "func (t *CarChaincode) getOwner(stub shim.ChaincodeStubInterface, vin string) (string, error) {\n\tcarIndex, err := t.getCarIndex(stub)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn carIndex[vin], nil\n}", "title": "" }, { "docid": "ae34f59049eab21e73e848339d5ea468", "score": "0.44149703", "text": "func TelephonenumberEQ(v string) predicate.Doctorinfo {\n\treturn predicate.Doctorinfo(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldTelephonenumber), v))\n\t})\n}", "title": "" }, { "docid": "a8795cfa09899c961b5bfb59318ebb97", "score": "0.4412328", "text": "func (o *PartnersResponsePartners) GetPhone() string {\n\tif o == nil || o.Phone.Get() == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Phone.Get()\n}", "title": "" }, { "docid": "6dfdcb779b03d5daed204a8adf71f209", "score": "0.44118944", "text": "func (o ContactDetailsResponseOutput) Phone() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ContactDetailsResponse) string { return v.Phone }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "540f574acf430f32086ea58143eafe20", "score": "0.44089815", "text": "func (s *TokenStore) GetByCode(ctx context.Context, code string) (oauth2.TokenInfo, error) {\n\tif code == \"\" {\n\t\treturn nil, nil\n\t}\n\n\tvar item TokenStoreItem\n\tif err := s.adapter.SelectOne(ctx, &item, fmt.Sprintf(\"SELECT * FROM %s WHERE code = $1\", s.tableName), code); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn s.toTokenInfo(item.Data)\n}", "title": "" }, { "docid": "798b1c33f03fad3cea01e8bde5b463bc", "score": "0.44072935", "text": "func (p *pkceCode) Verifier() string {\n\treturn p.verifier\n}", "title": "" }, { "docid": "0fd1cf217b2878bf769c26853930292a", "score": "0.44020456", "text": "func (s *Service) GetInfoByCode(c context.Context, req *api.GetInfoByCodeReq) (resp *api.GetInfoByCodeReply, err error) {\n\tplatform := parsePlatform(req.Platform)\n\tif platform == 0 || !s.isAppID(platform, req.AppId) {\n\t\treturn nil, ecode.RequestErr\n\t}\n\n\tvar (\n\t\tinfo *model.Oauth2Info\n\t\tmid int64\n\t)\n\tswitch platform {\n\tcase model.PlatformQQ:\n\t\tif info, err = s.d.QQOauth2Info(c, req.Code, req.RedirectUrl, s.AppMap[platform][req.AppId]); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\tcase model.PlatformWEIBO:\n\t\tif info, err = s.d.WeiboOauth2Info(c, req.Code, req.RedirectUrl, s.AppMap[platform][req.AppId]); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\tsnsUser, err := s.d.SnsUserByUnionID(c, info.UnionID, platform)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif snsUser != nil {\n\t\tmid = snsUser.Mid\n\t}\n\n\tproto := &model.Oauth2Proto{\n\t\tMid: mid,\n\t\tPlatform: int32(platform),\n\t\tUnionID: info.UnionID,\n\t\tOpenID: info.OpenID,\n\t\tToken: info.Token,\n\t\tExpires: info.Expires,\n\t\tAppID: req.AppId,\n\t}\n\tif err = s.d.SetOauth2Cache(c, info.OpenID, req.Platform, proto); err != nil {\n\t\treturn nil, err\n\t}\n\n\tlog.Info(\"GetInfoByCode request(%+v) response (%+v)\", req, &api.GetInfoByCodeReply{\n\t\tMid: mid,\n\t\tUnionId: info.UnionID,\n\t\tOpenId: info.OpenID,\n\t\tExpires: info.Expires,\n\t\tToken: info.Token,\n\t})\n\treturn &api.GetInfoByCodeReply{\n\t\tMid: mid,\n\t\tUnionId: info.UnionID,\n\t\tOpenId: info.OpenID,\n\t\tExpires: info.Expires,\n\t\tToken: info.Token,\n\t}, nil\n}", "title": "" }, { "docid": "e2c2a723be6f1bc44e7de3abe19d12ce", "score": "0.4401574", "text": "func (ah *authHandler) CertifyPhoneWithCode(c *gin.Context) {\n\treq := new(certifyPhoneWithCodeRequest)\n\tif err := ah.bindRequest(req, c); err != nil {\n\t\tc.JSON(http.StatusBadRequest, defaultResp(http.StatusBadRequest, 0, err.Error()))\n\t\treturn\n\t}\n\n\tswitch err := ah.aUsecase.CertifyPhoneWithCode(c.Request.Context(), req.PhoneNumber, req.CertifyCode); tErr := err.(type) {\n\tcase nil:\n\t\tresp := defaultResp(http.StatusOK, 0, \"succeed to certify phone with certify code\")\n\t\tc.JSON(http.StatusOK, resp)\n\tcase domain.UsecaseError:\n\t\tc.JSON(tErr.Status, defaultResp(tErr.Status, tErr.Code, tErr.Error()))\n\tdefault:\n\t\tmsg := errors.Wrap(err, \"CertifyPhoneWithCode return unexpected error\").Error()\n\t\tc.JSON(http.StatusInternalServerError, defaultResp(http.StatusInternalServerError, 0, msg))\n\t}\n\treturn\n}", "title": "" }, { "docid": "ed6162962a244b7493c2fab0c5e744ce", "score": "0.44014356", "text": "func (s *EmailTemplateService) FindByCode(req *appDTO.ETFindByCodeReqDTO, i identity.Identity) (*appDTO.ETFindByCodeResDTO, error) {\n\t// authorization\n\tif (i.CanAccessCurrentRequest() == false) && (i.CanAccess(\"\", \"system.module.email.template.findbycode\", \"READ\", nil) == false) {\n\t\terrMsg := fmt.Sprintf(\"You are not authorized to access [`%s.%s`]\",\n\t\t\ti.RequestInfo.RequestObject, i.RequestInfo.RequestAction)\n\t\treturn nil, sysError.CustomForbiddenAccess(errMsg)\n\t}\n\n\t// request domain\n\treqDom := domSchema.ETFindByCodeRequest{\n\t\tCode: req.Code,\n\t}\n\n\tif err := reqDom.Validate(); err != nil {\n\t\treturn nil, err\n\t}\n\n\tres, err := s.repo.FindByCode(&reqDom, i)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// response dto\n\tresDTO := new(appDTO.ETFindByCodeResDTO)\n\tresDTO.Query = reqDom\n\tresDTO.Data = res.Data\n\n\treturn resDTO, nil\n}", "title": "" }, { "docid": "94b746fc9e5fc75668caafbd16a547dc", "score": "0.43956414", "text": "func (o NetworkOutput) MobileCountryCode() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *Network) pulumi.StringOutput { return v.MobileCountryCode }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "838f7a63582afb978e571b1765474370", "score": "0.43943626", "text": "func LookupVATCountry(code string) (*Country, bool) {\n\tfor _, country := range VATCountries {\n\t\tif country.Code == code {\n\t\t\treturn &country, true\n\t\t}\n\t}\n\n\treturn nil, false\n}", "title": "" }, { "docid": "aeeb7c955390b5cee473078568f3d049", "score": "0.43934038", "text": "func Verify(number, method string) (verification *Verification, err error) {\n\ttype Data struct {\n\t\tMethod string `json:\"method\"`\n\t\tPhone string `json:\"phone\"`\n\t}\n\n\ta := Account{}\n\tresp, err := a.Request(\"POST\", EndpointVerifications, Data{Method: method, Phone: number}, false)\n\n\tif err != nil {\n\t\treturn\n\t}\n\n\terr = json.Unmarshal(resp, &verification)\n\treturn\n}", "title": "" }, { "docid": "b91a53af362edfb7be762b62638d66fc", "score": "0.438973", "text": "func get(stub shim.ChaincodeStubInterface, args []string, fn string ) peer.Response {\n\t fmt.Println(\"- start get value\")\n\t \n\t return stub.InvokeChaincode(\"sandeepxooacbmcp6zid\", [][]byte{[]byte(fn),[]byte(args[0])}, \"chus-east-1-0433560f-ff8a-4fa4-b74d-6cc710897098\");\n\t\n }", "title": "" }, { "docid": "98bb702c2d1746b6c061d093a4e91f40", "score": "0.43891972", "text": "func ClientCountryCode(ctx context.Context) string {\n\theaders := map[string]string{\"Content-Type\": \"application/json\"}\n\n\tpage, err := RequestWebPage(ctx, \"https://ipapi.co/json\", nil, headers, nil)\n\tif err != nil {\n\t\treturn \"\"\n\t}\n\n\t// Extract the country code from the REST API results\n\tvar ipinfo struct {\n\t\tCountryCode string `json:\"country\"`\n\t}\n\n\tif err := json.Unmarshal([]byte(page), &ipinfo); err != nil {\n\t\treturn \"\"\n\t}\n\treturn strings.ToLower(ipinfo.CountryCode)\n}", "title": "" }, { "docid": "1e21d4873cc714232013b92d5043a6a8", "score": "0.4379382", "text": "func VerifyEmail(evpw, url_email string) *dto.ErrResponce {\n\tvar response dto.ErrResponce\n\tverify := domain.EmailVerification{\n\t\tEmail: url_email,\n\t\tCode: evpw,\n\t}\n\terr := dbhandler.VerifyEmail(verify)\n\tif err != nil {\n\t\tresponse = dto.ErrResponce{\n\t\t\tMessage: err.Message,\n\t\t\tStatus: false,\n\t\t}\n\t} else {\n\t\tresponse = dto.ErrResponce{\n\t\t\tMessage: \"Email Verified\",\n\t\t\tStatus: true,\n\t\t}\n\t}\n\treturn &response\n}", "title": "" }, { "docid": "c96eaf007eccb4ad2c8eb178681cdbde", "score": "0.43758985", "text": "func (f Faker) PhoneExchangeCode() string {\n\treturn randomElement(f.CurrentLocale().ExchangeCodes)\n}", "title": "" }, { "docid": "e27f2f1926b961dd21d0134d76dfed94", "score": "0.4369834", "text": "func (r *UserRepository) GetByPhone(ctx context.Context, phone string) (*entities.User, error) {\n\tvar u entities.User\n\tdbt := r.DB.Where(\"mobile = ?\", phone).Find(&u)\n\tif dbt.RecordNotFound() {\n\t\treturn nil, errors.Wrap(dbt.Error, \"user not found\")\n\t}\n\tif dbt.Error != nil {\n\t\treturn nil, errors.Wrap(dbt.Error, \"error getting user with the given ID\")\n\t}\n\treturn &u, nil\n}", "title": "" }, { "docid": "d003b18bca5b32718b72426f83c9e2e4", "score": "0.43673068", "text": "func GetCode(err error) (code int, found bool) {\n\tfor {\n\t\tcodeAware, ok := err.(codeAware_)\n\t\tif ok {\n\t\t\tcode = codeAware.GetCode()\n\t\t\tif 0 != code {\n\t\t\t\tfound = true\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\terr = errors.Unwrap(err)\n\t\tif nil == err {\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "12a651bb2ee1b27af46a2cf0ff6116ff", "score": "0.43613234", "text": "func GetResult(mac Mac) string {\n\tbase := \"http://api.macvendors.com/\"\n\turl := fmt.Sprint(base, url.QueryEscape(mac.Address))\n\n\treq, err := http.NewRequest(\"GET\", url, nil)\n\tCheckErr(\"Couldn't construct new request\", err)\n\n\tclient := &http.Client{}\n\n\tres, err := client.Do(req)\n\tCheckErr(\"Couldn't complete request\", err)\n\n\tdefer res.Body.Close()\n\tif res.StatusCode != http.StatusOK {\n\t\treturn \"something went wrong\"\n\t}\n\tb, _ := ioutil.ReadAll(res.Body)\n\treturn string(b)\n}", "title": "" }, { "docid": "ca9fc2d3a2860f0391a280e3ea4b51d8", "score": "0.43608135", "text": "func (gs *GreyhoundSearch) SearchCode(projectName, query string) []string {\n\t_, hasKey := gs.Projects[projectName]\n\tif hasKey {\n\t\treturn gs.Projects[projectName].CodeResults(query)\n\t}\n\treturn []string{\"no results found\"}\n}", "title": "" }, { "docid": "f6c615d08b674855eb106918e34f0b77", "score": "0.43597218", "text": "func (o ContactDetailsOutput) Phone() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ContactDetails) string { return v.Phone }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "94989064e44f5974542b1984e8104067", "score": "0.43557855", "text": "func OTPCodeByHeader(key string) func(*http.Request) string {\n\treturn func(r *http.Request) (code string) {\n\t\treturn r.Header.Get(key)\n\t}\n}", "title": "" }, { "docid": "83c9ac88ed57e03b99434afe57335a6f", "score": "0.4350454", "text": "func (p *osif_project) suss_info( search *string ) ( name *string, id *string, ip4 *string, fip4 *string, mac *string, gw *string, phost *string, gwmap map[string]*string ) {\n\n\tname = nil\n\tid = nil\n\tip4 = nil\n\n\tif p == nil || search == nil {\n\t\treturn\n\t}\n\n\tdup_str := *search\t\t\t\t\t\t\t// new string in case we need to pass it back as a return value\n\tsearch = &dup_str\n\n\tp.rwlock.RLock()\t\t\t\t\t\t\t// lock for reading\n\tdefer p.rwlock.RUnlock() \t\t\t\t\t// ensure unlocked on return\n\n\tif p.vm2ip[*search] != nil {\t\t\t\t// search is the name\n\t\tip4 = p.vm2ip[*search]\n\t\tname = search\n\t} else {\n\t\tif p.ip2vmid[*search] != nil {\t\t\t// name is actually an ip\n\t\t\tip4 = search\n\t\t\tid = p.ip2vmid[*ip4]\n\t\t\tname = p.ip2vm[*ip4]\n\t\t} else {\t\t\t\t\t\t\t\t// assume its an id or project/id\n\t\t\tif p.vmid2ip[*search] != nil {\t\t// id2ip shouldn't include project, but handle that case\n\t\t\t\tid = search\n\t\t\t\tip4 = p.vmid2ip[*id]\n\t\t\t\tname = p.ip2vm[*ip4]\n\t\t\t} else {\n\t\t\t\ttokens := strings.Split( *search, \"/\" )\t\t\t// could be id or project/id\n\t\t\t\tid = &tokens[0]\t\t\t\t\t\t\t\t\t// assume it's just the id and not project/id\n\t\t\t\tif len( tokens ) > 1 {\n\t\t\t\t\tid = &tokens[1]\n\t\t\t\t}\n\t\t\t\tif p.vmid2ip[*id] != nil {\n\t\t\t\t\tip4 = p.vmid2ip[*id]\n\t\t\t\t\tname = p.ip2vm[*ip4]\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\tif name == nil || ip4 == nil {\n\t\treturn\n\t}\n\n\tif id == nil {\n\t\tid = p.ip2vmid[*ip4]\n\t}\n\n\tfip4 = p.ip2fip[*ip4]\n\tgw = p.ip2gw( ip4 )\t\t\t\t\t// find the gateway for the VM\n\tmac = p.ip2mac[*ip4]\n\tphost = p.vmid2host[*id]\n\tgwmap = make( map[string]*string, len( p.gwmap ) )\n\tfor k, v := range p.gwmap {\n\t\tgwmap[k] = v\t\t\t\t\t// should be safe to reference the same string\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "ff8a8e3174bac3cd96bdee803cfa52b9", "score": "0.43495953", "text": "func (_ERC20Gateway *ERC20GatewayCaller) Vmc(opts *bind.CallOpts) (common.Address, error) {\n\tvar (\n\t\tret0 = new(common.Address)\n\t)\n\tout := ret0\n\terr := _ERC20Gateway.contract.Call(opts, out, \"vmc\")\n\treturn *ret0, err\n}", "title": "" }, { "docid": "150c78186c828076036dfe5365883953", "score": "0.43425173", "text": "func (z *zkf) GetVHost(subdomain string) (string, string, error) {\n\tlogger := plog.WithField(\"subdomain\", subdomain)\n\n\t// get the root-based connection to check the public port\n\tconn, err := zzk.GetLocalConnection(\"/\")\n\tif err != nil {\n\t\tlogger.WithError(err).Debug(\"Could not acquire root-based connection to look up a public endpoint vhost\")\n\t\treturn \"\", \"\", err\n\t}\n\n\t// look for the vhost\n\tkey := zkr.VHostKey{\n\t\tHostID: \"master\",\n\t\tSubdomain: subdomain,\n\t}\n\tserviceID, application, err := zkr.GetVHost(conn, key)\n\tif err != nil {\n\t\tlogger.WithError(err).Debug(\"Could not look up public endpoint vhost\")\n\t\treturn \"\", \"\", err\n\t}\n\n\tlogger.Debug(\"Searched for public endpoint vhost\")\n\treturn serviceID, application, err\n}", "title": "" }, { "docid": "bf8c7c420913e24337478f86b7584261", "score": "0.43366688", "text": "func getVanityPrime(vanity string) string {\n\tp, err := vanityPrime(vanity)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn \"\"\n\t}\n\n\treturn p.Text(16) + \"\\n\"\n}", "title": "" }, { "docid": "5782e7b7d556a4fef24bff0eb9011a1a", "score": "0.43359917", "text": "func (multiAddress MultiAddress) ValueForProtocol(code int) (string, error) {\n\tif code == RepublicCode {\n\t\treturn multiAddress.address.String(), nil\n\t}\n\treturn multiAddress.baseMultiAddress.ValueForProtocol(code)\n}", "title": "" }, { "docid": "9fc2bc5fad516cc48ee7356fbb7eb8c5", "score": "0.43359703", "text": "func (_ERC20Gateway *ERC20GatewayCallerSession) Vmc() (common.Address, error) {\n\treturn _ERC20Gateway.Contract.Vmc(&_ERC20Gateway.CallOpts)\n}", "title": "" }, { "docid": "36fa0e10c6a38acbe04d29630f318717", "score": "0.43353602", "text": "func (t *ManageVessel) getVessel_byOwner(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\r\n\tvar jsonResp, ownerPhoneNumber, errResp string\r\n\tvar vesselIndex []string\r\n\tvar valIndex Vessel\r\n\tfmt.Println(\"start getVessel_byOwner\")\r\n\tvar err error\r\n\tif len(args) != 1 {\r\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting owner name\")\r\n\t}\r\n\t// set buyer's name\r\n\townerPhoneNumber = args[0]\r\n\t//fmt.Println(\"buyerName\" + buyerName)\r\n\tvesselAsBytes, err := stub.GetState(VesselIndexStr)\r\n\tif err != nil {\r\n\t\treturn nil, errors.New(\"Failed to get Vessel index string\")\r\n\t}\r\n\t//fmt.Print(\"poAsBytes : \")\r\n\t//fmt.Println(poAsBytes)\r\n\tjson.Unmarshal(vesselAsBytes, &vesselIndex)\t\t\t\t\t\t\t\t//un stringify it aka JSON.parse()\r\n\t//fmt.Print(\"poIndex : \")\r\n\t//fmt.Println(poIndex)\r\n\t//fmt.Println(\"len(poIndex) : \")\r\n\t//fmt.Println(len(poIndex))\r\n\tjsonResp = \"{\"\r\n\tfor i,val := range vesselIndex{\r\n\t\tfmt.Println(strconv.Itoa(i) + \" - looking at \" + val + \" for getVessel_byOwner\")\r\n\t\tvalueAsBytes, err := stub.GetState(val)\r\n\t\tif err != nil {\r\n\t\t\terrResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + val + \"\\\"}\"\r\n\t\t\treturn nil, errors.New(errResp)\r\n\t\t}\r\n\t\t//fmt.Print(\"valueAsBytes : \")\r\n\t\t//fmt.Println(valueAsBytes)\r\n\t\tjson.Unmarshal(valueAsBytes, &valIndex)\r\n\t\t//fmt.Print(\"valIndex: \")\r\n\t\t//fmt.Print(valIndex)\r\n\t\tif valIndex.OwnerPhoneNumber == ownerPhoneNumber{\r\n\t\t\tfmt.Println(\"Owner found\")\r\n\t\t\tjsonResp = jsonResp + \"\\\"\"+ val + \"\\\":\" + string(valueAsBytes[:])\r\n\t\t\t//fmt.Println(\"jsonResp inside if\")\r\n\t\t\t//fmt.Println(jsonResp)\r\n\t\t\tif i < len(vesselIndex)-1 {\r\n\t\t\t\tjsonResp = jsonResp + \",\"\r\n\t\t\t}\r\n\t\t}\r\n\t\t\r\n\t}\r\n\tjsonResp = jsonResp + \"}\"\r\n\t//fmt.Println(\"jsonResp : \" + jsonResp)\r\n\t//fmt.Print(\"jsonResp in bytes : \")\r\n\t//fmt.Println([]byte(jsonResp))\r\n\tfmt.Println(\"end getVessel_byOwner\")\r\n\treturn []byte(jsonResp), nil\t\t\t\t\t\t\t\t\t\t\t//send it onward\r\n}", "title": "" }, { "docid": "7d990aa5abacffc458d2da52bb062939", "score": "0.4334091", "text": "func (o *Account) GetPhoneOk() (*string, bool) {\n\tif o == nil || o.Phone == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Phone, true\n}", "title": "" }, { "docid": "8f24d7977faad9e0a8ab654edf345ed7", "score": "0.4328712", "text": "func (client *XenClient) VUSBGetByUuid(uuid string) (result string, err error) {\n\tobj, err := client.APICall(\"VUSB.get_by_uuid\", uuid)\n\tif err != nil {\n\t\treturn\n\t}\n\tresult = obj.(string)\n\treturn\n}", "title": "" }, { "docid": "4f7e1bc63b0aefd0ba638bf912a96197", "score": "0.43275094", "text": "func (api *APIHandler) GetCode(ctx context.Context, groupID int, addr string) ([]byte, error) {\n\tvar raw interface{}\n\terr := api.CallContext(ctx, &raw, \"getCode\", groupID, addr)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tjs, err := json.MarshalIndent(raw, \"\", indent)\n\treturn js, err\n}", "title": "" } ]
2e356ac8f57418951813639ac966d3a3
WithHTTPClient adds the HTTPClient to the role privilege modify params
[ { "docid": "8982d9a07247c05f8602add21bbaffb6", "score": "0.73529047", "text": "func (o *RolePrivilegeModifyParams) WithHTTPClient(client *http.Client) *RolePrivilegeModifyParams {\n\to.SetHTTPClient(client)\n\treturn o\n}", "title": "" } ]
[ { "docid": "d12081e5c188aeed912e863fad3309ac", "score": "0.7273923", "text": "func (o *RolePrivilegeModifyParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "ca125a2713919159183a2da698f99361", "score": "0.67191356", "text": "func (o *UpdatePrivilegeParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "3eed235d5f0a48b0a866de5118803414", "score": "0.6640625", "text": "func (o *AddRolePermissionParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "27024128f0e3ad3c691e90ad0aaf343d", "score": "0.657101", "text": "func (o *CifsShareACLModifyParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "11bd05c5eef0b0ca2d24d3ff4683d772", "score": "0.6516842", "text": "func NewRolePrivilegeModifyParamsWithHTTPClient(client *http.Client) *RolePrivilegeModifyParams {\n\treturn &RolePrivilegeModifyParams{\n\t\tHTTPClient: client,\n\t}\n}", "title": "" }, { "docid": "459084c11fe3d22dc9086e8c29fca3fb", "score": "0.6505645", "text": "func (o *GetCustomRoleParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "43f935af5de713ae91e6c20bda794776", "score": "0.64468217", "text": "func (o *UpdatePrivilegeParams) WithHTTPClient(client *http.Client) *UpdatePrivilegeParams {\n\to.SetHTTPClient(client)\n\treturn o\n}", "title": "" }, { "docid": "849bbdf337cabf8eb5cf930470133465", "score": "0.6242404", "text": "func (o *DeleteRolePrivilegeParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "50cb93a139bdeaf9acc5cc8fccf8084f", "score": "0.61961883", "text": "func (o *PublicGetRolesV3Params) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "ee2618eb2946f9c943973d167528f0fb", "score": "0.61632323", "text": "func (o *UpdateAccessResourceParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "d7b63635d2a7f59c0a3b607f5632da02", "score": "0.61084247", "text": "func (o *CifsShareACLModifyParams) WithHTTPClient(client *http.Client) *CifsShareACLModifyParams {\n\to.SetHTTPClient(client)\n\treturn o\n}", "title": "" }, { "docid": "8cacb5da9ab159ab6f46b5c58cfa7025", "score": "0.6079742", "text": "func (o *EditCredentialsOrRefreshProviderAccountParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "933a21af7a2a83df4645e86ee3dfa297", "score": "0.606159", "text": "func WithHTTPClient(c *http.Client) Option {\n\treturn func(m *Manager) { m.client = c }\n}", "title": "" }, { "docid": "606ed5de96c53a562de72a36cee30efd", "score": "0.6061052", "text": "func (o *UpdateAPITokenByAdminIDParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "ac1def8872ebd22627428465194bcb0c", "score": "0.60433865", "text": "func (o *GetACLParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "32a5fdc4ebdaefade73c7636ee4bf204", "score": "0.6039752", "text": "func (o *PublicUpdateCustomAttributesPartiallyParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "705facc9a5664a3304b358df0f04bbdd", "score": "0.5995354", "text": "func (o *JobModifyParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "c8e859e5966d68c97cfecbbb81000733", "score": "0.5948618", "text": "func (o *GetClientGrantsParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "93a13d553ef4481cb6a55fff08d7dea1", "score": "0.59462583", "text": "func (o *ChangeCredentialInEnvironmentV1ByCrnParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "a8e86ceb2014884d0c8047db655508ea", "score": "0.59415406", "text": "func (o *SvmMigrationModifyParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "1d962e1bfc1e1f26b7cd42620e83d19c", "score": "0.5936749", "text": "func (o *GetGrantsParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "51ac56cd4e14017246414a293220e565", "score": "0.5932604", "text": "func (o *AdminUpdateMyUserV4Params) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "59b045ce0073590f024ba24012295c94", "score": "0.59239185", "text": "func (o *UpdateSecurityListParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "15565415bc180ca1d4af89da1e7368ea", "score": "0.5918556", "text": "func (o *AutoUpdateStatusModifyParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "bb5f0018998a92eb6c6f1981194ffced", "score": "0.5913179", "text": "func (o *DeleteRoleParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "0bfaaf013e28cc2a061bb7e444d5a44e", "score": "0.5891689", "text": "func (o *UpdateClientSecretParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "ef1fdfc481ed0c9b9fc1ab42e039b203", "score": "0.5889331", "text": "func (o *CreateRoleMemberParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "623fda28cca487875a8ef5a3a3049818", "score": "0.588799", "text": "func WithHTTPClient(httpclient *http.Client) ClientOption {\n\treturn func(client *clientImp) {\n\t\tclient.httpClient = httpclient\n\t}\n}", "title": "" }, { "docid": "1f19ec014e5df797216d31ccd37428ea", "score": "0.5869638", "text": "func (o *ListProjectsForAdminParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "d3dad9fb7026cc8d98707702237780f2", "score": "0.58636075", "text": "func (o *BindUserToClusterRoleV2Params) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "b41580be6bd9354e37e2cab3052791c3", "score": "0.5848535", "text": "func (o *AppleAPICredentialListParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "0467e2d5f6044eea5a171f15130f868e", "score": "0.5840207", "text": "func (o *AddOrUpdateConfigItemParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "ed5d8988e51f82578d5109d99a02dc89", "score": "0.5825979", "text": "func (o *UpdatePolicyParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "06177e1003c9febf5b53b2cdbe0f1e9c", "score": "0.58192354", "text": "func (o *UpdateKeyPairAttributesParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "130f02340458e858cdff10cd99b70784", "score": "0.5815323", "text": "func (o *WatchRbacAuthorizationV1alpha1NamespacedRoleBindingListParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "1b5d02fd826672ee8d5d76516649c19c", "score": "0.5814918", "text": "func (o *DeletePrivilegeParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "2f796b01ffd9ad99ee0851eb8d5b35ad", "score": "0.5814067", "text": "func (o *UpdateNetworkClientSplashAuthorizationStatusParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "aab1515c5f54c5960f9219cda3caf479", "score": "0.58091295", "text": "func (o *GetLolQueueEligibilityV3CustomParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "df2486454d2621a933ef02f92b282aa3", "score": "0.57996655", "text": "func (o *ChangeLoginUsingPUTParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "5fc77745a92f22121165bdbab42f4e62", "score": "0.5793219", "text": "func (o *GetLoggedInAthleteActivitiesParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "e64c58359c413a3e4e6c63b6dab962c8", "score": "0.57826746", "text": "func (o *PostLolLobbyV1LobbyInvitationsParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "2be20dfe93a99491176f3d8a3284fa0c", "score": "0.57769704", "text": "func WithHTTPClient(cl *http.Client) ClientOption {\n\treturn func(c *client) {\n\t\tc.cl = cl\n\t}\n}", "title": "" }, { "docid": "6b0d3dd729174e13c8a56914dfce88cd", "score": "0.5767864", "text": "func (o *UpdateModeParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "3dcb74b8ac6ab2c4feabd3b48f2aefbf", "score": "0.57640445", "text": "func (o *PostAPI24AdminsAPITokensParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "4df66508498bd46c642c9bffa21f63a9", "score": "0.57607025", "text": "func (o *GuestLoginUsingPUTParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "f60fc359b50abf527f8e1e5861c80e59", "score": "0.57604635", "text": "func (o *UpdateAlertmanagerParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "cd1bb510e7332518e302c320e58b6c52", "score": "0.5759636", "text": "func (o *AddRolePermissionParams) WithHTTPClient(client *http.Client) *AddRolePermissionParams {\n\to.SetHTTPClient(client)\n\treturn o\n}", "title": "" }, { "docid": "e0f7e2b63fcb2d329038552d8b265539", "score": "0.5749325", "text": "func (o *GetEndorsingRightsParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "800af1be6915ecf8fcd1c7b19834d2e0", "score": "0.57293636", "text": "func (o *UpdateSettingsKrb5RealmParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "cdb937e3775a981350902900f679744e", "score": "0.57279867", "text": "func (o *JobModifyParams) WithHTTPClient(client *http.Client) *JobModifyParams {\n\to.SetHTTPClient(client)\n\treturn o\n}", "title": "" }, { "docid": "d6495d18e3f88bd58e71986e5f2f6bba", "score": "0.572539", "text": "func (o *PutCredentialRotationsRotationIDParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "5dae995e7a34a61ace0ac72f386ad212", "score": "0.5723299", "text": "func (o *CreateOrResetUipasswordParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "fb0d97c4958f2ed95d051b2b190de788", "score": "0.5720619", "text": "func (o *GetDatabaseCredentialsDatabaseCredentialIDOperationsParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "1131deeeec431830c3fd76205fcf82e3", "score": "0.57119495", "text": "func (o *AddIngredientAndVersionsParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "c3b93359d2a90c8f8babe5993d4272da", "score": "0.5705581", "text": "func (o *UpdateAccessResourceParams) WithHTTPClient(client *http.Client) *UpdateAccessResourceParams {\n\to.SetHTTPClient(client)\n\treturn o\n}", "title": "" }, { "docid": "87b6601f4515d3169bd3a518f951c821", "score": "0.56910414", "text": "func (o *AddAlarmsParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "fcaa04f642f26921a32af4219e51da6c", "score": "0.5684656", "text": "func (o *PatchConsentGrantsParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "0ea3fae1659f67d478f0c1e3f8453e20", "score": "0.5681822", "text": "func (o *PutLolMissionsV1PlayerOptParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "78f5af7990d95adff136378f95b386fa", "score": "0.5674966", "text": "func (o *InteractiveLoginCredentialInWorkspaceParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "e2d6164df729574552e13e4ce960cacc", "score": "0.5664918", "text": "func (o *CreateCapabilityUsingPOSTParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "dd2d48229a97a23eca5c12d39231c555", "score": "0.56613874", "text": "func (o *PostIamLocalUserPasswordsMoidParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "a87f1dd5f2b225514852c245de604855", "score": "0.5660639", "text": "func (o *CreateAuditCredentialV1Params) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "3a967f007f227aba4cf460d399d3a699", "score": "0.5660072", "text": "func (o *ListRoleBindingV2Params) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "a88aba16625315ab0170de359e6749c1", "score": "0.5659332", "text": "func (o *DeleteV1IncidentRolesIncidentRoleIDParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "24b5f1155e927556879fefbb698c2e03", "score": "0.56569207", "text": "func (o *AuthorizeCodeGrantFlowBasedCredentialV1Params) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "b0bdcb5252908c694a5a26a1d7e7a679", "score": "0.56549084", "text": "func (o *CreateRuntimeCredentialParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "4cff80019ea22eb76b82d033ae886a86", "score": "0.563876", "text": "func (o *GetAccountCustomFieldsParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "6555292de8ac1bc0daf6a69832c8ee9a", "score": "0.56347924", "text": "func (o *GetIPPoolsCredentialIDParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "21172b3578683d77691515d8940e7d75", "score": "0.562538", "text": "func (o *AddIngredientVersionParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "1c4baf74d86cbb40c87f085a4413fbc8", "score": "0.56252813", "text": "func (o *PostTasksEditPhpParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "6b81338af71fad40fec461970223e1fa", "score": "0.56225693", "text": "func (o *ListProtectedEntitiesParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "fba2b6c642919d0907db8f58517f9863", "score": "0.5618698", "text": "func (o *GenerateLockerReferenceForEnvironmentUsingPOSTParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "832a505689091db618bbe0731959ff82", "score": "0.56184596", "text": "func (o *GetClusterCredentialsParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "2537300b141784a8eb4e281ebfddbfce", "score": "0.56146055", "text": "func (o *PutCustomFieldParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "c63cbbe26654f52374f056715c807dae", "score": "0.56135887", "text": "func (o *ChangeBalanceParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "664f9a1866c2ad28565af4cb225985bb", "score": "0.5607229", "text": "func (o *ForbidTokenParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "f751461b4977a785643b3e328d119f0b", "score": "0.56049526", "text": "func (o *PostFoldersEditPhpParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "fe656837cae17de0f217e474a9195651", "score": "0.5603843", "text": "func (o *CreateClusterAssessItemParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "c92f631bce41efe772ac6c1b214a981d", "score": "0.5601085", "text": "func (o *PostIPAMsubnetcategoryParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "0515856d682a5dffa0d9f75190aef186", "score": "0.55979997", "text": "func NewUpdatePrivilegeParamsWithHTTPClient(client *http.Client) *UpdatePrivilegeParams {\n\treturn &UpdatePrivilegeParams{\n\t\tHTTPClient: client,\n\t}\n}", "title": "" }, { "docid": "24eb7f0279d5f2fd1f577423cb7a6749", "score": "0.5593769", "text": "func (o *UpdateStatParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "317af838b4261f2e8f79157f2cff0567", "score": "0.55934286", "text": "func (o *UpdateNameCrnAndTypeParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "af37c09c60aff4fc66749a7d49e41953", "score": "0.55913043", "text": "func (o *AddMealParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "4bbd3aa4445fe44c79819efc24ea11d6", "score": "0.5589362", "text": "func (o *PutLolMissionsV1PlayerByMissionIDParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "4bbbcaf5c165f137c853d3b5dd0bb467", "score": "0.55863583", "text": "func (o *WeaviateKeysRenewTokenParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "ddb485b5479daac6af19c54d27238f4d", "score": "0.5582904", "text": "func (o *RemoveMemberParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "1526623bf651fe8f1f976bf6e171ec6f", "score": "0.55811113", "text": "func WithHTTPClient(httpClient *http.Client) Option {\n\treturn func(a *client) {\n\t\ta.httpClient = httpClient\n\t}\n}", "title": "" }, { "docid": "8727932f6b00dd772d0b191083a88baf", "score": "0.5574095", "text": "func (o *UserAgentsParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "6168d85d6992be1fe7566f8624881dfb", "score": "0.5568286", "text": "func (o *DeleteIpmioverlanPoliciesMoidParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "565981abe940b0e2ceec951cdf8f76e7", "score": "0.55667645", "text": "func (o *CatalogProductAttributeMediaGalleryManagementV1UpdatePutParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "8b31820bbd39f88526dab2b1fe5a3254", "score": "0.5564858", "text": "func (o *AddMetadataParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "c6b28d27df6b3bf461fdc1ee887a5776", "score": "0.55626565", "text": "func WithHTTPClient(client *http.Client) ClientOptionFunc {\n\treturn func(c *Client) {\n\t\tc.client = client\n\t}\n}", "title": "" }, { "docid": "fe534cc251f91536aea9f98c83cf640d", "score": "0.5561962", "text": "func (o *GetCompatablityMatrixUsingGETParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "017db9b515a14eedc1b97d651377bc35", "score": "0.55606455", "text": "func (o *PostHyperflexSysConfigPoliciesParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "12fbbbaed0a6cffdccc3482b6ac6c06c", "score": "0.5559395", "text": "func (o *AttestationOptionsParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "102e6c2ed2bca81b1f0c5b2ccf17fb39", "score": "0.55591506", "text": "func (o *PostExpenseParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "2c07bcf06d0cf60c710101c2e5a3bc1d", "score": "0.5558872", "text": "func (o *GetUMAGatherClaimsParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "943a2be4cc3789296a3bd8254315c47c", "score": "0.55576265", "text": "func (o *PerformGroupActionParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "a031e607e81405b759522f836a078898", "score": "0.55564004", "text": "func (o *ToggleLightParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" }, { "docid": "c6f4e8dec2d05e3f7588eafd6631540e", "score": "0.55563277", "text": "func (o *UpdateTenantVariablesSpacesParams) SetHTTPClient(client *http.Client) {\n\to.HTTPClient = client\n}", "title": "" } ]
44ad407d358e784b67f09717d44656b3
NewNetworkController returns a new NetworkController.
[ { "docid": "c60846520635e5b88bb27bbcb0a9c41d", "score": "0.76246434", "text": "func NewNetworkController(client clientset.Interface, provider networkprovider.Interface) *NetworkController {\n\te := &NetworkController{\n\t\tclient: client,\n\t\tqueue: workqueue.New(),\n\t\tnetProvider: provider,\n\t}\n\n\te.serviceStore.Store, e.serviceController = framework.NewInformer(\n\t\t&cache.ListWatch{\n\t\t\tListFunc: func(options api.ListOptions) (runtime.Object, error) {\n\t\t\t\treturn e.client.Core().Services(api.NamespaceAll).List(options)\n\t\t\t},\n\t\t\tWatchFunc: func(options api.ListOptions) (watch.Interface, error) {\n\t\t\t\treturn e.client.Core().Services(api.NamespaceAll).Watch(options)\n\t\t\t},\n\t\t},\n\t\t&api.Service{},\n\t\tFullServiceResyncPeriod,\n\t\tframework.ResourceEventHandlerFuncs{\n\t\t\tAddFunc: e.enqueueService,\n\t\t\tUpdateFunc: func(old, cur interface{}) {\n\t\t\t\te.enqueueService(cur)\n\t\t\t},\n\t\t\tDeleteFunc: e.enqueueService,\n\t\t},\n\t)\n\n\te.networkStore.Store, e.networkController = framework.NewInformer(\n\t\t&cache.ListWatch{\n\t\t\tListFunc: func(options api.ListOptions) (runtime.Object, error) {\n\t\t\t\treturn e.client.Core().Networks().List(options)\n\t\t\t},\n\t\t\tWatchFunc: func(options api.ListOptions) (watch.Interface, error) {\n\t\t\t\treturn e.client.Core().Networks().Watch(options)\n\t\t\t},\n\t\t},\n\t\t&api.Network{},\n\t\tNetworkRelistPeriod,\n\t\tframework.ResourceEventHandlerFuncs{\n\t\t\tAddFunc: e.addNetwork,\n\t\t\tUpdateFunc: e.updateNetwork,\n\t\t\tDeleteFunc: e.deleteNetwork,\n\t\t},\n\t)\n\n\te.endpointStore.Store, e.endpointController = framework.NewInformer(\n\t\t&cache.ListWatch{\n\t\t\tListFunc: func(options api.ListOptions) (runtime.Object, error) {\n\t\t\t\treturn e.client.Core().Endpoints(api.NamespaceAll).List(options)\n\t\t\t},\n\t\t\tWatchFunc: func(options api.ListOptions) (watch.Interface, error) {\n\t\t\t\treturn e.client.Core().Endpoints(api.NamespaceAll).Watch(options)\n\t\t\t},\n\t\t},\n\t\t&api.Endpoints{},\n\t\tEndpointRelistPeriod,\n\t\tframework.ResourceEventHandlerFuncs{\n\t\t\tAddFunc: e.addEndpoint,\n\t\t\tUpdateFunc: e.updateEndpoint,\n\t\t\tDeleteFunc: e.deleteEndpoint,\n\t\t},\n\t)\n\n\treturn e\n}", "title": "" } ]
[ { "docid": "2aef871f6bdb1d1af74efe80a3ec4a6b", "score": "0.84027267", "text": "func NewNetworkController() network.Controller {\n\treturn &Controller{}\n}", "title": "" }, { "docid": "f69e8611b3d5f24cc1f1ff252311ee0a", "score": "0.8304055", "text": "func NewNetworkController(\n\tpulseHandler network.PulseHandler,\n\toptions *common.Options,\n\ttransport network.InternalTransport,\n\troutingTable network.RoutingTable,\n\tnetwork network.HostNetwork,\n\tscheme core.PlatformCryptographyScheme) network.Controller {\n\n\tc := Controller{}\n\tc.network = network\n\tc.options = options\n\tc.bootstrapController = NewBootstrapController(c.options, transport)\n\tc.authController = auth.NewAuthorizationController(c.options, c.bootstrapController, transport)\n\tc.pulseController = NewPulseController(pulseHandler, network, routingTable)\n\tc.rpcController = NewRPCController(c.options, network, scheme)\n\n\treturn &c\n}", "title": "" }, { "docid": "3a74517edfc724bfc8c5b0639951f393", "score": "0.7717513", "text": "func New(instanceEth, hostname string, op *options.NetworkOption,\n\tnetsvcClient netservice.Interface, nodeNetClient nodenetwork.Interface,\n\teniClient eni.Interface, netUtil networkutil.Interface) *NetworkController {\n\treturn &NetworkController{\n\t\tinstanceEth: instanceEth,\n\t\thostname: hostname,\n\t\toptions: op,\n\t\tnetsvcClient: netsvcClient,\n\t\tnodeNetClient: nodeNetClient,\n\t\teniClient: eniClient,\n\t\tnetUtil: netUtil,\n\t}\n}", "title": "" }, { "docid": "08f6e231a0e70218ff6cab025943d225", "score": "0.7066742", "text": "func NewNetworkControllerClient() *NetworkControllerClient {\n\treturn &NetworkControllerClient{\n\t\tHandleUplinkMetaDataChan: make(chan nc.HandleUplinkMetaDataRequest, 100),\n\t\tHandleDownlinkMetaDataChan: make(chan nc.HandleDownlinkMetaDataRequest, 100),\n\t\tHandleDataUpMACCommandChan: make(chan nc.HandleUplinkMACCommandRequest, 100),\n\t\tHandleRejectedUplinkFrameSetChan: make(chan nc.HandleRejectedUplinkFrameSetRequest, 100),\n\t}\n}", "title": "" }, { "docid": "d04cb051c321c22555224568640faf80", "score": "0.6901538", "text": "func NewController(topo topo.Store, conns gnmi.ConnManager) *controller.Controller {\n\tc := controller.NewController(\"connection\")\n\tc.Watch(&ConnWatcher{\n\t\tconns: conns,\n\t})\n\tc.Watch(&TopoWatcher{\n\t\ttopo: topo,\n\t})\n\tc.Reconcile(&Reconciler{\n\t\tconns: conns,\n\t\ttopo: topo,\n\t})\n\treturn c\n}", "title": "" }, { "docid": "95fed0f1134778a762c103bc86d9ba4a", "score": "0.6756763", "text": "func newNetwork(networkType NetworkModel) network {\n\tswitch networkType {\n\tcase NoopNetworkModel:\n\t\treturn &noopNetwork{}\n\tcase CNINetworkModel:\n\t\treturn &cni{}\n\tcase CNMNetworkModel:\n\t\treturn &cnm{}\n\tdefault:\n\t\treturn &noopNetwork{}\n\t}\n}", "title": "" }, { "docid": "ee3f495f19a3e3611f5d5567e5b58625", "score": "0.67122334", "text": "func NewNetwork(ctx *pulumi.Context,\n\tname string, args *NetworkArgs, opts ...pulumi.ResourceOption) (*Network, error) {\n\tif args == nil {\n\t\targs = &NetworkArgs{}\n\t}\n\n\tvar resource Network\n\terr := ctx.RegisterResource(\"docker:index/network:Network\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "c2e0420a752c8bc8e2f1138528bfd3b2", "score": "0.6706965", "text": "func NewNetwork(ctx *pulumi.Context,\n\tname string, args *NetworkArgs, opts ...pulumi.ResourceOption) (*Network, error) {\n\tif args == nil {\n\t\targs = &NetworkArgs{}\n\t}\n\tvar resource Network\n\terr := ctx.RegisterResource(\"docker:index/network:Network\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "f295ce675fbcb92cbaf52d7eeeffefc4", "score": "0.66552514", "text": "func NewController() *Controller {\n\treturn &Controller{\n\t\tUI: NewUI(),\n\t}\n}", "title": "" }, { "docid": "acfdd48007accc47e1f16ee2665398fc", "score": "0.66193426", "text": "func NewController() *Controller {\n\treturn &Controller{}\n}", "title": "" }, { "docid": "f759f1648fc6281cd16c5fec4b200553", "score": "0.6614871", "text": "func NewDefaultNetworkController(cnci *CommonNetworkControllerInfo) (*DefaultNetworkController, error) {\n\tstopChan := make(chan struct{})\n\twg := &sync.WaitGroup{}\n\treturn newDefaultNetworkControllerCommon(cnci, stopChan, wg, nil)\n}", "title": "" }, { "docid": "7c4e9a0a94f5ca6c6991382d089490f4", "score": "0.6602638", "text": "func NewController(context *clusterd.Context, containerImage string) *Controller {\n\treturn &Controller{\n\t\tcontext: context,\n\t\tcontainerImage: containerImage,\n\t}\n}", "title": "" }, { "docid": "cf7f878be2c0f5d3b9415e3bd49782b2", "score": "0.6564381", "text": "func NewController() controller.Controller {\n\treturn &Controller{}\n}", "title": "" }, { "docid": "b577b5d2befdac7459296c18364a2516", "score": "0.6545936", "text": "func NewController() Controller {\n\treturn &controller{\n\t\tClient: client.NewClient(),\n\t}\n}", "title": "" }, { "docid": "118ef941f532e932035b596363dc1e51", "score": "0.652471", "text": "func NewController() *Controller {\n\treturn &Controller{\n\t\tController: controller.NewController(),\n\t\tstorage: database.NewBrokerStorage(),\n\t}\n}", "title": "" }, { "docid": "b77055b6d910d0e09f83ec98e16e3ad0", "score": "0.6482604", "text": "func NewController() *Controller {\n\treturn &Controller{\n\t\tdoneCh: make(chan error),\n\t}\n}", "title": "" }, { "docid": "61a189796745e8c86eb108324ccd4c92", "score": "0.64660895", "text": "func NewController(\n\tclusterName string,\n\tgetter v1.NamespacesGetter,\n\tinformer coreinformers.NamespaceInformer,\n\tsync func(context.Context, string, *corev1.Namespace) error,\n\tdelete func(context.Context, string, string) error,\n) *Controller {\n\tlogger := klogr.New().WithName(\"NamespaceController\")\n\tc := &Controller{\n\t\tclusterName: clusterName,\n\t\tlog: logger,\n\t\tgetter: getter,\n\t\tlister: informer.Lister(),\n\t\tlisterSynced: informer.Informer().HasSynced,\n\t\tqueue: queue.NewNamedRateLimitingQueue(queue.DefaultControllerRateLimiter(), \"namespace\"),\n\t\tsyncNamespace: sync,\n\t\tdeleteNamespace: delete,\n\t}\n\n\tinformer.Informer().AddEventHandler(cache.ResourceEventHandlerFuncs{\n\t\tAddFunc: c.add,\n\t\tUpdateFunc: c.update,\n\t\tDeleteFunc: c.delete,\n\t})\n\n\treturn c\n}", "title": "" }, { "docid": "69f42abb33630db8c5980419162a70c4", "score": "0.6460034", "text": "func NewController(ipAddress, port string) Actions {\n\treturn dtv.Controller{\n\t\tReceiverEndpoint: \"http://\" + ipAddress + \":\" + port,\n\t}\n}", "title": "" }, { "docid": "9c4851e977d3c0b8fd617137d33bbfd6", "score": "0.6449864", "text": "func NewController(pod, namespace, class string) *Controller {\n\tcm := &Controller{\n\t\tlabels: prometheus.Labels{\n\t\t\t\"namespace\": namespace,\n\t\t\t\"class\": class,\n\t\t},\n\n\t\treconcileOperation: prometheus.NewCounterVec(\n\t\t\tprometheus.CounterOpts{\n\t\t\t\tNamespace: PrometheusNamespace,\n\t\t\t\tName: \"success\",\n\t\t\t\tHelp: `Cumulative number of Ingress controller reconcile operations`,\n\t\t\t},\n\t\t\toperation,\n\t\t),\n\t\treconcileOperationErrors: prometheus.NewCounterVec(\n\t\t\tprometheus.CounterOpts{\n\t\t\t\tNamespace: PrometheusNamespace,\n\t\t\t\tName: \"errors\",\n\t\t\t\tHelp: `Cumulative number of Ingress controller errors during reconcile operations`,\n\t\t\t},\n\t\t\toperation,\n\t\t),\n\t\tmanagedIngresses: prometheus.NewGaugeVec(\n\t\t\tprometheus.GaugeOpts{\n\t\t\t\tNamespace: PrometheusNamespace,\n\t\t\t\tName: \"managed_ingresses\",\n\t\t\t\tHelp: `Total number of ingresses managed by the controller`,\n\t\t\t},\n\t\t\toperation,\n\t\t),\n\t}\n\n\treturn cm\n}", "title": "" }, { "docid": "92d395ef68eb8638b3c5e94dcad28d82", "score": "0.6447244", "text": "func NewNetwork() *Network {\n\tn := Network{\n\t\tDisabled: false,\n\t\tSynapses: make([]*Synapse, 0),\n\t\tCells: make([]*Cell, 0),\n\t}\n\treturn &n\n}", "title": "" }, { "docid": "d8d562e6475c1738d134334ced9c81e9", "score": "0.6430775", "text": "func NewController(cfg *Config) (Controller, error) {\n\n\tctrl := Controller{}\n\tkubeConfig, err := buildConfig(cfg)\n\n\tif err != nil {\n\t\treturn ctrl, err\n\t}\n\n\tctrl.Config = *cfg\n\tctrl.KubeClient = kubeConfig\n\n\treturn ctrl, nil\n}", "title": "" }, { "docid": "b55b37fd0094186a574b24988f2a753d", "score": "0.64273065", "text": "func NewController() *Controller {\n\treturn &Controller{\n\t\tregistries: make([]serviceregistry.Instance, 0),\n\t}\n}", "title": "" }, { "docid": "6f6c071b01f6a405a55166f182011077", "score": "0.6422356", "text": "func NewController(clientWrap *client.Wrapper) *Controller {\n\treturn &Controller{clientWrap: clientWrap}\n}", "title": "" }, { "docid": "1e92bdf0e2a1c1ea98d057f6e32f01c7", "score": "0.63950974", "text": "func (c *Context) NewNetwork() *Network {\n\treturn c.blankNetwork(\"\")\n}", "title": "" }, { "docid": "81565abc085042876fb3d7ed01914018", "score": "0.6390572", "text": "func NewController(backendWorker worker.Interface, mgr mgt.Manager) Interface {\n\treturn &basicController{\n\t\tbackendWorker: backendWorker,\n\t\tmanager: mgr,\n\t}\n}", "title": "" }, { "docid": "cd684fb586345d1a5d029963c400a7d1", "score": "0.6388658", "text": "func (t *OpenconfigSystem_System_Openflow_Controllers) NewController(Name string) (*OpenconfigSystem_System_Openflow_Controllers_Controller, error){\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Controller == nil {\n\t\tt.Controller = make(map[string]*OpenconfigSystem_System_Openflow_Controllers_Controller)\n\t}\n\n\tkey := Name\n\n\t// Ensure that this key has not already been used in the\n\t// list. Keyed YANG lists do not allow duplicate keys to\n\t// be created.\n\tif _, ok := t.Controller[key]; ok {\n\t\treturn nil, fmt.Errorf(\"duplicate key %v for list Controller\", key)\n\t}\n\n\tt.Controller[key] = &OpenconfigSystem_System_Openflow_Controllers_Controller{\n\t\tName: &Name,\n\t}\n\n\treturn t.Controller[key], nil\n}", "title": "" }, { "docid": "cd684fb586345d1a5d029963c400a7d1", "score": "0.6388658", "text": "func (t *OpenconfigSystem_System_Openflow_Controllers) NewController(Name string) (*OpenconfigSystem_System_Openflow_Controllers_Controller, error){\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Controller == nil {\n\t\tt.Controller = make(map[string]*OpenconfigSystem_System_Openflow_Controllers_Controller)\n\t}\n\n\tkey := Name\n\n\t// Ensure that this key has not already been used in the\n\t// list. Keyed YANG lists do not allow duplicate keys to\n\t// be created.\n\tif _, ok := t.Controller[key]; ok {\n\t\treturn nil, fmt.Errorf(\"duplicate key %v for list Controller\", key)\n\t}\n\n\tt.Controller[key] = &OpenconfigSystem_System_Openflow_Controllers_Controller{\n\t\tName: &Name,\n\t}\n\n\treturn t.Controller[key], nil\n}", "title": "" }, { "docid": "cd684fb586345d1a5d029963c400a7d1", "score": "0.6388658", "text": "func (t *OpenconfigSystem_System_Openflow_Controllers) NewController(Name string) (*OpenconfigSystem_System_Openflow_Controllers_Controller, error){\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Controller == nil {\n\t\tt.Controller = make(map[string]*OpenconfigSystem_System_Openflow_Controllers_Controller)\n\t}\n\n\tkey := Name\n\n\t// Ensure that this key has not already been used in the\n\t// list. Keyed YANG lists do not allow duplicate keys to\n\t// be created.\n\tif _, ok := t.Controller[key]; ok {\n\t\treturn nil, fmt.Errorf(\"duplicate key %v for list Controller\", key)\n\t}\n\n\tt.Controller[key] = &OpenconfigSystem_System_Openflow_Controllers_Controller{\n\t\tName: &Name,\n\t}\n\n\treturn t.Controller[key], nil\n}", "title": "" }, { "docid": "da42938ec8165cb602b81b59d48fc33c", "score": "0.63868904", "text": "func NewNetwork() NetworkSetup {\n\treturn getEnv().NewNetwork()\n}", "title": "" }, { "docid": "d418302d13cb71cb439d535aba3e3231", "score": "0.6383917", "text": "func NewController(betRepository BetRepository) *Controller {\n\treturn &Controller{\n\t\tbetRepository: betRepository,\n\t}\n}", "title": "" }, { "docid": "161643aa8399f3107738ae3ab69de0f6", "score": "0.63783985", "text": "func (c *Client) CreateNetworkPoliciesController(namespace string,\n\taddFunc func(addedApiStruct *networking.NetworkPolicy) error, deleteFunc func(deletedApiStruct *networking.NetworkPolicy) error, updateFunc func(oldApiStruct, updatedApiStruct *networking.NetworkPolicy) error) (cache.Store, cache.Controller) {\n\treturn CreateResourceController(c.KubeClient().NetworkingV1().RESTClient(), \"networkpolicies\", namespace, &networking.NetworkPolicy{}, fields.Everything(),\n\t\tfunc(addedApiStruct interface{}) {\n\t\t\tif err := addFunc(addedApiStruct.(*networking.NetworkPolicy)); err != nil {\n\t\t\t\tzap.L().Error(\"Error while handling Add NetworkPolicy\", zap.Error(err))\n\t\t\t}\n\t\t},\n\t\tfunc(deletedApiStruct interface{}) {\n\t\t\tif err := deleteFunc(deletedApiStruct.(*networking.NetworkPolicy)); err != nil {\n\t\t\t\tzap.L().Error(\"Error while handling Delete NetworkPolicy\", zap.Error(err))\n\t\t\t}\n\t\t},\n\t\tfunc(oldApiStruct, updatedApiStruct interface{}) {\n\t\t\tif err := updateFunc(oldApiStruct.(*networking.NetworkPolicy), updatedApiStruct.(*networking.NetworkPolicy)); err != nil {\n\t\t\t\tzap.L().Error(\"Error while handling Update NetworkPolicy\", zap.Error(err))\n\t\t\t}\n\t\t})\n}", "title": "" }, { "docid": "d32d5f6f6a27be794cf845b0c1fdb946", "score": "0.63740194", "text": "func NewController(a i2c.Connector, options ...func(i2c.Config)) *Controller {\n\n\tq := make(PriorityQueue, 0)\n\theap.Init(&q)\n\n\td := &Controller{\n\t\tname: gobot.DefaultName(\"PIC\"),\n\t\tconnector: a,\n\t\tConfig: i2c.NewConfig(),\n\t\ti2cReq: make(chan req),\n\t\tquit: make(chan struct{}),\n\t\treqQ: q,\n\t\tmut: &sync.Mutex{},\n\t}\n\n\tfor _, option := range options {\n\t\toption(d)\n\t}\n\treturn d\n}", "title": "" }, { "docid": "ac90bb5ad251c90a57bc720a9ad03d2b", "score": "0.6358788", "text": "func NewController(config config.Config) (*Controller, error) {\n\treturn &Controller{config: config}, nil\n}", "title": "" }, { "docid": "ccb1d96258ff4de8b48046cafd1a291b", "score": "0.63473", "text": "func NewController(cli *client.Client) csi.ControllerServer {\n\treturn &controller{\n\t\tclient: cli,\n\t\tcapabilities: newControllerCapabilities(),\n\t}\n}", "title": "" }, { "docid": "3b92f0f458a47bd9622daac3f603231c", "score": "0.6337358", "text": "func NewController(\n\tctx context.Context,\n\tcmw configmap.Watcher,\n) *controller.Impl {\n\tchannelInformer := channelinformer.Get(ctx)\n\n\tr := &Reconciler{\n\t\tdynamicClientSet: dynamicclient.Get(ctx),\n\t\tchannelLister: channelInformer.Lister(),\n\t}\n\timpl := channelreconciler.NewImpl(ctx, r)\n\n\tr.channelableTracker = duck.NewListableTrackerFromTracker(ctx, channelable.Get, impl.Tracker)\n\n\tchannelInformer.Informer().AddEventHandler(controller.HandleAll(impl.Enqueue))\n\n\treturn impl\n}", "title": "" }, { "docid": "e2b9021acd186419716f7be56734c320", "score": "0.63302624", "text": "func NewController(config *Config, projectRoot string) (*Controller, error) {\n\tproject, _ := config.GetProjectStackName()\n\tl := Controller{\n\t\tConfig: config,\n\t\tprojectRoot: projectRoot,\n\t\tprojectPath: path.Join(projectRoot, project),\n\t}\n\terr := l.Validate()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &l, nil\n}", "title": "" }, { "docid": "cc61a0df24505c826ba4e293fdd32ab2", "score": "0.6324251", "text": "func NewNetwork(\n\tprovider net.Provider,\n\trules Rules,\n) Network {\n\treturn &network{\n\t\tprovider: provider,\n\t\trules: rules,\n\t}\n}", "title": "" }, { "docid": "a36daa20df556c0b8ab359b9789349b1", "score": "0.6322702", "text": "func NewController(name string) *Controller {\n\treturn &Controller{\n\t\tname: name,\n\t\tactivator: &UnconditionalActivator{},\n\t\tpartitioner: &UnaryPartitioner{},\n\t\twatchers: make([]Watcher, 0),\n\t\tpartitions: make(map[PartitionKey]chan Request),\n\t\tmaxRetryDelay: maxRetryDelayDefault,\n\t}\n}", "title": "" }, { "docid": "0f230c6db600fcfcf794fc4f905ff10f", "score": "0.6296102", "text": "func NewController(leadership leadershipstore.Store, networkChanges networkchangestore.Store,\n\tnetworkSnapshots networksnapstore.Store, deviceSnapshots devicesnapstore.Store,\n\tdeviceChanges devicechangestore.Store) *controller.Controller {\n\n\tc := controller.NewController(\"NetworkSnapshot\")\n\tc.Activate(&configcontroller.LeadershipActivator{\n\t\tStore: leadership,\n\t})\n\tc.Watch(&Watcher{\n\t\tStore: networkSnapshots,\n\t})\n\tc.Watch(&DeviceWatcher{\n\t\tStore: deviceSnapshots,\n\t})\n\tc.Reconcile(&Reconciler{\n\t\tnetworkChanges: networkChanges,\n\t\tdeviceChanges: deviceChanges,\n\t\tnetworkSnapshots: networkSnapshots,\n\t\tdeviceSnapshots: deviceSnapshots,\n\t})\n\treturn c\n}", "title": "" }, { "docid": "402094a6fb9eee8f3989ee1fbad408d8", "score": "0.62847716", "text": "func NewController(queue workqueue.RateLimitingInterface, indexer cache.Indexer, informer cache.Controller, calicoClient *caliclient.Client, domainName string, dryRun bool, syncSeconds int) *Controller {\n\treturn &Controller{\n\t\tinformer: informer,\n\t\tindexer: indexer,\n\t\tqueue: queue,\n\t\tcalicoCache: calicache.NewCache(),\n\t\tcalicoClient: calicoClient,\n\t\tdomainName: domainName,\n\t\tdryRun: dryRun,\n\t\tsyncSeconds: syncSeconds,\n\t}\n}", "title": "" }, { "docid": "d9dce8fe38b36e55e6b5111b02d57d71", "score": "0.62432534", "text": "func New(cfg *config.Config, kv api.ClientIFace) (cc *Controller) {\n\tcc = &Controller{\n\t\tConfig: cfg,\n\t\tClient: kv,\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "9014590468cac754aebb1966e02686b1", "score": "0.62420726", "text": "func NewController(config *Config, store LBPolicyStore) (*Controller, error) {\n\tcli, err := dockercli.NewEnvClient()\n\tif err != nil {\n\t\tsysLogger.Errorf(\"Create haproxy controller failed, reason: %v\", err)\n\t\treturn nil, err\n\t}\n\n\tcontroller := &Controller{\n\t\tWorkDir: config.WorkDir,\n\t\tdockerClient: cli,\n\t\tstore: store,\n\t\tkeepalivedCfg: config.KeepalivedCfg,\n\t}\n\treturn controller, nil\n}", "title": "" }, { "docid": "bd726cc23f0f93df0e987cdc42f32032", "score": "0.6236209", "text": "func NewNetworkCommand(settings *environment.Settings) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"network\",\n\t\tShort: \"Manage networks\",\n\t\tLong: \"Network indicates the Fabric Go SDK' config path\",\n\t}\n\n\tcmd.AddCommand(\n\t\tNewNetworkViewCommand(settings),\n\t\tNewNetworkListCommand(settings),\n\t\tNewNetworkSetCommand(settings),\n\t\tNewNetworkDeleteCommand(settings),\n\t)\n\n\tcmd.SetOutput(settings.Streams.Out)\n\n\treturn cmd\n}", "title": "" }, { "docid": "677cc2d3f1d02c2f30e8d89944049b21", "score": "0.6229942", "text": "func (c *Controller) New() {}", "title": "" }, { "docid": "cb42d180dc6bd6ab4da5c90fc45cdf62", "score": "0.6224864", "text": "func NewController() Controller {\n\treturn &controller{\n\t\tproMgr: pkg.ProjectMgr,\n\t\trepoMgr: pkg.RepositoryMgr,\n\t\tartMgr: pkg.ArtifactMgr,\n\t\tartCtl: artifact.Ctl,\n\t}\n}", "title": "" }, { "docid": "f546060f139f5afffe15f80396e8aa5a", "score": "0.6221175", "text": "func NewController(t mockConstructorTestingTNewController) *Controller {\n\tmock := &Controller{}\n\tmock.Mock.Test(t)\n\n\tt.Cleanup(func() { mock.AssertExpectations(t) })\n\n\treturn mock\n}", "title": "" }, { "docid": "f546060f139f5afffe15f80396e8aa5a", "score": "0.6221175", "text": "func NewController(t mockConstructorTestingTNewController) *Controller {\n\tmock := &Controller{}\n\tmock.Mock.Test(t)\n\n\tt.Cleanup(func() { mock.AssertExpectations(t) })\n\n\treturn mock\n}", "title": "" }, { "docid": "7ac6013e094c5afb2809be62fc6a4f21", "score": "0.6208333", "text": "func NewController(db *database.DB) *Controller {\n\treturn &Controller{\n\t\tService: &Service{\n\t\t\tDB: db,\n\t\t},\n\t}\n}", "title": "" }, { "docid": "367d3b84f4738f4302b6d4551acc0d8b", "score": "0.61882514", "text": "func NewController(maxpay, rxcap, txcap int) *Controller {\n\tc := new(Controller)\n\tc.devAddr = getDevAddr()\n\tc.advPDU = ble.MakeAdvPDU(6 + 3)\n\tc.advPDU.SetType(ble.AdvInd)\n\tc.advPDU.SetTxAdd(c.devAddr < 0)\n\tc.advPDU.AppendAddr(c.devAddr)\n\tc.advPDU.AppendBytes(ble.Flags, ble.GeneralDisc|ble.OnlyLE)\n\tc.rxaPDU = ble.MakeAdvPDU(ble.MaxAdvPay)\n\tc.txcPDU = ble.MakeDataPDU(27)\n\tc.recv = makePDUChan(maxpay, rxcap)\n\tc.send = makePDUChan(maxpay, txcap)\n\tc.radio = radio.RADIO\n\tc.rtc0 = rtc.RTC0\n\tc.tim0 = timer.TIMER0\n\tc.rnd.Seed(rtos.Nanosec())\n\treturn c\n}", "title": "" }, { "docid": "04f1cee2c2eadda8c62f934f63b16684", "score": "0.6185183", "text": "func NewController(sess *session.Session) *Controller {\n\tc := &Controller{\n\t\tClient: *client.NewClient(sess),\n\t}\n\treturn c\n}", "title": "" }, { "docid": "718f4591c2267a6727473ba879ba2f2a", "score": "0.61646533", "text": "func NewController(robot Interface) Controller {\n\treturn &controller{robot: robot}\n}", "title": "" }, { "docid": "c245350b423c19ed48d55fdf60c3945d", "score": "0.6145421", "text": "func NewController(queue workqueue.RateLimitingInterface, indexer cache.Indexer, informer cache.Controller, client kubernetes.Interface) *Controller {\n\treturn &Controller{\n\t\tinformer: informer,\n\t\tindexer: indexer,\n\t\tqueue: queue,\n\t\tclient: client,\n\t}\n}", "title": "" }, { "docid": "c2bca5337cb118aede1017b15c36c94d", "score": "0.6135281", "text": "func NewController(service articleBusiness.Service) *Controller {\n\treturn &Controller{\n\t\tservice,\n\t\tv10.New(),\n\t}\n}", "title": "" }, { "docid": "be37f54a2d406992067b8143e7c811b8", "score": "0.61315936", "text": "func NewNetwork(jsonBody string) (*Network, error) {\n\tn := Network{}\n\tjson.Unmarshal([]byte(jsonBody), &n)\n\terr := n.PopulateMaps()\n\treturn &n, err\n}", "title": "" }, { "docid": "982e3e86611ae9fc2e290b9ca99a4681", "score": "0.61210394", "text": "func NewTunnelController(mgr ctrl.Manager, wgc wireguard.Client, nl wireguard.Netlinker) (*TunnelController, error) {\n\tclientSet := k8s.NewForConfigOrDie(mgr.GetConfig())\n\tnamespace, err := utils.GetPodNamespace()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tpodIP, err := utils.GetPodIP()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\toverlayIP := strings.Join([]string{overlay.GetOverlayIP(podIP.String()), \"4\"}, \"/\")\n\t//create overlay network interface\n\twg, err := overlay.CreateInterface(gatewayPodName, namespace, overlayIP, clientSet, wgc, nl)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t//enable ip forwarding\n\tif err = utils.EnableIPForwarding(); err != nil {\n\t\treturn nil, err\n\t}\n\t//get name of the default interface\n\tiface, err := utils.GetDefaultIfaceName()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\ttc := &TunnelController{\n\t\tClient: mgr.GetClient(),\n\t\tEventRecorder: mgr.GetEventRecorderFor(OperatorName),\n\t\tk8sClient: clientSet,\n\t\tnamespace: namespace,\n\t\tpodIP: podIP.String(),\n\t\tDefaultIface: iface,\n\t\twg: wg,\n\t}\n\terr = tc.SetUpTunnelDrivers()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\terr = tc.SetUpIPTablesHandler()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\ttc.SetUpRouteManager(tc.EventRecorder)\n\treturn tc, nil\n}", "title": "" }, { "docid": "4a02d535f3a21fd25e11f92f4da455b2", "score": "0.61164075", "text": "func NewController(m driver.Matcher, store datastore.Vulnerability) *Controller {\n\treturn &Controller{\n\t\tm: m,\n\t\tstore: store,\n\t}\n}", "title": "" }, { "docid": "bbe800f4b6433387b67b4d3914124585", "score": "0.61127216", "text": "func NewNetwork(ssid, psk string) Network {\n\treturn NewNamedNetwork(ssid, ssid, psk)\n}", "title": "" }, { "docid": "dc6e0d380a049cb3b60f4d1692f3b5e3", "score": "0.61006206", "text": "func NewController(config *latest.Config, cache *generated.CacheConfig, client kubectlclient.Client) Controller {\n\treturn &controller{\n\t\tconfig: config,\n\t\tcache: cache,\n\n\t\thookExecuter: hook.NewExecuter(config),\n\t\tclient: client,\n\t}\n}", "title": "" }, { "docid": "6ec078d1011574b33cdd142f59ee79d4", "score": "0.60880166", "text": "func NewController(ctx context.Context, config *v2.Controller) network.ReadFilter {\n\tcontroller := &controller{\n\t\tconfig: config,\n\t\tcontext: ctx,\n\t}\n\n\tcontroller.sourceStreamListener = &sourceStreamCallbacks{\n\t\tcontroller: controller,\n\t}\n\n\treturn controller\n}", "title": "" }, { "docid": "e79a6d908ee390718d30ec202542b48e", "score": "0.608675", "text": "func NewController() *VirtualController {\n\treturn &VirtualController{}\n}", "title": "" }, { "docid": "748ce6991a9325af2156a3cd5db5330c", "score": "0.6065753", "text": "func New(opt *controller.Options) controller.Controller {\n\treturn &namespace{opt: opt}\n}", "title": "" }, { "docid": "87d8d44cd9faef09d1c8476452d8c32f", "score": "0.60407263", "text": "func NewNetwork(rt *RoutingTable, ht *ValueHashtable) *Network {\n\tnetwork := &Network{}\n\tnetwork.rt = rt\n\tnetwork.ht = ht\n\tnetwork.findNodeChannel = make(chan findNodeRequest)\n\tnetwork.storeChannel = make(chan storeRequest)\n\tnetwork.findDataChannel = make(chan findDataRequest)\n\tnetwork.exitChannel = make(chan bool)\n\treturn network\n}", "title": "" }, { "docid": "83fe46f62abaa83cd69e04e9a9c718a0", "score": "0.60402215", "text": "func NewController(ps *pss.Pss) *Controller {\n\tctrl := &Controller{\n\t\tpss: ps,\n\t\tnotifiers: make(map[string]*notifier),\n\t\tsubscriptions: make(map[string]*subscription),\n\t}\n\tctrl.pss.Register(&controlTopic, pss.NewHandler(ctrl.Handler))\n\treturn ctrl\n}", "title": "" }, { "docid": "3ad1c3e232d229ecfe09e4508f334d2d", "score": "0.6036942", "text": "func New(subcontrollers ...SubController) *Controller {\n\treturn &Controller{\n\t\tsubcontrollers: subcontrollers,\n\t}\n}", "title": "" }, { "docid": "81d2945389725a115d3a553a2b81e277", "score": "0.6036379", "text": "func NewController(service permissionBusiness.Service) *Controller {\n\treturn &Controller{\n\t\tservice,\n\t\tv10.New(),\n\t}\n}", "title": "" }, { "docid": "991389959cc6ce90c0133538732d7606", "score": "0.60343117", "text": "func NewController(qrcodeService contract.QRCodeService, mapper mapper.Mapper) *Controller {\n\tonce.Do(func() {\n\t\tinstance = &Controller{\n\t\t\tqrcodeService: qrcodeService,\n\t\t\tmapper: mapper,\n\t\t}\n\t})\n\treturn instance\n}", "title": "" }, { "docid": "fcc7244d712a5e7f15d7ab05ba7d5b17", "score": "0.60331345", "text": "func NewController(d *CSIDriver) csi.ControllerServer {\n\tctrl := &controller{\n\t\tdriver: d,\n\t\tcapabilities: newControllerCapabilities(),\n\t}\n\tif err := ctrl.init(); err != nil {\n\t\tklog.Fatalf(\"init controller: %v\", err)\n\t}\n\n\treturn ctrl\n}", "title": "" }, { "docid": "cf515f8ef500ab43028c91c587d13846", "score": "0.60330456", "text": "func newNetworkMapper() *OCINetworkMapper {\n\treturn &OCINetworkMapper{}\n}", "title": "" }, { "docid": "8faddb9cadef6e82ff334b99a872de86", "score": "0.6032372", "text": "func NewController(c *container.Container) *Controller {\n\treturn &Controller{\n\t\tlogger: c.Adapters.Log,\n\t\tvalidator: c.Adapters.Validator,\n\t\tFilterControllerFacilitator: filter.NewFilterControllerFacilitator(),\n\t\tPaginatorControllerFacilitator: paginator.NewPaginatorControllerFacilitator(),\n\t}\n}", "title": "" }, { "docid": "1c3ff9c2b9c0900e7f8f2ece460142e6", "score": "0.6024111", "text": "func NewController() *Controller {\n\treturn &Controller{\n\t\tstorage: database.NewUserStorage(),\n\t}\n}", "title": "" }, { "docid": "eaec026d0c8c2b936285934ecf079ba6", "score": "0.60235155", "text": "func NewController(queue workqueue.RateLimitingInterface, indexer cache.Indexer, informer cache.Controller, clientset *kubernetes.Clientset) *Controller {\n\treturn &Controller{\n\t\tinformer: informer,\n\t\tindexer: indexer,\n\t\tqueue: queue,\n\t\tclientset: clientset,\n\t}\n}", "title": "" }, { "docid": "26618203cbf3319364e5a422182a58db", "score": "0.6022816", "text": "func NewController(a application) (Controller, error) {\n\tcontroller := Controller{Application: a}\n\treturn controller, nil\n}", "title": "" }, { "docid": "c27559241e34a9034535dee70ae5beeb", "score": "0.60007447", "text": "func NewController(serv Service) *cont {\n\treturn &cont{serv: serv}\n}", "title": "" }, { "docid": "b70da3164dc7fc6634a8b85de902b60d", "score": "0.5998994", "text": "func NewController(cfg *config.Config, prom *metrics.Collector) Controller {\n\treturn &controller{\n\t\texecutions: make(map[string]*execution),\n\t\tnodes: make(map[string]bool),\n\t\tprom: prom,\n\t\tlog: log.WithName(\"controller\"),\n\t\treportHistory: cfg.ReportHistory + 1, // 1+ for latest\n\t\treportDir: cfg.ReportDirectory,\n\t\tpodPoolSize: cfg.PodPoolSize,\n\t\tconfig: *cfg,\n\t}\n}", "title": "" }, { "docid": "14af42611c5bf2f9906c59153d8ebaa0", "score": "0.5998041", "text": "func NewController(nodeID configapi.NodeID, transactions transactionstore.Store, configurations configurationstore.Store,\n\tconns gnmi.ConnManager, topo topo.Store, plugins pluginregistry.PluginRegistry) *controller.Controller {\n\tc := controller.NewController(\"transaction\")\n\tc.Watch(&Watcher{\n\t\ttransactions: transactions,\n\t})\n\tc.Watch(&ConfigurationWatcher{\n\t\tconfigurations: configurations,\n\t})\n\tc.Reconcile(&Reconciler{\n\t\tnodeID: nodeID,\n\t\ttransactions: transactions,\n\t\tconfigurations: configurations,\n\t\tconns: conns,\n\t\ttopo: topo,\n\t\tplugins: plugins,\n\t})\n\treturn c\n}", "title": "" }, { "docid": "3aff0ca28f7ce54bdeac9899c7ff5da5", "score": "0.5992497", "text": "func NewController(r Rover, p *Plateau) *Controller {\n\treturn &Controller{\n\t\tplateau: p,\n\t\trover: &r,\n\t}\n}", "title": "" }, { "docid": "30bac5b7a1e0a496ce05070b502fae50", "score": "0.598211", "text": "func New() *ClientController{\n\treturn &ClientController{}\n}", "title": "" }, { "docid": "f21407ae71a4d9a9168629ee79bd5ad7", "score": "0.5975089", "text": "func NewController() Controller {\n\treturn &basicController{\n\t\t// New report manager\n\t\tmanager: report.NewManager(),\n\t\t// Refer to the default artifact controller\n\t\tar: ar.Ctl,\n\t\t// Refer to the default scanner controller\n\t\tsc: sc.DefaultController,\n\t\t// Refer to the default robot account controller\n\t\trc: robot.RobotCtr,\n\t\t// Refer to the default job service client\n\t\tjc: func() cj.Client {\n\t\t\treturn cj.GlobalClient\n\t\t},\n\t\t// Generate UUID with uuid lib\n\t\tuuid: func() (string, error) {\n\t\t\taUUID, err := uuid.NewUUID()\n\t\t\tif err != nil {\n\t\t\t\treturn \"\", err\n\t\t\t}\n\n\t\t\treturn aUUID.String(), nil\n\t\t},\n\t\t// Get the required configuration options\n\t\tconfig: func(cfg string) (string, error) {\n\t\t\tswitch cfg {\n\t\t\tcase configRegistryEndpoint:\n\t\t\t\treturn config.ExtEndpoint()\n\t\t\tcase configCoreInternalAddr:\n\t\t\t\treturn config.InternalCoreURL(), nil\n\t\t\tdefault:\n\t\t\t\treturn \"\", errors.Errorf(\"configuration option %s not defined\", cfg)\n\t\t\t}\n\t\t},\n\t}\n}", "title": "" }, { "docid": "054bf2477072eeff691293684f1f7835", "score": "0.5974433", "text": "func NewController(name string, objectType runtime.Object, options Options) (*MultiClusterController, error) {\n\tif options.Reconciler == nil {\n\t\treturn nil, fmt.Errorf(\"must specify Reconciler\")\n\t}\n\n\tif len(name) == 0 {\n\t\treturn nil, fmt.Errorf(\"must specify Name for Controller\")\n\t}\n\n\tc := &MultiClusterController{\n\t\tname: name,\n\t\tobjectType: objectType,\n\t\tclusters: make(map[string]ClusterInterface),\n\t\tOptions: options,\n\t}\n\n\tif c.JitterPeriod == 0 {\n\t\tc.JitterPeriod = 1 * time.Second\n\t}\n\n\tif c.MaxConcurrentReconciles <= 0 {\n\t\tc.MaxConcurrentReconciles = 1\n\t}\n\n\tif c.Queue == nil {\n\t\tc.Queue = workqueue.NewRateLimitingQueue(workqueue.DefaultControllerRateLimiter())\n\t}\n\n\treturn c, nil\n}", "title": "" }, { "docid": "379dc2bae702c82d269c8a5b77ac05ed", "score": "0.5970481", "text": "func NewController(userModel database.UserModel) *Controller {\n\treturn &Controller{\n\t\tuserModel,\n\t}\n}", "title": "" }, { "docid": "9d672712e09a50041bf49b9b5561ce3e", "score": "0.5961968", "text": "func New(repo service.RepositoryService) Controller {\n\treturn Controller{\n\t\trepo: repo,\n\t\tlogger: logger.New(\"ctrl\"),\n\t}\n}", "title": "" }, { "docid": "c226ff65066fce2ebe1b01863449cec8", "score": "0.59563494", "text": "func NewController(\n\thandler rpc.T,\n\tsenderKs *keystore.KeyStore,\n\tsenderAcct *accounts.Account,\n\tchain common.ChainID,\n\toptions ...func(*Controller)) *Controller {\n\n\ttxParams := make(map[string]interface{})\n\tctrlr := &Controller{\n\t\tfailure: nil,\n\t\tmessenger: handler,\n\t\tsender: sender{\n\t\t\tks: senderKs,\n\t\t\taccount: senderAcct,\n\t\t},\n\t\ttransactionForRPC: transactionForRPC{\n\t\t\tparams: txParams,\n\t\t\tsignature: nil,\n\t\t\treceiptHash: nil,\n\t\t\treceipt: nil,\n\t\t},\n\t\tchain: chain,\n\t\tBehavior: behavior{false, Software, 0},\n\t}\n\tfor _, option := range options {\n\t\toption(ctrlr)\n\t}\n\treturn ctrlr\n}", "title": "" }, { "docid": "0298a46b40020d5838bbfb90c2ec3194", "score": "0.59542847", "text": "func NewNetworkClient(c config) *NetworkClient {\n\treturn &NetworkClient{config: c}\n}", "title": "" }, { "docid": "51557edfa9c60cb03cac652a08783440", "score": "0.59537727", "text": "func NewController(queue workqueue.RateLimitingInterface, indexer cache.Indexer, informer cache.Controller, clientset kubernetes.Interface, mutex *sync.Mutex, state map[string]string) *Controller {\n\treturn &Controller{\n\t\tinformer: informer,\n\t\tindexer: indexer,\n\t\tqueue: queue,\n\t\tclientset: clientset,\n\t\tmutex: mutex,\n\t\tstate: state,\n\t}\n}", "title": "" }, { "docid": "00fd90b2053f85e1e7afcf44f762ceed", "score": "0.5945698", "text": "func newController(nativelbClient kubecli.NativelbClient, r reconcile.Reconciler) (controller.Controller, error) {\n\t// Create a new controller\n\tc, err := controller.New(\"cluster-controller\", nativelbClient.GetManager(), controller.Options{Reconciler: r})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Watch for changes to Provider\n\terr = c.Watch(&source.Kind{Type: &v1.Cluster{}}, &handler.EnqueueRequestForObject{})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn c, nil\n}", "title": "" }, { "docid": "57d9c88dea5c6077b9353a930ede9adb", "score": "0.5936877", "text": "func NewController(r *render.Render, webSocketUpgrader *websocket.Upgrader) *Controller {\n\tlog.Print(\"[DEBUG] Instanciating a new Controller; render=\", r)\n\treturn &Controller{\n\t\tr: content.NewResponder(r),\n\t\tWebSocketUpgrader: webSocketUpgrader,\n\t}\n}", "title": "" }, { "docid": "e87a237340f1cc06d3efa036ca8baee7", "score": "0.59224707", "text": "func newNetwork(opts ...Option) Network {\n\toptions := DefaultOptions()\n\n\tfor _, o := range opts {\n\t\to(&options)\n\t}\n\n\t// init tunnel address to the network bind address\n\toptions.Tunnel.Init(\n\t\ttunnel.Address(options.Address),\n\t)\n\n\t// init router Id to the network id\n\toptions.Router.Init(\n\t\trouter.Id(options.Id),\n\t)\n\n\t// create tunnel client with tunnel transport\n\ttunTransport := trn.NewTransport(\n\t\ttrn.WithTunnel(options.Tunnel),\n\t)\n\n\t// server is network server\n\tserver := server.NewServer(\n\t\tserver.Id(options.Id),\n\t\tserver.Address(options.Address),\n\t\tserver.Name(options.Name),\n\t\tserver.Transport(tunTransport),\n\t)\n\n\t// client is network client\n\tclient := client.NewClient(\n\t\tclient.Transport(tunTransport),\n\t\tclient.Selector(\n\t\t\trtr.NewSelector(\n\t\t\t\trtr.WithRouter(options.Router),\n\t\t\t),\n\t\t),\n\t)\n\n\treturn &network{\n\t\toptions: options,\n\t\tRouter: options.Router,\n\t\tProxy: options.Proxy,\n\t\tTunnel: options.Tunnel,\n\t\tserver: server,\n\t\tclient: client,\n\t}\n}", "title": "" }, { "docid": "6b0963bd4668fdb19b14f3480869343b", "score": "0.5917198", "text": "func NewController(cs kubernetes.Interface) *Controller {\n\treturn newController(cs, clock.RealClock{}, rate.NewLimiter(rate.Every(30*time.Minute), 1))\n}", "title": "" }, { "docid": "55a44ba41c10b99666a0b269aa1ae1a3", "score": "0.59163857", "text": "func NewNetworkPolicy(network *metadata.Network) (*NetworkPolicy, error) {\n\tnp := NetworkPolicy{}\n\tif network.DefaultPolicyAction == ActionDeny {\n\t\tnp.DefaultAction = ActionDeny\n\t} else {\n\t\tnp.DefaultAction = ActionAllow\n\t}\n\n\tfor _, mr := range network.Policy {\n\t\tr := NetworkPolicyRule{mr}\n\t\tnp.Rules = append(np.Rules, r)\n\t}\n\n\tif err := np.Validate(); err != nil {\n\t\tlog.Errorf(\"error validating policy: %#v\", np)\n\t\tlog.Errorf(\"error: %v\", err)\n\t\treturn nil, err\n\t}\n\n\treturn &np, nil\n}", "title": "" }, { "docid": "05abd9d647141c03aab1c7e514cb8b3c", "score": "0.59147227", "text": "func NewController(backendServer *url.URL) (*Controller, error) {\n\tif backendServer == nil {\n\t\treturn nil, errors.New(\"failed to create chartserver.Controller: backend sever address is required\")\n\t}\n\n\t//Use customized reverse proxy\n\tproxy := NewProxyEngine(backendServer)\n\n\t//Initialize chart operator for use\n\toperator := &ChartOperator{}\n\n\treturn &Controller{\n\t\tbackendServerAddr: backendServer,\n\t\tbaseHandler: &BaseHandler{proxy},\n\t\trepositoryHandler: &RepositoryHandler{proxy},\n\t\tmanipulationHandler: &ManipulationHandler{\n\t\t\ttrafficProxy: proxy,\n\t\t\tchartOperator: operator,\n\t\t},\n\t}, nil\n}", "title": "" }, { "docid": "f4a86451471513635da8135d088fb5f4", "score": "0.58997244", "text": "func NewController() *QController {\n\treturn &QController{}\n}", "title": "" }, { "docid": "9dc2e260a1c227aef2663659f03dd4f4", "score": "0.58978325", "text": "func NewNetworkDriver(flow string) func(*zap.Logger, *types.Services, *types.Metadata) Minion {\n\treturn func(log *zap.Logger, svc *types.Services, meta *types.Metadata) Minion {\n\t\treturn &networkDriver{\n\t\t\tflow: flow,\n\t\t\tlog: log,\n\t\t\tsvc: svc,\n\t\t\tmetadata: meta,\n\t\t}\n\t}\n}", "title": "" }, { "docid": "2cd1e13e9673f9328422d09f3649d7a9", "score": "0.586975", "text": "func New(cfg *config.TrexConfig) *Controller {\n\treturn &Controller{\n\t\tcfg: cfg,\n\t}\n}", "title": "" }, { "docid": "0116d38fa5e0e75cdff61d593b7e7784", "score": "0.58667636", "text": "func (n *cniNetwork) NetworkCreate(net types.Network) (types.Network, error) {\n\tn.lock.Lock()\n\tdefer n.lock.Unlock()\n\terr := n.loadNetworks()\n\tif err != nil {\n\t\treturn types.Network{}, err\n\t}\n\tnetwork, err := n.networkCreate(net, true)\n\tif err != nil {\n\t\treturn types.Network{}, err\n\t}\n\t// add the new network to the map\n\tn.networks[network.libpodNet.Name] = network\n\treturn *network.libpodNet, nil\n}", "title": "" }, { "docid": "8dc93ae526a638057f68bd97632113e1", "score": "0.5856092", "text": "func NewController(\n\tkubeClient kubernetes.Interface,\n\tsvcNegClient svcnegclient.Interface,\n\tkubeSystemUID types.UID,\n\tingressInformer cache.SharedIndexInformer,\n\tserviceInformer cache.SharedIndexInformer,\n\tpodInformer cache.SharedIndexInformer,\n\tnodeInformer cache.SharedIndexInformer,\n\tendpointSliceInformer cache.SharedIndexInformer,\n\tsvcNegInformer cache.SharedIndexInformer,\n\tnetworkInformer cache.SharedIndexInformer,\n\tgkeNetworkParamSetInformer cache.SharedIndexInformer,\n\thasSynced func() bool,\n\tcontrollerMetrics *usageMetrics.ControllerMetrics,\n\tl4Namer namer2.L4ResourcesNamer,\n\tdefaultBackendService utils.ServicePort,\n\tcloud negtypes.NetworkEndpointGroupCloud,\n\tzoneGetter negtypes.ZoneGetter,\n\tnamer negtypes.NetworkEndpointGroupNamer,\n\tresyncPeriod time.Duration,\n\tgcPeriod time.Duration,\n\tnumGCWorkers int,\n\tenableReadinessReflector bool,\n\trunIngress bool,\n\trunL4Controller bool,\n\tenableNonGcpMode bool,\n\tenableDualStackNEG bool,\n\tenableAsm bool,\n\tasmServiceNEGSkipNamespaces []string,\n\tlpConfig labels.PodLabelPropagationConfig,\n\tenableMultiNetworking bool,\n\tlogger klog.Logger,\n) *Controller {\n\tlogger = logger.WithName(\"NEGController\")\n\n\t// init event recorder\n\t// TODO: move event recorder initializer to main. Reuse it among controllers.\n\teventBroadcaster := record.NewBroadcaster()\n\teventBroadcaster.StartStructuredLogging(0)\n\teventBroadcaster.StartRecordingToSink(&unversionedcore.EventSinkImpl{\n\t\tInterface: kubeClient.CoreV1().Events(\"\"),\n\t})\n\tnegScheme := runtime.NewScheme()\n\terr := scheme.AddToScheme(negScheme)\n\tif err != nil {\n\t\tlogger.Error(err, \"Errored adding default scheme to event recorder\")\n\t\tmetrics.PublishNegControllerErrorCountMetrics(err, true)\n\t}\n\terr = svcnegv1beta1.AddToScheme(negScheme)\n\tif err != nil {\n\t\tlogger.Error(err, \"Errored adding NEG CRD scheme to event recorder\")\n\t\tmetrics.PublishNegControllerErrorCountMetrics(err, true)\n\t}\n\trecorder := eventBroadcaster.NewRecorder(negScheme,\n\t\tapiv1.EventSource{Component: \"neg-controller\"})\n\n\tsyncerMetrics := syncMetrics.NewNegMetricsCollector(flags.F.NegMetricsExportInterval, logger)\n\tmanager := newSyncerManager(\n\t\tnamer,\n\t\trecorder,\n\t\tcloud,\n\t\tzoneGetter,\n\t\tsvcNegClient,\n\t\tkubeSystemUID,\n\t\tpodInformer.GetIndexer(),\n\t\tserviceInformer.GetIndexer(),\n\t\tendpointSliceInformer.GetIndexer(),\n\t\tnodeInformer.GetIndexer(),\n\t\tsvcNegInformer.GetIndexer(),\n\t\tsyncerMetrics,\n\t\tenableNonGcpMode,\n\t\tenableDualStackNEG,\n\t\tnumGCWorkers,\n\t\tlpConfig,\n\t\tlogger)\n\n\tvar reflector readiness.Reflector\n\tif enableReadinessReflector {\n\t\treflector = readiness.NewReadinessReflector(\n\t\t\tkubeClient,\n\t\t\tpodInformer.GetIndexer(),\n\t\t\tcloud,\n\t\t\tmanager,\n\t\t\tenableDualStackNEG,\n\t\t\tlogger,\n\t\t)\n\t} else {\n\t\treflector = &readiness.NoopReflector{}\n\t}\n\tmanager.reflector = reflector\n\n\tvar networkIndexer cache.Indexer\n\tif networkInformer != nil {\n\t\tnetworkIndexer = networkInformer.GetIndexer()\n\t}\n\tvar gkeNetworkParamSetIndexer cache.Indexer\n\tif gkeNetworkParamSetInformer != nil {\n\t\tgkeNetworkParamSetIndexer = gkeNetworkParamSetInformer.GetIndexer()\n\t}\n\tnegController := &Controller{\n\t\tclient: kubeClient,\n\t\tmanager: manager,\n\t\tresyncPeriod: resyncPeriod,\n\t\tgcPeriod: gcPeriod,\n\t\trecorder: recorder,\n\t\tzoneGetter: zoneGetter,\n\t\tcloud: cloud,\n\t\tnamer: namer,\n\t\tl4Namer: l4Namer,\n\t\tdefaultBackendService: defaultBackendService,\n\t\thasSynced: hasSynced,\n\t\tingressLister: ingressInformer.GetIndexer(),\n\t\tserviceLister: serviceInformer.GetIndexer(),\n\t\tnetworkResolver: network.NewNetworksResolver(networkIndexer, gkeNetworkParamSetIndexer, cloud, enableMultiNetworking, logger),\n\t\tserviceQueue: workqueue.NewNamedRateLimitingQueue(workqueue.DefaultControllerRateLimiter(), \"neg_service_queue\"),\n\t\tendpointQueue: workqueue.NewNamedRateLimitingQueue(workqueue.DefaultControllerRateLimiter(), \"neg_endpoint_queue\"),\n\t\tnodeQueue: workqueue.NewNamedRateLimitingQueue(workqueue.DefaultControllerRateLimiter(), \"neg_node_queue\"),\n\t\tsyncTracker: utils.NewTimeTracker(),\n\t\treflector: reflector,\n\t\tusageCollector: controllerMetrics,\n\t\tsyncerMetrics: syncerMetrics,\n\t\trunL4: runL4Controller,\n\t\tlogger: logger,\n\t}\n\tif runIngress {\n\t\tingressInformer.AddEventHandler(cache.ResourceEventHandlerFuncs{\n\t\t\tAddFunc: func(obj interface{}) {\n\t\t\t\taddIng := obj.(*v1.Ingress)\n\t\t\t\tif !utils.IsGLBCIngress(addIng) {\n\t\t\t\t\tlogger.V(4).Info(\"Ignoring add for ingress based on annotation\", \"ingress\", klog.KObj(addIng), \"annotation\", annotations.IngressClassKey)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tnegController.enqueueIngressServices(addIng)\n\t\t\t},\n\t\t\tDeleteFunc: func(obj interface{}) {\n\t\t\t\tdelIng := obj.(*v1.Ingress)\n\t\t\t\tif !utils.IsGLBCIngress(delIng) {\n\t\t\t\t\tlogger.V(4).Info(\"Ignoring delete for ingress based on annotation\", \"ingress\", klog.KObj(delIng), \"annotation\", annotations.IngressClassKey)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tnegController.enqueueIngressServices(delIng)\n\t\t\t},\n\t\t\tUpdateFunc: func(old, cur interface{}) {\n\t\t\t\toldIng := old.(*v1.Ingress)\n\t\t\t\tcurIng := cur.(*v1.Ingress)\n\t\t\t\t// Check if ingress class changed and previous class was a GCE ingress\n\t\t\t\t// Ingress class change may require cleanup so enqueue related services\n\t\t\t\tif !utils.IsGLBCIngress(curIng) && !utils.IsGLBCIngress(oldIng) {\n\t\t\t\t\tlogger.V(4).Info(\"Ignoring update for ingress based on annotation\", \"ingress\", klog.KObj(curIng), \"annotation\", annotations.IngressClassKey)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tkeys := gatherIngressServiceKeys(oldIng)\n\t\t\t\tkeys = keys.Union(gatherIngressServiceKeys(curIng))\n\t\t\t\tfor _, key := range keys.List() {\n\t\t\t\t\tnegController.enqueueService(cache.ExplicitKey(key))\n\t\t\t\t}\n\t\t\t},\n\t\t})\n\n\t\tpodInformer.AddEventHandler(cache.ResourceEventHandlerFuncs{\n\t\t\tAddFunc: func(obj interface{}) {\n\t\t\t\tpod := obj.(*apiv1.Pod)\n\t\t\t\tnegController.reflector.SyncPod(pod)\n\t\t\t},\n\t\t\tUpdateFunc: func(old, cur interface{}) {\n\t\t\t\tpod := cur.(*apiv1.Pod)\n\t\t\t\tnegController.reflector.SyncPod(pod)\n\t\t\t},\n\t\t})\n\t}\n\tserviceInformer.AddEventHandler(cache.ResourceEventHandlerFuncs{\n\t\tAddFunc: negController.enqueueService,\n\t\tDeleteFunc: negController.enqueueService,\n\t\tUpdateFunc: func(old, cur interface{}) {\n\t\t\tnegController.enqueueService(cur)\n\t\t},\n\t})\n\tendpointSliceInformer.AddEventHandler(cache.ResourceEventHandlerFuncs{\n\t\tAddFunc: negController.enqueueEndpointSlice,\n\t\tDeleteFunc: negController.enqueueEndpointSlice,\n\t\tUpdateFunc: func(old, cur interface{}) {\n\t\t\tnegController.enqueueEndpointSlice(cur)\n\t\t},\n\t})\n\tnodeInformer.AddEventHandler(cache.ResourceEventHandlerFuncs{\n\t\tAddFunc: func(obj interface{}) {\n\t\t\tnode := obj.(*apiv1.Node)\n\t\t\tnegController.enqueueNode(node)\n\t\t},\n\t\tDeleteFunc: func(obj interface{}) {\n\t\t\tnode := obj.(*apiv1.Node)\n\t\t\tnegController.enqueueNode(node)\n\t\t},\n\t\tUpdateFunc: func(old, cur interface{}) {\n\t\t\toldNode := old.(*apiv1.Node)\n\t\t\tcurrentNode := cur.(*apiv1.Node)\n\n\t\t\tvmIpCandidateNodeCheck := negtypes.NodePredicateForNetworkEndpointType(negtypes.VmIpEndpointType)\n\t\t\tvmIpPortCandidateNodeCheck := negtypes.NodePredicateForNetworkEndpointType(negtypes.VmIpPortEndpointType)\n\n\t\t\tif vmIpCandidateNodeCheck(oldNode) != vmIpCandidateNodeCheck(currentNode) ||\n\t\t\t\tvmIpPortCandidateNodeCheck(oldNode) != vmIpPortCandidateNodeCheck(currentNode) {\n\t\t\t\tlogger.Info(\"Node has changed, enqueueing\", \"node\", currentNode.Name)\n\t\t\t\tnegController.enqueueNode(currentNode)\n\t\t\t}\n\t\t},\n\t})\n\n\tif enableAsm {\n\t\tnegController.enableASM = enableAsm\n\t\tnegController.asmServiceNEGSkipNamespaces = asmServiceNEGSkipNamespaces\n\t}\n\treturn negController\n}", "title": "" }, { "docid": "39b7f009d38b4429ef23261e89a83537", "score": "0.58540136", "text": "func NewController(clientset clientset.Interface, config config.Config) (*Controller, error) {\n\tcontroller := &Controller{\n\t\tclientset: clientset,\n\t\tconfig: config,\n\t}\n\n\tcontroller.ipProviders = ipProviders.PopulateFromConfig(config.IpProviders)\n\tif len(controller.ipProviders) == 0 {\n\t\treturn nil, errors.New(\"No Ip Provider specified\")\n\t}\n\tcontroller.provider = providers.PopulateFromConfig(config.Provider, clientset)\n\tif controller.provider == nil {\n\t\treturn nil, errors.New(\"No Provider specified\")\n\t}\n\treturn controller, nil\n}", "title": "" }, { "docid": "cfc8e902bb3ef9fe9989792a333bcc55", "score": "0.5846347", "text": "func NewController(travelService contract.TravelService, mapper mapper.Mapper) *Controller {\n\tonce.Do(func() {\n\t\tinstance = &Controller{\n\t\t\ttravelService: travelService,\n\t\t\tmapper: mapper,\n\t\t}\n\t})\n\treturn instance\n}", "title": "" }, { "docid": "81e9c066a9b667af0e7ff3ee2c4d3306", "score": "0.58425486", "text": "func New(kind int, sim bool) (Controller, error) {\n\tvar err error\n\tc := &controller{\n\t\tctype: kind,\n\t\tinitCh: make(chan bool),\n\t}\n\n\tc.ctx, c.cancel = context.WithTimeout(context.Background(), timeout*time.Second)\n\tc.service, err = service.NewEcu(kind, sim, c.initCh)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn c, c.connect()\n}", "title": "" }, { "docid": "2a65e2dffea82d8e19986e428f78849e", "score": "0.5841702", "text": "func NewController(client Client, ticker time.Ticker) *Controller {\n\treturn &Controller{\n\t\tclient: client,\n\t\tticker: ticker,\n\t}\n}", "title": "" }, { "docid": "2977b52e5d47010a9ddf0d959adb963e", "score": "0.583368", "text": "func newController(fd int, k *kernel.Kernel, w *watchdog.Watchdog) (*controller, error) {\n\tsrv, err := server.CreateFromFD(fd)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tmanager := &containerManager{\n\t\tstartChan: make(chan struct{}),\n\t\tstartResultChan: make(chan error),\n\t\tk: k,\n\t\twatchdog: w,\n\t}\n\tsrv.Register(manager)\n\n\tif eps, ok := k.NetworkStack().(*epsocket.Stack); ok {\n\t\tnet := &Network{\n\t\t\tStack: eps.Stack,\n\t\t}\n\t\tsrv.Register(net)\n\t}\n\n\tsrv.Register(&debug{})\n\n\tif err := srv.StartServing(); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &controller{\n\t\tsrv: srv,\n\t\tmanager: manager,\n\t}, nil\n}", "title": "" } ]
c0a695afaea501f46eb9b7ec3075299a
SetOperationId sets the OperationId field's value.
[ { "docid": "4da3bdc01b262884a3fb606333166080", "score": "0.59306175", "text": "func (s *GetOperationInput) SetOperationId(v string) *GetOperationInput {\n\ts.OperationId = &v\n\treturn s\n}", "title": "" } ]
[ { "docid": "42db840ab3de85622089be4d3ea06dea", "score": "0.67051905", "text": "func (s *CreatePublicDnsNamespaceOutput) SetOperationId(v string) *CreatePublicDnsNamespaceOutput {\n\ts.OperationId = &v\n\treturn s\n}", "title": "" }, { "docid": "94475a80465adcedac2f96e69225c432", "score": "0.6686124", "text": "func (s *UpdatePublicDnsNamespaceOutput) SetOperationId(v string) *UpdatePublicDnsNamespaceOutput {\n\ts.OperationId = &v\n\treturn s\n}", "title": "" }, { "docid": "8fb53db55bcec878818f786fe9bbb5f0", "score": "0.6645524", "text": "func (s *RegisterInstanceOutput) SetOperationId(v string) *RegisterInstanceOutput {\n\ts.OperationId = &v\n\treturn s\n}", "title": "" }, { "docid": "16f746ffb4befdcb8aadef86b96005b0", "score": "0.6620224", "text": "func (s *CreatePrivateDnsNamespaceOutput) SetOperationId(v string) *CreatePrivateDnsNamespaceOutput {\n\ts.OperationId = &v\n\treturn s\n}", "title": "" }, { "docid": "4423aaef4ab27a5008b4afbf92920733", "score": "0.6613407", "text": "func (o *CampaignOperationState) SetOperationId(v string) {\n\to.OperationId = &v\n}", "title": "" }, { "docid": "ee999251b9164fbaca63fc41d2864648", "score": "0.6589584", "text": "func (s *UpdatePrivateDnsNamespaceOutput) SetOperationId(v string) *UpdatePrivateDnsNamespaceOutput {\n\ts.OperationId = &v\n\treturn s\n}", "title": "" }, { "docid": "2d5067e1274468733f0b57bb1cba1034", "score": "0.657702", "text": "func (b *OperationBuilder) OperationID(v string) *OperationBuilder {\n\tb.target.operationID = v\n\treturn b\n}", "title": "" }, { "docid": "b0b52ff661cb9b39ca3815a12805ba87", "score": "0.6483096", "text": "func (o *ErrorAllOf) SetOperationId(v string) {\n\to.OperationId = &v\n}", "title": "" }, { "docid": "82741258e33c7bd15b532ee2cd55bba8", "score": "0.6466077", "text": "func (o ApiOperationPolicyOutput) OperationId() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *ApiOperationPolicy) pulumi.StringOutput { return v.OperationId }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "cc66382ca16e14fdcd9270237829d998", "score": "0.6434093", "text": "func (s *CreateHttpNamespaceOutput) SetOperationId(v string) *CreateHttpNamespaceOutput {\n\ts.OperationId = &v\n\treturn s\n}", "title": "" }, { "docid": "e5d5f4ca2ee6a69971f87a30d6426baa", "score": "0.63650733", "text": "func (s *UpdateHttpNamespaceOutput) SetOperationId(v string) *UpdateHttpNamespaceOutput {\n\ts.OperationId = &v\n\treturn s\n}", "title": "" }, { "docid": "6f1076b2fd38afd2b445d8a4a0981725", "score": "0.6360286", "text": "func (s *DeregisterInstanceOutput) SetOperationId(v string) *DeregisterInstanceOutput {\n\ts.OperationId = &v\n\treturn s\n}", "title": "" }, { "docid": "ff869a4db0dc2b842a664b6edfa1370f", "score": "0.6315439", "text": "func (s *DeleteNamespaceOutput) SetOperationId(v string) *DeleteNamespaceOutput {\n\ts.OperationId = &v\n\treturn s\n}", "title": "" }, { "docid": "91856cc34ac822bedcf33d9f2f40e118", "score": "0.6270042", "text": "func (_m *MockEOperation) SetOperationID(_a0 int) {\n\t_m.Called(_a0)\n}", "title": "" }, { "docid": "a0c677620506816d1ea169da52a42b6b", "score": "0.62341815", "text": "func (s *UpdateServiceOutput) SetOperationId(v string) *UpdateServiceOutput {\n\ts.OperationId = &v\n\treturn s\n}", "title": "" }, { "docid": "2fa3eadf81b3f22e4e175b46dde940ca", "score": "0.61123735", "text": "func (b *ErrorBuilder) OperationID(value string) *ErrorBuilder {\n\tb.operationID = value\n\tb.bitmap_ |= 32\n\treturn b\n}", "title": "" }, { "docid": "a20942ee7ace5016535e3d66a70f8638", "score": "0.5796621", "text": "func (o *CampaignOperationState) GetOperationId() string {\n\tif o == nil || o.OperationId == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.OperationId\n}", "title": "" }, { "docid": "82231f2670114987f6bebe62bb9818d5", "score": "0.57494426", "text": "func (o *ErrorAllOf) GetOperationId() string {\n\tif o == nil || o.OperationId == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.OperationId\n}", "title": "" }, { "docid": "cc39a177eb7b009b3d427a8bfa7d8ef1", "score": "0.5591882", "text": "func (om *OperationManager) Id() string {\n\treturn om.op.Id\n}", "title": "" }, { "docid": "e11ea5f824cd4e5fa247be83d178a7e9", "score": "0.5437489", "text": "func (o *DeleteImageParams) SetOpID(opID *string) {\n\to.OpID = opID\n}", "title": "" }, { "docid": "140658f17b8752afec6c02f89fea9031", "score": "0.54138905", "text": "func (em *CacheOp) OperationID() OpType {\n\treturn em.op\n}", "title": "" }, { "docid": "8e01ff5f7c67df176e04458d4ca55a8a", "score": "0.535092", "text": "func (m *PrivilegedOperationEvent) SetRequestorId(value *string)() {\n err := m.GetBackingStore().Set(\"requestorId\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "3af16d255c553e81f23ae86e496265d8", "score": "0.5270801", "text": "func (m *LicenseMutation) SetOp(op Op) {\n\tm.op = op\n}", "title": "" }, { "docid": "9a902c29f44d3d6e8fa0c035696eb2f1", "score": "0.51664716", "text": "func (m *TeamItemRequestBuilder) OperationsById(id string)(*ie78978d46a3704a561b7ecbd9e66a5ee9be50b99960e26229ec758c80ee98271.TeamsAsyncOperationItemRequestBuilder) {\n urlTplParams := make(map[string]string)\n for idx, item := range m.pathParameters {\n urlTplParams[idx] = item\n }\n if id != \"\" {\n urlTplParams[\"teamsAsyncOperation%2Did\"] = id\n }\n return ie78978d46a3704a561b7ecbd9e66a5ee9be50b99960e26229ec758c80ee98271.NewTeamsAsyncOperationItemRequestBuilderInternal(urlTplParams, m.requestAdapter);\n}", "title": "" }, { "docid": "0f105741b79e8a4764e5a6af4ac3527d", "score": "0.513461", "text": "func (m *OnenoteRequestBuilder) OperationsById(id string)(*i2b8ad7bd2ae87c92c8852bbeef996852d7685df93cb12b50d58ecc094ecfd124.OnenoteOperationItemRequestBuilder) {\n urlTplParams := make(map[string]string)\n for idx, item := range m.pathParameters {\n urlTplParams[idx] = item\n }\n if id != \"\" {\n urlTplParams[\"onenoteOperation%2Did\"] = id\n }\n return i2b8ad7bd2ae87c92c8852bbeef996852d7685df93cb12b50d58ecc094ecfd124.NewOnenoteOperationItemRequestBuilderInternal(urlTplParams, m.requestAdapter);\n}", "title": "" }, { "docid": "f55bfb78f9db962a06884149f9dbb9dc", "score": "0.5128517", "text": "func (e *Error) OperationID() string {\n\tif e != nil && e.bitmap_&32 != 0 {\n\t\treturn e.operationID\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "c70911e2aa4ea7f5e934472fa5fcc27f", "score": "0.51283294", "text": "func (m *GroupInfoMutation) SetOp(op Op) {\n\tm.op = op\n}", "title": "" }, { "docid": "659040d065a53886c2384ef4441f5051", "score": "0.51208365", "text": "func (o *GetInstancesDocByOperationId2Params) SetOperationID(operationID string) {\n\to.OperationID = operationID\n}", "title": "" }, { "docid": "3017cbf6c70f1ebff1faa0391b736d9d", "score": "0.5103983", "text": "func (o *UnaryOperator) SetOperation(op UnOperation) {\n\to.op = op\n}", "title": "" }, { "docid": "46efa76ddaa560c4bc78b84c8e38ffab", "score": "0.50930005", "text": "func (o *CampaignOperationState) HasOperationId() bool {\n\tif o != nil && o.OperationId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "ae82979c2df5184675ba741f726a80c1", "score": "0.50704616", "text": "func (m *APIMutation) SetOp(op Op) {\n\tm.op = op\n}", "title": "" }, { "docid": "0922304cc0648683679e5e4ce14b594b", "score": "0.50568753", "text": "func (m *TodoMutation) SetOp(op Op) {\n\tm.op = op\n}", "title": "" }, { "docid": "b5c919008e8362f0b9c1ffd7ab08bd84", "score": "0.4972883", "text": "func (m *PetMutation) SetOp(op Op) {\n\tm.op = op\n}", "title": "" }, { "docid": "2960dd1201ce35813b38b88a0404060b", "score": "0.49665183", "text": "func (m *GroupMutation) SetOp(op Op) {\n\tm.op = op\n}", "title": "" }, { "docid": "d6773e342f04698645c459cb822c6575", "score": "0.49575317", "text": "func (m *TaskMutation) SetOp(op Op) {\n\tm.op = op\n}", "title": "" }, { "docid": "b6d97c941a879de293998fabbffb0d97", "score": "0.49389485", "text": "func (m *GoodsMutation) SetOp(op Op) {\n\tm.op = op\n}", "title": "" }, { "docid": "4e5f1edf7eded51ed3d178cfabad45c9", "score": "0.48998016", "text": "func TestOpID(t *testing.T) {\n\tassert := assert.New(t)\n\tcorid := \"fooid\"\n\topid := \"12345\"\n\tctx := NewFContext(corid)\n\tctx.AddRequestHeader(opIDHeader, opid)\n\tactOpID, err := getOpID(ctx)\n\tassert.Nil(err)\n\tassert.Equal(uint64(12345), actOpID)\n\n\tdelete(ctx.(*FContextImpl).requestHeaders, opIDHeader)\n\t_, err = getOpID(ctx)\n\tassert.Equal(fmt.Errorf(\"FContext does not have the required %s request header\", opIDHeader), err)\n\n\topIDStr := \"-123\"\n\tctx.(*FContextImpl).requestHeaders[opIDHeader] = opIDStr\n\t_, err = getOpID(ctx)\n\tassert.Equal(fmt.Errorf(\"FContext has an opid that is not a non-negative integer: %s\", opIDStr), err)\n}", "title": "" }, { "docid": "153c2c673295c6526cac5f3c923ffe56", "score": "0.48950338", "text": "func (r SetRequest) Operation() OperationType {\n\treturn OperationUpsert\n}", "title": "" }, { "docid": "7d93d266af8b7b2d17ffe6382af743fd", "score": "0.4891901", "text": "func (s *mockspan) SetOperationName(operationName string) {\n\ts.Lock()\n\tdefer s.Unlock()\n\ts.name = operationName\n\treturn\n}", "title": "" }, { "docid": "36d3a8d0c0ec91a495f79a55493a9bbb", "score": "0.48763883", "text": "func (o *Operation) SetOp(v string) {\n\to.Op = &v\n}", "title": "" }, { "docid": "088f5ecfc66609332bc93691516cf96e", "score": "0.4871952", "text": "func (m *SpecMutation) SetOp(op Op) {\n\tm.op = op\n}", "title": "" }, { "docid": "40d7fb6062f96bac8190aa80779ddc0e", "score": "0.48608086", "text": "func (o *ErrorAllOf) HasOperationId() bool {\n\tif o != nil && o.OperationId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "ac016ab70b0509536bdcec904ba02391", "score": "0.48458663", "text": "func (e *Error) OperationID() string {\n\treturn e.Details[\"operation_id\"]\n}", "title": "" }, { "docid": "04e628401c9d06ec71897f24d5aa1bab", "score": "0.48289952", "text": "func (op *SecureBuilderAuthorizationDecoratorOperation) Id() string {\n\treturn op.authorized.Id()\n}", "title": "" }, { "docid": "d24f5d44b1cdc7040cc7b2e1b645c687", "score": "0.48281598", "text": "func (m *UserMutation) SetOp(op Op) {\n\tm.op = op\n}", "title": "" }, { "docid": "3963c1f90ef283fff3dd883e8feedc6d", "score": "0.4804277", "text": "func (m *FileTypeMutation) SetOp(op Op) {\n\tm.op = op\n}", "title": "" }, { "docid": "82aa18a417d8115b0c0b50b71738632c", "score": "0.47943825", "text": "func (o *UnbindContainerParams) SetOpID(opID *string) {\n\to.OpID = opID\n}", "title": "" }, { "docid": "d461ebd58bc6023888c51389a171ef74", "score": "0.47894198", "text": "func TestID_IncOperationOrder(t *testing.T) {\n\ttid := ID{0, 0, 0}\n\ttid.IncOperationOrder()\n\tassert.Equal(t, int32(1), tid.OperationOrder)\n\ttid.OperationOrder = OperationMask\n\ttid.IncOperationOrder()\n\tassert.Equal(t, int32(0), tid.OperationOrder)\n\tassert.Equal(t, int32(1), tid.LedgerSequence)\n}", "title": "" }, { "docid": "03d87082a7f6470c4bbde7cb865c4619", "score": "0.4788157", "text": "func (p *Player) SetOperational(id int, num int) error {\n\tri := &ResourceInstallations{}\n\n\tswitch id {\n\tcase resource.Coal:\n\t\tri = &p.Coal\n\tcase resource.Oil:\n\t\tri = &p.Oil\n\tcase resource.Gas:\n\t\tri = &p.Gas\n\tcase resource.Nuclear:\n\t\tri = &p.Nuclear\n\tcase resource.Geothermal:\n\t\tri = &p.Geothermal\n\tcase resource.Solar:\n\t\tri = &p.Solar\n\tcase resource.Wind:\n\t\tri = &p.Wind\n\tcase resource.Hydroelectric:\n\t\tri = &p.Hydroelectric\n\tdefault:\n\t\treturn resource.ErrInvalidResource\n\t}\n\n\tif num < 0 || num > ri.Owned {\n\t\treturn ErrInvalidOperational\n\t}\n\n\tfmt.Println(num)\n\n\tri.Operational = num\n\treturn nil\n}", "title": "" }, { "docid": "457075cce910f5ff42867d6636e1eddf", "score": "0.47709915", "text": "func (m *FileMutation) SetOp(op Op) {\n\tm.op = op\n}", "title": "" }, { "docid": "d4c5476475850a602438b4ede59b5b37", "score": "0.47286358", "text": "func (req *Request) SetOperationValue(value interface{}) {\n\tif req.values == nil {\n\t\treq.values = opValues{}\n\t}\n\treq.values.set(value)\n}", "title": "" }, { "docid": "a551b96aa16d5eaa8ee244175c91fea7", "score": "0.47230452", "text": "func (o *ContainerGetStderrParams) SetOpID(opID *string) {\n\to.OpID = opID\n}", "title": "" }, { "docid": "16d99593cdf220a66b8f3337d32e35c1", "score": "0.4718247", "text": "func (m *ItemMutation) SetOp(op Op) {\n\tm.op = op\n}", "title": "" }, { "docid": "52b47af703fe5a5a7213748c3ba69302", "score": "0.47027442", "text": "func (m *GoodsSkuMutation) Op() Op {\n\treturn m.op\n}", "title": "" }, { "docid": "c7e4d94366d30bc0dac6ced9d6a4816e", "score": "0.46951187", "text": "func Operation(v interface{}) string {\n\tvar operation string\n\tif hasOp, ok := v.(HasOperation); ok {\n\t\toperation = hasOp.GetOperation()\n\t}\n\treturn operation\n}", "title": "" }, { "docid": "219c1ba035acb26fcb252bbd2bbb4682", "score": "0.46736294", "text": "func (m *NodeMutation) SetOp(op Op) {\n\tm.op = op\n}", "title": "" }, { "docid": "736dc3cef0c051c68f76664b2163ee22", "score": "0.4670573", "text": "func (o *CampaignOperationState) GetOperationIdOk() (*string, bool) {\n\tif o == nil || o.OperationId == nil {\n\t\treturn nil, false\n\t}\n\treturn o.OperationId, true\n}", "title": "" }, { "docid": "bd04c3c69ce32e3c87fab42c4d3ccac6", "score": "0.46550107", "text": "func (cmd *GetCurrentNetCmd) SetId(id interface{}) {\n\tcmd.id = id\n}", "title": "" }, { "docid": "465416b6919ee6c1d9a150314a1d7a90", "score": "0.4650649", "text": "func (options *GetClusterKeyOwnerOptions) SetIdOrName(idOrName string) *GetClusterKeyOwnerOptions {\n\toptions.IdOrName = core.StringPtr(idOrName)\n\treturn options\n}", "title": "" }, { "docid": "d3b47328c22420287f3faa658f51aae3", "score": "0.46495783", "text": "func (options *GetCluster1Options) SetIdOrName(idOrName string) *GetCluster1Options {\n\toptions.IdOrName = core.StringPtr(idOrName)\n\treturn options\n}", "title": "" }, { "docid": "c7e001aeb78e05272404aea011acf02f", "score": "0.4628843", "text": "func (m *CardMutation) SetOp(op Op) {\n\tm.op = op\n}", "title": "" }, { "docid": "481562176b3c1945184dbc11133e25f5", "score": "0.4613767", "text": "func ContextOperationID(ctx context.Context) string {\n\tv := ctx.Value(ContextKeyOperationID)\n\tif v == nil {\n\t\treturn \"\"\n\t}\n\n\tres, ok := v.(string)\n\tif !ok {\n\t\treturn \"\"\n\t}\n\n\treturn res\n}", "title": "" }, { "docid": "991ccaf3b90d1db3cf15c93627c21314", "score": "0.46120855", "text": "func (m *LicenseMutation) Op() Op {\n\treturn m.op\n}", "title": "" }, { "docid": "97e8743faacb3fa7c029cc0e2752e68b", "score": "0.46073902", "text": "func (m *OrderGoodsSkuMutation) Op() Op {\n\treturn m.op\n}", "title": "" }, { "docid": "8b2e74e4a5ad72f39ce081f0faba9d31", "score": "0.460714", "text": "func (ts *TeeSpan) SetOperationName(operationName string) opentracing.Span {\n\tfor _, sp := range ts.spans {\n\t\tsp.SetOperationName(operationName)\n\t}\n\treturn ts\n}", "title": "" }, { "docid": "d7d3c7624f6f181dea285162375ae9eb", "score": "0.4601663", "text": "func (o *ErrorAllOf) GetOperationIdOk() (*string, bool) {\n\tif o == nil || o.OperationId == nil {\n\t\treturn nil, false\n\t}\n\treturn o.OperationId, true\n}", "title": "" }, { "docid": "b6d16b28989806ffca6fcf33e0ca0888", "score": "0.45919633", "text": "func (options *GetClusterUserSubnetOptions) SetIdOrName(idOrName string) *GetClusterUserSubnetOptions {\n\toptions.IdOrName = core.StringPtr(idOrName)\n\treturn options\n}", "title": "" }, { "docid": "2487012a35990faa6057dc7705e8457f", "score": "0.4585364", "text": "func (options *HandleMasterAPIServerOptions) SetIdOrName(idOrName string) *HandleMasterAPIServerOptions {\n\toptions.IdOrName = core.StringPtr(idOrName)\n\treturn options\n}", "title": "" }, { "docid": "d80920d31a83638d3ff1e3a0ac264b98", "score": "0.45834416", "text": "func AddOperation(o Operation) int {\n\to.OperationID = *OperationID\n\t*OperationID++\n\tOperationMap[o.OperationShortName] = o\n\treturn o.OperationID\n}", "title": "" }, { "docid": "cd5445f2249fbe8ef94c6bee48518d0c", "score": "0.45746687", "text": "func (options *GetClusterSubnetsOptions) SetIdOrName(idOrName string) *GetClusterSubnetsOptions {\n\toptions.IdOrName = core.StringPtr(idOrName)\n\treturn options\n}", "title": "" }, { "docid": "d1d2b89599265427254eaa14da510722", "score": "0.45708823", "text": "func (o *PutOperationsIDParams) WithTimeout(timeout time.Duration) *PutOperationsIDParams {\n\to.SetTimeout(timeout)\n\treturn o\n}", "title": "" }, { "docid": "6dc3d8770a3929e0adf030b17bb19e4d", "score": "0.45670763", "text": "func (u HashIdPreimage) GetOperationId() (result HashIdPreimageOperationId, ok bool) {\n\tarmName, _ := u.ArmForSwitch(int32(u.Type))\n\n\tif armName == \"OperationId\" {\n\t\tresult = *u.OperationId\n\t\tok = true\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "a30a5e5f886117cb96b2b779c0fb61f1", "score": "0.45596302", "text": "func (options *GetClusterACLsOptions) SetIdOrName(idOrName string) *GetClusterACLsOptions {\n\toptions.IdOrName = core.StringPtr(idOrName)\n\treturn options\n}", "title": "" }, { "docid": "8c95f00683ec59bae044efdcde2831a2", "score": "0.45449972", "text": "func (m *CommentMutation) SetOp(op Op) {\n\tm.op = op\n}", "title": "" }, { "docid": "8f1ca932bdc10a1ae3e4515e34f02ea7", "score": "0.4531185", "text": "func (o *MeGroups) SetCorporationId(v string) {\n\to.CorporationId.Set(&v)\n}", "title": "" }, { "docid": "35064a597e63b921656134b5fe848657", "score": "0.45105952", "text": "func (options *UpdateClusterOptions) SetIdOrName(idOrName string) *UpdateClusterOptions {\n\toptions.IdOrName = core.StringPtr(idOrName)\n\treturn options\n}", "title": "" }, { "docid": "ba754f7a5622e6294d0228dc9319ae38", "score": "0.45050308", "text": "func (m *GoodsSpecsOptionMutation) Op() Op {\n\treturn m.op\n}", "title": "" }, { "docid": "cb8fbf880d90a2e09ad489c6627b1b35", "score": "0.45049715", "text": "func (s *Span) SetOperationName(operationName string) tracing.Span {\n\ts.operationName = operationName\n\treturn s\n}", "title": "" }, { "docid": "c4ffc36d0d92c1954e377cbb28a24230", "score": "0.44946098", "text": "func (m *AttackSimulationOperationsRequestBuilder) ByAttackSimulationOperationId(attackSimulationOperationId string)(*AttackSimulationOperationsAttackSimulationOperationItemRequestBuilder) {\n urlTplParams := make(map[string]string)\n for idx, item := range m.BaseRequestBuilder.PathParameters {\n urlTplParams[idx] = item\n }\n if attackSimulationOperationId != \"\" {\n urlTplParams[\"attackSimulationOperation%2Did\"] = attackSimulationOperationId\n }\n return NewAttackSimulationOperationsAttackSimulationOperationItemRequestBuilderInternal(urlTplParams, m.BaseRequestBuilder.RequestAdapter)\n}", "title": "" }, { "docid": "b410fa10677775b3b9746c6a9f722ad9", "score": "0.44945568", "text": "func (o *Ocal) SetOp(direction int) (op string) {\n\tif direction == -1 {\n\t\to.op = \"/\"\n\t\to.direction = direction\n\t} else if direction == 0 {\n\t\to.op = \"|\"\n\t\to.direction = direction\n\t} else if direction == 1 {\n\t\to.op = \"-\"\n\t\to.direction = direction\n\t}\n\treturn\n}", "title": "" }, { "docid": "8e700e731bf7a3777b9ebcaeb42783c7", "score": "0.4489424", "text": "func (options *AddClusterSubnetOptions) SetIdOrName(idOrName string) *AddClusterSubnetOptions {\n\toptions.IdOrName = core.StringPtr(idOrName)\n\treturn options\n}", "title": "" }, { "docid": "1150162d633063c3d0526cd0a53980a8", "score": "0.4485639", "text": "func (options *CreateClusterSubnetOptions) SetIdOrName(idOrName string) *CreateClusterSubnetOptions {\n\toptions.IdOrName = core.StringPtr(idOrName)\n\treturn options\n}", "title": "" }, { "docid": "48ca25151ca9df397e89add9498e3c54", "score": "0.44824314", "text": "func (m *OrganizationMutation) Op() Op {\n\treturn m.op\n}", "title": "" }, { "docid": "a0def55684971b993e9696f6c06c3482", "score": "0.44817096", "text": "func (options *ListServicesForAllNamespacesOptions) SetIdOrName(idOrName string) *ListServicesForAllNamespacesOptions {\n\toptions.IdOrName = core.StringPtr(idOrName)\n\treturn options\n}", "title": "" }, { "docid": "31cfcb22758e773d6dbc055490c1a5c4", "score": "0.4477276", "text": "func (r *AliexpressSolutionFeedSubmitAPIRequest) SetOperationType(_operationType string) error {\n\tr._operationType = _operationType\n\tr.Set(\"operation_type\", _operationType)\n\treturn nil\n}", "title": "" }, { "docid": "9665f2a5f218af77dacb4bd0faf41a1b", "score": "0.4470126", "text": "func (options *GetClusterConfigOptions) SetIdOrName(idOrName string) *GetClusterConfigOptions {\n\toptions.IdOrName = core.StringPtr(idOrName)\n\treturn options\n}", "title": "" }, { "docid": "ad99a95810ea2d8b0f5e948b9638977d", "score": "0.44653404", "text": "func (options *AddClusterUserSubnetOptions) SetIdOrName(idOrName string) *AddClusterUserSubnetOptions {\n\toptions.IdOrName = core.StringPtr(idOrName)\n\treturn options\n}", "title": "" }, { "docid": "b40b8f5d021bb98ab036f892399af51a", "score": "0.4464588", "text": "func (options *GetUpdatePolicyOptions) SetIdOrName(idOrName string) *GetUpdatePolicyOptions {\n\toptions.IdOrName = core.StringPtr(idOrName)\n\treturn options\n}", "title": "" }, { "docid": "d5df7d1d347a9030b549e40cce5adeba", "score": "0.4463699", "text": "func (options *CreateKMSConfigOptions) SetIdOrName(idOrName string) *CreateKMSConfigOptions {\n\toptions.IdOrName = core.StringPtr(idOrName)\n\treturn options\n}", "title": "" }, { "docid": "082bb89b9c406a71732c7d231a895182", "score": "0.44580233", "text": "func (u HashIdPreimage) MustOperationId() HashIdPreimageOperationId {\n\tval, ok := u.GetOperationId()\n\n\tif !ok {\n\t\tpanic(\"arm OperationId is not set\")\n\t}\n\n\treturn val\n}", "title": "" }, { "docid": "1dc9e12c17adc89c66d6fbcf5966e7ce", "score": "0.4453512", "text": "func (options *BindServiceToNamespaceOptions) SetIdOrName(idOrName string) *BindServiceToNamespaceOptions {\n\toptions.IdOrName = core.StringPtr(idOrName)\n\treturn options\n}", "title": "" }, { "docid": "cd6363efe1a1c0c6ce180ee7cb9f1202", "score": "0.44481063", "text": "func (m *NetInterfaceLayerMutation) Op() Op {\n\treturn m.op\n}", "title": "" }, { "docid": "517945146e83d14764076aa2343641ef", "score": "0.4441299", "text": "func (options *AddClusterACLsOptions) SetIdOrName(idOrName string) *AddClusterACLsOptions {\n\toptions.IdOrName = core.StringPtr(idOrName)\n\treturn options\n}", "title": "" }, { "docid": "e0236413e58e7e732eeaafc42f9bc6a4", "score": "0.44407067", "text": "func SetTransactionOpNameToContext(ctx context.Context, name string) context.Context {\n\tif ctx == nil {\n\t\tctx = context.Background()\n\t}\n\treturn context.WithValue(ctx, operationNameKey{}, name)\n}", "title": "" }, { "docid": "8bc484469f606f62eea37b981d08b9e8", "score": "0.44358104", "text": "func (cmd *ListAllTransactionsCmd) SetId(id interface{}) {\n\tcmd.id = id\n}", "title": "" }, { "docid": "0709a8fcd5b26c61444e10b6e3724a0a", "score": "0.44316116", "text": "func (o *ExecuteWorkflowParams) SetOp(op string) {\n\to.Op = op\n}", "title": "" }, { "docid": "f883728710d3249b9b293b953ea93d80", "score": "0.44311208", "text": "func (o *PutOperationsIDParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.AppRequest != nil {\n\t\tif err := r.SetBodyParam(o.AppRequest); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// path param id\n\tif err := r.SetPathParam(\"id\", swag.FormatInt64(o.ID)); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "1c0827df845e1acd36879ab0d01be27d", "score": "0.44208714", "text": "func (options *DisableClusterACLsOptions) SetIdOrName(idOrName string) *DisableClusterACLsOptions {\n\toptions.IdOrName = core.StringPtr(idOrName)\n\treturn options\n}", "title": "" }, { "docid": "03c5dda6c91754d3ae9221a065a62ded", "score": "0.44110155", "text": "func (options *GetDefaultLoggingEndpointOptions) SetIdOrName(idOrName string) *GetDefaultLoggingEndpointOptions {\n\toptions.IdOrName = core.StringPtr(idOrName)\n\treturn options\n}", "title": "" }, { "docid": "456690f70f469d7bd525511cb5194a6c", "score": "0.43995756", "text": "func (cmd *NotifyNewTXsCmd) SetId(id interface{}) {\n\tcmd.id = id\n}", "title": "" } ]
fdd8c942d64c5a42ae5d1dbb878727c8
Parse the line, and description from an error message like: html/template:Application/Register.html:36: no such template "footer.html"
[ { "docid": "5d79d49b8f40b0f2276219146315715d", "score": "0.7165003", "text": "func parseTemplateError(err error) (templateName string, line int, description string) {\n\tdescription = err.Error()\n\ti := regexp.MustCompile(`:\\d+:`).FindStringIndex(description)\n\tif i != nil {\n\t\tline, err = strconv.Atoi(description[i[0]+1 : i[1]-1])\n\t\tif err != nil {\n\t\t\tERROR.Println(\"Failed to parse line number from error message:\", err)\n\t\t}\n\t\ttemplateName = description[:i[0]]\n\t\tif colon := strings.Index(templateName, \":\"); colon != -1 {\n\t\t\ttemplateName = templateName[colon+1:]\n\t\t}\n\t\ttemplateName = strings.TrimSpace(templateName)\n\t\tdescription = description[i[1]+1:]\n\t}\n\treturn templateName, line, description\n}", "title": "" } ]
[ { "docid": "dff114af8fb19d7720eaf72bf18b3acc", "score": "0.54759896", "text": "func (l *logintest) errorPage(format string, a ...interface{}) {\n\tl.message(format, a...)\n\tif !l.serving {\n\t\treturn\n\t}\n\te := map[string]string{\"Error\": fmt.Sprintf(format, a...)}\n\tl.Thing = e\n\terrortmpl := l.templates.Lookup(\"error.html\")\n\terr := errortmpl.Execute(l.w, l)\n\tif err != nil {\n\t\tlog.Printf(\"Error executing error template: %s\", err)\n\t}\n}", "title": "" }, { "docid": "3fd6a3312ab70e265275ae97be6c7b32", "score": "0.5382313", "text": "func error_message(w http.ResponseWriter, r *http.Request, msg string) {\n\tlog.Println(\"ERROR:\", msg)\n\t_ = goview.Render(w, http.StatusBadRequest, \"error\", goview.M{\n\t\t\"Authorized\": authorized(r),\n\t\t\"CategoryNavbar\": &CategoryNavbar,\n\t\t\"err\": msg,\n\t})\n}", "title": "" }, { "docid": "95946cb3e02be6adaff322d615506276", "score": "0.53742856", "text": "func errorSummary(err *revel.Error) (message string) {\n\texpectedPrefix := \"(expected)\"\n\tactualPrefix := \"(actual)\"\n\terrDesc := err.Description\n\t//strip the actual/expected stuff to provide more condensed display.\n\tif strings.Index(errDesc, expectedPrefix) == 0 {\n\t\terrDesc = errDesc[len(expectedPrefix):]\n\t}\n\tif strings.LastIndex(errDesc, actualPrefix) > 0 {\n\t\terrDesc = errDesc[0 : len(errDesc)-len(actualPrefix)]\n\t}\n\n\terrFile := err.Path\n\tslashIdx := strings.LastIndex(errFile, \"/\")\n\tif slashIdx > 0 {\n\t\terrFile = errFile[slashIdx+1:]\n\t}\n\n\tmessage = fmt.Sprintf(\"%s %s#%d\", errDesc, errFile, err.Line)\n\n\t/*\n\t\t// If line of error isn't known return the message as is.\n\t\tif err.Line == 0 {\n\t\t\treturn\n\t\t}\n\n\t\t// Otherwise, include info about the line number and the relevant\n\t\t// source code lines.\n\t\tmessage += fmt.Sprintf(\" (around line %d): \", err.Line)\n\t\tfor _, line := range err.ContextSource() {\n\t\t\tif line.IsError {\n\t\t\t\tmessage += line.Source\n\t\t\t}\n\t\t}\n\t*/\n\n\treturn\n}", "title": "" }, { "docid": "46e8a5d7d5cc20734820bd2b03104ece", "score": "0.52801883", "text": "func (ws *website) displayHTTPErrMsg(w http.ResponseWriter, errCode int) {\n\n\tindexBtyes := ws.getRawMasterPage()\n\n\terrText := fmt.Sprintf(\"Error %d - %s\", errCode, http.StatusText(errCode))\n\n\t// Get the error code page\n\tphysPath := fmt.Sprintf(\"%s/html/errors/gen-error.html\", ws.InstallPath)\n\terrBtyes, err := ioutil.ReadFile(physPath)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t} else {\n\t\terrBtyes = bytes.Replace(errBtyes, []byte(\"{{.ErrorText}}\"), []byte(errText), -1)\n\t\tindexBtyes = bytes.Replace(indexBtyes, []byte(\"{{.ErrorPlaceHolder}}\"), errBtyes, -1)\n\t}\n\n\tw.WriteHeader(errCode)\n\tw.Write(indexBtyes)\n}", "title": "" }, { "docid": "6f124b62d00aa6427818b2d11a40f27a", "score": "0.5237078", "text": "func InvalidPageHandler(response http.ResponseWriter, request *http.Request) {\n\tvar body, _ = helpers.LoadFile(\"templates/invalid.html\")\n\tfmt.Fprintf(response, body)\n}", "title": "" }, { "docid": "dd82bba55718e1344914ee76eb13823f", "score": "0.5230869", "text": "func errorSummary(err *utils.SourceError) (message string) {\n\texpectedPrefix := \"(expected)\"\n\tactualPrefix := \"(actual)\"\n\terrDesc := err.Description\n\t//strip the actual/expected stuff to provide more condensed display.\n\tif strings.Index(errDesc, expectedPrefix) == 0 {\n\t\terrDesc = errDesc[len(expectedPrefix):]\n\t}\n\tif strings.LastIndex(errDesc, actualPrefix) > 0 {\n\t\terrDesc = errDesc[0 : len(errDesc)-len(actualPrefix)]\n\t}\n\n\terrFile := err.Path\n\tslashIdx := strings.LastIndex(errFile, \"/\")\n\tif slashIdx > 0 {\n\t\terrFile = errFile[slashIdx+1:]\n\t}\n\n\tmessage = fmt.Sprintf(\"%s %s#%d\", errDesc, errFile, err.Line)\n\n\t/*\n\t\t// If line of error isn't known return the message as is.\n\t\tif err.Line == 0 {\n\t\t\treturn\n\t\t}\n\n\t\t// Otherwise, include info about the line number and the relevant\n\t\t// source code lines.\n\t\tmessage += fmt.Sprintf(\" (around line %d): \", err.Line)\n\t\tfor _, line := range err.ContextSource() {\n\t\t\tif line.IsError {\n\t\t\t\tmessage += line.Source\n\t\t\t}\n\t\t}\n\t*/\n\n\treturn\n}", "title": "" }, { "docid": "39d8eb5d970491824edd7792b054a207", "score": "0.51027745", "text": "func ParseError(inp string, pointer int, err string) error {\n\tlines := strings.Split(inp, \"\\n\")\n\n\t// Get the end of the parsed line by finding the next newline.\n\tendOfLineIndex := pointer + strings.Index(inp[pointer:], \"\\n\")\n\tif endOfLineIndex == pointer + (-1) {\n\t\tendOfLineIndex = len(inp)\n\t}\n\n\t// Get the start of the parsed line by finding the previous newline.\n\tbeginningOfLineIndex := pointer - strings.LastIndex(inp[:pointer], \"\\n\")\n\tif beginningOfLineIndex == pointer - (-1) {\n\t\tbeginningOfLineIndex = 0\n\t}\n\n\t// Get the contents of the line\n\tcurrentLine := inp[beginningOfLineIndex:endOfLineIndex]\n\tnumberOfSpacesToPointer := pointer - beginningOfLineIndex\n\n\t// Calculate the line number now that we know the line that the error was related to.\n\tvar lineNumber int\n\tfor i := 0; i < len(lines); i++ {\n\t\tif lines[i] == currentLine {\n\t\t\tlineNumber = i+1\n\t\t\tbreak\n\t\t}\n\t}\n\n\t// Pad left the indicator for which the pointer points to.\n\tspaces := \"\"\n\tfor i := 0; i < numberOfSpacesToPointer; i++ { spaces += \" \" }\n\n\t// Return a formatted error\n\treturn errors.New(fmt.Sprintf(\n\t\t\"parse error on line %d: %s\\n%s\\n%s^\",\n\t\tlineNumber,\n\t\terr,\n\t\tcurrentLine,\n\t\tspaces,\n\t))\n}", "title": "" }, { "docid": "f7d1b4a627abaafcd3a354efe2fa090e", "score": "0.49537995", "text": "func (t TemplateLineParser) ParseLine(line string) ([]interface{}, error) {\n\tentries := make([]interface{}, 0)\n\t// ...change this to split a line in the text file\n\tdata := util.SplitString(line, ':', true, true)\n\t// ...change this to check data here\n\tif len(data) != 4 {\n\t\tentries = append(entries, interface{}(nil))\n\t\treturn entries, nil\n\t}\n\t// ...change this to extract the relevant data fields to form an entry\n\tentry := util.GenericData{\n\t\tUsername: data[0],\n\t\tEmail: data[1],\n\t\tLiame: util.Reverse(data[1]),\n\t\tIP: data[2],\n\t\tPassword: data[3],\n\t\tBreach: \"000webhost\",\n\t}\n\tentries = append(entries, entry)\n\treturn entries, nil\n}", "title": "" }, { "docid": "71246db79db745ccb56e375e10ca3551", "score": "0.49391046", "text": "func err(writer http.ResponseWriter, request *http.Request) {\n\tvals := request.URL.Query()\n\n\tgenerateHTML(writer, vals.Get(\"msg\"), \"layout\", \"navbar\", \"error\")\n\n}", "title": "" }, { "docid": "7580cbad44adcc5e825b84384e01b4a0", "score": "0.49390796", "text": "func prepareError(r *http.Response) error {\n\tdefer r.Body.Close()\n\n\tvar data errorMessage\n\tif err := json.NewDecoder(r.Body).Decode(&data); err == nil {\n\t\treturn errors.New(fmt.Sprintf(\"sofort pay client: %s\", data.Message))\n\t} else {\n\t\treturn err\n\t}\n}", "title": "" }, { "docid": "0c0e8b6f6d433b723c2fdc19ebc51089", "score": "0.4930271", "text": "func parseErrorForResponse(body io.ReadCloser) (string, error) {\n\tvar bJson map[string]string\n\n\tbText, err := ioutil.ReadAll(body)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tbody.Close()\n\n\terr = json.Unmarshal(bText, &bJson)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tparseError, ok := bJson[\"error\"]\n\tif !ok {\n\t\treturn \"\", errors.New(\"Response body did not contain error key\")\n\t}\n\treturn parseError, nil\n}", "title": "" }, { "docid": "2cfeddebfcfca563eaa161a2c525a840", "score": "0.48703364", "text": "func (e *Error) MessageTemplate() string {\n\treturn e.message\n}", "title": "" }, { "docid": "880c473dfbe6b9a9560d7f7d30647100", "score": "0.48670712", "text": "func (f *bpFile) addErrorText(message string) {\n\tf.insertExtraComment(message)\n}", "title": "" }, { "docid": "856feba11d684b48871f9b7e86ad81f1", "score": "0.48642626", "text": "func renderError(w http.ResponseWriter, t string, s string) {\n\tw.WriteHeader(http.StatusInternalServerError)\n\n\te := phpError{\n\t\tErrorType: t,\n\t\tText: s,\n\t}\n\n\terr := tmpl.Execute(w, e)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "e0bdc5b4045abb0205ebf39efd8e00cd", "score": "0.48503533", "text": "func (err CreateError) Error() string {\n\treturn fmt.Sprintf(\"pw_reset: in Create(), %s [%s]\", err.Msg, err.Code)\n}", "title": "" }, { "docid": "fb9714e6389e6b66267c1523a634a73d", "score": "0.4847735", "text": "func database_error(format_string string, err error) {\r\n\tfmt.Printf(format_string,err)\r\n\tfmt.Println(\"</BODY></HTML>\")\r\n\tos.Exit(0)\r\n}", "title": "" }, { "docid": "2c1596aa8532ed3a5dcf0152de4e40c6", "score": "0.48375636", "text": "func (l *golex) Error(message string) {\n\tfmt.Fprintf(os.Stderr, \"ERROR: %d: Parser: %s\\n\", yylineno, message)\n os.Exit(2)\n}", "title": "" }, { "docid": "b4eeb36e9535f54d65db7bcf32e54d46", "score": "0.48079714", "text": "func examErrorMessage(pkg *astrav.Package, suggs sugg.Suggester) {\n\tcheckErrMessage(pkg.FindByName(\"errors.New\"), suggs)\n\tcheckErrMessage(pkg.FindByName(\"fmt.Errorf\"), suggs)\n}", "title": "" }, { "docid": "b7494b692a1f03d3baab8b8b30e4764e", "score": "0.48013896", "text": "func Location(err error) string {\n\tif err == nil {\n\t\treturn \"\"\n\t}\n\tif aerr, ok := err.(annotation); ok {\n\t\tfile, line := aerr.location()\n\t\tif len(file) > 0 && line > 0 {\n\t\t\treturn fmt.Sprintf(\"%s(%d)\", file, line)\n\t\t}\n\t}\n\treturn \"Unknown source\"\n}", "title": "" }, { "docid": "154fb0d3c28222dfd0f25521fda7db73", "score": "0.47965708", "text": "func TMPLERRmain(template Template) (string, error) {\n\t_template := \"main.tmpl\"\n\t_escape := html.EscapeString\n\tvar _ftmpl bytes.Buffer\n\t_w := func(str string) { _, _ = _ftmpl.WriteString(str) }\n\t_, _, _ = _template, _escape, _w\n\n\t_w(`\n`)\n\t_w(`\n`)\n\t_w(`<html>\n<head>\n <meta charset=\"UTF-8\">\n</head>\n<body>\n`)\n\t_w(`\nbu\n\n<ul>\n`)\n\tfor _, letter := range template.Letters {\n\t\t_w(` <li/> <a href=\"dictionary_`)\n\t\t_w(fmt.Sprintf(`%s`, _escape(letter.Letter)))\n\t\t_w(`.html\">`)\n\t\t_w(fmt.Sprintf(`%s`, _escape(letter.Letter)))\n\t\t_w(`</a> (`)\n\t\t_w(fmt.Sprintf(`%d`, len(letter.Words)))\n\t\t_w(` riječi)\n`)\n\t}\n\t_w(`</ul>\n`)\n\t_w(`</body>\n</html>\n`)\n\n\treturn _ftmpl.String(), nil\n}", "title": "" }, { "docid": "69f10164bc2d5d5d5ce6332be70e68c7", "score": "0.47782835", "text": "func (t *ErrorMessage) GetErrorDescription(err error) *ErrorDescription {\n\tif t == nil || t.Templates == nil {\n\t\treturn nil\n\t}\n\tins, ok := (*t.Templates)[err.Error()]\n\tif !ok {\n\t\treturn &ErrorDescription{Message: err.Error()}\n\t}\n\tif t.IsDebug {\n\t\tmsg := ins.getDebugMessage(Params{\"error\": err.Error()})\n\t\treturn &ErrorDescription{Code: ins.getCode(), Message: msg}\n\t}\n\tmsg := ins.getMessage(Params{\"error\": err.Error()})\n\treturn &ErrorDescription{Code: ins.getCode(), Message: msg}\n}", "title": "" }, { "docid": "ff203b3ae5f4cba9d0342d4b700092e7", "score": "0.4756044", "text": "func extractMessage(authorizationResponse AuthorizationResponse) (message string, responseError error) {\n\n\tif len(authorizationResponse.Errors) != 0 {\n\t\tvar errorMessage string\n\n\t\tfor _, authError := range authorizationResponse.Errors {\n\t\t\terrorMessage += authError.Message\n\t\t}\n\n\t\treturn \"\", errors.New(errorMessage)\n\n\t} else {\n\t\treturn authorizationResponse.AccessToken, nil\n\t}\n}", "title": "" }, { "docid": "211c46bdd0624910ca0a91275ab047ad", "score": "0.4746455", "text": "func fail(w http.ResponseWriter, status int, message string) {\n\tlog.Write(\"[error] %s\", message)\n\tw.WriteHeader(status)\n\n\ttmpl := template.New(\"layout\")\n\ttmpl, err := tmpl.Parse(templates.Layout)\n\tif err != nil {\n\t\tlog.Write(\"[Error] failed to parse html layout page. Displaying error message without layout.\")\n\t\ttmpl = template.New(\"content\")\n\t}\n\ttmpl, err = tmpl.Parse(templates.Fail)\n\tif err != nil {\n\t\tlog.Write(\"[Error] failed to render fail page. Displaying plain error message.\")\n\t\tw.Write([]byte(message))\n\t\treturn\n\t}\n\terrinfo := struct {\n\t\tStatusCode int\n\t\tStatusText string\n\t\tMessage string\n\t}{\n\t\tstatus,\n\t\thttp.StatusText(status),\n\t\tmessage,\n\t}\n\ttmpl.Execute(w, &errinfo)\n}", "title": "" }, { "docid": "41f8ba156569cad770f276b562d33be0", "score": "0.47208562", "text": "func parseApiError(r io.Reader) (string, error) {\n\tmessage, err := io.ReadAll(r)\n\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tae := apiError{}\n\tif err := json.Unmarshal(message, &ae); err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn ae.ErrorType, nil\n}", "title": "" }, { "docid": "8cf24b990380745a5124e7d1d0930e94", "score": "0.47079787", "text": "func _404Handler(w http.ResponseWriter, r *http.Request) {\n logInfo(\"Rendering 404.\")\n t, _ := template.ParseFiles(\"html/404.html\")\n t.Execute(w, nil)\n}", "title": "" }, { "docid": "ce012343e96bfa898ae0cfce1666549d", "score": "0.46986657", "text": "func (f *bpFile) errorf(failedNode mkparser.Node, message string, args ...interface{}) {\n\torig := failedNode.Dump()\n\tmessage = fmt.Sprintf(message, args...)\n\tf.addErrorText(fmt.Sprintf(\"// ANDROIDMK TRANSLATION ERROR: %s\", message))\n\n\tlines := strings.Split(orig, \"\\n\")\n\tfor _, l := range lines {\n\t\tf.insertExtraComment(\"// \" + l)\n\t}\n}", "title": "" }, { "docid": "d34dcf161bae16163af8ba6431b8ab63", "score": "0.46811444", "text": "func (e TemplateValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "236f6ccc7a01232ece1c836219fd059d", "score": "0.46687755", "text": "func errString(err error) string {\n\te, ok := err.(*errors.Error)\n\tif !ok {\n\t\treturn err.Error()\n\t}\n\ts := e.StackFrames()[0]\n\tf := path.Base(s.File)\n\tprefix := fmt.Sprintf(\"[%s/%s:%d]\", s.Package, f, s.LineNumber)\n\tif e.Error() == \"\" {\n\t\treturn prefix\n\t}\n\treturn fmt.Sprint(prefix, \" \", e.Error())\n}", "title": "" }, { "docid": "95031a303cfd55b970c755fe076d0216", "score": "0.46612528", "text": "func displErr(uni *context.Uni) {\n\tr := recover()\n\tif r != nil {\n\t\tuni.Put(\"There was an error executing the template.\")\n\t\tfmt.Println(\"problem with template: \", r)\n\t\tdebug.PrintStack()\n\t}\n}", "title": "" }, { "docid": "fd85d8220c3e678da5a7e502cbd28883", "score": "0.46482936", "text": "func ( sb *Builder ) ErrorTokenUnexpected( \n expctDesc string, tn *TokenNode ) error {\n\n if tn == nil { tn = sb.peekUnexpectedTokenErrorNode() }\n var tokStr string\n var lc *Location\n if tn == nil {\n tokStr, lc = \"END\", sb.lx.Location()\n } else { tokStr, lc = sb.errorStringForToken( tn.Token ), tn.Loc }\n var msg string\n if expctDesc == \"\" {\n msg = fmt.Sprintf( \"Unexpected token: %s\", tokStr )\n } else { \n msg = fmt.Sprintf( \"Expected %s but found: %s\", expctDesc, tokStr ) \n }\n return &ParseError{ msg, lc }\n}", "title": "" }, { "docid": "577378bcc4afd136966355270492c215", "score": "0.4646767", "text": "func (p *parser) err(elmType, expected string) error {\n\treturn fmt.Errorf(\"malformed %s, expected %s, found %c at %d\", elmType, expected, p.s[p.i], p.i)\n}", "title": "" }, { "docid": "7272d339be0cf4e2bdb75bb3058ee971", "score": "0.4646558", "text": "func (client *okexClient) extractError(respByte []byte) error {\n\terrorMsg := gjson.GetBytes(respByte, \"error_message\")\n\tif !errorMsg.Exists() {\n\t\terrorMsg = gjson.GetBytes(respByte, \"message\")\n\t}\n\tif len(errorMsg.String()) != 0 {\n\t\treturn errors.New(errorMsg.String())\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "2412ec79ef30d8f2224ecc2f851d12bd", "score": "0.46457288", "text": "func parseNotifyErr(_ MessageID, b []byte) (MessageBody, error) {\n\tbodyLen := len(b)\n\tif bodyLen < 3 {\n\t\treturn nil, ErrMessageTooShort\n\t}\n\tp := &NotifyErr{\n\t\tTransactionID: binary.BigEndian.Uint16(b[:2]),\n\t\tRtrnCode: uint8(b[2]),\n\t}\n\treturn p, nil\n}", "title": "" }, { "docid": "ea25a9301956b5e3abfa1f0af0be7845", "score": "0.46402007", "text": "func (x *nixLex) Error(s string) {\n\tlog.Printf(\"parse error: %s\", s)\n}", "title": "" }, { "docid": "13f1e98c491a12aa2c8cfc0b456f0680", "score": "0.46391213", "text": "func (lcfg *LCfg) ErrorText() string {\n\tstr := \"\"\n\n\tif len(lcfg.InvalidSettings) > 0 {\n\t\tstr += \"Invalid log definitions detected:\"\n\t\tfor _, e := range lcfg.InvalidSettings {\n\t\t\tstr += \"\\n \" + e\n\t\t}\n\t}\n\n\tif len(lcfg.ModuleConflicts) > 0 {\n\t\tstr += \"Log module conflicts detected:\\n\"\n\t\tfor mod, logs := range lcfg.ModuleConflicts {\n\t\t\tfor _, l := range logs {\n\t\t\t\tstr += fmt.Sprintf(\" Module=%d Log=%s Package=%s\\n\",\n\t\t\t\t\tmod, l.Name, l.Source.FullName())\n\t\t\t}\n\t\t}\n\n\t\tstr +=\n\t\t\t\"\\nResolve the problem by assigning unique module IDs to each log.\"\n\t}\n\n\treturn str\n}", "title": "" }, { "docid": "a932e6b8d52480afa6dd445d709e5add", "score": "0.46004626", "text": "func beautyStack(err error) string {\n\tvar sb strings.Builder\n\tstack := fmt.Sprintf(\"%+v\", err)\n\tstackFormated := strings.ReplaceAll(stack, \"\\n\\t\", \"|\")\n\tlines := strings.Split(stackFormated, \"\\n\")\n\tfor index, line := range lines {\n\t\tif isLineUsable(line) && !isLineDuplicate(lines, index) {\n\t\t\tparts := strings.Split(line, \"|\")\n\t\t\tif len(parts) == 2 {\n\t\t\t\tfilename := extractFilename(parts[1])\n\t\t\t\tnewline := fmt.Sprintf(\"at %v (%v)\\n\", parts[0], filename)\n\t\t\t\tsb.WriteString(newline)\n\t\t\t} else {\n\t\t\t\tsb.WriteString(line + \"\\n\") //this is message\n\t\t\t}\n\t\t}\n\t}\n\treturn strings.Trim(sb.String(), \"\\n\")\n}", "title": "" }, { "docid": "5f461c88eaa22a49083d3d42f0b35cac", "score": "0.4596049", "text": "func TestBundleHeaderErr(t *testing.T) {\n\tbh := mockBundleHeader()\n\tbh.DestinationRoutingNumber = \"\"\n\tr := NewReader(strings.NewReader(bh.String()))\n\t_, err := r.Read()\n\tif p, ok := err.(*ParseError); ok {\n\t\tif e, ok := p.Err.(*FieldError); ok {\n\t\t\tif !strings.Contains(e.Msg, msgFieldInclusion) {\n\t\t\t\tt.Errorf(\"%T: %s\", e, e)\n\t\t\t}\n\t\t}\n\t} else {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n}", "title": "" }, { "docid": "5d77b240b90a1219f9d45f1b80eb0235", "score": "0.4590288", "text": "func (err ValidateTokenError) Error() string {\n\treturn fmt.Sprintf(\"pw_reset: in ValidateToken(), %s [%s]\", err.Msg, err.Code)\n}", "title": "" }, { "docid": "2601e17faf56e40af4d0d607ab5d15a8", "score": "0.45902774", "text": "func parseCommandErr(err error) errBits {\n\tvar team, cause, context string\n\n\t// if it is one of our utility errors we can\n\t// extract the cause and the stack separately\n\tif er, ok := err.(util.Err); ok {\n\t\tbits := errBits{}\n\t\tbits.team, bits.cause = parseTeam(er.Message)\n\t\tif er.Code != \"\" {\n\t\t\tbits.team = er.Code\n\t\t}\n\t\tbits.context = strings.Join(er.Stack, \" -> \")\n\t\tbits.suggest = er.Suggest\n\t\tbits.output = strings.TrimSpace(er.Output)\n\t\treturn bits\n\t}\n\n\ttrace := err.Error()\n\t// remove any extra : at the end of the trace\n\ttrace = CmdErrRegex.ReplaceAllString(trace, \"\")\n\n\t// split the trace into a slice\n\tstack := strings.Split(trace, \": \")\n\n\t// extract the last item off of the list\n\tcause = stack[len(stack)-1]\n\n\tteam, cause = parseTeam(cause)\n\n\t// now remove the last item from the list\n\tstack = stack[:len(stack)-1]\n\n\t// join the stack to create a context\n\tcontext = strings.Join(stack, \" -> \")\n\n\treturn errBits{\n\t\tcause: cause,\n\t\tcontext: context,\n\t\tteam: team,\n\t}\n}", "title": "" }, { "docid": "86e41225a46b6c2772db3065de4e1f42", "score": "0.45817694", "text": "func (e *BadMagic) Error() string {\n\terrMsg := fmt.Sprintf(\"ErrorCode: %s, ErrorType: %d, ErrorMessage: %s, ErrorDetails: %s\", e.ErrorCode, e.ErrorType, e.ErrorMsg, e.ErrorDetails)\n\treturn errMsg\n}", "title": "" }, { "docid": "fb82f72b3e9513ad6a65ffdc0530e347", "score": "0.4573015", "text": "func (e ValidationError) Error() string {\n\tif e.err == \"\" {\n\t\treturn \"Token is invalid\"\n\t}\n\treturn e.err\n}", "title": "" }, { "docid": "cfdfc91478074be07fdd8d0fe3067a4f", "score": "0.45645532", "text": "func Toline(data string) error {\r\n\tfor _, line := range strings.Split(string(data), \"\\n\") {\r\n\t\t//ERROR keys: ERROR 、.....\r\n\t\tif strings.Contains(line, \"ERROR\") || strings.Contains(line, \"memory\") {\r\n\t\t\tlog.Println(\"[ERROR] out error msg:\", line)\r\n\t\t\treturn fmt.Errorf(\"%v\", line)\r\n\t\t}\r\n\t}\r\n\treturn nil\r\n}", "title": "" }, { "docid": "618d8908a45a10cc5fe54eb5384b3209", "score": "0.45567247", "text": "func errorInCobbler(body []byte) error {\n\tpath := xmlpath.MustCompile(\"//member/value\")\n\trootNode, err := xmlpath.Parse(bytes.NewBuffer(body))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfound := 0\n\tnumberOfNodesToFind := 2\n\telements := make([]string, numberOfNodesToFind)\n\titerator := path.Iter(rootNode)\n\n\tfor iterator.Next() {\n\t\tif found < numberOfNodesToFind {\n\t\t\telements[found] = iterator.Node().String()\n\t\t\tfound++\n\t\t}\n\t}\n\n\tif found == 2 {\n\t\treturn fmt.Errorf(\"error %s: %s\", elements[0], elements[1])\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "fba4e3292dd301a5fe6befad08aeeb46", "score": "0.4526957", "text": "func errorAt(inst llvm.Value, msg string) scanner.Error {\n\treturn scanner.Error{\n\t\tPos: getPosition(inst),\n\t\tMsg: msg,\n\t}\n}", "title": "" }, { "docid": "09fd60ad469017763d11c442518b2982", "score": "0.452229", "text": "func (e *LastfmErrorResponse) Error() string {\n\treturn e.Message\n}", "title": "" }, { "docid": "1143c1732adfe5044a390c4bb8de30d9", "score": "0.45017993", "text": "func ErrorFormat() string {\n\treturn `{\n\t\ttime: ${time_rfc3339_nano}\n\t\tid: ${id}\n\t\tremote_ip: ${remote_ip}\n\t\thost: ${host}\n\t\tmethod: ${method}\n\t\turi: ${uri}\n\t\tstatus: ${status}\n\t\terror: ${error}\n\t\tlatency: ${latency}\n\t\tlatency_human: ${latency_human}\n\t\tbytes_in: ${bytes_in}\n\t\tbytes_out: ${bytes_out}\n\t}`\n}", "title": "" }, { "docid": "7c737268e0f9eb9fffb87c61ee0877cd", "score": "0.45013362", "text": "func shuttleErrorMessage(bot *BaseBot, channel string) {\n\tpostResponse(bot, channel, \":bus:\", \"신촌 셔틀버스\", \"정보를 가져오는데 에러가 발생했습니다.\\nhttp://www.yonsei.ac.kr/sc/campus/traffic1.jsp 에서 직접 확인해주세요.\")\n}", "title": "" }, { "docid": "d8f2437e0664512bcacafee84bac910b", "score": "0.4464811", "text": "func (e inner) Error() string { return e.msg }", "title": "" }, { "docid": "c932f5356d2966be1edd08cd381a7104", "score": "0.44616812", "text": "func writeError(lg *common.Logger, w http.ResponseWriter, errCode int,\n\terrStr string) {\n\tstr := strings.Replace(errStr, `\"`, `'`, -1)\n\tlg.Info(str + \"\\n\")\n\tw.WriteHeader(errCode)\n\tw.Write([]byte(`{ \"error\" : \"` + str + `\"}`))\n}", "title": "" }, { "docid": "1e16de1b4a22f6b28abb9e1d0818aeab", "score": "0.44614625", "text": "func (e *InvalidResponseErr) String() string {\n\treturn fmt.Sprintf(\"\\nInvalidResponseError: Details\\n URL=%s \\nExpectedOneOf=%#v \\nGot=%d \\nError: %s\", e.URL, e.Expect, e.Got, string(e.Data))\n}", "title": "" }, { "docid": "de03a229335fd768209ffd82dc6f276c", "score": "0.44546324", "text": "func (e errorTemplate) getDeveloperMessage(params Params) string {\n\treturn replacePlaceholders(e.DeveloperMessage, params)\n}", "title": "" }, { "docid": "6af8597988422b65d6469dd92ab80687", "score": "0.4453671", "text": "func GetErrPoint(skip int) string {\n\tpc, file, line, _ := runtime.Caller(skip)\n\tfuncName := runtime.FuncForPC(pc).Name()\n\n\titems := strings.Split(file, fmt.Sprintf(\"%s/\", strAppName))\n\tshortFileName := items[len(items)-1]\n\n\titems = strings.Split(funcName, \".\")\n\tshortFuncName := items[len(items)-1]\n\n\ts := fmt.Sprintf(\"%s:%d:%s\", shortFileName, line, shortFuncName)\n\treturn s\n}", "title": "" }, { "docid": "60c6a5c5fe21c1ec76ac1190d9e6d460", "score": "0.44518682", "text": "func FormatError(err error) error {\n\tpc, fn, line, _ := runtime.Caller(1)\n\treturn fmt.Errorf(\"%v\\nTRACE: %s[%s:%d]\", err, runtime.FuncForPC(pc).Name(), filepath.Base(fn), line)\n}", "title": "" }, { "docid": "bb47fbcb92f6bbbe27523963d6265c2c", "score": "0.44448793", "text": "func New(line string) MyError {\n\te := MyError{}\n\tl := make([]string, 3)\n\te.lines = l\n\n\te.lines = append(e.lines, \"page\")\n\n\tpc, fn, linenumber, _ := runtime.Caller(1)\n\te.lines = append(e.lines, fmt.Sprintf(\"Function: %s\", runtime.FuncForPC(pc).Name()))\n\te.lines = append(e.lines, fmt.Sprintf(\"File:Line: %s:%d\", fn, linenumber))\n\n\te.lines = append(e.lines, \"Version: \"+version.Version())\n\n\tuser, _ := user.Current()\n\te.lines = append(e.lines, \"Username: \"+user.Username)\n\te.lines = append(e.lines, \"HomeDir: \"+user.HomeDir)\n\n\tdir, _ := os.Getwd()\n\te.lines = append(e.lines, \"Current Working Directory: \"+dir)\n\n\treturn e.Add(line)\n}", "title": "" }, { "docid": "62ea91b5c426b4aa1f56b86032beeba8", "score": "0.4436271", "text": "func (t *GoT) error(args ...interface{}) {\n m := args[0].(string)\n\n depth := 2\n if len(args) == 2 {\n depth = args[1].(int)\n }\n\n var err string\n if _, file, line, ok := runtime.Caller(depth); ok {\n err = fmt.Sprintf(\"> %s:%d: %s\", path.Base(file), line, m)\n } else {\n err = fmt.Sprintf(\"> ???:-1: %s\", m)\n }\n t.t.Error(err)\n}", "title": "" }, { "docid": "b229157539517d6f7d14d714fc87c44b", "score": "0.44361907", "text": "func (e *TGTransactionVerificationError) Error() string {\n\terrMsg := fmt.Sprintf(\"ErrorCode: %s, ErrorType: %d, ErrorMessage: %s, ErrorDetails: %s\", e.ErrorCode, e.ErrorType, e.ErrorMsg, e.ErrorDetails)\n\treturn errMsg\n}", "title": "" }, { "docid": "b229157539517d6f7d14d714fc87c44b", "score": "0.44361907", "text": "func (e *TGTransactionVerificationError) Error() string {\n\terrMsg := fmt.Sprintf(\"ErrorCode: %s, ErrorType: %d, ErrorMessage: %s, ErrorDetails: %s\", e.ErrorCode, e.ErrorType, e.ErrorMsg, e.ErrorDetails)\n\treturn errMsg\n}", "title": "" }, { "docid": "3761b32fb3c163b0e05056ea590083ad", "score": "0.44285282", "text": "func (p *Parser) error(msg string) {\n\tlog.Fatalf(\"parser error: %s\", msg)\n}", "title": "" }, { "docid": "1b3e17c1c91553cf57e66b5661f6f578", "score": "0.44271326", "text": "func errHandler(context Context, e error) {\n\n\t// Cast the error to a status error if it is one, if not wrap it in a Status 500 error\n\terr := ToStatusError(e)\n\n\t// Get the writer from context and write the error page\n\twriter := context.Writer()\n\n\t// Set the headers\n\twriter.Header().Set(\"Content-Type\", \"text/html; charset=utf-8\")\n\twriter.WriteHeader(err.Status)\n\n\t// Write a simple error message page\n\thtml := fmt.Sprintf(\"<h1>%s</h1><p>%s</p>\", err.Title, err.Message)\n\n\t// If NOT in production, write a more complex page which reveals the real error (later stack trace etc)\n\tif !context.Production() {\n\t\thtml = fmt.Sprintf(\"<h1>%s</h1><p>%s</p><p>Error %d at %s</p><p><code>Error:%s</code></p>\",\n\t\t\terr.Title, err.Message, err.Status, err.FileLine(), err.Err.Error())\n\t}\n\n\tcontext.Logf(\"#error %s\\n\", err)\n\tio.WriteString(writer, html)\n}", "title": "" }, { "docid": "efe9f77317cff73a71a3f9ad0a1aec72", "score": "0.44162852", "text": "func TMPLmain(template Template) string {\n\thtml, err := TMPLERRmain(template)\n\tif err != nil {\n\t\t_, _ = os.Stderr.WriteString(\"Error running template main.tmpl:\" + err.Error())\n\t}\n\treturn html\n}", "title": "" }, { "docid": "548746bee1377c927b193d4a68f1f3e4", "score": "0.44126266", "text": "func (p *parser) addParseErr(positionRange PositionRange, err error) {\n\tperr := ParseErr{\n\t\tPositionRange: positionRange,\n\t\tErr: err,\n\t\tQuery: p.lex.input,\n\t}\n\n\tp.parseErrors = append(p.parseErrors, perr)\n}", "title": "" }, { "docid": "0a13902d35dd00c9b50f80a5fb2c98fe", "score": "0.44042686", "text": "func UserPage(w http.ResponseWriter, r *http.Request) {\n\tt := template.Must(template.ParseFiles(templatePath+\"/base.html\", templatePath+\"/userLogReg.html\"))\n\tt.Execute(w, nil)\n}", "title": "" }, { "docid": "f0b3538bdb6087d6b0af64fc4292bb63", "score": "0.44008654", "text": "func splitError(err error) (int64, string) {\n\terrMsg := err.Error()\n\tidx1 := strings.Index(errMsg, \"[\")\n\tidx2 := strings.Index(errMsg, \"]\")\n\tif idx1 == -1 || idx2 == -1 {\n\t\treturn 0, errMsg\n\t}\n\toffsetString := errMsg[idx1+1 : idx2]\n\toffset, err := strconv.ParseInt(offsetString, 10, 64)\n\tif err != nil {\n\t\treturn 0, errMsg\n\t}\n\treturn offset, errMsg[idx2+1:]\n}", "title": "" }, { "docid": "8552f0996c1d677ae5f729c87c04bafd", "score": "0.43997556", "text": "func (e *evalPackage) errorAt(inst llvm.Value, msg string) Error {\n\treturn Error{\n\t\tImportPath: e.packagePath,\n\t\tErrs: []scanner.Error{errorAt(inst, msg)},\n\t}\n}", "title": "" }, { "docid": "f3017c7d1fc7307ffb8615c177bb664b", "score": "0.43955207", "text": "func getScriptError(output []byte) string {\n\tlines := strings.Split(string(output), \"\\n\")\n\tfor n := len(lines) - 1; n >= 0; n-- {\n\t\tif strings.HasPrefix(lines[n], \"+\") {\n\t\t\treturn strings.Join(lines[n:], \"\\n\")\n\t\t}\n\t}\n\treturn string(output)\n}", "title": "" }, { "docid": "cf61f1b87f8d502cac83076184cb8fde", "score": "0.43946603", "text": "func (e *Error) Location() (file string, line int) {\n\treturn e.file, e.line\n}", "title": "" }, { "docid": "16625726e745688699d202073a9898b5", "score": "0.4389715", "text": "func (e TemplateValidationError) Field() string { return e.field }", "title": "" }, { "docid": "6c12f53ead6fd7a2503104e3fdea2548", "score": "0.43894818", "text": "func (e *Error) Message() string { return e.message }", "title": "" }, { "docid": "41fdd47c48649262da03053224200d77", "score": "0.43758264", "text": "func FmtErr(call int) string {\n\terr := RedBold(\"\\n Error Trace:\t\t\" + CallerInfo()[call] + \",\")\n\terr += Yellow(\"\\n Error:\t\tNot equal; \\n \")\n\terr += Blue(\"expected:\t'%s',\\n \") + Red(\"but got:\t'%s' \\n\\n\")\n\treturn err\n}", "title": "" }, { "docid": "b71eee80cc6ca5378093258f7849ba42", "score": "0.4375046", "text": "func getParseError(token lexer.Token, msg string, msgFmt ...interface{}) error {\n\tlineNum, lineCol := token.GetLineNum(), token.GetLineCol()\n\n\tfmtedMsg := fmt.Sprintf(msg, msgFmt...)\n\treturn fmt.Errorf(\"parse error line %d col %d: %s\", lineNum, lineCol, fmtedMsg)\n}", "title": "" }, { "docid": "2f849a959546c37f9e5d17753750d648", "score": "0.43749893", "text": "func (m *mchCGI) errorResp(msg string, info map[string]string) {\n\tm.WR.Header().Set(\"Content-Type\", \"text/html; charset=Shift_JIS\")\n\tinfo[\"message\"] = msg\n\tcgi.RenderTemplate(\"2ch_error\", info, m.WR)\n}", "title": "" }, { "docid": "bef7876b67fdff611d27139110ca1997", "score": "0.4362835", "text": "func (s Subscription) SplitErr() (p, n string, err error) {\n\tp, n, err = resourceProjectName(string(s))\n\treturn\n}", "title": "" }, { "docid": "7ebe3cdd46bebe1e22c585f63dedc97d", "score": "0.43556932", "text": "func (GithubValidator) Template() string { return \"github-validator\" }", "title": "" }, { "docid": "86bc669a6a1ac0f08fd1990ab18d10bd", "score": "0.43540254", "text": "func supplementalErr(output []byte, supplemental []string) error {\n\tfor _, supplement := range supplemental {\n\t\texpression := fmt.Sprintf(`(?i)%s[\\s\\S]+`, supplement)\n\t\tregex, err := regexp.Compile(expression)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"regexp.Compile(%q) returned %v: %w\", expression, err, errCompile)\n\t\t}\n\t\tif regex.Match(output) {\n\t\t\treturn fmt.Errorf(\"output %s contains supplemental error text %q: %w\", output, supplement, ErrPowerShell)\n\t\t}\n\t}\n\t// No matches found, output contains no errors.\n\treturn nil\n}", "title": "" }, { "docid": "3356e7023db092e4db8a911e7cb933f6", "score": "0.43472174", "text": "func renderOverQuotaErrorTemplates(w http.ResponseWriter, r *http.Request) {\n\tt := presentTemplates[path.Ext(\".overquota\")]\n\tif t == nil {\n\t\tpanic(t)\n\t}\n \n\tdoc := new(TEMPSTRUCT)\n\tdoc.STR_FILLER1\t= getSchemeUrl(w,r)\n\tdoc.STR_FILLER2 = html.UnescapeString(ADDTL_QUOTA_ERR_MSG)\n\t\t\n\tdata := struct {\n\t\t\n\t\t*TEMPSTRUCT\n\t\tTemplate *template.Template\n\t}{\t\n\t\tdoc,\n\t\tt,\n\t}\n\t//fmt.Fprintf(w, \"%v\", data)\n\t//t.Execute(w, &data)\n\tbuf := &bytes.Buffer{}\n\terr := t.Execute(buf, &data)\n\tif err != nil {\n\t\t// Send back error message, for example:\n\t\tmsgDtl := url.QueryEscape(fmt.Sprintf(\"[U00187] Template error: %v\", err))\n\t\tmsgTyp := \"error\"\n\t\taction := \"U00187\"\n\t\tsysReq := fmt.Sprintf(\"/sysmsg?msgTyp=%v&message=%v&msgURL=%v&action=%v\", msgTyp, msgDtl, \"\", action)\n\t\thttp.Redirect(w, r, sysReq, http.StatusFound)\n\t\treturn\n\t} else {\n\t\t// No error, send the content, HTTP 200 response status implied\n\t\tbuf.WriteTo(w)\n\t}\n\t\n}", "title": "" }, { "docid": "9dc9bca90a45a9710d830cd4e2ace064", "score": "0.43317768", "text": "func (e *TGDBError) Error() string {\n\terrMsg := fmt.Sprintf(\"ErrorCode: %s, ErrorType: %d, ErrorMessage: %s, ErrorDetails: %s\", e.ErrorCode, e.ErrorType, e.ErrorMsg, e.ErrorDetails)\n\treturn errMsg\n}", "title": "" }, { "docid": "833b771a33091ddd3927f1ff58683a0a", "score": "0.4330321", "text": "func (e *errNoUnregister) Error() string { return e.detail }", "title": "" }, { "docid": "bdeb20b106ac8ebb9fda40bfdc164ecc", "score": "0.43232587", "text": "func (anError customErr) Error() string {\n\treturn fmt.Sprintf(\"An error: %v\", anError.information)\n}", "title": "" }, { "docid": "b3f4e329a57a4037cbef15d8cfd02e35", "score": "0.4322217", "text": "func (err BadHttpResponseCode) Error() string {\n\treturn err.Message\n}", "title": "" }, { "docid": "cc64eb9abaa0fd3422257809081c648a", "score": "0.43214262", "text": "func (e *InvalidMessageLength) Error() string {\n\terrMsg := fmt.Sprintf(\"ErrorCode: %s, ErrorType: %d, ErrorMessage: %s, ErrorDetails: %s\", e.ErrorCode, e.ErrorType, e.ErrorMsg, e.ErrorDetails)\n\treturn errMsg\n}", "title": "" }, { "docid": "9859a88eff3d973c80ca48805e2f86fa", "score": "0.43196476", "text": "func (e *Error) Message() string { return e.msg }", "title": "" }, { "docid": "b446629a5def891ae59bcbd09f6dd220", "score": "0.43174118", "text": "func parseLineSecondFormat(line, path string) Result {\n\tr := Result{}\n\tparts := strings.Split(line, \" | \")\n\tif len(parts) != 2 {\n\t\tr.Err = fmt.Errorf(\"%s: unable to parse text string: %s\", SecondFormat, line)\n\t\treturn r\n\t}\n\n\t// 2018-02-01T15:04:05Z\n\tt, err := time.Parse(\"2006-02-01T15:04:05Z\", parts[0])\n\tif err != nil {\n\t\tr.Err = fmt.Errorf(\"%s: unable to parse string to time: %s\", FirstFormat, line)\n\t\treturn r\n\t}\n\n\tl := &Log{\n\t\tLogMsg: parts[1],\n\t\tFileName: path,\n\t\tLogFormat: SecondFormat,\n\t\tLogTime: t,\n\t}\n\tr.Log = l\n\n\treturn r\n}", "title": "" }, { "docid": "bff3e961773ebcd9ad7d1a854cbd9a07", "score": "0.43155506", "text": "func (e *TGTransactionGeneralError) Error() string {\n\terrMsg := fmt.Sprintf(\"ErrorCode: %s, ErrorType: %d, ErrorMessage: %s, ErrorDetails: %s\", e.ErrorCode, e.ErrorType, e.ErrorMsg, e.ErrorDetails)\n\treturn errMsg\n}", "title": "" }, { "docid": "bff3e961773ebcd9ad7d1a854cbd9a07", "score": "0.43155506", "text": "func (e *TGTransactionGeneralError) Error() string {\n\terrMsg := fmt.Sprintf(\"ErrorCode: %s, ErrorType: %d, ErrorMessage: %s, ErrorDetails: %s\", e.ErrorCode, e.ErrorType, e.ErrorMsg, e.ErrorDetails)\n\treturn errMsg\n}", "title": "" }, { "docid": "b85c10923914fe4b8a3232f1e134dc02", "score": "0.4315372", "text": "func PrintAuthFailed(err error) {\n fmt.Printf(model.AuthFailedMessage, err)\n printBlankLine()\n}", "title": "" }, { "docid": "04cffc01d227664a3e691ae0ff864cc5", "score": "0.43119884", "text": "func (n ErrorNameNotFound) Error() string {\n\treturn fmt.Sprintf(\"'%s' was not found in the grammar or declared; ensure either provided to grammar or declared inline\", n.Name)\n}", "title": "" }, { "docid": "9d24bdb23754b013deb77c7adea06c7c", "score": "0.42954415", "text": "func TErr(statement string, err error) (failureMessage string, ok bool) {\n\tif err == nil {\n\t\treturn \"\", true\n\t}\n\n\tmsg := fmt.Sprintf(\"an error occurred during %s: %s\", statement, err.Error())\n\treturn msg, false\n}", "title": "" }, { "docid": "8fad586279ca8fdbaeeb428152161e3f", "score": "0.42920312", "text": "func specErr(s string, err error) error { return fmt.Errorf(\"[dsort] parse-spec: %q %w\", s, err) }", "title": "" }, { "docid": "3a2e2c8bf8c1402ece9084a2b2c07e50", "score": "0.42913294", "text": "func parseError(resp *http.Response) error {\n\tvar couchReply couchError\n\tif resp.Request.Method != \"HEAD\" {\n\t\terr := parseBody(resp, &couchReply)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"Unknown error accessing CouchDB: %v\", err)\n\t\t}\n\t}\n\treturn &Error{\n\t\tStatusCode: resp.StatusCode,\n\t\tURL: resp.Request.URL.String(),\n\t\tMethod: resp.Request.Method,\n\t\tErrorCode: couchReply.Err,\n\t\tReason: couchReply.Reason,\n\t}\n}", "title": "" }, { "docid": "85ee0c005a0353cea72d39fe1b96f037", "score": "0.42879725", "text": "func ParseSingleIPTemplate(ipTmpl string) (string, error) {\n\tout, err := template.Parse(ipTmpl)\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"unable to parse address template %q: %v\", ipTmpl, err)\n\t}\n\n\tips := strings.Split(out, \" \")\n\tswitch len(ips) {\n\tcase 0:\n\t\treturn \"\", errors.New(\"no addresses found, please configure one\")\n\tcase 1:\n\t\treturn ips[0], nil\n\tdefault:\n\t\treturn \"\", fmt.Errorf(\"multiple addresses found (%q), please configure one\", out)\n\t}\n}", "title": "" }, { "docid": "901557ea2a559c4fbe05ebce1be54ec7", "score": "0.42843252", "text": "func (p *parser) errEOF(elmType, expected string) error {\n\treturn fmt.Errorf(\"malformed %s, expected %s, found EOF\", elmType, expected)\n}", "title": "" }, { "docid": "025a9d3cbfbe08c557889c527fcc1b65", "score": "0.4278605", "text": "func (t *tree) errorf(format string, args ...interface{}) {\n\tt.Root = nil\n\tformat = fmt.Sprintf(\"template: %s:%d: %s\", t.ParseName, t.lex.lineNumber(), format)\n\tpanic(fmt.Errorf(format, args...))\n}", "title": "" }, { "docid": "d44e3382b9a024a431fa29b6791ddb6c", "score": "0.42784992", "text": "func templateParser(done <-chan struct{}, page *HTMLPage, pc *PageChannel, tmMap *TemplateMap) error {\n\tdefer pc.Del(1)\n\tvar threadID uint64\n\n\tu := page.URL\n\tq := u.Query()\n\ttid := q.Get(\"tid\")\n\tif tid == \"\" {\n\t\treturn fmt.Errorf(\"Error parsing getting tid from %s\", page.URL.String()) // skip illegal URL\n\t}\n\tret, _ := strconv.Atoi(tid)\n\tthreadID = uint64(ret)\n\n\tvar tf *TemplateField\n\ttf = tmMap.Get(threadID)\n\n\ttf.mutex.Lock()\n\terr := json.Unmarshal([]byte(string(page.Content)), tf)\n\ttf.mutex.Unlock()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Error parsing template file %s: %v\", page.URL.String(), err)\n\t}\n\ttf.Send(tmMap.Channel)\n\n\treturn nil\n}", "title": "" }, { "docid": "77dd05c580a89b0df892ebda7c441913", "score": "0.42782912", "text": "func (e *TGTransactionMalFormed) Error() string {\n\terrMsg := fmt.Sprintf(\"ErrorCode: %s, ErrorType: %d, ErrorMessage: %s, ErrorDetails: %s\", e.ErrorCode, e.ErrorType, e.ErrorMsg, e.ErrorDetails)\n\treturn errMsg\n}", "title": "" }, { "docid": "77dd05c580a89b0df892ebda7c441913", "score": "0.42782912", "text": "func (e *TGTransactionMalFormed) Error() string {\n\terrMsg := fmt.Sprintf(\"ErrorCode: %s, ErrorType: %d, ErrorMessage: %s, ErrorDetails: %s\", e.ErrorCode, e.ErrorType, e.ErrorMsg, e.ErrorDetails)\n\treturn errMsg\n}", "title": "" }, { "docid": "fbbb7b9b84b1015d33300967204da284", "score": "0.42761528", "text": "func (e ErrorTemplate) getCode() int {\n\treturn e.Code\n}", "title": "" }, { "docid": "e5d7526edf0bc9731b178113fa92cfc0", "score": "0.4275985", "text": "func resourceError(reason, name, format string) error {\n\treturn fmt.Errorf(\"Invalid resource name format (%s) from: %q, expected: %q\", reason, name, format)\n}", "title": "" }, { "docid": "d0c33af73be9fdf7ce6a8b021a4f6167", "score": "0.4269223", "text": "func (tp TryParseError) Usage() {\n fmt.Fprintf(os.Stderr, \"%s: %s\\n\", os.Args[0], tp.Message)\n if tp.Command != \"\" {\n subcommandUsageByName(tp.Command)\n } else {\n Usage()\n }\n}", "title": "" }, { "docid": "947f5194fd4150935ffe96bad644e140", "score": "0.42670172", "text": "func (e *TGTransactionUniqueConstraintViolation) Error() string {\n\terrMsg := fmt.Sprintf(\"ErrorCode: %s, ErrorType: %d, ErrorMessage: %s, ErrorDetails: %s\", e.ErrorCode, e.ErrorType, e.ErrorMsg, e.ErrorDetails)\n\treturn errMsg\n}", "title": "" }, { "docid": "947f5194fd4150935ffe96bad644e140", "score": "0.42670172", "text": "func (e *TGTransactionUniqueConstraintViolation) Error() string {\n\terrMsg := fmt.Sprintf(\"ErrorCode: %s, ErrorType: %d, ErrorMessage: %s, ErrorDetails: %s\", e.ErrorCode, e.ErrorType, e.ErrorMsg, e.ErrorDetails)\n\treturn errMsg\n}", "title": "" } ]
40f6377f21c5f875d9c39b3e30c39634
The error reporting channel
[ { "docid": "fda9a9a64fe471984c3bdfcb9f695ea0", "score": "0.5553319", "text": "func (c *Context) Errors() <-chan ThreadError {\n\treturn c.errors\n}", "title": "" } ]
[ { "docid": "2891589f2949abb9fcb5357dfeab5b17", "score": "0.6316779", "text": "func (s *Server) Err() <-chan error { return s.err }", "title": "" }, { "docid": "2f9794fe608b088075af773334df991f", "score": "0.6225389", "text": "func (sched *myScheduler) ErrorChan() <-chan *constant.YiError {\n\terrBuffer := sched.errorBufferPool\n\terrCh := make(chan *constant.YiError, errBuffer.BufferCap())\n\tgo func(errBuffer buffer.Pool, errCh chan *constant.YiError) {\n\t\tfor {\n\t\t\t//stopped\n\t\t\tif sched.canceled() {\n\t\t\t\tclose(errCh)\n\t\t\t\tbreak\n\t\t\t}\n\t\t\t//paused\n\t\t\tif sched.Status() == constant.RUNNING_STATUS_PAUSED {\n\t\t\t\ttime.Sleep(100 * time.Millisecond)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tdatum, err := errBuffer.Get()\n\t\t\tif err != nil {\n\t\t\t\tlog.Warnln(\"The error buffer pool was closed. Break error reception.\")\n\t\t\t\tclose(errCh)\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tyierr, ok := datum.(*constant.YiError)\n\t\t\tif !ok {\n\t\t\t\tyierr := constant.NewYiErrorf(constant.ERR_CRAWL_SCHEDULER,\n\t\t\t\t\t\"Incorrect error type: %T\", datum)\n\t\t\t\tsched.sendError(yierr)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif sched.canceled() {\n\t\t\t\tclose(errCh)\n\t\t\t\tbreak\n\t\t\t}\n\t\t\terrCh <- yierr\n\t\t}\n\t}(errBuffer, errCh)\n\treturn errCh\n}", "title": "" }, { "docid": "fe97d4ee35cb6f324550b6a21ee36555", "score": "0.61520725", "text": "func (d *Dashboardd) Err() <-chan error {\n\treturn d.errChan\n}", "title": "" }, { "docid": "25e257b386eadafab90eb9ebe9a0237b", "score": "0.60567135", "text": "func (s *Service) Err() <-chan error { return s.err }", "title": "" }, { "docid": "25e257b386eadafab90eb9ebe9a0237b", "score": "0.60567135", "text": "func (s *Service) Err() <-chan error { return s.err }", "title": "" }, { "docid": "25e257b386eadafab90eb9ebe9a0237b", "score": "0.60567135", "text": "func (s *Service) Err() <-chan error { return s.err }", "title": "" }, { "docid": "25e257b386eadafab90eb9ebe9a0237b", "score": "0.60567135", "text": "func (s *Service) Err() <-chan error { return s.err }", "title": "" }, { "docid": "25e257b386eadafab90eb9ebe9a0237b", "score": "0.60567135", "text": "func (s *Service) Err() <-chan error { return s.err }", "title": "" }, { "docid": "2646f2ebc984a3b0be4076673fb45e0f", "score": "0.6031181", "text": "func (mes *MockSubscription) Err() <-chan error { return mes.Errors }", "title": "" }, { "docid": "2a628230e206622a45895f4b122514d2", "score": "0.6030469", "text": "func (b *Tracker) Err() chan error {\n\treturn b.errChan\n}", "title": "" }, { "docid": "296e62c5e334b4590b4e1b47d7cf585f", "score": "0.6011601", "text": "func (m BaseModule) SetErrorChan(c *chan error) {\n\tm.Errors = *c\n}", "title": "" }, { "docid": "efbf607f5a643036e0f348b52c29c166", "score": "0.597254", "text": "func (this *Schedule) Error() <-chan error {\n\tif this.error == nil {\n\t\tthis.error = make(chan error, DefaultErrorChanSize)\n\t}\n\treturn this.error\n}", "title": "" }, { "docid": "28aa85a5632042e26ea129d2db665a3a", "score": "0.5961774", "text": "func (m *Consumer) Err() <-chan error {\n\treturn m.echan\n}", "title": "" }, { "docid": "1304d54bdf2c29b09b0cf870436c3eb7", "score": "0.59108806", "text": "func Err() <-chan error {\n\tglobalMut.RLock()\n\tdefer globalMut.RUnlock()\n\n\treturn errChan\n}", "title": "" }, { "docid": "a170cf45315902b309d759368feb651e", "score": "0.59080887", "text": "func (c *LiveConnection) Err() <-chan error {\n\treturn c.errors\n}", "title": "" }, { "docid": "720e5cb2dcfda82dff4a037f7c914c3c", "score": "0.5829858", "text": "func (t *MultiTransport) ErrChan() <-chan error {\n\treturn t.errChan\n}", "title": "" }, { "docid": "205730ffa2cbbe96cb602797a66a124d", "score": "0.58123183", "text": "func (c customConsumerGroup) Errors() <-chan error {\n\terrors := make(chan error, 10)\n\tvar wg sync.WaitGroup\n\twg.Add(2)\n\tgo func() {\n\t\tfor e := range c.ConsumerGroup.Errors() {\n\t\t\terrors <- e\n\t\t}\n\t\twg.Done()\n\t}()\n\tgo func() {\n\t\tfor e := range c.handlerErrorChannel {\n\t\t\terrors <- e\n\t\t}\n\t\twg.Done()\n\t}()\n\n\t// Synchronization routine to close the error channel\n\tgo func() {\n\t\twg.Wait()\n\t\tclose(errors)\n\t}()\n\treturn errors\n}", "title": "" }, { "docid": "9b9c5452f5187940058bf44cf7e553f2", "score": "0.5799906", "text": "func waitForErrChannel(t *testing.T, ch chan error) error {\n\ttimeout := time.Duration(10) * time.Second\n\tselect {\n\tcase result := <-ch:\n\t\treturn result\n\tcase <-time.After(timeout):\n\t\tt.Fatal(\"Timeout waiting for data in the error channel\")\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "62a9f29cc5971546165a2a3de81004ec", "score": "0.5791618", "text": "func ErrorReport(args ...interface{}) {\n\tBackgroundContext().ErrorReport(args...)\n}", "title": "" }, { "docid": "0ac1647e57e755de9edf5a48379b6239", "score": "0.5724027", "text": "func (s *Subscription) Err() <-chan error {\n\treturn s.err\n}", "title": "" }, { "docid": "15970d4fa57ca1b1db843c8432b2df51", "score": "0.5721443", "text": "func (lm *LockManager) ecrpErrorChannelHandler() {\n\tfor {\n\t\tselect {\n\t\tcase <-lm.ecrpErrorChan:\n\t\t\tfmt.Println(\"etcd client retry proxy had error...\")\n\t\t\tlm.lockEvent <- UNKNOWN\n\t\tcase <-lm.closeAllGoRoutines:\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "ecac66e22b063147095b5959d785342f", "score": "0.5721427", "text": "func Error(s ssh.Session, err error, msg string) {\n\tfmt.Fprintln(s, msg+\" Please contact Matt Gleich about this bug.\")\n\tlumber.Error(err, msg)\n}", "title": "" }, { "docid": "e74b893e6ae63f965f25645b7ae80836", "score": "0.5713355", "text": "func (e *Eventd) Err() <-chan error {\n\treturn e.errChan\n}", "title": "" }, { "docid": "525b54a02d5e41992e2e9bc6461ff84e", "score": "0.56591165", "text": "func (s *server) err(err error) {\n\ts.errCh <- err\n}", "title": "" }, { "docid": "ceaf1ac43399f308e09777d720416ab8", "score": "0.5633586", "text": "func LoggedChannel() chan error {\n\terrors := make(chan error)\n\tgo logErrors(errors)\n\treturn errors\n}", "title": "" }, { "docid": "70b70f8018f3a548c9f82cf8f6d8a657", "score": "0.56149226", "text": "func (c *Chan) complain(ctx *dsl.Ctx, format string, args ...interface{}) {\n\tc.say(ctx, \"error\", format, args...)\n}", "title": "" }, { "docid": "a74befc575acbcd3261978c96ed066e0", "score": "0.5612285", "text": "func errorWorker(g *libgobuster.Gobuster, wg *sync.WaitGroup) {\n\tdefer wg.Done()\n\n\tfor e := range g.Errors() {\n\t\tif !g.Opts.Quiet {\n\t\t\tg.ClearProgress()\n\t\t\tg.LogError.Printf(\"[!] %v\", e)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "3a380ecfc5ad617a3466a4a92ea16f00", "score": "0.5578251", "text": "func Notify() <-chan error {\n\treturn errorsChan\n}", "title": "" }, { "docid": "765137624adc21f5febfd995e84d4439", "score": "0.55238116", "text": "func (fsm *UnisonFSMonitor) SendErr(format string, a ...interface{}) {\n\tmsg := fmt.Sprintf(format, a...)\n\tfsm.sendCmd(\"ERROR\", msg)\n\tfsm.shuttingDown = true\n\tfsm.ShutdownChannel <- empty{}\n}", "title": "" }, { "docid": "95e97e16812171b7d7329a0f1106794d", "score": "0.5502544", "text": "func (l *YDLidar) sendErr(e error) {\n\tl.D <- Packet{\n\t\tError: e,\n\t}\n}", "title": "" }, { "docid": "112f09fb48f2bec4d537c3e684f088ba", "score": "0.54960734", "text": "func (cg *ConsumerGroup) Errors() <-chan *sarama.ConsumerError {\n\treturn cg.errors\n}", "title": "" }, { "docid": "54380536c9c9b8f6b6b939f365fd28c8", "score": "0.54887635", "text": "func (r *Runtime) report(line int, where string, message string) {\n\tfmt.Fprintln(os.Stderr, \"[line \"+fmt.Sprint(line)+\"] Error\"+where+\": \"+message)\n\tr.HadError = true\n}", "title": "" }, { "docid": "1c6c561933a327573490588893dafa7d", "score": "0.5471254", "text": "func (c *Chan) Error() error {\n\tc.errormtx.Lock()\n\tdefer c.errormtx.Unlock()\n\n\treturn combineErrors(c.senderror, c.recverror)\n}", "title": "" }, { "docid": "c9faf82607fdda19cde3cbc06ec10b2b", "score": "0.54549956", "text": "func cardReportError(err error) {\n\tfmt.Printf(\"***\\n\")\n\tfmt.Printf(\"*** %s\\n\", err)\n\tfmt.Printf(\"***\\n\")\n\ttime.Sleep(10 * time.Second)\n}", "title": "" }, { "docid": "ba024131dff77bcd0344f6948b02d411", "score": "0.5407764", "text": "func (rs *RabbitService) CentralErr() <-chan error {\n\treturn rs.centralErr\n}", "title": "" }, { "docid": "6088a32d0f287bbf6c4b719eb4487fab", "score": "0.5397959", "text": "func resultChanFuncErr(gen func() (result, error)) (out <-chan result) {\n\tcha := make(chan result)\n\tgo chanResultFuncErr(cha, gen)\n\treturn cha\n}", "title": "" }, { "docid": "6ce206d1f705a4bfc75b16fa74ba0f35", "score": "0.53890324", "text": "func (s *SubSystem) Errc(closure StringClosure) {\n\tif s.Level > _fatal {\n\t\ts.Ch <- Errorc(closure)\n\t}\n}", "title": "" }, { "docid": "ca68157742e187b24c04376863bb7241", "score": "0.5327173", "text": "func Chk(err error) {\n\tif err != nil {\n\t\tlog.Printf(\"%T\\n\", err)\n\t\tlog.Fatal(err)\n\t}\n}", "title": "" }, { "docid": "e23e97a97034bf1b2e633edd69643bc0", "score": "0.53083605", "text": "func asyncSendErr(ch chan error, err error) {\n\tif ch == nil {\n\t\treturn\n\t}\n\tselect {\n\tcase ch <- err:\n\tdefault:\n\t}\n}", "title": "" }, { "docid": "2cf0689be02ef7933d07061c1a499c9a", "score": "0.5296519", "text": "func (c *Catcher) Run() error {\n\tvar buffer []ErrorReport\n\n\tfor {\n\t\tselect {\n\t\t// send all errors from buffer before stop\n\t\tcase err := <-c.done:\n\t\t\tif len(buffer) > 0 {\n\t\t\t\tsendErr := c.sender.Send(buffer)\n\t\t\t\tif sendErr != nil {\n\t\t\t\t\treturn fmt.Errorf(\"failed to send errors: %s;\\nCatcher exited with error: %w\", sendErr, err)\n\t\t\t\t}\n\t\t\t}\n\t\t\treturn err\n\t\t// process a new error message\n\t\tcase report := <-c.errorsCh:\n\t\t\tbuffer = append(buffer, report)\n\t\t\tif len(buffer) == c.options.MaxBulkSize {\n\t\t\t\t_ = c.sender.Send(buffer)\n\t\t\t\tbuffer = buffer[:0]\n\t\t\t} else {\n\t\t\t\t// initiate a new timer if not yet\n\t\t\t\ttimer.wait(c.timeout, c.options.MaxInterval)\n\t\t\t}\n\t\t// send all errors from a buffer\n\t\tcase <-c.timeout:\n\t\t\t_ = c.sender.Send(buffer)\n\t\t\tbuffer = buffer[:0]\n\t\t}\n\t}\n}", "title": "" }, { "docid": "c4e123e364058ab91f9f4c018a887414", "score": "0.5246072", "text": "func stringChanFuncErr(gen func() (string, error)) (out <-chan string) {\n\tcha := make(chan string)\n\tgo chanstringFuncErr(cha, gen)\n\treturn cha\n}", "title": "" }, { "docid": "192f16649f129f79403710133fa84d12", "score": "0.5164118", "text": "func mergeErrChan(ctx context.Context, channels ...<-chan error) <-chan error {\n\tvar wg sync.WaitGroup\n\twg.Add(len(channels))\n\n\tout := make(chan error, 100)\n\tmultiplex := func(c <-chan error) {\n\t\tdefer wg.Done()\n\t\tfor {\n\t\t\tselect {\n\t\t\tcase <-ctx.Done():\n\t\t\t\treturn\n\t\t\tcase e, ok := <-c:\n\t\t\t\tif !ok {\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\twriteError(ctx, out, e)\n\t\t\t}\n\t\t}\n\t}\n\tfor _, c := range channels {\n\t\tgo multiplex(c)\n\t}\n\tgo func() {\n\t\twg.Wait()\n\t\tclose(out)\n\t}()\n\treturn out\n}", "title": "" }, { "docid": "678111f298f59dcadbfeb00b90202509", "score": "0.51611817", "text": "func Err(message string) {\n\tfmt.Printf(\"%s[ERROR]%s %s\\n\", Red, Reset, message)\n}", "title": "" }, { "docid": "7c8cd1f7ee8741566d3b17bf20bf1740", "score": "0.51336116", "text": "func redirectMetricsErrorsToErrors(chanMetricsErr <-chan error, chanError chan<- error, chanMetricsExit <-chan struct{}) {\n\tcollectServerErrors := true\n\tfor collectServerErrors {\n\t\tselect {\n\t\tcase err := <-chanMetricsErr:\n\t\t\tif err != nil {\n\t\t\t\tchanError <- err\n\t\t\t}\n\t\tcase <-chanMetricsExit:\n\t\t\tcollectServerErrors = false\n\t\t}\n\t}\n}", "title": "" }, { "docid": "f82553d485e7f825b9bcde7415e335a9", "score": "0.5115531", "text": "func (o ServiceSlackOutput) IssueChannel() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *ServiceSlack) pulumi.StringPtrOutput { return v.IssueChannel }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "5b09a62ff3db01dd804ce93422aeada8", "score": "0.5108342", "text": "func sink(in <-chan *uof.Message) <-chan error {\n\terrc := make(chan error)\n\tgo func() {\n\t\tfor range in {\n\t\t}\n\t\tclose(errc)\n\t}()\n\treturn errc\n}", "title": "" }, { "docid": "4333305ebe4e18f661668c7bba75db3c", "score": "0.5097421", "text": "func (e *Elector) sendErr(err error) {\n\te.sendEvent(Event{Err: err})\n}", "title": "" }, { "docid": "4cd081625eb708b915a111ef6bc384b1", "score": "0.509538", "text": "func (console Console) Report(err error) {\n\n\tjson, _ := json.MarshalIndent(err, \"\", \"\\t\")\n\tfmt.Print(string(json))\n\treturn\n}", "title": "" }, { "docid": "a59c6e999b60480fdd3449daf241ca68", "score": "0.5089638", "text": "func Logging(LogChannel chan Log) {\n\n}", "title": "" }, { "docid": "ffb8363303a9391c0ee5ec000deb69ff", "score": "0.5067539", "text": "func (r *rabbus) EmitErr() <-chan error {\n\treturn r.emitErr\n}", "title": "" }, { "docid": "47e6ac92f8b6c6147ca6ebaa3c5f575d", "score": "0.5054762", "text": "func ThingChanFuncErr(gen func() (Thing, error)) (out ThingFrom) {\n\tcha := make(chan Thing)\n\tgo chanThingFuncErr(cha, gen)\n\treturn cha\n}", "title": "" }, { "docid": "2d1fdf73fab02afccf6b55c94fb0334f", "score": "0.50354785", "text": "func (r *ReconcileAmbassadorInstallation) ReportError(eventName string, message string, err error) {\n\t// Send to Metriton\n\tr.ReportEvent(eventName,\n\t\tScoutMeta{\"message\", message},\n\t\tScoutMeta{\"error\", err})\n\n\t// send to the error log\n\tlog.Error(err, message)\n}", "title": "" }, { "docid": "9749a9a8e9e46a0b3dd639784a5389d0", "score": "0.502388", "text": "func ReportError(w http.ResponseWriter, statusCode int, responseMessage string, logMessage string) {\n\thttp.Error(w, responseMessage, statusCode)\n\tlog.Println(logMessage)\n}", "title": "" }, { "docid": "f93b24a2644b758ca382ea1e64fbc78b", "score": "0.5016457", "text": "func (d *Daemon) listenChannel() {\n\tfor {\n\t\tselect {\n\t\tcase <-d.ctx.Done():\n\t\t\td.stopServices()\n\t\t\t// TODO (lmower): determine if we want to do anything with the ctx.Err\n\t\t\t// and ctx.Callback or if these are unnecessary\n\t\t\t//d.Err <- d.ctx.Err\n\t\t\t//d.Err <- d.ctx.Callback\n\t\t\treturn\n\t\tcase eMsg := <-d.Err:\n\t\t\t// this error channel should be used to signal terminal errors which result in\n\t\t\t// more drastic action from the daemon like attempted restarts or shutdowns\n\t\t\t// other less impacting errors should be sent over the Daemon.In channel and\n\t\t\t// the Message interface Err() should be checked for a nil value\n\t\t\tlog.Daemon.Fatalf(\"daemon received fatal error from %s: %s\", eMsg.Type(), eMsg.Error())\n\t\tcase m := <-d.In:\n\t\t\t// check if a non-fatal error was sent\n\t\t\tif m.Error() != nil {\n\t\t\t\tlog.Daemon.Errorf(\"daemon received error from %s service: %s\", m.Type(), m.Error())\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\td.directIncomingMsg(m)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "bf97e614945b1b4b44b1b073ba3679b9", "score": "0.50010145", "text": "func errorHandler(conn *nats.Conn, sub *nats.Subscription, err error) {\n\tlogrus.WithFields(\n\t\tlogrus.Fields{\n\t\t\t\"isConnected\": conn.IsConnected(),\n\t\t\t\"subject\": sub.Subject,\n\t\t\t\"queue\": sub.Queue,\n\t\t\t\"error\": err.Error(),\n\t\t}).Error(\"encountered error\")\n}", "title": "" }, { "docid": "6a8e059d394a53dfb8cf52dc0b0d6c1b", "score": "0.5000099", "text": "func (g *Gain) Err() error {\n\treturn g.Streamer.Err()\n}", "title": "" }, { "docid": "d28b0d4fbae366a7b4f2102bfd60acce", "score": "0.49774995", "text": "func fileInfosErrorFunc(esc <-chan error) func() error { // HLargs\n\tvar last error // HLstate\n\n\treturn func() error {\n\t\terr := <-esc // HLerrorchan\n\t\tif err != nil { // HLerrorchan\n\t\t\tlast = fmt.Errorf(\"cannot handle fileInfos: %s\", err) // HLstate\n\t\t} // HLerrorchan\n\n\t\treturn last // HLstate\n\t}\n}", "title": "" }, { "docid": "78a221c181fc72f3ed2a7a5952cbb425", "score": "0.49431512", "text": "func try_buffered_channel() {\n ch := make(chan int, 2)\n\tch <- 1\n ch <- 2\n // overfill the channel will give error like the following\n // \"fatal error: all goroutines are asleep - deadlock\"\n\t// ch <- 3\n\tfmt.Println(<-ch)\n fmt.Println(<-ch)\n // similarly, over-drain the channel will also give fatal error\n\t// fmt.Println(<-ch)\n}", "title": "" }, { "docid": "ea93a27ea706bb8d553905a7e3542446", "score": "0.49424452", "text": "func (w *write) emitErr(err error) {\n\tselect {\n\tcase w.errCh <- err:\n\tdefault:\n\t\t// no err read, cannot put err into chan\n\t}\n}", "title": "" }, { "docid": "cbbe9dd59a800adeff21b5e9c917dfe1", "score": "0.49392185", "text": "func (n *NullLogger) Err(_ []byte) {\n}", "title": "" }, { "docid": "0a34ac7e3ac44a3a3056845cbfca67f4", "score": "0.4925549", "text": "func report_error(w http.ResponseWriter, code int, err string) {\n\tw.WriteHeader(code)\n\n\tWriteJSON(w, map[string]string{\n\t\t\"error\": err,\n\t})\n}", "title": "" }, { "docid": "634791e3be5cd7a2b6701752d871e7f7", "score": "0.49220842", "text": "func ProcessServErr(err interface{}) {\n fmt.Println(server)\n log.Println(err)\n}", "title": "" }, { "docid": "71000305b102cbb36fd8304e701fa3fd", "score": "0.49183032", "text": "func (cn *Console) MonitorErr() {\n\tobuf := giv.OutBuf{}\n\tobuf.Init(cn.StderrRead, cn.Buf, 0, MarkupStderr)\n\tobuf.MonOut()\n}", "title": "" }, { "docid": "f1fe514f74f0117097fe7dc411417eed", "score": "0.4916492", "text": "func WaitForErr(valch <-chan interface{}) error {\n\tval := WaitForAny(valch)\n\terr, ok := val.(error)\n\tif ok {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5781b925706d3ccc85d591b849ffe4ea", "score": "0.49158466", "text": "func (e *ErrInternal) Report(w http.ResponseWriter) {\n\terr := struct {\n\t\tError string `json:\"Error\"`\n\t}{\n\t\tError: e.Error(),\n\t}\n\tjson.NewEncoder(w).Encode(&err)\n}", "title": "" }, { "docid": "f6a236454d6eaf0f29e87063959435d3", "score": "0.49157196", "text": "func (b *CircuitBreaker) Error(err error) {\n\tif err == nil {\n\t\tb.MarkSuccess()\n\t} else {\n\t\tb.MarkFailure()\n\t}\n}", "title": "" }, { "docid": "4027bae71e334d79262abe36aa862a80", "score": "0.49038067", "text": "func reportKHFailure(errorMessage string) error {\n\terr := checkclient.ReportFailure([]string{errorMessage})\n\tif err != nil {\n\t\tlog.Println(\"Error reporting failure to Kuberhealthy servers:\", err)\n\t\treturn err\n\t}\n\tlog.Println(\"Successfully reported failure to Kuberhealthy servers\")\n\treturn err\n}", "title": "" }, { "docid": "4027bae71e334d79262abe36aa862a80", "score": "0.49038067", "text": "func reportKHFailure(errorMessage string) error {\n\terr := checkclient.ReportFailure([]string{errorMessage})\n\tif err != nil {\n\t\tlog.Println(\"Error reporting failure to Kuberhealthy servers:\", err)\n\t\treturn err\n\t}\n\tlog.Println(\"Successfully reported failure to Kuberhealthy servers\")\n\treturn err\n}", "title": "" }, { "docid": "c95d625759d11aff03b7fe82020e167b", "score": "0.48972628", "text": "func (s *CollRPCSrv) ErrOut() <-chan error {\n\treturn s.grpcSrv.DoneCh\n}", "title": "" }, { "docid": "53c850952a84eae2b4e7b03c15b09644", "score": "0.4893541", "text": "func Report(ctx context.Context, err error, msg string) {\n\tif err != nil {\n\t\tGetLogger(ctx).Error(msg, zap.Error(err))\n\t}\n}", "title": "" }, { "docid": "8acd222c1c85ddf368de61e93913b217", "score": "0.4878072", "text": "func SendErr(ctx context.Context, errC chan<- error, err error) bool {\n\tselect {\n\tcase <-ctx.Done():\n\t\treturn false\n\tcase errC <- err:\n\t\treturn true\n\t}\n}", "title": "" }, { "docid": "7361010eaebf1df7846d731621c8bcd9", "score": "0.48491684", "text": "func (lc EdgeXLogger) Error(msg string, labels ...string) error {\n\tlc.stdOutLogger.SetPrefix(\"ERROR: \")\n\tlc.stdOutLogger.Println(msg)\n\treturn lc.log(support_domain.ERROR, msg, labels)\n}", "title": "" }, { "docid": "adc89ebba865615c945549464b88e36f", "score": "0.4841985", "text": "func (w *Watcher) sendError(err error) bool {\n\tselect {\n\tcase w.Errors <- err:\n\t\treturn true\n\tcase <-w.done:\n\t}\n\treturn false\n}", "title": "" }, { "docid": "5c6cb27e00e8d8d08c01f590f6c02f0d", "score": "0.4834433", "text": "func (c *DefaultConsumer) Err() error {\n\treturn c.err\n}", "title": "" }, { "docid": "6a3634b73387af30c512c37bf774f2f2", "score": "0.48271582", "text": "func SiteChanFuncErr(gen func() (Site, error)) (out SiteFrom) {\n\tcha := make(chan Site)\n\tgo chanSiteFuncErr(cha, gen)\n\treturn cha\n}", "title": "" }, { "docid": "b4c981b7edf829b8c934efd69adeeac3", "score": "0.48236057", "text": "func handleNewChannel(cr ssh.NewChannel, sc ssh.Conn, info string) {\n\tlog.Printf(\n\t\t\"%v Type:%q Data:%q NewChannel\",\n\t\tinfo,\n\t\tcr.ChannelType(),\n\t\tcr.ExtraData(),\n\t)\n\n\t/* Make the same request to the other side */\n\toch, oreqs, err := sc.OpenChannel(cr.ChannelType(), cr.ExtraData())\n\tif nil != err {\n\t\t/* If we can't log it, and reject the client */\n\t\toe, ok := err.(*ssh.OpenChannelError)\n\t\tvar (\n\t\t\treason ssh.RejectionReason\n\t\t\tmessage string\n\t\t)\n\t\tif !ok {\n\t\t\tlog.Printf(\n\t\t\t\t\"%v Type:%q Data:%q Unable to open channel: \"+\n\t\t\t\t\t\"%v\",\n\t\t\t\tinfo,\n\t\t\t\tcr.ChannelType(),\n\t\t\t\tcr.ExtraData(),\n\t\t\t\terr,\n\t\t\t)\n\t\t\treason = ssh.ConnectionFailed\n\t\t\tmessage = \"Fail\"\n\t\t\tmessage = err.Error()\n\t\t} else {\n\t\t\tlog.Printf(\n\t\t\t\t\"%v Type:%q Data:%q Reason:%q Message:%q \"+\n\t\t\t\t\t\"Unable to open channel\",\n\t\t\t\tinfo,\n\t\t\t\tcr.ChannelType(),\n\t\t\t\tcr.ExtraData(),\n\t\t\t\toe.Reason.String(),\n\t\t\t\toe.Message,\n\t\t\t)\n\t\t\treason = oe.Reason\n\t\t\tmessage = oe.Message\n\t\t}\n\t\tif err := cr.Reject(reason, message); nil != err {\n\t\t\tlog.Printf(\n\t\t\t\t\"%v Unable to pass on channel rejecton \"+\n\t\t\t\t\t\"request: %v\",\n\t\t\t\tinfo,\n\t\t\t\terr,\n\t\t\t)\n\t\t}\n\t\treturn\n\t}\n\tdefer och.Close()\n\n\t/* Accept the channel request from the requestor */\n\trch, rreqs, err := cr.Accept()\n\tif nil != err {\n\t\tlog.Printf(\n\t\t\t\"%v Unable to accept request for a channel of type \"+\n\t\t\t\t\"%q: %v\",\n\t\t\tcr.ChannelType(),\n\t\t\tinfo,\n\t\t\terr,\n\t\t)\n\t\treturn\n\t}\n\tdefer rch.Close()\n\n\t/* Handle passing requests between channels */\n\thcrinfo := fmt.Sprintf(\" %v ChannelType:%q\", info, cr.ChannelType())\n\tgo handleChannelRequests(\n\t\trreqs,\n\t\toch,\n\t\thcrinfo+\" ReqDir:AsDirection\",\n\t)\n\tgo handleChannelRequests(\n\t\toreqs,\n\t\trch,\n\t\thcrinfo+\" ReqDir:AgainstDirection\",\n\t)\n\n\tlog.Printf(\n\t\t\"%v Type:%q Data:%q Opened\",\n\t\tinfo,\n\t\tcr.ChannelType(),\n\t\tcr.ExtraData(),\n\t)\n\n\t/* For now, print out read data */\n\tdone := make(chan struct{}, 4)\n\tgo copyOut(och, rch, done)\n\tgo copyOut(rch, och, done)\n\tgo copyOut(och.Stderr(), rch.Stderr(), done)\n\tgo copyOut(rch.Stderr(), och.Stderr(), done)\n\n\t/* Wait for a pipe to break */\n\t<-done\n\tfmt.Printf(\"\\nDone.\\n\")\n}", "title": "" }, { "docid": "3bfbbd9ebd33c52d89c99cd36896ff46", "score": "0.48183644", "text": "func (a *Agent) Err(ctx context.Context) error {\n\tselect {\n\tcase <-a.closed:\n\t\treturn a.err\n\tcase <-ctx.Done():\n\t\treturn ctx.Err()\n\t}\n}", "title": "" }, { "docid": "3657e8d3a328fc8bfde98c2cc6f003cc", "score": "0.481742", "text": "func SIGHUPChannel(ctx context.Context) chan struct{} {\n\tsighupC := make(chan os.Signal, 1)\n\tsignal.Notify(sighupC, syscall.SIGHUP)\n\tch := make(chan struct{})\n\tgo func() {\n\t\tdefer log.HandlePanic()\n\t\tdefer signal.Stop(sighupC)\n\t\tfor {\n\t\t\tselect {\n\t\t\tcase <-sighupC:\n\t\t\t\tch <- struct{}{}\n\t\t\tcase <-ctx.Done():\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}()\n\treturn ch\n}", "title": "" }, { "docid": "172015977e99c9e7d11e5143e6014cc6", "score": "0.47870287", "text": "func reconnector(wsErrors chan string) {\n\tfor {\n\t\t_ = <- wsErrors\n\t\tlog.Println(\"Reconnecting...\")\n\t\tgo listen(openConnection(), wsErrors)\n\t}\n}", "title": "" }, { "docid": "e4ed0310dc4ab114557a55e5f31aecc6", "score": "0.47743747", "text": "func printErr(msg string, err error) {\n\tfmt.Println(chalk.Red.Color(fmt.Sprintf(\"ERROR %v: %v\", msg, err)))\n}", "title": "" }, { "docid": "5a545364cbec8dc9654c2bb8d739a7d5", "score": "0.47721714", "text": "func (kp *kafkaProducer) Background() (func(), chan error) {\n\t// proxy all Sarama errors to the caller until Close() drains and closes it\n\tgo func() {\n\t\tfor err := range kp.producer.Errors() {\n\t\t\tkp.errors <- err\n\t\t}\n\n\t\tkp.logger.Printf(\"Kafka producer: shutting down error reporter\")\n\t}()\n\n\treturn func() {\n\t\tdefer func() {\n\t\t\tkp.errors <- kp.producer.Close()\n\t\t\tclose(kp.errors)\n\t\t}()\n\n\t\t<-kp.ctx.Done()\n\t\tkp.logger.Printf(\"Kafka producer: shutdown triggered\")\n\t}, kp.errors\n}", "title": "" }, { "docid": "e224aaa91d549ab2607ae37dec005c0b", "score": "0.47720635", "text": "func (cli *StorageOSCli) Err() io.Writer {\n\treturn cli.err\n}", "title": "" }, { "docid": "a199646d96fb4f8500beb6281ea0af6f", "score": "0.47639316", "text": "func (n *Alerterator) reportError(source string, err error, alert *v1alpha1.Alert) {\n\tlog.Error(err)\n\tev := alert.CreateEvent(source, err.Error(), \"Warning\")\n\t_, err = n.reportEvent(ev)\n\tif err != nil {\n\t\tlog.Errorf(\"While creating an event for this error, another error occurred: %s\", err)\n\t}\n}", "title": "" }, { "docid": "ee463f1965bda5d7c7180fc23f71f103", "score": "0.4755906", "text": "func (b *Background) Err() error {\n\tselect {\n\tcase <-b.done:\n\t\treturn ErrClosed\n\tdefault:\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "5edac50f04c1566b9cf8aaf644b434c8", "score": "0.47545043", "text": "func (c *Ginger) Err() error {\n\treturn c.Context.Err()\n}", "title": "" }, { "docid": "fb88fe0a6876dfae50c1975ba349a06e", "score": "0.47540262", "text": "func (a *attempt) errorReport() *errorReport {\n\tr := &errorReport{}\n\tif a.planErr != nil {\n\t\tr.flattened = append(r.flattened, a.planErr)\n\t}\n\tfor _, fs := range a.fss {\n\t\tif fs.planning.done && fs.planning.err != nil {\n\t\t\tr.flattened = append(r.flattened, fs.planning.err)\n\t\t} else if fs.planning.done && fs.planned.stepErr != nil {\n\t\t\tr.flattened = append(r.flattened, fs.planned.stepErr)\n\t\t}\n\t}\n\n\t// build byClass\n\t{\n\t\tr.byClass = make(map[errorClass][]*timedError)\n\t\tputClass := func(err *timedError, class errorClass) {\n\t\t\terrs := r.byClass[class]\n\t\t\terrs = append(errs, err)\n\t\t\tr.byClass[class] = errs\n\t\t}\n\t\tfor _, err := range r.flattened {\n\t\t\tif neterr, ok := err.Err.(net.Error); ok && neterr.Timeout() {\n\t\t\t\tputClass(err, errorClassTemporaryConnectivityRelated)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif st, ok := status.FromError(err.Err); ok && st.Code() == codes.Unavailable {\n\t\t\t\t// technically, codes.Unavailable could be returned by the gRPC endpoint, indicating overload, etc.\n\t\t\t\t// for now, let's assume it only happens for connectivity issues, as specified in\n\t\t\t\t// https://grpc.io/grpc/core/md_doc_statuscodes.html\n\t\t\t\tputClass(err, errorClassTemporaryConnectivityRelated)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tputClass(err, errorClassPermanent)\n\t\t}\n\t\tfor _, errs := range r.byClass {\n\t\t\tsort.Slice(errs, func(i, j int) bool {\n\t\t\t\treturn errs[i].Time.After(errs[j].Time) // sort descendingly\n\t\t\t})\n\t\t}\n\t}\n\n\treturn r\n}", "title": "" }, { "docid": "90ebac9002aba967bad22ba7b52786e7", "score": "0.475347", "text": "func runnerChan(ctx context.Context, task Task) <-chan error {\n\terrch := make(chan error, 1)\n\tgo func() {\n\t\tdefer close(errch)\n\t\terrch <- task.Run(ctx)\n\t}()\n\treturn errch\n}", "title": "" }, { "docid": "c51c3e0b4cbc59e0c87558657e47171f", "score": "0.47409752", "text": "func (p *Poller) Err() error {\n\treturn <-p.err\n}", "title": "" }, { "docid": "b376a04a18ce92f6ba6bb4f1a8ccf79d", "score": "0.47319958", "text": "func reportError(format string, a ...interface{}) error {\n\treturn fmt.Errorf(format, a...)\n}", "title": "" }, { "docid": "729bde70d7d1a4fe55c6dbec517f2083", "score": "0.4724416", "text": "func (sl *listener) Channel() <-chan Action {\n\treturn sl.c\n}", "title": "" }, { "docid": "afb54685c6f12f4c398b234f1cddcbf0", "score": "0.4711678", "text": "func minimalPipelineStage(ctx context.Context) (<-chan error, error) {\r\n errc := make(chan error, 1)\r\n go func() {\r\n defer close(errc)\r\n // Do something useful here.\r\n }()\r\n return errc, nil\r\n}", "title": "" }, { "docid": "6c9451bdde3caaf004a132f0f30290b6", "score": "0.4698511", "text": "func (conn *LocalConnection) shutdown(err error) {\n\t// err should always be a real error, even if only io.EOF\n\tif err == nil {\n\t\tpanic(\"nil error\")\n\t}\n\n\tselect {\n\tcase conn.errorChan <- err:\n\tdefault:\n\t}\n}", "title": "" }, { "docid": "c46a98eb9dccedf81286884c9415dc26", "score": "0.46935382", "text": "func er(msg interface{}) {\n\t_, _ = fmt.Fprintf(os.Stderr, \"%v: %v\\n\", name, msg)\n\tos.Exit(1)\n}", "title": "" }, { "docid": "48ea1747e8c02f8f0eebbf0111cb8447", "score": "0.46925265", "text": "func shutdownChannel(channel *amqp.Channel, tag string) error {\n\t// This waits for a server acknowledgment which means the sockets will have\n\t// flushed all outbound publishings prior to returning. It's important to\n\t// block on Close to not lose any publishings.\n\tif err := channel.Cancel(tag, true); err != nil {\n\t\tif amqpError, isAMQPError := err.(*amqp.Error); isAMQPError && amqpError.Code != 504 {\n\t\t\treturn fmt.Errorf(\"AMQP connection close error: %s\", err)\n\t\t}\n\t}\n\n\tif err := channel.Close(); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "47678357f92de5563e8088f8c8c6c323", "score": "0.46831998", "text": "func (cli *CliInstance) Err() io.Writer {\n\treturn cli.err\n}", "title": "" }, { "docid": "7675bdb7310eaa388a006cd6c8d7d5e1", "score": "0.46705782", "text": "func (ctx *Context) Error(status int, errStr string) {\r\n\tglobal.errorFunc(ctx, errStr, status)\r\n\tctx.Stop()\r\n}", "title": "" }, { "docid": "f90acb71d7121f9255fca3e930ae21a9", "score": "0.46585768", "text": "func TestHandlerRecvError(t *testing.T) {\n\tassert := assert.New(t)\n\tsession := new(mockSession)\n\tsession.On(\"Recv\").Return(\"\", fmt.Errorf(\"error\"))\n\tvessel := NewSockJSVessel(\"http://localhost.com/foo\")\n\tvessel.AddChannel(\"foo\", newChannel(t, false))\n\thandler := vessel.(*sockjsVessel).handler()\n\n\thandler(session)\n\n\tassert.Equal(0, len(vessel.(*sockjsVessel).sessions))\n\tsession.Mock.AssertExpectations(t)\n}", "title": "" }, { "docid": "cd3007de5d7acc6fd5306d0c8d5a4be1", "score": "0.46545616", "text": "func (c *Config) Report() chan<- interface{} {\n\treturn c.reportCh\n}", "title": "" }, { "docid": "3364ad4206037c1bb04ec8343b184c47", "score": "0.46461102", "text": "func startHandleingFailures() {\n\tfor e := range producer.Events() {\n\t\tswitch ev := e.(type) {\n\t\tcase *kafka.Message:\n\t\t\tif ev.TopicPartition.Error != nil {\n\t\t\t\tlog.Printf(\"Delivery failed: %v\\n\", ev.TopicPartition)\n\t\t\t} else {\n\t\t\t\tlog.Printf(\"Delivered message to %v\\n\", ev.TopicPartition)\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "00ac6d7ccdf4d3c3263704d75118fd56", "score": "0.46406394", "text": "func send_error(c net.Conn) {\n send_ten( server_error, 0, c )\n}", "title": "" } ]
f63c7c99c9014e0bae6b9c10d789c1f1
List returns a list of classes
[ { "docid": "442725ac0db551c11edb2ee69a3fd54e", "score": "0.0", "text": "func (p plansImpl) List(ctx context.Context) (*configv1.PlanList, error) {\n\tplans := &configv1.PlanList{}\n\n\treturn plans, p.Store().Client().List(ctx,\n\t\tstore.ListOptions.InNamespace(HubNamespace),\n\t\tstore.ListOptions.InTo(plans),\n\t)\n}", "title": "" } ]
[ { "docid": "1c76881ae0be089c8df59762f316680d", "score": "0.7076588", "text": "func classesList(cl []string) string {\n\tif len(cl) > 0 {\n\t\treturn \" class=\" + strconv.Quote(strings.Join(cl, \" \"))\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "bbc9b77e04de1e664733c69b34b5e6d9", "score": "0.6987287", "text": "func List(fileName string) ([]jadeplib.ClassName, error) {\n\tvar result []jadeplib.ClassName\n\n\tr, err := zip.OpenReader(fileName)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error opening file %s:\\n%v\", fileName, err)\n\t}\n\tdefer r.Close()\n\n\tfor _, f := range r.File {\n\t\tfn := f.Name\n\t\tif strings.Contains(fn, \"$\") || !strings.HasSuffix(fn, \".class\") || strings.HasSuffix(fn, \"/package-info.class\") {\n\t\t\tcontinue\n\t\t}\n\t\tc := strings.Replace(strings.TrimSuffix(fn, \".class\"), \"/\", \".\", -1)\n\t\tresult = append(result, jadeplib.ClassName(c))\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "dd170a91746ee920c974bf1976dc3994", "score": "0.6723519", "text": "func ListClasses(center string, daysFromNow int) (ClassResponse, error) {\n\turl := fmt.Sprintf(CLASSES_URL, center, nextNDays(daysFromNow))\n\n\tvar c ClassResponse\n\n\tresp, err := util.HiyogaGet(url)\n\n\tif err != nil {\n\t\treturn c, err\n\t}\n\n\terr = json.Unmarshal(resp, &c)\n\n\treturn c, err\n}", "title": "" }, { "docid": "38367ad729c16fbb133de97ca88810d4", "score": "0.65275645", "text": "func (s *schedCtrlGroup) listClasses(w http.ResponseWriter, r *http.Request) {\n\tvar reqBody struct {\n\t\tFrom time.Time `json:\"from\"`\n\t\tTill time.Time `json:\"till\"`\n\t\tGroupID string `json:\"group_id\"`\n\t}\n\tif err := render.DecodeJSON(http.MaxBytesReader(w, r.Body, hardBodyLimit), &reqBody); err != nil {\n\t\trest.SendErrorJSON(w, r, http.StatusBadRequest, err, \"can't bind request for list classes\", rest.ErrDecode)\n\t\treturn\n\t}\n\n\tclasses, err := s.dataService.ListClasses(reqBody.From, reqBody.Till, reqBody.GroupID)\n\tif err != nil {\n\t\trest.SendErrorJSON(w, r, http.StatusInternalServerError, err, \"can't load classes\", rest.ErrInternal)\n\t\treturn\n\t}\n\n\ttype respBody struct {\n\t\tID string `json:\"id\"`\n\t\tTitle string `json:\"title\"`\n\t\tLocation store.Location `json:\"location\"`\n\t\tStart time.Time `json:\"start\"`\n\t\tEnd time.Time `json:\"end\"`\n\t}\n\n\tvar clDescs []respBody\n\tfor _, cl := range classes {\n\t\tclDescs = append(clDescs, respBody{\n\t\t\tID: cl.ID,\n\t\t\tTitle: cl.Title,\n\t\t\tLocation: cl.Location,\n\t\t\tStart: cl.Start,\n\t\t\tEnd: cl.Start.Add(cl.Duration),\n\t\t})\n\t}\n\n\trender.Status(r, http.StatusOK)\n\trender.JSON(w, r, R.JSON{\"classes\": clDescs})\n}", "title": "" }, { "docid": "d81f35949ca3eec04498a8744cb9b3b8", "score": "0.6490906", "text": "func (r *GiftcardclassService) List() *GiftcardclassListCall {\n\tc := &GiftcardclassListCall{s: r.s, urlParams_: make(gensupport.URLParams)}\n\treturn c\n}", "title": "" }, { "docid": "f5da170c2dd2118bf277831f90cfd1dd", "score": "0.6476352", "text": "func (s *DivisionClassesEndpoint) List(ctx context.Context, division int, all bool, o *api.ListOptions) ([]*DivisionClasses, error) {\n\tvar entities []*DivisionClasses\n\tu, _ := s.client.ResolvePathWithDivision(\"/api/v1/{division}/hrm/DivisionClasses\", division) // #nosec\n\tapi.AddListOptionsToURL(u, o)\n\n\tif all {\n\t\terr := s.client.ListRequestAndDoAll(ctx, u.String(), &entities)\n\t\treturn entities, err\n\t}\n\t_, _, err := s.client.NewRequestAndDo(ctx, \"GET\", u.String(), nil, &entities)\n\treturn entities, err\n}", "title": "" }, { "docid": "c1802892d9084e26d6bf9eac0513e914", "score": "0.6469846", "text": "func (r *LoyaltyclassService) List() *LoyaltyclassListCall {\n\tc := &LoyaltyclassListCall{s: r.s, urlParams_: make(gensupport.URLParams)}\n\treturn c\n}", "title": "" }, { "docid": "9e13f3074ace6ddd776cadd59d888678", "score": "0.63875604", "text": "func (s *Store) ListClasses(teacher string) ([]*synergy.Stu415, error) {\n\trows, err := s.db.Query(selectDistinctSectionsByTeacher, teacher)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer rows.Close()\n\tclasses := make([]*synergy.Stu415, 0)\n\tfor rows.Next() {\n\t\t// SELECT DISTINCT section_id, course_id_and_title, per from stu415 WHERE teacher=?\n\t\tstu := new(synergy.Stu415)\n\t\terr = rows.Scan(&stu.SectionID, &stu.CourseIDAndTitle, &stu.Per)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"error listing classes: %v\", err)\n\t\t\tcontinue\n\t\t}\n\t\tclasses = append(classes, stu)\n\n\t}\n\n\treturn classes, nil\n}", "title": "" }, { "docid": "c531e29328c6079f26b20d941776d0a2", "score": "0.6323368", "text": "func (r *TransitclassService) List() *TransitclassListCall {\n\tc := &TransitclassListCall{s: r.s, urlParams_: make(gensupport.URLParams)}\n\treturn c\n}", "title": "" }, { "docid": "d86b0191da121ebffbaba401e52350b9", "score": "0.6157403", "text": "func (r *FlightclassService) List() *FlightclassListCall {\n\tc := &FlightclassListCall{s: r.s, urlParams_: make(gensupport.URLParams)}\n\treturn c\n}", "title": "" }, { "docid": "7ef7f0d7838e68e9ddd177c2aeee7306", "score": "0.60787976", "text": "func (s *secretProviderClassLister) List(selector labels.Selector) (ret []*v1.SecretProviderClass, err error) {\n\terr = cache.ListAll(s.indexer, selector, func(m interface{}) {\n\t\tret = append(ret, m.(*v1.SecretProviderClass))\n\t})\n\treturn ret, err\n}", "title": "" }, { "docid": "b988aead0cac55250752dd4fc8fe969c", "score": "0.60687244", "text": "func getClassesList(w http.ResponseWriter, r *http.Request, classId string) {\n\tlogger.Debugf(\"getClassesList: %v\", r)\n\n\ttoken := getTokenFromRequest(r)\n\tuserId, err := getUserIdFromToken(token)\n\tif err != nil {\n\t\t// user permission error\n\t\t// Support Guest?\n\t\tif !supportGuest() {\n\t\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\t\tw.Write([]byte(`{\"error\":\"token_invalid\"}`))\n\t\t\treturn\n\t\t} else {\n\t\t\tuserId = \"guest\" // TODO: use const variable\n\t\t}\n\t}\n\n\tdataList := []interface{}{}\n\tfor bid, b := range boardHeader {\n\t\t// TODO: Show Board by user level\n\t\tif !shouldShowOnUserLevel(b, userId) {\n\t\t\tcontinue\n\t\t}\n\t\tif b.ClassId() != classId {\n\t\t\tcontinue\n\t\t}\n\t\tjb, _ := json.Marshal(b)\n\t\tlogger.Debugf(\"marshal class board: %v\", string(jb))\n\t\tm := marshalBoardHeader(b)\n\t\tif b.IsClass() {\n\t\t\tm[\"id\"] = fmt.Sprintf(\"%v\", bid+1)\n\t\t}\n\t\tdataList = append(dataList, m)\n\t}\n\n\tresponseMap := map[string]interface{}{\n\t\t\"data\": dataList,\n\t}\n\n\tb, _ := json.MarshalIndent(responseMap, \"\", \" \")\n\tw.Write(b)\n\n}", "title": "" }, { "docid": "d294a87bdfc3f39b5932f1fa81a5630c", "score": "0.6040587", "text": "func (s secretProviderClassNamespaceLister) List(selector labels.Selector) (ret []*v1.SecretProviderClass, err error) {\n\terr = cache.ListAllByNamespace(s.indexer, s.namespace, selector, func(m interface{}) {\n\t\tret = append(ret, m.(*v1.SecretProviderClass))\n\t})\n\treturn ret, err\n}", "title": "" }, { "docid": "812f01b0c24b2224ab59317f31e0a833", "score": "0.6026088", "text": "func (n *Namespace) List(ctx context.Context, ns string) ([]runtime.Object, error) {\n\too, err := n.Generic.List(ctx, ns)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn oo, nil\n}", "title": "" }, { "docid": "4eb2110a2d4a5aae5d9b74b20cfa44e1", "score": "0.6014747", "text": "func GetBoltClassList() []Class {\n\treturn []Class{G4p6, G4p8, G5p6, G5p8, G6p8, G8p8, G10p9}\n}", "title": "" }, { "docid": "318facc2e92c8acf82c9ac421d92a8de", "score": "0.59583527", "text": "func (c Client) ListClassifiers() ([]Classifier, error) {\n\tbody, err := c.watsonClient.MakeRequest(\"GET\", c.version+\"/classifiers\", nil, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tvar cl Classifiers\n\terr = json.Unmarshal(body, &cl)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn cl.Classifiers, nil\n}", "title": "" }, { "docid": "458faff2ac5d8227b558d5d6b5570063", "score": "0.59101015", "text": "func List() []string {\n\tnames := make([]string, 0, len(models))\n\tfor name := range models {\n\t\tnames = append(names, name)\n\t}\n\treturn names\n}", "title": "" }, { "docid": "d67705ea958f7b7434603a48c0ee0b89", "score": "0.5906094", "text": "func (r *dpRepo) listObjectClasses(currentView *model.ItemConfig) (model.ItemList, error) {\n\tlogging.LogDebugf(\"repo/dp/listObjectClasses(%v)\", currentView)\n\n\tif currentView.DpAppliance == \"\" {\n\t\treturn nil, errs.Error(\"Can't get object class list if DataPower appliance is not selected.\")\n\t}\n\n\tif currentView.DpDomain == \"\" {\n\t\treturn nil, errs.Error(\"Can't get object class list if DataPower domain is not selected.\")\n\t}\n\n\tvar err error\n\tvar classNamesAndStatusesWithDuplicates [][]string\n\tclassNameMap := make(map[string]int)\n\tclassNameModifiedMap := make(map[string]bool)\n\tclassNames := make([]string, 0)\n\n\tswitch r.dataPowerAppliance.DpManagmentInterface() {\n\tcase config.DpInterfaceRest:\n\t\tlistObjectStatusesURL := fmt.Sprintf(\"/mgmt/status/%s/ObjectStatus\", currentView.DpDomain)\n\t\tclassNamesAndStatusesWithDuplicates, _, err =\n\t\t\tr.restGetForListsResult(listObjectStatusesURL,\n\t\t\t\t\"/ObjectStatus//Class\", \"/ObjectStatus//ConfigState\")\n\n\tcase config.DpInterfaceSoma:\n\t\tsomaRequest := fmt.Sprintf(`<soapenv:Envelope xmlns:soapenv=\"http://schemas.xmlsoap.org/soap/envelope/\"\n xmlns:man=\"http://www.datapower.com/schemas/management\">\n\t<soapenv:Header/>\n\t<soapenv:Body>\n\t <man:request domain=\"%s\">\n\t <man:get-status class=\"ObjectStatus\"/>\n\t </man:request>\n\t</soapenv:Body>\n</soapenv:Envelope>`, currentView.DpDomain)\n\t\tvar somaResponse string\n\t\tsomaResponse, err = r.soma(somaRequest)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tclassNamesAndStatusesWithDuplicates, err = parseSOMAFindLists(somaResponse,\n\t\t\t\"//*[local-name()='response']/*[local-name()='status']/*[local-name()='ObjectStatus']/Class\",\n\t\t\t\"//*[local-name()='response']/*[local-name()='status']/*[local-name()='ObjectStatus']/ConfigState\")\n\n\tdefault:\n\t\tr.DpViewMode = model.DpFilestoreMode\n\t\tlogging.LogDebug(\"repo/dp/listObjectClasses(), using neither REST neither SOMA.\")\n\t\treturn nil, errs.Error(\"DataPower management interface not set.\")\n\t}\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfor idx, className := range classNamesAndStatusesWithDuplicates[0] {\n\t\tif _, oldName := classNameMap[className]; !oldName {\n\t\t\tclassNames = append(classNames, className)\n\t\t}\n\t\tif classNamesAndStatusesWithDuplicates[1][idx] != objectStatusSaved &&\n\t\t\tclassNamesAndStatusesWithDuplicates[1][idx] != objectStatusExternal {\n\t\t\tclassNameModifiedMap[className] = true\n\t\t}\n\t\tclassNameMap[className]++\n\t}\n\n\tlogging.LogDebugf(\"repo/dp/listObjectClasses(), classNames: %v\", classNames)\n\n\titems := make(model.ItemList, len(classNames))\n\tfor idx, className := range classNames {\n\t\titemConfig := model.ItemConfig{Type: model.ItemDpObjectClass,\n\t\t\tName: className,\n\t\t\tDpAppliance: currentView.DpAppliance,\n\t\t\tDpDomain: currentView.DpDomain,\n\t\t\tPath: className,\n\t\t\tParent: currentView}\n\t\tmodified := \"\"\n\t\tif classNameModifiedMap[className] {\n\t\t\tmodified = \"*\"\n\t\t}\n\t\titem := model.Item{Name: className,\n\t\t\tSize: fmt.Sprintf(\"%d\", classNameMap[className]),\n\t\t\tModified: modified,\n\t\t\tConfig: &itemConfig}\n\t\titems[idx] = item\n\t}\n\n\tsort.Sort(items)\n\n\tlogging.LogDebugf(\"repo/dp/listObjectClasses(), items: %v\", items)\n\treturn items, nil\n}", "title": "" }, { "docid": "20c4426cec1e672afa2a4860f1c1f10b", "score": "0.5868216", "text": "func (c *TypeService) List() ([]Type, *http.Response, error) {\n\toutput := &struct {\n\t\tData []Type `json:\"data\"`\n\t}{}\n\tresp, err := doList(c.sling, c.endpoint, nil, output)\n\treturn output.Data, resp, err\n}", "title": "" }, { "docid": "4186368c2da9e34090c7924a012eb07c", "score": "0.5827821", "text": "func (r *EventticketclassService) List() *EventticketclassListCall {\n\tc := &EventticketclassListCall{s: r.s, urlParams_: make(gensupport.URLParams)}\n\treturn c\n}", "title": "" }, { "docid": "0c280179610445914702a4c1125f21ae", "score": "0.57601213", "text": "func (r *OfferclassService) List() *OfferclassListCall {\n\tc := &OfferclassListCall{s: r.s, urlParams_: make(gensupport.URLParams)}\n\treturn c\n}", "title": "" }, { "docid": "3a629bbb476619f9b7ef2891f6c7b1ba", "score": "0.573965", "text": "func (md MDawg) List() []string {\n\treturn md.ListFrom(\"\")\n}", "title": "" }, { "docid": "1048692b111dc6475f36ce6b16d56b0c", "score": "0.57344824", "text": "func (dg Dawg) List() []string {\n\treturn dg.ListFrom(\"\")\n}", "title": "" }, { "docid": "011cce0e575473e2f1e348bd5ae119c8", "score": "0.5728074", "text": "func (m *GormResourceTypeRepository) List(ctx context.Context) ([]ResourceType, error) {\n\tdefer goa.MeasureSince([]string{\"goa\", \"db\", \"resource_type\", \"list\"}, time.Now())\n\tvar rows []ResourceType\n\n\terr := m.db.Model(&ResourceType{}).Order(\"name\").Find(&rows).Error\n\tif err != nil && err != gorm.ErrRecordNotFound {\n\t\treturn nil, errs.WithStack(err)\n\t}\n\treturn rows, nil\n}", "title": "" }, { "docid": "fca71e67d0c434ba9fe4c0f11adefef8", "score": "0.5709566", "text": "func CmdList() *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"list\",\n\t\tShort: \"List bucket classes\",\n\t\tRun: RunList,\n\t}\n\treturn cmd\n}", "title": "" }, { "docid": "515128ccceda7cd7af7afe9b179560ab", "score": "0.57062685", "text": "func getClasses(w http.ResponseWriter, r *http.Request) {\n\tlogger.Debugf(\"getClasses: %v\", r)\n\tclassId, item, err := parseClassPath(r.URL.Path)\n\tlogger.Noticef(\"query class: %v item: %v err: %v\", classId, item, err)\n\tif classId == \"\" {\n\t\tgetClassesWithoutClassId(w, r)\n\t\treturn\n\t}\n\tgetClassesList(w, r, classId)\n\treturn\n\n\t// // get single board\n\t// if item == \"information\" {\n\t// \tgetBoardInformation(w, r, boardId)\n\t// \treturn\n\t// }\n\n}", "title": "" }, { "docid": "00b42d781db0e80b2a2e6a927d4086e9", "score": "0.56751144", "text": "func getClassroomList(w http.ResponseWriter, r *http.Request) {\n\n\tclassrooms, err := services.ClassroomService.FindAllInfo()\n\tif logs.SqlError(err, w, len(classrooms) != 0) {\n\t\treturn\n\t}\n\n\tdata, _ := json.Marshal(classrooms)\n\tw.WriteHeader(200)\n\tw.Write(data)\n}", "title": "" }, { "docid": "fd0ebd51ccaa8d128361a7c2a8db1824", "score": "0.5669568", "text": "func (obj *tests) All() []Test {\n\treturn obj.list\n}", "title": "" }, { "docid": "7cf4bd9431d4ada253c841258d1c7b19", "score": "0.566884", "text": "func ListStudents(c *Class) {\n\tfmt.Println(\"The students in class, \", c.Name)\n\tfor _, s := range c.Students {\n\t\tfmt.Println(s.Name)\n\t}\n}", "title": "" }, { "docid": "140a506dd0a009cf3161deb101287b0b", "score": "0.5633702", "text": "func (a api) List(ctx context.Context) ([]string, error) {\n\turl := fmt.Sprintf(\n\t\t\"%s%s\",\n\t\ta.client.BaseURL(),\n\t\tpathPrefix,\n\t)\n\n\treq, err := http.NewRequestWithContext(ctx, http.MethodGet, url, nil)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"could not create nic types list request: %w\", err)\n\t}\n\n\thttpResponse, err := a.client.Do(req)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"could not execute nic types list request: %w\", err)\n\t}\n\tif httpResponse.StatusCode >= 500 && httpResponse.StatusCode < 600 {\n\t\treturn nil, fmt.Errorf(\"could not execute nic types list request, got response %s\", httpResponse.Status)\n\t}\n\n\tvar responsePayload []string\n\terr = json.NewDecoder(httpResponse.Body).Decode(&responsePayload)\n\t_ = httpResponse.Body.Close()\n\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"could not decode nic types list response: %w\", err)\n\t}\n\n\treturn responsePayload, err\n}", "title": "" }, { "docid": "230d554a8e0b5d8816e07b7e51775dee", "score": "0.56308854", "text": "func (s Set) Classes() []string {\n\tm := map[string]bool{}\n\tfor _, sample := range s {\n\t\tfor _, class := range sample.Classes {\n\t\t\tm[class] = true\n\t\t}\n\t}\n\n\tvar res []string\n\tfor class := range m {\n\t\tres = append(res, class)\n\t}\n\tsort.Strings(res)\n\n\treturn res\n}", "title": "" }, { "docid": "c045a75ef29d27b5a2f13242bc599e0e", "score": "0.5606818", "text": "func List(ctx context.Context, svc iaas.Service) (list []abstract.ClusterIdentity, xerr fail.Error) {\n\tvar emptyList []abstract.ClusterIdentity\n\n\tif ctx == nil {\n\t\treturn emptyList, fail.InvalidParameterCannotBeNilError(\"ctx\")\n\t}\n\tif svc == nil {\n\t\treturn emptyList, fail.InvalidParameterCannotBeNilError(\"svc\")\n\t}\n\n\tinstance, xerr := New(svc)\n\tif xerr != nil {\n\t\treturn nil, xerr\n\t}\n\n\tlist = []abstract.ClusterIdentity{}\n\txerr = instance.Browse(ctx, func(hc *abstract.ClusterIdentity) fail.Error {\n\t\tlist = append(list, *hc)\n\t\treturn nil\n\t})\n\treturn list, xerr\n}", "title": "" }, { "docid": "7b3fd60b3937fa4aca0c28540e59326c", "score": "0.55600107", "text": "func (r registry) List() []Def {\n\tlist := make([]Def, 0, len(r))\n\tfor _, def := range r {\n\t\tlist = append(list, def)\n\t}\n\tsort.Slice(list, func(i, j int) bool {\n\t\treturn list[i].Name < list[j].Name\n\t})\n\treturn list\n}", "title": "" }, { "docid": "fd33467fde724ef6473acecd21e801ad", "score": "0.5515846", "text": "func List(params *trakt.ListByTypeParams) *trakt.LanguageIterator {\n\treturn getC().List(params)\n}", "title": "" }, { "docid": "6377f15dd40d7b156d6ce4a39f3e9aa3", "score": "0.55141366", "text": "func (c *course) PrintClasses() {\n\ttext := \"Las clases son: \"\n\tfor _, class := range c.clases {\n\t\ttext += class + \", \"\n\t}\n\n\tfmt.Println(text[:len(text)-2])\n}", "title": "" }, { "docid": "48cdacbf116e52d5f15864e8b298e01f", "score": "0.54908615", "text": "func (f Cataloger) List() ([]*framework.Service, error) {\n\treturn f.Services, nil\n}", "title": "" }, { "docid": "61f1260178df82f47eeeae150e70661d", "score": "0.54800844", "text": "func (instanceApi *InstanceApi) List() ([]Instance, error) {\r\n\treturn instanceApi.ListWithOptions(map[string]string{})\r\n}", "title": "" }, { "docid": "800d2ad46efe4dfaf52fea25538584a8", "score": "0.5477169", "text": "func (k Keeper) GetClasses(ctx sdk.Context) (classes []*nft.Class) {\n\tstore := ctx.KVStore(k.storeKey)\n\titerator := sdk.KVStorePrefixIterator(store, ClassKey)\n\tdefer iterator.Close()\n\tfor ; iterator.Valid(); iterator.Next() {\n\t\tvar class nft.Class\n\t\tk.cdc.MustUnmarshal(iterator.Value(), &class)\n\t\tclasses = append(classes, &class)\n\t}\n\treturn\n}", "title": "" }, { "docid": "66c481c5690020990394d6bed1e86a1f", "score": "0.54526883", "text": "func (cmd *ListClassesCommand) Run(c *client.Client, args []string) error {\n\tvar path string\n\tif len(args) > 0 {\n\t\tpath = args[0]\n\t} else {\n\t\tpath = \"/classes\"\n\t}\n\tlogger := goa.NewLogger(log.New(os.Stderr, \"\", log.LstdFlags))\n\tctx := goa.WithLogger(context.Background(), logger)\n\tresp, err := c.ListClasses(ctx, path)\n\tif err != nil {\n\t\tgoa.LogError(ctx, \"failed\", \"err\", err)\n\t\treturn err\n\t}\n\n\tgoaclient.HandleResponse(c.Client, resp, cmd.PrettyPrint)\n\treturn nil\n}", "title": "" }, { "docid": "f487e3931fc33be26856e94f76bb17d3", "score": "0.5435803", "text": "func (mux *Mux) List(ctx context.Context, url string) ([]*Object, error) {\n\tbackend, err := mux.findBackend(url, listOp)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn backend.List(ctx, url)\n}", "title": "" }, { "docid": "6b1eadd9694cc23821fb02acffa6fecc", "score": "0.5429185", "text": "func (ft *Features) List() (out []string) {\n\tv := reflect.ValueOf(ft).Elem()\n\tvType := v.Type()\n\tfor i := 0; i < v.NumField(); i++ {\n\t\tout = append(out, vType.Field(i).Name)\n\t}\n\treturn out\n}", "title": "" }, { "docid": "73526f9483754cf209c6ec606c99194a", "score": "0.5417293", "text": "func (l Leftovers) List(filter string, regex bool) {\n\tl.logger.NoConfirm()\n\n\tvar deletables []common.Deletable\n\n\tfor _, r := range l.resources {\n\t\tlist, err := r.List(filter, regex)\n\t\tif err != nil {\n\t\t\tl.logger.Println(color.YellowString(err.Error()))\n\t\t}\n\n\t\tdeletables = append(deletables, list...)\n\t}\n\n\tfor _, d := range deletables {\n\t\tl.logger.Println(fmt.Sprintf(\"[%s: %s]\", d.Type(), d.Name()))\n\t}\n}", "title": "" }, { "docid": "1ac5674a651eaceb7c4b43cd1ea34a86", "score": "0.5411234", "text": "func (entering *entering) findActualClasses(names []ClassName) (classes []typing.Type) {\n\tfor _, name := range names {\n\t\tclass := entering.findClassByName(name.Name)\n\t\tclasses = append(classes, class.ActualClass)\n\t}\n\treturn\n}", "title": "" }, { "docid": "22bc05df7f10cab112628312cd96dd15", "score": "0.5410748", "text": "func (p *Pokedex) List() {\n\tfor _, pokemon := range p.directory {\n\t\tfmt.Println(pokemon.name, pokemon.caught)\n\t}\n}", "title": "" }, { "docid": "8bd302bc42ee9a0a56942ffdf19c73af", "score": "0.5409538", "text": "func (w *workerDelegate) MachineClassList() client.ObjectList {\n\treturn &machinev1alpha1.MachineClassList{}\n}", "title": "" }, { "docid": "1cca1c6db7a009d9bcfd409f02649b54", "score": "0.54060555", "text": "func (r *Registry) List() []string {\n\tr.locker.RLock()\n\tdefer r.locker.RUnlock()\n\n\tlist := make([]string, len(r.Instances))\n\tfor i := range r.Instances {\n\t\tlist[i] = r.Instances[i].String()\n\t}\n\treturn list\n}", "title": "" }, { "docid": "1afef2ece7980eb75d20c04322ab3179", "score": "0.5400096", "text": "func (r *Registry) List() (out []string) {\n\tfor _, x := range *r {\n\t\tout = append(out, x.Name)\n\t}\n\treturn\n}", "title": "" }, { "docid": "400f54e823d91b7d50308197b4d93386", "score": "0.53639174", "text": "func (m *Manager) List() (ret []string) {\n\tfor k := range m.macros {\n\t\tret = append(ret, k)\n\t}\n\n\treturn ret\n}", "title": "" }, { "docid": "400f54e823d91b7d50308197b4d93386", "score": "0.53639174", "text": "func (m *Manager) List() (ret []string) {\n\tfor k := range m.macros {\n\t\tret = append(ret, k)\n\t}\n\n\treturn ret\n}", "title": "" }, { "docid": "e9595e2fb12ad4fb015209e038d3d713", "score": "0.5358359", "text": "func List() []string {\n\tl := []string{}\n\tfor _, p := range initPlugins {\n\t\tl = append(l, p.name)\n\t}\n\treturn l\n}", "title": "" }, { "docid": "11a9582c863535835abf53444ebc5e13", "score": "0.53535026", "text": "func List() (l []string) {\n\tm.Lock()\n\n\tl = make([]string, 0, len(drivers))\n\tfor name := range drivers {\n\t\tl = append(l, name)\n\t}\n\n\tm.Unlock()\n\n\treturn\n}", "title": "" }, { "docid": "dd52a6a2420d613e860b7e73a86f3b7b", "score": "0.53514636", "text": "func (s *Service) GetAllTestClasses() (pgx.Rows, error) {\n\treturn s.db.GetAllTestClasses()\n}", "title": "" }, { "docid": "17c2075a500f648bcaa02e1ea770b06c", "score": "0.53429455", "text": "func List() ([]Food, error) {\n\treturn persist.list()\n}", "title": "" }, { "docid": "3a88c8f72db90b392b2dc5c20b4306d3", "score": "0.534162", "text": "func (l *lister) List(opts ...ListOption) ([]serving.Service, error) {\n\tcfg := ListOptionDefaults().Extend(opts).toConfig()\n\tlistOptions, err := l.setup(cfg, opts)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tservices, err := l.c.Services(cfg.Namespace).List(listOptions)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tservices.GetObjectKind().SetGroupVersionKind(schema.GroupVersionKind{\n\t\tGroup: \"knative.dev\",\n\t\tVersion: \"v1alpha1\",\n\t\tKind: \"Service\",\n\t})\n\n\treturn services.Items, nil\n}", "title": "" }, { "docid": "94c9276c28e32a5eec265e4f4d5f0528", "score": "0.53412336", "text": "func List() []string {\n\tl := []string{}\n\tfor _, p := range initPlugins {\n\t\tl = append(l, p.info.Name)\n\t}\n\treturn l\n}", "title": "" }, { "docid": "e2fe678a96c69e2c47a25840463ca8a9", "score": "0.5336127", "text": "func (b *Benchmark) List(ctx context.Context, _ string) ([]runtime.Object, error) {\n\tdir, ok := ctx.Value(internal.KeyDir).(string)\n\tif !ok {\n\t\treturn nil, errors.New(\"no benchmark dir found in context\")\n\t}\n\tpath, _ := ctx.Value(internal.KeyPath).(string)\n\n\tff, err := os.ReadDir(dir)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfileName := BenchRx.ReplaceAllString(strings.Replace(path, \"/\", \"_\", 1), \"_\")\n\too := make([]runtime.Object, 0, len(ff))\n\tfor _, f := range ff {\n\t\tif path != \"\" && !strings.HasPrefix(f.Name(), fileName) {\n\t\t\tcontinue\n\t\t}\n\n\t\tif fi, err := f.Info(); err == nil {\n\t\t\too = append(oo, render.BenchInfo{File: fi, Path: filepath.Join(dir, f.Name())})\n\t\t}\n\t}\n\n\treturn oo, nil\n}", "title": "" }, { "docid": "c5a33057a44dc2851d7d77296b3f8c2d", "score": "0.53330094", "text": "func (eventReceiver *storageClassEventReceiver) getStorageClasses() []storagev1.StorageClass {\n\n\tresults := make([]storagev1.StorageClass, 0, len(eventReceiver.store.List()))\n\n\t// Convert the store interface{}\n\tfor _, object := range eventReceiver.store.List() {\n\t\tstorageClass, ok := object.(*storagev1.StorageClass)\n\t\tif ok {\n\t\t\tresults = append(results, *storageClass)\n\t\t} else {\n\t\t\tfmt.Printf(\"Getting a storageClass that is not a storageClass\\n\")\n\t\t}\n\t}\n\treturn results\n}", "title": "" }, { "docid": "4af01ca5a8d3a198764dc4a0ce28d8a7", "score": "0.5298698", "text": "func List(w http.ResponseWriter, r *http.Request) {\n\tr.ParseForm()\n\n\tdb, err := server.Mongo()\n\tif err != nil {\n\t\thelper.WriteJSON(w, server.Result{\n\t\t\tCode: 300,\n\t\t\tMsg: err.Error(),\n\t\t})\n\t\treturn\n\t}\n\n\t// 获取所有类别\n\tfilter := bson.M{\n\t\t\"Type\": \"Animation\",\n\t}\n\tcategories := []category.Model{}\n\tdb.FindMany(server.CategoryCollectionName, filter, &categories)\n\n\tdocs := bson.A{}\n\n\topts := options.FindOptions{\n\t\tSort: bson.M{\n\t\t\t\"_id\": -1,\n\t\t},\n\t}\n\n\tif server.Config.Authority.Enabled {\n\t\tuser, _ := server.GetCurrentUser(r)\n\n\t\tif user != nil {\n\t\t\tfilter1 := bson.M{\n\t\t\t\t\"UserID\": user.ID,\n\t\t\t}\n\n\t\t\tif user.RoleName == \"Administrator\" {\n\t\t\t\tfilter2 := bson.M{\n\t\t\t\t\t\"UserID\": bson.M{\n\t\t\t\t\t\t\"$exists\": 0,\n\t\t\t\t\t},\n\t\t\t\t}\n\t\t\t\tfilter1 = bson.M{\n\t\t\t\t\t\"$or\": bson.A{\n\t\t\t\t\t\tfilter1,\n\t\t\t\t\t\tfilter2,\n\t\t\t\t\t},\n\t\t\t\t}\n\t\t\t}\n\t\t\tdb.FindMany(server.AnimationCollectionName, filter1, &docs, &opts)\n\t\t}\n\t} else {\n\t\tdb.FindAll(server.AnimationCollectionName, &docs, &opts)\n\t}\n\n\tlist := []Model{}\n\tfor _, i := range docs {\n\t\tdoc := i.(primitive.D).Map()\n\t\tcategoryID := \"\"\n\t\tcategoryName := \"\"\n\n\t\tif doc[\"Category\"] != nil {\n\t\t\tfor _, category := range categories {\n\t\t\t\tif category.ID == doc[\"Category\"].(string) {\n\t\t\t\t\tcategoryID = category.ID\n\t\t\t\t\tcategoryName = category.Name\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tthumbnail, _ := doc[\"Thumbnail\"].(string)\n\n\t\tinfo := Model{\n\t\t\tID: doc[\"_id\"].(primitive.ObjectID).Hex(),\n\t\t\tName: doc[\"Name\"].(string),\n\t\t\tCategoryID: categoryID,\n\t\t\tCategoryName: categoryName,\n\t\t\tTotalPinYin: helper.PinYinToString(doc[\"TotalPinYin\"]),\n\t\t\tFirstPinYin: helper.PinYinToString(doc[\"FirstPinYin\"]),\n\t\t\tType: doc[\"Type\"].(string),\n\t\t\tURL: doc[\"Url\"].(string),\n\t\t\tThumbnail: thumbnail,\n\t\t}\n\n\t\tlist = append(list, info)\n\t}\n\n\thelper.WriteJSON(w, server.Result{\n\t\tCode: 200,\n\t\tMsg: \"Get Successfully!\",\n\t\tData: list,\n\t})\n}", "title": "" }, { "docid": "3ea29bd432f64fc7ae2ae405c2b10ab6", "score": "0.52944815", "text": "func (p *Package) List() []string {\n\tpaths := []string{}\n\tfor _, part := range p.parts {\n\t\tpaths = append(paths, part.Path())\n\t}\n\treturn paths\n}", "title": "" }, { "docid": "e929b61c1ce60ae039aaf6f379c6c632", "score": "0.52761024", "text": "func (r *rester) List(ctx context.Context, options *metainternalversion.ListOptions) (runtime.Object, error) {\n\treturn r.store.List(ctx, r.gvr, options)\n}", "title": "" }, { "docid": "f9bce1a1e63e3f6d13a3cdb2441e5867", "score": "0.5248403", "text": "func ListStorageClasses(ctx context.Context, client ctrlruntimeclient.Client, annotationFilter storageClassAnnotationFilter) (apiv2.StorageClassList, error) {\n\tstorageClassList := storagev1.StorageClassList{}\n\tif err := client.List(ctx, &storageClassList); err != nil {\n\t\treturn nil, err\n\t}\n\n\tres := apiv2.StorageClassList{}\n\tfor _, sc := range storageClassList.Items {\n\t\tif annotationFilter == nil || annotationFilter(sc.Annotations) {\n\t\t\tres = append(res, apiv2.StorageClass{Name: sc.ObjectMeta.Name})\n\t\t}\n\t}\n\treturn res, nil\n}", "title": "" }, { "docid": "b8908d6d558096e733237cbc66dcbf2e", "score": "0.52233034", "text": "func List(client *occlient.Client) ([]string, error) {\n\tvar catalogList []string\n\timageStreams, err := getDefaultBuilderImages(client)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"unable to get image streams\")\n\t}\n\tcatalogList = append(catalogList, imageStreams...)\n\n\t// TODO: uncomment when component create supports template creation\n\t//clusterServiceClasses, err := client.GetClusterServiceClassExternalNames()\n\t//if err != nil {\n\t//\treturn nil, errors.Wrap(err, \"unable to get cluster service classes\")\n\t//}\n\t//catalogList = append(catalogList, clusterServiceClasses...)\n\n\treturn catalogList, nil\n}", "title": "" }, { "docid": "ba6c09259c81633b42d11cfb6b530709", "score": "0.52223355", "text": "func (c classCollection) FindAllClasses() ([]models.Class, error) {\n\tcur, err := c.Find(context.TODO(), bson.D{})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar classes = make([]models.Class, 0)\n\n\tfor cur.Next(context.TODO()) {\n\t\tvar class models.Class\n\t\tif err := cur.Decode(&class); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tclasses = append(classes, class)\n\t}\n\n\treturn classes, nil\n}", "title": "" }, { "docid": "b4218ee220cae5cf86b0dbe852a13468", "score": "0.5211523", "text": "func List(c *config.Config) {\n\ttmpl := t(list)\n\n\tif c.Templates.List != \"\" {\n\t\ttmpl = t(c.Templates.List)\n\t}\n\n\ttmpl.Execute(os.Stdout, c)\n}", "title": "" }, { "docid": "dc6d4b2cc444cc757b4f073a386707a5", "score": "0.5210116", "text": "func RunList(cmd *cobra.Command, args []string) {\n\tlist := &nbv1.BucketClassList{\n\t\tTypeMeta: metav1.TypeMeta{Kind: \"BucketClassList\"},\n\t}\n\tif !util.KubeList(list, &client.ListOptions{Namespace: options.Namespace}) {\n\t\treturn\n\t}\n\tif len(list.Items) == 0 {\n\t\tfmt.Printf(\"No bucket classes found.\\n\")\n\t\treturn\n\t}\n\ttable := (&util.PrintTable{}).AddRow(\n\t\t\"NAME\",\n\t\t\"PLACEMENT\",\n\t\t\"PHASE\",\n\t\t\"AGE\",\n\t)\n\tfor i := range list.Items {\n\t\tbc := &list.Items[i]\n\t\ttable.AddRow(\n\t\t\tbc.Name,\n\t\t\tfmt.Sprintf(\"%+v\", bc.Spec.PlacementPolicy),\n\t\t\tstring(bc.Status.Phase),\n\t\t\ttime.Since(bc.CreationTimestamp.Time).Round(time.Second).String(),\n\t\t)\n\t}\n\tfmt.Print(table.String())\n}", "title": "" }, { "docid": "c6149bc009a1fc0ba4452a67f39e4ccd", "score": "0.5199039", "text": "func (c *basicTypes) List(opts metav1.ListOptions) (result *v1.BasicTypeList, err error) {\n\tresult = &v1.BasicTypeList{}\n\terr = c.client.Get().\n\t\tNamespace(c.ns).\n\t\tResource(\"basictypes\").\n\t\tVersionedParams(&opts, scheme.ParameterCodec).\n\t\tDo().\n\t\tInto(result)\n\treturn\n}", "title": "" }, { "docid": "f7f30b2fc463d39135534b5fa66468f5", "score": "0.5194242", "text": "func (p *project) List(ctx context.Context) ([]plugin.Entry, error) {\n\tcomp, err := newComputeDir(ctx, p.client, p.id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tstor, err := newStorageDir(ctx, p.client, p.id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn []plugin.Entry{comp, stor}, nil\n}", "title": "" }, { "docid": "dac1a16955a33269cb006851cbde4f2a", "score": "0.519301", "text": "func (fts *FakeThingService) List(token string) ([]*entities.Thing, error) {\n\tret := fts.Called(token)\n\treturn ret.Get(0).([]*entities.Thing), ret.Error(1)\n}", "title": "" }, { "docid": "436264badb32efdd8b53cadbcea39616", "score": "0.51795274", "text": "func (r *dpRepo) listStatusClasses(currentView *model.ItemConfig) (model.ItemList, error) {\n\tlogging.LogDebugf(\"repo/dp/listStatusClasses(%v)\", currentView)\n\n\tif currentView.DpAppliance == \"\" {\n\t\treturn nil, errs.Error(\"Can't get status class list if DataPower appliance is not selected.\")\n\t}\n\n\tif currentView.DpDomain == \"\" {\n\t\treturn nil, errs.Error(\"Can't get status class list if DataPower domain is not selected.\")\n\t}\n\n\tclassNames := make([]string, 0)\n\tclassSizeMap := make(map[string]int)\n\t// Can be find out only for SOMA interface.\n\tclassModifiedMap := make(map[string]bool)\n\tvar err error\n\n\tswitch r.dataPowerAppliance.DpManagmentInterface() {\n\tcase config.DpInterfaceRest:\n\t\tresponseJSON, err := r.restGet(\"/mgmt/status/\")\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tdoc, err := jsonquery.Parse(strings.NewReader(responseJSON))\n\t\tif err != nil {\n\t\t\tlogging.LogDebug(\"Error parsing JSON.\", err)\n\t\t\treturn nil, err\n\t\t}\n\t\tquery := \"/_links/*\"\n\t\tresultNodes := jsonquery.Find(doc, query)\n\t\tif resultNodes == nil {\n\t\t\tlogging.LogDebugf(\"Can't find '%s' in JSON:\\n'%s'\", query, responseJSON)\n\t\t\treturn nil, errs.Errorf(\"Unexpected JSON, can't find '%s'.\", query)\n\t\t}\n\t\tfor _, node := range resultNodes {\n\t\t\tclassName := node.Data\n\t\t\tif className != \"self\" {\n\t\t\t\tclassNames = append(classNames, className)\n\t\t\t}\n\t\t}\n\tcase config.DpInterfaceSoma:\n\t\tsomaRequest := fmt.Sprintf(`<soapenv:Envelope xmlns:soapenv=\"http://schemas.xmlsoap.org/soap/envelope/\"\n xmlns:man=\"http://www.datapower.com/schemas/management\">\n\t<soapenv:Header/>\n\t<soapenv:Body>\n\t <man:request domain=\"%s\">\n\t <man:get-status/>\n\t </man:request>\n\t</soapenv:Body>\n</soapenv:Envelope>`, currentView.DpDomain)\n\t\tvar somaResponse string\n\t\tsomaResponse, err = r.soma(somaRequest)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tdoc, err := xmlquery.Parse(strings.NewReader(somaResponse))\n\t\tif err != nil {\n\t\t\tlogging.LogDebug(\"Error parsing response SOAP.\", err)\n\t\t\treturn nil, err\n\t\t}\n\t\tquery := \"//*[local-name()='response']/*[local-name()='status']/*\"\n\t\tresultNodes := xmlquery.Find(doc, query)\n\t\tif resultNodes == nil {\n\t\t\tlogging.LogDebugf(\"Can't find '%s' in SOMA response:\\n'%s'\", query, somaResponse)\n\t\t\treturn nil, errs.Errorf(\"Unexpected SOMA, can't find '%s'.\", query)\n\t\t}\n\n\t\tfor idx, node := range resultNodes {\n\t\t\tclassName := node.Data\n\t\t\tif className == \"self\" {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tstatus := parseStatusFromXML(className, idx, node)\n\n\t\t\tif _, existingName := classSizeMap[className]; !existingName {\n\t\t\t\tclassNames = append(classNames, className)\n\t\t\t}\n\t\t\tclassSizeMap[className]++\n\n\t\t\tif status.modified != \"\" {\n\t\t\t\tclassModifiedMap[className] = true\n\t\t\t}\n\t\t}\n\n\tdefault:\n\t\tr.DpViewMode = model.DpFilestoreMode\n\t\tlogging.LogDebug(\"repo/dp/listStatusClasses(), using neither REST neither SOMA.\")\n\t\treturn nil, errs.Error(\"DataPower management interface not set.\")\n\t}\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlogging.LogDebugf(\"repo/dp/listStatusClasses(), classNames: %v\", classNames)\n\n\titems := make(model.ItemList, len(classNames))\n\tfor idx, className := range classNames {\n\t\titemConfig := model.ItemConfig{Type: model.ItemDpStatusClass,\n\t\t\tName: className,\n\t\t\tDpAppliance: currentView.DpAppliance,\n\t\t\tDpDomain: currentView.DpDomain,\n\t\t\tPath: className,\n\t\t\tParent: currentView}\n\t\tstatusCnt := \"\"\n\t\tif r.dataPowerAppliance.DpManagmentInterface() == config.DpInterfaceSoma {\n\t\t\tstatusCnt = fmt.Sprintf(\"%d\", classSizeMap[className])\n\t\t}\n\t\tmodified := \"\"\n\t\tif classModifiedMap[className] {\n\t\t\tmodified = \"*\"\n\t\t}\n\t\titem := model.Item{Name: className,\n\t\t\tSize: statusCnt,\n\t\t\tModified: modified,\n\t\t\tConfig: &itemConfig}\n\t\titems[idx] = item\n\t}\n\n\tsort.Sort(items)\n\n\tlogging.LogDebugf(\"repo/dp/listStatusClasses(), items: %v\", items)\n\treturn items, nil\n}", "title": "" }, { "docid": "12e21b2ff89d39a13babce2793d488de", "score": "0.5177958", "text": "func (a NetApi) GetRateShapingTmClassList() (*NetRateShapingTmClassList, error) {\n\n\tvar httpMethod = \"Get\"\n\t// create path and map variables\n\tpath := a.configuration.BasePath + \"/tm/net/rateShaping/tmClass\"\n\n\theaderParams := make(map[string]string)\n\tqueryParams := url.Values{}\n\tformParams := make(map[string]string)\n\tvar postBody interface{}\n\tvar fileName string\n\tvar fileBytes []byte\n\t// authentication '(token)' required\n\t// set key with prefix in header\n\theaderParams[\"X-F5-Auth-Token\"] = a.configuration.getAPIKeyWithPrefix(\"X-F5-Auth-Token\")\n\t// add default headers if any\n\tfor key := range a.configuration.DefaultHeader {\n\t\theaderParams[key] = a.configuration.DefaultHeader[key]\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{\n\t\t\"application/json\",\n\t}\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := a.configuration.restClient.selectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\theaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\n\t\t\"aplication/json\",\n\t}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := a.configuration.restClient.SelectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\theaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\thttpResponse, err := a.configuration.restClient.callAPI(path, httpMethod, postBody, headerParams, queryParams, formParams, fileName, fileBytes)\n\tvar successPayload = new(NetRateShapingTmClassList)\n\tif err == nil && httpResponse.StatusCode() == 200 {\n\t\terr = json.Unmarshal(httpResponse.Body(), &successPayload)\n\t}\n\terr = NewAPIResponse(httpResponse, err)\n\tif err != nil {\n\t\treturn nil, err\n\t} else {\n\t\treturn successPayload, err\n\t}\n\n}", "title": "" }, { "docid": "094f72f6e22dce608c4dce2e3f2e50f6", "score": "0.5175397", "text": "func (c *cache) List() []interface{} {\n\tc.lock.RLock()\n\tdefer c.lock.RUnlock()\n\tlist := make([]interface{}, 0, len(c.items))\n\tfor _, item := range c.items {\n\t\tlist = append(list, item)\n\t}\n\treturn list\n}", "title": "" }, { "docid": "1d13459e66d583959911f6f4f5ecce5e", "score": "0.5171985", "text": "func (s *Rest) actgClassListCtrl(w http.ResponseWriter, r *http.Request) {\n\tif err := r.ParseForm(); err != nil {\n\t\tlog.Println(\"[ERROR] Can't parse request data\")\n\t\treturn\n\t}\n\tvar data JSON\n\terr := json.Unmarshal([]byte(r.FormValue(\"data\")), &data)\n\tif err != nil {\n\t\tlog.Println(\"[ERROR] Can't parse request data\")\n\t\treturn\n\t}\n\tcampaignName := data[\"filters\"].([]interface{})[0].(map[string]interface{})[\"value\"]\n\tclassList := make([]JSON, 0)\n\tclassList = append(classList, JSON{\n\t\t\"updatedTime\": \"2019-01-30T08:05:20.000+0000\",\n\t\t\"parentActgClassId\": fmt.Sprintf(\"cls%s\", RandStringBytes(17)),\n\t\t\"name\": campaignName,\n\t\t\"mergedIntoId\": \"00000000000000000000\",\n\t\t\"entity\": \"ActgClass\",\n\t\t\"createdTime\": \"2019-01-30T08:05:20.000+0000\",\n\t\t\"shortName\": \"\",\n\t\t\"id\": fmt.Sprintf(\"cls%s\", RandStringBytes(17)),\n\t\t\"isActive\": \"1\",\n\t\t\"description\": \"\",\n\t})\n\tactgClassResponse := JSON{\n\t\t\"response_status\": 0,\n\t\t\"response_message\": \"Success\",\n\t\t\"response_data\": classList,\n\t}\n\trender.JSON(w, r, actgClassResponse)\n}", "title": "" }, { "docid": "f58a28d5358177150eed110bb94b7193", "score": "0.51688385", "text": "func (s *DataStore) GetAllLonghornStorageClassList() (runtime.Object, error) {\n\tscList, err := s.kubeClient.StorageV1().StorageClasses().List(context.TODO(), metav1.ListOptions{})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlonghornStorageClasses := []storagev1.StorageClass{}\n\tfor _, sc := range scList.Items {\n\t\tif sc.Provisioner != types.LonghornDriverName {\n\t\t\tcontinue\n\t\t}\n\t\tlonghornStorageClasses = append(longhornStorageClasses, sc)\n\t}\n\n\tscList.Items = longhornStorageClasses\n\treturn scList, nil\n}", "title": "" }, { "docid": "402222476e6a2b184598714e90dfde0a", "score": "0.51634866", "text": "func List(things ...interface{}) *GCons {\n\treturn makeList(false, things)\n}", "title": "" }, { "docid": "e787ffce5b318e191ab70250f72ca41a", "score": "0.51630974", "text": "func (service *Service) List() []models.PersistedMixMetric {\n\treturn service.db.List()\n}", "title": "" }, { "docid": "507bc309a42d3cfd166d82865111baa3", "score": "0.5141539", "text": "func (l *ProcessList) List() []*Process {\n\t// get a list of all proc dirs\n\tprocDirs, err := l.GetProcDirs()\n\n\t// initialize an array to hold the proccess objects\n\tplist := []*Process{}\n\n\t// error checking\n\tif err != nil {\n\t\treturn plist\n\t}\n\n\t// loop over the proc dirs to initialize a process object for each\n\tfor _, dir := range procDirs {\n\t\tif process := NewProcess(l.fs, dir); process != (&Process{}) && filepath.Base(os.Args[0]) != process.Comm {\n\t\t\tplist = append(plist, process)\n\t\t}\n\t}\n\n\treturn plist\n}", "title": "" }, { "docid": "926fb44fbf0e11f2c4afe996bff421a9", "score": "0.51359075", "text": "func ShowAll(context context.Context) ([]map[string]interface{}, error) {\n\tvar instances []map[string]interface{}\n\n\thome, err := fsutils.Dir()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\terr = filepath.Walk(home, func(path string, info os.FileInfo, err error) error {\n\t\tif info.IsDir() {\n\t\t\tid := filepath.Base(path)\n\n\t\t\tif id == \".\" {\n\t\t\t\treturn nil\n\t\t\t}\n\n\t\t\taddr, err := fsutils.RpcAddress(id)\n\t\t\tif err != nil {\n\t\t\t\tlog.WithFields(log.Fields{\n\t\t\t\t\t\"rpc\": \"enabled\",\n\t\t\t\t\t\"id\": id,\n\t\t\t\t}).WithError(err).Debugf(\"rpc failed\")\n\n\t\t\t\treturn nil\n\t\t\t}\n\n\t\t\tresp, err := Call(context, addr, \"show-instance\", nil)\n\t\t\tif err != nil {\n\t\t\t\tlog.WithFields(log.Fields{\n\t\t\t\t\t\"rpc\": \"enabled\",\n\t\t\t\t\t\"id\": id,\n\t\t\t\t}).WithError(err).Debugf(\"rpc failed\")\n\n\t\t\t\treturn nil\n\t\t\t}\n\n\t\t\tinstances = append(instances, resp)\n\t\t}\n\n\t\treturn nil\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn instances, nil\n}", "title": "" }, { "docid": "4e285b5778eb9e4eb6defc934f574c54", "score": "0.5131384", "text": "func List() []StarterItem {\n\tm.Lock()\n\tdefer m.Unlock()\n\n\treturn starters\n}", "title": "" }, { "docid": "a13fa324f8420d058e323a34b5333678", "score": "0.51302975", "text": "func (p *Provider) List() (ret vm.List, _ error) {\n\tif sc, ok := install.Clusters[ProviderName]; ok {\n\t\tnow := timeutil.Now()\n\t\tfor range sc.VMs {\n\t\t\tret = append(ret, vm.VM{\n\t\t\t\tName: \"localhost\",\n\t\t\t\tCreatedAt: now,\n\t\t\t\tLifetime: time.Hour,\n\t\t\t\tPrivateIP: \"127.0.0.1\",\n\t\t\t\tProvider: ProviderName,\n\t\t\t\tProviderID: ProviderName,\n\t\t\t\tPublicIP: \"127.0.0.1\",\n\t\t\t\tRemoteUser: config.OSUser.Username,\n\t\t\t\tVPC: ProviderName,\n\t\t\t\tMachineType: ProviderName,\n\t\t\t\tZone: ProviderName,\n\t\t\t})\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "6650dbd2b9920f201caa257e1dd1c697", "score": "0.51199675", "text": "func (c *KubeCache) List() []interface{} {\n\treturn c.cache.List()\n}", "title": "" }, { "docid": "373d04ca26179783e3fe286c4fa955cf", "score": "0.5113421", "text": "func (s *BucketsService) List() ([]*api.Bucket, error) {\n\tbuckets := make([]*api.Bucket, 0)\n\n\titems, err := s.GetModels()\n\tif err != nil {\n\t\treturn buckets, err\n\t}\n\n\tfor _, item := range items {\n\t\tbucket := item.ConvertModelToEntity()\n\t\tbuckets = append(buckets, bucket)\n\t}\n\n\treturn buckets, nil\n}", "title": "" }, { "docid": "af554a38018d18d4ccf71bf7142be11c", "score": "0.5101996", "text": "func (s *ObjStore) List() []interface{} {\n\ts.mu.RLock()\n\tdefer s.mu.RUnlock()\n\n\tresult := make([]interface{}, 0, len(s.objs))\n\tfor _, v := range s.objs {\n\t\tresult = append(result, v)\n\t}\n\treturn result\n}", "title": "" }, { "docid": "8239e0e948c1c6a38e6e5dcc2d4257fc", "score": "0.5101437", "text": "func listMethods(T *types.Named) []*types.Selection {\n\t// method set for T\n\tmset := types.NewMethodSet(T)\n\tvar res []*types.Selection\n\tfor i, n := 0, mset.Len(); i < n; i++ {\n\t\tres = append(res, mset.At(i))\n\t}\n\n\t// add all *T methods with names different from T methods\n\tpmset := types.NewMethodSet(types.NewPointer(T))\n\tfor i, n := 0, pmset.Len(); i < n; i++ {\n\t\tpm := pmset.At(i)\n\t\tif obj := pm.Obj(); mset.Lookup(obj.Pkg(), obj.Name()) == nil {\n\t\t\tres = append(res, pm)\n\t\t}\n\t}\n\n\treturn res\n}", "title": "" }, { "docid": "0bc36105a85c732b5b7fbd8cca8bcc79", "score": "0.50855833", "text": "func List(basedir string, deep bool, format string) {\n\tbasedir, err := filepath.Abs(basedir)\n\tif err != nil {\n\t\tmsg.Die(\"Could not read directory: %s\", err)\n\t}\n\n\tr, err := dependency.NewResolver(basedir)\n\tif err != nil {\n\t\tmsg.Die(\"Could not create a resolver: %s\", err)\n\t}\n\th := &dependency.DefaultMissingPackageHandler{Missing: []string{}, Gopath: []string{}, Prefix: \"vendor\"}\n\tr.Handler = h\n\n\tlocalPkgs, _, err := r.ResolveLocal(deep)\n\tif err != nil {\n\t\tmsg.Die(\"Error listing dependencies: %s\", err)\n\t}\n\tsort.Strings(localPkgs)\n\tinstalled := make([]string, len(localPkgs))\n\tfor i, pkg := range localPkgs {\n\t\trelPkg, err := filepath.Rel(basedir, pkg)\n\t\tif err != nil {\n\t\t\t// msg.Warn(\"Failed to Rel path: %s\", err)\n\t\t\trelPkg = pkg\n\t\t}\n\t\tinstalled[i] = relPkg\n\t}\n\tl := PackageList{\n\t\tInstalled: installed,\n\t\tMissing: h.Missing,\n\t\tGopath: h.Gopath,\n\t}\n\n\toutputList(l, format)\n}", "title": "" }, { "docid": "5b4e46faaa644060578c3201e6becba7", "score": "0.5084925", "text": "func (s *service) List(ctx context.Context, tenant string) ([]model.LabelDefinition, error) {\n\tdefs, err := s.repo.List(ctx, tenant)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"while fetching Label Definitions\")\n\t}\n\treturn defs, nil\n}", "title": "" }, { "docid": "25773eb705384691cdd3f3c4bc692461", "score": "0.50751305", "text": "func List() []*types.Language {\n\treturn internal.List()\n}", "title": "" }, { "docid": "9dd323bfa78b539c91a7dc1f33fcff41", "score": "0.50742024", "text": "func (c *Client) All() ([]Instance, error) {\n\treturn c.Find().Done()\n}", "title": "" }, { "docid": "896d4ca362471b609358953396a50199", "score": "0.50714314", "text": "func (om *OutcomeMeasure) QueryOutcomeClassList() *OutcomeClassQuery {\n\treturn (&OutcomeMeasureClient{config: om.config}).QueryOutcomeClassList(om)\n}", "title": "" }, { "docid": "36225293b4a733a4b6cd26fdbb2e5cc0", "score": "0.5071195", "text": "func (repo *postgresRepository) List() ([]*ContentType, error) {\n\trows, err := repo.db.Query(allContentType)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdefer rows.Close()\n\tentries := make([]*ContentType, 0)\n\n\tfor rows.Next() {\n\t\tentry := &ContentType{}\n\t\terr := rows.Scan(\n\t\t\t&entry.ID,\n\t\t\t&entry.Name,\n\t\t\t&entry.CreatedOn,\n\t\t\t&entry.UpdatedOn,\n\t\t)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tentries = append(entries, entry)\n\t}\n\n\tif err = rows.Err(); err != nil {\n\t\treturn nil, err\n\t}\n\n\tfor _, entry := range entries {\n\t\tfields, err := repo.getFields(entry.ID)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tentry.Fields = fields\n\t}\n\n\treturn entries, nil\n}", "title": "" }, { "docid": "c94b8d0e4c4c9aec7cbe0154834854af", "score": "0.5069804", "text": "func (c *client) List(params *trakt.ListByTypeParams) *trakt.LanguageIterator {\n\tpath := trakt.FormatURLPath(\"/languages/%s\", params.Type)\n\treturn &trakt.LanguageIterator{\n\t\tBasicIterator: c.b.NewSimulatedIteratorWithCondition(http.MethodGet, path, params, func() error {\n\t\t\tswitch params.Type {\n\t\t\tcase trakt.TypeMovie, trakt.TypeShow:\n\t\t\t\treturn nil\n\t\t\t}\n\n\t\t\treturn &trakt.Error{\n\t\t\t\tHTTPStatusCode: http.StatusUnprocessableEntity,\n\t\t\t\tBody: \"invalid type: only movie / show are applicable\",\n\t\t\t\tResource: path,\n\t\t\t\tCode: trakt.ErrorCodeValidationError,\n\t\t\t}\n\t\t}),\n\t}\n}", "title": "" }, { "docid": "332d4342ac91617429233ae44cd95433", "score": "0.5069067", "text": "func (r *StandardREST) List(_ context.Context, _ *metainternalversion.ListOptions) (runtime.Object, error) {\n\treturn r.NewList(), nil\n}", "title": "" }, { "docid": "65d2498c27140b5b26ab89194e84184d", "score": "0.5063328", "text": "func (mock *RepositoryMock) List(recipeType model.RecipeType) ([]model.Recipe, error) {\n\n\trecipes := []model.Recipe{}\n\tfor _, recipe := range mock.Recipes {\n\t\tif recipe.Type == recipeType {\n\t\t\trecipes = append(recipes, recipe)\n\t\t}\n\t}\n\tvar err error\n\tif len(recipes) == 0 {\n\t\terr = errors.New(\"Not found\")\n\t}\n\treturn recipes, err\n}", "title": "" }, { "docid": "bafab24b0f216360a1376b894abf619e", "score": "0.5055068", "text": "func (me TClassListType) Values() (list []xsdt.String) {\r\n\tsvals := xsdt.ListValues(string(me))\r\n\tlist = make([]xsdt.String, len(svals))\r\n\tfor i, s := range svals {\r\n\t\tlist[i].Set(s)\r\n\t}\r\n\treturn\r\n}", "title": "" }, { "docid": "97235ade70ac69e37a627d8017236778", "score": "0.5051911", "text": "func (s *GLAccountClassificationMappingsEndpoint) List(ctx context.Context, division int, all bool, o *api.ListOptions) ([]*GLAccountClassificationMappings, error) {\n\tvar entities []*GLAccountClassificationMappings\n\tu, _ := s.client.ResolvePathWithDivision(\"/api/v1/beta/{division}/financial/GLAccountClassificationMappings\", division) // #nosec\n\tapi.AddListOptionsToURL(u, o)\n\n\tif all {\n\t\terr := s.client.ListRequestAndDoAll(ctx, u.String(), &entities)\n\t\treturn entities, err\n\t}\n\t_, _, err := s.client.NewRequestAndDo(ctx, \"GET\", u.String(), nil, &entities)\n\treturn entities, err\n}", "title": "" }, { "docid": "8e70b984742c89cda42b76b177a54840", "score": "0.5047046", "text": "func (instance *Instance) List() []int {\n\tversions := make([]int, 0)\n\tfor i := 1; i <= len(instance.migrations); i++ {\n\t\tversions = append(versions, i)\n\t}\n\treturn versions\n}", "title": "" }, { "docid": "243a109692f9937725b3efdf393e45ac", "score": "0.50289774", "text": "func (h *Classes) Index(ctx context.Context, w http.ResponseWriter, r *http.Request, params map[string]string) error {\n\n\tfields := []datatable.DisplayField{\n\t\t{Field: \"id\", Title: \"ID\", Visible: false, Searchable: true, Orderable: true, Filterable: false},\n\t\t{Field: \"name\", Title: \"Class\", Visible: true, Searchable: true, Orderable: true, Filterable: true, FilterPlaceholder: \"filter Name\"},\n\t}\n\n\tmapFunc := func(q *class.Class, cols []datatable.DisplayField) (resp []datatable.ColumnValue, err error) {\n\t\tfor i := 0; i < len(cols); i++ {\n\t\t\tcol := cols[i]\n\t\t\tvar v datatable.ColumnValue\n\t\t\tswitch col.Field {\n\t\t\tcase \"id\":\n\t\t\t\tv.Value = fmt.Sprintf(\"%s\", q.ID)\n\t\t\tcase \"name\":\n\t\t\t\tv.Value = q.Name\n\t\t\t\tv.Formatted = fmt.Sprintf(\"<a href='%s'>%s</a>\", urlClassesView(q.ID), v.Value)\n\t\t\tdefault:\n\t\t\t\treturn resp, errors.Errorf(\"Failed to map value for %s.\", col.Field)\n\t\t\t}\n\t\t\tresp = append(resp, v)\n\t\t}\n\n\t\treturn resp, nil\n\t}\n\n\tloadFunc := func(ctx context.Context, sorting string, fields []datatable.DisplayField) (resp [][]datatable.ColumnValue, err error) {\n\t\tres, err := h.Repo.Find(ctx, class.FindRequest{\n\t\t\tOrder: strings.Split(sorting, \",\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn resp, err\n\t\t}\n\n\t\tfor _, a := range res {\n\t\t\tl, err := mapFunc(a, fields)\n\t\t\tif err != nil {\n\t\t\t\treturn resp, errors.Wrapf(err, \"Failed to map class for display.\")\n\t\t\t}\n\n\t\t\tresp = append(resp, l)\n\t\t}\n\n\t\treturn resp, nil\n\t}\n\n\tdt, err := datatable.New(ctx, w, r, h.Redis, fields, loadFunc)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif dt.HasCache() {\n\t\treturn nil\n\t}\n\n\tif ok, err := dt.Render(); ok {\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t}\n\n\tdata := map[string]interface{}{\n\t\t\"datatable\": dt.Response(),\n\t\t\"urlClassesCreate\": urlClassesCreate(),\n\t\t\"urlClassesIndex\": urlClassesIndex(),\n\t}\n\n\treturn h.Renderer.Render(ctx, w, r, TmplLayoutBase, \"admin-classes-index.gohtml\", web.MIMETextHTMLCharsetUTF8, http.StatusOK, data)\n}", "title": "" }, { "docid": "530fd7068e63205432f92464e7a0b647", "score": "0.50255823", "text": "func AsList() []string {\n\tr := []string{}\n\tfor u := range providers {\n\t\tr = append(r, u)\n\t}\n\treturn r\n}", "title": "" }, { "docid": "637db94138bdc4687bd87585390ad5ce", "score": "0.5024968", "text": "func (set Set) List() []*packages.Package {\n\tdst := make([]*packages.Package, 0, len(set))\n\tfor _, p := range set {\n\t\tdst = append(dst, p)\n\t}\n\treturn dst\n}", "title": "" }, { "docid": "a001c9bc96276a23e26ded07257fa797", "score": "0.5023258", "text": "func (q subclassQuery) All(ctx context.Context, exec boil.ContextExecutor) (SubclassSlice, error) {\n\tvar o []*Subclass\n\n\terr := q.Bind(ctx, exec, &o)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"models: failed to assign all query results to Subclass slice\")\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "f8b24f0d80a2b1880c6c1d0a3e4e6f63", "score": "0.502213", "text": "func (api *userAPI) List(ctx context.Context, opts *api.ListWatchOptions) ([]*User, error) {\n\tvar objlist []*User\n\tobjs, err := api.ct.List(\"User\", ctx, opts)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfor _, obj := range objs {\n\t\tswitch tp := obj.(type) {\n\t\tcase *User:\n\t\t\teobj := obj.(*User)\n\t\t\tobjlist = append(objlist, eobj)\n\t\tdefault:\n\t\t\tlog.Fatalf(\"Got invalid object type %v while looking for User\", tp)\n\t\t}\n\t}\n\n\treturn objlist, nil\n}", "title": "" }, { "docid": "123e730388a103e80c6b4e2206a696d5", "score": "0.50191003", "text": "func (o IngressClassListTypeOutput) Items() IngressClassTypeArrayOutput {\n\treturn o.ApplyT(func(v IngressClassListType) []IngressClassType { return v.Items }).(IngressClassTypeArrayOutput)\n}", "title": "" } ]
7d665115703d227c2ad90c3a5dc421fa
ConfigureV1 use to configure the feature from a v1alpha1.DatadogAgent instance.
[ { "docid": "fc31a003b6ad0a27a582f4b6f20036b2", "score": "0.64220446", "text": "func (f *cwsFeature) ConfigureV1(dda *v1alpha1.DatadogAgent) (reqComp feature.RequiredComponents) {\n\tif dda.Spec.Agent.Security != nil && *dda.Spec.Agent.Security.Runtime.Enabled {\n\t\truntime := dda.Spec.Agent.Security.Runtime\n\n\t\tif runtime.SyscallMonitor != nil && apiutils.BoolValue(runtime.SyscallMonitor.Enabled) {\n\t\t\tf.syscallMonitorEnabled = true\n\t\t}\n\n\t\tif runtime.PoliciesDir != nil && runtime.PoliciesDir.ConfigMapName != \"\" {\n\t\t\tf.configMapName = runtime.PoliciesDir.ConfigMapName\n\t\t\tf.customConfig = v1alpha1.ConvertConfigDirSpecToCustomConfig(runtime.PoliciesDir)\n\t\t}\n\n\t\treqComp = feature.RequiredComponents{\n\t\t\tAgent: feature.RequiredComponent{\n\t\t\t\tIsRequired: apiutils.NewBoolPointer(true),\n\t\t\t\tContainers: []apicommonv1.AgentContainerName{\n\t\t\t\t\tapicommonv1.SecurityAgentContainerName,\n\t\t\t\t\tapicommonv1.SystemProbeContainerName,\n\t\t\t\t},\n\t\t\t},\n\t\t}\n\t}\n\n\treturn reqComp\n}", "title": "" } ]
[ { "docid": "0629f35640566bf0de5a9476216a10af", "score": "0.72242415", "text": "func (f *externalMetricsFeature) ConfigureV1(dda *v1alpha1.DatadogAgent) (reqComp feature.RequiredComponents) {\n\t// f.owner = dda\n\t// if dda.Spec.ClusterAgent.Config != nil && dda.Spec.ClusterAgent.Config.ExternalMetrics != nil {\n\t// \tem := dda.Spec.ClusterAgent.Config.ExternalMetrics\n\n\t// \tif em != nil && apiutils.BoolValue(em.Enabled) {\n\t// \t\tf.useWPA = em.WpaController\n\t// \t\tf.useDDM = em.UseDatadogMetrics\n\t// \t\tf.port = *em.Port\n\t// \t\tif em.Endpoint != nil {\n\t// \t\t\tf.url = *em.Endpoint\n\t// \t\t}\n\t// \t\tif em.Credentials != nil {\n\t// \t\t\tif em.Credentials != nil {\n\t// \t\t\t\tf.keySecret = make(map[string]secret)\n\t// \t\t\t\tif !v1alpha1.CheckAPIKeySufficiency(em.Credentials, apicommon.DDExternalMetricsProviderAPIKey) ||\n\t// \t\t\t\t!v1alpha1.CheckAppKeySufficiency(em.Credentials, apicommon.DDExternalMetricsProviderAppKey) {\n\t// \t\t\t\t\t// neither secrets nor the external metrics api/app key env vars are defined,\n\t// \t\t\t\t\t// so store key data to create secret later\n\t// \t\t\t\t\tfor keyType, keyData := range v1alpha1.GetKeysFromCredentials(em.Credentials) {\n\t// \t\t\t\t\t\tf.keySecret[keyType] = secret{\n\t// \t\t\t\t\t\t\tdata: keyData,\n\t// \t\t\t\t\t\t}\n\t// \t\t\t\t\t}\n\t// \t\t\t\t}\n\t// \t\t\t\tif v1alpha1.CheckAPIKeySufficiency(em.Credentials, apicommon.DDExternalMetricsProviderAPIKey) {\n\t// \t\t\t\t\t// api key secret exists; store secret name and key instead\n\t// \t\t\t\t\tif isSet, secretName, secretKey := v1alpha1.GetAPIKeySecret(em.Credentials, componentdca.GetDefaultExternalMetricSecretName(f.owner)); isSet {\n\t// \t\t\t\t\t\tf.keySecret[apicommon.DefaultAPIKeyKey] = secret{\n\t// \t\t\t\t\t\t\tname: secretName,\n\t// \t\t\t\t\t\t\tkey: secretKey,\n\t// \t\t\t\t\t\t}\n\t// \t\t\t\t\t}\n\t// \t\t\t\t}\n\t// \t\t\t\tif v1alpha1.CheckAppKeySufficiency(em.Credentials, apicommon.DDExternalMetricsProviderAppKey) {\n\t// \t\t\t\t\t// app key secret exists; store secret name and key instead\n\t// \t\t\t\t\tif isSet, secretName, secretKey := v1alpha1.GetAppKeySecret(em.Credentials, componentdca.GetDefaultExternalMetricSecretName(f.owner)); isSet {\n\t// \t\t\t\t\t\tf.keySecret[apicommon.DefaultAPPKeyKey] = secret{\n\t// \t\t\t\t\t\t\tname: secretName,\n\t// \t\t\t\t\t\t\tkey: secretKey,\n\t// \t\t\t\t\t\t}\n\t// \t\t\t\t\t}\n\t// \t\t\t\t}\n\t// \t\t\t}\n\t// \t\t}\n\n\t// \t\tf.serviceAccountName = v1alpha1.GetClusterAgentServiceAccount(dda)\n\n\t// if enabled, flavor := v1alpha1.IsAgentNetworkPolicyEnabled(dda); enabled {\n\t// \tif flavor == v1alpha1.NetworkPolicyFlavorCilium {\n\t// \t\tf.createCiliumNetworkPolicy = true\n\t// \t} else {\n\t// \t\tf.createKubernetesNetworkPolicy = true\n\t// \t}\n\t// }\n\n\t// \t\treqComp = feature.RequiredComponents{\n\t// \t\t\tClusterAgent: feature.RequiredComponent{IsRequired: apiutils.NewBoolPointer(true)},\n\t// \t\t}\n\t// \t}\n\t// }\n\n\t// return reqComp\n\n\t// do not apply this feature on v1alpha1\n\t// it breaks the unittests in `controller_test.go` because the `store` modifies\n\t// the dependency resources with additional labels which make the comparison fail\n\n\treturn feature.RequiredComponents{}\n}", "title": "" }, { "docid": "e05ebcbf392df083aa78743680e212c7", "score": "0.66883653", "text": "func (f *logCollectionFeature) ConfigureV1(dda *v1alpha1.DatadogAgent) (reqComp feature.RequiredComponents) {\n\tlogCollection := dda.Spec.Features.LogCollection\n\n\tif apiutils.BoolValue(logCollection.Enabled) {\n\t\tif apiutils.BoolValue(logCollection.LogsConfigContainerCollectAll) {\n\t\t\tf.containerCollectAll = true\n\t\t}\n\t\tif apiutils.BoolValue(logCollection.ContainerCollectUsingFiles) {\n\t\t\tf.containerCollectUsingFiles = true\n\t\t}\n\t\tf.containerLogsPath = *logCollection.ContainerLogsPath\n\t\tf.podLogsPath = *logCollection.PodLogsPath\n\t\tf.containerSymlinksPath = *logCollection.ContainerSymlinksPath\n\t\tf.tempStoragePath = *logCollection.TempStoragePath\n\t\tif logCollection.OpenFilesLimit != nil {\n\t\t\tf.openFilesLimit = *logCollection.OpenFilesLimit\n\t\t}\n\n\t\treqComp = feature.RequiredComponents{\n\t\t\tAgent: feature.RequiredComponent{\n\t\t\t\tIsRequired: apiutils.NewBoolPointer(true),\n\t\t\t\tContainers: []apicommonv1.AgentContainerName{\n\t\t\t\t\tapicommonv1.CoreAgentContainerName,\n\t\t\t\t},\n\t\t\t},\n\t\t}\n\t}\n\treturn reqComp\n}", "title": "" }, { "docid": "97f602c32efc3d1f47fa9531e45e69e7", "score": "0.6633001", "text": "func (f *ksmFeature) ConfigureV1(dda *v1alpha1.DatadogAgent) feature.RequiredComponents {\n\tf.owner = dda\n\tvar output feature.RequiredComponents\n\n\tif dda.Spec.Features.KubeStateMetricsCore != nil && apiutils.BoolValue(dda.Spec.Features.KubeStateMetricsCore.Enabled) {\n\t\toutput.ClusterAgent.IsRequired = apiutils.NewBoolPointer(true)\n\n\t\tif dda.Spec.ClusterAgent.Config != nil && apiutils.BoolValue(dda.Spec.ClusterAgent.Config.ClusterChecksEnabled) && apiutils.BoolValue(dda.Spec.Features.KubeStateMetricsCore.ClusterCheck) {\n\t\t\tif apiutils.BoolValue(dda.Spec.ClusterChecksRunner.Enabled) {\n\t\t\t\tf.runInClusterChecksRunner = true\n\t\t\t\toutput.ClusterChecksRunner.IsRequired = apiutils.NewBoolPointer(true)\n\n\t\t\t\tf.rbacSuffix = common.ChecksRunnerSuffix\n\t\t\t\tf.serviceAccountName = v1alpha1.GetClusterChecksRunnerServiceAccount(dda)\n\t\t\t}\n\t\t} else {\n\t\t\tf.serviceAccountName = v1alpha1.GetClusterAgentServiceAccount(dda)\n\t\t}\n\n\t\tif dda.Spec.Features.KubeStateMetricsCore.Conf != nil {\n\t\t\tf.customConfig = v1alpha1.ConvertCustomConfig(dda.Spec.Features.KubeStateMetricsCore.Conf)\n\t\t}\n\n\t\tf.configConfigMapName = apicommonv1.GetConfName(dda, f.customConfig, apicommon.DefaultKubeStateMetricsCoreConf)\n\t}\n\n\treturn output\n}", "title": "" }, { "docid": "e4613f2b7fc8553e68a8f57ec7a40965", "score": "0.57136273", "text": "func NewDatadogAgentWithOverrides(namespace string, name string) v2alpha1.DatadogAgent {\n\tagent := newDatadogAgentWithFeatures(namespace, name, nil)\n\n\t// This config is invalid (non-existing images, etc.), but it's good enough\n\t// to verify that the operator does not crash when parsing it.\n\n\tagent.Spec.Override = make(map[v2alpha1.ComponentName]*v2alpha1.DatadogAgentComponentOverride)\n\n\tagent.Spec.Override[v2alpha1.NodeAgentComponentName] = &v2alpha1.DatadogAgentComponentOverride{\n\t\tName: nil, // Don't override because these tests assume that it's always the default\n\t\tReplicas: nil, // Does not apply for the node agent\n\t\tCreateRbac: apiutils.NewBoolPointer(true),\n\t\tServiceAccountName: apiutils.NewStringPointer(\"an-overridden-sa\"),\n\t\tImage: &common.AgentImageConfig{\n\t\t\tName: \"an-overridden-image-name\",\n\t\t\tTag: \"7\",\n\t\t\tJMXEnabled: true,\n\t\t},\n\t\tEnv: []v1.EnvVar{\n\t\t\t{\n\t\t\t\tName: \"some-env\",\n\t\t\t\tValue: \"some-val\",\n\t\t\t},\n\t\t},\n\t\tCustomConfigurations: nil, // This option requires creating a configmap. Set to nil here to simplify the test\n\t\tExtraConfd: nil, // Also requires creating a configmap\n\t\tExtraChecksd: nil, // Also requires creating a configmap\n\t\tContainers: map[common.AgentContainerName]*v2alpha1.DatadogAgentGenericContainer{\n\t\t\tcommon.CoreAgentContainerName: {\n\t\t\t\tName: apiutils.NewStringPointer(\"my-container-name\"),\n\t\t\t\tLogLevel: apiutils.NewStringPointer(\"debug\"),\n\t\t\t\tEnv: []v1.EnvVar{\n\t\t\t\t\t{\n\t\t\t\t\t\tName: apicommon.DDLogLevel,\n\t\t\t\t\t\tValue: \"debug\",\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tVolumeMounts: nil, // This option requires creating a configmap. Set to nil here to simplify the test\n\t\t\t\tResources: &v1.ResourceRequirements{\n\t\t\t\t\tLimits: map[v1.ResourceName]resource.Quantity{\n\t\t\t\t\t\tv1.ResourceCPU: *resource.NewQuantity(2, resource.DecimalSI),\n\t\t\t\t\t},\n\t\t\t\t\tRequests: map[v1.ResourceName]resource.Quantity{\n\t\t\t\t\t\tv1.ResourceCPU: *resource.NewQuantity(1, resource.DecimalSI),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tCommand: []string{\"test-agent\", \"start\"},\n\t\t\t\tArgs: []string{\"arg1\", \"val1\"},\n\t\t\t\tHealthPort: apiutils.NewInt32Pointer(1234),\n\t\t\t\tReadinessProbe: &v1.Probe{\n\t\t\t\t\tProbeHandler: v1.ProbeHandler{\n\t\t\t\t\t\tHTTPGet: &v1.HTTPGetAction{\n\t\t\t\t\t\t\tPath: apicommon.DefaultLivenessProbeHTTPPath,\n\t\t\t\t\t\t\tPort: intstr.IntOrString{\n\t\t\t\t\t\t\t\tIntVal: apicommon.DefaultAgentHealthPort,\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tInitialDelaySeconds: 10,\n\t\t\t\t\tTimeoutSeconds: 5,\n\t\t\t\t\tPeriodSeconds: 30,\n\t\t\t\t\tSuccessThreshold: 1,\n\t\t\t\t\tFailureThreshold: 5,\n\t\t\t\t},\n\t\t\t\tLivenessProbe: &v1.Probe{\n\t\t\t\t\tProbeHandler: v1.ProbeHandler{\n\t\t\t\t\t\tHTTPGet: &v1.HTTPGetAction{\n\t\t\t\t\t\t\tPath: apicommon.DefaultLivenessProbeHTTPPath,\n\t\t\t\t\t\t\tPort: intstr.IntOrString{\n\t\t\t\t\t\t\t\tIntVal: apicommon.DefaultAgentHealthPort,\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tInitialDelaySeconds: 10,\n\t\t\t\t\tTimeoutSeconds: 5,\n\t\t\t\t\tPeriodSeconds: 30,\n\t\t\t\t\tSuccessThreshold: 1,\n\t\t\t\t\tFailureThreshold: 5,\n\t\t\t\t},\n\t\t\t\tSecurityContext: &v1.SecurityContext{\n\t\t\t\t\tRunAsUser: apiutils.NewInt64Pointer(12345),\n\t\t\t\t},\n\t\t\t\tSeccompConfig: &v2alpha1.SeccompConfig{\n\t\t\t\t\tCustomRootPath: apiutils.NewStringPointer(\"/some/path\"),\n\t\t\t\t\tCustomProfile: &v2alpha1.CustomConfig{\n\t\t\t\t\t\tConfigMap: &common.ConfigMapConfig{\n\t\t\t\t\t\t\tName: \"custom-seccomp-cm\",\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tAppArmorProfileName: apiutils.NewStringPointer(\"runtime/default\"),\n\t\t\t},\n\t\t},\n\t\tVolumes: []v1.Volume{\n\t\t\t{\n\t\t\t\tName: \"added-volume\",\n\t\t\t\tVolumeSource: v1.VolumeSource{\n\t\t\t\t\tEmptyDir: &v1.EmptyDirVolumeSource{},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t\tSecurityContext: &v1.PodSecurityContext{\n\t\t\tRunAsUser: apiutils.NewInt64Pointer(1234),\n\t\t},\n\t\tPriorityClassName: apiutils.NewStringPointer(\"a-priority-class\"),\n\t\tAffinity: &v1.Affinity{\n\t\t\tPodAntiAffinity: &v1.PodAntiAffinity{\n\t\t\t\tPreferredDuringSchedulingIgnoredDuringExecution: []v1.WeightedPodAffinityTerm{\n\t\t\t\t\t{\n\t\t\t\t\t\tWeight: 50,\n\t\t\t\t\t\tPodAffinityTerm: v1.PodAffinityTerm{\n\t\t\t\t\t\t\tLabelSelector: &metav1.LabelSelector{\n\t\t\t\t\t\t\t\tMatchLabels: map[string]string{\n\t\t\t\t\t\t\t\t\t\"some-label\": \"some-value\",\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\tTopologyKey: \"kubernetes.io/hostname\",\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t\tNodeSelector: map[string]string{\n\t\t\t\"key1\": \"val1\",\n\t\t},\n\t\tTolerations: []v1.Toleration{\n\t\t\t{\n\t\t\t\tKey: \"key1\",\n\t\t\t\tOperator: \"Exists\",\n\t\t\t\tEffect: \"NoSchedule\",\n\t\t\t},\n\t\t},\n\t\tAnnotations: map[string]string{\n\t\t\t\"an-annotation\": \"123\",\n\t\t},\n\t\tLabels: map[string]string{\n\t\t\t\"some-label\": \"456\",\n\t\t},\n\t\tHostNetwork: apiutils.NewBoolPointer(false),\n\t\tHostPID: apiutils.NewBoolPointer(true),\n\t\tDisabled: apiutils.NewBoolPointer(false),\n\t}\n\n\treturn agent\n}", "title": "" }, { "docid": "27d97a2ff4f782bff1254cc4c67b6bef", "score": "0.5661778", "text": "func (f *ksmFeature) Configure(dda *v2alpha1.DatadogAgent) feature.RequiredComponents {\n\tf.owner = dda\n\tvar output feature.RequiredComponents\n\n\tif dda.Spec.Features != nil && dda.Spec.Features.KubeStateMetricsCore != nil && apiutils.BoolValue(dda.Spec.Features.KubeStateMetricsCore.Enabled) {\n\t\toutput.ClusterAgent.IsRequired = apiutils.NewBoolPointer(true)\n\n\t\tf.collectAPIServiceMetrics = true\n\t\tf.collectCRDMetrics = true\n\t\tf.serviceAccountName = v2alpha1.GetClusterAgentServiceAccount(dda)\n\n\t\t// This check will only run in the Cluster Checks Runners or Cluster Agent (not the Node Agent)\n\t\tif dda.Spec.Features.ClusterChecks != nil && apiutils.BoolValue(dda.Spec.Features.ClusterChecks.Enabled) && apiutils.BoolValue(dda.Spec.Features.ClusterChecks.UseClusterChecksRunners) {\n\t\t\tf.runInClusterChecksRunner = true\n\t\t\tf.rbacSuffix = common.ChecksRunnerSuffix\n\t\t\tf.serviceAccountName = v2alpha1.GetClusterChecksRunnerServiceAccount(dda)\n\t\t\toutput.ClusterChecksRunner.IsRequired = apiutils.NewBoolPointer(true)\n\n\t\t\tif ccrOverride, ok := dda.Spec.Override[v2alpha1.ClusterChecksRunnerComponentName]; ok {\n\t\t\t\tif ccrOverride.Image != nil && !utils.IsAboveMinVersion(component.GetAgentVersionFromImage(*ccrOverride.Image), crdAPIServiceCollectionMinVersion) {\n\t\t\t\t\t// Disable if image is overridden to an unsupported version\n\t\t\t\t\tf.collectAPIServiceMetrics = false\n\t\t\t\t\tf.collectCRDMetrics = false\n\t\t\t\t}\n\t\t\t}\n\t\t} else if clusterAgentOverride, ok := dda.Spec.Override[v2alpha1.ClusterAgentComponentName]; ok {\n\t\t\tif clusterAgentOverride.Image != nil && !utils.IsAboveMinVersion(component.GetAgentVersionFromImage(*clusterAgentOverride.Image), crdAPIServiceCollectionMinVersion) {\n\t\t\t\t// Disable if image is overridden to an unsupported version\n\t\t\t\tf.collectAPIServiceMetrics = false\n\t\t\t\tf.collectCRDMetrics = false\n\t\t\t}\n\t\t}\n\n\t\tif dda.Spec.Features.KubeStateMetricsCore.Conf != nil {\n\t\t\tf.customConfig = v2alpha1.ConvertCustomConfig(dda.Spec.Features.KubeStateMetricsCore.Conf)\n\t\t\thash, err := comparison.GenerateMD5ForSpec(f.customConfig)\n\t\t\tif err != nil {\n\t\t\t\tf.logger.Error(err, \"couldn't generate hash for ksm core custom config\")\n\t\t\t} else {\n\t\t\t\tf.logger.V(2).Info(\"built ksm core from custom config\", \"hash\", hash)\n\t\t\t}\n\t\t\tf.customConfigAnnotationValue = hash\n\t\t\tf.customConfigAnnotationKey = object.GetChecksumAnnotationKey(feature.KubernetesStateCoreIDType)\n\t\t}\n\n\t\tf.configConfigMapName = apicommonv1.GetConfName(dda, f.customConfig, apicommon.DefaultKubeStateMetricsCoreConf)\n\t}\n\n\treturn output\n}", "title": "" }, { "docid": "ce2bd1d859778c9a413bd80c1db89387", "score": "0.5531547", "text": "func (f *externalMetricsFeature) Configure(dda *v2alpha1.DatadogAgent) (reqComp feature.RequiredComponents) {\n\tf.owner = dda\n\tem := dda.Spec.Features.ExternalMetricsServer\n\n\tif em != nil && apiutils.BoolValue(em.Enabled) {\n\t\tf.useWPA = apiutils.BoolValue(em.WPAController)\n\t\tf.useDDM = apiutils.BoolValue(em.UseDatadogMetrics)\n\t\tf.port = *em.Port\n\t\tif em.Endpoint != nil {\n\t\t\tif em.Endpoint.URL != nil {\n\t\t\t\tf.url = *em.Endpoint.URL\n\t\t\t}\n\t\t\tcreds := em.Endpoint.Credentials\n\t\t\tif creds != nil {\n\t\t\t\tf.keySecret = make(map[string]secret)\n\t\t\t\tif !v2alpha1.CheckAPIKeySufficiency(creds, apicommon.DDExternalMetricsProviderAPIKey) ||\n\t\t\t\t\t!v2alpha1.CheckAppKeySufficiency(creds, apicommon.DDExternalMetricsProviderAppKey) {\n\t\t\t\t\t// for one of api or app keys, neither secrets nor external metrics key env vars\n\t\t\t\t\t// are defined, so store key data to create secret later\n\t\t\t\t\tfor keyType, keyData := range v2alpha1.GetKeysFromCredentials(creds) {\n\t\t\t\t\t\tf.keySecret[keyType] = secret{\n\t\t\t\t\t\t\tdata: keyData,\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tif creds.APISecret != nil {\n\t\t\t\t\t_, secretName, secretKey := v2alpha1.GetAPIKeySecret(creds, componentdca.GetDefaultExternalMetricSecretName(f.owner))\n\t\t\t\t\tif secretName != \"\" && secretKey != \"\" {\n\t\t\t\t\t\t// api key secret exists; store secret name and key instead\n\t\t\t\t\t\tf.keySecret[apicommon.DefaultAPIKeyKey] = secret{\n\t\t\t\t\t\t\tname: secretName,\n\t\t\t\t\t\t\tkey: secretKey,\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tif creds.AppSecret != nil {\n\t\t\t\t\t_, secretName, secretKey := v2alpha1.GetAppKeySecret(creds, componentdca.GetDefaultExternalMetricSecretName(f.owner))\n\t\t\t\t\tif secretName != \"\" && secretKey != \"\" {\n\t\t\t\t\t\t// app key secret exists; store secret name and key instead\n\t\t\t\t\t\tf.keySecret[apicommon.DefaultAPPKeyKey] = secret{\n\t\t\t\t\t\t\tname: secretName,\n\t\t\t\t\t\t\tkey: secretKey,\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tf.serviceAccountName = v2alpha1.GetClusterAgentServiceAccount(dda)\n\n\t\tif enabled, flavor := v2alpha1.IsNetworkPolicyEnabled(dda); enabled {\n\t\t\tif flavor == v2alpha1.NetworkPolicyFlavorCilium {\n\t\t\t\tf.createCiliumNetworkPolicy = true\n\t\t\t} else {\n\t\t\t\tf.createKubernetesNetworkPolicy = true\n\t\t\t}\n\t\t}\n\n\t\treqComp = feature.RequiredComponents{\n\t\t\tClusterAgent: feature.RequiredComponent{IsRequired: apiutils.NewBoolPointer(true)},\n\t\t}\n\t}\n\n\treturn reqComp\n}", "title": "" }, { "docid": "5ea69a664e00ee793c189af92eac77c1", "score": "0.5494494", "text": "func NewDatadogAgentWithGlobalConfigSettings(namespace string, name string) v2alpha1.DatadogAgent {\n\tagent := newDatadogAgentWithFeatures(namespace, name, nil)\n\n\t// This config is invalid (incorrect URLs, paths, etc), but it's good enough\n\t// to verify that the operator does not crash when parsing it and using it\n\t// to configure some agent dependencies.\n\tagent.Spec.Global = &v2alpha1.GlobalConfig{\n\t\tClusterAgentToken: apiutils.NewStringPointer(\"my-cluster-agent-token\"),\n\t\tClusterName: apiutils.NewStringPointer(\"my-cluster\"),\n\t\tSite: apiutils.NewStringPointer(\"some-dd-site\"),\n\t\tCredentials: &v2alpha1.DatadogCredentials{\n\t\t\tAPIKey: apiutils.NewStringPointer(\"my-api-key\"),\n\t\t\tAppKey: apiutils.NewStringPointer(\"my-app-key\"),\n\t\t},\n\t\tEndpoint: &v2alpha1.Endpoint{\n\t\t\tURL: apiutils.NewStringPointer(\"some-url\"),\n\t\t\tCredentials: &v2alpha1.DatadogCredentials{\n\t\t\t\tAPIKey: apiutils.NewStringPointer(\"my-api-key\"),\n\t\t\t\tAppKey: apiutils.NewStringPointer(\"my-app-key\"),\n\t\t\t},\n\t\t},\n\t\tRegistry: apiutils.NewStringPointer(\"my-custom-registry\"),\n\t\tLogLevel: apiutils.NewStringPointer(\"INFO\"),\n\t\tTags: []string{\"tagA:valA\", \"tagB:valB\"},\n\t\tPodLabelsAsTags: map[string]string{\"some-label\": \"some-tag\"},\n\t\tPodAnnotationsAsTags: map[string]string{\"some-annotation\": \"some-tag\"},\n\t\tNodeLabelsAsTags: map[string]string{\"some-label\": \"some-tag\"},\n\t\tNamespaceLabelsAsTags: map[string]string{\"some-label\": \"some-tag\"},\n\t\tNetworkPolicy: &v2alpha1.NetworkPolicyConfig{\n\t\t\tCreate: apiutils.NewBoolPointer(true),\n\t\t\tFlavor: v2alpha1.NetworkPolicyFlavorKubernetes,\n\t\t},\n\t\tLocalService: &v2alpha1.LocalService{\n\t\t\tNameOverride: apiutils.NewStringPointer(\"my-local-service\"),\n\t\t\tForceEnableLocalService: apiutils.NewBoolPointer(true),\n\t\t},\n\t\tKubelet: &common.KubeletConfig{\n\t\t\tHost: &v1.EnvVarSource{\n\t\t\t\tFieldRef: &v1.ObjectFieldSelector{\n\t\t\t\t\tFieldPath: apicommon.FieldPathSpecNodeName,\n\t\t\t\t},\n\t\t\t},\n\t\t\tTLSVerify: apiutils.NewBoolPointer(true),\n\t\t\tHostCAPath: \"some/path\",\n\t\t},\n\t\tDockerSocketPath: apiutils.NewStringPointer(\"/some/path\"),\n\t\tCriSocketPath: apiutils.NewStringPointer(\"/another/path\"),\n\t}\n\n\treturn agent\n}", "title": "" }, { "docid": "91462533551a1beb500458cb61d04fe9", "score": "0.5483431", "text": "func (f *logCollectionFeature) Configure(dda *v2alpha1.DatadogAgent) (reqComp feature.RequiredComponents) {\n\tif dda.Spec.Features == nil {\n\t\treturn\n\t}\n\n\tlogCollection := dda.Spec.Features.LogCollection\n\n\tif logCollection != nil && apiutils.BoolValue(logCollection.Enabled) {\n\t\tif logCollection.ContainerCollectAll != nil {\n\t\t\t// fallback to agent default if not set\n\t\t\tf.containerCollectAll = apiutils.BoolValue(logCollection.ContainerCollectAll)\n\t\t}\n\t\tf.containerCollectUsingFiles = apiutils.BoolValue(logCollection.ContainerCollectUsingFiles)\n\t\tf.containerLogsPath = *logCollection.ContainerLogsPath\n\t\tf.podLogsPath = *logCollection.PodLogsPath\n\t\tf.containerSymlinksPath = *logCollection.ContainerSymlinksPath\n\t\tf.tempStoragePath = *logCollection.TempStoragePath\n\t\tif logCollection.OpenFilesLimit != nil {\n\t\t\tf.openFilesLimit = *logCollection.OpenFilesLimit\n\t\t}\n\n\t\treqComp = feature.RequiredComponents{\n\t\t\tAgent: feature.RequiredComponent{\n\t\t\t\tIsRequired: apiutils.NewBoolPointer(true),\n\t\t\t\tContainers: []apicommonv1.AgentContainerName{\n\t\t\t\t\tapicommonv1.CoreAgentContainerName,\n\t\t\t\t},\n\t\t\t},\n\t\t}\n\t}\n\treturn reqComp\n}", "title": "" }, { "docid": "517bbda5f9e3dc3407d570ba94c9bcab", "score": "0.5339444", "text": "func New() *AgentConfig {\n\treturn &AgentConfig{\n\t\tEnabled: true,\n\t\tDefaultEnv: \"none\",\n\t\tEndpoints: []*Endpoint{{Host: \"https://trace.agent.datadoghq.com\"}},\n\n\t\tBucketInterval: time.Duration(10) * time.Second,\n\t\tExtraAggregators: []string{\"http.status_code\", \"version\", \"_dd.hostname\"},\n\n\t\tExtraSampleRate: 1.0,\n\t\tMaxTPS: 10,\n\t\tMaxEPS: 200,\n\n\t\tReceiverHost: \"localhost\",\n\t\tReceiverPort: 8126,\n\t\tMaxRequestBytes: 50 * 1024 * 1024, // 50MB\n\n\t\tStatsWriter: new(WriterConfig),\n\t\tTraceWriter: new(WriterConfig),\n\t\tConnectionResetInterval: 0, // disabled\n\n\t\tStatsdHost: \"localhost\",\n\t\tStatsdPort: 8125,\n\n\t\tLogLevel: \"INFO\",\n\t\tLogFilePath: DefaultLogFilePath,\n\t\tLogThrottling: true,\n\n\t\tMaxMemory: 5e8, // 500 Mb, should rarely go above 50 Mb\n\t\tMaxCPU: 0.5, // 50%, well behaving agents keep below 5%\n\t\tWatchdogInterval: 10 * time.Second,\n\n\t\tIgnore: make(map[string][]string),\n\t\tAnalyzedRateByServiceLegacy: make(map[string]float64),\n\t\tAnalyzedSpansByService: make(map[string]map[string]float64),\n\n\t\tDDAgentBin: defaultDDAgentBin,\n\t}\n}", "title": "" }, { "docid": "6c71933b58aefaefffdd350a2f61ef5e", "score": "0.51115566", "text": "func Configure(v *viper.Viper, p *pflag.FlagSet) {\n\t// Log configuration\n\tif _, ok := os.LookupEnv(\"NO_COLOR\"); ok {\n\t\tv.SetDefault(\"no_color\", true)\n\t}\n\n\tv.SetDefault(\"auth::token::signingKey\", \"\")\n\tv.SetDefault(\"auth::token::issuer\", \"\")\n\tv.SetDefault(\"auth::token::audience\", \"\")\n\n\tv.SetDefault(\"log::format\", \"json\")\n\tv.SetDefault(\"log::level\", \"info\")\n\tv.RegisterAlias(\"log::noColor\", \"no_color\")\n\n\t// Dex configuration\n\tv.SetDefault(\"dex::apiAddr\", \"\")\n\tv.SetDefault(\"dex::apiCa\", \"\")\n\n\t// Kubernetes configuration\n\tv.SetDefault(\"kubernetes::client::forceGlobal\", false)\n\n\t// Database config\n\tv.SetDefault(\"database::dialect\", \"mysql\")\n\tv.SetDefault(\"database::host\", \"\")\n\tv.SetDefault(\"database::port\", 3306)\n\tv.SetDefault(\"database::tls\", \"\")\n\tv.SetDefault(\"database::user\", \"\")\n\tv.SetDefault(\"database::password\", \"\")\n\tv.SetDefault(\"database::name\", \"pipeline\")\n\tv.SetDefault(\"database::params\", map[string]string{\n\t\t\"charset\": \"utf8mb4\",\n\t})\n\tv.SetDefault(\"database::queryLog\", false)\n\n\t// Cadence configuration\n\tv.SetDefault(\"cadence::host\", \"\")\n\tv.SetDefault(\"cadence::port\", 7933)\n\tv.SetDefault(\"cadence::domain\", \"pipeline\")\n\n\t// Cluster configuration\n\tv.SetDefault(\"cluster::manifest\", \"\")\n\tv.SetDefault(\"cluster::namespace\", \"pipeline-system\")\n\n\tv.SetDefault(\"cluster::labels::domain\", \"banzaicloud.io\")\n\tv.SetDefault(\"cluster::labels::forbiddenDomains\", []string{\n\t\t\"k8s.io\",\n\t\t\"kubernetes.io\",\n\t\t\"google.com\",\n\t\t\"coreos.com\",\n\t\t\"oraclecloud.com\",\n\t\t\"node.info\",\n\t\t\"azure.com\",\n\t\t\"agentpool\",\n\t\t\"storageprofile\",\n\t\t\"storagetier\",\n\t})\n\tv.SetDefault(\"cluster::labels::charts::nodepoolLabelOperator::chart\", \"banzaicloud-stable/nodepool-labels-operator\")\n\tv.SetDefault(\"cluster::labels::charts::nodepoolLabelOperator::version\", \"0.2.7\")\n\tv.SetDefault(\"cluster::labels::charts::nodepoolLabelOperator::values\", map[string]interface{}{})\n\n\tv.SetDefault(\"cluster::vault::enabled\", true)\n\tv.SetDefault(\"cluster::vault::namespace\", \"\")\n\tv.SetDefault(\"cluster::vault::managed::enabled\", false)\n\tv.SetDefault(\"cluster::vault::managed::endpoint\", \"\")\n\tv.SetDefault(\"cluster::vault::charts::webhook::chart\", \"banzaicloud-stable/vault-secrets-webhook\")\n\tv.SetDefault(\"cluster::vault::charts::webhook::version\", \"1.16.0\")\n\tv.SetDefault(\"cluster::vault::charts::webhook::values\", map[string]interface{}{})\n\n\tv.SetDefault(\"cluster::monitoring::enabled\", true)\n\tv.SetDefault(\"cluster::monitoring::namespace\", \"\")\n\tv.SetDefault(\"cluster::monitoring::grafana::adminUser\", \"admin\")\n\tv.SetDefault(\"cluster::monitoring::charts::operator::chart\", \"prometheus-community/kube-prometheus-stack\")\n\tv.SetDefault(\"cluster::monitoring::charts::operator::version\", \"12.11.3\")\n\tv.SetDefault(\"cluster::monitoring::charts::operator::values\", map[string]interface{}{\n\t\t\"prometheus\": map[string]interface{}{\n\t\t\t\"ingress\": map[string]interface{}{\n\t\t\t\t\"annotations\": map[string]interface{}{\n\t\t\t\t\t\"traefik.frontend.rule.type\": \"PathPrefix\",\n\t\t\t\t\t\"traefik.ingress.kubernetes.io/ssl-redirect\": \"true\",\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t\t\"alertmanager\": map[string]interface{}{\n\t\t\t\"ingress\": map[string]interface{}{\n\t\t\t\t\"annotations\": map[string]interface{}{\n\t\t\t\t\t\"traefik.frontend.rule.type\": \"PathPrefix\",\n\t\t\t\t\t\"traefik.ingress.kubernetes.io/ssl-redirect\": \"true\",\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t\t\"grafana\": map[string]interface{}{\n\t\t\t\"ingress\": map[string]interface{}{\n\t\t\t\t\"annotations\": map[string]interface{}{\n\t\t\t\t\t\"traefik.frontend.rule.type\": \"PathPrefixStrip\",\n\t\t\t\t\t\"traefik.ingress.kubernetes.io/redirect-permanent\": \"true\",\n\t\t\t\t\t\"traefik.ingress.kubernetes.io/redirect-regex\": \"^http://(.*)\",\n\t\t\t\t\t\"traefik.ingress.kubernetes.io/redirect-replacement\": `https://$1\\`,\n\t\t\t\t},\n\t\t\t},\n\t\t\t\"sidecar\": map[string]interface{}{\n\t\t\t\t\"datasources\": map[string]interface{}{\n\t\t\t\t\t\"enabled\": \"true\",\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t})\n\tv.SetDefault(\"cluster::monitoring::images::operator::repository\", \"quay.io/prometheus-operator/prometheus-operator\")\n\tv.SetDefault(\"cluster::monitoring::images::operator::tag\", \"v0.44.1\")\n\tv.SetDefault(\"cluster::monitoring::images::prometheus::repository\", \"quay.io/prometheus/prometheus\")\n\tv.SetDefault(\"cluster::monitoring::images::prometheus::tag\", \"v2.22.1\")\n\tv.SetDefault(\"cluster::monitoring::images::alertmanager::repository\", \"quay.io/prometheus/alertmanager\")\n\tv.SetDefault(\"cluster::monitoring::images::alertmanager::tag\", \"v0.21.0\")\n\tv.SetDefault(\"cluster::monitoring::images::grafana::repository\", \"grafana/grafana\")\n\tv.SetDefault(\"cluster::monitoring::images::grafana::tag\", \"7.3.5\")\n\tv.SetDefault(\"cluster::monitoring::images::kubestatemetrics::repository\", \"quay.io/coreos/kube-state-metrics\")\n\tv.SetDefault(\"cluster::monitoring::images::kubestatemetrics::tag\", \"v1.9.7\")\n\tv.SetDefault(\"cluster::monitoring::images::nodeexporter::repository\", \"quay.io/prometheus/node-exporter\")\n\tv.SetDefault(\"cluster::monitoring::images::nodeexporter::tag\", \"v1.0.1\")\n\n\tv.SetDefault(\"cluster::monitoring::charts::pushgateway::chart\", \"prometheus-community/prometheus-pushgateway\")\n\tv.SetDefault(\"cluster::monitoring::charts::pushgateway::version\", \"1.5.1\")\n\tv.SetDefault(\"cluster::monitoring::charts::pushgateway::values\", map[string]interface{}{})\n\tv.SetDefault(\"cluster::monitoring::images::pushgateway::repository\", \"prom/pushgateway\")\n\tv.SetDefault(\"cluster::monitoring::images::pushgateway::tag\", \"v1.0.1\")\n\n\tv.SetDefault(\"cluster::logging::enabled\", true)\n\tv.SetDefault(\"cluster::logging::namespace\", \"\")\n\tv.SetDefault(\"cluster::logging::charts::operator::chart\", \"banzaicloud-stable/logging-operator\")\n\tv.SetDefault(\"cluster::logging::charts::operator::version\", \"3.2.2\")\n\tv.SetDefault(\"cluster::logging::charts::operator::values\", map[string]interface{}{})\n\tv.SetDefault(\"cluster::logging::images::operator::repository\", \"banzaicloud/logging-operator\")\n\tv.SetDefault(\"cluster::logging::images::operator::tag\", \"3.2.0\")\n\tv.SetDefault(\"cluster::logging::charts::loki::chart\", \"banzaicloud-stable/loki\")\n\tv.SetDefault(\"cluster::logging::charts::loki::version\", \"0.17.4\")\n\tv.SetDefault(\"cluster::logging::charts::loki::values\", map[string]interface{}{})\n\tv.SetDefault(\"cluster::logging::images::loki::repository\", \"grafana/loki\")\n\tv.SetDefault(\"cluster::logging::images::loki::tag\", \"v1.3.0\")\n\tv.SetDefault(\"cluster::logging::images::fluentbit::repository\", \"fluent/fluent-bit\")\n\tv.SetDefault(\"cluster::logging::images::fluentbit::tag\", \"1.4.4\")\n\tv.SetDefault(\"cluster::logging::images::fluentd::repository\", \"banzaicloud/fluentd\")\n\tv.SetDefault(\"cluster::logging::images::fluentd::tag\", \"v1.10.3-alpine-2\")\n\n\tv.SetDefault(\"cluster::dns::enabled\", true)\n\tv.SetDefault(\"cluster::dns::namespace\", \"\")\n\tv.SetDefault(\"cluster::dns::baseDomain\", \"\")\n\tv.SetDefault(\"cluster::dns::providerSecret\", \"secret/data/banzaicloud/aws\")\n\tv.SetDefault(\"cluster::dns::charts::externalDns::chart\", \"bitnami/external-dns\")\n\tv.SetDefault(\"cluster::dns::charts::externalDns::version\", \"6.12.2\")\n\tv.SetDefault(\"cluster::dns::charts::externalDns::values\", map[string]interface{}{\n\t\t\"image\": map[string]interface{}{\n\t\t\t\"registry\": \"k8s.gcr.io\",\n\t\t\t\"repository\": \"external-dns/external-dns\",\n\t\t\t\"tag\": \"v0.7.5\",\n\t\t},\n\t})\n\n\tv.SetDefault(\"cluster::ingress::enabled\", false)\n\tv.SetDefault(\"cluster::ingress::controllers\", []string{\"traefik\"})\n\tv.SetDefault(\"cluster::ingress::namespace\", \"\")\n\tv.SetDefault(\"cluster::ingress::releaseName\", \"ingress\")\n\tv.SetDefault(\"cluster::ingress::charts::traefik::chart\", \"stable/traefik\")\n\tv.SetDefault(\"cluster::ingress::charts::traefik::version\", \"1.86.2\")\n\tv.SetDefault(\"cluster::ingress::charts::traefik::values\", `\nssl:\n enabled: true\n generateTLS: true\nrbac:\n enabled: true\n`)\n\n\tv.SetDefault(\"cluster::autoscale::namespace\", \"\")\n\tv.SetDefault(\"cluster::autoscale::charts::clusterAutoscaler::chart\", \"stable/cluster-autoscaler\")\n\tv.SetDefault(\"cluster::autoscale::charts::clusterAutoscaler::version\", \"8.0.0\")\n\tv.SetDefault(\"cluster::autoscale::charts::clusterAutoscaler::values\", map[string]interface{}{})\n\tv.SetDefault(\"cluster::autoscale::charts::clusterAutoscaler::imageVersionConstraints\", []interface{}{\n\t\tmap[string]interface{}{\n\t\t\t\"k8sVersion\": \"<=1.12.x\",\n\t\t\t\"tag\": \"v1.12.8\",\n\t\t\t\"repository\": \"gcr.io/google-containers/cluster-autoscaler\",\n\t\t},\n\t\tmap[string]interface{}{\n\t\t\t\"k8sVersion\": \"~1.13\",\n\t\t\t\"tag\": \"v1.13.9\",\n\t\t\t\"repository\": \"gcr.io/google-containers/cluster-autoscaler\",\n\t\t},\n\t\tmap[string]interface{}{\n\t\t\t\"k8sVersion\": \"~1.14\",\n\t\t\t\"tag\": \"v1.14.7\",\n\t\t\t\"repository\": \"gcr.io/google-containers/cluster-autoscaler\",\n\t\t},\n\t\tmap[string]interface{}{\n\t\t\t\"k8sVersion\": \"~1.15\",\n\t\t\t\"tag\": \"v1.15.4\",\n\t\t\t\"repository\": \"gcr.io/google-containers/cluster-autoscaler\",\n\t\t},\n\t\tmap[string]interface{}{\n\t\t\t\"k8sVersion\": \"~1.16\",\n\t\t\t\"tag\": \"v1.16.7\",\n\t\t\t\"repository\": \"k8s.gcr.io/autoscaling/cluster-autoscaler\",\n\t\t},\n\t\tmap[string]interface{}{\n\t\t\t\"k8sVersion\": \"~1.17\",\n\t\t\t\"tag\": \"v1.17.4\",\n\t\t\t\"repository\": \"k8s.gcr.io/autoscaling/cluster-autoscaler\",\n\t\t},\n\t\tmap[string]interface{}{\n\t\t\t\"k8sVersion\": \"~1.18\",\n\t\t\t\"tag\": \"v1.18.3\",\n\t\t\t\"repository\": \"k8s.gcr.io/autoscaling/cluster-autoscaler\",\n\t\t},\n\t\tmap[string]interface{}{\n\t\t\t\"k8sVersion\": \"~1.19\",\n\t\t\t\"tag\": \"v1.19.2\",\n\t\t\t\"repository\": \"k8s.gcr.io/autoscaling/cluster-autoscaler\",\n\t\t},\n\t\tmap[string]interface{}{\n\t\t\t\"k8sVersion\": \"~1.20\",\n\t\t\t\"tag\": \"v1.20.2\",\n\t\t\t\"repository\": \"k8s.gcr.io/autoscaling/cluster-autoscaler\",\n\t\t},\n\t\tmap[string]interface{}{\n\t\t\t\"k8sVersion\": \"~1.21\",\n\t\t\t\"tag\": \"v1.21.2\",\n\t\t\t\"repository\": \"k8s.gcr.io/autoscaling/cluster-autoscaler\",\n\t\t},\n\t\tmap[string]interface{}{\n\t\t\t\"k8sVersion\": \"~1.22\",\n\t\t\t\"tag\": \"v1.22.2\",\n\t\t\t\"repository\": \"k8s.gcr.io/autoscaling/cluster-autoscaler\",\n\t\t},\n\t\tmap[string]interface{}{\n\t\t\t\"k8sVersion\": \">=1.23\",\n\t\t\t\"tag\": \"v1.23.0\",\n\t\t\t\"repository\": \"k8s.gcr.io/autoscaling/cluster-autoscaler\",\n\t\t},\n\t})\n\n\tv.SetDefault(\"cluster::securityScan::enabled\", true)\n\tv.SetDefault(\"cluster::securityScan::anchore::enabled\", false)\n\tv.SetDefault(\"cluster::securityScan::anchore::endpoint\", \"\")\n\tv.SetDefault(\"cluster::securityScan::anchore::user\", \"\")\n\tv.SetDefault(\"cluster::securityScan::anchore::password\", \"\")\n\tv.SetDefault(\"cluster::securityScan::anchore::insecure\", false)\n\tv.SetDefault(\"cluster::securityScan::webhook::chart\", \"banzaicloud-stable/anchore-policy-validator\")\n\tv.SetDefault(\"cluster::securityScan::webhook::version\", \"0.8.1\")\n\tv.SetDefault(\"cluster::securityScan::webhook::release\", \"anchore\")\n\tv.SetDefault(\"cluster::securityScan::webhook::namespace\", \"pipeline-system\")\n\t// v.SetDefault(\"cluster::securityScan::webhook::values\", map[string]interface{}{\n\t//\t\"image\": map[string]interface{}{\n\t//\t\t\"repository\": \"banzaicloud/ark\",\n\t//\t\t\"tag\": \"v0.9.11\",\n\t//\t\t\"pullPolicy\": \"IfNotPresent\",\n\t//\t},\n\t// })\n\tv.SetDefault(\"cluster::securityScan::anchore::policyPath\", \"/policies\")\n\n\tv.SetDefault(\"cluster::expiry::enabled\", true)\n\n\t// ingress controller config\n\tv.SetDefault(\"cluster::posthook::ingress::enabled\", true)\n\tv.SetDefault(\"cluster::posthook::ingress::chart\", \"banzaicloud-stable/pipeline-cluster-ingress\")\n\tv.SetDefault(\"cluster::posthook::ingress::version\", \"0.0.10\")\n\tv.SetDefault(\"cluster::posthook::ingress::values\", `\ntraefik:\n ssl:\n enabled: true\n generateTLS: true\n`)\n\n\t// Kubernetes Dashboard\n\tv.SetDefault(\"cluster::posthook::dashboard::enabled\", false)\n\tv.SetDefault(\"cluster::posthook::dashboard::chart\", \"banzaicloud-stable/kubernetes-dashboard\")\n\tv.SetDefault(\"cluster::posthook::dashboard::version\", \"0.9.2\")\n\n\t// Init spot config\n\tv.SetDefault(\"cluster::posthook::spotconfig::enabled\", false)\n\tv.SetDefault(\"cluster::posthook::spotconfig::charts::scheduler::chart\", \"banzaicloud-stable/spot-scheduler\")\n\tv.SetDefault(\"cluster::posthook::spotconfig::charts::scheduler::version\", \"0.1.2\")\n\tv.SetDefault(\"cluster::posthook::spotconfig::charts::webhook::chart\", \"banzaicloud-stable/spot-config-webhook\")\n\tv.SetDefault(\"cluster::posthook::spotconfig::charts::webhook::version\", \"0.1.6\")\n\n\t// Instance Termination Handler\n\tv.SetDefault(\"cluster::posthook::ith::enabled\", true)\n\tv.SetDefault(\"cluster::posthook::ith::chart\", \"banzaicloud-stable/instance-termination-handler\")\n\tv.SetDefault(\"cluster::posthook::ith::version\", \"0.1.3\")\n\n\t// Cluster Autoscaler\n\tv.SetDefault(\"cluster::posthook::autoscaler::enabled\", true)\n\n\t// v.SetDefault(\"cluster::disasterRecovery::enabled\", true)\n\tv.SetDefault(\"cluster::disasterRecovery::runAsIntegratedServiceV2\", false)\n\tv.SetDefault(\"cluster::disasterRecovery::namespace\", \"pipeline-system\")\n\tv.SetDefault(\"cluster::disasterRecovery::ark::syncEnabled\", true)\n\tv.SetDefault(\"cluster::disasterRecovery::ark::bucketSyncInterval\", \"10m\")\n\tv.SetDefault(\"cluster::disasterRecovery::ark::restoreSyncInterval\", \"20s\")\n\tv.SetDefault(\"cluster::disasterRecovery::ark::backupSyncInterval\", \"20s\")\n\tv.SetDefault(\"cluster::disasterRecovery::ark::restoreWaitTimeout\", \"5m\")\n\tv.SetDefault(\"cluster::disasterRecovery::charts::ark::chart\", \"banzaicloud-stable/velero\")\n\tv.SetDefault(\"cluster::disasterRecovery::charts::ark::version\", \"2.23.6-bc.2\")\n\tv.SetDefault(\"cluster::disasterRecovery::charts::ark::values\", map[string]interface{}{\n\t\t\"image\": map[string]interface{}{\n\t\t\t\"repository\": \"velero/velero\",\n\t\t\t\"tag\": \"v1.6.3\",\n\t\t\t\"pullPolicy\": \"IfNotPresent\",\n\t\t},\n\t\t\"resources\": map[string]interface{}{\n\t\t\t\"requests\": map[string]interface{}{\n\t\t\t\t\"memory\": \"3072Mi\",\n\t\t\t\t\"cpu\": \"1500m\",\n\t\t\t},\n\t\t\t\"limits\": map[string]interface{}{\n\t\t\t\t\"memory\": \"8192Mi\",\n\t\t\t\t\"cpu\": 4,\n\t\t\t},\n\t\t},\n\t})\n\tv.SetDefault(\"cluster::disasterRecovery::charts::ark::pluginImages\", map[string]interface{}{\n\t\t\"aws\": map[string]interface{}{\n\t\t\t\"repository\": \"velero/velero-plugin-for-aws\",\n\t\t\t\"tag\": \"v1.2.0\",\n\t\t\t\"pullPolicy\": \"IfNotPresent\",\n\t\t},\n\t\t\"azure\": map[string]interface{}{\n\t\t\t\"repository\": \"velero/velero-plugin-for-microsoft-azure\",\n\t\t\t\"tag\": \"v1.2.0\",\n\t\t\t\"pullPolicy\": \"IfNotPresent\",\n\t\t},\n\t\t\"gcp\": map[string]interface{}{\n\t\t\t\"repository\": \"velero/velero-plugin-for-gcp\",\n\t\t\t\"tag\": \"v1.2.0\",\n\t\t\t\"pullPolicy\": \"IfNotPresent\",\n\t\t},\n\t})\n\n\tv.SetDefault(\"cluster::charts\", nil)\n\n\t// Helm configuration\n\tv.SetDefault(\"helm::home\", \"./var/cache\")\n\tv.SetDefault(\"helm::repositories::aws-ebs-csi-driver\", \"https://kubernetes-sigs.github.io/aws-ebs-csi-driver\")\n\tv.SetDefault(\"helm::repositories::stable\", \"https://charts.helm.sh/stable\")\n\tv.SetDefault(\"helm::repositories::banzaicloud-stable\", \"https://kubernetes-charts.banzaicloud.com\")\n\tv.SetDefault(\"helm::repositories::bitnami\", \"https://charts.bitnami.com/bitnami\")\n\tv.SetDefault(\"helm::repositories::loki\", \"https://grafana.github.io/helm-charts\")\n\tv.SetDefault(\"helm::repositories::prometheus-community\", \"https://prometheus-community.github.io/helm-charts\")\n\n\t// Cloud configuration\n\tv.SetDefault(\"cloud::amazon::defaultRegion\", \"us-west-1\")\n\n\tv.SetDefault(\"distribution::eks::templateLocation\", \"./templates/eks\")\n\tv.SetDefault(\"distribution::eks::defaultNodeVolumeEncryption::enabled\", false)\n\tv.SetDefault(\"distribution::eks::defaultNodeVolumeEncryption::encryptionKeyARN\", \"\")\n\tv.SetDefault(\"distribution::eks::defaultNodeVolumeSize\", 0)\n\tv.SetDefault(\"distribution::eks::exposeAdminKubeconfig\", true)\n\tv.SetDefault(\"distribution::eks::ssh::generate\", true)\n\tv.SetDefault(\"distribution::eks::enableAddons\", false)\n\n\tv.SetDefault(\"distribution::pke::amazon::enabled\", true)\n\tv.SetDefault(\"distribution::pke::amazon::globalRegion\", \"us-east-1\")\n\tv.SetDefault(\"distribution::pke::amazon::defaultEBSCSIDriverChartVersion\", \"2.12.1\")\n\tv.SetDefault(\"distribution::pke::amazon::defaultImages\", map[string]string{})\n\tv.SetDefault(\"distribution::pke::amazon::defaultNetworkProvider\", \"cilium\")\n\tv.SetDefault(\"distribution::pke::amazon::defaultNodeVolumeSize\", 0)\n\n\tv.SetDefault(\"distribution::pke::azure::enabled\", true)\n\n\tv.SetDefault(\"cloudinfo::endpoint\", \"\")\n\n\tv.SetDefault(\"secret::tls::defaultValidity\", \"8760h\") // 1 year\n\n\t// Telemetry configuration\n\tv.SetDefault(\"telemetry::enabled\", false)\n\tp.String(\"telemetry-addr\", \"127.0.0.1:9900\", \"Telemetry HTTP server address\")\n\t_ = v.BindPFlag(\"telemetry::addr\", p.Lookup(\"telemetry-addr\"))\n\tv.SetDefault(\"telemetry::addr\", \"127.0.0.1:9900\")\n\tv.SetDefault(\"telemetry::debug\", true)\n\n\tv.SetDefault(\"integratedservice::v2\", false)\n\n\t// Integrated Service Operator\n\tv.SetDefault(\"integratedservice::operator::chart\", \"banzaicloud-stable/integrated-service-operator\")\n\tv.SetDefault(\"integratedservice::operator::version\", \"0.5.0\")\n\tv.SetDefault(\"integratedservice::operator::release\", \"iso\")\n\tv.SetDefault(\"integratedservice::operator::namespace\", \"pipeline-system\")\n\tv.SetDefault(\"integratedservice::operator::batchsize\", 100)\n}", "title": "" }, { "docid": "146ba1948f69aedef498af5035f77286", "score": "0.50809777", "text": "func (format *CollectdToInflux08) Configure(conf core.PluginConfigReader) {\n}", "title": "" }, { "docid": "7c13752d672eaf08a14c76b4e677adeb", "score": "0.5078553", "text": "func (c *Client) ConfigureAgent(ctx context.Context, params *ConfigureAgentInput, optFns ...func(*Options)) (*ConfigureAgentOutput, error) {\n\tif params == nil {\n\t\tparams = &ConfigureAgentInput{}\n\t}\n\n\tresult, metadata, err := c.invokeOperation(ctx, \"ConfigureAgent\", params, optFns, c.addOperationConfigureAgentMiddlewares)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tout := result.(*ConfigureAgentOutput)\n\tout.ResultMetadata = metadata\n\treturn out, nil\n}", "title": "" }, { "docid": "ce04ec6fefc977a7367837e6ba7d4c10", "score": "0.50145096", "text": "func (f *cwsFeature) Configure(dda *v2alpha1.DatadogAgent) (reqComp feature.RequiredComponents) {\n\tf.owner = dda\n\n\tif dda.Spec.Features != nil && dda.Spec.Features.CWS != nil && apiutils.BoolValue(dda.Spec.Features.CWS.Enabled) {\n\t\tcws := dda.Spec.Features.CWS\n\n\t\tf.syscallMonitorEnabled = apiutils.BoolValue(cws.SyscallMonitorEnabled)\n\n\t\tif cws.CustomPolicies != nil {\n\t\t\tf.customConfig = v2alpha1.ConvertCustomConfig(cws.CustomPolicies)\n\t\t\thash, err := comparison.GenerateMD5ForSpec(f.customConfig)\n\t\t\tif err != nil {\n\t\t\t\tf.logger.Error(err, \"couldn't generate hash for cws custom policies config\")\n\t\t\t} else {\n\t\t\t\tf.logger.V(2).Info(\"built cws custom policies from custom config\", \"hash\", hash)\n\t\t\t}\n\t\t\tf.customConfigAnnotationValue = hash\n\t\t\tf.customConfigAnnotationKey = object.GetChecksumAnnotationKey(feature.CWSIDType)\n\t\t}\n\t\tf.configMapName = apicommonv1.GetConfName(dda, f.customConfig, apicommon.DefaultCWSConf)\n\n\t\tif cws.Network != nil {\n\t\t\tf.networkEnabled = apiutils.BoolValue(cws.Network.Enabled)\n\t\t}\n\t\tif cws.SecurityProfiles != nil {\n\t\t\tf.activityDumpEnabled = apiutils.BoolValue(cws.SecurityProfiles.Enabled)\n\t\t}\n\n\t\tif dda.Spec.Features.RemoteConfiguration != nil {\n\t\t\tf.remoteConfigurationEnabled = apiutils.BoolValue(dda.Spec.Features.RemoteConfiguration.Enabled)\n\t\t}\n\n\t\treqComp = feature.RequiredComponents{\n\t\t\tAgent: feature.RequiredComponent{\n\t\t\t\tIsRequired: apiutils.NewBoolPointer(true),\n\t\t\t\tContainers: []apicommonv1.AgentContainerName{\n\t\t\t\t\tapicommonv1.SecurityAgentContainerName,\n\t\t\t\t\tapicommonv1.SystemProbeContainerName,\n\t\t\t\t},\n\t\t\t},\n\t\t}\n\t}\n\n\treturn reqComp\n}", "title": "" }, { "docid": "70fc0be460a84b8312cba2a8d459f8aa", "score": "0.49766162", "text": "func NewAgentConfig(conf *File, legacyConf *File) (*AgentConfig, error) {\n\tc := NewDefaultAgentConfig()\n\tvar m *ini.Section\n\tvar err error\n\n\tif conf == nil {\n\t\tgoto APM_CONF\n\t}\n\n\t// Inherit all relevant config from dd-agent\n\tm, err = conf.GetSection(\"Main\")\n\tif err == nil {\n\t\tif v := m.Key(\"hostname\").MustString(\"\"); v != \"\" {\n\t\t\tc.HostName = v\n\t\t} else {\n\t\t\tlog.Info(\"Failed to parse hostname from dd-agent config\")\n\t\t}\n\n\t\tif v := m.Key(\"api_key\").Strings(\",\"); len(v) != 0 {\n\t\t\tc.APIKey = v[0]\n\t\t} else {\n\t\t\tlog.Info(\"Failed to parse api_key from dd-agent config\")\n\t\t}\n\n\t\tif v := m.Key(\"bind_host\").MustString(\"\"); v != \"\" {\n\t\t\tc.StatsdHost = v\n\t\t\tc.ReceiverHost = v\n\t\t}\n\n\t\t// non_local_traffic is a shorthand in dd-agent configuration that is\n\t\t// equivalent to setting `bind_host: 0.0.0.0`. Respect this flag\n\t\t// since it defaults to true in Docker and saves us a command-line param\n\t\tif v := strings.ToLower(m.Key(\"non_local_traffic\").MustString(\"\")); v == \"yes\" || v == \"true\" {\n\t\t\tc.StatsdHost = \"0.0.0.0\"\n\t\t\tc.ReceiverHost = \"0.0.0.0\"\n\t\t}\n\n\t\tif v := m.Key(\"dogstatsd_port\").MustInt(-1); v != -1 {\n\t\t\tc.StatsdPort = v\n\t\t}\n\t\tif v := m.Key(\"log_level\").MustString(\"\"); v != \"\" {\n\t\t\tc.LogLevel = v\n\t\t}\n\n\t\tif p := getProxySettings(m); p.Host != \"\" {\n\t\t\tc.Proxy = p\n\t\t}\n\t}\n\nAPM_CONF:\n\t// When available inherit APM specific config\n\tif legacyConf != nil {\n\t\t// try to use the legacy config file passed via `-configfile`\n\t\tconf = legacyConf\n\t}\n\n\tif conf == nil {\n\t\tgoto ENV_CONF\n\t}\n\n\tif v := strings.ToLower(conf.GetDefault(\"Main\", \"apm_enabled\", \"\")); v == \"no\" || v == \"false\" {\n\t\tc.Enabled = false\n\t}\n\n\tif v, _ := conf.Get(\"trace.config\", \"env\"); v != \"\" {\n\t\tc.DefaultEnv = model.NormalizeTag(v)\n\t}\n\n\tif v, _ := conf.Get(\"trace.config\", \"log_level\"); v != \"\" {\n\t\tc.LogLevel = v\n\t}\n\n\tif v, _ := conf.Get(\"trace.config\", \"log_file\"); v != \"\" {\n\t\tc.LogFilePath = v\n\t}\n\n\tif v, e := conf.GetStrArray(\"trace.ignore\", \"resource\", ','); e == nil {\n\t\tc.Ignore[\"resource\"] = v\n\t}\n\n\tif v, e := conf.GetSection(\"trace.analyzed_rate_by_service\"); e == nil {\n\t\trates := v.KeysHash()\n\t\tfor service, rate := range rates {\n\t\t\trate, err := strconv.ParseFloat(rate, 64)\n\t\t\tif err != nil {\n\t\t\t\tlog.Infof(\"failed to parse rate for analyzed service: %v\", service)\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tc.AnalyzedRateByService[service] = rate\n\t\t}\n\t}\n\n\tif v := strings.ToLower(conf.GetDefault(\"trace.config\", \"log_throttling\", \"\")); v == \"no\" || v == \"false\" {\n\t\tc.LogThrottlingEnabled = false\n\t}\n\n\tif v, _ := conf.Get(\"trace.api\", \"api_key\"); v != \"\" {\n\t\tvals := strings.Split(v, \",\")\n\t\tfor i := range vals {\n\t\t\tvals[i] = strings.TrimSpace(vals[i])\n\t\t}\n\t\tc.APIKey = vals[0]\n\t}\n\n\tif v, _ := conf.Get(\"trace.api\", \"endpoint\"); v != \"\" {\n\t\tvals := strings.Split(v, \",\")\n\t\tfor i := range vals {\n\t\t\tvals[i] = strings.TrimSpace(vals[i])\n\t\t}\n\n\t\t// Takes the first endpoint\n\t\tc.APIEndpoint = vals[0]\n\t}\n\n\tif v, e := conf.GetInt(\"trace.api\", \"payload_buffer_max_size\"); e == nil {\n\t\tc.APIPayloadBufferMaxSize = v\n\t}\n\n\tif v, e := conf.GetInt(\"trace.concentrator\", \"bucket_size_seconds\"); e == nil {\n\t\tc.BucketInterval = time.Duration(v) * time.Second\n\t}\n\n\tif v, e := conf.GetStrArray(\"trace.concentrator\", \"extra_aggregators\", ','); e == nil {\n\t\tc.ExtraAggregators = append(c.ExtraAggregators, v...)\n\t} else {\n\t\tlog.Debug(\"No aggregator configuration, using defaults\")\n\t}\n\n\tif v, e := conf.GetFloat(\"trace.sampler\", \"extra_sample_rate\"); e == nil {\n\t\tc.ExtraSampleRate = v\n\t}\n\tif v, e := conf.GetFloat(\"trace.sampler\", \"pre_sample_rate\"); e == nil {\n\t\tc.PreSampleRate = v\n\t}\n\tif v, e := conf.GetFloat(\"trace.sampler\", \"max_traces_per_second\"); e == nil {\n\t\tc.MaxTPS = v\n\t}\n\n\tif v, e := conf.GetInt(\"trace.receiver\", \"receiver_port\"); e == nil {\n\t\tc.ReceiverPort = v\n\t}\n\n\tif v, e := conf.GetInt(\"trace.receiver\", \"connection_limit\"); e == nil {\n\t\tc.ConnectionLimit = v\n\t}\n\n\tif v, e := conf.GetInt(\"trace.receiver\", \"timeout\"); e == nil {\n\t\tc.ReceiverTimeout = v\n\t}\n\n\tc.ServiceWriterConfig = readServiceWriterConfig(conf, \"trace.writer.services\")\n\tc.StatsWriterConfig = readStatsWriterConfig(conf, \"trace.writer.stats\")\n\tc.TraceWriterConfig = readTraceWriterConfig(conf, \"trace.writer.traces\")\n\n\tif v, e := conf.GetFloat(\"trace.watchdog\", \"max_memory\"); e == nil {\n\t\tc.MaxMemory = v\n\t}\n\n\tif v, e := conf.GetFloat(\"trace.watchdog\", \"max_cpu_percent\"); e == nil {\n\t\tc.MaxCPU = v / 100\n\t}\n\n\tif v, e := conf.GetInt(\"trace.watchdog\", \"max_connections\"); e == nil {\n\t\tc.MaxConnections = v\n\t}\n\n\tif v, e := conf.GetInt(\"trace.watchdog\", \"check_delay_seconds\"); e == nil {\n\t\tc.WatchdogInterval = time.Duration(v) * time.Second\n\t}\n\nENV_CONF:\n\t// environment variables have precedence among defaults and the config file\n\tmergeEnv(c)\n\n\t// check for api-endpoint parity after all possible overrides have been applied\n\tif c.APIKey == \"\" {\n\t\treturn c, errors.New(\"you must specify an API Key, either via a configuration file or the DD_API_KEY env var\")\n\t}\n\n\treturn c, nil\n}", "title": "" }, { "docid": "4986973505a8b22d5af2f7a10bf91316", "score": "0.4931099", "text": "func BuildFeaturesV1(dda *v1alpha1.DatadogAgent, options *Options) ([]Feature, RequiredComponents) {\n\tbuilderMutex.RLock()\n\tdefer builderMutex.RUnlock()\n\n\tvar output []Feature\n\tvar requiredComponents RequiredComponents\n\n\t// to always return in feature in the same order we need to sort the map keys\n\tsortedkeys := make([]IDType, 0, len(featureBuilders))\n\tfor key := range featureBuilders {\n\t\tsortedkeys = append(sortedkeys, key)\n\t}\n\tsort.Slice(sortedkeys, func(i, j int) bool {\n\t\treturn sortedkeys[i] < sortedkeys[j]\n\t})\n\n\tfor _, id := range sortedkeys {\n\t\tfeat := featureBuilders[id](options)\n\t\t// only add feat to the output if the feature is enabled\n\t\tconfig := feat.ConfigureV1(dda)\n\t\tif config.IsEnabled() {\n\t\t\toutput = append(output, feat)\n\t\t}\n\t\trequiredComponents.Merge(&config)\n\t}\n\n\treturn output, requiredComponents\n}", "title": "" }, { "docid": "f15c9a52c9af568104710f9cb67abd95", "score": "0.49154198", "text": "func configure(v *viper.Viper, p *pflag.FlagSet) {\n\t// Viper settings\n\tv.AddConfigPath(\".\")\n\tv.AddConfigPath(fmt.Sprintf(\"$%s_CONFIG_DIR/\", strings.ToUpper(envPrefix)))\n\n\t// Environment variable settings\n\t// TODO: enable env prefix\n\t// v.SetEnvPrefix(envPrefix)\n\tv.SetEnvKeyReplacer(strings.NewReplacer(\".\", \"_\", \"-\", \"_\"))\n\tv.AllowEmptyEnv(true)\n\tv.AutomaticEnv()\n\n\t// Application constants\n\tv.Set(\"appName\", appName)\n\n\t// Global configuration\n\tv.SetDefault(\"environment\", \"production\")\n\tv.SetDefault(\"debug\", false)\n\tv.SetDefault(\"shutdownTimeout\", 5*time.Second)\n\tif _, ok := os.LookupEnv(\"NO_COLOR\"); ok {\n\t\tv.SetDefault(\"no_color\", true)\n\t}\n\n\t// Log configuration\n\tp.String(\"log-level\", \"info\", \"log level\")\n\t_ = v.BindPFlag(\"log.level\", p.Lookup(\"log-level\"))\n\n\tp.String(\"log-format\", \"json\", \"log format\")\n\t_ = v.BindPFlag(\"log.format\", p.Lookup(\"log-format\"))\n\n\tv.RegisterAlias(\"log.noColor\", \"no_color\")\n\n\t// Instrumentation\n\tp.Bool(\"metrics-enabled\", false, \"internal metrics are exposed if enabled\")\n\t_ = v.BindPFlag(\"instrumentation.metrics.enabled\", p.Lookup(\"metrics-enabled\"))\n\t_ = v.BindEnv(\"instrumentation.metrics.enabled\", \"METRICS_ENABLED\")\n\n\tp.String(\"metrics-address\", \":9090\", \"the address where internal metrics are exposed\")\n\t_ = v.BindPFlag(\"instrumentation.metrics.address\", p.Lookup(\"metrics-address\"))\n\t_ = v.BindEnv(\"instrumentation.metrics.address\", \"METRICS_ADDRESS\")\n\n\tv.SetDefault(\"instrumentation.jaeger.enabled\", false)\n\tv.SetDefault(\"instrumentation.jaeger.collectorEndpoint\", \"http://localhost:14268/api/traces?format=jaeger.thrift\")\n\tv.SetDefault(\"instrumentation.jaeger.agentEndpoint\", \"localhost:6832\")\n\tv.RegisterAlias(\"instrumentation.jaeger.serviceName\", \"appName\")\n\t_ = v.BindEnv(\"instrumentation.jaeger.username\")\n\t_ = v.BindEnv(\"instrumentation.jaeger.password\")\n\n\t// App configuration\n\tp.String(\"listen-address\", \":8000\", \"application listen address\")\n\t_ = v.BindPFlag(\"app.address\", p.Lookup(\"listen-address\"))\n\t_ = v.BindEnv(\"app.address\", \"LISTEN_ADDRESS\")\n\n\tp.Duration(\"product-info-renewal-interval\", 24*time.Hour, \"duration (in go syntax) between renewing the product information. Example: 2h30m\")\n\t_ = v.BindPFlag(\"app.renewalInterval\", p.Lookup(\"product-info-renewal-interval\"))\n\t_ = v.BindEnv(\"app.renewalInterval\", \"PRODUCT_INFO_RENEWAL_INTERVAL\")\n\n\tp.StringSlice(\"provider\", []string{Amazon, Google, Azure, Oracle, Alibaba}, \"Providers that will be used with the cloudinfo application.\")\n\t_ = v.BindPFlag(\"app.providers\", p.Lookup(\"provider\"))\n\t_ = v.BindEnv(\"app.providers\", \"PROVIDER\")\n\n\t// Amazon config\n\tp.String(\"aws-access-key-id\", \"\", \"aws access key id\")\n\t_ = v.BindPFlag(\"amazon.accessKeyId\", p.Lookup(\"aws-access-key-id\"))\n\t_ = v.BindEnv(\"amazon.accessKeyId\", \"AWS_ACCESS_KEY_ID\")\n\n\tp.String(\"aws-secret-access-key\", \"\", \"aws secret access key\")\n\t_ = v.BindPFlag(\"amazon.secretAccessKey\", p.Lookup(\"aws-secret-access-key\"))\n\t_ = v.BindEnv(\"amazon.secretAccessKey\", \"AWS_SECRET_ACCESS_KEY\")\n\n\tp.String(\n\t\t\"prometheus-address\",\n\t\t\"\",\n\t\t\"http address of a Prometheus instance that has AWS spot \"+\n\t\t\t\"price metrics via banzaicloud/spot-price-exporter. \"+\n\t\t\t\"If empty, the cloudinfo app will use current spot prices queried directly from the AWS API.\",\n\t)\n\t_ = v.BindPFlag(\"amazon.prometheusAddress\", p.Lookup(\"prometheus-address\"))\n\t_ = v.BindEnv(\"amazon.prometheusAddress\", \"PROMETHEUS_ADDRESS\")\n\n\tp.String(\n\t\t\"prometheus-query\",\n\t\t\"avg_over_time(aws_spot_current_price{region=\\\"%s\\\", product_description=\\\"Linux/UNIX\\\"}[1w])\",\n\t\t\"advanced configuration: change the query used to query spot price info from Prometheus.\",\n\t)\n\t_ = v.BindPFlag(\"amazon.prometheusQuery\", p.Lookup(\"prometheus-query\"))\n\t_ = v.BindEnv(\"amazon.prometheusQuery\", \"PROMETHEUS_QUERY\")\n\n\t// Google config\n\tp.String(\"gce-api-key\", \"\", \"GCE API key to use for getting SKUs\")\n\t_ = v.BindPFlag(\"google.apiKey\", p.Lookup(\"gce-api-key\"))\n\t_ = v.BindEnv(\"google.apiKey\", \"GCE_API_KEY\")\n\n\tp.String(\"google-application-credentials\", \"\", \"google application credentials location\")\n\t_ = v.BindPFlag(\"google.appCredentials\", p.Lookup(\"google-application-credentials\"))\n\t_ = v.BindEnv(\"google.appCredentials\", \"GOOGLE_APPLICATION_CREDENTIALS\")\n\n\t// Alibaba config\n\tp.String(\"alibaba-region-id\", \"\", \"alibaba region id\")\n\t_ = v.BindPFlag(\"alibaba.regionId\", p.Lookup(\"alibaba-region-id\"))\n\t_ = v.BindEnv(\"alibaba.regionId\", \"ALIBABA_REGION_ID\")\n\n\tp.String(\"alibaba-access-key-id\", \"\", \"alibaba access key id\")\n\t_ = v.BindPFlag(\"alibaba.accessKeyId\", p.Lookup(\"alibaba-access-key-id\"))\n\t_ = v.BindEnv(\"alibaba.accessKeyId\", \"ALIBABA_ACCESS_KEY_ID\")\n\n\tp.String(\"alibaba-access-key-secret\", \"\", \"alibaba access key secret\")\n\t_ = v.BindPFlag(\"alibaba.accessKeySecret\", p.Lookup(\"alibaba-access-key-secret\"))\n\t_ = v.BindEnv(\"alibaba.accessKeySecret\", \"ALIBABA_ACCESS_KEY_SECRET\")\n\n\t// Oracle config\n\tp.String(\"oracle-cli-config-location\", \"\", \"oracle config file location\")\n\t_ = v.BindPFlag(\"oracle.configLocation\", p.Lookup(\"oracle-cli-config-location\"))\n\t_ = v.BindEnv(\"oracle.configLocation\", \"ORACLE_CLI_CONFIG_LOCATION\")\n\n\t// Azure config\n\tp.String(\"azure-auth-location\", \"\", \"azure authentication file location\")\n\t_ = v.BindPFlag(\"azure.authLocation\", p.Lookup(\"azure-auth-location\"))\n\t_ = v.BindEnv(\"azure.authLocation\", \"AZURE_AUTH_LOCATION\")\n\n\t// Management\n\tv.SetDefault(\"management.enabled\", true)\n\tv.SetDefault(\"management.address\", \":8001\")\n\n\t// ServiceLoader\n\tv.SetDefault(\"serviceloader.serviceConfigLocation\", \"./configs\")\n\tv.SetDefault(\"serviceloader.serviceConfigName\", \"services\")\n\tv.SetDefault(\"serviceloader.format\", \"yaml\")\n\n\t// CloudInfoStore\n\t// Redis product store\n\tv.SetDefault(\"store.redis.enabled\", false)\n\tv.SetDefault(\"store.redis.host\", \"localhost\")\n\tv.SetDefault(\"store.redis.port\", 6379)\n\n\t// Cassandra product store\n\tv.SetDefault(\"store.cassandra.enabled\", false)\n\tv.SetDefault(\"store.cassandra.hosts\", \"localhost\")\n\tv.SetDefault(\"store.cassandra.port\", 9042)\n\tv.SetDefault(\"store.cassandra.keyspace\", \"cloudinfo\")\n\tv.SetDefault(\"store.cassandra.table\", \"products\")\n\n\t// InMemory product store\n\tv.SetDefault(\"store.gocache.expiration\", 0)\n\tv.SetDefault(\"store.gocache.cleanupInterval\", 0)\n}", "title": "" }, { "docid": "5b695f01faad2bbe727d30644190e2ff", "score": "0.4867822", "text": "func SetupAgent(instance *Agent, info IAgentInfo, waitTimeout time.Duration, connectTimeout time.Duration, readBufferSize int, autoReconnect bool) {\n instance.info = info\n instance.wait = waitTimeout\n instance.connectTimeout = connectTimeout\n instance.bufferSize = readBufferSize\n instance.autoReconnect = autoReconnect\n}", "title": "" }, { "docid": "e6ca588118e4ee4fce49ceb198e5e3ac", "score": "0.4776362", "text": "func ConfigureAndAdvertise(address *models.AddressConfig, service *models.ServiceConfig) {\n\tprint(\"Starting configuration -- announcing discovery\")\n\n\tvar (\n\t\tgRPCAddr = flag.String(\"grpc-health\", \"\"+address.AdvertiseAddr+\":\"+address.AdvertiseHealthPort,\n\t\t\t\"gRPC listen address\")\n\t)\n\tflag.Parse()\n\n\t// Register Service to Consul\n\tregistar := token_consul.RegisterService(address.ConsulAddr,\n\t\taddress.ConsulPort,\n\t\taddress.AdvertiseAddr,\n\t\taddress.AdvertisePort,\n\t\taddress.AdvertiseHealthPort,\n\t\tservice.ID, service.Name, service.Tags)\n\n\tctx := context.Background()\n\n\tvar svcH health_grpc.Health\n\tsvcH = health_grpc.HealthService{}\n\t// svcH = health_grpc.LoggingMiddlewareHealth(logger)(svcH)\n\n\tcheck := health_grpc.MakeHealthServiceCheckEndpoint(svcH)\n\twatch := health_grpc.MakeHealthServiceWatchEndpoint(svcH)\n\n\t// check = health_grpc.NewTokenBucketLimitter(rlbucket)(check)\n\tendpointsHealth := health_grpc.EndpointsConsul{\n\t\tConsulHealthCheckEndpoint: check,\n\t\tConsulHealthWatchEndpoint: watch,\n\t}\n\n\tgo func() {\n\t\tfmt.Println(\"starting healthcheck grpc server\")\n\t\tlistener, err := net.Listen(\"tcp\", *gRPCAddr)\n\t\tif err != nil {\n\t\t\tErrChanHC <- err\n\t\t\treturn\n\t\t}\n\t\thandler := health_grpc.NewGRPCServerHealth(ctx, endpointsHealth)\n\t\tgRPCServer := grpc.NewServer()\n\t\thc.RegisterHealthServer(gRPCServer, handler)\n\t\tregistar.Register()\n\t\tfmt.Printf(\"Service info %v\", gRPCServer.GetServiceInfo())\n\t\tErrChanHC <- gRPCServer.Serve(listener)\n\t}()\n\n\tgo func() {\n\t\tc := make(chan os.Signal, 1)\n\t\tsignal.Notify(c, syscall.SIGINT, syscall.SIGTERM)\n\t\tErrChanHC <- fmt.Errorf(\"%s\", <-c)\n\t}()\n\n\terror := <-ErrChanHC\n\t// deregister service on exit\n\tregistar.Deregister()\n\n\tlog.Fatalln(error)\n\n}", "title": "" }, { "docid": "6bef0df346a55ca2e338f00f7689bf2b", "score": "0.47481462", "text": "func NewDefaultAgentConfig() *AgentConfig {\n\thostname, err := getHostname()\n\tif err != nil {\n\t\thostname = \"\"\n\t}\n\tac := &AgentConfig{\n\t\tEnabled: true,\n\t\tHostName: hostname,\n\t\tDefaultEnv: \"none\",\n\t\tAPIEndpoint: \"https://trace.agent.datadoghq.com\",\n\t\tAPIKey: \"\",\n\t\tAPIEnabled: true,\n\t\tAPIPayloadBufferMaxSize: 16 * 1024 * 1024,\n\n\t\tBucketInterval: time.Duration(10) * time.Second,\n\t\tExtraAggregators: []string{\"http.status_code\"},\n\n\t\tExtraSampleRate: 1.0,\n\t\tPreSampleRate: 1.0,\n\t\tMaxTPS: 10,\n\n\t\tReceiverHost: \"localhost\",\n\t\tReceiverPort: 8126,\n\t\tConnectionLimit: 2000,\n\n\t\tServiceWriterConfig: writerconfig.DefaultServiceWriterConfig(),\n\t\tStatsWriterConfig: writerconfig.DefaultStatsWriterConfig(),\n\t\tTraceWriterConfig: writerconfig.DefaultTraceWriterConfig(),\n\n\t\tStatsdHost: \"localhost\",\n\t\tStatsdPort: 8125,\n\n\t\tLogLevel: \"INFO\",\n\t\tLogFilePath: DefaultLogFilePath,\n\t\tLogThrottlingEnabled: true,\n\n\t\tMaxMemory: 5e8, // 500 Mb, should rarely go above 50 Mb\n\t\tMaxCPU: 0.5, // 50%, well behaving agents keep below 5%\n\t\tMaxConnections: 200, // in practice, rarely goes over 20\n\t\tWatchdogInterval: time.Minute,\n\n\t\tIgnore: make(map[string][]string),\n\t\tAnalyzedRateByService: make(map[string]float64),\n\t}\n\n\treturn ac\n}", "title": "" }, { "docid": "a104ea4e872d6b4ab46cbdefaecae593", "score": "0.4727614", "text": "func NewDatadogAgent(ns, name string, globalOverride *v2alpha1.GlobalConfig) *v2alpha1.DatadogAgent {\n\tdda := &v2alpha1.DatadogAgent{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tKind: \"DatadogAgent\",\n\t\t\tAPIVersion: apiVersion,\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tNamespace: ns,\n\t\t\tName: name,\n\t\t\tLabels: map[string]string{},\n\t\t\tFinalizers: []string{\"finalizer.agent.datadoghq.com\"},\n\t\t},\n\t\tSpec: v2alpha1.DatadogAgentSpec{\n\t\t\tGlobal: &v2alpha1.GlobalConfig{\n\t\t\t\tCredentials: defaultCredentials(),\n\t\t\t},\n\t\t},\n\t}\n\n\tif globalOverride != nil {\n\t\tdda.Spec.Global = globalOverride\n\t}\n\treturn dda\n}", "title": "" }, { "docid": "067f9ff97da1584045517d6a791944e9", "score": "0.47025904", "text": "func (c *Command) setupAgent(config *Config, logOutput io.Writer) error {\n\tc.Ui.Output(\"Starting Nomad agent...\")\n\tagent, err := NewAgent(config, logOutput)\n\tif err != nil {\n\t\tc.Ui.Error(fmt.Sprintf(\"Error starting agent: %s\", err))\n\t\treturn err\n\t}\n\tc.agent = agent\n\n\t// Enable the SCADA integration\n\tif err := c.setupSCADA(config); err != nil {\n\t\tagent.Shutdown()\n\t\tc.Ui.Error(fmt.Sprintf(\"Error starting SCADA: %s\", err))\n\t\treturn err\n\t}\n\n\t// Setup the HTTP server\n\thttp, err := NewHTTPServer(agent, config, logOutput)\n\tif err != nil {\n\t\tagent.Shutdown()\n\t\tc.Ui.Error(fmt.Sprintf(\"Error starting http server: %s\", err))\n\t\treturn err\n\t}\n\tc.httpServer = http\n\n\t// Setup update checking\n\tif !config.DisableUpdateCheck {\n\t\tversion := config.Version\n\t\tif config.VersionPrerelease != \"\" {\n\t\t\tversion += fmt.Sprintf(\"-%s\", config.VersionPrerelease)\n\t\t}\n\t\tupdateParams := &checkpoint.CheckParams{\n\t\t\tProduct: \"nomad\",\n\t\t\tVersion: version,\n\t\t}\n\t\tif !config.DisableAnonymousSignature {\n\t\t\tupdateParams.SignatureFile = filepath.Join(config.DataDir, \"checkpoint-signature\")\n\t\t}\n\n\t\t// Schedule a periodic check with expected interval of 24 hours\n\t\tcheckpoint.CheckInterval(updateParams, 24*time.Hour, c.checkpointResults)\n\n\t\t// Do an immediate check within the next 30 seconds\n\t\tgo func() {\n\t\t\ttime.Sleep(randomStagger(30 * time.Second))\n\t\t\tc.checkpointResults(checkpoint.Check(updateParams))\n\t\t}()\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4d63c0e2e63fc706de392f53f207191e", "score": "0.47003317", "text": "func NewDatadogAgentWithAdmissionController(namespace string, name string) v2alpha1.DatadogAgent {\n\treturn newDatadogAgentWithFeatures(\n\t\tnamespace,\n\t\tname,\n\t\t&v2alpha1.DatadogFeatures{\n\t\t\tAdmissionController: &v2alpha1.AdmissionControllerFeatureConfig{\n\t\t\t\tEnabled: apiutils.NewBoolPointer(true),\n\t\t\t\tMutateUnlabelled: apiutils.NewBoolPointer(true),\n\t\t\t},\n\t\t},\n\t)\n}", "title": "" }, { "docid": "819825bed260f781dbe120e3db737199", "score": "0.4691738", "text": "func NewDatadogAgentWithAPM(namespace string, name string) v2alpha1.DatadogAgent {\n\treturn newDatadogAgentWithFeatures(\n\t\tnamespace,\n\t\tname,\n\t\t&v2alpha1.DatadogFeatures{\n\t\t\tAPM: &v2alpha1.APMFeatureConfig{\n\t\t\t\tEnabled: apiutils.NewBoolPointer(true),\n\t\t\t\tHostPortConfig: &v2alpha1.HostPortConfig{\n\t\t\t\t\tEnabled: apiutils.NewBoolPointer(true),\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t)\n}", "title": "" }, { "docid": "4e80dd2ec75ba334b19477e89083973e", "score": "0.46803597", "text": "func (d *defaultGameDelegate) ConfigureAgents() []Agent {\n\treturn nil\n}", "title": "" }, { "docid": "2ed82ee01a1453e641aa9e4f3f4daa49", "score": "0.46775132", "text": "func New(c *component.Component, conf *Config, opts ...Option) (*Agent, error) {\n\tctx := log.NewContextWithField(c.Context(), \"namespace\", \"packetbrokeragent\")\n\tlogger := log.FromContext(ctx)\n\n\tvar devAddrPrefixes []types.DevAddrPrefix\n\tif conf.HomeNetwork.Enable {\n\t\tdevAddrPrefixes = append(devAddrPrefixes, conf.HomeNetwork.DevAddrPrefixes...)\n\t\tif len(devAddrPrefixes) == 0 {\n\t\t\tdevAddr, err := types.NewDevAddr(conf.NetID, nil)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, errNetID.WithAttributes(\"net_id\", conf.NetID).WithCause(err)\n\t\t\t}\n\t\t\tdevAddrPrefix := types.DevAddrPrefix{\n\t\t\t\tDevAddr: devAddr,\n\t\t\t\tLength: uint8(conf.NetID.IDBits()),\n\t\t\t}\n\t\t\tdevAddrPrefixes = append(devAddrPrefixes, devAddrPrefix)\n\t\t}\n\t}\n\n\tvar authenticator authenticator\n\tswitch mode := conf.AuthenticationMode; mode {\n\tcase \"oauth2\":\n\t\tvar tlsConfig tlsConfigurator\n\t\tif !conf.Insecure {\n\t\t\ttlsConfig = c\n\t\t}\n\t\tauthenticator = newOAuth2(ctx, conf.OAuth2, tlsConfig)\n\t}\n\n\thomeNetworkClusterID := conf.HomeNetworkClusterID\n\tif homeNetworkClusterID == \"\" {\n\t\thomeNetworkClusterID = conf.ClusterID\n\t}\n\ta := &Agent{\n\t\tComponent: c,\n\t\tctx: ctx,\n\t\tdataPlaneAddress: conf.DataPlaneAddress,\n\t\tnetID: conf.NetID,\n\t\tsubscriptionTenantID: conf.TenantID,\n\t\tclusterID: conf.ClusterID,\n\t\thomeNetworkClusterID: homeNetworkClusterID,\n\t\tauthenticator: authenticator,\n\t\tforwarderConfig: conf.Forwarder,\n\t\thomeNetworkConfig: conf.HomeNetwork,\n\t\tdevAddrPrefixes: devAddrPrefixes,\n\t\ttenantIDExtractor: func(_ context.Context) string {\n\t\t\treturn conf.TenantID\n\t\t},\n\t\tregistrationInfoExtractor: func(_ context.Context, homeNetworkClusterID string) (*RegistrationInfo, error) {\n\t\t\tblocks := make([]*ttnpb.PacketBrokerDevAddrBlock, len(devAddrPrefixes))\n\t\t\tfor i, p := range devAddrPrefixes {\n\t\t\t\tblocks[i] = &ttnpb.PacketBrokerDevAddrBlock{\n\t\t\t\t\tDevAddrPrefix: &ttnpb.DevAddrPrefix{\n\t\t\t\t\t\tDevAddr: &p.DevAddr,\n\t\t\t\t\t\tLength: uint32(p.Length),\n\t\t\t\t\t},\n\t\t\t\t\tHomeNetworkClusterId: homeNetworkClusterID,\n\t\t\t\t}\n\t\t\t}\n\t\t\tcontactInfo := make([]*ttnpb.ContactInfo, 0, 2)\n\t\t\tif adminContact := conf.Registration.AdministrativeContact.ContactInfo(ttnpb.CONTACT_TYPE_OTHER); adminContact != nil {\n\t\t\t\tcontactInfo = append(contactInfo, adminContact)\n\t\t\t}\n\t\t\tif techContact := conf.Registration.TechnicalContact.ContactInfo(ttnpb.CONTACT_TYPE_TECHNICAL); techContact != nil {\n\t\t\t\tcontactInfo = append(contactInfo, techContact)\n\t\t\t}\n\t\t\treturn &RegistrationInfo{\n\t\t\t\tName: conf.Registration.Name,\n\t\t\t\tDevAddrBlocks: blocks,\n\t\t\t\tContactInfo: contactInfo,\n\t\t\t\tListed: conf.Registration.Listed,\n\t\t\t}, nil\n\t\t},\n\t}\n\n\tif a.forwarderConfig.Enable {\n\t\ta.upstreamCh = make(chan *uplinkMessage, upstreamBufferSize)\n\t\tif a.forwarderConfig.WorkerPool.Limit <= 1 {\n\t\t\ta.forwarderConfig.WorkerPool.Limit = 2\n\t\t}\n\t\tif len(a.forwarderConfig.TokenKey) == 0 {\n\t\t\ta.forwarderConfig.TokenKey = random.Bytes(16)\n\t\t\tlogger.WithField(\"token_key\", hex.EncodeToString(a.forwarderConfig.TokenKey)).Warn(\"No token key configured, generated a random one\")\n\t\t}\n\t\tvar (\n\t\t\tenc jose.ContentEncryption\n\t\t\talg jose.KeyAlgorithm\n\t\t)\n\t\tswitch l := len(a.forwarderConfig.TokenKey); l {\n\t\tcase 16:\n\t\t\tenc, alg = jose.A128GCM, jose.A128GCMKW\n\t\tcase 32:\n\t\t\tenc, alg = jose.A256GCM, jose.A256GCMKW\n\t\tdefault:\n\t\t\treturn nil, errTokenKey.WithAttributes(\"length\", l).New()\n\t\t}\n\t\tvar err error\n\t\ta.forwarderConfig.TokenEncrypter, err = jose.NewEncrypter(enc, jose.Recipient{\n\t\t\tAlgorithm: alg,\n\t\t\tKey: a.forwarderConfig.TokenKey,\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn nil, errTokenKey.WithCause(err)\n\t\t}\n\t}\n\n\tif a.homeNetworkConfig.Enable {\n\t\ta.downstreamCh = make(chan *downlinkMessage, downstreamBufferSize)\n\t\tif a.homeNetworkConfig.WorkerPool.Limit <= 1 {\n\t\t\ta.homeNetworkConfig.WorkerPool.Limit = 2\n\t\t}\n\t}\n\n\tfor _, opt := range opts {\n\t\topt(a)\n\t}\n\tif a.authenticator == nil {\n\t\treturn nil, errAuthenticationMode.WithAttributes(\"mode\", conf.AuthenticationMode)\n\t}\n\n\tif a.forwarderConfig.Enable || a.homeNetworkConfig.Enable {\n\t\tiamConn, err := a.dialContext(ctx, conf.IAMAddress)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tcpConn, err := a.dialContext(ctx, conf.ControlPlaneAddress)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ta.grpc.pba = &pbaServer{\n\t\t\tAgent: a,\n\t\t\tiamConn: iamConn,\n\t\t\tcpConn: cpConn,\n\t\t}\n\t} else {\n\t\ta.grpc.pba = &disabledServer{}\n\t}\n\tif a.forwarderConfig.Enable {\n\t\tmapperConn, err := a.dialContext(ctx, conf.MapperAddress)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ta.grpc.gsPba = &gsPbaServer{\n\t\t\tnetID: a.netID,\n\t\t\tclusterID: a.clusterID,\n\t\t\tconfig: a.forwarderConfig,\n\t\t\tmessageEncrypter: a,\n\t\t\tcontextDecoupler: a,\n\t\t\ttenantIDExtractor: a.tenantIDExtractor,\n\t\t\tfrequencyPlansStore: a.FrequencyPlans,\n\t\t\tupstreamCh: a.upstreamCh,\n\t\t\tmapperConn: mapperConn,\n\t\t}\n\t} else {\n\t\ta.grpc.gsPba = &disabledServer{}\n\t}\n\tif a.homeNetworkConfig.Enable {\n\t\ta.grpc.nsPba = &nsPbaServer{\n\t\t\tcontextDecoupler: a,\n\t\t\tdownstreamCh: a.downstreamCh,\n\t\t\tfrequencyPlans: a.FrequencyPlans,\n\t\t}\n\t} else {\n\t\ta.grpc.nsPba = &disabledServer{}\n\t}\n\n\tnewTaskConfig := func(id string, fn component.TaskFunc) *component.TaskConfig {\n\t\treturn &component.TaskConfig{\n\t\t\tContext: c.Context(),\n\t\t\tID: id,\n\t\t\tFunc: fn,\n\t\t\tRestart: component.TaskRestartOnFailure,\n\t\t\tBackoff: component.DialTaskBackoffConfig,\n\t\t}\n\t}\n\tif a.forwarderConfig.Enable && a.dataPlaneAddress != \"\" {\n\t\tc.RegisterTask(newTaskConfig(\"pb_publish_uplink\", a.publishUplink))\n\t\tc.RegisterTask(newTaskConfig(\"pb_subscribe_downlink\", a.subscribeDownlink))\n\t}\n\tif a.homeNetworkConfig.Enable && a.dataPlaneAddress != \"\" {\n\t\tc.RegisterTask(newTaskConfig(\"pb_subscribe_uplink\", a.subscribeUplink))\n\t\tc.RegisterTask(newTaskConfig(\"pb_publish_downlink\", a.publishDownlink))\n\t}\n\n\thooks.RegisterUnaryHook(\"/ttn.lorawan.v3.GsPba\", cluster.HookName, c.ClusterAuthUnaryHook())\n\thooks.RegisterUnaryHook(\"/ttn.lorawan.v3.NsPba\", cluster.HookName, c.ClusterAuthUnaryHook())\n\n\tc.RegisterGRPC(a)\n\treturn a, nil\n}", "title": "" }, { "docid": "aa1cdeb6a15a6c0890d2a2bcc8252c00", "score": "0.4660959", "text": "func Setup(envPrefix string) {\n\tviper.SetDefault(configLogLevel, logrus.ErrorLevel)\n\tviper.SetDefault(configLogIndex, \"log\")\n\tviper.SetDefault(configElasticsearchURL, \"http://localhost:9200\")\n\tviper.SetDefault(configElasticsearchUser, \"\")\n\tviper.SetDefault(configElasticsearchPassword, \"\")\n\tviper.SetDefault(configTLSSkipVerify, true)\n\tviper.SetDefault(configIgnoreURLs, \"\")\n\tviper.SetDefault(configElasticsearchSniff, false)\n\tviper.SetDefault(configElasticsearchMetricsIndex, \"metrics\")\n\n\thostName := filepath.Base(os.Args[0])\n\tif runtime.GOOS == \"windows\" {\n\t\thostName = strings.TrimSuffix(hostName, filepath.Ext(hostName))\n\t}\n\n\tviper.SetDefault(configHostName, hostName)\n\n\tviper.SetEnvPrefix(envPrefix)\n\tviper.AutomaticEnv()\n}", "title": "" }, { "docid": "04db5ba0ffb3915c61af2f3812a26b2a", "score": "0.4657777", "text": "func (c *Command) setupAgent(config *Config, logger hclog.InterceptLogger, logOutput io.Writer, inmem *metrics.InmemSink) error {\n\tc.Ui.Output(\"Starting Nomad agent...\")\n\n\tagent, err := NewAgent(config, logger, logOutput, inmem)\n\tif err != nil {\n\t\t// log the error as well, so it appears at the end\n\t\tlogger.Error(\"error starting agent\", \"error\", err)\n\t\tc.Ui.Error(fmt.Sprintf(\"Error starting agent: %s\", err))\n\t\treturn err\n\t}\n\tc.agent = agent\n\n\t// Setup the HTTP server\n\thttpServers, err := NewHTTPServers(agent, config)\n\tif err != nil {\n\t\tagent.Shutdown()\n\t\tc.Ui.Error(fmt.Sprintf(\"Error starting http server: %s\", err))\n\t\treturn err\n\t}\n\tc.httpServers = httpServers\n\n\t// If DisableUpdateCheck is not enabled, set up update checking\n\t// (DisableUpdateCheck is false by default)\n\tif config.DisableUpdateCheck != nil && !*config.DisableUpdateCheck {\n\t\tversion := config.Version.Version\n\t\tif config.Version.VersionPrerelease != \"\" {\n\t\t\tversion += fmt.Sprintf(\"-%s\", config.Version.VersionPrerelease)\n\t\t}\n\t\tupdateParams := &checkpoint.CheckParams{\n\t\t\tProduct: \"nomad\",\n\t\t\tVersion: version,\n\t\t}\n\t\tif !config.DisableAnonymousSignature {\n\t\t\tupdateParams.SignatureFile = filepath.Join(config.DataDir, \"checkpoint-signature\")\n\t\t}\n\n\t\t// Schedule a periodic check with expected interval of 24 hours\n\t\tcheckpoint.CheckInterval(updateParams, 24*time.Hour, c.checkpointResults)\n\n\t\t// Do an immediate check within the next 30 seconds\n\t\tgo func() {\n\t\t\ttime.Sleep(helper.RandomStagger(30 * time.Second))\n\t\t\tc.checkpointResults(checkpoint.Check(updateParams))\n\t\t}()\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "22287f82063746f8071a7cfbe9ac9e45", "score": "0.4652112", "text": "func configure() {\n\n\tconst service = \"device-rest\"\n\n\tlog.SetComponentName(\"configure\")\n\n\t// read and handle config\n\tenvJSON, err := cli.Config(hooks.EnvConfig)\n\tif err != nil {\n\t\tlog.Fatalf(\"Reading config 'env' failed: %v\", err)\n\t}\n\tif envJSON != \"\" {\n\t\thooks.Debug(fmt.Sprintf(\"envJSON: %s\", envJSON))\n\t\terr = hooks.HandleEdgeXConfig(service, envJSON, ConfToEnv)\n\t\tif err != nil {\n\t\t\tlog.Fatalf(\"HandleEdgeXConfig failed: %v\", err)\n\t\t}\n\t}\n\n\t// If autostart is not explicitly set, default to \"no\"\n\t// as only example service configuration and profiles\n\t// are provided by default.\n\tautostart, err := snapctl.Get(\"autostart\").Run()\n\tif err != nil {\n\t\tlog.Fatalf(\"Reading config 'autostart' failed: %v\", err)\n\t}\n\tif autostart == \"\" {\n\t\tlog.Debug(\"autostart is NOT set, initializing to 'no'\")\n\t\tautostart = \"no\"\n\t}\n\tautostart = strings.ToLower(autostart)\n\tlog.Debugf(\"autostart=%s\", autostart)\n\n\t// services are stopped/disabled by default in the install hook\n\tswitch autostart {\n\tcase \"true\", \"yes\":\n\t\terr = snapctl.Start(service).Enable().Run()\n\t\tif err != nil {\n\t\t\tlog.Fatalf(\"Can't start service: %s\", err)\n\t\t}\n\tcase \"false\", \"no\":\n\t\t// no action necessary\n\tdefault:\n\t\tlog.Fatalf(\"Invalid value for 'autostart': %s\", autostart)\n\t}\n\n\tlog.Info(\"Processing options\")\n\terr = options.ProcessAppConfig(service)\n\tif err != nil {\n\t\tlog.Fatalf(\"could not process options: %v\", err)\n\t}\n}", "title": "" }, { "docid": "b8b6eeaf5555e1043a6f206695507e03", "score": "0.46169883", "text": "func Configure(basePath string, flags cmd.PersistentFlags, delegationFlags cmd.DelegationFlags) (err error) {\n\tconfigPath := filepath.Join(basePath, \"config.yml\")\n\tif err = loadYamlConfig(configPath); err != nil {\n\t\treturn err\n\t}\n\n\tif Configuration.BasePath == \"\" {\n\t\tConfiguration.BasePath = basePath\n\t}\n\n\tConfiguration.Application.Verbose = true\n\tsdkNetwork.Verbose = flags.Verbose\n\tgoSdkCommon.DebugRPC = flags.VerboseGoSdk\n\n\t// It's very important that configureTransactionsConfig gets executed first since it sets config fields that are later used by other configuration steps\n\tif err = configureDelegationConfig(flags, delegationFlags); err != nil {\n\t\treturn err\n\t}\n\n\tif err = configureNetworkConfig(flags, delegationFlags); err != nil {\n\t\treturn err\n\t}\n\n\tif err = configureAccountConfig(flags, delegationFlags); err != nil {\n\t\treturn err\n\t}\n\n\tif err = configureFundingConfig(flags, delegationFlags); err != nil {\n\t\treturn err\n\t}\n\n\ttfConfig.ConfigureStylingConfig()\n\n\treturn nil\n}", "title": "" }, { "docid": "4f4dc6a7c92aaa6aa893b481fe5b377e", "score": "0.46140087", "text": "func New(config *Config) (*Agent, error) {\n\terr := config.validate()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"configuration error: %s\", err)\n\t}\n\n\tawsSession := session.New()\n\n\t// Try to determine the AWS region using the following sources:\n\t// - Supplied Agent configuration\n\t// - Environment variable (AWS_REGION)\n\t// - EC2 metadata of current host\n\tif config.Region != \"\" {\n\t\tawsSession.Config.Region = aws.String(config.Region)\n\t} else if region := os.Getenv(awsRegionEnv); region != \"\" {\n\t\tawsSession.Config.Region = aws.String(region)\n\t} else {\n\t\tregion, err := getRegion(awsSession)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tawsSession.Config.Region = aws.String(region)\n\t}\n\n\t// Configure dimensions to aggregate by when reporting metrics\n\tdimensions := make(map[string]string)\n\tif config.Hostname != \"\" {\n\t\tdimensions[hostnameDimensionKey] = config.Hostname\n\t} else {\n\t\tinstanceID, err := getInstanceID(awsSession)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tdimensions[instanceIDDimensionKey] = instanceID\n\n\t\tif config.AutoScaling {\n\t\t\tautoScalingGroup, err := getAutoScalingGroup(awsSession, instanceID)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tdimensions[autoScalingGroupDimensionKey] = autoScalingGroup\n\t\t}\n\t}\n\n\treturn &Agent{\n\t\tconfig: config,\n\t\tbaseDimensions: dimensions,\n\t\tsvc: cloudwatch.New(awsSession),\n\t}, nil\n}", "title": "" }, { "docid": "07e381cbaf53ad9bac216a5b53139c16", "score": "0.4611423", "text": "func (r *AgentServiceConfigReconciler) SetupWithManager(mgr ctrl.Manager) error {\n\tingressCMPredicates := builder.WithPredicates(predicate.Funcs{\n\t\tCreateFunc: func(e event.CreateEvent) bool { return checkIngressCMName(e.Object) },\n\t\tUpdateFunc: func(e event.UpdateEvent) bool { return checkIngressCMName(e.ObjectNew) },\n\t\tDeleteFunc: func(e event.DeleteEvent) bool { return checkIngressCMName(e.Object) },\n\t\tGenericFunc: func(e event.GenericEvent) bool { return checkIngressCMName(e.Object) },\n\t})\n\tingressCMHandler := handler.EnqueueRequestsFromMapFunc(\n\t\tfunc(_ client.Object) []reconcile.Request {\n\t\t\treturn []reconcile.Request{{NamespacedName: types.NamespacedName{Name: agentServiceConfigName}}}\n\t\t},\n\t)\n\n\treturn ctrl.NewControllerManagedBy(mgr).\n\t\tFor(&aiv1beta1.AgentServiceConfig{}).\n\t\tOwns(&corev1.PersistentVolumeClaim{}).\n\t\tOwns(&monitoringv1.ServiceMonitor{}).\n\t\tOwns(&corev1.Service{}).\n\t\tOwns(&corev1.ServiceAccount{}).\n\t\tOwns(&corev1.Secret{}).\n\t\tOwns(&routev1.Route{}).\n\t\tOwns(&appsv1.Deployment{}).\n\t\tOwns(&appsv1.StatefulSet{}).\n\t\tOwns(&corev1.ConfigMap{}).\n\t\tOwns(&rbacv1.ClusterRoleBinding{}).\n\t\tOwns(&rbacv1.ClusterRole{}).\n\t\tOwns(&apiregv1.APIService{}).\n\t\tWatches(&source.Kind{Type: &corev1.ConfigMap{}}, ingressCMHandler, ingressCMPredicates).\n\t\tComplete(r)\n}", "title": "" }, { "docid": "54eddf150c1bd374fe5593232541be1f", "score": "0.45998138", "text": "func UseAgent(u bool) Option {\n\treturn func(c *Config) error {\n\t\tc.useAgent = u\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "54eddf150c1bd374fe5593232541be1f", "score": "0.45998138", "text": "func UseAgent(u bool) Option {\n\treturn func(c *Config) error {\n\t\tc.useAgent = u\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "92d5ec1fd5e9304ad8a245b169d54f86", "score": "0.45889834", "text": "func main() {\n\t// Agent 1 datasync plugin\n\tserviceLabel1 := servicelabel.NewPlugin(servicelabel.UseLabel(agent1))\n\tserviceLabel1.SetName(agent1)\n\tetcdDataSyncAgent1 := kvdbsync.NewPlugin(kvdbsync.UseKV(&etcd.DefaultPlugin), kvdbsync.UseDeps(func(deps *kvdbsync.Deps) {\n\t\tdeps.Log = logging.ForPlugin(agent1)\n\t\tdeps.ServiceLabel = serviceLabel1\n\t}))\n\tetcdDataSyncAgent1.SetName(\"etcd-datasync-\" + agent1)\n\n\t// Agent 2 datasync plugin\n\tserviceLabel2 := servicelabel.NewPlugin(servicelabel.UseLabel(agent2))\n\tserviceLabel2.SetName(agent2)\n\tetcdDataSyncAgent2 := kvdbsync.NewPlugin(kvdbsync.UseKV(&etcd.DefaultPlugin), kvdbsync.UseDeps(func(deps *kvdbsync.Deps) {\n\t\tdeps.Log = logging.ForPlugin(agent2)\n\t\tdeps.ServiceLabel = serviceLabel2\n\t}))\n\tetcdDataSyncAgent2.SetName(\"etcd-datasync-\" + agent2)\n\n\t// Example plugin datasync\n\tetcdDataSync := kvdbsync.NewPlugin(kvdbsync.UseKV(&etcd.DefaultPlugin))\n\n\t// VPP plugin\n\twatcher := datasync.KVProtoWatchers{\n\t\tetcdDataSync,\n\t}\n\tvppPlugin := vpp.NewPlugin(vpp.UseDeps(func(deps *vpp.Deps) {\n\t\tdeps.Watcher = watcher\n\t}))\n\n\t// Inject dependencies to example plugin\n\tep := &ExamplePlugin{\n\t\texampleFinished: make(chan struct{}),\n\t\tDeps: Deps{\n\t\t\tLog: logging.DefaultLogger,\n\t\t\tETCDDataSync: etcdDataSync,\n\t\t\tVPP: vppPlugin,\n\t\t\tAgent1: etcdDataSyncAgent1,\n\t\t\tAgent2: etcdDataSyncAgent2,\n\t\t},\n\t}\n\n\t// Start Agent\n\ta := agent.NewAgent(\n\t\tagent.AllPlugins(ep),\n\t\tagent.QuitOnClose(ep.exampleFinished),\n\t)\n\tif err := a.Run(); err != nil {\n\t\tlog.Fatal()\n\t}\n}", "title": "" }, { "docid": "92d5ec1fd5e9304ad8a245b169d54f86", "score": "0.45889834", "text": "func main() {\n\t// Agent 1 datasync plugin\n\tserviceLabel1 := servicelabel.NewPlugin(servicelabel.UseLabel(agent1))\n\tserviceLabel1.SetName(agent1)\n\tetcdDataSyncAgent1 := kvdbsync.NewPlugin(kvdbsync.UseKV(&etcd.DefaultPlugin), kvdbsync.UseDeps(func(deps *kvdbsync.Deps) {\n\t\tdeps.Log = logging.ForPlugin(agent1)\n\t\tdeps.ServiceLabel = serviceLabel1\n\t}))\n\tetcdDataSyncAgent1.SetName(\"etcd-datasync-\" + agent1)\n\n\t// Agent 2 datasync plugin\n\tserviceLabel2 := servicelabel.NewPlugin(servicelabel.UseLabel(agent2))\n\tserviceLabel2.SetName(agent2)\n\tetcdDataSyncAgent2 := kvdbsync.NewPlugin(kvdbsync.UseKV(&etcd.DefaultPlugin), kvdbsync.UseDeps(func(deps *kvdbsync.Deps) {\n\t\tdeps.Log = logging.ForPlugin(agent2)\n\t\tdeps.ServiceLabel = serviceLabel2\n\t}))\n\tetcdDataSyncAgent2.SetName(\"etcd-datasync-\" + agent2)\n\n\t// Example plugin datasync\n\tetcdDataSync := kvdbsync.NewPlugin(kvdbsync.UseKV(&etcd.DefaultPlugin))\n\n\t// VPP plugin\n\twatcher := datasync.KVProtoWatchers{\n\t\tetcdDataSync,\n\t}\n\tvppPlugin := vpp.NewPlugin(vpp.UseDeps(func(deps *vpp.Deps) {\n\t\tdeps.Watcher = watcher\n\t}))\n\n\t// Inject dependencies to example plugin\n\tep := &ExamplePlugin{\n\t\texampleFinished: make(chan struct{}),\n\t\tDeps: Deps{\n\t\t\tLog: logging.DefaultLogger,\n\t\t\tETCDDataSync: etcdDataSync,\n\t\t\tVPP: vppPlugin,\n\t\t\tAgent1: etcdDataSyncAgent1,\n\t\t\tAgent2: etcdDataSyncAgent2,\n\t\t},\n\t}\n\n\t// Start Agent\n\ta := agent.NewAgent(\n\t\tagent.AllPlugins(ep),\n\t\tagent.QuitOnClose(ep.exampleFinished),\n\t)\n\tif err := a.Run(); err != nil {\n\t\tlog.Fatal()\n\t}\n}", "title": "" }, { "docid": "81acdafe54af4f45f563fe72da755abe", "score": "0.4574908", "text": "func (c *Control) Configure(ctx context.Context) error {\n\tdnsClient := &Client{\n\t\tkubeClient: xclient{\n\t\t\txdep: xdep{\n\t\t\t\tget: func(ctx context.Context, ns, name string) (*appsv1.Deployment, error) {\n\t\t\t\t\tvar v appsv1.Deployment\n\t\t\t\t\tif err := c.Get(ctx, types.NamespacedName{}, &v); err != nil {\n\t\t\t\t\t\treturn nil, err\n\t\t\t\t\t}\n\t\t\t\t\treturn &v, nil\n\t\t\t\t},\n\t\t\t\tupdate: func(ctx context.Context, ns string, m *appsv1.Deployment) (*appsv1.Deployment, error) {\n\t\t\t\t\tif err := c.Update(ctx, m); err != nil {\n\t\t\t\t\t\treturn nil, err\n\t\t\t\t\t}\n\t\t\t\t\treturn m, nil\n\t\t\t\t},\n\t\t\t},\n\t\t\txmap: xmap{\n\t\t\t\tget: func(ctx context.Context, ns, name string) (*corev1.ConfigMap, error) {\n\t\t\t\t\tvar v corev1.ConfigMap\n\t\t\t\t\tif err := c.Get(ctx, types.NamespacedName{}, &v); err != nil {\n\t\t\t\t\t\treturn nil, err\n\t\t\t\t\t}\n\t\t\t\t\treturn &v, nil\n\t\t\t\t},\n\t\t\t\tupdate: func(ctx context.Context, ns string, m *corev1.ConfigMap) (*corev1.ConfigMap, error) {\n\t\t\t\t\tif err := c.Update(ctx, m); err != nil {\n\t\t\t\t\t\treturn nil, err\n\t\t\t\t\t}\n\t\t\t\t\treturn m, nil\n\t\t\t\t},\n\t\t\t\tcreate: func(ctx context.Context, ns string, m *corev1.ConfigMap) (*corev1.ConfigMap, error) {\n\t\t\t\t\tif err := c.Create(ctx, m); err != nil {\n\t\t\t\t\t\treturn nil, err\n\t\t\t\t\t}\n\t\t\t\t\treturn m, nil\n\t\t\t\t},\n\t\t\t},\n\t\t\txsvc: xsvc{\n\t\t\t\tget: func(ctx context.Context, ns, name string) (*corev1.Service, error) {\n\t\t\t\t\tvar v corev1.Service\n\t\t\t\t\tif err := c.Get(ctx, types.NamespacedName{}, &v); err != nil {\n\t\t\t\t\t\treturn nil, err\n\t\t\t\t\t}\n\t\t\t\t\treturn &v, nil\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t\tlogger: c.Log,\n\t}\n\n\tdnsProvider, err := dnsClient.CheckDNSProvider(ctx)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"unable to find suitable DNS provider: %w\", err)\n\t}\n\n\tswitch dnsProvider {\n\tcase CoreDNS:\n\t\tif err := dnsClient.ConfigureCoreDNS(ctx, c.Namespace, c.ServiceName, c.ServicePort); err != nil {\n\t\t\treturn fmt.Errorf(\"unable to configure CoreDNS: %w\", err)\n\t\t}\n\n\tcase KubeDNS:\n\t\tif err := dnsClient.ConfigureKubeDNS(ctx, c.Namespace, c.ServiceName, c.ServicePort); err != nil {\n\t\t\treturn fmt.Errorf(\"unable to configure KubeDNS: %w\", err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "2c2f47b3bd09d5f944c43cf819a1a5da", "score": "0.4573641", "text": "func (f *externalMetricsFeature) ManageClusterAgent(managers feature.PodTemplateManagers) error {\n\tmanagers.EnvVar().AddEnvVarToContainer(apicommonv1.ClusterAgentContainerName, &corev1.EnvVar{\n\t\tName: apicommon.DDExternalMetricsProviderEnabled,\n\t\tValue: \"true\",\n\t})\n\tmanagers.EnvVar().AddEnvVarToContainer(apicommonv1.ClusterAgentContainerName, &corev1.EnvVar{\n\t\tName: apicommon.DDExternalMetricsProviderPort,\n\t\tValue: strconv.FormatInt(int64(f.port), 10),\n\t})\n\tmanagers.EnvVar().AddEnvVarToContainer(apicommonv1.ClusterAgentContainerName, &corev1.EnvVar{\n\t\tName: apicommon.DDExternalMetricsProviderUseDatadogMetric,\n\t\tValue: apiutils.BoolToString(&f.useDDM),\n\t})\n\tmanagers.EnvVar().AddEnvVarToContainer(apicommonv1.ClusterAgentContainerName, &corev1.EnvVar{\n\t\tName: apicommon.DDExternalMetricsProviderWPAController,\n\t\tValue: apiutils.BoolToString(&f.useWPA),\n\t})\n\n\tif f.url != \"\" {\n\t\tmanagers.EnvVar().AddEnvVarToContainer(apicommonv1.ClusterAgentContainerName, &corev1.EnvVar{\n\t\t\tName: apicommon.DDExternalMetricsProviderEndpoint,\n\t\t\tValue: f.url,\n\t\t})\n\t}\n\n\tif len(f.keySecret) != 0 {\n\t\t// api key\n\t\tif s, ok := f.keySecret[apicommon.DefaultAPIKeyKey]; ok {\n\t\t\tvar apiKeyEnvVar *corev1.EnvVar\n\t\t\t// api key from existing secret\n\t\t\tif s.name != \"\" {\n\t\t\t\tapiKeyEnvVar = component.BuildEnvVarFromSource(\n\t\t\t\t\tapicommon.DDExternalMetricsProviderAPIKey,\n\t\t\t\t\tcomponent.BuildEnvVarFromSecret(s.name, s.key),\n\t\t\t\t)\n\t\t\t} else {\n\t\t\t\t// api key from secret created by operator\n\t\t\t\tapiKeyEnvVar = component.BuildEnvVarFromSource(\n\t\t\t\t\tapicommon.DDExternalMetricsProviderAPIKey,\n\t\t\t\t\tcomponent.BuildEnvVarFromSecret(componentdca.GetDefaultExternalMetricSecretName(f.owner), apicommon.DefaultAPIKeyKey),\n\t\t\t\t)\n\t\t\t}\n\t\t\tmanagers.EnvVar().AddEnvVarToContainer(apicommonv1.ClusterAgentContainerName, apiKeyEnvVar)\n\t\t}\n\t\t// app key\n\t\tif s, ok := f.keySecret[apicommon.DefaultAPPKeyKey]; ok {\n\t\t\tvar appKeyEnvVar *corev1.EnvVar\n\t\t\t// app key from existing secret\n\t\t\tif s.name != \"\" {\n\t\t\t\tappKeyEnvVar = component.BuildEnvVarFromSource(\n\t\t\t\t\tapicommon.DDExternalMetricsProviderAppKey,\n\t\t\t\t\tcomponent.BuildEnvVarFromSecret(s.name, s.key),\n\t\t\t\t)\n\t\t\t} else {\n\t\t\t\t// api key from secret created by operator\n\t\t\t\tappKeyEnvVar = component.BuildEnvVarFromSource(\n\t\t\t\t\tapicommon.DDExternalMetricsProviderAppKey,\n\t\t\t\t\tcomponent.BuildEnvVarFromSecret(componentdca.GetDefaultExternalMetricSecretName(f.owner), apicommon.DefaultAPPKeyKey),\n\t\t\t\t)\n\t\t\t}\n\t\t\tmanagers.EnvVar().AddEnvVarToContainer(apicommonv1.ClusterAgentContainerName, appKeyEnvVar)\n\t\t}\n\t}\n\n\tmanagers.Port().AddPortToContainer(apicommonv1.ClusterAgentContainerName, &corev1.ContainerPort{\n\t\tName: apicommon.ExternalMetricsPortName,\n\t\tContainerPort: f.port,\n\t\tProtocol: corev1.ProtocolTCP,\n\t})\n\n\treturn nil\n}", "title": "" }, { "docid": "6e892c835d2dfa6d8d8908808c43c459", "score": "0.45705253", "text": "func CtrAgentConfig(w http.ResponseWriter, r *http.Request, opt router.UrlOptions, sm session.ISessionManager, s store.IStore) {\n\tdefer r.Body.Close()\n\tagentID := opt.Params[\"agent\"]\n\n\tdfc := s.GetDataSource(datasources.Persistence)\n\n\tp, ok := dfc.(persistence.IPersistance)\n\tif !ok {\n\t\tutl.Log(\"Invalid store - should implement `IPersistance`\")\n\t\treturn\n\t}\n\tc := p.GetCollection(\"agentConfigs\")\n\n\tvar config agent.Config\n\n\tlinks := map[string]map[string]string{\n\t\t\"self\": map[string]string{\n\t\t\t\"href\": \"api/agentsConfig/\" + agentID,\n\t\t},\n\t}\n\n\tswitch r.Method {\n\tcase \"GET\":\n\t\tvar list []agent.Config\n\n\t\terr := c.Find(bson.M{}).All(&list)\n\n\t\tif err != nil {\n\t\t\tutl.Log(\"AgentConfig not found err=\", err)\n\t\t\treturn\n\t\t}\n\n\t\tdata := map[string]string{\n\t\t\t\"count\": strconv.Itoa(len(list)),\n\t\t}\n\n\t\tembedded := map[string]interface{}{\n\t\t\t\"configs\": list,\n\t\t}\n\t\tjson.NewEncoder(w).Encode(helpers.ServeHal(data, embedded, links))\n\n\tcase \"POST\":\n\t\tdecoder := json.NewDecoder(r.Body)\n\t\tdecoder.Decode(&config)\n\t\tconfig.AgentID = agentID\n\t\t_, err := c.Upsert(\n\t\t\tbson.M{\"agentId\": agentID},\n\t\t\tconfig,\n\t\t)\n\t\tif err != nil {\n\t\t\tutl.Log(err)\n\t\t}\n\t\tembedded := map[string]string{}\n\t\tjson.NewEncoder(w).Encode(helpers.ServeHal(config, embedded, links))\n\n\tdefault:\n\t}\n}", "title": "" }, { "docid": "dd21044b0c55057a990bb5de973d8aee", "score": "0.4567362", "text": "func HandleKubeConfigEvent(op protos.SdkMgrOperation, key *protos.ConfigKey, data *string, a *Agent) {\n\tlog.Infof(\"\\n jspath %s keys %v\", key.GetJsPath(), key.GetKeys())\n\n\tif data != nil {\n\t\tlog.Infof(\"\\n data %v\", *data)\n\t}\n\n\tif data == nil {\n\t\tlog.Infof(\"\\nNo data found\")\n\t\tif op == protos.SdkMgrOperation_Delete {\n\t\t\tlog.Infof(\"\\nDelete operation\")\n\t\t\ta.DeleteTelemetry(&a.YangRoot)\n\t\t}\n\t\treturn\n\t}\n\n\tcur := config.AgentYang{}\n\t// cur := &yang.Device{}\n\tif err := json.Unmarshal([]byte(*data), &cur); err != nil {\n\t\tlog.Fatalf(\"Can not unmarshal config data: %s error %s\", *data, err)\n\t}\n\n\tlog.Infof(\"\\nkey %v\", *key)\n\tlog.Infof(\"\\nkey %v doing something now\", *key)\n\n\ta.Yang.SetName(cur.Name.Value)\n\t// a.Yang.Name.Value = cur.Name.Value\n\tif len(a.Yang.Name.Value) < 1 {\n\t\ta.Yang.SetResponse(\"Hello, do tell me your name\")\n\t\t// a.Yang.Response.Value = fmt.Sprintf(\"Hello, do tell me your name\")\n\t} else {\n\t\ta.Yang.SetResponse(fmt.Sprintf(\"Hello, %s\", a.Yang.GetName()))\n\t\t// a.Yang.Response.Value = fmt.Sprintf(\"Hello, %s\", a.Yang.GetName())\n\t}\n\ta.UpdateTelemetry()\n\t// agent.Yang.Name = cur.Kubernetes.Name\n\t// if len(*agent.Yang.Name) < 1 {\n\t// \t*agent.Yang.Response = fmt.Sprintf(\"Hello, do tell me your name\")\n\t// } else {\n\t// \t*agent.Yang.Response = fmt.Sprintf(\"Hello, %s\", *agent.Yang.Name)\n\t// }\n\t// JsData, err := json.Marshal(a.Yang)\n\t// if err != nil {\n\t// \tlog.Fatalf(\"Can not marshal config data:%v error %s\", *data, err)\n\t// }\n\t// JsString := string(JsData)\n\t// log.Infof(\"JsPath: %s\", JsPath)\n\t// log.Infof(\"JsString: %s\", JsString)\n\n\t// a.UpdateTelemetry(&JsPath, &JsString)\n\t//ProgramRoutes(FibMgr.YangGoFib.InputFib.Value)\n}", "title": "" }, { "docid": "250e8bba4af758f1721875cf06819bc0", "score": "0.45611235", "text": "func (a *Agent) Init(name string, ndkAddress string, yangRoot string) {\n\tvar err error\n\n\t// Set up a connection to the server.\n\tconn, err := grpc.Dial(ndkAddress, grpc.WithInsecure(), grpc.WithBlock())\n\tif err != nil {\n\t\tlog.Fatalf(\"did not connect: %v\", err)\n\t}\n\n\t// Set up base service client\n\tclient := protos.NewSdkMgrServiceClient(conn)\n\n\tctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)\n\tdefer cancel()\n\n\t// Set up agent name\n\tctx = metadata.AppendToOutgoingContext(ctx, \"agent_name\", name)\n\n\t// Register agent with NDK manager\n\tr, err := client.AgentRegister(ctx, &protos.AgentRegistrationRequest{})\n\tif err != nil {\n\t\tlog.Fatalf(\"Could not register: %v\", err)\n\t}\n\tlog.Infof(\"Agent registration status: %s AppId: %d\\n\", r.Status, r.GetAppId())\n\n\ta.Name = name\n\ta.GrpcConn = conn\n\ta.Client = client\n\ta.OwnAppID = r.GetAppId()\n\ta.YangRoot = yangRoot\n\t// agent = Agent{\n\t// \tName: name,\n\t// \tGrpcConn: conn,\n\t// \tClient: client,\n\t// \tOwnAppID: r.GetAppId(),\n\t// }\n\n\t// agent.CfgTranxMap = make(map[string][]CfgTranxEntry)\n\ta.CfgTranxMap = make(map[string][]CfgTranxEntry)\n\n\tsubscribeStreams(a)\n\n\t// return &agent, err\n}", "title": "" }, { "docid": "298d2a85e04cbab7addea10492563737", "score": "0.45347482", "text": "func configureFlags(api *operations.BdForumGenAPI) {\n\t// api.CommandLineOptionsGroups = []swag.CommandLineOptionsGroup{ ... }\n}", "title": "" }, { "docid": "521082feaa792be4ee3a4bb0ddd17c63", "score": "0.45303607", "text": "func (plugin *BFDConfigurator) Init(logger logging.PluginLogger, goVppMux govppmux.API, swIfIndexes ifaceidx.SwIfIndex,\n\tenableStopwatch bool) (err error) {\n\t// Logger\n\tplugin.log = logger.NewLogger(\"-bfd-conf\")\n\tplugin.log.Infof(\"Initializing BFD configurator\")\n\n\t// Mappings\n\tplugin.ifIndexes = swIfIndexes\n\tplugin.sessionsIndexes = nametoidx.NewNameToIdx(plugin.log, \"bfd_session_indexes\", nil)\n\tplugin.keysIndexes = nametoidx.NewNameToIdx(plugin.log, \"bfd_auth_keys_indexes\", nil)\n\tplugin.echoFunctionIndex = nametoidx.NewNameToIdx(plugin.log, \"bfd_echo_function_index\", nil)\n\n\t// VPP channel\n\tplugin.vppChan, err = goVppMux.NewAPIChannel()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Stopwatch\n\tif enableStopwatch {\n\t\tplugin.stopwatch = measure.NewStopwatch(\"BFDConfigurator\", plugin.log)\n\t}\n\n\tif err = vppcalls.CheckMsgCompatibilityForBfd(plugin.vppChan); err != nil {\n\t\tplugin.log.Error(err)\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "abe3fc04029a80509d801eafecc771ab", "score": "0.45277125", "text": "func configureFlags(api *operations.MonitoringAsAServiceAPI) {\n\t// api.CommandLineOptionsGroups = []swag.CommandLineOptionsGroup{ ... }\n}", "title": "" }, { "docid": "bce01787d8c39068a8e11d9d39cf5a9b", "score": "0.45190066", "text": "func MakeBaseConfig(common *Common, testEnv bool, dmsgHTTP bool, services *Services, dmsgHTTPServersList *DmsgHTTPServers) *V1 {\n\t//check if any services were passed\n\tif services == nil {\n\t\t//fall back on defaults\n\t\tif !testEnv {\n\t\t\tservices = &Services{\n\t\t\t\tDmsgDiscovery: utilenv.DmsgDiscAddr,\n\t\t\t\tTransportDiscovery: utilenv.TpDiscAddr,\n\t\t\t\tAddressResolver: utilenv.AddressResolverAddr,\n\t\t\t\tRouteFinder: utilenv.RouteFinderAddr,\n\t\t\t\tRouteSetupNodes: MustPKs(utilenv.RouteSetupPKs),\n\t\t\t\tTransportSetupPKs: MustPKs(utilenv.TPSetupPKs),\n\t\t\t\tUptimeTracker: utilenv.UptimeTrackerAddr,\n\t\t\t\tServiceDiscovery: utilenv.ServiceDiscAddr,\n\t\t\t\tStunServers: utilenv.GetStunServers(),\n\t\t\t\tDNSServer: utilenv.DNSServer,\n\t\t\t}\n\t\t} else {\n\t\t\tservices = &Services{\n\t\t\t\tDmsgDiscovery: utilenv.TestDmsgDiscAddr,\n\t\t\t\tTransportDiscovery: utilenv.TestTpDiscAddr,\n\t\t\t\tAddressResolver: utilenv.TestAddressResolverAddr,\n\t\t\t\tRouteFinder: utilenv.TestRouteFinderAddr,\n\t\t\t\tRouteSetupNodes: MustPKs(utilenv.TestRouteSetupPKs),\n\t\t\t\tTransportSetupPKs: MustPKs(utilenv.TestTPSetupPKs),\n\t\t\t\tUptimeTracker: utilenv.TestUptimeTrackerAddr,\n\t\t\t\tServiceDiscovery: utilenv.TestServiceDiscAddr,\n\t\t\t\tStunServers: utilenv.GetStunServers(),\n\t\t\t\tDNSServer: utilenv.DNSServer,\n\t\t\t}\n\t\t}\n\t}\n\tconf := new(V1)\n\tif common != nil {\n\t\tconf.Common = common\n\t}\n\tconf.Dmsg = &dmsgc.DmsgConfig{\n\t\tDiscovery: services.DmsgDiscovery, //utilenv.DmsgDiscAddr,\n\t\tSessionsCount: 1,\n\t\tServers: []*disc.Entry{},\n\t}\n\tconf.Transport = &Transport{\n\t\tDiscovery: services.TransportDiscovery, //utilenv.TpDiscAddr,\n\t\tAddressResolver: services.AddressResolver, //utilenv.AddressResolverAddr,\n\t\tPublicAutoconnect: PublicAutoconnect,\n\t\tLogStore: &LogStore{\n\t\t\tType: FileLogStore,\n\t\t\tLocation: LocalPath + \"/\" + TpLogStore,\n\t\t\tRotationInterval: DefaultLogRotationInterval,\n\t\t},\n\t\tSudphPort: 0,\n\t\tStcprPort: 0,\n\t}\n\tconf.Routing = &Routing{\n\t\tRouteFinder: services.RouteFinder, //utilenv.RouteFinderAddr,\n\t\tRouteSetupNodes: services.RouteSetupNodes, //[]cipher.PubKey{utilenv.MustPK(utilenv.SetupPK)},\n\t\tRouteFinderTimeout: DefaultTimeout,\n\t}\n\tconf.Launcher = &Launcher{\n\t\tServiceDisc: services.ServiceDiscovery, //utilenv.ServiceDiscAddr,\n\t\tApps: nil,\n\t\tServerAddr: AppSrvAddr,\n\t\tBinPath: AppBinPath,\n\t\tDisplayNodeIP: false,\n\t}\n\tconf.UptimeTracker = &UptimeTracker{\n\t\tAddr: services.UptimeTracker, //utilenv.UptimeTrackerAddr,\n\t}\n\tconf.CLIAddr = RPCAddr\n\tconf.LogLevel = LogLevel\n\tconf.LocalPath = LocalPath\n\tconf.DmsgHTTPServerPath = LocalPath + \"/\" + Custom\n\tconf.StunServers = services.StunServers //utilenv.GetStunServers()\n\tconf.ShutdownTimeout = DefaultTimeout\n\tconf.RestartCheckDelay = Duration(restart.DefaultCheckDelay)\n\n\tconf.Dmsgpty = &Dmsgpty{\n\t\tDmsgPort: DmsgPtyPort,\n\t\tCLINet: DmsgPtyCLINet,\n\t\tCLIAddr: dmsgpty.DefaultCLIAddr(),\n\t}\n\n\tconf.STCP = &network.STCPConfig{\n\t\tListeningAddress: STCPAddr,\n\t\tPKTable: nil,\n\t}\n\t// Use dmsg urls for services and add dmsg-servers\n\tif dmsgHTTP {\n\t\tif dmsgHTTPServersList != nil {\n\t\t\tif testEnv {\n\t\t\t\tconf.Dmsg.Servers = dmsgHTTPServersList.Test.DMSGServers\n\t\t\t\tconf.Dmsg.Discovery = dmsgHTTPServersList.Test.DMSGDiscovery\n\t\t\t\tconf.Transport.AddressResolver = dmsgHTTPServersList.Test.AddressResolver\n\t\t\t\tconf.Transport.Discovery = dmsgHTTPServersList.Test.TransportDiscovery\n\t\t\t\tconf.UptimeTracker.Addr = dmsgHTTPServersList.Test.UptimeTracker\n\t\t\t\tconf.Routing.RouteFinder = dmsgHTTPServersList.Test.RouteFinder\n\t\t\t\tconf.Launcher.ServiceDisc = dmsgHTTPServersList.Test.ServiceDiscovery\n\t\t\t} else {\n\t\t\t\tconf.Dmsg.Servers = dmsgHTTPServersList.Prod.DMSGServers\n\t\t\t\tconf.Dmsg.Discovery = dmsgHTTPServersList.Prod.DMSGDiscovery\n\t\t\t\tconf.Transport.AddressResolver = dmsgHTTPServersList.Prod.AddressResolver\n\t\t\t\tconf.Transport.Discovery = dmsgHTTPServersList.Prod.TransportDiscovery\n\t\t\t\tconf.UptimeTracker.Addr = dmsgHTTPServersList.Prod.UptimeTracker\n\t\t\t\tconf.Routing.RouteFinder = dmsgHTTPServersList.Prod.RouteFinder\n\t\t\t\tconf.Launcher.ServiceDisc = dmsgHTTPServersList.Prod.ServiceDiscovery\n\t\t\t}\n\t\t}\n\t}\n\tconf.IsPublic = IsPublic\n\treturn conf\n}", "title": "" }, { "docid": "7ebf802e33e02fb62eb61d7d1b3c3cfb", "score": "0.44968402", "text": "func (a *ConfigApiService) EnableAgent(ctx context.Context, server string, agent string) (SuccessData, *http.Response, error) {\n\tvar (\n\t\tlocalVarHttpMethod = strings.ToUpper(\"Post\")\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue SuccessData\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/config/server/{server}/agent/{agent}/enable\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"server\"+\"}\", fmt.Sprintf(\"%v\", server), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"agent\"+\"}\", fmt.Sprintf(\"%v\", agent), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := selectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := selectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\tif ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := ctx.Value(ContextAPIKey).(APIKey); ok {\n\t\t\tvar key string\n\t\t\tif auth.Prefix != \"\" {\n\t\t\t\tkey = auth.Prefix + \" \" + auth.Key\n\t\t\t} else {\n\t\t\t\tkey = auth.Key\n\t\t\t}\n\t\t\tlocalVarHeaderParams[\"Authorization\"] = key\n\t\t\t\n\t\t}\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHttpResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHttpResponse == nil {\n\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHttpResponse.Body)\n\tlocalVarHttpResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t}\n\n\tif localVarHttpResponse.StatusCode < 300 {\n\t\t// If we succeed, return the data, otherwise pass on to decode error.\n\t\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"));\n\t\tif err == nil { \n\t\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t\t}\n\t}\n\n\tif localVarHttpResponse.StatusCode >= 300 {\n\t\tnewErr := GenericSwaggerError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHttpResponse.Status,\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 200 {\n\t\t\tvar v SuccessData\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"));\n\t\t\t\tif err != nil {\n\t\t\t\t\tnewErr.error = err.Error()\n\t\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t\t}\n\t\t\t\tnewErr.model = v\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 404 {\n\t\t\tvar v ErrorList\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"));\n\t\t\t\tif err != nil {\n\t\t\t\t\tnewErr.error = err.Error()\n\t\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t\t}\n\t\t\t\tnewErr.model = v\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 500 {\n\t\t\tvar v ErrorList\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"));\n\t\t\t\tif err != nil {\n\t\t\t\t\tnewErr.error = err.Error()\n\t\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t\t}\n\t\t\t\tnewErr.model = v\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHttpResponse, nil\n}", "title": "" }, { "docid": "84d3f10caae880b14f9fcc3e6064f574", "score": "0.4496254", "text": "func configureFlags(api *operations.VariantsAndCallsAPIDemoAPI) {\n // api.CommandLineOptionsGroups = []swag.CommandLineOptionsGroup{ ... }\n}", "title": "" }, { "docid": "fdf8163cbf58b5cca0c93e19ab9adfef", "score": "0.44947758", "text": "func (c *DefaultClient) Configure(conf *viper.Viper) error {\n\tvar cc *proto.Config\n\tif err := conf.UnmarshalExact(&cc); err != nil {\n\t\treturn err\n\t}\n\n\tframe := &proto.Frame{\n\t\tDst: c.name,\n\t\tPayload: &proto.Frame_Config{Config: cc},\n\t}\n\tc.Send() <- frame\n\n\treturn nil\n}", "title": "" }, { "docid": "141eff87594b1ad2dd3ce979304a7801", "score": "0.44919044", "text": "func InitializePlugin(pluginConfPath string, agentVersion string) {\n\n\t// StdoutIgnoreNsSet = make(map[string]bool)\n\t// StderrIgnoreNsSet = make(map[string]bool)\n\t// ImageIDMap = make(map[string]string)\n\t// NameIDMap = make(map[string]string)\n\t// // Keeping the two error hashes separate since we need to keep the config error hash for the lifetime of the container\n\t// // whereas the prometheus scrape error hash needs to be refreshed every hour\n\t// ConfigErrorEvent = make(map[string]KubeMonAgentEventTags)\n\t// PromScrapeErrorEvent = make(map[string]KubeMonAgentEventTags)\n\t// // Initilizing this to true to skip the first kubemonagentevent flush since the errors are not populated at this time\n\t// skipKubeMonEventsFlush = true\n\n\t// enrichContainerLogsSetting := os.Getenv(\"AZMON_CLUSTER_CONTAINER_LOG_ENRICH\")\n\t// \tif (strings.Compare(enrichContainerLogsSetting, \"true\") == 0) {\n\t// \t\tenrichContainerLogs = true\n\t// \t\tLog(\"ContainerLogEnrichment=true \\n\")\n\t// \t} else {\n\t// \t\tenrichContainerLogs = false\n\t// \t\tLog(\"ContainerLogEnrichment=false \\n\")\n\t// \t}\n\n\t// pluginConfig, err := ReadConfiguration(pluginConfPath)\n\t// if err != nil {\n\t// \tmessage := fmt.Sprintf(\"Error Reading plugin config path : %s \\n\", err.Error())\n\t// \tLog(message)\n\t// \tSendException(message)\n\t// \ttime.Sleep(30 * time.Second)\n\t// \tlog.Fatalln(message)\n\t// }\n\n\t// omsadminConf, err := ReadConfiguration(pluginConfig[\"omsadmin_conf_path\"])\n\t// if err != nil {\n\t// \tmessage := fmt.Sprintf(\"Error Reading omsadmin configuration %s\\n\", err.Error())\n\t// \tLog(message)\n\t// \tSendException(message)\n\t// \ttime.Sleep(30 * time.Second)\n\t// \tlog.Fatalln(message)\n\t// }\n\tOMSEndpoint = os.Getenv(\"CI_DOMAIN\")//omsadminConf[\"OMS_ENDPOINT\"]\n\tLog(\"OMSEndpoint %s\", OMSEndpoint)\n\n\tWorkspaceID = os.Getenv(\"CI_WSID\")\n\tResourceID = os.Getenv(envAKSResourceID)\n\n\tif len(ResourceID) > 0 {\n\t\t//AKS Scenario\n\t\tResourceCentric = true\n\t\tsplitted := strings.Split(ResourceID, \"/\")\n\t\tResourceName = splitted[len(splitted)-1]\n\t\tLog(\"ResourceCentric: True\")\n\t\tLog(\"ResourceID=%s\", ResourceID)\n\t\tLog(\"ResourceName=%s\", ResourceID)\n\t}\n\t// if ResourceCentric == false {\n\t// \t//AKS-Engine/hybrid scenario\n\t// \tResourceName = os.Getenv(ResourceNameEnv)\n\t// \tResourceID = ResourceName\n\t// \tLog(\"ResourceCentric: False\")\n\t// \tLog(\"ResourceID=%s\", ResourceID)\n\t// \tLog(\"ResourceName=%s\", ResourceName)\n\t// }\n\n\t// // Initialize image,name map refresh ticker\n\t// containerInventoryRefreshInterval, err := strconv.Atoi(pluginConfig[\"container_inventory_refresh_interval\"])\n\t// if err != nil {\n\t// \tmessage := fmt.Sprintf(\"Error Reading Container Inventory Refresh Interval %s\", err.Error())\n\t// \tLog(message)\n\t// \tSendException(message)\n\t// \tLog(\"Using Default Refresh Interval of %d s\\n\", defaultContainerInventoryRefreshInterval)\n\t// \tcontainerInventoryRefreshInterval = defaultContainerInventoryRefreshInterval\n\t// }\n\t// Log(\"containerInventoryRefreshInterval = %d \\n\", containerInventoryRefreshInterval)\n\t// ContainerImageNameRefreshTicker = time.NewTicker(time.Second * time.Duration(containerInventoryRefreshInterval))\n\n\t// Log(\"kubeMonAgentConfigEventFlushInterval = %d \\n\", kubeMonAgentConfigEventFlushInterval)\n\t// KubeMonAgentConfigEventsSendTicker = time.NewTicker(time.Minute * time.Duration(kubeMonAgentConfigEventFlushInterval))\n\n\t// Populate Computer field\n\t// containerHostName, err := ioutil.ReadFile(pluginConfig[\"container_host_file_path\"])\n\t// if err != nil {\n\t// \t// It is ok to log here and continue, because only the Computer column will be missing,\n\t// \t// which can be deduced from a combination of containerId, and docker logs on the node\n\t// \tmessage := fmt.Sprintf(\"Error when reading containerHostName file %s.\\n It is ok to log here and continue, because only the Computer column will be missing, which can be deduced from a combination of containerId, and docker logs on the nodes\\n\", err.Error())\n\t// \tLog(message)\n\t// \tSendException(message)\n\t// }\n\tComputer := os.Getenv(\"CI_HOSTNAME\")//strings.TrimSuffix(ToString(containerHostName), \"\\n\")\n\tLog(\"Computer == %s \\n\", Computer)\n\n\tret, err := InitializeTelemetryClient(agentVersion)\n\tif ret != 0 || err != nil {\n\t\tmessage := fmt.Sprintf(\"Error During Telemetry Initialization :%s\", err.Error())\n\t\tfmt.Printf(message)\n\t\tLog(message)\n\t}\n\n\t// // Initialize KubeAPI Client\n\t// config, err := rest.InClusterConfig()\n\t// if err != nil {\n\t// \tmessage := fmt.Sprintf(\"Error getting config %s.\\nIt is ok to log here and continue, because the logs will be missing image and Name, but the logs will still have the containerID\", err.Error())\n\t// \tLog(message)\n\t// \tSendException(message)\n\t// }\n\n\t// ClientSet, err = kubernetes.NewForConfig(config)\n\t// if err != nil {\n\t// \tmessage := fmt.Sprintf(\"Error getting clientset %s.\\nIt is ok to log here and continue, because the logs will be missing image and Name, but the logs will still have the containerID\", err.Error())\n\t// \tSendException(message)\n\t// \tLog(message)\n\t// }\n\n\t// PluginConfiguration = pluginConfig\n\n\tCreateHTTPClient()\n\n\t// if strings.Compare(strings.ToLower(os.Getenv(\"CONTROLLER_TYPE\")), \"daemonset\") == 0 {\n\t// \tpopulateExcludedStdoutNamespaces()\n\t// \tpopulateExcludedStderrNamespaces()\n\t// \tif enrichContainerLogs == true {\n\t// \t\tLog(\"ContainerLogEnrichment=true; starting goroutine to update containerimagenamemaps \\n\")\n\t// \t\tgo updateContainerImageNameMaps()\n\t// \t} else {\n\t\t\tLog(\"ContainerLogEnrichment=false \\n\")\n\t// \t}\n\n\t// \t// Flush config error records every hour\n\t// \tgo flushKubeMonAgentEventRecords()\n\t// } else {\n\t// \tLog(\"Running in replicaset. Disabling container enrichment caching & updates \\n\")\n\t// }\n\n}", "title": "" }, { "docid": "c2240244e7c5698924f2d86858e85bfb", "score": "0.44901887", "text": "func main() {\n\t// Initialize Logger instance\n\tlog, err := logger.New(serviceName, logger.Options{\n\t\tFormat: logger.SyslogLogFormat,\n\t\tDebugLevel: isDebug(),\n\t})\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\tos.Exit(1)\n\t}\n\n\terr = os.Setenv(\"KUBECONFIG\", path.Join(\n\t\tconfig.KubeConfig[configprovider.FilePath],\n\t\tfmt.Sprintf(\"%s.%s\", config.KubeConfig[configprovider.FileName], config.KubeConfig[configprovider.FileType])),\n\t)\n\n\tif err != nil {\n\t\t// Fail silently\n\t\tlog.Warn(err)\n\t}\n\n\tfmt.Println(\"HELOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO\")\n\n\t// Initialize application specific configs and dependencies\n\t// App and request config\n\tcfg, err := config.New(configprovider.ViperKey)\n\tif err != nil {\n\t\tlog.Error(err)\n\t\tos.Exit(1)\n\t}\n\n\tservice := &grpc.Service{}\n\terr = cfg.GetObject(adapter.ServerKey, service)\n\tif err != nil {\n\t\tlog.Error(err)\n\t\tos.Exit(1)\n\t}\n\n\tkubeconfigHandler, err := config.NewKubeconfigBuilder(configprovider.ViperKey)\n\tif err != nil {\n\t\tlog.Error(err)\n\t\tos.Exit(1)\n\t}\n\n\t// // Initialize Tracing instance\n\t// tracer, err := tracing.New(service.Name, service.TraceURL)\n\t// if err != nil {\n\t// log.Err(\"Tracing Init Failed\", err.Error())\n\t// os.Exit(1)\n\t// }\n\n\t// Initialize Handler intance\n\thandler := traefik.New(cfg, log, kubeconfigHandler)\n\thandler = adapter.AddLogger(log, handler)\n\n\tservice.Handler = handler\n\tservice.Channel = make(chan interface{}, 10)\n\tservice.StartedAt = time.Now()\n\tservice.Version = version\n\tservice.GitSHA = gitsha\n\n\tfmt.Println(\"HELOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO\")\n\tgo registerCapabilities(service.Port, log) //Registering static capabilities\n\tgo registerDynamicCapabilities(service.Port, log) //Registering latest capabilities periodically\n\n\t// Server Initialization\n\tlog.Info(\"Adaptor Listening at port: \", service.Port)\n\terr = grpc.Start(service, nil)\n\tif err != nil {\n\t\tlog.Error(err)\n\t\tos.Exit(1)\n\t}\n}", "title": "" }, { "docid": "b2f637a9c2876ffb9f096509ba059b85", "score": "0.44821623", "text": "func (exr *Extractor) Configure(facts map[string]interface{}) error {\n\tif l, exists := facts[core.ConfigLogger].(core.Logger); exists {\n\t\texr.l = l\n\t}\n\tif val, exists := facts[ConfigUASTEndpoint].(string); exists {\n\t\texr.Endpoint = val\n\t}\n\tif val, exists := facts[ConfigUASTTimeout].(int); exists {\n\t\texr.Context = func() (context.Context, context.CancelFunc) {\n\t\t\treturn context.WithTimeout(context.Background(),\n\t\t\t\ttime.Duration(val)*time.Second)\n\t\t}\n\t}\n\tif val, exists := facts[ConfigUASTPoolSize].(int); exists {\n\t\texr.PoolSize = val\n\t}\n\tif val, exists := facts[ConfigUASTFailOnErrors].(bool); exists {\n\t\texr.FailOnErrors = val\n\t}\n\tif val, exists := facts[ConfigUASTIgnoreMissingDrivers].([]string); exists {\n\t\texr.IgnoredMissingDrivers = map[string]bool{}\n\t\tfor _, name := range val {\n\t\t\texr.IgnoredMissingDrivers[name] = true\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "848dfd25f4b7b48e4cb365e3c956c787", "score": "0.44760552", "text": "func configureFlags(api *operations.EFoodAPI) {\n\t// api.CommandLineOptionsGroups = []swag.CommandLineOptionsGroup{ ... }\n}", "title": "" }, { "docid": "b93e843ad3e983f650f377a1b6baf28e", "score": "0.44757998", "text": "func InitializePlugin(pluginConfPath string, agentVersion string) {\n\n\tStdoutIgnoreNsSet = make(map[string]bool)\n\tStderrIgnoreNsSet = make(map[string]bool)\n\tImageIDMap = make(map[string]string)\n\tNameIDMap = make(map[string]string)\n\t// Keeping the two error hashes separate since we need to keep the config error hash for the lifetime of the container\n\t// whereas the prometheus scrape error hash needs to be refreshed every hour\n\tConfigErrorEvent = make(map[string]KubeMonAgentEventTags)\n\tPromScrapeErrorEvent = make(map[string]KubeMonAgentEventTags)\n\t// Initilizing this to true to skip the first kubemonagentevent flush since the errors are not populated at this time\n\tskipKubeMonEventsFlush = true\n\n\tenrichContainerLogsSetting := os.Getenv(\"AZMON_CLUSTER_CONTAINER_LOG_ENRICH\")\n\t\tif (strings.Compare(enrichContainerLogsSetting, \"true\") == 0) {\n\t\t\tenrichContainerLogs = true\n\t\t\tLog(\"ContainerLogEnrichment=true \\n\")\n\t\t} else {\n\t\t\tenrichContainerLogs = false\n\t\t\tLog(\"ContainerLogEnrichment=false \\n\")\n\t\t}\n\n\tpluginConfig, err := ReadConfiguration(pluginConfPath)\n\tif err != nil {\n\t\tmessage := fmt.Sprintf(\"Error Reading plugin config path : %s \\n\", err.Error())\n\t\tLog(message)\n\t\tSendException(message)\n\t\ttime.Sleep(30 * time.Second)\n\t\tlog.Fatalln(message)\n\t}\n\n\tomsadminConf, err := ReadConfiguration(pluginConfig[\"omsadmin_conf_path\"])\n\tif err != nil {\n\t\tmessage := fmt.Sprintf(\"Error Reading omsadmin configuration %s\\n\", err.Error())\n\t\tLog(message)\n\t\tSendException(message)\n\t\ttime.Sleep(30 * time.Second)\n\t\tlog.Fatalln(message)\n\t}\n\tOMSEndpoint = omsadminConf[\"OMS_ENDPOINT\"]\n\tLog(\"OMSEndpoint %s\", OMSEndpoint)\n\n\tWorkspaceID = omsadminConf[\"WORKSPACE_ID\"]\n\tResourceID = os.Getenv(\"customResourceId\")\n\n\tif len(ResourceID) > 0 {\n\t\t//AKS Scenario\n\t\tResourceCentric = true\n\t\tsplitted := strings.Split(ResourceID, \"/\")\n\t\tResourceName = splitted[len(splitted)-1]\n\t\tLog(\"ResourceCentric: True\")\n\t\tLog(\"ResourceID=%s\", ResourceID)\n\t\tLog(\"ResourceName=%s\", ResourceID)\n\t}\n\tif ResourceCentric == false {\n\t\t//AKS-Engine/hybrid scenario\n\t\tResourceName = os.Getenv(ResourceNameEnv)\n\t\tResourceID = ResourceName\n\t\tLog(\"ResourceCentric: False\")\n\t\tLog(\"ResourceID=%s\", ResourceID)\n\t\tLog(\"ResourceName=%s\", ResourceName)\n\t}\n\n\t// Initialize image,name map refresh ticker\n\tcontainerInventoryRefreshInterval, err := strconv.Atoi(pluginConfig[\"container_inventory_refresh_interval\"])\n\tif err != nil {\n\t\tmessage := fmt.Sprintf(\"Error Reading Container Inventory Refresh Interval %s\", err.Error())\n\t\tLog(message)\n\t\tSendException(message)\n\t\tLog(\"Using Default Refresh Interval of %d s\\n\", defaultContainerInventoryRefreshInterval)\n\t\tcontainerInventoryRefreshInterval = defaultContainerInventoryRefreshInterval\n\t}\n\tLog(\"containerInventoryRefreshInterval = %d \\n\", containerInventoryRefreshInterval)\n\tContainerImageNameRefreshTicker = time.NewTicker(time.Second * time.Duration(containerInventoryRefreshInterval))\n\n\tLog(\"kubeMonAgentConfigEventFlushInterval = %d \\n\", kubeMonAgentConfigEventFlushInterval)\n\tKubeMonAgentConfigEventsSendTicker = time.NewTicker(time.Minute * time.Duration(kubeMonAgentConfigEventFlushInterval))\n\n\t// Populate Computer field\n\tcontainerHostName, err := ioutil.ReadFile(pluginConfig[\"container_host_file_path\"])\n\tif err != nil {\n\t\t// It is ok to log here and continue, because only the Computer column will be missing,\n\t\t// which can be deduced from a combination of containerId, and docker logs on the node\n\t\tmessage := fmt.Sprintf(\"Error when reading containerHostName file %s.\\n It is ok to log here and continue, because only the Computer column will be missing, which can be deduced from a combination of containerId, and docker logs on the nodes\\n\", err.Error())\n\t\tLog(message)\n\t\tSendException(message)\n\t}\n\tComputer = strings.TrimSuffix(ToString(containerHostName), \"\\n\")\n\tLog(\"Computer == %s \\n\", Computer)\n\n\tret, err := InitializeTelemetryClient(agentVersion)\n\tif ret != 0 || err != nil {\n\t\tmessage := fmt.Sprintf(\"Error During Telemetry Initialization :%s\", err.Error())\n\t\tfmt.Printf(message)\n\t\tLog(message)\n\t}\n\n\t// Initialize KubeAPI Client\n\tconfig, err := rest.InClusterConfig()\n\tif err != nil {\n\t\tmessage := fmt.Sprintf(\"Error getting config %s.\\nIt is ok to log here and continue, because the logs will be missing image and Name, but the logs will still have the containerID\", err.Error())\n\t\tLog(message)\n\t\tSendException(message)\n\t}\n\n\tClientSet, err = kubernetes.NewForConfig(config)\n\tif err != nil {\n\t\tmessage := fmt.Sprintf(\"Error getting clientset %s.\\nIt is ok to log here and continue, because the logs will be missing image and Name, but the logs will still have the containerID\", err.Error())\n\t\tSendException(message)\n\t\tLog(message)\n\t}\n\n\tPluginConfiguration = pluginConfig\n\n\tCreateHTTPClient()\n\n\tif strings.Compare(strings.ToLower(os.Getenv(\"CONTROLLER_TYPE\")), \"daemonset\") == 0 {\n\t\tpopulateExcludedStdoutNamespaces()\n\t\tpopulateExcludedStderrNamespaces()\n\t\tif enrichContainerLogs == true {\n\t\t\tLog(\"ContainerLogEnrichment=true; starting goroutine to update containerimagenamemaps \\n\")\n\t\t\tgo updateContainerImageNameMaps()\n\t\t} else {\n\t\t\tLog(\"ContainerLogEnrichment=false \\n\")\n\t\t}\n\n\t\t// Flush config error records every hour\n\t\tgo flushKubeMonAgentEventRecords()\n\t} else {\n\t\tLog(\"Running in replicaset. Disabling container enrichment caching & updates \\n\")\n\t}\n\n}", "title": "" }, { "docid": "52eab10a4d7eedade65dee040a8bcb23", "score": "0.44742644", "text": "func Configure(api *operations.DenonAPI) {\n\toptions := getConfigurationOptions(api)\n\n\tif options.Version {\n\t\tshowVersion()\n\t\tos.Exit(0)\n\t}\n\n\tif options.ConfigFile == \"\" {\n\t\tprintError(\"Configuration file is missing. Use flag `-c, --config' to provide a config file.\")\n\t\tos.Exit(1)\n\t}\n\tloadConfig(options.ConfigFile)\n}", "title": "" }, { "docid": "6253682de48572da816c03058df8433f", "score": "0.44713527", "text": "func DefaultAgentOpt(testCtx *TestCtx, agentName string) *AgentOpt {\n\tagentImg := agentImage\n\tif img := os.Getenv(\"VPP_AGENT\"); img != \"\" {\n\t\tagentImg = img\n\t}\n\tgrpcConfig := \"grpc.conf\"\n\tif val := os.Getenv(\"GRPC_CONFIG\"); val != \"\" {\n\t\tgrpcConfig = val\n\t}\n\tetcdConfig := \"DISABLED\"\n\tif val := os.Getenv(\"ETCD_CONFIG\"); val != \"\" {\n\t\tetcdConfig = val\n\t}\n\topt := &AgentOpt{\n\t\tRuntime: &ContainerRuntime{\n\t\t\tctx: testCtx,\n\t\t\tlogIdentity: \"Agent \" + agentName,\n\t\t\tstopTimeout: agentStopTimeout,\n\t\t},\n\t\tRuntimeStartOptions: AgentStartOptionsForContainerRuntime,\n\t\tName: agentName,\n\t\tImage: agentImg,\n\t\tUseEtcd: false,\n\t\tInitialResync: true,\n\t\tEnv: []string{\n\t\t\t\"INITIAL_LOGLVL=\" + logging.DefaultLogger.GetLevel().String(),\n\t\t\t\"ETCD_CONFIG=\" + etcdConfig,\n\t\t\t\"GRPC_CONFIG=\" + grpcConfig,\n\t\t\t\"DEBUG=\" + os.Getenv(\"DEBUG\"),\n\t\t\t\"MICROSERVICE_LABEL=\" + agentName,\n\t\t},\n\t}\n\treturn opt\n}", "title": "" }, { "docid": "909d5f82bc629a76fe66b1f7ad2c6ce4", "score": "0.44686848", "text": "func AgentService(cfg *config.Config) error {\n\treturn nil\n}", "title": "" }, { "docid": "909d5f82bc629a76fe66b1f7ad2c6ce4", "score": "0.44686848", "text": "func AgentService(cfg *config.Config) error {\n\treturn nil\n}", "title": "" }, { "docid": "b1ba7ef07e7f5615783d858853825f8d", "score": "0.44644707", "text": "func (c *Catalog) Configure(env *Environment) error {\n\tif env.Platform != nil {\n\t\tif err := c.configureTraits(env.Platform.Status.Traits); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif err := c.configureTraitsFromAnnotations(env.Platform.Annotations); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tif env.IntegrationKit != nil {\n\t\tif err := c.configureTraits(env.IntegrationKit.Spec.Traits); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif err := c.configureTraitsFromAnnotations(env.IntegrationKit.Annotations); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tif env.Integration != nil {\n\t\tif err := c.configureTraits(env.Integration.Spec.Traits); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif err := c.configureTraitsFromAnnotations(env.Integration.Annotations); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "c5f9db9f12c9676ba4d0ab5a5824118c", "score": "0.4463576", "text": "func WithAgentEndpoints(eps []string) OpOption {\n\treturn func(o *op) {\n\t\to.agentEndpoints = eps\n\t}\n}", "title": "" }, { "docid": "e3b165aa870d93d745b8cbfc700786f0", "score": "0.44581416", "text": "func (c *CommandableHttpService) Configure(config *cconf.ConfigParams) {\n\tc.RestService.Configure(config)\n\tc.SwaggerAuto = config.GetAsBooleanWithDefault(\"swagger.auto\", c.SwaggerAuto)\n}", "title": "" }, { "docid": "3c7fd82a184f673542d718d72b927beb", "score": "0.44477412", "text": "func configureFlags(api *operations.ServiceConfiguratorAPI) {\n\t// api.CommandLineOptionsGroups = []swag.CommandLineOptionsGroup{ ... }\n}", "title": "" }, { "docid": "bb71463cf002a9e57fdd99dfa886f201", "score": "0.44443727", "text": "func (s *Service) Configure(signer crypto.Signer, auth auth.Authenticator, tracer *tracing.Tracer, o Options, e ExtraOptions, chainID int64, erc20 erc20.Service) {\n\ts.auth = auth\n\ts.signer = signer\n\ts.Options = o\n\ts.tracer = tracer\n\ts.metrics = newMetrics()\n\n\ts.quit = make(chan struct{})\n\n\ts.storer = e.Storer\n\ts.resolver = e.Resolver\n\ts.pss = e.Pss\n\ts.feedFactory = e.FeedFactory\n\ts.post = e.Post\n\ts.postageContract = e.PostageContract\n\ts.steward = e.Steward\n\ts.stakingContract = e.Staking\n\n\ts.pingpong = e.Pingpong\n\ts.topologyDriver = e.TopologyDriver\n\ts.accounting = e.Accounting\n\ts.chequebook = e.Chequebook\n\ts.swap = e.Swap\n\ts.lightNodes = e.LightNodes\n\ts.pseudosettle = e.Pseudosettle\n\ts.blockTime = e.BlockTime\n\n\ts.statusSem = semaphore.NewWeighted(1)\n\ts.postageSem = semaphore.NewWeighted(1)\n\ts.stakingSem = semaphore.NewWeighted(1)\n\ts.cashOutChequeSem = semaphore.NewWeighted(1)\n\n\ts.chainID = chainID\n\ts.erc20Service = erc20\n\ts.syncStatus = e.SyncStatus\n\n\ts.statusService = e.NodeStatus\n\n\ts.preMapHooks[\"resolve\"] = func(v string) (string, error) {\n\t\tswitch addr, err := s.resolveNameOrAddress(v); {\n\t\tcase err == nil:\n\t\t\treturn addr.String(), nil\n\t\tcase errors.Is(err, ens.ErrNotImplemented):\n\t\t\treturn v, nil\n\t\tdefault:\n\t\t\treturn \"\", err\n\t\t}\n\t}\n}", "title": "" }, { "docid": "ec606d5003cd0601133df96c7e90297d", "score": "0.44420746", "text": "func NewDatadogAgentWithLogCollection(namespace string, name string) v2alpha1.DatadogAgent {\n\treturn newDatadogAgentWithFeatures(\n\t\tnamespace,\n\t\tname,\n\t\t&v2alpha1.DatadogFeatures{\n\t\t\tLogCollection: &v2alpha1.LogCollectionFeatureConfig{\n\t\t\t\tEnabled: apiutils.NewBoolPointer(true),\n\t\t\t\tContainerCollectAll: apiutils.NewBoolPointer(true),\n\t\t\t},\n\t\t},\n\t)\n}", "title": "" }, { "docid": "7731bd46377dcc69fef57cc0a49331ec", "score": "0.44412914", "text": "func Configure(enableIPv6 bool, config *kubeproxyconfig.KubeProxyConntrackConfiguration) {\n\tloadKernelModule(\"overlay\")\n\tloadKernelModule(\"nf_conntrack\")\n\tloadKernelModule(\"br_netfilter\")\n\tloadKernelModule(\"iptable_nat\")\n\tif enableIPv6 {\n\t\tloadKernelModule(\"ip6table_nat\")\n\t}\n\n\t// Kernel is inconsistent about how devconf is configured for\n\t// new network namespaces between ipv4 and ipv6. Make sure to\n\t// enable forwarding on all and default for both ipv4 and ipv6.\n\tsysctls := map[string]int{\n\t\t\"net/ipv4/conf/all/forwarding\": 1,\n\t\t\"net/ipv4/conf/default/forwarding\": 1,\n\t\t\"net/bridge/bridge-nf-call-iptables\": 1,\n\t}\n\n\tif enableIPv6 {\n\t\tsysctls[\"net/ipv6/conf/all/forwarding\"] = 1\n\t\tsysctls[\"net/ipv6/conf/default/forwarding\"] = 1\n\t\tsysctls[\"net/bridge/bridge-nf-call-ip6tables\"] = 1\n\t\tsysctls[\"net/core/devconf_inherit_init_net\"] = 1\n\t}\n\n\tif conntrackMax := getConntrackMax(config); conntrackMax > 0 {\n\t\tsysctls[\"net/netfilter/nf_conntrack_max\"] = conntrackMax\n\t}\n\tif config.TCPEstablishedTimeout.Duration > 0 {\n\t\tsysctls[\"net/netfilter/nf_conntrack_tcp_timeout_established\"] = int(config.TCPEstablishedTimeout.Duration / time.Second)\n\t}\n\tif config.TCPCloseWaitTimeout.Duration > 0 {\n\t\tsysctls[\"net/netfilter/nf_conntrack_tcp_timeout_close_wait\"] = int(config.TCPCloseWaitTimeout.Duration / time.Second)\n\t}\n\n\tsys := sysctl.New()\n\tfor entry, value := range sysctls {\n\t\tif val, _ := sys.GetSysctl(entry); val != value {\n\t\t\tlogrus.Infof(\"Set sysctl '%v' to %v\", entry, value)\n\t\t\tif err := sys.SetSysctl(entry, value); err != nil {\n\t\t\t\tlogrus.Errorf(\"Failed to set sysctl: %v\", err)\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "fc0ba8f697d9db5e5f93319378c10790", "score": "0.44336557", "text": "func defaultConfig() Config {\n\tc := Config{}\n\n\tc.Enabled = true\n\tc.ServiceType = io.ServiceTypeGo\n\tc.APIMetaDataMapSize = 4096\n\n\tc.SamplingRate = 5 // 20%\n\n\tc.Collector.IP = \"127.0.0.1\"\n\tc.Collector.TCPPort = 9994\n\tc.Collector.StatPort = 9995\n\tc.Collector.SpanPort = 9996\n\tc.Collector.Uploaded = true\n\tc.Collector.UploadedAgentStat = true\n\tc.Collector.TCPConnTimeout = 2 * time.Second\n\n\tc.Labels = make(map[string]string)\n\tc.CustomInsightsEvents.Enabled = true\n\tc.TransactionEvents.Enabled = true\n\tc.TransactionEvents.Attributes.Enabled = true\n\tc.TransactionEvents.MaxSamplesStored = internal.MaxTxnEvents\n\tc.HighSecurity = false\n\tc.ErrorCollector.Enabled = true\n\tc.ErrorCollector.CaptureEvents = true\n\tc.ErrorCollector.IgnoreStatusCodes = []int{\n\t\t// https://github.com/grpc/grpc/blob/master/doc/statuscodes.md\n\t\t0, // gRPC OK\n\t\t5, // gRPC NOT_FOUND\n\t\thttp.StatusNotFound, // 404\n\t}\n\tc.ErrorCollector.Attributes.Enabled = true\n\tc.Utilization.DetectAWS = true\n\tc.Utilization.DetectAzure = true\n\tc.Utilization.DetectPCF = true\n\tc.Utilization.DetectGCP = true\n\tc.Utilization.DetectDocker = true\n\tc.Utilization.DetectKubernetes = true\n\tc.Attributes.Enabled = true\n\tc.RuntimeSampler.Enabled = true\n\n\tc.TransactionTracer.Enabled = true\n\tc.TransactionTracer.Threshold.IsApdexFailing = true\n\tc.TransactionTracer.Threshold.Duration = 500 * time.Millisecond\n\tc.TransactionTracer.Segments.Threshold = 2 * time.Millisecond\n\tc.TransactionTracer.Segments.StackTraceThreshold = 500 * time.Millisecond\n\tc.TransactionTracer.Attributes.Enabled = true\n\tc.TransactionTracer.Segments.Attributes.Enabled = true\n\n\tc.BrowserMonitoring.Enabled = false\n\t// browser monitoring attributes are disabled by default\n\tc.BrowserMonitoring.Attributes.Enabled = false\n\n\tc.CrossApplicationTracer.Enabled = true\n\tc.DistributedTracer.Enabled = true\n\tc.SpanEvents.Enabled = true\n\tc.SpanEvents.Attributes.Enabled = true\n\n\tc.DatastoreTracer.InstanceReporting.Enabled = true\n\tc.DatastoreTracer.DatabaseNameReporting.Enabled = true\n\tc.DatastoreTracer.QueryParameters.Enabled = true\n\tc.DatastoreTracer.SlowQuery.Enabled = true\n\tc.DatastoreTracer.SlowQuery.Threshold = 10 * time.Millisecond\n\n\tc.ServerlessMode.ApdexThreshold = 500 * time.Millisecond\n\tc.ServerlessMode.Enabled = false\n\n\tc.Heroku.UseDynoNames = true\n\tc.Heroku.DynoNamePrefixesToShorten = []string{\"scheduler\", \"run\"}\n\n\tc.InfiniteTracing.TraceObserver.Port = 443\n\tc.InfiniteTracing.SpanEvents.QueueSize = 10000\n\n\treturn c\n}", "title": "" }, { "docid": "5787232fe83f257286eee019ee798eb4", "score": "0.44256082", "text": "func (nc *nodeConfig) Configure() error {\n\tdrainHelper := nc.newDrainHelper()\n\t// If a Node object exists already, it implies that we are reconfiguring and we should cordon the node\n\tif nc.node != nil {\n\t\t// Make a best effort to cordon the node until it is fully configured\n\t\tif err := drain.RunCordonOrUncordon(drainHelper, nc.node, true); err != nil {\n\t\t\tnc.log.Info(\"unable to cordon\", \"node\", nc.node.GetName(), \"error\", err)\n\t\t}\n\t}\n\n\tif err := nc.createBootstrapFiles(); err != nil {\n\t\treturn err\n\t}\n\tif cluster.IsProxyEnabled() {\n\t\tif err := nc.ensureTrustedCABundle(); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\twicdKC, err := nc.generateWICDKubeconfig()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\twmcoVersion := version.Get()\n\t// Start all required services to bootstrap a node object using WICD\n\tif err := nc.Windows.Bootstrap(wmcoVersion, nc.wmcoNamespace, wicdKC); err != nil {\n\t\treturn fmt.Errorf(\"bootstrapping the Windows instance failed: %w\", err)\n\t}\n\n\t// Perform rest of the configuration with the kubelet running\n\terr = func() error {\n\t\tif nc.node == nil {\n\t\t\t// populate node object in nodeConfig in the case of a new Windows instance\n\t\t\tif err := nc.setNode(false); err != nil {\n\t\t\t\treturn fmt.Errorf(\"error setting node object: %w\", err)\n\t\t\t}\n\t\t}\n\n\t\t// Make a best effort to cordon the node until it is fully configured\n\t\tif err := drain.RunCordonOrUncordon(drainHelper, nc.node, true); err != nil {\n\t\t\tnc.log.Info(\"unable to cordon\", \"node\", nc.node.GetName(), \"error\", err)\n\t\t}\n\n\t\t// Ensure we are labeling and annotating the node as soon as the Node object is created, so that we can identify\n\t\t// which controller should be watching it\n\t\tannotationsToApply := map[string]string{PubKeyHashAnnotation: nc.publicKeyHash}\n\t\tfor key, value := range nc.additionalAnnotations {\n\t\t\tannotationsToApply[key] = value\n\t\t}\n\t\tif err := metadata.ApplyLabelsAndAnnotations(context.TODO(), nc.client, *nc.node, nc.additionalLabels,\n\t\t\tannotationsToApply); err != nil {\n\t\t\treturn fmt.Errorf(\"error updating public key hash and additional annotations on node %s: %w\",\n\t\t\t\tnc.node.GetName(), err)\n\t\t}\n\n\t\townedByCCM, err := isCloudControllerOwnedByCCM()\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unable to check if cloud controller owned by cloud controller manager: %w\", err)\n\t\t}\n\n\t\tif err := nc.Windows.ConfigureWICD(nc.wmcoNamespace, wicdKC); err != nil {\n\t\t\treturn fmt.Errorf(\"configuring WICD failed: %w\", err)\n\t\t}\n\t\t// Set the desired version annotation, communicating to WICD which Windows services configmap to use\n\t\tif err := metadata.ApplyDesiredVersionAnnotation(context.TODO(), nc.client, *nc.node, wmcoVersion); err != nil {\n\t\t\treturn fmt.Errorf(\"error updating desired version annotation on node %s: %w\", nc.node.GetName(), err)\n\t\t}\n\n\t\t// Wait for version annotation. This prevents uncordoning the node until all node services and networks are up\n\t\tif err := metadata.WaitForVersionAnnotation(context.TODO(), nc.client, nc.node.Name); err != nil {\n\t\t\treturn fmt.Errorf(\"error waiting for proper %s annotation for node %s: %w\", metadata.VersionAnnotation,\n\t\t\t\tnc.node.GetName(), err)\n\t\t}\n\n\t\t// Now that the node has been fully configured, update the node object in nodeConfig once more\n\t\tif err := nc.setNode(false); err != nil {\n\t\t\treturn fmt.Errorf(\"error getting node object: %w\", err)\n\t\t}\n\n\t\t// If we deploy on Azure with CCM support, we have to explicitly remove the cloud taint, because cloud node\n\t\t// manager running on the node can't do it itself, due to lack of RBAC permissions given by the node\n\t\t// kubeconfig it uses.\n\t\tif ownedByCCM && nc.platformType == configv1.AzurePlatformType {\n\t\t\t// TODO: The proper long term solution is to run this as a pod and give it the correct permissions\n\t\t\t// via service account. This isn't currently possible as we are unable to build Windows container images\n\t\t\t// due to shortcomings in our build system.\n\t\t\tcloudTaint := &core.Taint{\n\t\t\t\tKey: cloudproviderapi.TaintExternalCloudProvider,\n\t\t\t\tEffect: core.TaintEffectNoSchedule,\n\t\t\t}\n\t\t\tif err := cloudnodeutil.RemoveTaintOffNode(nc.k8sclientset, nc.node.GetName(), nc.node, cloudTaint); err != nil {\n\t\t\t\treturn fmt.Errorf(\"error excluding cloud taint on node %s: %w\", nc.node.GetName(), err)\n\t\t\t}\n\t\t}\n\n\t\t// Uncordon the node now that it is fully configured\n\t\tif err := drain.RunCordonOrUncordon(drainHelper, nc.node, false); err != nil {\n\t\t\treturn fmt.Errorf(\"error uncordoning the node %s: %w\", nc.node.GetName(), err)\n\t\t}\n\n\t\tnc.log.Info(\"instance has been configured as a worker node\", \"version\",\n\t\t\tnc.node.Annotations[metadata.VersionAnnotation])\n\t\treturn nil\n\t}()\n\n\t// Stop the kubelet so that the node is marked NotReady in case of an error in configuration. We are stopping all\n\t// the required services as they are interdependent and is safer to do so given the node is going to be NotReady.\n\tif err != nil {\n\t\tif err := nc.Windows.RunWICDCleanup(nc.wmcoNamespace, wicdKC); err != nil {\n\t\t\tnc.log.Info(\"Unable to mark node as NotReady\", \"error\", err)\n\t\t}\n\t}\n\treturn err\n}", "title": "" }, { "docid": "83927046c94cddb364fbf55a82841212", "score": "0.44233012", "text": "func NewAgent() (*Agent, error) {\n\tif uid := os.Geteuid(); uid != 0 {\n\t\tlogging.GetLogger().Warning(\"Agent needs root permissions for some feature like capture, network namespace introspection, some feature might not work as expected\")\n\t}\n\n\tbackend, err := graph.NewMemoryBackend()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\thostID := config.GetString(\"host_id\")\n\torigin := graph.Origin(hostID, config.AgentService)\n\tg := graph.NewGraph(hostID, backend, origin)\n\n\tapiAuthBackendName := config.GetString(\"agent.auth.api.backend\")\n\tapiAuthBackend, err := config.NewAuthenticationBackendByName(apiAuthBackendName)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tclusterAuthOptions := &shttp.AuthenticationOpts{\n\t\tUsername: config.GetString(\"agent.auth.cluster.username\"),\n\t\tPassword: config.GetString(\"agent.auth.cluster.password\"),\n\t\tCookie: config.GetStringMapString(\"http.cookie\"),\n\t}\n\n\tanalyzers, err := config.GetAnalyzerServiceAddresses()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Unable to get the analyzers list: %s\", err)\n\t}\n\n\tif len(analyzers) == 0 {\n\t\tlogging.GetLogger().Info(\"Agent is running in standalone mode\")\n\t}\n\n\tvar tlsConfig *tls.Config\n\tif config.IsTLSEnabled() {\n\t\ttlsConfig, err = config.GetTLSServerConfig(true)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\twsClientOpts, err := config.NewWSClientOpts(clusterAuthOptions)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tagent := &Agent{}\n\n\topts := pod.Opts{\n\t\tHubs: analyzers,\n\t\tWebsocketOpts: config.NewWSServerOpts(),\n\t\tWebsocketClientOpts: *wsClientOpts,\n\t\tAPIValidator: validator.Validator,\n\t\tGraphValidator: topology.SchemaValidator,\n\t\tTLSConfig: tlsConfig,\n\t\tAPIAuthBackend: apiAuthBackend,\n\t\tTopologyMarshallers: api.TopologyMarshallers,\n\t\tStatusReporter: agent,\n\t}\n\n\tlistenAddr := config.GetString(\"agent.listen\")\n\tpod, err := pod.NewPod(hostID, config.AgentService, listenAddr, \"/ws/agent/topology\", g, opts)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tagent.pod = pod\n\n\tagent.tidMapper = topology.NewTIDMapper(g)\n\tagent.tidMapper.Start()\n\n\trootNode, err := createRootNode(g)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tagent.topologyProbeBundle, err = NewTopologyProbeBundle(g, rootNode)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tupdateEvery := time.Duration(config.GetInt(\"flow.update\")) * time.Second\n\texpireAfter := time.Duration(config.GetInt(\"flow.expire\")) * time.Second\n\n\tanalyzerClientPool := pod.ClientPool()\n\tagent.flowClientPool = client.NewFlowClientPool(analyzerClientPool, wsClientOpts)\n\tflowTableAllocator := flow.NewTableAllocator(updateEvery, expireAfter, agent.flowClientPool)\n\n\tagent.flowProbeBundle = NewFlowProbeBundle(agent.topologyProbeBundle, g, flowTableAllocator)\n\n\tagent.onDemandPIServer, err = packetinjector.NewOnDemandInjectionServer(g, analyzerClientPool)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"unable to initialize on-demand packet injection: %s\", err)\n\t}\n\n\tagent.onDemandProbeServer, err = ondemand.NewOnDemandFlowProbeServer(agent.flowProbeBundle, g, analyzerClientPool)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"unable to initialize on-demand flow probe: %s\", err)\n\t}\n\n\t// exposes a flow server through the client connections\n\tflow.NewWSTableServer(flowTableAllocator, analyzerClientPool)\n\n\thttpServer := pod.HTTPServer()\n\tui.NewServer(httpServer, config.GetString(\"ui.extra_assets\"))\n\n\treturn agent, nil\n}", "title": "" }, { "docid": "231e33050f201191e237f636b62cae59", "score": "0.44175696", "text": "func Setup(conf *Config) (*Client, error) {\n\tvar config *rest.Config\n\tvar err error\n\tif conf.InCluster {\n\t\tconfig, err = rest.InClusterConfig()\n\t} else {\n\t\thome := homedir.HomeDir()\n\t\tkubeconfig := filepath.Join(home, \".kube\", \"config\")\n\t\tconfig, err = clientcmd.BuildConfigFromFlags(\"\", kubeconfig)\n\t}\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tclientset, err := kubernetes.NewForConfig(config)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdefaultResync := time.Second * 1\n\n\tkubeInformerOpt := kubeinformers.WithNamespace(faasNamespace)\n\tkubeInformerFactory := kubeinformers.NewSharedInformerFactoryWithOptions(clientset, defaultResync, kubeInformerOpt)\n\tgo startFactory(kubeInformerFactory)\n\n\tendpointsInformer := kubeInformerFactory.Core().V1().Endpoints()\n\tendpointsLister := endpointsInformer.Lister()\n\n\treturn &Client{\n\t\tmongoDBHost: conf.MongoDBHost,\n\t\tclientset: clientset,\n\t\tendpointLister: endpointsLister.Endpoints(faasNamespace),\n\t\tcache: cache.New(conf.CacheExpiryDuration, conf.CacheExpiryDuration),\n\t\tlimitRange: ResourceLimits{\n\t\t\tMinCPU: conf.LimitCPUMin,\n\t\t\tMaxCPU: conf.LimitCPUMax,\n\t\t\tMinMem: conf.LimitMemMin,\n\t\t\tMaxMem: conf.LimitMemMax,\n\t\t},\n\t}, nil\n}", "title": "" }, { "docid": "8b9210e985b3f7fd3ea30a7c4bbd5018", "score": "0.44124746", "text": "func (g *GameDelegate) ConfigureAgents() []boardgame.Agent {\n\treturn nil\n}", "title": "" }, { "docid": "46a63a154e73913c5b8c56b242519403", "score": "0.44077343", "text": "func Init(cfg *config.AgentConfig) func() {\n\tmu.Lock()\n\tdefer mu.Unlock()\n\tif initialized {\n\t\treturn func() {}\n\t}\n\tsdkconfig.InitConfig(cfg)\n\n\texporterFactory = makeExporterFactory(cfg)\n\n\texporter, err := exporterFactory()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tbatcher := sdktrace.NewBatchSpanProcessor(exporter, sdktrace.WithBatchTimeout(batchTimeout))\n\n\tresources, err := resource.New(\n\t\tcontext.Background(),\n\t\tresource.WithAttributes(createResources(cfg.GetServiceName().GetValue(), cfg.ResourceAttributes)...),\n\t)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tsampler := sdktrace.AlwaysSample()\n\ttp := sdktrace.NewTracerProvider(\n\t\tsdktrace.WithSampler(sampler),\n\t\tsdktrace.WithSpanProcessor(batcher),\n\t\tsdktrace.WithResource(resources),\n\t)\n\totel.SetTracerProvider(tp)\n\n\totel.SetTextMapPropagator(makePropagator(cfg.PropagationFormats))\n\n\ttraceProviders = make(map[string]*sdktrace.TracerProvider)\n\tglobalSampler = sampler\n\tinitialized = true\n\n\treturn func() {\n\t\tmu.Lock()\n\t\tdefer mu.Unlock()\n\t\tfor serviceName, tracerProvider := range traceProviders {\n\t\t\ttracerProvider.Shutdown(context.Background())\n\t\t\tdelete(traceProviders, serviceName)\n\t\t}\n\t\ttp.Shutdown(context.Background())\n\t\tinitialized = false\n\t}\n}", "title": "" }, { "docid": "49c5ddfa9f0fbcb76a766d8d1b1ba29a", "score": "0.44065404", "text": "func InitFlag() (*FlowqletConfig, error) {\n\n //all flag include host, port , nodeID,token,etcdEndpoint,updateserver,volumeDriver\n\thost := flag.String(\"host\", \"localhost\", \"listen address\")\n\tport := flag.Int(\"port\", 8800, \"listen port\")\n\tnodeID := flag.String(\"nodeID\", \"env1\", \"nodeID\")\n\ttoken := flag.String(\"token\", \"\", \"join token\")\n\tetcdEndpoint := flag.String(\"etcdURL\", \"127.0.0.1:2379\", \"etcd endporint\")\n\tupdateServer := flag.String(\"updateServer\", \"\", \"update web server endporint\")\n\tvolumeDriver := flag.String(\"volumeDriver\", \"local\", \"volume driver support local|s3\")\n\tlabel := flag.String(\"label\", \"\", \"label\")\n\t_version:=flag.Bool(\"version\",false,\"show version\")\n\n\tflag.Parse()\n\n\tif *_version {\n\t\tversion.PrintVersionInfo()\n\t\tos.Exit(-1)\n\t}\n\n\tvar err error\n\n\tif *token == \"\" {\n\t\treturn nil, fmt.Errorf(\"join token required.\")\n\t}\n\n\ttcpAddr, err := net.ResolveTCPAddr(\"tcp\", fmt.Sprintf(\"%s:%d\", *host, *port))\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tnodeConfig, err = NewFlowqletConfig(*nodeID, tcpAddr.String(), *token, *etcdEndpoint, *updateServer, *volumeDriver, *label)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn nodeConfig, nil\n}", "title": "" }, { "docid": "49be8f969d1a7828cf50d31f94c5bbfb", "score": "0.44044384", "text": "func Configure() (*DataFeedConfig, error) {\n\tlog.Debug(\"config.go Configure() ->\")\n\tconfig := &DataFeedConfig{}\n\n\t// Unmarshal the viper config into the server Config\n\tif err := viper.Unmarshal(config); err != nil {\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"err\": err,\n\t\t}).Error(\"Failed to unmarshal config options to server config\")\n\t\treturn config, err\n\t}\n\n\t// Validates that the configuration has a valid host/port\n\t_, err := url.ParseRequestURI(path.Join(\"http://\", config.ListenAddress()))\n\tif err != nil {\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"err\": err,\n\t\t}).Error(fmt.Sprintf(\"Listen adddress '%s' is not valid. Please check the 'host' and 'port' configuration\", config.ListenAddress()))\n\t\treturn config, err\n\t}\n\t// Set log level\n\tconfig.SetLogLevel()\n\n\t// Fix any relative paths that might be in the config file\n\tconfig.TLSConfig.FixupRelativeTLSPaths(viper.ConfigFileUsed())\n\tserviceCerts, err := config.TLSConfig.ReadCerts()\n\n\tif err != nil {\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"err\": err.Error(),\n\t\t}).Error(\"Failed to load x509 key pair and/or root CA certificate\")\n\t\treturn config, err\n\t}\n\tconfig.ServiceCerts = serviceCerts\n\n\tif config.PostgresConfig.ConnectionString == \"\" {\n\t\tvar err error\n\t\tlog.Infof(\"Database %s\", config.PostgresConfig.Database)\n\t\tconfig.PostgresConfig.ConnectionString, err = platform_config.PGURIFromEnvironment(config.PostgresConfig.Database)\n\t\tmaskedDBConnString := MaskPGCredInURI(config.PostgresConfig.ConnectionString)\n\t\tlog.Infof(\"Masked Database connection string %s\", maskedDBConnString)\n\t\tif err != nil {\n\t\t\tlog.WithError(err).Error(\"Failed to get pg uri\")\n\t\t\treturn nil, err\n\t\t}\n\t}\n\tlogConfigForDebug := fmt.Sprintf(\"DATA FEED SERVICE CONFIG: %+v\", config)\n\tmaskedLogConfigForDebug := MaskPGCredInURI(logConfigForDebug)\n\tlog.Debug(maskedLogConfigForDebug)\n\tlog.Debug(\"end config.go Configure() ->\")\n\treturn config, nil\n}", "title": "" }, { "docid": "519ba994e37c4821aa21e849f477767a", "score": "0.44041154", "text": "func Configure(confs Configs) {\n}", "title": "" }, { "docid": "336b6f4b827cf4313cc2b2b96b59644e", "score": "0.4395305", "text": "func (t *LoadBalancerTracer) Config(ctx context.Context, zone string, id types.ID) error {\n\tlog.Println(\"[TRACE] LoadBalancerAPI.Config start\")\n\ttargetArguments := struct {\n\t\tArgzone string\n\t\tArgid types.ID `json:\"id\"`\n\t}{\n\t\tArgzone: zone,\n\t\tArgid: id,\n\t}\n\tif d, err := json.Marshal(targetArguments); err == nil {\n\t\tlog.Printf(\"[TRACE] \\targs: %s\\n\", string(d))\n\t}\n\n\tdefer func() {\n\t\tlog.Println(\"[TRACE] LoadBalancerAPI.Config end\")\n\t}()\n\n\terr := t.Internal.Config(ctx, zone, id)\n\ttargetResults := struct {\n\t\tError error\n\t}{\n\t\tError: err,\n\t}\n\tif d, err := json.Marshal(targetResults); err == nil {\n\t\tlog.Printf(\"[TRACE] \\tresults: %s\\n\", string(d))\n\t}\n\n\treturn err\n}", "title": "" }, { "docid": "e362203d52a892515730d675af0e8dd5", "score": "0.43778962", "text": "func (ns1 *NS1) Configure(cfg *Cfg) error {\n\tif cfg.APIKey == \"\" {\n\t\treturn fmt.Errorf(\"the NS1 Pusher requires an API KEY to be defined\")\n\t}\n\n\tif cfg.SourceID == \"\" {\n\t\treturn fmt.Errorf(\"the NS1 Pusher requires a SourceID to be defined\")\n\t}\n\n\tns1.Cfg = cfg\n\thttpClient := &http.Client{Timeout: time.Duration(ns1.Cfg.ClientTimeout) * time.Second}\n\tns1.client = api.NewClient(httpClient, api.SetAPIKey(ns1.Cfg.APIKey))\n\treturn nil\n}", "title": "" }, { "docid": "97a6ab764e7466530337cef93d1f7542", "score": "0.43775472", "text": "func (b *ListenerBuilder) Configure(opts ...ListenerBuilderOpt) *ListenerBuilder {\n\tfor _, opt := range opts {\n\t\topt.ApplyTo(&b.config)\n\t}\n\treturn b\n}", "title": "" }, { "docid": "4a2c0f498b461c252c9a25ab172af2b6", "score": "0.43772933", "text": "func configureFlags(api *operations.VtmRefactorAPI) {\n\t// api.CommandLineOptionsGroups = []swag.CommandLineOptionsGroup{ ... }\n}", "title": "" }, { "docid": "f6724143b1e8bb6de90b88dc3675f590", "score": "0.4374081", "text": "func NewDatadogAgentWithEventCollection(namespace string, name string) v2alpha1.DatadogAgent {\n\treturn newDatadogAgentWithFeatures(\n\t\tnamespace,\n\t\tname,\n\t\t&v2alpha1.DatadogFeatures{\n\t\t\tEventCollection: &v2alpha1.EventCollectionFeatureConfig{\n\t\t\t\tCollectKubernetesEvents: apiutils.NewBoolPointer(true),\n\t\t\t},\n\t\t},\n\t)\n}", "title": "" }, { "docid": "4361d0f70f26720b772380341f3dfa2f", "score": "0.43675342", "text": "func (c *Config) UpdateConfigFromAgent() error {\n\t// check config was enable\n\tc.Lock()\n\tdefer c.Unlock()\n\n\tclient := &http.Client{}\n\treq, err := http.NewRequest(\"GET\", c.AgentURL, nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\treq.Header.Set(\"Authorization\", c.SerectKey)\n\n\tres, err := client.Do(req)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer res.Body.Close()\n\n\tagentCfg := agentConfig.Config{}\n\terr = json.NewDecoder(res.Body).Decode(&agentCfg)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tc.ConnectionInfo = agentCfg.ConnectionInfo\n\tc.DBUsername = c.UserWithACL.Username\n\tc.DBPassword = c.UserWithACL.Password\n\tc.ModelList = agentCfg.ModelList\n\terr = c.UpdateDB()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "487a0e129526d834545dd4c682491bae", "score": "0.4360403", "text": "func configureFlags(api *operations.AstrolabeAPI) {\n\t// api.CommandLineOptionsGroups = []swag.CommandLineOptionsGroup{ ... }\n}", "title": "" }, { "docid": "bcd34fb767f1968d06f0465fc0983aa8", "score": "0.4360283", "text": "func (m *Monitor) Configure(conf *Config) error {\n\tconf.pyConf = &python.Config{\n\t\tMonitorConfig: conf.MonitorConfig,\n\t\tHost: conf.Host,\n\t\tPort: conf.Port,\n\t\tModuleName: \"consul_plugin\",\n\t\tModulePaths: []string{collectd.MakePythonPluginPath(\"consul\")},\n\t\tTypesDBPaths: []string{collectd.DefaultTypesDBPath()},\n\t\tPluginConfig: map[string]interface{}{\n\t\t\t\"ApiHost\": conf.Host,\n\t\t\t\"ApiPort\": conf.Port,\n\t\t\t\"TelemetryServer\": conf.TelemetryServer,\n\t\t\t\"TelemetryHost\": conf.TelemetryHost,\n\t\t\t\"TelemetryPort\": conf.TelemetryPort,\n\t\t\t\"SfxToken\": conf.SignalFxAccessToken,\n\t\t\t\"EnhancedMetrics\": conf.EnhancedMetrics,\n\t\t\t\"AclToken\": conf.ACLToken,\n\t\t\t\"CaCertificate\": conf.CACertificate,\n\t\t\t\"ClientCertificate\": conf.ClientCertificate,\n\t\t\t\"ClientKey\": conf.ClientKey,\n\t\t},\n\t}\n\n\tif conf.UseHTTPS {\n\t\tconf.pyConf.PluginConfig[\"ApiProtocol\"] = \"https\"\n\t} else {\n\t\tconf.pyConf.PluginConfig[\"ApiProtocol\"] = \"http\"\n\t}\n\n\treturn m.PyMonitor.Configure(conf)\n}", "title": "" }, { "docid": "7565bc9093f56e32d75e8c0b1899fe63", "score": "0.43541396", "text": "func writeLogstashAgentConfig(hostID string, hostIPs string, svcPath string, service *service.Service,\n\tinstanceID string, logforwarderOptions LogforwarderOptions) error {\n\n\t// generate a prospector configuration for each service log file\n\tprospectorsConf := ``\n\tfor _, logConfig := range service.LogConfigs {\n\t\tprospectorsConf = prospectorsConf + `\n - ignore_older: 10m\n close_inactive: 5m\n close_timeout: 15m\n paths:\n - %s\n fields: %s`\n\t\tprospectorsConf = fmt.Sprintf(prospectorsConf, logConfig.Path,\n\t\t\tformatTagsForConfFile(createFields(hostID, hostIPs, svcPath, service, instanceID, &logConfig)))\n\t}\n\n\tresourcePath := filepath.Dir(logforwarderOptions.Path)\n\ttemplatePath := filepath.Join(resourcePath, \"filebeat.conf.in\")\n\ttemplateContent, err := ioutil.ReadFile(templatePath)\n\tif err != nil {\n\t\tglog.Errorf(\"Unable to read logforwarder configuration template %s: %s\", templatePath, err)\n\t\treturn err\n\t}\n\tglog.Infof(\"Using logforwarder template from %s\", templatePath)\n\n\t// Perform all of the template substitution to create the filebeat configuration file from the \".in\" template\n\tfilebeatShipperConf := strings.Replace(string(templateContent), \"${PROSPECTORS_SECTION}\", prospectorsConf, 1)\n\tfilebeatShipperConf = strings.Replace(filebeatShipperConf, \"${HOSTS_SECTION}\", \"127.0.0.1:5043\", 1)\n\tfilebeatShipperConf = strings.Replace(filebeatShipperConf, \"${CERT_SECTION}\", resourcePath+\"/filebeat.crt\", 1)\n\tfilebeatShipperConf = strings.Replace(filebeatShipperConf, \"${CERT_KEY_SECTION}\", resourcePath+\"/filebeat.key\", 1)\n\tfilebeatShipperConf = strings.Replace(filebeatShipperConf, \"${CERT_AUTH_SECTION}\", resourcePath+\"/filebeat.crt\", 1)\n\n\tconfig := servicedefinition.ConfigFile{\n\t\tFilename: logforwarderOptions.ConfigFile,\n\t\tContent: filebeatShipperConf,\n\t}\n\n\tif err := writeConfFile(config); err != nil {\n\t\tglog.Errorf(\"Unable to create logforwarder configuration file %s: %s\", config.Filename, err)\n\t\treturn err\n\t}\n\n\tglog.V(2).Infof(\"Created logforwarder configuration at %s\", config.Filename)\n\treturn nil\n}", "title": "" }, { "docid": "7a5a68e6d021d7df567c04fdf778b629", "score": "0.43539178", "text": "func (c *DaemonConfig) Populate(vp *viper.Viper) {\n\tvar err error\n\n\tc.AgentHealthPort = vp.GetInt(AgentHealthPort)\n\tc.ClusterHealthPort = vp.GetInt(ClusterHealthPort)\n\tc.ClusterMeshHealthPort = vp.GetInt(ClusterMeshHealthPort)\n\tc.AgentLabels = vp.GetStringSlice(AgentLabels)\n\tc.AllowICMPFragNeeded = vp.GetBool(AllowICMPFragNeeded)\n\tc.AllowLocalhost = vp.GetString(AllowLocalhost)\n\tc.AnnotateK8sNode = vp.GetBool(AnnotateK8sNode)\n\tc.ARPPingRefreshPeriod = vp.GetDuration(ARPPingRefreshPeriod)\n\tc.EnableL2NeighDiscovery = vp.GetBool(EnableL2NeighDiscovery)\n\tc.AutoCreateCiliumNodeResource = vp.GetBool(AutoCreateCiliumNodeResource)\n\tc.BPFRoot = vp.GetString(BPFRoot)\n\tc.CGroupRoot = vp.GetString(CGroupRoot)\n\tc.ClusterID = vp.GetUint32(ClusterIDName)\n\tc.ClusterName = vp.GetString(ClusterName)\n\tc.DatapathMode = vp.GetString(DatapathMode)\n\tc.Debug = vp.GetBool(DebugArg)\n\tc.DebugVerbose = vp.GetStringSlice(DebugVerbose)\n\tc.DirectRoutingDevice = vp.GetString(DirectRoutingDevice)\n\tc.LBDevInheritIPAddr = vp.GetString(LBDevInheritIPAddr)\n\tc.EnableIPv4 = vp.GetBool(EnableIPv4Name)\n\tc.EnableIPv6 = vp.GetBool(EnableIPv6Name)\n\tc.EnableIPv6NDP = vp.GetBool(EnableIPv6NDPName)\n\tc.EnableIPv6BIGTCP = vp.GetBool(EnableIPv6BIGTCP)\n\tc.EnableIPv4BIGTCP = vp.GetBool(EnableIPv4BIGTCP)\n\tc.EnableSRv6 = vp.GetBool(EnableSRv6)\n\tc.SRv6EncapMode = vp.GetString(SRv6EncapModeName)\n\tc.EnableSCTP = vp.GetBool(EnableSCTPName)\n\tc.IPv6MCastDevice = vp.GetString(IPv6MCastDevice)\n\tc.EnableIPSec = vp.GetBool(EnableIPSecName)\n\tc.EnableWireguard = vp.GetBool(EnableWireguard)\n\tc.EnableL2Announcements = vp.GetBool(EnableL2Announcements)\n\tc.L2AnnouncerLeaseDuration = vp.GetDuration(L2AnnouncerLeaseDuration)\n\tc.L2AnnouncerRenewDeadline = vp.GetDuration(L2AnnouncerRenewDeadline)\n\tc.L2AnnouncerRetryPeriod = vp.GetDuration(L2AnnouncerRetryPeriod)\n\tc.EnableWireguardUserspaceFallback = vp.GetBool(EnableWireguardUserspaceFallback)\n\tc.EnableWellKnownIdentities = vp.GetBool(EnableWellKnownIdentities)\n\tc.EnableXDPPrefilter = vp.GetBool(EnableXDPPrefilter)\n\tc.DisableCiliumEndpointCRD = vp.GetBool(DisableCiliumEndpointCRDName)\n\tc.MasqueradeInterfaces = vp.GetStringSlice(MasqueradeInterfaces)\n\tc.EgressMasqueradeInterfaces = strings.Join(c.MasqueradeInterfaces, \",\")\n\tc.BPFSocketLBHostnsOnly = vp.GetBool(BPFSocketLBHostnsOnly)\n\tc.EnableSocketLB = vp.GetBool(EnableSocketLB)\n\tc.EnableSocketLBTracing = vp.GetBool(EnableSocketLBTracing)\n\tc.EnableRemoteNodeIdentity = vp.GetBool(EnableRemoteNodeIdentity)\n\tc.EnableBPFTProxy = vp.GetBool(EnableBPFTProxy)\n\tc.EnableXTSocketFallback = vp.GetBool(EnableXTSocketFallbackName)\n\tc.EnableAutoDirectRouting = vp.GetBool(EnableAutoDirectRoutingName)\n\tc.EnableEndpointRoutes = vp.GetBool(EnableEndpointRoutes)\n\tc.EnableHealthChecking = vp.GetBool(EnableHealthChecking)\n\tc.EnableEndpointHealthChecking = vp.GetBool(EnableEndpointHealthChecking)\n\tc.EnableHealthCheckNodePort = vp.GetBool(EnableHealthCheckNodePort)\n\tc.EnableHealthCheckLoadBalancerIP = vp.GetBool(EnableHealthCheckLoadBalancerIP)\n\tc.EnableLocalNodeRoute = vp.GetBool(EnableLocalNodeRoute)\n\tc.EnablePolicy = strings.ToLower(vp.GetString(EnablePolicy))\n\tc.EnableExternalIPs = vp.GetBool(EnableExternalIPs)\n\tc.EnableL7Proxy = vp.GetBool(EnableL7Proxy)\n\tc.EnableTracing = vp.GetBool(EnableTracing)\n\tc.EnableUnreachableRoutes = vp.GetBool(EnableUnreachableRoutes)\n\tc.EnableNodePort = vp.GetBool(EnableNodePort)\n\tc.EnableSVCSourceRangeCheck = vp.GetBool(EnableSVCSourceRangeCheck)\n\tc.EnableHostPort = vp.GetBool(EnableHostPort)\n\tc.EnableHostLegacyRouting = vp.GetBool(EnableHostLegacyRouting)\n\tc.MaglevTableSize = vp.GetInt(MaglevTableSize)\n\tc.MaglevHashSeed = vp.GetString(MaglevHashSeed)\n\tc.NodePortBindProtection = vp.GetBool(NodePortBindProtection)\n\tc.EnableAutoProtectNodePortRange = vp.GetBool(EnableAutoProtectNodePortRange)\n\tc.KubeProxyReplacement = vp.GetString(KubeProxyReplacement)\n\tc.EnableSessionAffinity = vp.GetBool(EnableSessionAffinity)\n\tc.EnableServiceTopology = vp.GetBool(EnableServiceTopology)\n\tc.EnableBandwidthManager = vp.GetBool(EnableBandwidthManager)\n\tc.EnableBBR = vp.GetBool(EnableBBR)\n\tc.EnableRecorder = vp.GetBool(EnableRecorder)\n\tc.EnableMKE = vp.GetBool(EnableMKE)\n\tc.CgroupPathMKE = vp.GetString(CgroupPathMKE)\n\tc.EnableHostFirewall = vp.GetBool(EnableHostFirewall)\n\tc.EnableLocalRedirectPolicy = vp.GetBool(EnableLocalRedirectPolicy)\n\tc.EncryptInterface = vp.GetStringSlice(EncryptInterface)\n\tc.EncryptNode = vp.GetBool(EncryptNode)\n\tc.EnvoyLogPath = vp.GetString(EnvoyLog)\n\tc.HTTPNormalizePath = vp.GetBool(HTTPNormalizePath)\n\tc.HTTPIdleTimeout = vp.GetInt(HTTPIdleTimeout)\n\tc.HTTPMaxGRPCTimeout = vp.GetInt(HTTPMaxGRPCTimeout)\n\tc.HTTPRequestTimeout = vp.GetInt(HTTPRequestTimeout)\n\tc.HTTPRetryCount = vp.GetInt(HTTPRetryCount)\n\tc.HTTPRetryTimeout = vp.GetInt(HTTPRetryTimeout)\n\tc.IdentityChangeGracePeriod = vp.GetDuration(IdentityChangeGracePeriod)\n\tc.IdentityRestoreGracePeriod = vp.GetDuration(IdentityRestoreGracePeriod)\n\tc.IPAM = vp.GetString(IPAM)\n\tc.IPv4Range = vp.GetString(IPv4Range)\n\tc.IPv4NodeAddr = vp.GetString(IPv4NodeAddr)\n\tc.IPv4ServiceRange = vp.GetString(IPv4ServiceRange)\n\tc.IPv6ClusterAllocCIDR = vp.GetString(IPv6ClusterAllocCIDRName)\n\tc.IPv6NodeAddr = vp.GetString(IPv6NodeAddr)\n\tc.IPv6Range = vp.GetString(IPv6Range)\n\tc.IPv6ServiceRange = vp.GetString(IPv6ServiceRange)\n\tc.JoinCluster = vp.GetBool(JoinClusterName)\n\tc.K8sEnableK8sEndpointSlice = vp.GetBool(K8sEnableEndpointSlice)\n\tc.K8sRequireIPv4PodCIDR = vp.GetBool(K8sRequireIPv4PodCIDRName)\n\tc.K8sRequireIPv6PodCIDR = vp.GetBool(K8sRequireIPv6PodCIDRName)\n\tc.K8sServiceCacheSize = uint(vp.GetInt(K8sServiceCacheSize))\n\tc.K8sEventHandover = vp.GetBool(K8sEventHandover)\n\tc.K8sSyncTimeout = vp.GetDuration(K8sSyncTimeoutName)\n\tc.AllocatorListTimeout = vp.GetDuration(AllocatorListTimeoutName)\n\tc.K8sWatcherEndpointSelector = vp.GetString(K8sWatcherEndpointSelector)\n\tc.KeepConfig = vp.GetBool(KeepConfig)\n\tc.KVStore = vp.GetString(KVStore)\n\tc.KVstoreLeaseTTL = vp.GetDuration(KVstoreLeaseTTL)\n\tc.KVstoreKeepAliveInterval = c.KVstoreLeaseTTL / defaults.KVstoreKeepAliveIntervalFactor\n\tc.KVstorePeriodicSync = vp.GetDuration(KVstorePeriodicSync)\n\tc.KVstoreConnectivityTimeout = vp.GetDuration(KVstoreConnectivityTimeout)\n\tc.KVstoreMaxConsecutiveQuorumErrors = vp.GetInt(KVstoreMaxConsecutiveQuorumErrorsName)\n\tc.IPAllocationTimeout = vp.GetDuration(IPAllocationTimeout)\n\tc.LabelPrefixFile = vp.GetString(LabelPrefixFile)\n\tc.Labels = vp.GetStringSlice(Labels)\n\tc.LibDir = vp.GetString(LibDir)\n\tc.LogDriver = vp.GetStringSlice(LogDriver)\n\tc.LogSystemLoadConfig = vp.GetBool(LogSystemLoadConfigName)\n\tc.Logstash = vp.GetBool(Logstash)\n\tc.LoopbackIPv4 = vp.GetString(LoopbackIPv4)\n\tc.LocalRouterIPv4 = vp.GetString(LocalRouterIPv4)\n\tc.LocalRouterIPv6 = vp.GetString(LocalRouterIPv6)\n\tc.EnableBPFClockProbe = vp.GetBool(EnableBPFClockProbe)\n\tc.EnableIPMasqAgent = vp.GetBool(EnableIPMasqAgent)\n\tc.EnableIPv4EgressGateway = vp.GetBool(EnableIPv4EgressGateway)\n\tc.EnableEnvoyConfig = vp.GetBool(EnableEnvoyConfig)\n\tc.EnableIngressController = vp.GetBool(EnableIngressController)\n\tc.EnableGatewayAPI = vp.GetBool(EnableGatewayAPI)\n\tc.EnvoyConfigTimeout = vp.GetDuration(EnvoyConfigTimeout)\n\tc.IPMasqAgentConfigPath = vp.GetString(IPMasqAgentConfigPath)\n\tc.InstallIptRules = vp.GetBool(InstallIptRules)\n\tc.IPTablesLockTimeout = vp.GetDuration(IPTablesLockTimeout)\n\tc.IPTablesRandomFully = vp.GetBool(IPTablesRandomFully)\n\tc.IPSecKeyFile = vp.GetString(IPSecKeyFileName)\n\tc.IPsecKeyRotationDuration = vp.GetDuration(IPsecKeyRotationDuration)\n\tc.EnableIPsecKeyWatcher = vp.GetBool(EnableIPsecKeyWatcher)\n\tc.MonitorAggregation = vp.GetString(MonitorAggregationName)\n\tc.MonitorAggregationInterval = vp.GetDuration(MonitorAggregationInterval)\n\tc.MTU = vp.GetInt(MTUName)\n\tc.PreAllocateMaps = vp.GetBool(PreAllocateMapsName)\n\tc.PrependIptablesChains = vp.GetBool(PrependIptablesChainsName)\n\tc.ProcFs = vp.GetString(ProcFs)\n\tc.ProxyConnectTimeout = vp.GetInt(ProxyConnectTimeout)\n\tc.ProxyGID = vp.GetInt(ProxyGID)\n\tc.ProxyPrometheusPort = vp.GetInt(ProxyPrometheusPort)\n\tc.ProxyMaxRequestsPerConnection = vp.GetInt(ProxyMaxRequestsPerConnection)\n\tc.ProxyMaxConnectionDuration = time.Duration(vp.GetInt64(ProxyMaxConnectionDuration))\n\tc.ProxyIdleTimeout = time.Duration(vp.GetInt64(ProxyIdleTimeout))\n\tc.RestoreState = vp.GetBool(Restore)\n\tc.RouteMetric = vp.GetInt(RouteMetric)\n\tc.RunDir = vp.GetString(StateDir)\n\tc.ExternalEnvoyProxy = vp.GetBool(ExternalEnvoyProxy)\n\tc.SidecarIstioProxyImage = vp.GetString(SidecarIstioProxyImage)\n\tc.UseSingleClusterRoute = vp.GetBool(SingleClusterRouteName)\n\tc.SocketPath = vp.GetString(SocketPath)\n\tc.TracePayloadlen = vp.GetInt(TracePayloadlen)\n\tc.Version = vp.GetString(Version)\n\tc.PolicyTriggerInterval = vp.GetDuration(PolicyTriggerInterval)\n\tc.CTMapEntriesTimeoutTCP = vp.GetDuration(CTMapEntriesTimeoutTCPName)\n\tc.CTMapEntriesTimeoutAny = vp.GetDuration(CTMapEntriesTimeoutAnyName)\n\tc.CTMapEntriesTimeoutSVCTCP = vp.GetDuration(CTMapEntriesTimeoutSVCTCPName)\n\tc.CTMapEntriesTimeoutSVCTCPGrace = vp.GetDuration(CTMapEntriesTimeoutSVCTCPGraceName)\n\tc.CTMapEntriesTimeoutSVCAny = vp.GetDuration(CTMapEntriesTimeoutSVCAnyName)\n\tc.CTMapEntriesTimeoutSYN = vp.GetDuration(CTMapEntriesTimeoutSYNName)\n\tc.CTMapEntriesTimeoutFIN = vp.GetDuration(CTMapEntriesTimeoutFINName)\n\tc.PolicyAuditMode = vp.GetBool(PolicyAuditModeArg)\n\tc.EnableIPv4FragmentsTracking = vp.GetBool(EnableIPv4FragmentsTrackingName)\n\tc.FragmentsMapEntries = vp.GetInt(FragmentsMapEntriesName)\n\tc.K8sServiceProxyName = vp.GetString(K8sServiceProxyName)\n\tc.CRDWaitTimeout = vp.GetDuration(CRDWaitTimeout)\n\tc.LoadBalancerDSRDispatch = vp.GetString(LoadBalancerDSRDispatch)\n\tc.LoadBalancerDSRL4Xlate = vp.GetString(LoadBalancerDSRL4Xlate)\n\tc.LoadBalancerRSSv4CIDR = vp.GetString(LoadBalancerRSSv4CIDR)\n\tc.LoadBalancerRSSv6CIDR = vp.GetString(LoadBalancerRSSv6CIDR)\n\tc.InstallNoConntrackIptRules = vp.GetBool(InstallNoConntrackIptRules)\n\tc.EnableCustomCalls = vp.GetBool(EnableCustomCallsName)\n\tc.BGPAnnounceLBIP = vp.GetBool(BGPAnnounceLBIP)\n\tc.BGPAnnouncePodCIDR = vp.GetBool(BGPAnnouncePodCIDR)\n\tc.BGPConfigPath = vp.GetString(BGPConfigPath)\n\tc.ExternalClusterIP = vp.GetBool(ExternalClusterIPName)\n\tc.EnableNat46X64Gateway = vp.GetBool(EnableNat46X64Gateway)\n\tc.EnableHighScaleIPcache = vp.GetBool(EnableHighScaleIPcache)\n\tc.EnableIPv4Masquerade = vp.GetBool(EnableIPv4Masquerade) && c.EnableIPv4\n\tc.EnableIPv6Masquerade = vp.GetBool(EnableIPv6Masquerade) && c.EnableIPv6\n\tc.EnableBPFMasquerade = vp.GetBool(EnableBPFMasquerade)\n\tc.EnableMasqueradeRouteSource = vp.GetBool(EnableMasqueradeRouteSource)\n\tc.DeriveMasqIPAddrFromDevice = vp.GetString(DeriveMasqIPAddrFromDevice)\n\tc.EnablePMTUDiscovery = vp.GetBool(EnablePMTUDiscovery)\n\tc.IPv6NAT46x64CIDR = defaults.IPv6NAT46x64CIDR\n\tc.IPAMCiliumNodeUpdateRate = vp.GetDuration(IPAMCiliumNodeUpdateRate)\n\n\tc.populateLoadBalancerSettings(vp)\n\tc.populateDevices(vp)\n\tc.EnableRuntimeDeviceDetection = vp.GetBool(EnableRuntimeDeviceDetection)\n\tc.EgressMultiHomeIPRuleCompat = vp.GetBool(EgressMultiHomeIPRuleCompat)\n\n\tvlanBPFBypassIDs := vp.GetStringSlice(VLANBPFBypass)\n\tc.VLANBPFBypass = make([]int, 0, len(vlanBPFBypassIDs))\n\tfor _, vlanIDStr := range vlanBPFBypassIDs {\n\t\tvlanID, err := strconv.Atoi(vlanIDStr)\n\t\tif err != nil {\n\t\t\tlog.WithError(err).Fatalf(\"Cannot parse vlan ID integer from --%s option\", VLANBPFBypass)\n\t\t}\n\t\tc.VLANBPFBypass = append(c.VLANBPFBypass, vlanID)\n\t}\n\n\ttcFilterPrio := vp.GetUint32(TCFilterPriority)\n\tif tcFilterPrio > math.MaxUint16 {\n\t\tlog.Fatalf(\"%s cannot be higher than %d\", TCFilterPriority, math.MaxUint16)\n\t}\n\tc.TCFilterPriority = uint16(tcFilterPrio)\n\n\tc.Tunnel = vp.GetString(TunnelName)\n\tc.RoutingMode = vp.GetString(RoutingMode)\n\tc.TunnelProtocol = vp.GetString(TunnelProtocol)\n\tc.TunnelPort = vp.GetInt(TunnelPortName)\n\n\tif c.Tunnel != \"\" && c.RoutingMode != defaults.RoutingMode {\n\t\tlog.Fatalf(\"Option --%s cannot be used in combination with --%s\", RoutingMode, TunnelName)\n\t}\n\n\tif c.Tunnel == \"disabled\" {\n\t\tc.RoutingMode = RoutingModeNative\n\t} else if c.Tunnel != \"\" {\n\t\tc.TunnelProtocol = c.Tunnel\n\t}\n\tc.Tunnel = \"\"\n\n\tif c.TunnelPort == 0 {\n\t\t// manually pick port for native-routing and DSR with Geneve dispatch:\n\t\tif !c.TunnelingEnabled() &&\n\t\t\t(c.EnableNodePort || (c.KubeProxyReplacement == KubeProxyReplacementStrict || c.KubeProxyReplacement == KubeProxyReplacementTrue)) &&\n\t\t\tc.NodePortMode != NodePortModeSNAT &&\n\t\t\tc.LoadBalancerDSRDispatch == DSRDispatchGeneve {\n\t\t\tc.TunnelPort = defaults.TunnelPortGeneve\n\t\t} else {\n\t\t\tswitch c.TunnelProtocol {\n\t\t\tcase TunnelVXLAN:\n\t\t\t\tc.TunnelPort = defaults.TunnelPortVXLAN\n\t\t\tcase TunnelGeneve:\n\t\t\t\tc.TunnelPort = defaults.TunnelPortGeneve\n\t\t\t}\n\t\t}\n\t}\n\n\tif vp.IsSet(AddressScopeMax) {\n\t\tc.AddressScopeMax, err = ip.ParseScope(vp.GetString(AddressScopeMax))\n\t\tif err != nil {\n\t\t\tlog.WithError(err).Fatalf(\"Cannot parse scope integer from --%s option\", AddressScopeMax)\n\t\t}\n\t} else {\n\t\tc.AddressScopeMax = defaults.AddressScopeMax\n\t}\n\n\tif c.EnableNat46X64Gateway {\n\t\tif !c.EnableIPv4 || !c.EnableIPv6 {\n\t\t\tlog.Fatalf(\"--%s requires both --%s and --%s enabled\",\n\t\t\t\tEnableNat46X64Gateway, EnableIPv4Name, EnableIPv6Name)\n\t\t}\n\t}\n\n\tencryptionStrictModeEnabled := vp.GetBool(EnableEncryptionStrictMode)\n\tif encryptionStrictModeEnabled {\n\t\tif c.EnableIPv6 {\n\t\t\tlog.Warnf(\"WireGuard encryption strict mode only support IPv4. IPv6 traffic is not protected and can be leaked.\")\n\t\t}\n\n\t\tstrictCIDR := vp.GetString(EncryptionStrictModeCIDR)\n\t\tc.EncryptionStrictModeCIDR, err = netip.ParsePrefix(strictCIDR)\n\t\tif err != nil {\n\t\t\tlog.WithError(err).Fatalf(\"Cannot parse CIDR %s from --%s option\", strictCIDR, EncryptionStrictModeCIDR)\n\t\t}\n\n\t\tif !c.EncryptionStrictModeCIDR.Addr().Is4() {\n\t\t\tlog.Fatalf(\"%s must be an IPv4 CIDR\", EncryptionStrictModeCIDR)\n\t\t}\n\n\t\tc.EncryptionStrictModeAllowRemoteNodeIdentities = vp.GetBool(EncryptionStrictModeAllowRemoteNodeIdentities)\n\t\tc.EnableEncryptionStrictMode = encryptionStrictModeEnabled\n\t}\n\n\tipv4NativeRoutingCIDR := vp.GetString(IPv4NativeRoutingCIDR)\n\n\tif ipv4NativeRoutingCIDR != \"\" {\n\t\tc.IPv4NativeRoutingCIDR, err = cidr.ParseCIDR(ipv4NativeRoutingCIDR)\n\t\tif err != nil {\n\t\t\tlog.WithError(err).Fatalf(\"Unable to parse CIDR '%s'\", ipv4NativeRoutingCIDR)\n\t\t}\n\n\t\tif len(c.IPv4NativeRoutingCIDR.IP) != net.IPv4len {\n\t\t\tlog.Fatalf(\"%s must be an IPv4 CIDR\", IPv4NativeRoutingCIDR)\n\t\t}\n\t}\n\n\tif c.EnableIPv4 && ipv4NativeRoutingCIDR == \"\" && c.EnableAutoDirectRouting {\n\t\tlog.Warnf(\"If %s is enabled, then you are recommended to also configure %s. If %s is not configured, this may lead to pod to pod traffic being masqueraded, \"+\n\t\t\t\"which can cause problems with performance, observability and policy\", EnableAutoDirectRoutingName, IPv4NativeRoutingCIDR, IPv4NativeRoutingCIDR)\n\t}\n\n\tipv6NativeRoutingCIDR := vp.GetString(IPv6NativeRoutingCIDR)\n\n\tif ipv6NativeRoutingCIDR != \"\" {\n\t\tc.IPv6NativeRoutingCIDR, err = cidr.ParseCIDR(ipv6NativeRoutingCIDR)\n\t\tif err != nil {\n\t\t\tlog.WithError(err).Fatalf(\"Unable to parse CIDR '%s'\", ipv6NativeRoutingCIDR)\n\t\t}\n\n\t\tif len(c.IPv6NativeRoutingCIDR.IP) != net.IPv6len {\n\t\t\tlog.Fatalf(\"%s must be an IPv6 CIDR\", IPv6NativeRoutingCIDR)\n\t\t}\n\t}\n\n\tif c.EnableIPv6 && ipv6NativeRoutingCIDR == \"\" && c.EnableAutoDirectRouting {\n\t\tlog.Warnf(\"If %s is enabled, then you are recommended to also configure %s. If %s is not configured, this may lead to pod to pod traffic being masqueraded, \"+\n\t\t\t\"which can cause problems with performance, observability and policy\", EnableAutoDirectRoutingName, IPv6NativeRoutingCIDR, IPv6NativeRoutingCIDR)\n\t}\n\n\tif err := c.calculateBPFMapSizes(vp); err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tc.ClockSource = ClockSourceKtime\n\tc.EnableIdentityMark = vp.GetBool(EnableIdentityMark)\n\n\t// toFQDNs options\n\tc.DNSMaxIPsPerRestoredRule = vp.GetInt(DNSMaxIPsPerRestoredRule)\n\tc.DNSPolicyUnloadOnShutdown = vp.GetBool(DNSPolicyUnloadOnShutdown)\n\tc.FQDNRegexCompileLRUSize = vp.GetInt(FQDNRegexCompileLRUSize)\n\tc.ToFQDNsMaxIPsPerHost = vp.GetInt(ToFQDNsMaxIPsPerHost)\n\tif maxZombies := vp.GetInt(ToFQDNsMaxDeferredConnectionDeletes); maxZombies >= 0 {\n\t\tc.ToFQDNsMaxDeferredConnectionDeletes = vp.GetInt(ToFQDNsMaxDeferredConnectionDeletes)\n\t} else {\n\t\tlog.Fatalf(\"%s must be positive, or 0 to disable deferred connection deletion\",\n\t\t\tToFQDNsMaxDeferredConnectionDeletes)\n\t}\n\tswitch {\n\tcase vp.IsSet(ToFQDNsMinTTL): // set by user\n\t\tc.ToFQDNsMinTTL = vp.GetInt(ToFQDNsMinTTL)\n\tdefault:\n\t\tc.ToFQDNsMinTTL = defaults.ToFQDNsMinTTL\n\t}\n\tc.ToFQDNsProxyPort = vp.GetInt(ToFQDNsProxyPort)\n\tc.ToFQDNsPreCache = vp.GetString(ToFQDNsPreCache)\n\tc.ToFQDNsEnableDNSCompression = vp.GetBool(ToFQDNsEnableDNSCompression)\n\tc.ToFQDNsIdleConnectionGracePeriod = vp.GetDuration(ToFQDNsIdleConnectionGracePeriod)\n\tc.FQDNProxyResponseMaxDelay = vp.GetDuration(FQDNProxyResponseMaxDelay)\n\tc.DNSProxyConcurrencyLimit = vp.GetInt(DNSProxyConcurrencyLimit)\n\tc.DNSProxyConcurrencyProcessingGracePeriod = vp.GetDuration(DNSProxyConcurrencyProcessingGracePeriod)\n\tc.DNSProxyLockCount = vp.GetInt(DNSProxyLockCount)\n\tc.DNSProxyLockTimeout = vp.GetDuration(DNSProxyLockTimeout)\n\tc.FQDNRejectResponse = vp.GetString(FQDNRejectResponseCode)\n\n\t// Convert IP strings into net.IPNet types\n\tsubnets, invalid := ip.ParseCIDRs(vp.GetStringSlice(IPv4PodSubnets))\n\tif len(invalid) > 0 {\n\t\tlog.WithFields(\n\t\t\tlogrus.Fields{\n\t\t\t\t\"Subnets\": invalid,\n\t\t\t}).Warning(\"IPv4PodSubnets parameter can not be parsed.\")\n\t}\n\tc.IPv4PodSubnets = subnets\n\n\tsubnets, invalid = ip.ParseCIDRs(vp.GetStringSlice(IPv6PodSubnets))\n\tif len(invalid) > 0 {\n\t\tlog.WithFields(\n\t\t\tlogrus.Fields{\n\t\t\t\t\"Subnets\": invalid,\n\t\t\t}).Warning(\"IPv6PodSubnets parameter can not be parsed.\")\n\t}\n\tc.IPv6PodSubnets = subnets\n\n\tc.XDPMode = XDPModeLinkNone\n\n\terr = c.populateNodePortRange(vp)\n\tif err != nil {\n\t\tlog.WithError(err).Fatal(\"Failed to populate NodePortRange\")\n\t}\n\n\tmonitorAggregationFlags := vp.GetStringSlice(MonitorAggregationFlags)\n\tvar ctMonitorReportFlags uint16\n\tfor i := 0; i < len(monitorAggregationFlags); i++ {\n\t\tvalue := strings.ToLower(monitorAggregationFlags[i])\n\t\tflag, exists := TCPFlags[value]\n\t\tif !exists {\n\t\t\tlog.Fatalf(\"Unable to parse TCP flag %q for %s!\",\n\t\t\t\tvalue, MonitorAggregationFlags)\n\t\t}\n\t\tctMonitorReportFlags |= flag\n\t}\n\tc.MonitorAggregationFlags = ctMonitorReportFlags\n\n\t// Map options\n\tif m := command.GetStringMapString(vp, FixedIdentityMapping); err != nil {\n\t\tlog.Fatalf(\"unable to parse %s: %s\", FixedIdentityMapping, err)\n\t} else if len(m) != 0 {\n\t\tc.FixedIdentityMapping = m\n\t}\n\n\tc.ConntrackGCInterval = vp.GetDuration(ConntrackGCInterval)\n\n\tif m, err := command.GetStringMapStringE(vp, KVStoreOpt); err != nil {\n\t\tlog.Fatalf(\"unable to parse %s: %s\", KVStoreOpt, err)\n\t} else {\n\t\tc.KVStoreOpt = m\n\t}\n\n\tif m, err := command.GetStringMapStringE(vp, LogOpt); err != nil {\n\t\tlog.Fatalf(\"unable to parse %s: %s\", LogOpt, err)\n\t} else {\n\t\tc.LogOpt = m\n\t}\n\n\tc.bpfMapEventConfigs = make(BPFEventBufferConfigs)\n\tparseBPFMapEventConfigs(c.bpfMapEventConfigs, defaults.BPFEventBufferConfigs)\n\tif m, err := command.GetStringMapStringE(vp, BPFMapEventBuffers); err != nil {\n\t\tlog.Fatalf(\"unable to parse %s: %s\", BPFMapEventBuffers, err)\n\t} else {\n\t\tparseBPFMapEventConfigs(c.bpfMapEventConfigs, m)\n\t}\n\n\tc.NodeEncryptionOptOutLabelsString = vp.GetString(NodeEncryptionOptOutLabels)\n\tif sel, err := k8sLabels.Parse(c.NodeEncryptionOptOutLabelsString); err != nil {\n\t\tlog.Fatalf(\"unable to parse label selector %s: %s\", NodeEncryptionOptOutLabels, err)\n\t} else {\n\t\tc.NodeEncryptionOptOutLabels = sel\n\t}\n\n\tfor _, option := range vp.GetStringSlice(EndpointStatus) {\n\t\tc.EndpointStatus[option] = struct{}{}\n\t}\n\n\tif err := c.parseExcludedLocalAddresses(vp.GetStringSlice(ExcludeLocalAddress)); err != nil {\n\t\tlog.WithError(err).Fatalf(\"Unable to parse excluded local addresses\")\n\t}\n\n\t// Ensure CiliumEndpointSlice is enabled only if CiliumEndpointCRD is enabled too.\n\tc.EnableCiliumEndpointSlice = vp.GetBool(EnableCiliumEndpointSlice)\n\tif c.EnableCiliumEndpointSlice && c.DisableCiliumEndpointCRD {\n\t\tlog.Fatalf(\"Running Cilium with %s=%t requires %s set to false to enable CiliumEndpoint CRDs.\",\n\t\t\tEnableCiliumEndpointSlice, c.EnableCiliumEndpointSlice, DisableCiliumEndpointCRDName)\n\t}\n\n\tc.IdentityAllocationMode = vp.GetString(IdentityAllocationMode)\n\tswitch c.IdentityAllocationMode {\n\t// This is here for tests. Some call Populate without the normal init\n\tcase \"\":\n\t\tc.IdentityAllocationMode = IdentityAllocationModeKVstore\n\tcase IdentityAllocationModeKVstore, IdentityAllocationModeCRD:\n\t\t// c.IdentityAllocationMode is set above\n\tdefault:\n\t\tlog.Fatalf(\"Invalid identity allocation mode %q. It must be one of %s or %s\", c.IdentityAllocationMode, IdentityAllocationModeKVstore, IdentityAllocationModeCRD)\n\t}\n\tif c.KVStore == \"\" {\n\t\tif c.IdentityAllocationMode != IdentityAllocationModeCRD {\n\t\t\tlog.Warningf(\"Running Cilium with %q=%q requires identity allocation via CRDs. Changing %s to %q\", KVStore, c.KVStore, IdentityAllocationMode, IdentityAllocationModeCRD)\n\t\t\tc.IdentityAllocationMode = IdentityAllocationModeCRD\n\t\t}\n\t\tif c.DisableCiliumEndpointCRD {\n\t\t\tlog.Warningf(\"Running Cilium with %q=%q requires endpoint CRDs. Changing %s to %t\", KVStore, c.KVStore, DisableCiliumEndpointCRDName, false)\n\t\t\tc.DisableCiliumEndpointCRD = false\n\t\t}\n\t\tif c.K8sEventHandover {\n\t\t\tlog.Warningf(\"Running Cilium with %q=%q requires KVStore capability. Changing %s to %t\", KVStore, c.KVStore, K8sEventHandover, false)\n\t\t\tc.K8sEventHandover = false\n\t\t}\n\t}\n\n\tswitch c.IPAM {\n\tcase ipamOption.IPAMKubernetes, ipamOption.IPAMClusterPool, ipamOption.IPAMClusterPoolV2:\n\t\tif c.EnableIPv4 {\n\t\t\tc.K8sRequireIPv4PodCIDR = true\n\t\t}\n\n\t\tif c.EnableIPv6 {\n\t\t\tc.K8sRequireIPv6PodCIDR = true\n\t\t}\n\t}\n\tif m, err := command.GetStringMapStringE(vp, IPAMMultiPoolPreAllocation); err != nil {\n\t\tlog.Fatalf(\"unable to parse %s: %s\", IPAMMultiPoolPreAllocation, err)\n\t} else {\n\t\tc.IPAMMultiPoolPreAllocation = m\n\t}\n\n\tc.KubeProxyReplacementHealthzBindAddr = vp.GetString(KubeProxyReplacementHealthzBindAddr)\n\n\t// Hubble options.\n\tc.EnableHubble = vp.GetBool(EnableHubble)\n\tc.EnableHubbleOpenMetrics = vp.GetBool(EnableHubbleOpenMetrics)\n\tc.HubbleSocketPath = vp.GetString(HubbleSocketPath)\n\tc.HubbleListenAddress = vp.GetString(HubbleListenAddress)\n\tc.HubblePreferIpv6 = vp.GetBool(HubblePreferIpv6)\n\tc.HubbleTLSDisabled = vp.GetBool(HubbleTLSDisabled)\n\tc.HubbleTLSCertFile = vp.GetString(HubbleTLSCertFile)\n\tc.HubbleTLSKeyFile = vp.GetString(HubbleTLSKeyFile)\n\tc.HubbleTLSClientCAFiles = vp.GetStringSlice(HubbleTLSClientCAFiles)\n\tc.HubbleEventBufferCapacity = vp.GetInt(HubbleEventBufferCapacity)\n\tc.HubbleEventQueueSize = vp.GetInt(HubbleEventQueueSize)\n\tif c.HubbleEventQueueSize == 0 {\n\t\tc.HubbleEventQueueSize = getDefaultMonitorQueueSize(runtime.NumCPU())\n\t}\n\tc.HubbleMetricsServer = vp.GetString(HubbleMetricsServer)\n\tc.HubbleMetrics = vp.GetStringSlice(HubbleMetrics)\n\tc.HubbleExportFilePath = vp.GetString(HubbleExportFilePath)\n\tc.HubbleExportFileMaxSizeMB = vp.GetInt(HubbleExportFileMaxSizeMB)\n\tc.HubbleExportFileMaxBackups = vp.GetInt(HubbleExportFileMaxBackups)\n\tc.HubbleExportFileCompress = vp.GetBool(HubbleExportFileCompress)\n\n\tfor _, enc := range vp.GetStringSlice(HubbleExportAllowlist) {\n\t\tdec := json.NewDecoder(strings.NewReader(enc))\n\t\tvar result flowpb.FlowFilter\n\t\tif err := dec.Decode(&result); err != nil {\n\t\t\tif err == io.EOF {\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tlog.Fatalf(\"failed to decode hubble-export-allowlist '%v': %s\", enc, err)\n\t\t}\n\t\tc.HubbleExportAllowlist = append(c.HubbleExportAllowlist, &result)\n\t}\n\n\tfor _, enc := range vp.GetStringSlice(HubbleExportDenylist) {\n\t\tdec := json.NewDecoder(strings.NewReader(enc))\n\t\tvar result flowpb.FlowFilter\n\t\tif err := dec.Decode(&result); err != nil {\n\t\t\tif err == io.EOF {\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tlog.Fatalf(\"failed to decode hubble-export-denylist '%v': %s\", enc, err)\n\t\t}\n\t\tc.HubbleExportDenylist = append(c.HubbleExportDenylist, &result)\n\t}\n\n\tif fm := vp.GetStringSlice(HubbleExportFieldmask); len(fm) > 0 {\n\t\t_, err := fieldmaskpb.New(&flowpb.Flow{}, fm...)\n\t\tif err != nil {\n\t\t\tlog.Fatalf(\"hubble-export-fieldmask contains invalid fieldmask '%v': %s\", fm, err)\n\t\t}\n\t\tc.HubbleExportFieldmask = vp.GetStringSlice(HubbleExportFieldmask)\n\t}\n\n\tc.EnableHubbleRecorderAPI = vp.GetBool(EnableHubbleRecorderAPI)\n\tc.HubbleRecorderStoragePath = vp.GetString(HubbleRecorderStoragePath)\n\tc.HubbleRecorderSinkQueueSize = vp.GetInt(HubbleRecorderSinkQueueSize)\n\tc.HubbleSkipUnknownCGroupIDs = vp.GetBool(HubbleSkipUnknownCGroupIDs)\n\tc.HubbleMonitorEvents = vp.GetStringSlice(HubbleMonitorEvents)\n\tc.HubbleRedactEnabled = vp.GetBool(HubbleRedactEnabled)\n\tc.HubbleRedactHttpURLQuery = vp.GetBool(HubbleRedactHttpURLQuery)\n\tc.HubbleRedactKafkaApiKey = vp.GetBool(HubbleRedactKafkaApiKey)\n\n\tc.DisableIptablesFeederRules = vp.GetStringSlice(DisableIptablesFeederRules)\n\n\t// Hidden options\n\tc.CompilerFlags = vp.GetStringSlice(CompilerFlags)\n\tc.ConfigFile = vp.GetString(ConfigFile)\n\tc.HTTP403Message = vp.GetString(HTTP403Message)\n\tc.K8sNamespace = vp.GetString(K8sNamespaceName)\n\tc.AgentNotReadyNodeTaintKey = vp.GetString(AgentNotReadyNodeTaintKeyName)\n\tc.MaxControllerInterval = vp.GetInt(MaxCtrlIntervalName)\n\tc.PolicyQueueSize = sanitizeIntParam(vp, PolicyQueueSize, defaults.PolicyQueueSize)\n\tc.EndpointQueueSize = sanitizeIntParam(vp, EndpointQueueSize, defaults.EndpointQueueSize)\n\tc.DisableCNPStatusUpdates = vp.GetBool(DisableCNPStatusUpdates)\n\tc.EnableICMPRules = vp.GetBool(EnableICMPRules)\n\tc.UseCiliumInternalIPForIPsec = vp.GetBool(UseCiliumInternalIPForIPsec)\n\tc.BypassIPAvailabilityUponRestore = vp.GetBool(BypassIPAvailabilityUponRestore)\n\tc.EnableK8sTerminatingEndpoint = vp.GetBool(EnableK8sTerminatingEndpoint)\n\tc.EnableStaleCiliumEndpointCleanup = vp.GetBool(EnableStaleCiliumEndpointCleanup)\n\n\t// Disable Envoy version check if L7 proxy is disabled.\n\tc.DisableEnvoyVersionCheck = vp.GetBool(DisableEnvoyVersionCheck)\n\tif !c.EnableL7Proxy {\n\t\tc.DisableEnvoyVersionCheck = true\n\t}\n\n\t// VTEP integration enable option\n\tc.EnableVTEP = vp.GetBool(EnableVTEP)\n\n\t// Enable BGP control plane features\n\tc.EnableBGPControlPlane = vp.GetBool(EnableBGPControlPlane)\n\n\t// Envoy secrets namespaces to watch\n\tparams := []string{EnvoySecretsNamespace, IngressSecretsNamespace, GatewayAPISecretsNamespace}\n\tvar nsList = make([]string, 0, len(params))\n\tfor _, param := range params {\n\t\tns := vp.GetString(param)\n\t\tif ns != \"\" {\n\t\t\tnsList = append(nsList, ns)\n\t\t}\n\t}\n\tc.EnvoySecretNamespaces = nsList\n\n\t// To support K8s NetworkPolicy\n\tc.EnableK8sNetworkPolicy = vp.GetBool(EnableK8sNetworkPolicy)\n}", "title": "" }, { "docid": "a5462db8d3f27f0672a370260c227c32", "score": "0.43505165", "text": "func configureFlags(api *operations.ConfigurationServiceAPI) {\n\t// api.CommandLineOptionsGroups = []swag.CommandLineOptionsGroup{ ... }\n}", "title": "" }, { "docid": "d01075fab7ba613dde61904748f74a35", "score": "0.43481544", "text": "func buildFwdServiceOpts(t *testing.T, namespace string) *FwdServiceOpts {\n\n\thasRoot, err := utils.CheckRoot()\n\n\tif !hasRoot {\n\t\tt.Fatal(\"Please run test use Root\")\n\t\tif err != nil {\n\t\t\tt.Fatalf(\"Root check failure: %s\", err.Error())\n\t\t}\n\t}\n\n\tt.Log(\"Start buildFwdServiceOpts test\")\n\n\thostFile, err := txeh.NewHostsDefault()\n\tif err != nil {\n\t\tt.Fatalf(\"Hostfile error: %s\", err.Error())\n\t}\n\n\t_, err = fwdhost.BackupHostFile(hostFile)\n\tif err != nil {\n\t\tt.Fatalf(\"Error backing up hostfile: %s\\n\", err.Error())\n\t}\n\n\t// default cfgFilePath is \"$HOME/.kube/config\" ;\n\t// if you want to use other kubeconfig pls change it here ;\n\tcfgFilePath := \"\"\n\n\t// create a ConfigGetter\n\tconfigGetter := fwdcfg.NewConfigGetter()\n\t// build the ClientConfig\n\trawConfig, err := configGetter.GetClientConfig(cfgFilePath)\n\tif err != nil {\n\t\tt.Fatalf(\"Error in get rawConfig: %s\\n\", err.Error())\n\t}\n\n\t// ipC is the class C for the local IP address\n\t// increment this for each cluster\n\t// ipD is the class D for the local IP address\n\t// increment this for each service in each cluster\n\tipC := 27\n\tipD := 1\n\n\tstopListenCh := make(chan struct{})\n\tdefer close(stopListenCh)\n\n\trestConfig, err := configGetter.GetRestConfig(cfgFilePath, rawConfig.CurrentContext)\n\tif err != nil {\n\t\tt.Fatalf(\"Error generating REST configuration: %s\\n\", err.Error())\n\t}\n\n\t// create the k8s clientSet\n\tclientSet, err := kubernetes.NewForConfig(restConfig)\n\tif err != nil {\n\t\tt.Fatalf(\"Error creating k8s clientSet: %s\\n\", err.Error())\n\t}\n\n\t// create the k8s RESTclient\n\trestClient, err := configGetter.GetRESTClient()\n\tif err != nil {\n\t\tt.Fatalf(\"Error creating k8s RestClient: %s\\n\", err.Error())\n\t}\n\t// create the test service\n\tcreateTestService(t, clientSet, namespace)\n\n\tlistOptions := metav1.ListOptions{\n\t\tLabelSelector: \"app=kubefwd-test-nginx-service\",\n\t}\n\n\twg := &sync.WaitGroup{}\n\n\treturn &FwdServiceOpts{\n\t\tWg: wg,\n\t\tClientSet: clientSet,\n\t\tContext: rawConfig.CurrentContext,\n\t\tNamespace: namespace,\n\t\tListOptions: listOptions,\n\t\tHostfile: &fwdport.HostFileWithLock{Hosts: hostFile},\n\t\tClientConfig: restConfig,\n\t\tRESTClient: restClient,\n\t\tShortName: true,\n\t\tIpC: byte(ipC),\n\t\tIpD: ipD,\n\t\tExitOnFail: exitOnFail,\n\t\tDomain: domain,\n\t}\n}", "title": "" }, { "docid": "4a0f5e4f1b1351d23b88f219997db2f5", "score": "0.43453005", "text": "func Configure(opts interface{}) {\n\tmo().Call(\"configure\", opts)\n}", "title": "" }, { "docid": "9062ea6218fe242f308263ff6cd60ba0", "score": "0.4344489", "text": "func (f Factory) Configure(cmd *cobra.Command) (*viper.Viper, error) {\n\tconfig := viper.New()\n\tif err := f.ConfigFunc(config, cmd, f.Replacer); err != nil {\n\t\treturn nil, err\n\t}\n\treturn config, nil\n}", "title": "" }, { "docid": "e66b95d88e63a8482c5d268102ebf5e7", "score": "0.4334154", "text": "func (s *envoyConfigStrategy) Run(input *types.Discovery) error {\n\tec, err := envoy.RetrieveConfig(\"http://localhost:15000/config_dump\")\n\tif err != nil {\n\t\treturn err\n\t}\n\taddr, err := ec.DiscoveryAddress()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tc, err := xds.NewClient(addr)\n\tif err != nil {\n\t\treturn err\n\t}\n\tc.Close()\n\n\tinput.DiscoveryAddress = addr\n\treturn nil\n}", "title": "" }, { "docid": "8ba5c26d6725c9dbe70e300cb2ec7111", "score": "0.4324985", "text": "func knativeServingConfigure(t *testing.T, clients *test.Clients, names test.ResourceNames) {\n\t// We'll arbitrarily choose logging and defaults config\n\tloggingConfigKey := \"logging\"\n\tloggingConfigMapName := fmt.Sprintf(\"%s/config-%s\", names.Namespace, loggingConfigKey)\n\tdefaultsConfigKey := \"defaults\"\n\tdefaultsConfigMapName := fmt.Sprintf(\"%s/config-%s\", names.Namespace, defaultsConfigKey)\n\t// Get the existing KS without any spec\n\tks, err := clients.KnativeServing().Get(names.KnativeServing, metav1.GetOptions{})\n\t// Add config to its spec\n\tks.Spec = v1alpha1.KnativeServingSpec{\n\t\tConfig: map[string]map[string]string{\n\t\t\tdefaultsConfigKey: {\n\t\t\t\t\"revision-timeout-seconds\": \"200\",\n\t\t\t},\n\t\t\tloggingConfigKey: {\n\t\t\t\t\"loglevel.controller\": \"debug\",\n\t\t\t\t\"loglevel.autoscaler\": \"debug\",\n\t\t\t},\n\t\t},\n\t}\n\t// Update it\n\tif ks, err = clients.KnativeServing().Update(ks); err != nil {\n\t\tt.Fatalf(\"KnativeServing %q failed to update: %v\", names.KnativeServing, err)\n\t}\n\t// Verify the relevant configmaps have been updated\n\terr = resources.WaitForConfigMap(defaultsConfigMapName, clients.KubeClient.Kube, func(m map[string]string) bool {\n\t\treturn m[\"revision-timeout-seconds\"] == \"200\"\n\t})\n\tif err != nil {\n\t\tt.Fatalf(\"The operator failed to update %s configmap\", defaultsConfigMapName)\n\t}\n\terr = resources.WaitForConfigMap(loggingConfigMapName, clients.KubeClient.Kube, func(m map[string]string) bool {\n\t\treturn m[\"loglevel.controller\"] == \"debug\" && m[\"loglevel.autoscaler\"] == \"debug\"\n\t})\n\tif err != nil {\n\t\tt.Fatalf(\"The operator failed to update %s configmap\", loggingConfigMapName)\n\t}\n\n\t// Delete a single key/value pair\n\tdelete(ks.Spec.Config[loggingConfigKey], \"loglevel.autoscaler\")\n\t// Update it\n\tif ks, err = clients.KnativeServing().Update(ks); err != nil {\n\t\tt.Fatalf(\"KnativeServing %q failed to update: %v\", names.KnativeServing, err)\n\t}\n\t// Verify the relevant configmap has been updated\n\terr = resources.WaitForConfigMap(loggingConfigMapName, clients.KubeClient.Kube, func(m map[string]string) bool {\n\t\t_, autoscalerKeyExists := m[\"loglevel.autoscaler\"]\n\t\t// deleted key/value pair should be removed from the target config map\n\t\treturn m[\"loglevel.controller\"] == \"debug\" && !autoscalerKeyExists\n\t})\n\tif err != nil {\n\t\tt.Fatal(\"The operator failed to update the configmap\")\n\t}\n\n\t// Use an empty map as the value\n\tks.Spec.Config[defaultsConfigKey] = map[string]string{}\n\t// Update it\n\tif ks, err = clients.KnativeServing().Update(ks); err != nil {\n\t\tt.Fatalf(\"KnativeServing %q failed to update: %v\", names.KnativeServing, err)\n\t}\n\t// Verify the relevant configmap has been updated and does not contain any keys except \"_example\"\n\terr = resources.WaitForConfigMap(defaultsConfigMapName, clients.KubeClient.Kube, func(m map[string]string) bool {\n\t\t_, exampleExists := m[\"_example\"]\n\t\treturn len(m) == 1 && exampleExists\n\t})\n\tif err != nil {\n\t\tt.Fatal(\"The operator failed to update the configmap\")\n\t}\n\n\t// Now remove the config from the spec and update\n\tks.Spec = v1alpha1.KnativeServingSpec{}\n\tif ks, err = clients.KnativeServing().Update(ks); err != nil {\n\t\tt.Fatalf(\"KnativeServing %q failed to update: %v\", names.KnativeServing, err)\n\t}\n\t// And verify the configmap entry is gone\n\terr = resources.WaitForConfigMap(loggingConfigMapName, clients.KubeClient.Kube, func(m map[string]string) bool {\n\t\t_, exists := m[\"loglevel.controller\"]\n\t\treturn !exists\n\t})\n\tif err != nil {\n\t\tt.Fatal(\"The operator failed to revert the configmap\")\n\t}\n}", "title": "" }, { "docid": "f9f0c631443dd927371bc2bb5e60f9b7", "score": "0.43226036", "text": "func (m *DeviceComanagementAuthorityConfiguration) SetInstallConfigurationManagerAgent(value *bool)() {\n err := m.GetBackingStore().Set(\"installConfigurationManagerAgent\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "5765d42c179c2a38573decf03ce96aad", "score": "0.43205562", "text": "func (w *Workload) Configure(client client.Interface) {\n\twep := w.WorkloadEndpoint\n\twep.Namespace = \"fv\"\n\tvar err error\n\tw.WorkloadEndpoint, err = client.WorkloadEndpoints().Create(utils.Ctx, w.WorkloadEndpoint, utils.NoOptions)\n\tExpect(err).NotTo(HaveOccurred(), \"Failed to create workload in the calico datastore.\")\n}", "title": "" }, { "docid": "db53eb7473c18afb546311916e1f797b", "score": "0.4315594", "text": "func (f *ServerConfig) configureAndStart(serveInGoroutine bool) error {\n\tclientFlags.url = f.URL\n\tif f.Disable {\n\t\tlog15.Debug(\"Appdash server (collector and web UI) is disabled\")\n\t\treturn nil\n\t}\n\n\t// Create a default InfluxDB configuration.\n\tconf, err := influxdbstore.NewConfig()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to create influxdb config, error: %v\", err)\n\t}\n\n\t// Usage metrics are non-invasive; but we disable them anyway to get rid of\n\t// an annoying log message about it.\n\tconf.Server.ReportingDisabled = true\n\n\t// Setup address configurations.\n\tconf.Server.BindAddress = f.InfluxAddr\n\tconf.Server.Admin.BindAddress = f.InfluxAdminAddr\n\tconf.Server.CollectdInputs[0].BindAddress = f.InfluxCollectdAddr\n\tconf.Server.GraphiteInputs[0].BindAddress = f.InfluxGraphiteAddr\n\tconf.Server.HTTPD.BindAddress = f.InfluxHTTPDAddr\n\tconf.Server.OpenTSDBInputs[0].BindAddress = f.InfluxOpenTSDBAddr\n\tconf.Server.UDPInputs[0].BindAddress = f.InfluxUDPAddr\n\n\t// InfluxDB needs an admin user in the config, even if not using HTTP basic\n\t// auth.\n\tconf.Server.HTTPD.AuthEnabled = true\n\tif f.HTTPBasicAuthUser != \"\" {\n\t\tconf.AdminUser.Username = f.HTTPBasicAuthUser\n\t\tconf.AdminUser.Password = f.HTTPBasicAuthPassword\n\t} else {\n\t\tconf.AdminUser.Username = \"sourcegraph\"\n\t\tconf.AdminUser.Password = \"sourcegraph\"\n\t}\n\n\tlogOutputName := \"\"\n\tif f.LogDebug {\n\t\tlogOutputName = \"(stderr)\"\n\t\tconf.LogOutput = os.Stderr\n\t} else if f.InfluxLogDir != \"\" {\n\t\tlogOutputName = os.ExpandEnv(filepath.Join(f.InfluxLogDir, \"influxdb.log\"))\n\t\tlogFile, err := os.OpenFile(logOutputName, os.O_CREATE|os.O_WRONLY|os.O_APPEND, 0666)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"failed to open influxdb log file, error: %v\", err)\n\t\t}\n\t\tconf.LogOutput = logFile\n\t}\n\n\tuseTLS := f.TLSCertFile != \"\" || f.TLSKeyFile != \"\"\n\n\tvar l net.Listener\n\tvar proto string\n\tconst listenNet = \"tcp4\" // IPv6 causes some issues inside some environments (e.g., Mesos)\n\tcollectorUseTLS := f.CollectorTLS && useTLS && f.CollectorAddr != \"127.0.0.1:0\"\n\tif collectorUseTLS {\n\t\tcertBytes, err := ioutil.ReadFile(f.TLSCertFile)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tkeyBytes, err := ioutil.ReadFile(f.TLSKeyFile)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tvar tc tls.Config\n\t\tcert, err := tls.X509KeyPair(certBytes, keyBytes)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttc.Certificates = []tls.Certificate{cert}\n\t\tl, err = tls.Listen(listenNet, f.CollectorAddr, &tc)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tproto = fmt.Sprintf(\"TLS with cert %s, key %s\", f.TLSCertFile, f.TLSKeyFile)\n\t} else {\n\t\tvar err error\n\t\tl, err = net.Listen(listenNet, f.CollectorAddr)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tproto = \"plaintext (non-TLS) TCP\"\n\t}\n\n\t// Configure appdash client.\n\tclientFlags.RemoteAddr = l.Addr().String()\n\tclientFlags.TLS = collectorUseTLS\n\n\tserve := func() {\n\t\tvar (\n\t\t\tstore appdash.Store\n\t\t\tqueryer appdash.Queryer\n\t\t\taggregator appdash.Aggregator\n\t\t)\n\t\tif f.LimitStore == 0 {\n\t\t\tlog15.Info(\"InfluxDB server starting\", \"logoutput\", logOutputName)\n\t\t\tinfluxStore, err := influxdbstore.New(conf)\n\t\t\tif err != nil {\n\t\t\t\tlog.Fatalf(\"failed to create influxdb store, error: %v\", err)\n\t\t\t}\n\t\t\tdefer func() {\n\t\t\t\tif err := influxStore.Close(); err != nil {\n\t\t\t\t\tlog.Fatal(err)\n\t\t\t\t}\n\t\t\t}()\n\n\t\t\tstore = influxStore\n\t\t\taggregator = influxStore\n\t\t\tlog15.Info(\"InfluxDB server started\")\n\t\t} else {\n\t\t\tmemStore := appdash.NewMemoryStore()\n\t\t\tqueryer = memStore\n\t\t\tstore = &appdash.LimitStore{\n\t\t\t\tMax: f.LimitStore,\n\t\t\t\tDeleteStore: memStore,\n\t\t\t}\n\t\t}\n\n\t\tcs := appdash.NewServer(l, appdash.NewLocalCollector(store))\n\t\tcs.Debug = f.LogDebug\n\t\tcs.Trace = f.LogTrace\n\t\tgo cs.Start()\n\n\t\t// Create a MultiQueryer that will query both our LimitStore and our\n\t\t// AggregateStore for traces.\n\t\tappdashURL, err := url.Parse(f.URL)\n\t\tif err != nil {\n\t\t\tlog.Fatalln(\"failed to parse --appdash.url, error:\", err)\n\t\t}\n\t\tapp, err := traceapp.New(nil, appdashURL)\n\t\tif err != nil {\n\t\t\tlog.Fatalln(err)\n\t\t}\n\t\tapp.Store = store\n\t\tapp.Queryer = queryer\n\t\tapp.Aggregator = aggregator\n\n\t\t// Setup basic authentication if desired.\n\t\th := http.Handler(app)\n\t\tif f.HTTPBasicAuthUser != \"\" {\n\t\t\th = httputil.BasicAuth(f.HTTPBasicAuthUser, f.HTTPBasicAuthPassword, 0, app)\n\t\t}\n\n\t\tlog15.Debug(\"Appdash server running\", \"web\", f.HTTPAddr, \"collector\", l.Addr(), \"proto\", proto)\n\n\t\tif useTLS {\n\t\t\tlog.Fatal(http.ListenAndServeTLS(f.HTTPAddr, f.TLSCertFile, f.TLSKeyFile, h))\n\t\t} else {\n\t\t\tlog.Fatal(http.ListenAndServe(f.HTTPAddr, h))\n\t\t}\n\t}\n\tif serveInGoroutine {\n\t\tgo serve()\n\t} else {\n\t\tserve()\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "dce41804618f93d28d7121e6546dc474", "score": "0.43121818", "text": "func (m *Monitor) Configure(conf *Config) error {\n\tlogger.Warningf(\"'%s' monitor is in beta on this platform. For production environments please use 'collectd/%s'.\", monitorType, monitorType)\n\n\t// create contexts for managing the the plugin loop\n\tvar ctx context.Context\n\tctx, m.cancel = context.WithCancel(context.Background())\n\n\t// save conf to monitor for convenience\n\tm.conf = conf\n\n\t// configure filters\n\tvar err error\n\tif len(conf.Disks) == 0 {\n\t\tm.filter, err = filter.NewOverridableStringFilter([]string{\"*\"})\n\t\tlogger.Debugf(\"empty disk list defaulting to '*'\")\n\t} else {\n\t\tm.filter, err = filter.NewOverridableStringFilter(conf.Disks)\n\t}\n\n\t// return an error if we can't set the filter\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// gather metrics on the specified interval\n\tutils.RunOnInterval(ctx, func() {\n\t\tm.emitDatapoints()\n\t}, time.Duration(conf.IntervalSeconds)*time.Second)\n\n\treturn nil\n}", "title": "" }, { "docid": "1772d533449a70981c4d802cec86132b", "score": "0.43086216", "text": "func (ad *ADConfig) defaultAD() {\n\tif ad.KubeContainerNames == nil {\n\t\tad.KubeContainerNames = []string{}\n\t}\n\n\tif ad.KubeAnnotations == nil {\n\t\tad.KubeAnnotations = &InclExcl{\n\t\t\tExcl: map[string]string{PrometheusScrapeAnnotation: \"false\"},\n\t\t\tIncl: map[string]string{PrometheusScrapeAnnotation: \"true\"},\n\t\t}\n\t\treturn\n\t}\n\n\tif ad.KubeAnnotations.Excl == nil {\n\t\tad.KubeAnnotations.Excl = map[string]string{PrometheusScrapeAnnotation: \"false\"}\n\t}\n\n\tif ad.KubeAnnotations.Incl == nil {\n\t\tad.KubeAnnotations.Incl = map[string]string{PrometheusScrapeAnnotation: \"true\"}\n\t}\n}", "title": "" }, { "docid": "bb7dcfa197e8a1d9cc68157191459c63", "score": "0.4308482", "text": "func (helper *ClientHelper) SetupServiceConfig(ctx context.Context) error {\n\n\t// exit if the service has already been setup\n\tif helper.Service != nil {\n\t\treturn nil\n\t}\n\n\t// set the logger to global logger\n\thelper.Logger = zap.L()\n\n\t// Configure the ClientHelper.Builder\n\thelper.Builder = NewBuilder(helper.Logger).\n\t\tSetHostPort(helper.Config.hostPort).\n\t\tSetClientOptions(helper.Config.clientOptions).\n\t\tSetDomain(helper.Config.domain)\n\n\t// build the service client\n\tservice, err := helper.Builder.BuildServiceClient()\n\tif err != nil {\n\t\treturn err\n\t}\n\thelper.Service = service\n\n\t// build the domain client\n\tdomainClient, err := helper.Builder.BuildCadenceDomainClient()\n\tif err != nil {\n\n\t\t// $debug(jack.burns)\n\t\thelper.Logger.Error(\"failed to build domain cadence client.\", zap.Error(err))\n\n\t\treturn err\n\t}\n\thelper.DomainClient = domainClient\n\n\t// validate that a connection has been established\n\t// make a channel that waits for a connection to be established\n\t// until returning ready\n\tconnectChan := make(chan error)\n\tdefer close(connectChan)\n\n\t// validate the connection\n\terr = helper.pollDomain(ctx, connectChan, _cadenceSystemDomain)\n\tif err != nil {\n\t\tdefer func() {\n\t\t\thelper = nil\n\t\t}()\n\n\t\treturn err\n\t}\n\n\t// build the workflow client\n\tworkflowClient, err := helper.Builder.BuildCadenceClient()\n\tif err != nil {\n\n\t\t// $debug(jack.burns)\n\t\thelper.Logger.Error(\"failed to build domain cadence client.\", zap.Error(err))\n\n\t\treturn nil\n\t}\n\thelper.WorkflowClient = workflowClient\n\n\treturn nil\n}", "title": "" }, { "docid": "f447144198bab82cb33c1e63934d4128", "score": "0.43065044", "text": "func configureFlags(api *operations.CelkopierAPI) {\n\t// api.CommandLineOptionsGroups = []swag.CommandLineOptionsGroup{ ... }\n}", "title": "" }, { "docid": "720d6acf38ac7603dbc28b0c1f5fb9ed", "score": "0.43061382", "text": "func configureFlags(api *operations.WeaviateAPI) {\n\t// api.CommandLineOptionsGroups = []swag.CommandLineOptionsGroup{ ... }\n}", "title": "" }, { "docid": "9a1adcf7ed0e42141ec7d52c8d507295", "score": "0.4303157", "text": "func (wb *Wolfbot) Configure() {\n\t// var err error\n\tviper.AddConfigPath(\"./config/\")\n\tviper.SetConfigName(\"config\")\n\n\terr := viper.ReadInConfig() // Find and read the config file\n\tif err != nil { // Handle errors reading the config file\n\t\tif _, ok := err.(viper.ConfigFileNotFoundError); ok {\n\t\t\t// Config file not found; ignore error if desired\n\t\t\tlog.Fatal(\"No config file found at config/config.yaml.\", err)\n\t\t} else {\n\t\t\t// Config file was found but another error was produced\n\t\t\tlog.Fatalf(\"Fatal error reading config file: %s \\n\", err)\n\t\t}\n\t}\n\n\t// TODO: Connect to DB here.\n\n\twb.token = viper.GetString(\"discordToken\")\n}", "title": "" }, { "docid": "08f77a388c32e39334c4752cf4d52355", "score": "0.43006694", "text": "func Setup(mgr ctrl.Manager) error {\n\tdm, err := discoverymapper.New(mgr.GetConfig())\n\tif err != nil {\n\t\treturn err\n\t}\n\tr := Reconciler{\n\t\tClient: mgr.GetClient(),\n\t\tLog: ctrl.Log.WithName(\"Autoscaler\"),\n\t\tScheme: mgr.GetScheme(),\n\t\tdm: dm,\n\t}\n\treturn r.SetupWithManager(mgr)\n}", "title": "" }, { "docid": "e475fc7df9b685e19e6fc58fbe06714a", "score": "0.42974913", "text": "func (c *Config) Setup(componentName string) (opentracing.Tracer, io.Closer, error) {\n\treporter := &jaegercfg.ReporterConfig{\n\t\tLogSpans: true,\n\t\tLocalAgentHostPort: c.LocalAgentHostPort,\n\t\tCollectorEndpoint: c.CollectorEndpoint,\n\t\tUser: c.CollectorUser,\n\t\tPassword: c.CollectorPassword,\n\t}\n\n\tjcfg := jaegercfg.Configuration{\n\t\tSampler: &jaegercfg.SamplerConfig{\n\t\t\tSamplingServerURL: c.SamplingServerURL,\n\t\t\tType: c.SamplingType,\n\t\t\tParam: c.SamplingParam,\n\t\t},\n\t\tReporter: reporter,\n\t\tHeaders: &jaegercli.HeadersConfig{\n\t\t\tTraceContextHeaderName: c.TraceContextHeaderName,\n\t\t},\n\t}\n\n\tjMetricsFactory := jaegermet.NullFactory\n\n\topts := []jaegercfg.Option{\n\t\tjaegercfg.Metrics(jMetricsFactory),\n\t\tjaegercfg.Gen128Bit(c.Gen128Bit),\n\t}\n\n\tswitch c.Propagation {\n\tcase \"b3\":\n\t\tp := zipkin.NewZipkinB3HTTPHeaderPropagator()\n\t\topts = append(opts,\n\t\t\tjaegercfg.Injector(opentracing.HTTPHeaders, p),\n\t\t\tjaegercfg.Extractor(opentracing.HTTPHeaders, p),\n\t\t)\n\tcase \"jaeger\", \"\":\n\tdefault:\n\t\treturn nil, nil, fmt.Errorf(\"unknown propagation format: %s\", c.Propagation)\n\t}\n\n\t// Initialize tracer with a logger and a metrics factory\n\tcloser, err := jcfg.InitGlobalTracer(\n\t\tcomponentName,\n\t\topts...,\n\t)\n\tif err != nil {\n\t\tlog.Logger.Error(\"Could not initialize jaeger tracer: %s\", err.Error())\n\t\treturn nil, nil, err\n\t}\n\treturn opentracing.GlobalTracer(), closer, nil\n}", "title": "" }, { "docid": "5389be7fca311cc013509e5a37db043e", "score": "0.4296964", "text": "func (p *IIDAttestorPlugin) Configure(ctx context.Context, req *spi.ConfigureRequest) (*spi.ConfigureResponse, error) {\n\t// Parse HCL config payload into config struct\n\tconfig := &IIDAttestorConfig{}\n\tif err := hcl.Decode(config, req.Configuration); err != nil {\n\t\treturn nil, status.Errorf(codes.InvalidArgument, \"unable to decode configuration: %v\", err)\n\t}\n\n\tif config.EC2MetadataEndpoint != \"\" {\n\t\tif config.DeprecatedIdentityDocumentURL != \"\" {\n\t\t\tp.log.Warn(\"Deprecated configuration identity_document_url ignored because ec2_metadata_endpoint is set\")\n\t\t}\n\n\t\tif config.DeprecatedIdentitySignatureURL != \"\" {\n\t\t\tp.log.Warn(\"Deprecated configuration identity_signature_url ignored because ec2_metadata_endpoint is set\")\n\t\t}\n\t} else {\n\t\tif config.DeprecatedIdentityDocumentURL != \"\" {\n\t\t\tp.log.Warn(\"configuration identity_document_url is deprecated, please use ec2_metadata_endpoint instead\")\n\t\t}\n\n\t\tif config.DeprecatedIdentitySignatureURL != \"\" {\n\t\t\tp.log.Warn(\"configuration identity_signature_url is deprecated, please use ec2_metadata_endpoint instead\")\n\t\t}\n\t}\n\n\t// If we have a legacy config, ensure both have a value\n\tif config.isLegacyConfig() {\n\t\tif config.DeprecatedIdentityDocumentURL == \"\" {\n\t\t\tconfig.DeprecatedIdentityDocumentURL = defaultIdentityDocumentURL\n\t\t}\n\n\t\tif config.DeprecatedIdentitySignatureURL == \"\" {\n\t\t\tconfig.DeprecatedIdentitySignatureURL = defaultIdentitySignatureURL\n\t\t}\n\t}\n\n\tp.mtx.Lock()\n\tdefer p.mtx.Unlock()\n\n\tp.config = config\n\n\treturn &spi.ConfigureResponse{}, nil\n}", "title": "" } ]
7874aee8211092fb51b23e05c3d16749
IsGameEnd : if game is end
[ { "docid": "61f57dafb94f69f9944d4ba9dbdf1fd4", "score": "0.8142038", "text": "func (fspgame *FSPGame) IsGameEnd() bool {\n\treturn fspgame.State == GameEnd\n}", "title": "" } ]
[ { "docid": "72b8de97194d9e58fc14da6245e812db", "score": "0.7849093", "text": "func (g *Game)EndOfGame(){\n\t(*g).GameRunning=false\n}", "title": "" }, { "docid": "96061d8e5fc1055a1c6c1ebc108e16c0", "score": "0.7348011", "text": "func (ttt *TTTGame) GameFinished() bool {\n\n\treturn ttt.GameWinner() != Empty || ttt.GameDraw()\n}", "title": "" }, { "docid": "8138ad0f6ee63d3ed8f922cc401b082f", "score": "0.6893277", "text": "func (g *Game) EndTurn(jump bool) bool {\n\tg.Rounds += 1\n\tg.logger.Trace().Int(\"pid\", g.CurrentPlayer().ID).Int(\"rounds\", g.Rounds).Msg(\"Ending turn\")\n\tif len(g.CurrentPlayer().Hand) == 0 {\n\t\tg.logger.Trace().Int(\"pid\", g.CurrentPlayer().ID).Msg(\"Player has 0 cards\")\n\t\tg.State = LOBBY\n\t\treturn true\n\t}\n\n\tif len(g.CurrentPlayer().Hand) == 1 && g.CurrentCard.Value != deck.SWAP {\n\t\tg.logger.Trace().Int(\"pid\", g.CurrentPlayer().ID).Msg(\"Player has 1 card left, setting catorce\")\n\t\tg.PlayerCatorce = g.CurrentPlayer()\n\t}\n\n\tg.Players = g.NextPlayer()\n\tif jump {\n\t\tg.Players = g.NextPlayer()\n\t}\n\n\tg.logger.Debug().Str(\"from\", string(g.State)).Str(\"to\", \"CHOOSE_CARD\").Msg(\"Changing state\")\n\tg.State = CHOOSE_CARD\n\n\tg.TurnStarted = time.Now()\n\treturn false\n}", "title": "" }, { "docid": "48b2199c42b0db2e83cbb068e76c437c", "score": "0.6876806", "text": "func endGame(player Player, player2 Player) {\n\tfmt.Println(\"\\n\\nEnd of game!\")\n\tshowScore(player, player2)\n}", "title": "" }, { "docid": "6e78e9df4b484db25a6cc7220256e714", "score": "0.67747766", "text": "func (gs gameState) isGameOver() bool {\n\treturn gs == stateLost\n}", "title": "" }, { "docid": "f0e960e581db06b67b864f5d7ddba553", "score": "0.67680824", "text": "func IsLevelEnd(state GameState) bool {\n\tvar playerTile *level.Tile\n\tif len(state.Players) != 0 {\n\t\tplayerTile = state.Level.GetTile(state.Players[0].Position)\n\t}\n\treturn len(state.Players) == 0 || (len(state.Players) == 1 && playerTile.Item != nil && playerTile.Item.Type == level.UnlockedExit)\n}", "title": "" }, { "docid": "597d2ae45a067c5a95f85364adb2b936", "score": "0.66095734", "text": "func isGameOver(state *gameState) bool {\n\tnumActivePlayers := state.numPlayers - len(state.finishOrder)\n\treturn numActivePlayers <= 1\n}", "title": "" }, { "docid": "30192a64203ae74eade20b0bfd5e9823", "score": "0.65333307", "text": "func (r *Round) End(seat int, t time.Time) error {\n\tif r.Turn != seat {\n\t\treturn errors.New(\"wrong turn\")\n\t}\n\tif r.Phase != PhaseDiscard {\n\t\treturn errors.New(\"wrong phase\")\n\t}\n\tif len(r.Wall) >= MinTilesLeft {\n\t\treturn errors.New(\"some draws remaining\")\n\t}\n\tr.Finished = true\n\tr.Result = &Result{\n\t\tDealer: r.Dealer,\n\t\tWind: r.Wind,\n\t\tWinner: -1,\n\t\tLoser: -1,\n\t}\n\tr.LastActionTime = t\n\tr.Events = append(r.Events, newEvent(EventEnd, seat, t))\n\treturn nil\n}", "title": "" }, { "docid": "c7bac2f9402fac1a5c61698f643e38d6", "score": "0.6472102", "text": "func (o *MatchingDowntime) HasEnd() bool {\n\treturn o != nil && o.End.IsSet()\n}", "title": "" }, { "docid": "11adad5c1435dc7c68cebf2a41578954", "score": "0.6443602", "text": "func (analyser *Analyser) checkMatchEnd(tScore, ctScore int) (bool, bool) {\n\tmpOvertimeMaxrounds := analyser.NumOvertime\n\tnOvertimeRounds := ctScore + tScore - maxRounds\n\tvar matchOver, isovertime bool\n\n\tif ((ctScore == normalTimeWinRounds) != (tScore == normalTimeWinRounds)) || nOvertimeRounds >= 0 {\n\t\t// a team won in normal time or at least 30 rounds have been played\n\t\tabsDiff := utils.Abs(ctScore - tScore)\n\t\tx := nOvertimeRounds % mpOvertimeMaxrounds\n\t\tnRoundsOfHalf := mpOvertimeMaxrounds / 2\n\t\tif nOvertimeRounds < 0 || ((x == 0 && absDiff == 2) || (x > nRoundsOfHalf && absDiff >= nRoundsOfHalf)) {\n\t\t\tmatchOver = true\n\t\t}\n\t\tisovertime = true\n\t}\n\n\treturn matchOver, isovertime\n}", "title": "" }, { "docid": "6bf452ec1ac9f6d17fe631354c3fd707", "score": "0.63661206", "text": "func (g ScheduleGame) IsOver() bool {\n\treturn g.Status.AbstractGameState == \"Final\"\n}", "title": "" }, { "docid": "5de253bd153e7d96c4e2fec5991a407b", "score": "0.63161546", "text": "func handleEndOfTurn(stream SimonSays_GameServer, con redis.Conn, game *Game, player *Request_Player) (bool, error) {\n\tlc := \"handleEndOfTurn\"\n\tctx := stream.Context()\n\n\t// if not my turn, exit early.\n\tif game.isMyTurn() {\n\t\treturn false, nil\n\t}\n\n\tif game.match() {\n\t\tb, err := game.encodePresses()\n\t\tif err != nil {\n\t\t\tlogger.Error(ctx, lc, \"Error encoding presses: %#v, %v\", game, err)\n\t\t\treturn false, err\n\t\t}\n\n\t\tmsg := message{Type: stopTurnMessage, Player: player.Id, Data: b}\n\t\tif err := publish(ctx, con, game, msg); err != nil {\n\t\t\tlogger.Error(ctx, lc, \"error publishing StopTurnMessage %#v, %v\", msg, err)\n\t\t\treturn false, err\n\t\t}\n\n\t\treturn false, nil\n\t}\n\n\t// if there is no match, you did something wrong. otherwise, my friend, you have lost the game.\n\tmsg := message{Type: lostMessage, Player: player.Id}\n\tif err := publish(ctx, con, game, msg); err != nil {\n\t\tlogger.Error(ctx, lc, \"error publishing LostMessage %#v, %v\", msg, err)\n\t\treturn false, err\n\t}\n\n\t// and we are done taking input - end of game!\n\tlogger.Info(ctx, lc, \"We are done taking input. Returning that we have lost. %#v\", game)\n\treturn true, nil\n}", "title": "" }, { "docid": "2d4919ac8cacf2abdaa2f6f9e4ba9d8b", "score": "0.6170781", "text": "func Ended(g Game) bool {\n\tfor _, winner := range g.Winners() {\n\t\tif winner < 0 {\n\t\t\treturn false\n\t\t}\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "72ad9ea9c7555e588d7772c78ff73c14", "score": "0.6164217", "text": "func (screen *GameScreen) IsEndGameConfirmScreen() bool {\n\treturn screen.scrStatus == ConfirmEndGame\n}", "title": "" }, { "docid": "485375ac781ae73c62a50d7b488709ba", "score": "0.6142848", "text": "func (r *Rules) ScoreEndGame(lastPlay *history.Entry, seats []seat.Seat) (finalScores []int) {\n\tscorer := r.endGameScorer\n\tif scorer == nil {\n\t\tscorer = scoring.ScoreEndGame\n\t}\n\treturn scorer(lastPlay, seats)\n}", "title": "" }, { "docid": "5e401e0f5e8c0dbaf147851e064d228a", "score": "0.6129732", "text": "func (s *SOMASServer) endOfTurn() error {\n\ts.logf(\"start endOfTurn\")\n\tdefer s.logf(\"finish endOfTurn\")\n\n\terr := s.runOrgsEndOfTurn()\n\tif err != nil {\n\t\treturn errors.Errorf(\"Failed to run orgs end of turn: %v\", err)\n\t}\n\n\terr = s.runForage()\n\tif err != nil {\n\t\treturn errors.Errorf(\"Failed to run hunt at end of turn: %v\", err)\n\t}\n\n\t// probe for disaster\n\tupdatedEnv, err := s.probeDisaster()\n\tif err != nil {\n\t\treturn errors.Errorf(\"Failed to probe disaster: %v\", err)\n\t}\n\ts.gameState.Environment = updatedEnv\n\t// increment turn & season if needed\n\tdisasterHappened := updatedEnv.LastDisasterReport.Magnitude > 0\n\ts.incrementTurnAndSeason(disasterHappened)\n\n\t// deduct cost of living\n\ts.deductCostOfLiving(config.GameConfig().CostOfLiving)\n\n\terr = s.updateIslandLivingStatus()\n\tif err != nil {\n\t\treturn errors.Errorf(\"Failed to update island living status: %v\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "420ac0a10c9b852d8cf7148f4babdfb6", "score": "0.6094008", "text": "func EndRound(g *Game, ai AI) {\n\tpScore, dScore := Score(g.player...), Score(g.dealer...)\n\tpBlackjack, dBlackjack := Blackjack(g.player...), Blackjack(g.dealer...)\n\twinnings := g.plrBet\n\n\tswitch {\n\tcase pBlackjack && dBlackjack:\n\t\twinnings = 0\n\tcase pBlackjack:\n\t\twinnings *= int(float64(winnings) * g.BJPayout)\n\tcase dBlackjack:\n\t\twinnings = -winnings\n\tcase pScore > 21:\n\t\tfmt.Println(\"You busted\")\n\t\twinnings = -winnings\n\tcase dScore > 21:\n\t\tfmt.Println(\"Dealer busted\")\n\tcase pScore > dScore:\n\t\tfmt.Println(\"You win!\")\n\tcase dScore > pScore:\n\t\tfmt.Println(\"You lose.\")\n\t\twinnings = -winnings\n\tcase pScore == dScore:\n\t\tfmt.Print(\"It's a draw.\")\n\t\twinnings = 0\n\t}\n\tg.balance += winnings\n\tfmt.Println()\n\tai.Results([][]deck.Card{g.player}, g.dealer)\n\tg.player = nil\n\tg.dealer = nil\n}", "title": "" }, { "docid": "5906de26f53ecfd90aeb29745eb9ff5d", "score": "0.6088166", "text": "func (s *State) EndFrame() {\r\n\ts.Engine.Apply(s.DrawList)\r\n\ts.Engine.EndFrame()\r\n\ts.FrameEnd = time.Now()\r\n\ts.LastFrameDuration = s.FrameEnd.Sub(s.FrameStart)\r\n}", "title": "" }, { "docid": "e19eeed0a0c7d377b7224350e9291665", "score": "0.6067193", "text": "func (g *Game) IsFinished() bool {\n\tif g.Winner() != \"\" {\n\t\treturn true\n\t}\n\tfor x := 0; x < 3; x++ {\n\t\tfor y := 0; y < 3; y++ {\n\t\t\tif g.Board[x][y] == 0 {\n\t\t\t\treturn false\n\t\t\t}\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "02560494bd0001f08efa15ce2e9a5e69", "score": "0.60166305", "text": "func (bs BreakerSection) IsEnd() bool {\n\treturn false\n}", "title": "" }, { "docid": "6322c64e71944a933634d9bc5b57a73c", "score": "0.6002311", "text": "func (game *Game) EndGame() {\n\tgame.Phase = \"end\"\n\tkillcount := make(map[string]int)\n\twhoNominatesWhom := make(map[string]string)\n\t// each player chooses whom to kill\n\tfor _, player := range game.players {\n\t\tname := game.actionManager.NominateToKill(player)\n\n\t\twhoNominatesWhom[player.Name] = name\n\n\t\tif _, ok := killcount[name]; !ok {\n\t\t\tkillcount[name] = 0\n\t\t}\n\n\t\tkillcount[name]++\n\t}\n\n\t// find how many votes decide a kill\n\tmaxKillCount := -1\n\tfor _, v := range killcount {\n\t\tif v > maxKillCount {\n\t\t\tmaxKillCount = v\n\t\t}\n\t}\n\n\t// Find whose been nominated to be killed\n\tnominees := make([]string, 0)\n\tfor k, v := range killcount {\n\t\tif v == maxKillCount {\n\t\t\tnominees = append(nominees, k)\n\t\t}\n\t}\n\n\t// If a nominated person is hunter they can kill someone else\n\tfor _, name := range nominees {\n\t\tif name == NoWereWolfs {\n\t\t\tcontinue\n\t\t}\n\n\t\tplayer := game.GetPlayerByName(name)\n\t\tif player.currentRole == Hunter {\n\t\t\tname := game.actionManager.NominateToKill(player)\n\t\t\tnominees = append(nominees, name)\n\t\t}\n\t}\n\n\t// Find all winners and losers\n\ttannerDeath := false\n\twerewolfDeath := false\n\tNoWereWolfsSelected := false\n\tfor _, name := range nominees {\n\t\tif name == NoWereWolfs {\n\t\t\tNoWereWolfsSelected = true\n\t\t\tcontinue\n\t\t}\n\n\t\tplayer := game.GetPlayerByName(name)\n\t\tswitch player.currentRole {\n\t\tcase Tanner:\n\t\t\ttannerDeath = true\n\t\tcase Werewolf:\n\t\t\twerewolfDeath = true\n\t\t}\n\t}\n\n\tfmt.Printf(\"Nominees %v\\n\", nominees)\n\n\tcenterWerewolfs := 0\n\tif game.Center[0].currentRole == Werewolf {\n\t\tcenterWerewolfs++\n\t}\n\tif game.Center[1].currentRole == Werewolf {\n\t\tcenterWerewolfs++\n\t}\n\tif game.Center[2].currentRole == Werewolf {\n\t\tcenterWerewolfs++\n\t}\n\n\tfmt.Printf(\n\t\t\"Werewolf Death %t, Tanner Death %t, No Werewolfs Selected %t, \"+\n\t\t\t\"number of central werewolfs %d\\n\",\n\t\twerewolfDeath, tannerDeath, NoWereWolfsSelected, centerWerewolfs)\n\n\tvar winner string\n\tif werewolfDeath {\n\t\twinner = \"Team Villager\"\n\t\tgame.VillagerWin()\n\t}\n\n\tif tannerDeath {\n\t\twinner = \"Tanner\"\n\t\tgame.TannerWin()\n\t} else {\n\n\t\tif NoWereWolfsSelected && len(game.GetPlayerByCurrentRole(Werewolf)) == 0 {\n\t\t\twinner = \"Team Villager\"\n\t\t\tgame.VillagerWin()\n\t\t} else if !werewolfDeath {\n\t\t\twinner = \"Team Werewolf\"\n\t\t\tgame.WerewolfWin()\n\t\t}\n\t}\n\n\tgame.EndGameState = &EndGameState{\n\t\tWinner: winner,\n\t\tWhoNominatesWhom: whoNominatesWhom,\n\t\tOriginalRoles: game.getOriginalRolesMap(),\n\t\tCurrentRoles: game.getCurrentRolesMap(),\n\t}\n}", "title": "" }, { "docid": "382af076b40aac519bb7b2c0dd365733", "score": "0.5995076", "text": "func EndgameHandler(eventData *types.EventData, db *gorm.DB) error {\n\tvar event zb_data.PlayerActionEvent\n\tif err := proto.Unmarshal(eventData.EncodedBody, &event); err != nil {\n\t\treturn err\n\t}\n\n\tmatch := models.Match{}\n\terr := db.Where(&models.Match{ID: event.Match.Id}).First(&match).Error\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tmatch.WinnerID = event.Block.List[0].GetEndGame().WinnerId\n\tmatch.Status = event.Match.Status.String()\n\tmatch.BlockHeight = eventData.BlockHeight\n\n\tif err := db.Omit(\"created_at\").Save(&match).Error; err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "54c7f65b26093cbaebbf7a1a5a8d9716", "score": "0.5993606", "text": "func (o *CalendareventsIdJsonEvent) HasEnd() bool {\n\tif o != nil && o.End != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "ed8e4429fdea3b2f5c0e00d4d87b1497", "score": "0.59903455", "text": "func (e *Execution) IsEnded() bool {\n select {\n case <-e.ended:\n return true\n default:\n return false\n }\n return false\n}", "title": "" }, { "docid": "7a0cc46e01b91c7d2d351d93b345678b", "score": "0.5955318", "text": "func (g *Game) isOver() bool {\n\treturn g.board.winner() != \"\" || g.board.emptyCount() == 0\n}", "title": "" }, { "docid": "545c522cbc14ce795bcd563da00949df", "score": "0.5925463", "text": "func (o *EventCreation) HasEnd() bool {\n\tif o != nil && o.End != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "e229e95f1f421d1f15caa8ffc6c876be", "score": "0.5920789", "text": "func (s *Match) IsEnded() bool {\n\treturn s.EndedAt != nil\n}", "title": "" }, { "docid": "e1b0c9c33bf352cb1a7ff8fbc262cde2", "score": "0.59009546", "text": "func (s *SmartContract) finishGame(APIstub shim.ChaincodeStubInterface) sc.Response {\n\treturn shim.Success(nil)\n}", "title": "" }, { "docid": "a2a01f83a8e62f71b76df6ad53678145", "score": "0.5899843", "text": "func ForceEndGame(client *websocket.Conn, err error) {\n\tlog.Printf(\"Error: %v\", err)\n\topponentClient, getClientErr := GetOpponentClient(Clients[client].PlayerID)\n\tif getClientErr != nil {\n\t\tlog.Printf(\"Error: %v\", getClientErr)\n\t}\n\topponentClient.WriteJSON(CreateBasicReturnMessageJSON(\"forceEndGame\"))\n\tclient.Close()\n}", "title": "" }, { "docid": "42ef9b20461474019bf43c358f5663d6", "score": "0.58967507", "text": "func (st *GameOverState) OnPause(world w.World) {}", "title": "" }, { "docid": "aefcfbe36ca6ca6d3d105a20adb75bf9", "score": "0.58756256", "text": "func (g *Game) IsFinished(str string, done *bool) (err error) {\n\t*done = !g.currentlyRunning\n\treturn\n}", "title": "" }, { "docid": "3d98d9e95c3e23025d89bbd7d252abc3", "score": "0.5872351", "text": "func (c *Controls) IsTurnFinished() bool {\n\tif world, ok := c.game.engine.Screen().Level().(*World); ok {\n\t\tfor _, e := range world.Entities {\n\t\t\tif _, ok := e.(*Bullet); ok {\n\t\t\t\treturn false\n\t\t\t}\n\t\t\tif _, ok := e.(*Explosion); ok {\n\t\t\t\treturn false\n\t\t\t}\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "55ba57f208b3c5be2d7a92dde7f3e1da", "score": "0.58576006", "text": "func (s *playTile) ToEndGame() interfaces.State {\n\treturn &endGame{}\n}", "title": "" }, { "docid": "e9603b4000cc00dfc7fefcecbafdf45b", "score": "0.58571297", "text": "func (g *Game) checkGameOver() {\n if g.Player.health < 0 {\n g.mode = ModeGameOver\n }\n}", "title": "" }, { "docid": "509a21abdb61884847935a78a851cd4b", "score": "0.5843526", "text": "func EndGameHandler(w http.ResponseWriter, req *http.Request) {\n\tgame := models.Game{}\n\tbody, err := ioutil.ReadAll(req.Body)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tjson.Unmarshal(body, &game)\n\tarena.GameTableMap[game.GameID].End <- game\n\tdelete(arena.GameTableMap, game.GameID)\n\tw.WriteHeader(200)\n}", "title": "" }, { "docid": "d70b6988dacf72db7f1d3398d58a2ae0", "score": "0.582493", "text": "func (b *Bet) IsFinished() bool {\n\tif b.stand || b.Hand.HasBlackJack() || b.Hand.IsBust() {\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "c42b3cefdb7cc3930cd6bfa87a34f6a9", "score": "0.58169", "text": "func (wn WorkNode) IsEnd() bool {\n\t// return len(wn.NextNodes) == 0\n\treturn wn.NextNodes == nil\n}", "title": "" }, { "docid": "f9252355cef139837fb141e1bc222609", "score": "0.57841533", "text": "func (end EndSection) IsEnd() bool {\n\treturn true\n}", "title": "" }, { "docid": "786074df4677a753420b8caac2f3240e", "score": "0.57297486", "text": "func (board Board) isGameOver() bool {\n\n\tvar zero time.Time\n\n\tif start != zero && time.Now().Sub(start) > time.Minute {\n\t\treturn true\n\t}\n\n\tfor i := 0; i < BoardCols; i++ {\n\t\tif board[1][i] != 0 {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "cba2d13a2977a13baec898d1467add33", "score": "0.5724586", "text": "func (o *MatchingDowntime) GetEndOk() (*int64, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.End.Get(), o.End.IsSet()\n}", "title": "" }, { "docid": "d099b6b518a21f1b0db66632a8b60359", "score": "0.5718929", "text": "func (ath *athlete) HasFinished() bool { return ath.hasFinished }", "title": "" }, { "docid": "df603399a3eca996d7ce7158a17ad68b", "score": "0.5718921", "text": "func (s *Simulator) Finished() bool {\n\treturn s.madePoints >= s.maxPoints\n}", "title": "" }, { "docid": "209c18d7bfa97c827efbbcae1ee1e8a3", "score": "0.5716436", "text": "func (p *GoalObserver) PlayerEnd(playerID int, wait *sync.WaitGroup) {\n\tdefer wait.Done()\n}", "title": "" }, { "docid": "26494feba4bb6a4626ec8286db3e1998", "score": "0.5714928", "text": "func (f *fsm) End() {\n\n\tif f.state == 2 {\n\t\tf.endNumber()\n\t}\n\tif f.state == 1 || f.state == 2 {\n\t\tf.endCommand()\n\t}\n}", "title": "" }, { "docid": "7ba5ef96a8913efe3e93c46d2c3d7b83", "score": "0.57093924", "text": "func (p *DiagObserver) PlayerEnd(playerID int, wait *sync.WaitGroup) {\n\tdefer wait.Done()\n\tlog.Traceln(\"DiagObserver:PlayerEnd()\")\n}", "title": "" }, { "docid": "888ad8eb47e9e9e44385b3d7c69de5e5", "score": "0.5694706", "text": "func IsTaskGroupEnd(taskGroup *types.TaskGroup) bool {\n\tfor _, task := range taskGroup.Taskgroup {\n\t\tstatus := task.Status\n\t\tif status == types.TASK_STATUS_LOST || status == types.TASK_STATUS_STAGING || status == types.TASK_STATUS_STARTING || status == types.TASK_STATUS_RUNNING || status == types.TASK_STATUS_KILLING { //nolint\n\t\t\tblog.Info(\"task %s status(%s), not end status\", task.ID, status)\n\t\t\treturn false\n\t\t}\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "6672ce82cd50b0d37972b4561258d37f", "score": "0.56892794", "text": "func (g *game) quit() {\n\t// This will probably eventually autosave game information.\n}", "title": "" }, { "docid": "809861e15b0ee801888836d9c0332789", "score": "0.56879175", "text": "func (o *DowntimeScheduleOneTimeResponse) HasEnd() bool {\n\treturn o != nil && o.End.IsSet()\n}", "title": "" }, { "docid": "357df6d038efffb849142904d70870d9", "score": "0.5685651", "text": "func (g *Graph) EndLoop() bool {\n\tg.Hook = g.ActiveBlock.End\n\tg.ActiveBlock.Terminate()\n\tg.ActiveBlock = nil\n\treturn true\n}", "title": "" }, { "docid": "5663311803b17707601432315b915aee", "score": "0.5645255", "text": "func (o *SessionAbstractSessionAllOf) HasEndTime() bool {\n\tif o != nil && o.EndTime != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "6942927c0992f3e330a3dbf3a268d1b0", "score": "0.5633712", "text": "func (e GRPCEvent) End() time.Time { return e.ServerSend }", "title": "" }, { "docid": "45a7ccd64f9b2272989a76df43879f29", "score": "0.56283796", "text": "func (s *Baseasm8086Listener) ExitEndif_(ctx *Endif_Context) {}", "title": "" }, { "docid": "2b2d1591d24314c61bd1ef66c3226f6f", "score": "0.56257236", "text": "func (fspgame *FSPGame) OnStateGameBegin() {\n\t// TODO: 是否需要检测玩家的退出情况,如果玩家在游戏回合开始前退出,应该是游戏结束还是继续游戏,只是该玩家无行动而已。\n\n\t//\n\tif fspgame.isFlagFull(fspgame.gameEndFlag) {\n\t\t// TODO: param1, param2 : 额外信息。\n\t\tfspgame.SetGameState(GameEnd, NormalExit, 0)\n\t\tv := fspgame.UpperController.CreateGameEndMsg()\n\t\t//fmt.Println(\"gameEndMsg: \",v,string(v), len(v))\n\t\tfspgame.AddCmdToCurrFrame(GameEnd, v)\n\t\tfspgame.UpperController.OnGameEndMsgAddCallBack()\n\t}\n\n\tif fspgame.isFlagFull(fspgame.roundBeginFlag) {\n\t\tfspgame.SetGameState(RoundBegin, 0, 0)\n\t\tfspgame.IncRoundID()\n\t\tfspgame.ClearRound()\n\t\t//get content via upper FSPGameI interface\n\t\tv := fspgame.UpperController.CreateRoundMsg()\n\t\t//fmt.Println(\"roundmsgv: \",v)\n\t\tfspgame.AddCmdToCurrFrame(RoundBegin, v)\n\t\tfspgame.UpperController.OnRoundBeginMsgAddCallBack()\n\t}\n}", "title": "" }, { "docid": "aa5566247205db0255286da3d86d32dd", "score": "0.5613975", "text": "func (o *Problem) HasEndTime() bool {\n\tif o != nil && o.EndTime != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "5921b55d5644f2eb4b0b11de63489bf6", "score": "0.5595828", "text": "func (g *Game) IsGameOver() (bool, Token) {\r\n\tfor _, v := range [...]Token{X, O} {\r\n\t\tif IsWinner(v, g.GameBoard) {\r\n\t\t\treturn true, v\r\n\t\t}\r\n\t}\r\n\r\n\t// Return blank if the games over\r\n\tif !g.GameBoard.BlankSpacesExist() {\r\n\t\treturn true, Blank\r\n\t}\r\n\treturn false, Blank\r\n}", "title": "" }, { "docid": "5f80f7d9034646b652902f541637f1d3", "score": "0.5591546", "text": "func (server *ServerRPC) GameClosed(name string) {\n\tserver.callClientMethod(\"GameClosed\", name)\n}", "title": "" }, { "docid": "7ae87e636b0b5932b64668f070cb96dd", "score": "0.558856", "text": "func (p *Player) IsFinished() bool {\n\tfor _, bet := range p.Bets {\n\t\tif !bet.IsFinished() {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "cdeb6ada35f7c49c4cd0cf3ee3c1188e", "score": "0.5584406", "text": "func (g *GameSpy) Finish(winner string) {\n\tg.FinishedWith = winner\n}", "title": "" }, { "docid": "43e240870c7f2b441a63b385e3081715", "score": "0.55801195", "text": "func end(ep int, op int) bool {\n\tif ep == op {\n\t\treturn true\n\t}\n\tif ep > op {\n\t\treturn true\n\t}\n\tif op < ep {\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "c58b7983b72ad4a95abf9cc880fb7c14", "score": "0.5577587", "text": "func (c *Curtain) IsFinished() bool {\n\tif c.counter < c.transitionFrames {\n\t\treturn false\n\t}\n\n\tc.counter = 0\n\tc.changing = false\n\n\treturn true\n}", "title": "" }, { "docid": "ecc720f6d6ef0795738358bc6db590c6", "score": "0.55706567", "text": "func (o *XmlNs0EnclaveProcessAllOf) HasEndingTime() bool {\n\tif o != nil && o.EndingTime != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "26782b81407d3e2fb04598faf81a1deb", "score": "0.5570282", "text": "func (s *Baseasm8086Listener) ExitEnd(ctx *EndContext) {}", "title": "" }, { "docid": "db7a48a63e0457d8a8db310d107fd904", "score": "0.555703", "text": "func (m *MatchData) Finished() bool {\n\treturn m.EndTime.Valid && !m.Cancelled\n}", "title": "" }, { "docid": "ec3f0c4967a584b37ba80f762d5518b9", "score": "0.5547414", "text": "func (analyser *Analyser) checkFinishedRoundValidity(e events.RoundEnd) bool {\n\treason := e.Reason\n\tif reason == events.RoundEndReasonCTSurrender || reason == events.RoundEndReasonDraw {\n\t\treturn false\n\t}\n\treturn true\n}", "title": "" }, { "docid": "7556b88ec11105c944cd4b02dd0aa34d", "score": "0.5546092", "text": "func WaitEnd() {\n\tplayer.waitEnd()\n}", "title": "" }, { "docid": "5aee507c12661008ced681453eeacbd4", "score": "0.5536482", "text": "func (o *EventCreation) GetEndOk() (*int64, bool) {\n\tif o == nil || o.End == nil {\n\t\treturn nil, false\n\t}\n\treturn o.End, true\n}", "title": "" }, { "docid": "f0ada26f3a1ade3f8163a9bf6ae74dfa", "score": "0.55328095", "text": "func (m *BookingMutation) EndTime() (r time.Time, exists bool) {\n\tv := m.endTime\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "title": "" }, { "docid": "0e8ec21abe3c224930005b4afae5b85c", "score": "0.55263543", "text": "func (ss *SleepService) End(ctx context.Context, family *goparent.Family, child *goparent.Child) error {\n\t_, ok, err := ss.Status(ctx, family, child)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif ok {\n\t\t//this is broken until someone fixes it\n\t\t// sleep.End = time.Now()\n\t\treturn nil\n\t}\n\treturn goparent.ErrNoExistingSession\n\n}", "title": "" }, { "docid": "e8b2a065e810d9163bdca0359deba4ec", "score": "0.5525121", "text": "func (g *GokobanGame) GameCompleted() {\n\tlog.Debug(\"Game Completed\")\n\n\tif g.audioAvailable {\n\t\tg.musicPlayer.Stop()\n\t\tg.PlaySound(g.gameCompletePlayer, nil)\n\t}\n\tg.titleImage.SetImage(gui.ButtonDisabled, g.dataDir + \"/gui/title3_completed.png\")\n}", "title": "" }, { "docid": "6e524666d46fd2561e56f629d2251ad6", "score": "0.5509835", "text": "func GameOver(o Octopus) bool {\n\treturn Fishes(o) == len(o)\n}", "title": "" }, { "docid": "75bbf31ee190f196b7809b1848ebe3b6", "score": "0.5499743", "text": "func GameComplete(c *routing.Context) error {\n\treturn nil\n}", "title": "" }, { "docid": "2928f2397aa49405e085ed309a9ffedb", "score": "0.5498127", "text": "func (v *View) End() bool {\n\tif v.mainCursor() {\n\t\tif v.height > v.Buf.NumLines {\n\t\t\tv.Topline = 0\n\t\t} else {\n\t\t\tv.Topline = v.Buf.NumLines - v.height\n\t\t}\n\n\t}\n\treturn false\n}", "title": "" }, { "docid": "962a37f9ec4db84c2abb77c6ec945707", "score": "0.5488606", "text": "func (e *Execution) End() {\n if e.markEnded() {\n close(e.ended)\n }\n}", "title": "" }, { "docid": "c04f927ab61e17fb60d8deaf59feab06", "score": "0.54863316", "text": "func (ts TimeSpan) End() time.Time { return ts.end }", "title": "" }, { "docid": "80209f181beafb832412218c53790116", "score": "0.5482499", "text": "func (w *Window) end() {\n\t// nothing, really\n}", "title": "" }, { "docid": "e3b719d409d69adc985315310f850c06", "score": "0.54765856", "text": "func (o *SessionAbstractSession) HasEndTime() bool {\n\tif o != nil && o.EndTime != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "c88f25d78ad658d7d05d0c69314a2d9d", "score": "0.5437849", "text": "func (fspgame *FSPGame) OnStateControlStart() {\n\t// TODO: 是否需要检测玩家的退出情况,如果玩家在游戏回合开始前退出,应该是游戏结束还是继续游戏,只是该玩家无行动而已。\n\n\t//\n\tif fspgame.isFlagFull(fspgame.gameEndFlag) {\n\t\t// TODO: param1, param2 : 额外信息。\n\t\tfspgame.SetGameState(GameEnd, NormalExit, 0)\n\t\tv := fspgame.UpperController.CreateGameEndMsg()\n\t\t//fmt.Println(\"gameEndMsg: \",v,string(v), len(v))\n\t\tfspgame.AddCmdToCurrFrame(GameEnd, v)\n\t\tfspgame.UpperController.OnGameEndMsgAddCallBack()\n\t}\n\n\t//\n\tif fspgame.isFlagFull(fspgame.roundEndFlag) {\n\t\tfspgame.SetGameState(RoundEnd, 0, 0)\n\t\tfspgame.ClearRound()\n\t\tv := fspgame.UpperController.CreateRoundEndMsg()\n\t\tfspgame.AddCmdToCurrFrame(RoundEnd, v)\n\t\tfspgame.UpperController.OnRoundEndMsgAddCallBack()\n\t}\n}", "title": "" }, { "docid": "8b1379196996e2cd563a0e393d0942b3", "score": "0.5424535", "text": "func (ath *athlete) InFinishCorridor() bool { return ath.inFinishCorridor }", "title": "" }, { "docid": "73c88d18ac72399548cdcaa751dc33d8", "score": "0.54087687", "text": "func (m *SlotMutation) EndTime() (r string, exists bool) {\n\tv := m.endTime\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "title": "" }, { "docid": "9635e2ff8b4504496f581d78917037cf", "score": "0.54063344", "text": "func (module *PatchVoiceModule) IsFinished() bool {\n\treturn module.envState == patchVoiceEnvStateIdle\n}", "title": "" }, { "docid": "4837d88feed9eb5c62cfb497fd56a460", "score": "0.5400665", "text": "func (m *UnavailabilityMutation) EndTime() (r time.Time, exists bool) {\n\tv := m.endTime\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "title": "" }, { "docid": "5839fd2755169fb0cd97fefd352a38f4", "score": "0.5397418", "text": "func (o *CalendareventsIdJsonEvent) GetEndOk() (*string, bool) {\n\tif o == nil || o.End == nil {\n\t\treturn nil, false\n\t}\n\treturn o.End, true\n}", "title": "" }, { "docid": "19383af359bb80e8780e14fded965546", "score": "0.53788763", "text": "func (board *Board) IsGameOver() (bool, int) {\n\n\tfor _, element := range board.getHands() {\n\n\t\tif board.Grid[element[0]/3][element[0]%3] == board.Grid[element[1]/3][element[1]%3] && board.Grid[element[0]/3][element[0]%3] == board.Grid[element[2]/3][element[2]%3] && board.Grid[element[0]/3][element[0]%3] != -1 {\n\t\t\treturn true, board.Grid[element[0]/3][element[0]%3]\n\t\t}\n\t}\n\treturn false, -1\n}", "title": "" }, { "docid": "7b46edf29ca3f9d57916359852055e12", "score": "0.53774667", "text": "func (s Segment) IsOnEnd(p Point) bool {\n\treturn p.Eq(s.Source) || p.Eq(s.Target)\n}", "title": "" }, { "docid": "a14cc9697a8f5faf9a58bc32ff23d2f5", "score": "0.53730863", "text": "func (g *GameManager) EndHand() error {\n\tg.ShowVisibleCards()\n\tpayouts := g.Pot.GetPayouts(g.State.GetWinningIDs())\n\n\tg.gameHand.Board = g.cardsToStringArray(g.State.Board)\n\tg.gameHand.Payouts = payouts\n\tg.gameHand.Bets = g.Pot.PlayerTotals\n\n\terr := g.gameHand.Save()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tplayerIDs := []int64{}\n\tfor playerID := range g.gamePlayerHands {\n\t\tplayerIDs = append(playerIDs, playerID)\n\t}\n\n\tplayers := g.State.Table.GetPlayersFromIDs(playerIDs)\n\tfor _, player := range players {\n\t\thand := g.gamePlayerHands[player.ID]\n\n\t\tif amount, ok := payouts[player.ID]; ok {\n\t\t\tplayer.Stack += amount\n\t\t}\n\t\thand.Ending = player.Stack\n\n\t\terr = hand.Save()\n\t\tif err != nil {\n\t\t\tfmt.Printf(\"Error saving user hand: %s\\n\", err)\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "10cd2672b0f1633395e9f26ba2cf86cc", "score": "0.53595334", "text": "func (jmi *JarvisMsgInfo) IsEnd() bool {\n\treturn jmi.Msg != nil && jmi.Msg.MsgType == pb.MSGTYPE_REPLY2 && jmi.Msg.ReplyType == pb.REPLYTYPE_END\n}", "title": "" }, { "docid": "70d42225c537fe1c7215edc8a551fa5a", "score": "0.5358823", "text": "func (s *Service) End(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tkey := r.FormValue(\"key\")\n\n\tfmt.Println(\"endgame: key\", key)\n\tres := &Response{\n\t\tSuccess: false,\n\t}\n\n\tif s.CreateTransactionForPayoutMethod == nil {\n\t\tjson.NewEncoder(w).Encode(res)\n\t\treturn\n\t}\n\n\ttxID, err := s.CreateTransactionForEndMethod(key)\n\tif err != nil {\n\t\tutils.GetLogInstance().Error(\"Payout error\", err)\n\t\tjson.NewEncoder(w).Encode(res)\n\t\treturn\n\t}\n\tres.Success = true\n\tres.TxID = txID\n\tjson.NewEncoder(w).Encode(res)\n}", "title": "" }, { "docid": "e27becc1dabf8d173fd6c0d09f962dae", "score": "0.53405184", "text": "func (o *PooledObject) EndEvictionTest(idleQueue *collections.LinkedBlockingDeque) bool {\n\to.lock.Lock()\n\tdefer o.lock.Unlock()\n\tif o.state == StateEviction {\n\t\to.state = StateIdle\n\t\treturn true\n\t} else if o.state == StateEvictionReturnToHead {\n\t\to.state = StateIdle\n\t\tif !idleQueue.OfferFirst(o) {\n\t\t\t// TODO - Should never happen\n\t\t\tpanic(fmt.Errorf(\"Should never happen\"))\n\t\t}\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "af311e341b3bf43869431854c3d678e0", "score": "0.5325515", "text": "func (me TxsdPresentationAttributesTextContentElementsTextAnchor) IsEnd() bool { return me == \"end\" }", "title": "" }, { "docid": "4ee4b0e057f7a6446d3b42a90b997c9f", "score": "0.5317024", "text": "func (n *RuneTrieNode) IsEnd() bool {\n\treturn len(n.keys) == 0\n}", "title": "" }, { "docid": "356aab90e86de415c770d20738a1bef9", "score": "0.5311379", "text": "func (o *Op) End() {\n\to.Runtime.End = time.Now()\n}", "title": "" }, { "docid": "e024a9ef5d3fa9ca54d9c143e6f7e11c", "score": "0.5310741", "text": "func (ssh *StepSessionHandler) End() {\n\tfmt.Println(\"End session: \", *ssh.messageSession.SessionID())\n\tfmt.Println(\"\")\n}", "title": "" }, { "docid": "7fe6feeb539353f7b6738e6c7ffbd7de", "score": "0.5303279", "text": "func End() {\n\tC.endwin()\n}", "title": "" }, { "docid": "9c162c5b506dce07e7fd1286152e5ce3", "score": "0.52991676", "text": "func (ZwpPointerGestureHoldV1EndEvent) MessageName() string { return \"end\" }", "title": "" }, { "docid": "3ffa8145c533f74353b78493c43cf823", "score": "0.529653", "text": "func (o *MetricEvidenceAllOf) HasEndTime() bool {\n\tif o != nil && o.EndTime != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "7c482d5efd70fc14018fe3049f4708df", "score": "0.5296116", "text": "func (o *ViewTimer) HasTimerLastIntervalEnd() bool {\n\tif o != nil && o.TimerLastIntervalEnd != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "a65370bb14d828ed56e2d11d3106875e", "score": "0.52934015", "text": "func (res *Res) End() {\n\tres.exit = true\n}", "title": "" }, { "docid": "d1a3dbede68d4dab8beee3499a87a938", "score": "0.5285345", "text": "func (_FinalizableCrowdsale *FinalizableCrowdsaleSession) HasEnded() (bool, error) {\n\treturn _FinalizableCrowdsale.Contract.HasEnded(&_FinalizableCrowdsale.CallOpts)\n}", "title": "" }, { "docid": "6e3799ac6784a6c609e044d7fa4505c0", "score": "0.5280979", "text": "func (o *SessionAbstractSessionAllOf) GetEndTimeOk() (*time.Time, bool) {\n\tif o == nil || o.EndTime == nil {\n\t\treturn nil, false\n\t}\n\treturn o.EndTime, true\n}", "title": "" }, { "docid": "8cd90a6900ca4d2b676558fad40e3789", "score": "0.5268325", "text": "func (gs gameState) isStarted() bool {\n\treturn gs == stateStarted\n}", "title": "" } ]
446fdef0125ab505355f1bd044ac6ab1
Key function returns key value.
[ { "docid": "37441b2351f26873fee4148a498dc069", "score": "0.0", "text": "func (e UpdateAppConfigRequestValidationError) Key() bool { return e.key }", "title": "" } ]
[ { "docid": "b78d2f3303c40e80806d21d9a6fc50ac", "score": "0.7184771", "text": "func (fn KeyerFunc) Key(key string) (string, time.Duration) { return fn(key) }", "title": "" }, { "docid": "2e0ab038f206090b6d52aeda5a0a5ea3", "score": "0.7114424", "text": "func (kv KV) Key() string { return kv.k }", "title": "" }, { "docid": "803a34d99733371be76d0b776cd0d1f5", "score": "0.703695", "text": "func (f binaryEqualsFunc) key() Key {\n\treturn f.k\n}", "title": "" }, { "docid": "57e7a308863371e35d23a7d49ffb590c", "score": "0.69205874", "text": "func (f booleanFunc) key() Key {\n\treturn f.k\n}", "title": "" }, { "docid": "4e5480a74f30d391e557a6bcc10ca820", "score": "0.68172514", "text": "func (v Value) Key() string {\n\tif len(v.keys) == 0 {\n\t\treturn \"\" // BUG: https://github.com/golang/go/issues/16694\n\t}\n\treturn v.keys[v.index]\n}", "title": "" }, { "docid": "a8262e0f96328183fd8993293a0db569", "score": "0.6765463", "text": "func (m *Map) Key() Type {}", "title": "" }, { "docid": "d5e7eda17329b9ec9647e920bfb6afc0", "score": "0.6743437", "text": "func (p *kvParser) Key() string { return p.k }", "title": "" }, { "docid": "2a069427e76da26f26d1a823005eebdf", "score": "0.67357004", "text": "func (a AlphaNumeric) GetKey() string {\n\treturn a.Key\n}", "title": "" }, { "docid": "2a069427e76da26f26d1a823005eebdf", "score": "0.67357004", "text": "func (a AlphaNumeric) GetKey() string {\n\treturn a.Key\n}", "title": "" }, { "docid": "19c6b64b8ba8af129396736d19673533", "score": "0.6720314", "text": "func (f numericEqualsFunc) key() Key {\n\treturn f.k\n}", "title": "" }, { "docid": "c89089f359a71f31693bb7065f12fc8b", "score": "0.67008", "text": "func (m MultiKey) Key() string { return MapToStrKey(m) }", "title": "" }, { "docid": "eb0a156a0650b5e2a22b66afec86df53", "score": "0.6682776", "text": "func (c *CachedItem) getKey() string {\n\treturn c.item.Id\n}", "title": "" }, { "docid": "d09a050527e6c35b7151ad5e879ff0b4", "score": "0.66713667", "text": "func (v ConfigMap) Key(key string) string {\n\tkey = strings.ToLower(key)\n\treturn v[key]\n}", "title": "" }, { "docid": "d4962c8917986a1896a92fbe0be41d42", "score": "0.6669151", "text": "func (nd Node) GetKey(i int) Item {\n\treturn nd.keys.GetItem(i, nd.msg)\n}", "title": "" }, { "docid": "8707084c9368ce22a78fe0b9863a670c", "score": "0.66542304", "text": "func KeyFunc(key string) func(interface{}) error {\n\treturn def.KeyFunc(key)\n}", "title": "" }, { "docid": "4890b393ef21ea7a197c93f2bf234388", "score": "0.6651405", "text": "func GetKey(name string, value interface{}) string {\n\treturn fmt.Sprintf(\"%s:%v\", name, value)\n}", "title": "" }, { "docid": "612fefb3eef1c872caeab808fda0bdb0", "score": "0.66479045", "text": "func (m Match) GetKey() string {\n\treturn m.Key\n}", "title": "" }, { "docid": "612fefb3eef1c872caeab808fda0bdb0", "score": "0.66479045", "text": "func (m Match) GetKey() string {\n\treturn m.Key\n}", "title": "" }, { "docid": "cd3bd4e8a9cbd4e1bf8d1477eeccca6d", "score": "0.66223323", "text": "func (a Alpha) GetKey() string {\n\treturn a.Key\n}", "title": "" }, { "docid": "cd3bd4e8a9cbd4e1bf8d1477eeccca6d", "score": "0.66223323", "text": "func (a Alpha) GetKey() string {\n\treturn a.Key\n}", "title": "" }, { "docid": "2cb6b30bfc1096abcb995fd018cb28d4", "score": "0.6572397", "text": "func Key(x, y int) string {\n\treturn fmt.Sprintf(\"%d-%d\", x, y)\n}", "title": "" }, { "docid": "2d6783e716dcd6ac367ede4e5f5ee89d", "score": "0.65577745", "text": "func (d *Controller) KeyVal() string {\n\treturn d.ID\n}", "title": "" }, { "docid": "7fd2384a3a8c88deea112f0e5f9127cb", "score": "0.6553677", "text": "func (m MinFloat64) GetKey() string {\n\treturn m.Key\n}", "title": "" }, { "docid": "1e2f7e3966e7f5119c6fc29b443e2c1a", "score": "0.654752", "text": "func (p parameter) Key() key {\n\treturn key{p.typ, p.name}\n}", "title": "" }, { "docid": "15e053274400253179dcec68d657a399", "score": "0.65472716", "text": "func Key() interface{} { return level.Key() }", "title": "" }, { "docid": "3ba757be44b6b25de64a9e4975f8bb38", "score": "0.65384364", "text": "func (e *Elevator) getKey() string {\n\treturn strconv.Itoa(e.GroupId) + \"-\" + strconv.Itoa(e.Id)\n}", "title": "" }, { "docid": "60284144ace46f66a9f2ed38eb302091", "score": "0.6534903", "text": "func (i *Inode) GetKey() (m string) {\n\treturn fmt.Sprintf(\"%d\", i.Inode)\n}", "title": "" }, { "docid": "a9f5be84fd0266edca71551fbb3e9a70", "score": "0.6534497", "text": "func (n *DomainNode) GetKey() string {\n\treturn n.key\n}", "title": "" }, { "docid": "0774f27fd97f9e3f1bb79ceaa372649c", "score": "0.6534132", "text": "func (t keyTitle) Key() string {\n\treturn string(t)\n}", "title": "" }, { "docid": "ca94c364fbc5e30b8b7c5b53326afc73", "score": "0.65322113", "text": "func (d *Dentry) GetKey() (m string) {\n\treturn fmt.Sprintf(\"%10d*%s\", d.ParentId, d.Name)\n}", "title": "" }, { "docid": "f3bd0087b49d8aaa0a076a1214fb27a5", "score": "0.65268946", "text": "func (n NoMatch) GetKey() string {\n\treturn n.Key\n}", "title": "" }, { "docid": "f3bd0087b49d8aaa0a076a1214fb27a5", "score": "0.65268946", "text": "func (n NoMatch) GetKey() string {\n\treturn n.Key\n}", "title": "" }, { "docid": "b0202e03c631caad5d5557a08bc56545", "score": "0.651423", "text": "func (ring *Ring) Get(key string) string {\n\n\tif ring.Len() == 0 {\n\t\treturn \"\"\n\t}\n\n\thash := ring.hashfunc([]byte(key))\n\n\t// Binary search for appropriate replica.\n\tidx := sort.Search(len(ring.keys), func(i int) bool {\n\t\tel := ring.keys[i]\n\t\treturn (el.hash > hash) || (el.hash == hash && el.key >= key)\n\t})\n\n\t// Means we have cycled back to the first replica.\n\tif idx == len(ring.keys) {\n\t\tidx = 0\n\t}\n\n\treturn ring.keys[idx].key\n}", "title": "" }, { "docid": "ae0b10076caca1b6c8865a71e48cfe4c", "score": "0.6513304", "text": "func (d Date) GetKey() string {\n\treturn d.Key\n}", "title": "" }, { "docid": "3442ab6f273d53ac292fb4b557244cab", "score": "0.6499769", "text": "func (n Numeric) GetKey() string {\n\treturn n.Key\n}", "title": "" }, { "docid": "3442ab6f273d53ac292fb4b557244cab", "score": "0.6499769", "text": "func (n Numeric) GetKey() string {\n\treturn n.Key\n}", "title": "" }, { "docid": "031dae71ee3017c469fbc739e879a929", "score": "0.6485388", "text": "func (m Min) GetKey() string {\n\treturn m.Key\n}", "title": "" }, { "docid": "031dae71ee3017c469fbc739e879a929", "score": "0.6485388", "text": "func (m Min) GetKey() string {\n\treturn m.Key\n}", "title": "" }, { "docid": "2b29437e380c1f04864a3c38f6c31ba9", "score": "0.64805114", "text": "func (m *Map)Get(key string) string{\n\tif len(m.keys) == 0{\n\t\treturn \"\"\n\t}\n\thash := int(m.hash([]byte(key)))\n\t//Binary search for appropriate replica\n\tidx := sort.Search(len(m.keys), func(i int) bool {\n\t\treturn m.keys[i]>=hash\n\t})\n\treturn m.hashMap[m.keys[idx%len(m.keys)]]\n}", "title": "" }, { "docid": "344e17c93d40324ed34dc95e3d440b42", "score": "0.6477321", "text": "func (v Map) Key(k string) Value {\n\tvar result, ok = v[k]\n\tif !ok {\n\t\treturn Undefined{}\n\t}\n\treturn result\n}", "title": "" }, { "docid": "ae390a4f07d42bd7cb22a0badb4b0cae", "score": "0.6447402", "text": "func (o *Object) Key(name string) Value {\n\treturn o.key(name, false)\n}", "title": "" }, { "docid": "602c0b3fcd919e79fb4a08e44c17d7d2", "score": "0.6432166", "text": "func (l *InMem) GetKey(key string) string {\n\tl.mutex.Lock()\n\tdefer l.mutex.Unlock()\n\treturn l.store[key]\n}", "title": "" }, { "docid": "39bc6e9063ff59a5dc2c43a5270ca4af", "score": "0.6421318", "text": "func (i IP) GetKey() string {\n\treturn i.Key\n}", "title": "" }, { "docid": "39bc6e9063ff59a5dc2c43a5270ca4af", "score": "0.6421318", "text": "func (i IP) GetKey() string {\n\treturn i.Key\n}", "title": "" }, { "docid": "9c39a4b176705c38fd140de96eed88df", "score": "0.64165527", "text": "func (self Hex) Key() string {\n\treturn self.Position.ToString()\n}", "title": "" }, { "docid": "33b8526055d489e7d63daed8e142e46f", "score": "0.64138", "text": "func (l Length) GetKey() string {\n\treturn l.Key\n}", "title": "" }, { "docid": "33b8526055d489e7d63daed8e142e46f", "score": "0.64138", "text": "func (l Length) GetKey() string {\n\treturn l.Key\n}", "title": "" }, { "docid": "3e042d48a0d9d9323fdc100a2c6281b9", "score": "0.64061964", "text": "func (o KeyValueOutput) Key() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v KeyValue) *string { return v.Key }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "6051d6cb11c46d49a9cdfe548fe7ce1c", "score": "0.64041346", "text": "func GetKey(id dna.Int) dna.String {\n\treturn Encrypt(id)\n}", "title": "" }, { "docid": "604d2372cd7f003c80a56cd66960c524", "score": "0.6404133", "text": "func (i *Identifier) Key() string {\n\treturn i.Name\n}", "title": "" }, { "docid": "bfbce98c6d29b4931e4e0c265277124d", "score": "0.64010125", "text": "func (s *Spread) Key(k string) float64 {\n\tbytes := s.bytes(k)\n\ti := s.makeInt(bytes[0], bytes[1], bytes[2], bytes[3])\n\tf := s.fraction(i)\n\treturn s.bound(f)\n}", "title": "" }, { "docid": "355f3c8684a51cfaef40b471dadc6f59", "score": "0.6397474", "text": "func (r *RandomStringValue) GetKey() string {\n\treturn r.key\n}", "title": "" }, { "docid": "aefb53c3906c6a6622aefe3689744e6a", "score": "0.6394633", "text": "func (q *QueueInformer) key(obj interface{}) (string, bool) {\n\treturn q.keyFunc(obj)\n}", "title": "" }, { "docid": "49fc9d12eeef688125352db058d22702", "score": "0.6393383", "text": "func (entry KVEntry) Key() string {\n\treturn entry.key\n}", "title": "" }, { "docid": "70004d7a96a155b313c17b4854d20a5b", "score": "0.6390142", "text": "func (cyphernodeKeys *CyphernodeKeys) KeyForLabel( keyLabel string ) string {\n if key, exists := cyphernodeKeys.keys[keyLabel]; exists {\n return key\n }\n return \"\"\n}", "title": "" }, { "docid": "8719445bbff66704fa3a402e5c13d4dc", "score": "0.63871264", "text": "func (node *nodeR) GetKey() string {\n\treturn node.key\n}", "title": "" }, { "docid": "355336270dfdda5d0f7fa3beea55622a", "score": "0.6386478", "text": "func (f dateLessThanFunc) key() Key {\n\treturn f.k\n}", "title": "" }, { "docid": "408c02a994e06e403dacb74bbde2d8e4", "score": "0.6380024", "text": "func (operator *BaseOperator) GetKey() string {\n\treturn operator.key\n}", "title": "" }, { "docid": "4ae9ebafa73840df6498feebdd6b2a83", "score": "0.6379109", "text": "func (i SdOperationFilter) Key() string {\n\tif val, ok := _SdOperationFilterValueToKeyMap[i]; ok {\n\t\t// found\n\t\treturn val\n\t} else {\n\t\t// not found\n\t\treturn \"\"\n\t}\n}", "title": "" }, { "docid": "dbeb5260d1ed65c8204b73909daa71d7", "score": "0.6374444", "text": "func (o *VirtualizationVmwareVirtualNetworkInterfaceAllOf) GetKey() int64 {\n\tif o == nil || o.Key == nil {\n\t\tvar ret int64\n\t\treturn ret\n\t}\n\treturn *o.Key\n}", "title": "" }, { "docid": "5e79178edc93af6b4049800b14e12a1c", "score": "0.63719285", "text": "func (o *Item) GetKey() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.Key\n}", "title": "" }, { "docid": "847f7fff114144e1928375ccea1f550d", "score": "0.63689536", "text": "func (s Sec) Key(key string) string {\r\n\treturn s.Map[key]\r\n}", "title": "" }, { "docid": "4e8c2ab1adae3823a12e1583a6af83f3", "score": "0.63689", "text": "func (e *Entry) GetKey() string {\n\tif e.Key == \"\" {\n\t\te.Key = fmt.Sprintf(\"%s%s\", strings.ToLower(e.FirstAuthorLast()), e.Year())\n\t}\n\treturn e.Key\n}", "title": "" }, { "docid": "dc0d07913b25f19a6edccff33cf74913", "score": "0.6367644", "text": "func (a AlphaDash) GetKey() string {\n\treturn a.Key\n}", "title": "" }, { "docid": "dc0d07913b25f19a6edccff33cf74913", "score": "0.6367644", "text": "func (a AlphaDash) GetKey() string {\n\treturn a.Key\n}", "title": "" }, { "docid": "3eea9d57b21801f2588fe077356acecd", "score": "0.6364853", "text": "func (f feature) Key() sumr.Key {\n\tbuf := []byte(f.String())\n\thash := fnv.New64a()\n\thash.Write(buf)\n\tg := hash.Sum(nil)\n\tvar k uint64\n\tfor i := 0; i < 64/8; i++ {\n\t\tk |= uint64(g[i]) << uint(i*8)\n\t}\n\treturn sumr.Key(k)\n}", "title": "" }, { "docid": "b0194880a412ba2c9b49adf69acc79f9", "score": "0.63644713", "text": "func (m *Model) GetKey() string {\n\treturn m.cur.GetKey()\n}", "title": "" }, { "docid": "ac888aa2bd36186be447211d8c4953d9", "score": "0.63587505", "text": "func (k *Node[T]) Key() T {\n\treturn k.key\n}", "title": "" }, { "docid": "332612c7a5e9f8cbc1eeb05d34057612", "score": "0.63574535", "text": "func (c *Config) KeyFunc(key string) func(interface{}) error {\n\treturn c.real().KeyFunc(key)\n}", "title": "" }, { "docid": "a4b8f936e27c09f223b71339d041a5a5", "score": "0.635377", "text": "func (o SchedulingNodeAffinityOutput) Key() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v SchedulingNodeAffinity) *string { return v.Key }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "a0d4d1298b09c2037bb481a748ab9962", "score": "0.6352584", "text": "func (k Key) Get(index int) string {\n\treturn k.Comp[index]\n}", "title": "" }, { "docid": "f5b8f8f01e3dc8812f31cebfded28691", "score": "0.6352067", "text": "func Key(v string) predicate.BookingMetadatum {\n\treturn predicate.BookingMetadatum(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldKey), v))\n\t})\n}", "title": "" }, { "docid": "e68ab177baca8ed2198cc1584fa3e9c8", "score": "0.6351393", "text": "func (l *LabelLiteral) Key() string {\n\treturn l.Value\n}", "title": "" }, { "docid": "cb03e9ef7bdbd37b02fd045d8f6b9890", "score": "0.6350215", "text": "func (i SQSSystemAttribute) Key() string {\n\tif val, ok := _SQSSystemAttributeValueToKeyMap[i]; ok {\n\t\t// found\n\t\treturn val\n\t} else {\n\t\t// not found\n\t\treturn \"\"\n\t}\n}", "title": "" }, { "docid": "edf1f243d7d1900fafc8db5b2017ffd7", "score": "0.6349095", "text": "func getKey(ing *networkingv1.Ingress, t *testing.T) string {\n\tkey, err := common.KeyFunc(ing)\n\tif err != nil {\n\t\tt.Fatalf(\"Unexpected error getting key for Ingress %v: %v\", ing.Name, err)\n\t}\n\treturn key\n}", "title": "" }, { "docid": "f58dd98a0d94de90c5a91be9f736de2b", "score": "0.6335427", "text": "func (e *Entry) GetKey() string {\n\treturn e.key\n}", "title": "" }, { "docid": "e6fdad19ec743f804ec736055fcdd852", "score": "0.63335997", "text": "func (s *Scratch) Key(k string) bool {\n\ts.RLock()\n\tdefer s.RUnlock()\n\t_, ok := s.values[k]\n\treturn ok\n}", "title": "" }, { "docid": "ca3cc498d347ce77a20e5972c8a377be", "score": "0.6318337", "text": "func (h GenericIEI) Key() byte {\n\treturn h.K\n}", "title": "" }, { "docid": "3b91c2d33c3bcedcf67500bb0f334a03", "score": "0.6315163", "text": "func (cmd Arg) Key() string {\n\treturn cmd.k\n}", "title": "" }, { "docid": "b3eb4d5e03a2c3c750083c0126f9faed", "score": "0.63119996", "text": "func (t *ScheduledTask) Key() string {\n\treturn fmt.Sprintf(\"s:%v:%v\", t.ID, t.score)\n}", "title": "" }, { "docid": "48c9812d99fa72ecc8f346e30aa76f54", "score": "0.6304168", "text": "func (sie *stringIndexElement) Key() interface{} {\n\treturn sie.key\n}", "title": "" }, { "docid": "8c07a4d5d14695c5cee5135d62bd4b7a", "score": "0.6296629", "text": "func (delai Delai) Key() string {\n\treturn delai.key\n}", "title": "" }, { "docid": "079d19c01b5be93017024847127b1d22", "score": "0.62910837", "text": "func (r Range) GetKey() string {\n\treturn r.Key\n}", "title": "" }, { "docid": "079d19c01b5be93017024847127b1d22", "score": "0.62910837", "text": "func (r Range) GetKey() string {\n\treturn r.Key\n}", "title": "" }, { "docid": "e63818b28222e13d8287fe197f8253c6", "score": "0.62886405", "text": "func keyFunc(name, namespace string) string {\n\tif len(namespace) == 0 {\n\t\treturn name\n\t}\n\treturn namespace + \"/\" + name\n}", "title": "" }, { "docid": "ee46bd1c3253817371e7c3c8941ab598", "score": "0.6285285", "text": "func (r RiskLimit) Key() string {\n\treturn fmt.Sprintf(\"%s-%.2f\", r.Code, r.Lever)\n}", "title": "" }, { "docid": "57c61070d56d7ec2253928d7cc9b57a5", "score": "0.62844545", "text": "func (id ClaimID) Key() string {\n\treturn string(id[:])\n}", "title": "" }, { "docid": "74fccfb6c0e095085f52bd1ebb06ac30", "score": "0.6282164", "text": "func (r RayID) GetKey() string { return \"rayId\" }", "title": "" }, { "docid": "22eac8b8e74bf641c58f4c747f9c66a1", "score": "0.62809145", "text": "func (i SQSGetQueueAttribute) Key() string {\n\tif val, ok := _SQSGetQueueAttributeValueToKeyMap[i]; ok {\n\t\t// found\n\t\treturn val\n\t} else {\n\t\t// not found\n\t\treturn \"\"\n\t}\n}", "title": "" }, { "docid": "a7d50727cf05eb96a8217b15e26d2dc1", "score": "0.6273545", "text": "func (q Qq) GetKey() string {\n\treturn q.Key\n}", "title": "" }, { "docid": "8aa413aff6e2e50cc0d683d3573e25f1", "score": "0.62668425", "text": "func (i *MapIterator) Key() interface{} {\n\treturn i.kv.Key\n}", "title": "" }, { "docid": "17747495594866c11831d07b543a98a2", "score": "0.62658", "text": "func getKey(key string) (string, error) {\n\trow := db.QueryRow(\"SELECT value FROM key_val WHERE key = ?\", key)\n\tret := \"\"\n\terr := row.Scan(&ret)\n\tif err != nil {\n\t\tret = kvDefaults[key]\n\t\terr = setKey(key, ret)\n\t}\n\treturn ret, err\n}", "title": "" }, { "docid": "68c423fc5c335de4a289917547e9b726", "score": "0.62654096", "text": "func (this *ShardingHandler) GetKey(xesRedis redo.XesRedisBase) (ret string) {\n\tdefer func() {\n\t\tif xesRedis.GetCtx() == nil {\n\t\t\treturn\n\t\t}\n\t\tbench := xesRedis.GetCtx().Value(\"IS_BENCHMARK\")\n\t\tif cast.ToString(bench) == \"1\" {\n\t\t\tret = \"benchmark_\" + ret\n\t\t}\n\t}()\n\tret = fmt.Sprintf(xesRedis.GetKeyName(), (xesRedis.GetKeyParams())...)\n\treturn\n}", "title": "" }, { "docid": "9b659bd7dc6b9ff47b57d91067dd753a", "score": "0.6263314", "text": "func (l *StringLiteral) Key() string {\n\treturn l.Value\n}", "title": "" }, { "docid": "3a15446cf6e42e1f2edbd79ba1dd4ecb", "score": "0.62618864", "text": "func (o ReservationAffinityOutput) Key() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ReservationAffinity) *string { return v.Key }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "3a15446cf6e42e1f2edbd79ba1dd4ecb", "score": "0.62618864", "text": "func (o ReservationAffinityOutput) Key() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ReservationAffinity) *string { return v.Key }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "3a15446cf6e42e1f2edbd79ba1dd4ecb", "score": "0.62618864", "text": "func (o ReservationAffinityOutput) Key() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ReservationAffinity) *string { return v.Key }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "c0a098e359fc68d409d22b2308053344", "score": "0.6260913", "text": "func key(name string, id int64) string {\n\treturn fmt.Sprintf(\"%s:%d\", name, id)\n}", "title": "" }, { "docid": "6e82b0e9223da739ded040b07c474c6c", "score": "0.6259758", "text": "func getKey(meta metav1.Object) string {\n\treturn types.NamespacedName{\n\t\tNamespace: meta.GetNamespace(),\n\t\tName: meta.GetName(),\n\t}.String()\n}", "title": "" }, { "docid": "116ecc6d70a890b91de0836718fb1b00", "score": "0.6238949", "text": "func (t Tuple) Key() Key {\n\treturn t.Pack()\n}", "title": "" }, { "docid": "877cd37f0a830477f6d77407e5535098", "score": "0.6238088", "text": "func (s ShardSorter) Key(ind int) string {\n\treturn strings.Split(s[ind], \"-\")[0]\n}", "title": "" } ]
93e6e1bcafdf615e9a0dfd654ccf9441
GetBackingStore gets the backingStore property value. Stores model information.
[ { "docid": "07aee9d3dccf528cd84240ed41f5f793", "score": "0.7414719", "text": "func (m *ServiceUpdateMessageViewpoint) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" } ]
[ { "docid": "c74591081115b85ba13ca0aa5f42c3db", "score": "0.80231166", "text": "func (s Store) GetBackingStore() crud.ManagedStore {\n\treturn s.backingStore\n}", "title": "" }, { "docid": "16cf9584d1df07657235af002ac7f189", "score": "0.7790771", "text": "func (m *Setting) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "9757925fac1e4350d92dbfe943bcd0f6", "score": "0.76316553", "text": "func (m *DiscoveredSensitiveType) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "3664c567071e1ec3f389ba71e1698f3d", "score": "0.7567228", "text": "func (m *Reminder) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "98c128bd53c0a47781fce81cdd1e4ec2", "score": "0.7546476", "text": "func (m *EmailSettings) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "0d9f42e5d04fa3c82866c3b03c415b8f", "score": "0.7495666", "text": "func (m *PrinterDefaults) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "673588382a4759a39ac5a08e35d4f351", "score": "0.74896413", "text": "func (m *AgedAccountsPayable) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "7e208c55810474752181f714c97dd6af", "score": "0.74795586", "text": "func (m *MailboxSettings) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "65b2bd2610cc77a7c43deb38f84859a6", "score": "0.74617785", "text": "func (m *GovernancePolicy) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "ce07de75640484e1f6cda6be863f4abe", "score": "0.74345595", "text": "func (m *DeviceManagementSettings) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "3441457c710a7ff10770ea5b8e8ea860", "score": "0.74129206", "text": "func (m *Headers) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "d38aa8024c5ab09c8cc698bdbd6442ba", "score": "0.7407502", "text": "func (m *SolutionsRoot) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "bcfbfca3c031c7307e95c5d96355eb60", "score": "0.73937064", "text": "func (m *DeviceManagementSettingDependency) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "61d801f4437b1ef13425256ea56afce2", "score": "0.73908806", "text": "func (m *CloudPcRestorePointSetting) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "a7ad3ddf6fc0163dcac93626293ea9ff", "score": "0.7390045", "text": "func (m *RetentionLabelSettings) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "48616820254bf4470b42a753fdb30d12", "score": "0.7374402", "text": "func (m *ItemTranslateExchangeIdsPostRequestBody) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "e9d048089cb0dd5c7d62b97091a154ea", "score": "0.7373027", "text": "func (m *PrinterLocation) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "51fae11376ca13cbd10155ab9465fa37", "score": "0.73678553", "text": "func (m *RelatedContact) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "30aad797cd4da3f82b930789e962284b", "score": "0.73630285", "text": "func (m *ImportedWindowsAutopilotDeviceIdentityState) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "babb1066f56b1cd2bdca64dc2f258e03", "score": "0.736116", "text": "func (m *BgpConfiguration) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "0d7f1dc1ee86e100a224484c01d6ed53", "score": "0.7341471", "text": "func (m *LabelActionBase) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "01525850fa8ab723f4ed64039682d9f1", "score": "0.7323396", "text": "func (m *PolicySetsItemUpdatePostRequestBody) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "8293203b0da2de129c66bd7214c6551a", "score": "0.7323145", "text": "func (m *AuthenticationContext) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "8f43fd7a20b44e084c7669138e9386e2", "score": "0.73228693", "text": "func (m *DeviceHealthAttestationState) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "3ae6ff3746ba511354034af178e09cad", "score": "0.731501", "text": "func (m *ConditionalAccessDeviceStates) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "99b3242aa2215cc388a416b86199a812", "score": "0.73137957", "text": "func (m *MicrosoftManagedDesktop) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "9833f83a610c38807967b29b3c3b02a1", "score": "0.73069084", "text": "func (m *ParentLabelDetails) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "0495ea24d869587531584a635682815a", "score": "0.7302342", "text": "func (m *WindowsKioskProfile) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "d52214128f91761c43e6cd0cba7857f6", "score": "0.7270454", "text": "func (m *SharepointIds) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "499d6910fc933dc4288517a354a94b5c", "score": "0.72670054", "text": "func (m *TeamworkSoftwareUpdateHealth) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "6d10d4530a622050ebc2d5de7814dc4d", "score": "0.7260829", "text": "func (m *DeviceHealth) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "4dc13a61f26e75fc3b73fd1868c89e3f", "score": "0.7256599", "text": "func (m *PaymentTerm) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "ddfab5791233184451c448450b62c7c1", "score": "0.7252025", "text": "func (m *InvitedUserMessageInfo) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "5fb34ad9518d085fd43779c855638c63", "score": "0.72497827", "text": "func (m *RetentionEventStatus) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "099a9d245bbf1e0d39d342f00f550126", "score": "0.7238901", "text": "func (m *SecurityActionState) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "db1633b1b353d9ad04201f9d53e3e08f", "score": "0.7221488", "text": "func (m *IntentsItemUpdateSettingsPostRequestBody) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "5533c45345771d39eefa36c7705f4e53", "score": "0.71846503", "text": "func (m *EmbeddedSIMActivationCode) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "05c4144c19382361860f121bfe2ac296", "score": "0.7182433", "text": "func (m *PortalNotification) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "9fc94750f6e4cbd8b118c468cedbe3e2", "score": "0.7176107", "text": "func (m *AppliedAuthenticationEventListener) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "e355abb1e7d8094b601d055abc9647b5", "score": "0.7129772", "text": "func (m *TeamworkActivePeripherals) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "d7f7e22815cd39ad71f77f253ba988b6", "score": "0.712316", "text": "func (m *UpdateAllowedCombinationsResult) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "cabac48716bd11045f108b16fd0f87ed", "score": "0.71218896", "text": "func (m *AssignmentFilterEvaluateRequest) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "cfb883303f1b98f853eebbef5f1fd460", "score": "0.711194", "text": "func (m *OnlineMeetingInfo) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "ac4e420d9ba5329b7f2096987149f534", "score": "0.71105987", "text": "func (m *SmsLogRow) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "a56fb2af4adaa701575e6d900409ed2f", "score": "0.70978236", "text": "func (m *RiskyServicePrincipalsDismissPostRequestBody) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "0ad142662427f7020a328ca94b6447cc", "score": "0.7090867", "text": "func (m *TemplateParameter) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "fe8d18125be6dd402f48b8d43d7776d9", "score": "0.7088598", "text": "func (m *MailTips) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "40007edd6ae7f8c9ceb43a182c256b15", "score": "0.7083091", "text": "func (m *DeviceOperatingSystemSummary) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "1856c5e39f9d35eac22560981d3c8d68", "score": "0.7047344", "text": "func (m *RequestSchedule) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "bde66e8922a304baebbe85a1c234b777", "score": "0.704384", "text": "func (m *WebPartData) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "062db891088e4ad94a156f3af27a9656", "score": "0.70192295", "text": "func (m *InformationalUrl) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "2b6bda49661ad3689fe4d4a3b7d04b65", "score": "0.7000226", "text": "func (m *PresenceStatusMessage) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "bcd8fed2ecd581b2e9966e570dfd0717", "score": "0.69854426", "text": "func (m *DeliveryOptimizationBandwidthBusinessHoursLimit) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "f74b2b43b3088e92370b5269fb05a4db", "score": "0.6984773", "text": "func (m *TimeConstraint) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "62ec655c341b3d9f856c90105fe86a74", "score": "0.6979283", "text": "func (m *AndroidEnrollmentCompanyCode) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "1657a43d700b0d4ddc61e0c9aef0c62e", "score": "0.6974157", "text": "func (m *ScheduleItem) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "10e5acfe73cb5a468381801687c580ab", "score": "0.6968359", "text": "func (m *MeetingTimeSuggestionsResult) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "81658bce539bd672cfc726a2b377fab9", "score": "0.6957306", "text": "func (m *ConnectorStatusDetails) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "70ebfe9f699c6bb2345405745099b357", "score": "0.6929914", "text": "func (m *MacOSMinimumOperatingSystem) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "4e274f5ac72573446db065cc5185e38a", "score": "0.6928703", "text": "func (m *DeviceManagementApplicabilityRuleOsEdition) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "a2b8e7dce320cca27e4003d2d03103ce", "score": "0.6928617", "text": "func (m *BookingWorkTimeSlot) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "2cc377c4fcdf2131baa9bbf10591e250", "score": "0.69009435", "text": "func (m *ChatMessageAttachment) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "b3e208979ceb3026d733a9261714c587", "score": "0.6898289", "text": "func (m *QueryCondition) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "4674480efdc1acbddb60dd97d257887e", "score": "0.68893576", "text": "func (m *ItemItemsItemWorkbookFunctionsComplexPostRequestBody) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "2d20d84ede9fd2ab557bd3594347b972", "score": "0.6865283", "text": "func (m *WindowsInformationProtectionDataRecoveryCertificate) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "e120aa81a5d8120fdc265588d90e8a58", "score": "0.6853741", "text": "func (m *CasesEdiscoveryCasesItemSearchesItemMicrosoftGraphSecurityPurgeDataPurgeDataPostRequestBody) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "fd40062808cf4713e16fb00ff1a2d433", "score": "0.68426794", "text": "func (m *ItemItemsItemWorkbookFunctionsRandBetweenPostRequestBody) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "f9b85d5b3dd36c420d9d85e75a1e0bd4", "score": "0.6830124", "text": "func (m *UserExperienceAnalyticsDeviceScopesItemTriggerDeviceScopeActionPostRequestBody) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "06aa54f0f575f80495b38a06a70e2992", "score": "0.6808832", "text": "func (m *ProfileCardAnnotation) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "c9d485e6917f671e5d06cd6dc95fc5b0", "score": "0.6786151", "text": "func (m *ItemItemsItemWorkbookFunctionsAverageIfPostRequestBody) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "0187c931ee2a736f1760366e4ef4779f", "score": "0.6764314", "text": "func (m *ResultTemplateOption) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "27f755c3e62f19028b852ea3d70bdc1a", "score": "0.6757885", "text": "func (m *CloudPcBulkActionSummary) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "d3955616d92cca40e0e925c0d90abf4d", "score": "0.67549336", "text": "func (m *WindowsMalwareCategoryCount) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "401103e736924bc3c224f3e66b56c5a4", "score": "0.6713842", "text": "func (m *RecurrenceRange) GetBackingStore()(ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore) {\n return m.backingStore\n}", "title": "" }, { "docid": "027a7d471c163a35233fe7812353f555", "score": "0.6553604", "text": "func (m *ItemTranslateExchangeIdsPostRequestBody) SetBackingStore(value ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore)() {\n m.backingStore = value\n}", "title": "" }, { "docid": "09582dc046e9fdf40074d03b92fd45b1", "score": "0.65315115", "text": "func (m *DiscoveredSensitiveType) SetBackingStore(value ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore)() {\n m.backingStore = value\n}", "title": "" }, { "docid": "8e0d6c876cf220a7b799ba92205833a6", "score": "0.65158", "text": "func (m *Reminder) SetBackingStore(value ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore)() {\n m.backingStore = value\n}", "title": "" }, { "docid": "d42e2a3dbfac870c06559629d56e14e9", "score": "0.6486435", "text": "func (m *RelatedContact) SetBackingStore(value ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore)() {\n m.backingStore = value\n}", "title": "" }, { "docid": "2d281cefdacb4c12c44bb8e8620ce01e", "score": "0.64760953", "text": "func (m *Setting) SetBackingStore(value ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore)() {\n m.backingStore = value\n}", "title": "" }, { "docid": "116eb390c33f1a9ea409ecc7551610f9", "score": "0.6463322", "text": "func (m *MicrosoftManagedDesktop) SetBackingStore(value ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore)() {\n m.backingStore = value\n}", "title": "" }, { "docid": "401387c494031b5c63b815486fcefef4", "score": "0.646298", "text": "func (m *EmailSettings) SetBackingStore(value ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore)() {\n m.backingStore = value\n}", "title": "" }, { "docid": "1f66dc9c1a795b6ac091d524e8aad7d1", "score": "0.6444289", "text": "func (m *AgedAccountsPayable) SetBackingStore(value ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore)() {\n m.backingStore = value\n}", "title": "" }, { "docid": "1edb8a2916563d3ad15f72da16f76e04", "score": "0.64424264", "text": "func (m *TeamworkSoftwareUpdateHealth) SetBackingStore(value ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore)() {\n m.backingStore = value\n}", "title": "" }, { "docid": "c36e29c03fcf31835199f106d5c348f5", "score": "0.6432536", "text": "func (m *WindowsKioskProfile) SetBackingStore(value ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore)() {\n m.backingStore = value\n}", "title": "" }, { "docid": "50d2fe27fd8707672bceb02a92712a10", "score": "0.642604", "text": "func (m *SolutionsRoot) SetBackingStore(value ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore)() {\n m.backingStore = value\n}", "title": "" }, { "docid": "1c35c6e988b03a777768664295f240fe", "score": "0.63864356", "text": "func (m *GovernancePolicy) SetBackingStore(value ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore)() {\n m.backingStore = value\n}", "title": "" }, { "docid": "30ccf263d696042c992a0630b34eedc6", "score": "0.63788563", "text": "func (m *PortalNotification) SetBackingStore(value ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore)() {\n m.backingStore = value\n}", "title": "" }, { "docid": "fd181ebccb6f3abe078e79695746427d", "score": "0.63719374", "text": "func (m *MailboxSettings) SetBackingStore(value ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore)() {\n m.backingStore = value\n}", "title": "" }, { "docid": "165e94a8caf4b96bd9b4f9ce01ce4bd5", "score": "0.63716", "text": "func (m *OnlineMeetingInfo) SetBackingStore(value ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore)() {\n m.backingStore = value\n}", "title": "" }, { "docid": "e59be1f16adaa1273156f29d3cc68d8d", "score": "0.63458633", "text": "func (m *ParentLabelDetails) SetBackingStore(value ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore)() {\n m.backingStore = value\n}", "title": "" }, { "docid": "2b58c4f6467b7135c26745f10f3dfb0f", "score": "0.6329256", "text": "func (m *PolicySetsItemUpdatePostRequestBody) SetBackingStore(value ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore)() {\n m.backingStore = value\n}", "title": "" }, { "docid": "aa522c3c95ee6d5fdc087944959a178e", "score": "0.63223606", "text": "func (m *DeviceHealthAttestationState) SetBackingStore(value ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore)() {\n m.backingStore = value\n}", "title": "" }, { "docid": "0f6749fe7af14bc8ce4eb79c6290a798", "score": "0.6322037", "text": "func (m *AuthenticationContext) SetBackingStore(value ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore)() {\n m.backingStore = value\n}", "title": "" }, { "docid": "a71b4b0f2c262479956d3e77d2a08051", "score": "0.631668", "text": "func (m *AppliedAuthenticationEventListener) SetBackingStore(value ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore)() {\n m.backingStore = value\n}", "title": "" }, { "docid": "53c3bf81cd0a2cb90253d7a52fa8bd7b", "score": "0.6315949", "text": "func (m *CloudPcRestorePointSetting) SetBackingStore(value ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore)() {\n m.backingStore = value\n}", "title": "" }, { "docid": "f417dfefab7cc52e8355de9e806faf27", "score": "0.63122904", "text": "func (m *SharepointIds) SetBackingStore(value ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore)() {\n m.backingStore = value\n}", "title": "" }, { "docid": "eea31a215da7fd086d0d710c492c76f5", "score": "0.6307853", "text": "func (m *PresenceStatusMessage) SetBackingStore(value ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore)() {\n m.backingStore = value\n}", "title": "" }, { "docid": "f13b5b5be30b58cb5eebd4a889ecf074", "score": "0.62991935", "text": "func (m *WebPartData) SetBackingStore(value ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore)() {\n m.backingStore = value\n}", "title": "" }, { "docid": "7a24d1d6a840cead7d3b2a07e9ba81cf", "score": "0.6297132", "text": "func (m *ServiceUpdateMessageViewpoint) SetBackingStore(value ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore)() {\n m.backingStore = value\n}", "title": "" }, { "docid": "a5bf8c182071f7b1be36453658d9add1", "score": "0.62903243", "text": "func (m *DeliveryOptimizationBandwidthBusinessHoursLimit) SetBackingStore(value ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStore)() {\n m.backingStore = value\n}", "title": "" } ]
8818ac5d0dcab2467abff32d10de7ff0
When you call this operation with an Alibaba Cloud account, IoT Platform sends a verification code by text message to confirm your identity. When you call this operation with a RAM user, IoT Platform does not send a verification code. To ensure device security, you can create custom permission policies to perform finegrained permission management. For more information, see [Mapping of IoT Platform operations and RAM policies](~~47485~~) and [Custom permissions](~~47495~~). Warning After a device is deleted, the device ID (IotId) becomes invalid, and all other information associated with the device is deleted. In addition, you can no longer perform an operation on the device. Before you delete a device in the IoT Platform console, make sure that the corresponding actual device is offline. Otherwise, after the device is deleted from IoT Platform, the actual device continues to initiate connection requests to IoT Platform. If the number of requests exceeds the upper limit, IoT Platform starts request throttling. In this case, access of other devices within your Alibaba Cloud account is affected. After you delete a device, the certificate of the device becomes invalid and cannot be restored. Proceed with caution. You must specify a value for the IotId parameter or values for the ProductKey and DeviceName parameters to identify a device. If you specify a gateway and the number of subdevices that belong to the gateway exceeds 2,000, you can call this operation to create a device job to delete the topological relationships in an asynchronous manner. The operation returns the JobId parameter. QPS limits You can call this API operation up to 50 times per second per account. > The RAM users of an Alibaba Cloud account share the quota of the account.
[ { "docid": "683f73b7d5073f54b9816c38e22900df", "score": "0.44414026", "text": "func (client *Client) DeleteDeviceWithOptions(request *DeleteDeviceRequest, runtime *util.RuntimeOptions) (_result *DeleteDeviceResponse, _err error) {\n\t_err = util.ValidateModel(request)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\tquery := map[string]interface{}{}\n\tif !tea.BoolValue(util.IsUnset(request.DeviceName)) {\n\t\tquery[\"DeviceName\"] = request.DeviceName\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.IotId)) {\n\t\tquery[\"IotId\"] = request.IotId\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.IotInstanceId)) {\n\t\tquery[\"IotInstanceId\"] = request.IotInstanceId\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.ProductKey)) {\n\t\tquery[\"ProductKey\"] = request.ProductKey\n\t}\n\n\treq := &openapi.OpenApiRequest{\n\t\tQuery: openapiutil.Query(query),\n\t}\n\tparams := &openapi.Params{\n\t\tAction: tea.String(\"DeleteDevice\"),\n\t\tVersion: tea.String(\"2018-01-20\"),\n\t\tProtocol: tea.String(\"HTTPS\"),\n\t\tPathname: tea.String(\"/\"),\n\t\tMethod: tea.String(\"POST\"),\n\t\tAuthType: tea.String(\"AK\"),\n\t\tStyle: tea.String(\"RPC\"),\n\t\tReqBodyType: tea.String(\"formData\"),\n\t\tBodyType: tea.String(\"json\"),\n\t}\n\t_result = &DeleteDeviceResponse{}\n\t_body, _err := client.CallApi(params, req, runtime)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\t_err = tea.Convert(_body, &_result)\n\treturn _result, _err\n}", "title": "" } ]
[ { "docid": "fcc43c0ff6e435cb9a229122add36d8f", "score": "0.5784461", "text": "func main() {\n\tctx := context.Background()\n\n\t// ------------------------- Get params and just verify they were provided -------------------------\n\tendpoint := pflag.StringP(\"endpoint\", \"e\", \"\", \"API endpoint (for example, devices.stg01b.edgelq.com:443)\")\n\tprojectId := pflag.StringP(\"project\", \"p\", \"\", \"Project ID for this demo\")\n\tregionId := pflag.StringP(\"region\", \"r\", \"\", \"Region ID for this demo\")\n\taccessToken := pflag.StringP(\"access-token\", \"a\", \"\", \"Active token for your user\")\n\tcredsFile := pflag.StringP(\"credentials\", \"c\", \"\", \"Path to service account credentials file\")\n\tpflag.Parse()\n\tif *projectId == \"\" {\n\t\tpflag.Usage()\n\t\tpanic(fmt.Errorf(\"no project ID was provided\"))\n\t}\n\tif *regionId == \"\" {\n\t\tpflag.Usage()\n\t\tpanic(fmt.Errorf(\"no region ID was provided\"))\n\t}\n\tif *endpoint == \"\" {\n\t\tpflag.Usage()\n\t\tpanic(fmt.Errorf(\"no endpoint was provided\"))\n\t}\n\tif *accessToken == \"\" && *credsFile == \"\" {\n\t\tpflag.Usage()\n\t\tpanic(fmt.Errorf(\"access token OR credentials file are necessary in order to execute this example\"))\n\t}\n\n\t// ------------------------- Create GRPC connection -------------------------\n\tgrpcConn := utils.Dial(ctx, *endpoint, *accessToken, *credsFile)\n\tdevicesClient := cdevice.NewDeviceServiceClient(grpcConn)\n\n\t// ------------------------- Lets begin! -------------------------\n\t// server will generate device ID, we need to provide parent only\n\tcreatedDevice, err := devicesClient.CreateDevice(ctx, &cdevice.CreateDeviceRequest{\n\t\tParent: rdevice.NewNameBuilder().SetProjectId(*projectId).SetRegionId(*regionId).ParentReference(),\n\t\tDevice: &rdevice.Device{\n\t\t\tMetadata: &ntt_meta.Meta{\n\t\t\t\tLabels: map[string]string{\"device_type\": \"test\"},\n\t\t\t},\n\t\t\tDisplayName: \"Example Device\",\n\t\t},\n\t})\n\tif err != nil {\n\t\t_, _ = os.Stderr.WriteString(fmt.Sprintf(\"failed to create device: %s\\n\", err))\n\t\tos.Exit(1)\n\t}\n\t_, _ = os.Stderr.WriteString(fmt.Sprintf(\"device with name %s has been created\\n\", createdDevice.GetName()))\n\n\t// get all devices like that\n\tlistDevicesResp, err := devicesClient.ListDevices(ctx, &cdevice.ListDevicesRequest{\n\t\tParent: rdevice.NewNameBuilder().SetProjectId(*projectId).SetRegionId(*regionId).Parent(),\n\t\tFilter: rdevice.NewFilterBuilder().Where().Metadata().Labels().WithKey(\"device_type\").Eq(\"test\").Filter(),\n\t\tView: view.View_FULL,\n\t})\n\tif err != nil {\n\t\t_, _ = os.Stderr.WriteString(fmt.Sprintf(\"failed to list devices: %s\\n\", err))\n\t\tos.Exit(1)\n\t}\n\n\t// in theory, if by any chance there are thousands of devices matching parent/filter in request,\n\t// we may not find our device at all! Server applies paging automatically even if we did not specify\n\t// page size in the request.\n\tfor _, obtainedDevice := range listDevicesResp.GetDevices() {\n\t\tif obtainedDevice.GetName().GotenEqual(createdDevice.GetName()) {\n\t\t\t_, _ = os.Stderr.WriteString(fmt.Sprintf(\"we found our device!\\n\"))\n\t\t} else {\n\t\t\t_, _ = os.Stderr.WriteString(fmt.Sprintf(\"found device %s with same test label\\n\", obtainedDevice.GetName()))\n\t\t}\n\t}\n\n\t// update our device. Since we are updating only field path metadata.labels.other_label, we should\n\t// not have cleared previous label\n\tupdatedDevice, err := devicesClient.UpdateDevice(ctx, &cdevice.UpdateDeviceRequest{\n\t\tDevice: &rdevice.Device{\n\t\t\tName: createdDevice.GetName(),\n\t\t\tMetadata: &ntt_meta.Meta{\n\t\t\t\tLabels: map[string]string{\"other_label\": \"other\"},\n\t\t\t},\n\t\t},\n\t\tUpdateMask: &rdevice.Device_FieldMask{Paths: []rdevice.Device_FieldPath{\n\t\t\trdevice.NewDeviceFieldPathBuilder().Metadata().Labels().WithKey(\"other_label\").FieldPath(),\n\t\t}},\n\t})\n\tif err != nil {\n\t\t_, _ = os.Stderr.WriteString(fmt.Sprintf(\"failed to update device: %s\\n\", err))\n\t\tos.Exit(1)\n\t}\n\tif updatedDevice.GetMetadata().GetLabels()[\"device_type\"] != \"test\" {\n\t\t_, _ = os.Stderr.WriteString(fmt.Sprintf(\"label device_type is incorrect, updated device looks like: %s\\n\", updatedDevice))\n\t\tos.Exit(1)\n\t}\n\tif updatedDevice.GetMetadata().GetLabels()[\"other_label\"] != \"other\" {\n\t\t_, _ = os.Stderr.WriteString(fmt.Sprintf(\"label other_label is incorrect, updated device looks like: %s\\n\", updatedDevice))\n\t\tos.Exit(1)\n\t}\n\n\t// lets read device, but only selected label... view NAME puts \"name\" and \"displayName\" in field\n\t// mask, but thats all we should receive.\n\tobtainedDevice, err := devicesClient.GetDevice(ctx, &cdevice.GetDeviceRequest{\n\t\tName: updatedDevice.GetName().AsReference(),\n\t\tView: view.View_NAME,\n\t\tFieldMask: &rdevice.Device_FieldMask{Paths: []rdevice.Device_FieldPath{\n\t\t\trdevice.NewDeviceFieldPathBuilder().Metadata().Labels().WithKey(\"other_label\").FieldPath(),\n\t\t}},\n\t})\n\tif err != nil {\n\t\t_, _ = os.Stderr.WriteString(fmt.Sprintf(\"failed to read device: %s\\n\", err))\n\t\tos.Exit(1)\n\t}\n\tif obtainedDevice.GetMetadata().GetLabels()[\"device_type\"] != \"\" {\n\t\t_, _ = os.Stderr.WriteString(fmt.Sprintf(\"label device_type is not empty, obtained device looks like: %s\\n\", obtainedDevice))\n\t\tos.Exit(1)\n\t}\n\tif obtainedDevice.GetMetadata().GetLabels()[\"other_label\"] != \"other\" {\n\t\t_, _ = os.Stderr.WriteString(fmt.Sprintf(\"label other_label is incorrect, obtained device looks like: %s\\n\", obtainedDevice))\n\t\tos.Exit(1)\n\t}\n\n\t// just delete\n\t_, err = devicesClient.DeleteDevice(ctx, &cdevice.DeleteDeviceRequest{Name: createdDevice.GetName().AsReference()})\n\tif err != nil {\n\t\t_, _ = os.Stderr.WriteString(fmt.Sprintf(\"failed to delete device: %s\\n\", err))\n\t\tos.Exit(1)\n\t}\n}", "title": "" }, { "docid": "07cce35286627adcf160ffea27cda31d", "score": "0.5216173", "text": "func (a *DeviceApiService) DeviceDeviceDeleteExecute(r ApiDeviceDeviceDeleteRequest) (DeviceDeviceDeleteSuccess, *_nethttp.Response, GenericOpenAPIError) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodDelete\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\texecutionError GenericOpenAPIError\n\t\tlocalVarReturnValue DeviceDeviceDeleteSuccess\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"DeviceApiService.DeviceDeviceDelete\")\n\tif err != nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, nil, executionError\n\t}\n\n\tlocalVarPath := localBasePath + \"/device/device/delete\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tif r.deviceId != nil {\n\t\tlocalVarQueryParams.Add(\"device_id\", parameterToString(*r.deviceId, \"\"))\n\t}\n\tif r.deviceName != nil {\n\t\tlocalVarQueryParams.Add(\"device_name\", parameterToString(*r.deviceName, \"\"))\n\t}\n\tif r.warnings != nil {\n\t\tlocalVarQueryParams.Add(\"warnings\", parameterToString(*r.warnings, \"\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif apiKey, ok := auth[\"HttpHeaderLoginKey\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif apiKey.Prefix != \"\" {\n\t\t\t\t\tkey = apiKey.Prefix + \" \" + apiKey.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = apiKey.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"X-IPM-Username\"] = key\n\t\t\t}\n\t\t}\n\t}\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif apiKey, ok := auth[\"HttpHeaderPasswordKey\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif apiKey.Prefix != \"\" {\n\t\t\t\t\tkey = apiKey.Prefix + \" \" + apiKey.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = apiKey.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"X-IPM-Password\"] = key\n\t\t\t}\n\t\t}\n\t}\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, nil, executionError\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, localVarHTTPResponse, executionError\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = _ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, localVarHTTPResponse, executionError\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v DeviceDeviceDeleteFailed\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, executionError\n}", "title": "" }, { "docid": "deb478b78a46544ce1f6e2eecbfd10cb", "score": "0.50893235", "text": "func (a *DeviceApiService) DeviceDeviceInfoExecute(r ApiDeviceDeviceInfoRequest) (DeviceDeviceData, *_nethttp.Response, GenericOpenAPIError) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\texecutionError GenericOpenAPIError\n\t\tlocalVarReturnValue DeviceDeviceData\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"DeviceApiService.DeviceDeviceInfo\")\n\tif err != nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, nil, executionError\n\t}\n\n\tlocalVarPath := localBasePath + \"/device/device/info\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tif r.deviceId != nil {\n\t\tlocalVarQueryParams.Add(\"device_id\", parameterToString(*r.deviceId, \"\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif apiKey, ok := auth[\"HttpHeaderLoginKey\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif apiKey.Prefix != \"\" {\n\t\t\t\t\tkey = apiKey.Prefix + \" \" + apiKey.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = apiKey.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"X-IPM-Username\"] = key\n\t\t\t}\n\t\t}\n\t}\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif apiKey, ok := auth[\"HttpHeaderPasswordKey\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif apiKey.Prefix != \"\" {\n\t\t\t\t\tkey = apiKey.Prefix + \" \" + apiKey.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = apiKey.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"X-IPM-Password\"] = key\n\t\t\t}\n\t\t}\n\t}\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, nil, executionError\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, localVarHTTPResponse, executionError\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = _ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, localVarHTTPResponse, executionError\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v ApiResponse\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, executionError\n}", "title": "" }, { "docid": "4c0393aeffac261ff7f6e719590d231f", "score": "0.50659114", "text": "func (a *DeviceApiService) DeleteDeviceExecute(r ApiDeleteDeviceRequest) (*_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodDelete\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.Ctx, \"DeviceApiService.DeleteDevice\")\n\tif localBasePath == \"/\" {\n\t localBasePath = \"\"\n\t}\n\tif err != nil {\n\t\treturn nil, GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/v2/devices/{device_id}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"device_id\"+\"}\", _neturl.PathEscape(parameterToString(r.P_deviceId, \"\")) , -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\treq, err := a.client.prepareRequest(r.Ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\treturn localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "ebe90baffc049d525ad6f88464fd76a6", "score": "0.50408405", "text": "func (a *API) CreateDevice(hostname string, conf *conf.Conf, console Console) (*packngo.Device, error) {\n\tconsoleStarted := false\n\tdefer func() {\n\t\tif console != nil && !consoleStarted {\n\t\t\tconsole.Close()\n\t\t}\n\t}()\n\n\tuserdata, err := a.wrapUserData(conf)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// The Ignition config can't go in userdata via coreos.config.url=https://metadata.packet.net/userdata because Ignition supplies an Accept header that metadata.packet.net finds 406 Not Acceptable.\n\t// It can't go in userdata via coreos.oem.id=packet because the Packet OEM expects unit files in /usr/share/oem which the PXE image doesn't have.\n\tuserdataName, userdataURL, err := a.uploadObject(hostname, \"application/vnd.coreos.ignition+json\", []byte(userdata))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer a.bucket.Delete(context.TODO(), userdataName)\n\n\t// This can't go in userdata because the installed coreos-cloudinit will try to execute it.\n\tipxeScriptName, ipxeScriptURL, err := a.uploadObject(hostname, \"application/octet-stream\", []byte(a.ipxeScript(userdataURL)))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer a.bucket.Delete(context.TODO(), ipxeScriptName)\n\n\tdevice, err := a.createDevice(hostname, ipxeScriptURL)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"couldn't create device: %v\", err)\n\t}\n\tdeviceID := device.ID\n\n\tif console != nil {\n\t\terr := a.startConsole(deviceID, console)\n\t\tconsoleStarted = true\n\t\tif err != nil {\n\t\t\ta.DeleteDevice(deviceID)\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tdevice, err = a.waitForActive(deviceID)\n\tif err != nil {\n\t\ta.DeleteDevice(deviceID)\n\t\treturn nil, err\n\t}\n\n\tipAddress := a.GetDeviceAddress(device, 4, true)\n\tif ipAddress == \"\" {\n\t\ta.DeleteDevice(deviceID)\n\t\treturn nil, fmt.Errorf(\"no public IP address found for %v\", deviceID)\n\t}\n\n\terr = waitForInstall(ipAddress)\n\tif err != nil {\n\t\ta.DeleteDevice(deviceID)\n\t\treturn nil, fmt.Errorf(\"timed out waiting for coreos-install: %v\", err)\n\t}\n\n\treturn device, nil\n}", "title": "" }, { "docid": "cda80e7f33b81605942dc9472691163d", "score": "0.5017474", "text": "func (m *WindowsAutopilotDeviceIdentityItemRequestBuilder) Delete(ctx context.Context, requestConfiguration *WindowsAutopilotDeviceIdentityItemRequestBuilderDeleteRequestConfiguration)(error) {\n requestInfo, err := m.CreateDeleteRequestInformation(ctx, requestConfiguration);\n if err != nil {\n return err\n }\n errorMapping := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.ErrorMappings {\n \"4XX\": ia572726a95efa92ddd544552cd950653dc691023836923576b2f4bf716cf204a.CreateODataErrorFromDiscriminatorValue,\n \"5XX\": ia572726a95efa92ddd544552cd950653dc691023836923576b2f4bf716cf204a.CreateODataErrorFromDiscriminatorValue,\n }\n err = m.requestAdapter.SendNoContentAsync(ctx, requestInfo, errorMapping)\n if err != nil {\n return err\n }\n return nil\n}", "title": "" }, { "docid": "0a8f8c5d287c9c32b65170153706ee60", "score": "0.4967305", "text": "func authenticate(clientID uuid.UUID) (token *adal.Token, err error) {\n\tauthClient := autorest.NewClientWithUserAgent(\"github.com/Azure-Samples/arm-compute-go-vm-extensions\")\n\tvar deviceCode *adal.DeviceCode\n\tvar config *adal.OAuthConfig\n\n\tconfig, err = adal.NewOAuthConfig(environment.ActiveDirectoryEndpoint, \"common\")\n\tif err != nil {\n\t\treturn\n\t}\n\n\tdeviceCode, err = adal.InitiateDeviceAuth(&authClient, *config, clientID.String(), environment.ServiceManagementEndpoint)\n\tif err != nil {\n\t\treturn\n\t}\n\n\t_, err = fmt.Println(*deviceCode.Message)\n\tif err != nil {\n\t\treturn\n\t}\n\n\ttoken, err = adal.WaitForUserCompletion(&authClient, deviceCode)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tvar tenantCache []string\n\ttenants, tenantErrs := getTenants(autorest.NewBearerAuthorizer(token))\n\tfor tenant := range tenants {\n\t\ttenantCache = append(tenantCache, *tenant.TenantID)\n\t}\n\terr = <-tenantErrs\n\tif err != nil {\n\t\treturn\n\t}\n\n\tif len(tenantCache) == 1 {\n\t\tuserTenantID, err = uuid.FromString(tenantCache[0])\n\t} else {\n\t\terr = errors.New(\"zero or multiple tenants associated with this account\")\n\t\treturn\n\t}\n\n\tconfig, err = adal.NewOAuthConfig(environment.ActiveDirectoryEndpoint, userTenantID.String())\n\n\tvar spt *adal.ServicePrincipalToken\n\tspt, err = adal.NewServicePrincipalTokenFromManualToken(*config, clientID.String(), environment.ResourceManagerEndpoint, *token)\n\tif err != nil {\n\t\ttoken = nil\n\t\treturn\n\t}\n\n\ttoken = &spt.Token\n\treturn\n}", "title": "" }, { "docid": "8d64903c5055d93c96f84b6ba21306ed", "score": "0.49551526", "text": "func (m *WindowsAutopilotDeviceIdentitiesWindowsAutopilotDeviceIdentityItemRequestBuilder) Delete(ctx context.Context, requestConfiguration *WindowsAutopilotDeviceIdentitiesWindowsAutopilotDeviceIdentityItemRequestBuilderDeleteRequestConfiguration)(error) {\n requestInfo, err := m.ToDeleteRequestInformation(ctx, requestConfiguration);\n if err != nil {\n return err\n }\n errorMapping := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.ErrorMappings {\n \"4XX\": ia572726a95efa92ddd544552cd950653dc691023836923576b2f4bf716cf204a.CreateODataErrorFromDiscriminatorValue,\n \"5XX\": ia572726a95efa92ddd544552cd950653dc691023836923576b2f4bf716cf204a.CreateODataErrorFromDiscriminatorValue,\n }\n err = m.BaseRequestBuilder.RequestAdapter.SendNoContent(ctx, requestInfo, errorMapping)\n if err != nil {\n return err\n }\n return nil\n}", "title": "" }, { "docid": "ee6e293a1f21d5296a433b12b78b85be", "score": "0.4954261", "text": "func doDeviceAttestation(clictx *cli.Context, ac *ca.ACMEClient, ch *acme.Challenge, identifier string, af *acmeFlow) error {\n\t// TODO(hs): make TPM flow work with CreateAttestor()/Attest() too\n\tattestationURI := clictx.String(\"attestation-uri\")\n\tif strings.HasPrefix(attestationURI, \"tpmkms:\") {\n\t\treturn doTPMAttestation(clictx, ac, ch, identifier, af)\n\t}\n\n\tattestor, err := cryptoutil.CreateAttestor(\"\", attestationURI)\n\tif err != nil {\n\t\treturn err\n\t}\n\tpemData, err := attestor.Attest()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdata, err := acme.KeyAuthorization(ch.Token, ac.Key)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"error generating ACME key authorization\")\n\t}\n\n\tvar alg int64\n\tvar digest []byte\n\tvar opts crypto.SignerOpts\n\tswitch k := attestor.Public().(type) {\n\tcase *ecdsa.PublicKey:\n\t\tif k.Curve != elliptic.P256() {\n\t\t\treturn fmt.Errorf(\"unsupported elliptic curve %s\", k.Curve)\n\t\t}\n\t\talg = -7 // ES256\n\t\topts = crypto.SHA256\n\t\tsum := sha256.Sum256([]byte(data))\n\t\tdigest = sum[:]\n\tcase *rsa.PublicKey:\n\t\t// TODO(mariano): support for PS256 (-37)\n\t\talg = -257 // RS256\n\t\topts = crypto.SHA256\n\t\tsum := sha256.Sum256([]byte(data))\n\t\tdigest = sum[:]\n\tcase ed25519.PublicKey:\n\t\talg = -8 // EdDSA\n\t\topts = crypto.Hash(0)\n\t\tdigest = []byte(data)\n\tdefault:\n\t\treturn fmt.Errorf(\"unsupported public key type %T\", k)\n\t}\n\n\t// Sign proves possession of private key. Per recommendation at\n\t// https://w3c.github.io/webauthn/#sctn-signature-attestation-types, we use\n\t// CBOR to encode the signature.\n\tsig, err := attestor.Sign(rand.Reader, digest, opts)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"error signing key authorization\")\n\t}\n\tsig, err = cbor.Marshal(sig)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"error marshaling signature\")\n\t}\n\n\tcerts, err := pemutil.ParseCertificateBundle(pemData)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tx5c := make([][]byte, len(certs))\n\tfor i, c := range certs {\n\t\tx5c[i] = c.Raw\n\t}\n\n\t// step format is based on the \"packed\" format described in\n\t// https://w3c.github.io/webauthn/#sctn-attestation but with the authData\n\t// omitted as described in the device-attest-01 RFC.\n\tobj := &attestationObject{\n\t\tFormat: \"step\",\n\t\tAttStatement: map[string]interface{}{\n\t\t\t\"alg\": alg,\n\t\t\t\"sig\": sig,\n\t\t\t\"x5c\": x5c,\n\t\t},\n\t}\n\n\tb, err := cbor.Marshal(obj)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tpayload, err := json.Marshal(attestationPayload{\n\t\tAttObj: base64.RawURLEncoding.EncodeToString(b),\n\t})\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error marshaling payload: %w\", err)\n\t}\n\n\tui.Printf(\"Using Device Attestation challenge to validate %q\", identifier)\n\tui.Printf(\" .\") // Indicates passage of time.\n\n\tif err := ac.ValidateWithPayload(ch.URL, payload); err != nil {\n\t\tui.Printf(\" Error!\\n\\n\")\n\t\treturn errors.Wrapf(err, \"error validating ACME Challenge at %s\", ch.URL)\n\t}\n\n\tdurationBetweenAttempts := 2 * time.Second\n\tif err := getChallengeStatus(ac, ch, durationBetweenAttempts); err != nil {\n\t\tui.Printf(\" Error!\\n\\n\")\n\t\treturn err\n\t}\n\n\tui.Printf(\" done!\\n\")\n\treturn nil\n}", "title": "" }, { "docid": "fd9f23893d308ab2fbc19b047289de6c", "score": "0.49296796", "text": "func (m *ItemAuthenticationOperationsLongRunningOperationItemRequestBuilder) Delete(ctx context.Context, requestConfiguration *ItemAuthenticationOperationsLongRunningOperationItemRequestBuilderDeleteRequestConfiguration)(error) {\n requestInfo, err := m.ToDeleteRequestInformation(ctx, requestConfiguration);\n if err != nil {\n return err\n }\n errorMapping := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.ErrorMappings {\n \"4XX\": ia572726a95efa92ddd544552cd950653dc691023836923576b2f4bf716cf204a.CreateODataErrorFromDiscriminatorValue,\n \"5XX\": ia572726a95efa92ddd544552cd950653dc691023836923576b2f4bf716cf204a.CreateODataErrorFromDiscriminatorValue,\n }\n err = m.BaseRequestBuilder.RequestAdapter.SendNoContent(ctx, requestInfo, errorMapping)\n if err != nil {\n return err\n }\n return nil\n}", "title": "" }, { "docid": "f5f385703ce1f31112b47cf02c1b6c9f", "score": "0.4911764", "text": "func (a *DeviceApiService) CreateDeviceExecute(r ApiCreateDeviceRequest) (SingleDevice, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue SingleDevice\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.Ctx, \"DeviceApiService.CreateDevice\")\n\tif localBasePath == \"/\" {\n\t localBasePath = \"\"\n\t}\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/v2/devices\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\tif r.P_deviceInfo == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"deviceInfo is required and must be specified\")\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = r.P_deviceInfo\n\treq, err := a.client.prepareRequest(r.Ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "2ef813059b960aef124ebcc464f8a597", "score": "0.4860728", "text": "func (client *Client) QueryDeviceWithOptions(request *QueryDeviceRequest, runtime *util.RuntimeOptions) (_result *QueryDeviceResponse, _err error) {\n\t_err = util.ValidateModel(request)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\tquery := map[string]interface{}{}\n\tif !tea.BoolValue(util.IsUnset(request.CurrentPage)) {\n\t\tquery[\"CurrentPage\"] = request.CurrentPage\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.IotInstanceId)) {\n\t\tquery[\"IotInstanceId\"] = request.IotInstanceId\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.NextToken)) {\n\t\tquery[\"NextToken\"] = request.NextToken\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.PageSize)) {\n\t\tquery[\"PageSize\"] = request.PageSize\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.ProductKey)) {\n\t\tquery[\"ProductKey\"] = request.ProductKey\n\t}\n\n\treq := &openapi.OpenApiRequest{\n\t\tQuery: openapiutil.Query(query),\n\t}\n\tparams := &openapi.Params{\n\t\tAction: tea.String(\"QueryDevice\"),\n\t\tVersion: tea.String(\"2018-01-20\"),\n\t\tProtocol: tea.String(\"HTTPS\"),\n\t\tPathname: tea.String(\"/\"),\n\t\tMethod: tea.String(\"POST\"),\n\t\tAuthType: tea.String(\"AK\"),\n\t\tStyle: tea.String(\"RPC\"),\n\t\tReqBodyType: tea.String(\"formData\"),\n\t\tBodyType: tea.String(\"json\"),\n\t}\n\t_result = &QueryDeviceResponse{}\n\t_body, _err := client.CallApi(params, req, runtime)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\t_err = tea.Convert(_body, &_result)\n\treturn _result, _err\n}", "title": "" }, { "docid": "564a38da11458040032da1de428c122f", "score": "0.4771813", "text": "func (m *ComanagedDevicesManagedDeviceItemRequestBuilder) Delete(ctx context.Context, requestConfiguration *ComanagedDevicesManagedDeviceItemRequestBuilderDeleteRequestConfiguration)(error) {\n requestInfo, err := m.ToDeleteRequestInformation(ctx, requestConfiguration);\n if err != nil {\n return err\n }\n errorMapping := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.ErrorMappings {\n \"4XX\": i20a3050780ee0b0cde0a884a4f35429a20d60067e3bcda382ec5400079147459.CreateODataErrorFromDiscriminatorValue,\n \"5XX\": i20a3050780ee0b0cde0a884a4f35429a20d60067e3bcda382ec5400079147459.CreateODataErrorFromDiscriminatorValue,\n }\n err = m.BaseRequestBuilder.RequestAdapter.SendNoContent(ctx, requestInfo, errorMapping)\n if err != nil {\n return err\n }\n return nil\n}", "title": "" }, { "docid": "7f4b47c3717c5db3d907de33e5079328", "score": "0.47496158", "text": "func (me *REMOTERESTORE_IMPL) CreateRemoteVaultRestoreTask (\r\n body *models.CreateRemoteVaultRestoreTaskRequest) (*models.UniqueGlobalId, error) {\r\n//validating required parameters\r\n if (body == nil){\r\n return nil,errors.New(\"The parameter 'body' is a required parameter and cannot be nil.\")\r\n} //the endpoint path uri\r\n _pathUrl := \"/public/remoteVaults/restoreTasks\"\r\n\r\n //variable to hold errors\r\n var err error = nil\r\n //the base uri for api requests\r\n _queryBuilder := configuration.GetBaseURI(configuration.DEFAULT_HOST,me.config);\r\n\r\n //prepare query string for API call\r\n _queryBuilder = _queryBuilder + _pathUrl\r\n\r\n //validate and preprocess url\r\n _queryBuilder, err = apihelper.CleanUrl(_queryBuilder)\r\n if err != nil {\r\n //error in url validation or cleaning\r\n return nil, err\r\n }\r\n if me.config.AccessToken() == nil {\r\n return nil, errors.New(\"Access Token not set. Please authorize the client using client.Authorize()\");\r\n }\r\n //prepare headers for the outgoing request\r\n headers := map[string]interface{} {\r\n \"user-agent\" : \"cohesity-Go-sdk-6.2.0\",\r\n \"accept\" : \"application/json\",\r\n \"content-type\" : \"application/json; charset=utf-8\",\r\n \"Authorization\" : fmt.Sprintf(\"%s %s\",*me.config.AccessToken().TokenType, *me.config.AccessToken().AccessToken),\r\n }\r\n\r\n //prepare API request\r\n _request := unirest.Post(_queryBuilder, headers, body)\r\n //and invoke the API call request to fetch the response\r\n _response, err := unirest.AsString(_request,me.config.SkipSSL());\r\n if err != nil {\r\n //error in API invocation\r\n return nil, err\r\n }\r\n\r\n //error handling using HTTP status codes\r\n if (_response.Code == 0) {\r\n err = apihelper.NewAPIError(\"Error\", _response.Code, _response.RawBody)\r\n } else if (_response.Code < 200) || (_response.Code > 206) { //[200,206] = HTTP OK\r\n err = apihelper.NewAPIError(\"HTTP Response Not OK\", _response.Code, _response.RawBody)\r\n }\r\n if(err != nil) {\r\n //error detected in status code validation\r\n return nil, err\r\n }\r\n\r\n //returning the response\r\n var retVal *models.UniqueGlobalId = &models.UniqueGlobalId{}\r\n err = json.Unmarshal(_response.RawBody, &retVal)\r\n\r\n if err != nil {\r\n //error in parsing\r\n return nil, err\r\n }\r\n return retVal, nil\r\n\r\n}", "title": "" }, { "docid": "f73ef402d1cde9c579656c4dae014c58", "score": "0.47235572", "text": "func (req *deviceCodeRequest) Execute(ctx context.Context) (msalbase.TokenResponse, error) {\n\t// Resolve authority endpoints\n\tresolutionManager := requests.CreateAuthorityEndpointResolutionManager(req.webRequestManager)\n\tendpoints, err := resolutionManager.ResolveEndpoints(ctx, req.authParameters.AuthorityInfo, \"\")\n\tif err != nil {\n\t\treturn msalbase.TokenResponse{}, err\n\t}\n\treq.authParameters.Endpoints = endpoints\n\tdeviceCodeResult, err := req.webRequestManager.GetDeviceCodeResult(ctx, req.authParameters)\n\tif err != nil {\n\t\treturn msalbase.TokenResponse{}, err\n\t}\n\t// Let the user do what they want with the device code result\n\treq.deviceCodeCallback(deviceCodeResult)\n\t// Using the device code to get the token response\n\treturn req.waitForTokenResponse(ctx, deviceCodeResult)\n}", "title": "" }, { "docid": "65a9a7bd06f3da374ff7cedbac460d84", "score": "0.4716985", "text": "func (a *DeviceApiService) DeviceDeviceAddExecute(r ApiDeviceDeviceAddRequest) (DeviceDeviceAddSuccess, *_nethttp.Response, GenericOpenAPIError) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\texecutionError GenericOpenAPIError\n\t\tlocalVarReturnValue DeviceDeviceAddSuccess\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"DeviceApiService.DeviceDeviceAdd\")\n\tif err != nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, nil, executionError\n\t}\n\n\tlocalVarPath := localBasePath + \"/device/device/add\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = r.deviceDeviceAddInput\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif apiKey, ok := auth[\"HttpHeaderLoginKey\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif apiKey.Prefix != \"\" {\n\t\t\t\t\tkey = apiKey.Prefix + \" \" + apiKey.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = apiKey.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"X-IPM-Username\"] = key\n\t\t\t}\n\t\t}\n\t}\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif apiKey, ok := auth[\"HttpHeaderPasswordKey\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif apiKey.Prefix != \"\" {\n\t\t\t\t\tkey = apiKey.Prefix + \" \" + apiKey.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = apiKey.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"X-IPM-Password\"] = key\n\t\t\t}\n\t\t}\n\t}\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, nil, executionError\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, localVarHTTPResponse, executionError\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = _ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, localVarHTTPResponse, executionError\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v DeviceDeviceAddFailed\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, executionError\n}", "title": "" }, { "docid": "23be92c3309984832a063644f9d77619", "score": "0.47132722", "text": "func (m *WindowsAutopilotDeviceIdentitiesWindowsAutopilotDeviceIdentityItemRequestBuilder) ToGetRequestInformation(ctx context.Context, requestConfiguration *WindowsAutopilotDeviceIdentitiesWindowsAutopilotDeviceIdentityItemRequestBuilderGetRequestConfiguration)(*i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RequestInformation, error) {\n requestInfo := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.NewRequestInformation()\n requestInfo.UrlTemplate = m.BaseRequestBuilder.UrlTemplate\n requestInfo.PathParameters = m.BaseRequestBuilder.PathParameters\n requestInfo.Method = i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.GET\n requestInfo.Headers.Add(\"Accept\", \"application/json\")\n if requestConfiguration != nil {\n if requestConfiguration.QueryParameters != nil {\n requestInfo.AddQueryParameters(*(requestConfiguration.QueryParameters))\n }\n requestInfo.Headers.AddAll(requestConfiguration.Headers)\n requestInfo.AddRequestOptions(requestConfiguration.Options)\n }\n return requestInfo, nil\n}", "title": "" }, { "docid": "38014413e0fdb76e76447c05b9d3de13", "score": "0.4709073", "text": "func (c *Client) Device(ctx context.Context, deviceID string, fields *DeviceFieldsOpts) (device *Device, err error) {\n\tdefer func() {\n\t\tif err != nil {\n\t\t\terr = fmt.Errorf(\"tailscale.Device: %w\", err)\n\t\t}\n\t}()\n\tpath := fmt.Sprintf(\"%s/api/v2/device/%s\", c.baseURL(), deviceID)\n\treq, err := http.NewRequestWithContext(ctx, \"GET\", path, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Add fields.\n\tfieldStr := fields.addFieldsToQueryParameter()\n\tq := req.URL.Query()\n\tq.Add(\"fields\", fieldStr)\n\treq.URL.RawQuery = q.Encode()\n\n\tb, resp, err := c.sendRequest(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t// If status code was not successful, return the error.\n\t// TODO: Change the check for the StatusCode to include other 2XX success codes.\n\tif resp.StatusCode != http.StatusOK {\n\t\treturn nil, handleErrorResponse(b, resp)\n\t}\n\n\terr = json.Unmarshal(b, &device)\n\treturn device, err\n}", "title": "" }, { "docid": "96d062843a8d2640a64080f0f508b1c6", "score": "0.4690651", "text": "func GenerateDeviceToken(t Source, exp time.Time, coreid, userEmail string) (string, error) {\n\treturn t.GenerateToken(exp, Claims{\n\t\t\"email\": userEmail,\n\t\t\"coreid\": coreid,\n\t\t\"exp\": exp.Format(time.RFC3339),\n\t})\n}", "title": "" }, { "docid": "3b02bd0c6c8de53306e9dd0695f0ace6", "score": "0.46807846", "text": "func (a *DeviceApiService) GetDeviceExecute(r ApiGetDeviceRequest) (SingleDevice, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue SingleDevice\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.Ctx, \"DeviceApiService.GetDevice\")\n\tif localBasePath == \"/\" {\n\t localBasePath = \"\"\n\t}\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/v2/devices/{device_id}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"device_id\"+\"}\", _neturl.PathEscape(parameterToString(r.P_deviceId, \"\")) , -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tif r.P_lang != nil {\n\t\tlocalVarQueryParams.Add(\"lang\", parameterToString(*r.P_lang, \"\"))\n\t}\n\tif r.P_isDev != nil {\n\t\tlocalVarQueryParams.Add(\"is_dev\", parameterToString(*r.P_isDev, \"\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\treq, err := a.client.prepareRequest(r.Ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "bf6b32d4580b1ed7c7088c203153080d", "score": "0.46566346", "text": "func (m *WindowsAutopilotDeploymentProfilesItemAssignedDevicesWindowsAutopilotDeviceIdentityItemRequestBuilder) Delete(ctx context.Context, requestConfiguration *WindowsAutopilotDeploymentProfilesItemAssignedDevicesWindowsAutopilotDeviceIdentityItemRequestBuilderDeleteRequestConfiguration)(error) {\n requestInfo, err := m.ToDeleteRequestInformation(ctx, requestConfiguration);\n if err != nil {\n return err\n }\n errorMapping := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.ErrorMappings {\n \"4XX\": i20a3050780ee0b0cde0a884a4f35429a20d60067e3bcda382ec5400079147459.CreateODataErrorFromDiscriminatorValue,\n \"5XX\": i20a3050780ee0b0cde0a884a4f35429a20d60067e3bcda382ec5400079147459.CreateODataErrorFromDiscriminatorValue,\n }\n err = m.BaseRequestBuilder.RequestAdapter.SendNoContent(ctx, requestInfo, errorMapping)\n if err != nil {\n return err\n }\n return nil\n}", "title": "" }, { "docid": "32c8f9c9841354b4b7bf3f4d8a915919", "score": "0.4647348", "text": "func main() {\n opts := gophercloud.AuthOptions{\n\t\tIdentityEndpoint: \"http://10.169.41.188/identity\",\n\t\tUsername: \"admin\",\n\t\tPassword: \"password\",\n\t\tTenantID: \"01821bd38f2f474489491adb0da7efaf\",\n\t\tDomainID: \"default\",\n\t}\n\tprovider, err := openstack.AuthenticatedClient(opts)\n\tif err != nil {\n\t\tfmt.Errorf(\"Sending get container group request failed: %v\", err)\n\t\treturn\n\t}\n\tclient, err := openstack.NewContainerV1(provider, gophercloud.EndpointOpts{\n\t\tRegion: \"RegionOne\",\n\t})\n if err != nil {\n\t\tfmt.Errorf(\"Get zun client failed: %v\", err)\n\t\treturn\n\t}\n\terr = capsules.Delete(client, \"e64c25a4-ff62-4bce-8442-f1cf78d6f053\").ExtractErr()\n\tif err != nil {\n\t\tfmt.Errorf(\"Failed to delete: %v\", err)\n\t\tfmt.Printf(\"Failed to delete: %v\", err)\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "0e7afd5bb1b6a71d16ad6c09b85342ef", "score": "0.46470332", "text": "func TestDeviceManagerClaim(t *testing.T) {\n\tctx, shutdown := test.V23Init()\n\tdefer shutdown()\n\n\t// Use a common root identity provider so that all principals can talk to one\n\t// another.\n\tidp := testutil.NewIDProvider(\"root\")\n\tif err := idp.Bless(v23.GetPrincipal(ctx), \"ctx\"); err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\tsh, deferFn := servicetest.CreateShellAndMountTable(t, ctx)\n\tdefer deferFn()\n\n\t// Set up mock application and binary repositories.\n\tenvelope, cleanup := utiltest.StartMockRepos(t, ctx)\n\tdefer cleanup()\n\n\troot, cleanup := servicetest.SetupRootDir(t, \"devicemanager\")\n\tdefer cleanup()\n\tif err := versioning.SaveCreatorInfo(ctx, root); err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\t// Create a script wrapping the test target that implements suidhelper.\n\thelperPath := utiltest.GenerateSuidHelperScript(t, root)\n\n\t// Set up the device manager. Since we won't do device manager updates,\n\t// don't worry about its application envelope and current link.\n\tpairingToken := \"abcxyz\"\n\tdm := utiltest.DeviceManagerCmd(sh, utiltest.DeviceManager, \"dm\", root, helperPath, \"unused_app_repo_name\", \"unused_curr_link\", pairingToken)\n\tdm.Start()\n\tdm.S.Expect(\"READY\")\n\n\t*envelope = utiltest.EnvelopeFromShell(sh, nil, nil, utiltest.App, \"google naps\", 0, 0, \"trapp\")\n\n\tclaimantCtx := utiltest.CtxWithNewPrincipal(t, ctx, idp, \"claimant\")\n\toctx, err := v23.WithPrincipal(ctx, testutil.NewPrincipal(\"other\"))\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\t// Unclaimed devices cannot do anything but be claimed.\n\t// TODO(ashankar,caprita): The line below will currently fail with\n\t// ErrUnclaimedDevice != NotTrusted. NotTrusted can be avoided by\n\t// passing options.ServerAuthorizer{security.AllowEveryone()} to the\n\t// \"Install\" RPC. Refactor the helper function to make this possible.\n\t//installAppExpectError(t, octx, impl.ErrUnclaimedDevice.ID)\n\n\t// Claim the device with an incorrect pairing token should fail.\n\tutiltest.ClaimDeviceExpectError(t, claimantCtx, \"claimable\", \"mydevice\", \"badtoken\", errors.ErrInvalidPairingToken.ID)\n\t// But succeed with a valid pairing token\n\tutiltest.ClaimDevice(t, claimantCtx, \"claimable\", \"dm\", \"mydevice\", pairingToken)\n\n\t// Installation should succeed since claimantRT is now the \"owner\" of\n\t// the devicemanager.\n\tappID := utiltest.InstallApp(t, claimantCtx)\n\n\t// octx will not install the app now since it doesn't recognize the\n\t// device's blessings. The error returned will be ErrNoServers as that\n\t// is what the IPC stack does when there are no authorized servers.\n\tutiltest.InstallAppExpectError(t, octx, verror.ErrNoServers.ID)\n\t// Even if it does recognize the device (by virtue of recognizing the\n\t// claimant), the device will not allow it to install.\n\tclaimantB, _ := v23.GetPrincipal(claimantCtx).BlessingStore().Default()\n\tif err := security.AddToRoots(v23.GetPrincipal(octx), claimantB); err != nil {\n\t\tt.Fatal(err)\n\t}\n\tutiltest.InstallAppExpectError(t, octx, verror.ErrNoAccess.ID)\n\n\t// Create the local server that the app uses to let us know it's ready.\n\tpingCh, cleanup := utiltest.SetupPingServer(t, claimantCtx)\n\tdefer cleanup()\n\n\t// Start an instance of the app.\n\tinstanceID := utiltest.LaunchApp(t, claimantCtx, appID)\n\n\t// Wait until the app pings us that it's ready.\n\tpingCh.WaitForPingArgs(t)\n\tutiltest.Resolve(t, ctx, \"trapp\", 1, false)\n\tutiltest.KillApp(t, claimantCtx, appID, instanceID)\n\n\t// TODO(gauthamt): Test that AccessLists persist across devicemanager restarts\n}", "title": "" }, { "docid": "db03126a36fac397583749840f5d7c8e", "score": "0.46427372", "text": "func (m *WindowsAutopilotDeviceIdentityItemRequestBuilder) CreateGetRequestInformation(ctx context.Context, requestConfiguration *WindowsAutopilotDeviceIdentityItemRequestBuilderGetRequestConfiguration)(*i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RequestInformation, error) {\n requestInfo := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.NewRequestInformation()\n requestInfo.UrlTemplate = m.urlTemplate\n requestInfo.PathParameters = m.pathParameters\n requestInfo.Method = i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.GET\n requestInfo.Headers[\"Accept\"] = \"application/json\"\n if requestConfiguration != nil {\n if requestConfiguration.QueryParameters != nil {\n requestInfo.AddQueryParameters(*(requestConfiguration.QueryParameters))\n }\n requestInfo.AddRequestHeaders(requestConfiguration.Headers)\n requestInfo.AddRequestOptions(requestConfiguration.Options)\n }\n return requestInfo, nil\n}", "title": "" }, { "docid": "5206ca7bda3518d5cfaa8cd33e2f13c6", "score": "0.46360415", "text": "func (e *DeviceAdd) Run(m libkb.MetaContext) (err error) {\n\tdefer m.Trace(\"DeviceAdd#Run\", &err)()\n\n\tm.G().LocalSigchainGuard().Set(m.Ctx(), \"DeviceAdd\")\n\tdefer m.G().LocalSigchainGuard().Clear(m.Ctx(), \"DeviceAdd\")\n\n\targ := keybase1.ChooseDeviceTypeArg{Kind: keybase1.ChooseType_NEW_DEVICE}\n\tprovisioneeType, err := m.UIs().ProvisionUI.ChooseDeviceType(context.TODO(), arg)\n\tif err != nil {\n\t\treturn err\n\t}\n\tuid := m.CurrentUID()\n\n\t// make a new secret; continue to generate legacy Kex2 secrets for now.\n\tkex2SecretTyp := libkb.Kex2SecretTypeV1Desktop\n\tif provisioneeType == keybase1.DeviceType_MOBILE || m.G().IsMobileAppType() {\n\t\tkex2SecretTyp = libkb.Kex2SecretTypeV1Mobile\n\t}\n\tm.Debug(\"provisionee device type: %v; uid: %s; secret type: %d\", provisioneeType, uid, kex2SecretTyp)\n\tsecret, err := libkb.NewKex2SecretFromTypeAndUID(kex2SecretTyp, uid)\n\tif err != nil {\n\t\treturn err\n\t}\n\tm.Debug(\"secret phrase received\")\n\n\t// provisioner needs ppstream, and UI is confusing when it asks for\n\t// it at the same time as asking for the secret, so get it first\n\t// before prompting for the kex2 secret:\n\tpps, err := libkb.GetPassphraseStreamStored(m)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// create provisioner engine\n\tprovisioner := NewKex2Provisioner(m.G(), secret.Secret(), pps)\n\n\tvar canceler func()\n\tm, canceler = m.WithContextCancel()\n\n\t// display secret and prompt for secret from X in a goroutine:\n\tgo func() {\n\t\terr := e.promptLoop(m, provisioner, secret, provisioneeType)\n\t\tif err != nil {\n\t\t\tm.Debug(\"DeviceAdd prompt loop error: %s\", err)\n\t\t\tcanceler()\n\t\t}\n\t}()\n\n\tdefer func() {\n\t\tcanceler()\n\t}()\n\n\tif err := RunEngine2(m, provisioner); err != nil {\n\t\tif err == kex2.ErrHelloTimeout {\n\t\t\terr = libkb.CanceledError{M: \"Failed to provision device: are you sure you typed the secret properly?\"}\n\t\t}\n\t\treturn err\n\t}\n\n\tm.G().KeyfamilyChanged(m.Ctx(), m.G().Env.GetUID())\n\n\treturn nil\n}", "title": "" }, { "docid": "cbb88cce0a7d363162182e446bf6aaac", "score": "0.46302074", "text": "func (a *DeviceApiService) DeviceInterfaceDeleteExecute(r ApiDeviceInterfaceDeleteRequest) (DeviceInterfaceDeleteSuccess, *_nethttp.Response, GenericOpenAPIError) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodDelete\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\texecutionError GenericOpenAPIError\n\t\tlocalVarReturnValue DeviceInterfaceDeleteSuccess\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"DeviceApiService.DeviceInterfaceDelete\")\n\tif err != nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, nil, executionError\n\t}\n\n\tlocalVarPath := localBasePath + \"/device/interface/delete\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tif r.deviceId != nil {\n\t\tlocalVarQueryParams.Add(\"device_id\", parameterToString(*r.deviceId, \"\"))\n\t}\n\tif r.deviceName != nil {\n\t\tlocalVarQueryParams.Add(\"device_name\", parameterToString(*r.deviceName, \"\"))\n\t}\n\tif r.interfaceId != nil {\n\t\tlocalVarQueryParams.Add(\"interface_id\", parameterToString(*r.interfaceId, \"\"))\n\t}\n\tif r.interfaceName != nil {\n\t\tlocalVarQueryParams.Add(\"interface_name\", parameterToString(*r.interfaceName, \"\"))\n\t}\n\tif r.warnings != nil {\n\t\tlocalVarQueryParams.Add(\"warnings\", parameterToString(*r.warnings, \"\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif apiKey, ok := auth[\"HttpHeaderLoginKey\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif apiKey.Prefix != \"\" {\n\t\t\t\t\tkey = apiKey.Prefix + \" \" + apiKey.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = apiKey.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"X-IPM-Username\"] = key\n\t\t\t}\n\t\t}\n\t}\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif apiKey, ok := auth[\"HttpHeaderPasswordKey\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif apiKey.Prefix != \"\" {\n\t\t\t\t\tkey = apiKey.Prefix + \" \" + apiKey.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = apiKey.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"X-IPM-Password\"] = key\n\t\t\t}\n\t\t}\n\t}\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, nil, executionError\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, localVarHTTPResponse, executionError\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = _ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, localVarHTTPResponse, executionError\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v DeviceInterfaceDeleteFailed\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, executionError\n}", "title": "" }, { "docid": "5f3df45b532a9b6447bb6ae57473094a", "score": "0.4623613", "text": "func (a *DeviceApiService) DeviceDeviceEditExecute(r ApiDeviceDeviceEditRequest) (DeviceDeviceEditSuccess, *_nethttp.Response, GenericOpenAPIError) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodPut\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\texecutionError GenericOpenAPIError\n\t\tlocalVarReturnValue DeviceDeviceEditSuccess\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"DeviceApiService.DeviceDeviceEdit\")\n\tif err != nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, nil, executionError\n\t}\n\n\tlocalVarPath := localBasePath + \"/device/device/edit\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = r.deviceDeviceEditInput\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif apiKey, ok := auth[\"HttpHeaderLoginKey\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif apiKey.Prefix != \"\" {\n\t\t\t\t\tkey = apiKey.Prefix + \" \" + apiKey.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = apiKey.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"X-IPM-Username\"] = key\n\t\t\t}\n\t\t}\n\t}\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif apiKey, ok := auth[\"HttpHeaderPasswordKey\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif apiKey.Prefix != \"\" {\n\t\t\t\t\tkey = apiKey.Prefix + \" \" + apiKey.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = apiKey.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"X-IPM-Password\"] = key\n\t\t\t}\n\t\t}\n\t}\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, nil, executionError\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, localVarHTTPResponse, executionError\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = _ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, localVarHTTPResponse, executionError\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v DeviceDeviceEditFailed\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, executionError\n}", "title": "" }, { "docid": "3d1719eb78046339365adaa164201c96", "score": "0.4620558", "text": "func (a *DeviceManagementActionsApiService) DeviceManagementManagedDevicesDeleteUserFromSharedAppleDevice(ctx _context.Context, managedDeviceId string, inlineObject20 InlineObject20) (*_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/deviceManagement/managedDevices({managedDevice-id})/deleteUserFromSharedAppleDevice\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"managedDevice-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", managedDeviceId)), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = &inlineObject20\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 0 {\n\t\t\tvar v OdataError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarHTTPResponse, newErr\n\t\t}\n\t\treturn localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "a901ce5fdbfc4d46002e82f5d055288d", "score": "0.4618941", "text": "func (client *Client) BatchQueryDeviceDetailWithOptions(request *BatchQueryDeviceDetailRequest, runtime *util.RuntimeOptions) (_result *BatchQueryDeviceDetailResponse, _err error) {\n\t_err = util.ValidateModel(request)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\tquery := map[string]interface{}{}\n\tif !tea.BoolValue(util.IsUnset(request.DeviceName)) {\n\t\tquery[\"DeviceName\"] = request.DeviceName\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.IotInstanceId)) {\n\t\tquery[\"IotInstanceId\"] = request.IotInstanceId\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.ProductKey)) {\n\t\tquery[\"ProductKey\"] = request.ProductKey\n\t}\n\n\treq := &openapi.OpenApiRequest{\n\t\tQuery: openapiutil.Query(query),\n\t}\n\tparams := &openapi.Params{\n\t\tAction: tea.String(\"BatchQueryDeviceDetail\"),\n\t\tVersion: tea.String(\"2018-01-20\"),\n\t\tProtocol: tea.String(\"HTTPS\"),\n\t\tPathname: tea.String(\"/\"),\n\t\tMethod: tea.String(\"POST\"),\n\t\tAuthType: tea.String(\"AK\"),\n\t\tStyle: tea.String(\"RPC\"),\n\t\tReqBodyType: tea.String(\"formData\"),\n\t\tBodyType: tea.String(\"json\"),\n\t}\n\t_result = &BatchQueryDeviceDetailResponse{}\n\t_body, _err := client.CallApi(params, req, runtime)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\t_err = tea.Convert(_body, &_result)\n\treturn _result, _err\n}", "title": "" }, { "docid": "425e283bf67320e12eefb50a772de450", "score": "0.46161816", "text": "func (client *Client) QueryDeviceDetailWithOptions(request *QueryDeviceDetailRequest, runtime *util.RuntimeOptions) (_result *QueryDeviceDetailResponse, _err error) {\n\t_err = util.ValidateModel(request)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\tquery := map[string]interface{}{}\n\tif !tea.BoolValue(util.IsUnset(request.DeviceName)) {\n\t\tquery[\"DeviceName\"] = request.DeviceName\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.IotId)) {\n\t\tquery[\"IotId\"] = request.IotId\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.IotInstanceId)) {\n\t\tquery[\"IotInstanceId\"] = request.IotInstanceId\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.ProductKey)) {\n\t\tquery[\"ProductKey\"] = request.ProductKey\n\t}\n\n\treq := &openapi.OpenApiRequest{\n\t\tQuery: openapiutil.Query(query),\n\t}\n\tparams := &openapi.Params{\n\t\tAction: tea.String(\"QueryDeviceDetail\"),\n\t\tVersion: tea.String(\"2018-01-20\"),\n\t\tProtocol: tea.String(\"HTTPS\"),\n\t\tPathname: tea.String(\"/\"),\n\t\tMethod: tea.String(\"POST\"),\n\t\tAuthType: tea.String(\"AK\"),\n\t\tStyle: tea.String(\"RPC\"),\n\t\tReqBodyType: tea.String(\"formData\"),\n\t\tBodyType: tea.String(\"json\"),\n\t}\n\t_result = &QueryDeviceDetailResponse{}\n\t_body, _err := client.CallApi(params, req, runtime)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\t_err = tea.Convert(_body, &_result)\n\treturn _result, _err\n}", "title": "" }, { "docid": "a2670a9b7dc6f5872f3fd9362372d49a", "score": "0.46160978", "text": "func (r *ManagedDeviceRequest) Delete(ctx context.Context) error {\n\treturn r.JSONRequest(ctx, \"DELETE\", \"\", nil, nil)\n}", "title": "" }, { "docid": "a30e1bd7d1fa377af663fc9837d6ca68", "score": "0.46155015", "text": "func (a *DeviceApiService) DeleteDeviceClientExecute(r ApiDeleteDeviceClientRequest) (*_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodDelete\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.Ctx, \"DeviceApiService.DeleteDeviceClient\")\n\tif localBasePath == \"/\" {\n\t localBasePath = \"\"\n\t}\n\tif err != nil {\n\t\treturn nil, GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/v2/devices/{device_id}/device_clients/{client_id}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"device_id\"+\"}\", _neturl.PathEscape(parameterToString(r.P_deviceId, \"\")) , -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"client_id\"+\"}\", _neturl.PathEscape(parameterToString(r.P_clientId, \"\")) , -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\treq, err := a.client.prepareRequest(r.Ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\treturn localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "a9ca5db95d657188cbbf0183cf5e1ce3", "score": "0.46097094", "text": "func (self *u2fAgent) deviceTag(dev *hid.DeviceInfo) []byte {\n\tvar nonce [24]byte\n\n\tmac := hmac.New(sha256.New, self.nonceKey[:])\n\tmac.Write([]byte(dev.Path))\n\tsum := mac.Sum(nil)\n\tcopy(nonce[:], sum[:24])\n\n\treturn secretbox.Seal(nonce[:], []byte(dev.Path), &nonce, &self.boxSecret)\n}", "title": "" }, { "docid": "a4255551ea030fa354a9050d6b209b29", "score": "0.4597951", "text": "func (e *XLoginProvision) device(ctx *Context) error {\n\tprovisionerType, err := ctx.ProvisionUI.ChooseDeviceType(context.TODO(), 0)\n\tif err != nil {\n\t\treturn err\n\t}\n\te.G().Log.Debug(\"provisioner device type: %v\", provisionerType)\n\n\t// make a new secret:\n\tsecret, err := libkb.NewKex2Secret()\n\tif err != nil {\n\t\treturn err\n\t}\n\te.G().Log.Debug(\"secret phrase: %s\", secret.Phrase())\n\n\t// make a new device:\n\tdeviceID, err := libkb.NewDeviceID()\n\tif err != nil {\n\t\treturn err\n\t}\n\tdevice := &libkb.Device{\n\t\tID: deviceID,\n\t\tType: e.deviceType,\n\t}\n\n\t// create provisionee engine\n\tprovisionee := NewKex2Provisionee(e.G(), device, secret.Secret())\n\n\tvar canceler func()\n\n\t// display secret and prompt for secret from X in a goroutine:\n\tgo func() {\n\t\tsb := secret.Secret()\n\t\targ := keybase1.DisplayAndPromptSecretArg{\n\t\t\tSecret: sb[:],\n\t\t\tPhrase: secret.Phrase(),\n\t\t\tOtherDeviceType: provisionerType,\n\t\t}\n\t\tvar contxt context.Context\n\t\tcontxt, canceler = context.WithCancel(context.Background())\n\t\treceivedSecret, err := ctx.ProvisionUI.DisplayAndPromptSecret(contxt, arg)\n\t\tif err != nil {\n\t\t\t// XXX ???\n\t\t\te.G().Log.Warning(\"DisplayAndPromptSecret error: %s\", err)\n\t\t} else if receivedSecret != nil {\n\t\t\tvar ks kex2.Secret\n\t\t\tcopy(ks[:], receivedSecret)\n\t\t\tprovisionee.AddSecret(ks)\n\t\t}\n\t}()\n\n\tdefer func() {\n\t\tif canceler != nil {\n\t\t\te.G().Log.Debug(\"canceling DisplayAndPromptSecret call\")\n\t\t\tcanceler()\n\t\t}\n\t}()\n\n\t// run provisionee\n\tif err := RunEngine(provisionee, ctx); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "d10522683477017ee85abf53c935fc01", "score": "0.45834363", "text": "func (m *WindowsMalwareInformationItemDeviceMalwareStatesMalwareStateForWindowsDeviceItemRequestBuilder) Delete(ctx context.Context, requestConfiguration *WindowsMalwareInformationItemDeviceMalwareStatesMalwareStateForWindowsDeviceItemRequestBuilderDeleteRequestConfiguration)(error) {\n requestInfo, err := m.ToDeleteRequestInformation(ctx, requestConfiguration);\n if err != nil {\n return err\n }\n errorMapping := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.ErrorMappings {\n \"4XX\": ia572726a95efa92ddd544552cd950653dc691023836923576b2f4bf716cf204a.CreateODataErrorFromDiscriminatorValue,\n \"5XX\": ia572726a95efa92ddd544552cd950653dc691023836923576b2f4bf716cf204a.CreateODataErrorFromDiscriminatorValue,\n }\n err = m.BaseRequestBuilder.RequestAdapter.SendNoContent(ctx, requestInfo, errorMapping)\n if err != nil {\n return err\n }\n return nil\n}", "title": "" }, { "docid": "1d4a33a03668654beecda986c507ceb8", "score": "0.4575278", "text": "func (mc *ThingController) AuthDevice(body []byte, authorization, replyTo, corrID string) error {\n\tvar authThingReq network.DeviceAuthRequest\n\terr := json.Unmarshal(body, &authThingReq)\n\tif err != nil {\n\t\tmc.logger.Error(err)\n\t\treturn err\n\t}\n\n\tmc.logger.Info(\"auth device command received\")\n\terr = mc.thingInteractor.Auth(authorization, authThingReq.ID)\n\tif err != nil {\n\t\tsendErr := mc.sender.SendAuthResponse(authThingReq.ID, replyTo, corrID, err)\n\t\tif sendErr != nil {\n\t\t\treturn fmt.Errorf(\"error sending response: %v: %w\", err, sendErr)\n\t\t}\n\t\treturn err\n\t}\n\n\tsendErr := mc.sender.SendAuthResponse(authThingReq.ID, replyTo, corrID, err)\n\tif sendErr != nil {\n\t\treturn fmt.Errorf(\"error sending response: %v: %w\", err, sendErr)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "c08eddc0dc49340e6b3cc23abca3423d", "score": "0.4572156", "text": "func CreateCreateAppRequest() (request *CreateAppRequest) {\nrequest = &CreateAppRequest{\nRpcRequest: &requests.RpcRequest{},\n}\nrequest.InitWithApiInfo(\"AMS\", \"2018-02-12\", \"CreateApp\", \"\", \"\")\nreturn\n}", "title": "" }, { "docid": "a8877f4d12f935a069313526eba83895", "score": "0.4570659", "text": "func (m *WindowsAutopilotDeploymentProfilesItemAssignedDevicesWindowsAutopilotDeviceIdentityItemRequestBuilder) ToGetRequestInformation(ctx context.Context, requestConfiguration *WindowsAutopilotDeploymentProfilesItemAssignedDevicesWindowsAutopilotDeviceIdentityItemRequestBuilderGetRequestConfiguration)(*i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RequestInformation, error) {\n requestInfo := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.NewRequestInformation()\n requestInfo.UrlTemplate = m.BaseRequestBuilder.UrlTemplate\n requestInfo.PathParameters = m.BaseRequestBuilder.PathParameters\n requestInfo.Method = i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.GET\n requestInfo.Headers.Add(\"Accept\", \"application/json\")\n if requestConfiguration != nil {\n if requestConfiguration.QueryParameters != nil {\n requestInfo.AddQueryParameters(*(requestConfiguration.QueryParameters))\n }\n requestInfo.Headers.AddAll(requestConfiguration.Headers)\n requestInfo.AddRequestOptions(requestConfiguration.Options)\n }\n return requestInfo, nil\n}", "title": "" }, { "docid": "7d984da49bfa0fb4958c2dc477763e30", "score": "0.45701298", "text": "func (client *Client) QueryDeviceInfoWithOptions(request *QueryDeviceInfoRequest, runtime *util.RuntimeOptions) (_result *QueryDeviceInfoResponse, _err error) {\n\t_err = util.ValidateModel(request)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\tquery := map[string]interface{}{}\n\tif !tea.BoolValue(util.IsUnset(request.DeviceName)) {\n\t\tquery[\"DeviceName\"] = request.DeviceName\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.IotId)) {\n\t\tquery[\"IotId\"] = request.IotId\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.IotInstanceId)) {\n\t\tquery[\"IotInstanceId\"] = request.IotInstanceId\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.ProductKey)) {\n\t\tquery[\"ProductKey\"] = request.ProductKey\n\t}\n\n\treq := &openapi.OpenApiRequest{\n\t\tQuery: openapiutil.Query(query),\n\t}\n\tparams := &openapi.Params{\n\t\tAction: tea.String(\"QueryDeviceInfo\"),\n\t\tVersion: tea.String(\"2018-01-20\"),\n\t\tProtocol: tea.String(\"HTTPS\"),\n\t\tPathname: tea.String(\"/\"),\n\t\tMethod: tea.String(\"POST\"),\n\t\tAuthType: tea.String(\"AK\"),\n\t\tStyle: tea.String(\"RPC\"),\n\t\tReqBodyType: tea.String(\"formData\"),\n\t\tBodyType: tea.String(\"json\"),\n\t}\n\t_result = &QueryDeviceInfoResponse{}\n\t_body, _err := client.CallApi(params, req, runtime)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\t_err = tea.Convert(_body, &_result)\n\treturn _result, _err\n}", "title": "" }, { "docid": "321846f0c5555d360e23a2ccb533c396", "score": "0.45601177", "text": "func (m *WindowsAutopilotDeploymentProfilesItemAssignedDevicesWindowsAutopilotDeviceIdentityItemRequestBuilder) ToDeleteRequestInformation(ctx context.Context, requestConfiguration *WindowsAutopilotDeploymentProfilesItemAssignedDevicesWindowsAutopilotDeviceIdentityItemRequestBuilderDeleteRequestConfiguration)(*i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RequestInformation, error) {\n requestInfo := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.NewRequestInformation()\n requestInfo.UrlTemplate = m.BaseRequestBuilder.UrlTemplate\n requestInfo.PathParameters = m.BaseRequestBuilder.PathParameters\n requestInfo.Method = i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.DELETE\n if requestConfiguration != nil {\n requestInfo.Headers.AddAll(requestConfiguration.Headers)\n requestInfo.AddRequestOptions(requestConfiguration.Options)\n }\n return requestInfo, nil\n}", "title": "" }, { "docid": "d940e23d621d8df8eedfc1ba7bb1fd2d", "score": "0.45433626", "text": "func (m *WindowsAutopilotDeviceIdentitiesItemUnassignUserFromDeviceRequestBuilder) ToPostRequestInformation(ctx context.Context, requestConfiguration *WindowsAutopilotDeviceIdentitiesItemUnassignUserFromDeviceRequestBuilderPostRequestConfiguration)(*i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RequestInformation, error) {\n requestInfo := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.NewRequestInformation()\n requestInfo.UrlTemplate = m.urlTemplate\n requestInfo.PathParameters = m.pathParameters\n requestInfo.Method = i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.POST\n if requestConfiguration != nil {\n requestInfo.Headers.AddAll(requestConfiguration.Headers)\n requestInfo.AddRequestOptions(requestConfiguration.Options)\n }\n return requestInfo, nil\n}", "title": "" }, { "docid": "0beef16d4e4cec667479f4de269476ff", "score": "0.45351002", "text": "func (a *Client) TapeDeviceModify(params *TapeDeviceModifyParams, authInfo runtime.ClientAuthInfoWriter, opts ...ClientOption) (*TapeDeviceModifyOK, *TapeDeviceModifyAccepted, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewTapeDeviceModifyParams()\n\t}\n\top := &runtime.ClientOperation{\n\t\tID: \"tape_device_modify\",\n\t\tMethod: \"PATCH\",\n\t\tPathPattern: \"/storage/tape-devices/{node.uuid}/{device_id}\",\n\t\tProducesMediaTypes: []string{\"application/hal+json\", \"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/hal+json\", \"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &TapeDeviceModifyReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t}\n\tfor _, opt := range opts {\n\t\topt(op)\n\t}\n\n\tresult, err := a.transport.Submit(op)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tswitch value := result.(type) {\n\tcase *TapeDeviceModifyOK:\n\t\treturn value, nil, nil\n\tcase *TapeDeviceModifyAccepted:\n\t\treturn nil, value, nil\n\t}\n\t// unexpected success response\n\tunexpectedSuccess := result.(*TapeDeviceModifyDefault)\n\treturn nil, nil, runtime.NewAPIError(\"unexpected success response: content available as default response in error\", unexpectedSuccess, unexpectedSuccess.Code())\n}", "title": "" }, { "docid": "0e553580c70ab6696beea4762793437e", "score": "0.45334747", "text": "func (m *WindowsAutopilotDeviceIdentitiesWindowsAutopilotDeviceIdentityItemRequestBuilder) ToDeleteRequestInformation(ctx context.Context, requestConfiguration *WindowsAutopilotDeviceIdentitiesWindowsAutopilotDeviceIdentityItemRequestBuilderDeleteRequestConfiguration)(*i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RequestInformation, error) {\n requestInfo := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.NewRequestInformation()\n requestInfo.UrlTemplate = m.BaseRequestBuilder.UrlTemplate\n requestInfo.PathParameters = m.BaseRequestBuilder.PathParameters\n requestInfo.Method = i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.DELETE\n if requestConfiguration != nil {\n requestInfo.Headers.AddAll(requestConfiguration.Headers)\n requestInfo.AddRequestOptions(requestConfiguration.Options)\n }\n return requestInfo, nil\n}", "title": "" }, { "docid": "cbfce7a39bd42684caaddc260f988c40", "score": "0.45205218", "text": "func (m *WindowsAutopilotDeviceIdentitiesWindowsAutopilotDeviceIdentityItemRequestBuilder) Patch(ctx context.Context, body iadcd81124412c61e647227ecfc4449d8bba17de0380ddda76f641a29edf2b242.WindowsAutopilotDeviceIdentityable, requestConfiguration *WindowsAutopilotDeviceIdentitiesWindowsAutopilotDeviceIdentityItemRequestBuilderPatchRequestConfiguration)(iadcd81124412c61e647227ecfc4449d8bba17de0380ddda76f641a29edf2b242.WindowsAutopilotDeviceIdentityable, error) {\n requestInfo, err := m.ToPatchRequestInformation(ctx, body, requestConfiguration);\n if err != nil {\n return nil, err\n }\n errorMapping := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.ErrorMappings {\n \"4XX\": ia572726a95efa92ddd544552cd950653dc691023836923576b2f4bf716cf204a.CreateODataErrorFromDiscriminatorValue,\n \"5XX\": ia572726a95efa92ddd544552cd950653dc691023836923576b2f4bf716cf204a.CreateODataErrorFromDiscriminatorValue,\n }\n res, err := m.BaseRequestBuilder.RequestAdapter.Send(ctx, requestInfo, iadcd81124412c61e647227ecfc4449d8bba17de0380ddda76f641a29edf2b242.CreateWindowsAutopilotDeviceIdentityFromDiscriminatorValue, errorMapping)\n if err != nil {\n return nil, err\n }\n if res == nil {\n return nil, nil\n }\n return res.(iadcd81124412c61e647227ecfc4449d8bba17de0380ddda76f641a29edf2b242.WindowsAutopilotDeviceIdentityable), nil\n}", "title": "" }, { "docid": "3dbaba049a86f531b17b05f0d1df3e0b", "score": "0.45183817", "text": "func (dtc *DeviceTokenCreate) Exec(ctx context.Context) error {\n\t_, err := dtc.Save(ctx)\n\treturn err\n}", "title": "" }, { "docid": "32732652cfe31995287c82cd58ed3234", "score": "0.45146248", "text": "func (a *DeviceApiService) DeviceDeviceCountExecute(r ApiDeviceDeviceCountRequest) (ApiCountResponseSuccess, *_nethttp.Response, GenericOpenAPIError) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\texecutionError GenericOpenAPIError\n\t\tlocalVarReturnValue ApiCountResponseSuccess\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"DeviceApiService.DeviceDeviceCount\")\n\tif err != nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, nil, executionError\n\t}\n\n\tlocalVarPath := localBasePath + \"/device/device/count\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tif r.where != nil {\n\t\tlocalVarQueryParams.Add(\"where\", parameterToString(*r.where, \"\"))\n\t}\n\tif r.tags != nil {\n\t\tlocalVarQueryParams.Add(\"tags\", parameterToString(*r.tags, \"\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif apiKey, ok := auth[\"HttpHeaderLoginKey\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif apiKey.Prefix != \"\" {\n\t\t\t\t\tkey = apiKey.Prefix + \" \" + apiKey.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = apiKey.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"X-IPM-Username\"] = key\n\t\t\t}\n\t\t}\n\t}\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif apiKey, ok := auth[\"HttpHeaderPasswordKey\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif apiKey.Prefix != \"\" {\n\t\t\t\t\tkey = apiKey.Prefix + \" \" + apiKey.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = apiKey.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"X-IPM-Password\"] = key\n\t\t\t}\n\t\t}\n\t}\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, nil, executionError\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, localVarHTTPResponse, executionError\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = _ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, localVarHTTPResponse, executionError\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v ApiResponse\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, executionError\n}", "title": "" }, { "docid": "650ea5aa149d8ce3b54d3c12cd534de4", "score": "0.4512902", "text": "func (a *DeviceApiService) DeviceDeviceInfo(ctx _context.Context) ApiDeviceDeviceInfoRequest {\n\treturn ApiDeviceDeviceInfoRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t}\n}", "title": "" }, { "docid": "7d149e2373de08f4b16d90ef0ad6efb3", "score": "0.45122805", "text": "func (m *UserExperienceAnalyticsWorkFromAnywhereMetricsUserExperienceAnalyticsWorkFromAnywhereMetricItemRequestBuilder) ToDeleteRequestInformation(ctx context.Context, requestConfiguration *UserExperienceAnalyticsWorkFromAnywhereMetricsUserExperienceAnalyticsWorkFromAnywhereMetricItemRequestBuilderDeleteRequestConfiguration)(*i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RequestInformation, error) {\n requestInfo := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.NewRequestInformation()\n requestInfo.UrlTemplate = m.BaseRequestBuilder.UrlTemplate\n requestInfo.PathParameters = m.BaseRequestBuilder.PathParameters\n requestInfo.Method = i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.DELETE\n if requestConfiguration != nil {\n requestInfo.Headers.AddAll(requestConfiguration.Headers)\n requestInfo.AddRequestOptions(requestConfiguration.Options)\n }\n return requestInfo, nil\n}", "title": "" }, { "docid": "a79c48dbffd26985c32f5d064fa09e1b", "score": "0.45117244", "text": "func CreateDevicePut(token string, name string) *PutDeviceRequest {\n\n\t// If we have a messaging key, pass it on the PUT.\n\tpkBytes := []byte(\"\")\n\tif HasKeys() {\n\t\tpkBytes = keyBytes()\n\t}\n\n\t// Create the PUT node body.\n\tpdr := &PutDeviceRequest{\n\t\tToken: token,\n\t\tName: name,\n\t\tMsgEndPoint: \"\",\n\t\tPattern: \"\",\n\t\tSoftwareVersions: make(map[string]string),\n\t\tPublicKey: pkBytes,\n\t}\n\n\treturn pdr\n}", "title": "" }, { "docid": "e08e9294aeca02765cb68b469660fde3", "score": "0.45084617", "text": "func (m *ManagedDevicesItemDeviceHealthScriptStatesWithIdWithPolicyIdWithDeviceIdRequestBuilder) ToGetRequestInformation(ctx context.Context, requestConfiguration *ManagedDevicesItemDeviceHealthScriptStatesWithIdWithPolicyIdWithDeviceIdRequestBuilderGetRequestConfiguration)(*i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RequestInformation, error) {\n requestInfo := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.NewRequestInformation()\n requestInfo.UrlTemplate = m.BaseRequestBuilder.UrlTemplate\n requestInfo.PathParameters = m.BaseRequestBuilder.PathParameters\n requestInfo.Method = i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.GET\n requestInfo.Headers.Add(\"Accept\", \"application/json\")\n if requestConfiguration != nil {\n if requestConfiguration.QueryParameters != nil {\n requestInfo.AddQueryParameters(*(requestConfiguration.QueryParameters))\n }\n requestInfo.Headers.AddAll(requestConfiguration.Headers)\n requestInfo.AddRequestOptions(requestConfiguration.Options)\n }\n return requestInfo, nil\n}", "title": "" }, { "docid": "34dce890c229da336b7dc683ec5b1c43", "score": "0.45077884", "text": "func (m *ItemAuthenticationOperationsLongRunningOperationItemRequestBuilder) ToDeleteRequestInformation(ctx context.Context, requestConfiguration *ItemAuthenticationOperationsLongRunningOperationItemRequestBuilderDeleteRequestConfiguration)(*i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RequestInformation, error) {\n requestInfo := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.NewRequestInformation()\n requestInfo.UrlTemplate = m.BaseRequestBuilder.UrlTemplate\n requestInfo.PathParameters = m.BaseRequestBuilder.PathParameters\n requestInfo.Method = i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.DELETE\n if requestConfiguration != nil {\n requestInfo.Headers.AddAll(requestConfiguration.Headers)\n requestInfo.AddRequestOptions(requestConfiguration.Options)\n }\n return requestInfo, nil\n}", "title": "" }, { "docid": "371e92a70e2e51fec35542532fc6b6c8", "score": "0.45057544", "text": "func (a *DevicesV2OtaApiService) DevicesV2OtaSend(ctx _context.Context, id string, devicev2Otabinaryurl Devicev2Otabinaryurl) (*_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodPut\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/v2/devices/{id}/ota\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"id\"+\"}\", _neturl.QueryEscape(parameterToString(id, \"\")) , -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\", \"application/x-www-form-urlencoded\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = &devicev2Otabinaryurl\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v ModelError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v ModelError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 410 {\n\t\t\tvar v ModelError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 412 {\n\t\t\tvar v ModelError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 500 {\n\t\t\tvar v ModelError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "590149d0575bc100414057d7ea34da9a", "score": "0.4502444", "text": "func (m *UserExperienceAnalyticsBatteryHealthOsPerformanceUserExperienceAnalyticsBatteryHealthOsPerformanceItemRequestBuilder) Delete(ctx context.Context, requestConfiguration *UserExperienceAnalyticsBatteryHealthOsPerformanceUserExperienceAnalyticsBatteryHealthOsPerformanceItemRequestBuilderDeleteRequestConfiguration)(error) {\n requestInfo, err := m.ToDeleteRequestInformation(ctx, requestConfiguration);\n if err != nil {\n return err\n }\n errorMapping := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.ErrorMappings {\n \"4XX\": i20a3050780ee0b0cde0a884a4f35429a20d60067e3bcda382ec5400079147459.CreateODataErrorFromDiscriminatorValue,\n \"5XX\": i20a3050780ee0b0cde0a884a4f35429a20d60067e3bcda382ec5400079147459.CreateODataErrorFromDiscriminatorValue,\n }\n err = m.BaseRequestBuilder.RequestAdapter.SendNoContent(ctx, requestInfo, errorMapping)\n if err != nil {\n return err\n }\n return nil\n}", "title": "" }, { "docid": "7c989261b86ad4f9a2cc16912d09132c", "score": "0.44997075", "text": "func (m *UserExperienceAnalyticsBatteryHealthOsPerformanceUserExperienceAnalyticsBatteryHealthOsPerformanceItemRequestBuilder) ToDeleteRequestInformation(ctx context.Context, requestConfiguration *UserExperienceAnalyticsBatteryHealthOsPerformanceUserExperienceAnalyticsBatteryHealthOsPerformanceItemRequestBuilderDeleteRequestConfiguration)(*i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RequestInformation, error) {\n requestInfo := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.NewRequestInformation()\n requestInfo.UrlTemplate = m.BaseRequestBuilder.UrlTemplate\n requestInfo.PathParameters = m.BaseRequestBuilder.PathParameters\n requestInfo.Method = i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.DELETE\n if requestConfiguration != nil {\n requestInfo.Headers.AddAll(requestConfiguration.Headers)\n requestInfo.AddRequestOptions(requestConfiguration.Options)\n }\n return requestInfo, nil\n}", "title": "" }, { "docid": "c980f9f156ca844ee27b37fda85f4fa4", "score": "0.44988063", "text": "func (c *Client) DecomisionDevice(deviceId string) error {\n\tresp, err := c.client.R().Delete(path.Join(deviceAuthBasePath, \"devices\", deviceId))\n\tif err = checkAndReturnError(resp, err); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "0d03fcfeb02ca5462776b5d401a417bc", "score": "0.4477717", "text": "func (d *IamDriver) Delete_Mfadevice_DryRun(ctx driver.Context, params map[string]interface{}) (interface{}, error) {\n\tif _, ok := params[\"id\"]; !ok {\n\t\treturn nil, errors.New(\"delete mfadevice: missing required params 'id'\")\n\t}\n\n\td.logger.Verbose(\"params dry run: delete mfadevice ok\")\n\treturn fakeDryRunId(\"mfadevice\"), nil\n}", "title": "" }, { "docid": "ebc92cd5ececdf79828196fd00d7e91b", "score": "0.44773278", "text": "func (client *Client) QueryDevice(request *QueryDeviceRequest) (_result *QueryDeviceResponse, _err error) {\n\truntime := &util.RuntimeOptions{}\n\t_result = &QueryDeviceResponse{}\n\t_body, _err := client.QueryDeviceWithOptions(request, runtime)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\t_result = _body\n\treturn _result, _err\n}", "title": "" }, { "docid": "65d0b006bd01fc0dcfbca43a5886f106", "score": "0.4474802", "text": "func (a *API) createDevice(hostname, ipxeScriptURL string) (device *packngo.Device, err error) {\n\tfor tries := apiRetries; tries >= 0; tries-- {\n\t\tvar response *packngo.Response\n\t\tdevice, response, err = a.c.Devices.Create(&packngo.DeviceCreateRequest{\n\t\t\tProjectID: a.opts.Project,\n\t\t\tFacility: a.opts.Facility,\n\t\t\tPlan: a.opts.Plan,\n\t\t\tBillingCycle: \"hourly\",\n\t\t\tHostname: hostname,\n\t\t\tOS: \"custom_ipxe\",\n\t\t\tIPXEScriptURL: ipxeScriptURL,\n\t\t\tTags: []string{\"mantle\"},\n\t\t})\n\t\tif err == nil || response.StatusCode != 500 {\n\t\t\treturn\n\t\t}\n\t\tif tries > 0 {\n\t\t\ttime.Sleep(apiRetryInterval)\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "67d2759ce27b9bd1f65ca591457c98f3", "score": "0.4471947", "text": "func (wm *WoodTrackManager) treeDetailsUpdateByManufacturer(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n if len(args) != 1 {\n logger.Errorf(\"treeDetailsUpdateByManufacturer:Invalid Number of arguments provided for transaction\")\n jsonResp = \"{\\\"Data\\\":\" + strconv.Itoa(len(args)) + \",\\\"ErrorDetails\\\":\\\"Invalid Number of argumnets provided for transaction\\\"}\"\n return shim.Error(jsonResp)\n }\n\n res, certData := wm.getInvokerIdentity(stub)\n if res == false {\n return shim.Error(\"Unauthorized access\")\n }\n\n if certData != \"manufacture.com\" {\n errorKey = args[0]\n errorData = \"Tree Details Updated by Cutter Only Unknown Owner is trying to Update\"\n jsonResp = \"{\\\"Data\\\":\" + errorKey + \",\\\"ErrorDetails\\\":\\\"\" + errorData + \"\\\"}\"\n logger.Error(\"treeDetailsUpdateByManufacturer:\" + string(jsonResp))\n return shim.Error(jsonResp)\n }\n ownername := OwnerNames[certData]\n\n var manufactureObj LogUpdateByManufacturer\n err := json.Unmarshal([]byte(args[0]), &manufactureObj)\n if err != nil {\n errorKey = args[0]\n errorData = \"Invalid json provided as input\"\n jsonResp = \"{\\\"Data\\\":\" + errorKey + \",\\\"ErrorDetails\\\":\\\"\" + errorData + \"\\\"}\"\n logger.Error(\"treeDetailsUpdateByManufacturer:\" + string(jsonResp))\n return shim.Error(jsonResp)\n }\n\n if len(manufactureObj.TreeID) == 0 {\n errorKey = \"undefined\"\n errorData = \"TreeID is Mandatory\"\n jsonResp = \"{\\\"Data\\\":\" + errorKey + \",\\\"ErrorDetails\\\":\\\"\" + errorData + \"\\\"}\"\n logger.Error(string(jsonResp))\n return shim.Error(jsonResp)\n }\n\n timestamp := strconv.FormatInt(time.Now().Unix(), 10)\n woodTrackExist, err := stub.GetState(manufactureObj.TreeID)\n if err != nil {\n errorKey = string(manufactureObj.TreeID)\n replaceErr := strings.Replace(err.Error(), \"\\\"\", \" \", -1)\n errorData = \"GetState is Failed :\" + replaceErr\n jsonResp = \"{\\\"Data\\\":\" + errorKey + \",\\\"ErrorDetails\\\":\\\"\" + errorData + \"\\\"}\"\n logger.Error(\"treeDetailsUpdateByManufacturer:\" + string(jsonResp))\n return shim.Error(jsonResp)\n }\n if woodTrackExist == nil {\n logger.Errorf(\"treeDetailsUpdateByManufacturer:No Existing WoodTrack for TreeID:\" + string(manufactureObj.TreeID))\n jsonResp = \"{\\\"Data\\\":\\\"\" + manufactureObj.TreeID + \"\\\",\\\"ErrorDetails\\\":\\\"No Existing WoodTrack\\\"}\"\n return shim.Error(jsonResp)\n } else {\n woodtrackObj := WoodTrack{}\n err := json.Unmarshal(woodTrackExist, &woodtrackObj)\n if err != nil {\n logger.Errorf(\"treeDetailsUpdateByManufacturer::Existing WoodTrackData unmarshalling Error\" + string(err.Error()))\n replaceErr := strings.Replace(err.Error(), \"\\\"\", \" \", -1)\n errorData = \"Unmarshalling Error :\" + replaceErr\n jsonResp = \"{\\\"Data\\\":\\\"\" + manufactureObj.TreeID + \"\\\",\\\"ErrorDetails\\\":\\\"\" + errorData + \"\\\"}\"\n return shim.Error(jsonResp)\n }\n if woodtrackObj.TreeDetails.Owner == \"TRANSPORTER\" || woodtrackObj.TreeDetails.Owner== \"MANUFACTURER\" {\n if woodtrackObj.TreeLogUpdateByLogistics.LoadingStatus == \"Delivered\" {\n if manufactureObj.Status == \"NotManufactured\" || manufactureObj.Status == \"Manufactured\" {\n woodtrackObj.TreeDetails.Owner = ownername\n\t\t\t\t\t woodtrackObj.TreeLogUpdateByManufacturer.TreeID =manufactureObj.TreeID\n\t\t\t\t\t woodtrackObj.TreeLogUpdateByManufacturer.ProductDimensions=manufactureObj.ProductDimensions\n\t\t\t\t\t woodtrackObj.TreeLogUpdateByManufacturer.Status=manufactureObj.Status\n\t\t\t\t\t woodtrackObj.TreeLogUpdateByManufacturer.QRCode=manufactureObj.QRCode\n woodtrackObj.UpdatedBy = certData\n woodtrackObj.UpdateTs = timestamp\n woodtrackJson, err := json.Marshal(woodtrackObj)\n if err != nil {\n logger.Errorf(\"treeDetailsUpdateByManufacturer: Marshalling Error : \" + string(err.Error()))\n replaceErr := strings.Replace(err.Error(), \"\\\"\", \" \", -1)\n errorData = \"Marshalling Error :\" + replaceErr\n jsonResp = \"{\\\"Data\\\":\" + woodtrackObj.TreeID + \",\\\"ErrorDetails\\\":\\\"\" + errorData + \"\\\"}\"\n return shim.Error(jsonResp)\n }\n err = stub.PutState(manufactureObj.TreeID, woodtrackJson)\n if err != nil {\n logger.Errorf(\"treeDetailsUpdateByManufacturer:PutState is Failed :\" + string(err.Error()))\n jsonResp = \"{\\\"Data\\\":\" + args[0] + \",\\\"ErrorDetails\\\":\\\"Unable to set the WoodTrack\\\"}\"\n return shim.Error(jsonResp)\n }\n logger.Infof(\"treeDetailsUpdateByManufacturer:WoodTrack added succesfull for TreeID is :\" + string(manufactureObj.TreeID))\n } else {\n logger.Errorf(\"treeDetailsUpdateByManufacturer:Invalid Status Either Manufactured/Manufactured\")\n jsonResp = \"{\\\"Data\\\":\" + manufactureObj.TreeID + \",\\\"ErrorDetails\\\":\\\"Invalid Log Status Either Manufactured/NotManufactured\\\"}\"\n return shim.Error(jsonResp)\n }\n } else {\n logger.Errorf(\"treeDetailsUpdateByManufacturer:Failed to Updated Logistics Tree is NotReady To Manufactured/NotManufactured\")\n jsonResp = \"{\\\"Data\\\":\" + manufactureObj.TreeID + \",\\\"ErrorDetails\\\":\\\"Failed to Updated Cutter Tree is NotReady To Manufactured/NotManufactured\\\"}\"\n return shim.Error(jsonResp)\n }\n } else {\n logger.Errorf(\"treeDetailsUpdateByManufacturer:Unauthorized Organization is trying to update Existing TreeDetails\")\n jsonResp = \"{\\\"Data\\\":\" + manufactureObj.TreeID + \",\\\"ErrorDetails\\\":\\\"Only Manufacture can update\\\"}\"\n return shim.Error(jsonResp)\n\n }\n }\n\n resultData := map[string]interface{}{\n \"trxnID\": stub.GetTxID(),\n \"TreeID\": manufactureObj.TreeID,\n \"message\": \"treeDetailsUpdateByManufacturer Updated Successfull\",\n \"data\": manufactureObj,\n }\n respJson, _ := json.Marshal(resultData)\n return shim.Success(respJson)\n\n}", "title": "" }, { "docid": "1403aa56921383bf470182505755d312", "score": "0.4470065", "text": "func (m *ManagedDeviceMobileAppConfigurationItemRequestBuilder) Delete(ctx context.Context, requestConfiguration *ManagedDeviceMobileAppConfigurationItemRequestBuilderDeleteRequestConfiguration)(error) {\n requestInfo, err := m.CreateDeleteRequestInformation(ctx, requestConfiguration);\n if err != nil {\n return err\n }\n errorMapping := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.ErrorMappings {\n \"4XX\": ia572726a95efa92ddd544552cd950653dc691023836923576b2f4bf716cf204a.CreateODataErrorFromDiscriminatorValue,\n \"5XX\": ia572726a95efa92ddd544552cd950653dc691023836923576b2f4bf716cf204a.CreateODataErrorFromDiscriminatorValue,\n }\n err = m.requestAdapter.SendNoContentAsync(ctx, requestInfo, errorMapping)\n if err != nil {\n return err\n }\n return nil\n}", "title": "" }, { "docid": "ff2d73896484cf0add2f8553e5916b26", "score": "0.44657454", "text": "func (a *DeviceManagementActionsApiService) DeviceManagementManagedDevicesCleanWindowsDevice(ctx _context.Context, managedDeviceId string, inlineObject19 InlineObject19) (*_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/deviceManagement/managedDevices({managedDevice-id})/cleanWindowsDevice\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"managedDevice-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", managedDeviceId)), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = &inlineObject19\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 0 {\n\t\t\tvar v OdataError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarHTTPResponse, newErr\n\t\t}\n\t\treturn localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "817693eaf37f0a8ecb257cba21d62fc2", "score": "0.44627264", "text": "func (m *WindowsAutopilotDeviceIdentityItemRequestBuilder) Get(ctx context.Context, requestConfiguration *WindowsAutopilotDeviceIdentityItemRequestBuilderGetRequestConfiguration)(iadcd81124412c61e647227ecfc4449d8bba17de0380ddda76f641a29edf2b242.WindowsAutopilotDeviceIdentityable, error) {\n requestInfo, err := m.CreateGetRequestInformation(ctx, requestConfiguration);\n if err != nil {\n return nil, err\n }\n errorMapping := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.ErrorMappings {\n \"4XX\": ia572726a95efa92ddd544552cd950653dc691023836923576b2f4bf716cf204a.CreateODataErrorFromDiscriminatorValue,\n \"5XX\": ia572726a95efa92ddd544552cd950653dc691023836923576b2f4bf716cf204a.CreateODataErrorFromDiscriminatorValue,\n }\n res, err := m.requestAdapter.SendAsync(ctx, requestInfo, iadcd81124412c61e647227ecfc4449d8bba17de0380ddda76f641a29edf2b242.CreateWindowsAutopilotDeviceIdentityFromDiscriminatorValue, errorMapping)\n if err != nil {\n return nil, err\n }\n if res == nil {\n return nil, nil\n }\n return res.(iadcd81124412c61e647227ecfc4449d8bba17de0380ddda76f641a29edf2b242.WindowsAutopilotDeviceIdentityable), nil\n}", "title": "" }, { "docid": "948f5c416fabe40f3a52a5e538e0c3b4", "score": "0.4461384", "text": "func (m *WindowsAutopilotDeviceIdentitiesItemUnassignUserFromDeviceRequestBuilder) Post(ctx context.Context, requestConfiguration *WindowsAutopilotDeviceIdentitiesItemUnassignUserFromDeviceRequestBuilderPostRequestConfiguration)(error) {\n requestInfo, err := m.ToPostRequestInformation(ctx, requestConfiguration);\n if err != nil {\n return err\n }\n errorMapping := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.ErrorMappings {\n \"4XX\": ia572726a95efa92ddd544552cd950653dc691023836923576b2f4bf716cf204a.CreateODataErrorFromDiscriminatorValue,\n \"5XX\": ia572726a95efa92ddd544552cd950653dc691023836923576b2f4bf716cf204a.CreateODataErrorFromDiscriminatorValue,\n }\n err = m.requestAdapter.SendNoContent(ctx, requestInfo, errorMapping)\n if err != nil {\n return err\n }\n return nil\n}", "title": "" }, { "docid": "06bf51c46d90f48214144a73809a652d", "score": "0.4458595", "text": "func (_Identity *IdentityTransactorSession) Execute(_operationType *big.Int, _to common.Address, _value *big.Int, _data []byte) (*types.Transaction, error) {\n\treturn _Identity.Contract.Execute(&_Identity.TransactOpts, _operationType, _to, _value, _data)\n}", "title": "" }, { "docid": "2a7a98a5051a285179c207a6640283b3", "score": "0.44569817", "text": "func (_Identity *IdentitySession) Execute(_operationType *big.Int, _to common.Address, _value *big.Int, _data []byte) (*types.Transaction, error) {\n\treturn _Identity.Contract.Execute(&_Identity.TransactOpts, _operationType, _to, _value, _data)\n}", "title": "" }, { "docid": "ee081a8150e13c98ef6ce451b3e8313f", "score": "0.44567662", "text": "func (a *DeviceApiService) GetDevicesExecute(r ApiGetDevicesRequest) (MultipleDevice, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue MultipleDevice\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.Ctx, \"DeviceApiService.GetDevices\")\n\tif localBasePath == \"/\" {\n\t localBasePath = \"\"\n\t}\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/v2/devices\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tif r.P_offset != nil {\n\t\tlocalVarQueryParams.Add(\"offset\", parameterToString(*r.P_offset, \"\"))\n\t}\n\tif r.P_limit != nil {\n\t\tlocalVarQueryParams.Add(\"limit\", parameterToString(*r.P_limit, \"\"))\n\t}\n\tif r.P_order != nil {\n\t\tlocalVarQueryParams.Add(\"order\", parameterToString(*r.P_order, \"\"))\n\t}\n\tif r.P_orderBy != nil {\n\t\tlocalVarQueryParams.Add(\"order_by\", parameterToString(*r.P_orderBy, \"\"))\n\t}\n\tif r.P_lang != nil {\n\t\tlocalVarQueryParams.Add(\"lang\", parameterToString(*r.P_lang, \"\"))\n\t}\n\tif r.P_isDev != nil {\n\t\tlocalVarQueryParams.Add(\"is_dev\", parameterToString(*r.P_isDev, \"\"))\n\t}\n\tif r.P_isPublic != nil {\n\t\tlocalVarQueryParams.Add(\"is_public\", parameterToString(*r.P_isPublic, \"\"))\n\t}\n\tif r.P_resourceOwnerId != nil {\n\t\tlocalVarQueryParams.Add(\"resource_owner_id\", parameterToString(*r.P_resourceOwnerId, \"\"))\n\t}\n\tif r.P_name != nil {\n\t\tlocalVarQueryParams.Add(\"name\", parameterToString(*r.P_name, \"\"))\n\t}\n\tif r.P_idNumber != nil {\n\t\tlocalVarQueryParams.Add(\"id_number\", parameterToString(*r.P_idNumber, \"\"))\n\t}\n\tif r.P_definitionId != nil {\n\t\tlocalVarQueryParams.Add(\"definition_id\", parameterToString(*r.P_definitionId, \"\"))\n\t}\n\tif r.P_definitionTag != nil {\n\t\tlocalVarQueryParams.Add(\"definition_tag\", parameterToString(*r.P_definitionTag, \"\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\treq, err := a.client.prepareRequest(r.Ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "fa51feec666bbdb018e67f972c36604d", "score": "0.44510812", "text": "func (a *DeviceApiService) DeviceInterfaceInfoExecute(r ApiDeviceInterfaceInfoRequest) (DeviceInterfaceData, *_nethttp.Response, GenericOpenAPIError) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\texecutionError GenericOpenAPIError\n\t\tlocalVarReturnValue DeviceInterfaceData\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"DeviceApiService.DeviceInterfaceInfo\")\n\tif err != nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, nil, executionError\n\t}\n\n\tlocalVarPath := localBasePath + \"/device/interface/info\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tif r.interfaceId != nil {\n\t\tlocalVarQueryParams.Add(\"interface_id\", parameterToString(*r.interfaceId, \"\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif apiKey, ok := auth[\"HttpHeaderLoginKey\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif apiKey.Prefix != \"\" {\n\t\t\t\t\tkey = apiKey.Prefix + \" \" + apiKey.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = apiKey.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"X-IPM-Username\"] = key\n\t\t\t}\n\t\t}\n\t}\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif apiKey, ok := auth[\"HttpHeaderPasswordKey\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif apiKey.Prefix != \"\" {\n\t\t\t\t\tkey = apiKey.Prefix + \" \" + apiKey.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = apiKey.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"X-IPM-Password\"] = key\n\t\t\t}\n\t\t}\n\t}\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, nil, executionError\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, localVarHTTPResponse, executionError\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = _ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, localVarHTTPResponse, executionError\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v ApiResponse\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, executionError\n}", "title": "" }, { "docid": "e4fed4145bd182b740ef6f12527cdc99", "score": "0.4450632", "text": "func (m *WindowsAutopilotDeviceIdentityItemRequestBuilder) UnassignUserFromDevice()(*i61f366cffe0511c25120182704b917a2c085f27e6fcb6cc1453adc2f2f0c1f45.UnassignUserFromDeviceRequestBuilder) {\n return i61f366cffe0511c25120182704b917a2c085f27e6fcb6cc1453adc2f2f0c1f45.NewUnassignUserFromDeviceRequestBuilderInternal(m.pathParameters, m.requestAdapter);\n}", "title": "" }, { "docid": "cc35c329dbc3d7a82e23015aa1c7d4a6", "score": "0.4447582", "text": "func queryRecepientById(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n \n shim.Success([]byte(\"###################### Entering in queryHospitalById Method ######################\"))\n\n if len(args) != 1{\n return shim.Error(\"@@@@@@@@@@@@@@@@@@@ Incorrect no. of arguments Expecting 1 argument @@@@@@@@@@@@@@@@@@@\")\n }\n\n var recepientId = args[0]\n recepientBytes, _ := stub.GetState(recepientId)\n if recepientBytes == nil {\n return shim.Error(\"@@@@@@@@@@@@@@@@@@@ Unable to locate Recepient @@@@@@@@@@@@@@@@@@@\")\n }\n str := \"[\"+string(recepientBytes)+\"]\"\n \nreturn shim.Success([]byte(str))\n\n}", "title": "" }, { "docid": "cc94d0dc8a7735c698d23df058efd300", "score": "0.4444488", "text": "func queryHospitalById(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n \n shim.Success([]byte(\"###################### Entering in queryHospitalById Method ######################\"))\n\n if len(args) != 1{\n return shim.Error(\"@@@@@@@@@@@@@@@@@@@ Incorrect no. of arguments Expecting 1 argument @@@@@@@@@@@@@@@@@@@\")\n }\n\n var hospitalId = args[0]\n hospitalBytes, _ := stub.GetState(hospitalId)\n if hospitalBytes == nil {\n return shim.Error(\"@@@@@@@@@@@@@@@@@@@ Unable to locate Hospital @@@@@@@@@@@@@@@@@@@\")\n }\n str := \"[\"+string(hospitalBytes)+\"]\"\n \nreturn shim.Success([]byte(str))\n\n}", "title": "" }, { "docid": "f7d6c50728085dce2ecd88da0929b2b8", "score": "0.44415063", "text": "func (m *WindowsAutopilotDeviceIdentityItemRequestBuilder) Patch(ctx context.Context, body iadcd81124412c61e647227ecfc4449d8bba17de0380ddda76f641a29edf2b242.WindowsAutopilotDeviceIdentityable, requestConfiguration *WindowsAutopilotDeviceIdentityItemRequestBuilderPatchRequestConfiguration)(iadcd81124412c61e647227ecfc4449d8bba17de0380ddda76f641a29edf2b242.WindowsAutopilotDeviceIdentityable, error) {\n requestInfo, err := m.CreatePatchRequestInformation(ctx, body, requestConfiguration);\n if err != nil {\n return nil, err\n }\n errorMapping := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.ErrorMappings {\n \"4XX\": ia572726a95efa92ddd544552cd950653dc691023836923576b2f4bf716cf204a.CreateODataErrorFromDiscriminatorValue,\n \"5XX\": ia572726a95efa92ddd544552cd950653dc691023836923576b2f4bf716cf204a.CreateODataErrorFromDiscriminatorValue,\n }\n res, err := m.requestAdapter.SendAsync(ctx, requestInfo, iadcd81124412c61e647227ecfc4449d8bba17de0380ddda76f641a29edf2b242.CreateWindowsAutopilotDeviceIdentityFromDiscriminatorValue, errorMapping)\n if err != nil {\n return nil, err\n }\n if res == nil {\n return nil, nil\n }\n return res.(iadcd81124412c61e647227ecfc4449d8bba17de0380ddda76f641a29edf2b242.WindowsAutopilotDeviceIdentityable), nil\n}", "title": "" }, { "docid": "0059c5b0ee75e08577091ec0c59086fc", "score": "0.4441219", "text": "func (t *M2OChaincode) queryUserTransactionsForAll(stub shim.ChaincodeStubInterface, args []string) peer.Response {\n\tfmt.Println(\"- start queryUserTransactionsForAll\")\n\t//var err error\n\n\tif len(args) != 1 {\n\t\treturn shim.Error(\"Incorrect number of arguments. Expecting 1\")\n\t}\n\n\tM2OUID := strings.ToLower(args[0])\n\tfmt.Println(\"-----------------------------\")\n\tfmt.Println(M2OUID)\n\tresultsIterator, err := stub.GetHistoryForKey(M2OUID)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\tdefer resultsIterator.Close()\n\n\t// buffer is a JSON array containing historic values for the key/value pair\n\tvar buffer bytes.Buffer\n\tbuffer.WriteString(\"[\")\n\n\tbArrayMemberAlreadyWritten := false\n\tfor resultsIterator.HasNext() {\n\t\tresponse, err := resultsIterator.Next()\n\t\tif err != nil {\n\t\t\treturn shim.Error(err.Error())\n\t\t}\n\t\t// Add a comma before array members, suppress it for the first array member\n\t\tif bArrayMemberAlreadyWritten == true {\n\t\t\tbuffer.WriteString(\",\")\n\t\t}\n\t\tbuffer.WriteString(\"{\\\"TxId\\\":\")\n\t\tbuffer.WriteString(\"\\\"\")\n\t\tbuffer.WriteString(response.TxId)\n\t\tbuffer.WriteString(\"\\\"\")\n\n\t\tbuffer.WriteString(\", \\\"Value\\\":\")\n\t\t// if it was a delete operation on given key, then we need to set the\n\t\t//corresponding value null. Else, we will write the response.Value\n\t\t//as-is (as the Value itself a JSON vehiclePart)\n\t\tif response.IsDelete {\n\t\t\tbuffer.WriteString(\"null\")\n\t\t} else {\n\t\t\tbuffer.WriteString(string(response.Value))\n\t\t}\n\n\t\tbuffer.WriteString(\", \\\"Timestamp\\\":\")\n\t\tbuffer.WriteString(\"\\\"\")\n\t\tbuffer.WriteString(time.Unix(response.Timestamp.Seconds, int64(response.Timestamp.Nanos)).String())\n\t\tbuffer.WriteString(\"\\\"\")\n\n\t\tbuffer.WriteString(\", \\\"IsDelete\\\":\")\n\t\tbuffer.WriteString(\"\\\"\")\n\t\tbuffer.WriteString(strconv.FormatBool(response.IsDelete))\n\t\tbuffer.WriteString(\"\\\"\")\n\n\t\tbuffer.WriteString(\"}\")\n\t\tbArrayMemberAlreadyWritten = true\n\t}\n\tbuffer.WriteString(\"]\")\n\n\tfmt.Printf(\"- getHistoryForRecord returning:\\n%s\\n\", buffer.String())\n\n\treturn shim.Success(buffer.Bytes())\n\t\n\n\treturn shim.Success(nil)\n}", "title": "" }, { "docid": "3d54b4cfa9f4f716694bbe7cd6100892", "score": "0.4439024", "text": "func (r *ImportedDeviceIdentityRequest) Delete(ctx context.Context) error {\n\treturn r.JSONRequest(ctx, \"DELETE\", \"\", nil, nil)\n}", "title": "" }, { "docid": "93dc685ae4efc6035ee6af8733b1420f", "score": "0.44325617", "text": "func (m *UserExperienceAnalyticsWorkFromAnywhereMetricsUserExperienceAnalyticsWorkFromAnywhereMetricItemRequestBuilder) Delete(ctx context.Context, requestConfiguration *UserExperienceAnalyticsWorkFromAnywhereMetricsUserExperienceAnalyticsWorkFromAnywhereMetricItemRequestBuilderDeleteRequestConfiguration)(error) {\n requestInfo, err := m.ToDeleteRequestInformation(ctx, requestConfiguration);\n if err != nil {\n return err\n }\n errorMapping := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.ErrorMappings {\n \"4XX\": ia572726a95efa92ddd544552cd950653dc691023836923576b2f4bf716cf204a.CreateODataErrorFromDiscriminatorValue,\n \"5XX\": ia572726a95efa92ddd544552cd950653dc691023836923576b2f4bf716cf204a.CreateODataErrorFromDiscriminatorValue,\n }\n err = m.BaseRequestBuilder.RequestAdapter.SendNoContent(ctx, requestInfo, errorMapping)\n if err != nil {\n return err\n }\n return nil\n}", "title": "" }, { "docid": "379f58eab3c369e0677d3b8d569b9996", "score": "0.44200534", "text": "func (m *UserExperienceAnalyticsBatteryHealthOsPerformanceUserExperienceAnalyticsBatteryHealthOsPerformanceItemRequestBuilder) ToGetRequestInformation(ctx context.Context, requestConfiguration *UserExperienceAnalyticsBatteryHealthOsPerformanceUserExperienceAnalyticsBatteryHealthOsPerformanceItemRequestBuilderGetRequestConfiguration)(*i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RequestInformation, error) {\n requestInfo := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.NewRequestInformation()\n requestInfo.UrlTemplate = m.BaseRequestBuilder.UrlTemplate\n requestInfo.PathParameters = m.BaseRequestBuilder.PathParameters\n requestInfo.Method = i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.GET\n requestInfo.Headers.Add(\"Accept\", \"application/json\")\n if requestConfiguration != nil {\n if requestConfiguration.QueryParameters != nil {\n requestInfo.AddQueryParameters(*(requestConfiguration.QueryParameters))\n }\n requestInfo.Headers.AddAll(requestConfiguration.Headers)\n requestInfo.AddRequestOptions(requestConfiguration.Options)\n }\n return requestInfo, nil\n}", "title": "" }, { "docid": "b936425a45b7c07388d9c54c06a7683f", "score": "0.441926", "text": "func (client *Client) BatchRegisterDeviceWithOptions(request *BatchRegisterDeviceRequest, runtime *util.RuntimeOptions) (_result *BatchRegisterDeviceResponse, _err error) {\n\t_err = util.ValidateModel(request)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\tquery := map[string]interface{}{}\n\tif !tea.BoolValue(util.IsUnset(request.Count)) {\n\t\tquery[\"Count\"] = request.Count\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.IotInstanceId)) {\n\t\tquery[\"IotInstanceId\"] = request.IotInstanceId\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.ProductKey)) {\n\t\tquery[\"ProductKey\"] = request.ProductKey\n\t}\n\n\treq := &openapi.OpenApiRequest{\n\t\tQuery: openapiutil.Query(query),\n\t}\n\tparams := &openapi.Params{\n\t\tAction: tea.String(\"BatchRegisterDevice\"),\n\t\tVersion: tea.String(\"2018-01-20\"),\n\t\tProtocol: tea.String(\"HTTPS\"),\n\t\tPathname: tea.String(\"/\"),\n\t\tMethod: tea.String(\"POST\"),\n\t\tAuthType: tea.String(\"AK\"),\n\t\tStyle: tea.String(\"RPC\"),\n\t\tReqBodyType: tea.String(\"formData\"),\n\t\tBodyType: tea.String(\"json\"),\n\t}\n\t_result = &BatchRegisterDeviceResponse{}\n\t_body, _err := client.CallApi(params, req, runtime)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\t_err = tea.Convert(_body, &_result)\n\treturn _result, _err\n}", "title": "" }, { "docid": "cf24c1846beaaaf0244dd30a69a93a61", "score": "0.44176394", "text": "func main() {\n\tif len(os.Args) != 5 {\n\t\tfmt.Printf(\"Usage: <IP> <username> <password> <BIOS file>\\n\")\n\t\tos.Exit(1)\n\t}\n\taddr := os.Args[1]\n\tif !strings.HasPrefix(addr, \":623\") {\n\t\taddr = addr + \":623\"\n\t}\n\tc, err := ipmigo.NewClient(ipmigo.Arguments{\n\t\tVersion: ipmigo.V2_0,\n\t\tAddress: addr,\n\t\tTimeout: 30 * time.Second,\n\t\tRetries: 1,\n\t\tUsername: os.Args[2],\n\t\tPassword: os.Args[3],\n\t\tCipherSuiteID: 3,\n\t})\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn\n\t}\n\n\tif err := c.Open(); err != nil {\n\t\tfmt.Println(err)\n\t\treturn\n\t}\n\tdefer c.Close()\n\n\tcmdProductID := &ipmigo.SupermicroOEMProductIDCommand{}\n\tif err := c.Execute(cmdProductID); err != nil {\n\t\tfmt.Println(err)\n\t\treturn\n\t}\n\tfmt.Printf(\"Remote Product ID: 0x%x\\n\", cmdProductID.BoardModelID)\n\tcmdVer := &ipmigo.SupermicroOEMBIOSVersionCommand{}\n\tif err := c.Execute(cmdVer); err != nil {\n\t\tfmt.Println(err)\n\t\treturn\n\t}\n\tfmt.Printf(\"BIOS Version: %s\\n\", cmdVer.BIOSVersion)\n\tcmdDate := &ipmigo.SupermicroOEMBIOSDate2Command{}\n\tif err := c.Execute(cmdDate); err != nil {\n\t\tfmt.Println(err)\n\t\treturn\n\t}\n\tfmt.Printf(\"BIOS Date: %s\\n\", cmdDate.BIOSDate)\n\n\trom, err := ioutil.ReadFile(os.Args[4])\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn\n\t}\n\tfmt.Printf(\"Writing new ROM with size: %d\\n\", len(rom))\n\n\terr = supermicroBiosUpdate(c, rom)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "275eb4910da0066b59e36d95c0abe0e8", "score": "0.4412681", "text": "func DeviceAuthorization(as authorizationserver.AuthorizationServer) http.Handler {\n\ttype response struct {\n\t\tDeviceCode string `json:\"device_code\"`\n\t\tUserCode string `json:\"user_code\"`\n\t\tVerificationURI string `json:\"verification_uri\"`\n\t\tExpiresIn uint64 `json:\"expires_in\"`\n\t\tInterval uint64 `json:\"interval\"`\n\t}\n\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t// Only POST verb\n\t\tif r.Method != http.MethodPost {\n\t\t\twithError(w, r, http.StatusMethodNotAllowed, rfcerrors.InvalidRequest().Build())\n\t\t\treturn\n\t\t}\n\n\t\t// Parameters\n\t\tvar (\n\t\t\tq = r.URL.Query()\n\t\t\tctx = r.Context()\n\t\t\tclientIDRaw = q.Get(\"client_id\")\n\t\t\tscopeRaw = q.Get(\"scope\")\n\t\t\taudienceRaw = q.Get(\"audience\")\n\t\t)\n\n\t\t// Prepare request\n\t\treq := &corev1.DeviceAuthorizationRequest{\n\t\t\tClientId: clientIDRaw,\n\t\t}\n\t\tif scopeRaw != \"\" {\n\t\t\treq.Scope = &wrapperspb.StringValue{\n\t\t\t\tValue: scopeRaw,\n\t\t\t}\n\t\t}\n\t\tif audienceRaw != \"\" {\n\t\t\treq.Audience = &wrapperspb.StringValue{\n\t\t\t\tValue: audienceRaw,\n\t\t\t}\n\t\t}\n\n\t\t// Send to reactor\n\t\tres, err := as.Do(ctx, req)\n\t\tauthRes, ok := res.(*corev1.DeviceAuthorizationResponse)\n\t\tif !ok {\n\t\t\twithError(w, r, http.StatusInternalServerError, rfcerrors.ServerError().Build())\n\t\t\treturn\n\t\t}\n\t\tif err != nil {\n\t\t\tlog.Println(\"unable to process device authorization request:\", err)\n\t\t\twithError(w, r, http.StatusBadRequest, authRes.Error)\n\t\t\treturn\n\t\t}\n\n\t\t// Send json reponse\n\t\twithJSON(w, r, http.StatusOK, &response{\n\t\t\tDeviceCode: authRes.DeviceCode,\n\t\t\tUserCode: authRes.UserCode,\n\t\t\tVerificationURI: fmt.Sprintf(\"%s/device\", as.Issuer()),\n\t\t\tExpiresIn: authRes.ExpiresIn,\n\t\t\tInterval: authRes.Interval,\n\t\t})\n\t})\n}", "title": "" }, { "docid": "a6a6b0e4102f649576c79e9aa191161d", "score": "0.440949", "text": "func (m *ItemAuthenticationOperationsLongRunningOperationItemRequestBuilder) ToGetRequestInformation(ctx context.Context, requestConfiguration *ItemAuthenticationOperationsLongRunningOperationItemRequestBuilderGetRequestConfiguration)(*i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RequestInformation, error) {\n requestInfo := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.NewRequestInformation()\n requestInfo.UrlTemplate = m.BaseRequestBuilder.UrlTemplate\n requestInfo.PathParameters = m.BaseRequestBuilder.PathParameters\n requestInfo.Method = i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.GET\n requestInfo.Headers.Add(\"Accept\", \"application/json\")\n if requestConfiguration != nil {\n if requestConfiguration.QueryParameters != nil {\n requestInfo.AddQueryParameters(*(requestConfiguration.QueryParameters))\n }\n requestInfo.Headers.AddAll(requestConfiguration.Headers)\n requestInfo.AddRequestOptions(requestConfiguration.Options)\n }\n return requestInfo, nil\n}", "title": "" }, { "docid": "c48d0c4ecb0d42f09b06dd4250cb821c", "score": "0.44071963", "text": "func RegisterDevice(e *common.Environment, name, credential string, r *http.Request) error {\n\t// Build guest user model\n\tguest, err := models.GetUserByUsername(e, credential)\n\tif err != nil {\n\t\te.Log.WithFields(verbose.Fields{\n\t\t\t\"error\": err,\n\t\t\t\"package\": \"guest\",\n\t\t\t\"username\": credential,\n\t\t}).Error(\"Error getting guest\")\n\t\treturn err\n\t}\n\tdefer guest.Release()\n\tguest.DeviceLimit = models.UserDeviceLimit(e.Config.Guest.DeviceLimit)\n\tguest.DeviceExpiration = &models.UserDeviceExpiration{}\n\n\tswitch e.Config.Guest.DeviceExpirationType {\n\tcase \"never\":\n\t\tguest.DeviceExpiration.Mode = models.UserDeviceExpirationNever\n\tcase \"date\":\n\t\tguest.DeviceExpiration.Mode = models.UserDeviceExpirationSpecific\n\t\texpTime, err := time.ParseInLocation(common.TimeFormat, e.Config.Guest.DeviceExpiration, time.Local)\n\t\tif err != nil {\n\t\t\te.Log.WithFields(verbose.Fields{\n\t\t\t\t\"error\": err,\n\t\t\t\t\"package\": \"guest\",\n\t\t\t}).Error(\"Error parsing time\")\n\t\t\treturn errors.New(\"Internal Server Error\")\n\t\t}\n\t\tguest.DeviceExpiration.Value = expTime.Unix()\n\tcase \"duration\":\n\t\tguest.DeviceExpiration.Mode = models.UserDeviceExpirationDuration\n\t\tdur, err := time.ParseDuration(e.Config.Guest.DeviceExpiration)\n\t\tif err != nil {\n\t\t\te.Log.WithFields(verbose.Fields{\n\t\t\t\t\"error\": err,\n\t\t\t\t\"package\": \"guest\",\n\t\t\t}).Error(\"Error parsing time\")\n\t\t\treturn errors.New(\"Internal Server Error\")\n\t\t}\n\t\tguest.DeviceExpiration.Value = int64(dur / time.Second)\n\tcase \"daily\":\n\t\tvar err error\n\t\tguest.DeviceExpiration.Mode = models.UserDeviceExpirationDaily\n\t\tguest.DeviceExpiration.Value, err = common.ParseTime(e.Config.Guest.DeviceExpiration)\n\t\tif err != nil {\n\t\t\te.Log.WithFields(verbose.Fields{\n\t\t\t\t\"error\": err,\n\t\t\t\t\"package\": \"guest\",\n\t\t\t}).Error(\"Error parsing time\")\n\t\t\treturn errors.New(\"Internal Server Error\")\n\t\t}\n\tdefault:\n\t\treturn errors.New(e.Config.Guest.DeviceExpirationType + \" is not a valid device expiration type\")\n\t}\n\n\t// Get and enforce the device limit\n\tdeviceCount, err := models.GetDeviceCountForUser(e, guest)\n\tif err != nil {\n\t\te.Log.WithFields(verbose.Fields{\n\t\t\t\"package\": \"guest\",\n\t\t\t\"error\": err,\n\t\t}).Error(\"Error getting device count\")\n\t}\n\tif guest.DeviceLimit != models.UserDeviceLimitUnlimited && deviceCount >= int(guest.DeviceLimit) {\n\t\treturn errors.New(\"Device limit reached\")\n\t}\n\n\t// Get MAC address\n\tvar mac net.HardwareAddr\n\tip := common.GetIPFromContext(r)\n\n\t// Automatic registration\n\tlease, err := models.GetLeaseStore(e).GetLeaseByIP(ip)\n\tif err != nil {\n\t\te.Log.WithFields(verbose.Fields{\n\t\t\t\"error\": err,\n\t\t\t\"package\": \"guest\",\n\t\t\t\"ip\": ip.String(),\n\t\t}).Error(\"Error getting MAC for IP\")\n\t\treturn errors.New(\"Internal Server Error\")\n\t} else if lease.ID == 0 {\n\t\te.Log.WithFields(verbose.Fields{\n\t\t\t\"package\": \"guest\",\n\t\t\t\"ip\": ip.String(),\n\t\t}).Notice(\"Attempted auto reg from non-leased device\")\n\t\treturn errors.New(\"Error detecting MAC address\")\n\t}\n\tmac = lease.MAC\n\n\t// Get device from database\n\tdevice, err := models.GetDeviceByMAC(e, mac)\n\tif err != nil {\n\t\te.Log.WithFields(verbose.Fields{\n\t\t\t\"error\": err,\n\t\t\t\"package\": \"guest\",\n\t\t\t\"mac\": mac.String(),\n\t\t}).Error(\"Error getting device\")\n\t\treturn errors.New(\"Database error\")\n\t}\n\n\t// Check if device is already registered\n\tif device.ID != 0 {\n\t\te.Log.WithFields(verbose.Fields{\n\t\t\t\"package\": \"guest\",\n\t\t\t\"mac\": mac.String(),\n\t\t\t\"username\": credential,\n\t\t}).Notice(\"Attempted duplicate registration\")\n\t\treturn errors.New(\"This device is already registered\")\n\t}\n\n\t// Validate platform, we don't want someone to submit an inappropiate value\n\tplatform := common.ParseUserAgent(r.UserAgent())\n\n\t// Fill in device information\n\tdevice.Username = credential\n\tdevice.Description = \"Guest - \" + name\n\tdevice.RegisteredFrom = ip\n\tdevice.Platform = platform\n\tdevice.Expires = guest.DeviceExpiration.NextExpiration(e, time.Now())\n\tdevice.DateRegistered = time.Now()\n\tdevice.LastSeen = time.Now()\n\tdevice.UserAgent = r.UserAgent()\n\n\t// Save new device\n\tif err := device.Save(); err != nil {\n\t\te.Log.WithFields(verbose.Fields{\n\t\t\t\"error\": err,\n\t\t\t\"package\": \"guest\",\n\t\t}).Error(\"Error saving device\")\n\t\treturn errors.New(\"Error registering device\")\n\t}\n\te.Log.WithFields(verbose.Fields{\n\t\t\"package\": \"guest\",\n\t\t\"mac\": mac.String(),\n\t\t\"name\": name,\n\t\t\"username\": credential,\n\t\t\"action\": \"register-guest-device\",\n\t}).Info(\"Device registered\")\n\treturn nil\n}", "title": "" }, { "docid": "79efda30634bf2e678c1eadec672eeda", "score": "0.44038546", "text": "func toggleDeviceHandler(w http.ResponseWriter, r *http.Request) {\n\n\terr := r.ParseForm()\n\tif err != nil {\n\t\t// Handle error\n\t\tfmt.Println(\"ParseForm error: \", err)\n\t}\n\n\t//fmt.Println(\"Form: \", r.PostForm)\n\t//TODO: user input for geogram PIN\n\tdeviceType := strings.Trim(r.PostForm.Get(\"deviceType\"), \" \")\n\tdeviceId := strings.Trim(r.PostForm.Get(\"deviceId\"), \" \")\n\tdeviceCommand := strings.Trim(r.PostForm.Get(\"deviceCommand\"), \" \")\n\n\t// Check for any empty form inputs\n\tif deviceType == \"\" || deviceId == \"\" || deviceCommand == \"\" {\n\t\t// Send back error response, input field is empty\n\n\t\treturn\n\t}\n\tresCh := make(chan []byte)\n\tbuf := CustomProtocol.CreatePayload(deviceId)\n\t//fmt.Println(\"Device type: \", deviceType)\n\n\tswitch deviceType {\n\tcase \"gps\":\n\t\t//todo Default PIN-NUMBER for Geogram One\n\n\t\tbuf = append(buf, CustomProtocol.CreatePayload(\"1234\")...)\n\t\tif deviceCommand == \"1\" {\n\t\t\treqToDB := &CustomProtocol.Request{Id: CustomProtocol.AssignRequestId(), Destination: CustomProtocol.Database, Source: CustomProtocol.Web,\n\t\t\t\tOpCode: CustomProtocol.ActivateGPS, Payload: buf, Response: resCh}\n\t\t\ttoServer <- reqToDB\n\t\t\t// Default interval 140 seconds\n\t\t\tbuf = append(buf, CustomProtocol.CreatePayload(\"140\")...)\n\t\t\treqToDevice := &CustomProtocol.Request{Id: CustomProtocol.AssignRequestId(), Destination: CustomProtocol.DeviceGPS, Source: CustomProtocol.Web,\n\t\t\t\tOpCode: CustomProtocol.ActivateIntervalGps, Payload: buf, Response: nil}\n\t\t\ttoServer <- reqToDevice\n\t\t\t//sleep command\n\t\t\treqToDevice2 := &CustomProtocol.Request{Id: CustomProtocol.AssignRequestId(), Destination: CustomProtocol.DeviceGPS, Source: CustomProtocol.Web,\n\t\t\t\tOpCode: CustomProtocol.SleepGeogram, Payload: buf, Response: nil}\n\t\t\ttoServer <- reqToDevice2\n\t\t} else {\n\t\t\t// send to database to flag not stolen\n\t\t\treqToDB := &CustomProtocol.Request{Id: CustomProtocol.AssignRequestId(), Destination: CustomProtocol.Database, Source: CustomProtocol.Web,\n\t\t\t\tOpCode: CustomProtocol.FlagNotStolen, Payload: buf, Response: resCh}\n\t\t\ttoServer <- reqToDB\n\t\t\t// Deactivate command to device\n\t\t\t// end tracking\n\t\t\tbuf = append(buf, CustomProtocol.CreatePayload(\"0\")...)\n\t\t\treqToDevice := &CustomProtocol.Request{Id: CustomProtocol.AssignRequestId(), Destination: CustomProtocol.DeviceGPS, Source: CustomProtocol.Web,\n\t\t\t\tOpCode: CustomProtocol.ActivateIntervalGps, Payload: buf, Response: nil}\n\t\t\ttoServer <- reqToDevice\n\t\t}\n\tcase \"laptop\":\n\t\tif deviceCommand == \"1\" {\n\t\t\treq := &CustomProtocol.Request{Id: CustomProtocol.AssignRequestId(), Destination: CustomProtocol.Database, Source: CustomProtocol.Web,\n\t\t\t\tOpCode: CustomProtocol.FlagStolen, Payload: buf, Response: resCh}\n\t\t\ttoServer <- req\n\t\t} else {\n\t\t\t// send to database to flag not stolen\n\t\t\treqToDB := &CustomProtocol.Request{Id: CustomProtocol.AssignRequestId(), Destination: CustomProtocol.Database, Source: CustomProtocol.Web,\n\t\t\t\tOpCode: CustomProtocol.FlagNotStolen, Payload: buf, Response: resCh}\n\t\t\ttoServer <- reqToDB\n\n\t\t\treqToDeviceHub := &CustomProtocol.Request{Id: CustomProtocol.AssignRequestId(), Destination: CustomProtocol.DeviceLaptop, Source: CustomProtocol.Web,\n\t\t\t\tOpCode: CustomProtocol.FlagNotStolen, Payload: buf, Response: resCh}\n\t\t\ttoServer <- reqToDeviceHub\n\t\t}\n\tdefault:\n\t}\n\n}", "title": "" }, { "docid": "92ee3d8ffaec7c58c2f4eb93a9356c13", "score": "0.44023183", "text": "func (m *EntitlementManagementRequestBuilder) Delete(ctx context.Context, requestConfiguration *EntitlementManagementRequestBuilderDeleteRequestConfiguration)(error) {\n requestInfo, err := m.ToDeleteRequestInformation(ctx, requestConfiguration);\n if err != nil {\n return err\n }\n errorMapping := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.ErrorMappings {\n \"4XX\": ia572726a95efa92ddd544552cd950653dc691023836923576b2f4bf716cf204a.CreateODataErrorFromDiscriminatorValue,\n \"5XX\": ia572726a95efa92ddd544552cd950653dc691023836923576b2f4bf716cf204a.CreateODataErrorFromDiscriminatorValue,\n }\n err = m.BaseRequestBuilder.RequestAdapter.SendNoContent(ctx, requestInfo, errorMapping)\n if err != nil {\n return err\n }\n return nil\n}", "title": "" }, { "docid": "f1ad0cb12bc31d38bdf8dfad085a5164", "score": "0.44017643", "text": "func (c CvpRestAPI) DeleteDevice(deviceMac string) error {\n\terr := c.DeleteDevices([]string{deviceMac})\n\treturn errors.Wrapf(err, \"DeleteDevice:\")\n}", "title": "" }, { "docid": "80741fc26e9e9fd25ceeb2aa9fad62a7", "score": "0.44012147", "text": "func (m *ComanagedDevicesItemWindowsProtectionStateRequestBuilder) Delete(ctx context.Context, requestConfiguration *ComanagedDevicesItemWindowsProtectionStateRequestBuilderDeleteRequestConfiguration)(error) {\n requestInfo, err := m.ToDeleteRequestInformation(ctx, requestConfiguration);\n if err != nil {\n return err\n }\n errorMapping := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.ErrorMappings {\n \"4XX\": i20a3050780ee0b0cde0a884a4f35429a20d60067e3bcda382ec5400079147459.CreateODataErrorFromDiscriminatorValue,\n \"5XX\": i20a3050780ee0b0cde0a884a4f35429a20d60067e3bcda382ec5400079147459.CreateODataErrorFromDiscriminatorValue,\n }\n err = m.BaseRequestBuilder.RequestAdapter.SendNoContent(ctx, requestInfo, errorMapping)\n if err != nil {\n return err\n }\n return nil\n}", "title": "" }, { "docid": "aec3d91e67f231c1a204215af86217f8", "score": "0.4389212", "text": "func (m *EntitlementManagementRequestBuilder) Delete(ctx context.Context, requestConfiguration *EntitlementManagementRequestBuilderDeleteRequestConfiguration)(error) {\n requestInfo, err := m.ToDeleteRequestInformation(ctx, requestConfiguration);\n if err != nil {\n return err\n }\n errorMapping := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.ErrorMappings {\n \"4XX\": i20a3050780ee0b0cde0a884a4f35429a20d60067e3bcda382ec5400079147459.CreateODataErrorFromDiscriminatorValue,\n \"5XX\": i20a3050780ee0b0cde0a884a4f35429a20d60067e3bcda382ec5400079147459.CreateODataErrorFromDiscriminatorValue,\n }\n err = m.BaseRequestBuilder.RequestAdapter.SendNoContent(ctx, requestInfo, errorMapping)\n if err != nil {\n return err\n }\n return nil\n}", "title": "" }, { "docid": "34b72a708197ff969cd0703c33efc782", "score": "0.43855372", "text": "func TestRegisterDeviceToUser(t *testing.T) {\n\tSetupTestDB(t)\n\n\terr := service.RegisterDeviceToUser(\"test_token\", \"android\", \"test_user\")\n\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\tdevices, err := service.GetUserDevices(\"test_user\")\n\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\texpected_devices := []string{\"test_arn\", \"\"}\n\n\tif !reflect.DeepEqual(devices, expected_devices) {\n\t\tt.Errorf(\"Wrong topics.\\nExpected %v\\ngot %v\\n\", expected_devices, devices)\n\t}\n\n\t// Test deduplication\n\terr = service.RegisterDeviceToUser(\"test_token\", \"android\", \"test_user\")\n\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\tdevices, err = service.GetUserDevices(\"test_user\")\n\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\texpected_devices = []string{\"test_arn\", \"\"}\n\n\tif !reflect.DeepEqual(devices, expected_devices) {\n\t\tt.Errorf(\"Wrong topics.\\nExpected %v\\ngot %v\\n\", expected_devices, devices)\n\t}\n\n\tCleanupTestDB(t)\n}", "title": "" }, { "docid": "4c6feb566042a82ee877a929e267f428", "score": "0.43842608", "text": "func (p *Provider) DeviceDelete(instanceID string, deviceID string) error {\n\t// Create an aws ops object\n\tops := awsops.NewEc2Storage(instanceID, p.ec2c)\n\n\t// Detach volume\n\tif err := ops.Detach(deviceID); err != nil {\n\t\treturn fmt.Errorf(\"Failed to detach volume %s from instance %s: %v\",\n\t\t\tdeviceID,\n\t\t\tinstanceID,\n\t\t\terr)\n\t}\n\n\t// Delete volume\n\tif err := ops.Delete(deviceID); err != nil {\n\t\treturn fmt.Errorf(\"Failed to delete volume %s: %v\",\n\t\t\tdeviceID,\n\t\t\terr)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "6f5608e41a3b5f613969395aae19d8b5", "score": "0.43829", "text": "func (me *REMOTERESTORE_IMPL) DeleteStopRemoteVaultSearchJob (\r\n body *models.SearchJobStopRequest) (error) {\r\n//validating required parameters\r\n if (body == nil){\r\n return errors.New(\"The parameter 'body' is a required parameter and cannot be nil.\")\r\n} //the endpoint path uri\r\n _pathUrl := \"/public/remoteVaults/searchJobs\"\r\n\r\n //variable to hold errors\r\n var err error = nil\r\n //the base uri for api requests\r\n _queryBuilder := configuration.GetBaseURI(configuration.DEFAULT_HOST,me.config);\r\n\r\n //prepare query string for API call\r\n _queryBuilder = _queryBuilder + _pathUrl\r\n\r\n //validate and preprocess url\r\n _queryBuilder, err = apihelper.CleanUrl(_queryBuilder)\r\n if err != nil {\r\n //error in url validation or cleaning\r\n return err\r\n }\r\n if me.config.AccessToken() == nil {\r\n return errors.New(\"Access Token not set. Please authorize the client using client.Authorize()\");\r\n }\r\n //prepare headers for the outgoing request\r\n headers := map[string]interface{} {\r\n \"user-agent\" : \"cohesity-Go-sdk-6.2.0\",\r\n \"content-type\" : \"application/json; charset=utf-8\",\r\n \"Authorization\" : fmt.Sprintf(\"%s %s\",*me.config.AccessToken().TokenType, *me.config.AccessToken().AccessToken),\r\n }\r\n\r\n //prepare API request\r\n _request := unirest.Delete(_queryBuilder, headers, body)\r\n //and invoke the API call request to fetch the response\r\n _response, err := unirest.AsString(_request,me.config.SkipSSL());\r\n if err != nil {\r\n //error in API invocation\r\n return err\r\n }\r\n\r\n //error handling using HTTP status codes\r\n if (_response.Code == 0) {\r\n err = apihelper.NewAPIError(\"Error\", _response.Code, _response.RawBody)\r\n } else if (_response.Code < 200) || (_response.Code > 206) { //[200,206] = HTTP OK\r\n err = apihelper.NewAPIError(\"HTTP Response Not OK\", _response.Code, _response.RawBody)\r\n }\r\n if(err != nil) {\r\n //error detected in status code validation\r\n return err\r\n }\r\n\r\n //returning the response\r\n return nil\r\n\r\n}", "title": "" }, { "docid": "a71cb55fc46b497e0dfe6040f379f973", "score": "0.43794677", "text": "func (a *DeviceApiService) UpdateDeviceExecute(r ApiUpdateDeviceRequest) (SingleDevice, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodPatch\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue SingleDevice\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.Ctx, \"DeviceApiService.UpdateDevice\")\n\tif localBasePath == \"/\" {\n\t localBasePath = \"\"\n\t}\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/v2/devices/{device_id}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"device_id\"+\"}\", _neturl.PathEscape(parameterToString(r.P_deviceId, \"\")) , -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\tif r.P_deviceUpdateRequest == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"deviceUpdateRequest is required and must be specified\")\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = r.P_deviceUpdateRequest\n\treq, err := a.client.prepareRequest(r.Ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "6e8ef043a3a5595f74d45d375e26ea5e", "score": "0.43769836", "text": "func (a *DeviceManagementActionsApiService) DeviceManagementManagedDevicesWipe(ctx _context.Context, managedDeviceId string, inlineObject23 InlineObject23) (*_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/deviceManagement/managedDevices({managedDevice-id})/wipe\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"managedDevice-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", managedDeviceId)), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = &inlineObject23\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 0 {\n\t\t\tvar v OdataError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarHTTPResponse, newErr\n\t\t}\n\t\treturn localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "169eab20f152271512d2771d2ece9837", "score": "0.4367291", "text": "func (r *DeviceAppManagementRequest) Delete(ctx context.Context) error {\n\treturn r.JSONRequest(ctx, \"DELETE\", \"\", nil, nil)\n}", "title": "" }, { "docid": "5e38c9a953ea2e201b5fd41ecf0337b6", "score": "0.43629283", "text": "func (m *ComanagedDevicesManagedDeviceItemRequestBuilder) ToGetRequestInformation(ctx context.Context, requestConfiguration *ComanagedDevicesManagedDeviceItemRequestBuilderGetRequestConfiguration)(*i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RequestInformation, error) {\n requestInfo := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.NewRequestInformation()\n requestInfo.UrlTemplate = m.BaseRequestBuilder.UrlTemplate\n requestInfo.PathParameters = m.BaseRequestBuilder.PathParameters\n requestInfo.Method = i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.GET\n requestInfo.Headers.Add(\"Accept\", \"application/json\")\n if requestConfiguration != nil {\n if requestConfiguration.QueryParameters != nil {\n requestInfo.AddQueryParameters(*(requestConfiguration.QueryParameters))\n }\n requestInfo.Headers.AddAll(requestConfiguration.Headers)\n requestInfo.AddRequestOptions(requestConfiguration.Options)\n }\n return requestInfo, nil\n}", "title": "" }, { "docid": "d53e36823629fb5f7fd8ad91afc73e1a", "score": "0.43628767", "text": "func DeviceGenerateMnemonic(deviceType DeviceType, wordCount uint32, usePassphrase bool) {\n\n\tdev, err := getDevice(deviceType)\n\tif err != nil {\n\t\tlog.Panicf(err.Error())\n\t\treturn\n\t}\n\tdefer dev.Close()\n\n\tskycoinGenerateMnemonic := &messages.GenerateMnemonic{\n\t\tPassphraseProtection: proto.Bool(usePassphrase),\n\t\tWordCount: proto.Uint32(wordCount),\n\t}\n\n\tdata, _ := proto.Marshal(skycoinGenerateMnemonic)\n\tchunks := makeTrezorMessage(data, messages.MessageType_MessageType_GenerateMnemonic)\n\n\tmsg, err := sendToDevice(dev, chunks)\n\tif err != nil {\n\t\tlog.Panicf(err.Error())\n\t\treturn\n\t}\n\n\tif msg.Kind == uint16(messages.MessageType_MessageType_ButtonRequest) {\n\t\tmsg = deviceButtonAck(dev)\n\t}\n\tlog.Println(DecodeSuccessOrFailMsg(msg.Kind, msg.Data))\n}", "title": "" }, { "docid": "f38c74f3380040137b5d3c3dcf4d44db", "score": "0.43588176", "text": "func (a *DeviceApiService) DeviceDeviceListExecute(r ApiDeviceDeviceListRequest) (DeviceDeviceData, *_nethttp.Response, GenericOpenAPIError) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\texecutionError GenericOpenAPIError\n\t\tlocalVarReturnValue DeviceDeviceData\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"DeviceApiService.DeviceDeviceList\")\n\tif err != nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, nil, executionError\n\t}\n\n\tlocalVarPath := localBasePath + \"/device/device/list\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tif r.orderby != nil {\n\t\tlocalVarQueryParams.Add(\"orderby\", parameterToString(*r.orderby, \"\"))\n\t}\n\tif r.where != nil {\n\t\tlocalVarQueryParams.Add(\"where\", parameterToString(*r.where, \"\"))\n\t}\n\tif r.limit != nil {\n\t\tlocalVarQueryParams.Add(\"limit\", parameterToString(*r.limit, \"\"))\n\t}\n\tif r.offset != nil {\n\t\tlocalVarQueryParams.Add(\"offset\", parameterToString(*r.offset, \"\"))\n\t}\n\tif r.tags != nil {\n\t\tlocalVarQueryParams.Add(\"tags\", parameterToString(*r.tags, \"\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif apiKey, ok := auth[\"HttpHeaderLoginKey\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif apiKey.Prefix != \"\" {\n\t\t\t\t\tkey = apiKey.Prefix + \" \" + apiKey.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = apiKey.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"X-IPM-Username\"] = key\n\t\t\t}\n\t\t}\n\t}\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif apiKey, ok := auth[\"HttpHeaderPasswordKey\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif apiKey.Prefix != \"\" {\n\t\t\t\t\tkey = apiKey.Prefix + \" \" + apiKey.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = apiKey.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"X-IPM-Password\"] = key\n\t\t\t}\n\t\t}\n\t}\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, nil, executionError\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, localVarHTTPResponse, executionError\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = _ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, localVarHTTPResponse, executionError\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v ApiResponse\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, executionError\n}", "title": "" }, { "docid": "ea3299aed855714e9303815ba154f481", "score": "0.43573692", "text": "func (p *Provider) DeviceCreate(\n\tinstanceID string,\n\tclass *config.Class,\n) (*cloudprovider.Device, error) {\n\n\t// Create an aws ops object\n\tops := awsops.NewEc2Storage(instanceID, p.ec2c)\n\n\t// Get availability zone of the instance\n\tdescriptionI, err := ops.Describe()\n\tdescription := descriptionI.(*ec2.Instance)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Create a volume request according to the parameters\n\taz := description.Placement.AvailabilityZone\n\n\t// Create a volume\n\tvolreq := &ec2.Volume{\n\t\tAvailabilityZone: az,\n\t\tSize: &class.DiskSizeGb,\n\t}\n\tif err = p.volumeRequestFromParameters(class, volreq); err != nil {\n\t\treturn nil, err\n\t}\n\n\td, err := ops.Create(volreq, nil)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Failed to create volume: %v\", err)\n\t}\n\tvol := d.(*ec2.Volume)\n\n\t// Attach the volume\n\tpath, err := ops.Attach(*vol.VolumeId)\n\tif err != nil {\n\t\treterr := fmt.Errorf(\"Unable to attach volume %s to %s: %v\",\n\t\t\t*vol.VolumeId,\n\t\t\tinstanceID,\n\t\t\terr)\n\t\tlogrus.Errorf(err.Error())\n\t\tif err := ops.Delete(*vol.VolumeId); err != nil {\n\t\t\tlogrus.Errorf(\"Failed to delete volume %s: %v\", *vol.VolumeId, err)\n\t\t}\n\t\treturn nil, reterr\n\t}\n\n\treturn &cloudprovider.Device{\n\t\tID: *vol.VolumeId,\n\t\tPath: path,\n\t\tSize: *vol.Size,\n\t}, nil\n}", "title": "" }, { "docid": "9dc802e040576b2115cd3f5b43f3663e", "score": "0.43564975", "text": "func (m *ManagedDevicesItemInitiateMobileDeviceManagementKeyRecoveryRequestBuilder) Post(ctx context.Context, requestConfiguration *ManagedDevicesItemInitiateMobileDeviceManagementKeyRecoveryRequestBuilderPostRequestConfiguration)(error) {\n requestInfo, err := m.ToPostRequestInformation(ctx, requestConfiguration);\n if err != nil {\n return err\n }\n errorMapping := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.ErrorMappings {\n \"4XX\": i20a3050780ee0b0cde0a884a4f35429a20d60067e3bcda382ec5400079147459.CreateODataErrorFromDiscriminatorValue,\n \"5XX\": i20a3050780ee0b0cde0a884a4f35429a20d60067e3bcda382ec5400079147459.CreateODataErrorFromDiscriminatorValue,\n }\n err = m.BaseRequestBuilder.RequestAdapter.SendNoContent(ctx, requestInfo, errorMapping)\n if err != nil {\n return err\n }\n return nil\n}", "title": "" }, { "docid": "8e42da5ed68eb2b08442af1d5d3c038b", "score": "0.4356326", "text": "func (m *WindowsAutopilotDeviceIdentityItemRequestBuilder) CreateDeleteRequestInformation(ctx context.Context, requestConfiguration *WindowsAutopilotDeviceIdentityItemRequestBuilderDeleteRequestConfiguration)(*i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RequestInformation, error) {\n requestInfo := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.NewRequestInformation()\n requestInfo.UrlTemplate = m.urlTemplate\n requestInfo.PathParameters = m.pathParameters\n requestInfo.Method = i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.DELETE\n if requestConfiguration != nil {\n requestInfo.AddRequestHeaders(requestConfiguration.Headers)\n requestInfo.AddRequestOptions(requestConfiguration.Options)\n }\n return requestInfo, nil\n}", "title": "" }, { "docid": "f43511d00b91e33e2b860b45cebd4bf5", "score": "0.43505582", "text": "func (m *WindowsMalwareInformationItemDeviceMalwareStatesMalwareStateForWindowsDeviceItemRequestBuilder) ToDeleteRequestInformation(ctx context.Context, requestConfiguration *WindowsMalwareInformationItemDeviceMalwareStatesMalwareStateForWindowsDeviceItemRequestBuilderDeleteRequestConfiguration)(*i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RequestInformation, error) {\n requestInfo := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.NewRequestInformation()\n requestInfo.UrlTemplate = m.BaseRequestBuilder.UrlTemplate\n requestInfo.PathParameters = m.BaseRequestBuilder.PathParameters\n requestInfo.Method = i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.DELETE\n if requestConfiguration != nil {\n requestInfo.Headers.AddAll(requestConfiguration.Headers)\n requestInfo.AddRequestOptions(requestConfiguration.Options)\n }\n return requestInfo, nil\n}", "title": "" }, { "docid": "326458892bfdde6818a6fd5b9e9730a6", "score": "0.43498048", "text": "func cbRegisterDevice(t cbtest.T, provider provider.ConfigAndClient, name, activeKey string) error {\n\tt.Helper()\n\n\tconfig := provider.Config(t)\n\tdevClient, err := provider.ClientE(t)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdata := cbMakeRegisterDeviceData(name, activeKey)\n\n\t_, err = devClient.CreateDevice(config.SystemKey, name, data)\n\tif err != nil && !strings.Contains(err.Error(), \"already exists\") {\n\t\treturn err\n\t}\n\n\terr = devClient.AddDeviceToRoles(config.SystemKey, name, []string{\"Administrator\"})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "484ac4414ab31ae769d0038e14b7c213", "score": "0.4348735", "text": "func (e *EventRestClient) DeleteForDevice(deviceId string) error {\n\treq, err := http.NewRequest(http.MethodDelete, e.url+\"/device/\"+url.QueryEscape(deviceId), nil)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn err\n\t}\n\n\tresp, err := makeRequest(req)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn err\n\t}\n\tif resp == nil {\n\t\tfmt.Println(ErrResponseNil)\n\t\treturn ErrResponseNil\n\t}\n\tdefer resp.Body.Close()\n\n\tif resp.StatusCode != http.StatusOK {\n\t\tbodyBytes, err := getBody(resp)\n\t\tif err != nil {\n\t\t\tfmt.Println(err.Error())\n\t\t\treturn err\n\t\t}\n\t\tbodyString := string(bodyBytes)\n\n\t\treturn errors.New(bodyString)\n\t}\n\n\treturn nil\n}", "title": "" } ]
2bc07f73a205b365d88cd224afe5f86c
Parse attempts to parse the given QR code data.
[ { "docid": "6783250f32559bf5eff115047b56de91", "score": "0.0", "text": "func Parse(data []byte) (Data, error) {\n\tfor _, model := range [...]Data{\n\t\t&LoRaAllianceTR005Draft3{},\n\t\t&LoRaAllianceTR005Draft2{},\n\t} {\n\t\tif err := model.UnmarshalText(data); err == nil {\n\t\t\treturn model, nil\n\t\t}\n\t}\n\treturn nil, errFormat.New()\n}", "title": "" } ]
[ { "docid": "317486b7011da9b7691de704d6bd5bbc", "score": "0.5470907", "text": "func (q *Quackit) Parse(reader io.Reader) error {\n\tbuf := new(bytes.Buffer)\n\tbuf.ReadFrom(reader)\n\treturn q.ParseString(buf.String())\n}", "title": "" }, { "docid": "82b7ea0cc19012e5a9a2792315ca70aa", "score": "0.5394103", "text": "func (qr *Processing) Decode() error {\n\tif decodeError := C.quirc_decode(&qr.code, &qr.data); decodeError != C.QUIRC_SUCCESS {\n\t\treturn errors.New(C.GoString(C.quirc_strerror(decodeError)))\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "735293a0a9f89e3ea392c27d52c9bf41", "score": "0.5312848", "text": "func ParseGetBitlinkQRCodeResponse(rsp *http.Response) (*GetBitlinkQRCodeResponse, error) {\n\tbodyBytes, err := ioutil.ReadAll(rsp.Body)\n\tdefer rsp.Body.Close()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresponse := &GetBitlinkQRCodeResponse{\n\t\tBody: bodyBytes,\n\t\tHTTPResponse: rsp,\n\t}\n\n\tswitch {\n\tcase strings.Contains(rsp.Header.Get(\"Content-Type\"), \"json\") && rsp.StatusCode == 200:\n\t\tvar dest BitlinkQR\n\t\tif err := json.Unmarshal(bodyBytes, &dest); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresponse.JSON200 = &dest\n\n\tcase strings.Contains(rsp.Header.Get(\"Content-Type\"), \"json\") && rsp.StatusCode == 400:\n\t\tvar dest BadRequest\n\t\tif err := json.Unmarshal(bodyBytes, &dest); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresponse.JSON400 = &dest\n\n\tcase strings.Contains(rsp.Header.Get(\"Content-Type\"), \"json\") && rsp.StatusCode == 402:\n\t\tvar dest UpgradeRequired\n\t\tif err := json.Unmarshal(bodyBytes, &dest); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresponse.JSON402 = &dest\n\n\tcase strings.Contains(rsp.Header.Get(\"Content-Type\"), \"json\") && rsp.StatusCode == 403:\n\t\tvar dest Forbidden\n\t\tif err := json.Unmarshal(bodyBytes, &dest); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresponse.JSON403 = &dest\n\n\tcase strings.Contains(rsp.Header.Get(\"Content-Type\"), \"json\") && rsp.StatusCode == 404:\n\t\tvar dest NotFound\n\t\tif err := json.Unmarshal(bodyBytes, &dest); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresponse.JSON404 = &dest\n\n\tcase strings.Contains(rsp.Header.Get(\"Content-Type\"), \"json\") && rsp.StatusCode == 500:\n\t\tvar dest InternalError\n\t\tif err := json.Unmarshal(bodyBytes, &dest); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresponse.JSON500 = &dest\n\n\t}\n\n\treturn response, nil\n}", "title": "" }, { "docid": "a4ab99b0578b3e02b7d42e1188c329e1", "score": "0.525117", "text": "func (db *Database) ParseCallData(data []byte) (*DecodedCallData, error) {\n\n\t// If the data is empty, we have a plain value transfer, nothing more to do\n\tif len(data) == 0 {\n\t\treturn nil, errors.New(\"transaction doesn't contain data\")\n\t}\n\t// Validate the call data that it has the 4byte prefix and the rest divisible by 32 bytes\n\tif len(data) < 4 {\n\t\treturn nil, errors.New(\"transaction data is not valid ABI: missing the 4 byte call prefix\")\n\t}\n\tif n := len(data) - 4; n%32 != 0 {\n\t\treturn nil, errors.Errorf(\"transaction data is not valid ABI (length should be a multiple of 32 (was %d))\", n)\n\t}\n\tembedded, err := db.Selector(data[:4])\n\tif err != nil {\n\t\treturn nil, errors.Errorf(\"Transaction contains data, but the ABI signature could not be found: %v\", err)\n\t}\n\tinfo, err := verifySelector(embedded, data)\n\tif err != nil {\n\t\treturn nil, errors.Errorf(\"Transaction contains data, but provided ABI signature could not be verified: %v\", err)\n\t}\n\treturn info, nil\n\n}", "title": "" }, { "docid": "0b5c7da8abadf5119cc3382c29b66568", "score": "0.52247554", "text": "func Parse(b []byte) Quiz {\n\tl := len(b)\n\n\tq := Quiz{\n\t\tType: NoQuiz,\n\t\tquestion: b,\n\t}\n\n\tif l == 0 {\n\t\tq.Type = NullQuiz\n\t\tq.question = nil\n\t\treturn q\n\t}\n\n\t// check for ---\n\tparts := bytes.SplitN(b, []byte{'-', '-', '-'}, 3)\n\tif len(parts) >= 2 && len(parts[1]) != 0 {\n\t\tq.question = parts[0]\n\t\tq.answer = parts[1]\n\t\tq.Type = Card\n\t\treturn q\n\t}\n\n\t// check for inline ~~\n\tparts = bytes.SplitN(b, []byte{'~', '~'}, 4)\n\n\tif len(parts) >= 3 {\n\t\tblanks := getCopy(parts[1])\n\t\tfor i := range blanks {\n\t\t\tblanks[i] = '_'\n\t\t}\n\t\tparts[1] = blanks\n\n\t\tq.answer = getCopy(b)\n\t\tq.Type = Inline\n\t\tq.question = bytes.Join(parts, nil)\n\t}\n\n\treturn q\n}", "title": "" }, { "docid": "3e33835341424a0d9664ea622db58ad9", "score": "0.51563686", "text": "func (p *Parser) Parse(str string) error {\n\tp.raw = str\n\n\tfor p.Trim() {\n\t\tif err := p.parseBlock(); err {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif len(p.defs) == 0 {\n\t\treturn errors.New(\"Could not find bracket '(', \\n empty file detected\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "3db120be09d0b80d7e4f6433b0e6a619", "score": "0.5120802", "text": "func ParseData(_data []byte, lendata int, connection net.Conn) {\n\n\tif !((_data[0] == 0x78) && (_data[1] == 0x78)) {\n\t\tfmt.Println(\"not equl\")\n\t} else if _data[3] == 0x01 {\n\t\tregisterDevice(_data, lendata, connection)\n\t} else if _data[3] == 0x13 {\n\t\theartBeat(_data, lendata, connection)\n\t} else if (_data[3] == 0x22) || (_data[3] == 0x12) {\n\t\tlocationDt(_data, lendata, connection)\n\t}\n\n\t//data1 := string(_data[:lendata])\n\n\t//fmt.Print(data1)\n\t//connection.Write([]byte(data1 + \"\\n\"))\n}", "title": "" }, { "docid": "9886e78a421e31a0e75b4cfaf40775de", "score": "0.5110099", "text": "func Parse(repData []byte) (*rep.Replay, error) {\n\treturn ParseConfig(repData, Config{Commands: true, MapData: true})\n}", "title": "" }, { "docid": "b708fc4b1de75edc68c2d0c9261594f9", "score": "0.5104375", "text": "func ParseData(str string) (*Datas, error) {\n\tdata := &Datas{}\n\tstrs := strings.Split(str, \"\\n\")\n\tfN, fM, fP, fQ := getNums(strs[0])\n\n\tN := int(fN)\n\tM := int(fM)\n\tP := int(fP)\n\tQ := int(fQ)\n\n\tdata.Places = parcePlace(strs[1:N+1], 0)\n\tdata.Roads = parceRoad(strs[N+1:M+N+1], data.Places)\n\n\tif P != 0 {\n\t\tdata.AddPlaces = parcePlace(strs[M+N+1:P+M+N+1], N)\n\t}\n\n\tif Q != 0 {\n\t\tdata.Queries = parceQuery(strs[P+M+N+1:])\n\t}\n\n\treturn data, nil\n}", "title": "" }, { "docid": "893dca053c19f6bece0b45e3c8d63f2e", "score": "0.5097483", "text": "func decodeQR(image image.Image) {\n\n\tresults, err := grcode.GetDataFromImage(image)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tif len(results) == 0 {\n\t\tlog.Printf(\"No qrcode detected from file\")\n\t}\n\tfor _, result := range results {\n\t\tfmt.Printf(\"%s\\n\", result)\n\t}\n}", "title": "" }, { "docid": "7a4579f3e7136493ab65129be2d4df7f", "score": "0.5081073", "text": "func Parse(reader io.ReadCloser, data interface{}) {\n\tdefer reader.Close()\n\n\tbody, err := ioutil.ReadAll(reader)\n\tif err != nil {\n\t\tfmt.Printf(\"Error reading body! %s\\n\", err)\n\t\tpanic(err.Error())\n\t}\n\n\terr = json.Unmarshal(body, data)\n\tif err != nil {\n\t\tswitch t := err.(type) {\n\t\tcase *json.SyntaxError:\n\t\t\tjsn := string(body[0:t.Offset])\n\t\t\tjsn += \"<--(Invalid Character)\"\n\t\t\tfmt.Printf(\"Invalid character at offset %v\\n %s\\n\", t.Offset, jsn)\n\t\tcase *json.UnmarshalTypeError:\n\t\t\tjsn := string(body[0:t.Offset])\n\t\t\tjsn += \"<--(Invalid Type)\"\n\t\t\tfmt.Printf(\"Invalid value at offset %v\\n %s\\n\", t.Offset, jsn)\n\t\t\tfmt.Println(\"You might need to save the json file locally and validate the format - e.g. classifications with a single CodeList are known to be in an invalid format. See the readme for details.\")\n\t\tdefault:\n\t\t\tfmt.Printf(\"Unable to unmarshal data. Error=%T, data=%s\\n\", t, string(body))\n\t\t}\n\t\tpanic(err)\n\t}\n\n}", "title": "" }, { "docid": "666ae74a830607103dc3b969e01ed51f", "score": "0.5011268", "text": "func MustBarCode(data []byte, mode Mode) (*BarCode, error) {\n\tv := result{}\n\tif len(data) == 0 {\n\t\treturn nil, ErrDataBufferEmpty\n\t}\n\tsData := strings.TrimSpace(string(data))\n\tif mode == ModeXML {\n\t\t//xml format\n\t\tif strings.HasPrefix(sData, \"<barcodes\") || strings.HasPrefix(sData, \"</source></barcodes>\") {\n\t\t\treturn nil, ErrSkipRootTag\n\t\t}\n\t\terr := xml.Unmarshal(data, &v)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t} else if mode == ModeNative {\n\t\t//native format\n\t\tidx := bytes.Index(data, []byte{':'})\n\t\tif idx == -1 {\n\t\t\treturn nil, ErrFormatError\n\t\t}\n\t\tv.Barcode.Type = string(data[0:idx])\n\t\tv.Barcode.Data = data[idx:]\n\t\tv.Barcode.Quality = 1\n\t} else {\n\t\t//Raw\n\t\tv.Barcode.Type = \"raw\"\n\t\tv.Barcode.Quality = 1\n\t\tv.Barcode.Data = data\n\n\t}\n\treturn &v.Barcode, nil\n}", "title": "" }, { "docid": "f90645e56fc7b9255993e16f826f4bdf", "score": "0.4983852", "text": "func (pub *PublicKey) Parse(curve elliptic.Curve, data []byte) error {\n\tif len(data) < PublicKeyCompressedLen {\n\t\treturn errors.New(\"Invalid data length\")\n\t}\n\n\tvar err error\n\tswitch data[0] & 0xfe {\n\tcase pubKeyCompressed:\n\t\terr = pub.Decompress(curve, data)\n\tcase pubKeyUncompressed:\n\t\terr = pub.UncompressedDecode(curve, data)\n\tdefault:\n\t\terr = errors.New(\"Invalid format tag\")\n\t}\n\n\tif nil == err {\n\t\tif !curve.IsOnCurve(pub.X, pub.Y) {\n\t\t\terr = errors.New(\"The parsed point is off curve\")\n\t\t}\n\t}\n\n\treturn err\n}", "title": "" }, { "docid": "1662dea435cce29a19a5c7c9031ccdd1", "score": "0.49700826", "text": "func Parse(validSchemes qnr.IdentityScheme, input string) (*Node, error) {\n\tif strings.HasPrefix(input, \"qnode://\") {\n\t\treturn ParseV4(input)\n\t}\n\tif !strings.HasPrefix(input, \"qnr:\") {\n\t\treturn nil, errMissingPrefix\n\t}\n\tbin, err := base64.RawURLEncoding.DecodeString(input[4:])\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tvar r qnr.Record\n\tif err := rlp.DecodeBytes(bin, &r); err != nil {\n\t\treturn nil, err\n\t}\n\treturn New(validSchemes, &r)\n}", "title": "" }, { "docid": "6a4a9631111a1312248d02a18377c87e", "score": "0.49655128", "text": "func Parse(reader IOReader) (interface{}, error) {\n\tchar, err := readByte(reader)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tswitch char {\n\tcase 36:\n\t\treturn parseBulkString(reader)\n\tcase 42:\n\t\treturn parseArray(reader)\n\tcase 43:\n\t\tresult, err := reader.ReadString('\\n')\n\t\tif err != nil {\n\t\t\treturn nil, formatError(err)\n\t\t}\n\t\treturn strings.TrimSpace(result), nil\n\tcase 45:\n\t\tresult, err := reader.ReadString('\\n')\n\t\tif err != nil {\n\t\t\treturn nil, formatError(err)\n\t\t}\n\t\treturn nil, fmt.Errorf(\"Redis: %v\", strings.TrimSpace(result))\n\tcase 58:\n\t\treturn parseInteger(reader)\n\tdefault:\n\t\tpanic(fmt.Sprintf(\"Response symbole '%v' not supported\", char))\n\t}\n}", "title": "" }, { "docid": "39cfea5a59d125072b8a04c32888660f", "score": "0.49222553", "text": "func (ri *Remittance) Parse(record string) error {\n\tif utf8.RuneCountInString(record) < 6 {\n\t\treturn NewTagMinLengthErr(6, len(record))\n\t}\n\n\tri.tag = record[:6]\n\tlength := 6\n\n\tvalue, read, err := ri.parseVariableStringField(record[length:], 5)\n\tif err != nil {\n\t\treturn fieldError(\"SwiftFieldTag\", err)\n\t}\n\tri.CoverPayment.SwiftFieldTag = value\n\tlength += read\n\n\tvalue, read, err = ri.parseVariableStringField(record[length:], 35)\n\tif err != nil {\n\t\treturn fieldError(\"SwiftLineOne\", err)\n\t}\n\tri.CoverPayment.SwiftLineOne = value\n\tlength += read\n\n\tvalue, read, err = ri.parseVariableStringField(record[length:], 35)\n\tif err != nil {\n\t\treturn fieldError(\"SwiftLineTwo\", err)\n\t}\n\tri.CoverPayment.SwiftLineTwo = value\n\tlength += read\n\n\tvalue, read, err = ri.parseVariableStringField(record[length:], 35)\n\tif err != nil {\n\t\treturn fieldError(\"SwiftLineThree\", err)\n\t}\n\tri.CoverPayment.SwiftLineThree = value\n\tlength += read\n\n\tvalue, read, err = ri.parseVariableStringField(record[length:], 35)\n\tif err != nil {\n\t\treturn fieldError(\"SwiftLineFour\", err)\n\t}\n\tri.CoverPayment.SwiftLineFour = value\n\tlength += read\n\n\tif err := ri.verifyDataWithReadLength(record, length); err != nil {\n\t\treturn NewTagMaxLengthErr(err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "ffcd302a21e859940df1934a2e09d80a", "score": "0.49180594", "text": "func (n *Needle) ParseData(buf []byte) (err error) {\n\tif len(buf) != int(n.Size) {\n\t\treturn errors.ErrNeedleDataSize\n\t}\n\t// data\n\tn.Data = buf\n\t// checksum\n\tn.Checksum = crc32.Update(0, _crc32Table, n.Data)\n\treturn\n}", "title": "" }, { "docid": "955b4d30d5b79b9fc958ae64315e00e8", "score": "0.4864016", "text": "func (msg *DNSMessage) Parse(buffer []byte) (err error) {\n\t//fmt.Println(hex.EncodeToString(buffer))\n\tlength := len(buffer)\n\toffset := 0 // Point in the buffer that we are reading\n\n\t// Header first\n\tmsg.Id = uint16(buffer[offset])<<8 | uint16(buffer[offset+1])\n\toffset += 2\n\n\tmsg.IsResponse = (buffer[offset]&(1<<7) != 0)\n\tmsg.Opcode = int(buffer[offset]>>3) & 0xF\n\tmsg.IsAuthoritative = (buffer[offset]&(1<<2) != 0)\n\tmsg.IsTruncated = (buffer[offset]&(1<<1) != 0)\n\tmsg.IsRecursionDesired = (buffer[offset] != 0)\n\toffset += 1\n\n\tmsg.IsRecursionAvailable = (buffer[offset]&(1<<7) != 0)\n\tmsg.IsZero = (buffer[offset]&(1<<6) != 0) // TODO: There's other stuff in here!\n\tmsg.Rcode = int(buffer[offset] & 0xF)\n\toffset += 1\n\n\t// Now the rest of the message\n\tqdcount := uint16(buffer[offset])<<8 | uint16(buffer[offset+1])\n\tmsg.Questions = make([]Question, qdcount)\n\toffset += 2\n\n\tancount := uint16(buffer[offset])<<8 | uint16(buffer[offset+1])\n\tmsg.Answers = make([]ResourceRecord, ancount)\n\toffset += 2\n\n\tnscount := uint16(buffer[offset])<<8 | uint16(buffer[offset+1])\n\tmsg.Nss = make([]ResourceRecord, nscount)\n\toffset += 2\n\n\tarcount := uint16(buffer[offset])<<8 | uint16(buffer[offset+1])\n\tmsg.Extras = make([]ResourceRecord, arcount)\n\toffset += 2\n\n\tfor i := 0; i < len(msg.Questions); i++ {\n\t\tname, new_offset := parseDomainName(buffer, offset)\n\t\toffset = new_offset\n\t\tmsg.Questions[i].Name = name\n\n\t\tmsg.Questions[i].Type = uint16(buffer[offset])<<8 | uint16(buffer[offset+1])\n\t\toffset += 2\n\n\t\tmsg.Questions[i].Class = uint16(buffer[offset])<<8 | uint16(buffer[offset+1])\n\t\toffset += 2\n\t}\n\n\tfor i := 0; i < len(msg.Answers); i++ {\n\t\toffset, _ = msg.Answers[i].Parse(buffer, offset)\n\t}\n\n\tfor i := 0; i < len(msg.Nss); i++ {\n\t\toffset, _ = msg.Nss[i].Parse(buffer, offset)\n\t}\n\n\tfor i := 0; i < len(msg.Extras); i++ {\n\t\toffset, _ = msg.Extras[i].Parse(buffer, offset)\n\t}\n\n\tif length != offset {\n\t\treturn fmt.Errorf(\"Expected %d, ended up with %d\", length, offset)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "25f9b35e66df648474ff470c33a03c9d", "score": "0.48594815", "text": "func (di *decoderImpl) FromFileQRCode(filename string) (*Output, error) {\n\n\tif strings.HasSuffix(filename, \".png\") {\n\t\tpngBytes, err := ioutil.ReadFile(os.ExpandEnv(filename))\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"error reading QR code file=%s err=%s\", filename, err)\n\t\t}\n\t\treturn di.FromQRCodePNGBytes(pngBytes)\n\t}\n\n\tif strings.HasSuffix(filename, \".jpg\") {\n\t\tjpegBytes, err := ioutil.ReadFile(os.ExpandEnv(filename))\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"error reading QR code file=%s err=%s\", filename, err)\n\t\t}\n\t\treturn di.FromQRCodeJPGBytes(jpegBytes)\n\t}\n\n\treturn nil, fmt.Errorf(\"error only supports .png and .jpg formats passed=%s\", filename)\n\n}", "title": "" }, { "docid": "b88d6c379fbb144c83da255020c9058b", "score": "0.48131517", "text": "func ParseQlcMessage(data []byte) (*QlcMessage, error) {\n\tif len(data) < QlcMessageHeaderLength {\n\t\treturn nil, ErrInvalidMessageHeaderLength\n\t}\n\tmessage := &QlcMessage{\n\t\tcontent: make([]byte, QlcMessageHeaderLength),\n\t}\n\tcopy(message.content, data)\n\tif err := message.VerifyHeader(); err != nil {\n\t\treturn nil, err\n\t}\n\tmessage.messageType = message.MessageType()\n\treturn message, nil\n}", "title": "" }, { "docid": "9a10b18c816209ac2e0aba89edfdf109", "score": "0.4770931", "text": "func (message *QlcMessage) ParseMessageData(data []byte) error {\n\tif uint32(len(data)) < message.DataLength() {\n\t\treturn ErrInvalidMessageDataLength\n\t}\n\tmessage.content = append(message.content, data[:message.DataLength()]...)\n\treturn message.VerifyData()\n}", "title": "" }, { "docid": "ab5df320dcadb9224d1eb2e3cb210405", "score": "0.4759721", "text": "func MsgParse(data []byte) (*Message, error) {\n\tmsg := initMessage()\n\n\tidx := bytes.Index(data, []byte(\"\\r\\n\"))\n\tif idx == -1 {\n\t\treturn nil, ErrorSIPMsgParse\n\t}\n\t// parse first line\n\tidx += 2\n\thid, err := parseHeader(msg, data[:idx])\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif !(hid == SIPHdrRequestLine || hid == SIPHdrStatusLine) {\n\t\treturn nil, ErrorSIPMsgParse.msg(\"Missing Request/Status line\")\n\t}\n\n\tstart := idx\n\tfor i := idx; i < len(data); {\n\t\tif bytes.HasPrefix(data[i:], []byte(\"\\r\\n\")) {\n\t\t\ti += 2\n\t\t\tif i < len(data) && (data[i] == ' ' || data[i] == '\\t') {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\thid, err = parseHeader(msg, data[start:i])\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tif hid == MsgEOF {\n\t\t\t\tstart += 2\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tstart = i\n\t\t\tcontinue\n\t\t}\n\t\ti++\n\t}\n\t// must be CRLF in the end of the SIP Message\n\tif hid != MsgEOF {\n\t\treturn nil, ErrorSIPMsgParse.msg(\"Message must be finished with CRLF (%d)\", hid)\n\t}\n\n\tif start < len(data) {\n\t\tmsg.Body = data[start:]\n\t}\n\treturn msg, nil\n}", "title": "" }, { "docid": "39486a11b8adf498d806c9e8d8f1efce", "score": "0.47312498", "text": "func (gyro *GYRO) Parse(bytes []byte, scale *SCAL) error {\n\t// Check length\n\tif 6 != len(bytes) {\n\t\treturn errors.New(\"GYRO: Invalid packet length\")\n\t}\n\n\t// Gyroscope 3D\n\tgyro.X = float64(int16(binary.BigEndian.Uint16(bytes[0:2]))) / float64(scale.Divisor[0])\n\tgyro.Y = float64(int16(binary.BigEndian.Uint16(bytes[2:4]))) / float64(scale.Divisor[0])\n\tgyro.Z = float64(int16(binary.BigEndian.Uint16(bytes[4:6]))) / float64(scale.Divisor[0])\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "c8a719320d3cebed9be9b616aad8f88b", "score": "0.4724298", "text": "func (str *SenderToReceiver) Parse(record string) error {\n\tif utf8.RuneCountInString(record) != 221 {\n\t\treturn NewTagWrongLengthErr(221, utf8.RuneCountInString(record))\n\t}\n\tstr.tag = record[:6]\n\tstr.CoverPayment.SwiftFieldTag = str.parseStringField(record[6:11])\n\tstr.CoverPayment.SwiftLineOne = str.parseStringField(record[11:46])\n\tstr.CoverPayment.SwiftLineTwo = str.parseStringField(record[46:81])\n\tstr.CoverPayment.SwiftLineThree = str.parseStringField(record[81:116])\n\tstr.CoverPayment.SwiftLineFour = str.parseStringField(record[116:151])\n\tstr.CoverPayment.SwiftLineFive = str.parseStringField(record[151:186])\n\tstr.CoverPayment.SwiftLineSix = str.parseStringField(record[186:221])\n\treturn nil\n}", "title": "" }, { "docid": "1f53ba6383bd9470d7c0b52cddca64c5", "score": "0.47178963", "text": "func (q *Parsed) Decode(b []byte) {\n\tq.b = b\n\tq.CaptureMeta = CaptureMeta{} // Clear any capture metadata if it exists.\n\n\tif len(b) < 1 {\n\t\tq.IPVersion = 0\n\t\tq.IPProto = unknown\n\t\treturn\n\t}\n\n\tq.IPVersion = b[0] >> 4\n\tswitch q.IPVersion {\n\tcase 4:\n\t\tq.decode4(b)\n\tcase 6:\n\t\tq.decode6(b)\n\tdefault:\n\t\tq.IPVersion = 0\n\t\tq.IPProto = unknown\n\t}\n}", "title": "" }, { "docid": "348b3c1b708479f4ae6837d1a28b2520", "score": "0.47040185", "text": "func ParseRules(data []byte) (Rules, error) { return ReadRules(bytes.NewReader(data)) }", "title": "" }, { "docid": "911f0816654865d439d743765c42fb00", "score": "0.47016203", "text": "func Parse(content []byte) (Playlist){\n\n\tscanner := bufio.NewScanner(bytes.NewReader(content))\n\tscanner.Scan()\n\n\tfirstLine := scanner.Text()\n\tif !strings.HasPrefix(firstLine, HEADER) {\n\t\tpanic(\"This is not a valid m3u8 playlist\")\n\t}\n\n\tinfo := parseInfo(scanner)\n\n\ti := 0\n\tvar streams [10]Stream\n\n\tfor scanner.Scan() {\n\t\tstreams[i] = parseStream(scanner)\n\t\ti++\n\t}\n\n\treturn Playlist{info, streams[:i]}\n}", "title": "" }, { "docid": "ad72d5f57d649e4c2abe14cbf2587742", "score": "0.46800068", "text": "func Parse(buf []byte) (*Message, error) {\n\tbuf = bytes.TrimSpace(buf)\n\tif len(buf) == 0 {\n\t\treturn nil, errors.New(\"empty buffer\")\n\t}\n\n\tif buf[0] == '{' {\n\t\treturn parseJSON(buf)\n\t}\n\treturn parseCompact(buf)\n}", "title": "" }, { "docid": "cddffc8e7d953d1be8c269b14be1825f", "score": "0.46694216", "text": "func (n *Needle) Parse() (err error) {\n\tvar dataOffset int32\n\tif err = n.ParseHeader(n.Buffer[:_headerSize]); err == nil {\n\t\tdataOffset = _headerSize + n.Size\n\t\tif err = n.ParseData(n.Buffer[_headerSize:dataOffset]); err == nil {\n\t\t\terr = n.ParseFooter(n.Buffer[dataOffset:n.TotalSize])\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "0c50a09c8a0a5430dc305a1099c68032", "score": "0.46676204", "text": "func parse_track(data []byte, offsets BinaryPatternData) (Track, int, error) {\n var track Track\n\n if len(data) < offsets.ID_end {\n return track, 0, errors.New(\"Data not big enough to hold track info\\n\")\n }\n\n // Get ID\n start := offsets.ID_start\n end := offsets.ID_end\n\n buf := bytes.NewReader(data[start:end])\n err := binary.Read(buf, binary.LittleEndian, &track.ID)\n if err != nil {\n return track, offsets.ID_end, err\n }\n\n // This should only take one line?\n var track_name_length uint8\n start = offsets.name_length_start\n end = offsets.name_length_end\n\n buf = bytes.NewReader(data[start:end])\n err = binary.Read(buf, binary.LittleEndian, &track_name_length)\n if err != nil {\n return track, offsets.name_length_end, err\n }\n\n // Get name\n start = offsets.name_length_end\n end = offsets.name_length_end + int(track_name_length)\n track.name = string(data[start:end])\n\n // Get steps, use previous end calculation\n start = end\n end = start + offsets.step_length\n track.steps = append(track.steps, data[start:end]...)\n if len(track.steps) != offsets.step_length {\n return track,\n offsets.name_length_end + int(track_name_length) + len(track.steps),\n errors.New(\"Error reading track data.\\n\")\n }\n return track, offsets.name_length_end + int(track_name_length) + len(track.steps), nil\n}", "title": "" }, { "docid": "72ac7e136dd49c05e2f3c53f07a34feb", "score": "0.46652827", "text": "func (fcr *FilterCycleResponse) Parse(bin []byte) (err error) {\n\tpanic(\"implement me\")\n}", "title": "" }, { "docid": "aad3eef99a144cb11bdce05246cae3b5", "score": "0.46558952", "text": "func (parser WasmMsgParser) ParseCustom(contractAddr sdk.AccAddress, data json.RawMessage) (sdk.Msg, error) {\n\treturn nil, nil\n}", "title": "" }, { "docid": "a0fc14211dd4dee2730c1c95f7c507b6", "score": "0.46282127", "text": "func Decode(data string) ([]byte, error) {\n\tif len(data)%4 != 0 {\n\t\treturn nil, ErrInvalidLength\n\t}\n\n\tresult := make([]byte, len(data)/4)\n\tfor i := 0; i != len(data); i += 4 {\n\t\tif data[i+0] != first || data[i+1] != second {\n\t\t\treturn nil, ErrInvalidData\n\t\t}\n\n\t\tresult[i/4] = (data[i+2]-third)*divisor +\n\t\t\tdata[i+3] - forth - shift\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "31b9b049203a14a3490ce5e4e2396c54", "score": "0.46215504", "text": "func Parse(v []byte) (output SipMsg) {\n\toutput.Src = v\n\t// Allow multiple vias and media Attribs\n\tviaIdx := 0\n\toutput.Via = make([]SipVia, 0, 8)\n\n\tlines := bytes.Split(v, []byte(\"\\r\\n\"))\n\n\tfor i, line := range lines {\n\t\t//fmt.Println(i, string(line))\n\t\tline = bytes.TrimSpace(line)\n\t\tif i == 0 {\n\t\t\t// For the first line parse the request\n\t\t\tParseSipReq(line, &output.Req)\n\t\t} else {\n\t\t\t// For subsequent lines split in sep (: for sip, = for sdp)\n\t\t\tspos, stype := indexSep(line)\n\t\t\tif spos > 0 && stype == ':' {\n\t\t\t\t// SIP: Break up into header and value\n\t\t\t\tlhdr := strings.ToLower(string(line[0:spos]))\n\t\t\t\tlval := bytes.TrimSpace(line[spos+1:])\n\n\t\t\t\t// Switch on the line header\n\t\t\t\t//fmt.Println(i, string(lhdr), string(lval))\n\t\t\t\tswitch {\n\t\t\t\tcase lhdr == \"f\" || lhdr == \"from\":\n\t\t\t\t\tParseSipFrom(lval, &output.From)\n\t\t\t\tcase lhdr == \"t\" || lhdr == \"to\":\n\t\t\t\t\tParseSipTo(lval, &output.To)\n\t\t\t\tcase lhdr == \"m\" || lhdr == \"contact\":\n\t\t\t\t\tParseSipContact(lval, &output.Contact)\n\t\t\t\tcase lhdr == \"v\" || lhdr == \"via\":\n\t\t\t\t\tvar tmpVia SipVia\n\t\t\t\t\toutput.Via = append(output.Via, tmpVia)\n\t\t\t\t\tParseSipVia(lval, &output.Via[viaIdx])\n\t\t\t\t\tviaIdx++\n\t\t\t\tcase lhdr == \"i\" || lhdr == \"call-id\":\n\t\t\t\t\toutput.CallId.Value = lval\n\t\t\t\tcase lhdr == \"c\" || lhdr == \"content-type\":\n\t\t\t\t\toutput.ContType.Value = lval\n\t\t\t\tcase lhdr == \"content-length\":\n\t\t\t\t\toutput.ContLen.Value = lval\n\t\t\t\tcase lhdr == \"user-agent\":\n\t\t\t\t\toutput.Ua.Value = lval\n\t\t\t\tcase lhdr == \"expires\":\n\t\t\t\t\toutput.Exp.Value = lval\n\t\t\t\tcase lhdr == \"max-forwards\":\n\t\t\t\t\toutput.MaxFwd.Value = lval\n\t\t\t\tcase lhdr == \"cseq\":\n\t\t\t\t\tParseSipCseq(lval, &output.Cseq)\n\t\t\t\t} // End of Switch\n\t\t\t}\n\n\t\t}\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "95023060e009aca22121cbfd77c9d8a4", "score": "0.4612935", "text": "func parseBitmap(input string, sizeHint uint32) (*bitmap.Bitmap, error) {\n\tb := bitmap.New(sizeHint)\n\n\tif termIdx := strings.IndexAny(input, \"\\n\\000\"); termIdx != -1 {\n\t\tinput = input[:termIdx]\n\t}\n\tinput = strings.TrimSpace(input)\n\n\tif len(input) == 0 {\n\t\treturn &b, nil\n\t}\n\ttokens := strings.Split(input, \",\")\n\n\tfor _, t := range tokens {\n\t\tstart, end, err := parseToken(strings.TrimSpace(t))\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tfor i := start; i <= end; i++ {\n\t\t\tb.Add(i)\n\t\t}\n\t}\n\treturn &b, nil\n}", "title": "" }, { "docid": "f36db807d208aa7e95c8b050c975c461", "score": "0.46031028", "text": "func Parse(rs io.ReadSeeker) (*Metadata, error) {\n\tvar (\n\t\textractor Extractor\n\t\terr error\n\t)\n\tif extractor, err = detectExtractor(rs); err != nil {\n\t\treturn nil, errors.Wrap(err, \"error occured while initializing extractor for detected audio type\")\n\t}\n\tif _, err = rs.Seek(0, os.SEEK_SET); err != nil {\n\t\treturn nil, errors.Wrap(err, \"error occured while seeking data back to 0 offset\")\n\t}\n\n\treturn extractor.Extract(rs)\n}", "title": "" }, { "docid": "3fa76bf7ffc2f52ed9e865485532031d", "score": "0.4600512", "text": "func (p *Parser) Parse(r *bufio.Reader) error {\n\tlineNum := 0\n\tfor {\n\t\trowBytes, isPrefix, err := r.ReadLine()\n\t\trow := string(rowBytes)\n\t\tlineNum++\n\t\tif err := func() error {\n\t\t\tif isPrefix {\n\t\t\t\treturn status.Errorf(codes.InvalidArgument, \"read a fragment\")\n\t\t\t}\n\t\t\tif err != nil {\n\t\t\t\tif err == io.EOF {\n\t\t\t\t\treturn status.Error(codes.OutOfRange, \"\")\n\t\t\t\t}\n\t\t\t\treturn status.Errorf(codes.Internal, \"failed to ReadLine: %s\", err)\n\t\t\t}\n\t\t\tif len(row) == 0 {\n\t\t\t\treturn badRow(row)\n\t\t\t}\n\t\t\tparts := strings.Split(row, \":\")\n\t\t\tif len(parts) == 0 {\n\t\t\t\treturn nil\n\t\t\t}\n\t\t\trowType := parts[0]\n\t\t\tparts = parts[1:]\n\t\t\tswitch rowType {\n\t\t\tcase \"ST\":\n\t\t\t\treturn p.parseStartTimestamp(row, parts)\n\t\t\tcase \"S\":\n\t\t\t\treturn p.parseSwitch(row, parts)\n\t\t\tcase \"P\":\n\t\t\t\treturn p.parsePIDInfo(row, parts)\n\t\t\tcase \"M\":\n\t\t\t\treturn p.parseMigrate(row, parts)\n\t\t\tcase \"W\":\n\t\t\t\treturn p.parseWakeup(row, parts)\n\t\t\tdefault:\n\t\t\t\t// Skip unparsable rows.\n\t\t\t\treturn nil\n\t\t\t}\n\t\t}(); err != nil {\n\t\t\ts, ok := status.FromError(err)\n\t\t\tif !ok {\n\t\t\t\treturn status.Errorf(codes.Internal, \"at line %d, %s\", lineNum, err)\n\t\t\t}\n\t\t\tif s.Code() == codes.OutOfRange {\n\t\t\t\tbreak\n\t\t\t}\n\t\t\treturn status.Errorf(s.Code(), \"at line %d, %s\", lineNum, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "3a17933a8fcec183f654c6d652dafc6f", "score": "0.4592406", "text": "func (rns *RoutingNumberSummary) Parse(record string) {\n\tif utf8.RuneCountInString(record) < 55 {\n\t\treturn // line too short\n\t}\n\n\t// Character position 1-2, Always \"85\"\n\trns.setRecordType()\n\t// 03-11\n\trns.CashLetterRoutingNumber = rns.parseStringField(record[2:11])\n\t// 12-25\n\trns.RoutingNumberTotalAmount = rns.parseNumField(record[11:25])\n\t// 26-31\n\trns.RoutingNumberItemCount = rns.parseNumField(record[26:31])\n\t// 32-55\n\trns.UserField = rns.parseStringField(record[31:55])\n\t// 56-80\n\trns.reserved = \" \"\n}", "title": "" }, { "docid": "6dcea285fda78ac17cee8927c89e3811", "score": "0.4589467", "text": "func (p Parser) Parse(rawRequest []byte) (*Data, *Error) {\n\n\tdata := &Data{}\n\trequestData := string(rawRequest)\n\n\tif len(rawRequest) == 0 {\n\t\treturn data, newError(status.BadRequest)\n\t}\n\n\ttokens := strings.Split(requestData, \" \")\n\tdata.Verb = tokens[0]\n\n\tif data.Verb != \"GET\" {\n\t\treturn data, newError(status.InvalidHTTPMethod)\n\t}\n\n\tif len(tokens) < 2 {\n\t\treturn data, newError(status.BadRequest)\n\t}\n\n\tdata.Path = tokens[1][1:]\n\n\tif len(data.Path) > 512 {\n\t\treturn data, newError(status.URITooLong)\n\t}\n\n\tif !isFileTypeSupported(data.Path) {\n\t\treturn data, newError(status.UnsupportedMediaType)\n\t}\n\n\tif !p.fileChecker.Exists(data.Path) {\n\t\treturn data, newError(status.NotFound)\n\t}\n\n\tdata.FileType = tokens[len(tokens)-1]\n\n\treturn data, nil\n}", "title": "" }, { "docid": "f4cc509b011eeb9b38fe7b6379227850", "score": "0.4586012", "text": "func (BaseTxPresenter) ParseData(raw []byte) (interface{}, error) {\n\tvar tx basecoin.Tx\n\terr := wire.ReadBinaryBytes(raw, &tx)\n\treturn tx, err\n}", "title": "" }, { "docid": "6f6e3d98bb4226066bb060b794d9bab9", "score": "0.45648766", "text": "func Parse(r io.Reader, typ int) ([]PartsStruct, []NetsStruct, error) {\n\tswitch typ {\n\tcase EAGLE:\n\t\treturn ParseEagleSchematic(r)\n\t}\n\treturn nil, nil, errors.New(\"invalid schematics type\")\n}", "title": "" }, { "docid": "4403b997adf64a05403bc193f5979153", "score": "0.45597142", "text": "func (p *Parser) Parse(typ *zed.TypeRecord, zng []byte) (zcode.Bytes, error) {\n\tp.Reset()\n\tif zng[0] != leftbracket {\n\t\treturn nil, ErrSyntax\n\t}\n\trest, err := p.ParseContainer(typ, zng)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif len(rest) > 0 {\n\t\treturn nil, ErrSyntax\n\t}\n\treturn p.Bytes().ContainerBody()\n}", "title": "" }, { "docid": "fd3b91f31a3390c89a1acf4759c11f64", "score": "0.4557641", "text": "func (p *paymentPerson) Parse(buf []byte) (int, error) {\n\tbufSize := len(buf)\n\treadPtr := 0\n\n\tif string(buf[readPtr]) != config.ARecordType || bufSize < config.RecordLength {\n\t\treturn readPtr, utils.ErrInvalidAscii\n\t}\n\n\tif p.Payer == nil {\n\t\tp.Payer = records.NewARecord()\n\t}\n\terr := p.Payer.Parse(buf[readPtr : readPtr+config.RecordLength])\n\tif err != nil {\n\t\treturn readPtr, err\n\t}\n\treadPtr += config.RecordLength\n\n\ttypeOfReturn, err := p.getTypeOfReturn()\n\tif err != nil {\n\t\treturn readPtr, err\n\t}\n\n\tp.Payees = []records.Record{}\n\tfor bufSize > readPtr && string(buf[readPtr]) == config.BRecordType {\n\t\tif bufSize < readPtr+config.RecordLength {\n\t\t\treturn readPtr, utils.ErrInvalidAscii\n\t\t}\n\n\t\tnewPayee, err := records.NewBRecord(typeOfReturn)\n\t\tif err != nil {\n\t\t\treturn readPtr, err\n\t\t}\n\t\tif err = newPayee.Parse(buf[readPtr : readPtr+config.RecordLength]); err != nil {\n\t\t\treturn readPtr, err\n\t\t}\n\n\t\treadPtr += config.RecordLength\n\t\tp.Payees = append(p.Payees, newPayee)\n\t}\n\n\tif bufSize <= readPtr {\n\t\treturn readPtr, utils.ErrInvalidAscii\n\t}\n\n\tif string(buf[readPtr]) == config.CRecordType || bufSize < readPtr+config.RecordLength {\n\t\tif p.EndPayer == nil {\n\t\t\tp.EndPayer = records.NewCRecord()\n\t\t}\n\t\terr := p.EndPayer.Parse(buf[readPtr : readPtr+config.RecordLength])\n\t\tif err != nil {\n\t\t\treturn readPtr, err\n\t\t}\n\t\treadPtr += config.RecordLength\n\t}\n\n\tp.States = []records.Record{}\n\tfor bufSize > readPtr && string(buf[readPtr]) == config.KRecordType {\n\t\tif bufSize < readPtr+config.RecordLength {\n\t\t\treturn readPtr, utils.ErrInvalidAscii\n\t\t}\n\n\t\tnewState := records.NewKRecord()\n\t\tif err = newState.Parse(buf[readPtr : readPtr+config.RecordLength]); err != nil {\n\t\t\treturn readPtr, err\n\t\t}\n\n\t\treadPtr += config.RecordLength\n\t\tp.States = append(p.States, newState)\n\t}\n\n\treturn readPtr, nil\n}", "title": "" }, { "docid": "fd3b91f31a3390c89a1acf4759c11f64", "score": "0.4557641", "text": "func (p *paymentPerson) Parse(buf []byte) (int, error) {\n\tbufSize := len(buf)\n\treadPtr := 0\n\n\tif string(buf[readPtr]) != config.ARecordType || bufSize < config.RecordLength {\n\t\treturn readPtr, utils.ErrInvalidAscii\n\t}\n\n\tif p.Payer == nil {\n\t\tp.Payer = records.NewARecord()\n\t}\n\terr := p.Payer.Parse(buf[readPtr : readPtr+config.RecordLength])\n\tif err != nil {\n\t\treturn readPtr, err\n\t}\n\treadPtr += config.RecordLength\n\n\ttypeOfReturn, err := p.getTypeOfReturn()\n\tif err != nil {\n\t\treturn readPtr, err\n\t}\n\n\tp.Payees = []records.Record{}\n\tfor bufSize > readPtr && string(buf[readPtr]) == config.BRecordType {\n\t\tif bufSize < readPtr+config.RecordLength {\n\t\t\treturn readPtr, utils.ErrInvalidAscii\n\t\t}\n\n\t\tnewPayee, err := records.NewBRecord(typeOfReturn)\n\t\tif err != nil {\n\t\t\treturn readPtr, err\n\t\t}\n\t\tif err = newPayee.Parse(buf[readPtr : readPtr+config.RecordLength]); err != nil {\n\t\t\treturn readPtr, err\n\t\t}\n\n\t\treadPtr += config.RecordLength\n\t\tp.Payees = append(p.Payees, newPayee)\n\t}\n\n\tif bufSize <= readPtr {\n\t\treturn readPtr, utils.ErrInvalidAscii\n\t}\n\n\tif string(buf[readPtr]) == config.CRecordType || bufSize < readPtr+config.RecordLength {\n\t\tif p.EndPayer == nil {\n\t\t\tp.EndPayer = records.NewCRecord()\n\t\t}\n\t\terr := p.EndPayer.Parse(buf[readPtr : readPtr+config.RecordLength])\n\t\tif err != nil {\n\t\t\treturn readPtr, err\n\t\t}\n\t\treadPtr += config.RecordLength\n\t}\n\n\tp.States = []records.Record{}\n\tfor bufSize > readPtr && string(buf[readPtr]) == config.KRecordType {\n\t\tif bufSize < readPtr+config.RecordLength {\n\t\t\treturn readPtr, utils.ErrInvalidAscii\n\t\t}\n\n\t\tnewState := records.NewKRecord()\n\t\tif err = newState.Parse(buf[readPtr : readPtr+config.RecordLength]); err != nil {\n\t\t\treturn readPtr, err\n\t\t}\n\n\t\treadPtr += config.RecordLength\n\t\tp.States = append(p.States, newState)\n\t}\n\n\treturn readPtr, nil\n}", "title": "" }, { "docid": "c839ca7a79bb94a5fea78bbb8e362da7", "score": "0.4544248", "text": "func ParseCardBytes(b []byte) (Card, error) {\n\n\tmatches := cardRE.FindSubmatchIndex(b)\n\tif len(matches) != 6 {\n\t\treturn Card(0), ErrBadCard\n\t}\n\tupc := bytes.ToUpper(b)\n\trankStr := string(upc[matches[2]:matches[3]])\n\tsuitStr := string(upc[matches[4]:matches[5]])\n\n\trank := chrToNumRanks[rankStr]\n\tsuit := chrToNumSuits[suitStr]\n\tprime := primeRanks[rank]\n\tbbbb := int32(0x10000) << rank\n\trrrr := rank << 8\n\n\treturn Card(bbbb | suit | rrrr | prime), nil\n}", "title": "" }, { "docid": "3f7ac8b7706bf1e5c48761bc9ade6cce", "score": "0.45410073", "text": "func (parser *AnalyzeResultParser) Parse(data []byte) (interface{}, error) {\n\tanalyze := AnalyzeResult{}\n\tif err := json.Unmarshal(data, &analyze); err == nil && !deepEqual(analyze, *new(AnalyzeResult)) {\n\t\tlog.Println(\"analyze\", analyze)\n\t\treturn analyze, nil\n\t}\n\tnext1 := SuccessParser{}\n\tif success, err := next1.Parse(data); err == nil && success != *new(Success) {\n\t\treturn success, nil\n\t}\n\tnext2 := &FailureParser{}\n\tif failure, err := next2.Parse(data); err == nil && !deepEqual(failure, *new(Failure)) {\n\t\treturn failure, nil\n\t}\n\tlog.Println(\"Failed to parse response\", string(data))\n\treturn nil, errors.New(\"Failed to parse response\")\n}", "title": "" }, { "docid": "9eb30fea571357f0be0686075d073556", "score": "0.45316273", "text": "func (parser *MappingResultParser) Parse(data []byte) (interface{}, error) {\n\tvar result interface{}\n\t/*index := IndexResult{}\n\tif err := json.Unmarshal(data, &index); err == nil {\n\t\tlog.Println(\"index\", string(data), index)\n\t} else {\n\t\tlog.Println(\"Failed to parse response\", string(data))\n\t}*/\n\tlog.Println(string(data))\n\treturn result, nil\n}", "title": "" }, { "docid": "8010339a68060c746db4bf5ff8befb07", "score": "0.45304412", "text": "func (firfi *FIReceiverFI) Parse(record string) error {\n\tif utf8.RuneCountInString(record) < 6 {\n\t\treturn NewTagMinLengthErr(6, len(record))\n\t}\n\n\tfirfi.tag = record[:6]\n\tlength := 6\n\n\tvalue, read, err := firfi.parseVariableStringField(record[length:], 30)\n\tif err != nil {\n\t\treturn fieldError(\"LineOne\", err)\n\t}\n\tfirfi.FIToFI.LineOne = value\n\tlength += read\n\n\tvalue, read, err = firfi.parseVariableStringField(record[length:], 33)\n\tif err != nil {\n\t\treturn fieldError(\"LineTwo\", err)\n\t}\n\tfirfi.FIToFI.LineTwo = value\n\tlength += read\n\n\tvalue, read, err = firfi.parseVariableStringField(record[length:], 33)\n\tif err != nil {\n\t\treturn fieldError(\"LineThree\", err)\n\t}\n\tfirfi.FIToFI.LineThree = value\n\tlength += read\n\n\tvalue, read, err = firfi.parseVariableStringField(record[length:], 33)\n\tif err != nil {\n\t\treturn fieldError(\"LineFour\", err)\n\t}\n\tfirfi.FIToFI.LineFour = value\n\tlength += read\n\n\tvalue, read, err = firfi.parseVariableStringField(record[length:], 33)\n\tif err != nil {\n\t\treturn fieldError(\"LineFive\", err)\n\t}\n\tfirfi.FIToFI.LineFive = value\n\tlength += read\n\n\tvalue, read, err = firfi.parseVariableStringField(record[length:], 33)\n\tif err != nil {\n\t\treturn fieldError(\"LineSix\", err)\n\t}\n\tfirfi.FIToFI.LineSix = value\n\tlength += read\n\n\tif err := firfi.verifyDataWithReadLength(record, length); err != nil {\n\t\treturn NewTagMaxLengthErr(err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "7f73ac8cc30f396cf038e30c2b873963", "score": "0.45240036", "text": "func (addenda98 *Addenda98) Parse(record string) {\n\tif utf8.RuneCountInString(record) != 94 {\n\t\treturn\n\t}\n\n\t// 1-1 Always \"7\"\n\taddenda98.recordType = \"7\"\n\t// 2-3 Always \"98\"\n\taddenda98.TypeCode = record[1:3]\n\t// 4-6\n\taddenda98.ChangeCode = record[3:6]\n\t// 7-21\n\taddenda98.OriginalTrace = strings.TrimSpace(record[6:21])\n\t// 28-35\n\taddenda98.OriginalDFI = addenda98.parseStringField(record[27:35])\n\t// 36-64\n\taddenda98.CorrectedData = strings.TrimSpace(record[35:64])\n\t// 80-94\n\taddenda98.TraceNumber = strings.TrimSpace(record[79:94])\n}", "title": "" }, { "docid": "828f0a391fe2a62260fc4605308ec149", "score": "0.45152232", "text": "func (RDA) FromRaw(m dia.RawMsg) (dia.Answer, string, error) {\n\ts := \"\"\n\te := m.Validate(false, true, false, false)\n\tif e != nil {\n\t\treturn nil, s, e\n\t}\n\n\tv := RDA{}\n\tfor _, a := range m.AVP {\n\t\tswitch a.Code {\n\t\tcase 263:\n\t\t\ts, e = dia.GetSessionID(a)\n\t\tcase 268, 297:\n\t\t\tv.ResultCode, e = dia.GetResultCode(a)\n\t\tcase 264:\n\t\t\tv.OriginHost, e = dia.GetOriginHost(a)\n\t\tcase 296:\n\t\t\tv.OriginRealm, e = dia.GetOriginRealm(a)\n\n\t\tcase 3102:\n\t\t\t_, v.MSISDN, e = getUserIdentifier(a)\n\t\t}\n\t\tif e != nil {\n\t\t\treturn nil, s, e\n\t\t}\n\t}\n\n\tif v.ResultCode == 0 ||\n\t\tlen(v.OriginHost) == 0 || len(v.OriginRealm) == 0 {\n\t\te = dia.InvalidAVP(dia.DiameterMissingAvp)\n\t}\n\treturn v, s, e\n}", "title": "" }, { "docid": "0fba6ac765b8f15ef3b39e55461d6e36", "score": "0.45036364", "text": "func ParseRaw(b []byte) ([]byte, Type, []byte) {\n\ttp := Type(b[0])\n\tb, l := ParseLength(b[1:])\n\tres := b[:l]\n\treturn b[l:], tp, res\n}", "title": "" }, { "docid": "e7b7d01e99c1e6f7e85dd884134d951d", "score": "0.4499796", "text": "func (cd *CheckDetail) Parse(record string) {\n\tif utf8.RuneCountInString(record) < 80 {\n\t\treturn // line too short\n\t}\n\n\t// Character position 1-2, Always \"25\"\n\tcd.setRecordType()\n\t// 03-17\n\tcd.AuxiliaryOnUs = cd.parseStringField(record[2:17])\n\t// 18-18\n\tcd.ExternalProcessingCode = cd.parseStringField(record[17:18])\n\t// 19-26\n\tcd.PayorBankRoutingNumber = cd.parseStringField(record[18:26])\n\t// 27-27\n\tcd.PayorBankCheckDigit = cd.parseStringField(record[26:27])\n\t// 28-47\n\tcd.OnUs = cd.parseStringField(record[27:47])\n\t// 48-57\n\tcd.ItemAmount = cd.parseNumField(record[47:57])\n\t// 58-72\n\tcd.EceInstitutionItemSequenceNumber = cd.parseStringField(record[57:72])\n\t// 73-73\n\tcd.DocumentationTypeIndicator = cd.parseStringField(record[72:73])\n\t// 74-74\n\tcd.ReturnAcceptanceIndicator = cd.parseStringField(record[73:74])\n\t// 75-75\n\tcd.MICRValidIndicator = cd.parseNumField(record[74:75])\n\t// 76-76\n\tcd.BOFDIndicator = cd.parseStringField(record[75:76])\n\t// 77-78\n\tcd.AddendumCount = cd.parseNumField(record[76:78])\n\t// 79-79\n\tcd.CorrectionIndicator = cd.parseNumField(record[78:79])\n\t// 80-80\n\tcd.ArchiveTypeIndicator = cd.parseStringField(record[79:80])\n}", "title": "" }, { "docid": "b343fc56dfc50f2861459c7ae7e87439", "score": "0.44965222", "text": "func Parse(data []byte) (*fintracts.Contract, error) {\n\tast := &Contract{}\n\terr := parser.ParseBytes(\"\", data, ast)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tcontract, err := ast.convert()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\terr = validator.Validate(contract)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn contract, err\n}", "title": "" }, { "docid": "798b43899a8b1770b7f0ee8be26fe4dd", "score": "0.4493515", "text": "func (p JSONDataParser) Parse() ([]*models.Card, error) {\n\tvar ret []*models.Card\n\n\t// Parsing skills\n\tvar tmpSkills []TmpSkill\n\tvar skills []*models.Skill\n\ttext, err := ioutil.ReadFile(skillPath)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"cannot read file (%s): %v\", skillPath, err)\n\t}\n\tif err = json.Unmarshal(text, &tmpSkills); err != nil {\n\t\treturn nil, fmt.Errorf(\"cannot unmarshal (%s): %v\", rarityPath, err)\n\t}\n\tfor _, tmpSkill := range tmpSkills {\n\t\tskill, err := makeSkill(tmpSkill)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"cannot make skill: %v\", err)\n\t\t}\n\t\tskills = append(skills, skill)\n\t}\n\n\t// Parsing rarities\n\tvar tmpRarities []TmpRarity\n\tvar rarities []*models.Rarity\n\ttext, err = ioutil.ReadFile(rarityPath)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"cannot read file (%s): %v\", rarityPath, err)\n\t}\n\tif err = json.Unmarshal(text, &tmpRarities); err != nil {\n\t\treturn nil, fmt.Errorf(\"cannot unmarshal (%s): %v\", rarityPath, err)\n\t}\n\tfor _, tmpRarity := range tmpRarities {\n\t\trarities = append(rarities, makeRarity(tmpRarity))\n\t}\n\n\t// Parsing idols\n\tvar tmpIdols []TmpIdol\n\tvar idols []*models.Idol\n\ttext, err = ioutil.ReadFile(idolPath)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"cannot read file (%s): %v\", idolPath, err)\n\t}\n\tif err = json.Unmarshal(text, &tmpIdols); err != nil {\n\t\treturn nil, fmt.Errorf(\"cannot unmarshal (%s): %v\", rarityPath, err)\n\t}\n\tfor _, tmpIdol := range tmpIdols {\n\t\tidols = append(idols, makeIdol(tmpIdol))\n\t}\n\n\t// Parsing cards\n\tvar cards []TmpCard\n\ttext, err = ioutil.ReadFile(cardPath)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"cannot read file (%s): %v\", cardPath, err)\n\t}\n\tif err = json.Unmarshal(text, &cards); err != nil {\n\t\treturn nil, fmt.Errorf(\"cannot unmarshal %s : %v\", cardPath, err)\n\t}\n\n\tfor _, tmpCard := range cards {\n\t\tleadSkill, err := makeLeadSkill(tmpCard.TmpLeadSkill)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"cannot get lead skill for card id (%d): %v\", tmpCard.ID, err)\n\t\t}\n\t\tvar chosenRarity *models.Rarity\n\t\tfor _, rarity := range rarities {\n\t\t\tif rarity.ID == tmpCard.TmpRarity.Rarity {\n\t\t\t\tchosenRarity = rarity\n\t\t\t}\n\t\t}\n\t\tif chosenRarity == nil {\n\t\t\treturn nil, fmt.Errorf(\"cannot get rarity for card id (%d)\", tmpCard.ID)\n\t\t}\n\n\t\tvar chosenIdol *models.Idol\n\t\tfor _, idol := range idols {\n\t\t\tif idol.ID == tmpCard.TmpIdol.ID {\n\t\t\t\tchosenIdol = idol\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif chosenIdol == nil {\n\t\t\treturn nil, fmt.Errorf(\"cannot get idol for card id (%d)\", tmpCard.ID)\n\t\t}\n\n\t\tvar chosenSkill *models.Skill\n\t\tfor _, skill := range skills {\n\t\t\tif skill.ID == tmpCard.TmpSkill.ID {\n\t\t\t\tchosenSkill = skill\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif chosenSkill == nil {\n\t\t\treturn nil, fmt.Errorf(\"cannot get skill for card id (%d)\", tmpCard.ID)\n\t\t}\n\n\t\tcard := models.Card{\n\t\t\tID: tmpCard.ID,\n\t\t\tSeriesID: tmpCard.SeriesID,\n\t\t\tTitle: tmpCard.Title,\n\t\t\tIdol: chosenIdol,\n\t\t\tRarity: chosenRarity,\n\t\t\tLeadSkill: leadSkill,\n\t\t\tSkill: chosenSkill,\n\t\t\tBonusDance: tmpCard.BonusDance,\n\t\t\tBonusHp: tmpCard.BonusHp,\n\t\t\tBonusVisual: tmpCard.BonusVisual,\n\t\t\tBonusVocal: tmpCard.BonusVocal,\n\t\t\tDanceMax: tmpCard.DanceMax,\n\t\t\tDanceMin: tmpCard.DanceMin,\n\t\t\tHpMax: tmpCard.HpMax,\n\t\t\tHpMin: tmpCard.HpMin,\n\t\t\tVisualMax: tmpCard.VisualMax,\n\t\t\tVisualMin: tmpCard.VisualMin,\n\t\t\tVocalMax: tmpCard.VocalMax,\n\t\t\tVocalMin: tmpCard.VocalMin,\n\t\t}\n\t\tret = append(ret, &card)\n\t}\n\n\treturn ret, nil\n}", "title": "" }, { "docid": "f8eee55c3251e240a30264f91930a9f6", "score": "0.44922605", "text": "func DecodeQP(raw []byte) (out []byte) {\n\tif len(raw) == 0 {\n\t\treturn nil\n\t}\n\n\tout = make([]byte, 0, len(raw))\n\n\tfor x := 0; x < len(raw); x++ {\n\t\tif ascii.IsSpace(raw[x]) {\n\t\t\tcontinue\n\t\t}\n\t\tif raw[x] == '=' {\n\t\t\tif x+2 < len(raw) {\n\t\t\t\tx++\n\t\t\t\tb, ok := libbytes.ReadHexByte(raw, x)\n\t\t\t\tif ok {\n\t\t\t\t\tout = append(out, b)\n\t\t\t\t\tx++\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tx--\n\t\t\t}\n\t\t}\n\t\tout = append(out, raw[x])\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "364d7aa4aa563a829fbd0d6abf0a0cc8", "score": "0.4489443", "text": "func (p Payload) Parse() (MoveeFrame, error) {\n\tif len(p) < 3 {\n\t\treturn nil, fmt.Errorf(\"The payload must have at least 3 bytes: %#v\", p)\n\t}\n\tswitch MoveeType(p[2]) {\n\tcase Alive:\n\t\treturn parseAlive(p)\n\tcase Temperature:\n\t\treturn parseTemperature(p)\n\tcase Shock:\n\t\treturn parseShock(p)\n\tcase Tilt:\n\t\treturn parseTilt(p)\n\tcase Orient:\n\t\treturn parseOrient(p)\n\tcase Motion:\n\t\treturn parseMotion(p)\n\tcase Activity:\n\t\treturn parseActivity(p)\n\tcase Rotation:\n\t\treturn parseRotation(p)\n\tcase Vibration:\n\t\treturn parseVibe(p)\n\tcase Version:\n\t\treturn parseVersion(p)\n\tcase Service:\n\t\treturn parseService(p)\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"Unknown type of frame : %x\", p)\n\t}\n}", "title": "" }, { "docid": "ba0de67cc0d071b94ef3c3eea6d84cc3", "score": "0.44890973", "text": "func ParseRaws(input []byte) []*Tag {\n\tout := make([]*Tag, 0)\n\n\t// Some trickery to preserve leading comments, part A\n\tx := make([]byte, 0, len(input)+9)\n\tx = append(x, \"[__NOP__]\"...)\n\tinput = append(x, input...)\n\n\tlexeme := make([]byte, 0, 20)\n\trawtag := make([]byte, 0, 40)\n\tcomments := make([]byte, 0, 100)\n\tstate := stEatComment\n\tvar prevTag *Tag\n\tvar curTag *Tag\n\n\tline := 1\n\tcolumn := 1\n\n\tfor _, val := range input {\n\t\t// Unused, but better to have it and not use it than not to have it at all...\n\t\tif val == '\\n' {\n\t\t\tline++\n\t\t\tcolumn = 1\n\t\t} else {\n\t\t\tcolumn++\n\t\t}\n\n\t\tif val == '[' {\n\t\t\t// Start new tag\n\t\t\tif state != stEatComment {\n\t\t\t\tcomments = append(comments, rawtag...)\n\t\t\t\tcomments = append(comments, lexeme...)\n\n\t\t\t\tlexeme = lexeme[0:0]\n\t\t\t\trawtag = rawtag[0:1]\n\t\t\t\trawtag[0] = '['\n\n\t\t\t\tif prevTag != nil {\n\t\t\t\t\tprevTag.Comments += string(comments)\n\t\t\t\t}\n\t\t\t\tcomments = comments[0:0]\n\t\t\t\tcurTag = new(Tag)\n\t\t\t\tcurTag.Line = line\n\t\t\t\tstate = stReadTagID\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\trawtag = rawtag[0:1]\n\t\t\trawtag[0] = '['\n\n\t\t\tif curTag != nil {\n\t\t\t\tcurTag.Comments = string(comments)\n\t\t\t\tout = append(out, curTag)\n\t\t\t}\n\t\t\tcomments = comments[0:0]\n\t\t\tprevTag = curTag\n\t\t\tcurTag = new(Tag)\n\t\t\tcurTag.Line = line\n\t\t\tstate = stReadTagID\n\t\t\tcontinue\n\t\t}\n\t\tif val == ']' {\n\t\t\t// Close out tag\n\t\t\tif state == stReadTagID {\n\t\t\t\tcurTag.ID = string(lexeme)\n\t\t\t} else if state == stReadParam {\n\t\t\t\tcurTag.Params = append(curTag.Params, string(lexeme))\n\t\t\t}\n\t\t\tlexeme = lexeme[0:0]\n\t\t\tstate = stEatComment\n\t\t\tcontinue\n\t\t}\n\t\tif val == ':' {\n\t\t\t// Start new param\n\t\t\tif state == stReadTagID {\n\t\t\t\tcurTag.ID = string(lexeme)\n\t\t\t\trawtag = append(rawtag, lexeme...)\n\t\t\t\trawtag = append(rawtag, ':')\n\t\t\t\tlexeme = lexeme[0:0]\n\t\t\t\tstate = stReadParam\n\t\t\t\tcontinue\n\t\t\t} else if state == stReadParam {\n\t\t\t\tcurTag.Params = append(curTag.Params, string(lexeme))\n\t\t\t\trawtag = append(rawtag, lexeme...)\n\t\t\t\trawtag = append(rawtag, ':')\n\t\t\t\tlexeme = lexeme[0:0]\n\t\t\t\tcontinue\n\t\t\t}\n\t\t}\n\n\t\tif state == stEatComment {\n\t\t\tcomments = append(comments, val)\n\t\t\tcontinue\n\t\t}\n\n\t\t// Add char to lexeme\n\t\tlexeme = append(lexeme, val)\n\t}\n\tif curTag != nil {\n\t\tcurTag.Comments = string(comments)\n\t\tcomments = comments[0:0]\n\t\tout = append(out, curTag)\n\t}\n\n\t// Some trickery to preserve leading comments, part B\n\tout[0].CommentsOnly = true\n\n\treturn out\n}", "title": "" }, { "docid": "bf8b6ff1e1025092ecffed85f25a045c", "score": "0.44842002", "text": "func ParseMsg(data []byte) (*Msg, error) {\n\tif len(data) < 236 {\n\t\treturn nil, ErrShortRead\n\t}\n\n\tmsg := &Msg{\n\t\tOp: data[0],\n\t\tHtype: data[1],\n\t\tHlen: data[2],\n\t\tHops: data[3],\n\t\tXid: binary.BigEndian.Uint32(data[4:8]),\n\t\tSecs: binary.BigEndian.Uint16(data[8:10]),\n\t\tFlags: binary.BigEndian.Uint16(data[10:12]),\n\t\tCiaddr: net.IP(data[12:16]),\n\t\tYiaddr: net.IP(data[16:20]),\n\t\tSiaddr: net.IP(data[20:24]),\n\t\tGiaddr: net.IP(data[24:28]),\n\t\tChaddr: net.HardwareAddr(data[28:34]), // 6-byte MAC only\n\t\tSname: string(bytes.TrimRight(data[44:108], \"\\000\")),\n\t\tFile: string(bytes.TrimRight(data[108:236], \"\\000\")),\n\t}\n\n\tif msg.Hlen != 6 {\n\t\treturn nil, errors.Errorf(\"unsupported hlen of %d\", msg.Hlen)\n\t}\n\n\tcookie := binary.BigEndian.Uint32(data[236:240])\n\tif Cookie != cookie {\n\t\tfmt.Printf(\"data: %v\\n\", data)\n\t\treturn nil, errors.Errorf(\"incorrect cookie, expected %d got %d\", Cookie, cookie)\n\t}\n\n\tvar err error\n\tmsg.Options, err = ParseOptions(data[240:])\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"parse options\")\n\t}\n\n\treturn msg, nil\n}", "title": "" }, { "docid": "132ab0e52d2fbe85200261f10f376148", "score": "0.44822982", "text": "func (p MsgParser) Parse(contractAddr sdk.AccAddress, msg wasmTypes.CosmosMsg) ([]sdk.Msg, error) {\r\n\tswitch {\r\n\tcase msg.Bank != nil:\r\n\t\tif parser, ok := p[WasmMsgParserRouteBank]; ok {\r\n\t\t\treturn parser.Parse(contractAddr, msg)\r\n\t\t}\r\n\r\n\t\treturn nil, sdkerrors.Wrap(ErrNoRegisteredParser, WasmMsgParserRouteBank)\r\n\tcase msg.Custom != nil:\r\n\t\tvar customMsg WasmCustomMsg\r\n\t\terr := json.Unmarshal(msg.Custom, &customMsg)\r\n\t\tif err != nil {\r\n\t\t\treturn nil, sdkerrors.Wrap(sdkerrors.ErrJSONUnmarshal, err.Error())\r\n\t\t}\r\n\r\n\t\tif parser, ok := p[customMsg.Route]; ok {\r\n\t\t\treturn parser.ParseCustom(contractAddr, customMsg.MsgData)\r\n\t\t}\r\n\r\n\t\treturn nil, sdkerrors.Wrap(ErrNoRegisteredParser, customMsg.Route)\r\n\tcase msg.Staking != nil:\r\n\t\tif parser, ok := p[WasmMsgParserRouteStaking]; ok {\r\n\t\t\treturn parser.Parse(contractAddr, msg)\r\n\t\t}\r\n\r\n\t\treturn nil, sdkerrors.Wrap(ErrNoRegisteredParser, WasmMsgParserRouteStaking)\r\n\tcase msg.Wasm != nil:\r\n\t\tif parser, ok := p[WasmMsgParserRouteWasm]; ok {\r\n\t\t\treturn parser.Parse(contractAddr, msg)\r\n\t\t}\r\n\r\n\t\treturn nil, sdkerrors.Wrap(ErrNoRegisteredParser, WasmMsgParserRouteWasm)\r\n\t}\r\n\treturn nil, sdkerrors.Wrap(ErrInvalidMsg, \"failed to parse empty msg\")\r\n}", "title": "" }, { "docid": "0686691097fd9c7de03fb48853f748b5", "score": "0.44758797", "text": "func (parser *AggregationResultParser) Parse(data []byte) (interface{}, error) {\n\tvar result interface{}\n\tagg := AggregationResult{}\n\tif err := json.Unmarshal(data, &agg); err == nil && !deepEqual(agg, *new(AggregationResult)) {\n\t\tlog.Println(\"aggregation\", agg)\n\t\treturn agg, nil\n\t}\n\tnext2 := &FailureParser{}\n\tif failure, err := next2.Parse(data); err == nil && !deepEqual(failure, *new(Failure)) {\n\t\treturn failure, nil\n\t}\n\tlog.Println(string(data))\n\treturn result, nil\n}", "title": "" }, { "docid": "2d72a73242f1602ca9ff1f5b63ab4c84", "score": "0.44676366", "text": "func (addenda98 *Addenda98) ParseCorrectedData() *CorrectedData {\n\tif addenda98 == nil {\n\t\treturn nil\n\t}\n\tcc := addenda98.ChangeCodeField()\n\tif cc == nil {\n\t\treturn nil\n\t}\n\tswitch cc.Code {\n\tcase \"C01\": // Incorrect DFI Account Number\n\t\tif v := first(17, addenda98.CorrectedData); v != \"\" {\n\t\t\treturn &CorrectedData{AccountNumber: v}\n\t\t}\n\tcase \"C02\": // Incorrect Routing Number\n\t\tif v := first(9, addenda98.CorrectedData); v != \"\" {\n\t\t\treturn &CorrectedData{RoutingNumber: v}\n\t\t}\n\tcase \"C03\": // Incorrect Routing Number and Incorrect DFI Account Number\n\t\tparts := strings.Fields(addenda98.CorrectedData)\n\t\tif len(parts) == 2 {\n\t\t\treturn &CorrectedData{\n\t\t\t\tRoutingNumber: parts[0],\n\t\t\t\tAccountNumber: parts[1],\n\t\t\t}\n\t\t}\n\tcase \"C04\": // Incorrect Individual Name\n\t\tif v := first(22, addenda98.CorrectedData); v != \"\" {\n\t\t\treturn &CorrectedData{Name: v}\n\t\t}\n\tcase \"C05\": // Incorrect Transaction Code\n\t\tif n, err := strconv.Atoi(first(2, addenda98.CorrectedData)); err == nil {\n\t\t\treturn &CorrectedData{TransactionCode: n}\n\t\t}\n\tcase \"C06\": // Incorrect DFI Account Number and Incorrect Transaction Code\n\t\tparts := strings.Fields(addenda98.CorrectedData)\n\t\tif len(parts) == 2 {\n\t\t\tif n, err := strconv.Atoi(parts[1]); err == nil {\n\t\t\t\treturn &CorrectedData{\n\t\t\t\t\tAccountNumber: parts[0],\n\t\t\t\t\tTransactionCode: n,\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\tcase \"C07\": // Incorrect Routing Number, Incorrect DFI Account Number, and Incorrect Tranaction Code\n\t\tvar cd CorrectedData\n\t\tif n := len(addenda98.CorrectedData); n > 9 {\n\t\t\tcd.RoutingNumber = addenda98.CorrectedData[:9]\n\t\t} else {\n\t\t\treturn nil\n\t\t}\n\t\tparts := strings.Fields(addenda98.CorrectedData[9:])\n\t\tif len(parts) == 2 {\n\t\t\tif n, err := strconv.Atoi(parts[1]); err == nil {\n\t\t\t\tcd.AccountNumber = parts[0]\n\t\t\t\tcd.TransactionCode = n\n\t\t\t\treturn &cd\n\t\t\t}\n\t\t} else {\n\t\t\treturn nil\n\t\t}\n\tcase \"C09\": // Incorrect Individual Identification Number\n\t\tif v := first(22, addenda98.CorrectedData); v != \"\" {\n\t\t\treturn &CorrectedData{Identification: v}\n\t\t}\n\t}\n\t// The Code/Correction is either unsupported or wasn't parsed correctly\n\treturn nil\n}", "title": "" }, { "docid": "85e647d41945efadd1d2c4410786db0a", "score": "0.4461494", "text": "func Parse(s string) (Zip, error) {\n\tif len(s) != 5 {\n\t\treturn 0, fmt.Errorf(\"%q is not a zip code\", s)\n\t}\n\n\ti, err := strconv.Atoi(s)\n\tif err != nil {\n\t\treturn 0, fmt.Errorf(\"%q is not a zip code\", s)\n\t}\n\n\treturn Zip(i), nil\n}", "title": "" }, { "docid": "b44d41f21ecabef3307a8dd0692578c4", "score": "0.4460771", "text": "func (accl *ACCL) Parse(bytes []byte, scale *SCAL) error {\n\t// Check length\n\tif 6 != len(bytes) {\n\t\treturn errors.New(\"ACCL: Invalid packet length\")\n\t}\n\n\t// Accelerometer 3D\n\taccl.X = float64(int16(binary.BigEndian.Uint16(bytes[0:2]))) / float64(scale.Divisor[0])\n\taccl.Y = float64(int16(binary.BigEndian.Uint16(bytes[2:4]))) / float64(scale.Divisor[0])\n\taccl.Z = float64(int16(binary.BigEndian.Uint16(bytes[4:6]))) / float64(scale.Divisor[0])\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "40a50fa65d2033e23f9b97be0b16ca2a", "score": "0.4458096", "text": "func parseData(resp *http.Response, data interface{}) (err error) {\n\tdefer resp.Body.Close()\n\treturn ParseData(resp, data)\n}", "title": "" }, { "docid": "dcc1cded98fe9afb417179733307ab0f", "score": "0.44539762", "text": "func (d *Decoder) Parse() error {\n\tvar err error\n\n\t// File header\n\tif err = d.Read(&d.Format); err != nil {\n\t\treturn err\n\t}\n\tif d.Format != fileHeaderID {\n\t\treturn fmt.Errorf(\"%s %s\", string(d.Format[:]), ErrFmtNotSupported)\n\t}\n\tif err = d.Read(&d.Version); err != nil {\n\t\treturn err\n\t}\n\tif d.Version > 1 {\n\t\treturn fmt.Errorf(\"CAF v%s - %s\", d.Version, ErrFmtNotSupported)\n\t}\n\t// ignore the flags value\n\tif err = d.Read(&d.Flags); err != nil {\n\t\treturn err\n\t}\n\n\t// The Audio Description chunk is required and must appear in a CAF file immediately following the file header. It describes the format of the audio data in the Audio Data chunk.\n\tcType, _, err := d.chunkHeader()\n\tif err != nil {\n\t\treturn err\n\t}\n\tif cType != StreamDescriptionChunkID {\n\t\treturn fmt.Errorf(\"%s - Expected description chunk\", ErrUnexpectedData)\n\t}\n\tif err := d.parseDescChunk(); err != nil {\n\t\treturn err\n\t}\n\n\t// parse the actual content\n\tfor err == nil {\n\t\terr = d.parseChunk()\n\t}\n\n\tif err != io.EOF {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "aba6a41a81197112890c7c83bb549533", "score": "0.44533613", "text": "func (g *Game) ParseQuestionFinished(bytes []byte) (questionFinished *QuestionFinished) {\n\tjson.Unmarshal(bytes, &questionFinished)\n\n\tif questionFinished.Type == \"questionFinished\" {\n\t\treturn questionFinished\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "53d8e8e0f55fcb1a07398d276fd11dc9", "score": "0.44526172", "text": "func (gps5 *GPS5) Parse(bytes []byte, scale *SCAL) error {\n\t// Check length\n\tif 20 != len(bytes) {\n\t\treturn errors.New(\"GPS5: Inavlid packet length\")\n\t}\n\n\t// Geodetic location\n\tgps5.Lat = float64(int32(binary.BigEndian.Uint32(bytes[0:4]))) / float64(scale.Divisor[0])\n\tgps5.Lon = float64(int32(binary.BigEndian.Uint32(bytes[4:8]))) / float64(scale.Divisor[1])\n\tgps5.Alt = float64(int32(binary.BigEndian.Uint32(bytes[8:12]))) / float64(scale.Divisor[2])\n\n\t// Speed 2D/3D\n\tgps5.Speed2D = float64(int32(binary.BigEndian.Uint32(bytes[12:16]))) / float64(scale.Divisor[3])\n\tgps5.Speed3D = float64(int32(binary.BigEndian.Uint32(bytes[16:20]))) / float64(scale.Divisor[4])\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "0d93583aa55d9c5a68cc1e2845d0e6c8", "score": "0.44498494", "text": "func parseData(s string) (d data, ok bool) {\n var err error\n barra1 := strings.IndexRune(s, '/')\n if barra1 < 0 {\n return\n }\n barra2 := strings.IndexRune(s[barra1+1:], '/')\n if barra2 < 0 {\n return\n }\n barra2 += barra1 + 1\n d.g, err = strconv.Atoi(s[:barra1])\n if err != nil {\n return\n }\n d.m, err = strconv.Atoi(s[barra1+1:barra2])\n if err != nil {\n return\n }\n d.a, err = strconv.Atoi(s[barra2+1:])\n if err != nil {\n return\n }\n ok = true\n return\n}", "title": "" }, { "docid": "93a84ba3f5c6588d41146db7f32aa719", "score": "0.44497648", "text": "func (p *Peripheral) ParseData(b []byte) {\n\tif len(b) < 13 {\n\t\treturn\n\t}\n\n\tt := fmt.Sprintf(\"%02X%02X\", b[8], b[9])\n\th := fmt.Sprintf(\"%02X%02X\", b[10], b[11])\n\tbt := fmt.Sprintf(\"%02X\", b[3])\n\n\tparseTemperature(p, &t)\n\tparseHumidity(p, &h)\n\tparseBattery(p, &bt)\n}", "title": "" }, { "docid": "7226511069afe638c8cca3d8e28efbd1", "score": "0.44481367", "text": "func (gpsp *GPSP) Parse(bytes []byte) error {\n\t// Check length\n\tif 2 != len(bytes) {\n\t\treturn errors.New(\"GPSP: Invalid packet length\")\n\t}\n\n\t// GPS accuracy\n\tgpsp.Accuracy = binary.BigEndian.Uint16(bytes[0:2])\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "d4bdec2b669fd34167bd18620aaaf759", "score": "0.44469687", "text": "func (addenda10 *Addenda10) Parse(record string) {\n\tif utf8.RuneCountInString(record) != 94 {\n\t\treturn\n\t}\n\trunes := []rune(record)\n\n\t// 1-1 Always 7\n\t// 2-3 Always 10\n\taddenda10.TypeCode = string(runes[1:3])\n\t// 04-06 Describes the type of payment\n\taddenda10.TransactionTypeCode = string(runes[3:6])\n\t// 07-24 Payment Amount\tFor inbound IAT payments this field should contain the USD amount or may be blank.\n\taddenda10.ForeignPaymentAmount = addenda10.parseNumField(string(runes[06:24]))\n\t// 25-46 Insert blanks or zeros\n\taddenda10.ForeignTraceNumber = strings.TrimSpace(string(runes[24:46]))\n\t// 47-81 Receiving Company Name/Individual Name\n\taddenda10.Name = strings.TrimSpace(string(runes[46:81]))\n\t// 82-87 reserved - Leave blank\n\t// 88-94 Contains the last seven digits of the number entered in the Trace Number field in the corresponding Entry Detail Record\n\taddenda10.EntryDetailSequenceNumber = addenda10.parseNumField(string(runes[87:94]))\n}", "title": "" }, { "docid": "fe01d3da5e0a3505cf433c5779f7aa1a", "score": "0.44442075", "text": "func (klv *KLV) Parse(bytes []byte) error {\n\t// Check length\n\tif len(bytes) != 8 {\n\t\treturn errors.New(\"KLV: Invalid packet length\")\n\t}\n\n\t// Four CC\n\tklv.FourCC = bytes[0:4]\n\tfor _, c := range klv.FourCC {\n\t\tif c < 0x41 || c > 0x5A {\n\t\t\treturn errors.New(\"KLV: Invalid Four CC Character\")\n\t\t}\n\t}\n\n\t// Format\n\tklv.Format = bytes[4]\n\thasFormat := false\n\tfor _, f := range formats {\n\t\thasFormat = hasFormat || (f == klv.Format)\n\t}\n\tif !hasFormat {\n\t\treturn errors.New(\"KLV: Invalid Format Character\")\n\t}\n\n\t// Size & Count\n\tklv.Size = bytes[5]\n\tklv.Count = binary.BigEndian.Uint16(bytes[6:8])\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "c3c1d45d5acf30ff1430bf416d149c04", "score": "0.4443434", "text": "func ParseResults(data string) [][]string {\n\tvar out [][]string\n\trows := strings.Split(data, \"\\n\")\n\tfor i := 0; i < len(rows); i++ {\n\t\trow := strings.Split(rows[i], \",\")\n\t\tif len(row) == 5 && row[0] != \"SUM\" {\n\t\t\tout = append(out, row)\n\t\t}\n\t}\n\treturn out\n}", "title": "" }, { "docid": "cf705ca62aefc9775dab69393e917372", "score": "0.4440395", "text": "func parseSkin(data []byte, r *rep.Replay, cfg Config) error {\n\t// TODO 0x15e0 bytes of data\n\treturn nil\n}", "title": "" }, { "docid": "db2563a16669eb1835c768156e95a0b5", "score": "0.44271305", "text": "func (p *parser) parseData() (stmts []goast.Stmt) {\n\tp.expect(ftData)\n\tp.ident++\n\n\t// parse names and values\n\tvar names [][]node\n\tnames = append(names, []node{})\n\tvar values [][]node\n\tcounter := 0\n\tisNames := true\n\tfor ; p.ident < len(p.ns); p.ident++ {\n\t\tif p.ns[p.ident].tok == ftNewLine {\n\t\t\tbreak\n\t\t}\n\t\tif p.ns[p.ident].tok == token.QUO {\n\t\t\tif isNames {\n\t\t\t\tvalues = append(values, []node{})\n\t\t\t}\n\t\t\tisNames = !isNames\n\t\t\tcontinue\n\t\t}\n\t\tif p.ns[p.ident].tok == token.LPAREN {\n\t\t\tcounter++\n\t\t}\n\t\tif p.ns[p.ident].tok == token.RPAREN {\n\t\t\tcounter--\n\t\t}\n\t\tif p.ns[p.ident].tok == token.COMMA && counter == 0 {\n\t\t\tif isNames {\n\t\t\t\tnames = append(names, []node{})\n\t\t\t} else {\n\t\t\t\tvalues = append(values, []node{})\n\t\t\t}\n\t\t\tcontinue\n\t\t}\n\t\tif isNames {\n\t\t\tnames[len(names)-1] = append(names[len(names)-1], p.ns[p.ident])\n\t\t} else {\n\t\t\tvalues[len(values)-1] = append(values[len(values)-1], p.ns[p.ident])\n\t\t}\n\t}\n\n\t// Example of names:\n\t// LL - value\n\t// LL - vector fully\n\t// LL - matrix fully\n\t// LL (1) - one value of vector\n\t// LL (1,1) - one value of matrix\n\t// (LL( J ), J = 1, 4 ) - one row of vector\n\t// (LL( 1, J ), J = 1, 4 ) - one row of matrix\n\ttype tExpr struct {\n\t\texpr goast.Expr\n\t\tisByte bool\n\t}\n\tvar nameExpr []tExpr\n\tfor _, name := range names {\n\t\tif len(name) == 1 {\n\t\t\t// LL - value\n\t\t\t// LL - vector fully\n\t\t\t// LL - matrix fully\n\t\t\tv, ok := p.initVars.get(nodesToString(name))\n\t\t\tif !ok {\n\t\t\t\tp.initVars.add(nodesToString(name), goType{\n\t\t\t\t\tbaseType: \"float64\",\n\t\t\t\t})\n\t\t\t\tv, _ = p.initVars.get(nodesToString(name))\n\t\t\t}\n\t\t\tlenArray := p.getArrayLen(v.name)\n\t\t\tisByte := v.typ.getBaseType() == \"byte\"\n\t\t\tswitch lenArray {\n\t\t\tcase 0:\n\t\t\t\tnameExpr = append(nameExpr, tExpr{\n\t\t\t\t\texpr: p.parseExprNodes(name),\n\t\t\t\t\tisByte: isByte,\n\t\t\t\t})\n\t\t\tcase 1: // vector\n\t\t\t\tsize, ok := p.getSize(v.name, 0)\n\t\t\t\tif !ok {\n\t\t\t\t\tpanic(\"Not ok : \" + v.name)\n\t\t\t\t}\n\t\t\t\tfor i := 0; i < size; i++ {\n\t\t\t\t\tnameExpr = append(nameExpr, tExpr{\n\t\t\t\t\t\texpr: &goast.IndexExpr{\n\t\t\t\t\t\t\tX: goast.NewIdent(nodesToString(name)),\n\t\t\t\t\t\t\tLbrack: 1,\n\t\t\t\t\t\t\tIndex: &goast.BasicLit{\n\t\t\t\t\t\t\t\tKind: token.INT,\n\t\t\t\t\t\t\t\tValue: strconv.Itoa(i),\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t\tisByte: isByte})\n\t\t\t\t}\n\t\t\tcase 2: // matrix\n\t\t\t\tsize0, _ := p.getSize(v.name, 0)\n\t\t\t\tsize1, _ := p.getSize(v.name, 1)\n\t\t\t\tfor i := 0; i < size0; i++ {\n\t\t\t\t\tfor j := 0; j < size1; j++ {\n\t\t\t\t\t\tnameExpr = append(nameExpr, tExpr{\n\t\t\t\t\t\t\texpr: &goast.IndexExpr{\n\t\t\t\t\t\t\t\tX: &goast.IndexExpr{\n\t\t\t\t\t\t\t\t\tX: goast.NewIdent(nodesToString(name)),\n\t\t\t\t\t\t\t\t\tLbrack: 1,\n\t\t\t\t\t\t\t\t\tIndex: &goast.BasicLit{\n\t\t\t\t\t\t\t\t\t\tKind: token.INT,\n\t\t\t\t\t\t\t\t\t\tValue: strconv.Itoa(j),\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\tLbrack: 1,\n\t\t\t\t\t\t\t\tIndex: &goast.BasicLit{\n\t\t\t\t\t\t\t\t\tKind: token.INT,\n\t\t\t\t\t\t\t\t\tValue: strconv.Itoa(i),\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\tisByte: isByte})\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\tcase 3: //matrix ()()()\n\t\t\t\tsize0, _ := p.getSize(v.name, 0)\n\t\t\t\tsize1, _ := p.getSize(v.name, 1)\n\t\t\t\tsize2, _ := p.getSize(v.name, 2)\n\t\t\t\tfor k := 0; k < size2; k++ {\n\t\t\t\t\tfor j := 0; j < size1; j++ {\n\t\t\t\t\t\tfor i := 0; i < size0; i++ {\n\t\t\t\t\t\t\tnameExpr = append(nameExpr, tExpr{\n\t\t\t\t\t\t\t\texpr: &goast.IndexExpr{\n\t\t\t\t\t\t\t\t\tX: &goast.IndexExpr{\n\t\t\t\t\t\t\t\t\t\tX: &goast.IndexExpr{\n\t\t\t\t\t\t\t\t\t\t\tX: goast.NewIdent(nodesToString(name)),\n\t\t\t\t\t\t\t\t\t\t\tLbrack: 1,\n\t\t\t\t\t\t\t\t\t\t\tIndex: &goast.BasicLit{\n\t\t\t\t\t\t\t\t\t\t\t\tKind: token.INT,\n\t\t\t\t\t\t\t\t\t\t\t\tValue: strconv.Itoa(i),\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\tLbrack: 1,\n\t\t\t\t\t\t\t\t\t\tIndex: &goast.BasicLit{\n\t\t\t\t\t\t\t\t\t\t\tKind: token.INT,\n\t\t\t\t\t\t\t\t\t\t\tValue: strconv.Itoa(j),\n\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\tLbrack: 1,\n\t\t\t\t\t\t\t\t\tIndex: &goast.BasicLit{\n\t\t\t\t\t\t\t\t\t\tKind: token.INT,\n\t\t\t\t\t\t\t\t\t\tValue: strconv.Itoa(k),\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\tisByte: isByte})\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tpanic(\"Not acceptable type : \" + nodesToString(name))\n\t\t\t}\n\n\t\t\tcontinue\n\t\t}\n\t\tif v, ok := p.initVars.get(string(name[0].b)); ok {\n\t\t\tlenArray := p.getArrayLen(v.name)\n\t\t\tisByte := v.typ.getBaseType() == \"byte\"\n\t\t\tswitch lenArray {\n\t\t\tcase 1: // vector\n\t\t\t\t// LL (1) - one value of vector\n\t\t\t\tnameExpr = append(nameExpr, tExpr{\n\t\t\t\t\texpr: &goast.IndexExpr{\n\t\t\t\t\t\tX: goast.NewIdent(string(name[0].b)),\n\t\t\t\t\t\tLbrack: 1,\n\t\t\t\t\t\tIndex: goast.NewIdent(nodesToString(\n\t\t\t\t\t\t\tappend(name[2:len(name)-1], []node{\n\t\t\t\t\t\t\t\t{tok: token.SUB, b: []byte(\"-\")},\n\t\t\t\t\t\t\t\t{tok: token.INT, b: []byte(\"1\")},\n\t\t\t\t\t\t\t}...))),\n\t\t\t\t\t},\n\t\t\t\t\tisByte: isByte})\n\n\t\t\tcase 2: // matrix\n\t\t\t\t// LL (1,1) - one value of matrix\n\t\t\t\tvar mid int\n\t\t\t\tfor mid = 2; mid < len(name); mid++ {\n\t\t\t\t\tif name[mid].tok == token.COMMA {\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tvar i []node\n\t\t\t\ti = append(i, name[2:mid]...)\n\t\t\t\ti = append(i, []node{\n\t\t\t\t\t{tok: token.SUB, b: []byte(\"-\")},\n\t\t\t\t\t{tok: token.INT, b: []byte(\"1\")},\n\t\t\t\t}...)\n\t\t\t\tnameExpr = append(nameExpr, tExpr{\n\t\t\t\t\texpr: &goast.IndexExpr{\n\t\t\t\t\t\tX: &goast.IndexExpr{\n\t\t\t\t\t\t\tX: goast.NewIdent(string(name[0].b)),\n\t\t\t\t\t\t\tLbrack: 1,\n\t\t\t\t\t\t\tIndex: goast.NewIdent(nodesToString(i)),\n\t\t\t\t\t\t},\n\t\t\t\t\t\tLbrack: 1,\n\t\t\t\t\t\tIndex: goast.NewIdent(nodesToString(\n\t\t\t\t\t\t\tappend(name[mid+1:len(name)-1], []node{\n\t\t\t\t\t\t\t\t{tok: token.SUB, b: []byte(\"-\")},\n\t\t\t\t\t\t\t\t{tok: token.INT, b: []byte(\"1\")},\n\t\t\t\t\t\t\t}...))),\n\t\t\t\t\t},\n\t\t\t\t\tisByte: isByte})\n\n\t\t\tdefault:\n\t\t\t\tpanic(\"Not acceptable type : \" + nodesToString(name))\n\t\t\t}\n\t\t\tcontinue\n\t\t}\n\n\t\tif v, ok := p.initVars.get(string(name[1].b)); ok {\n\t\t\tisByte := v.typ.getBaseType() == \"byte\"\n\t\t\tswitch p.getArrayLen(v.name) {\n\t\t\tcase 1: // vector\n\t\t\t\t// (LL( J ), J = 1, 4 ) - one row of vector\n\t\t\t\tstart, _ := strconv.Atoi(string(name[8].b))\n\t\t\t\tend, _ := strconv.Atoi(string(name[10].b))\n\t\t\t\tfor i := start - 1; i < end; i++ {\n\t\t\t\t\tnameExpr = append(nameExpr, tExpr{\n\t\t\t\t\t\texpr: &goast.IndexExpr{\n\t\t\t\t\t\t\tX: goast.NewIdent(string(name[1].b)),\n\t\t\t\t\t\t\tLbrack: 1,\n\t\t\t\t\t\t\tIndex: &goast.BasicLit{\n\t\t\t\t\t\t\t\tKind: token.INT,\n\t\t\t\t\t\t\t\tValue: strconv.Itoa(i),\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t\tisByte: isByte})\n\t\t\t\t}\n\t\t\t\tstmts = append(stmts, &goast.AssignStmt{\n\t\t\t\t\tLhs: []goast.Expr{goast.NewIdent(\"_\")},\n\t\t\t\t\tTok: token.ASSIGN,\n\t\t\t\t\tRhs: []goast.Expr{goast.NewIdent(string(name[3].b))},\n\t\t\t\t})\n\n\t\t\tcase 2: // matrix\n\t\t\t\t// (LL( 1, J ), J = 1, 4 ) - one row of matrix\n\t\t\t\tif bytes.Equal(name[3].b, name[8].b) {\n\t\t\t\t\t// (LL( J, 1 ), J = 1, 4 ) - one row of matrix\n\t\t\t\t\tpanic(\"TODO: Not support\")\n\t\t\t\t}\n\t\t\t\tc, _ := strconv.Atoi(string(name[3].b))\n\t\t\t\tstart, _ := strconv.Atoi(string(name[10].b))\n\t\t\t\tend, _ := strconv.Atoi(string(name[12].b))\n\t\t\t\tfor j := start - 1; j < end; j++ {\n\t\t\t\t\tnameExpr = append(nameExpr, tExpr{\n\t\t\t\t\t\texpr: &goast.IndexExpr{\n\t\t\t\t\t\t\tX: &goast.IndexExpr{\n\t\t\t\t\t\t\t\tX: goast.NewIdent(string(name[1].b)),\n\t\t\t\t\t\t\t\tLbrack: 1,\n\t\t\t\t\t\t\t\tIndex: &goast.BasicLit{\n\t\t\t\t\t\t\t\t\tKind: token.INT,\n\t\t\t\t\t\t\t\t\tValue: strconv.Itoa(c - 1),\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\tLbrack: 1,\n\t\t\t\t\t\t\tIndex: &goast.BasicLit{\n\t\t\t\t\t\t\t\tKind: token.INT,\n\t\t\t\t\t\t\t\tValue: strconv.Itoa(j),\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t\tisByte: isByte})\n\t\t\t\t}\n\t\t\t\tstmts = append(stmts, &goast.AssignStmt{\n\t\t\t\t\tLhs: []goast.Expr{goast.NewIdent(\"_\")},\n\t\t\t\t\tTok: token.ASSIGN,\n\t\t\t\t\tRhs: []goast.Expr{goast.NewIdent(string(name[5].b))},\n\t\t\t\t})\n\n\t\t\tdefault:\n\t\t\t\tpanic(\"Not acceptable type : \" + nodesToString(name))\n\t\t\t}\n\t\t\tcontinue\n\t\t}\n\t\tif v, ok := p.initVars.get(string(name[2].b)); ok {\n\t\t\tisByte := v.typ.getBaseType() == \"byte\"\n\t\t\tswitch p.getArrayLen(v.name) {\n\t\t\tcase 3: // ()()()\n\t\t\t\t// ((CV(I,J,1),I=1,2),J=1,2)\n\t\t\t\tstartI, _ := strconv.Atoi(string(name[13].b))\n\t\t\t\tendI, _ := strconv.Atoi(string(name[15].b))\n\t\t\t\tstartJ, _ := strconv.Atoi(string(name[20].b))\n\t\t\t\tendJ, _ := strconv.Atoi(string(name[22].b))\n\t\t\t\tvalueK, _ := strconv.Atoi(string(name[8].b))\n\n\t\t\t\tfor j := startJ - 1; j < endJ; j++ {\n\t\t\t\t\tfor i := startI - 1; i < endI; i++ {\n\t\t\t\t\t\tnameExpr = append(nameExpr, tExpr{\n\t\t\t\t\t\t\texpr: &goast.IndexExpr{\n\t\t\t\t\t\t\t\tX: &goast.IndexExpr{\n\t\t\t\t\t\t\t\t\tX: &goast.IndexExpr{\n\t\t\t\t\t\t\t\t\t\tX: goast.NewIdent(string(name[2].b)),\n\t\t\t\t\t\t\t\t\t\tLbrack: 1,\n\t\t\t\t\t\t\t\t\t\tIndex: &goast.BasicLit{\n\t\t\t\t\t\t\t\t\t\t\tKind: token.INT,\n\t\t\t\t\t\t\t\t\t\t\tValue: strconv.Itoa(i),\n\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\tLbrack: 1,\n\t\t\t\t\t\t\t\t\tIndex: &goast.BasicLit{\n\t\t\t\t\t\t\t\t\t\tKind: token.INT,\n\t\t\t\t\t\t\t\t\t\tValue: strconv.Itoa(j),\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\tLbrack: 1,\n\t\t\t\t\t\t\t\tIndex: &goast.BasicLit{\n\t\t\t\t\t\t\t\t\tKind: token.INT,\n\t\t\t\t\t\t\t\t\tValue: strconv.Itoa(valueK - 1),\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\tisByte: isByte})\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\tstmts = append(stmts, &goast.AssignStmt{\n\t\t\t\t\tLhs: []goast.Expr{goast.NewIdent(\"_\")},\n\t\t\t\t\tTok: token.ASSIGN,\n\t\t\t\t\tRhs: []goast.Expr{goast.NewIdent(string(name[4].b))},\n\t\t\t\t})\n\t\t\t\tstmts = append(stmts, &goast.AssignStmt{\n\t\t\t\t\tLhs: []goast.Expr{goast.NewIdent(\"_\")},\n\t\t\t\t\tTok: token.ASSIGN,\n\t\t\t\t\tRhs: []goast.Expr{goast.NewIdent(string(name[6].b))},\n\t\t\t\t})\n\t\t\t}\n\t\t\tcontinue\n\t\t}\n\n\t\tpanic(\"Not acceptable type : \" + nodesToString(name))\n\t}\n\nmul:\n\tfor k := range values {\n\t\t// Example :\n\t\t// DATA R / 5*6 /\n\t\t// Equal:\n\t\t// DATA R / 6,6,6,6,6 /\n\t\tvar haveStar bool\n\t\tvar starPos int\n\t\tfor i, vi := range values[k] {\n\t\t\tif vi.tok == token.MUL {\n\t\t\t\thaveStar = true\n\t\t\t\tstarPos = i\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\n\t\tif !haveStar {\n\t\t\tcontinue\n\t\t}\n\n\t\tamount, _ := strconv.Atoi(string(values[k][starPos-1].b))\n\t\tvar inject [][]node\n\t\tfor i := 0; i < amount; i++ {\n\t\t\tinject = append(inject, values[k][starPos+1:])\n\t\t}\n\t\tvalues = append(values[:k], append(inject, values[k+1:]...)...)\n\t\tgoto mul\n\t}\n\n\tif len(nameExpr) != len(values) {\n\t\tvar str string\n\t\tfor i := range names {\n\t\t\tstr += fmt.Sprintln(\">>\", nodesToString(names[i]))\n\t\t\tv, ok := p.initVars.get(nodesToString(names[i]))\n\t\t\tif ok {\n\t\t\t\tfmt.Println(\"1) \", v.name)\n\t\t\t\tfmt.Println(\"2) \", v.typ)\n\t\t\t\tfmt.Println(\"3) \", v.typ.baseType)\n\t\t\t\tfmt.Println(\"4) \", v.typ.getBaseType())\n\t\t\t\tfmt.Println(\"5) \", v.typ.arrayNode)\n\t\t\t}\n\t\t}\n\t\tfor i := range values {\n\t\t\tstr += fmt.Sprintln(\"<<\", nodesToString(values[i]))\n\t\t}\n\t\tpanic(fmt.Errorf(\"Size is not same %d!=%d\\n%v\",\n\t\t\tlen(nameExpr), len(values), str))\n\t}\n\n\tfor i := range nameExpr {\n\t\tif nameExpr[i].isByte {\n\t\t\te := p.parseExprNodes(values[i])\n\t\t\te.(*goast.BasicLit).Kind = token.CHAR\n\t\t\te.(*goast.BasicLit).Value = fmt.Sprintf(\"'%c'\", e.(*goast.BasicLit).Value[1])\n\t\t\tstmts = append(stmts, &goast.AssignStmt{\n\t\t\t\tLhs: []goast.Expr{nameExpr[i].expr},\n\t\t\t\tTok: token.ASSIGN,\n\t\t\t\tRhs: []goast.Expr{e},\n\t\t\t})\n\t\t\tcontinue\n\t\t}\n\t\tstmts = append(stmts, &goast.AssignStmt{\n\t\t\tLhs: []goast.Expr{nameExpr[i].expr},\n\t\t\tTok: token.ASSIGN,\n\t\t\tRhs: []goast.Expr{p.parseExprNodes(values[i])},\n\t\t})\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "144eef8895b8a39720b783af8a479ffc", "score": "0.44258106", "text": "func (addenda98 *Addenda98) Parse(record string) {\n\tif utf8.RuneCountInString(record) != 94 {\n\t\treturn\n\t}\n\trunes := []rune(record)\n\n\t// 1-1 Always 7\n\t// 2-3 Always \"98\"\n\taddenda98.TypeCode = string(runes[1:3])\n\t// 4-6\n\taddenda98.ChangeCode = string(runes[3:6])\n\t// 7-21\n\taddenda98.OriginalTrace = strings.TrimSpace(string(runes[6:21]))\n\t// 28-35\n\taddenda98.OriginalDFI = addenda98.parseStringField(string(runes[27:35]))\n\t// 36-64\n\taddenda98.CorrectedData = strings.TrimSpace(string(runes[35:64]))\n\t// 80-94\n\taddenda98.TraceNumber = strings.TrimSpace(string(runes[79:94]))\n}", "title": "" }, { "docid": "2c1e2db556adf51886e58fd9e7c27590", "score": "0.44105476", "text": "func Parse(raw string) (*Message, error) {\n\traw = strings.TrimRight(raw, \"\\r\\n\")\n\tret := &Message{Raw: raw, ToA: time.Now()}\n\n\tprefixEnd := -1\n\tif strings.HasPrefix(raw, \":\") {\n\t\tprefixEnd = strings.Index(raw, \" \")\n\t\tif prefixEnd < 0 {\n\t\t\treturn nil, errMalformed\n\t\t}\n\t\tret.Prefix = raw[1:prefixEnd]\n\t}\n\n\ttrailingStart := strings.Index(raw, \" :\")\n\tif trailingStart >= 0 {\n\t\tret.Trailing = raw[trailingStart+2:]\n\t} else {\n\t\ttrailingStart = len(raw)\n\t}\n\n\tcmdparams := strings.Split(raw[prefixEnd+1:trailingStart], \" \")\n\tif len(cmdparams) > 0 {\n\t\tret.Command, ret.Params = cmdparams[0], cmdparams[1:]\n\t} else {\n\t\treturn nil, errMalformed\n\t}\n\treturn ret, nil\n}", "title": "" }, { "docid": "5988e10ddbfdc51cee1658c61d621699", "score": "0.44055298", "text": "func (RDR) FromRaw(m dia.RawMsg) (dia.Request, string, error) {\n\ts := \"\"\n\te := m.Validate(true, true, false, false)\n\tif e != nil {\n\t\treturn nil, s, e\n\t}\n\n\tv := RDR{}\n\tfor _, a := range m.AVP {\n\t\tswitch a.Code {\n\t\tcase 263:\n\t\t\ts, e = dia.GetSessionID(a)\n\t\tcase 264:\n\t\t\tv.OriginHost, e = dia.GetOriginHost(a)\n\t\tcase 296:\n\t\t\tv.OriginRealm, e = dia.GetOriginRealm(a)\n\t\tcase 293:\n\t\t\tv.DestinationHost, e = dia.GetDestinationHost(a)\n\t\tcase 283:\n\t\t\tv.DestinationRealm, e = dia.GetDestinationRealm(a)\n\n\t\tcase 3102:\n\t\t\tv.IMSI, v.MSISDN, e = getUserIdentifier(a)\n\t\tcase 3300:\n\t\t\tv.SCAddress, e = getSCAddress(a)\n\t\tcase 3316:\n\t\t\tv.DeliveryOutcome.MME.SMDeliveryCause,\n\t\t\t\tv.DeliveryOutcome.MSC.SMDeliveryCause,\n\t\t\t\tv.DeliveryOutcome.SGSN.SMDeliveryCause,\n\t\t\t\tv.DeliveryOutcome.MME.AbsentDiag,\n\t\t\t\tv.DeliveryOutcome.MSC.AbsentDiag,\n\t\t\t\tv.DeliveryOutcome.SGSN.AbsentDiag,\n\t\t\t\te = getSMDeliveryOutcome(a)\n\t\tcase 3323:\n\t\t\tv.Flags.SingleAttempt, e = getRDRFlags(a)\n\t\t}\n\n\t\tif e != nil {\n\t\t\treturn nil, s, e\n\t\t}\n\t}\n\n\tif len(v.OriginHost) == 0 || len(v.OriginRealm) == 0 ||\n\t\tlen(v.DestinationRealm) == 0 || v.SCAddress.Length() == 0 {\n\t\te = dia.InvalidAVP(dia.DiameterMissingAvp)\n\t} else if v.MSISDN.Length() == 0 && v.IMSI.Length() == 0 {\n\t\te = dia.InvalidAVP(dia.DiameterMissingAvp)\n\t} else if v.DeliveryOutcome.MME.SMDeliveryCause == NoOutcome &&\n\t\tv.DeliveryOutcome.MSC.SMDeliveryCause == NoOutcome &&\n\t\tv.DeliveryOutcome.SGSN.SMDeliveryCause == NoOutcome {\n\t\te = dia.InvalidAVP(dia.DiameterMissingAvp)\n\t}\n\treturn v, s, e\n}", "title": "" }, { "docid": "998d5e5bf95181b7156457533d5a2aa9", "score": "0.4403638", "text": "func parseSudoku(sudoku *[9][9]int, data string) error {\n\tnumbersParsed := 0\n\tfor i := 0; i < len(data); i++ {\n\t\tif data[i] >= '0' && data[i] <= '9' && numbersParsed < 81 {\n\t\t\tsudoku[numbersParsed/9][numbersParsed%9] = int(data[i] - '0')\n\t\t\tnumbersParsed++\n\t\t}\n\t}\n\tif numbersParsed != 81 {\n\t\treturn errors.New(\"Input file must have exactly 81 numbers to be a valid sudoku puzzle.\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "88ad2439ba1a71f6e8c3a3f5e0ad1851", "score": "0.44027665", "text": "func parseMapData(data []byte, r *rep.Replay, cfg Config) error {\n\tmd := new(rep.MapData)\n\tr.MapData = md\n\tif cfg.Debug {\n\t\tmd.Debug = &rep.MapDataDebug{Data: data}\n\t}\n\tif cfg.MapGraphics {\n\t\tmd.MapGraphics = &rep.MapGraphics{}\n\t}\n\n\tvar (\n\t\tscenarioNameIdx uint16 // String index\n\t\tscenarioDescriptionIdx uint16 // String index\n\t\tstringsData []byte\n\t\textendedStringsData bool\n\t)\n\n\t// Map data section is a sequence of sub-sections:\n\tfor sr, size := (sliceReader{b: data}), uint32(len(data)); sr.pos < size; {\n\t\tid := sr.getString(4)\n\t\tssSize := sr.getUint32() // sub-section size (remaining)\n\t\tssEndPos := sr.pos + ssSize // sub-section end position\n\n\t\tswitch id {\n\t\tcase \"VER \":\n\t\t\tmd.Version = sr.getUint16()\n\t\tcase \"ERA \": // Tile set sub-section\n\t\t\tmd.TileSet = repcore.TileSetByID(sr.getUint16() & 0x07)\n\t\tcase \"DIM \": // Dimension sub-section\n\t\t\t// If map has a non-standard size, the replay header contains\n\t\t\t// invalid map size, this is the correct one.\n\t\t\twidth := sr.getUint16()\n\t\t\theight := sr.getUint16()\n\t\t\tif width <= 256 && height <= 256 {\n\t\t\t\tif width > r.Header.MapWidth {\n\t\t\t\t\tr.Header.MapWidth = width\n\t\t\t\t}\n\t\t\t\tif height > r.Header.MapHeight {\n\t\t\t\t\tr.Header.MapHeight = height\n\t\t\t\t}\n\t\t\t}\n\t\tcase \"OWNR\": // StarCraft Player Types\n\t\t\tcount := uint32(12) // 12 bytes, 1 for each player\n\t\t\tif count > ssSize {\n\t\t\t\tcount = ssSize\n\t\t\t}\n\t\t\towners := sr.readSlice(count)\n\t\t\tmd.PlayerOwners = make([]*repcore.PlayerOwner, len(owners))\n\t\t\tfor i, id := range owners {\n\t\t\t\tmd.PlayerOwners[i] = repcore.PlayerOwnerByID(id)\n\t\t\t}\n\t\tcase \"SIDE\": // Player races\n\t\t\tcount := uint32(12) // 12 bytes, 1 for each player\n\t\t\tif count > ssSize {\n\t\t\t\tcount = ssSize\n\t\t\t}\n\t\t\tsides := sr.readSlice(count)\n\t\t\tmd.PlayerSides = make([]*repcore.PlayerSide, len(sides))\n\t\t\tfor i, id := range sides {\n\t\t\t\tmd.PlayerSides[i] = repcore.PlayerSideByID(id)\n\t\t\t}\n\t\tcase \"MTXM\": // Tile sub-section\n\t\t\t// map_width*map_height (a tile is an uint16 value)\n\t\t\tmaxI := ssSize / 2\n\t\t\t// Note: Sometimes map is broken into multiple sections.\n\t\t\t// The first one is the biggest (whole map size),\n\t\t\t// but the beginning of map is empty. The subsequent MTXM\n\t\t\t// sub-sections will fill the whole at the beginning.\n\t\t\t// An example was found when the first MTXM section was only\n\t\t\t// 8 elements, and the next was the whole map, beginning also filled.\n\t\t\t// Therefore if currently allocated Tile is small, a new one is allocated.\n\t\t\tif len(md.Tiles) < int(maxI) {\n\t\t\t\tmd.Tiles = make([]uint16, maxI)\n\t\t\t}\n\t\t\tfor i := uint32(0); i < maxI; i++ {\n\t\t\t\tmd.Tiles[i] = sr.getUint16()\n\t\t\t}\n\t\tcase \"UNIT\": // Placed units\n\t\t\tfor sr.pos+36 <= ssEndPos { // Loop while we have a complete unit\n\t\t\t\tunitEndPos := sr.pos + 36 // 36 bytes for each unit\n\n\t\t\t\tsr.pos += 4 // uint32 unit class instance (\"serial number\")\n\t\t\t\tx := sr.getUint16()\n\t\t\t\ty := sr.getUint16()\n\t\t\t\tunitID := sr.getUint16()\n\t\t\t\tsr.pos += 2 // uint16 Type of relation to another building (i.e. add-on, nydus link)\n\t\t\t\tsr.pos += 2 // uint16 Flags of special properties (e.g. cloacked, burrowed etc.)\n\t\t\t\tsr.pos += 2 // uint16 valid elements flag\n\t\t\t\townerID := sr.getByte() // 0-based SlotID\n\t\t\t\tsr.pos++ // Hit points % (1-100)\n\t\t\t\tsr.pos++ // Shield points % (1-100)\n\t\t\t\tsr.pos++ // Energy points % (1-100)\n\t\t\t\tresAmount := sr.getUint32() // Resource amount\n\n\t\t\t\tswitch unitID {\n\t\t\t\tcase repcmd.UnitIDMineralField1, repcmd.UnitIDMineralField2, repcmd.UnitIDMineralField3:\n\t\t\t\t\tmd.MineralFields = append(md.MineralFields, rep.Resource{Point: repcore.Point{X: x, Y: y}, Amount: resAmount})\n\t\t\t\tcase repcmd.UnitIDVespeneGeyser:\n\t\t\t\t\tmd.Geysers = append(md.Geysers, rep.Resource{Point: repcore.Point{X: x, Y: y}, Amount: resAmount})\n\t\t\t\tcase repcmd.UnitIDStartLocation:\n\t\t\t\t\tmd.StartLocations = append(md.StartLocations,\n\t\t\t\t\t\trep.StartLocation{Point: repcore.Point{X: x, Y: y}, SlotID: ownerID},\n\t\t\t\t\t)\n\t\t\t\t}\n\n\t\t\t\tif cfg.MapGraphics {\n\t\t\t\t\tmd.MapGraphics.PlacedUnits = append(md.MapGraphics.PlacedUnits, &rep.PlacedUnit{\n\t\t\t\t\t\tPoint: repcore.Point{X: x, Y: y},\n\t\t\t\t\t\tUnitID: unitID,\n\t\t\t\t\t\tSlotID: ownerID,\n\t\t\t\t\t\tResourceAmount: resAmount,\n\t\t\t\t\t})\n\t\t\t\t}\n\n\t\t\t\t// Skip unprocessed unit data:\n\t\t\t\tsr.pos = unitEndPos\n\t\t\t}\n\t\tcase \"THG2\": // StarCraft Sprites\n\t\t\tif cfg.MapGraphics {\n\t\t\t\tfor sr.pos+10 <= ssEndPos { // Loop while we have a complete sprite\n\t\t\t\t\tspriteEndPos := sr.pos + 10 // 10 bytes for each sprite\n\n\t\t\t\t\tspriteID := sr.getUint16()\n\t\t\t\t\tx := sr.getUint16()\n\t\t\t\t\ty := sr.getUint16()\n\t\t\t\t\townerID := sr.getByte() // 0-based SlotID\n\t\t\t\t\tsr.pos++ // Unused\n\t\t\t\t\tflags := sr.getUint16()\n\t\t\t\t\tif flags&0x1000 == 0 {\n\t\t\t\t\t\t// It's actually a unit\n\t\t\t\t\t\tmd.MapGraphics.PlacedUnits = append(md.MapGraphics.PlacedUnits, &rep.PlacedUnit{\n\t\t\t\t\t\t\tPoint: repcore.Point{X: x, Y: y},\n\t\t\t\t\t\t\tUnitID: spriteID,\n\t\t\t\t\t\t\tSlotID: ownerID,\n\t\t\t\t\t\t\tSprite: true,\n\t\t\t\t\t\t})\n\t\t\t\t\t} else {\n\t\t\t\t\t\t// It really is a sprite\n\t\t\t\t\t\tmd.MapGraphics.Sprites = append(md.MapGraphics.Sprites, &rep.Sprite{\n\t\t\t\t\t\t\tPoint: repcore.Point{X: x, Y: y},\n\t\t\t\t\t\t\tSpriteID: spriteID,\n\t\t\t\t\t\t})\n\t\t\t\t\t}\n\n\t\t\t\t\t// Skip unprocessed sprite data:\n\t\t\t\t\tsr.pos = spriteEndPos\n\t\t\t\t}\n\t\t\t}\n\t\tcase \"SPRP\": // Scenario properties\n\t\t\t// Strings section might be after this, so we just record the string indices for now:\n\t\t\tscenarioNameIdx = sr.getUint16()\n\t\t\tscenarioDescriptionIdx = sr.getUint16()\n\t\tcase \"STR \": // String data\n\t\t\t// There might be multiple \"STR \" sections, subsequent sections overwrite the\n\t\t\t// beginning of earlier sections.\n\t\t\tstringsStart := int(sr.pos)\n\t\t\t// count := sr.getUint16() // Number of following offsets (uint16 values)\n\t\t\tif len(stringsData) < int(ssEndPos)-stringsStart {\n\t\t\t\tstringsData = make([]byte, int(ssEndPos)-stringsStart)\n\t\t\t}\n\t\t\tcopy(stringsData, data[stringsStart:ssEndPos])\n\t\tcase \"STRx\": // Extended String data\n\t\t\t// This section is identical to \"STR \" except that all uint16 values are uint32 values.\n\t\t\tstringsStart := int(sr.pos)\n\t\t\t// count := sr.getUint32() // Number of following offsets (uint32 values)\n\t\t\tif len(stringsData) < int(ssEndPos)-stringsStart {\n\t\t\t\tstringsData = make([]byte, int(ssEndPos)-stringsStart)\n\t\t\t}\n\t\t\tcopy(stringsData, data[stringsStart:ssEndPos])\n\t\t\textendedStringsData = true\n\t\t}\n\n\t\t// Part or all of the sub-section might be unprocessed, skip the unprocessed bytes\n\t\tsr.pos = ssEndPos\n\t}\n\n\t// Get a string from the strings identified by its index.\n\tgetString := func(idx uint16) string {\n\t\tif idx == 0 {\n\t\t\treturn \"\"\n\t\t}\n\t\tvar offsetSize uint32\n\t\tif extendedStringsData {\n\t\t\toffsetSize = 4\n\t\t} else {\n\t\t\toffsetSize = 2\n\t\t}\n\t\tpos := uint32(idx) * offsetSize // idx is 1-based (0th offset is not included), but stringsData contains the offsets count too\n\t\tif int(pos+offsetSize-1) >= len(stringsData) {\n\t\t\tlog.Printf(\"Invalid strings index: %d, map: %s\", idx, r.Header.Map)\n\t\t\treturn \"\"\n\t\t}\n\t\tvar offset uint32\n\t\tif extendedStringsData {\n\t\t\toffset = (&sliceReader{b: stringsData, pos: pos}).getUint32()\n\t\t} else {\n\t\t\toffset = uint32((&sliceReader{b: stringsData, pos: pos}).getUint16())\n\t\t}\n\t\tif int(offset) >= len(stringsData) {\n\t\t\tlog.Printf(\"Invalid strings offset: %d, strings index: %d, map: %s\", offset, idx, r.Header.Map)\n\t\t\treturn \"\"\n\t\t}\n\t\ts, _ := cString(stringsData[offset:])\n\t\treturn s\n\t}\n\n\tmd.Name = getString(scenarioNameIdx)\n\tmd.Description = getString(scenarioDescriptionIdx)\n\n\treturn nil\n}", "title": "" }, { "docid": "b4bada85b3ce15ca6093f6a3724792e0", "score": "0.43979585", "text": "func (gpsf *GPSF) Parse(bytes []byte) error {\n\t// Check length\n\tif 4 != len(bytes) {\n\t\treturn errors.New(\"GPSF: Invalid packet length\")\n\t}\n\n\t// GPS fix\n\tgpsf.Fix = binary.BigEndian.Uint32(bytes[0:4])\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "5ca1b883705f44941cc2a977391f02ae", "score": "0.4390639", "text": "func (c *Codec) deserialize(data string) *TreeNode {\n\tif data == \"\" || data == \"#\" {\n\t\treturn nil\n\t}\n\n\tqueue := make([]*TreeNode, 0)\n\tqueI := 0\n\tstrS := strings.Split(data, \",\")\n\tqueue = append(queue, str2Node(strS[0]))\n\n\tfor strI := 0; strI < len(strS); queI++ {\n\t\tnode := queue[queI]\n\n\t\tstrI++\n\t\tif strI < len(strS) {\n\t\t\tnode.Left = str2Node(strS[strI])\n\t\t}\n\t\tif node.Left != nil {\n\t\t\tqueue = append(queue, node.Left)\n\t\t}\n\n\t\tstrI++\n\t\tif strI < len(strS) {\n\t\t\tnode.Right = str2Node(strS[strI])\n\t\t}\n\t\tif node.Right != nil {\n\t\t\tqueue = append(queue, node.Right)\n\t\t}\n\n\t}\n\n\treturn queue[0]\n}", "title": "" }, { "docid": "deefe0723dad3f08127462b809fa89b9", "score": "0.43901414", "text": "func ParseRate(data []byte) (*RateDetail, error) {\n\tjsonData := &Data{}\n\terr := json.Unmarshal(data, jsonData)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &jsonData.RateDetail, nil\n}", "title": "" }, { "docid": "ceebb4632863ab68b23e1f214e57aea7", "score": "0.43807715", "text": "func Parse(filename string, r io.Reader) (interface{}, error) {\n\treturn parse(filename, r, g)\n}", "title": "" }, { "docid": "f9acf77408fa463f41df8eb684d4688f", "score": "0.43782842", "text": "func (this *Codec) deserialize(data string) *TreeNode {\n\tque := strings.Split(data, \",\")\n\tvar dfs func() *TreeNode\n\tdfs = func() *TreeNode {\n\t\ts := que[0]\n\t\tque = que[1:]\n\t\tif s == \"#\" {\n\t\t\treturn nil\n\t\t}\n\t\ti, _ := strconv.Atoi(s)\n\t\troot := &TreeNode{Val: i}\n\t\troot.Left = dfs()\n\t\troot.Right = dfs()\n\t\treturn root\n\t}\n\treturn dfs()\n}", "title": "" }, { "docid": "e24b0776d4992f2dacfd6e8b2ae83b37", "score": "0.43746316", "text": "func ParseMessage(data []byte) Message {\n\t// Can't possibly be good data if we don't even have a length.\n\tif len(data) < 4 {\n\t\treturn nil\n\t}\n\tlength := binary.BigEndian.Uint32(data[0:4])\n\tif length == 0 {\n\t\treturn KeepAlive{}\n\t}\n\t// If the length isn't what it says it is, then fail.\n\tif length != uint32(len(data[4:])) {\n\t\treturn nil\n\t}\n\tif length == 1 {\n\t\tswitch data[4] {\n\t\tcase 0: // choke\n\t\t\treturn Choke{}\n\t\tcase 1: // unchoke\n\t\t\treturn Unchoke{}\n\t\tcase 2: // interested\n\t\t\treturn Interested{}\n\t\tcase 3: // not interested\n\t\t\treturn NotInterested{}\n\t\t}\n\t} else if length == 5 {\n\t\tif data[4] == 4 {\n\t\t\tpieceIndex := binary.BigEndian.Uint32(data[5:9])\n\t\t\treturn Have{PieceIndex: pieceIndex}\n\t\t}\n\t} else if length == 13 {\n\t\tindex := binary.BigEndian.Uint32(data[5:9])\n\t\tbegin := binary.BigEndian.Uint32(data[9:13])\n\t\tlength := binary.BigEndian.Uint32(data[13:17])\n\t\tif data[4] == 6 {\n\t\t\treturn Request{Index: index, Begin: begin, Length: length}\n\t\t} else if data[4] == 8 {\n\t\t\treturn Cancel{Index: index, Begin: begin, Length: length}\n\t\t}\n\t}\n\tif data[4] == 5 {\n\t\treturn Bitfield{Data: data[5 : 5+length-1]}\n\t} else if data[4] == 7 {\n\t\tindex := binary.BigEndian.Uint32(data[5:9])\n\t\tbegin := binary.BigEndian.Uint32(data[9:13])\n\t\treturn Piece{Index: index, Begin: begin, Block: data[13 : 13+length-9]}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "786ddea60451aac97f8a27256eb19768", "score": "0.4365571", "text": "func ParserSpecialReport(frameSlice []string, frameParsedCommon structs.Msg) (structs.Msg, error) {\n\n\tframeParsedSpecialEmpty := structs.Msg{}\n\n\t//VERIFICACION DE CADA CAMPO ESPECIAL\n\t//Comprobación Model\n\tModelParsed, err := strconv.ParseInt(frameSlice[2], 10, 32)\n\tif err != nil || ModelParsed <= 0 {\n\t\tfmt.Println(\"Hubo un error al parsear Model\")\n\t\treturn frameParsedSpecialEmpty, errWrongData\n\t}\n\n\t//Parseo de Date\n\tDateParsed, err := strconv.ParseInt(frameSlice[4], 10, 32)\n\tif err != nil {\n\t\tfmt.Println(\"Hubo un error al parsear Date\")\n\t\treturn frameParsedSpecialEmpty, errWrongData\n\t}\n\n\t//Comprobación Time\n\tif len(frameSlice[5]) == 0 {\n\t\tfmt.Println(\"Time no ingresado\")\n\t\treturn frameParsedSpecialEmpty, errWrongData\n\t}\n\n\t//Comprobación Cell\n\tif len(frameSlice[6]) == 0 {\n\t\tfmt.Println(\"Cell no ingresado\")\n\t\treturn frameParsedSpecialEmpty, errWrongData\n\t}\n\n\t//Parseo de Latitude\n\tLatitudeParsed, err := strconv.ParseFloat(frameSlice[7], 64)\n\tif err != nil {\n\t\tfmt.Println(\"Hubo un error al parsear Latitude\")\n\t\treturn frameParsedSpecialEmpty, errWrongData\n\t}\n\n\t//Parseo de Longitude\n\tLongitudeParsed, err := strconv.ParseFloat(frameSlice[8], 64)\n\tif err != nil {\n\t\tfmt.Println(\"Hubo un error al parsear Longitude\")\n\t\treturn frameParsedSpecialEmpty, errWrongData\n\t}\n\n\t//Parseo de Speed\n\tSpeedParsed, err := strconv.ParseFloat(frameSlice[9], 64)\n\tif err != nil {\n\t\tfmt.Println(\"Hubo un error al parsear Speed\")\n\t\treturn frameParsedSpecialEmpty, errWrongData\n\t}\n\n\t//Parseo de Heading\n\tHeadingParsed, err := strconv.ParseFloat(frameSlice[10], 64)\n\tif err != nil {\n\t\tfmt.Println(\"Hubo un error al parsear Heading\")\n\t\treturn frameParsedSpecialEmpty, errWrongData\n\t}\n\n\t//Parseo de Satellites\n\tSatellitesParsed, err := strconv.ParseInt(frameSlice[11], 10, 32)\n\tif err != nil {\n\t\tfmt.Println(\"Hubo un error al parsear Satellites\")\n\t\treturn frameParsedSpecialEmpty, errWrongData\n\t}\n\n\t//Parseo de GPSFixed\n\tGPSFixedParsed, err := strconv.ParseBool(frameSlice[12])\n\tif err != nil {\n\t\tfmt.Println(\"Hubo un error al parsear GPSFixed\")\n\t\treturn frameParsedSpecialEmpty, errWrongData\n\t}\n\n\t//Parseo de Distance\n\tDistanceParsed, err := strconv.ParseInt(frameSlice[13], 10, 32)\n\tif err != nil {\n\t\tfmt.Println(\"Hubo un error al parsear Distance\")\n\t\treturn frameParsedSpecialEmpty, errWrongData\n\t}\n\n\t//Parseo de PowerVolt\n\tPowerVoltParsed, err := strconv.ParseFloat(frameSlice[14], 64)\n\tif err != nil {\n\t\tfmt.Println(\"Hubo un error al parsear PowerVolt\")\n\t\treturn frameParsedSpecialEmpty, errWrongData\n\t}\n\n\t//Comprobación InOut\n\tif len(frameSlice[15]) == 0 {\n\t\tfmt.Println(\"InOut no ingresado\")\n\t\treturn frameParsedSpecialEmpty, errWrongData\n\t}\n\t//INT FIELDS\n\tframeParsedCommon.ContentsInt = append(frameParsedCommon.ContentsInt, ModelParsed)\n\tframeParsedCommon.ContentsInt = append(frameParsedCommon.ContentsInt, DateParsed)\n\tframeParsedCommon.ContentsInt = append(frameParsedCommon.ContentsInt, SatellitesParsed)\n\tframeParsedCommon.ContentsInt = append(frameParsedCommon.ContentsInt, DistanceParsed)\n\t//STRING FIELDS\n\tframeParsedCommon.ContentsString = append(frameParsedCommon.ContentsString, frameSlice[5]) //Time\n\tframeParsedCommon.ContentsString = append(frameParsedCommon.ContentsString, frameSlice[6]) //Cell\n\tframeParsedCommon.ContentsString = append(frameParsedCommon.ContentsString, frameSlice[15]) //InOut\n\t//FLOAT FIELDS\n\tframeParsedCommon.ContentsFloat = append(frameParsedCommon.ContentsFloat, LatitudeParsed)\n\tframeParsedCommon.ContentsFloat = append(frameParsedCommon.ContentsFloat, LongitudeParsed)\n\tframeParsedCommon.ContentsFloat = append(frameParsedCommon.ContentsFloat, SpeedParsed)\n\tframeParsedCommon.ContentsFloat = append(frameParsedCommon.ContentsFloat, HeadingParsed)\n\tframeParsedCommon.ContentsFloat = append(frameParsedCommon.ContentsFloat, PowerVoltParsed)\n\t//BOOL FIELDS\n\tframeParsedCommon.ContentsBool = append(frameParsedCommon.ContentsBool, GPSFixedParsed)\n\n\t//TRATAR ERRORES\n\tif frameParsedCommon.Hdr == \"ST300STT\" {\n\t\tframeParsedCommon, err := ParserSTT(frameSlice, frameParsedCommon)\n\t\tif err != nil {\n\t\t\treturn frameParsedSpecialEmpty, errWrongData\n\t\t}\n\t\treturn frameParsedCommon, nil\n\t} else if frameParsedCommon.Hdr == \"ST300EMG\" || frameParsedCommon.Hdr == \"ST300EVT\" || frameParsedCommon.Hdr == \"ST300ALT\" {\n\t\tframeParsedCommon, err := ParserEmgEvtAlt(frameSlice, frameParsedCommon)\n\t\tif err != nil {\n\t\t\treturn frameParsedSpecialEmpty, errWrongData\n\t\t}\n\t\treturn frameParsedCommon, nil\n\t}\n\n\treturn frameParsedCommon, nil\n}", "title": "" }, { "docid": "b8252f9aaf03010d6d178b61d1f5fe38", "score": "0.43632704", "text": "func (s *SegReply) ParseRaw() error {\n\tif s.Recs != nil {\n\t\treturn s.Recs.ParseRaw()\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5cdc64ab44f8573998b2238c389fdf79", "score": "0.43536454", "text": "func (this *Codec) deserialize(data string) *TreeNode {\n\tss := []byte(data)\n\tif len(ss) == 0 {\n\t\treturn nil\n\t}\n\troot := new(TreeNode)\n\tidx2 := 0\n\tif ss[0] != '(' {\n\t\troot.Left = nil\n\t\tidx2 = 0\n\t\tfor idx2 < len(ss) {\n\t\t\tif ss[idx2] == '(' {\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tidx2 += 1\n\t\t}\n\t\troot.Val, _ = strconv.Atoi(string(ss[:idx2]))\n\t} else {\n\t\tidx := 1\n\t\tnum := 1\n\t\tfor idx < len(ss) {\n\t\t\tif ss[idx] == '(' {\n\t\t\t\tnum += 1\n\t\t\t}\n\t\t\tif ss[idx] == ')' {\n\t\t\t\tnum -= 1\n\t\t\t\tif num == 0 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tidx += 1\n\t\t}\n\t\troot.Left = this.deserialize(string(ss[1:idx]))\n\t\tidx2 = idx + 1\n\t\tfor idx2 < len(ss) {\n\t\t\tif ss[idx2] == '(' {\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tidx2 += 1\n\t\t}\n\t\troot.Val, _ = strconv.Atoi(string(ss[idx+1 : idx2]))\n\t}\n\tif idx2 == len(ss) {\n\t\troot.Right = nil\n\t} else {\n\t\troot.Right = this.deserialize(string(ss[idx2+1 : len(ss)-1]))\n\t}\n\treturn root\n}", "title": "" }, { "docid": "9779e1df8f83c7dd80e1b90199f4c7a9", "score": "0.43518686", "text": "func (this *Codec) deserialize(data string) *data.TreeNode {\n\tvalueList := strings.Split(data, \",\")\n\tif len(data) == 0 || len(valueList) == 0 {\n\t\treturn nil\n\t}\n\tpos := 0\n\treturn buildTreeNode(valueList, &pos)\n}", "title": "" }, { "docid": "551d9f671d6e7dcf83df3a5006e317b5", "score": "0.43497837", "text": "func Decode(signatureLayerFilePath string) ([]DecodedMessage, error) {\n\tsignatureLayerImage, err := gg.LoadImage(signatureLayerFilePath)\n\tif err != nil {\n\t\treturn nil, errors.New(err)\n\t}\n\n\tsignatureRect := signatureLayerImage.Bounds()\n\tpositionVectorImageRectMin := image.Point{signatureRect.Max.X - PositionVectorQRImageSize, signatureRect.Max.Y - PositionVectorQRImageSize}\n\tpositionVectorImage, err := cropImage(signatureLayerImage, image.Rectangle{positionVectorImageRectMin, signatureRect.Max})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tpositionVectorCompressed, err := decodeImage(positionVectorImage)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tpositionVector, err := decompress(positionVectorCompressed)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfmt.Printf(\"\\n\" + positionVector)\n\ttokens := strings.Split(positionVector, \";\")\n\tif len(tokens) <= 1 {\n\t\treturn nil, errors.New(MalformedPositionVector)\n\t}\n\ttokenCount, err := strconv.Atoi(tokens[0])\n\tif err != nil {\n\t\treturn nil, errors.New(err)\n\t}\n\tif tokenCount != len(tokens)-2 {\n\t\treturn nil, errors.New(MalformedPositionVector)\n\t}\n\n\tvar decoded []DecodedMessage\n\tcurrentAlias := \"\"\n\tfor i := 1; i < len(tokens)-1; i++ {\n\t\ttoken := tokens[i]\n\t\tidx := strings.IndexByte(token, ':')\n\t\tif idx >= 0 {\n\t\t\tcurrentAlias = token[:idx]\n\t\t\tdecoded = append(decoded, DecodedMessage{\n\t\t\t\tAlias: currentAlias,\n\t\t\t})\n\t\t}\n\t\tif currentAlias == \"\" {\n\t\t\treturn nil, errors.New(MalformedPositionVector)\n\t\t}\n\t\timageRectValues := strings.Split(token[idx+1:], \",\")\n\t\tif len(imageRectValues) != 3 {\n\t\t\treturn nil, errors.New(MalformedPositionVector)\n\t\t}\n\t\trectX, err := strconv.Atoi(imageRectValues[0])\n\t\tif err != nil {\n\t\t\treturn nil, errors.New(err)\n\t\t}\n\t\trectY, err := strconv.Atoi(imageRectValues[1])\n\t\tif err != nil {\n\t\t\treturn nil, errors.New(err)\n\t\t}\n\t\trectSize, err := strconv.Atoi(imageRectValues[2])\n\t\tif err != nil {\n\t\t\treturn nil, errors.New(err)\n\t\t}\n\t\tqrImageRect := image.Rectangle{image.Point{rectX, rectY}, image.Point{rectX + rectSize, rectY + rectSize}}\n\t\tqrImage, err := cropImage(signatureLayerImage, qrImageRect)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tfd, err := os.Create(\"last-decoded.png\")\n\t\tif err != nil {\n\t\t\treturn nil, errors.New(err)\n\t\t}\n\t\tdefer fd.Close()\n\t\tpng.Encode(fd, qrImage)\n\n\t\tdecodedString, err := decodeImage(qrImage)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tdecoded[len(decoded)-1].Content += decodedString\n\t\tfmt.Printf(\"\\n\" + decodedString)\n\t}\n\n\treturn decoded, nil\n}", "title": "" }, { "docid": "65acf004641a0f76746341512908447a", "score": "0.43473363", "text": "func parseRawSamplesFromRawData(data []int, identifiers []string) ([]RawSample, error) {\n\tif len(data)%3 != 0 {\n\t\treturn nil, errors.New(\"must have a multiple of 3 data points\")\n\t}\n\n\tsamples := make([]RawSample, 0)\n\n\tdCount := 0\n\n\tfor _, identifier := range identifiers {\n\t\tvar s RawSample\n\t\ts.Name = identifier\n\t\tfor j := 0; j < 3; j++ {\n\t\t\ts.Data[j] = data[dCount]\n\t\t\tdCount++\n\t\t}\n\t\tsamples = append(samples, s)\n\t}\n\n\treturn samples, nil\n}", "title": "" }, { "docid": "235b2ddade71a34a9751ebf9b6fcca6b", "score": "0.43460602", "text": "func parseCard(c []byte) Card {\n\tcard := Card{}\n\tswitch string(c[0]) {\n\tcase \"2\":\n\t\tcard.value = 2\n\tcase \"3\":\n\t\tcard.value = 3\n\tcase \"4\":\n\t\tcard.value = 4\n\tcase \"5\":\n\t\tcard.value = 5\n\tcase \"6\":\n\t\tcard.value = 6\n\tcase \"7\":\n\t\tcard.value = 7\n\tcase \"8\":\n\t\tcard.value = 8\n\tcase \"9\":\n\t\tcard.value = 9\n\tcase \"T\":\n\t\tcard.value = 10\n\tcase \"J\":\n\t\tcard.value = 11\n\tcase \"Q\":\n\t\tcard.value = 12\n\tcase \"K\":\n\t\tcard.value = 13\n\tcase \"A\":\n\t\tcard.value = 14\n\tdefault:\n\t\tpanic(\"unknown card.value\")\n\t}\n\tswitch string(c[1]) {\n\tcase \"S\":\n\t\tcard.suit = \"S\"\n\tcase \"C\":\n\t\tcard.suit = \"C\"\n\tcase \"H\":\n\t\tcard.suit = \"H\"\n\tcase \"D\":\n\t\tcard.suit = \"D\"\n\tdefault:\n\t\tpanic(\"unknown card.suit\")\n\t}\n\treturn card\n}", "title": "" }, { "docid": "51ca3b8a3b3ad0925cf381f9f8d4bb1b", "score": "0.43448424", "text": "func ParseData(data []string) ([]claim, error) {\n\tvar claims []claim\n\tfor idx, line := range data {\n\t\tvar cur_claim claim\n\t\tvar err error\n\n\t\t// split_by_spaces if of the form\n\t\t// [0] = \"#<id>\"\n\t\t// [1] = \"@\"\n\t\t// [2] = \"loff,toff:\"\n\t\t// [3] = \"widthxheight\"\n\t\tsplit_by_spaces := strings.Split(line, \" \")\n\n\t\tif !strings.HasPrefix(split_by_spaces[0], \"#\") {\n\t\t\treturn []claim{}, errors.New(fmt.Sprintf(\"idx %d does not start with #\", idx))\n\t\t}\n\t\tcur_claim.id, err = strconv.Atoi(split_by_spaces[0][1:])\n\t\tcheck.Check(err)\n\n\t\tif split_by_spaces[1] != \"@\" {\n\t\t\treturn []claim{}, errors.New(fmt.Sprintf(\"idx %d does not contain an '@'\", idx))\n\t\t}\n\n\t\toffsets := strings.Split(split_by_spaces[2][:len(split_by_spaces[2])-1], \",\")\n\t\tif len(offsets) != 2 {\n\t\t\treturn []claim{}, errors.New(fmt.Sprintf(\"idx %d has its offsets formatted incorrectly - %+v\", idx, offsets))\n\t\t}\n\t\tcur_claim.loff, err = strconv.Atoi(offsets[0])\n\t\tcheck.Check(err)\n\t\tcur_claim.toff, err = strconv.Atoi(offsets[1])\n\t\tcheck.Check(err)\n\n\t\tdimensions := strings.Split(split_by_spaces[3], \"x\")\n\t\tif len(dimensions) != 2 {\n\t\t\treturn []claim{}, errors.New(fmt.Sprintf(\"idx %d has its dimensions formatted incorrectly - %+v\", idx, dimensions))\n\t\t}\n\t\tcur_claim.width, err = strconv.Atoi(dimensions[0])\n\t\tcheck.Check(err)\n\t\tcur_claim.height, err = strconv.Atoi(dimensions[1])\n\t\tcheck.Check(err)\n\n\t\tclaims = append(claims, cur_claim)\n\t}\n\n\treturn claims, nil\n}", "title": "" }, { "docid": "094a09d3a11f0c9567b887f30045f4dc", "score": "0.43391693", "text": "func Parse(in []byte) (constr Construction, err error) {\n\tvar rest []byte\n\n\tconstr.FinalMask, rest = parseMatrix(in)\n\n\tfor i, _ := range constr.ShiftRows {\n\t\tconstr.ShiftRows[i], rest = parseMatrix(rest)\n\t}\n\n\tfor i, _ := range constr.TBoxMixCol {\n\t\tfor j, _ := range constr.TBoxMixCol[i] {\n\t\t\tconstr.TBoxMixCol[i][j] = table.ParsedDoubleToWord(rest[:tmcSize])\n\t\t\trest = rest[tmcSize:]\n\t\t}\n\t}\n\n\tif rest == nil {\n\t\terr = errors.New(\"Parsing the key failed!\")\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "000528b16c50af48e4c998400ea6345c", "score": "0.43218172", "text": "func parse(b []byte) (*msg, error) {\n\tm := &msg{}\n\ts := strings.TrimSpace(string(b))\n\tif s == \"ping\" {\n\t\tm.op = \"ping\"\n\t\treturn m, nil\n\t}\n\tn := strings.Count(s, \";\")\n\tif n != 2 {\n\t\treturn m, InvalidMsg\n\t}\n\tp := strings.Split(s, \";\")\n\tif p[0] != \"pub\" && p[0] != \"sub\" {\n\t\treturn m, InvalidOp\n\t}\n\tif p[1] == \"\" {\n\t\treturn m, InvalidQueue\n\t}\n\tif p[0] == \"pub\" && p[2] == \"\" {\n\t\treturn m, InvalidTextLength\n\t}\n\tm.op = p[0]\n\tm.queue = p[1]\n\tm.text = p[2]\n\treturn m, nil\n}", "title": "" }, { "docid": "dad383e250dee2e4579b0c78ef171026", "score": "0.43066546", "text": "func (d *decodeState) parse() (interface{}, error) {\n\tt := d.nextCBORType()\n\tswitch t {\n\tcase cborTypePositiveInt:\n\t\t_, _, val := d.getHead()\n\t\treturn val, nil\n\tcase cborTypeNegativeInt:\n\t\t_, _, val := d.getHead()\n\t\tif val > math.MaxInt64 {\n\t\t\treturn nil, &UnmarshalTypeError{Value: t.String(), Type: reflect.TypeOf([]interface{}(nil)).Elem(), errMsg: \"-1-\" + strconv.FormatUint(val, 10) + \" overflows Go's int64\"}\n\t\t}\n\t\tnValue := int64(-1) ^ int64(val)\n\t\treturn nValue, nil\n\tcase cborTypeByteString:\n\t\treturn d.parseByteString(), nil\n\tcase cborTypeTextString:\n\t\tb, err := d.parseTextString()\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn string(b), nil\n\tcase cborTypeTag:\n\t\td.getHead() // Skip tag number\n\t\treturn d.parse()\n\tcase cborTypePrimitives:\n\t\t_, ai, val := d.getHead()\n\t\tif ai < 20 || ai == 24 {\n\t\t\treturn uint64(val), nil\n\t\t}\n\t\tswitch ai {\n\t\tcase 20, 21:\n\t\t\treturn (ai == 21), nil\n\t\tcase 22, 23:\n\t\t\treturn nil, nil\n\t\tcase 25:\n\t\t\tf := float64(float16.Frombits(uint16(val)).Float32())\n\t\t\treturn f, nil\n\t\tcase 26:\n\t\t\tf := float64(math.Float32frombits(uint32(val)))\n\t\t\treturn f, nil\n\t\tcase 27:\n\t\t\tf := math.Float64frombits(val)\n\t\t\treturn f, nil\n\t\t}\n\tcase cborTypeArray:\n\t\treturn d.parseArray()\n\tcase cborTypeMap:\n\t\treturn d.parseMap()\n\t}\n\treturn nil, nil\n}", "title": "" }, { "docid": "16d0fd1bddd880cb15c0582805922d40", "score": "0.43040347", "text": "func (rr *ResourceRecord) Parse(buffer []byte, offset int) (new_offset int, err error) {\n\tnew_offset = offset\n\n\tname, new_offset2 := parseDomainName(buffer, new_offset)\n\tnew_offset = new_offset2\n\trr.Name = name\n\n\trr.Type = uint16(buffer[new_offset])<<8 | uint16(buffer[new_offset+1])\n\tnew_offset += 2\n\n\trr.CacheClear = (buffer[new_offset]&0x80 == 0x80)\n\tif rr.CacheClear {\n\t\trr.Class = uint16(buffer[new_offset]^0x80)<<8 | uint16(buffer[new_offset+1])\n\t} else {\n\t\trr.Class = uint16(buffer[new_offset])<<8 | uint16(buffer[new_offset+1])\n\t}\n\tnew_offset += 2\n\n\trr.TTL = uint32(uint32(buffer[new_offset])<<24 | uint32(buffer[new_offset+1])<<16 | uint32(buffer[new_offset+2])<<8 | uint32(buffer[new_offset+3]))\n\tnew_offset += 4\n\n\tdataLength := int(uint16(buffer[new_offset])<<8 | uint16(buffer[new_offset+1]))\n\tnew_offset += 2\n\n\tswitch rr.Type {\n\tcase 1: // A\n\t\tvar record ARecord\n\t\trecord.Address = net.IPv4(buffer[new_offset], buffer[new_offset+1], buffer[new_offset+2], buffer[new_offset+3])\n\t\trr.Rdata = record\n\t\tnew_offset += int(dataLength)\n\t\tbreak\n\n\tcase 12: // PTR\n\t\tvar record PTRRecord\n\t\tptrName, _ := parseDomainName(buffer, new_offset)\n\t\trecord.Name = ptrName\n\t\trr.Rdata = record\n\t\tnew_offset += int(dataLength)\n\t\tbreak\n\n\tcase 16: // TXT\n\t\tvar record TXTRecord\n\t\tconsumed := 0\n\n\t\tfor consumed < dataLength {\n\t\t\tcs, new_offset1 := parseCharacterString(buffer, new_offset)\n\t\t\trecord.CStrings = append(record.CStrings, cs)\n\t\t\tconsumed += new_offset1 - new_offset\n\t\t\tnew_offset = new_offset1\n\t\t}\n\n\t\trr.Rdata = record\n\t\tbreak\n\n\tcase 28: // AAAA\n\t\tvar record AAAARecord\n\t\trecord.Address = net.IP{buffer[new_offset], buffer[new_offset+1], buffer[new_offset+2], buffer[new_offset+3],\n\t\t\tbuffer[new_offset+4], buffer[new_offset+5], buffer[new_offset+6], buffer[new_offset+7],\n\t\t\tbuffer[new_offset+8], buffer[new_offset+9], buffer[new_offset+10], buffer[new_offset+11],\n\t\t\tbuffer[new_offset+12], buffer[new_offset+13], buffer[new_offset+14], buffer[new_offset+15]}\n\t\trr.Rdata = record\n\t\tnew_offset += int(dataLength)\n\t\tbreak\n\n\tcase 33: // SRV\n\t\tvar record SRVRecord\n\t\trecord.Priority = uint16(buffer[new_offset])<<8 | uint16(buffer[new_offset+1])\n\t\trecord.Weight = uint16(buffer[new_offset+2])<<8 | uint16(buffer[new_offset+3])\n\t\trecord.Port = uint16(buffer[new_offset+4])<<8 | uint16(buffer[new_offset+5])\n\n\t\ttargetName, _ := parseDomainName(buffer, new_offset+6)\n\t\trecord.Target = targetName\n\n\t\trr.Rdata = record\n\t\tnew_offset += int(dataLength)\n\t\tbreak\n\n\tdefault:\n\t\tnew_offset += int(dataLength)\n\t\tbreak\n\t}\n\n\treturn new_offset, nil\n}", "title": "" }, { "docid": "bd4b7997e5b15c0e6afdb84ddc7ef9f0", "score": "0.4302291", "text": "func Parse(data []byte, order binary.ByteOrder, offset, staticBase uint64) FrameDescriptionEntries {\n\tvar (\n\t\tbuf = bytes.NewBuffer(data)\n\t\tpctx = &parseContext{\n\t\t\tbuf: buf,\n\t\t\torder: order,\n\t\t\tentries: NewFrameIndex(),\n\t\t\toffset: offset,\n\t\t\tstaticBase: staticBase}\n\t)\n\n\tfor fn := parselength; buf.Len() != 0; {\n\t\tfn = fn(pctx)\n\t}\n\n\tfor i := range pctx.entries {\n\t\tpctx.entries[i].order = order\n\t}\n\n\treturn pctx.entries\n}", "title": "" }, { "docid": "f1270d7e933074682f77c8e1de54d1ed", "score": "0.42962363", "text": "func (s *SendPack) Parse(body io.Reader) error {\n\ts.multiband = make(map[string]*bandInfo)\n\tfor _, band := range Bands() {\n\t\ts.multiband[band] = &bandInfo{}\n\t}\n\n\tscanner := pktline.NewScanner(body)\n\tseenFlush := false\n\tseenPack := false\n\n\t// We're requesting the side-band-64k capability and thus receive a multiplexed stream from\n\t// git-receive-pack(1). The first byte of each pktline will identify the multiplexing band.\n\tfor ; scanner.Scan(); s.packets++ {\n\t\tif seenFlush {\n\t\t\treturn errors.New(\"received extra packet after flush\")\n\t\t}\n\t\tif pktline.IsFlush(scanner.Bytes()) {\n\t\t\tseenFlush = true\n\t\t\tcontinue\n\t\t}\n\n\t\tdata := pktline.Data(scanner.Bytes())\n\t\tif len(data) == 0 {\n\t\t\treturn errors.New(\"empty packet in PACK data\")\n\t\t}\n\t\tif len(data) > s.largestPacketSize {\n\t\t\ts.largestPacketSize = len(data)\n\t\t}\n\n\t\tband, err := bandToHuman(data[0])\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"converting band: %w\", err)\n\t\t}\n\n\t\ts.multiband[band].consume(data)\n\t\tdata = data[1:]\n\n\t\tswitch band {\n\t\tcase bandPack:\n\t\t\t// The pack band contains our \"normal\" pktlines which are nested into the\n\t\t\t// outer pktline.\n\t\t\tscanner := pktline.NewScanner(bytes.NewReader(data))\n\t\t\tfor scanner.Scan() {\n\t\t\t\tif pktline.IsFlush(scanner.Bytes()) {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\n\t\t\t\tdata := pktline.Data(scanner.Bytes())\n\t\t\t\tif !seenPack {\n\t\t\t\t\tif !bytes.Equal(data, []byte(\"unpack ok\\n\")) {\n\t\t\t\t\t\treturn fmt.Errorf(\"expected unpack ok, got %q\", data)\n\t\t\t\t\t}\n\t\t\t\t\ts.unpackOK = time.Now()\n\t\t\t\t\tseenPack = true\n\t\t\t\t} else {\n\t\t\t\t\tif bytes.HasPrefix(data, []byte(\"ok \")) {\n\t\t\t\t\t\ts.updatedRefs++\n\t\t\t\t\t} else if bytes.HasPrefix(data, []byte(\"ng \")) {\n\t\t\t\t\t\treturn fmt.Errorf(\"reference update failed: %q\", data)\n\t\t\t\t\t} else {\n\t\t\t\t\t\treturn fmt.Errorf(\"unsupported packet line: %q\", data)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\tcase bandProgress:\n\t\t\tif s.ReportProgress != nil {\n\t\t\t\ts.ReportProgress(data)\n\t\t\t}\n\t\tcase bandError:\n\t\t\treturn fmt.Errorf(\"received error: %q\", data)\n\t\tdefault:\n\t\t\treturn fmt.Errorf(\"unsupported band: %q\", band)\n\t\t}\n\t}\n\n\ts.responseBody = time.Now()\n\n\treturn nil\n}", "title": "" }, { "docid": "aa792a31498162492a9b1b662114b7d0", "score": "0.42956582", "text": "func (this *RSeqParser) Parse() (sh header.Header, ParseException error) {\n\trseq := header.NewRSeq()\n\n\tlexer := this.GetLexer()\n\tthis.HeaderName(TokenTypes_RSEQ)\n\n\trseq.SetHeaderName(core.SIPHeaderNames_RSEQ)\n\n\tvar number int\n\tif number, ParseException = lexer.Number(); ParseException != nil {\n\t\treturn nil, ParseException\n\t}\n\trseq.SetSequenceNumber(number)\n\n\tlexer.SPorHT()\n\tlexer.Match('\\n')\n\n\treturn rseq, nil\n}", "title": "" } ]
570df4ffaa0f925a33f6620104e2b365
SetEnabledCustomTag set enabled flag for set custom tag name if set true and set customTagName, the custom tag will be check during mapping's GetFieldName default is false
[ { "docid": "37b3192222e125a2791711b8e5083ae5", "score": "0.7986368", "text": "func (dm *mapperObject) SetEnabledCustomTag(isEnabled bool) {\n\tdm.enabledCustomTag = isEnabled\n\tdm.cleanRegisterValue()\n}", "title": "" } ]
[ { "docid": "fb30aacce54540ded200f1c037644eb8", "score": "0.82479495", "text": "func SetEnabledCustomTag(isEnabled bool) {\n\tstandardMapper.SetEnabledCustomTag(isEnabled)\n}", "title": "" }, { "docid": "bae9b957a68bf7fc5eb997bf2ad760aa", "score": "0.58600587", "text": "func SetEnableFieldIgnoreTag(isEnabled bool) {\n\tstandardMapper.SetEnableFieldIgnoreTag(isEnabled)\n}", "title": "" }, { "docid": "a3040c5d8e3318b905df2136c05a8442", "score": "0.580317", "text": "func SetEnabledMapperTag(isEnabled bool) {\n\tstandardMapper.SetEnabledMapperTag(isEnabled)\n}", "title": "" }, { "docid": "882654e7421bf14e9a4229d08675576c", "score": "0.5709792", "text": "func (dm *mapperObject) SetEnabledMapperTag(isEnabled bool) {\n\tdm.enabledMapperTag = isEnabled\n\tdm.cleanRegisterValue()\n}", "title": "" }, { "docid": "f6aefa06e85a9687d1e485b3b8dcca3f", "score": "0.567342", "text": "func SetEnabledJsonTag(isEnabled bool) {\n\tstandardMapper.SetEnabledJsonTag(isEnabled)\n}", "title": "" }, { "docid": "646012db9d3855220a8e359a352badb0", "score": "0.56259584", "text": "func WithCustomTag(key string, value interface{}) WrapOption {\n\treturn func(cfg *queryConfig) {\n\t\tif cfg.customTags == nil {\n\t\t\tcfg.customTags = make(map[string]interface{})\n\t\t}\n\t\tcfg.customTags[key] = value\n\t}\n}", "title": "" }, { "docid": "750a1d55347400de108650d80bc3e1a9", "score": "0.56194174", "text": "func (dm *mapperObject) SetEnabledJsonTag(isEnabled bool) {\n\tdm.enabledJsonTag = isEnabled\n\tdm.cleanRegisterValue()\n}", "title": "" }, { "docid": "013cb14dcf5791dbc54c56dcf75c746d", "score": "0.54082674", "text": "func (dm *mapperObject) SetEnableFieldIgnoreTag(isEnabled bool) {\n\tdm.enableFieldIgnoreTag = isEnabled\n}", "title": "" }, { "docid": "b72a523439b723d2252e696e2fcc7641", "score": "0.52679306", "text": "func (b *Bag) AddCustomTagfile(sourcePath string, destPath string, includeInTagManifests bool) error {\n\tif (strings.HasPrefix(destPath, \"/data\") ||\n\t\tstrings.HasPrefix(destPath, \"/\") || strings.Contains(destPath, \"..\")) {\n\t\treturn fmt.Errorf(\"Illegal value '%s' for param destPath. \" +\n\t\t\t\"File name cannot start with '/' or '/data' or contain '..'\", destPath)\n\t}\n\n\tabsSourcePath, err := filepath.Abs(sourcePath)\n\tif err != nil {\n\t\treturn err\n\t}\n\tabsDestPath, err := filepath.Abs(filepath.Join(b.pathToFile, destPath))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif absSourcePath != absDestPath {\n\t\tsourceFile, err := os.Open(absSourcePath)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdefer sourceFile.Close()\n\n\t\tif err = os.MkdirAll(filepath.Dir(absDestPath), 0766); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdestFile, err := os.Create(absDestPath)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdefer destFile.Close()\n\n\t\t_, err = io.Copy(destFile, sourceFile)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// The Save() function puts all non-payload, non-manifest files\n\t// into the tag manifests by default. So we only need to keep\n\t// a map of what to exclude.\n\tif includeInTagManifests == false {\n\t\tif b.excludeFromTagManifests == nil {\n\t\t\tb.excludeFromTagManifests = make(map[string]bool)\n\t\t}\n\t\tb.excludeFromTagManifests[destPath] = true\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "b59a8817aa530a214a8948a05f24d544", "score": "0.52623665", "text": "func (v *Validator) RegisterCustomValidatorTag(tag string, fn validator.Func) error {\n\treturn v.validate.RegisterValidation(tag, fn, false)\n}", "title": "" }, { "docid": "77036bc0933c51239557e6349a612db1", "score": "0.5184298", "text": "func RegisterCustomTags() {\n\ten := en.New()\n\tval.UniversalTranslator = ut.New(en, en)\n\n\t// this is usually know or extracted from http 'Accept-Language' header\n\t// also see uni.FindTranslator(...)\n\ttrans, _ := val.GetTranslator(\"en\")\n\n\tval.Validate = validator.New()\n\ten_translations.RegisterDefaultTranslations(val.Validate, trans)\n\n}", "title": "" }, { "docid": "1529100ad7efc0c34fc2d78498004464", "score": "0.50607413", "text": "func (n *Node) SetBoolTag(key string, value bool) {\n\tn.SetTag(key, strconv.FormatBool(value))\n}", "title": "" }, { "docid": "701f37f6542fe4ce0268eb9cbef73b17", "score": "0.50498956", "text": "func (s *span) setTagBool(key string, v bool) {\n\tswitch key {\n\tcase ext.AnalyticsEvent:\n\t\tif v {\n\t\t\ts.setMetric(ext.EventSampleRate, 1.0)\n\t\t} else {\n\t\t\ts.setMetric(ext.EventSampleRate, 0.0)\n\t\t}\n\tcase ext.ManualDrop:\n\t\tif v {\n\t\t\ts.setSamplingPriorityLocked(ext.PriorityUserReject, samplernames.Manual, math.NaN())\n\t\t}\n\tcase ext.ManualKeep:\n\t\tif v {\n\t\t\ts.setSamplingPriorityLocked(ext.PriorityUserKeep, samplernames.Manual, math.NaN())\n\t\t}\n\tdefault:\n\t\tif v {\n\t\t\ts.setMeta(key, \"true\")\n\t\t} else {\n\t\t\ts.setMeta(key, \"false\")\n\t\t}\n\t}\n}", "title": "" }, { "docid": "39715925565e315bc56b86f5bba13268", "score": "0.50468296", "text": "func AddCustomConfigForFlag(f *pflag.Flag, key string) {\n\tif f.Annotations == nil {\n\t\tf.Annotations = map[string][]string{}\n\t}\n\tf.Annotations[KeyAnnotation] = []string{key}\n}", "title": "" }, { "docid": "551526fb34552748a506a830987ef196", "score": "0.5033198", "text": "func (evsuo *ExValueScanUpdateOne) SetCustom(s string) *ExValueScanUpdateOne {\n\tevsuo.mutation.SetCustom(s)\n\treturn evsuo\n}", "title": "" }, { "docid": "08667cf05ec89bab04dfb51786295f41", "score": "0.5029997", "text": "func SetCustomDict(dict map[Tag]TagInfo) {\n\tcustomDict = dict\n}", "title": "" }, { "docid": "914c9848a5ae8a74c82ed7eb7ddcf706", "score": "0.50155276", "text": "func (evsu *ExValueScanUpdate) SetCustom(s string) *ExValueScanUpdate {\n\tevsu.mutation.SetCustom(s)\n\treturn evsu\n}", "title": "" }, { "docid": "ac9c79d0ace9a72a7cdccdaa705dfe9a", "score": "0.49952453", "text": "func (ctu *CustomTypeUpdate) SetCustom(s string) *CustomTypeUpdate {\n\tctu.mutation.SetCustom(s)\n\treturn ctu\n}", "title": "" }, { "docid": "37c0cec162bf9c81648d192a672145a0", "score": "0.49670216", "text": "func OptEnableCustomCode(enableCustomCode bool) ServiceOptions{\n\treturn func(s *utils.ServiceOpts) {\n\t\ts.CustomCodeEnabled = enableCustomCode\n\t}\n}", "title": "" }, { "docid": "805bcec3eb37be3843536db3ef4996e1", "score": "0.49475893", "text": "func (cs *YAGCommand) customEnabled(guildID int64) (bool, error) {\n\t// No special key so it's automatically enabled\n\tif cs.Key == \"\" || cs.CustomEnabled {\n\t\treturn true, nil\n\t}\n\n\t// Check redis for settings\n\tvar enabled bool\n\terr := common.RedisPool.Do(radix.Cmd(&enabled, \"GET\", cs.Key+discordgo.StrID(guildID)))\n\tif err != nil {\n\t\treturn false, err\n\t}\n\n\tif cs.Default {\n\t\tenabled = !enabled\n\t}\n\n\tif !enabled {\n\t\treturn false, nil\n\t}\n\n\treturn enabled, nil\n}", "title": "" }, { "docid": "9212f7f618ff628478b2ebe8d6a4df10", "score": "0.49430472", "text": "func (ctu *CustomTypeUpdate) SetNillableCustom(s *string) *CustomTypeUpdate {\n\tif s != nil {\n\t\tctu.SetCustom(*s)\n\t}\n\treturn ctu\n}", "title": "" }, { "docid": "429a069780aec488e9b92b6e96287d3b", "score": "0.4907889", "text": "func (ctuo *CustomTypeUpdateOne) SetCustom(s string) *CustomTypeUpdateOne {\n\tctuo.mutation.SetCustom(s)\n\treturn ctuo\n}", "title": "" }, { "docid": "8a38b0d6ac82668e4cb7fc37d2a9ea3f", "score": "0.4878051", "text": "func (b *ConnectionBase) SetFieldNameTag(name string) {\n\tb.fieldNameTag = name\n}", "title": "" }, { "docid": "9fcfe75f635d1a309606a1d47bc63041", "score": "0.48724493", "text": "func (a *Status_Tags) Set(fieldName string, value string) {\n\tif a.AdditionalProperties == nil {\n\t\ta.AdditionalProperties = make(map[string]string)\n\t}\n\ta.AdditionalProperties[fieldName] = value\n}", "title": "" }, { "docid": "a6c70a3df79fa14ce307ece9a88ac2d0", "score": "0.48497206", "text": "func (a *Member_Tags) Set(fieldName string, value string) {\n\tif a.AdditionalProperties == nil {\n\t\ta.AdditionalProperties = make(map[string]string)\n\t}\n\ta.AdditionalProperties[fieldName] = value\n}", "title": "" }, { "docid": "ff7202cdd599c107c3981defe576e160", "score": "0.48379058", "text": "func (ctuo *CustomTypeUpdateOne) SetNillableCustom(s *string) *CustomTypeUpdateOne {\n\tif s != nil {\n\t\tctuo.SetCustom(*s)\n\t}\n\treturn ctuo\n}", "title": "" }, { "docid": "1a9093d8cfe20f143a9ac9dc42262226", "score": "0.48225126", "text": "func (m *CustomExtensionStageSetting) SetCustomExtension(value CustomCalloutExtensionable)() {\n err := m.GetBackingStore().Set(\"customExtension\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "f555b38c6bfa07722fce31c78fdff0ac", "score": "0.47842473", "text": "func (m *EmailThreatSubmissionPolicy) SetIsCustomizedMessageEnabled(value *bool)() {\n err := m.GetBackingStore().Set(\"isCustomizedMessageEnabled\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "c7602337da9b630536b0b1ed625af804", "score": "0.4783483", "text": "func (o LinkedServiceAzureDatabricksNewClusterConfigOutput) CustomTags() pulumi.StringMapOutput {\n\treturn o.ApplyT(func(v LinkedServiceAzureDatabricksNewClusterConfig) map[string]string { return v.CustomTags }).(pulumi.StringMapOutput)\n}", "title": "" }, { "docid": "5eaa09ef3a7920eb7715f4bfa0a97ae4", "score": "0.4771719", "text": "func setupCustomUnmarshal(d APIDescription, tgType TypeDescription) (string, error) {\n\tvar fields []customUnmarshalFieldData\n\tgenerateCustomMarshal := false\n\tfor idx, f := range tgType.Fields {\n\t\tprefType, err := f.getPreferredType(d)\n\t\tif err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\n\t\tif isTgType(d, prefType) {\n\t\t\tfieldType, err := getTypeByName(d, prefType)\n\t\t\tif err != nil {\n\t\t\t\treturn \"\", fmt.Errorf(\"failed to get type of parameter %s in %s: %w\", prefType, tgType.Name, err)\n\t\t\t}\n\n\t\t\tif len(fieldType.Subtypes) > 0 {\n\t\t\t\tsubtypes, err := getTypesByName(d, fieldType.Subtypes)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn \"\", fmt.Errorf(\"failed to get subtypes from %s: %w\", fieldType.Name, err)\n\t\t\t\t}\n\t\t\t\tif len(getCommonFields(subtypes)) > 0 {\n\t\t\t\t\tgenerateCustomMarshal = true\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tif idx == 0 && len(tgType.SubtypeOf) > 0 && f.isConstantField(d, tgType) {\n\t\t\tcontinue\n\t\t}\n\n\t\tif isTgType(d, prefType) && !f.Required {\n\t\t\tprefType = \"*\" + prefType\n\t\t}\n\n\t\tfields = append(fields, customUnmarshalFieldData{\n\t\t\tName: snakeToTitle(f.Name),\n\t\t\tCustom: len(d.Types[prefType].Subtypes) > 0,\n\t\t\tType: prefType,\n\t\t\tJSONTag: fmt.Sprintf(\"`json:\\\"%s\\\"`\", f.Name),\n\t\t})\n\t}\n\n\tif !generateCustomMarshal {\n\t\treturn \"\", nil\n\t}\n\n\tbd := strings.Builder{}\n\terr := customUnmarshalTmpl.Execute(&bd, customUnmarshalData{\n\t\tType: tgType.Name,\n\t\tFields: fields,\n\t})\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"failed to generate custom unmarshal: %w\", err)\n\t}\n\treturn bd.String(), nil\n}", "title": "" }, { "docid": "e2e39ec76f80ae78fbba67e22f90f4f1", "score": "0.47588268", "text": "func (a *Job_Tags) Set(fieldName string, value string) {\n\tif a.AdditionalProperties == nil {\n\t\ta.AdditionalProperties = make(map[string]string)\n\t}\n\ta.AdditionalProperties[fieldName] = value\n}", "title": "" }, { "docid": "884b7994601918975cd910976edccc5b", "score": "0.47430468", "text": "func SetCustomFlags(cmd *cobra.Command) {\n\tpath := commandPath(cmd)\n\n\tif flags, ok := flagRegistry[path]; ok {\n\t\tfor _, f := range flags {\n\t\t\tswitch v := f.defaultValue.(type) {\n\t\t\tcase bool:\n\t\t\t\tcmd.Flags().BoolP(f.name, f.short, v, f.description)\n\t\t\tcase int:\n\t\t\t\tcmd.Flags().Int64P(f.name, f.short, int64(v), f.description)\n\t\t\tcase int32:\n\t\t\t\tcmd.Flags().Int64P(f.name, f.short, int64(v), f.description)\n\t\t\tcase int64:\n\t\t\t\tcmd.Flags().Int64P(f.name, f.short, v, f.description)\n\t\t\tcase float32:\n\t\t\t\tcmd.Flags().Float64P(f.name, f.short, float64(v), f.description)\n\t\t\tcase float64:\n\t\t\t\tcmd.Flags().Float64P(f.name, f.short, v, f.description)\n\t\t\tdefault:\n\t\t\t\tcmd.Flags().StringP(f.name, f.short, fmt.Sprintf(\"%v\", v), f.description)\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "fc5ad9e8552d5c0cf2bbb1a2bf206283", "score": "0.47001117", "text": "func (m *OathTokenMetadata) SetEnabled(value *bool)() {\n err := m.GetBackingStore().Set(\"enabled\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "61c509c672cc7fdbd3528564848ccaff", "score": "0.46983886", "text": "func (s *Service) UpCustomSubTags(c context.Context, mid int64, tids []int64, tp int) (err error) {\n\treturn s.upCustomSubTags(c, mid, tp, tids)\n}", "title": "" }, { "docid": "082972e30d3a133049efec40586f4984", "score": "0.46887645", "text": "func (o LinkedServiceAzureDatabricksNewClusterConfigPtrOutput) CustomTags() pulumi.StringMapOutput {\n\treturn o.ApplyT(func(v *LinkedServiceAzureDatabricksNewClusterConfig) map[string]string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.CustomTags\n\t}).(pulumi.StringMapOutput)\n}", "title": "" }, { "docid": "efe414736a9dcff0c86dd831989b3855", "score": "0.46711016", "text": "func SetTagLevel(lv int) {\n\tfionConf.setTagLevel(lv)\n}", "title": "" }, { "docid": "9bac009521709b468801bd474e0a04fe", "score": "0.4654938", "text": "func (lvdb *LVDB) SetCustom(opt *levigo.WriteOptions, key []byte, value []byte) error {\n\treturn lvdb._db.Put(opt, key, value)\n}", "title": "" }, { "docid": "0c00be83274306a60c24f161ddfc5e8d", "score": "0.4636579", "text": "func (s *Service) CustomSubTags(c context.Context, mid int64, order, tp, ps, pn int) (cst, sst []*model.TagInfo, total int, err error) {\n\tvar tids []int64\n\tcustomTags, err := s.customSubTag(c, mid, tp, pn, ps, order)\n\tif err != nil {\n\t\treturn _emptyTagInfo, _emptyTagInfo, 0, err\n\t}\n\tif customTags == nil {\n\t\treturn _emptyTagInfo, _emptyTagInfo, 0, nil\n\t}\n\ttotal = customTags.Total\n\tfor _, tag := range customTags.Sort {\n\t\ttids = append(tids, tag.ID)\n\t}\n\tfor _, tag := range customTags.Tags {\n\t\ttids = append(tids, tag.ID)\n\t}\n\tcountMap, _ := s.countMap(c, tids, mid)\n\tfor _, tag := range customTags.Sort {\n\t\tt := &model.TagInfo{\n\t\t\tID: tag.ID,\n\t\t\tType: tag.Type,\n\t\t\tName: tag.Name,\n\t\t\tCover: tag.Cover,\n\t\t\tContent: tag.Content,\n\t\t\tVerify: tag.Verify,\n\t\t\tAttr: tag.Attr,\n\t\t\tAttention: tag.Attention,\n\t\t\tState: tag.State,\n\t\t\tCTime: tag.CTime,\n\t\t\tMTime: tag.MTime,\n\t\t}\n\t\tif k, ok := countMap[tag.ID]; ok {\n\t\t\tt.Bind = k.Bind\n\t\t\tt.Sub = k.Sub\n\t\t}\n\t\tcst = append(cst, t)\n\t}\n\tfor _, tag := range customTags.Tags {\n\t\tt := &model.TagInfo{\n\t\t\tID: tag.ID,\n\t\t\tType: tag.Type,\n\t\t\tName: tag.Name,\n\t\t\tCover: tag.Cover,\n\t\t\tContent: tag.Content,\n\t\t\tVerify: tag.Verify,\n\t\t\tAttr: tag.Attr,\n\t\t\tAttention: tag.Attention,\n\t\t\tState: tag.State,\n\t\t\tCTime: tag.CTime,\n\t\t\tMTime: tag.MTime,\n\t\t}\n\t\tif k, ok := countMap[tag.ID]; ok {\n\t\t\tt.Bind = k.Bind\n\t\t\tt.Sub = k.Sub\n\t\t}\n\t\tsst = append(sst, t)\n\t}\n\tif cst == nil {\n\t\tcst = _emptyTagInfo\n\t}\n\tif sst == nil {\n\t\tsst = _emptyTagInfo\n\t}\n\treturn\n}", "title": "" }, { "docid": "0a0e87da465e60799e968722c2194750", "score": "0.46201223", "text": "func SetEnabledMapperStructField(isEnabled bool) {\n\tstandardMapper.SetEnabledMapperStructField(isEnabled)\n}", "title": "" }, { "docid": "99b5e346e579646aa8730e33c4064848", "score": "0.4603668", "text": "func (a *api) SetCustomHeader(key, val string) {\n\ta.customHeaders.Set(key, val)\n}", "title": "" }, { "docid": "d432f94e526b46a004244114a2631734", "score": "0.45851558", "text": "func (crl *ConnectedRileyLink) SetCustomName(newname string) error {\n\tvar (\n\t\tdata []byte\n\t\terr error\n\t)\n\tdata = []byte(newname)\n\terr = crl.client.WriteCharacteristic(crl.customNameChr, data, false)\n\treturn err\n}", "title": "" }, { "docid": "b9ce91e720ee2157f636d12dea9c4256", "score": "0.4567356", "text": "func (t *jsiiProxy_TagManager) SetTag(key *string, value *string, priority *float64, applyToLaunchedInstances *bool) {\n\t_jsii_.InvokeVoid(\n\t\tt,\n\t\t\"setTag\",\n\t\t[]interface{}{key, value, priority, applyToLaunchedInstances},\n\t)\n}", "title": "" }, { "docid": "eff866386b22a2d6ac86d1fce5c647d5", "score": "0.4537213", "text": "func (ns *Nodes) SetTag(fieldName, key, value string) error {\n\tn, ok := ns.nodesMap[fieldName]\n\tif !ok {\n\t\treturn errors.New(\"unable to set field tag: no field found by name '\" + fieldName + \"'\")\n\t}\n\n\tn.SetTag(key, value)\n\n\treturn nil\n}", "title": "" }, { "docid": "02403b7c53ab4e893430686a3dc8739b", "score": "0.45263737", "text": "func (evsuo *ExValueScanUpdateOne) SetNillableCustomOptional(s *string) *ExValueScanUpdateOne {\n\tif s != nil {\n\t\tevsuo.SetCustomOptional(*s)\n\t}\n\treturn evsuo\n}", "title": "" }, { "docid": "3f7516a9b6f1389fb77d00ff6a1c080d", "score": "0.4523839", "text": "func SetTagName(value string) {\n\ttagName = value\n}", "title": "" }, { "docid": "9b570cc0e2a625441fc0ad2279ee27c2", "score": "0.4521542", "text": "func SetOmitTagName(value string) {\n\tomitTagName = value\n}", "title": "" }, { "docid": "2e62d5d4f9f67d55fe7c0bacf7e72989", "score": "0.45207658", "text": "func (o *FabricPortMode) SetCustomMode(v string) {\n\to.CustomMode = &v\n}", "title": "" }, { "docid": "e1e006412214756f74803e5f79ff6b6f", "score": "0.45082203", "text": "func (customView *CustomViewData) Set(tag string, value interface{}) bool {\n\treturn customView.superView.Set(tag, value)\n}", "title": "" }, { "docid": "1eab7b6170c0dc2ab77495a075a384ea", "score": "0.45075378", "text": "func PropertyNameTag(tag string, additional ...string) func(*ReflectContext) {\n\treturn func(rc *ReflectContext) {\n\t\trc.PropertyNameTag = tag\n\t\trc.PropertyNameAdditionalTags = additional\n\t}\n}", "title": "" }, { "docid": "4644e2ce724c32ef44362bec9adac686", "score": "0.4499603", "text": "func SetTag(t string) {\n\ttag = t\n}", "title": "" }, { "docid": "4644e2ce724c32ef44362bec9adac686", "score": "0.4499603", "text": "func SetTag(t string) {\n\ttag = t\n}", "title": "" }, { "docid": "3f447ad41a98bbea62c00d916f17ba62", "score": "0.4495449", "text": "func (m RuntimeSetCustomObjectFormatterEnabled) Call(c Client) error {\n\treturn call(m.ProtoReq(), m, nil, c)\n}", "title": "" }, { "docid": "b91988dbc6a4217394fc745987619703", "score": "0.44901657", "text": "func (evsuo *ExValueScanUpdateOne) SetCustomOptional(s string) *ExValueScanUpdateOne {\n\tevsuo.mutation.SetCustomOptional(s)\n\treturn evsuo\n}", "title": "" }, { "docid": "46f234e34ddcfacf0993534e8c925b45", "score": "0.44867897", "text": "func (o *ShortenBitlinkBody) SetCustomBitlinks(v []string) {\n\to.CustomBitlinks = &v\n}", "title": "" }, { "docid": "46daa99ca77330209ca8287f99f59753", "score": "0.44744843", "text": "func SetTag(tag string) {\n\tTagName = tag\n}", "title": "" }, { "docid": "5ec79356976f5aa162e74d1e97490221", "score": "0.44507682", "text": "func (self *Touch) SetEnabledA(member bool) {\n self.Object.Set(\"enabled\", member)\n}", "title": "" }, { "docid": "8c6be4b63790ad13411096426811d372", "score": "0.44504386", "text": "func (evsu *ExValueScanUpdate) SetNillableCustomOptional(s *string) *ExValueScanUpdate {\n\tif s != nil {\n\t\tevsu.SetCustomOptional(*s)\n\t}\n\treturn evsu\n}", "title": "" }, { "docid": "22ebb28337d34c23d4e7c6e94b211e06", "score": "0.44309425", "text": "func (m *CustomSecurityAttributeDefinition) Serialize(writer i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.SerializationWriter)(error) {\n err := m.Entity.Serialize(writer)\n if err != nil {\n return err\n }\n if m.GetAllowedValues() != nil {\n cast := make([]i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.Parsable, len(m.GetAllowedValues()))\n for i, v := range m.GetAllowedValues() {\n if v != nil {\n cast[i] = v.(i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.Parsable)\n }\n }\n err = writer.WriteCollectionOfObjectValues(\"allowedValues\", cast)\n if err != nil {\n return err\n }\n }\n {\n err = writer.WriteStringValue(\"attributeSet\", m.GetAttributeSet())\n if err != nil {\n return err\n }\n }\n {\n err = writer.WriteStringValue(\"description\", m.GetDescription())\n if err != nil {\n return err\n }\n }\n {\n err = writer.WriteBoolValue(\"isCollection\", m.GetIsCollection())\n if err != nil {\n return err\n }\n }\n {\n err = writer.WriteBoolValue(\"isSearchable\", m.GetIsSearchable())\n if err != nil {\n return err\n }\n }\n {\n err = writer.WriteStringValue(\"name\", m.GetName())\n if err != nil {\n return err\n }\n }\n {\n err = writer.WriteStringValue(\"status\", m.GetStatus())\n if err != nil {\n return err\n }\n }\n {\n err = writer.WriteStringValue(\"type\", m.GetTypeEscaped())\n if err != nil {\n return err\n }\n }\n {\n err = writer.WriteBoolValue(\"usePreDefinedValuesOnly\", m.GetUsePreDefinedValuesOnly())\n if err != nil {\n return err\n }\n }\n return nil\n}", "title": "" }, { "docid": "7b21cf2c10a0f7362a4d692bc0233499", "score": "0.44295627", "text": "func (m *MockUserStore) SetTag(v0 context.Context, v1 int32, v2 string, v3 bool) error {\n\tr0 := m.SetTagFunc.nextHook()(v0, v1, v2, v3)\n\tm.SetTagFunc.appendCall(UserStoreSetTagFuncCall{v0, v1, v2, v3, r0})\n\treturn r0\n}", "title": "" }, { "docid": "3adedb5da942f2d6d73cfc7d4c154795", "score": "0.44257745", "text": "func (m *EmailThreatSubmissionPolicy) SetIsCustomizedNotificationSenderEnabled(value *bool)() {\n err := m.GetBackingStore().Set(\"isCustomizedNotificationSenderEnabled\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "cbb1e3a4218ad7f91608d9940e2ce63a", "score": "0.4415129", "text": "func (m *EmailThreatSubmissionPolicy) SetIsReportToCustomizedEmailAddressEnabled(value *bool)() {\n err := m.GetBackingStore().Set(\"isReportToCustomizedEmailAddressEnabled\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "fadbb4724f53e57eeece799bffb850e0", "score": "0.4414434", "text": "func (tag BoolTagName) Set(span opentracing.Span, value bool) {\n\tspan.SetTag(string(tag), value)\n}", "title": "" }, { "docid": "ce192cfc1a8335867dd43932730c410b", "score": "0.44037235", "text": "func (t *jaegerImpl) SetTag(key string, value interface{}) {\n\tif t.span == nil {\n\t\treturn\n\t}\n\n\tif t.tags == nil {\n\t\tt.tags = make(map[string]interface{})\n\t}\n\tt.tags[key] = value\n}", "title": "" }, { "docid": "6d80344d0163a246cf8b50be90a47194", "score": "0.44014528", "text": "func (c *ChatReactionsAll) SetAllowCustom(value bool) {\n\tif value {\n\t\tc.Flags.Set(0)\n\t\tc.AllowCustom = true\n\t} else {\n\t\tc.Flags.Unset(0)\n\t\tc.AllowCustom = false\n\t}\n}", "title": "" }, { "docid": "86aa8fecac4016370a7354cf3601ff86", "score": "0.44006503", "text": "func (m *Request) SetCustomData(value *string)() {\n m.customData = value\n}", "title": "" }, { "docid": "0b4c623b19254bcbb6daf7ed42cd4f43", "score": "0.43949443", "text": "func (o *InstanceTypes) SetCustom(v []*CustomInstance) *InstanceTypes {\n\tif o.Custom = v; o.Custom == nil {\n\t\to.nullFields = append(o.nullFields, \"Custom\")\n\t}\n\treturn o\n}", "title": "" }, { "docid": "f2eb2455371c743848fe8af464328c3f", "score": "0.43875125", "text": "func (o DomainDomainEndpointOptionsOutput) CustomEndpointEnabled() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v DomainDomainEndpointOptions) *bool { return v.CustomEndpointEnabled }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "54ffd77a5ea2009a6f1e3400d2da8dd2", "score": "0.43674338", "text": "func (s *SerfNode) SetTag(name, value string) {\n\ts.mutex.Lock()\n\tdefer s.mutex.Unlock()\n\tif value == \"\" {\n\t\tdelete(s.tags, name)\n\t\treturn\n\t}\n\ts.tags[name] = value\n\ts.changedTags = true\n}", "title": "" }, { "docid": "149c376d8db78c648ce7c93c36bab703", "score": "0.43642092", "text": "func (self *TraitTooltip) SetCustom(custom_widget IsWidget) {\n\tvar __cgo__custom_widget *C.GtkWidget\n\tif custom_widget != nil {\n\t\t__cgo__custom_widget = custom_widget.GetWidgetPointer()\n\t}\n\tC.gtk_tooltip_set_custom(self.CPointer, __cgo__custom_widget)\n\treturn\n}", "title": "" }, { "docid": "00c13b279da1894b721d94181b5b44e8", "score": "0.43576393", "text": "func (this *Tracing_CustomTag) UnmarshalJSON(b []byte) error {\n\treturn TelemetryUnmarshaler.Unmarshal(bytes.NewReader(b), this)\n}", "title": "" }, { "docid": "c3976ed206e0158b3aaae828c7cc2ea5", "score": "0.43470356", "text": "func (en *EventName) IsCustom() bool {\n\treturn en.Subclass != \"\"\n}", "title": "" }, { "docid": "1c64e1610cf24ce70bb61507080e9252", "score": "0.4318622", "text": "func (m *customIntegration) SetTags(val []string) {\n\tm.tagsField = val\n}", "title": "" }, { "docid": "16ea98784c890b6af02d778c7663a763", "score": "0.43123618", "text": "func (m *OnTokenIssuanceStartCustomExtension) Serialize(writer i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.SerializationWriter)(error) {\n err := m.CustomAuthenticationExtension.Serialize(writer)\n if err != nil {\n return err\n }\n if m.GetClaimsForTokenConfiguration() != nil {\n cast := make([]i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.Parsable, len(m.GetClaimsForTokenConfiguration()))\n for i, v := range m.GetClaimsForTokenConfiguration() {\n if v != nil {\n cast[i] = v.(i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.Parsable)\n }\n }\n err = writer.WriteCollectionOfObjectValues(\"claimsForTokenConfiguration\", cast)\n if err != nil {\n return err\n }\n }\n return nil\n}", "title": "" }, { "docid": "9b5664a6bc492d9726cc5c4164f1351a", "score": "0.4312173", "text": "func (this *Tracing_CustomTag) MarshalJSON() ([]byte, error) {\n\tstr, err := TelemetryMarshaler.MarshalToString(this)\n\treturn []byte(str), err\n}", "title": "" }, { "docid": "428a9086f88a88d93c50725513befe4d", "score": "0.4291418", "text": "func (evsu *ExValueScanUpdate) SetCustomOptional(s string) *ExValueScanUpdate {\n\tevsu.mutation.SetCustomOptional(s)\n\treturn evsu\n}", "title": "" }, { "docid": "225b25f44663ba0731be84b0c49467d6", "score": "0.4279133", "text": "func emitTag(tag string, pos token.Pos, fset *token.FileSet, kind rune, extra string) {\n\tp := fset.Position(pos)\n\tsearchString := contentOfLine(p.Line, p.Filename)\n\ttags = append(tags, fmt.Sprintf(\"%s\\t%s\\t/^%s$/;\\\"\\t%c\\t%s\", tag, p.Filename, searchString, kind, extra))\n}", "title": "" }, { "docid": "5b941c1380ad83ad1d87e7c51394a5f9", "score": "0.4277836", "text": "func (customView *CustomViewData) Tag() string {\n\tif customView.tag != \"\" {\n\t\treturn customView.tag\n\t}\n\treturn customView.superView.Tag()\n}", "title": "" }, { "docid": "8afaaca8b99ca84a8d32f1dcd7bd17c4", "score": "0.4267672", "text": "func (o DomainDomainEndpointOptionsPtrOutput) CustomEndpointEnabled() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *DomainDomainEndpointOptions) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.CustomEndpointEnabled\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "ac0a4d3d18b29e259d7b533c316148bd", "score": "0.42553675", "text": "func SetDebugEnabledFor(component string) {\n\tlog.Println(\"ENABLING DEBUG FOR \" + component)\n\tdebugEnabledFor_.Store(component, true)\n\t//debugEnabledFor_[component] = true\n}", "title": "" }, { "docid": "08e9bd02a61a6d8efa76f3d8598863e1", "score": "0.4247455", "text": "func (m *EmailThreatSubmissionPolicy) SetIsCustomizedMessageEnabledForPhishing(value *bool)() {\n err := m.GetBackingStore().Set(\"isCustomizedMessageEnabledForPhishing\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "59a03ad4adc496d7b2402723662afbab", "score": "0.42459658", "text": "func WithCustomWriter(w io.Writer) LoggerOption {\n\treturn func(lo *options) error {\n\t\tif w != nil {\n\t\t\tlo.w = w\n\t\t\tlo.isTerminal = false\n\t\t\tlo.stdout = false\n\t\t}\n\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "7a9628bc1027bba8eeef5f3bf867ef22", "score": "0.42371976", "text": "func setTagsDX(conn *directconnect.DirectConnect, d *schema.ResourceData, arn string) error {\n\tif d.HasChange(\"tags\") {\n\t\toraw, nraw := d.GetChange(\"tags\")\n\t\to := oraw.(map[string]interface{})\n\t\tn := nraw.(map[string]interface{})\n\t\tcreate, remove := diffTagsDX(tagsFromMapDX(o), tagsFromMapDX(n))\n\n\t\t// Set tags\n\t\tif len(remove) > 0 {\n\t\t\tlog.Printf(\"[DEBUG] Removing tags: %#v\", remove)\n\t\t\tk := make([]*string, len(remove), len(remove))\n\t\t\tfor i, t := range remove {\n\t\t\t\tk[i] = t.Key\n\t\t\t}\n\n\t\t\t_, err := conn.UntagResource(&directconnect.UntagResourceInput{\n\t\t\t\tResourceArn: aws.String(arn),\n\t\t\t\tTagKeys: k,\n\t\t\t})\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t\tif len(create) > 0 {\n\t\t\tlog.Printf(\"[DEBUG] Creating tags: %#v\", create)\n\t\t\t_, err := conn.TagResource(&directconnect.TagResourceInput{\n\t\t\t\tResourceArn: aws.String(arn),\n\t\t\t\tTags: create,\n\t\t\t})\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "85127d7371798b84ec8b7d3ddb965039", "score": "0.42369732", "text": "func (self *FlexGrid) SetScaleCustomA(member interface{}) {\n self.Object.Set(\"scaleCustom\", member)\n}", "title": "" }, { "docid": "8d0110126baad2daab570391eacf2f41", "score": "0.42367625", "text": "func (r *Repo) SetAllowTag(v bool) {\n\t// return if Repo type is nil\n\tif r == nil {\n\t\treturn\n\t}\n\n\tr.AllowTag = &v\n}", "title": "" }, { "docid": "7d005e062bd069e29ce32d378991b7ec", "score": "0.42333996", "text": "func RegisterCustomLoggerTarget(name string, logger CustomTarget) error {\n\ttarget.RegisterCustomTarget(name, logger)\n\treturn nil\n}", "title": "" }, { "docid": "18f851fb3e5954850a96938d66cd725c", "score": "0.42283136", "text": "func (cs *CustomCommand) customEnabled(client *redis.Client, guildID string) (bool, error) {\n\t// No special key so it's automatically enabled\n\tif cs.Key == \"\" || cs.CustomEnabled {\n\t\treturn true, nil\n\t}\n\n\t// Check redis for settings\n\treply := client.Cmd(\"GET\", cs.Key+guildID)\n\tif reply.Err != nil {\n\t\treturn false, reply.Err\n\t}\n\n\tenabled, _ := common.RedisBool(reply)\n\n\tif cs.Default {\n\t\tenabled = !enabled\n\t}\n\n\tif !enabled {\n\t\treturn false, nil\n\t}\n\n\treturn enabled, nil\n}", "title": "" }, { "docid": "118a2e4ae541dedc3697d40142dcd28e", "score": "0.4219549", "text": "func TestTagNameSetNameSet(t *testing.T) {\n\tsample := validSample()\n\tsample.Tags = make(map[string]string)\n\tsample.Tags[\"name\"] = \"testName\"\n\tsample.Name = \"realName\"\n\n\tbuf, err := proto.Marshal(&sample)\n\tassert.NoError(t, err, \"Error when marshalling sample\")\n\n\tspan, errSSF := protocol.ParseSSF(buf)\n\tassert.NoError(t, err)\n\tif assert.NotNil(t, span) {\n\t\tassert.NoError(t, err)\n\t\tif assert.NotNil(t, span) {\n\t\t\tassert.Equal(t, sample.Name, span.Name, \"Name did not propogate\")\n\t\t\tassert.NoError(t, errSSF)\n\t\t\tassert.NotEmpty(t, span.Tags[\"name\"])\n\t\t}\n\t}\n}", "title": "" }, { "docid": "336a554b3d0310ac4fc79061e3b5ac88", "score": "0.4219074", "text": "func (options *CreateAssetOptions) SetIsCustom(isCustom bool) *CreateAssetOptions {\n\toptions.IsCustom = core.BoolPtr(isCustom)\n\treturn options\n}", "title": "" }, { "docid": "2f53ed622526ea8417bfc7e43e48daae", "score": "0.4213172", "text": "func (s *Span) SetTag(key string, value interface{}) opentracing.Span {\n\tswitch key {\n\tcase ext.Resource:\n\t\tv, ok := value.(string)\n\t\tif ok {\n\t\t\ts.resource = v\n\t\t}\n\n\tcase ext.Type:\n\t\tv, ok := value.(string)\n\t\tif ok {\n\t\t\ts.typ = v\n\t\t}\n\n\tcase ext.Service:\n\t\tv, ok := value.(string)\n\t\tif ok {\n\t\t\ts.service = v\n\t\t}\n\t}\n\n\tif err, ok := value.(error); ok {\n\t\ts.setError(err)\n\t\treturn s\n\t}\n\n\ts.setTag(key, value)\n\treturn s\n}", "title": "" }, { "docid": "0be4c0e11cc03b52415956bffa1ad1e8", "score": "0.42119253", "text": "func GetEnabledCustom(service *service.Service, name string, channel string) (*Custom, error) {\n\tcommand, err := GetCustom(service, name, channel)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif command != nil && !command.Enabled {\n\t\treturn nil, nil\n\t}\n\treturn command, nil\n}", "title": "" }, { "docid": "0ae08ae9f3c0e709a9dba82e696734a2", "score": "0.42096713", "text": "func (m *OperationMutator) Tag(value string) *OperationMutator {\n\tm.lock.Lock()\n\tdefer m.lock.Unlock()\n\tm.proxy.tags = append(m.proxy.tags, value)\n\treturn m\n}", "title": "" }, { "docid": "322c06a510b18234d728405f5a117cee", "score": "0.42092875", "text": "func (m *CustomExtensionStageSetting) Serialize(writer i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.SerializationWriter)(error) {\n err := m.Entity.Serialize(writer)\n if err != nil {\n return err\n }\n {\n err = writer.WriteObjectValue(\"customExtension\", m.GetCustomExtension())\n if err != nil {\n return err\n }\n }\n if m.GetStage() != nil {\n cast := (*m.GetStage()).String()\n err = writer.WriteStringValue(\"stage\", &cast)\n if err != nil {\n return err\n }\n }\n return nil\n}", "title": "" }, { "docid": "c95cfd9e42ac8ada19feaf1e28942e70", "score": "0.42037413", "text": "func (o StackOutput) UseCustomCookbooks() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *Stack) pulumi.BoolPtrOutput { return v.UseCustomCookbooks }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "656335c69180db128a6fc2b5bf5455ea", "score": "0.41979885", "text": "func (o *ProcessGroup) SetCustomizedName(v string) {\n\to.CustomizedName = &v\n}", "title": "" }, { "docid": "bb14abe0fdae44a11848fd1df461d2c4", "score": "0.4196179", "text": "func (r *Registry) SetEnabled(fqn string, enabled bool) {\n\tr.Lock()\n\tdefer r.Unlock()\n\tr.initDisabled()\n\tr.disabled[fqn] = !enabled\n\tfor _, o := range r.objects {\n\t\tif o.FQN() == fqn {\n\t\t\to.Enabled = enabled\n\t\t\tbreak\n\t\t}\n\t}\n}", "title": "" }, { "docid": "1011584a109e8c408fcb83bfd6d4db85", "score": "0.41750595", "text": "func (self *TraitPrintOperation) SetCustomTabLabel(label string) {\n\t__cgo__label := (*C.gchar)(unsafe.Pointer(C.CString(label)))\n\tC.gtk_print_operation_set_custom_tab_label(self.CPointer, __cgo__label)\n\tC.free(unsafe.Pointer(__cgo__label))\n\treturn\n}", "title": "" }, { "docid": "4dd67b7612089be62a747aef0f58424f", "score": "0.41487464", "text": "func (c CustomField) MarshalXML(e *xml.Encoder, start xml.StartElement) error {\n\treturn e.EncodeElement(c.Value, xml.StartElement{Name: xml.Name{Local: c.Name}, Attr: start.Attr})\n}", "title": "" }, { "docid": "e7036f462a3cb4fdc61845bb1dfa5531", "score": "0.4142053", "text": "func (a *JobTemplate_Extension) Set(fieldName string, value string) {\n\tif a.AdditionalProperties == nil {\n\t\ta.AdditionalProperties = make(map[string]string)\n\t}\n\ta.AdditionalProperties[fieldName] = value\n}", "title": "" }, { "docid": "5c35a7f00703c32302069a3144a34418", "score": "0.41388208", "text": "func (ob *ObjectBuilder) AddCustomFields(fieldAdditions map[string][]*graphql.Field) {\n\tfor key, fields := range fieldAdditions {\n\t\tob.fieldAdditions[key] = fields\n\n\t\tsplits := strings.Split(key, FieldPathSeparator)\n\t\tifaceName := splits[0]\n\t\tif iface, ok := ob.interfaces[ifaceName]; ok {\n\t\t\tparent := findObjectField(iface.Fields(), splits[1:])\n\t\t\tif parent == nil {\n\t\t\t\tfor _, field := range fields {\n\t\t\t\t\tiface.AddFieldConfig(field.Name, field)\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tfor _, field := range fields {\n\t\t\t\t\tparent.AddFieldConfig(field.Name, field)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "94cd3cc672e7ea1653d2b4cdfaf662eb", "score": "0.41366607", "text": "func (g *goGenerator) emitCustomImports(w *tools.GenWriter, mod *module, infos []*tfbridge.SchemaInfo) error {\n\t// TODO: implement this; until we do, we can't easily add overlays with intra- or inter-package references.\n\treturn nil\n}", "title": "" } ]
01dbf980bc6569d781f90bb4bdaa638a
SetBiosUuid gets a reference to the given string and assigns it to the BiosUuid field.
[ { "docid": "2b4afc651eb573476b6de46fe0aabd68", "score": "0.7197609", "text": "func (o *CanonicalFactsInAllOf) SetBiosUuid(v string) {\n\to.BiosUuid = &v\n}", "title": "" } ]
[ { "docid": "e9b1c982dc7500ae3aaada523fc0b3dc", "score": "0.68261933", "text": "func (o *HyperflexVirtualMachineRuntimeInfoAllOf) SetBiosUuid(v string) {\n\to.BiosUuid = &v\n}", "title": "" }, { "docid": "bb66ee7c6c4ec5b95f3e586ba873bc26", "score": "0.6284644", "text": "func (o *CanonicalFactsInAllOf) GetBiosUuid() string {\n\tif o == nil || o.BiosUuid == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.BiosUuid\n}", "title": "" }, { "docid": "ba33e8b015933ba7b42f2e185a9fdbb5", "score": "0.6127922", "text": "func (o *HyperflexVirtualMachineRuntimeInfoAllOf) GetBiosUuid() string {\n\tif o == nil || o.BiosUuid == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.BiosUuid\n}", "title": "" }, { "docid": "8a29b92fafe37efcc06fcdb8e9566d54", "score": "0.60951", "text": "func (o *Rebalance) SetUuid(v string) {\n\to.Uuid = v\n}", "title": "" }, { "docid": "6009656dc08b58248a20173aa6e44e4a", "score": "0.5844698", "text": "func (o *HyperflexIscsiNetwork) SetUuid(v string) {\n\to.Uuid = &v\n}", "title": "" }, { "docid": "c33b79aa60d9c6ea92d5f015ef3ac815", "score": "0.5808004", "text": "func (o *StorageNetAppVolume) SetUuid(v string) {\n\to.Uuid = &v\n}", "title": "" }, { "docid": "7320990b5af051ccc8cae18ff7ef6fa0", "score": "0.5783455", "text": "func (o *PatchedBankAccountCreateUpdate) SetUuid(v string) {\n\to.Uuid = &v\n}", "title": "" }, { "docid": "5b7f1472cf264ec411f6c42c42517e29", "score": "0.5683927", "text": "func (c *Volley) SetUUID(uuid message.UUID) { c.Uuid = uuid[:] }", "title": "" }, { "docid": "ee6eaed4e69f1eb3440afadf0f392a4c", "score": "0.56645507", "text": "func (o *HyperflexVdiskConfig) SetUuid(v string) {\n\to.Uuid = &v\n}", "title": "" }, { "docid": "efb43e6b46b45d590c07e2ecbf053006", "score": "0.555272", "text": "func (o *LunInfoType) SetUuid(newValue string) *LunInfoType {\n\to.UuidPtr = &newValue\n\treturn o\n}", "title": "" }, { "docid": "e47cd21f0c9ccccad451656755bdbefa", "score": "0.5533471", "text": "func (o *StorageNetAppAggregateAllOf) SetUuid(v string) {\n\to.Uuid = &v\n}", "title": "" }, { "docid": "a6d6b0678066b96d151aec0b21e685b1", "score": "0.55269194", "text": "func (o *Document) SetUuid(v string) {\n\to.Uuid = v\n}", "title": "" }, { "docid": "857bf61010ef75216008978ca98bb875", "score": "0.5492292", "text": "func (o *HyperflexHxZoneInfoDt) SetUuid(v string) {\n\to.Uuid = &v\n}", "title": "" }, { "docid": "9c2a920518665588dff189bf79864f4d", "score": "0.5469851", "text": "func (o *AssetDetail) SetUuid(v string) {\n\to.Uuid = v\n}", "title": "" }, { "docid": "02b1c22e2035355187ca5418489fa6bd", "score": "0.5455345", "text": "func (o *StorageNetAppLun) SetUuid(v string) {\n\to.Uuid = &v\n}", "title": "" }, { "docid": "f4bb4fb8b915b1753dff85ab4d55062f", "score": "0.54318625", "text": "func (o *JsonEnvironmentPublishingRequest) SetUuid(v string) {\n\to.Uuid = &v\n}", "title": "" }, { "docid": "a478f004ce1724b1de9ffdb2824ff029", "score": "0.5395348", "text": "func (o *ApplicationClientUpdate) SetUuid(v string) {\n\to.Uuid = v\n}", "title": "" }, { "docid": "b6112e06fc9074dfb9ba625fea74d920", "score": "0.537698", "text": "func (o *CloudBaseEntity) SetUuid(v string) {\n\to.Uuid = &v\n}", "title": "" }, { "docid": "895be840e5e0ea06ce947d37614b1c9d", "score": "0.5351123", "text": "func SetShortcutViaUuid(iUuid string, shortcut *Shortcut) (int64, error) {\n\tshortcut.Uuid = iUuid\n\treturn Engine.Insert(shortcut)\n}", "title": "" }, { "docid": "26ca6d55d145eb560599eff5bbd00a6c", "score": "0.533346", "text": "func (r *TaobaoWdkEquipmentConveyorStatusconfirmAPIRequest) SetUuid(_uuid string) error {\n\tr._uuid = _uuid\n\tr.Set(\"uuid\", _uuid)\n\treturn nil\n}", "title": "" }, { "docid": "323f3c3c2460cc49aa68dc703081e3a5", "score": "0.48856816", "text": "func (calendar *GoogleCalendar) SetUUID(id string) {\n\tcalendar.uuid = id\n}", "title": "" }, { "docid": "8b60b7967b85c15e2eff7fe62f291c39", "score": "0.48649883", "text": "func (_m *Router) SetUid(_a0 string) {\n\t_m.Called(_a0)\n}", "title": "" }, { "docid": "7dc27fd34b7e68d387ce93ef334e4d77", "score": "0.48024234", "text": "func setReceivedUUID(path string, UUID string) error {\n\ttype btrfsIoctlReceivedSubvolArgs struct {\n\t\tuuid [16]byte\n\t\t_ [22]uint64 // padding\n\t}\n\n\tf, err := os.Open(path)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Failed opening %s: %w\", path, err)\n\t}\n\n\tdefer func() { _ = f.Close() }()\n\n\targs := btrfsIoctlReceivedSubvolArgs{}\n\n\tbinUUID, err := uuid.Parse(UUID).MarshalBinary()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Failed coverting UUID: %w\", err)\n\t}\n\n\tcopy(args.uuid[:], binUUID)\n\n\t// 0xC0C09425 = _IOWR(BTRFS_IOCTL_MAGIC, 37, struct btrfs_ioctl_received_subvol_args)\n\t_, _, errno := unix.Syscall(unix.SYS_IOCTL, f.Fd(), 0xC0C09425, uintptr(unsafe.Pointer(&args)))\n\tif errno != 0 {\n\t\treturn fmt.Errorf(\"Failed setting received UUID: %w\", unix.Errno(errno))\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "7e1f3c9c27cc49a3126f2596bd9b152a", "score": "0.47376367", "text": "func (o *CanonicalFactsInAllOf) HasBiosUuid() bool {\n\tif o != nil && o.BiosUuid != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "fd538cc7310f23f8826d6b62468c8cb5", "score": "0.47370765", "text": "func (o *HyperflexVirtualMachineRuntimeInfoAllOf) HasBiosUuid() bool {\n\tif o != nil && o.BiosUuid != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "89d1f2bacb94bf7bc194243447698a43", "score": "0.4731142", "text": "func (_class VMClass) SetPCIBus(sessionID SessionRef, self VMRef, value string) (_err error) {\n\tif IsMock {\n\t\treturn _class.SetPCIBusMock(sessionID, self, value)\n\t}\t\n\t_method := \"VM.set_PCI_bus\"\n\t_sessionIDArg, _err := convertSessionRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"session_id\"), sessionID)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_selfArg, _err := convertVMRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"self\"), self)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_valueArg, _err := convertStringToXen(fmt.Sprintf(\"%s(%s)\", _method, \"value\"), value)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_, _err = _class.client.APICall(_method, _sessionIDArg, _selfArg, _valueArg)\n\treturn\n}", "title": "" }, { "docid": "b105ae83b4dd6e210ad6ec1e4f3fa046", "score": "0.46719652", "text": "func (rb *ResourceBuilder) SetK8sStatefulsetUID(val string) {\n\tif rb.config.K8sStatefulsetUID.Enabled {\n\t\trb.res.Attributes().PutStr(\"k8s.statefulset.uid\", val)\n\t}\n}", "title": "" }, { "docid": "b00287be5dac141a36c6ec1a172d98f2", "score": "0.46127728", "text": "func (h *ObjHeader) SetUid(uid Uid) {\n\th.id = uid\n\th.Id = uid.String()\n}", "title": "" }, { "docid": "5d3dedabf8dbe1bb14ef380fc52658ff", "score": "0.46101823", "text": "func (o *CanonicalFactsInAllOf) GetBiosUuidOk() (*string, bool) {\n\tif o == nil || o.BiosUuid == nil {\n\t\treturn nil, false\n\t}\n\treturn o.BiosUuid, true\n}", "title": "" }, { "docid": "1b24c1c97b1d1535896533b9de4983f5", "score": "0.4572841", "text": "func (o *SystemProfile) SetBiosVendor(v string) {\n\to.BiosVendor = &v\n}", "title": "" }, { "docid": "7fdd806ec42067f871c73dd5feb3655c", "score": "0.4558346", "text": "func (o *HyperflexVirtualMachineRuntimeInfoAllOf) GetBiosUuidOk() (*string, bool) {\n\tif o == nil || o.BiosUuid == nil {\n\t\treturn nil, false\n\t}\n\treturn o.BiosUuid, true\n}", "title": "" }, { "docid": "32f806e79047474260907559613f21e9", "score": "0.4533637", "text": "func (bc *BuildingCreate) SetBuname(s string) *BuildingCreate {\n\tbc.mutation.SetBuname(s)\n\treturn bc\n}", "title": "" }, { "docid": "dbf9b7750afb414952e4d2d8e09f9a55", "score": "0.4530092", "text": "func (o *PostLolClashV1EventsParams) SetUuids(uuids []string) {\n\to.Uuids = uuids\n}", "title": "" }, { "docid": "9daa127cc93789925f9f9cdabfe0c7fd", "score": "0.45076695", "text": "func (o *Rebalance) GetUuid() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.Uuid\n}", "title": "" }, { "docid": "632ad051d14edcd5d56ffc055b167f90", "score": "0.44911224", "text": "func (o *SystemProfile) SetBiosVersion(v string) {\n\to.BiosVersion = &v\n}", "title": "" }, { "docid": "eed3f402e69479f0f6cb14b3a883ca49", "score": "0.4479702", "text": "func PutShortcutViaUuid(Uuid_ string, iShortcut *Shortcut) (int64, error) {\n\trow, err := Engine.Update(iShortcut, &Shortcut{Uuid: Uuid_})\n\treturn row, err\n}", "title": "" }, { "docid": "0c3b91b3c21da9cbdc5274bf44636096", "score": "0.44496006", "text": "func (o *ComputeBlade) SetBiosUnits(v []BiosUnitRelationship) {\n\to.BiosUnits = v\n}", "title": "" }, { "docid": "9a97443bd5627e3ca8b7144a118c4b31", "score": "0.443465", "text": "func (c *Command) SetUUID(id string) *Command {\n\tc.uuid = append(c.uuid[:0], id...)\n\treturn c\n}", "title": "" }, { "docid": "758e9ff7a849e12a25dd84df1fd13f8c", "score": "0.4430042", "text": "func c_setuid(uid Uid_t) _C_int", "title": "" }, { "docid": "b961a60350142134bee9a26d643d16c6", "score": "0.4425645", "text": "func (o *HyperflexVirtualMachineRuntimeInfoAllOf) SetInstanceUuid(v string) {\n\to.InstanceUuid = &v\n}", "title": "" }, { "docid": "18cef61da4a86ddd269d6802cce7321f", "score": "0.44256294", "text": "func (_class VMClass) CopyBiosStrings(sessionID SessionRef, vm VMRef, host HostRef) (_err error) {\n\tif IsMock {\n\t\treturn _class.CopyBiosStringsMock(sessionID, vm, host)\n\t}\t\n\t_method := \"VM.copy_bios_strings\"\n\t_sessionIDArg, _err := convertSessionRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"session_id\"), sessionID)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_vmArg, _err := convertVMRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"vm\"), vm)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_hostArg, _err := convertHostRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"host\"), host)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_, _err = _class.client.APICall(_method, _sessionIDArg, _vmArg, _hostArg)\n\treturn\n}", "title": "" }, { "docid": "225007d240f88384bec4596420e16772", "score": "0.44083238", "text": "func (hdler *Handler) SetUID(uid string) {\n\tif tupuerrorlib.StringIsEmpty(uid) {\n\t\treturn\n\t}\n\thdler.UID = uid\n}", "title": "" }, { "docid": "e355fc9aa4310d8e36f2235048bf01ab", "score": "0.44060323", "text": "func (rb *ResourceBuilder) SetK8sNodeUID(val string) {\n\tif rb.config.K8sNodeUID.Enabled {\n\t\trb.res.Attributes().PutStr(\"k8s.node.uid\", val)\n\t}\n}", "title": "" }, { "docid": "c3c49193f031c4af51c8e3529e737225", "score": "0.43850905", "text": "func (o *LunInfoType) SetApplicationUuid(newValue string) *LunInfoType {\n\to.ApplicationUuidPtr = &newValue\n\treturn o\n}", "title": "" }, { "docid": "fd8241bef3739a1cbdf6641b85023773", "score": "0.43836963", "text": "func (this *ConfigXmlFactory) SetUuidGenerator(fct func(entity interface{}) string) {\n\tthis.m_generateUuid = fct\n}", "title": "" }, { "docid": "aed32d334e0b55ae1e13ac8f64805e17", "score": "0.43692076", "text": "func (c *S3Client) UpdateNodeUuid(ctx context.Context, node *tree.Node) (*tree.Node, error) {\n\n\tif node.IsLeaf() {\n\t\treturn nil, errors.New(\"UpdateNodeUuid is only supported by folders\")\n\t}\n\thiddenPath := fmt.Sprintf(\"%v/%s\", node.Path, servicescommon.PYDIO_SYNC_HIDDEN_FILE_META)\n\tvar uid string\n\tif node.Uuid != \"\" {\n\t\tuid = node.Uuid\n\t} else {\n\t\tuid = fmt.Sprintf(\"%s\", uuid.NewV4())\n\t\tnode.Uuid = uid\n\t}\n\t_, err := c.Mc.PutObject(c.Bucket, hiddenPath, strings.NewReader(uid), int64(len(uid)), minio.PutObjectOptions{ContentType: \"text/plain\"})\n\treturn node, err\n\n}", "title": "" }, { "docid": "8ae048493a0462e8f0b032568bb72e95", "score": "0.4366481", "text": "func ReplaceUuid(id uuid.UUID, idMapReplaced map[uuid.UUID]uuid.UUID) (uuid.UUID, error) {\n\tnewId, err := uuid.NewV4()\n\tif err != nil {\n\t\treturn uuid.Nil, err\n\t}\n\tidMapReplaced[id] = newId\n\treturn newId, nil\n}", "title": "" }, { "docid": "c1044b7f6f103392d9e32c92f1b30356", "score": "0.43463767", "text": "func (rb *ResourceBuilder) SetK8sJobUID(val string) {\n\tif rb.config.K8sJobUID.Enabled {\n\t\trb.res.Attributes().PutStr(\"k8s.job.uid\", val)\n\t}\n}", "title": "" }, { "docid": "824868f80e8cc66db0cb25e1455a2026", "score": "0.43445078", "text": "func (rb *ResourceBuilder) SetK8sReplicasetUID(val string) {\n\tif rb.config.K8sReplicasetUID.Enabled {\n\t\trb.res.Attributes().PutStr(\"k8s.replicaset.uid\", val)\n\t}\n}", "title": "" }, { "docid": "240f86856c4bb8defe260cb641579419", "score": "0.4340071", "text": "func (nu *NodeUpdate) SetUUID(s string) *NodeUpdate {\n\tnu.mutation.SetUUID(s)\n\treturn nu\n}", "title": "" }, { "docid": "da990ec3a312f9bf94d7423ac7dc5dc4", "score": "0.43250936", "text": "func (m *UnsavedPostVideoMutation) SetUUID(s string) {\n\tm.uuid = &s\n}", "title": "" }, { "docid": "763045689b2080ee669112a1a68dffe3", "score": "0.43236598", "text": "func (o *HyperflexClusterBackupPolicyInventory) SetTargetUuid(v string) {\n\to.TargetUuid = &v\n}", "title": "" }, { "docid": "475128a6936d62a407169f9d4da07c69", "score": "0.43112177", "text": "func (rb *ResourceBuilder) SetK8sCronjobUID(val string) {\n\tif rb.config.K8sCronjobUID.Enabled {\n\t\trb.res.Attributes().PutStr(\"k8s.cronjob.uid\", val)\n\t}\n}", "title": "" }, { "docid": "25eb2568761da402ff1fc66539b68f34", "score": "0.43111354", "text": "func (r *ModifyACLReq) SetUUID(id uuid.UUID) {\n\tr.Id = id.String()\n}", "title": "" }, { "docid": "56f30807a2aceec2b3832f2dceed431a", "score": "0.43056625", "text": "func (o *AssetDetail) GetUuid() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.Uuid\n}", "title": "" }, { "docid": "cc00c07029ba7c03a4584ebb15281d94", "score": "0.42905256", "text": "func (r *PoolReintegrateReq) SetUUID(id uuid.UUID) {\n\tr.Id = id.String()\n}", "title": "" }, { "docid": "c2da2d3ea80ff6ff242cb9bdd0eb1e6a", "score": "0.42855042", "text": "func (m *CompanyInformation) SetTaxRegistrationNumber(value *string)() {\n err := m.GetBackingStore().Set(\"taxRegistrationNumber\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "db4e5647d8b346f07579c7b9c4971149", "score": "0.428468", "text": "func (nuo *NodeUpdateOne) SetUUID(s string) *NodeUpdateOne {\n\tnuo.mutation.SetUUID(s)\n\treturn nuo\n}", "title": "" }, { "docid": "6aaf0a5a78a9a420b3c22cad20fb593d", "score": "0.4283088", "text": "func (m *ComanagementEligibleDevice) SetReferenceId(value *string)() {\n err := m.GetBackingStore().Set(\"referenceId\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "32fe2cb4ceab261d4c1dbda7788a2988", "score": "0.42818236", "text": "func (o *SystemProfile) SetBiosReleaseDate(v string) {\n\to.BiosReleaseDate = &v\n}", "title": "" }, { "docid": "e2e51f714267538ef0e395812dae3c24", "score": "0.42802218", "text": "func (e *Empty) SetUID(uid types.UID) {}", "title": "" }, { "docid": "e2e51f714267538ef0e395812dae3c24", "score": "0.42802218", "text": "func (e *Empty) SetUID(uid types.UID) {}", "title": "" }, { "docid": "eb69bef0ff28ecda6883fbfb7e5a4444", "score": "0.42758143", "text": "func (r *PoolSetPropReq) SetUUID(id uuid.UUID) {\n\tr.Id = id.String()\n}", "title": "" }, { "docid": "486a58a6c08b427d2ba10f3af97c8e3e", "score": "0.42757747", "text": "func (p *Pod) SetUID(uid types.UID) {}", "title": "" }, { "docid": "66921760da3048c6a695fb1ae840d6ea", "score": "0.42707276", "text": "func (m *WindowsAutopilotDeviceIdentity) SetSerialNumber(value *string)() {\n m.serialNumber = value\n}", "title": "" }, { "docid": "95c4e05870d21a9119729ffc185db704", "score": "0.42570773", "text": "func (m *PostVideoMutation) SetUUID(s string) {\n\tm.uuid = &s\n}", "title": "" }, { "docid": "234ded16500b27df441debb35bbf84bc", "score": "0.42451474", "text": "func (m *SubscribedSku) SetSkuId(value *i561e97a8befe7661a44c8f54600992b4207a3a0cf6770e5559949bc276de2e22.UUID)() {\n err := m.GetBackingStore().Set(\"skuId\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "f17785aad38ef0bbfe86c67262936cb8", "score": "0.42407787", "text": "func (m *UnsavedPostAttachmentMutation) SetUUID(s string) {\n\tm.uuid = &s\n}", "title": "" }, { "docid": "7253ceda7169af05951ed6b9b8d69a7b", "score": "0.42344865", "text": "func (o *StorageNetAppVolume) GetUuid() string {\n\tif o == nil || o.Uuid == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Uuid\n}", "title": "" }, { "docid": "52122d0c8f68f98f9da1db086f7cb355", "score": "0.42311218", "text": "func (r *GetACLReq) SetUUID(id uuid.UUID) {\n\tr.Id = id.String()\n}", "title": "" }, { "docid": "a91692e3c9ba9914062d527ce6cb63e0", "score": "0.42303854", "text": "func c_setresuid(ruid Uid_t, euid Uid_t, suid Uid_t) _C_int", "title": "" }, { "docid": "fd364a1c9ae38d501cc8eaa380a1bfc8", "score": "0.4228825", "text": "func (s *RestServer) SetNodeUUID(name string) {\n\ts.Lock()\n\tdefer s.Unlock()\n\ts.nodeUUID = name\n}", "title": "" }, { "docid": "650281403022e66081da42dd04e05128", "score": "0.42171842", "text": "func (s BankSet) SetWriteUID(value int64) {\n\ts.RecordCollection.Set(models.NewFieldName(\"WriteUID\", \"write_uid\"), value)\n}", "title": "" }, { "docid": "b3860a45140b0e39849580d143d382ad", "score": "0.42170846", "text": "func SetUUIDAttributes(moduleBlock *Block, block *hcl.Block) {\n\tif body, ok := block.Body.(*hclsyntax.Body); ok {\n\t\tif (block.Type == \"resource\" || block.Type == \"data\") && body.Attributes != nil {\n\t\t\t_, withCount := body.Attributes[\"count\"]\n\t\t\tif _, ok := body.Attributes[\"id\"]; !ok {\n\t\t\t\tbody.Attributes[\"id\"] = newUniqueAttribute(\"id\", withCount)\n\t\t\t}\n\n\t\t\tif _, ok := body.Attributes[\"arn\"]; !ok {\n\t\t\t\tbody.Attributes[\"arn\"] = newArnAttribute(\"arn\", withCount)\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "e496ac124cd445660acb78d82825e0df", "score": "0.42111233", "text": "func (rb *ResourceBuilder) SetK8sReplicationcontrollerUID(val string) {\n\tif rb.config.K8sReplicationcontrollerUID.Enabled {\n\t\trb.res.Attributes().PutStr(\"k8s.replicationcontroller.uid\", val)\n\t}\n}", "title": "" }, { "docid": "0040a1c8bd632493d96ef248d6600c9e", "score": "0.42077485", "text": "func (client *XenClient) BlobGetUuid(self string) (result string, err error) {\n\tobj, err := client.APICall(\"blob.get_uuid\", self)\n\tif err != nil {\n\t\treturn\n\t}\n\tresult = obj.(string)\n\treturn\n}", "title": "" }, { "docid": "80896cb25f11d9095abf8a18e1074fb1", "score": "0.42011675", "text": "func (m *UnsavedPostMutation) SetUUID(s string) {\n\tm.uuid = &s\n}", "title": "" }, { "docid": "05f13c6682cf786529441f974d198672", "score": "0.4200971", "text": "func (o *HyperflexIscsiNetwork) GetUuid() string {\n\tif o == nil || o.Uuid == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Uuid\n}", "title": "" }, { "docid": "bd98e82be08971d834d47b23b9435821", "score": "0.4196622", "text": "func (r *PoolExtendReq) SetUUID(id uuid.UUID) {\n\tr.Id = id.String()\n}", "title": "" }, { "docid": "ded3c050268cf9d4025f082faf809042", "score": "0.4190719", "text": "func (m *CompanySubscription) SetOwnerId(value *string)() {\n err := m.GetBackingStore().Set(\"ownerId\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "e158cf85d4790bfb2fdc954690820f0b", "score": "0.41780052", "text": "func ValidateUuid(stringUUID string) error {\n\t_, err := uuid.FromString(stringUUID)\n\tif err != nil {\n\t\treturn ErrInvalidUUID\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "12537e44d7cb0032cdebb09295a16cbf", "score": "0.41750714", "text": "func (o *Subscription) SetConsumerUuid(v string) {\n\to.ConsumerUuid = &v\n}", "title": "" }, { "docid": "8e9514d7c7798bc4ee0b3e69ad37e34e", "score": "0.4164042", "text": "func (m *UnsavedPostImageMutation) SetUUID(s string) {\n\tm.uuid = &s\n}", "title": "" }, { "docid": "ebe5043dc32737929df709e57170e487", "score": "0.4162702", "text": "func (auo *AlertUpdateOne) SetUUID(s string) *AlertUpdateOne {\n\tauo.mutation.SetUUID(s)\n\treturn auo\n}", "title": "" }, { "docid": "6357f6ea344809050c71290c37aae207", "score": "0.41593122", "text": "func (m *PostMutation) SetUUID(s string) {\n\tm.uuid = &s\n}", "title": "" }, { "docid": "97865c794a8e375e3cfa07abea47a364", "score": "0.41542503", "text": "func (o VmwareVmDetailsResponseOutput) Uuid() pulumi.StringOutput {\n\treturn o.ApplyT(func(v VmwareVmDetailsResponse) string { return v.Uuid }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "3f4c023f1212c69b8ecaf4d463947d54", "score": "0.41529077", "text": "func (m *WindowsAutopilotDeviceIdentity) SetSerialNumber(value *string)() {\n err := m.GetBackingStore().Set(\"serialNumber\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "eb7b8dc94fb78fc06f7b6727cf5d3b11", "score": "0.41445622", "text": "func (m *WindowsAutopilotDeviceIdentity) SetAddressableUserName(value *string)() {\n err := m.GetBackingStore().Set(\"addressableUserName\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "a2c0d5a516ee92d5f961ebac81919e27", "score": "0.41434306", "text": "func (o *HyperflexVdiskConfig) GetUuid() string {\n\tif o == nil || o.Uuid == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Uuid\n}", "title": "" }, { "docid": "e12681595adffd50b314ddd21df496d0", "score": "0.4141531", "text": "func (m *CompanySubscription) SetSkuId(value *string)() {\n err := m.GetBackingStore().Set(\"skuId\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "950a5d33665890b1209e113e3c6e9cee", "score": "0.4139457", "text": "func (au *AlertUpdate) SetUUID(s string) *AlertUpdate {\n\tau.mutation.SetUUID(s)\n\treturn au\n}", "title": "" }, { "docid": "62ba700ad4e3b20f2d24e37c62ad06d7", "score": "0.41379502", "text": "func (node *Node) ZapUuid() zapcore.Field {\n\treturn zap.String(common.KEY_NODE_UUID, node.GetUuid())\n}", "title": "" }, { "docid": "2cb53bf3023881a734efac4f254216e7", "score": "0.41342238", "text": "func (o *NodeDetailsInfoType) SetNodeUuid(newValue string) *NodeDetailsInfoType {\n\to.NodeUuidPtr = &newValue\n\treturn o\n}", "title": "" }, { "docid": "9be35548bdde9ed9285767fe683e94cf", "score": "0.412612", "text": "func (cuo *CustomerUpdateOne) SetUUID(u uuid.UUID) *CustomerUpdateOne {\n\tcuo.mutation.SetUUID(u)\n\treturn cuo\n}", "title": "" }, { "docid": "23ddf0af223af371764e294acfe6f5df", "score": "0.41171423", "text": "func (r *PoolGetPropReq) SetUUID(id uuid.UUID) {\n\tr.Id = id.String()\n}", "title": "" }, { "docid": "63a891f7efbcfb4252c9794aed627c5c", "score": "0.41171145", "text": "func (o *BeaconUserIDNumber) SetValue(v string) {\n\to.Value = v\n}", "title": "" }, { "docid": "6fa01c335c9d11eed3b2ea27751172f8", "score": "0.41099033", "text": "func (m *SignIn) SetUniqueTokenIdentifier(value *string)() {\n err := m.GetBackingStore().Set(\"uniqueTokenIdentifier\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "60d22622f9e3d6b455e33ec83b4fd25d", "score": "0.41031814", "text": "func (r *PoolEvictReq) SetUUID(id uuid.UUID) {\n\tr.Id = id.String()\n}", "title": "" }, { "docid": "5acc2e99889e5538d9078ca7061b89f2", "score": "0.40966478", "text": "func (w *JsonSerializationWriter) WriteUUIDValue(key string, value *uuid.UUID) error {\n\tif key != \"\" && value != nil {\n\t\tw.writePropertyName(key)\n\t}\n\tif value != nil {\n\t\tw.writeStringValue((*value).String())\n\t}\n\tif key != \"\" && value != nil {\n\t\tw.writePropertySeparator()\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "dd992a790c0e83d51148144ac6b6baa0", "score": "0.40957978", "text": "func (i *KSUID) Set(s string) error {\n\treturn i.UnmarshalText([]byte(s))\n}", "title": "" } ]
1ea7ddb47ea7914fb967dfd9988c0224
Validate inspects the fields of the type to determine if they are valid.
[ { "docid": "500b323bbd3ee03f0388f1005900cc92", "score": "0.0", "text": "func (s *DescribeDBClusterBacktracksInput) Validate() error {\n\tinvalidParams := aws.ErrInvalidParams{Context: \"DescribeDBClusterBacktracksInput\"}\n\n\tif s.DBClusterIdentifier == nil {\n\t\tinvalidParams.Add(aws.NewErrParamRequired(\"DBClusterIdentifier\"))\n\t}\n\tif s.Filters != nil {\n\t\tfor i, v := range s.Filters {\n\t\t\tif err := v.Validate(); err != nil {\n\t\t\t\tinvalidParams.AddNested(fmt.Sprintf(\"%s[%v]\", \"Filters\", i), err.(aws.ErrInvalidParams))\n\t\t\t}\n\t\t}\n\t}\n\n\tif invalidParams.Len() > 0 {\n\t\treturn invalidParams\n\t}\n\treturn nil\n}", "title": "" } ]
[ { "docid": "688d7853ed3208baf26b81a87e38b975", "score": "0.67102504", "text": "func (m *FieldsToEvaluate) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "title": "" }, { "docid": "26912e70bc3feaebb03a8bba7eb3ae48", "score": "0.6506426", "text": "func Validate(o interface{}) (bool, []error) {\n\tvar err []error\n\tv := reflect.ValueOf(o)\n\n\tif v.Kind() == reflect.Ptr {\n\t\tv = v.Elem()\n\t}\n\n\tif v.Kind() != reflect.Struct {\n\t\tfmt.Println(v.Kind().String())\n\t\terr = append(err, fmt.Errorf(\"Type %#q is not a struct\", v.Type().Name()))\n\t\treturn false, err\n\t}\n\n\tfor i := 0; i < v.NumField(); i++ {\n\t\tf := v.Type().Field(i)\n\t\tfv := v.FieldByName(f.Name)\n\n\t\tswitch fv.Kind() {\n\t\tcase reflect.Array:\n\t\tcase reflect.Interface:\n\t\tcase reflect.Slice:\n\t\tcase reflect.Struct:\n\t\t\tif reflect.DeepEqual(v.Interface(), fv.Interface()) {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t}\n\n\t\tif len(f.Tag) > 0 {\n\t\t\terr = append(err, validateField(f, v.FieldByName(f.Name))...)\n\t\t}\n\t}\n\n\treturn len(err) == 0, err\n}", "title": "" }, { "docid": "bc730beb9b72cffd28a1e47f71015a37", "score": "0.6417883", "text": "func Validate(obj interface{}) error {\n\n\ttyp := reflect.TypeOf(obj)\n\tvalue := reflect.ValueOf(obj)\n\n\t// Check to ensure we are getting a valid\n\t// pointer for manipulation.\n\tif typ.Kind() == reflect.Ptr {\n\t\ttyp = typ.Elem()\n\t\tvalue = value.Elem()\n\t}\n\n\t// Kill process if obj did not pass in a scruct.\n\t// This happens when a pointer passed in.\n\tif value.Kind() != reflect.Struct {\n\t\treturn nil\n\t}\n\n\tfor i := 0; i < typ.NumField(); i++ {\n\n\t\tfield := typ.Field(i)\n\t\tfieldValue := value.Field(i).Interface()\n\t\tzero := reflect.Zero(field.Type).Interface()\n\n\t\t// Validate nested and embedded structs (if pointer, only do so if not nil)\n\t\tif field.Type.Kind() == reflect.Struct ||\n\t\t\t(field.Type.Kind() == reflect.Ptr && !reflect.DeepEqual(zero, fieldValue)) {\n\t\t\tif err := Validate(fieldValue); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t\tif field.Tag.Get(\"validate\") != \"\" || field.Tag.Get(\"binding\") != \"\" {\n\t\t\t// Break validate field into array\n\t\t\tarray := strings.Split(field.Tag.Get(\"validate\"), \"|\")\n\n\t\t\t// Legacy Support for binding.\n\t\t\tif array[0] == \"\" {\n\t\t\t\tarray = strings.Split(field.Tag.Get(\"binding\"), \"|\")\n\t\t\t}\n\n\t\t\t// Do the hard work of checking all assertions\n\t\t\tfor setting := range array {\n\n\t\t\t\tmatch := array[setting]\n\n\t\t\t\t//Check that value was passed in and is not required.\n\t\t\t\tif match != \"required\" && null(fieldValue) == true {\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\n\t\t\t\tswitch {\n\t\t\t\tcase \"required\" == match:\n\t\t\t\t\tif err := required(field, fieldValue, zero); err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\tcase \"email\" == match:\n\t\t\t\t\tif err := regex(`regex:^[a-zA-Z0-9_.+-]+@[a-zA-Z0-9-]+\\.[a-zA-Z0-9-.]+$`, fieldValue); err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\tcase \"url\" == match:\n\t\t\t\t\tif err := regex(`regex:/^(https?:\\/\\/)?([\\da-z\\.-]+)\\.([a-z\\.]{2,6})([\\/\\w \\.-]*)*\\/?$/`, fieldValue); err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\tcase \"alpha\" == match:\n\t\t\t\t\tif err := regex(`regex:\\p{L}`, fieldValue); err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\tcase \"alphadash\" == match:\n\t\t\t\t\tif err := regex(`regex:^[a-zA-Z0-9_]*$`, fieldValue); err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\tcase \"alphanumeric\" == match:\n\t\t\t\t\tif err := regex(`regex:/[0-9a-zA-Z]/`, fieldValue); err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\tcase strings.HasPrefix(match, \"min:\"):\n\t\t\t\t\tif err := min(match, fieldValue); err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\tcase strings.HasPrefix(match, \"max:\"):\n\t\t\t\t\tif err := max(match, fieldValue); err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\tcase strings.HasPrefix(match, \"in:\"):\n\t\t\t\t\tif err := in(match, fieldValue); err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\tcase strings.HasPrefix(match, \"regex:\"):\n\t\t\t\t\tif err := regex(match, fieldValue); err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\tcase strings.HasPrefix(match, \"length:\"):\n\t\t\t\t\tif err := length(match, fieldValue); err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\tcase strings.HasPrefix(match, \"length_between:\"):\n\t\t\t\t\tif err := length_between(match, fieldValue); err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tpanic(\"The field \" + match + \" is not a valid validation check.\")\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "db7366c28b71403d4f487d5c870ee7fc", "score": "0.6392051", "text": "func (model HCN) ValidateFields(structFields ...[]string) (bool, error) {\n\tif len(structFields) == 0 {\n\t\treturn helper.ValidateFields(model)\n\t}\n\treturn helper.ValidateFields(model, structFields[0])\n}", "title": "" }, { "docid": "f1b9112662188e05dd6a26d5fb3ce152", "score": "0.6388321", "text": "func ValidateFields(payload map[string]interface{}) error {\n\tvar err error\n\tfor key, value := range payload {\n\t\tswitch v := value.(type) {\n\t\tcase float64:\n\t\t\tif v == 0 {\n\t\t\t\terr = fmt.Errorf(\"%q cannot be empty\", key)\n\t\t\t}\n\t\tcase string:\n\t\t\tif v == \"\" {\n\t\t\t\terr = fmt.Errorf(\"%q cannot be empty\", key)\n\t\t\t}\n\t\tcase map[string]interface{}:\n\t\t\tif len(v) == 0 {\n\t\t\t\terr = fmt.Errorf(\"%q cannot be empty\", key)\n\t\t\t}\n\t\tcase []interface{}:\n\t\t\tif len(v) == 0 {\n\t\t\t\terr = fmt.Errorf(\"%q cannot be empty\", key)\n\t\t\t}\n\t\tcase []string:\n\t\t\tif len(v) == 0 {\n\t\t\t\terr = fmt.Errorf(\"%q cannot be empty\", key)\n\t\t\t}\n\t\tdefault:\n\t\t\terr = fmt.Errorf(\"invalid field types in request payload\")\n\t\t}\n\t}\n\treturn err\n}", "title": "" }, { "docid": "baf1055a462a120268b63e49cbe6e974", "score": "0.63638514", "text": "func ValidateFields(\n\tobject interface{},\n\tschema map[string]map[string]string,\n\tcustomFunctionsArg ...map[string]func(reflect.Value, string) (bool, string, error)) (\n\tbool,\n\tmap[string][]string,\n\terror) {\n\tvalueOf := reflect.ValueOf(object)\n\ttypeOf := reflect.TypeOf(object)\n\toutput := map[string][]string{}\n\n\t// If custom functions are given, add it to functions map\n\tif customFunctionsArg != nil {\n\t\tfor name, function := range customFunctionsArg[0] {\n\t\t\tfunctions[name] = function\n\t\t}\n\t}\n\n\tfor i := 0; i < typeOf.NumField(); i++ {\n\t\tcurField := typeOf.Field(i)\n\t\tif !valueOf.Field(i).IsZero() {\n\t\t\tif args, ok := schema[curField.Name]; ok {\n\t\t\t\tvalid, msgs, err := validateField(valueOf.Field(i), args)\n\t\t\t\tif err != nil {\n\t\t\t\t\terr = errors.Wrap(err, \"Error while validating field\")\n\t\t\t\t\treturn false, map[string][]string{}, err\n\t\t\t\t} else if !valid {\n\t\t\t\t\toutput[curField.Name] = msgs\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\treturn len(output) <= 0, output, nil\n}", "title": "" }, { "docid": "bc7d894e9484bb70bb81e18f8d0381da", "score": "0.63544", "text": "func ValidateType(record interface{}, list StructList) []Result {\n\ttyp := reflect.TypeOf(record)\n\t// if a pointer to a struct is passed, get the type of the dereferenced object\n\tif typ.Kind() == reflect.Ptr {\n\t\ttyp = typ.Elem()\n\t}\n\n\tfieldChecks := []func(f goflect.Info) []error{\n\t\tnominal,\n\t\tuniqueType,\n\t\tautoinc,\n\t\tcheckDefault,\n\t}\n\n\trecordChecks := []func(f []goflect.Info) []error{\n\t\tnominalOnce,\n\t\tnominalRequiresPrimary,\n\t\tprimaryOnce,\n\t\tvalidatorStringParseable,\n\t}\n\n\toutput := make([]Result, 0)\n\tfields := goflect.GetInfo(record)\n\n\tfor _, recordCheck := range recordChecks {\n\t\terrors := recordCheck(fields)\n\t\tfor _, err := range errors {\n\t\t\tcast, _ := err.(ValidationError)\n\t\t\tcast.Message += \" on type \" + strconv.Quote(typ.Name())\n\t\t\toutput = append(output, Result{Error: cast, Position: list.Position})\n\t\t}\n\t}\n\tfor _, field := range fields {\n\t\tpos := list.Position\n\t\tif fieldStruct, present := list.Structs[field.Name]; present {\n\t\t\tpos = fieldStruct.Position\n\t\t}\n\t\tvalType, _ := typ.FieldByName(field.Name)\n\t\terrors := structTag(string(valType.Tag))\n\t\tfor _, err := range errors {\n\t\t\tcast, _ := err.(ValidationError)\n\t\t\tcast.Message += \" with field \" + strconv.Quote(field.Name)\n\t\t\toutput = append(output, Result{Error: cast, Position: pos})\n\t\t}\n\t\tfor _, fieldCheck := range fieldChecks {\n\t\t\terrors := fieldCheck(field)\n\t\t\tfor _, err := range errors {\n\t\t\t\tcast, _ := err.(ValidationError)\n\t\t\t\tcast.Message += \" with field \" + strconv.Quote(field.Name)\n\t\t\t\toutput = append(output, Result{Error: cast, Position: pos})\n\t\t\t}\n\t\t}\n\t}\n\treturn output\n}", "title": "" }, { "docid": "0478bb73cf2b599026cc807533925569", "score": "0.6320722", "text": "func (model HCNVinculation) ValidateFields(structFields ...[]string) (bool, error) {\n\tif len(structFields) == 0 {\n\t\treturn helper.ValidateFields(model)\n\t}\n\treturn helper.ValidateFields(model, structFields[0])\n}", "title": "" }, { "docid": "21bcf61b853dd1bbf18b28bcf3637e6e", "score": "0.6223737", "text": "func validateAllFieldsAreDefined(item interface{}) error {\n\treturn validateReflect(reflect.ValueOf(item), []string{})\n}", "title": "" }, { "docid": "b153b2791c691ca4f481a9d7ed9afd33", "score": "0.62234753", "text": "func Validate(v Validator) (errs Errors) {\n\treturn v.Validate(&Field{})\n}", "title": "" }, { "docid": "c0d81cb55222a7eaf4c9e0cb31fc5d7c", "score": "0.6105436", "text": "func Check(val interface{}) error {\n\tif err := validate.Struct(val); err != nil {\n\n\t\t// Use a type assertion to get the real error value.\n\t\tverrors, ok := err.(validator.ValidationErrors)\n\t\tif !ok {\n\t\t\treturn err\n\t\t}\n\n\t\t// lang controls the language of the error messages. You could look at the\n\t\t// Accept-Language header if you intend to support multiple languages.\n\t\tlang, _ := translator.GetTranslator(\"en\")\n\n\t\tvar fields FieldErrors\n\t\tfor _, verror := range verrors {\n\t\t\tfield := FieldError{\n\t\t\t\tField: verror.Field(),\n\t\t\t\tError: verror.Translate(lang),\n\t\t\t}\n\t\t\tfields = append(fields, field)\n\t\t}\n\n\t\treturn fields\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "1aec484438b0e5228d52d2463703ae5b", "score": "0.6105219", "text": "func (m *FieldInfo) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "title": "" }, { "docid": "242fdb2f6dfd362ddb413eea2ef1bc35", "score": "0.61021787", "text": "func validateFields(req *logical.Request, data *framework.FieldData) error {\n\tvar unknownFields []string\n\n\tfor k := range req.Data {\n\t\tif _, ok := data.Schema[k]; !ok {\n\t\t\tunknownFields = append(unknownFields, k)\n\t\t}\n\t}\n\n\tswitch len(unknownFields) {\n\tcase 0:\n\t\treturn nil\n\tcase 1:\n\t\treturn fmt.Errorf(\"%w: %s\", errUnknownField, unknownFields[0])\n\tdefault:\n\t\tsort.Strings(unknownFields)\n\n\t\treturn fmt.Errorf(\"%w: %s\", errUnknownFields, strings.Join(unknownFields, \", \"))\n\t}\n}", "title": "" }, { "docid": "45832e3a4a27d95c38c1f26b7b787a2c", "score": "0.60880864", "text": "func (v V) Validate(s interface{}) []error {\n\tvar val reflect.Value\n\n\t// If the interface is a reflect.Value, do nothing\n\tif reflect.TypeOf(s).String() == \"reflect.Value\" {\n\t\tval = s.(reflect.Value)\n\t} else {\n\t\tval = reflect.ValueOf(s)\n\t}\n\n\tif val.Kind() == reflect.Ptr {\n\t\tval = val.Elem()\n\t}\n\n\tt := val.Type()\n\tif t == nil || t.Kind() != reflect.Struct {\n\t\treturn nil\n\t}\n\n\tvar errs []error\n\n\tfor i := 0; i < t.NumField(); i++ {\n\t\tf := t.Field(i)\n\t\tfv := val.Field(i)\n\t\tif !fv.CanInterface() {\n\t\t\tcontinue\n\t\t}\n\t\tval := fv.Interface()\n\t\ttag := f.Tag.Get(\"validate\")\n\t\tif tag == \"\" {\n\t\t\tcontinue\n\t\t}\n\t\tvts := strings.Split(tag, \",\")\n\n\t\tfor _, vt := range vts {\n\t\t\tif vt == \"struct\" {\n\t\t\t\terrs2 := v.Validate(val)\n\t\t\t\tif len(errs2) > 0 {\n\t\t\t\t\terrs = append(errs, errs2...)\n\t\t\t\t}\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tvf := v[vt]\n\t\t\tif vf == nil {\n\t\t\t\terrs = append(errs, BadField{\n\t\t\t\t\tField: f.Name,\n\t\t\t\t\tDesc: fmt.Sprintf(\"undefined validator: %q\", vt),\n\t\t\t\t})\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif err := vf(val); err != nil {\n\t\t\t\tp := fmt.Sprintf(\"%s\", err)\n\t\t\t\terrs = append(errs, BadField{\n\t\t\t\t\tField: fieldName(&f),\n\t\t\t\t\tDesc: p,\n\t\t\t\t})\n\t\t\t}\n\t\t}\n\t}\n\n\treturn errs\n}", "title": "" }, { "docid": "2e308c3ffbc682228764bef3790f674a", "score": "0.60626304", "text": "func (m *PassObject) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateVehicleTypes(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "3213defae123e2339c5009d5499857c1", "score": "0.60441285", "text": "func (m *ProfileTypeDTO) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "title": "" }, { "docid": "f403cd6cbf71828a5641b1ad9222295f", "score": "0.6038453", "text": "func (s Schema) Validate(doc Document) error {\n\tif len(s.fields) == 0 {\n\t\treturn nil\n\t}\n\n\tvar ve = make(ValidationError)\n\n\t// validate the fields in doc\n\tfor _, name := range s.RevComplement(doc) {\n\t\tve[name] = append(ve[name], fmt.Errorf(\"Unknown field: %s\", name))\n\t}\n\n\tfor _, name := range s.Intersection(doc) {\n\t\tfield := doc.Fields[name]\n\t\tschemaField := s.fields[name]\n\n\t\terr := field.Validate(name, schemaField)\n\t\tif err != nil {\n\t\t\tve[name] = err\n\t\t} else {\n\t\t\tdoc.Fields[name] = field\n\t\t}\n\t}\n\n\t// Check for missing fields\n\tfor _, name := range s.Complement(doc) {\n\t\tschemaField := s.fields[name]\n\t\tif schemaField.Required {\n\t\t\tve[name] = append(ve[name], fmt.Errorf(\"Required field %s missing\", name))\n\t\t}\n\t}\n\n\tif len(ve) == 0 {\n\t\treturn nil\n\t}\n\n\treturn ve\n}", "title": "" }, { "docid": "eddae5cb37b916df902f8b28d5a09ff5", "score": "0.6003946", "text": "func (f *SQLField) Validate() bool {\n\treturn f.Name != \"\" && f.SQLType != \"\"\n}", "title": "" }, { "docid": "492d54b0175b5fd60290f260ee8a2aa1", "score": "0.5988475", "text": "func (m *DurationFieldType) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "title": "" }, { "docid": "6f6f07331315bcaae6448d676404e31d", "score": "0.59691864", "text": "func ValidateAllFields(item interface{}) (bool, error) {\n\tv := reflect.ValueOf(item)\n\tfor i := 0; i < v.NumField(); i++ {\n\t\tvalidator := getValidatorFromValue(v.Field(i))\n\t\tif validator != nil {\n\t\t\tres, err := validator.validate(v.Type().Field(i), v.Field(i))\n\t\t\tif err != nil || res == false {\n\t\t\t\treturn res, err\n\t\t\t}\n\t\t}\n\t}\n\n\treturn true, nil\n}", "title": "" }, { "docid": "8228a347697de8ed3b3317e792eb4d70", "score": "0.5942311", "text": "func (v *ComplexValidator) Validate(s interface{}) error {\n\tif v.TagName == \"\" {\n\t\tv.TagName = \"validate\"\n\t}\n\n\tfor _, field := range structs.Fields(s) {\n\t\tif err := v.processField(\"\", field); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "430fb1eb4d217d2645a9cf2556a9a7a5", "score": "0.5919413", "text": "func (PoseidonStrategy) Validate(ctx context.Context, obj runtime.Object) field.ErrorList {\n\to := obj.(*Poseidon)\n\tklog.Infof(\"Validating fields for Poseidon %s\\n\", o.Name)\n\terrors := field.ErrorList{}\n\t// perform validation here and add to errors using field.Invalid\n\treturn errors\n}", "title": "" }, { "docid": "b24342f4a592287a3706a4fb50643752", "score": "0.59040385", "text": "func CheckStructFields(conf data.Config) {\n\tfor index, plugin := range conf.Plugins {\n\t\t_ = index\n\t\tfor index, check := range plugin.Checks {\n\t\t\t_ = index\n\t\t\tif check.Description == nil {\n\t\t\t\tlog.Fatal(\"Missing description field in \" + check.PluginName + \" plugin checks. Stopping execution.\")\n\t\t\t}\n\t\t\tif check.Remediation == nil {\n\t\t\t\tlog.Fatal(\"Missing remediation field in \" + check.PluginName + \" plugin checks. Stopping execution.\")\n\t\t\t}\n\t\t\tif check.Severity == nil {\n\t\t\t\tlog.Fatal(\"Missing severity field in \" + check.PluginName + \" plugin checks. Stopping execution.\")\n\t\t\t} else {\n\t\t\t\tif err := data.SeverityType.IsValid(*check.Severity); err != nil {\n\t\t\t\t\tlog.Fatal(\" ------ Unknown severity type : \" + string(*check.Severity) + \" . Only Informational / Low / Medium / High are valid severity types.\")\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "6f4de7bf7d5258c0ae5644af3fc3e6e6", "score": "0.5895208", "text": "func (t Type) Validate() error {\n\tv := string(t)\n\n\treturn validation.Validate(&v, validation.Required)\n}", "title": "" }, { "docid": "00b7b7027c6b64c661d2792bfb640c86", "score": "0.58236533", "text": "func (member *Member) Validate() (map[string]interface{}, bool) {\n\tif member.first_name == \"\" {\n\t\treturn u.Message(false, \"Member first name should be on the payload\"), false\n\t}\n\n\tif member.last_name == \"\" {\n\t\treturn u.Message(false, \"Member last name should be on the payload\"), false\n\t}\n\n\tif member.phone_number == \"\" {\n\t\treturn u.Message(false, \"Member phone number should be on the payload\"), false\n\t}\n\n\tif member.client_member_id == 0 {\n\t\treturn u.Message(false, \"Client member id should be on the payload\"), false\n\t}\n\n\tif member.account_id == 0 {\n\t\treturn u.Message(false, \"Account id should be on the payload\"), false\n\t}\n\n\t//All the required parameters are present\n\treturn u.Message(true, \"success\"), true\n}", "title": "" }, { "docid": "39561fef5fa762f1f20c40d885df4149", "score": "0.58186406", "text": "func (m *IngredientVersionAndUsageType) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// validation for a type composition with IngredientAndVersion\n\tif err := m.IngredientAndVersion.Validate(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\t// validation for a type composition with IngredientVersionAndUsageTypeAllOf1\n\tif err := m.IngredientVersionAndUsageTypeAllOf1.Validate(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "081543052c6fce0e3df9901f7792b4a6", "score": "0.58049405", "text": "func (c *Criterion) Validate() error {\n\tif c == nil {\n\t\treturn nil\n\t}\n\tnoNil := 0\n\tif c.Value.Bool != nil {\n\t\tnoNil++\n\t}\n\tif c.Value.String != nil {\n\t\tnoNil++\n\t}\n\tif c.Value.Float != nil {\n\t\tnoNil++\n\t}\n\tif noNil != 1 {\n\t\treturn fmt.Errorf(\"value type should describe exactly one type\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ad7cb3721e9bd4d969727c2ef5b8caba", "score": "0.57974607", "text": "func Validate(v interface{}) error {\n\tvar inv InvalidError\n\tif fve := validate.Struct(v); fve != nil {\n\t\tfor _, fe := range fve.(validator.ValidationErrors) {\n\t\t\tinv = append(inv, Invalid{Field: fe.Field(), Error: fe.Tag()})\n\t\t}\n\t\treturn inv\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "f4e7f3fe5389a2db0f90d37d47b40c1a", "score": "0.5786819", "text": "func (m *Member) Validate(action string) error {\n\tif m.Name == \"\" {\n\t\treturn errors.New(\"type name is required\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "bf78aeed8706b4a6aa3a0abe5648374e", "score": "0.5783949", "text": "func (pv *Validator) Validate(i interface{}) error {\n\terr := pv.validator.Struct(i)\n\n\tvar errorMessages []string\n\n\tif err != nil {\n\t\tfor _, err := range err.(validator.ValidationErrors) {\n\t\t\terrorMessages = append(errorMessages, validationErrorMessages[err.Field()])\n\t\t}\n\n\t\treturn errors.New(strings.Join(errorMessages, \" and \"))\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "32760d75fb7a54259e8366ecdb5a76c7", "score": "0.576528", "text": "func (schema *RawSchema) validate() (*Schema, error) {\n\tfieldsLen := len(schema.Fields)\n\ttypesLen := len(schema.Types)\n\tif fieldsLen != typesLen {\n\t\treturn nil, fmt.Errorf(\"Mismatched fields and types lengths: %d %d\", fieldsLen, typesLen)\n\t}\n\tvar types []SchemaType\n\tfor _, typeString := range schema.Types {\n\t\tvar validType SchemaType\n\t\tswitch typeString {\n\t\tcase \"int\":\n\t\t\tvalidType = INT\n\t\tcase \"string\":\n\t\t\tvalidType = STRING\n\t\tdefault:\n\t\t\treturn nil, fmt.Errorf(\"Unrecognized schema type: %s\", typeString)\n\t\t}\n\t\ttypes = append(types, validType)\n\t}\n\treturn &Schema{schema.Fields, types}, nil\n}", "title": "" }, { "docid": "812c73858fbec0fa4deaced337cbc2a1", "score": "0.5748537", "text": "func Validate(schema Schema, rules ...*ozzo.FieldRules) error {\n\terr := ozzo.ValidateStruct(schema, rules...)\n\tswitch e := err.(type) {\n\tcase nil:\n\t\treturn nil\n\tcase ozzo.Errors:\n\t\t// Form a proper HTTPError\n\t\tmessages := make(map[string]string)\n\t\tfor k, v := range e {\n\t\t\tmessages[k] = v.Error()\n\t\t}\n\t\treturn errors.NewHTTPValidationError(messages)\n\tdefault:\n\t\treturn errors.NewInternalError(e, \"Error while validating\")\n\t}\n}", "title": "" }, { "docid": "da1e12f27f41242e8ab07e2a7976cc8c", "score": "0.57460326", "text": "func (FestivalStrategy) Validate(ctx context.Context, obj runtime.Object) field.ErrorList {\n\to := obj.(*Festival)\n\tklog.Infof(\"Validating fields for Festival %s\", o.Name)\n\terrors := field.ErrorList{}\n\n\tif o.Spec.Year < 0 {\n\t\terrors = append(errors,\n\t\t\tfield.Invalid(field.NewPath(\"spec\", \"year\"), o.Spec.Year, \"year must be > 0\"))\n\t}\n\n\t// perform validation here and add to errors using field.Invalid\n\treturn errors\n}", "title": "" }, { "docid": "8a30e9ed1ee4b751d18029e76e321535", "score": "0.57425207", "text": "func (m *Query) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tif utf8.RuneCountInString(m.GetField()) < 1 {\n\t\treturn QueryValidationError{\n\t\t\tfield: \"Field\",\n\t\t\treason: \"value length must be at least 1 runes\",\n\t\t}\n\t}\n\n\t// no validation rules for Op\n\n\t// no validation rules for Value\n\n\t// no validation rules for ValueType\n\n\treturn nil\n}", "title": "" }, { "docid": "e71df1479c7d8bed2919eb476ceb1771", "score": "0.57418716", "text": "func (m *RType) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tif !_RType_From_Pattern.MatchString(m.GetFrom()) {\n\t\treturn RTypeValidationError{\n\t\t\tfield: \"From\",\n\t\t\treason: \"value does not match regex pattern \\\"^[a-z][a-z0-9]{1,14}$\\\"\",\n\t\t}\n\t}\n\n\tif !_RType_To_Pattern.MatchString(m.GetTo()) {\n\t\treturn RTypeValidationError{\n\t\t\tfield: \"To\",\n\t\t\treason: \"value does not match regex pattern \\\"^[a-z][a-z0-9]{1,14}$\\\"\",\n\t\t}\n\t}\n\n\tif !_RType_Verb_Pattern.MatchString(m.GetVerb()) {\n\t\treturn RTypeValidationError{\n\t\t\tfield: \"Verb\",\n\t\t\treason: \"value does not match regex pattern \\\"^[a-z][a-z0-9]{1,14}$\\\"\",\n\t\t}\n\t}\n\n\t// no validation rules for Multiple\n\n\t// no validation rules for CountType\n\n\treturn nil\n}", "title": "" }, { "docid": "e7803f323c3ccf930ca5575cdd020580", "score": "0.5737211", "text": "func (ftc *FieldTypeCreate) check() error {\n\tif _, ok := ftc.mutation.Int(); !ok {\n\t\treturn &ValidationError{Name: \"int\", err: errors.New(`ent: missing required field \"FieldType.int\"`)}\n\t}\n\tif _, ok := ftc.mutation.Int8(); !ok {\n\t\treturn &ValidationError{Name: \"int8\", err: errors.New(`ent: missing required field \"FieldType.int8\"`)}\n\t}\n\tif _, ok := ftc.mutation.Int16(); !ok {\n\t\treturn &ValidationError{Name: \"int16\", err: errors.New(`ent: missing required field \"FieldType.int16\"`)}\n\t}\n\tif _, ok := ftc.mutation.Int32(); !ok {\n\t\treturn &ValidationError{Name: \"int32\", err: errors.New(`ent: missing required field \"FieldType.int32\"`)}\n\t}\n\tif _, ok := ftc.mutation.Int64(); !ok {\n\t\treturn &ValidationError{Name: \"int64\", err: errors.New(`ent: missing required field \"FieldType.int64\"`)}\n\t}\n\tif v, ok := ftc.mutation.ValidateOptionalInt32(); ok {\n\t\tif err := fieldtype.ValidateOptionalInt32Validator(v); err != nil {\n\t\t\treturn &ValidationError{Name: \"validate_optional_int32\", err: fmt.Errorf(`ent: validator failed for field \"FieldType.validate_optional_int32\": %w`, err)}\n\t\t}\n\t}\n\tif v, ok := ftc.mutation.State(); ok {\n\t\tif err := fieldtype.StateValidator(v); err != nil {\n\t\t\treturn &ValidationError{Name: \"state\", err: fmt.Errorf(`ent: validator failed for field \"FieldType.state\": %w`, err)}\n\t\t}\n\t}\n\tif v, ok := ftc.mutation.MAC(); ok {\n\t\tif err := fieldtype.MACValidator(v.String()); err != nil {\n\t\t\treturn &ValidationError{Name: \"mac\", err: fmt.Errorf(`ent: validator failed for field \"FieldType.mac\": %w`, err)}\n\t\t}\n\t}\n\tif _, ok := ftc.mutation.Dir(); !ok {\n\t\treturn &ValidationError{Name: \"dir\", err: errors.New(`ent: missing required field \"FieldType.dir\"`)}\n\t}\n\tif v, ok := ftc.mutation.Ndir(); ok {\n\t\tif err := fieldtype.NdirValidator(string(v)); err != nil {\n\t\t\treturn &ValidationError{Name: \"ndir\", err: fmt.Errorf(`ent: validator failed for field \"FieldType.ndir\": %w`, err)}\n\t\t}\n\t}\n\tif v, ok := ftc.mutation.Link(); ok {\n\t\tif err := fieldtype.LinkValidator(v.String()); err != nil {\n\t\t\treturn &ValidationError{Name: \"link\", err: fmt.Errorf(`ent: validator failed for field \"FieldType.link\": %w`, err)}\n\t\t}\n\t}\n\tif v, ok := ftc.mutation.RawData(); ok {\n\t\tif err := fieldtype.RawDataValidator(v); err != nil {\n\t\t\treturn &ValidationError{Name: \"raw_data\", err: fmt.Errorf(`ent: validator failed for field \"FieldType.raw_data\": %w`, err)}\n\t\t}\n\t}\n\tif v, ok := ftc.mutation.IP(); ok {\n\t\tif err := fieldtype.IPValidator([]byte(v)); err != nil {\n\t\t\treturn &ValidationError{Name: \"ip\", err: fmt.Errorf(`ent: validator failed for field \"FieldType.ip\": %w`, err)}\n\t\t}\n\t}\n\tif _, ok := ftc.mutation.Role(); !ok {\n\t\treturn &ValidationError{Name: \"role\", err: errors.New(`ent: missing required field \"FieldType.role\"`)}\n\t}\n\tif v, ok := ftc.mutation.Role(); ok {\n\t\tif err := fieldtype.RoleValidator(v); err != nil {\n\t\t\treturn &ValidationError{Name: \"role\", err: fmt.Errorf(`ent: validator failed for field \"FieldType.role\": %w`, err)}\n\t\t}\n\t}\n\tif v, ok := ftc.mutation.Priority(); ok {\n\t\tif err := fieldtype.PriorityValidator(v); err != nil {\n\t\t\treturn &ValidationError{Name: \"priority\", err: fmt.Errorf(`ent: validator failed for field \"FieldType.priority\": %w`, err)}\n\t\t}\n\t}\n\tif _, ok := ftc.mutation.Pair(); !ok {\n\t\treturn &ValidationError{Name: \"pair\", err: errors.New(`ent: missing required field \"FieldType.pair\"`)}\n\t}\n\tif _, ok := ftc.mutation.Vstring(); !ok {\n\t\treturn &ValidationError{Name: \"vstring\", err: errors.New(`ent: missing required field \"FieldType.vstring\"`)}\n\t}\n\tif _, ok := ftc.mutation.Triple(); !ok {\n\t\treturn &ValidationError{Name: \"triple\", err: errors.New(`ent: missing required field \"FieldType.triple\"`)}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4f5197474c2f161ebb1961164ed0fdd9", "score": "0.5736984", "text": "func (u UserDTO) Validate() (bool, []error) {\n\n\tvalid := true\n\terrs := []error{}\n\n\tif u.Name.IsZero() {\n\t\tvalid = false\n\t\terrs = append(errs, errors.New(\"Missing name\"))\n\t}\n\n\tif u.Lastname.IsZero() {\n\t\tvalid = false\n\t\terrs = append(errs, errors.New(\"Missing lastname\"))\n\t}\n\n\tif u.Gender.IsZero() {\n\t\tvalid = false\n\t\terrs = append(errs, errors.New(\"Gender missing\"))\n\t}\n\n\treturn valid, errs\n}", "title": "" }, { "docid": "bc4e616e999f1c1d3423bbafeb4a1f4d", "score": "0.57343364", "text": "func (m *UpdateStatefulSetRequest_Fields) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tfor key, val := range m.GetLabels() {\n\t\t_ = val\n\n\t\tif len(key) < 1 {\n\t\t\treturn UpdateStatefulSetRequest_FieldsValidationError{\n\t\t\t\tfield: fmt.Sprintf(\"Labels[%v]\", key),\n\t\t\t\treason: \"value length must be at least 1 bytes\",\n\t\t\t}\n\t\t}\n\n\t\t// no validation rules for Labels[key]\n\t}\n\n\tfor key, val := range m.GetAnnotations() {\n\t\t_ = val\n\n\t\tif len(key) < 1 {\n\t\t\treturn UpdateStatefulSetRequest_FieldsValidationError{\n\t\t\t\tfield: fmt.Sprintf(\"Annotations[%v]\", key),\n\t\t\t\treason: \"value length must be at least 1 bytes\",\n\t\t\t}\n\t\t}\n\n\t\t// no validation rules for Annotations[key]\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "55800e49c400177b56b7f3a8ac762b24", "score": "0.57157606", "text": "func (m *UpdateDeploymentRequest_Fields) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tfor key, val := range m.GetLabels() {\n\t\t_ = val\n\n\t\tif len(key) < 1 {\n\t\t\treturn UpdateDeploymentRequest_FieldsValidationError{\n\t\t\t\tfield: fmt.Sprintf(\"Labels[%v]\", key),\n\t\t\t\treason: \"value length must be at least 1 bytes\",\n\t\t\t}\n\t\t}\n\n\t\t// no validation rules for Labels[key]\n\t}\n\n\tfor key, val := range m.GetAnnotations() {\n\t\t_ = val\n\n\t\tif len(key) < 1 {\n\t\t\treturn UpdateDeploymentRequest_FieldsValidationError{\n\t\t\t\tfield: fmt.Sprintf(\"Annotations[%v]\", key),\n\t\t\t\treason: \"value length must be at least 1 bytes\",\n\t\t\t}\n\t\t}\n\n\t\t// no validation rules for Annotations[key]\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "75f116bd7cf8210fd7994506a542c2e3", "score": "0.57148767", "text": "func (cv *Validator) Validate(i interface{}) error {\n\treturn cv.Validator.Struct(i)\n}", "title": "" }, { "docid": "a967e42dc117ccb7a5542bc32bc2a559", "score": "0.5710826", "text": "func (m *PassGuestDataVehicleTypeObject) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateObject(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "61bf43f84cc15db0a524d0548b2468a2", "score": "0.5702163", "text": "func (m *ObjectMetaFields) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tfor key, val := range m.GetLabels() {\n\t\t_ = val\n\n\t\tif len(key) < 1 {\n\t\t\treturn ObjectMetaFieldsValidationError{\n\t\t\t\tfield: fmt.Sprintf(\"Labels[%v]\", key),\n\t\t\t\treason: \"value length must be at least 1 bytes\",\n\t\t\t}\n\t\t}\n\n\t\t// no validation rules for Labels[key]\n\t}\n\n\tfor key, val := range m.GetAnnotations() {\n\t\t_ = val\n\n\t\tif len(key) < 1 {\n\t\t\treturn ObjectMetaFieldsValidationError{\n\t\t\t\tfield: fmt.Sprintf(\"Annotations[%v]\", key),\n\t\t\t\treason: \"value length must be at least 1 bytes\",\n\t\t\t}\n\t\t}\n\n\t\t// no validation rules for Annotations[key]\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "a842b088add5854211a891864a02caad", "score": "0.569169", "text": "func (s *Selector) Validate() error {\n\tvar count int\n\t{\n\t\tv := reflect.ValueOf(s).Elem()\n\t\tfor i := 0; i < v.NumField(); i++ {\n\t\t\tif !v.Field(i).IsNil() {\n\t\t\t\tcount++\n\t\t\t}\n\t\t}\n\t}\n\tif count != 1 {\n\t\treturn errors.New(\"music: one field must be specified\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ed19af5f633397e51bfe46970c9382e4", "score": "0.56875634", "text": "func (b *Blueprint) Validate() error {\n\tfor name, field := range schemaMap {\n\t\t// check if field exists\n\t\tok, err := reflections.HasField(b, name)\n\t\tif !ok || err != nil {\n\t\t\tif !ok {\n\t\t\t\treturn fmt.Errorf(\"Field %s is not a valid field name\", name)\n\t\t\t}\n\t\t\treturn err\n\t\t}\n\n\t\t// check field is populated\n\t\tval, err := reflections.GetField(b, name)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif val == field.NullValue && field.Required {\n\t\t\treturn fmt.Errorf(\"Field %s has no value and is required\", name)\n\t\t}\n\t\tif val == field.NullValue && !field.Required {\n\t\t\terr = reflections.SetField(b, name, field.DefaultValue)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t\t// check field type\n\t\ttyp, err := reflections.GetFieldType(b, name)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif typ != field.ValueType {\n\t\t\treturn fmt.Errorf(\"Found type of %s but expected type %s\", typ, field.ValueType)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "de44796ccd69e349351bd202bb0ea488", "score": "0.5684898", "text": "func (u *User) Validate() error {\n\treturn validate.Struct(u)\n}", "title": "" }, { "docid": "fd10ce461ad53d9cf615f30dd6260da9", "score": "0.5660465", "text": "func (s *CreateEventSourceMappingInput) Validate() error {\n\tinvalidParams := request.ErrInvalidParams{Context: \"CreateEventSourceMappingInput\"}\n\tif s.BatchSize != nil && *s.BatchSize < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinValue(\"BatchSize\", 1))\n\t}\n\tif s.FunctionName == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"FunctionName\"))\n\t}\n\tif s.FunctionName != nil && len(*s.FunctionName) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"FunctionName\", 1))\n\t}\n\tif s.MaximumRecordAgeInSeconds != nil && *s.MaximumRecordAgeInSeconds < -1 {\n\t\tinvalidParams.Add(request.NewErrParamMinValue(\"MaximumRecordAgeInSeconds\", -1))\n\t}\n\tif s.MaximumRetryAttempts != nil && *s.MaximumRetryAttempts < -1 {\n\t\tinvalidParams.Add(request.NewErrParamMinValue(\"MaximumRetryAttempts\", -1))\n\t}\n\tif s.ParallelizationFactor != nil && *s.ParallelizationFactor < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinValue(\"ParallelizationFactor\", 1))\n\t}\n\tif s.Queues != nil && len(s.Queues) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"Queues\", 1))\n\t}\n\tif s.Topics != nil && len(s.Topics) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"Topics\", 1))\n\t}\n\tif s.AmazonManagedKafkaEventSourceConfig != nil {\n\t\tif err := s.AmazonManagedKafkaEventSourceConfig.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"AmazonManagedKafkaEventSourceConfig\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.DocumentDBEventSourceConfig != nil {\n\t\tif err := s.DocumentDBEventSourceConfig.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"DocumentDBEventSourceConfig\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.ScalingConfig != nil {\n\t\tif err := s.ScalingConfig.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"ScalingConfig\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.SelfManagedEventSource != nil {\n\t\tif err := s.SelfManagedEventSource.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"SelfManagedEventSource\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.SelfManagedKafkaEventSourceConfig != nil {\n\t\tif err := s.SelfManagedKafkaEventSourceConfig.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"SelfManagedKafkaEventSourceConfig\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.SourceAccessConfigurations != nil {\n\t\tfor i, v := range s.SourceAccessConfigurations {\n\t\t\tif v == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif err := v.Validate(); err != nil {\n\t\t\t\tinvalidParams.AddNested(fmt.Sprintf(\"%s[%v]\", \"SourceAccessConfigurations\", i), err.(request.ErrInvalidParams))\n\t\t\t}\n\t\t}\n\t}\n\n\tif invalidParams.Len() > 0 {\n\t\treturn invalidParams\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8ba52dadac212ceee855cb00c5c7a902", "score": "0.56587666", "text": "func (m *Map) IsValid(object interface{}) (bool, []ValidationError) {\r\n\r\n\t// Get the object's value and type\r\n\tobjectValue := reflect.ValueOf(object)\r\n\tobjectType := reflect.TypeOf(object)\r\n\r\n\t// Get the validations\r\n\tvalidations := m.get(objectType)\r\n\r\n\t// If we are a pointer and not nil, run IsValid on it's interface\r\n\tif objectValue.Kind() == reflect.Ptr && !objectValue.IsNil() {\r\n\t\treturn IsValid(objectValue.Elem().Interface())\r\n\t}\r\n\r\n\t// Do we have some validations?\r\n\tif len(validations) == 0 {\r\n\t\tvar err error\r\n\r\n\t\t// Loop the fields and decrement through the loop\r\n\t\tfor i := objectType.NumField() - 1; i >= 0; i-- {\r\n\t\t\tfield := objectType.Field(i)\r\n\t\t\tvalidationTag := field.Tag.Get(\"validation\")\r\n\r\n\t\t\t// Do we have a validation tag?\r\n\t\t\tif len(validationTag) > 0 {\r\n\t\t\t\tvalidationComponent := strings.Split(validationTag, \" \")\r\n\r\n\t\t\t\t// Loop each validation component\r\n\t\t\t\tfor _, validationSpec := range validationComponent {\r\n\t\t\t\t\tcomponent := strings.Split(validationSpec, \"=\")\r\n\t\t\t\t\tif len(component) != 2 {\r\n\t\t\t\t\t\tlog.Fatalln(\"invalid validation specification:\", objectType.Name(), field.Name, validationSpec)\r\n\t\t\t\t\t}\r\n\r\n\t\t\t\t\t// Create the validation\r\n\t\t\t\t\tvar validation Interface\r\n\t\t\t\t\tif builder, ok := m.validationNameToBuilder.Load(component[0]); ok && builder != nil {\r\n\t\t\t\t\t\tfn := builder.(func(string, reflect.Kind) (Interface, error))\r\n\t\t\t\t\t\tvalidation, err = fn(component[1], field.Type.Kind())\r\n\r\n\t\t\t\t\t\tif err != nil {\r\n\t\t\t\t\t\t\tlog.Fatalln(\"error creating validation:\", objectType.Name(), field.Name, validationSpec, err)\r\n\t\t\t\t\t\t}\r\n\t\t\t\t\t} else {\r\n\t\t\t\t\t\tlog.Fatalln(\"unknown validation named:\", component[0])\r\n\t\t\t\t\t}\r\n\r\n\t\t\t\t\t// Store the other properties and append to validations\r\n\t\t\t\t\tvalidation.SetFieldName(field.Name)\r\n\t\t\t\t\tvalidation.SetFieldIndex(i)\r\n\t\t\t\t\tvalidations = append(validations, validation)\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t}\r\n\r\n\t\t// Set the validations\r\n\t\tm.set(objectType, validations)\r\n\t}\r\n\r\n\t// Loop and build errors\r\n\tvar errors []ValidationError\r\n\tfor _, validation := range validations {\r\n\t\tfield := objectValue.Field(validation.FieldIndex())\r\n\t\tvalue := field.Interface()\r\n\t\tif err := validation.Validate(value, objectValue); err != nil {\r\n\t\t\terrors = append(errors, *err)\r\n\t\t}\r\n\t}\r\n\r\n\t// Return flag and errors\r\n\treturn len(errors) == 0, errors\r\n}", "title": "" }, { "docid": "56ec5d72247d9f1f02b57ff182d42837", "score": "0.56550145", "text": "func (s Schema) Validate(field *Field) (errs Errors) {\n\treturn validateSchema(s, field, func(name string) string { return name })\n}", "title": "" }, { "docid": "ca26b9e91bba684584704f0e1b4887d0", "score": "0.5644803", "text": "func (fds FieldDataSpec) ValidateType(data interface{}) bool {\n\tisDataOk := false\n\tswitch fds.DataType {\n\tcase \"string\":\n\t\t_, isDataOk = data.(string)\n\tcase \"int\":\n\t\t_, isDataOk = data.(int)\n\tcase \"arrayInt\":\n\t\t_, isDataOk = data.([]int)\n\tcase \"arraySting\":\n\t\t_, isDataOk = data.([]string)\n\tcase \"arrayObjets\":\n\t\t_, isDataOk = data.([]interface{})\n\tcase \"mapOfObjects\":\n\t\t_, isDataOk = data.(map[string]interface{})\n\tcase \"mapOfString\":\n\t\t_, isDataOk = data.(map[string]string)\n\tcase \"object\":\n\t\t_, isDataOk = data.(interface{})\n\tcase \"bool\":\n\t\t_, isDataOk = data.(bool)\n\t}\n\treturn isDataOk\n}", "title": "" }, { "docid": "624052b098b58d5bd99729542b7a9848", "score": "0.56366485", "text": "func (p *U1) Validate() error {\n\tvalidate := validator.New()\n\treturn validate.Struct(p)\n}", "title": "" }, { "docid": "c3756ac69e0a88c7a02734d33b0fefc9", "score": "0.56341195", "text": "func (s *PutModelInput) Validate() error {\n\tinvalidParams := request.ErrInvalidParams{Context: \"PutModelInput\"}\n\tif s.Description != nil && len(*s.Description) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"Description\", 1))\n\t}\n\tif s.LabelSchema == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"LabelSchema\"))\n\t}\n\tif s.ModelId == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"ModelId\"))\n\t}\n\tif s.ModelId != nil && len(*s.ModelId) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"ModelId\", 1))\n\t}\n\tif s.ModelType == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"ModelType\"))\n\t}\n\tif s.ModelVariables == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"ModelVariables\"))\n\t}\n\tif s.TrainingDataSource == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"TrainingDataSource\"))\n\t}\n\tif s.LabelSchema != nil {\n\t\tif err := s.LabelSchema.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"LabelSchema\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.ModelVariables != nil {\n\t\tfor i, v := range s.ModelVariables {\n\t\t\tif v == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif err := v.Validate(); err != nil {\n\t\t\t\tinvalidParams.AddNested(fmt.Sprintf(\"%s[%v]\", \"ModelVariables\", i), err.(request.ErrInvalidParams))\n\t\t\t}\n\t\t}\n\t}\n\tif s.TrainingDataSource != nil {\n\t\tif err := s.TrainingDataSource.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"TrainingDataSource\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\n\tif invalidParams.Len() > 0 {\n\t\treturn invalidParams\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "73cae87adce91b9b60595ef6941586fe", "score": "0.5631854", "text": "func (u *UserCreate) Validate() bool {\n\tanyBlank := false\n\tfieldErrors := false\n\n\tu.errors = JsonErrors{}\n\n\temail := strings.TrimSpace(u.Email)\n\tname := strings.TrimSpace(u.Name)\n\n\tif email == \"\" {\n\t\tu.errors[\"email\"] = UserEmailEmpty\n\t\tanyBlank = true\n\t}\n\t// Spaces are valid in passwords\n\tif u.Password == \"\" {\n\t\tu.errors[\"password\"] = UserPasswordEmpty\n\t\tanyBlank = true\n\t}\n\tif name == \"\" {\n\t\tu.errors[\"name\"] = UserNameEmpty\n\t\tanyBlank = true\n\t}\n\tif anyBlank {\n\t\treturn false\n\t}\n\n\tif !ValidatePassword(u.Password) {\n\t\tu.errors[\"password\"] = UserCreatePasswordLength\n\t\tfieldErrors = true\n\t}\n\n\tif !ValidateEmail(u.Email) {\n\t\tu.errors[\"email\"] = UserInvalidEmail\n\t\tfieldErrors = true\n\t}\n\n\treturn !fieldErrors\n}", "title": "" }, { "docid": "a7a1b9d31e405ea0bd061501af7159bc", "score": "0.5627449", "text": "func Validate(i interface{}) error {\n\tvar value = reflect.ValueOf(i)\n\n\t// if the reflected value is nil\n\tif !value.IsValid() {\n\t\treturn errors.New(\"i value is nil\")\n\t}\n\n\t// as i is actually an interface, just get the thing behind the interface\n\tvalue = reflect.Indirect(value.Elem())\n\n\tvar errs = make(ValidationError)\n\t// recursively walk through it to see if it's valid\n\tvalidateRecursively(&value, \"\", errs)\n\n\tif len(errs) > 0 {\n\t\treturn errs\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "3ff68d7328faa93d141e3a14f2f8bd55", "score": "0.5627385", "text": "func (t Table) Validate() error {\n\treturn validateField(t)\n}", "title": "" }, { "docid": "f8419b9d5ad987d97ad30887c572e1a0", "score": "0.56254816", "text": "func (m *MoBaseComplexType) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0d4b83154201366e086a61ffca84a863", "score": "0.5625102", "text": "func (p Params) Validate() error {\n\tif err := validateCreditTypes(p.CreditTypes); err != nil {\n\t\treturn err\n\t}\n\n\tif err := validateAllowedClassCreators(p.AllowedClassCreators); err != nil {\n\t\treturn err\n\t}\n\n\tif err := validateAllowlistEnabled(p.AllowlistEnabled); err != nil {\n\t\treturn err\n\t}\n\n\tif err := validateCreditClassFee(p.CreditClassFee); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "cd4851b36540a42ad2fc4ed9ec76635d", "score": "0.56163764", "text": "func (o *Complex) Validate() error {\n\tfor _, err := range dynahelpers.ValidateStruct(*o) {\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "39ee42c76fc1765534fff683e11de1e3", "score": "0.56116414", "text": "func (params *Params) Validate() error {\n\treturn deputil.ValidateParams(params)\n}", "title": "" }, { "docid": "60c29cff12fb7c43a0c419c1ad2b941b", "score": "0.5598943", "text": "func (f field) IsValid() bool { return f != nil }", "title": "" }, { "docid": "d3e835046df99cacdfb1e2b1253f33c1", "score": "0.5597185", "text": "func Validate(args ...interface{}) error {\n\tfor _, arg := range args {\n\t\t// type judge\n\t\tswitch arg.(type) {\n\t\tcase bool:\n\t\t\treturn nil\n\t\tcase int:\n\t\t\tif value, ok := arg.(int); ok && value == 0 {\n\t\t\t\treturn errors.New(\"int values is 0\")\n\t\t\t}\n\t\tcase string:\n\t\t\tif value, ok := arg.(string); ok && len(value) == 0 {\n\t\t\t\treturn errors.New(\"string value length is 0\")\n\t\t\t}\n\t\tcase int64:\n\t\t\tif value, ok := arg.(int64); ok && value == 0 {\n\t\t\t\treturn errors.New(\"int64 value is 0\")\n\t\t\t}\n\t\tcase float64:\n\t\t\tif value, ok := arg.(float64); ok && value == 0 {\n\t\t\t\treturn errors.New(\"float64 value is 0.0\")\n\t\t\t}\n\t\tcase []int:\n\t\t\tif value, ok := arg.([]int); ok && len(value) == 0 {\n\t\t\t\treturn errors.New(\"[]int value is 0\")\n\t\t\t}\n\t\tcase []string:\n\t\t\tif value, ok := arg.([]string); ok && len(value) == 0 {\n\t\t\t\treturn errors.New(\"[]string value is nil\")\n\t\t\t}\n\t\tcase map[string]string:\n\t\t\tif len(arg.(map[string]string)) == 0 {\n\t\t\t\treturn errors.New(\"map[string]string is nil\")\n\t\t\t}\n\t\tdefault:\n\t\t\treturn errors.New(\"unSupport type\")\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5e06aff87a187c66063917c91c3187d9", "score": "0.5587805", "text": "func (m *ModuleType) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateCreated(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateDescription(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateLastUpdated(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateManufacturer(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateModel(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validatePartNumber(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateTags(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateURL(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateWeightUnit(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "cec5fe2ef450550edc15567f15cf5697", "score": "0.55854666", "text": "func (v *Validation) Validate(i interface{}) ValidationErrors {\n\terr := v.validate.Struct(i)\n\tif ves, ok := err.(validator.ValidationErrors); ok {\n\t\tif len(ves) == 0 {\n\t\t\treturn nil\n\t\t}\n\n\t\tvar returnErrs []ValidationError\n\n\t\tfor _, ve := range ves {\n\t\t\t// cast the FieldError into ValidationError append into slice\n\t\t\t// from implemented Error()\n\t\t\te := ValidationError{ve.(validator.FieldError)}\n\t\t\treturnErrs = append(returnErrs, e)\n\t\t}\n\t\treturn returnErrs\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "283e845c78b5fcc2403c72ca9ab4b3a6", "score": "0.5585018", "text": "func (cv *Validator) Validate(i interface{}) error {\n\treturn cv.validator.Struct(i)\n}", "title": "" }, { "docid": "28d7cc806e59e30c0e62bd344bc56fd5", "score": "0.5584105", "text": "func Validate(cfg interface{}) error {\n\tbaseConfigType := reflect.TypeOf((*Validator)(nil)).Elem()\n\n\tv := reflect.ValueOf(cfg).Elem()\n\tfor i := 0; i < v.NumField(); i++ {\n\t\tif v.Type().Field(i).Type.Implements(baseConfigType) {\n\t\t\terr := v.Field(i).Interface().(Validator).Validate()\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "fbb5624b4a7d76d824963e54d707a11b", "score": "0.5582587", "text": "func (s *UpdateEventSourceMappingInput) Validate() error {\n\tinvalidParams := request.ErrInvalidParams{Context: \"UpdateEventSourceMappingInput\"}\n\tif s.BatchSize != nil && *s.BatchSize < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinValue(\"BatchSize\", 1))\n\t}\n\tif s.FunctionName != nil && len(*s.FunctionName) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"FunctionName\", 1))\n\t}\n\tif s.MaximumRecordAgeInSeconds != nil && *s.MaximumRecordAgeInSeconds < -1 {\n\t\tinvalidParams.Add(request.NewErrParamMinValue(\"MaximumRecordAgeInSeconds\", -1))\n\t}\n\tif s.MaximumRetryAttempts != nil && *s.MaximumRetryAttempts < -1 {\n\t\tinvalidParams.Add(request.NewErrParamMinValue(\"MaximumRetryAttempts\", -1))\n\t}\n\tif s.ParallelizationFactor != nil && *s.ParallelizationFactor < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinValue(\"ParallelizationFactor\", 1))\n\t}\n\tif s.UUID == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"UUID\"))\n\t}\n\tif s.UUID != nil && len(*s.UUID) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"UUID\", 1))\n\t}\n\tif s.DocumentDBEventSourceConfig != nil {\n\t\tif err := s.DocumentDBEventSourceConfig.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"DocumentDBEventSourceConfig\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.ScalingConfig != nil {\n\t\tif err := s.ScalingConfig.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"ScalingConfig\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.SourceAccessConfigurations != nil {\n\t\tfor i, v := range s.SourceAccessConfigurations {\n\t\t\tif v == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif err := v.Validate(); err != nil {\n\t\t\t\tinvalidParams.AddNested(fmt.Sprintf(\"%s[%v]\", \"SourceAccessConfigurations\", i), err.(request.ErrInvalidParams))\n\t\t\t}\n\t\t}\n\t}\n\n\tif invalidParams.Len() > 0 {\n\t\treturn invalidParams\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8be33636e365259305cbcf8cdaf48ef2", "score": "0.55696255", "text": "func (user *Users) Validate() (ValidationError, bool) {\n\terr := validate.Struct(user)\n\tif err != nil {\n\t\treturn constructValidationError(err), false\n\t}\n\treturn ValidationError{}, true\n}", "title": "" }, { "docid": "3ed9bdcf8a29d3790f29e1be64885775", "score": "0.5569175", "text": "func (p Params) Validate() error {\n\tif err := validateUnbondingTime(p.UnbondingTime); err != nil {\n\t\treturn err\n\t}\n\tif err := validateMaxValidators(p.MaxValidators); err != nil {\n\t\treturn err\n\t}\n\tif err := validateMaxEntries(p.MaxEntries); err != nil {\n\t\treturn err\n\t}\n\tif err := validateBondDenom(p.BondDenom); err != nil {\n\t\treturn err\n\t}\n\tif err := validateMinSelfDelegation(p.MinSelfDelegation); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "1cb853c32b0398174ecfca597ea2369a", "score": "0.5567541", "text": "func (s Space) Validate() error {\n\treturn validation.ValidateStruct(&s,\n\t\tvalidation.Field(&s.Name, validation.Required, validation.Length(1, 25)),\n\t\tvalidation.Field(&s.About, validation.Required, validation.Length(1, 80)),\n\t\tvalidation.Field(&s.Topics, validation.Length(0, 3)),\n\t)\n}", "title": "" }, { "docid": "ebe5f9e3054f98f15b81e0ce4b15e52d", "score": "0.5567535", "text": "func (m *Update) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tif utf8.RuneCountInString(m.GetField()) < 1 {\n\t\treturn UpdateValidationError{\n\t\t\tfield: \"Field\",\n\t\t\treason: \"value length must be at least 1 runes\",\n\t\t}\n\t}\n\n\t// no validation rules for Action\n\n\t// no validation rules for Value\n\n\t// no validation rules for ValueType\n\n\treturn nil\n}", "title": "" }, { "docid": "633602d8e7bbedaa45c05cd76a59e754", "score": "0.55674666", "text": "func (m *PassGuestData) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateModel(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateVehicleTypeObject(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e23811e59d9f1d94749ddf9cb93513ed", "score": "0.5565782", "text": "func (h Handler) Validate() (err error) {\n\terr = validation.ValidateStruct(&h,\n\t\tvalidation.Field(&h.Name, validation.Required),\n\t)\n\n\treturn\n}", "title": "" }, { "docid": "0989e10ac873d8c129ac5ec227b042e7", "score": "0.5565046", "text": "func (s *ConfigTypeData) Validate() error {\n\tinvalidParams := request.ErrInvalidParams{Context: \"ConfigTypeData\"}\n\tif s.AntennaDownlinkConfig != nil {\n\t\tif err := s.AntennaDownlinkConfig.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"AntennaDownlinkConfig\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.AntennaDownlinkDemodDecodeConfig != nil {\n\t\tif err := s.AntennaDownlinkDemodDecodeConfig.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"AntennaDownlinkDemodDecodeConfig\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.AntennaUplinkConfig != nil {\n\t\tif err := s.AntennaUplinkConfig.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"AntennaUplinkConfig\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.DataflowEndpointConfig != nil {\n\t\tif err := s.DataflowEndpointConfig.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"DataflowEndpointConfig\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.S3RecordingConfig != nil {\n\t\tif err := s.S3RecordingConfig.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"S3RecordingConfig\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.TrackingConfig != nil {\n\t\tif err := s.TrackingConfig.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"TrackingConfig\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.UplinkEchoConfig != nil {\n\t\tif err := s.UplinkEchoConfig.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"UplinkEchoConfig\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\n\tif invalidParams.Len() > 0 {\n\t\treturn invalidParams\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "60fc57b671be9ed58404fa88788914d9", "score": "0.5561809", "text": "func (v *Value) Validate(target interface{}) error {\n\tswitch v.Type {\n\tcase \"range\":\n\t\tt := target.(float32)\n\t\tif t < v.Range.From || t > v.Range.To {\n\t\t\treturn fmt.Errorf(\"out of range: %v\", target)\n\t\t}\n\tcase \"toggle\":\n\t\tt := target.(string)\n\t\tfor _, val := range v.Toggle {\n\t\t\tif val == target {\n\t\t\t\treturn nil\n\t\t\t}\n\t\t}\n\t\treturn fmt.Errorf(\"invalid toggle provided: %v\", t)\n\tcase \"step\":\n\t\tt := target.(string)\n\t\tfor _, val := range v.Step {\n\t\t\tif val == target {\n\t\t\t\treturn nil\n\t\t\t}\n\t\t}\n\t\treturn fmt.Errorf(\"invalid step provided: %v\", t)\n\tcase \"shot\":\n\t\tt := target.(string)\n\t\tif v.Shot.Value == target || v.Default == target {\n\t\t\treturn nil\n\t\t}\n\t\treturn fmt.Errorf(\"invalid button provided: %v\", t)\n\n\tdefault:\n\t\treturn fmt.Errorf(\"unknown type provided: %v\", v.Type)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "3cfae618c5b66c04401cf54806e998b5", "score": "0.5559485", "text": "func (s *EndpointDetails) Validate() error {\n\tinvalidParams := request.ErrInvalidParams{Context: \"EndpointDetails\"}\n\tif s.AwsGroundStationAgentEndpoint != nil {\n\t\tif err := s.AwsGroundStationAgentEndpoint.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"AwsGroundStationAgentEndpoint\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.Endpoint != nil {\n\t\tif err := s.Endpoint.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"Endpoint\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.SecurityDetails != nil {\n\t\tif err := s.SecurityDetails.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"SecurityDetails\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\n\tif invalidParams.Len() > 0 {\n\t\treturn invalidParams\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "73f2c02c2df26e5f1237b9d840ac3418", "score": "0.5554674", "text": "func (m *UserPrivate) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// validation for a type composition with UserBasic\n\tif err := m.UserBasic.Validate(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateBirthDate(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateBoasts(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateLastBirthDateChange(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateLastPosition(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateMatchs(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateRadio(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "bf29270a21a8f39fdbb50bbd143d432d", "score": "0.5550872", "text": "func (m *E) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tif !_E_Type_Pattern.MatchString(m.GetType()) {\n\t\treturn EValidationError{\n\t\t\tfield: \"Type\",\n\t\t\treason: \"value does not match regex pattern \\\"^[a-z][a-z0-9]{1,14}$\\\"\",\n\t\t}\n\t}\n\n\t// no validation rules for ID\n\n\t// no validation rules for ID1\n\n\t// no validation rules for ID2\n\n\t// no validation rules for ID3\n\n\t// no validation rules for CTime\n\n\t// no validation rules for UTime\n\n\t// no validation rules for State\n\n\t// no validation rules for Meta\n\n\t// no validation rules for Content\n\n\t// no validation rules for Score\n\n\t// no validation rules for Score1\n\n\treturn nil\n}", "title": "" }, { "docid": "6e1a60314725d32ef4f61e42f15f4430", "score": "0.55463773", "text": "func (s *GlobalSecondaryIndex) Validate() error {\n\tinvalidParams := request.ErrInvalidParams{Context: \"GlobalSecondaryIndex\"}\n\tif s.IndexName == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"IndexName\"))\n\t}\n\tif s.IndexName != nil && len(*s.IndexName) < 3 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"IndexName\", 3))\n\t}\n\tif s.KeySchema == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"KeySchema\"))\n\t}\n\tif s.KeySchema != nil && len(s.KeySchema) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"KeySchema\", 1))\n\t}\n\tif s.Projection == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"Projection\"))\n\t}\n\tif s.KeySchema != nil {\n\t\tfor i, v := range s.KeySchema {\n\t\t\tif v == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif err := v.Validate(); err != nil {\n\t\t\t\tinvalidParams.AddNested(fmt.Sprintf(\"%s[%v]\", \"KeySchema\", i), err.(request.ErrInvalidParams))\n\t\t\t}\n\t\t}\n\t}\n\tif s.Projection != nil {\n\t\tif err := s.Projection.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"Projection\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.ProvisionedThroughput != nil {\n\t\tif err := s.ProvisionedThroughput.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"ProvisionedThroughput\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\n\tif invalidParams.Len() > 0 {\n\t\treturn invalidParams\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5be3b3513756ea25a9ff51579f161dd8", "score": "0.55448836", "text": "func (v *Validator) Validate(i interface{}) error {\n\terr := v.Validator.Struct(i)\n\tif err == nil {\n\t\treturn nil\n\t}\n\terrs := err.(validator.ValidationErrors)\n\t// return pretty errors\n\tmsg := \"\"\n\tfor _, v := range errs.Translate(v.Trans) {\n\t\tif msg != \"\" {\n\t\t\tmsg += \", \"\n\t\t}\n\t\tmsg += v\n\t}\n\treturn errors.New(msg)\n}", "title": "" }, { "docid": "7004b34cf36b818ce764173df0306b15", "score": "0.5540665", "text": "func Validate(v *validationparams.ValidationParams) (*ValidationError, error) {\n\tvalidationErrors := validationErrorMap{}\n\tif v == nil {\n\t\treturn nil, errors.New(\"no FieldValidationData provided\")\n\t}\n\tperformFieldValidation(*v, &validationErrors)\n\tif len(validationErrors) > 0 {\n\t\treturn &ValidationError{\n\t\t\tErrors: validationErrors,\n\t\t}, nil\n\t}\n\treturn nil, nil\n}", "title": "" }, { "docid": "12681bd5a96f8b48ac785d554ccd4b02", "score": "0.55349964", "text": "func (a Account) Validate() error {\n\treturn validation.ValidateStruct(&a,\n\t\tvalidation.Field(&a.Address, validation.Required),\n\t)\n}", "title": "" }, { "docid": "57a2e43b71f99dd020d5bb0b51240eb9", "score": "0.55298966", "text": "func (s *Projection) Validate() error {\n\tinvalidParams := request.ErrInvalidParams{Context: \"Projection\"}\n\tif s.NonKeyAttributes != nil && len(s.NonKeyAttributes) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"NonKeyAttributes\", 1))\n\t}\n\n\tif invalidParams.Len() > 0 {\n\t\treturn invalidParams\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "1b1c8d70c143d171fc064c8db5f4e882", "score": "0.55250084", "text": "func (m *SearchUsersRequest) ValidateFields(paths ...string) error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tif len(paths) == 0 {\n\t\tpaths = SearchUsersRequestFieldPathsNested\n\t}\n\n\tfor name, subs := range _processPaths(append(paths[:0:0], paths...)) {\n\t\t_ = subs\n\t\tswitch name {\n\t\tcase \"query\":\n\n\t\t\tif utf8.RuneCountInString(m.GetQuery()) > 50 {\n\t\t\t\treturn SearchUsersRequestValidationError{\n\t\t\t\t\tfield: \"query\",\n\t\t\t\t\treason: \"value length must be at most 50 runes\",\n\t\t\t\t}\n\t\t\t}\n\n\t\tcase \"id_contains\":\n\n\t\t\tif utf8.RuneCountInString(m.GetIdContains()) > 50 {\n\t\t\t\treturn SearchUsersRequestValidationError{\n\t\t\t\t\tfield: \"id_contains\",\n\t\t\t\t\treason: \"value length must be at most 50 runes\",\n\t\t\t\t}\n\t\t\t}\n\n\t\tcase \"name_contains\":\n\n\t\t\tif utf8.RuneCountInString(m.GetNameContains()) > 50 {\n\t\t\t\treturn SearchUsersRequestValidationError{\n\t\t\t\t\tfield: \"name_contains\",\n\t\t\t\t\treason: \"value length must be at most 50 runes\",\n\t\t\t\t}\n\t\t\t}\n\n\t\tcase \"description_contains\":\n\n\t\t\tif utf8.RuneCountInString(m.GetDescriptionContains()) > 50 {\n\t\t\t\treturn SearchUsersRequestValidationError{\n\t\t\t\t\tfield: \"description_contains\",\n\t\t\t\t\treason: \"value length must be at most 50 runes\",\n\t\t\t\t}\n\t\t\t}\n\n\t\tcase \"attributes_contain\":\n\n\t\t\tif len(m.GetAttributesContain()) > 10 {\n\t\t\t\treturn SearchUsersRequestValidationError{\n\t\t\t\t\tfield: \"attributes_contain\",\n\t\t\t\t\treason: \"value must contain no more than 10 pair(s)\",\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tfor key, val := range m.GetAttributesContain() {\n\t\t\t\t_ = val\n\n\t\t\t\tif utf8.RuneCountInString(key) > 36 {\n\t\t\t\t\treturn SearchUsersRequestValidationError{\n\t\t\t\t\t\tfield: fmt.Sprintf(\"attributes_contain[%v]\", key),\n\t\t\t\t\t\treason: \"value length must be at most 36 runes\",\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\tif !_SearchUsersRequest_AttributesContain_Pattern.MatchString(key) {\n\t\t\t\t\treturn SearchUsersRequestValidationError{\n\t\t\t\t\t\tfield: fmt.Sprintf(\"attributes_contain[%v]\", key),\n\t\t\t\t\t\treason: \"value does not match regex pattern \\\"^[a-z0-9](?:[-]?[a-z0-9]){2,}$\\\"\",\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\tif utf8.RuneCountInString(val) > 50 {\n\t\t\t\t\treturn SearchUsersRequestValidationError{\n\t\t\t\t\t\tfield: fmt.Sprintf(\"attributes_contain[%v]\", key),\n\t\t\t\t\t\treason: \"value length must be at most 50 runes\",\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t}\n\n\t\tcase \"state\":\n\n\t\t\t_SearchUsersRequest_State_Unique := make(map[State]struct{}, len(m.GetState()))\n\n\t\t\tfor idx, item := range m.GetState() {\n\t\t\t\t_, _ = idx, item\n\n\t\t\t\tif _, exists := _SearchUsersRequest_State_Unique[item]; exists {\n\t\t\t\t\treturn SearchUsersRequestValidationError{\n\t\t\t\t\t\tfield: fmt.Sprintf(\"state[%v]\", idx),\n\t\t\t\t\t\treason: \"repeated value must contain unique items\",\n\t\t\t\t\t}\n\t\t\t\t} else {\n\t\t\t\t\t_SearchUsersRequest_State_Unique[item] = struct{}{}\n\t\t\t\t}\n\n\t\t\t\tif _, ok := State_name[int32(item)]; !ok {\n\t\t\t\t\treturn SearchUsersRequestValidationError{\n\t\t\t\t\t\tfield: fmt.Sprintf(\"state[%v]\", idx),\n\t\t\t\t\t\treason: \"value must be one of the defined enum values\",\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t}\n\n\t\tcase \"field_mask\":\n\n\t\t\tif v, ok := interface{}(m.GetFieldMask()).(interface{ ValidateFields(...string) error }); ok {\n\t\t\t\tif err := v.ValidateFields(subs...); err != nil {\n\t\t\t\t\treturn SearchUsersRequestValidationError{\n\t\t\t\t\t\tfield: \"field_mask\",\n\t\t\t\t\t\treason: \"embedded message failed validation\",\n\t\t\t\t\t\tcause: err,\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\tcase \"order\":\n\n\t\t\tif _, ok := _SearchUsersRequest_Order_InLookup[m.GetOrder()]; !ok {\n\t\t\t\treturn SearchUsersRequestValidationError{\n\t\t\t\t\tfield: \"order\",\n\t\t\t\t\treason: \"value must be in list [ user_id -user_id name -name primary_email_address -primary_email_address state -state admin -admin created_at -created_at]\",\n\t\t\t\t}\n\t\t\t}\n\n\t\tcase \"limit\":\n\n\t\t\tif m.GetLimit() > 1000 {\n\t\t\t\treturn SearchUsersRequestValidationError{\n\t\t\t\t\tfield: \"limit\",\n\t\t\t\t\treason: \"value must be less than or equal to 1000\",\n\t\t\t\t}\n\t\t\t}\n\n\t\tcase \"page\":\n\t\t\t// no validation rules for Page\n\t\tcase \"deleted\":\n\t\t\t// no validation rules for Deleted\n\t\tdefault:\n\t\t\treturn SearchUsersRequestValidationError{\n\t\t\t\tfield: name,\n\t\t\t\treason: \"invalid field path\",\n\t\t\t}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "b06a4174a53a4ea1ecb57ed1c80d0499", "score": "0.55235374", "text": "func (v *Validator) Validate(structure interface{}) error {\n\t// Use the ShellHub package validator to validate the request body.\n\tif ok, err := v.validator.Struct(structure); !ok {\n\t\tfields, err := validator.GetInvalidFieldsFromErr(structure, err)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\treturn errors.NewErrInvalidEntity(fields)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "f5d6cfa9ff82dd2fcffa081bc0fd33d8", "score": "0.55222595", "text": "func (e Example) Validate(path *valley.Path) []valley.ConstraintViolation {\n\tvar violations []valley.ConstraintViolation\n\n\tpath.Write(\".\")\n\n\t{\n\t\t// MutuallyInclusive uses it's own block to lock down nonEmpty's scope.\n\t\tvar nonEmpty []string\n\n\t\tif !(len(e.Text) == 0) {\n\t\t\tnonEmpty = append(nonEmpty, \"text\")\n\t\t}\n\n\t\tif !(len(e.Texts) == 0) {\n\t\t\tnonEmpty = append(nonEmpty, \"texts\")\n\t\t}\n\n\t\tif len(nonEmpty) > 0 && len(nonEmpty) != 2 {\n\n\t\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\t\tPath: path.String(),\n\t\t\t\tPathKind: \"struct\",\n\t\t\t\tMessage: \"fields are mutually inclusive\",\n\t\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\t\"fields\": []string{\"text\", \"texts\"},\n\t\t\t\t},\n\t\t\t})\n\n\t\t}\n\t}\n\n\t{\n\t\t// MutuallyInclusive uses it's own block to lock down nonEmpty's scope.\n\t\tvar nonEmpty []string\n\n\t\tif !(e.Int == 0) {\n\t\t\tnonEmpty = append(nonEmpty, \"int\")\n\t\t}\n\n\t\tif !(e.Int2 == nil) {\n\t\t\tnonEmpty = append(nonEmpty, \"int2\")\n\t\t}\n\n\t\tif !(len(e.Ints) == 0) {\n\t\t\tnonEmpty = append(nonEmpty, \"ints\")\n\t\t}\n\n\t\tif len(nonEmpty) > 0 && len(nonEmpty) != 3 {\n\n\t\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\t\tPath: path.String(),\n\t\t\t\tPathKind: \"struct\",\n\t\t\t\tMessage: \"fields are mutually inclusive\",\n\t\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\t\"fields\": []string{\"int\", \"int2\", \"ints\"},\n\t\t\t\t},\n\t\t\t})\n\n\t\t}\n\t}\n\n\t{\n\t\t// ExactlyNRequired uses it's own block to lock down nonEmpty's scope.\n\t\tvar nonEmpty []string\n\n\t\tif !(e.Int == 0) {\n\t\t\tnonEmpty = append(nonEmpty, \"int\")\n\t\t}\n\n\t\tif !(e.Int2 == nil) {\n\t\t\tnonEmpty = append(nonEmpty, \"int2\")\n\t\t}\n\n\t\tif !(len(e.Ints) == 0) {\n\t\t\tnonEmpty = append(nonEmpty, \"ints\")\n\t\t}\n\n\t\tif !(len(e.Text) == 0) {\n\t\t\tnonEmpty = append(nonEmpty, \"text\")\n\t\t}\n\n\t\tif len(nonEmpty) != 3 {\n\n\t\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\t\tPath: path.String(),\n\t\t\t\tPathKind: \"struct\",\n\t\t\t\tMessage: \"exact number of required fields not met\",\n\t\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\t\"num_required\": 3,\n\t\t\t\t\t\"fields\": []string{\"int\", \"int2\", \"ints\", \"text\"},\n\t\t\t\t},\n\t\t\t})\n\n\t\t}\n\t}\n\n\tif e.Adults < 1 {\n\t\tsize := path.Write(\"adults\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"minimum value not met\",\n\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\"minimum\": 1,\n\t\t\t},\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif e.Adults > 9 {\n\t\tsize := path.Write(\"adults\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"maximum value exceeded\",\n\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\"maximum\": 9,\n\t\t\t},\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif e.Bool == false {\n\t\tsize := path.Write(\"bool\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"values must not be equal\",\n\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\"equal_to\": false,\n\t\t\t},\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif !reflect.DeepEqual(e.Bool, true) {\n\t\tsize := path.Write(\"bool\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"values must be deeply equal\",\n\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\"deeply_equal_to\": true,\n\t\t\t},\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif len(e.Chan) > 12 {\n\t\tsize := path.Write(\"chan\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"maximum length exceeded\",\n\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\"maximum\": 12,\n\t\t\t},\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif e.Children < 0 {\n\t\tsize := path.Write(\"children\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"minimum value not met\",\n\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\"minimum\": 0,\n\t\t\t},\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif e.Children != e.Adults+2 {\n\t\tsize := path.Write(\"children\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"values must be equal\",\n\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\"equal_to\": e.Adults + 2,\n\t\t\t},\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif e.Children > int(math.Max(float64(8-(e.Adults-1)), 0)) {\n\t\tsize := path.Write(\"children\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"maximum value exceeded\",\n\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\"maximum\": int(math.Max(float64(8-(e.Adults-1)), 0)),\n\t\t\t},\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif e.Float != math.Pi {\n\t\tsize := path.Write(\"float\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"values must be equal\",\n\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\"equal_to\": math.Pi,\n\t\t\t},\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif e.Int == 0 {\n\t\tsize := path.Write(\"int\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"a value is required\",\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif e.Int2 == nil {\n\t\tsize := path.Write(\"int2\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"a value is required\",\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif e.Int2 == nil {\n\t\tsize := path.Write(\"int2\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"value must not be nil\",\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif e.Int2 != nil && *e.Int2 < 0 {\n\t\tsize := path.Write(\"int2\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"minimum value not met\",\n\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\"minimum\": 0,\n\t\t\t},\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif len(e.Ints) == 0 {\n\t\tsize := path.Write(\"ints\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"a value is required\",\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif len(e.Ints) > 3 {\n\t\tsize := path.Write(\"ints\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"maximum length exceeded\",\n\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\"maximum\": 3,\n\t\t\t},\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tfor i, element := range e.Ints {\n\n\t\tif element == 0 {\n\t\t\tsize := path.Write(\"ints.[\" + strconv.Itoa(i) + \"]\")\n\t\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\t\tPath: path.String(),\n\t\t\t\tPathKind: \"element\",\n\t\t\t\tMessage: \"a value is required\",\n\t\t\t})\n\t\t\tpath.TruncateRight(size)\n\t\t}\n\n\t\tif element < 0 {\n\t\t\tsize := path.Write(\"ints.[\" + strconv.Itoa(i) + \"]\")\n\t\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\t\tPath: path.String(),\n\t\t\t\tPathKind: \"element\",\n\t\t\t\tMessage: \"minimum value not met\",\n\t\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\t\"minimum\": 0,\n\t\t\t\t},\n\t\t\t})\n\t\t\tpath.TruncateRight(size)\n\t\t}\n\n\t}\n\n\tif e.Nested == nil {\n\t\tsize := path.Write(\"nested\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"a value is required\",\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif e.Nested != nil {\n\t\tsize := path.Write(\"nested\")\n\t\tviolations = append(violations, e.Nested.Validate(path)...)\n\t\tpath.TruncateRight(size)\n\t}\n\n\tfor key := range e.NestedMap {\n\t\tsize := path.Write(\"nested_map.[\" + fmt.Sprintf(\"%v\", key) + \"]\")\n\t\tviolations = append(violations, key.Validate(path)...)\n\t\tpath.TruncateRight(size)\n\n\t}\n\n\tfor i, element := range e.Nesteds {\n\t\tif element != nil {\n\t\t\tsize := path.Write(\"nesteds.[\" + strconv.Itoa(i) + \"]\")\n\t\t\tviolations = append(violations, element.Validate(path)...)\n\t\t\tpath.TruncateRight(size)\n\t\t}\n\n\t}\n\n\tif len(e.Text) == 0 {\n\t\tsize := path.Write(\"text\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"a value is required\",\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif !patternGreeting.MatchString(e.Text) {\n\t\tsize := path.Write(\"text\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"value must match regular expression\",\n\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\"regexp\": patternGreeting.String(),\n\t\t\t},\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif len(e.Text) > 12 {\n\t\tsize := path.Write(\"text\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"maximum length exceeded\",\n\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\"maximum\": 12,\n\t\t\t},\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif len(e.Text) != 5 {\n\t\tsize := path.Write(\"text\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"exact length not met\",\n\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\"exactly\": 5,\n\t\t\t},\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif e.Text != \"Hello, World!\" && e.Text != \"Hello, SeerUK!\" && e.Text != \"Hello, GitHub!\" {\n\t\tsize := path.Write(\"text\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"value must be one of the allowed values\",\n\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\"allowed\": []interface{}{\"Hello, World!\", \"Hello, SeerUK!\", \"Hello, GitHub!\"},\n\t\t\t},\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif strings.HasPrefix(e.Text, \"custom\") && len(e.Text) == 32 {\n\t\tsize := path.Write(\"text\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"\\\"value must be a valid custom ID\\\"\",\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif len(e.Text) > 32 {\n\n\t\tif len(e.Text) == 0 {\n\t\t\tsize := path.Write(\"text\")\n\t\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\t\tPath: path.String(),\n\t\t\t\tPathKind: \"field\",\n\t\t\t\tMessage: \"a value is required\",\n\t\t\t})\n\t\t\tpath.TruncateRight(size)\n\t\t}\n\n\t\tif len(e.Text) < 64 {\n\t\t\tsize := path.Write(\"text\")\n\t\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\t\tPath: path.String(),\n\t\t\t\tPathKind: \"field\",\n\t\t\t\tMessage: \"minimum length not met\",\n\t\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\t\"minimum\": 64,\n\t\t\t\t},\n\t\t\t})\n\t\t\tpath.TruncateRight(size)\n\t\t}\n\n\t}\n\n\tif len(e.TextMap) == 0 {\n\t\tsize := path.Write(\"text_map\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"a value is required\",\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tfor i, element := range e.TextMap {\n\n\t\tif len(element) == 0 {\n\t\t\tsize := path.Write(\"text_map.[\" + fmt.Sprintf(\"%v\", i) + \"]\")\n\t\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\t\tPath: path.String(),\n\t\t\t\tPathKind: \"element\",\n\t\t\t\tMessage: \"a value is required\",\n\t\t\t})\n\t\t\tpath.TruncateRight(size)\n\t\t}\n\n\t}\n\n\tfor key := range e.TextMap {\n\n\t\tif len(key) < 10 {\n\t\t\tsize := path.Write(\"text_map.[\" + fmt.Sprintf(\"%v\", key) + \"]\")\n\t\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\t\tPath: path.String(),\n\t\t\t\tPathKind: \"key\",\n\t\t\t\tMessage: \"minimum length not met\",\n\t\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\t\"minimum\": 10,\n\t\t\t\t},\n\t\t\t})\n\t\t\tpath.TruncateRight(size)\n\t\t}\n\n\t}\n\n\tif !e.Time.Before(timeYosemite) {\n\t\tsize := path.Write(\"time\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"value must be before time\",\n\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\"time\": timeYosemite.Format(time.RFC3339),\n\t\t\t},\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif len(e.Times) < 1 {\n\t\tsize := path.Write(\"times\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"minimum length not met\",\n\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\"minimum\": 1,\n\t\t\t},\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tfor i, element := range e.Times {\n\n\t\tif !element.Before(timeYosemite) {\n\t\t\tsize := path.Write(\"times.[\" + strconv.Itoa(i) + \"]\")\n\t\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\t\tPath: path.String(),\n\t\t\t\tPathKind: \"element\",\n\t\t\t\tMessage: \"value must be before time\",\n\t\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\t\"time\": timeYosemite.Format(time.RFC3339),\n\t\t\t\t},\n\t\t\t})\n\t\t\tpath.TruncateRight(size)\n\t\t}\n\n\t}\n\n\tpath.TruncateRight(1)\n\n\treturn violations\n}", "title": "" }, { "docid": "c554637688feff806b74e3b2912e47e7", "score": "0.551247", "text": "func (s *AgentDetails) Validate() error {\n\tinvalidParams := request.ErrInvalidParams{Context: \"AgentDetails\"}\n\tif s.AgentVersion == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"AgentVersion\"))\n\t}\n\tif s.AgentVersion != nil && len(*s.AgentVersion) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"AgentVersion\", 1))\n\t}\n\tif s.ComponentVersions == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"ComponentVersions\"))\n\t}\n\tif s.ComponentVersions != nil && len(s.ComponentVersions) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"ComponentVersions\", 1))\n\t}\n\tif s.InstanceId == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"InstanceId\"))\n\t}\n\tif s.InstanceId != nil && len(*s.InstanceId) < 10 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"InstanceId\", 10))\n\t}\n\tif s.InstanceType == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"InstanceType\"))\n\t}\n\tif s.InstanceType != nil && len(*s.InstanceType) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"InstanceType\", 1))\n\t}\n\tif s.ComponentVersions != nil {\n\t\tfor i, v := range s.ComponentVersions {\n\t\t\tif v == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif err := v.Validate(); err != nil {\n\t\t\t\tinvalidParams.AddNested(fmt.Sprintf(\"%s[%v]\", \"ComponentVersions\", i), err.(request.ErrInvalidParams))\n\t\t\t}\n\t\t}\n\t}\n\n\tif invalidParams.Len() > 0 {\n\t\treturn invalidParams\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "fb1e1bfe1012d8f1b628166693c822cc", "score": "0.5507423", "text": "func (s *CdmaObj) Validate() error {\n\tinvalidParams := request.ErrInvalidParams{Context: \"CdmaObj\"}\n\tif s.BaseLat != nil && *s.BaseLat < -90 {\n\t\tinvalidParams.Add(request.NewErrParamMinValue(\"BaseLat\", -90))\n\t}\n\tif s.BaseLng != nil && *s.BaseLng < -180 {\n\t\tinvalidParams.Add(request.NewErrParamMinValue(\"BaseLng\", -180))\n\t}\n\tif s.BaseStationId == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"BaseStationId\"))\n\t}\n\tif s.CdmaNmr != nil && len(s.CdmaNmr) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"CdmaNmr\", 1))\n\t}\n\tif s.NetworkId == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"NetworkId\"))\n\t}\n\tif s.PilotPower != nil && *s.PilotPower < -142 {\n\t\tinvalidParams.Add(request.NewErrParamMinValue(\"PilotPower\", -142))\n\t}\n\tif s.SystemId == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"SystemId\"))\n\t}\n\tif s.SystemId != nil && *s.SystemId < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinValue(\"SystemId\", 1))\n\t}\n\tif s.CdmaLocalId != nil {\n\t\tif err := s.CdmaLocalId.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"CdmaLocalId\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.CdmaNmr != nil {\n\t\tfor i, v := range s.CdmaNmr {\n\t\t\tif v == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif err := v.Validate(); err != nil {\n\t\t\t\tinvalidParams.AddNested(fmt.Sprintf(\"%s[%v]\", \"CdmaNmr\", i), err.(request.ErrInvalidParams))\n\t\t\t}\n\t\t}\n\t}\n\n\tif invalidParams.Len() > 0 {\n\t\treturn invalidParams\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "34620d3b6b710b54fef404dc033fb2f4", "score": "0.5506633", "text": "func Validate(values []*Value) error {\n\t// Going through all values\n\tfor _, value := range values {\n\t\t// Setting default, if value string isn't set\n\t\tresolvedInput := value.Input\n\t\tif resolvedInput == \"\" {\n\t\t\tresolvedInput = value.Default\n\t\t}\n\n\t\t// Going through all rules for each value\n\t\tfor _, rule := range value.Rules {\n\t\t\t// Verifying rule passes\n\t\t\terr := rule(value.Name, resolvedInput)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t\t// Set primitive + null type handlers\n\t\tif value.TypeHandler == nil {\n\t\t\terr := applyTypeHandler(value)\n\t\t\tif err != nil {\n\t\t\t\tpanic(err.Error())\n\t\t\t}\n\t\t}\n\n\t\t// Validate against type\n\t\terr := value.TypeHandler(resolvedInput, value)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "196553345eae734c7acb298617be8ac5", "score": "0.55008453", "text": "func (m LOAType) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// value enum\n\tif err := m.validateLOATypeEnum(\"\", \"body\", m); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c844a92fdf7330ad6f7f1c72fd6fd5b5", "score": "0.54976606", "text": "func (v *Validation) Validate(value interface{}, obj reflect.Value) *ValidationError {\r\n\treturn &ValidationError{\r\n\t\tKey: v.fieldName,\r\n\t\tMessage: \"validation not implemented\",\r\n\t}\r\n}", "title": "" }, { "docid": "e7f7f25f6544e2f91c077dc0be8160c9", "score": "0.5497042", "text": "func (s *CreateGlobalSecondaryIndexAction) Validate() error {\n\tinvalidParams := request.ErrInvalidParams{Context: \"CreateGlobalSecondaryIndexAction\"}\n\tif s.IndexName == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"IndexName\"))\n\t}\n\tif s.IndexName != nil && len(*s.IndexName) < 3 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"IndexName\", 3))\n\t}\n\tif s.KeySchema == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"KeySchema\"))\n\t}\n\tif s.KeySchema != nil && len(s.KeySchema) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"KeySchema\", 1))\n\t}\n\tif s.Projection == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"Projection\"))\n\t}\n\tif s.KeySchema != nil {\n\t\tfor i, v := range s.KeySchema {\n\t\t\tif v == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif err := v.Validate(); err != nil {\n\t\t\t\tinvalidParams.AddNested(fmt.Sprintf(\"%s[%v]\", \"KeySchema\", i), err.(request.ErrInvalidParams))\n\t\t\t}\n\t\t}\n\t}\n\tif s.Projection != nil {\n\t\tif err := s.Projection.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"Projection\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.ProvisionedThroughput != nil {\n\t\tif err := s.ProvisionedThroughput.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"ProvisionedThroughput\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\n\tif invalidParams.Len() > 0 {\n\t\treturn invalidParams\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "66543f632903197935784dd62b3ca4c8", "score": "0.5496284", "text": "func (v *Validator) Validate(i interface{}) error {\n\treturn v.validator.Struct(i)\n}", "title": "" }, { "docid": "66543f632903197935784dd62b3ca4c8", "score": "0.5496284", "text": "func (v *Validator) Validate(i interface{}) error {\n\treturn v.validator.Struct(i)\n}", "title": "" }, { "docid": "66543f632903197935784dd62b3ca4c8", "score": "0.5496284", "text": "func (v *Validator) Validate(i interface{}) error {\n\treturn v.validator.Struct(i)\n}", "title": "" }, { "docid": "96084de563333a8cb2b2d7ca9b7d45f3", "score": "0.5488848", "text": "func (user *User) Validate() error {\n\tvalidate := validator.New()\n\treturn validate.Struct(user)\n\n}", "title": "" }, { "docid": "b6fd5f745ab1e7d1104726ceec1aeded", "score": "0.548876", "text": "func (m *CustomField) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateEnums(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateNested(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateRequiredStatuses(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "429d75ce234e2002816b0d89a0e90505", "score": "0.54884094", "text": "func (s *Address) Validate() error {\n\tinvalidParams := request.ErrInvalidParams{Context: \"Address\"}\n\tif s.City == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"City\"))\n\t}\n\tif s.City != nil && len(*s.City) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"City\", 1))\n\t}\n\tif s.Company != nil && len(*s.Company) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"Company\", 1))\n\t}\n\tif s.Country == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"Country\"))\n\t}\n\tif s.Country != nil && len(*s.Country) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"Country\", 1))\n\t}\n\tif s.EmailAddress != nil && len(*s.EmailAddress) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"EmailAddress\", 1))\n\t}\n\tif s.Name == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"Name\"))\n\t}\n\tif s.Name != nil && len(*s.Name) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"Name\", 1))\n\t}\n\tif s.PhoneNumber != nil && len(*s.PhoneNumber) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"PhoneNumber\", 1))\n\t}\n\tif s.PostalCode == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"PostalCode\"))\n\t}\n\tif s.PostalCode != nil && len(*s.PostalCode) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"PostalCode\", 1))\n\t}\n\tif s.StateOrProvince == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"StateOrProvince\"))\n\t}\n\tif s.StateOrProvince != nil && len(*s.StateOrProvince) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"StateOrProvince\", 1))\n\t}\n\tif s.Street1 == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"Street1\"))\n\t}\n\tif s.Street1 != nil && len(*s.Street1) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"Street1\", 1))\n\t}\n\tif s.Street2 != nil && len(*s.Street2) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"Street2\", 1))\n\t}\n\tif s.Street3 != nil && len(*s.Street3) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"Street3\", 1))\n\t}\n\n\tif invalidParams.Len() > 0 {\n\t\treturn invalidParams\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "6fd816d448132d62a3420b56aa3a318e", "score": "0.54879147", "text": "func (m *PacketBrokerInfo) ValidateFields(paths ...string) error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tif len(paths) == 0 {\n\t\tpaths = PacketBrokerInfoFieldPathsNested\n\t}\n\n\tfor name, subs := range _processPaths(append(paths[:0:0], paths...)) {\n\t\t_ = subs\n\t\tswitch name {\n\t\tcase \"registration\":\n\n\t\t\tif v, ok := interface{}(m.GetRegistration()).(interface{ ValidateFields(...string) error }); ok {\n\t\t\t\tif err := v.ValidateFields(subs...); err != nil {\n\t\t\t\t\treturn PacketBrokerInfoValidationError{\n\t\t\t\t\t\tfield: \"registration\",\n\t\t\t\t\t\treason: \"embedded message failed validation\",\n\t\t\t\t\t\tcause: err,\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\tcase \"forwarder_enabled\":\n\t\t\t// no validation rules for ForwarderEnabled\n\t\tcase \"home_network_enabled\":\n\t\t\t// no validation rules for HomeNetworkEnabled\n\t\tcase \"register_enabled\":\n\t\t\t// no validation rules for RegisterEnabled\n\t\tdefault:\n\t\t\treturn PacketBrokerInfoValidationError{\n\t\t\t\tfield: name,\n\t\t\t\treason: \"invalid field path\",\n\t\t\t}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "7a39c272fdfe40ff08e6637777f53d49", "score": "0.5483368", "text": "func (m *ContainerType) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\t// no validation rules for Id\n\n\t// no validation rules for ContainerItemTypeId\n\n\t// no validation rules for MaxNumber\n\n\t// no validation rules for MaxVolume\n\n\t// no validation rules for MaxWeight\n\n\treturn nil\n}", "title": "" }, { "docid": "c85880d67e99a550d296a7e590fc6e81", "score": "0.54823405", "text": "func (s *UpdateMissionProfileInput) Validate() error {\n\tinvalidParams := request.ErrInvalidParams{Context: \"UpdateMissionProfileInput\"}\n\tif s.MinimumViableContactDurationSeconds != nil && *s.MinimumViableContactDurationSeconds < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinValue(\"MinimumViableContactDurationSeconds\", 1))\n\t}\n\tif s.MissionProfileId == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"MissionProfileId\"))\n\t}\n\tif s.MissionProfileId != nil && len(*s.MissionProfileId) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"MissionProfileId\", 1))\n\t}\n\tif s.Name != nil && len(*s.Name) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"Name\", 1))\n\t}\n\tif s.StreamsKmsKey != nil {\n\t\tif err := s.StreamsKmsKey.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"StreamsKmsKey\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\n\tif invalidParams.Len() > 0 {\n\t\treturn invalidParams\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "787134be0cb8e367a83cdfead7d99026", "score": "0.54821956", "text": "func (s *CreateCustomActionTypeInput) Validate() error {\n\tinvalidParams := aws.ErrInvalidParams{Context: \"CreateCustomActionTypeInput\"}\n\tif len(s.Category) == 0 {\n\t\tinvalidParams.Add(aws.NewErrParamRequired(\"Category\"))\n\t}\n\n\tif s.InputArtifactDetails == nil {\n\t\tinvalidParams.Add(aws.NewErrParamRequired(\"InputArtifactDetails\"))\n\t}\n\n\tif s.OutputArtifactDetails == nil {\n\t\tinvalidParams.Add(aws.NewErrParamRequired(\"OutputArtifactDetails\"))\n\t}\n\n\tif s.Provider == nil {\n\t\tinvalidParams.Add(aws.NewErrParamRequired(\"Provider\"))\n\t}\n\tif s.Provider != nil && len(*s.Provider) < 1 {\n\t\tinvalidParams.Add(aws.NewErrParamMinLen(\"Provider\", 1))\n\t}\n\n\tif s.Version == nil {\n\t\tinvalidParams.Add(aws.NewErrParamRequired(\"Version\"))\n\t}\n\tif s.Version != nil && len(*s.Version) < 1 {\n\t\tinvalidParams.Add(aws.NewErrParamMinLen(\"Version\", 1))\n\t}\n\tif s.ConfigurationProperties != nil {\n\t\tfor i, v := range s.ConfigurationProperties {\n\t\t\tif err := v.Validate(); err != nil {\n\t\t\t\tinvalidParams.AddNested(fmt.Sprintf(\"%s[%v]\", \"ConfigurationProperties\", i), err.(aws.ErrInvalidParams))\n\t\t\t}\n\t\t}\n\t}\n\tif s.InputArtifactDetails != nil {\n\t\tif err := s.InputArtifactDetails.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"InputArtifactDetails\", err.(aws.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.OutputArtifactDetails != nil {\n\t\tif err := s.OutputArtifactDetails.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"OutputArtifactDetails\", err.(aws.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.Settings != nil {\n\t\tif err := s.Settings.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"Settings\", err.(aws.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.Tags != nil {\n\t\tfor i, v := range s.Tags {\n\t\t\tif err := v.Validate(); err != nil {\n\t\t\t\tinvalidParams.AddNested(fmt.Sprintf(\"%s[%v]\", \"Tags\", i), err.(aws.ErrInvalidParams))\n\t\t\t}\n\t\t}\n\t}\n\n\tif invalidParams.Len() > 0 {\n\t\treturn invalidParams\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "02623cd7c811db8e875caa9cbac30922", "score": "0.54815596", "text": "func (s *TableCreationParameters) Validate() error {\n\tinvalidParams := request.ErrInvalidParams{Context: \"TableCreationParameters\"}\n\tif s.AttributeDefinitions == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"AttributeDefinitions\"))\n\t}\n\tif s.KeySchema == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"KeySchema\"))\n\t}\n\tif s.KeySchema != nil && len(s.KeySchema) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"KeySchema\", 1))\n\t}\n\tif s.TableName == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"TableName\"))\n\t}\n\tif s.TableName != nil && len(*s.TableName) < 3 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"TableName\", 3))\n\t}\n\tif s.AttributeDefinitions != nil {\n\t\tfor i, v := range s.AttributeDefinitions {\n\t\t\tif v == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif err := v.Validate(); err != nil {\n\t\t\t\tinvalidParams.AddNested(fmt.Sprintf(\"%s[%v]\", \"AttributeDefinitions\", i), err.(request.ErrInvalidParams))\n\t\t\t}\n\t\t}\n\t}\n\tif s.GlobalSecondaryIndexes != nil {\n\t\tfor i, v := range s.GlobalSecondaryIndexes {\n\t\t\tif v == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif err := v.Validate(); err != nil {\n\t\t\t\tinvalidParams.AddNested(fmt.Sprintf(\"%s[%v]\", \"GlobalSecondaryIndexes\", i), err.(request.ErrInvalidParams))\n\t\t\t}\n\t\t}\n\t}\n\tif s.KeySchema != nil {\n\t\tfor i, v := range s.KeySchema {\n\t\t\tif v == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif err := v.Validate(); err != nil {\n\t\t\t\tinvalidParams.AddNested(fmt.Sprintf(\"%s[%v]\", \"KeySchema\", i), err.(request.ErrInvalidParams))\n\t\t\t}\n\t\t}\n\t}\n\tif s.ProvisionedThroughput != nil {\n\t\tif err := s.ProvisionedThroughput.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"ProvisionedThroughput\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\n\tif invalidParams.Len() > 0 {\n\t\treturn invalidParams\n\t}\n\treturn nil\n}", "title": "" } ]
9791b3654936dfb2d3fbc24695ece2ef
ScanX is like Scan, but panics if an error occurs.
[ { "docid": "7b4c0292f17691ef4a369581496d98cc", "score": "0.0", "text": "func (mlgb *MetricLabelGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := mlgb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" } ]
[ { "docid": "fc46b51418608701bad3c01315efe43a", "score": "0.77462333", "text": "func (as *AmountpaidSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := as.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "aab0c6a814e938cb13ed7b029b1e4eb7", "score": "0.771877", "text": "func (drs *DataRoomSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := drs.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "b2acc1e4ca1a136f5bc96598563ab80f", "score": "0.770878", "text": "func (rs *ResearchSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := rs.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "cc6d9016863735cf60f373402793b51f", "score": "0.7695937", "text": "func (scis *StatusCheckInSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := scis.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "843eef1f3d9e1b2318dc7ab2e284c3e8", "score": "0.7686652", "text": "func (ss *SettlementSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := ss.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "b151e441b7f43a62495aaf8dce03b804", "score": "0.7680545", "text": "func (srs *StepRunSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := srs.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "d805357d9a0b1ed93183aac0787951ef", "score": "0.76560354", "text": "func (rs *RoominfoSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := rs.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "39ce0a1f1a15194048718d91b7b95416", "score": "0.7649704", "text": "func (irs *InspectionResultSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := irs.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "d277e94399481db559c9f227ed916b0d", "score": "0.76339287", "text": "func (ris *RepairInvoiceSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := ris.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "215281bcd171ccaff75f544fb38b81c2", "score": "0.7629473", "text": "func (os *OfficeroomSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := os.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "4f26aa6d2b54915c8e68c3fb50358ffc", "score": "0.76273197", "text": "func (cs *CarSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := cs.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "9c60a0f752acb5bb041a3c5f4b08de41", "score": "0.76221395", "text": "func (ss *SurgeryappointmentSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := ss.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "4e95b60cdd23ea4d6b912c6375b14ebf", "score": "0.7604577", "text": "func (sds *SensorDataSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := sds.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "b91c05124a3194950522e5c5bf3b741c", "score": "0.7600031", "text": "func (swfss *SurveyWiFiScanSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := swfss.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "65f52ad0ac5d32e8777fe58f737cde91", "score": "0.75997806", "text": "func (bbs *BasicBannerSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := bbs.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "6423a4a1ad5b8b46b813f9118f7e58b2", "score": "0.7586464", "text": "func (css *CardScanSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := css.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "12e2d40fca66e53a763a9fac73e4d505", "score": "0.75620604", "text": "func (sus *SysUserSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := sus.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "c031c07906aa026d4b94a5d036ef57ad", "score": "0.7557203", "text": "func (pis *PlayerIdentifierSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := pis.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "16fd7aad2bdffda5911d8cb5389f1a5f", "score": "0.7545898", "text": "func (ots *OutboundTransactionSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := ots.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "47635d4db599afacbcfd1d97648cd035", "score": "0.7543389", "text": "func (zs *ZoneSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := zs.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "068f25e93b6f3bd302ac9d07b7b66a4a", "score": "0.753548", "text": "func (ds *DentalkindSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := ds.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "61767c775b5b80d4408b62ed09fa3124", "score": "0.75218403", "text": "func (as *AppointmentSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := as.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "a207a7ef20cccb805eb45a165624d8cf", "score": "0.7510463", "text": "func (os *OfficeSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := os.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "fb7fdda0fc315514cae75e1b2edbf2a5", "score": "0.7500149", "text": "func (ibrs *IncidentBasicRuleSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := ibrs.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "7ceaa1c80739d3da1abedb082e64f789", "score": "0.7499738", "text": "func (pcis *PortChannelInterfaceSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := pcis.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "889fd32f4d1ad7ea0c56817133003dd0", "score": "0.74922156", "text": "func (rgb *RoominfoGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := rgb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "9127b599ab9a8bb2ea724117185f86c4", "score": "0.7466912", "text": "func (rgb *ResearchGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := rgb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "44e6790a8d8be003ad1bfe87b161fedc", "score": "0.7462372", "text": "func (cs *ConstructionSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := cs.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "76d7c22da34714a181b6be3c91b6c0d9", "score": "0.7462232", "text": "func (kms *K8sMetricSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := kms.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "08cf59c4dadca4e7ad72dd8382ebafe8", "score": "0.7445136", "text": "func (qs *QuestionSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := qs.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "dd0c04ed54c8e4b26e9343765e0f89ea", "score": "0.7430719", "text": "func (as *ArticleSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := as.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "3d505f1d157f6dbc89831495129dd14b", "score": "0.74263185", "text": "func (vs *VoteSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := vs.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "884f4758f5f8ad141e9ad718a4b9f775", "score": "0.742496", "text": "func (ars *AppointmentResultsSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := ars.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "d90af3d03e0d4c8696148d8e98c9eda7", "score": "0.7416781", "text": "func (pus *ProfileUKMSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := pus.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "fb6a4fcc7bf8586c014337623c018861", "score": "0.74151695", "text": "func (dcs *DeathCertificateSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := dcs.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "41b5de970215cea15214ace43883dada", "score": "0.7412518", "text": "func (pvs *PlaylistVideoSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := pvs.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "a98eaba9cd4286e2c6800a0117434277", "score": "0.74013937", "text": "func (ds *DistrictSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := ds.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "7ab29ab7fb5e7af270d86f01d3bc3218", "score": "0.7400052", "text": "func (jms *JDModelSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := jms.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "65dcba4545e99993519c676db06bb5e7", "score": "0.7397201", "text": "func (uss *UserStatusSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := uss.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "e4881deb2c660832ade29b7146831c18", "score": "0.73858625", "text": "func (hs *HistorySelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := hs.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "3918d74ee5218f25bb2874d68434478b", "score": "0.73857105", "text": "func (drgb *DataRoomGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := drgb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "5647851653e4ce116b91707cdd99e2ba", "score": "0.7377321", "text": "func (ars *ActionsRuleSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := ars.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "26bc35bba3665a324a90d5090b671822", "score": "0.73635113", "text": "func (hs *HeartbeatSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := hs.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "4b214b817e2508fc46ed93002846d56d", "score": "0.7362637", "text": "func (srs *StatusRoomSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := srs.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "2da0f7dde3612d8f03c414d6f4eeae18", "score": "0.7356847", "text": "func (ces *ComprimiseEmailSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := ces.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "769f5ee79757525a480cea077fef3389", "score": "0.7354993", "text": "func (wes *WorkflowEventsSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := wes.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "430b1d09e8352abd84d340570ca1daa2", "score": "0.7348652", "text": "func (pcigb *PortChannelInterfaceGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := pcigb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "3e2fb5c0c36cea5b3267eb33cafcf66d", "score": "0.7345285", "text": "func (bms *BookingMetadatumSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := bms.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "584cf7bb81adb5319d23a9390aa236eb", "score": "0.73444027", "text": "func (srgb *StepRunGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := srgb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "6cf41b9aa10f3081a60ab4164f928524", "score": "0.73423624", "text": "func (uws *UserWalletSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := uws.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "f4c6fb7a989198526cdc9cf0d9f06e6c", "score": "0.7342041", "text": "func (rigb *RepairInvoiceGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := rigb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "9fb44042fca6de69f34c7c0795326dc7", "score": "0.7341552", "text": "func (scigb *StatusCheckInGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := scigb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "061032780c238b7c39034ac4e1b15a11", "score": "0.733127", "text": "func (swfsgb *SurveyWiFiScanGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := swfsgb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "fda18f55efa742985d35656340b79272", "score": "0.7330626", "text": "func (irgb *InspectionResultGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := irgb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "8ae5c4b4d0c20749aceb1211232be0ae", "score": "0.73183894", "text": "func (css *CardScheduleSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := css.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "0a76a86974bd24743d96cedd0216dd36", "score": "0.73175544", "text": "func (sdgb *SensorDataGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := sdgb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "ce9d986f8cc020ff43abdeac0c95bc77", "score": "0.7316798", "text": "func (ts *TemplateSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := ts.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "4955d7f1949d8db0f918c162d9968e5c", "score": "0.7289946", "text": "func (sgb *SettlementGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := sgb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "d8e9f12b21cfba04cc40af0194462133", "score": "0.72838676", "text": "func (cus *CompanyUserSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := cus.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "9463129d432679586dd8913b727836ae", "score": "0.72793406", "text": "func (argb *AppointmentResultsGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := argb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "de11af7eb263a78b809e1808802b26fe", "score": "0.7277308", "text": "func (ahs *AlertHistorySelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := ahs.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "c03c9bb86419ddad3c08e252fac1fb99", "score": "0.72459596", "text": "func (etis *EntityTaxInformationSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := etis.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "3b6a08a1a4d236f0c83024c075e54926", "score": "0.72362936", "text": "func (dgb *DentalkindGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := dgb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "d68279330d6e4a119f659bd146364410", "score": "0.7225902", "text": "func (uls *UrgencyLevelSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := uls.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "6b037acc0906eb4a071669c45a3d0b72", "score": "0.7207925", "text": "func (ois *OrderInfoSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := ois.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "d778d528927e32eb6fdfcdee6c5f6eb5", "score": "0.7206264", "text": "func (csgb *CardScanGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := csgb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "75be5d343fd0183cea3fb7a8f6c44f9d", "score": "0.71979326", "text": "func (pigb *PlayerIdentifierGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := pigb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "5a0af768cc2cc0f86fdee7f9f319d37e", "score": "0.7196266", "text": "func (sgb *SurgeryappointmentGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := sgb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "f5ee537a6cf0e2c97c5041dc5b65b2bc", "score": "0.7182856", "text": "func (olis *OrderLineItemSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := olis.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "1d403e1dd6608f703463f58c7390330d", "score": "0.7182014", "text": "func (uwgb *UserWalletGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := uwgb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "f607fc642f1983126a1fd8bd37ed0450", "score": "0.7168147", "text": "func (sugb *SysUserGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := sugb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "5d7a761610957a81cc56ae9f1f1af0fa", "score": "0.71668833", "text": "func (rgb *RevisionGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := rgb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "86874e3fb8a39f3b1ac2dd0523a20e97", "score": "0.71579146", "text": "func (sos *SubjectsOfferedSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := sos.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "bc3a1dca02d56a59ee367d8e32700e32", "score": "0.7152478", "text": "func (srgb *StatusRoomGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := srgb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "69ba7d12d9da0f838e4109f4b228a894", "score": "0.7150646", "text": "func (rs *RevisionSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := rs.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "93d3605d3a1f85c053016f023a804f08", "score": "0.71496105", "text": "func (cgb *CarGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := cgb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "a4331f8a584ed1ab0e74621b09d9f98f", "score": "0.7123966", "text": "func (kots *K8sObjectTagSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := kots.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "de29ca89cc7e0611f5b95c6d4a867424", "score": "0.71196026", "text": "func (mls *MetricLabelSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := mls.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "1dab31dd74c01fe24e0f0244f76b46c9", "score": "0.71180326", "text": "func (csgb *CardScheduleGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := csgb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "de4c157835f9d02cec2b6c2ee14202f2", "score": "0.71132994", "text": "func (pvgb *PlaylistVideoGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := pvgb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "8441397e7c59419bf3f118bc5b63ebb7", "score": "0.7109632", "text": "func (zgb *ZoneGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := zgb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "2cb9f44101855ea81bff06ed5c939142", "score": "0.71019787", "text": "func (ogb *OfficeGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := ogb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "9754c06354a7a3f95abe8d6d0d6893c0", "score": "0.7100129", "text": "func (ibrgb *IncidentBasicRuleGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := ibrgb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "f0d8763ab96011a789e2e276d94aec56", "score": "0.7094616", "text": "func (ahgb *AlertHistoryGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := ahgb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "7562b9b0f92341b7d9339f6b1b8ec172", "score": "0.708463", "text": "func (qgb *QuestionGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := qgb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "c661edf2d582dd8ca8031e5b87813c55", "score": "0.70794445", "text": "func (cegb *ComprimiseEmailGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := cegb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "9f6fcdc44a475eaca62fedfb31589b1f", "score": "0.7077869", "text": "func (usgb *UserStatusGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := usgb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "438a5ebc5f9da56baf116638d27697f9", "score": "0.7070526", "text": "func (bbgb *BasicBannerGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := bbgb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "8df6b920aa8c4838d00b7bcf95d96848", "score": "0.706112", "text": "func (vgb *VoteGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := vgb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "95017da9f44bdb9661252b812a55ff5d", "score": "0.7056311", "text": "func (agb *AppointmentGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := agb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "d9fb6ef42831b4445b785269a23aec2c", "score": "0.7050093", "text": "func (dgb *DistrictGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := dgb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "132dd9e4a0460ee67071ea0fb54c96e4", "score": "0.70476776", "text": "func (wegb *WorkflowEventsGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := wegb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "d37aa1cd80f449c0351c04d989f759fb", "score": "0.7046649", "text": "func (jmgb *JDModelGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := jmgb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "5a8d5cb0f69367ab5ea689236386c2ee", "score": "0.70454216", "text": "func (dcgb *DeathCertificateGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := dcgb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "83a54a0a3a273f8033272ab881f99acf", "score": "0.7034508", "text": "func (agb *AmountpaidGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := agb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "a5aa2dfc91b0dba505d31470cc41ac5b", "score": "0.7032217", "text": "func (pugb *ProfileUKMGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := pugb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "e96671f5ff63d75bbca44dca9476e131", "score": "0.70200163", "text": "func (rcs *RecommendationsCategorySelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := rcs.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "3571690c286d666beb62a5a9344d41d7", "score": "0.70158213", "text": "func (vds *VacDepartmentSelect) ScanX(ctx context.Context, v interface{}) {\n\tif err := vds.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "93a66e210b02848f9e5e8baaf73824b9", "score": "0.70141256", "text": "func (hgb *HistoryGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := hgb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "86c2660406a9096cfed91526349a8640", "score": "0.7010047", "text": "func (otgb *OutboundTransactionGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := otgb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "31591aee1357f83c2416c35fa253ce1a", "score": "0.69784886", "text": "func (ogb *OfficeroomGroupBy) ScanX(ctx context.Context, v interface{}) {\n\tif err := ogb.Scan(ctx, v); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" } ]
c5230bece2f6c425a2bbb0ff7658f57b
LatestStaked is a free data retrieval call binding the contract method 0x01d9717d. Solidity: function latestStaked(address rollup, address staker) view returns(uint256, bytes32)
[ { "docid": "9f378231f112b692c6852f033faca2a9", "score": "0.8345199", "text": "func (_ValidatorUtils *ValidatorUtilsSession) LatestStaked(rollup common.Address, staker common.Address) (*big.Int, [32]byte, error) {\n\treturn _ValidatorUtils.Contract.LatestStaked(&_ValidatorUtils.CallOpts, rollup, staker)\n}", "title": "" } ]
[ { "docid": "5cc5de25d337f2ebf1506cc29b2b683d", "score": "0.8383744", "text": "func (_ValidatorUtils *ValidatorUtilsCallerSession) LatestStaked(rollup common.Address, staker common.Address) (*big.Int, [32]byte, error) {\n\treturn _ValidatorUtils.Contract.LatestStaked(&_ValidatorUtils.CallOpts, rollup, staker)\n}", "title": "" }, { "docid": "8bf02ee43539b967d355dd6c035aa559", "score": "0.81708336", "text": "func (_ValidatorUtils *ValidatorUtilsCaller) LatestStaked(opts *bind.CallOpts, rollup common.Address, staker common.Address) (*big.Int, [32]byte, error) {\n\tvar out []interface{}\n\terr := _ValidatorUtils.contract.Call(opts, &out, \"latestStaked\", rollup, staker)\n\n\tif err != nil {\n\t\treturn *new(*big.Int), *new([32]byte), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(*big.Int)).(**big.Int)\n\tout1 := *abi.ConvertType(out[1], new([32]byte)).(*[32]byte)\n\n\treturn out0, out1, err\n\n}", "title": "" }, { "docid": "1b57e31fc2671450fbe325ef5fe03f0a", "score": "0.636145", "text": "func (_RollupAdminFacet *RollupAdminFacetCaller) LatestStakedNode(opts *bind.CallOpts, staker common.Address) (*big.Int, error) {\n\tvar out []interface{}\n\terr := _RollupAdminFacet.contract.Call(opts, &out, \"latestStakedNode\", staker)\n\n\tif err != nil {\n\t\treturn *new(*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(*big.Int)).(**big.Int)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "861b1cb084389cb883093898e4452cb9", "score": "0.6286253", "text": "func (_RollupAdminFacet *RollupAdminFacetCallerSession) LatestStakedNode(staker common.Address) (*big.Int, error) {\n\treturn _RollupAdminFacet.Contract.LatestStakedNode(&_RollupAdminFacet.CallOpts, staker)\n}", "title": "" }, { "docid": "5165b4408b7ff135cea61e8156c62da1", "score": "0.6122763", "text": "func (_RollupAdminFacet *RollupAdminFacetSession) LatestStakedNode(staker common.Address) (*big.Int, error) {\n\treturn _RollupAdminFacet.Contract.LatestStakedNode(&_RollupAdminFacet.CallOpts, staker)\n}", "title": "" }, { "docid": "9361c162c4f3f161b6c7b178512666c1", "score": "0.5931371", "text": "func (u *UserAPI) GetStakedBalance(address string, blockHeight ...uint64) (float64, error) {\n\n\tvar height uint64\n\tif len(blockHeight) > 0 {\n\t\theight = blockHeight[0]\n\t}\n\n\tresp, status, err := u.c.call(\"user_getStakedBalance\", util.Map{\n\t\t\"address\": address,\n\t\t\"height\": height})\n\tif err != nil {\n\t\treturn 0, makeReqErrFromCallErr(status, err)\n\t}\n\n\treturn cast.ToFloat64(resp[\"balance\"]), nil\n}", "title": "" }, { "docid": "00806cec15786c6d9a097fa83d32d346", "score": "0.57945776", "text": "func (_ValidatorUtils *ValidatorUtilsCaller) StakerInfo(opts *bind.CallOpts, rollup common.Address, stakerAddress common.Address) (struct {\n\tIsStaked bool\n\tLatestStakedNode *big.Int\n\tAmountStaked *big.Int\n\tCurrentChallenge common.Address\n}, error) {\n\tvar out []interface{}\n\terr := _ValidatorUtils.contract.Call(opts, &out, \"stakerInfo\", rollup, stakerAddress)\n\n\toutstruct := new(struct {\n\t\tIsStaked bool\n\t\tLatestStakedNode *big.Int\n\t\tAmountStaked *big.Int\n\t\tCurrentChallenge common.Address\n\t})\n\tif err != nil {\n\t\treturn *outstruct, err\n\t}\n\n\toutstruct.IsStaked = *abi.ConvertType(out[0], new(bool)).(*bool)\n\toutstruct.LatestStakedNode = *abi.ConvertType(out[1], new(*big.Int)).(**big.Int)\n\toutstruct.AmountStaked = *abi.ConvertType(out[2], new(*big.Int)).(**big.Int)\n\toutstruct.CurrentChallenge = *abi.ConvertType(out[3], new(common.Address)).(*common.Address)\n\n\treturn *outstruct, err\n\n}", "title": "" }, { "docid": "b4cd6e1ec75e56601870d0b04d33e069", "score": "0.5685695", "text": "func (_StakeManager *StakeManagerCaller) GetStaker(opts *bind.CallOpts, _id *big.Int) (StructsStaker, error) {\n\tvar out []interface{}\n\terr := _StakeManager.contract.Call(opts, &out, \"getStaker\", _id)\n\n\tif err != nil {\n\t\treturn *new(StructsStaker), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(StructsStaker)).(*StructsStaker)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "02340ba3341af867291c2c7a4650dc06", "score": "0.56529367", "text": "func (nm *NetworkManager) GetUserUnStakedValue(address string) (*big.Float, error) {\n\tpubkey, _ := erdgo.Bech32ToPubkey(address)\n\thexAddress := hex.EncodeToString(pubkey)\n\tiStake, err := nm.queryScIntResult(utils.ContractAddress, \"getUserUnStakedValue\", []string{hexAddress})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfStake := big.NewFloat(0).SetInt(iStake)\n\tfStake.Quo(fStake, nm.fDenomination)\n\n\treturn fStake, nil\n}", "title": "" }, { "docid": "79bacc4a252ed6a04753c9e8aae9a5c8", "score": "0.5608198", "text": "func Latest(ctx context.Context, l Lookup, after uint64) (swarm.Chunk, error) {\n\tc, _, _, err := l.At(ctx, time.Now().Unix(), after)\n\treturn c, err\n}", "title": "" }, { "docid": "f9ed2062c9ad9313cac079133e66030f", "score": "0.5560885", "text": "func (_RollupAdminFacet *RollupAdminFacetCaller) LastStakeBlock(opts *bind.CallOpts) (*big.Int, error) {\n\tvar out []interface{}\n\terr := _RollupAdminFacet.contract.Call(opts, &out, \"lastStakeBlock\")\n\n\tif err != nil {\n\t\treturn *new(*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(*big.Int)).(**big.Int)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "082088e26629dd29e73a5234a42c3f9e", "score": "0.5532431", "text": "func (_RollupAdminFacet *RollupAdminFacetCaller) GetStakerAddress(opts *bind.CallOpts, stakerNum *big.Int) (common.Address, error) {\n\tvar out []interface{}\n\terr := _RollupAdminFacet.contract.Call(opts, &out, \"getStakerAddress\", stakerNum)\n\n\tif err != nil {\n\t\treturn *new(common.Address), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(common.Address)).(*common.Address)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "2c796c2895a64a072b071884bdf13736", "score": "0.55241346", "text": "func (_ValidatorUtils *ValidatorUtilsCallerSession) StakerInfo(rollup common.Address, stakerAddress common.Address) (struct {\n\tIsStaked bool\n\tLatestStakedNode *big.Int\n\tAmountStaked *big.Int\n\tCurrentChallenge common.Address\n}, error) {\n\treturn _ValidatorUtils.Contract.StakerInfo(&_ValidatorUtils.CallOpts, rollup, stakerAddress)\n}", "title": "" }, { "docid": "fae450ed6b06a8dc1f726f00ff4a0b4e", "score": "0.5512589", "text": "func (_ValidatorUtils *ValidatorUtilsSession) StakerInfo(rollup common.Address, stakerAddress common.Address) (struct {\n\tIsStaked bool\n\tLatestStakedNode *big.Int\n\tAmountStaked *big.Int\n\tCurrentChallenge common.Address\n}, error) {\n\treturn _ValidatorUtils.Contract.StakerInfo(&_ValidatorUtils.CallOpts, rollup, stakerAddress)\n}", "title": "" }, { "docid": "ce50cdfd4a328010c9de927a258d5d82", "score": "0.5468172", "text": "func (_Staking *StakingCaller) TotalStaked(opts *bind.CallOpts) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _Staking.contract.Call(opts, out, \"totalStaked\")\n\treturn *ret0, err\n}", "title": "" }, { "docid": "0f26a7c37736a4f9491d3a5bec4e813a", "score": "0.5416951", "text": "func (_RollupAdminFacet *RollupAdminFacetCaller) ZombieLatestStakedNode(opts *bind.CallOpts, zombieNum *big.Int) (*big.Int, error) {\n\tvar out []interface{}\n\terr := _RollupAdminFacet.contract.Call(opts, &out, \"zombieLatestStakedNode\", zombieNum)\n\n\tif err != nil {\n\t\treturn *new(*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(*big.Int)).(**big.Int)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "3870f7b50f3acc173ecaf9ddb0d2ea09", "score": "0.5407609", "text": "func (k KVStore) GetStaker(ctx cosmos.Context, asset common.Asset, addr common.Address) (Staker, error) {\n\trecord := Staker{\n\t\tAsset: asset,\n\t\tRuneAddress: addr,\n\t\tUnits: cosmos.ZeroUint(),\n\t\tPendingRune: cosmos.ZeroUint(),\n\t}\n\t_, err := k.get(ctx, k.GetKey(ctx, prefixStaker, record.Key()), &record)\n\treturn record, err\n}", "title": "" }, { "docid": "d79db986640992183e33a7debf3c7e8b", "score": "0.5395141", "text": "func (client *EthClient) GetLatestBlock() (uint32, common.Hash, error) {\r\n\theader, err := client.HeaderByNumber(context.Background(), nil)\r\n\tif err != nil {\r\n\t\treturn 0, common.BytesToHash([]byte{}), err\r\n\t}\r\n\treturn uint32(header.Number.Int64()), header.Hash(), nil\r\n}", "title": "" }, { "docid": "3fb782c04c6205ac32f64e092faad7b6", "score": "0.5386653", "text": "func (_RollupAdminFacet *RollupAdminFacetCallerSession) LastStakeBlock() (*big.Int, error) {\n\treturn _RollupAdminFacet.Contract.LastStakeBlock(&_RollupAdminFacet.CallOpts)\n}", "title": "" }, { "docid": "97dff186b5048481eef9f050c34a9c80", "score": "0.53511417", "text": "func (_RollupAdminFacet *RollupAdminFacetCaller) AmountStaked(opts *bind.CallOpts, staker common.Address) (*big.Int, error) {\n\tvar out []interface{}\n\terr := _RollupAdminFacet.contract.Call(opts, &out, \"amountStaked\", staker)\n\n\tif err != nil {\n\t\treturn *new(*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(*big.Int)).(**big.Int)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "d00bc21bbe38ce0757f53aaf0dee3083", "score": "0.5350079", "text": "func (_RollupAdminFacet *RollupAdminFacetSession) LastStakeBlock() (*big.Int, error) {\n\treturn _RollupAdminFacet.Contract.LastStakeBlock(&_RollupAdminFacet.CallOpts)\n}", "title": "" }, { "docid": "1b71fd33a382f8ebc9878c36e67979be", "score": "0.5335372", "text": "func (_RollupAdminFacet *RollupAdminFacetCallerSession) GetStakerAddress(stakerNum *big.Int) (common.Address, error) {\n\treturn _RollupAdminFacet.Contract.GetStakerAddress(&_RollupAdminFacet.CallOpts, stakerNum)\n}", "title": "" }, { "docid": "743245088291056c21e099c9cb554532", "score": "0.5308355", "text": "func (_RollupAdminFacet *RollupAdminFacetCallerSession) AmountStaked(staker common.Address) (*big.Int, error) {\n\treturn _RollupAdminFacet.Contract.AmountStaked(&_RollupAdminFacet.CallOpts, staker)\n}", "title": "" }, { "docid": "c82dc2a1deecab66b6ec150c7f3849ca", "score": "0.5291254", "text": "func (_Staking *StakingSession) Unstake(_bucketIndex *big.Int, _data []byte) (*types.Transaction, error) {\n\treturn _Staking.Contract.Unstake(&_Staking.TransactOpts, _bucketIndex, _data)\n}", "title": "" }, { "docid": "fc14f38a95ca69c9a854c1577e67aef6", "score": "0.5263918", "text": "func (_StakeManager *StakeManagerCaller) Stakers(opts *bind.CallOpts, arg0 *big.Int) (struct {\n\tId *big.Int\n\tAddress common.Address\n\tStake *big.Int\n\tEpochStaked *big.Int\n\tEpochLastCommitted *big.Int\n\tEpochLastRevealed *big.Int\n\tAcceptDelegation bool\n\tCommission *big.Int\n\tTokenAddress common.Address\n}, error) {\n\tvar out []interface{}\n\terr := _StakeManager.contract.Call(opts, &out, \"stakers\", arg0)\n\n\toutstruct := new(struct {\n\t\tId *big.Int\n\t\tAddress common.Address\n\t\tStake *big.Int\n\t\tEpochStaked *big.Int\n\t\tEpochLastCommitted *big.Int\n\t\tEpochLastRevealed *big.Int\n\t\tAcceptDelegation bool\n\t\tCommission *big.Int\n\t\tTokenAddress common.Address\n\t})\n\tif err != nil {\n\t\treturn *outstruct, err\n\t}\n\n\toutstruct.Id = *abi.ConvertType(out[0], new(*big.Int)).(**big.Int)\n\toutstruct.Address = *abi.ConvertType(out[1], new(common.Address)).(*common.Address)\n\toutstruct.Stake = *abi.ConvertType(out[2], new(*big.Int)).(**big.Int)\n\toutstruct.EpochStaked = *abi.ConvertType(out[3], new(*big.Int)).(**big.Int)\n\toutstruct.EpochLastCommitted = *abi.ConvertType(out[4], new(*big.Int)).(**big.Int)\n\toutstruct.EpochLastRevealed = *abi.ConvertType(out[5], new(*big.Int)).(**big.Int)\n\toutstruct.AcceptDelegation = *abi.ConvertType(out[6], new(bool)).(*bool)\n\toutstruct.Commission = *abi.ConvertType(out[7], new(*big.Int)).(**big.Int)\n\toutstruct.TokenAddress = *abi.ConvertType(out[8], new(common.Address)).(*common.Address)\n\n\treturn *outstruct, err\n\n}", "title": "" }, { "docid": "19038e0b64f9fea7b8b0ecc1c6984d41", "score": "0.5240044", "text": "func (_Staking *StakingTransactorSession) Unstake(_bucketIndex *big.Int, _data []byte) (*types.Transaction, error) {\n\treturn _Staking.Contract.Unstake(&_Staking.TransactOpts, _bucketIndex, _data)\n}", "title": "" }, { "docid": "4ac5cba635ec1f58905cc776b6e37158", "score": "0.5239695", "text": "func (_StakeManager *StakeManagerCallerSession) GetStaker(_id *big.Int) (StructsStaker, error) {\n\treturn _StakeManager.Contract.GetStaker(&_StakeManager.CallOpts, _id)\n}", "title": "" }, { "docid": "58faabeb1fbd31f7be4070737d74cf79", "score": "0.523939", "text": "func (p *proxy) LastStakerId() (hexutil.Uint64, error) {\n\treturn p.rpc.LastStakerId()\n}", "title": "" }, { "docid": "bdf417bdde7a5ab7cce61608939119a6", "score": "0.5235682", "text": "func (pgb *ChainDB) GetStakeVersionsLatest() (*chainjson.StakeVersions, error) {\n\ttxHash := pgb.BestBlockHashStr()\n\tstkVers, err := pgb.GetStakeVersions(txHash, 1)\n\tif err != nil || stkVers == nil || len(stkVers.StakeVersions) == 0 {\n\t\treturn nil, err\n\t}\n\tstkVer := stkVers.StakeVersions[0]\n\treturn &stkVer, nil\n}", "title": "" }, { "docid": "83ad5f0ff7a46fb65e1c15c614e95dc9", "score": "0.5230839", "text": "func (_RollupAdminFacet *RollupAdminFacetSession) GetStakerAddress(stakerNum *big.Int) (common.Address, error) {\n\treturn _RollupAdminFacet.Contract.GetStakerAddress(&_RollupAdminFacet.CallOpts, stakerNum)\n}", "title": "" }, { "docid": "4b2c7e29d82ea12de6b3a9c070d7912f", "score": "0.52175814", "text": "func (_SwearGame *SwearGameCaller) AmountStaked(opts *bind.CallOpts) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _SwearGame.contract.Call(opts, out, \"amountStaked\")\n\treturn *ret0, err\n}", "title": "" }, { "docid": "c7a9067a88e91852201fed6ccff812b2", "score": "0.52091575", "text": "func (_StakeManager *StakeManagerSession) GetStaker(_id *big.Int) (StructsStaker, error) {\n\treturn _StakeManager.Contract.GetStaker(&_StakeManager.CallOpts, _id)\n}", "title": "" }, { "docid": "94f21551a0d34cc26b5af64dad91f365", "score": "0.5196236", "text": "func (_Staking *StakingCallerSession) TotalStaked() (*big.Int, error) {\n\treturn _Staking.Contract.TotalStaked(&_Staking.CallOpts)\n}", "title": "" }, { "docid": "33f4bd1ff72a83afcde2a4d2b0d78f86", "score": "0.51905566", "text": "func (_ValidatorUtils *ValidatorUtilsCallerSession) GetStakers(rollup common.Address, startIndex *big.Int, max *big.Int) ([]common.Address, bool, error) {\n\treturn _ValidatorUtils.Contract.GetStakers(&_ValidatorUtils.CallOpts, rollup, startIndex, max)\n}", "title": "" }, { "docid": "454760c3df6e4c0fa4ad946f33543aaa", "score": "0.51891416", "text": "func (_ValidatorUtils *ValidatorUtilsSession) GetStakers(rollup common.Address, startIndex *big.Int, max *big.Int) ([]common.Address, bool, error) {\n\treturn _ValidatorUtils.Contract.GetStakers(&_ValidatorUtils.CallOpts, rollup, startIndex, max)\n}", "title": "" }, { "docid": "15fddee0c8c77debb330e6130e3c565b", "score": "0.51768416", "text": "func (_Staking *StakingTransactor) Unstake(opts *bind.TransactOpts, _bucketIndex *big.Int, _data []byte) (*types.Transaction, error) {\n\treturn _Staking.contract.Transact(opts, \"unstake\", _bucketIndex, _data)\n}", "title": "" }, { "docid": "9291c41486bae63f7678c7673207181a", "score": "0.5173641", "text": "func (p VersionedSecretStoreImpl) Latest(ctx context.Context, namespace string, secretName string) (*corev1.Secret, error) {\n\tlatestVersion, err := p.getGreatestVersion(ctx, namespace, secretName)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn p.Get(ctx, namespace, secretName, latestVersion)\n}", "title": "" }, { "docid": "b916391a1a9eb36a445010d7e515fe0c", "score": "0.5164983", "text": "func (_RollupAdminFacet *RollupAdminFacetSession) AmountStaked(staker common.Address) (*big.Int, error) {\n\treturn _RollupAdminFacet.Contract.AmountStaked(&_RollupAdminFacet.CallOpts, staker)\n}", "title": "" }, { "docid": "98f58d00ec96d46bef400128c65bd2a3", "score": "0.5156516", "text": "func (suite *KeeperTestSuite) Stake(farmer sdk.AccAddress, amt sdk.Coins) types.Staking {\n\tstaking, err := suite.keeper.Stake(suite.ctx, farmer, amt)\n\tsuite.Require().NoError(err)\n\n\treturn staking\n}", "title": "" }, { "docid": "cd040520671c47dec63073fb0129db10", "score": "0.5148244", "text": "func (_RollupAdminFacet *RollupAdminFacetCallerSession) ZombieLatestStakedNode(zombieNum *big.Int) (*big.Int, error) {\n\treturn _RollupAdminFacet.Contract.ZombieLatestStakedNode(&_RollupAdminFacet.CallOpts, zombieNum)\n}", "title": "" }, { "docid": "e29e2890491bff72b314332e843a9dad", "score": "0.5142001", "text": "func (_ValidatorUtils *ValidatorUtilsCallerSession) StakedNodes(rollup common.Address, staker common.Address) ([]*big.Int, error) {\n\treturn _ValidatorUtils.Contract.StakedNodes(&_ValidatorUtils.CallOpts, rollup, staker)\n}", "title": "" }, { "docid": "69187609c33cbfe2cf73694d8616e924", "score": "0.5133398", "text": "func (_ValidatorUtils *ValidatorUtilsCaller) FindStakerConflict(opts *bind.CallOpts, rollup common.Address, staker1 common.Address, staker2 common.Address, maxDepth *big.Int) (uint8, *big.Int, *big.Int, error) {\n\tvar out []interface{}\n\terr := _ValidatorUtils.contract.Call(opts, &out, \"findStakerConflict\", rollup, staker1, staker2, maxDepth)\n\n\tif err != nil {\n\t\treturn *new(uint8), *new(*big.Int), *new(*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(uint8)).(*uint8)\n\tout1 := *abi.ConvertType(out[1], new(*big.Int)).(**big.Int)\n\tout2 := *abi.ConvertType(out[2], new(*big.Int)).(**big.Int)\n\n\treturn out0, out1, out2, err\n\n}", "title": "" }, { "docid": "8eec5fcfd2456b7bcfb035f3cc7e4e22", "score": "0.5131983", "text": "func (_SwearGame *SwearGameCallerSession) AmountStaked() (*big.Int, error) {\n\treturn _SwearGame.Contract.AmountStaked(&_SwearGame.CallOpts)\n}", "title": "" }, { "docid": "82a7bc36a0384d2a524222a11c8ba712", "score": "0.51273054", "text": "func (_ValidatorUtils *ValidatorUtilsCaller) GetStakers(opts *bind.CallOpts, rollup common.Address, startIndex *big.Int, max *big.Int) ([]common.Address, bool, error) {\n\tvar out []interface{}\n\terr := _ValidatorUtils.contract.Call(opts, &out, \"getStakers\", rollup, startIndex, max)\n\n\tif err != nil {\n\t\treturn *new([]common.Address), *new(bool), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new([]common.Address)).(*[]common.Address)\n\tout1 := *abi.ConvertType(out[1], new(bool)).(*bool)\n\n\treturn out0, out1, err\n\n}", "title": "" }, { "docid": "59d425fe0a0a17a9287fca8d3b071df8", "score": "0.5102201", "text": "func (_Dosbridge *DosbridgeCaller) GetStakingAddress(opts *bind.CallOpts) (common.Address, error) {\n\tvar out []interface{}\n\terr := _Dosbridge.contract.Call(opts, &out, \"getStakingAddress\")\n\n\tif err != nil {\n\t\treturn *new(common.Address), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(common.Address)).(*common.Address)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "eec3f080d55650b2f3c21643bc074096", "score": "0.50995797", "text": "func Latest(ctx context.Context, uds string, options ...grpc.DialOption) (latest *agent.Deploy, err error) {\n\tvar (\n\t\tc Conn\n\t)\n\n\tif c, err = dial(ctx, uds, options...); err != nil {\n\t\treturn latest, err\n\t}\n\n\tdefer c.conn.Close()\n\n\treturn c.Archive(ctx)\n}", "title": "" }, { "docid": "c2faffe0366154c0a687a1aad9f2d00f", "score": "0.50910795", "text": "func (_PearlDistributeOysterby *PearlDistributeOysterbyTransactor) Stake(opts *bind.TransactOpts, _send common.Address, _amount *big.Int) (*types.Transaction, error) {\n\treturn _PearlDistributeOysterby.contract.Transact(opts, \"stake\", _send, _amount)\n}", "title": "" }, { "docid": "9bf4ff7b1b2f98ced179f65765ea4138", "score": "0.50834143", "text": "func (m InkMiner) getLatestBlock(args *shared.BlockArgs, reply *shared.BlockArgs) (err error) {\n\tBlockchainRef.lock.Lock()\n\tblock := BlockchainRef.LastBlock\n\tBlockchainRef.lock.Unlock()\n\tblockstring, _ := json.Marshal(block)\n\treply.BlockString = string(blockstring)\n\treturn nil\n}", "title": "" }, { "docid": "4837e8271e62915ac6f16776d3a7302b", "score": "0.50804436", "text": "func (_Staking *StakingSession) TotalStaked() (*big.Int, error) {\n\treturn _Staking.Contract.TotalStaked(&_Staking.CallOpts)\n}", "title": "" }, { "docid": "dbd8ad1992f56b864100b794b4f4625e", "score": "0.506579", "text": "func (p *Provisioners) GetStake(pubKeyBLS []byte) (uint64, error) {\n\tif len(pubKeyBLS) != 129 {\n\t\treturn 0, fmt.Errorf(\"public key is %v bytes long instead of 129\", len(pubKeyBLS))\n\t}\n\n\tp.lock.RLock()\n\tdefer p.lock.RUnlock()\n\n\ti := strPk(pubKeyBLS)\n\tm, found := p.members[i]\n\tif !found {\n\t\treturn 0, fmt.Errorf(\"public key %v not found among provisioner set\", pubKeyBLS)\n\t}\n\n\treturn m.Stake, nil\n}", "title": "" }, { "docid": "fd0416705fc755a7a577099ab976e0d6", "score": "0.50475657", "text": "func (_StakeManager *StakeManagerSession) Unstake(epoch *big.Int, stakerId *big.Int, sAmount *big.Int) (*types.Transaction, error) {\n\treturn _StakeManager.Contract.Unstake(&_StakeManager.TransactOpts, epoch, stakerId, sAmount)\n}", "title": "" }, { "docid": "65f85b9eeec0cd3f442b51b3b491846f", "score": "0.5037745", "text": "func (_StakeManager *StakeManagerTransactorSession) Unstake(epoch *big.Int, stakerId *big.Int, sAmount *big.Int) (*types.Transaction, error) {\n\treturn _StakeManager.Contract.Unstake(&_StakeManager.TransactOpts, epoch, stakerId, sAmount)\n}", "title": "" }, { "docid": "e550474aca5b1a74d1fae03b64de2fbf", "score": "0.5030004", "text": "func (_ValidatorUtils *ValidatorUtilsSession) StakedNodes(rollup common.Address, staker common.Address) ([]*big.Int, error) {\n\treturn _ValidatorUtils.Contract.StakedNodes(&_ValidatorUtils.CallOpts, rollup, staker)\n}", "title": "" }, { "docid": "b156c128af5bf5a50f5ad330ae1d1162", "score": "0.5015809", "text": "func (_StakeManager *StakeManagerTransactor) Unstake(opts *bind.TransactOpts, epoch *big.Int, stakerId *big.Int, sAmount *big.Int) (*types.Transaction, error) {\n\treturn _StakeManager.contract.Transact(opts, \"unstake\", epoch, stakerId, sAmount)\n}", "title": "" }, { "docid": "4cd45ba841f949e3a90a2aaa780f1855", "score": "0.49818662", "text": "func (_RollupAdminFacet *RollupAdminFacetCaller) IsStaked(opts *bind.CallOpts, staker common.Address) (bool, error) {\n\tvar out []interface{}\n\terr := _RollupAdminFacet.contract.Call(opts, &out, \"isStaked\", staker)\n\n\tif err != nil {\n\t\treturn *new(bool), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(bool)).(*bool)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "64a4196afedaf43cf2c66225e2792b53", "score": "0.4977346", "text": "func (p *Patchitup) getLatestHash(filename string) (hashRemote string, err error) {\n\tsr := serverRequest{\n\t\tSignature: p.signature,\n\t\tPublicKey: p.key.Public,\n\t\tFilename: p.filename,\n\t}\n\n\taddress := fmt.Sprintf(\"%s/hash\", p.serverAddress)\n\ttarget, err := request(\"GET\", address, sr)\n\thashRemote = target.Message\n\treturn\n}", "title": "" }, { "docid": "4441e041b61894340aeaadedfbafc05f", "score": "0.49760076", "text": "func (_SwearGame *SwearGameSession) AmountStaked() (*big.Int, error) {\n\treturn _SwearGame.Contract.AmountStaked(&_SwearGame.CallOpts)\n}", "title": "" }, { "docid": "a3195de7d083ff11794d74ed790a88a8", "score": "0.4975709", "text": "func (_DowntimeSlasher *DowntimeSlasherCaller) LastSlashedBlock(opts *bind.CallOpts, arg0 common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _DowntimeSlasher.contract.Call(opts, out, \"lastSlashedBlock\", arg0)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "6f057e7292f816f4a1e63901e81f2dcc", "score": "0.4972754", "text": "func (_RollupAdminFacet *RollupAdminFacetCaller) StakerMap(opts *bind.CallOpts, arg0 common.Address) (struct {\n\tIndex *big.Int\n\tLatestStakedNode *big.Int\n\tAmountStaked *big.Int\n\tCurrentChallenge common.Address\n\tIsStaked bool\n}, error) {\n\tvar out []interface{}\n\terr := _RollupAdminFacet.contract.Call(opts, &out, \"_stakerMap\", arg0)\n\n\toutstruct := new(struct {\n\t\tIndex *big.Int\n\t\tLatestStakedNode *big.Int\n\t\tAmountStaked *big.Int\n\t\tCurrentChallenge common.Address\n\t\tIsStaked bool\n\t})\n\tif err != nil {\n\t\treturn *outstruct, err\n\t}\n\n\toutstruct.Index = *abi.ConvertType(out[0], new(*big.Int)).(**big.Int)\n\toutstruct.LatestStakedNode = *abi.ConvertType(out[1], new(*big.Int)).(**big.Int)\n\toutstruct.AmountStaked = *abi.ConvertType(out[2], new(*big.Int)).(**big.Int)\n\toutstruct.CurrentChallenge = *abi.ConvertType(out[3], new(common.Address)).(*common.Address)\n\toutstruct.IsStaked = *abi.ConvertType(out[4], new(bool)).(*bool)\n\n\treturn *outstruct, err\n\n}", "title": "" }, { "docid": "c5965a424649ca1fb16ccf32da969aa0", "score": "0.4965415", "text": "func (_RollupAdminFacet *RollupAdminFacetSession) ZombieLatestStakedNode(zombieNum *big.Int) (*big.Int, error) {\n\treturn _RollupAdminFacet.Contract.ZombieLatestStakedNode(&_RollupAdminFacet.CallOpts, zombieNum)\n}", "title": "" }, { "docid": "884f596e72fa4fd941126a1b34c9f749", "score": "0.49563834", "text": "func (_PearlDistributeOysterby *PearlDistributeOysterbySession) Stake(_send common.Address, _amount *big.Int) (*types.Transaction, error) {\n\treturn _PearlDistributeOysterby.Contract.Stake(&_PearlDistributeOysterby.TransactOpts, _send, _amount)\n}", "title": "" }, { "docid": "a6c5de6ecee26bc15183d3bcac3be0ab", "score": "0.49283093", "text": "func (_PaletteToken *PaletteTokenCaller) StakeTable(opts *bind.CallOpts, arg0 *big.Int, arg1 common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _PaletteToken.contract.Call(opts, out, \"stakeTable\", arg0, arg1)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "43db3e9d41919c0ec9430c2d132aaebf", "score": "0.49148116", "text": "func (c Client) GetLatest() (map[currency.Unit]float64, error) {\n\treturn c.getHistorical(fmt.Sprintf(\"%d-%d-%d\", time.Now().Year(), time.Now().Month(), time.Now().Day()), nil)\n}", "title": "" }, { "docid": "725a17342c11f57de40c2f2a97a8b6ae", "score": "0.48953587", "text": "func (db *ChainDb) fetchActiveStakingTxFromUnexpired(height uint64) (map[[sha256.Size]byte][]database.StakingTxInfo, error) {\n\n\tstakingTxInfos := make(map[[sha256.Size]byte][]database.StakingTxInfo)\n\n\titer := db.stor.NewIterator(storage.BytesPrefix(recordStakingTx))\n\tdefer iter.Release()\n\n\tfor iter.Next() {\n\t\tkey := iter.Key()\n\t\texpiredHeight := binary.LittleEndian.Uint64(key[len(recordStakingTx) : len(recordStakingTx)+8])\n\t\tmapKey := mustDecodeStakingTxMapKey(key[len(recordStakingTx)+8:])\n\t\tblkHeight := mapKey.blockHeight\n\n\t\tvalue := iter.Value()\n\t\tscriptHash, amount := mustDecodeStakingTxValue(value)\n\n\t\tif height > blkHeight &&\n\t\t\theight <= expiredHeight &&\n\t\t\theight-blkHeight >= consensus.StakingTxRewardStart {\n\t\t\tstakingTxInfos[scriptHash] = append(stakingTxInfos[scriptHash], database.StakingTxInfo{\n\t\t\t\tValue: amount,\n\t\t\t\tFrozenPeriod: expiredHeight - blkHeight,\n\t\t\t\tBlkHeight: blkHeight})\n\t\t}\n\t}\n\tif err := iter.Error(); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn stakingTxInfos, nil\n}", "title": "" }, { "docid": "f511acc5a0d356b6b91dd6e4c101fcfb", "score": "0.48914936", "text": "func getLatest(versions map[string][]string) (string, error) {\n\tlatestVersions := GetKeys(versions)[0]\n\tlatestList := semverifyList(versions[latestVersions])\n\n\treturn latestList[0], nil\n}", "title": "" }, { "docid": "699eaab235c368834af10d2fab3704ed", "score": "0.4890891", "text": "func (_StakeManager *StakeManagerTransactor) Stake(opts *bind.TransactOpts, epoch *big.Int, amount *big.Int) (*types.Transaction, error) {\n\treturn _StakeManager.contract.Transact(opts, \"stake\", epoch, amount)\n}", "title": "" }, { "docid": "718a98091e32aeaa210f0bb7ab104fa9", "score": "0.48873374", "text": "func (m *MockSettingsStore) GetLatest(v0 context.Context, v1 api.SettingsSubject) (*api.Settings, error) {\n\tr0, r1 := m.GetLatestFunc.nextHook()(v0, v1)\n\tm.GetLatestFunc.appendCall(SettingsStoreGetLatestFuncCall{v0, v1, r0, r1})\n\treturn r0, r1\n}", "title": "" }, { "docid": "86d40193d0473a799f2721ad93d5fb6e", "score": "0.48865932", "text": "func (_PearlDistributeOysterby *PearlDistributeOysterbyTransactorSession) Stake(_send common.Address, _amount *big.Int) (*types.Transaction, error) {\n\treturn _PearlDistributeOysterby.Contract.Stake(&_PearlDistributeOysterby.TransactOpts, _send, _amount)\n}", "title": "" }, { "docid": "b0fa767493369e7999d4c10198e31b65", "score": "0.4879195", "text": "func (uc *Usecase) GetStakerDetails(address common.Address) (*models.StakerAddressDetails, error) {\n\tdetails, err := uc.store.GetStakerAddressDetails(address)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &details, nil\n}", "title": "" }, { "docid": "3a7b7045f99f1afba5f72c247fa39561", "score": "0.4878237", "text": "func (m *MockSettingStore) GetLatest(v0 context.Context, v1 api.SettingsSubject) (*api.Settings, error) {\n\tr0, r1 := m.GetLatestFunc.nextHook()(v0, v1)\n\tm.GetLatestFunc.appendCall(SettingStoreGetLatestFuncCall{v0, v1, r0, r1})\n\treturn r0, r1\n}", "title": "" }, { "docid": "edcfd101f6205783ac95529fa86b130d", "score": "0.48755136", "text": "func (_HarvestAutoStake *HarvestAutoStakeTransactor) Stake(opts *bind.TransactOpts, amount *big.Int) (*types.Transaction, error) {\n\treturn _HarvestAutoStake.contract.Transact(opts, \"stake\", amount)\n}", "title": "" }, { "docid": "58dacfabe28cd78f778b866b29cbd1df", "score": "0.487311", "text": "func (uc *Usecase) GetStakers() ([]common.Address, error) {\n\tstakers, err := uc.store.GetStakerAddresses()\n\treturn stakers, err\n}", "title": "" }, { "docid": "fd26f7ecbdcb8497285b381ee998fc56", "score": "0.4866853", "text": "func (s *PublicTransactionService) GetStakingTransactionByHash(\n\tctx context.Context, hash common.Hash,\n) (StructuredResponse, error) {\n\t// Try to return an already finalized transaction\n\tstx, blockHash, blockNumber, index := rawdb.ReadStakingTransaction(s.hmy.ChainDb(), hash)\n\tif stx == nil {\n\t\tutils.Logger().Debug().\n\t\t\tErr(errors.Wrapf(ErrTransactionNotFound, \"hash %v\", hash.String())).\n\t\t\tMsgf(\"%v error at %v\", LogTag, \"GetStakingTransactionByHash\")\n\t\t// Legacy behavior is to not return RPC errors\n\t\treturn nil, nil\n\t}\n\tblock, err := s.hmy.GetBlock(ctx, blockHash)\n\tif err != nil {\n\t\tutils.Logger().Debug().\n\t\t\tErr(err).\n\t\t\tMsgf(\"%v error at %v\", LogTag, \"GetStakingTransactionByHash\")\n\t\t// Legacy behavior is to not return RPC errors\n\t\treturn nil, nil\n\t}\n\n\tswitch s.version {\n\tcase V1:\n\t\ttx, err := v1.NewStakingTransaction(stx, blockHash, blockNumber, block.Time().Uint64(), index)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn NewStructuredResponse(tx)\n\tcase V2:\n\t\ttx, err := v2.NewStakingTransaction(stx, blockHash, blockNumber, block.Time().Uint64(), index)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn NewStructuredResponse(tx)\n\tdefault:\n\t\treturn nil, ErrUnknownRPCVersion\n\t}\n}", "title": "" }, { "docid": "0a35625e46bd1c9b2354987242e23e2e", "score": "0.4864932", "text": "func (_StakeManager *StakeManagerTransactorSession) Stake(epoch *big.Int, amount *big.Int) (*types.Transaction, error) {\n\treturn _StakeManager.Contract.Stake(&_StakeManager.TransactOpts, epoch, amount)\n}", "title": "" }, { "docid": "f4e1eff705dddaee74b946b7af56b3f6", "score": "0.48589745", "text": "func FetchLatestTimeStamp() (*strfmt.DateTime, error) {\n\tclient := inventory.Get()\n\tresult, err := client.GetLatestTimestamp(inventory_operations.NewGetLatestTimestampParams())\n\tif err != nil {\n\t\treturn nil, errs.Wrap(err, \"GetLatestTimestamp failed\")\n\t}\n\n\treturn result.Payload.Timestamp, nil\n}", "title": "" }, { "docid": "cf7a45ef8a64a0f3bcbe02340bb62d88", "score": "0.48583665", "text": "func (_StakeManager *StakeManagerSession) Stake(epoch *big.Int, amount *big.Int) (*types.Transaction, error) {\n\treturn _StakeManager.Contract.Stake(&_StakeManager.TransactOpts, epoch, amount)\n}", "title": "" }, { "docid": "593f0a8cae710d6b14390998bf6dbd4d", "score": "0.48566267", "text": "func (s *Server) getStakeInfo(ctx context.Context, icmd interface{}) (interface{}, error) {\n\tw, ok := s.walletLoader.LoadedWallet()\n\tif !ok {\n\t\treturn nil, errUnloadedWallet\n\t}\n\n\tvar rpc *dcrd.RPC\n\tn, _ := s.walletLoader.NetworkBackend()\n\tif client, ok := n.(*dcrd.RPC); ok {\n\t\trpc = client\n\t}\n\tvar sinfo *wallet.StakeInfoData\n\tvar err error\n\tif rpc != nil {\n\t\tsinfo, err = w.StakeInfoPrecise(ctx, rpc)\n\t} else {\n\t\tsinfo, err = w.StakeInfo(ctx)\n\t}\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar proportionLive, proportionMissed float64\n\tif sinfo.PoolSize > 0 {\n\t\tproportionLive = float64(sinfo.Live) / float64(sinfo.PoolSize)\n\t}\n\tif sinfo.Missed > 0 {\n\t\tproportionMissed = float64(sinfo.Missed) / (float64(sinfo.Voted + sinfo.Missed))\n\t}\n\n\tresp := &types.GetStakeInfoResult{\n\t\tBlockHeight: sinfo.BlockHeight,\n\t\tDifficulty: sinfo.Sdiff.ToCoin(),\n\t\tTotalSubsidy: sinfo.TotalSubsidy.ToCoin(),\n\n\t\tOwnMempoolTix: sinfo.OwnMempoolTix,\n\t\tImmature: sinfo.Immature,\n\t\tUnspent: sinfo.Unspent,\n\t\tVoted: sinfo.Voted,\n\t\tRevoked: sinfo.Revoked,\n\t\tUnspentExpired: sinfo.UnspentExpired,\n\n\t\tPoolSize: sinfo.PoolSize,\n\t\tAllMempoolTix: sinfo.AllMempoolTix,\n\t\tLive: sinfo.Live,\n\t\tProportionLive: proportionLive,\n\t\tMissed: sinfo.Missed,\n\t\tProportionMissed: proportionMissed,\n\t\tExpired: sinfo.Expired,\n\t}\n\n\treturn resp, nil\n}", "title": "" }, { "docid": "46def192dd795bec963f1289388b937d", "score": "0.48423022", "text": "func (nm *NetworkManager) GetUserActiveStake(address string) (*big.Float, error) {\n\tpubkey, _ := erdgo.Bech32ToPubkey(address)\n\thexAddress := hex.EncodeToString(pubkey)\n\tiStake, err := nm.queryScIntResult(utils.ContractAddress, \"getUserActiveStake\", []string{hexAddress})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfStake := big.NewFloat(0).SetInt(iStake)\n\tfStake.Quo(fStake, nm.fDenomination)\n\n\treturn fStake, nil\n}", "title": "" }, { "docid": "2068fbe74cd14d40144cefe75b2f3099", "score": "0.48422578", "text": "func (_YieldFarmContinuous *YieldFarmContinuousCaller) LastSoftPullTs(opts *bind.CallOpts) (*big.Int, error) {\n\tvar out []interface{}\n\terr := _YieldFarmContinuous.contract.Call(opts, &out, \"lastSoftPullTs\")\n\n\tif err != nil {\n\t\treturn *new(*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(*big.Int)).(**big.Int)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "74fa72766d30bf29f63d053f11bcc1f0", "score": "0.48169032", "text": "func (_StakeManager *StakeManagerCaller) GetStakerId(opts *bind.CallOpts, _address common.Address) (*big.Int, error) {\n\tvar out []interface{}\n\terr := _StakeManager.contract.Call(opts, &out, \"getStakerId\", _address)\n\n\tif err != nil {\n\t\treturn *new(*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(*big.Int)).(**big.Int)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "436bca459120c87bf8ced2ff784dc890", "score": "0.4816368", "text": "func (s *PublicTransactionService) GetStakingTransactionsHistory(\n\tctx context.Context, args TxHistoryArgs,\n) (StructuredResponse, error) {\n\t// Fetch transaction history\n\tvar address string\n\tvar result []common.Hash\n\tvar err error\n\tif strings.HasPrefix(args.Address, \"one1\") {\n\t\taddress = args.Address\n\t} else {\n\t\taddr := internal_common.ParseAddr(args.Address)\n\t\taddress, err = internal_common.AddressToBech32(addr)\n\t\tif err != nil {\n\t\t\tutils.Logger().Debug().\n\t\t\t\tErr(err).\n\t\t\t\tMsgf(\"%v error at %v\", LogTag, \"GetStakingTransactionsHistory\")\n\t\t\t// Legacy behavior is to not return RPC errors\n\t\t\treturn nil, nil\n\t\t}\n\t}\n\thashes, err := s.hmy.GetStakingTransactionsHistory(address, args.TxType, args.Order)\n\tif err != nil {\n\t\tutils.Logger().Debug().\n\t\t\tErr(err).\n\t\t\tMsgf(\"%v error at %v\", LogTag, \"GetStakingTransactionsHistory\")\n\t\t// Legacy behavior is to not return RPC errors\n\t\treturn nil, nil\n\t}\n\n\tresult = returnHashesWithPagination(hashes, args.PageIndex, args.PageSize)\n\n\t// Just hashes have same response format for all versions\n\tif !args.FullTx {\n\t\treturn StructuredResponse{\"staking_transactions\": result}, nil\n\t}\n\n\t// Full transactions have different response format\n\ttxs := []StructuredResponse{}\n\tfor _, hash := range result {\n\t\ttx, err := s.GetStakingTransactionByHash(ctx, hash)\n\t\tif err == nil {\n\t\t\ttxs = append(txs, tx)\n\t\t} else {\n\t\t\tutils.Logger().Debug().\n\t\t\t\tErr(err).\n\t\t\t\tMsgf(\"%v error at %v\", LogTag, \"GetStakingTransactionsHistory\")\n\t\t\t// Legacy behavior is to not return RPC errors\n\t\t}\n\t}\n\treturn StructuredResponse{\"staking_transactions\": txs}, nil\n}", "title": "" }, { "docid": "79f4ea3c6e4138e314cf14acc8d7b0e0", "score": "0.48153812", "text": "func (_PaletteToken *PaletteTokenCallerSession) StakeTable(arg0 *big.Int, arg1 common.Address) (*big.Int, error) {\n\treturn _PaletteToken.Contract.StakeTable(&_PaletteToken.CallOpts, arg0, arg1)\n}", "title": "" }, { "docid": "1638cde8f150e77fb060fb5cca71c91b", "score": "0.4814783", "text": "func (nm *NetworkManager) GetTotalUnStaked() (*big.Float, error) {\n\treturn nm.getScIntNoArgs(\"getTotalUnStaked\")\n}", "title": "" }, { "docid": "dac47e392df99a581cdac78112434fbf", "score": "0.48100814", "text": "func (chain *Blockchain) GetLatestBlock() *Block {\n\treturn chain.GetNLatestBlock(1)\n}", "title": "" }, { "docid": "a77b3c4361ddf0d66c87daef7b1293e8", "score": "0.48086047", "text": "func (_IncognitoProxy *IncognitoProxyCaller) LatestBeaconBlk(opts *bind.CallOpts) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _IncognitoProxy.contract.Call(opts, out, \"latestBeaconBlk\")\n\treturn *ret0, err\n}", "title": "" }, { "docid": "30827b80f8fa496808c7f91a40772153", "score": "0.48047084", "text": "func (s *stateObject) ReturnGas(gas *big.Int) {}", "title": "" }, { "docid": "fb14f6aa5125b6fd9f416fe747564253", "score": "0.47955325", "text": "func (db *LevelDb) NewestSha() (rsha *wire.Hash, rblkid int32, err error) {\n\n\tif db.lastBlkIdx == -1 {\n\t\treturn &wire.Hash{}, -1, nil\n\t}\n\tsha := db.lastBlkSha\n\n\treturn &sha, db.lastBlkIdx, nil\n}", "title": "" }, { "docid": "bc27ee812a8527e1b809a3b34484f225", "score": "0.479334", "text": "func (_TokenGrant *TokenGrantTransactor) Stake(opts *bind.TransactOpts, _id *big.Int, _stakingContract common.Address, _amount *big.Int, _extraData []byte) (*types.Transaction, error) {\n\treturn _TokenGrant.contract.Transact(opts, \"stake\", _id, _stakingContract, _amount, _extraData)\n}", "title": "" }, { "docid": "8de1ebefacc1510281765857effabad8", "score": "0.47773907", "text": "func (t *LoadStakingsTask) UpdateStakingsByStakingEvents() error {\n\tlog.Printf(\"getting pool %s staking events\", t.poolAddress.String())\n\n\tevents, err := furucombo.GetStakingEvents(t.poolAddress, t.startBlock, t.endBlock)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tlog.Printf(\"found %d staking events\", len(events))\n\n\tfor _, event := range events {\n\t\taccount := common.BytesToAddress(event.Topics[2].Bytes())\n\n\t\tlog.Printf(\"found %s staking event at %d block\", account.String(), event.BlockNumber)\n\n\t\tif _, ok := t.stakingMap[account]; !ok {\n\t\t\tt.stakingMap.Add(account, t.duration, t.baseAmount, decimal.Zero)\n\t\t}\n\n\t\tduration := decimal.NewFromInt(int64(t.endBlock - event.BlockNumber))\n\t\tamount := decimal.NewFromBigInt(new(big.Int).SetBytes(event.Data), -18)\n\t\tarea := duration.Mul(amount)\n\n\t\tvar eventName string\n\t\tswitch event.Topics[0] {\n\t\tcase furucombo.StakingStakedEventSig:\n\t\t\teventName = \"Staked\"\n\n\t\t\tt.stakingMap[account].EndAmount = t.stakingMap[account].EndAmount.Add(amount)\n\t\t\tt.stakingMap[account].Area = t.stakingMap[account].Area.Add(area)\n\n\t\tcase furucombo.StakingUnstakedEventSig:\n\t\t\teventName = \"Unstaked\"\n\n\t\t\tif area.GreaterThan(t.stakingMap[account].Area) {\n\t\t\t\treturn errors.New(\"unexpected staking area < 0 \")\n\t\t\t}\n\n\t\t\tt.stakingMap[account].EndAmount = t.stakingMap[account].EndAmount.Sub(amount)\n\t\t\tt.stakingMap[account].Area = t.stakingMap[account].Area.Sub(area)\n\n\t\tdefault:\n\t\t\treturn fmt.Errorf(\"unexpected staking event: %s\", event.Topics[0].String())\n\t\t}\n\n\t\tlog.Printf(\"event: %s duration: %s amount: %s area: %s\", eventName, duration, amount, area)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "082aeb817b6a4a00b365f349f8f02688", "score": "0.47762325", "text": "func (_ValidatorUtils *ValidatorUtilsCaller) StakedNodes(opts *bind.CallOpts, rollup common.Address, staker common.Address) ([]*big.Int, error) {\n\tvar out []interface{}\n\terr := _ValidatorUtils.contract.Call(opts, &out, \"stakedNodes\", rollup, staker)\n\n\tif err != nil {\n\t\treturn *new([]*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new([]*big.Int)).(*[]*big.Int)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "2fe6de0a6b6717f3834f18392bb3f962", "score": "0.47752526", "text": "func (_Dosbridge *DosbridgeSession) GetStakingAddress() (common.Address, error) {\n\treturn _Dosbridge.Contract.GetStakingAddress(&_Dosbridge.CallOpts)\n}", "title": "" }, { "docid": "66e6d858ee0807d54a58cfac63299651", "score": "0.47622955", "text": "func (_RollupAdminFacet *RollupAdminFacetCaller) StakerCount(opts *bind.CallOpts) (*big.Int, error) {\n\tvar out []interface{}\n\terr := _RollupAdminFacet.contract.Call(opts, &out, \"stakerCount\")\n\n\tif err != nil {\n\t\treturn *new(*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(*big.Int)).(**big.Int)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "b2239f2904aaee23fae304ab2c4bb05c", "score": "0.4754671", "text": "func (_PaletteToken *PaletteTokenSession) StakeTable(arg0 *big.Int, arg1 common.Address) (*big.Int, error) {\n\treturn _PaletteToken.Contract.StakeTable(&_PaletteToken.CallOpts, arg0, arg1)\n}", "title": "" }, { "docid": "51ee9ce62c620f178baf6531d5c1d7fe", "score": "0.47444275", "text": "func (_HarvestAutoStake *HarvestAutoStakeTransactorSession) Stake(amount *big.Int) (*types.Transaction, error) {\n\treturn _HarvestAutoStake.Contract.Stake(&_HarvestAutoStake.TransactOpts, amount)\n}", "title": "" }, { "docid": "a0b1155d41b69dff94344646811f4b7c", "score": "0.47318283", "text": "func (_RollupAdminFacet *RollupAdminFacetCaller) BaseStake(opts *bind.CallOpts) (*big.Int, error) {\n\tvar out []interface{}\n\terr := _RollupAdminFacet.contract.Call(opts, &out, \"baseStake\")\n\n\tif err != nil {\n\t\treturn *new(*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(*big.Int)).(**big.Int)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "80a9256eba786719a17c22e9875494e1", "score": "0.47295383", "text": "func GetRecentBlock(w http.ResponseWriter, r *http.Request) {\n\tdbase := db.ConnectShyftDatabase()\n\n\tblock, err := b.BlockQueries(dbase, db.GetBlock, \"\")\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), 500)\n\t\treturn\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json; charset=UTF-8\")\n\tw.WriteHeader(http.StatusOK)\n\tlogger.WriteLogger(w.Write(block))\n}", "title": "" }, { "docid": "d02e40113f55ef177cf5244e9a6f25e9", "score": "0.47270095", "text": "func (_Dosbridge *DosbridgeCallerSession) GetStakingAddress() (common.Address, error) {\n\treturn _Dosbridge.Contract.GetStakingAddress(&_Dosbridge.CallOpts)\n}", "title": "" }, { "docid": "880ff47b7176120abfac6b9ec3ee1cb4", "score": "0.4717797", "text": "func (m *RemoteMap) Unstash(addr net.Addr) <-chan []byte {\n\tm.lock.Lock()\n\tdefer m.lock.Unlock()\n\treturn m.inner.Lookup(addr, time.Now()).Stash\n}", "title": "" }, { "docid": "020196dab472369b5f55154a0ac4a9ce", "score": "0.47106308", "text": "func (_TokenGrant *TokenGrantTransactorSession) Stake(_id *big.Int, _stakingContract common.Address, _amount *big.Int, _extraData []byte) (*types.Transaction, error) {\n\treturn _TokenGrant.Contract.Stake(&_TokenGrant.TransactOpts, _id, _stakingContract, _amount, _extraData)\n}", "title": "" }, { "docid": "10ab116119f9f085c6c841fb8df4b919", "score": "0.47051433", "text": "func (_HarvestAutoStake *HarvestAutoStakeCaller) Store(opts *bind.CallOpts) (common.Address, error) {\n\tvar (\n\t\tret0 = new(common.Address)\n\t)\n\tout := ret0\n\terr := _HarvestAutoStake.contract.Call(opts, out, \"store\")\n\treturn *ret0, err\n}", "title": "" } ]
fd0611839395768ae007d54ee0ac9601
Validate checks the field values on CustomerResponse with the rules defined in the proto definition for this message. If any rules are violated, an error is returned.
[ { "docid": "3842e0ded24e890018099e09d3b937ae", "score": "0.7989751", "text": "func (m *CustomerResponse) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\t// no validation rules for CustomerNumber\n\n\t// no validation rules for Alias\n\n\t// no validation rules for Mobile\n\n\t// no validation rules for FirstName\n\n\t// no validation rules for LastName\n\n\t// no validation rules for Address1\n\n\t// no validation rules for Address2\n\n\t// no validation rules for Email\n\n\tif v, ok := interface{}(m.GetSetting()).(interface{ Validate() error }); ok {\n\t\tif err := v.Validate(); err != nil {\n\t\t\treturn CustomerResponseValidationError{\n\t\t\t\tfield: \"Setting\",\n\t\t\t\treason: \"embedded message failed validation\",\n\t\t\t\tcause: err,\n\t\t\t}\n\t\t}\n\t}\n\n\t// no validation rules for Active\n\n\tif v, ok := interface{}(m.GetBirthDay()).(interface{ Validate() error }); ok {\n\t\tif err := v.Validate(); err != nil {\n\t\t\treturn CustomerResponseValidationError{\n\t\t\t\tfield: \"BirthDay\",\n\t\t\t\treason: \"embedded message failed validation\",\n\t\t\t\tcause: err,\n\t\t\t}\n\t\t}\n\t}\n\n\t// no validation rules for Gender\n\n\tfor idx, item := range m.GetPhones() {\n\t\t_, _ = idx, item\n\n\t\tif v, ok := interface{}(item).(interface{ Validate() error }); ok {\n\t\t\tif err := v.Validate(); err != nil {\n\t\t\t\treturn CustomerResponseValidationError{\n\t\t\t\t\tfield: fmt.Sprintf(\"Phones[%v]\", idx),\n\t\t\t\t\treason: \"embedded message failed validation\",\n\t\t\t\t\tcause: err,\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t}\n\n\t// no validation rules for Weight\n\n\t// no validation rules for Height\n\n\tif v, ok := interface{}(m.GetEmergencySetting()).(interface{ Validate() error }); ok {\n\t\tif err := v.Validate(); err != nil {\n\t\t\treturn CustomerResponseValidationError{\n\t\t\t\tfield: \"EmergencySetting\",\n\t\t\t\treason: \"embedded message failed validation\",\n\t\t\t\tcause: err,\n\t\t\t}\n\t\t}\n\t}\n\n\tif v, ok := interface{}(m.GetLocale()).(interface{ Validate() error }); ok {\n\t\tif err := v.Validate(); err != nil {\n\t\t\treturn CustomerResponseValidationError{\n\t\t\t\tfield: \"Locale\",\n\t\t\t\treason: \"embedded message failed validation\",\n\t\t\t\tcause: err,\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" } ]
[ { "docid": "c07f7cebd18f7caf7d47ade7b936e43e", "score": "0.74895656", "text": "func (m *SearchCustomersResponse) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateCustomers(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateErrors(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "b9daf2bf6fb0e8934425a597788a9e94", "score": "0.6466925", "text": "func (m *RetrieveCustomerGroupResponse) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateErrors(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateGroup(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c1f6392e657e8a9ab23b312538a65b84", "score": "0.63712835", "text": "func (m *Customer) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tif utf8.RuneCountInString(m.GetName()) > 255 {\n\t\treturn CustomerValidationError{\n\t\t\tfield: \"Name\",\n\t\t\treason: \"value length must be at most 255 runes\",\n\t\t}\n\t}\n\n\tif err := m._validateEmail(m.GetEmail()); err != nil {\n\t\treturn CustomerValidationError{\n\t\t\tfield: \"Email\",\n\t\t\treason: \"value must be a valid email address\",\n\t\t\tcause: err,\n\t\t}\n\t}\n\n\tif utf8.RuneCountInString(m.GetPhone()) > 15 {\n\t\treturn CustomerValidationError{\n\t\t\tfield: \"Phone\",\n\t\t\treason: \"value length must be at most 15 runes\",\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "744f116fe8455ebb8c04e4dd0d3224fa", "score": "0.610339", "text": "func (m *Customer) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// validation for a type composition with Fid\n\tif err := m.Fid.Validate(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateFlags(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "1b7e7e13a99d75c2c12876e09944ca22", "score": "0.60125136", "text": "func (m *GetContactResponse) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tif v, ok := interface{}(m.GetResult()).(interface {\n\t\tValidate() error\n\t}); ok {\n\t\tif err := v.Validate(); err != nil {\n\t\t\treturn GetContactResponseValidationError{\n\t\t\t\tField: \"Result\",\n\t\t\t\tReason: \"embedded message failed validation\",\n\t\t\t\tCause: err,\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "f8030c54fe1dcbd88ebcb47ff37962c6", "score": "0.59817827", "text": "func (m *CustomerRequest) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\t// no validation rules for CustomerNumber\n\n\treturn nil\n}", "title": "" }, { "docid": "11375e4aa72cc30cebde0a95f0f3fe7e", "score": "0.5928319", "text": "func (m *CreateDoctorResponse) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tif v, ok := interface{}(m.GetResponse()).(interface{ Validate() error }); ok {\n\t\tif err := v.Validate(); err != nil {\n\t\t\treturn CreateDoctorResponseValidationError{\n\t\t\t\tfield: \"Response\",\n\t\t\t\treason: \"embedded message failed validation\",\n\t\t\t\tcause: err,\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "f264b734937642bb210695410d66aff7", "score": "0.5904406", "text": "func (m *CreateContactResponse) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tif v, ok := interface{}(m.GetResult()).(interface {\n\t\tValidate() error\n\t}); ok {\n\t\tif err := v.Validate(); err != nil {\n\t\t\treturn CreateContactResponseValidationError{\n\t\t\t\tField: \"Result\",\n\t\t\t\tReason: \"embedded message failed validation\",\n\t\t\t\tCause: err,\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "f264b734937642bb210695410d66aff7", "score": "0.5904406", "text": "func (m *CreateContactResponse) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tif v, ok := interface{}(m.GetResult()).(interface {\n\t\tValidate() error\n\t}); ok {\n\t\tif err := v.Validate(); err != nil {\n\t\t\treturn CreateContactResponseValidationError{\n\t\t\t\tField: \"Result\",\n\t\t\t\tReason: \"embedded message failed validation\",\n\t\t\t\tCause: err,\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "237ca3f6cff304af7ba4fd70458b114b", "score": "0.58963966", "text": "func (m *VoicemailResponse) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateBelongsToEndpoint(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f17664cccf0bffc5c345ec572e49535a", "score": "0.5872555", "text": "func (m *SearchCustomersResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateCustomers(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.contextValidateErrors(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "07320ae2a52132700a0304144432a04d", "score": "0.5868026", "text": "func (c *Customer) Validate() error {\n\tif c.Name == \"\" {\n\t\treturn apperr.Validation{\n\t\t\tWhere: \"Customer\",\n\t\t\tField: \"name\",\n\t\t\tCause: apperr.ValidationEmpty,\n\t\t}\n\t}\n\n\tif !c.Gender.Validate() {\n\t\treturn apperr.Validation{\n\t\t\tWhere: \"Customer\",\n\t\t\tField: \"gender\",\n\t\t\tCause: apperr.ValidationInvalid,\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "f9f1dc1d773b92f5f4d56b6a20d9935d", "score": "0.5863638", "text": "func (m *DeleteContactResponse) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "b0b863f13915927d5e3346effe24b615", "score": "0.58312935", "text": "func (m *CouponCodeResponse) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateCouponcode(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8377e2206c86a052b4c955771ee9c702", "score": "0.5793917", "text": "func ValidateCustomer(customer *CustomerForm) error {\n\t_, err := govalidator.ValidateStruct(customer)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif customer.Name == \"\" {\n\t\treturn errors.New(\"Invalid name\")\n\t}\n\n\tif valid := verifyPassword(customer.Password); valid == false {\n\t\treturn errors.New(\"Password must be composed of at least 8 character, one uppercase letter and one number\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "6f5394be53062bef8390b4301f0fd0ca", "score": "0.5777836", "text": "func (m *SmsCallerIDResponse) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "title": "" }, { "docid": "556dcab26ba8eaad76eb679af9548d75", "score": "0.57546955", "text": "func (m *UpdateContactResponse) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tif v, ok := interface{}(m.GetResult()).(interface {\n\t\tValidate() error\n\t}); ok {\n\t\tif err := v.Validate(); err != nil {\n\t\t\treturn UpdateContactResponseValidationError{\n\t\t\t\tField: \"Result\",\n\t\t\t\tReason: \"embedded message failed validation\",\n\t\t\t\tCause: err,\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "556dcab26ba8eaad76eb679af9548d75", "score": "0.57546955", "text": "func (m *UpdateContactResponse) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tif v, ok := interface{}(m.GetResult()).(interface {\n\t\tValidate() error\n\t}); ok {\n\t\tif err := v.Validate(); err != nil {\n\t\t\treturn UpdateContactResponseValidationError{\n\t\t\t\tField: \"Result\",\n\t\t\t\tReason: \"embedded message failed validation\",\n\t\t\t\tCause: err,\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "118ebc6a6468028c92aeaf47e22dfc6b", "score": "0.5742461", "text": "func DecodeGrpcRespCustomer(ctx context.Context, response interface{}) (interface{}, error) {\n\treturn response, nil\n}", "title": "" }, { "docid": "f8e7addb95b23ae6fc92633127f1921c", "score": "0.57416594", "text": "func (c *ClientResponse) Validate(data interface{}) (*Result, error) {\n\tresult, err := validate(c.schema, data)\n\treturn result, err\n}", "title": "" }, { "docid": "1c88b5fbe9523f4b76cedd7ebdc9e279", "score": "0.5675734", "text": "func (m *DestinyResponsesDestinyCharacterResponse) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateActivities(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateCharacter(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateEquipment(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateInventory(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateItemComponents(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateKiosks(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateProgressions(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateRenderData(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "07921dcde2b6636e585059705c1317e9", "score": "0.564192", "text": "func (o *GetCustomerReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewGetCustomerOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 400:\n\t\tresult := NewGetCustomerBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 401:\n\t\tresult := NewGetCustomerUnauthorized()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 403:\n\t\tresult := NewGetCustomerForbidden()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 404:\n\t\tresult := NewGetCustomerNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 429:\n\t\tresult := NewGetCustomerTooManyRequests()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "title": "" }, { "docid": "a74b6fa49d28289d9a86ce2aa6ef1a8e", "score": "0.5637857", "text": "func (o *PatchCustomerListsByIDCustomersByIDReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 400:\n\t\tresult := NewPatchCustomerListsByIDCustomersByIDBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tcase 404:\n\t\tresult := NewPatchCustomerListsByIDCustomersByIDNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\tresult := NewPatchCustomerListsByIDCustomersByIDDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "title": "" }, { "docid": "50abe5638d7677373107c223aed6258e", "score": "0.5616039", "text": "func (m *UpdateDoctorResponse) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tif v, ok := interface{}(m.GetResponse()).(interface{ Validate() error }); ok {\n\t\tif err := v.Validate(); err != nil {\n\t\t\treturn UpdateDoctorResponseValidationError{\n\t\t\t\tfield: \"Response\",\n\t\t\t\treason: \"embedded message failed validation\",\n\t\t\t\tcause: err,\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "cccedc8e445e46d7f7237bbf40e5a8e1", "score": "0.5568905", "text": "func (o *GetCustomerOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(200)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "title": "" }, { "docid": "9f7ecaf969100f658c78607bbdaba1e5", "score": "0.55577815", "text": "func (m *WirelessInfoResultResponse) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateWirelessLicenseInfo(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "05e0695ce6f01f8aa7e3b544a98ba5c6", "score": "0.55486166", "text": "func DecodeGrpcRespCustomerList(ctx context.Context, response interface{}) (interface{}, error) {\n\treturn response, nil\n}", "title": "" }, { "docid": "6301677d7996c275efc96893bbbb5169", "score": "0.5546373", "text": "func (m *ReadContactResponse) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tif v, ok := interface{}(m.GetResult()).(interface {\n\t\tValidate() error\n\t}); ok {\n\t\tif err := v.Validate(); err != nil {\n\t\t\treturn ReadContactResponseValidationError{\n\t\t\t\tField: \"Result\",\n\t\t\t\tReason: \"embedded message failed validation\",\n\t\t\t\tCause: err,\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "d220c0947b1ba0e7c49818f7b54defaa", "score": "0.5546079", "text": "func (m *CreateTransactionResponse) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\t// no validation rules for Code\n\n\treturn nil\n}", "title": "" }, { "docid": "e4f87ae939116c3353901b31d8895a88", "score": "0.5528661", "text": "func (o *UpdateCustomerOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(200)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "title": "" }, { "docid": "88cefe1f55f929b28b5e24d72616536c", "score": "0.5523717", "text": "func (m *CancelMatchmakeResponse) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "be64df36d4506f04097fa76570ad7424", "score": "0.54937613", "text": "func (m *DeviceTokenResponse) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\t// no validation rules for CustomerNumber\n\n\tfor idx, item := range m.GetDevices() {\n\t\t_, _ = idx, item\n\n\t\tif v, ok := interface{}(item).(interface{ Validate() error }); ok {\n\t\t\tif err := v.Validate(); err != nil {\n\t\t\t\treturn DeviceTokenResponseValidationError{\n\t\t\t\t\tfield: fmt.Sprintf(\"Devices[%v]\", idx),\n\t\t\t\t\treason: \"embedded message failed validation\",\n\t\t\t\t\tcause: err,\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "b42c7a7afa3e05c4f966687296cd7270", "score": "0.54929936", "text": "func (m *DirectDebitReturnCreationResponse) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateData(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateLinks(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "949e56c99b491a3b041a67dfddc9d6a7", "score": "0.5470172", "text": "func (o *UpdateCustomerBadRequest) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(400)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "title": "" }, { "docid": "3bbb9d2419594bf348d68b51cb1ab6d4", "score": "0.545749", "text": "func (o *GetCustomerBadRequest) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(400)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "title": "" }, { "docid": "2ee7f116793ff1f79df4ab3c5dec9b1c", "score": "0.545677", "text": "func (o *MutationResponse) SetCustomerID(id string) {\n\to.CustomerID = id\n}", "title": "" }, { "docid": "c5946f5aaf4b7764245aeed359c0548c", "score": "0.54563975", "text": "func (m *MessageResponse) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\t// no validation rules for StatusCode\n\n\treturn nil\n}", "title": "" }, { "docid": "c57035b9bfad250a6429c4cb992318eb", "score": "0.5454323", "text": "func (m *GetDoctorByIdResponse) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tif v, ok := interface{}(m.GetResponse()).(interface{ Validate() error }); ok {\n\t\tif err := v.Validate(); err != nil {\n\t\t\treturn GetDoctorByIdResponseValidationError{\n\t\t\t\tfield: \"Response\",\n\t\t\t\treason: \"embedded message failed validation\",\n\t\t\t\tcause: err,\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "a5975c89e30bad51a3ea1debb98ccb71", "score": "0.54523516", "text": "func (m *CompactRegionV1Response) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "title": "" }, { "docid": "ca500bc8513a5f415ac2b1461e7385f3", "score": "0.5440064", "text": "func (m *GetSubscriptionsResponse) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\t// no validation rules for Data\n\n\t// no validation rules for Code\n\n\treturn nil\n}", "title": "" }, { "docid": "73da662e2d2a506a0f8f8f827556eb9e", "score": "0.5431144", "text": "func (m *SMSResponse) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "6d058c4e5b14b32c123aaa6f278277d8", "score": "0.543111", "text": "func (o *UpdateCustomerUnprocessableEntity) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(422)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "title": "" }, { "docid": "bccab5d683b13a5ada1e578deed595e1", "score": "0.54056925", "text": "func (r ApiCreateCustomerRequest) Customer(customer Customer) ApiCreateCustomerRequest {\n\tr.customer = &customer\n\treturn r\n}", "title": "" }, { "docid": "0f85bcbf758fc385ce0d1f7561258aa4", "score": "0.5403589", "text": "func (m *PrivateGetopenordersResponse) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateResult(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8135a131ff055b6fc3dafe5547d63944", "score": "0.5395392", "text": "func (r *Resolver) Customer() generated.CustomerResolver { return &customerResolver{r} }", "title": "" }, { "docid": "8135a131ff055b6fc3dafe5547d63944", "score": "0.5395392", "text": "func (r *Resolver) Customer() generated.CustomerResolver { return &customerResolver{r} }", "title": "" }, { "docid": "efb02dd8af9fdddc71696de51f68808a", "score": "0.5388281", "text": "func DecodeGrpcRespCustomerStatus(ctx context.Context, response interface{}) (interface{}, error) {\n\treturn response, nil\n}", "title": "" }, { "docid": "6f7a1aa4cfb627c2481178982f90c511", "score": "0.53824365", "text": "func (qr QueryResponse) ToCustomer() ([]Customer, error) {\n\tqueryResponse := qr[\"QueryResponse\"]\n\tdocument := queryResponse.(map[string]interface{})\n\n\tb, err := json.Marshal(document[\"Customer\"])\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tcustomers := []Customer{}\n\terr = json.Unmarshal(b, &customers)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn customers, nil\n}", "title": "" }, { "docid": "fdfefc883a5944a89356a80d07f1dde2", "score": "0.5350512", "text": "func (m *RetrieveCustomerGroupResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateErrors(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.contextValidateGroup(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "072c5a1840ae1b64ed3c5d956f045d1a", "score": "0.5348699", "text": "func (mt *Userdataresponse) Validate() (err error) {\n\tif mt.Code == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"code\"))\n\t}\n\tif mt.Message == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"message\"))\n\t}\n\n\tif mt.Data == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"data\"))\n\t}\n\tif mt.Data != nil {\n\t\tif err2 := mt.Data.Validate(); err2 != nil {\n\t\t\terr = goa.MergeErrors(err, err2)\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "0475293aeeb1d39449e9e44413b3ac76", "score": "0.53447056", "text": "func (o *MutationResponse) GetCustomerID() string {\n\treturn o.CustomerID\n}", "title": "" }, { "docid": "0a0ad42efa6958d7ef5bd7034b4b948a", "score": "0.5337695", "text": "func (m *GetWalletInfoResponse) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\t// no validation rules for Status\n\n\t// no validation rules for Data\n\n\treturn nil\n}", "title": "" }, { "docid": "e949c36a01cd427d1bb0c8c1ba043f95", "score": "0.5335313", "text": "func (o *UpdateCustomerPreconditionFailed) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(412)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "title": "" }, { "docid": "fc8689ed83feb2b05d9f82469c747063", "score": "0.53257227", "text": "func (m *GetResponse) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tif v, ok := interface{}(m.GetAccount()).(interface{ Validate() error }); ok {\n\t\tif err := v.Validate(); err != nil {\n\t\t\treturn GetResponseValidationError{\n\t\t\t\tfield: \"Account\",\n\t\t\t\treason: \"embedded message failed validation\",\n\t\t\t\tcause: err,\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "8ba6e550d19df366997d3eb664b15890", "score": "0.5300347", "text": "func EncodeGrpcRespCustomer(ctx context.Context, response interface{}) (interface{}, error) {\n\treturn response, nil\n}", "title": "" }, { "docid": "e7c55a116dab1a6ef9dd07f43c6d6169", "score": "0.5286938", "text": "func encodeCreateCustomerResponse(_ context.Context, response interface{}) (interface{}, error) {\n\tres := response.(transport.CreateCustomerResponse)\n\terr := getError(res.Err)\n\tif err == nil {\n\t\treturn &pb.CreateCustomerResponse{}, nil\n\t}\n\treturn nil, err\n}", "title": "" }, { "docid": "01e02e488b4bde6461f99a2642616501", "score": "0.5280707", "text": "func (m *GetSiteClientsResponse) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateData(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "9c9c369f43b6fd47f6e901c3a6fc71cc", "score": "0.5270507", "text": "func DecodeGrpcRespCustomerPersonalInfo(ctx context.Context, response interface{}) (interface{}, error) {\n\treturn response, nil\n}", "title": "" }, { "docid": "0c6f6d1be8dfa8007dd220880a99517a", "score": "0.52547926", "text": "func (m *GetResponse) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\t{\n\t\ttmp := m.GetPayment()\n\n\t\tif v, ok := interface{}(tmp).(interface{ Validate() error }); ok {\n\n\t\t\tif err := v.Validate(); err != nil {\n\t\t\t\treturn GetResponseValidationError{\n\t\t\t\t\tfield: \"Payment\",\n\t\t\t\t\treason: \"embedded message failed validation\",\n\t\t\t\t\tcause: err,\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "07fc9a3b5d19f47468f7e508d0c91c01", "score": "0.52467173", "text": "func (j JsonRpc20Request) ValidateResponse(response JsonRpc20Response) *JsonRpc20Error {\n\tif j.notification {\n\t\tlog.Error(\"JSON RPC notification does not have response\")\n\t\treturn NewJsonRpcErrorInvalidParams(nil)\n\n\t}\n\t//Check jsonrpc version\n\tif j.version != response.version {\n\t\tlog.Errorf(\"JSON RPC incompatible version: %s. Expecting %s\", response.version, j.version)\n\t\treturn NewJsonRpcErrorInvalidParams(nil)\n\t}\n\tvar id_ interface{}\n\tif response.error != nil {\n\t\tvar responseCode = response.error[\"code\"]\n\t\tif responseCode == JSONRPC_PARSE_ERROR || responseCode == JSONRPC_INVALID_REQUEST {\n\t\t\tid_ = nil\n\t\t}\n\t} else {\n\t\tid_ = j.id\n\t}\n\tif id_ != response.id {\n\t\tlog.Errorf(\"Json RPC response id mismatch: %s. Expecting %s\", response.id, id_)\n\t\treturn NewJsonRpcErrorInvalidParams(nil)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "07fc9a3b5d19f47468f7e508d0c91c01", "score": "0.52467173", "text": "func (j JsonRpc20Request) ValidateResponse(response JsonRpc20Response) *JsonRpc20Error {\n\tif j.notification {\n\t\tlog.Error(\"JSON RPC notification does not have response\")\n\t\treturn NewJsonRpcErrorInvalidParams(nil)\n\n\t}\n\t//Check jsonrpc version\n\tif j.version != response.version {\n\t\tlog.Errorf(\"JSON RPC incompatible version: %s. Expecting %s\", response.version, j.version)\n\t\treturn NewJsonRpcErrorInvalidParams(nil)\n\t}\n\tvar id_ interface{}\n\tif response.error != nil {\n\t\tvar responseCode = response.error[\"code\"]\n\t\tif responseCode == JSONRPC_PARSE_ERROR || responseCode == JSONRPC_INVALID_REQUEST {\n\t\t\tid_ = nil\n\t\t}\n\t} else {\n\t\tid_ = j.id\n\t}\n\tif id_ != response.id {\n\t\tlog.Errorf(\"Json RPC response id mismatch: %s. Expecting %s\", response.id, id_)\n\t\treturn NewJsonRpcErrorInvalidParams(nil)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a25ee4b991653c46d97e7722fe31612b", "score": "0.5222387", "text": "func (m *ListContactsResponse) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tfor idx, item := range m.GetResults() {\n\t\t_, _ = idx, item\n\n\t\tif v, ok := interface{}(item).(interface {\n\t\t\tValidate() error\n\t\t}); ok {\n\t\t\tif err := v.Validate(); err != nil {\n\t\t\t\treturn ListContactsResponseValidationError{\n\t\t\t\t\tField: fmt.Sprintf(\"Results[%v]\", idx),\n\t\t\t\t\tReason: \"embedded message failed validation\",\n\t\t\t\t\tCause: err,\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "a25ee4b991653c46d97e7722fe31612b", "score": "0.5222387", "text": "func (m *ListContactsResponse) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tfor idx, item := range m.GetResults() {\n\t\t_, _ = idx, item\n\n\t\tif v, ok := interface{}(item).(interface {\n\t\t\tValidate() error\n\t\t}); ok {\n\t\t\tif err := v.Validate(); err != nil {\n\t\t\t\treturn ListContactsResponseValidationError{\n\t\t\t\t\tField: fmt.Sprintf(\"Results[%v]\", idx),\n\t\t\t\t\tReason: \"embedded message failed validation\",\n\t\t\t\t\tCause: err,\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "a3ec2a382f1b4c1b3b8bf386a6a80c3e", "score": "0.5219739", "text": "func (o *GetCustomersByIDReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 400:\n\t\tresult := NewGetCustomersByIDBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tcase 404:\n\t\tresult := NewGetCustomersByIDNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\tresult := NewGetCustomersByIDDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "title": "" }, { "docid": "263a8d3acd25ef0942fef9c2da855392", "score": "0.5214789", "text": "func (m *DeleteBrandResponse) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "ad2e9d144c99235b5a85a740fcd601e3", "score": "0.5213666", "text": "func (m *CertificateResponse) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateClientCert(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateClientKey(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateServerCert(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "3566b0a835294ed679bd0fadb899d55c", "score": "0.5198909", "text": "func (m *CustomerDataCustomerExtensionInterface) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateCompanyAttributes(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e1132e7069e1d7606f693dbe2f9de434", "score": "0.5176528", "text": "func NewNotifyCustomerInformationResponse() *NotifyCustomerInformationResponse {\n\treturn &NotifyCustomerInformationResponse{}\n}", "title": "" }, { "docid": "a03bb700828acc4b32739ff17820b60e", "score": "0.51701266", "text": "func (r *cancelRequest) Validate() *validation.Output {\n\to := &validation.Output{Valid: true}\n\n\tif r.RecapSales.IsDeleted == int8(1) {\n\t\to.Failure(\"is_deleted\", \"document is deleted\")\n\t}\n\n\treturn o\n}", "title": "" }, { "docid": "fc40a55d06a32fa33f48f71a1b30264a", "score": "0.51626664", "text": "func (m *GetDeviceResponse) Validate() error {\n\tif err := m.DeviceHeader.Validate(); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "fc40a55d06a32fa33f48f71a1b30264a", "score": "0.51626664", "text": "func (m *GetDeviceResponse) Validate() error {\n\tif err := m.DeviceHeader.Validate(); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "3e36e0d16abe5b2c1a0ec24525442b01", "score": "0.51515985", "text": "func (m *GetBrandResponse) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tif v, ok := interface{}(m.GetResult()).(interface{ Validate() error }); ok {\n\t\tif err := v.Validate(); err != nil {\n\t\t\treturn GetBrandResponseValidationError{\n\t\t\t\tfield: \"Result\",\n\t\t\t\treason: \"embedded message failed validation\",\n\t\t\t\tcause: err,\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "165c7c120a362da42fed45b5282ca383", "score": "0.51477695", "text": "func (m *InvoiceResponse) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateInvoice(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a1ab5f227ef84cec007d06ce8959abbb", "score": "0.5142634", "text": "func (o *CustomerActivityReport) SetCustomerId(v int32) {\n\to.CustomerId = v\n}", "title": "" }, { "docid": "a7dce657e375ede950c35f6e3d1507a0", "score": "0.5130347", "text": "func DecodeGrpcRespCustomerSpec(ctx context.Context, response interface{}) (interface{}, error) {\n\treturn response, nil\n}", "title": "" }, { "docid": "584c8808f19b519b3e8da67e89a018b9", "score": "0.5122007", "text": "func (client *SubscriptionsClient) listByCustomerHandleResponse(resp *http.Response) (SubscriptionsClientListByCustomerResponse, error) {\n\tresult := SubscriptionsClientListByCustomerResponse{}\n\tif err := runtime.UnmarshalAsJSON(resp, &result.SubscriptionsListResult); err != nil {\n\t\treturn SubscriptionsClientListByCustomerResponse{}, err\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "dc04b6102e56017c5f7f39265336a4d0", "score": "0.51179826", "text": "func NewResponse(id string, custID string, accepted bool) *Response {\n\treturn &Response{\n\t\tID: id,\n\t\tCustID: custID,\n\t\tAccepted: accepted,\n\t}\n}", "title": "" }, { "docid": "77dd72f952401aab69370ff04f4bc2b0", "score": "0.510561", "text": "func (m *APIResponse) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateErrors(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateResult(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "33aa19bf44b0f290c1917cb9a3a8dfda", "score": "0.5099999", "text": "func ValidateResponse(t *testing.T, response *http.Response, expected interface{}, code int) {\n\tassert.Equal(t, code, response.StatusCode)\n\tb, err := ioutil.ReadAll(response.Body)\n\tassert.NoError(t, err)\n\n\tout, err := json.Marshal(expected)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tassert.Equal(t, string(out), string(b))\n}", "title": "" }, { "docid": "44bf6745c456ed436a86be5b12388fb9", "score": "0.50982136", "text": "func (mt *Usercommonresponse) Validate() (err error) {\n\tif mt.Code == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"code\"))\n\t}\n\tif mt.Message == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"message\"))\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "a830fd7199adec23eb8bdf564d48e4ec", "score": "0.50955033", "text": "func (m *DeleteElevatorResponse) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "46b8f19c01da7d6db82827f2418c826a", "score": "0.50921494", "text": "func (e CustomerResponseValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "b1c75237a74824acf143e4ebbaee9879", "score": "0.50832194", "text": "func (o *UpdateCustomerInternalServerError) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(500)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "title": "" }, { "docid": "00a1887472f8584f369673846d9795c9", "score": "0.5081384", "text": "func (m *GetElevatorFloorsResponse) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "39e57fbc6730c24fba36925117981549", "score": "0.5073528", "text": "func (m *DeleteObjectResponse) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "8f06f10ab586d3d6fd9b9bfc70468c96", "score": "0.50613", "text": "func (m *GetConnectionsResponse) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateRealms(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "b8a7ad3468be83596446a8b417dccf41", "score": "0.50596464", "text": "func (m *CreateBrandResponse) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tif v, ok := interface{}(m.GetBrand()).(interface{ Validate() error }); ok {\n\t\tif err := v.Validate(); err != nil {\n\t\t\treturn CreateBrandResponseValidationError{\n\t\t\t\tfield: \"Brand\",\n\t\t\t\treason: \"embedded message failed validation\",\n\t\t\t\tcause: err,\n\t\t\t}\n\t\t}\n\t}\n\n\t// no validation rules for ExternalId\n\n\treturn nil\n}", "title": "" }, { "docid": "e05b98747cecb1a5d1866849d1ef71ab", "score": "0.50530165", "text": "func (o *PutCustomersCustomerFidSubscriptionsSubscriptionFidCalculateModificationOKBody) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// validation for a type composition with models.Envelope\n\tif err := o.Envelope.Validate(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := o.validateData(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d448e1ef11a121b4084d04304106efca", "score": "0.5045551", "text": "func ValidateCodeGeneratorResponse(response *pluginpb.CodeGeneratorResponse) error {\n\tif response == nil {\n\t\treturn errors.New(\"nil CodeGeneratorResponse\")\n\t}\n\tfor _, file := range response.File {\n\t\tif file.GetName() == \"\" {\n\t\t\treturn errors.New(\"empty CodeGeneratorResponse.File.Name\")\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d60716347024917958eefc054a62b691", "score": "0.50440294", "text": "func (o *GetContactParams) SetCustomerID(customerID *string) {\n\to.CustomerID = customerID\n}", "title": "" }, { "docid": "0d5493b3a927fd8cbdc6d0bac2e13d7b", "score": "0.50424653", "text": "func (cr *CertificateResponse) Validate() error {\n\treturn validation.ValidateStruct(cr,\n\t\tvalidation.Field(&cr.FileName, validation.Required),\n\t\tvalidation.Field(&cr.CommonName, validation.Required),\n\t\tvalidation.Field(&cr.CertificateChain, validation.Required),\n\t)\n}", "title": "" }, { "docid": "be453696291f83515b4c2abd476d28ef", "score": "0.5031703", "text": "func (m *DeleteBrandAttributeResponse) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "4ddb284f531c9916ee2b8f0724187563", "score": "0.5029833", "text": "func (e CustomerResponseValidationError) Cause() error { return e.cause }", "title": "" }, { "docid": "86311d37cd842dec1d98e1ef4d205a72", "score": "0.5026527", "text": "func (m *CheckInMutation) SetCustomerID(id int) {\n\tm.customer = &id\n}", "title": "" }, { "docid": "adf8c40a6e8245db1aed3a17efcf440e", "score": "0.50226265", "text": "func NewUpdateCustomerOK() *UpdateCustomerOK {\n\n\treturn &UpdateCustomerOK{}\n}", "title": "" }, { "docid": "3bdaf23bf77d02e32b218fef78b0546c", "score": "0.5021527", "text": "func CreateGetCreateCustomerInformationResponse() (response *GetCreateCustomerInformationResponse) {\n\tresponse = &GetCreateCustomerInformationResponse{\n\t\tBaseResponse: &responses.BaseResponse{},\n\t}\n\treturn\n}", "title": "" }, { "docid": "2cfefee2e6cb9bba4f9686c8ccd54533", "score": "0.5019326", "text": "func (o *Contract) SetCustomerId(v string) {\n\to.CustomerId = &v\n}", "title": "" }, { "docid": "e50f1cf0a5833b2af796203e02bdc693", "score": "0.5013899", "text": "func (m *CreateResponse) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\t// no validation rules for ID\n\n\treturn nil\n}", "title": "" }, { "docid": "c958f889f2fb0c3bc7473620b5a4dd9d", "score": "0.5010532", "text": "func (m *MatchmakeResponse) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\t// no validation rules for Id\n\n\treturn nil\n}", "title": "" }, { "docid": "30432d44f4cf5348ebd66871d7d48451", "score": "0.500768", "text": "func EncodeGrpcRespCustomerList(ctx context.Context, response interface{}) (interface{}, error) {\n\treturn response, nil\n}", "title": "" } ]
cf080e500d71ad921a02e8b3d40e3712
Setters always write values, regardless of default
[ { "docid": "9725321f66f58a17de19e369cbe9b98b", "score": "0.0", "text": "func SetBoolSlot(fbb *flatbuffers.Builder, slot int, value bool) {\n\tif value {\n\t\tSetByteSlot(fbb, slot, 1)\n\t} else {\n\t\tSetByteSlot(fbb, slot, 0)\n\t}\n}", "title": "" } ]
[ { "docid": "1cc156185628b4eeb17437441bcb93d5", "score": "0.5790446", "text": "func Set(config configmap.Getter, opt interface{}) (err error) {\n\tdefaultItems, err := Items(opt)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefStruct := reflect.ValueOf(opt).Elem()\n\tfor _, defaultItem := range defaultItems {\n\t\tnewValue := defaultItem.Value\n\t\tif configValue, ok := config.Get(defaultItem.Name); ok {\n\t\t\tvar newNewValue interface{}\n\t\t\tnewNewValue, err = StringToInterface(newValue, configValue)\n\t\t\tif err != nil {\n\t\t\t\t// Mask errors if setting an empty string as\n\t\t\t\t// it isn't valid for all types. This makes\n\t\t\t\t// empty string be the equivalent of unset.\n\t\t\t\tif configValue != \"\" {\n\t\t\t\t\treturn fmt.Errorf(\"couldn't parse config item %q = %q as %T: %w\", defaultItem.Name, configValue, defaultItem.Value, err)\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tnewValue = newNewValue\n\t\t\t}\n\t\t}\n\t\tdefStruct.Field(defaultItem.Num).Set(reflect.ValueOf(newValue))\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "307a27489f3e8d61c1bfc26f398680d0", "score": "0.57279396", "text": "func TestSetFalse(t *testing.T) {\n\t// Set\n\tactual := example{\n\t\tFoo: false,\n\t}\n\n\tdefaults.SetDefaults(&actual)\n\n\t// Assert\n\tassert.Equal(t, actual.Foo, false)\n}", "title": "" }, { "docid": "b3c8be2b8a16b3ebffedd2c8247ff3a8", "score": "0.5710638", "text": "func (w *Writer) Set() (int, error) { return w.Write(nil) }", "title": "" }, { "docid": "1c91a63e4cba8e3ef04bd1267643ecee", "score": "0.5688839", "text": "func (p *PWM) Set(val float32) {\n\tlog.Printf(\"%s.Set() %f\\n\", p.Name, val)\n\tp.val = clamp(val)\n}", "title": "" }, { "docid": "8bcf45eb57770df757668ecbe3e5bb3a", "score": "0.5639145", "text": "func (d *Defaulter) Set(arg interface{}) error {\n\td.once()\n\tv := reflect.ValueOf(arg)\n\tif !v.IsValid() {\n\t\treturn errors.New(\"invalid value\")\n\t}\n\tv = reflect.Indirect(v)\n\tdefValue, ok := d.r[v.Type().String()]\n\tif !ok {\n\t\treturn errors.New(\"type not registered: \" + reflect.TypeOf(arg).String())\n\t}\n\terr := mergo.Merge(arg, defValue, mergo.WithTransformers(kongTransformer{}))\n\tif err != nil {\n\t\terr = errors.Wrap(err, \"merging\")\n\t}\n\treturn err\n\t// return defaulter.Set(arg, defValue)\n}", "title": "" }, { "docid": "377bfa610f546bb4aefbb27f19442441", "score": "0.55672145", "text": "func (sl *StabilityLevel) setDefaults() {\n\tswitch *sl {\n\tcase \"\":\n\t\t*sl = ALPHA\n\tdefault:\n\t\t// no-op, since we have a StabilityLevel already\n\t}\n}", "title": "" }, { "docid": "d38f9f6c999205ac6099951e5c9df317", "score": "0.5524115", "text": "func setDefaults(a, b interface{}) {\n\tpt := reflect.TypeOf(a)\n\tt := pt.Elem()\n\tva := reflect.ValueOf(a).Elem()\n\tvb := reflect.ValueOf(b).Elem()\n\tfor i := 0; i < t.NumField(); i++ {\n\t\taField := va.Field(i)\n\t\t// Set a from b if it is public\n\t\tif aField.CanSet() {\n\t\t\tbField := vb.Field(i)\n\t\t\taField.Set(bField)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "dff74a00f42820471e4b140a02a5db5e", "score": "0.54964596", "text": "func (d *Default) Set(key string, value interface{}) bool {\n\treturn true\n}", "title": "" }, { "docid": "bb5ca4aaa1fc5eb4428a4001797935f1", "score": "0.5496052", "text": "func (g *TerminalGenerator) Set(name, value string) {}", "title": "" }, { "docid": "0d8ae9e8fc3a522e122174b1adf7f329", "score": "0.54681313", "text": "func (s *State) Set(cs, p, pe, eof int) {\n\ts.cs, s.p, s.pe, s.eof = cs, p, pe, eof\n}", "title": "" }, { "docid": "1927b7d65bd9e4c385b82f724f4f2e3e", "score": "0.54397434", "text": "func SetDefault(key string, value interface{}) { v.SetDefault(key, value) }", "title": "" }, { "docid": "c28c2bfa50d0acc9b0166a01e70d3ba0", "score": "0.5425989", "text": "func TestSettersandGetters(t *testing.T) {\n\tfor _, sv := range GetSysVars() {\n\t\tif !sv.HasSessionScope() {\n\t\t\t// There are some historial exceptions where global variables are loaded into the session.\n\t\t\t// Please don't add to this list, the behavior is not MySQL compatible.\n\t\t\tswitch sv.Name {\n\t\t\tcase TiDBEnableChangeMultiSchema, TiDBDDLReorgBatchSize, TiDBEnableAlterPlacement,\n\t\t\t\tTiDBMaxDeltaSchemaCount, InitConnect, MaxPreparedStmtCount,\n\t\t\t\tTiDBDDLReorgWorkerCount, TiDBDDLErrorCountLimit, TiDBRowFormatVersion,\n\t\t\t\tTiDBEnableTelemetry, TiDBEnablePointGetCache:\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\trequire.Nil(t, sv.SetSession)\n\t\t\trequire.Nil(t, sv.GetSession)\n\t\t}\n\t\tif !sv.HasGlobalScope() {\n\t\t\trequire.Nil(t, sv.SetGlobal)\n\t\t\tif sv.Name == Timestamp {\n\t\t\t\t// The Timestamp sysvar will have GetGlobal func even though it does not have global scope.\n\t\t\t\t// It's GetGlobal func will only be called when \"set timestamp = default\".\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\trequire.Nil(t, sv.GetGlobal)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "6c157577443d3b15b8a75cf056e87f19", "score": "0.5387344", "text": "func (c XchainServer) SetDefaults() {\n}", "title": "" }, { "docid": "0ca2541a342e2323b2b49462d2d6b69e", "score": "0.53417945", "text": "func (c DbConfig) SetDefaults() {\n}", "title": "" }, { "docid": "672583ebb900ba416d22728b5b19a7c5", "score": "0.53359413", "text": "func Set(o interface{}) {\n\tv := reflect.ValueOf(o)\n\tif v.Kind() == reflect.Ptr && !v.Elem().CanSet() {\n\t\tfmt.Println(\"this could not be set\")\n\t\treturn\n\t}\n\n\tv = v.Elem()\n\n\tif f := v.FieldByName(\"Name\"); f.Kind() == reflect.String {\n\t\tf.SetString(\"BYEbye\")\n\t}\n}", "title": "" }, { "docid": "a9ed4e84f1a001bc72c7f804991833e0", "score": "0.52892554", "text": "func Set(args []string) {\n\tif len(args) < 2 {\n\t\tmessenger.Alert(\"error\", Language.Translate(\"Not enough arguments\"))\n\t\treturn\n\t}\n\n\toption := args[0]\n\tvalue := args[1]\n\n\tSetOptionAndSettings(option, value)\n}", "title": "" }, { "docid": "c3b4a307c7969b456f90c430d5e3286d", "score": "0.5268817", "text": "func (o *UserPreferenceAllOf) SetValue(v string) {\n\to.Value = &v\n}", "title": "" }, { "docid": "f883ac3ddebb500d2584bbd4161907b6", "score": "0.5266157", "text": "func (c *Client) setDefaults() {\n\tif c.transport == nil {\n\t\tc.transport = usrv.DefaultTransportFactory()\n\t}\n\n\tif c.codec == nil {\n\t\tc.codec = usrv.DefaultCodecFactory()\n\t}\n}", "title": "" }, { "docid": "ef568ec1114f8a70d941149a171cd545", "score": "0.5248441", "text": "func canSetExample() {\n\tx := 10\n\tv := reflect.ValueOf(&x).Elem()\n\tchangeToSeven(v)\n\tfmt.Println(\"value outside:\", v.Interface())\n\n\t// 结果\n\t// panic: reflect: reflect.Value.SetInt using unaddressable value\n}", "title": "" }, { "docid": "4e492c8bfbf03ed146515011f7335007", "score": "0.5247551", "text": "func (a *adapter) Set(protoreflect.FieldDescriptor, protoreflect.Value) {\n\tklog.Fatalf(\"not implemented\")\n}", "title": "" }, { "docid": "a44488433322045da258aaf1528d9148", "score": "0.5236004", "text": "func (request *RotateClusterRequest) SetDefaults() {}", "title": "" }, { "docid": "d1dd47340630e0d48bf4233ef08900d2", "score": "0.5225272", "text": "func (s *NotifTelegram) SetDefaults() {\n\t// noop\n}", "title": "" }, { "docid": "9ec7faf2c22571002e6024dd480a28e8", "score": "0.5224593", "text": "func setFields(fieldValue reflect.Value, val parse.Parser) error {\n\tif fieldValue.CanSet() {\n\t\tfieldValue.Set(reflect.ValueOf(val).Elem().Convert(fieldValue.Type()))\n\t} else {\n\t\treturn fmt.Errorf(\"%s is not settable\", fieldValue.Type().String())\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "efa987ddca28384e4f390ad2740bed2a", "score": "0.5215288", "text": "func (this *Uint) Set(val interface{}) {\n this.lock.Lock()\n defer this.lock.Unlock()\n\n this.val = val.(uint64)\n}", "title": "" }, { "docid": "4bb6d7608e0cffbbdd8875fef3bf67f1", "score": "0.52132505", "text": "func setInitialValues() {\n\tint64ValPos1 = 101\n\tint64ValPos2 = 102\n\n\tint64Val1 = 1\n\tint64Val2 = 2\n\tfloat64Val3 = 3.333\n\tboolVal4 = false\n\tstr5 = \"v1\"\n\tstr6 = \"v2\"\n}", "title": "" }, { "docid": "3c73368b11af52cdb5e13348ed9fab1a", "score": "0.5211136", "text": "func (m *SingleValueLegacyExtendedProperty) SetValue(value *string)() {\n err := m.GetBackingStore().Set(\"value\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "c4b88861594cb707d16eafee0f2e3a6e", "score": "0.52047396", "text": "func (s *OTKSuite) TestSetReplacesExistingValues(c *C) {\n\ttoken := otk.OpenToken{}\n\ttoken.Set(\"key\", \"value1\")\n\ttoken.Set(\"key\", \"value2\")\n\tc.Assert(token[\"key\"], Equals, []string{\"value2\"})\n}", "title": "" }, { "docid": "88465024dad0360d375ba09df88eb5fc", "score": "0.5195761", "text": "func (dec *Decoder) setValues() error {\n\ttmp := dec.curr // hold current field\n\tfor i, v := range dec.currValues {\n\t\tdec.curr = tmp.Index(i)\n\t\tdec.currValues[0] = v\n\t\tif err := dec.decode(); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "1a7c088240f8d7309e4709ecb34f9aa8", "score": "0.5193937", "text": "func (node *Node) SetValue(val int){\n\tnode.Val = val\n}", "title": "" }, { "docid": "e90dd51539d1a75ae74d05f3c911b09a", "score": "0.5190361", "text": "func (s *Safe) Set(value interface{}) {\n\ts.m.Lock()\n\tdefer s.m.Unlock()\n\ts.value = value\n}", "title": "" }, { "docid": "33b785207ad544a0eb5ecc6c0928b7e5", "score": "0.51903576", "text": "func (m *Int64) Set(x int64) {\n\tm.Value = x\n\tm.Valid = true\n}", "title": "" }, { "docid": "992dcdb767d130ff0ea19dc2a68f1535", "score": "0.5180814", "text": "func (p *Output) Set() {\n\tlog.Printf(\"%s.Set()\", p.Name)\n}", "title": "" }, { "docid": "3c19b27819751f1a99ca38a64523a9a9", "score": "0.5165724", "text": "func (h *WasmHelper) Set(name string, value any) error {\n\tif h.verbose {\n\t\tprintLog(\"Setting value: %+v for name: '%s'\", value, name)\n\t}\n\n\tnames := strings.Split(name, \".\")\n\tcount := len(names)\n\n\tvar lastName string\n\tvar parent js.Value\n\n\tif count >= 2 {\n\t\tparentNames := names[:count-1]\n\t\tparent, _ = h.get(js.Null(), parentNames)\n\n\t\t// undefined / null check\n\t\tif parent.IsUndefined() || parent.IsNull() {\n\t\t\treturn fmt.Errorf(\"could not set value, '%s' is undefined or null\", strings.Join(parentNames, \".\"))\n\t\t}\n\n\t\tlastName = names[count-1]\n\t} else if count == 1 {\n\t\tparent = js.Global()\n\t\tlastName = names[0]\n\t} else {\n\t\treturn fmt.Errorf(\"could not set value, given name is empty\")\n\t}\n\n\t// set value\n\tparent.Set(lastName, value)\n\n\treturn nil\n}", "title": "" }, { "docid": "5de56d16f6ff734099bb0b932b47e146", "score": "0.51593876", "text": "func (self *DBSeter) setFieldValue(ind reflect.Value, value interface{}) {\r\n\tswitch ind.Kind() {\r\n\tcase reflect.Bool:\r\n\t\tif value == nil {\r\n\t\t\tind.SetBool(false)\r\n\t\t} else if v, ok := value.(bool); ok {\r\n\t\t\tind.SetBool(v)\r\n\t\t} else {\r\n\t\t\tv, _ := StrTo(ToStr(value)).Bool()\r\n\t\t\tind.SetBool(v)\r\n\t\t}\r\n\r\n\tcase reflect.String:\r\n\t\tif value == nil {\r\n\t\t\tind.SetString(\"\")\r\n\t\t} else {\r\n\t\t\tind.SetString(ToStr(value))\r\n\t\t}\r\n\r\n\tcase reflect.Int, reflect.Int8, reflect.Int16, reflect.Int32, reflect.Int64:\r\n\t\tif value == nil {\r\n\t\t\tind.SetInt(0)\r\n\t\t} else {\r\n\t\t\tval := reflect.ValueOf(value)\r\n\t\t\tswitch val.Kind() {\r\n\t\t\tcase reflect.Int, reflect.Int8, reflect.Int16, reflect.Int32, reflect.Int64:\r\n\t\t\t\tind.SetInt(val.Int())\r\n\t\t\tcase reflect.Uint, reflect.Uint8, reflect.Uint16, reflect.Uint32, reflect.Uint64:\r\n\t\t\t\tind.SetInt(int64(val.Uint()))\r\n\t\t\tdefault:\r\n\t\t\t\tv, _ := StrTo(ToStr(value)).Int64()\r\n\t\t\t\tind.SetInt(v)\r\n\t\t\t}\r\n\t\t}\r\n\tcase reflect.Uint, reflect.Uint8, reflect.Uint16, reflect.Uint32, reflect.Uint64:\r\n\t\tif value == nil {\r\n\t\t\tind.SetUint(0)\r\n\t\t} else {\r\n\t\t\tval := reflect.ValueOf(value)\r\n\t\t\tswitch val.Kind() {\r\n\t\t\tcase reflect.Int, reflect.Int8, reflect.Int16, reflect.Int32, reflect.Int64:\r\n\t\t\t\tind.SetUint(uint64(val.Int()))\r\n\t\t\tcase reflect.Uint, reflect.Uint8, reflect.Uint16, reflect.Uint32, reflect.Uint64:\r\n\t\t\t\tind.SetUint(val.Uint())\r\n\t\t\tdefault:\r\n\t\t\t\tv, _ := StrTo(ToStr(value)).Uint64()\r\n\t\t\t\tind.SetUint(v)\r\n\t\t\t}\r\n\t\t}\r\n\tcase reflect.Float64, reflect.Float32:\r\n\t\tif value == nil {\r\n\t\t\tind.SetFloat(0)\r\n\t\t} else {\r\n\t\t\tval := reflect.ValueOf(value)\r\n\t\t\tswitch val.Kind() {\r\n\t\t\tcase reflect.Float64:\r\n\t\t\t\tind.SetFloat(val.Float())\r\n\t\t\tdefault:\r\n\t\t\t\tv, _ := StrTo(ToStr(value)).Float64()\r\n\t\t\t\tind.SetFloat(v)\r\n\t\t\t}\r\n\t\t}\r\n\r\n\tcase reflect.Struct:\r\n\t\tif value == nil {\r\n\t\t\tind.Set(reflect.Zero(ind.Type()))\r\n\t\t\treturn\r\n\t\t}\r\n\t\tswitch ind.Interface().(type) {\r\n\t\tcase time.Time:\r\n\t\t\tvar str string\r\n\t\t\tswitch d := value.(type) {\r\n\t\t\tcase time.Time:\r\n\t\t\t\tself.TimeFromDB(&d, self.oper.info.TZ)\r\n\r\n\t\t\t\tind.Set(reflect.ValueOf(d))\r\n\t\t\tcase []byte:\r\n\t\t\t\tstr = string(d)\r\n\t\t\tcase string:\r\n\t\t\t\tstr = d\r\n\t\t\t}\r\n\t\t\tif str != \"\" {\r\n\t\t\t\tif len(str) >= 19 {\r\n\t\t\t\t\tstr = str[:19]\r\n\t\t\t\t\tt, err := time.ParseInLocation(formatDateTime, str, self.oper.info.TZ)\r\n\t\t\t\t\tif err == nil {\r\n\t\t\t\t\t\tt = t.In(DefaultTimeLoc)\r\n\t\t\t\t\t\tind.Set(reflect.ValueOf(t))\r\n\t\t\t\t\t}\r\n\t\t\t\t} else if len(str) >= 10 {\r\n\t\t\t\t\tstr = str[:10]\r\n\t\t\t\t\tt, err := time.ParseInLocation(formatDate, str, DefaultTimeLoc)\r\n\t\t\t\t\tif err == nil {\r\n\t\t\t\t\t\tind.Set(reflect.ValueOf(t))\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\tcase sql.NullString, sql.NullInt64, sql.NullFloat64, sql.NullBool:\r\n\t\t\tindi := reflect.New(ind.Type()).Interface()\r\n\t\t\tsc, ok := indi.(sql.Scanner)\r\n\t\t\tif !ok {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\t\t\terr := sc.Scan(value)\r\n\t\t\tif err == nil {\r\n\t\t\t\tind.Set(reflect.Indirect(reflect.ValueOf(sc)))\r\n\t\t\t}\r\n\t\t}\r\n\t}\r\n}", "title": "" }, { "docid": "72c18eb5814036d68cbc36db08a89e08", "score": "0.5135557", "text": "func TestSetValues(t *testing.T) {\n\n\tcurrentPage := 1\n\ttotalItems := 50\n\tperPage := 5\n\trangePage := 5\n\n\tpagination := new(Pagination)\n\tpagination.CurrentPage = currentPage\n\tpagination.TotalItems = totalItems\n\tpagination.PerPage = perPage\n\tpagination.RangePage = rangePage\n\n\tpagination.SetValues()\n\n\tif pagination.NextPage != 2 {\n\t\tt.Errorf(\"SetValues(): expected pagination.NextPage equals 2 but obtained %v\", pagination.NextPage)\n\t}\n\n\tif pagination.PreviousPage != 0 {\n\t\tt.Errorf(\"SetValues(): expected pagination.PreviousPage equals 0 but obtained %v\", pagination.PreviousPage)\n\t}\n\n\tif pagination.TotalPages != 10 {\n\t\tt.Errorf(\"SetValues(): expected pagination.TotalPages equals 10 but obtained %v\", pagination.TotalPages)\n\t}\n\n}", "title": "" }, { "docid": "1f340787212a80b77a25599ab2a3d23d", "score": "0.51315767", "text": "func (m *Bool) Set(x bool) {\n\tm.Value = x\n\tm.Valid = true\n}", "title": "" }, { "docid": "0c8a3043af789e1dd375622d8deec0ed", "score": "0.51302296", "text": "func (m *AutonomousSystem) SetValue(value *string)() {\n err := m.GetBackingStore().Set(\"value\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "f2ced45a75edd28b330da04486dd05f9", "score": "0.51252097", "text": "func (hangupReceiver *Hangup) Setter(field string) (setter func(interface{}) (*Hangup, error)) {\n\n\treturn\n}", "title": "" }, { "docid": "01eb65ffa7b24a5a186e5827ba99e8e9", "score": "0.5122386", "text": "func (w *Writer) SetVal(start LineNumber, end Goto, dest Writable, src Readable) {\n\tw.startLine(start)\n\tdest.writeWrite(w)\n\tw.write(\" EQUALS\")\n\tsrc.writeRead(w)\n\tw.endLine(end)\n}", "title": "" }, { "docid": "d13719221e56c015a87ecbf0a8714529", "score": "0.51213384", "text": "func (d *Datum) SetValue(val interface{}, tp *types.FieldType) {\n\tswitch x := val.(type) {\n\tcase nil:\n\t\td.SetNull()\n\tcase bool:\n\t\tif x {\n\t\t\td.SetInt64(1)\n\t\t} else {\n\t\t\td.SetInt64(0)\n\t\t}\n\tcase int:\n\t\td.SetInt64(int64(x))\n\tcase int64:\n\t\td.SetInt64(x)\n\tcase uint64:\n\t\td.SetUint64(x)\n\tcase float32:\n\t\td.SetFloat32(x)\n\tcase float64:\n\t\td.SetFloat64(x)\n\tcase string:\n\t\td.SetString(x, tp.GetCollate())\n\tcase []byte:\n\t\td.SetBytes(x)\n\tcase *MyDecimal:\n\t\td.SetMysqlDecimal(x)\n\tcase Duration:\n\t\td.SetMysqlDuration(x)\n\tcase Enum:\n\t\td.SetMysqlEnum(x, tp.GetCollate())\n\tcase BinaryLiteral:\n\t\td.SetBinaryLiteral(x)\n\tcase BitLiteral: // Store as BinaryLiteral for Bit and Hex literals\n\t\td.SetBinaryLiteral(BinaryLiteral(x))\n\tcase HexLiteral:\n\t\td.SetBinaryLiteral(BinaryLiteral(x))\n\tcase Set:\n\t\td.SetMysqlSet(x, tp.GetCollate())\n\tcase BinaryJSON:\n\t\td.SetMysqlJSON(x)\n\tcase Time:\n\t\td.SetMysqlTime(x)\n\tdefault:\n\t\td.SetInterface(x)\n\t}\n}", "title": "" }, { "docid": "c5461f30b6430f4c39356812e331a185", "score": "0.511451", "text": "func set(ctx *cli.Context) error {\n\tkeyPath := ctx.String(\"keypath\")\n\n\tif keyPath == \"crypto\" || strings.HasPrefix(keyPath, \"crypto.\") {\n\t\treturn Exit(fmt.Errorf(\"Unable to modify `crypto` property, use `rekey` instead.\"), ExitCodeInputError)\n\t}\n\n\tisPlainText := ctx.Bool(\"plain-text\")\n\tif !configFile.HasCrypto() && !isPlainText {\n\t\t// Won't store a plaintext unless we very explicitly ask for it\n\t\tmessage := fmt.Sprintf(noCryptoError, keyPath)\n\t\treturn Exit(errors.New(message), ExitCodeInputError)\n\t}\n\n\tvar plainText []byte\n\tvar err error\n\tif file := ctx.String(\"input-file\"); file != \"\" {\n\t\tplainText, err = input.ReadFile(file)\n\t} else {\n\t\tprompt := fmt.Sprintf(\"Enter value for “%s”\", keyPath)\n\t\tplainText, err = input.ReadSecret(prompt, !isPlainText)\n\t}\n\n\tif err != nil {\n\t\treturn Exit(err, ExitCodeInputError)\n\t}\n\n\tif isPlainText {\n\t\terr = configFile.VeryInsecurelySetPlaintext(keyPath, plainText)\n\t} else {\n\t\terr = configFile.Set(keyPath, plainText)\n\t}\n\n\tif err != nil {\n\t\treturn Exit(fmt.Sprintf(\"Could not set %s: %s\", keyPath, err), ExitCodeToolError)\n\t}\n\n\ttarget := ctx.Args().Get(0)\n\tif err := util.SerializeAndWrite(target, configFile); err != nil {\n\t\treturn Exit(err, ExitCodeToolError)\n\t}\n\n\tlog.Infof(\"Value set at %s\", keyPath)\n\t// update defaults file if write was successful\n\tupdateDefaultsFile(target, keyPath)\n\n\treturn nil\n}", "title": "" }, { "docid": "a248553671e7f92cdfbe1b23d907393a", "score": "0.51142186", "text": "func (o *DeviceControlParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "8de71f0b7e201117d852e7da0b41d110", "score": "0.510949", "text": "func (s *Server) setDefaults() {\n\tif s.transport == nil {\n\t\ts.transport = usrv.DefaultTransportFactory()\n\t}\n\n\tif s.codec == nil {\n\t\ts.codec = usrv.DefaultCodecFactory()\n\t}\n\n\tif s.panicHandler == nil {\n\t\ts.panicHandler = defaultPanicHandler\n\t}\n}", "title": "" }, { "docid": "5611b963c3447ad24556f0ebba58a2aa", "score": "0.5106475", "text": "func (o *FrozenAllParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "8e0244a43c6948727f2bc526f911ddfe", "score": "0.5101883", "text": "func (o *LunModifyParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "805ec5b8dfa7466af9702ee724c674b5", "score": "0.5099848", "text": "func TestDefaultValuesAreSettable(t *testing.T) {\n\tvars := NewSessionVars()\n\tvars.GlobalVarsAccessor = NewMockGlobalAccessor4Tests()\n\tfor _, sv := range GetSysVars() {\n\t\tif sv.HasSessionScope() && !sv.ReadOnly {\n\t\t\tval, err := sv.Validate(vars, sv.Value, ScopeSession)\n\t\t\trequire.Equal(t, val, sv.Value)\n\t\t\trequire.NoError(t, err)\n\t\t}\n\n\t\tif sv.HasGlobalScope() && !sv.ReadOnly {\n\t\t\tval, err := sv.Validate(vars, sv.Value, ScopeGlobal)\n\t\t\trequire.Equal(t, val, sv.Value)\n\t\t\trequire.NoError(t, err)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "b29132ef1be3d99255ab742a42d17db9", "score": "0.5098645", "text": "func (pin Pin) Set() {\n\tp().io[pin].Store(uint32(CONSTANT | DriveH34L23 | EnOE | InvOE | InvDO))\n}", "title": "" }, { "docid": "2e52ee87081ac35d2856b76509a42276", "score": "0.50975007", "text": "func (f *Field) Set(number int) {\n\tf.wait <- 1\n\tf.value = number\n\t<-f.wait\n}", "title": "" }, { "docid": "141e149400685cd10be6145a2e872a0c", "score": "0.50929904", "text": "func (m *model) Set(options ...ModAttr) Model { // Functional options.\n\tfor _, opt := range options {\n\t\topt(m) // apply option by calling function with model instance.\n\t}\n\treturn m\n}", "title": "" }, { "docid": "14af9fe60bd5bbc40cc7d3f6579d179b", "score": "0.5082963", "text": "func (f *Bool) Set(val bool) {\n\tf.set(-1, val, false)\n}", "title": "" }, { "docid": "7c512f3a9b3976f0ac815645f213a8c8", "score": "0.50792265", "text": "func setDefaults(obj any) {\n\tvalueOf := reflect.ValueOf(obj).Elem()\n\n\tfor i := 0; i < valueOf.NumField(); i++ {\n\t\tfield := valueOf.Field(i)\n\t\tfieldType := valueOf.Type().Field(i)\n\t\ttag := fieldType.Tag.Get(\"default\")\n\n\t\tswitch field.Kind() {\n\t\tcase reflect.String:\n\t\t\tif tag != \"\" && field.IsZero() {\n\t\t\t\tfield.SetString(tag)\n\t\t\t}\n\t\t\tcontinue\n\t\tcase reflect.Struct:\n\t\t\tsetDefaults(field.Addr().Interface())\n\t\t\tcontinue\n\t\t}\n\n\t\tswitch field.Type().String() {\n\t\tcase \"metrics.Counter\":\n\t\t\tif field.IsNil() {\n\t\t\t\tif tag != \"discard.NewCounter()\" {\n\t\t\t\t\tpanic(\"invalid default value for counter\")\n\t\t\t\t}\n\t\t\t\tfield.Set(reflect.ValueOf(discard.NewCounter()))\n\t\t\t}\n\t\tcase \"metrics.Gauge\":\n\t\t\tif field.IsNil() {\n\t\t\t\tif tag != \"discard.NewGauge()\" {\n\t\t\t\t\tpanic(\"invalid default value for gauge\")\n\t\t\t\t}\n\t\t\t\tfield.Set(reflect.ValueOf(discard.NewGauge()))\n\t\t\t}\n\t\tcase \"metrics.Histogram\":\n\t\t\tif field.IsNil() {\n\t\t\t\tif tag != \"discard.NewHistogram()\" {\n\t\t\t\t\tpanic(\"invalid default value for histogram\")\n\t\t\t\t}\n\t\t\t\tfield.Set(reflect.ValueOf(discard.NewHistogram()))\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "78a534aa599c63108c89675088fdeadd", "score": "0.5078681", "text": "func (mmWriteTo *mFoldableReaderMockWriteTo) Set(f func(w io.Writer) (n int64, err error)) *FoldableReaderMock {\n\tif mmWriteTo.defaultExpectation != nil {\n\t\tmmWriteTo.mock.t.Fatalf(\"Default expectation is already set for the FoldableReader.WriteTo method\")\n\t}\n\n\tif len(mmWriteTo.expectations) > 0 {\n\t\tmmWriteTo.mock.t.Fatalf(\"Some expectations are already set for the FoldableReader.WriteTo method\")\n\t}\n\n\tmmWriteTo.mock.funcWriteTo = f\n\treturn mmWriteTo.mock\n}", "title": "" }, { "docid": "36bd51a6f0a6719d6e65a85412a90a4e", "score": "0.50773484", "text": "func (m *AuthenticationStrengthUsage) SetNone(value []ConditionalAccessPolicyable)() {\n err := m.GetBackingStore().Set(\"none\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "a20e5cbf7f83a896a3d43b643c565e47", "score": "0.50763834", "text": "func (f *Float64) Set(val float64) {\n\tf.set(-1, val, false)\n}", "title": "" }, { "docid": "c46cf44b6b1fb61ef166159e57bec570", "score": "0.5073733", "text": "func (mmWrite *mWriterMockWrite) Set(f func(p []byte) (n int, err error)) *WriterMock {\n\tif mmWrite.defaultExpectation != nil {\n\t\tmmWrite.mock.t.Fatalf(\"Default expectation is already set for the Writer.Write method\")\n\t}\n\n\tif len(mmWrite.expectations) > 0 {\n\t\tmmWrite.mock.t.Fatalf(\"Some expectations are already set for the Writer.Write method\")\n\t}\n\n\tmmWrite.mock.funcWrite = f\n\treturn mmWrite.mock\n}", "title": "" }, { "docid": "0f0544f1a442d6b7829db014fdec9529", "score": "0.5073099", "text": "func (reflection *Reflector) SetValues(provider DataProvider) (interface{}, error){\n\t// get data from provider\n\tdata, err := provider.Load()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tvalueOf := reflect.ValueOf(reflection.source)\n\tif err := setFieldsValues(&valueOf, reflection.fields, data); err != nil {\n\t\treturn nil, err\n\t}\n\n\n\treturn reflection.source, nil\n}", "title": "" }, { "docid": "a33c7122cdf9218f12b26b7cb247f972", "score": "0.5072726", "text": "func (o *StorageServiceUpdateSnitchPostParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "b36c3875ff1a5fe7ec6896f8d2cc0f72", "score": "0.5068019", "text": "func (d *data) SetValue(val string) {\n\td.value = val\n}", "title": "" }, { "docid": "8218f9dfe2686f7e0d4e17d154624abd", "score": "0.5057348", "text": "func (m *Int) Set(x int) {\n\tm.Value = x\n\tm.Valid = true\n}", "title": "" }, { "docid": "fc1e58e2116a0f9668651b5bb0dabbbe", "score": "0.5057315", "text": "func Set(uint64) error { return nil }", "title": "" }, { "docid": "6d9adda035cd0cab04954f73e8a72f6a", "score": "0.50506085", "text": "func (sc *ShoppingCreate) defaults() {\n\tif _, ok := sc.mutation.Date(); !ok {\n\t\tv := shopping.DefaultDate()\n\t\tsc.mutation.SetDate(v)\n\t}\n\tif _, ok := sc.mutation.Sum(); !ok {\n\t\tv := shopping.DefaultSum\n\t\tsc.mutation.SetSum(v)\n\t}\n\tif _, ok := sc.mutation.Complete(); !ok {\n\t\tv := shopping.DefaultComplete\n\t\tsc.mutation.SetComplete(v)\n\t}\n\tif _, ok := sc.mutation.GetType(); !ok {\n\t\tv := shopping.DefaultType\n\t\tsc.mutation.SetType(v)\n\t}\n}", "title": "" }, { "docid": "1780b7641903b6fd766318237ba42b4a", "score": "0.5048616", "text": "func (obj Thing) Set(key string, v interface{}) { obj.o.Set(key, v) }", "title": "" }, { "docid": "268a93fa3d0c945557affd21c6039099", "score": "0.50471985", "text": "func (box *Int64) Set(v int64) {\n\tbox.value = v\n\tbox.status = Full\n}", "title": "" }, { "docid": "50e07cd25831b98903764e343823b6a1", "score": "0.5039669", "text": "func set(out *long10, in int) {\n\tout._0 = int64(in)\n\tout._1 = 0\n\tout._2 = 0\n\tout._3 = 0\n\tout._4 = 0\n\tout._5 = 0\n\tout._6 = 0\n\tout._7 = 0\n\tout._8 = 0\n\tout._9 = 0\n}", "title": "" }, { "docid": "3ebf0706b34928c6ba550ccc055b161c", "score": "0.50359094", "text": "func (x *fastReflection_TallyParams) Set(fd protoreflect.FieldDescriptor, value protoreflect.Value) {\n\tswitch fd.FullName() {\n\tcase \"cosmos.gov.v1.TallyParams.quorum\":\n\t\tx.Quorum = value.Interface().(string)\n\tcase \"cosmos.gov.v1.TallyParams.threshold\":\n\t\tx.Threshold = value.Interface().(string)\n\tcase \"cosmos.gov.v1.TallyParams.veto_threshold\":\n\t\tx.VetoThreshold = value.Interface().(string)\n\tdefault:\n\t\tif fd.IsExtension() {\n\t\t\tpanic(fmt.Errorf(\"proto3 declared messages do not support extensions: cosmos.gov.v1.TallyParams\"))\n\t\t}\n\t\tpanic(fmt.Errorf(\"message cosmos.gov.v1.TallyParams does not contain field %s\", fd.FullName()))\n\t}\n}", "title": "" }, { "docid": "7b26548f0688e01cbe53d1b4d37f2c8d", "score": "0.50262535", "text": "func (variable *Variable[T]) SetValue(value T) {\n\tvariable.Value = value\n\tvariable.Empty = false\n}", "title": "" }, { "docid": "5b90b501906a7d2ac0d79ec5cc17f582", "score": "0.50251067", "text": "func (muo *MachineUpdateOne) defaults() {\n\tif _, ok := muo.mutation.CreatedAt(); !ok && !muo.mutation.CreatedAtCleared() {\n\t\tv := machine.UpdateDefaultCreatedAt()\n\t\tmuo.mutation.SetCreatedAt(v)\n\t}\n\tif _, ok := muo.mutation.UpdatedAt(); !ok && !muo.mutation.UpdatedAtCleared() {\n\t\tv := machine.UpdateDefaultUpdatedAt()\n\t\tmuo.mutation.SetUpdatedAt(v)\n\t}\n\tif _, ok := muo.mutation.LastPush(); !ok && !muo.mutation.LastPushCleared() {\n\t\tv := machine.UpdateDefaultLastPush()\n\t\tmuo.mutation.SetLastPush(v)\n\t}\n\tif _, ok := muo.mutation.LastHeartbeat(); !ok && !muo.mutation.LastHeartbeatCleared() {\n\t\tv := machine.UpdateDefaultLastHeartbeat()\n\t\tmuo.mutation.SetLastHeartbeat(v)\n\t}\n}", "title": "" }, { "docid": "4fcb3cf7cd6e5b5dbbf8603a81843d86", "score": "0.5024998", "text": "func (m *InferenceClassificationOverrideCollectionResponse) SetValue(value []InferenceClassificationOverrideable)() {\n m.value = value\n}", "title": "" }, { "docid": "fc1a4794655488e85a188d59578bd08e", "score": "0.5022125", "text": "func (c Call) SET(set ...interface{}) Call {\n\tc.Set = Vs(set)\n\treturn c\n}", "title": "" }, { "docid": "004b1a8bb7051d839f087c86abfc974a", "score": "0.50197935", "text": "func Set(c Config) {\n\tC = c\n}", "title": "" }, { "docid": "004b1a8bb7051d839f087c86abfc974a", "score": "0.50197935", "text": "func Set(c Config) {\n\tC = c\n}", "title": "" }, { "docid": "519a812a705fffb97dcd52c7a14bd09b", "score": "0.50197023", "text": "func (_options *UpdateOpportunisticOnionOptions) SetValue(value string) *UpdateOpportunisticOnionOptions {\n\t_options.Value = core.StringPtr(value)\n\treturn _options\n}", "title": "" }, { "docid": "70890470d8ba24cd7c0f51e5299f6a6d", "score": "0.5019484", "text": "func Set(h CallHandler) Option {\n\treturn Call(\"set\", h)\n}", "title": "" }, { "docid": "e6dc2cbec77bb04a5884e2f0edcf02f2", "score": "0.50146556", "text": "func (d *Datum) SetValueWithDefaultCollation(val interface{}) {\n\tswitch x := val.(type) {\n\tcase nil:\n\t\td.SetNull()\n\tcase bool:\n\t\tif x {\n\t\t\td.SetInt64(1)\n\t\t} else {\n\t\t\td.SetInt64(0)\n\t\t}\n\tcase int:\n\t\td.SetInt64(int64(x))\n\tcase int64:\n\t\td.SetInt64(x)\n\tcase uint64:\n\t\td.SetUint64(x)\n\tcase float32:\n\t\td.SetFloat32(x)\n\tcase float64:\n\t\td.SetFloat64(x)\n\tcase string:\n\t\td.SetString(x, mysql.DefaultCollationName)\n\tcase []byte:\n\t\td.SetBytes(x)\n\tcase *MyDecimal:\n\t\td.SetMysqlDecimal(x)\n\tcase Duration:\n\t\td.SetMysqlDuration(x)\n\tcase Enum:\n\t\td.SetMysqlEnum(x, mysql.DefaultCollationName)\n\tcase BinaryLiteral:\n\t\td.SetBinaryLiteral(x)\n\tcase BitLiteral: // Store as BinaryLiteral for Bit and Hex literals\n\t\td.SetBinaryLiteral(BinaryLiteral(x))\n\tcase HexLiteral:\n\t\td.SetBinaryLiteral(BinaryLiteral(x))\n\tcase Set:\n\t\td.SetMysqlSet(x, mysql.DefaultCollationName)\n\tcase BinaryJSON:\n\t\td.SetMysqlJSON(x)\n\tcase Time:\n\t\td.SetMysqlTime(x)\n\tdefault:\n\t\td.SetInterface(x)\n\t}\n}", "title": "" }, { "docid": "8b4ccff9761696bf17b2fa6ea4b74e21", "score": "0.50117236", "text": "func (me *Tonnes) Set(s string) { (*TFloat)(me).Set(s) }", "title": "" }, { "docid": "bfda48d4d33b47387f26cf9bf2b5f7fa", "score": "0.5008423", "text": "func (this *Server) Set(n string, v ...string) string {\n\tif len(v) == 0 {\n\t\treturn this.settings[n]\n\t}\n\tthis.settings[n] = v[0]\n\treturn v[0]\n}", "title": "" }, { "docid": "b6faf30677b80c595387e239834ba881", "score": "0.5007825", "text": "func (a *listAdapter) Set(int, protoreflect.Value) {\n\tklog.Fatalf(\"not implemented\")\n\n}", "title": "" }, { "docid": "f07b8c0bad3877ab67407a9fc4618ce8", "score": "0.49895597", "text": "func (f *DeployForgeYaml) Set(source, object, name, key, value string) {\n\tfrom := func(string) (string, bool) {\n\t\treturn value, (value != \"\")\n\t}\n\tf.SetHandler(source, object, name, from, (*ForjValue).Set, key)\n}", "title": "" }, { "docid": "caf22d47022bdd293e052687e1454659", "score": "0.49873978", "text": "func (o *ChangeMeteringAssignmentStrategyUsingPATCHParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "e7ce113c27e6557dd905943cfcf24f6a", "score": "0.4985464", "text": "func (m *mWriteAccessorMockBegin) Set(f func(p context.Context, p1 insolar.PulseNumber) (r func(), r1 error)) *WriteAccessorMock {\n\tm.mainExpectation = nil\n\tm.expectationSeries = nil\n\n\tm.mock.BeginFunc = f\n\treturn m.mock\n}", "title": "" }, { "docid": "291607c62d2633b06098f7cd9fe0176b", "score": "0.49828172", "text": "func (o *S3UserModifyParams) SetDefaults() {\n\tvar (\n\t\tregenerateKeysDefault = bool(false)\n\t)\n\n\tval := S3UserModifyParams{\n\t\tRegenerateKeys: &regenerateKeysDefault,\n\t}\n\n\tval.timeout = o.timeout\n\tval.Context = o.Context\n\tval.HTTPClient = o.HTTPClient\n\t*o = val\n}", "title": "" }, { "docid": "664d8c40b07946bd2957da5cba7fb377", "score": "0.4981711", "text": "func SetApiDefaultValues(gkeTF *GkeTF, configFile string) error {\n\n\t// The defaults library does not support bool pointers.\n\t// So we have to make a copy and then copy the original value back.\n\toriginal, err := UnmarshalGkeTF(configFile)\n\tif err != nil {\n\t\tklog.Errorf(\"error creating copy of gke api: %v\", err)\n\t\treturn err\n\t}\n\n\tdefaultSpec := &GkeTF{\n\t\tSpec: ClusterSpec{\n\t\t\tAddons: &AddonsSpec{},\n\t\t},\n\t}\n\n\tdefaultNodePool := &GkeNodePool{\n\t\tSpec: NodePoolSpec{},\n\t}\n\n\tif err := defaults.Set(defaultSpec); err != nil {\n\t\tklog.Errorf(\"error setting defaults for defaultSepc: %v\", err)\n\t\treturn err\n\t}\n\tif err := defaults.Set(&defaultNodePool.Spec); err != nil {\n\t\tklog.Errorf(\"error setting defaults for defaultNodePool.Spec: %v\", err)\n\t\treturn err\n\t}\n\tif err := defaults.Set(defaultSpec.Spec.Addons); err != nil {\n\t\tklog.Errorf(\"error setting defaults for defaultSpec.Spec.Addons: %v\", err)\n\t\treturn err\n\t}\n\n\tif gkeTF.Spec.Addons == nil {\n\t\tgkeTF.Spec.Addons = &AddonsSpec{}\n\t}\n\n\tif err := mergo.Merge(&gkeTF.Spec, &defaultSpec.Spec); err != nil {\n\t\tklog.Errorf(\"error gkeTF: %v\", err)\n\t\treturn err\n\t}\n\n\toriginalNodePools := *original.Spec.NodePools\n\tfor i, nodePool := range *gkeTF.Spec.NodePools {\n\t\tif err := mergo.Merge(&nodePool.Spec, &defaultNodePool.Spec); err != nil {\n\t\t\tklog.Errorf(\"error merging nodePoolSpec: %v\", err)\n\t\t\treturn err\n\t\t}\n\t\toriginalNodePool := originalNodePools[i]\n\t\tif originalNodePool.Spec.AutoRepair != nil {\n\t\t\tnodePool.Spec.AutoRepair = originalNodePool.Spec.AutoRepair\n\t\t}\n\n\t\tif originalNodePool.Spec.AutoUpgrade != nil {\n\t\t\tnodePool.Spec.AutoUpgrade = originalNodePool.Spec.AutoUpgrade\n\t\t}\n\n\t}\n\n\t// Go through and reset values overwritten by defaults\n\tif original.Spec.RemoveDefaultNodePool != nil {\n\t\t*gkeTF.Spec.RemoveDefaultNodePool = *original.Spec.RemoveDefaultNodePool\n\t}\n\tif original.Spec.Addons != nil {\n\t\tif original.Spec.Addons.VPA != nil {\n\t\t\t*gkeTF.Spec.Addons.VPA = *original.Spec.Addons.VPA\n\t\t}\n\t\tif original.Spec.Addons.PodSecurityPolicy != nil {\n\t\t\t*gkeTF.Spec.Addons.PodSecurityPolicy = *original.Spec.Addons.PodSecurityPolicy\n\t\t}\n\t\tif original.Spec.Addons.HTTPLoadBalancing != nil {\n\t\t\t*gkeTF.Spec.Addons.HTTPLoadBalancing = *original.Spec.Addons.HTTPLoadBalancing\n\t\t}\n\t\tif original.Spec.Addons.BinaryAuth != nil {\n\t\t\t*gkeTF.Spec.Addons.BinaryAuth = *original.Spec.Addons.BinaryAuth\n\t\t}\n\t\tif original.Spec.Addons.ClusterAutoscaling != nil {\n\t\t\t*gkeTF.Spec.Addons.ClusterAutoscaling = *original.Spec.Addons.ClusterAutoscaling\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "3a7c9b10ee06857d8148961579a1f345", "score": "0.49770147", "text": "func Set(frame wdte.Frame, args ...wdte.Func) wdte.Func {\n\tframe = frame.Sub(\"set\")\n\n\tif len(args) < 3 {\n\t\treturn wdteutil.SaveArgsReverse(wdte.GoFunc(Set), args...)\n\t}\n\n\ts := args[0].(wdte.Setter)\n\tk := args[1]\n\tv := args[2]\n\n\tr, err := s.Set(k, v)\n\tif err != nil {\n\t\treturn wdte.Error{\n\t\t\tFrame: frame,\n\t\t\tErr: err,\n\t\t}\n\t}\n\treturn r\n}", "title": "" }, { "docid": "d7d515baffb669f601342147e75d6c65", "score": "0.4976479", "text": "func SetStructFieldDefaultValues(inputStructPtr interface{}) bool {\n\tif inputStructPtr == nil {\n\t\treturn false\n\t}\n\n\ts := reflect.ValueOf(inputStructPtr)\n\n\tif s.Kind() != reflect.Ptr {\n\t\treturn false\n\t} else {\n\t\ts = s.Elem()\n\t}\n\n\tif s.Kind() != reflect.Struct {\n\t\treturn false\n\t}\n\n\tfor i := 0; i < s.NumField(); i++ {\n\t\tfield := s.Type().Field(i)\n\n\t\tif o := s.FieldByName(field.Name); o.IsValid() && o.CanSet() {\n\t\t\ttagDef := field.Tag.Get(\"def\")\n\n\t\t\tif len(tagDef) == 0 {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tswitch o.Kind() {\n\t\t\tcase reflect.String:\n\t\t\t\tif LenTrim(o.String()) == 0 {\n\t\t\t\t\to.SetString(tagDef)\n\t\t\t\t}\n\t\t\tcase reflect.Int8:\n\t\t\t\tfallthrough\n\t\t\tcase reflect.Int16:\n\t\t\t\tfallthrough\n\t\t\tcase reflect.Int:\n\t\t\t\tfallthrough\n\t\t\tcase reflect.Int32:\n\t\t\t\tfallthrough\n\t\t\tcase reflect.Int64:\n\t\t\t\tif o.Int() == 0 {\n\t\t\t\t\ttagSetter := Trim(field.Tag.Get(\"setter\"))\n\n\t\t\t\t\tif LenTrim(tagSetter) == 0 {\n\t\t\t\t\t\tif i64, ok := ParseInt64(tagDef); ok && i64 != 0 {\n\t\t\t\t\t\t\tif !o.OverflowInt(i64) {\n\t\t\t\t\t\t\t\to.SetInt(i64)\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t} else {\n\t\t\t\t\t\tif res, notFound := ReflectCall(o, tagSetter, tagDef); !notFound {\n\t\t\t\t\t\t\tif len(res) == 1 {\n\t\t\t\t\t\t\t\tif val, skip, err := ReflectValueToString(res[0], \"\", \"\", false, false, \"\", false); err == nil && !skip {\n\t\t\t\t\t\t\t\t\ttagDef = val\n\t\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t} else if len(res) > 1 {\n\t\t\t\t\t\t\t\tif err := DerefError(res[len(res)-1:][0]); err == nil {\n\t\t\t\t\t\t\t\t\tif val, skip, err := ReflectValueToString(res[0], \"\", \"\", false, false, \"\", false); err == nil && !skip {\n\t\t\t\t\t\t\t\t\t\ttagDef = val\n\t\t\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t}\n\n\t\t\t\t\t\t\tif i64, ok := ParseInt64(tagDef); ok && i64 != 0 {\n\t\t\t\t\t\t\t\tif !o.OverflowInt(i64) {\n\t\t\t\t\t\t\t\t\to.SetInt(i64)\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\tcase reflect.Float32:\n\t\t\t\tfallthrough\n\t\t\tcase reflect.Float64:\n\t\t\t\tif o.Float() == 0 {\n\t\t\t\t\tif f64, ok := ParseFloat64(tagDef); ok && f64 != 0 {\n\t\t\t\t\t\tif !o.OverflowFloat(f64) {\n\t\t\t\t\t\t\to.SetFloat(f64)\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\tcase reflect.Uint8:\n\t\t\t\tfallthrough\n\t\t\tcase reflect.Uint16:\n\t\t\t\tfallthrough\n\t\t\tcase reflect.Uint:\n\t\t\t\tfallthrough\n\t\t\tcase reflect.Uint32:\n\t\t\t\tfallthrough\n\t\t\tcase reflect.Uint64:\n\t\t\t\tif o.Uint() == 0 {\n\t\t\t\t\tif u64 := StrToUint64(tagDef); u64 != 0 {\n\t\t\t\t\t\tif !o.OverflowUint(u64) {\n\t\t\t\t\t\t\to.SetUint(u64)\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tswitch f := o.Interface().(type) {\n\t\t\t\tcase sql.NullString:\n\t\t\t\t\tif !f.Valid {\n\t\t\t\t\t\to.Set(reflect.ValueOf(sql.NullString{String: tagDef, Valid: true}))\n\t\t\t\t\t}\n\t\t\t\tcase sql.NullBool:\n\t\t\t\t\tif !f.Valid {\n\t\t\t\t\t\tb, _ := ParseBool(tagDef)\n\t\t\t\t\t\to.Set(reflect.ValueOf(sql.NullBool{Bool: b, Valid: true}))\n\t\t\t\t\t}\n\t\t\t\tcase sql.NullFloat64:\n\t\t\t\t\tif !f.Valid {\n\t\t\t\t\t\tif f64, ok := ParseFloat64(tagDef); ok && f64 != 0 {\n\t\t\t\t\t\t\to.Set(reflect.ValueOf(sql.NullFloat64{Float64: f64, Valid: true}))\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\tcase sql.NullInt32:\n\t\t\t\t\tif !f.Valid {\n\t\t\t\t\t\tif i32, ok := ParseInt32(tagDef); ok && i32 != 0 {\n\t\t\t\t\t\t\to.Set(reflect.ValueOf(sql.NullInt32{Int32: int32(i32), Valid: true}))\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\tcase sql.NullInt64:\n\t\t\t\t\tif !f.Valid {\n\t\t\t\t\t\tif i64, ok := ParseInt64(tagDef); ok && i64 != 0 {\n\t\t\t\t\t\t\to.Set(reflect.ValueOf(sql.NullInt64{Int64: i64, Valid: true}))\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\tcase sql.NullTime:\n\t\t\t\t\tif !f.Valid {\n\t\t\t\t\t\ttagTimeFormat := Trim(field.Tag.Get(\"timeformat\"))\n\n\t\t\t\t\t\tif LenTrim(tagTimeFormat) == 0 {\n\t\t\t\t\t\t\ttagTimeFormat = DateTimeFormatString()\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\tif t := ParseDateTimeCustom(tagDef, tagTimeFormat); !t.IsZero() {\n\t\t\t\t\t\t\to.Set(reflect.ValueOf(sql.NullTime{Time: t, Valid: true}))\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\tcase time.Time:\n\t\t\t\t\tif f.IsZero() {\n\t\t\t\t\t\ttagTimeFormat := Trim(field.Tag.Get(\"timeformat\"))\n\n\t\t\t\t\t\tif LenTrim(tagTimeFormat) == 0 {\n\t\t\t\t\t\t\ttagTimeFormat = DateTimeFormatString()\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\tif t := ParseDateTimeCustom(tagDef, tagTimeFormat); !t.IsZero() {\n\t\t\t\t\t\t\to.Set(reflect.ValueOf(t))\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "4a13f6ff0327527f497d31bdfe4618a8", "score": "0.4972348", "text": "func (deps *ctvEndpointDeps) setDefaultValues() {\n\t//read and set extension values\n\tdeps.readExtensions()\n\n\t//set request is adpod request or normal request\n\tdeps.setIsAdPodRequest()\n\n\tif deps.isAdPodRequest {\n\t\tdeps.readImpExtensionsAndTags()\n\t}\n}", "title": "" }, { "docid": "b25f1af9b299960f06bce7aa6693fd5a", "score": "0.4970944", "text": "func setDefaultValuesForOptionalFields() {\n\n\t// Autoposting\n\tviper.SetDefault(\"autoposting.filesizethreshold\", defaultAutopostingFileSizeThreshold)\n\tviper.SetDefault(\"autoposting.postalertthreshold\", defaultAutopostingPostAlertThreshold)\n\tviper.SetDefault(\"autoposting.mediaapproximation\", defaultAutopostingMediaApproximation)\n\tviper.SetDefault(\"autoposting.similaritythreshold\", defaultAutopostingSimilarityThreshold)\n\tviper.SetDefault(\"autoposting.channelhandle\", defaultAutopostingChannelHandle)\n\n\t// DocumentStore\n\tviper.SetDefault(\"documentstore.hosts\", []string{defaultDocumentStoreHosts})\n\tviper.SetDefault(\"documentstore.useauthentication\", defaultDocumentStoreUseAuthentication)\n\tviper.SetDefault(\"documentstore.usereplicaset\", defaultDocumentStoreUseReplicaSet)\n\tviper.SetDefault(\"documentstore.authmechanism\", defaultDocumentStoreAuthMechanism)\n\n\t// Tdlib\n\tviper.SetDefault(\"tdlib.usetestdc\", defaultTdlibUseTestDc)\n\tviper.SetDefault(\"tdlib.usefiledatabase\", defaultTdlibUseFileDatabase)\n\tviper.SetDefault(\"tdlib.usechatinfodatabase\", defaultTdlibUseChatInfoDatabase)\n\tviper.SetDefault(\"tdlib.usemessagedatabase\", defaultTdlibUseMessageDatabase)\n\tviper.SetDefault(\"tdlib.usesecretchats\", defaultTdlibUseSecretChats)\n\tviper.SetDefault(\"tdlib.systemlanguagecode\", defaultTdlibSystemLanguageCode)\n\tviper.SetDefault(\"tdlib.devicemodel\", defaultTdlibDeviceModel)\n\tviper.SetDefault(\"tdlib.systemversion\", defaultTdlibSystemVersion)\n\tviper.SetDefault(\"tdlib.applicationversion\", defaultTdlibApplicationVersion)\n\tviper.SetDefault(\"tdlib.enablestorageoptimizer\", defaultTdlibEnableStorageOptimizer)\n\tviper.SetDefault(\"tdlib.ignorefilenames\", defaultTdlibIgnoreFileNames)\n\n}", "title": "" }, { "docid": "2d57bd019d31f5446351581ce41df2f0", "score": "0.49688226", "text": "func (d *Defaulter) MustSet(arg interface{}) {\n\terr := d.Set(arg)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "bd36a457fc93243f38c5e5cf9432a894", "score": "0.49650592", "text": "func SetDefaults(obj interface{}) error {\n\treturn defaults.Set(obj)\n}", "title": "" }, { "docid": "94fdbc574f00f5228425a2dd832ac69d", "score": "0.496394", "text": "func (c *bundleCmdLegacy) setCommonDefaults() {\n\tif c.operatorName == \"\" {\n\t\tc.operatorName = filepath.Base(projutil.MustGetwd())\n\t}\n\t// A default channel can be inferred if there is only one channel. Don't infer\n\t// default otherwise; the user must set this value.\n\tif c.defaultChannel == \"\" && strings.Count(c.channels, \",\") == 0 {\n\t\tc.defaultChannel = c.channels\n\t}\n}", "title": "" }, { "docid": "6413a960bc00f618039222a519bb59ba", "score": "0.49606794", "text": "func (p *Perfdata) SetValue(value int) {\n\tlog.Debug(\"Value: \", value)\n\n\tp.value = value\n}", "title": "" }, { "docid": "4cf8a4394d188a046b83feb2ec58c5ef", "score": "0.49595204", "text": "func Set(name string, value float64, tags ...Tag) {\n\tDefaultEngine.Set(name, value, tags...)\n}", "title": "" }, { "docid": "3f2b6e236a9a1e393e7e67d1773d34b7", "score": "0.49574617", "text": "func (p *JsonPointer) Set(document interface{}, value interface{}) (interface{}, error) {\n\n\tis := &implStruct{mode: \"SET\", inDocument: document, setInValue: value}\n\tp.implementation(is)\n\treturn document, is.outError\n\n}", "title": "" }, { "docid": "b38e8041c0416e2df0f667fdcf5f28f9", "score": "0.49568138", "text": "func (o *StorageServiceHintedHandoffPostParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "6fdacc7ec71b7e3e20f69bf9ab1ebd3d", "score": "0.49565732", "text": "func Set(name string, value int64) {\n\tif gDisabled {\n\t\treturn\n\t}\n\tgLock.Lock()\n\tgStorage[name] = value\n\tgLock.Unlock()\n}", "title": "" }, { "docid": "906236b778f03a0ca569ce6329a88aa0", "score": "0.4953422", "text": "func (_options *UpdateBrotliOptions) SetValue(value string) *UpdateBrotliOptions {\n\t_options.Value = core.StringPtr(value)\n\treturn _options\n}", "title": "" }, { "docid": "2b224fda0d1527e88c224c95eed323ba", "score": "0.49499974", "text": "func (buf *Buffer) Set(readpos, writepos uint64) {\n\tbuf.read = readpos\n\tbuf.write = writepos\n}", "title": "" }, { "docid": "2dd6497254599975c831dd59592b5095", "score": "0.49488035", "text": "func (s Struct) GenerateSetters(w io.Writer) error {\n\treturn structSetters.Execute(w, s)\n}", "title": "" }, { "docid": "d999e79ad655d050f89f00c16a7d6db3", "score": "0.4946167", "text": "func (s *DefaultStore) Set(key, store string, value interface{}) error {\r\n\tif !s.IsLeader() {\r\n\t\treturn errors.New(\"not leader\")\r\n\t}\r\n\r\n\tc := &command{\r\n\t\tOp: \"set\",\r\n\t\tKey: key,\r\n\t\tStore: store,\r\n\t\tValue: value,\r\n\t}\r\n\tb, err := json.Marshal(c)\r\n\tif err != nil {\r\n\t\treturn err\r\n\t}\r\n\r\n\tf := s.raft.Apply(b, raftTimeout)\r\n\tif err := f.Error(); err != nil {\r\n\t\treturn err\r\n\t}\r\n\treturn nil\r\n}", "title": "" }, { "docid": "9aad4e69adfb92d6ba08cf6eb10dc2ea", "score": "0.49446148", "text": "func (o *RegisterUsingPUTParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "title": "" }, { "docid": "77156ffce30a564a5beb1e6fbfe67752", "score": "0.49426594", "text": "func (e *EPM) Set(args []string) error {\n\tk := args[0]\n\tv := args[1]\n\te.StoreVar(k, v)\n\treturn nil\n}", "title": "" }, { "docid": "fb8478dc166b10c49fab8668bbcc639b", "score": "0.4942643", "text": "func (u *Utils) Set(k string, x interface{}) {\n\tu.cache.SetDefault(k, x)\n}", "title": "" } ]
3beb1b8cd885f62d7001ac866b38a767
The builtin f64 function returns operand 1 casted from type i64 to type f64.
[ { "docid": "ba1984da2ecc6967ff808495b1cde5c8", "score": "0.7703726", "text": "func opI64ToF64(expr *CXExpression, fp int) {\n\toutB0 := float64(ReadI64(fp, expr.Inputs[0]))\n\tWriteF64(GetOffset_i64(fp, expr.Outputs[0]), outB0)\n}", "title": "" } ]
[ { "docid": "edaa8a805b4670961eaf001d02c4688d", "score": "0.7278064", "text": "func opUI64ToF64(prgrm *CXProgram) {\n\texpr := prgrm.GetExpr()\n\tfp := prgrm.GetFramePointer()\n\n\toutV0 := float64(ReadUI64(fp, expr.Inputs[0]))\n\tWriteF64(GetFinalOffset(fp, expr.Outputs[0]), outV0)\n}", "title": "" }, { "docid": "9062388cd9ada27161be489461ca8627", "score": "0.6835644", "text": "func op_f64_print(expr *CXExpression, fp int) {\n\tinp1 := expr.Inputs[0]\n\tfmt.Println(ReadF64(fp, inp1))\n}", "title": "" }, { "docid": "f4eeb3fe4cef3c174b5a6d262f928130", "score": "0.674696", "text": "func opI8ToF64(expr *CXExpression, fp int) {\n\toutV0 := float64(ReadI8(fp, expr.Inputs[0]))\n\tWriteF64(GetOffset_f64(fp, expr.Outputs[0]), outV0)\n}", "title": "" }, { "docid": "4c4f43b9001e0819b3495ed57a2f7d5a", "score": "0.67107004", "text": "func opI64ToF32(expr *CXExpression, fp int) {\n\toutB0 := float32(ReadI64(fp, expr.Inputs[0]))\n\tWriteF32(GetOffset_i32(fp, expr.Outputs[0]), outB0)\n}", "title": "" }, { "docid": "237cabe5cee43d4503001796ef5d32ae", "score": "0.6627936", "text": "func op_f64_mul(expr *CXExpression, fp int) {\n\tinp1, inp2, out1 := expr.Inputs[0], expr.Inputs[1], expr.Outputs[0]\n\toutB1 := FromF64(ReadF64(fp, inp1) * ReadF64(fp, inp2))\n\tWriteMemory(GetFinalOffset(fp, out1), outB1)\n}", "title": "" }, { "docid": "406a2dad2ac7f88ccc5615bc0af7e51b", "score": "0.6600844", "text": "func op_f64_log(expr *CXExpression, fp int) {\n\tinp1, out1 := expr.Inputs[0], expr.Outputs[0]\n\toutB1 := FromF64(math.Log(ReadF64(fp, inp1)))\n\tWriteMemory(GetFinalOffset(fp, out1), outB1)\n}", "title": "" }, { "docid": "7c3f1fdf369812e8ae42460058d443ad", "score": "0.65960103", "text": "func op_f64_add(expr *CXExpression, fp int) {\n\tinp1, inp2, out1 := expr.Inputs[0], expr.Inputs[1], expr.Outputs[0]\n\toutB1 := FromF64(ReadF64(fp, inp1) + ReadF64(fp, inp2))\n\tWriteMemory(GetFinalOffset(fp, out1), outB1)\n}", "title": "" }, { "docid": "54589ede9c2f27b2e7424628621d1761", "score": "0.6565502", "text": "func Float64(f *float64) float64 {\n\tif f == nil {\n\t\treturn 0\n\t}\n\treturn *f\n}", "title": "" }, { "docid": "9ec0b126d415f807426782332076e177", "score": "0.65359724", "text": "func IToFloat64(i interface{}) (res float64, err error) {\n\tswitch v := i.(type) {\n\tcase float64:\n\t\treturn v, nil\n\tcase string:\n\t\treturn strconv.ParseFloat(v, 64)\n\tcase bool:\n\t\tif v {\n\t\t\treturn 1, nil\n\t\t}\n\t\treturn 0, nil\n\tdefault:\n\t\treturn strconv.ParseFloat(fmt.Sprint(i), 64)\n\t}\n}", "title": "" }, { "docid": "1b1680d9447a7282023b76eed224128c", "score": "0.6511921", "text": "func op_f64_eq(expr *CXExpression, fp int) {\n\tinp1, inp2, out1 := expr.Inputs[0], expr.Inputs[1], expr.Outputs[0]\n\toutB1 := FromBool(ReadF64(fp, inp1) == ReadF64(fp, inp2))\n\tWriteMemory(GetFinalOffset(fp, out1), outB1)\n}", "title": "" }, { "docid": "61e7878e9d222be592027aea997c7e75", "score": "0.64879775", "text": "func op_f64_pow(expr *CXExpression, fp int) {\n\tinp1, inp2, out1 := expr.Inputs[0], expr.Inputs[1], expr.Outputs[0]\n\toutB1 := FromF64(math.Pow(ReadF64(fp, inp1), ReadF64(fp, inp2)))\n\tWriteMemory(GetFinalOffset(fp, out1), outB1)\n}", "title": "" }, { "docid": "29b9ca09902567c3c28e8a98e1a93208", "score": "0.64505446", "text": "func opI16ToF64(expr *CXExpression, fp int) {\n\toutB0 := float64(ReadI16(fp, expr.Inputs[0]))\n\tWriteF64(GetOffset_f64(fp, expr.Outputs[0]), outB0)\n}", "title": "" }, { "docid": "08964249e24681e74723a84cbf3ff1ca", "score": "0.63804275", "text": "func (x *Rat) Float64() (f float64, exact bool) {}", "title": "" }, { "docid": "3657bf6428cbe30979cc96dd0e065fce", "score": "0.63653594", "text": "func opUI64ToF32(prgrm *CXProgram) {\n\texpr := prgrm.GetExpr()\n\tfp := prgrm.GetFramePointer()\n\n\toutV0 := float32(ReadUI64(fp, expr.Inputs[0]))\n\tWriteF32(GetFinalOffset(fp, expr.Outputs[0]), outV0)\n}", "title": "" }, { "docid": "21c99b3c120cc4724a04040e73ef2ce6", "score": "0.6365157", "text": "func (e *Encoder) Float64(v float64) (int, error) {\n\treturn e.uint64(math.Float64bits(v))\n}", "title": "" }, { "docid": "f95c978dbef33595c5950c0a38013a59", "score": "0.6364045", "text": "func anyToFloat64(i interface{}, def ...float64) float64 {\n\tvar defValue float64 = 0\n\tif len(def) > 0 {\n\t\tdefValue = def[0]\n\t}\n\tif i == nil {\n\t\treturn defValue\n\t}\n\tswitch value := i.(type) {\n\tcase float32:\n\t\treturn float64(value)\n\tcase float64:\n\t\treturn value\n\tcase []byte:\n\t\treturn decodeToFloat64(value)\n\tdefault:\n\t\tv, _ := strconv.ParseFloat(anyToString(i), 64)\n\t\treturn v\n\t}\n}", "title": "" }, { "docid": "fc5a68abc69deb1db3729d811650437f", "score": "0.6351485", "text": "func ToFloat64(i interface{}) float64 {\n\treturn cast.ToFloat64(i)\n}", "title": "" }, { "docid": "6f85e9a387c3caf9fc21fafbef5e2499", "score": "0.63219", "text": "func opUI8ToF64(inputs []ast.CXValue, outputs []ast.CXValue) {\n\toutV0 := float64(inputs[0].Get_ui8())\n outputs[0].Set_f64(outV0)\n}", "title": "" }, { "docid": "8e956e739c5727c609f16a3ad6d5816b", "score": "0.62713695", "text": "func ToFloat64(i interface{}) (float64, error) {\n\ti = indirect(i)\n\n\tswitch s := i.(type) {\n\tcase float64:\n\t\treturn s, nil\n\tcase float32:\n\t\treturn float64(s), nil\n\tcase int64:\n\t\treturn float64(s), nil\n\tcase int32:\n\t\treturn float64(s), nil\n\tcase int16:\n\t\treturn float64(s), nil\n\tcase int8:\n\t\treturn float64(s), nil\n\tcase int:\n\t\treturn float64(s), nil\n\tcase string:\n\t\tv, err := strconv.ParseFloat(s, 64)\n\t\tif err == nil {\n\t\t\treturn v, nil\n\t\t}\n\t\treturn 0.0, fmt.Errorf(\"unable to cast %#v to float\", i)\n\tdefault:\n\t\treturn 0.0, fmt.Errorf(\"unable to cast %#v to float\", i)\n\t}\n}", "title": "" }, { "docid": "76548e014ca8053adc9ec5441fb2aff6", "score": "0.6215562", "text": "func (f Float) Float64() float64 {\n\tpanic(\"not yet implemented\")\n}", "title": "" }, { "docid": "4594c7d45e12a4dabae28736812ff9ac", "score": "0.62072843", "text": "func (nimgb *NetInterfaceModeGroupBy) Float64(ctx context.Context) (_ float64, err error) {\n\tvar v []float64\n\tif v, err = nimgb.Float64s(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{netinterfacemode.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: NetInterfaceModeGroupBy.Float64s returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "4ab7d00394fff7168e84bb679723bec4", "score": "0.61998", "text": "func (nims *NetInterfaceModeSelect) Float64(ctx context.Context) (_ float64, err error) {\n\tvar v []float64\n\tif v, err = nims.Float64s(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{netinterfacemode.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: NetInterfaceModeSelect.Float64s returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "3d4c5c56a898f80548c9628f478c31a1", "score": "0.61892074", "text": "func (f Float) Float64() (float64, big.Accuracy) {\n\tx, nan := f.Big()\n\tif nan {\n\t\tif x.Signbit() {\n\t\t\treturn -math.NaN(), big.Exact\n\t\t}\n\t\treturn math.NaN(), big.Exact\n\t}\n\treturn x.Float64()\n}", "title": "" }, { "docid": "3d4c5c56a898f80548c9628f478c31a1", "score": "0.61892074", "text": "func (f Float) Float64() (float64, big.Accuracy) {\n\tx, nan := f.Big()\n\tif nan {\n\t\tif x.Signbit() {\n\t\t\treturn -math.NaN(), big.Exact\n\t\t}\n\t\treturn math.NaN(), big.Exact\n\t}\n\treturn x.Float64()\n}", "title": "" }, { "docid": "3d4c5c56a898f80548c9628f478c31a1", "score": "0.61892074", "text": "func (f Float) Float64() (float64, big.Accuracy) {\n\tx, nan := f.Big()\n\tif nan {\n\t\tif x.Signbit() {\n\t\t\treturn -math.NaN(), big.Exact\n\t\t}\n\t\treturn math.NaN(), big.Exact\n\t}\n\treturn x.Float64()\n}", "title": "" }, { "docid": "f6dc01e078b6a52a875860a3bc881832", "score": "0.61714846", "text": "func (o *OutputState) ApplyFloat64(applier interface{}) Float64Output {\n\treturn o.ApplyT(applier).(Float64Output)\n}", "title": "" }, { "docid": "7c3fc89fb580ec5b74e5c668675a8f23", "score": "0.6161837", "text": "func op_f64_log2(expr *CXExpression, fp int) {\n\tinp1, out1 := expr.Inputs[0], expr.Outputs[0]\n\toutB1 := FromF64(math.Log2(ReadF64(fp, inp1)))\n\tWriteMemory(GetFinalOffset(fp, out1), outB1)\n}", "title": "" }, { "docid": "b272c4f458b21aaae6e70766a608c061", "score": "0.6153893", "text": "func toFloat64(value interface{}) float64 {\n\treturn convertType(value, reflect.TypeOf(float64(0.0))).(float64)\n}", "title": "" }, { "docid": "10372d767fb54c9705382c7da7e76e39", "score": "0.6146372", "text": "func (sp booleanSpace) F64Value(outcome Outcome) float64 {\n\tif outcome == 0 {\n\t\treturn 0.0\n\t} else {\n\t\treturn 1.0\n\t}\n}", "title": "" }, { "docid": "5aa17422b7e1d1f2505521382d683916", "score": "0.61392856", "text": "func wrap1(a any,f func(float64)float64)any{\n var t string = fmt.Sprintf(\"%T\", a)\n switch t {\n case \"int\": return f(float64(a.(int)))\n case \"int8\": return f(float64(a.(int8)))\n case \"int16\": return f(float64(a.(int16)))\n case \"int32\": return f(float64(a.(int32)))\n case \"int64\": return f(float64(a.(int64)))\n case \"uint\": return f(float64(a.(uint)))\n case \"uint8\": return f(float64(a.(uint8)))\n case \"uint16\": return f(float64(a.(uint16)))\n case \"uint32\": return f(float64(a.(uint32)))\n case \"uint64\": return f(float64(a.(uint64)))\n case \"float32\": return f(float64(a.(float32)))\n case \"float64\": return f(a.(float64))\n default: fmt.Println(\"Invalid type\")\n }\n return nil\n}", "title": "" }, { "docid": "57be2137efd41a3827f98dca0c4c3236", "score": "0.6137574", "text": "func (ec evalContext) evalFloat64(e spansql.Expr) (float64, error) {\n\tv, err := ec.evalExpr(e)\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\treturn asFloat64(e, v)\n}", "title": "" }, { "docid": "61992cabd41630e04dcea0cb4e022176", "score": "0.61310387", "text": "func (s *selector) Float64(ctx context.Context) (_ float64, err error) {\n\tvar v []float64\n\tif v, err = s.Float64s(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{s.label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: Float64s returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "57fd509bf2a24e196d8b33bd21ec3a3c", "score": "0.612599", "text": "func ToFloat64E(i interface{}) (float64, error) {\n\treturn cast.ToFloat64E(i)\n}", "title": "" }, { "docid": "a71894e787d2288dcae782f4676a2169", "score": "0.61019915", "text": "func (wts *WorkerTypeSelect) Float64(ctx context.Context) (_ float64, err error) {\n\tvar v []float64\n\tif v, err = wts.Float64s(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{workertype.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: WorkerTypeSelect.Float64s returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "e2ad50155b5af480b2d0eb8196470781", "score": "0.6094897", "text": "func Float64(val interface{}) float64 {\r\n\r\n\tswitch t := val.(type) {\r\n\tcase int:\r\n\t\treturn float64(t)\r\n\tcase int8:\r\n\t\treturn float64(t)\r\n\tcase int16:\r\n\t\treturn float64(t)\r\n\tcase int32:\r\n\t\treturn float64(t)\r\n\tcase int64:\r\n\t\treturn float64(t)\r\n\tcase uint:\r\n\t\treturn float64(t)\r\n\tcase uint8:\r\n\t\treturn float64(t)\r\n\tcase uint16:\r\n\t\treturn float64(t)\r\n\tcase uint32:\r\n\t\treturn float64(t)\r\n\tcase uint64:\r\n\t\treturn float64(t)\r\n\tcase float32:\r\n\t\treturn float64(t)\r\n\tcase float64:\r\n\t\treturn float64(t)\r\n\tcase bool:\r\n\t\tif t == true {\r\n\t\t\treturn float64(1)\r\n\t\t}\r\n\t\treturn float64(0)\r\n\tcase string:\r\n\t\tf, _ := strconv.ParseFloat(val.(string), 64)\r\n\t\treturn f\r\n\tdefault:\r\n\t\ts := String(val)\r\n\t\tf, _ := strconv.ParseFloat(s, 64)\r\n\t\treturn f\r\n\t}\r\n\r\n\tpanic(\"Reached\")\r\n}", "title": "" }, { "docid": "3e3df0abdefe017bc8ba47403bc7658d", "score": "0.60922676", "text": "func Float64(i float64) string {\n\treturn strconv.FormatFloat(i, 'f', -1, 64)\n}", "title": "" }, { "docid": "362626995c4487dd7e30a3cac4bcf801", "score": "0.6092186", "text": "func Float64(v interface{}) (float64, error) {\n\tswitch v := v.(type) {\n\tdefault:\n\t\treturn 0, ErrWrongType\n\tcase int:\n\t\tif int(float64(v)) != v {\n\t\t\tif warnOnImpreciseConversion {\n\t\t\t\tlog.Warn(ErrImpreciseConversion)\n\t\t\t}\n\t\t\tif !allowImpreciseConversion {\n\t\t\t\treturn float64(v), ErrImpreciseConversion\n\t\t\t}\n\t\t}\n\t\treturn float64(v), nil\n\n\tcase uint:\n\t\tif uint(float64(v)) != v {\n\t\t\tif warnOnImpreciseConversion {\n\t\t\t\tlog.Warn(ErrImpreciseConversion)\n\t\t\t}\n\t\t\tif !allowImpreciseConversion {\n\t\t\t\treturn float64(v), ErrImpreciseConversion\n\t\t\t}\n\t\t}\n\t\treturn float64(v), nil\n\n\tcase uint64:\n\t\tif uint64(float64(v)) != v {\n\t\t\tif warnOnImpreciseConversion {\n\t\t\t\tlog.Warn(ErrImpreciseConversion)\n\t\t\t}\n\t\t\tif !allowImpreciseConversion {\n\t\t\t\treturn float64(v), ErrImpreciseConversion\n\t\t\t}\n\t\t}\n\t\treturn float64(v), nil\n\n\tcase int64:\n\t\tif int64(float64(v)) != v {\n\t\t\tif warnOnImpreciseConversion {\n\t\t\t\tlog.Warn(ErrImpreciseConversion)\n\t\t\t}\n\t\t\tif !allowImpreciseConversion {\n\t\t\t\treturn float64(v), ErrImpreciseConversion\n\t\t\t}\n\t\t}\n\t\treturn float64(v), nil\n\n\tcase int8:\n\t\treturn float64(v), nil\n\tcase int16:\n\t\treturn float64(v), nil\n\tcase int32:\n\t\treturn float64(v), nil\n\tcase uint8:\n\t\treturn float64(v), nil\n\tcase uint16:\n\t\treturn float64(v), nil\n\tcase uint32:\n\t\treturn float64(v), nil\n\tcase float32:\n\t\treturn float64(v), nil\n\tcase float64:\n\t\treturn v, nil\n\t}\n}", "title": "" }, { "docid": "aca46758f414175d6993eadee008adf8", "score": "0.60839474", "text": "func (numeric) convertToFloat64(i interface{}) float64 {\n\tswitch s := i.(type) {\n\tcase float32:\n\t\treturn float64(s)\n\tcase int:\n\t\treturn float64(s)\n\tcase int64:\n\t\treturn float64(s)\n\tcase int32:\n\t\treturn float64(s)\n\tcase int16:\n\t\treturn float64(s)\n\tcase int8:\n\t\treturn float64(s)\n\tcase uint:\n\t\treturn float64(s)\n\tcase uint64:\n\t\treturn float64(s)\n\tcase uint32:\n\t\treturn float64(s)\n\tcase uint16:\n\t\treturn float64(s)\n\tcase uint8:\n\t\treturn float64(s)\n\tdefault:\n\t\treturn s.(float64)\n\t}\n}", "title": "" }, { "docid": "f610b6072ac8f1ad20ef134e436dc675", "score": "0.60820895", "text": "func (p *Parser) Float64(i int, context string) float64 {\n\treturn p.NullFloat64(i, context).Value\n}", "title": "" }, { "docid": "72905e9e0630ebd842348dc7f247380d", "score": "0.60820645", "text": "func opI64ToUI64(expr *CXExpression, fp int) {\n\toutB0 := uint64(ReadI64(fp, expr.Inputs[0]))\n\tWriteUI64(GetOffset_ui64(fp, expr.Outputs[0]), outB0)\n}", "title": "" }, { "docid": "23b49ab47bab02156c1d2475775052e5", "score": "0.6076826", "text": "func Float64(a, b interface{}) int {\n\tf1, _ := a.(float64)\n\tf2, _ := b.(float64)\n\tswitch {\n\tcase f1 < f2:\n\t\treturn -1\n\tcase f1 > f2:\n\t\treturn 1\n\tdefault:\n\t\treturn 0\n\t}\n}", "title": "" }, { "docid": "32aece334b5ce2d398fecfae67ea731a", "score": "0.60601026", "text": "func EvalCommonf64(expr string) (float64, error) {\n\trat, err := EvalCommon(expr)\n\tif err != nil {\n\t\treturn 0, err\n\t} else {\n\t\tf64, _ := rat.Float64()\n\t\treturn f64, nil\n\t}\n}", "title": "" }, { "docid": "4bce387b8276595b340c8b33d3b141d4", "score": "0.6059682", "text": "func (p *PoolAllocator) Float64() Floating {\n\ts := p.f64.Get().(*f64)\n\ts.channels = channels(p.Channels)\n\ts.buffer = s.buffer[:p.Length*p.Channels]\n\treturn s\n}", "title": "" }, { "docid": "c6dd55e2997e06582e160bdb89d1d984", "score": "0.60595495", "text": "func PF64(x float64) *float64 {\n\treturn &x\n}", "title": "" }, { "docid": "a43c8249c03cf29263cf3080a7cf5d0f", "score": "0.6058411", "text": "func (irs *InstanceRuntimeSelect) Float64(ctx context.Context) (_ float64, err error) {\n\tvar v []float64\n\tif v, err = irs.Float64s(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{instanceruntime.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: InstanceRuntimeSelect.Float64s returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "7a0aaa3e106d00c183883315aa86a191", "score": "0.60371023", "text": "func ToFloat64(value interface{}) (float64, error) {\n\tvalue = indirect(value)\n\n\tvar s string\n\tswitch v := value.(type) {\n\tcase nil:\n\t\treturn 0, nil\n\tcase bool:\n\t\tif v {\n\t\t\treturn 1, nil\n\t\t}\n\t\treturn 0, nil\n\tcase int:\n\t\treturn float64(v), nil\n\tcase int8:\n\t\treturn float64(v), nil\n\tcase int16:\n\t\treturn float64(v), nil\n\tcase int32:\n\t\treturn float64(v), nil\n\tcase int64:\n\t\treturn float64(v), nil\n\tcase uint:\n\t\treturn float64(v), nil\n\tcase uint8:\n\t\treturn float64(v), nil\n\tcase uint16:\n\t\treturn float64(v), nil\n\tcase uint32:\n\t\treturn float64(v), nil\n\tcase uint64:\n\t\treturn float64(v), nil\n\tcase float32:\n\t\treturn float64(v), nil\n\tcase float64:\n\t\treturn v, nil\n\tcase complex64:\n\t\treturn float64(real(v)), nil\n\tcase complex128:\n\t\treturn real(v), nil\n\tcase []byte:\n\t\ts = string(v)\n\tcase string:\n\t\ts = v\n\tcase fmt.Stringer:\n\t\ts = v.String()\n\tdefault:\n\t\treturn 0, fmt.Errorf(\"unable to cast %#v of type %T to float64\", v, v)\n\t}\n\n\tif f, err := strconv.ParseFloat(s, 64); err == nil {\n\t\treturn f, nil\n\t}\n\treturn 0, fmt.Errorf(\"unable to cast %#v of type %T to float64\", value, value)\n}", "title": "" }, { "docid": "c9ab5359b4a57ada8b78d9879973cdbc", "score": "0.6025277", "text": "func (v *Value) Float64() float64 {\n\tswitch {\n\tcase v.fvalOk:\n\tcase v.ivalOk:\n\t\tv.fval = float64(v.ival)\n\t\tv.fvalOk = true\n\tcase v.svalOk:\n\t\t// Perform a best-effort conversion from string to float64.\n\t\tv.fval = 0.0\n\t\tstrs := matchFloat.FindStringSubmatch(v.sval)\n\t\tif len(strs) >= 2 {\n\t\t\tv.fval, _ = strconv.ParseFloat(strs[1], 64)\n\t\t}\n\t\tv.fvalOk = true\n\t}\n\treturn v.fval\n}", "title": "" }, { "docid": "1feb718423cdc39059e7db610d631651", "score": "0.60224783", "text": "func Float64(val interface{}) (float64, error) {\n\tswitch ret := val.(type) {\n\tcase float64:\n\t\treturn ret, nil\n\tcase int:\n\t\treturn float64(ret), nil\n\tcase int8:\n\t\treturn float64(ret), nil\n\tcase int16:\n\t\treturn float64(ret), nil\n\tcase int32:\n\t\treturn float64(ret), nil\n\tcase int64:\n\t\treturn float64(ret), nil\n\tcase uint:\n\t\treturn float64(ret), nil\n\tcase uint8:\n\t\treturn float64(ret), nil\n\tcase uint16:\n\t\treturn float64(ret), nil\n\tcase uint32:\n\t\treturn float64(ret), nil\n\tcase uint64:\n\t\treturn float64(ret), nil\n\tcase float32:\n\t\treturn float64(ret), nil\n\tcase bool:\n\t\tif ret {\n\t\t\treturn 1.0, nil\n\t\t}\n\t\treturn 0.0, nil\n\tdefault:\n\t\tstr := strings.Replace(strings.TrimSpace(StringMust(val)), \" \", \"\", -1)\n\t\treturn strconv.ParseFloat(str, 64)\n\t}\n}", "title": "" }, { "docid": "c75c774ca56e59e0b96c73e831052364", "score": "0.6018751", "text": "func (i *InsertFactBuilder) OFloat64(f float64, unitID uint64) *InsertFactBuilder {\n\ti.fact.Object = AFloat64(f, unitID)\n\treturn i\n}", "title": "" }, { "docid": "6d379fe8a17d2130d666183b457ddc82", "score": "0.6014805", "text": "func (wtgb *WorkerTypeGroupBy) Float64(ctx context.Context) (_ float64, err error) {\n\tvar v []float64\n\tif v, err = wtgb.Float64s(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{workertype.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: WorkerTypeGroupBy.Float64s returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "f01dce6d8373ee164a0c7be016b68e82", "score": "0.60147494", "text": "func Float64Val(f *float64) float64 {\n\tif f == nil {\n\t\treturn 0.0\n\t}\n\treturn *f\n}", "title": "" }, { "docid": "ce336d0831e120bc7e75768476d669ba", "score": "0.60091937", "text": "func opUI16ToF64(prgrm *CXProgram) {\n\texpr := prgrm.GetExpr()\n\tfp := prgrm.GetFramePointer()\n\n\toutV0 := float64(ReadUI16(fp, expr.Inputs[0]))\n\tWriteF64(GetFinalOffset(fp, expr.Outputs[0]), outV0)\n}", "title": "" }, { "docid": "69d307e0dc1eaadab0cdda51c34b6a74", "score": "0.6007803", "text": "func (ws *WorkflowSelect) Float64(ctx context.Context) (_ float64, err error) {\n\tvar v []float64\n\tif v, err = ws.Float64s(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{workflow.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: WorkflowSelect.Float64s returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "1aed85de05c1d9aa2a0c7b2b0e631c28", "score": "0.600442", "text": "func (lus *LastUpdatedSelect) Float64(ctx context.Context) (_ float64, err error) {\n\tvar v []float64\n\tif v, err = lus.Float64s(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{lastupdated.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: LastUpdatedSelect.Float64s returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "9bf9f7e1cb60f1d7ee9d1a7038ea7729", "score": "0.599948", "text": "func Float64(r interface{}, err error) (float64, error) {\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\tswitch r := r.(type) {\n\tcase float64:\n\t\treturn r, err\n\tcase []byte:\n\t\tn, err := strconv.ParseFloat(string(r), 64)\n\t\treturn n, err\n\tcase string:\n\t\tn, err := strconv.ParseFloat(r, 64)\n\t\treturn n, err\n\tcase nil:\n\t\treturn 0, simplesessions.ErrNil\n\t}\n\treturn 0, simplesessions.ErrAssertType\n}", "title": "" }, { "docid": "2878182eb97eb5ddf1cd387f27edf87a", "score": "0.599097", "text": "func (n Number) Float64() float64 {\n\treturn float64(n)\n}", "title": "" }, { "docid": "e268ab04d61ed7e05634c13ade5252ed", "score": "0.59906554", "text": "func (ws *WidgetSelect) Float64(ctx context.Context) (_ float64, err error) {\n\tvar v []float64\n\tif v, err = ws.Float64s(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{widget.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: WidgetSelect.Float64s returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "3624afa999797a82a7423da224631b29", "score": "0.598285", "text": "func NewFuncI64I64ToI64(rvars []string, fct func(arg00 int64, arg01 int64) int64) *FuncI64I64ToI64 {\n\treturn &FuncI64I64ToI64{\n\t\trvars: rvars,\n\t\tfct: fct,\n\t}\n}", "title": "" }, { "docid": "8372f21b75a2f38107aeec4635ff2c37", "score": "0.598048", "text": "func (rls *RuleLimitSelect) Float64(ctx context.Context) (_ float64, err error) {\n\tvar v []float64\n\tif v, err = rls.Float64s(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{rulelimit.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: RuleLimitSelect.Float64s returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "f2db825c4bee882c3d9111dd8155d775", "score": "0.5979665", "text": "func (nss *NamespaceSecretSelect) Float64(ctx context.Context) (_ float64, err error) {\n\tvar v []float64\n\tif v, err = nss.Float64s(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{namespacesecret.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: NamespaceSecretSelect.Float64s returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "3328b842cfb8051aedcdf0ee3779f5c4", "score": "0.59728956", "text": "func (wfs *WithFieldsSelect) Float64(ctx context.Context) (_ float64, err error) {\n\tvar v []float64\n\tif v, err = wfs.Float64s(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{withfields.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: WithFieldsSelect.Float64s returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "b9201034c03d21b12ce3ba3bf0825f5e", "score": "0.59696573", "text": "func (rs *RemedySelect) Float64(ctx context.Context) (_ float64, err error) {\n\tvar v []float64\n\tif v, err = rs.Float64s(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{remedy.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: RemedySelect.Float64s returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "50080eeb8da68658e1ca3b9a87fb0e93", "score": "0.59585446", "text": "func (r *Reader) Float64() float64 {\n\treturn math.Float64frombits(r.Uint64())\n}", "title": "" }, { "docid": "59e4e7961c3ba066ab3755df66b28609", "score": "0.5955808", "text": "func NewFuncI64I64I64ToI64(rvars []string, fct func(arg00 int64, arg01 int64, arg02 int64) int64) *FuncI64I64I64ToI64 {\n\treturn &FuncI64I64I64ToI64{\n\t\trvars: rvars,\n\t\tfct: fct,\n\t}\n}", "title": "" }, { "docid": "48f30d98dcf43b72d109f378a7de5d2a", "score": "0.5955351", "text": "func (f Float64) Float64(_ context.Context) (*float64, error) {\n\tif f > 0 {\n\t\tvalue := float64(f)\n\t\treturn &value, nil\n\t}\n\treturn nil, nil\n}", "title": "" }, { "docid": "a4bf109751ac734a6abd8a8d1741c099", "score": "0.5955066", "text": "func op_f64_uneq(expr *CXExpression, fp int) {\n\tinp1, inp2, out1 := expr.Inputs[0], expr.Inputs[1], expr.Outputs[0]\n\toutB1 := FromBool(ReadF64(fp, inp1) != ReadF64(fp, inp2))\n\tWriteMemory(GetFinalOffset(fp, out1), outB1)\n}", "title": "" }, { "docid": "5199fafae0abe48c2d1fb73569a921eb", "score": "0.5953492", "text": "func ReduceAnyValueToFloat64(in []AnyValue, memo float64, f func(float64, AnyValue) float64) float64 {\n\tfor _, value := range in {\n\t\tmemo = f(memo, value)\n\t}\n\treturn memo\n}", "title": "" }, { "docid": "4f9a88b0dc7154d1fcc1ab45ffeead23", "score": "0.59493434", "text": "func (ws *WifiSelect) Float64(ctx context.Context) (_ float64, err error) {\n\tvar v []float64\n\tif v, err = ws.Float64s(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{wifi.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: WifiSelect.Float64s returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "0a6c626a312f86f3ba33ff8a3d99c1e0", "score": "0.5948532", "text": "func boolFloat64(b bool) float64 {\n\tif !b {\n\t\treturn 0.0\n\t}\n\n\treturn 1.0\n}", "title": "" }, { "docid": "e48869d12778835c3b0d9af2383579e6", "score": "0.59444404", "text": "func op_f64_min(expr *CXExpression, fp int) {\n\tinp1, inp2, out1 := expr.Inputs[0], expr.Inputs[1], expr.Outputs[0]\n\toutB1 := FromF64(math.Min(ReadF64(fp, inp1), ReadF64(fp, inp2)))\n\tWriteMemory(GetFinalOffset(fp, out1), outB1)\n}", "title": "" }, { "docid": "cbdaee12c292e3cc04475b650ceb5230", "score": "0.5934736", "text": "func Float64F(name string, value float64, usage string) *float64 {\n\treturn Global.Float64F(name, value, usage)\n}", "title": "" }, { "docid": "9697e9fb824c3f8ac347cee73eaa6d33", "score": "0.5933909", "text": "func (r *Result) Float64() float64 {\n\tif r.Error != nil {\n\t\treturn 0\n\t}\n\n\treturn convert.ToFloat64(r.Value)\n}", "title": "" }, { "docid": "c25ca47a0d540073433a82bf94ba76c3", "score": "0.59312135", "text": "func FastrandInt64() int64 {\n\treturn int64(FastrandUint64() & (1<<63 - 1))\n}", "title": "" }, { "docid": "bd536dbb7fe64771561a737899a964ee", "score": "0.5920996", "text": "func (fs *ForumSelect) Float64(ctx context.Context) (_ float64, err error) {\n\tvar v []float64\n\tif v, err = fs.Float64s(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{forum.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: ForumSelect.Float64s returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "19345d5ef832ffde9c9f3dc27367907a", "score": "0.5913916", "text": "func NewFuncI64ToI64(rvars []string, fct func(arg00 int64) int64) *FuncI64ToI64 {\n\treturn &FuncI64ToI64{\n\t\trvars: rvars,\n\t\tfct: fct,\n\t}\n}", "title": "" }, { "docid": "ceed902afb2f4c65ba85fbd2921cfb74", "score": "0.59093475", "text": "func (a Allocator) Float64() Floating {\n\treturn &f64{\n\t\tbuffer: make([]float64, a.Channels*a.Length, a.Channels*a.Capacity),\n\t\tchannels: channels(a.Channels),\n\t}\n}", "title": "" }, { "docid": "a8a98e1008cd51b73aeb8d9a1d336b03", "score": "0.590651", "text": "func Interface2Float64(v interface{}) float64 {\n\tif v == nil {\n\t\treturn 0\n\t}\n\tswitch d := v.(type) {\n\tcase string:\n\t\tt, _ := strconv.ParseFloat(d, 64)\n\t\treturn t\n\tcase float32, float64:\n\t\treturn reflect.ValueOf(d).Float()\n\tcase int, int8, int16, int32, int64:\n\t\treturn float64(reflect.ValueOf(d).Int())\n\tcase uint, uint8, uint16, uint32, uint64:\n\t\treturn float64(reflect.ValueOf(d).Uint())\n\t}\n\treturn 0\n}", "title": "" }, { "docid": "82a905ff7d104f78ab188b1b6aa85425", "score": "0.5906232", "text": "func (wgb *WorkflowGroupBy) Float64(ctx context.Context) (_ float64, err error) {\n\tvar v []float64\n\tif v, err = wgb.Float64s(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{workflow.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: WorkflowGroupBy.Float64s returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "23da4d545effc5c0e75981b9e12bfa15", "score": "0.5904979", "text": "func Float64() float64 {\n\tmu.Lock()\n\tres := r.Float64()\n\tmu.Unlock()\n\treturn res\n}", "title": "" }, { "docid": "05cbade887adfbb3ed9a58df0462134c", "score": "0.58943987", "text": "func op_f64_sin(expr *CXExpression, fp int) {\n\tinp1, out1 := expr.Inputs[0], expr.Outputs[0]\n\toutB1 := FromF64(math.Sin(ReadF64(fp, inp1)))\n\tWriteMemory(GetFinalOffset(fp, out1), outB1)\n}", "title": "" }, { "docid": "1f3138e14a865be91a7f0bd4e972a1ee", "score": "0.58903134", "text": "func (ws *WordSelect) Float64(ctx context.Context) (_ float64, err error) {\n\tvar v []float64\n\tif v, err = ws.Float64s(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{word.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: WordSelect.Float64s returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "aa7e0922ad56cb6403507c2c873ce10c", "score": "0.5879394", "text": "func (kls *K8sLabelSelect) Float64(ctx context.Context) (_ float64, err error) {\n\tvar v []float64\n\tif v, err = kls.Float64s(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{k8slabel.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: K8sLabelSelect.Float64s returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "6eea5af4d6a54d53fd3c929f5db413cd", "score": "0.5875952", "text": "func (f F128d16) Int64() (int64, error) {\n\tn := f.AsInt64()\n\tif F128d16FromInt64(n) != f {\n\t\treturn 0, errDoesNotFitInInt64\n\t}\n\treturn n, nil\n}", "title": "" }, { "docid": "9dfcc14d43834d3aa237ac0d54e7ad42", "score": "0.58693", "text": "func ReduceFloat64ToFloat64(in []float64, memo float64, f func(float64, float64) float64) float64 {\n\tfor _, value := range in {\n\t\tmemo = f(memo, value)\n\t}\n\treturn memo\n}", "title": "" }, { "docid": "0feba77cff326d0facdae0f532b4955b", "score": "0.58689743", "text": "func (n Number) Float64() (float64, error) {\n\treturn strconv.ParseFloat(string(n), 64)\n}", "title": "" }, { "docid": "840bf19c70b46cf3c1cee2b0f8099870", "score": "0.5866008", "text": "func (p *PCG64) Float64() float64 {\n\treturn float64(p.Int63n(1<<53)) / (1 << 53)\n}", "title": "" }, { "docid": "20e5c1697ee1d6a78e11fcb94b21f6df", "score": "0.58585036", "text": "func (x *Float) Float64() (float64, Accuracy) {\n\t// possible: panic(\"unreachable\")\n}", "title": "" }, { "docid": "ded15dcadfd310edeba5152aadcc9f7d", "score": "0.5856269", "text": "func (irgb *InstanceRuntimeGroupBy) Float64(ctx context.Context) (_ float64, err error) {\n\tvar v []float64\n\tif v, err = irgb.Float64s(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{instanceruntime.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: InstanceRuntimeGroupBy.Float64s returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "d350ae49646f0584b24f470b5e6af9e9", "score": "0.58555716", "text": "func (hs *HarborSelect) Float64(ctx context.Context) (_ float64, err error) {\n\tvar v []float64\n\tif v, err = hs.Float64s(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{harbor.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: HarborSelect.Float64s returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "9741a5480a54cf32d9e48d0e578b00c7", "score": "0.5854675", "text": "func (n *eeNum) float64() *float64 { return (*float64)(unsafe.Pointer(&n.data)) }", "title": "" }, { "docid": "cfeb3f90c067b78ab9f0ce5bc2cd7c26", "score": "0.5854431", "text": "func opUI64ToI64(prgrm *CXProgram) {\n\texpr := prgrm.GetExpr()\n\tfp := prgrm.GetFramePointer()\n\n\toutV0 := int64(ReadUI64(fp, expr.Inputs[0]))\n\tWriteI64(GetFinalOffset(fp, expr.Outputs[0]), outV0)\n}", "title": "" }, { "docid": "40365851e4ac42c5ffebdc95f0c71d10", "score": "0.58540606", "text": "func (rs *RentSelect) Float64(ctx context.Context) (_ float64, err error) {\n\tvar v []float64\n\tif v, err = rs.Float64s(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{rent.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: RentSelect.Float64s returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "8914785e8bac0544e1e90e7522fded0b", "score": "0.5853995", "text": "func (fds *FurnitureDetailSelect) Float64(ctx context.Context) (_ float64, err error) {\n\tvar v []float64\n\tif v, err = fds.Float64s(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{furnituredetail.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: FurnitureDetailSelect.Float64s returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "7d342b2bf12a2004841506f932046af5", "score": "0.5833142", "text": "func (x *Big) Float64() (f float64, ok bool) {\n\tif debug {\n\t\tx.validate()\n\t}\n\n\tif !x.IsFinite() {\n\t\tswitch x.form {\n\t\tcase pinf, ninf:\n\t\t\treturn math.Inf(int(x.form & signbit)), true\n\t\tcase snan, qnan:\n\t\t\treturn math.NaN(), true\n\t\tcase ssnan, sqnan:\n\t\t\treturn math.Copysign(math.NaN(), -1), true\n\t\t}\n\t}\n\n\tconst (\n\t\tmaxPow10 = 22 // largest exact power of 10\n\t\tmaxMantissa = 1<<53 + 1 // largest exact mantissa\n\t)\n\tswitch xc := x.compact; {\n\tcase !x.isCompact():\n\t\tfallthrough\n\t//lint:ignore ST1015 convoluted, but on purpose\n\tdefault:\n\t\tf, _ = strconv.ParseFloat(x.String(), 64)\n\t\tok = !math.IsInf(f, 0) && !math.IsNaN(f)\n\tcase xc == 0:\n\t\tok = true\n\tcase x.IsInt():\n\t\tif xc, ok := x.Int64(); ok {\n\t\t\tf = float64(xc)\n\t\t} else if xc, ok := x.Uint64(); ok {\n\t\t\tf = float64(xc)\n\t\t}\n\t\tok = xc < maxMantissa || (xc&(xc-1)) == 0\n\tcase x.exp == 0:\n\t\tf = float64(xc)\n\t\tok = xc < maxMantissa || (xc&(xc-1)) == 0\n\tcase x.exp > 0:\n\t\tf = float64(x.compact) * math.Pow10(x.exp)\n\t\tok = x.compact < maxMantissa && x.exp < maxPow10\n\tcase x.exp < 0:\n\t\tf = float64(x.compact) / math.Pow10(-x.exp)\n\t\tok = x.compact < maxMantissa && x.exp > -maxPow10\n\t}\n\n\tif x.form&signbit != 0 {\n\t\tf = math.Copysign(f, -1)\n\t}\n\treturn f, ok\n}", "title": "" }, { "docid": "9338d88f706ad303709ec7699b5eb95d", "score": "0.5832764", "text": "func MarshalF64(x float64, buf []byte, rem int) ([]byte, int, error) {\n\tif len(buf) < SizeHintF64 || rem < SizeHintF64 {\n\t\treturn buf, rem, ErrUnexpectedEndOfBuffer\n\t}\n\tbinary.BigEndian.PutUint64(buf, math.Float64bits(x))\n\treturn buf[SizeHintF64:], rem - SizeHintF64, nil\n}", "title": "" }, { "docid": "26e74797112eb2597ff8272c0ca8e798", "score": "0.5831832", "text": "func (d Decimal) Float64() (f float64, exact bool) {\n\treturn d.Rat().Float64()\n}", "title": "" }, { "docid": "26e74797112eb2597ff8272c0ca8e798", "score": "0.5831832", "text": "func (d Decimal) Float64() (f float64, exact bool) {\n\treturn d.Rat().Float64()\n}", "title": "" }, { "docid": "e8a83f6464cd9084f776ee36e1a87018", "score": "0.58269936", "text": "func (das *DrugAllergySelect) Float64(ctx context.Context) (_ float64, err error) {\n\tvar v []float64\n\tif v, err = das.Float64s(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{drugallergy.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: DrugAllergySelect.Float64s returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "8e2d0c222fd185c24a08a0a661402ba2", "score": "0.5821647", "text": "func Float64(name string, value float64, usage string) *float64 {\n\treturn Global.Float64(name, value, usage)\n}", "title": "" }, { "docid": "65ccbd3900ec83ecfe47c1bed17a61a4", "score": "0.58210874", "text": "func (ups *UnsavedPostSelect) Float64(ctx context.Context) (_ float64, err error) {\n\tvar v []float64\n\tif v, err = ups.Float64s(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{unsavedpost.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: UnsavedPostSelect.Float64s returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" } ]
dd124bbe82e3accde55029e5d6b8bba9
Compile compiles a qlang source file.
[ { "docid": "3ec9a0c9093b6712bdde7205f1f98f26", "score": "0.56153345", "text": "func (p *Compiler) Compile(fname string) int {\n\n\tcodeText, err := ReadFile(fname)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn p.Cl(codeText, fname)\n}", "title": "" } ]
[ { "docid": "a98e7c4129be09d9e845bdd59b9d6f2c", "score": "0.6335856", "text": "func Compile(source []byte, name string, opts Opts) ([]byte, error) {\n\tvar err error\n\n\toutdir := opts.Output\n\tif outdir == \"\" {\n\t\toutdir, err = ioutil.TempDir(\"\", \"cbpfc-clang\")\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"can't create output directory\")\n\t\t}\n\t\tdefer os.RemoveAll(outdir)\n\t} else {\n\t\t_ = os.Mkdir(outdir, 0755)\n\t}\n\n\tinputFile := fmt.Sprintf(\"%s.c\", name)\n\toutputFile := fmt.Sprintf(\"%s.elf\", name)\n\terr = ioutil.WriteFile(filepath.Join(outdir, inputFile), source, 0644)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"can't write out program\")\n\t}\n\n\tflags := []string{\n\t\t\"-O2\",\n\t\t\"-Wall\", \"-Werror\",\n\t\t\"-nostdinc\",\n\t\t\"-c\",\n\t\t\"-target\", \"bpf\",\n\t\tinputFile,\n\t\t\"-o\", outputFile,\n\t}\n\n\tfor _, include := range opts.Include {\n\t\t// debug build script will be in a different directory, relative imports won't work\n\t\tabsInclude, err := filepath.Abs(include)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrapf(err, \"can't get absolute path to include %s\", include)\n\t\t}\n\n\t\tflags = append(flags, \"-I\", absInclude)\n\t}\n\n\tif opts.EmitDebug {\n\t\tflags = append(flags, \"-g\")\n\t}\n\n\tcmd := exec.Command(opts.Clang, flags...)\n\n\t// debug build script\n\tif opts.Output != \"\" {\n\t\tcmdline := cmd.Path + \" \" + strings.Join(flags, \" \") + \"\\n\"\n\t\terr := ioutil.WriteFile(filepath.Join(outdir, \"build\"), []byte(cmdline), 0644)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"can't write build cmdline\")\n\t\t}\n\t}\n\n\tcmd.Dir = outdir\n\t_, err = cmd.Output()\n\tif err != nil {\n\t\tswitch e := err.(type) {\n\t\tcase *exec.ExitError:\n\t\t\treturn nil, errors.Wrapf(e, \"unable to compile C:\\n%s\", string(e.Stderr))\n\t\tdefault:\n\t\t\treturn nil, errors.Wrapf(e, \"unable to compile C\")\n\t\t}\n\t}\n\n\telf, err := ioutil.ReadFile(filepath.Join(outdir, outputFile))\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"can't read ELF\")\n\t}\n\n\treturn elf, nil\n}", "title": "" }, { "docid": "a6af6a6e2d7397ac26f45a0a89468d10", "score": "0.62621355", "text": "func Compile(args ...string) ([]byte, error) { return Shell(\"ccgo\", args...) }", "title": "" }, { "docid": "de51ed438f8d46257c3bb217f41f7f17", "score": "0.61852366", "text": "func Compile(inputFile string, outputFile string) error {\n\tlines, err := ReadAndParseFile(inputFile)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\toperations, err := ConstructProgram(lines)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = WriteProgramFile(operations, outputFile)\n\treturn err\n}", "title": "" }, { "docid": "5792d901c0bd67aee818e254c7a06db2", "score": "0.6092558", "text": "func Compile(name string, src io.Reader) (*Program, error) {\n\tprogName = name\n\tsc := new(scan.Scanner)\n\tast = NewProgram(sc)\n\tlexlineno = 1\n\tnlsemi = false\n\tl := &yyLex{reader: bufio.NewReader(src)}\n\tyyParse(l)\n\tanalyse(ast, sc)\n\treturn ast, l.err\n}", "title": "" }, { "docid": "1743064b90573493fb7ad75df9e82415", "score": "0.5977003", "text": "func NewCode(f string, lang []string, i *Info, w, e io.Writer) (*Code, *Result, func(), error) {\n\tdir, err := ioutil.TempDir(\"\", \"goyuki\")\n\tif err != nil {\n\t\treturn nil, nil, nil, fmt.Errorf(\"can't create directory: %v\", err)\n\t}\n\tclearFunc := func() {\n\t\tos.RemoveAll(dir)\n\t}\n\n\text := Ext(lang[2])\n\t_, source := path.Split(f)\n\tlCmd := LangCmd{\n\t\tFile: source,\n\t\tExec: strings.Split(source, \".\")[0],\n\t}\n\n\tb, err := ioutil.ReadFile(f)\n\tif err != nil {\n\t\treturn nil, nil, nil, fmt.Errorf(\"failed to read source file: %v\", err)\n\t}\n\n\tif err := ioutil.WriteFile(dir+\"/\"+source, b, FPerm); err != nil {\n\t\treturn nil, nil, nil, err\n\t}\n\n\tret := &Result{\n\t\tinfo: i,\n\t\tdate: time.Now(),\n\t\tlang: lang[2],\n\t\tcodeLength: len(b),\n\t}\n\n\tcode := &Code{\n\t\tLangCmd: &lCmd,\n\t\tLang: lang,\n\t\tInfo: i,\n\t\tDir: dir,\n\t}\n\n\tsTime := time.Now()\n\terr = code.Compile(os.Stdin, w, e)\n\tret.compileTime = time.Now().Sub(sTime)\n\tif err != nil {\n\t\treturn nil, nil, nil, err\n\t}\n\n\tif ext[1:] == \"java\" || ext[1:] == \"scala\" {\n\t\tlCmd.Class, err = classFile(dir, source, ext[1:])\n\t\tif err != nil {\n\t\t\treturn nil, nil, nil, err\n\t\t}\n\t}\n\treturn code, ret, clearFunc, nil\n}", "title": "" }, { "docid": "47fb16a997110f94910fe8542c26277d", "score": "0.5962097", "text": "func Compile(path string, opt *Options) (string, error) {\n\t// TODO: implement\n\treturn \"\", nil\n}", "title": "" }, { "docid": "5121a8dddcae7895bd0c37d32e6a78c8", "score": "0.59212136", "text": "func execCompile(compilerExecName string, pr ParserResult, wg *sync.WaitGroup) {\n defer (*wg).Done()\n if execCmd(compilerExecName, pr.InputList, \"\") {\n log.Fatal(\"Failed to compile using given arguments.\")\n }\n}", "title": "" }, { "docid": "cf4bbb60fe8f59d4986f0e130a68c719", "score": "0.59018826", "text": "func (c *Code) Compile(r io.Reader, w, e io.Writer) error {\n\tcmd, err := c.buildCmd(0)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tcmd.Stdin, cmd.Stdout, cmd.Stderr = r, w, e\n\tif err := cmd.Run(); err != nil {\n\t\treturn fmt.Errorf(\"%s: %s\", CE, c.File)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f0142d937fd7762a7991dcd793c56568", "score": "0.58387965", "text": "func CompileSource(src string) (*ProgramIL, error) {\n\tctx := context.Background()\n\n\thash := sha256.Sum256([]byte(src))\n\n\tcomp := &compiler{\n\t\tSource: src,\n\t\tHash: hash[:],\n\t\tTokens: []*TokenIL{},\n\t\tFuncCalls: map[string]uint64{},\n\t}\n\n\terr := failable.DoWithContext(ctx, func(ctx context.Context, fail failable.FailFunc) {\n\t\ttokenize(ctx, comp, fail)\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\terr = failable.DoWithContext(ctx, func(ctx context.Context, fail failable.FailFunc) {\n\t\tparser(ctx, comp, fail)\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &ProgramIL{\n\t\tId: ksuid.New().Bytes(),\n\t\tSource: comp.GenerateSource(),\n\t\tEntry: comp.Ast,\n\t\tFuncCalls: comp.FuncCalls,\n\t}, nil\n}", "title": "" }, { "docid": "9cae54f8809739819e6b6d1e235f01c8", "score": "0.5665793", "text": "func (parser *Parser) Compile(fpath string,\n\tmroPaths []string, checkSrcPath bool) (string, []string, *Ast, error) {\n\n\tif data, err := ioutil.ReadFile(fpath); err != nil {\n\t\treturn \"\", nil, nil, err\n\t} else {\n\t\treturn parser.ParseSourceBytes(data, fpath, mroPaths, checkSrcPath)\n\t}\n}", "title": "" }, { "docid": "46a3989908746e62bb64341837ce7a76", "score": "0.5659693", "text": "func (e *Engine) Compile(filePath string) (*lua.FunctionProto, error) {\r\n\tfile, err := os.Open(filePath)\r\n\tdefer file.Close()\r\n\tif err != nil {\r\n\t\treturn nil, err\r\n\t}\r\n\treader := bufio.NewReader(file)\r\n\tchunk, err := parse.Parse(reader, filePath)\r\n\tif err != nil {\r\n\t\treturn nil, err\r\n\t}\r\n\tproto, err := lua.Compile(chunk, filePath)\r\n\tif err != nil {\r\n\t\treturn nil, err\r\n\t}\r\n\treturn proto, nil\r\n}", "title": "" }, { "docid": "326edc12d3cb0c01c15bf51790ab0042", "score": "0.56531566", "text": "func execCompile(_ int, p *gop.Context) {\n\targs := p.GetArgs(1)\n\tret, ret1 := regexp.Compile(args[0].(string))\n\tp.Ret(1, ret, ret1)\n}", "title": "" }, { "docid": "775d4fe90682668d15002699ba3a9770", "score": "0.5585786", "text": "func (pi PolicyInterpreter) compile(path string) error {\n\t// Setup the input\n\tis, err := antlr.NewFileStream(path)\n\tif err != nil {\n\t\tlogger.Error.Println(\"Error reading policy from path\", path)\n\t\treturn err\n\t}\n\n\t// Create the Lexer\n\tlexer := parser.NewSfplLexer(is)\n\tstream := antlr.NewCommonTokenStream(lexer, antlr.TokenDefaultChannel)\n\n\t// Create the Parser\n\tp := parser.NewSfplParser(stream)\n\n\t// Pre-processing (to deal with usage before definitions of macros and lists)\n\tantlr.ParseTreeWalkerDefault.Walk(&sfplListener{}, p.Defs())\n\tp.GetInputStream().Seek(0)\n\n\t// Parse the policy\n\tantlr.ParseTreeWalkerDefault.Walk(&sfplListener{}, p.Policy())\n\n\treturn nil\n}", "title": "" }, { "docid": "dec43298b1b31ce645007749f9447aa2", "score": "0.5581676", "text": "func qlCompile(key string, wraptx bool) (list ql.List, err error) {\n\tvar src string\n\tif l, ok := qlc[key]; !ok {\n\t\tif src, ok = qlq[key]; !ok {\n\t\t\tsrc = key\n\t\t}\n\t\tif wraptx {\n\t\t\tsrc = \"BEGIN TRANSACTION; \" + src + \"; COMMIT;\"\n\t\t}\n\t\tif l, e := ql.Compile(src); err != nil {\n\t\t\terr = e\n\t\t} else {\n\t\t\tlist = l\n\t\t}\n\t\tqlc[key] = list\n\t} else {\n\t\tlist = l\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "ae52640edb2589a3d41068010885b472", "score": "0.5576965", "text": "func compile(ch chan<- *automata.FiniteState, compilable Compiler) {\n\tch <- compilable.Compile()\n}", "title": "" }, { "docid": "332b42316df7b5268af9ba337b3afa83", "score": "0.556181", "text": "func CompileSource(t *testing.T, sender util.Uint160, src io.Reader, opts *compiler.Options) *Contract {\n\t// nef.NewFile() cares about version a lot.\n\tconfig.Version = \"neotest\"\n\n\tne, di, err := compiler.CompileWithDebugInfo(opts.Name, src)\n\trequire.NoError(t, err)\n\n\tm, err := compiler.CreateManifest(di, opts)\n\trequire.NoError(t, err)\n\n\treturn &Contract{\n\t\tHash: state.CreateContractHash(sender, ne.Checksum, m.Name),\n\t\tNEF: ne,\n\t\tManifest: m,\n\t}\n}", "title": "" }, { "docid": "fc67a4f21db3b597f4ca383f6c66010a", "score": "0.5553798", "text": "func (c *Computer) CompileProgram(src string) ([]byte, error) {\n\tvar err error\n\tb, err := compile(src)\n\treturn b, err\n}", "title": "" }, { "docid": "06f4a339f21b8ed049620e4d3e0dc291", "score": "0.5541801", "text": "func buildBitcodeFile(compilerExecName string, pr ParserResult, srcFile string, bcFile string) {\n args := pr.CompileArgs[:]\n args = append(args, \"-emit-llvm\", \"-c\", srcFile, \"-o\", bcFile)\n if execCmd(compilerExecName, args, \"\") {\n log.Fatal(\"Failed to build bitcode file for \", srcFile)\n }\n}", "title": "" }, { "docid": "1312867f10378fa2897779d60046c8b1", "score": "0.5512177", "text": "func Compile(fpath string,\n\tmroPaths []string, checkSrcPath bool) (string, []string, *Ast, error) {\n\tvar parser Parser\n\treturn parser.Compile(fpath, mroPaths, checkSrcPath)\n}", "title": "" }, { "docid": "e94d652dcdee17ca0335a6295320de00", "score": "0.549918", "text": "func (vm *VM) Compile() (err error) {\n\tvm.Compiled, err = vm.Script.Compile()\n\treturn err\n}", "title": "" }, { "docid": "3b8f7a7f44938276eaa09a7ae76e679c", "score": "0.5495862", "text": "func NewCompiler(lang string, path string) (*Compiler, error) {\n\tcompilers := map[string]string{\n\t\t\"java\": \"javac\",\n\t\t\"c\": \"gcc\",\n\t\t\"kotlin\": \"kotlinc\",\n\t\t\"go\": \"go\",\n\t}\n\tcommands := map[string]string{\n\t\t\"java\": \"\",\n\t\t\"c\": \"\",\n\t\t\"kotlin\": \"-include-runtime\",\n\t\t\"go\": \"build\",\n\t}\n\tto := map[string]string{\n\t\t\"java\": \"-d\",\n\t\t\"c\": \"-o\",\n\t\t\"kotlin\": \"-d\",\n\t\t\"go\": \"-o\",\n\t}\n\n\tif _, ok := compilers[lang]; !ok {\n\t\treturn nil, fmt.Errorf(\"language not suported\")\n\t}\n\n\tcomp := Compiler{\n\t\tName: compilers[lang],\n\t\tCommand: commands[lang],\n\t\tInputPath: path,\n\t\tOutputPath: \"output/\",\n\t\tTo: to[lang],\n\t}\n\n\treturn &comp, nil\n}", "title": "" }, { "docid": "f2b8d0ab50f4e58357a2bd613b57088c", "score": "0.54909134", "text": "func (i *Interpreter) compile(w *eval.World, fileSet *token.FileSet, sourceCode string) (code eval.Code, vars []string, err error) {\n\tvar statements []ast.Stmt\n\tvar declarations []ast.Decl\n\n\tvars_buffer := make(map[string]bool)\n\n\tstatements, err1 := parseStmtList(fileSet, sourceCode)\n\tif err1 == nil {\n\t\tfor _, s := range statements {\n\t\t\taddTopLevelVars(s, vars_buffer)\n\t\t}\n\t\tvars = make([]string, 0, len(vars_buffer))\n\t\tfor varName := range vars_buffer {\n\t\t\tvars = append(vars, varName)\n\t\t}\n\n\t\tcode, err = w.CompileStmtList(fileSet, statements)\n\n\t\treturn code, vars, err\n\t}\n\n\tdeclarations, err2 := parseDeclList(fileSet, sourceCode)\n\tif err2 == nil {\n\t\tfor _, d := range declarations {\n\t\t\taddTopLevelVars(d, vars_buffer)\n\t\t}\n\t\tvars = make([]string, 0, len(vars_buffer))\n\t\tfor varName := range vars_buffer {\n\t\t\tvars = append(vars, varName)\n\t\t}\n\n\t\tcode, err = w.CompileDeclList(fileSet, declarations)\n\n\t\treturn code, vars, err\n\t}\n\n\treturn nil, nil, err1\n}", "title": "" }, { "docid": "f6057936b60f01d13ddde5542d83fff8", "score": "0.5490247", "text": "func Compile(cfg *config.Config, variant string) (*bytes.Buffer, error) {\n\tbuffer := new(bytes.Buffer)\n\tctx := context.Background()\n\n\tstate, _, err := CompileToLLB(ctx, nil, cfg, variant, d2llb.ConvertOpt{})\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdef, err := state.Marshal(ctx)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\twriter := bufio.NewWriter(buffer)\n\terr = llb.WriteTo(def, writer)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\terr = writer.Flush()\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn buffer, nil\n}", "title": "" }, { "docid": "2c9cf641911331c8a70ebc7293169554", "score": "0.5467335", "text": "func (e *baseExecutor) compile() *CodeResult {\n\tout, errOut := e.runCommand(e.CompileCommandName, e.CompileCommandArgs...)\n\treturn &CodeResult{\n\t\tOutput: out.String(),\n\t\tError: errOut.String(),\n\t}\n}", "title": "" }, { "docid": "8561c89d9afb4eefffd075e4e9ea41b7", "score": "0.546059", "text": "func (c *Client) Compile(ctx context.Context, src []byte) (*CompileResponse, error) {\n\tform := url.Values{}\n\tform.Add(\"body\", string(src))\n\tform.Add(\"version\", \"2\")\n\n\tresp, err := c.postForm(ctx, \"compile\", form)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdest := &CompileResponse{}\n\tif err := json.Unmarshal(resp, dest); err != nil {\n\t\t// return response text as errors\n\t\treturn nil, fmt.Errorf(\"error from %q: %s\", c.baseUrl, string(resp))\n\t}\n\n\treturn dest, err\n}", "title": "" }, { "docid": "99f9b30941e82be6803047ff82865f20", "score": "0.5456197", "text": "func Compile(w http.ResponseWriter, req *http.Request) {\n\tvar code CodeS\n\tdoc := req.FormValue(\"doc\")\n\terr := json.Unmarshal([]byte(doc), &code)\n\tif err != nil {\n\t\tlog.Printf(\"json.Unmarshal err = %s string = %s\", err, doc)\n\t\treturn\n\t}\n\t\n\t//writing to a tempfile\n\tfDoc, _ := ioutil.TempFile(Tempdir, \"doc-\")\n\tfDoc.WriteString(code.Code)\n\tfDoc.Close()\n\t\n\t//setting the code to filename\n\tcode.Code = fDoc.Name()\n\t\n\t//compiling the posxml code\n\tif code.Type == \"posxml\" {\n\t\terr = CallWalkCompiler2(&code)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"CallWalkCompiler err = %s\", err)\n\t\t\treturn\n\t\t}\n\t}\n\t\n\t//echo\n\tif code.Type == \"echo\" {\n\t\terr = CallEcho(&code)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"CallEcho err = %s\", err)\n\t\t\treturn\n\t\t}\n\t}\n\t\n\tw.Header().Set(\"Content-Type\", \"text/plain\")\n\tw.Write([]byte(code.Output))\n}", "title": "" }, { "docid": "c016b1875a1946bc23d6d967b42ce2b9", "score": "0.54535323", "text": "func compileProgram(t testing.TB, prog string) (*py.Module, *py.Code) {\n\tf, err := os.Open(prog)\n\tif err != nil {\n\t\tt.Fatalf(\"%s: Open failed: %v\", prog, err)\n\t}\n\tdefer func() {\n\t\tif err := f.Close(); err != nil {\n\t\t\tt.Fatalf(\"%s: Close failed: %v\", prog, err)\n\t\t}\n\t}()\n\n\tstr, err := ioutil.ReadAll(f)\n\tif err != nil {\n\t\tt.Fatalf(\"%s: ReadAll failed: %v\", prog, err)\n\t}\n\n\tobj, err := compile.Compile(string(str), prog, \"exec\", 0, true)\n\tif err != nil {\n\t\tt.Fatalf(\"%s: Compile failed: %v\", prog, err)\n\t}\n\n\tcode := obj.(*py.Code)\n\tmodule := py.NewModule(\"__main__\", \"\", nil, nil)\n\tmodule.Globals[\"__file__\"] = py.String(prog)\n\treturn module, code\n}", "title": "" }, { "docid": "ea3d036097a088ec5c780659d2996ee6", "score": "0.5425291", "text": "func main() {\n\tfileName := os.Args[1]\n\tcode, err := ioutil.ReadFile(fileName)\n\n\tif err != nil {\n\t\t\tfmt.Fprint(os.Stderr, \"error: %s\\n\", err)\n\t\t\tos.Exit(-1)\n\t}\n\n\tcompiler := Compiler.SpawnCompiler(string(code))\n\tinstructions := compiler.Compile()\n\n\tm := Compiler.SpawnVM(instructions, os.Stdin, os.Stdout)\n\tm.Execute()\n}", "title": "" }, { "docid": "c7452502ae7c9d1bcb5c2fce17743306", "score": "0.5410454", "text": "func compile(solFilePath string) (*solCompileOutput, func()) {\n\tif !common.FileOrFolderExists(solFilePath) {\n\t\tfmt.Println(\"The specified solidity file does not exist,\", solFile)\n\t\treturn nil, nil\n\t}\n\n\t// output to temp dir\n\ttempDir, err := ioutil.TempDir(\"\", \"SolCompile-\")\n\tif err != nil {\n\t\tfmt.Println(\"Failed to create temp folder for solidity compilation,\", err.Error())\n\t\treturn nil, nil\n\t}\n\n\tdeleteTempDir := true\n\tdefer func() {\n\t\tif deleteTempDir {\n\t\t\tos.RemoveAll(tempDir)\n\t\t}\n\t}()\n\n\t// run solidity compilation command\n\tcmdArgs := fmt.Sprintf(\"--optimize --bin --hashes -o %v %v\", tempDir, solFile)\n\tcmd := exec.Command(\"solc\", strings.Split(cmdArgs, \" \")...)\n\tif err = cmd.Run(); err != nil {\n\t\tfmt.Println(\"Failed to compile the solidity file,\", err.Error())\n\t\treturn nil, nil\n\t}\n\n\t// walk through the temp dir to construct compilation outputs\n\toutput := new(solCompileOutput)\n\twalkFunc := func(path string, info os.FileInfo, err error) error {\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif info.IsDir() {\n\t\t\treturn nil\n\t\t}\n\n\t\tcontent, err := ioutil.ReadFile(path)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tswitch filepath.Ext(path) {\n\t\tcase \".signatures\":\n\t\t\toutput.parseFuncHash(string(content))\n\t\tcase \".bin\":\n\t\t\toutput.HexByteCodes = ensurePrefix(string(content), \"0x\")\n\t\t}\n\n\t\treturn nil\n\t}\n\n\tif err = filepath.Walk(tempDir, walkFunc); err != nil {\n\t\tfmt.Println(\"Failed to walk through the compilation temp folder,\", err.Error())\n\t\treturn nil, nil\n\t}\n\n\tdeleteTempDir = false\n\n\treturn output, func() {\n\t\tos.RemoveAll(tempDir)\n\t}\n}", "title": "" }, { "docid": "586b9cc982b1bf4b01fd14d4e7a2fdbc", "score": "0.5401649", "text": "func (comp *Compiler) Compile() (string, error) {\n\targs := buildCompilerArgs(comp)\n\tcmd := exec.Command(comp.Name, args...)\n\terr := cmd.Run()\n\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"compiling error: %v %v %v\", comp.Name, strings.Join(args, \" \"), err)\n\t}\n\n\treturn comp.OutputPath, nil\n}", "title": "" }, { "docid": "ad8d8962c3f6d105f1e81846bef3c28e", "score": "0.5344524", "text": "func Compile(files *[]string, outputFilePath string, options map[string]string) error {\n\toptionsArray := []string{}\n\n\tif options != nil {\n\t\tfor k, v := range options {\n\t\t\toptionsArray = append(optionsArray, k)\n\n\t\t\tif v != \"\" {\n\t\t\t\toptionsArray = append(optionsArray, v)\n\t\t\t}\n\t\t}\n\t}\n\n\targs := make([]string, len(*files)*2+2)\n\n\tfor i, file := range *files {\n\t\targs[i*2] = \"--js\"\n\t\targs[i*2+1] = file\n\t}\n\n\targs[len(args)-2] = \"--js_output_file\"\n\targs[len(args)-1] = outputFilePath\n\n\targs = append(optionsArray, args...)\n\n\tcmd := exec.Command(\"closure-compiler\", args...)\n\n\tif err := cmd.Run(); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "9a93397da48692c343cb67628153db1b", "score": "0.534285", "text": "func (g *Generator) compile(dict *dictionary) error {\n\n\t// Create dictionary file.\n\tfilename := dict.kind.String() + \".go\"\n\tpath := filepath.Join(g.cfg.DictionaryPath, filename)\n\tfile, err := os.Create(path)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"could not open dictionary file: %w\", err)\n\t}\n\tdefer file.Close()\n\n\t// Execute template using the dictionary file as the writer.\n\tt := template.Must(template.New(\"\").Parse(dictionaryTemplate))\n\terr = t.Execute(file, templateData{Name: dict.kind.String(), Bytes: dict.raw})\n\tif err != nil {\n\t\treturn fmt.Errorf(\"could not execute dictionary template: %w\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "6bd193487456da49385518eca8c72f82", "score": "0.52941155", "text": "func Compile(cmd *cobra.Command, args []string) error {\n\n\tclient, err := auth.GetClient()\n\tif err != nil {\n\t\treturn err\n\t}\n\t// Parse all flags\n\n\tvar inputDatafile string\n\terr = flags.ParseFlag(cmd.Flags(), \"input-datafile\", &inputDatafile)\n\tif err != nil {\n\t\treturn fmt.Errorf(`error parsing \"input-datafile\": ` + err.Error())\n\t}\n\tvar spl string\n\tvar validateDefault bool\n\tvalidate := &validateDefault\n\terr = flags.ParseFlag(cmd.Flags(), \"validate\", &validate)\n\tif err != nil {\n\t\treturn fmt.Errorf(`error parsing \"validate\": ` + err.Error())\n\t}\n\t//porcess customized FileInput\n\tbytes, err := ioutil.ReadFile(inputDatafile)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = json.Unmarshal(bytes, &spl)\n\tif err != nil {\n\t\t// If failed to parse as JSON, try reading as simple string\n\t\tspl = string(bytes)\n\t}\n\t// Form the request body\n\tgenerated_request_body := model.SplCompileRequest{\n\n\t\tSpl: spl,\n\t\tValidate: validate,\n\t}\n\n\t// Silence Usage\n\tcmd.SilenceUsage = true\n\n\tresp, err := client.StreamsService.Compile(generated_request_body)\n\tif err != nil {\n\t\treturn err\n\t}\n\tjsonx.Pprint(cmd, resp)\n\treturn nil\n}", "title": "" }, { "docid": "f89ae60d54e76a1373fb73b50680e522", "score": "0.5283878", "text": "func (shader shader) Compile() { CompileShader(shader.c()) }", "title": "" }, { "docid": "5d5fa754d6d127462021337498c6e850", "score": "0.526901", "text": "func Compile(ctx *Context) error {\n\tprinter.Print(\"--- compiling... \")\n\tprinter.Logf(\"compile to %s\", ctx.DstDir())\n\n\tvar (\n\t\ttasks = ctx.prepareCompileTask()\n\t\ttaskSuccessCounter int\n\t\ttaskFailCounter int\n\t)\n\tprinter.Logf(\"compile tasks %d\", len(tasks))\n\n\tfor _, task := range tasks {\n\t\tdata, err := ctx.compile(task.TplFile, task.ViewData)\n\t\tif err != nil {\n\t\t\tprinter.Error(\"compile %v fail : %v\", task.SrcFile, err)\n\t\t\ttaskFailCounter++\n\t\t} else {\n\t\t\tos.MkdirAll(path.Dir(task.DstFile), os.ModePerm)\n\t\t\tif err = ioutil.WriteFile(task.DstFile, data, os.ModePerm); err != nil {\n\t\t\t\tprinter.Error(\"compile %v fail : %v\", task.SrcFile, err)\n\t\t\t\ttaskFailCounter++\n\t\t\t}\n\t\t}\n\t\tif err == nil {\n\t\t\ttaskSuccessCounter++\n\t\t}\n\t}\n\n\tprinter.Logf(\"compile rss\")\n\tif err := compileRSS(ctx); err != nil {\n\t\tprinter.Error(\"compile rss fail : %v\", err)\n\t\ttaskFailCounter++\n\t} else {\n\t\ttaskSuccessCounter++\n\t}\n\n\tprinter.Logf(\"compile sitemap\")\n\tif err := compileSitemap(ctx); err != nil {\n\t\tprinter.Error(\"compile sitemap fail : %v\", err)\n\t\ttaskFailCounter++\n\t} else {\n\t\ttaskSuccessCounter++\n\t}\n\n\tprinter.Info(\"created pages \\t: %v\", taskSuccessCounter)\n\tif taskFailCounter > 0 {\n\t\tprinter.Warn(\"failed pages \\t: %v\", taskFailCounter)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "3c09215bc500518aa4267fefc15c0e4a", "score": "0.52658623", "text": "func compile(compilationList []string, shasums map[string]string, files map[string][]string) error {\n\t// Compile\n\t// http://closure-compiler.googlecode.com/files/compiler-latest.zip\n\tif len(compilationList) > 0 {\n\t\tcompilationStart := time.Now()\n\t\tportableCompilationList := make([]string, len(compilationList))\n\t\tfor i, path := range compilationList {\n\t\t\tportableCompilationList[i] = filepath.ToSlash(path)\n\t\t}\n\t\tcmd := jsCompileCommand(portableCompilationList, appDir)\n\t\tif *verbose {\n\t\t\tfmt.Println(cmd)\n\t\t}\n\t\tb, err := exec.Command(shellForCommands, \"-c\", cmd).CombinedOutput()\n\t\tif err != nil {\n\t\t\tfmt.Println(\"%v\\n\", string(b))\n\t\t\tos.Exit(1)\n\t\t}\n\n\t\t// Split compiler output into separate cached files\n\t\tvar currentFile *os.File\n\t\tlines := strings.Split(string(b), \"\\n\")\n\t\tlastLine := len(lines) - 1\n\t\tfor i, line := range lines {\n\t\t\tif strings.HasPrefix(line, \"// Input \") {\n\t\t\t\tif currentFile != nil {\n\t\t\t\t\tcurrentFile.Close()\n\t\t\t\t}\n\t\t\t\ti, err := strconv.Atoi(strings.Split(line, \"// Input \")[1])\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tfile := compilationList[i]\n\t\t\t\tsha := shasums[file]\n\t\t\t\tcached := filepath.Join(cacheDir, sha)\n\t\t\t\tif *verbose {\n\t\t\t\t\tfmt.Println(file, sha)\n\t\t\t\t}\n\t\t\t\tcurrentFile, err = os.Create(cached)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif currentFile == nil {\n\t\t\t\treturn fmt.Errorf(\"No file to write to! Line: %s\", line)\n\t\t\t}\n\t\t\tcurrentFile.Write([]byte(line))\n\t\t\tif i != lastLine {\n\t\t\t\tcurrentFile.Write([]byte(\"\\n\"))\n\t\t\t}\n\t\t}\n\t\tif currentFile != nil {\n\t\t\tcurrentFile.Close()\n\t\t}\n\t\tif *verbose {\n\t\t\tfmt.Println(\"JS compiled in, \", time.Since(compilationStart))\n\t\t}\n\t}\n\n\t// Assemble asset file from compiled files\n\tvar outputFiles []string\n\tfor manifest := range files {\n\t\tcatList := make([]string, len(files[manifest]))\n\t\tfor i, file := range files[manifest] {\n\t\t\tcatFile := filepath.Join(cacheDir, shasums[file])\n\t\t\tportableCatFile := filepath.ToSlash(catFile)\n\t\t\tcatList[i] = portableCatFile\n\t\t}\n\t\tinputFiles := strings.Join(catList, \" \")\n\t\toutputFile := filepath.Join(*outdir, filepath.Base(manifest))\n\t\tif *digest != \"\" {\n\t\t\toutputFile = injectDigest(outputFile, *digest)\n\t\t}\n\t\tportableOutputFile := filepath.ToSlash(outputFile)\n\t\tcmd := fmt.Sprintf(\"cat %s > %s\", inputFiles, portableOutputFile)\n\t\tif *verbose {\n\t\t\tfmt.Println(cmd)\n\t\t}\n\t\tif _, err := exec.Command(shellForCommands, \"-c\", cmd).CombinedOutput(); err != nil {\n\t\t\treturn err\n\t\t}\n\t\toutputFiles = append(outputFiles, outputFile)\n\t}\n\tif *verbose {\n\t\tfmt.Println(\"Output files:\", outputFiles)\n\t}\n\n\t// Inject digests into output filenames, if no digest is given\n\tif *generateDigest {\n\t\t// Shasum the output files\n\t\toutputDigests := make(map[string]string)\n\t\tshasum(strings.Join(outputFiles, \" \"), &outputDigests)\n\n\t\t// Rename files to include the shasum\n\t\tfor outputFile, sha1 := range outputDigests {\n\t\t\trenamedFile := injectDigest(outputFile, sha1)\n\t\t\tcmd := fmt.Sprintf(\"mv %s %s\", outputFile, renamedFile)\n\t\t\tif *verbose {\n\t\t\t\tfmt.Println(cmd)\n\t\t\t}\n\t\t\tif _, err := exec.Command(shellForCommands, \"-c\", cmd).CombinedOutput(); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "3d9486d15d659f22135c15a815181d95", "score": "0.5241991", "text": "func (c *PhaseOrderedCompiler) Compile(desiredState DesiredState) (Plan, error) {\n\tphases, err := buildPhases(desiredState)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &PhaseOrderedProgram{\n\t\tphases: phases,\n\t}, nil\n}", "title": "" }, { "docid": "c80a47d874b28b0b30304d5b56447cf1", "score": "0.52261734", "text": "func T01_CrossCompile() {\n\tcmd := quote.Cmd(`\n\t\tcd cicdtools\n\t\tset GOARCH=amd64\n\t\tset GOOS=linux\n\t\tmage -compile cicdbuilder\n\t`, \"&&\")\n\tshellkit.Execute(\"cmd\", \"/c\", cmd)\n}", "title": "" }, { "docid": "eb3f9ceb3fad638389689a77053ec0e9", "score": "0.5212315", "text": "func (self *GoxcAgentCompiler) Compile(sourceDir string, destDir string) error {\n\n\tbuildAgentStr := fmt.Sprintf(\n\t\t`go run %v -tasks-=go-vet,go-test,archive,rmbin -d %v -os=\"%v\" -arch=\"%v\"`,\n\t\tgoxc, destDir, AgentOSTargets, AgentArchTargets)\n\n\tbuildAgentCmd := &command.LocalCommand{\n\t\tCmdString: buildAgentStr,\n\t\tStdout: ioutil.Discard,\n\t\tStderr: ioutil.Discard,\n\t\tWorkingDirectory: sourceDir,\n\t}\n\n\t// build the agent\n\tif err := buildAgentCmd.Run(); err != nil {\n\t\treturn fmt.Errorf(\"error building agent: %v\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "2bb35f1e7337885c6ae776a7582ba647", "score": "0.52068514", "text": "func CompilePath(path string) {\n\tinFile, e := os.Open(path)\n\tif e != nil {\n\t\tlog.Fatal(e)\n\t}\n\tdefer inFile.Close()\n\toutName := strings.TrimSuffix(path, filepath.Ext(path)) + \".vm\"\n\toutFile, e := os.Create(outName)\n\tif e != nil {\n\t\tlog.Fatal(e)\n\t}\n\tdefer outFile.Close()\n\tcr := newCompiler(bufio.NewReader(inFile), outFile)\n\tcr.Compile()\n}", "title": "" }, { "docid": "1cf7bbd0cec943a24533da9d59194567", "score": "0.51865697", "text": "func Compile(name string, input io.Reader, emitAst bool, emitAstTypes bool, maxRegexpLength int, maxRecursionDepth int) (*code.Object, error) { // TODO this is a prime candidate for Options pattern. See https://github.com/google/mtail/pull/474#discussion_r598044460\n\tname = filepath.Base(name)\n\n\tast, err := parser.Parse(name, input)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif emitAst {\n\t\ts := parser.Sexp{}\n\t\tglog.Infof(\"%s AST:\\n%s\", name, s.Dump(ast))\n\t}\n\n\tast, err = checker.Check(ast, maxRegexpLength, maxRecursionDepth)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif emitAstTypes {\n\t\ts := parser.Sexp{}\n\t\ts.EmitTypes = true\n\t\tglog.Infof(\"%s AST with Type Annotation:\\n%s\", name, s.Dump(ast))\n\t}\n\n\tobj, err := codegen.CodeGen(name, ast)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn obj, nil\n}", "title": "" }, { "docid": "96a234a3277f6400b64c33a54d3637ad", "score": "0.51841986", "text": "func (self *Compiler) Compile(file string) (output string, err error) {\n\toutput = path.Join(os.TempDir(), fmt.Sprintf(\"%s.gosafe\", self.shorten(file)))\n\terr = self.CompileTo(file, output)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn output, nil\n}", "title": "" }, { "docid": "7c47872f944929f883745681c6909fa2", "score": "0.5177774", "text": "func Compile(envModel *models.Env) error {\n\t// by acquiring a local lock we are only allowing\n\t// one build to happen at a time\n\tlocker.LocalLock()\n\tdefer locker.LocalUnlock()\n\n\t// init docker client and env mounts\n\tif err := env.Setup(envModel); err != nil {\n\t\treturn util.ErrorAppend(err, \"failed to init docker client\")\n\t}\n\n\t// build code\n\tif err := code.Compile(envModel); err != nil {\n\t\treturn util.ErrorAppend(err, \"failed to compile the code\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "785bee5b417b0d6112c7a98463ed9041", "score": "0.5169594", "text": "func CompileFile(t *testing.T, sender util.Uint160, srcPath string, configPath string) *Contract {\n\tif c, ok := contracts[srcPath]; ok {\n\t\treturn c\n\t}\n\n\t// nef.NewFile() cares about version a lot.\n\tconfig.Version = \"neotest\"\n\n\tne, di, err := compiler.CompileWithDebugInfo(srcPath, nil)\n\trequire.NoError(t, err)\n\n\tconf, err := smartcontract.ParseContractConfig(configPath)\n\trequire.NoError(t, err)\n\n\to := &compiler.Options{}\n\to.Name = conf.Name\n\to.ContractEvents = conf.Events\n\to.ContractSupportedStandards = conf.SupportedStandards\n\to.Permissions = make([]manifest.Permission, len(conf.Permissions))\n\tfor i := range conf.Permissions {\n\t\to.Permissions[i] = manifest.Permission(conf.Permissions[i])\n\t}\n\to.SafeMethods = conf.SafeMethods\n\tm, err := compiler.CreateManifest(di, o)\n\trequire.NoError(t, err)\n\n\tc := &Contract{\n\t\tHash: state.CreateContractHash(sender, ne.Checksum, m.Name),\n\t\tNEF: ne,\n\t\tManifest: m,\n\t}\n\tcontracts[srcPath] = c\n\treturn c\n}", "title": "" }, { "docid": "407191bfed3bc6b6fe3e79934b479866", "score": "0.5160055", "text": "func (ctx *Context) Compile(pkg string, preArgs ...string) string {\n\tctx.test.Helper()\n\n\tvar binName string\n\tif pkg == \"\" {\n\t\tdir, _ := os.Getwd()\n\t\tbinName = path.Base(dir)\n\t} else {\n\t\tbinName = path.Base(pkg)\n\t}\n\n\texe := ctx.File(\"build\", binName+\".exe\")\n\n\targs := append([]string{\"build\"}, preArgs...)\n\tif raceEnabled {\n\t\targs = append(args, \"-race\")\n\t}\n\targs = append(args, \"-tags=unittest\")\n\targs = append(args, \"-o\", exe, pkg)\n\n\t/* #nosec G204 */ // This package is only used for test\n\tcmd := exec.Command(\"go\", args...)\n\tctx.test.Log(\"exec:\", cmd.Args)\n\n\tout, err := cmd.CombinedOutput()\n\tif err != nil {\n\t\tctx.test.Error(string(out))\n\t\tctx.test.Fatal(err)\n\t}\n\n\treturn exe\n}", "title": "" }, { "docid": "4cef7b97460e1eb815360d563a07654b", "score": "0.51575774", "text": "func compile(args []string) error {\n\t// Process command line arguments.\n\tvar stdImportcfgPath, packagePath, outPath string\n\tvar archives []archive\n\tfs := flag.NewFlagSet(\"compile\", flag.ExitOnError)\n\tfs.StringVar(&stdImportcfgPath, \"stdimportcfg\", \"\", \"path to importcfg for the standard library\")\n\tfs.Var(archiveFlag{&archives}, \"arc\", \"information about dependencies, formatted as packagepath=file (may be repeated)\")\n\tfs.StringVar(&packagePath, \"p\", \"\", \"package path for the package being compiled\")\n\tfs.StringVar(&outPath, \"o\", \"\", \"path to archive file the compiler should produce\")\n\tfs.Parse(args)\n\tsrcPaths := fs.Args()\n\n\t// Extract metadata from source files and filter out sources using\n\t// build constraints.\n\tsrcs := make([]sourceInfo, 0, len(srcPaths))\n\tfilteredSrcPaths := make([]string, 0, len(srcPaths))\n\tbctx := &build.Default\n\tfor _, srcPath := range srcPaths {\n\t\tif src, err := loadSourceInfo(bctx, srcPath); err != nil {\n\t\t\treturn err\n\t\t} else if src.match {\n\t\t\tsrcs = append(srcs, src)\n\t\t\tfilteredSrcPaths = append(filteredSrcPaths, srcPath)\n\t\t}\n\t}\n\n\t// Build an importcfg file that maps this package's imports to archive files\n\t// from the standard library or direct dependencies.\n\tstdArchiveMap, err := readImportcfg(stdImportcfgPath)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdirectArchiveMap := make(map[string]string)\n\tfor _, arc := range archives {\n\t\tdirectArchiveMap[arc.packagePath] = arc.filePath\n\t}\n\n\tarchiveMap := make(map[string]string)\n\tfor _, src := range srcs {\n\t\tfor _, imp := range src.imports {\n\t\t\tswitch {\n\t\t\tcase imp == \"unsafe\":\n\t\t\t\tcontinue\n\n\t\t\tcase imp == \"C\":\n\t\t\t\treturn fmt.Errorf(\"%s: cgo not supported\", src.fileName)\n\n\t\t\tcase stdArchiveMap[imp] != \"\":\n\t\t\t\tarchiveMap[imp] = stdArchiveMap[imp]\n\n\t\t\tcase directArchiveMap[imp] != \"\":\n\t\t\t\tarchiveMap[imp] = directArchiveMap[imp]\n\n\t\t\tdefault:\n\t\t\t\treturn fmt.Errorf(\"%s: import %q is not provided by any direct dependency\", src.fileName, imp)\n\t\t\t}\n\t\t}\n\t}\n\timportcfgPath, err := writeTempImportcfg(archiveMap)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer os.Remove(importcfgPath)\n\n\t// Invoke the compiler.\n\treturn runCompiler(packagePath, importcfgPath, filteredSrcPaths, outPath)\n}", "title": "" }, { "docid": "2b2d08ee6aeea2f36bc4dde0751f53c2", "score": "0.5096762", "text": "func (v *VM) Compile(s string) (Expr, error) {\n\tlex := &Lexer{new(scanner.Scanner), nil}\n\tlex.s.Init(strings.NewReader(s))\n\tif yyParse(lex) != 0 {\n\t\treturn nil, fmt.Errorf(\"syntax error: %s\", s)\n\t}\n\treturn lex.e, nil\n}", "title": "" }, { "docid": "640562db5d4fc209ba2fa6fe3bd597d1", "score": "0.5077338", "text": "func Compile(fileList []string, notice string) []byte {\n combinedInput := []byte{}\n for _, file := range fileList {\n input, _ := ioutil.ReadFile(file)\n combinedInput = append(combinedInput, input...)\n }\n\n html := blackfriday.Run(combinedInput)\n return append([]byte(notice), html...)\n}", "title": "" }, { "docid": "43ed76910ac4604dc5bbc1c1ac7745be", "score": "0.50416744", "text": "func (q *Query) Compile() string {\n var sqlStr string\n\n switch q.queryType {\n case SELECT:\n q.SelectCompile()\n case INSERT:\n q.InsertCompile()\n case UPDATE:\n q.UpdateCompile()\n case DELETE:\n q.DeleteCompile()\n default:\n }\n\n // Import the SQL locally\n q.sqlStr = strings.TrimSpace(q.sqlStr)\n sqlStr = q.sqlStr\n\n if q.parameters != nil {\n // Quote all of the values\n values := make(map[string]string, len(q.parameters))\n for k, v := range q.parameters {\n // 如果前面没有:,前面加 :,用于替换\n if k[0:1] != \":\" {\n k = \":\" + k\n }\n values[k] = q.Quote(v)\n }\n // Replace the values in the SQL\n sqlStr = Strtr(sqlStr, values)\n }\n\n // 不需要了, 一个Query()一个对象,db.query = &Query{} 以后之前那个就会被回收掉了\n //q.Reset()\n\n return sqlStr\n}", "title": "" }, { "docid": "31c8b9786e786b91ea5d310211c2ecd3", "score": "0.50400525", "text": "func (c *Compiler) Compile() (*CompiledContract, error) {\n\tmainContractName := basenameNoExt(c.Filename)\n\n\tcontracts, err := c.CompileAll()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tcontract, ok := contracts[mainContractName]\n\tif !ok {\n\t\treturn nil, errors.Errorf(\"cannot find contract: %s\", mainContractName)\n\t}\n\n\treturn &contract, nil\n}", "title": "" }, { "docid": "aa9e9959980b8f9b3c370575925881ba", "score": "0.50267065", "text": "func (c *Context) Build(buildDir string) {\n\n\tsrc, err := lexer.NewSourcefile(c.Input)\n\tif err != nil {\n\t\tlog.Fatal(\"Unable to construct a source file.\\n\")\n\t}\n\terr = src.ResolveFile(c.Input)\n\tsrc.Preprocess()\n\tif err != nil {\n\t\tlog.Fatal(\"Unable to read file %s into sourcefile structure: %s\\n\", c.Input, err)\n\t}\n\tpath := strings.Split(c.Input, \"/\")\n\tscope := ast.NewScope()\n\n\tnodeNamespaces := make(map[string]*[]ast.Node, 0)\n\trootPackage := ast.NewPackage(path[len(path)-1], src, scope, nodeNamespaces)\n\tpkgs := make([]*ast.Package, 0)\n\tprimaryTree := make([]ast.Node, 0)\n\n\truntime := ast.GetRuntime(scope, nodeNamespaces)\n\n\trootPackage.Inject(runtime)\n\n\tfor pkg := range rootPackage.Parse() {\n\t\tlog.Debug(\"Added package %s\\n\", pkg.Name)\n\t\tpkgs = append(pkgs, pkg)\n\t}\n\n\t// Construct a linker object\n\ttarget := ast.BinaryTarget\n\tif *emitASM {\n\t\ttarget = ast.ASMTarget\n\t}\n\n\tlinker := ast.NewLinker(*buildOutput)\n\tlinker.SetTarget(target)\n\tlinker.SetBuildDir(buildDir)\n\tlinker.SetOutput(c.Output)\n\tlinker.SetOptimize(*optimize)\n\n\tmodule := ir.NewModule()\n\n\t// Loop over the compilers and generate to .ll files\n\tlog.Timed(\"llvm emission\", func() {\n\t\tfor c := range rootPackage.Compile(module, c.TargetTripple) {\n\t\t\tprimaryTree = append(primaryTree, c.Nodes...)\n\t\t\tif !*disableEmission {\n\t\t\t\tlog.Debug(\"Compiled pkg %s with namespace %s\\n\", c.Name, c.NamespaceName)\n\t\t\t\tfor _, link := range c.CLinkages {\n\t\t\t\t\tlog.Debug(\"Added c linkage %s\\n\", link)\n\t\t\t\t\tlinker.AddObject(link)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t})\n\n\t// for _, fn := range module.Funcs {\n\t// \tfmt.Println(fn.Name)\n\t// }\n\n\tif *dumpScopeTree {\n\t\tfmt.Println(scope)\n\t}\n\n\tfor _, n := range primaryTree {\n\t\tinfo.AddNode(n)\n\t}\n\n\tif *disableEmission {\n\t\tif *dumpResult {\n\t\t\tfmt.Println(rootPackage)\n\t\t}\n\t\treturn\n\t}\n\n\tlinker.SetDump(*dumpResult)\n\n\tlinker.AddObject(rootPackage.Emit(buildDir))\n\tlog.Timed(\"Linking\", func() {\n\t\tlinker.Run()\n\t})\n}", "title": "" }, { "docid": "61dde0c869fcbbf6af8dc3677a92ea28", "score": "0.50246763", "text": "func compileProxy() (string, error) {\n\t// get path of the cmd pkg\n\t_, f, _, ok := runtime.Caller(0)\n\tif !ok {\n\t\treturn \"\", fmt.Errorf(\"failed to find cmd pkg\")\n\t}\n\tprojRoot := path.Dir(path.Dir(f)) // cd ../..\n\tpkgPath := path.Join(projRoot, \"cmd\", \"cloud_sql_proxy\")\n\t// compile the proxy into a tmp directory\n\ttmp, err := ioutil.TempDir(\"\", \"\")\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"failed to create temp dir: %s\", err)\n\t}\n\tb := path.Join(tmp, \"cloud_sql_proxy\")\n\tcmd := exec.Command(\"go\", \"build\", \"-o\", b, pkgPath)\n\tout, err := cmd.CombinedOutput()\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"failed to run 'go build': %w \\n %s\", err, out)\n\t}\n\treturn b, nil\n}", "title": "" }, { "docid": "d6ce73b7042b39e66524f003041312ce", "score": "0.50088143", "text": "func (l *Lexer) Compile() error {\n\treturn l.CompileDFA()\n}", "title": "" }, { "docid": "635a292abb6f7b86758b7196c8da2202", "score": "0.50016606", "text": "func handleCompile(w http.ResponseWriter, r *http.Request) {\n\tvar source []byte\n\tif strings.HasPrefix(r.Header.Get(\"Content-Type\"), \"text/plain\") {\n\t\t// Read the source from the POST request.\n\t\tvar err error\n\t\tsource, err = ioutil.ReadAll(r.Body)\n\t\tif err != nil {\n\t\t\tw.WriteHeader(http.StatusUnprocessableEntity)\n\t\t\treturn\n\t\t}\n\t} else {\n\t\t// Read the source from a form parameter.\n\t\tsource = []byte(r.FormValue(\"code\"))\n\t}\n\t// Hash the source code, used for the build cache.\n\tsourceHashRaw := sha256.Sum256([]byte(source))\n\tsourceHash := hex.EncodeToString(sourceHashRaw[:])\n\n\tformat := r.FormValue(\"format\")\n\tswitch format {\n\tcase \"\", \"wasm\":\n\t\t// Run code in the browser.\n\t\tformat = \"wasm\"\n\tcase \"elf\", \"hex\":\n\t\t// Build a firmware that can be flashed directly to a development board.\n\tdefault:\n\t\t// Unrecognized format. Disallow to be sure (might introduce security\n\t\t// issues otherwise).\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t// Attempt to serve directly from the directory with cached files.\n\tfilename := filepath.Join(cacheDir, \"build-\"+r.FormValue(\"target\")+\"-\"+sourceHash+\".\"+format)\n\tfp, err := os.Open(filename)\n\tif err == nil {\n\t\t// File was already cached! Serve it directly.\n\t\tdefer fp.Close()\n\t\tsendCompiledResult(w, fp, format)\n\t\treturn\n\t}\n\n\t// Create a new compiler job, which will be executed in a single goroutine\n\t// (to avoid overloading the system).\n\tjob := compilerJob{\n\t\tSource: source,\n\t\tSourceHash: sourceHash,\n\t\tTarget: r.FormValue(\"target\"),\n\t\tFormat: format,\n\t\tContext: r.Context(),\n\t\tResultFile: make(chan string),\n\t\tResultErrors: make(chan *bytes.Buffer),\n\t}\n\t// Send the job for execution.\n\tcompilerChan <- job\n\t// See how well that went, when it finishes.\n\tselect {\n\tcase filename := <-job.ResultFile:\n\t\t// Succesful compilation.\n\t\tfp, err := os.Open(filename)\n\t\tif err != nil {\n\t\t\tlog.Println(\"could not open compiled file:\", err)\n\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\t\tdefer fp.Close()\n\t\tsendCompiledResult(w, fp, format)\n\tcase buf := <-job.ResultErrors:\n\t\t// Failed compilation.\n\t\tio.Copy(w, buf)\n\t}\n}", "title": "" }, { "docid": "3a259897da69f2540098ea4cc062a50f", "score": "0.49730417", "text": "func (a *Utils) ScriptCompile(ctx context.Context, code string) (*UtilsScriptCompile, *Response, error) {\n\treturn a.ScriptCompileCode(ctx, code, false)\n}", "title": "" }, { "docid": "5825a517c659fab30f08ef9ebad1f85f", "score": "0.49658403", "text": "func CompileString(source string, opt *Options) (string, error) {\n\t// TODO: implement\n\treturn \"\", nil\n}", "title": "" }, { "docid": "eb7731592c9d29507ab0d8e0ba2744fa", "score": "0.4943292", "text": "func (p Pattern) Compile(lang string) glob.Glob {\n\trawglob := strings.Replace(string(p), \"%l\", lang, 1)\n\treturn glob.MustCompile(rawglob, os.PathSeparator)\n}", "title": "" }, { "docid": "c40b2cb16ecb2a52183d38c0da998fd7", "score": "0.49303713", "text": "func Compile(name string, expr interface{}) (CodeObject, LispError) {\n\tcompiler := NewCompiler()\n\terr := compiler.Compile(expr)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn compiler.Assemble(name, theEmptyList), nil\n}", "title": "" }, { "docid": "a584535605f6ab6a06b2a913fe0d395d", "score": "0.4930266", "text": "func buildObjectFile(compilerExecName string, pr ParserResult, srcFile string, objFile string) {\n args := pr.CompileArgs[:]\n args = append(args, srcFile, \"-c\", \"-o\", objFile)\n if execCmd(compilerExecName, args, \"\") {\n log.Fatal(\"Failed to build object file for \", srcFile)\n }\n}", "title": "" }, { "docid": "fb9c8aeec662090bf7eb602d3e301ad9", "score": "0.4925153", "text": "func CompileString(s string) (*ast.File, error) {\n\treturn Compile(strings.NewReader(s))\n}", "title": "" }, { "docid": "c9cb373d06125526df4b6a23ea3b0049", "score": "0.49220085", "text": "func compile(includepath *string, targetpath string, extra ...string) {\n\tvar libPath string\n\tif *testMode {\n\t\ttargetpath = targetpath + \"/tests\"\n\t\tlibPath = strings.Replace(targetpath, \"/tests\", \"/lib\", 1)\n\t} else {\n\t\ttargetpath = targetpath + \"/src\"\n\t\tlibPath = strings.Replace(targetpath, \"/src\", \"/lib\", 1)\n\t}\n\tglobs := []string{\n\t\t\"*.cpp\",\n\t\t\"*.cxx\",\n\t\t\"*.cc\",\n\t}\n\ttargets, err := findAll(targetpath, globs)\n\tif err != nil {\n\t\tlog.Fatalf(\"could not find target files: %+v\", err)\n\t}\n\tbinaryPath := strings.Replace(targetpath, \"/src\", \"/bin\", 1) + \"/\"\n\tbinaryNameFQ := binaryPath + *name\n\n\toptLevel := \"0\"\n\tif *optimize {\n\t\toptLevel = \"3\"\n\t}\n\n\tcArgs := []string{\n\t\t\"-std=\" + *std,\n\t\t\"-Wall\",\n\t\t\"-O\" + optLevel,\n\t\t\"-o\" + binaryNameFQ,\n\t}\n\tcArgs = append(cArgs, targets...)\n\tcArgs = append(cArgs, extra...)\n\n\tif includepath == nil {\n\t\tincludepath = &targetpath\n\t} else {\n\t\tif *includepath == \"\" {\n\t\t\tincludepath = &targetpath\n\t\t}\n\t\tcArgs = append(cArgs, \"-I\"+*includepath)\n\t\tlog.Printf(\"checking for shared objects in %s...\", libPath)\n\t\tlibs, err := dirIsEmpty(libPath)\n\t\tif err != nil && err != io.EOF {\n\t\t\tlog.Fatalf(\"error reading lib dir: %+v\", err)\n\t\t}\n\t\tif libs {\n\t\t\tlink := \"-L\" + libPath\n\t\t\tcArgs = append(cArgs, link)\n\t\t\tlibs, err := linkLibs(libPath)\n\t\t\tif err != nil {\n\t\t\t\tlog.Fatalf(\"error reading shared libraries: %+v\", err)\n\t\t\t}\n\t\t\tfor _, l := range libs {\n\t\t\t\tif strings.HasSuffix(l, \".so\") {\n\t\t\t\t\tstriplib := strings.Replace(l, \"lib\", \"\", 1)\n\t\t\t\t\ttrimmedLib := strings.Replace(striplib, \".so\", \"\", 1)\n\t\t\t\t\tlog.Printf(\"linking shared object: %s\", trimmedLib)\n\t\t\t\t\tcArgs = append(cArgs, \"-l\"+trimmedLib)\n\t\t\t\t}\n\t\t\t\tif runtime.GOOS == \"darwin\" {\n\t\t\t\t\tlog.Println(\"compiling on macos, so rpath linking will be done after compilation\")\n\t\t\t\t} else {\n\t\t\t\t\tcArgs = append(cArgs, \"-Wl,-rpath,\"+binaryPath)\n\t\t\t\t}\n\t\t\t}\n\t\t} else {\n\t\t\tlog.Println(\"none found\")\n\t\t}\n\t}\n\tout, err := wrap(*compiler, cArgs)\n\tif err != nil || *debug {\n\t\tfmt.Println(\"printing wrapped call for debugging:\")\n\t\tfmt.Println(\"═════════════════════════════════════\")\n\t\tfmt.Printf(\"\\n%s %s\", *compiler, strings.Join(cArgs, \" \"))\n\t\tfmt.Printf(\"\\n\\n\")\n\t\tfmt.Println(\"═════════════════════════════════════\")\n\t\tif err != nil {\n\t\t\tlog.Fatalf(\"reason: %+v, %v\", string(out), err)\n\t\t}\n\t}\n\tif len(out) == 0 {\n\t\tlog.Println(\"🎉 compilation succeeded with no errors\")\n\t\tif runtime.GOOS == \"darwin\" {\n\t\t\tlibs, err := dirIsEmpty(libPath)\n\t\t\tif err != nil && err != io.EOF {\n\t\t\t\tlog.Fatalf(\"error reading lib dir: %+v\", err)\n\t\t\t}\n\t\t\tif libs {\n\t\t\t\tlibs, err := linkLibs(libPath)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Fatalf(\"error reading shared libraries: %+v\", err)\n\t\t\t\t}\n\t\t\t\tfor _, l := range libs {\n\t\t\t\t\t// -id \"@loader_path/lib/libhello.so\" bin/example\n\t\t\t\t\trPathArgs := []string{\n\t\t\t\t\t\t\"-id\",\n\t\t\t\t\t\t\"\\\"@loader_path/lib/\" + l + \"\\\"\",\n\t\t\t\t\t\tbinaryNameFQ,\n\t\t\t\t\t}\n\t\t\t\t\tout, err := wrap(\n\t\t\t\t\t\t\"install_name_tool\",\n\t\t\t\t\t\trPathArgs,\n\t\t\t\t\t)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tlog.Printf(\"error with mac rpath tool: %v\", err)\n\t\t\t\t\t\tfmt.Printf(\"\\n%s %s\", \"install_name_tool\", strings.Join(rPathArgs, \" \"))\n\t\t\t\t\t\tfmt.Printf(\"\\n\\n\")\n\t\t\t\t\t\tlog.Println(string(out))\n\t\t\t\t\t}\n\t\t\t\t\tif len(out) == 0 {\n\t\t\t\t\t\tlog.Println(\"🎉 dynamic linking succeeded with no errors\")\n\t\t\t\t\t}\n\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t} else {\n\t\tlog.Print(string(out))\n\t}\n}", "title": "" }, { "docid": "f302578519cab46188f85ed1183598d7", "score": "0.49182335", "text": "func NewReactiveCode(info *Info, no string, w, e io.Writer) (*Code, func(), error) {\n\tdir, err := ioutil.TempDir(\"\", \"goyuki\")\n\tif err != nil {\n\t\treturn nil, nil, fmt.Errorf(\"can't create directory: %v\", err)\n\t}\n\tclearFunc := func() {\n\t\tos.RemoveAll(dir)\n\t}\n\n\text := Ext(info.RLang)\n\tlang, source := Lang[ext[1:]], ReactiveCode+ext\n\tlCmd := LangCmd{\n\t\tFile: source,\n\t\tExec: strings.Split(source, \".\")[0],\n\t}\n\n\tb, err := ioutil.ReadFile(no + \"/\" + source)\n\tif err != nil {\n\t\treturn nil, nil, fmt.Errorf(\"failed to read reactive file: %v\", err)\n\t}\n\n\tif ext[1:] == \"java\" {\n\t\tsource = className(b) + ext\n\t\tlCmd.File = source\n\t}\n\n\tif err := ioutil.WriteFile(dir+\"/\"+source, b, FPerm); err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tcode := &Code{\n\t\tLangCmd: &lCmd,\n\t\tLang: lang,\n\t\tInfo: info,\n\t\tDir: dir,\n\t}\n\n\tif err := code.Compile(os.Stdin, w, e); err != nil {\n\t\treturn nil, nil, err\n\t}\n\tif ext[1:] == \"java\" || ext[1:] == \"scala\" {\n\t\tlCmd.Class, err = classFile(dir, source, ext[1:])\n\t\tif err != nil {\n\t\t\treturn nil, nil, err\n\t\t}\n\t}\n\treturn code, clearFunc, nil\n}", "title": "" }, { "docid": "162be2e536b35b92f7d88f095a48ed74", "score": "0.490411", "text": "func Compile(cfg Config, tmpl string, baseTmplPaths []string, data map[string]interface{}) ([]byte, error) {\n\tvar err error\n\tt, err := GetTemplate(cfg, tmpl, baseTmplPaths)\n\tif err != nil {\n\t\treturn []byte(\"\"), err\n\t}\n\n\tvar tmplBody bytes.Buffer\n\tif err := t.Execute(&tmplBody, data); err != nil {\n\t\treturn []byte(\"\"), err\n\t}\n\treturn tmplBody.Bytes(), nil\n}", "title": "" }, { "docid": "5e97ba7c42720fbce5cc1470d71a0015", "score": "0.48940927", "text": "func (b *builder) gcc(p *Package, out string, flags []string, cfile string) error {\n\tcfile = mkAbs(p.Dir, cfile)\n\treturn b.run(p.Dir, p.ImportPath, b.gccCmd(p.Dir), flags, \"-o\", out, \"-c\", cfile)\n}", "title": "" }, { "docid": "f7abdaf2ffbc1e5f7905485ad8c483d9", "score": "0.48902658", "text": "func Compile(ctx *Context, pkg *build.Package, deps []Future) PkgFuture {\n\tvar gofiles []string\n\tgofiles = append(gofiles, pkg.GoFiles...)\n\tvar objs []ObjFuture\n\tif len(pkg.CgoFiles) > 0 {\n\t\tcgo, cgofiles := cgo(ctx, pkg, deps)\n\t\tdeps = append(deps, cgo[0])\n\t\tobjs = append(objs, cgo...)\n\t\tgofiles = append(gofiles, cgofiles...)\n\t}\n\tobjs = append(objs, Gc(ctx, pkg, deps, gofiles))\n\tfor _, sfile := range pkg.SFiles {\n\t\tobjs = append(objs, Asm(ctx, pkg, sfile))\n\t}\n\treturn Pack(ctx, pkg, objs)\n}", "title": "" }, { "docid": "4c05230155faf8cf7665488baa9897b2", "score": "0.48861307", "text": "func main() {\n var errno uint64;\n var i uint64;\n var j uint64;\n var k uint64;\n var singleChar byte;\n\n libgogo.GetArgv();\n\n ParseOption();\n\n if libgogo.Argc > 40 {\n libgogo.ExitError(\"Cannot compile more than 38 files at once\",1);\n }\n\n InitSymbolTable(); //Initialize symbol table\n InitFreeRegisters(); //Init registers for code generation\n\n ResetCode();\n\n for i=2; i < libgogo.Argc ; i= i+1 {\n curFileIndex = i-2;\n fileInfo[curFileIndex].filename = libgogo.Argv[i];\n fileInfo[curFileIndex].lineCounter = 1;\n fileInfo[curFileIndex].charCounter = 1;\n \n fileInfo[curFileIndex].fd = libgogo.FileOpen(libgogo.Argv[i], 0);\n if (fileInfo[curFileIndex].fd == 0) {\n GlobalError(\"Cannot open file.\");\n }\n }\n fileInfoLen = i-2;\n\n if (Compile == 0) || (Compile == 1) { // Compile == 0|1 => Parse/Compile\n for curFileIndex=0;curFileIndex<fileInfoLen;curFileIndex=curFileIndex+1 {\n i = libgogo.StringLength(fileInfo[curFileIndex].filename);\n if i > 2 { //Check for assembly files\n j = i - 2;\n k = i - 1;\n if (Compile == 1) && (fileInfo[curFileIndex].filename[j] == '.') && (fileInfo[curFileIndex].filename[k] == 's') { \n // Assembly file: compile if in compiler mode\n if curFileIndex == 0 {\n GlobalError(\"The first file in the list cannot be an assembly file\");\n }\n for singleChar = libgogo.GetChar(fileInfo[curFileIndex].fd); singleChar != 0; singleChar = libgogo.GetChar(fileInfo[curFileIndex].fd) { //Copy file to output character by character\n /* middot '·' is U+00C7 => UTF-8: C2B7*/\n if singleChar != 194 /*C2*/ {\n if singleChar == 183 /*B7*/ { //Prepend package name\n PrintCodeOutput(CurrentPackage); \n PrintCodeOutputChar(194);\n PrintCodeOutputChar(183);\n } else {\n PrintCodeOutputChar(singleChar);\n }\n }\n }\n } else {\n // Go file: parse and/or compile\n Parse();\n }\n } else { //Go file: parse and/or compile\n Parse();\n }\n }\n } else { // Compile==2 => Link\n Link();\n }\n\n for curFileIndex=0;curFileIndex<fileInfoLen;curFileIndex=curFileIndex+1 {\n errno = libgogo.FileClose(fileInfo[curFileIndex].fd);\n if errno != 0 {\n GlobalError(\"Cannot close file.\");\n }\n }\n\n PrintGlobalSymbolTable();\n \n if Compile == 1 {\n i = libgogo.GetAlignedObjectListSize(GlobalObjects); //Get required data segment size\n SetDataSegmentSize(i); //Set data segment size\n PrintFile(GlobalFunctions, GlobalTypes); //Print compiled output to file\n }\n}", "title": "" }, { "docid": "fbe59d0b348feb2977211797d9b83b55", "score": "0.48850256", "text": "func (pi PolicyInterpreter) Compile(paths ...string) error {\n\tfor _, path := range paths {\n\t\tlogger.Trace.Println(\"Parsing policy file \", path)\n\t\tif err := pi.compile(path); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "172102eb785cf53cedb3c5f3118965be", "score": "0.4869527", "text": "func compileShader(source string, shaderType uint32) (uint32, error) {\n\tshader := gl.CreateShader(shaderType)\n\n\tcsources, free := gl.Strs(source)\n\tgl.ShaderSource(shader, 1, csources, nil)\n\tgl.CompileShader(shader)\n\tfree()\n\n\terr := getGLError(shader, gl.COMPILE_STATUS)\n\tif err != nil {\n\t\tgl.DeleteShader(shader)\n\t\treturn 0, fmt.Errorf(\"failed to compile\\n'%v'\\n%v\", source, err)\n\t}\n\n\treturn shader, nil\n}", "title": "" }, { "docid": "18822eb8abeac2f1d51a10dfeb8fbe9f", "score": "0.48692602", "text": "func MustCompile(stackTrace bool, args ...string) []byte {\n\treturn MustShell(stackTrace, \"ccgo\", args...)\n}", "title": "" }, { "docid": "ef4b020e69febadd4daeeadf98f5bc79", "score": "0.48659554", "text": "func (scr *Script) CompileFile(ctx *context.T, filename string) error {\n\tstmts, err := parseFile(filename)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn scr.compile(stmts)\n}", "title": "" }, { "docid": "20f62f49b26b9927fa9fef26497b1e81", "score": "0.48470655", "text": "func rungcc1(ctx *Context, dir, ofile, cfile string) Target {\n\tcmd := exec.Command(gcc(),\n\t\t\"-fPIC\", \"-m64\", \"-pthread\", \"-fmessage-length=0\",\n\t\t\"-I\", dir,\n\t\t\"-I\", filepath.Dir(ofile),\n\t\t\"-g\", \"-O2\",\n\t\t\"-o\", ofile,\n\t\t\"-c\", cfile,\n\t)\n\tcmd.Dir = dir\n\treturn ctx.Run(cmd)\n\t// return ctx.run(dir, nil, gcc(), args...)\n}", "title": "" }, { "docid": "bd59a7b92e1fa2abc9eeeb73a18c71ac", "score": "0.48372164", "text": "func CompileAll(mroPaths []string, checkSrcPath bool) (int, []*syntax.Ast, error) {\n\tfileNames := make([]string, 0, len(mroPaths)*3)\n\tfor _, mroPath := range mroPaths {\n\t\tfpaths, _ := filepath.Glob(mroPath + \"/[^_]*.mro\")\n\t\tfileNames = append(fileNames, fpaths...)\n\t}\n\tasts := make([]*syntax.Ast, 0, len(fileNames))\n\tvar parser syntax.Parser\n\tfor _, fpath := range fileNames {\n\t\tif _, _, ast, err := parser.Compile(fpath, mroPaths, checkSrcPath); err != nil {\n\t\t\treturn 0, nil, err\n\t\t} else {\n\t\t\tasts = append(asts, ast)\n\t\t}\n\t}\n\treturn len(fileNames), asts, nil\n}", "title": "" }, { "docid": "64d57f3ceb301ffe7627483d9c823a37", "score": "0.48361385", "text": "func (self *Compiler) CompileTo(file, output string) error {\n\tfstat, err := os.Stat(file)\n\tif err != nil {\n\t\t// Problem stating file\n\t\treturn err\n\t}\n\tif compileTime, ok := self.okCompiled[file]; ok && compileTime.After(fstat.ModTime()) {\n\t\t// Was compiled before, and after the file was last changed\n\t\treturn nil\n\t}\n\terr = self.Check(file)\n\tif err != nil {\n\t\treturn err\n\t}\n\tvar stderr bytes.Buffer\n\tvar stdout bytes.Buffer\n\targs := []string{\"build\", \"-ldflags\", fmt.Sprint(\"-o \", output), file}\n\tcmd := exec.Command(\"go\", args...)\n\tcmd.Stderr = &stderr\n\tcmd.Stdout = &stdout\n\terr = cmd.Run()\n\tif len((stderr).Bytes()) > 0 {\n\t\treturn Error(string(stderr.Bytes()))\n\t}\n\tif len((stdout).Bytes()) > 0 {\n\t\treturn Error(string(stdout.Bytes()))\n\t}\n\tif err != nil {\n\t\treturn err\n\t}\n\tself.okCompiled[file] = time.Now()\n\treturn nil\n}", "title": "" }, { "docid": "66447258c0870e3950850af429650390", "score": "0.483007", "text": "func (scr *Script) CompileBytes(src []byte) error {\n\tstmts, err := parseBytes(src)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn scr.compile(stmts)\n}", "title": "" }, { "docid": "962fb0ced055d576d3c1345ce811db66", "score": "0.48186728", "text": "func CompileString(name string, prog string) (CodeObject, LispError) {\n\t// Thus begins the \"inject\" operation in CESK, Byte Code Edition (TM).\n\tvar err LispError\n\tparser := NewParser()\n\tparsed, err := parser.Parse(prog)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t// By ensuring that the program is wrapped inside a (begin ...) we\n\t// create what constitutes the \"halt\" continuation, as well as the\n\t// \"step\" function.\n\texpanded, err := parser.Expand(wrapWithBegin(parsed))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn Compile(name, expanded)\n}", "title": "" }, { "docid": "211cdc72ca69280040354f494c019da2", "score": "0.48114693", "text": "func (e *Expr) Compile() error {\n\tif e.compiled {\n\t\treturn nil\n\t}\n\ttoks, err := tokenizeExpr(e.raw)\n\tif err != nil {\n\t\treturn err\n\t}\n\trpn, err := shuntingYard(toks)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\te.rpn = rpn\n\te.compiled = true\n\n\treturn nil\n}", "title": "" }, { "docid": "7b69b5a9ab97c26700a4b1532d074c70", "score": "0.48025748", "text": "func (c *Compile) Compile(ctx context.Context, pn *plan.Plan, u any, fill func(any, *batch.Batch) error) (err error) {\n\t_, task := gotrace.NewTask(context.TODO(), \"pipeline.Compile\")\n\tdefer task.End()\n\tdefer func() {\n\t\tif e := recover(); e != nil {\n\t\t\terr = moerr.ConvertPanicError(ctx, e)\n\t\t}\n\t}()\n\n\t// with values\n\tc.proc.Ctx = perfcounter.WithCounterSet(c.proc.Ctx, &c.counterSet)\n\tc.ctx = c.proc.Ctx\n\n\t// session info and callback function to write back query result.\n\t// XXX u is really a bad name, I'm not sure if `session` or `user` will be more suitable.\n\tc.u = u\n\tc.fill = fill\n\n\tc.pn = pn\n\t// get execute related information\n\t// about ap or tp, what and how many compute resource we can use.\n\tc.info = plan2.GetExecTypeFromPlan(pn)\n\tif pn.IsPrepare {\n\t\tc.info.Typ = plan2.ExecTypeTP\n\t}\n\n\t// Compile may exec some function that need engine.Engine.\n\tc.proc.Ctx = context.WithValue(c.proc.Ctx, defines.EngineKey{}, c.e)\n\t// generate logic pipeline for query.\n\tc.scope, err = c.compileScope(ctx, pn)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\tfor _, s := range c.scope {\n\t\tif len(s.NodeInfo.Addr) == 0 {\n\t\t\ts.NodeInfo.Addr = c.addr\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0d76151844955de713837e5537e49758", "score": "0.476099", "text": "func (b *builder) cc(p *Package, objdir, ofile, cfile string) error {\n\tinc := filepath.Join(b.goroot, \"pkg\", fmt.Sprintf(\"%s_%s\", b.goos, b.goarch))\n\tcfile = mkAbs(p.Dir, cfile)\n\treturn b.run(p.Dir, p.ImportPath, b.arch+\"c\", \"-FVw\",\n\t\t\"-I\", objdir, \"-I\", inc, \"-o\", ofile,\n\t\t\"-DGOOS_\"+b.goos, \"-DGOARCH_\"+b.goarch, cfile)\n}", "title": "" }, { "docid": "9e46a4987d645634dbe2bf0220199e37", "score": "0.47593468", "text": "func CompileC(ctx *testcontext.Context, t *testing.T, opts CompileCOptions) string {\n\tt.Helper()\n\n\texe := ctx.File(\"build\", opts.Dest+\".exe\")\n\n\targs := []string{}\n\tif !opts.NoWarn {\n\t\targs = append(args, \"-Wall\")\n\t\targs = append(args, \"-Wextra\")\n\t\targs = append(args, \"-Wpedantic\")\n\t\targs = append(args, \"-Werror\")\n\t}\n\targs = append(args, \"-ggdb\")\n\targs = append(args, \"-o\", exe)\n\n\t// include headers\n\tfor _, inc := range opts.Includes {\n\t\tif inc.Header != \"\" {\n\t\t\targs = append(args, \"-I\", filepath.Dir(inc.Header))\n\t\t}\n\t}\n\n\t// include sources\n\targs = append(args, opts.Sources...)\n\n\t// include libraries\n\tfor _, inc := range opts.Includes {\n\t\tif inc.Library != \"\" {\n\t\t\tif inc.Standard {\n\t\t\t\targs = append(args,\n\t\t\t\t\t\"-l\"+inc.Library,\n\t\t\t\t)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif runtime.GOOS == \"windows\" {\n\t\t\t\targs = append(args,\n\t\t\t\t\t\"-L\"+filepath.Dir(inc.Library),\n\t\t\t\t\t\"-l:\"+filepath.Base(inc.Library),\n\t\t\t\t)\n\t\t\t} else {\n\t\t\t\targs = append(args, inc.Library)\n\t\t\t}\n\t\t}\n\t}\n\n\t/* #nosec G204 */ // This package is used for testing and the parameter's value are controlled by the above logic\n\tcmd := exec.Command(\"gcc\", args...)\n\tt.Log(\"exec:\", cmd.Args)\n\n\tout, err := cmd.CombinedOutput()\n\tif err != nil {\n\t\tt.Error(string(out))\n\t\tt.Fatal(err)\n\t}\n\tt.Log(string(out))\n\n\treturn exe\n}", "title": "" }, { "docid": "ee4b0d1bf92e0339e2e27ef2711221c7", "score": "0.47454575", "text": "func compileProgram(glctx gl.Context, vSrc, fSrc string) (gl.Program, error) {\n\tprogram := glctx.CreateProgram()\n\tif program.Value == 0 {\n\t\treturn gl.Program{}, fmt.Errorf(\"gldriver: no programs available\")\n\t}\n\n\tvertexShader, err := compileShader(glctx, gl.VERTEX_SHADER, vSrc)\n\tif err != nil {\n\t\treturn gl.Program{}, err\n\t}\n\tfragmentShader, err := compileShader(glctx, gl.FRAGMENT_SHADER, fSrc)\n\tif err != nil {\n\t\tglctx.DeleteShader(vertexShader)\n\t\treturn gl.Program{}, err\n\t}\n\n\tglctx.AttachShader(program, vertexShader)\n\tglctx.AttachShader(program, fragmentShader)\n\tglctx.LinkProgram(program)\n\n\t// Flag shaders for deletion when program is unlinked.\n\tglctx.DeleteShader(vertexShader)\n\tglctx.DeleteShader(fragmentShader)\n\n\tif glctx.GetProgrami(program, gl.LINK_STATUS) == 0 {\n\t\tdefer glctx.DeleteProgram(program)\n\t\treturn gl.Program{}, fmt.Errorf(\"gldriver: program compile: %s\", glctx.GetProgramInfoLog(program))\n\t}\n\treturn program, nil\n}", "title": "" }, { "docid": "049c5de9b1772a2c700a5423eb61ce03", "score": "0.47435218", "text": "func Compile(validateKeys bool, inputFilePaths []string, expectedKeyPath string, outputFilePath string) error {\n\tvar expectedKeys ExpectedKeys\n\tif validateKeys {\n\t\tdata, err := ioutil.ReadFile(expectedKeyPath)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\terr = yaml.Unmarshal(data, &expectedKeys)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\toutput, err := Generate(validateKeys, inputFilePaths, expectedKeys.Keys)\n\tif err != nil {\n\t\treturn err\n\t}\n\tbytes, err := yaml.Marshal(output)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn ioutil.WriteFile(outputFilePath, bytes, 0644)\n}", "title": "" }, { "docid": "80ea8410a478ee4196acafd1140da3c5", "score": "0.47412974", "text": "func compileShader(glctx gl.Context, shaderType gl.Enum, src string) (gl.Shader, error) {\n\tshader := glctx.CreateShader(shaderType)\n\tif shader.Value == 0 {\n\t\treturn gl.Shader{}, fmt.Errorf(\"gldriver: could not create shader (type %v)\", shaderType)\n\t}\n\tglctx.ShaderSource(shader, src)\n\tglctx.CompileShader(shader)\n\tif glctx.GetShaderi(shader, gl.COMPILE_STATUS) == 0 {\n\t\tdefer glctx.DeleteShader(shader)\n\t\treturn gl.Shader{}, fmt.Errorf(\"gldriver: shader compile: %s\", glctx.GetShaderInfoLog(shader))\n\t}\n\treturn shader, nil\n}", "title": "" }, { "docid": "95c63b68d63bb9a1bfbb12fdea36fa5a", "score": "0.4724484", "text": "func (xc *ExprCompiler) compile(x ast.Expr, callCtx bool) *Expr {\n\tswitch x := x.(type) {\n\t// Literals\n\tcase *ast.BasicLit:\n\t\treturn xc.compileBasicLit(x)\n\tcase *ast.CompositeLit:\n\t\treturn xc.compileCompositeLit(x, callCtx)\n\tcase *ast.FuncLit:\n\t\treturn xc.compileFuncLit(x)\n\n\t// Types\n\tcase *ast.ArrayType:\n\t\treturn xc.compileTypeExpr(x, callCtx)\n\tcase *ast.ChanType:\n\t\treturn xc.compileTypeExpr(x, callCtx)\n\tcase *ast.Ellipsis:\n\t\treturn xc.compileTypeExpr(x, callCtx)\n\tcase *ast.FuncType:\n\t\treturn xc.compileTypeExpr(x, callCtx)\n\tcase *ast.InterfaceType:\n\t\treturn xc.compileTypeExpr(x, callCtx)\n\tcase *ast.MapType:\n\t\treturn xc.compileTypeExpr(x, callCtx)\n\n\t// Remaining expressions\n\tcase *ast.BadExpr:\n\t\txc.SilentErrors++ // Error already reported by parser\n\t\treturn nil\n\tcase *ast.BinaryExpr:\n\t\treturn xc.compileBinaryExpr(x)\n\tcase *ast.CallExpr:\n\t\treturn xc.compileCallExpr(x)\n\tcase *ast.Ident:\n\t\treturn xc.compileIdent(x, callCtx)\n\tcase *ast.IndexExpr:\n\t\treturn xc.compileIndexExpr(x)\n\tcase *ast.SliceExpr:\n\t\treturn xc.compileSliceExpr(x)\n\tcase *ast.KeyValueExpr:\n\t\treturn xc.compileKeyValueExpr(x)\n\tcase *ast.ParenExpr:\n\t\treturn xc.compile(x.X, callCtx)\n\tcase *ast.SelectorExpr:\n\t\treturn xc.compileSelectorExpr(x)\n\tcase *ast.StarExpr:\n\t\treturn xc.compileStarExpr(x, callCtx)\n\tcase *ast.StructType:\n\t\txc.errorAt(x.Pos(), \"%T expression node not implemented\", x)\n\t\treturn nil\n\tcase *ast.TypeAssertExpr:\n\t\txc.errorAt(x.Pos(), \"%T expression node not implemented\", x)\n\t\treturn nil\n\tcase *ast.UnaryExpr:\n\t\treturn xc.compileUnaryExpr(x)\n\t}\n\n\tlogger.Panic().\n\t\tStr(\"type\", fmt.Sprintf(\"%T\", x)).\n\t\tMsg(\"unexpected ast node type\")\n\tpanic(\"unreachable\")\n}", "title": "" }, { "docid": "102c4d5011ca0ebd212efdf1cfe0406a", "score": "0.47238097", "text": "func Compiler() string { return C.GoString(C.libvlc_get_compiler()) }", "title": "" }, { "docid": "c99565b5b71568f57437d1bfafde6c54", "score": "0.47042525", "text": "func CompileThriftFile(thriftAbsPath string, thriftRootPath string) (*Module, error) {\n\tcompiledModule, err := compile.Compile(thriftAbsPath)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"failed to compile thrift file\")\n\t}\n\tb, err := ioutil.ReadFile(thriftAbsPath)\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"failed to read file %q\", thriftAbsPath)\n\t}\n\tprogram, err := idl.Parse(b)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"failed to parse thrift program\")\n\t}\n\treturn ConvertModule(compiledModule, program, thriftRootPath), nil\n}", "title": "" }, { "docid": "69fa035942ffc229ba8c70ee899d1cf4", "score": "0.46840596", "text": "func (c *Compiler) CompileAll() (map[string]CompiledContract, error) {\n\t_, err := os.Stat(c.Filename)\n\n\tif err != nil && os.IsNotExist(err) {\n\t\treturn nil, errors.Errorf(\"file not found: %s\", c.Filename)\n\t}\n\n\toutput, err := c.execSolc()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn output.CompiledContracts(), nil\n}", "title": "" }, { "docid": "2fa461fa510e0658da95c088aed4bc10", "score": "0.4680158", "text": "func Compile(re string) *Graph {\n\tc := compiler{\n\t\tptr: 0,\n\t\tstack: make([]fragment, len(re)),\n\t\tre: re,\n\t}\n\treturn c.compile()\n}", "title": "" }, { "docid": "0f54129b88c005b08239297c5916d08b", "score": "0.4663055", "text": "func (i *Interpreter) run(w *eval.World, path_orEmpty string, sourceCode string) error {\n\tvar code eval.Code\n\tvar vars []string\n\tvar err error\n\n\tfileSet := token.NewFileSet()\n\tif len(path_orEmpty) > 0 {\n\t\tfileSet.AddFile(path_orEmpty, fileSet.Base(), len(sourceCode))\n\t}\n\n\tcode, vars, err = i.compile(w, fileSet, sourceCode)\n\ti.tryToAddVars(w, fileSet, vars)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tresult, err := code.Run()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif result != nil {\n\t\tfmt.Fprintf(stdout, \"%s\\n\", result)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "0134e0edc2c98e6d0635762d1660e255", "score": "0.46622428", "text": "func (fet *Fet) Compile(tpl string, writeFile bool) (string, []string, error) {\n\tvar (\n\t\tresult string\n\t\terr error\n\t)\n\tparentScopes := []string{}\n\tlocalScopes := []string{}\n\tincludes := []string{}\n\tincludeChains := Imports{\n\t\tNodes: map[string]*ImportNode{},\n\t}\n\textends := []string{}\n\tcaptures := map[string]string{}\n\tdeps := []string{}\n\ttplFile := fet.RealTmplPath(tpl)\n\tcompileFile := fet.RealCmplPath(tplFile)\n\tconf := fet.Config\n\tparseOptions := &generator.ParseOptions{\n\t\tConf: conf,\n\t\tCaptures: &captures,\n\t}\n\toptions := &CompileOptions{\n\t\tParentScopes: parentScopes,\n\t\tLocalScopes: &localScopes,\n\t\tIncludes: &includes,\n\t\tIncludeChains: &includeChains,\n\t\tExtends: &extends,\n\t\tCaptures: &captures,\n\t\tParseOptions: parseOptions,\n\t}\n\tif writeFile {\n\t\trelaTpl, _ := filepath.Rel(fet.TemplateDir, tplFile)\n\t\tdefer func() {\n\t\t\tif err != nil {\n\t\t\t\tfet.debug(\"compile %s fail:%s\", relaTpl, err.Error())\n\t\t\t} else {\n\t\t\t\tfmt.Println(\"compile success:\", relaTpl)\n\t\t\t}\n\t\t}()\n\t\tfet.debug(\"compile file:%s\", relaTpl)\n\t}\n\tif result, err = fet.compileFileContent(tplFile, options); err != nil {\n\t\treturn \"\", nil, err\n\t}\n\tif conf.Glob {\n\t\tbasename, _ := filepath.Rel(fet.TemplateDir, tplFile)\n\t\text := path.Ext(tplFile)\n\t\tfilename := strings.TrimSuffix(basename, ext)\n\t\tresult = \"{{define \\\"\" + filename + \"\\\"}}\" + result + \"{{end}}\"\n\t}\n\tif writeFile {\n\t\tdir := path.Dir(compileFile)\n\t\tif notexist, err := isDorfExists(dir); err != nil {\n\t\t\tif notexist {\n\t\t\t\terr = os.MkdirAll(dir, os.ModePerm)\n\t\t\t}\n\t\t\tif err != nil {\n\t\t\t\treturn \"\", nil, fmt.Errorf(\"open the compile dir '%s' failure:%s\", dir, err.Error())\n\t\t\t}\n\t\t}\n\t\terr = ioutil.WriteFile(compileFile, []byte(result), 0644)\n\t\tif err != nil {\n\t\t\treturn \"\", nil, fmt.Errorf(\"compile file '%s' failure:%s\", compileFile, err.Error())\n\t\t}\n\t}\n\tdeps = append(deps, extends...)\n\tdeps = append(deps, includes...)\n\treturn result, deps, nil\n}", "title": "" }, { "docid": "f3a1609eed9272e4878fcf3181841bb2", "score": "0.46505478", "text": "func CompileSingle(fname, s string, golike bool) (\n\t[]byte, []*lex8.Error, []byte,\n) {\n\tvar lang build8.Lang\n\tif !golike {\n\t\tlang = Lang()\n\t} else {\n\t\tlang = LangGolike()\n\t}\n\treturn buildSingle(fname, s, lang)\n}", "title": "" }, { "docid": "0eca05f401c5e793875b9bb92b792eaa", "score": "0.46384504", "text": "func language(toolchain string, c *BuildCommand, in io.Reader, out io.Writer, spinner text.Spinner) (*Language, error) {\n\tvar language *Language\n\tswitch toolchain {\n\tcase \"assemblyscript\":\n\t\tlanguage = NewLanguage(&LanguageOptions{\n\t\t\tName: \"assemblyscript\",\n\t\t\tSourceDirectory: AsSourceDirectory,\n\t\t\tToolchain: NewAssemblyScript(\n\t\t\t\t&c.Manifest.File,\n\t\t\t\tc.Globals,\n\t\t\t\tc.Flags,\n\t\t\t\tin,\n\t\t\t\tout,\n\t\t\t\tspinner,\n\t\t\t),\n\t\t})\n\tcase \"go\":\n\t\tlanguage = NewLanguage(&LanguageOptions{\n\t\t\tName: \"go\",\n\t\t\tSourceDirectory: GoSourceDirectory,\n\t\t\tToolchain: NewGo(\n\t\t\t\t&c.Manifest.File,\n\t\t\t\tc.Globals,\n\t\t\t\tc.Flags,\n\t\t\t\tin,\n\t\t\t\tout,\n\t\t\t\tspinner,\n\t\t\t),\n\t\t})\n\tcase \"javascript\":\n\t\tlanguage = NewLanguage(&LanguageOptions{\n\t\t\tName: \"javascript\",\n\t\t\tSourceDirectory: JsSourceDirectory,\n\t\t\tToolchain: NewJavaScript(\n\t\t\t\t&c.Manifest.File,\n\t\t\t\tc.Globals,\n\t\t\t\tc.Flags,\n\t\t\t\tin,\n\t\t\t\tout,\n\t\t\t\tspinner,\n\t\t\t),\n\t\t})\n\tcase \"rust\":\n\t\tlanguage = NewLanguage(&LanguageOptions{\n\t\t\tName: \"rust\",\n\t\t\tSourceDirectory: RustSourceDirectory,\n\t\t\tToolchain: NewRust(\n\t\t\t\t&c.Manifest.File,\n\t\t\t\tc.Globals,\n\t\t\t\tc.Flags,\n\t\t\t\tin,\n\t\t\t\tout,\n\t\t\t\tspinner,\n\t\t\t),\n\t\t})\n\tcase \"other\":\n\t\tlanguage = NewLanguage(&LanguageOptions{\n\t\t\tName: \"other\",\n\t\t\tToolchain: NewOther(\n\t\t\t\t&c.Manifest.File,\n\t\t\t\tc.Globals,\n\t\t\t\tc.Flags,\n\t\t\t\tin,\n\t\t\t\tout,\n\t\t\t\tspinner,\n\t\t\t),\n\t\t})\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"unsupported language %s\", toolchain)\n\t}\n\n\treturn language, nil\n}", "title": "" }, { "docid": "b194e720547c20ed00a6920ee344fcf9", "score": "0.4619145", "text": "func NewCompiler(file *source.File, symbolTable *SymbolTable, constants []objects.Object, modules *objects.ModuleMap, trace io.Writer) *Compiler {\n\tmainScope := CompilationScope{\n\t\tsymbolInit: make(map[string]bool),\n\t\tsourceMap: make(map[int]source.Pos),\n\t}\n\n\t// symbol table\n\tif symbolTable == nil {\n\t\tsymbolTable = NewSymbolTable()\n\t}\n\n\t// add builtin functions to the symbol table\n\tfor idx, fn := range objects.Builtins {\n\t\tsymbolTable.DefineBuiltin(idx, fn.Name)\n\t}\n\n\t// builtin modules\n\tif modules == nil {\n\t\tmodules = objects.NewModuleMap()\n\t}\n\n\treturn &Compiler{\n\t\tfile: file,\n\t\tsymbolTable: symbolTable,\n\t\tconstants: constants,\n\t\tscopes: []CompilationScope{mainScope},\n\t\tscopeIndex: 0,\n\t\tloopIndex: -1,\n\t\ttrace: trace,\n\t\tmodules: modules,\n\t\tcompiledModules: make(map[string]*objects.CompiledFunction),\n\t}\n}", "title": "" }, { "docid": "155402076d25f00e4641d0f0c2e04c89", "score": "0.46130538", "text": "func Compile(r io.Reader) (*ast.File, error) {\n\tgr := reader.From(r)\n\n\tenv := &SymExprsTable{\n\t\timports: make(map[string][]string),\n\t\tm: map[string]ast.Expr{},\n\t}\n\tfor k, v := range Symbols.m {\n\t\tenv.m[k] = v\n\t}\n\tfor k, v := range Symbols.imports {\n\t\tenv.imports[k] = v\n\t}\n\n\tmain := &ast.FuncDecl{\n\t\tName: identExpr(\"main\"),\n\t\tType: &ast.FuncType{Params: &ast.FieldList{}},\n\t\tBody: &ast.BlockStmt{List: []ast.Stmt{}},\n\t}\n\n\tsymMap := &ast.CompositeLit{\n\t\tType: &ast.MapType{\n\t\t\tKey: identExpr(\"string\"),\n\t\t\tValue: &ast.InterfaceType{Methods: &ast.FieldList{}}},\n\t\tElts: []ast.Expr{}}\n\tfor k, v := range env.m {\n\t\tsymMap.Elts = append(symMap.Elts, &ast.KeyValueExpr{\n\t\t\tKey: &ast.BasicLit{Kind: token.STRING, Value: \"`\" + k + \"`\"},\n\t\t\tValue: v,\n\t\t})\n\t}\n\n\tfor k, v := range env.m {\n\t\tmain.Body.List = append(main.Body.List,\n\t\t\t&ast.AssignStmt{\n\t\t\t\tLhs: []ast.Expr{\n\t\t\t\t\t&ast.IndexExpr{\n\t\t\t\t\t\tX: &ast.SelectorExpr{\n\t\t\t\t\t\t\tX: identExpr(\"symbols\"),\n\t\t\t\t\t\t\tSel: identExpr(\"m\")},\n\t\t\t\t\t\tIndex: &ast.BasicLit{Kind: token.STRING, Value: \"`\" + k + \"`\"},\n\t\t\t\t\t}},\n\t\t\t\tTok: token.ASSIGN,\n\t\t\t\tRhs: []ast.Expr{v}})\n\t}\n\n\tvar expr ast.Expr\n\tform, err := gr.Read()\n\tfor err == nil {\n\t\texpr, env, err = CompileForm(form, env)\n\t\tif err != nil {\n\t\t\tbreak\n\t\t}\n\t\tif expr != nil {\n\t\t\tmain.Body.List = append(main.Body.List, &ast.DeclStmt{&ast.GenDecl{\n\t\t\t\tTok: token.VAR,\n\t\t\t\tSpecs: []ast.Spec{&ast.ValueSpec{\n\t\t\t\t\tNames: []*ast.Ident{identExpr(\"_\")},\n\t\t\t\t\tValues: []ast.Expr{expr.(ast.Expr)}}}}})\n\t\t}\n\t\tform, err = gr.Read()\n\t}\n\tif err != nil && err != io.EOF {\n\t\treturn nil, err\n\t}\n\n\timports := \"import (\"\n\tfor name, paths := range env.imports {\n\t\tfor _, path := range paths {\n\t\t\timports += \"\\n\" + name + \" \\\"\" + path + \"\\\"\"\n\t\t}\n\t}\n\timports += \")\"\n\n\tfile, _ := parser.ParseFile(&token.FileSet{}, \"\", `\n\t\tpackage main\n\n\t\t`+imports+`\n\n\t\tvar _ *persistent.List\n\t\tvar _ lang.Symbol\n\t\tvar _ reflect.Type\n\n\t\ttype SymTable struct {\n\t\t\tparent *SymTable\n\t\t\tm map[string]interface{}\n\t\t}\n\n\t\tfunc (st SymTable) Get(k string) interface{} {\n\t\t\tv, ok := st.m[k]\n\t\t\tif ok {\n\t\t\t\treturn v\n\t\t\t} else if !ok && st.parent != nil {\n\t\t\t\treturn st.parent.Get(k)\n\t\t\t}\n\t\t\tpanic(\"Undefined symbol \"+k)\n\t\t}`, 0)\n\n\tfile.Decls = append(file.Decls,\n\t\t&ast.GenDecl{\n\t\t\tTok: token.VAR,\n\t\t\tSpecs: []ast.Spec{&ast.ValueSpec{\n\t\t\t\tNames: []*ast.Ident{identExpr(\"symbols\")},\n\t\t\t\tValues: []ast.Expr{&ast.UnaryExpr{\n\t\t\t\t\tOp: token.AND,\n\t\t\t\t\tX: &ast.CompositeLit{\n\t\t\t\t\t\tType: identExpr(\"SymTable\"),\n\t\t\t\t\t\tElts: []ast.Expr{\n\t\t\t\t\t\t\t&ast.KeyValueExpr{\n\t\t\t\t\t\t\t\tKey: identExpr(\"m\"),\n\t\t\t\t\t\t\t\tValue: &ast.CompositeLit{\n\t\t\t\t\t\t\t\t\tType: &ast.MapType{\n\t\t\t\t\t\t\t\t\t\tKey: identExpr(\"string\"),\n\t\t\t\t\t\t\t\t\t\tValue: &ast.InterfaceType{Methods: &ast.FieldList{}}},\n\t\t\t\t\t\t\t\t\tElts: []ast.Expr{}}}}}}}}}},\n\t\tmain)\n\n\treturn file, nil\n}", "title": "" }, { "docid": "d9ebbbb9bd0c690f9177ef347bcb01e9", "score": "0.4609923", "text": "func Compile(rules string, variables map[string]interface{}) (r *Rules, err error) {\n\tvar c *Compiler\n\tif c, err = NewCompiler(); err != nil {\n\t\treturn\n\t}\n\tfor k, v := range variables {\n\t\tif err = c.DefineVariable(k, v); err != nil {\n\t\t\treturn\n\t\t}\n\t}\n\tif err = c.AddString(rules, \"\"); err != nil {\n\t\treturn\n\t}\n\tr, err = c.GetRules()\n\treturn\n}", "title": "" }, { "docid": "f52f7d418b549fac183a5e7f2309f6fb", "score": "0.46083373", "text": "func (c *Compiler) Compile(node ast.Node) error {\n\tif c.trace != nil {\n\t\tif node != nil {\n\t\t\tdefer un(trace(c, fmt.Sprintf(\"%s (%s)\", node.String(), reflect.TypeOf(node).Elem().Name())))\n\t\t} else {\n\t\t\tdefer un(trace(c, \"<nil>\"))\n\t\t}\n\t}\n\n\tswitch node := node.(type) {\n\tcase *ast.File:\n\t\tfor _, stmt := range node.Stmts {\n\t\t\tif err := c.Compile(stmt); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\tcase *ast.ExprStmt:\n\t\tif err := c.Compile(node.Expr); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tc.emit(node, OpPop)\n\n\tcase *ast.IncDecStmt:\n\t\top := token.AddAssign\n\t\tif node.Token == token.Dec {\n\t\t\top = token.SubAssign\n\t\t}\n\n\t\treturn c.compileAssign(node, []ast.Expr{node.Expr}, []ast.Expr{&ast.IntLit{Value: 1}}, op)\n\n\tcase *ast.ParenExpr:\n\t\tif err := c.Compile(node.Expr); err != nil {\n\t\t\treturn err\n\t\t}\n\n\tcase *ast.BinaryExpr:\n\t\tif node.Token == token.LAnd || node.Token == token.LOr {\n\t\t\treturn c.compileLogical(node)\n\t\t}\n\n\t\tif node.Token == token.Less {\n\t\t\tif err := c.Compile(node.RHS); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tif err := c.Compile(node.LHS); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tc.emit(node, OpBinaryOp, int(token.Greater))\n\n\t\t\treturn nil\n\t\t} else if node.Token == token.LessEq {\n\t\t\tif err := c.Compile(node.RHS); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif err := c.Compile(node.LHS); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tc.emit(node, OpBinaryOp, int(token.GreaterEq))\n\n\t\t\treturn nil\n\t\t}\n\n\t\tif err := c.Compile(node.LHS); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif err := c.Compile(node.RHS); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tswitch node.Token {\n\t\tcase token.Add:\n\t\t\tc.emit(node, OpBinaryOp, int(token.Add))\n\t\tcase token.Sub:\n\t\t\tc.emit(node, OpBinaryOp, int(token.Sub))\n\t\tcase token.Mul:\n\t\t\tc.emit(node, OpBinaryOp, int(token.Mul))\n\t\tcase token.Quo:\n\t\t\tc.emit(node, OpBinaryOp, int(token.Quo))\n\t\tcase token.Rem:\n\t\t\tc.emit(node, OpBinaryOp, int(token.Rem))\n\t\tcase token.Greater:\n\t\t\tc.emit(node, OpBinaryOp, int(token.Greater))\n\t\tcase token.GreaterEq:\n\t\t\tc.emit(node, OpBinaryOp, int(token.GreaterEq))\n\t\tcase token.Equal:\n\t\t\tc.emit(node, OpEqual)\n\t\tcase token.NotEqual:\n\t\t\tc.emit(node, OpNotEqual)\n\t\tcase token.And:\n\t\t\tc.emit(node, OpBinaryOp, int(token.And))\n\t\tcase token.Or:\n\t\t\tc.emit(node, OpBinaryOp, int(token.Or))\n\t\tcase token.Xor:\n\t\t\tc.emit(node, OpBinaryOp, int(token.Xor))\n\t\tcase token.AndNot:\n\t\t\tc.emit(node, OpBinaryOp, int(token.AndNot))\n\t\tcase token.Shl:\n\t\t\tc.emit(node, OpBinaryOp, int(token.Shl))\n\t\tcase token.Shr:\n\t\t\tc.emit(node, OpBinaryOp, int(token.Shr))\n\t\tdefault:\n\t\t\treturn c.errorf(node, \"invalid binary operator: %s\", node.Token.String())\n\t\t}\n\n\tcase *ast.IntLit:\n\t\tc.emit(node, OpConstant, c.addConstant(&objects.Int{Value: node.Value}))\n\n\tcase *ast.FloatLit:\n\t\tc.emit(node, OpConstant, c.addConstant(&objects.Float{Value: node.Value}))\n\n\tcase *ast.BoolLit:\n\t\tif node.Value {\n\t\t\tc.emit(node, OpTrue)\n\t\t} else {\n\t\t\tc.emit(node, OpFalse)\n\t\t}\n\n\tcase *ast.StringLit:\n\t\tif len(node.Value) > tengo.MaxStringLen {\n\t\t\treturn c.error(node, objects.ErrStringLimit)\n\t\t}\n\n\t\tc.emit(node, OpConstant, c.addConstant(&objects.String{Value: node.Value}))\n\n\tcase *ast.CharLit:\n\t\tc.emit(node, OpConstant, c.addConstant(&objects.Char{Value: node.Value}))\n\n\tcase *ast.UndefinedLit:\n\t\tc.emit(node, OpNull)\n\n\tcase *ast.UnaryExpr:\n\t\tif err := c.Compile(node.Expr); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tswitch node.Token {\n\t\tcase token.Not:\n\t\t\tc.emit(node, OpLNot)\n\t\tcase token.Sub:\n\t\t\tc.emit(node, OpMinus)\n\t\tcase token.Xor:\n\t\t\tc.emit(node, OpBComplement)\n\t\tcase token.Add:\n\t\t\t// do nothing?\n\t\tdefault:\n\t\t\treturn c.errorf(node, \"invalid unary operator: %s\", node.Token.String())\n\t\t}\n\n\tcase *ast.IfStmt:\n\t\t// open new symbol table for the statement\n\t\tc.symbolTable = c.symbolTable.Fork(true)\n\t\tdefer func() {\n\t\t\tc.symbolTable = c.symbolTable.Parent(false)\n\t\t}()\n\n\t\tif node.Init != nil {\n\t\t\tif err := c.Compile(node.Init); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t\tif err := c.Compile(node.Cond); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t// first jump placeholder\n\t\tjumpPos1 := c.emit(node, OpJumpFalsy, 0)\n\n\t\tif err := c.Compile(node.Body); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif node.Else != nil {\n\t\t\t// second jump placeholder\n\t\t\tjumpPos2 := c.emit(node, OpJump, 0)\n\n\t\t\t// update first jump offset\n\t\t\tcurPos := len(c.currentInstructions())\n\t\t\tc.changeOperand(jumpPos1, curPos)\n\n\t\t\tif err := c.Compile(node.Else); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\t// update second jump offset\n\t\t\tcurPos = len(c.currentInstructions())\n\t\t\tc.changeOperand(jumpPos2, curPos)\n\t\t} else {\n\t\t\t// update first jump offset\n\t\t\tcurPos := len(c.currentInstructions())\n\t\t\tc.changeOperand(jumpPos1, curPos)\n\t\t}\n\n\tcase *ast.ForStmt:\n\t\treturn c.compileForStmt(node)\n\n\tcase *ast.ForInStmt:\n\t\treturn c.compileForInStmt(node)\n\n\tcase *ast.BranchStmt:\n\t\tif node.Token == token.Break {\n\t\t\tcurLoop := c.currentLoop()\n\t\t\tif curLoop == nil {\n\t\t\t\treturn c.errorf(node, \"break not allowed outside loop\")\n\t\t\t}\n\t\t\tpos := c.emit(node, OpJump, 0)\n\t\t\tcurLoop.Breaks = append(curLoop.Breaks, pos)\n\t\t} else if node.Token == token.Continue {\n\t\t\tcurLoop := c.currentLoop()\n\t\t\tif curLoop == nil {\n\t\t\t\treturn c.errorf(node, \"continue not allowed outside loop\")\n\t\t\t}\n\t\t\tpos := c.emit(node, OpJump, 0)\n\t\t\tcurLoop.Continues = append(curLoop.Continues, pos)\n\t\t} else {\n\t\t\tpanic(fmt.Errorf(\"invalid branch statement: %s\", node.Token.String()))\n\t\t}\n\n\tcase *ast.BlockStmt:\n\t\tif len(node.Stmts) == 0 {\n\t\t\treturn nil\n\t\t}\n\n\t\tc.symbolTable = c.symbolTable.Fork(true)\n\t\tdefer func() {\n\t\t\tc.symbolTable = c.symbolTable.Parent(false)\n\t\t}()\n\n\t\tfor _, stmt := range node.Stmts {\n\t\t\tif err := c.Compile(stmt); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\tcase *ast.AssignStmt:\n\t\tif err := c.compileAssign(node, node.LHS, node.RHS, node.Token); err != nil {\n\t\t\treturn err\n\t\t}\n\n\tcase *ast.Ident:\n\t\tsymbol, _, ok := c.symbolTable.Resolve(node.Name)\n\t\tif !ok {\n\t\t\treturn c.errorf(node, \"unresolved reference '%s'\", node.Name)\n\t\t}\n\n\t\tswitch symbol.Scope {\n\t\tcase ScopeGlobal:\n\t\t\tc.emit(node, OpGetGlobal, symbol.Index)\n\t\tcase ScopeLocal:\n\t\t\tc.emit(node, OpGetLocal, symbol.Index)\n\t\tcase ScopeBuiltin:\n\t\t\tc.emit(node, OpGetBuiltin, symbol.Index)\n\t\tcase ScopeFree:\n\t\t\tc.emit(node, OpGetFree, symbol.Index)\n\t\t}\n\n\tcase *ast.ArrayLit:\n\t\tfor _, elem := range node.Elements {\n\t\t\tif err := c.Compile(elem); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t\tc.emit(node, OpArray, len(node.Elements))\n\n\tcase *ast.MapLit:\n\t\tfor _, elt := range node.Elements {\n\t\t\t// key\n\t\t\tif len(elt.Key) > tengo.MaxStringLen {\n\t\t\t\treturn c.error(node, objects.ErrStringLimit)\n\t\t\t}\n\t\t\tc.emit(node, OpConstant, c.addConstant(&objects.String{Value: elt.Key}))\n\n\t\t\t// value\n\t\t\tif err := c.Compile(elt.Value); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t\tc.emit(node, OpMap, len(node.Elements)*2)\n\n\tcase *ast.SelectorExpr: // selector on RHS side\n\t\tif err := c.Compile(node.Expr); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif err := c.Compile(node.Sel); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tc.emit(node, OpIndex)\n\n\tcase *ast.IndexExpr:\n\t\tif err := c.Compile(node.Expr); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif err := c.Compile(node.Index); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tc.emit(node, OpIndex)\n\n\tcase *ast.SliceExpr:\n\t\tif err := c.Compile(node.Expr); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif node.Low != nil {\n\t\t\tif err := c.Compile(node.Low); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t} else {\n\t\t\tc.emit(node, OpNull)\n\t\t}\n\n\t\tif node.High != nil {\n\t\t\tif err := c.Compile(node.High); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t} else {\n\t\t\tc.emit(node, OpNull)\n\t\t}\n\n\t\tc.emit(node, OpSliceIndex)\n\n\tcase *ast.FuncLit:\n\t\tc.enterScope()\n\n\t\tfor _, p := range node.Type.Params.List {\n\t\t\ts := c.symbolTable.Define(p.Name)\n\n\t\t\t// function arguments is not assigned directly.\n\t\t\ts.LocalAssigned = true\n\t\t}\n\n\t\tif err := c.Compile(node.Body); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t// code optimization\n\t\tc.optimizeFunc(node)\n\n\t\tfreeSymbols := c.symbolTable.FreeSymbols()\n\t\tnumLocals := c.symbolTable.MaxSymbols()\n\t\tinstructions, sourceMap := c.leaveScope()\n\n\t\tfor _, s := range freeSymbols {\n\t\t\tswitch s.Scope {\n\t\t\tcase ScopeLocal:\n\t\t\t\tif !s.LocalAssigned {\n\t\t\t\t\t// Here, the closure is capturing a local variable that's not yet assigned its value.\n\t\t\t\t\t// One example is a local recursive function:\n\t\t\t\t\t//\n\t\t\t\t\t// func() {\n\t\t\t\t\t// foo := func(x) {\n\t\t\t\t\t// // ..\n\t\t\t\t\t// return foo(x-1)\n\t\t\t\t\t// }\n\t\t\t\t\t// }\n\t\t\t\t\t//\n\t\t\t\t\t// which translate into\n\t\t\t\t\t//\n\t\t\t\t\t// 0000 GETL 0\n\t\t\t\t\t// 0002 CLOSURE ? 1\n\t\t\t\t\t// 0006 DEFL 0\n\t\t\t\t\t//\n\t\t\t\t\t// . So the local variable (0) is being captured before it's assigned the value.\n\t\t\t\t\t//\n\t\t\t\t\t// Solution is to transform the code into something like this:\n\t\t\t\t\t//\n\t\t\t\t\t// func() {\n\t\t\t\t\t// foo := undefined\n\t\t\t\t\t// foo = func(x) {\n\t\t\t\t\t// // ..\n\t\t\t\t\t// return foo(x-1)\n\t\t\t\t\t// }\n\t\t\t\t\t// }\n\t\t\t\t\t//\n\t\t\t\t\t// that is equivalent to\n\t\t\t\t\t//\n\t\t\t\t\t// 0000 NULL\n\t\t\t\t\t// 0001 DEFL 0\n\t\t\t\t\t// 0003 GETL 0\n\t\t\t\t\t// 0005 CLOSURE ? 1\n\t\t\t\t\t// 0009 SETL 0\n\t\t\t\t\t//\n\n\t\t\t\t\tc.emit(node, OpNull)\n\t\t\t\t\tc.emit(node, OpDefineLocal, s.Index)\n\n\t\t\t\t\ts.LocalAssigned = true\n\t\t\t\t}\n\n\t\t\t\tc.emit(node, OpGetLocalPtr, s.Index)\n\t\t\tcase ScopeFree:\n\t\t\t\tc.emit(node, OpGetFreePtr, s.Index)\n\t\t\t}\n\t\t}\n\n\t\tcompiledFunction := &objects.CompiledFunction{\n\t\t\tInstructions: instructions,\n\t\t\tNumLocals: numLocals,\n\t\t\tNumParameters: len(node.Type.Params.List),\n\t\t\tVarArgs: node.Type.Params.VarArgs,\n\t\t\tSourceMap: sourceMap,\n\t\t}\n\n\t\tif len(freeSymbols) > 0 {\n\t\t\tc.emit(node, OpClosure, c.addConstant(compiledFunction), len(freeSymbols))\n\t\t} else {\n\t\t\tc.emit(node, OpConstant, c.addConstant(compiledFunction))\n\t\t}\n\n\tcase *ast.ReturnStmt:\n\t\tif c.symbolTable.Parent(true) == nil {\n\t\t\t// outside the function\n\t\t\treturn c.errorf(node, \"return not allowed outside function\")\n\t\t}\n\n\t\tif node.Result == nil {\n\t\t\tc.emit(node, OpReturn, 0)\n\t\t} else {\n\t\t\tif err := c.Compile(node.Result); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tc.emit(node, OpReturn, 1)\n\t\t}\n\n\tcase *ast.CallExpr:\n\t\tif err := c.Compile(node.Func); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tfor _, arg := range node.Args {\n\t\t\tif err := c.Compile(arg); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t\tc.emit(node, OpCall, len(node.Args))\n\n\tcase *ast.ImportExpr:\n\t\tif node.ModuleName == \"\" {\n\t\t\treturn c.errorf(node, \"empty module name\")\n\t\t}\n\n\t\tif mod := c.modules.Get(node.ModuleName); mod != nil {\n\t\t\tv, err := mod.Import(node.ModuleName)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tswitch v := v.(type) {\n\t\t\tcase []byte: // module written in Tengo\n\t\t\t\tcompiled, err := c.compileModule(node, node.ModuleName, node.ModuleName, v)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tc.emit(node, OpConstant, c.addConstant(compiled))\n\t\t\t\tc.emit(node, OpCall, 0)\n\t\t\tcase objects.Object: // builtin module\n\t\t\t\tc.emit(node, OpConstant, c.addConstant(v))\n\t\t\tdefault:\n\t\t\t\tpanic(fmt.Errorf(\"invalid import value type: %T\", v))\n\t\t\t}\n\t\t} else if c.allowFileImport {\n\t\t\tmoduleName := node.ModuleName\n\t\t\tif !strings.HasSuffix(moduleName, \".tengo\") {\n\t\t\t\tmoduleName += \".tengo\"\n\t\t\t}\n\n\t\t\tmodulePath, err := filepath.Abs(moduleName)\n\t\t\tif err != nil {\n\t\t\t\treturn c.errorf(node, \"module file path error: %s\", err.Error())\n\t\t\t}\n\n\t\t\tif err := c.checkCyclicImports(node, modulePath); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tmoduleSrc, err := ioutil.ReadFile(moduleName)\n\t\t\tif err != nil {\n\t\t\t\treturn c.errorf(node, \"module file read error: %s\", err.Error())\n\t\t\t}\n\n\t\t\tcompiled, err := c.compileModule(node, moduleName, modulePath, moduleSrc)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tc.emit(node, OpConstant, c.addConstant(compiled))\n\t\t\tc.emit(node, OpCall, 0)\n\t\t} else {\n\t\t\treturn c.errorf(node, \"module '%s' not found\", node.ModuleName)\n\t\t}\n\n\tcase *ast.ExportStmt:\n\t\t// export statement must be in top-level scope\n\t\tif c.scopeIndex != 0 {\n\t\t\treturn c.errorf(node, \"export not allowed inside function\")\n\t\t}\n\n\t\t// export statement is simply ignore when compiling non-module code\n\t\tif c.parent == nil {\n\t\t\tbreak\n\t\t}\n\n\t\tif err := c.Compile(node.Result); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tc.emit(node, OpImmutable)\n\t\tc.emit(node, OpReturn, 1)\n\n\tcase *ast.ErrorExpr:\n\t\tif err := c.Compile(node.Expr); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tc.emit(node, OpError)\n\n\tcase *ast.ImmutableExpr:\n\t\tif err := c.Compile(node.Expr); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tc.emit(node, OpImmutable)\n\n\tcase *ast.CondExpr:\n\t\tif err := c.Compile(node.Cond); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t// first jump placeholder\n\t\tjumpPos1 := c.emit(node, OpJumpFalsy, 0)\n\n\t\tif err := c.Compile(node.True); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t// second jump placeholder\n\t\tjumpPos2 := c.emit(node, OpJump, 0)\n\n\t\t// update first jump offset\n\t\tcurPos := len(c.currentInstructions())\n\t\tc.changeOperand(jumpPos1, curPos)\n\n\t\tif err := c.Compile(node.False); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t// update second jump offset\n\t\tcurPos = len(c.currentInstructions())\n\t\tc.changeOperand(jumpPos2, curPos)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "f5c20c838cb3ef17c5b6278476a923b9", "score": "0.46036452", "text": "func Compile(strexp string, c *StrExpConfig) (*regexp.Regexp, error) {\n\tt, err := Parse(strexp)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tr := t.RegExpFragment(c)\n\n\treturn regexp.Compile(\"^\" + r + \"$\")\n}", "title": "" }, { "docid": "fe182d6734c6ea6fc4ac3662da7cfd1b", "score": "0.460011", "text": "func (t *Test) compile(ast *dp.AST) (c *cpu.CPU, err error) {\n\tvar bin []cpu.Word\n\n\tif bin, t.dbg, err = asm.Assemble(ast); err != nil {\n\t\treturn\n\t}\n\n\tif !hasExit(bin) {\n\t\treturn nil, errors.New(fmt.Sprintf(\n\t\t\t\"%s: Program has no unconditional EXIT. This means the test will run indefinitely.\", t.file))\n\t}\n\n\tt.profile = prof.New(bin, t.dbg)\n\n\tc = cpu.New()\n\tcopy(c.Store.Mem[:], bin)\n\n\tc.ClockSpeed = time.Duration(time.Duration(*clock))\n\tc.Trace = func(pc, op, a, b cpu.Word, s *cpu.Storage) {\n\t\tt.parseInstruction(pc, op, a, b, s, *trace)\n\t}\n\n\tc.InstructionHandler = func(pc cpu.Word, s *cpu.Storage) {\n\t\tt.profile.Update(pc, s)\n\t}\n\n\tc.NotifyBranchSkip = func(pc, cost cpu.Word) {\n\t\tt.profile.UpdateCost(pc, cost)\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "f26201b74b11ef5511eb9ddb8b130086", "score": "0.4583753", "text": "func Srclang(query string) string {\n\tclient := getHttpClient(0, 0)\n\n\tresp, err := client.Get(GOOGLEURL + \"&sl=auto&tl=zh_TW&q=\" + query)\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t\treturn \"\"\n\t}\n\tdefer resp.Body.Close()\n\n\tdata, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\treturn \"\"\n\t}\n\tvar reply GoogleReply\n\n\tif err = json.Unmarshal(data, &reply); err != nil {\n\t\tlog.Println(err)\n\t\treturn \"\"\n\t}\n\tlangs := reply.Ld_result.Extended_srclangs\n\tif len(langs) == 0 {\n\t\treturn \"\"\n\t}\n\tif langs[0] == \"ja\" {\n\t\treturn \"ja-JP\"\n\t}\n\treturn langs[0]\n}", "title": "" }, { "docid": "c26a38fcc986dd8f45bd8459bc272678", "score": "0.45814472", "text": "func NewCompiler(w io.Writer) (c *Compiler) {\n\tc = &Compiler{w: w}\n\treturn\n}", "title": "" }, { "docid": "6917c305305523bc9187d59ec96d50b8", "score": "0.4571482", "text": "func (v AllOf) Compile(rc ReferenceChecker) (err error) {\n\tfor _, sv := range v {\n\t\tif c, ok := sv.(Compiler); ok {\n\t\t\tif err = c.Compile(rc); err != nil {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" } ]
c558d7cbe7a77e51070c691a6961d0b0
GroupByInt groups elements into a map keyed by int. See: GROUPBY START OMIT
[ { "docid": "a8a7e73e86cd7a100def0f86bc7da092", "score": "0.829445", "text": "func (rcv DifferentTypes) GroupByInt(fn func(DifferentType) int) map[int]DifferentTypes {\n\t// GROUPBY END OMIT\n\tresult := make(map[int]DifferentTypes)\n\tfor _, v := range rcv {\n\t\tkey := fn(v)\n\t\tresult[key] = append(result[key], v)\n\t}\n\treturn result\n}", "title": "" } ]
[ { "docid": "8c3c07845d8d7e259b2d89f254088d9b", "score": "0.591257", "text": "func MapIntKeys(rec map[int]interface{}) []int {\n\tkeys := make([]int, 0, len(rec))\n\tfor k := range rec {\n\t\tkeys = append(keys, k)\n\t}\n\treturn keys\n}", "title": "" }, { "docid": "31a471cd91b0db6245a6e70bd37eb8bf", "score": "0.5780102", "text": "func Group[S ~[]E, M map[E]N, E comparable, N int](s S) M {\n\t// If s is nil, Split returns nil (zero map).\n\tif s == nil {\n\t\treturn nil\n\t}\n\n\t// Below: s != nil\n\n\t// If s is empty, Split returns an empty map.\n\tif len(s) == 0 {\n\t\tvar emptyM = M{}\n\t\treturn emptyM\n\t}\n\n\t// Below: len(s) > 0 && f != nil\n\tvar m = M{}\n\tfor _, e := range s {\n\t\tm[e] = m[e] + 1\n\t}\n\treturn m\n}", "title": "" }, { "docid": "6775b094758deedeb977f22025fab40d", "score": "0.57694805", "text": "func (m *mapTransformation) regroupWith(keyIndices []int, arrs []array.Array) []int {\n\tregroup := make([]int, 0, len(keyIndices))\n\tfor _, idx := range keyIndices {\n\t\tif !arrowutil.IsConstant(arrs[idx]) {\n\t\t\tregroup = append(regroup, idx)\n\t\t}\n\t}\n\treturn regroup\n}", "title": "" }, { "docid": "8c0656ad7f2cbe23c57f0221ca66335f", "score": "0.5758753", "text": "func (ss ItemSlice) GroupByID() (grouped map[ItemID]*Item, ids []ItemID) {\n\tif len(ss) == 0 {\n\t\treturn\n\t}\n\tgrouped = make(map[ItemID]*Item)\n\tids = make([]ItemID, len(ss))\n\tfor idx, i := range ss {\n\t\tgrouped[i.Id] = i\n\t\tids[idx] = ItemID(i.Id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "a07eedf7cfdf2a3dac1f9633d91f93c7", "score": "0.5748055", "text": "func GroupBy[S ~[]T, T any, G constraints.Ordered](items S, f func(el T) G) map[G]S {\n\tresult := make(map[G]S)\n\tfor _, el := range items {\n\t\tkey := f(el)\n\t\tval, ok := result[key]\n\t\tif !ok {\n\t\t\tresult[key] = make(S, 1)\n\t\t}\n\t\tresult[key] = append(val, el)\n\t}\n\treturn result\n}", "title": "" }, { "docid": "fdb214daca02460ccd0d80635c21aabe", "score": "0.5726494", "text": "func (h Helper) FormatSliceToIntMap(all []int) map[int]int {\n\tbmap := make(map[int]int)\n\tfor _, bv := range all {\n\t\tbmap[bv] = bv\n\t}\n\treturn bmap\n}", "title": "" }, { "docid": "92ec8b57ca73885a4277a97de95d9209", "score": "0.5726228", "text": "func (m MapOfFoo) GroupByInterfaceField() map[D][]*Foo {\n\tresult := make(map[D][]*Foo)\n\tfor _, value := range m {\n\t\tresult[value.InterfaceField] = append(result[value.InterfaceField], value)\n\t}\n\treturn result\n}", "title": "" }, { "docid": "19c3a488e4c6eb1b0c99f4671c96b408", "score": "0.57229", "text": "func (s SliceOfFoo) GroupByInterfaceField() map[D][]*Foo {\n\tresult := make(map[D][]*Foo)\n\tfor _, value := range s {\n\t\tresult[value.InterfaceField] = append(result[value.InterfaceField], value)\n\t}\n\treturn result\n}", "title": "" }, { "docid": "2c226f2f5d26b6f180c6ee3234e5deaa", "score": "0.56955534", "text": "func (pgb *PharmacistGroupBy) Int(ctx context.Context) (_ int, err error) {\n\tvar v []int\n\tif v, err = pgb.Ints(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{pharmacist.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: PharmacistGroupBy.Ints returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "1e4621ddfcef058aad1d29624d046a18", "score": "0.5679679", "text": "func GroupBy(items DashSlice, iteratee Iteratee) map[interface{}]DashSlice {\n\tresult := map[interface{}]DashSlice{}\n\n\tfor _, item := range items {\n\t\tkey := iteratee(item)\n\n\t\tel, found := result[key]\n\t\tif found {\n\t\t\tresult[key] = append(el, item)\n\t\t} else {\n\t\t\tresult[key] = append(DashSlice{}, item)\n\t\t}\n\t}\n\n\treturn result\n}", "title": "" }, { "docid": "25696f9f2090fd3fa63cd273941ff650", "score": "0.5636237", "text": "func (s SliceOfFoo) GroupByKey() map[int][]*Foo {\n\tresult := make(map[int][]*Foo)\n\tfor _, value := range s {\n\t\tresult[value.Key] = append(result[value.Key], value)\n\t}\n\treturn result\n}", "title": "" }, { "docid": "3d95f45dbe48e3fa5fe9a240c7f071c9", "score": "0.5599018", "text": "func intMapKeys(i interface{}) (keys []int) {\n\tm, ok := i.(map[int]interface{})\n\tif !ok {\n\t\tpanic(\"map doesn't have int key type\")\n\t}\n\n\tfor k := range m {\n\t\tkeys = append(keys, k)\n\t}\n\tsort.Ints(keys)\n\n\treturn keys\n}", "title": "" }, { "docid": "d48acac3e3d14563930dca6ee2a55b4e", "score": "0.55726457", "text": "func countGroup(config Config) map[int64]int {\n\tcountGroup := make(map[int64]int)\n\tfor key, _ := range config.Groups {\n\t\tcountGroup[key] = 0\n\t}\n\n\tfor _, value := range config.Shards {\n\t\tif value != 0 {\n\t\t\tcountGroup[value]++\n\t\t}\n\t}\n\treturn countGroup\n}", "title": "" }, { "docid": "386531a0aac233ea4b8097292648224c", "score": "0.55147517", "text": "func (kngb *K8sNodeGroupBy) Int(ctx context.Context) (_ int, err error) {\n\tvar v []int\n\tif v, err = kngb.Ints(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{k8snode.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: K8sNodeGroupBy.Ints returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "06fd2f5fc9e16f7bdd2449b01f09b2d4", "score": "0.5490655", "text": "func (kgb *KpiGroupBy) Int(ctx context.Context) (_ int, err error) {\n\tvar v []int\n\tif v, err = kgb.Ints(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{kpi.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: KpiGroupBy.Ints returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "5919c01677062f9e4a0fb36b876e3a0f", "score": "0.5488524", "text": "func groupingPlanets(p []planet) (map[int][]int, error) {\n\tgroupPlanet := map[int][]int{}\n\tfor _, v := range p {\n\t\tif v.RadiusJpt.String() == \"\" {\n\t\t\tcontinue\n\t\t}\n\t\tr, err := v.RadiusJpt.Float64()\n\t\tif err != nil {\n\t\t\treturn map[int][]int{}, err\n\t\t}\n\t\tif r == 0 {\n\t\t\tcontinue\n\t\t}\n\t\tif v.DiscoveryYear.String() == \"\" {\n\t\t\tcontinue\n\t\t}\n\t\ty, err := v.DiscoveryYear.Float64()\n\t\tif err != nil {\n\t\t\treturn map[int][]int{}, err\n\t\t}\n\t\tif y == 0 {\n\t\t\tcontinue\n\t\t}\n\n\t\tif r < 1 {\n\t\t\tif len(groupPlanet[int(y)]) == 0 {\n\t\t\t\tgroupPlanet[int(y)] = []int{1, 0, 0}\n\t\t\t} else {\n\t\t\t\tgroupPlanet[int(y)][0]++\n\t\t\t}\n\t\t} else if r < 2 {\n\t\t\tif len(groupPlanet[int(y)]) == 0 {\n\t\t\t\tgroupPlanet[int(y)] = []int{0, 1, 0}\n\t\t\t} else {\n\t\t\t\tgroupPlanet[int(y)][1]++\n\t\t\t}\n\t\t} else {\n\t\t\tif len(groupPlanet[int(y)]) == 0 {\n\t\t\t\tgroupPlanet[int(y)] = []int{0, 0, 1}\n\t\t\t} else {\n\t\t\t\tgroupPlanet[int(y)][2]++\n\t\t\t}\n\t\t}\n\t}\n\treturn groupPlanet, nil\n}", "title": "" }, { "docid": "30afcdf1065b3ee992eefa744b18a344", "score": "0.546879", "text": "func (m MapOfFoo) GroupByKey() map[int][]*Foo {\n\tresult := make(map[int][]*Foo)\n\tfor _, value := range m {\n\t\tresult[value.Key] = append(result[value.Key], value)\n\t}\n\treturn result\n}", "title": "" }, { "docid": "8701b32d8dc9720fcba2ffe8808167aa", "score": "0.5424088", "text": "func (kngb *K8sNamespaceGroupBy) Int(ctx context.Context) (_ int, err error) {\n\tvar v []int\n\tif v, err = kngb.Ints(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{k8snamespace.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: K8sNamespaceGroupBy.Ints returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "ef7869d46f7badd3ed71861bf649643c", "score": "0.541092", "text": "func IntKeys[M ~map[K]V, K constraints.Integer, V any](m M) (keys []int64) {\n\tkeys = make([]int64, 0, len(m))\n\tfor k := range m {\n\t\tkeys = append(keys, int64(k))\n\t}\n\treturn\n}", "title": "" }, { "docid": "0af1f74c5606bdfb009a8614f491f2be", "score": "0.53855187", "text": "func NewWithIntComparator() *Map {\n\treturn &Map{tree: rbt.NewWithIntComparator()}\n}", "title": "" }, { "docid": "4b48557006ee4a663ffbab5000d70ccc", "score": "0.537199", "text": "func (wgb *WechatGroupBy) Int(ctx context.Context) (_ int, err error) {\n\tvar v []int\n\tif v, err = wgb.Ints(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{wechat.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: WechatGroupBy.Ints returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "63805de8e83591d34aad8bcf5a31c060", "score": "0.529636", "text": "func (pgb *PersonnelGroupBy) Int(ctx context.Context) (_ int, err error) {\n\tvar v []int\n\tif v, err = pgb.Ints(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{personnel.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: PersonnelGroupBy.Ints returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "908aa995fe1d79704643ec17ff4ef7ae", "score": "0.52926034", "text": "func GroupIntoThree(num int64) map[int]string {\n\tgroups := make(map[int]string)\n\tinitial := 1\n\n\tfor num > 0 {\n\t\tsplitNum := num % 1000\n\t\tremainder, quotient := divideByCertainNumber(splitNum, 100)\n\t\tinWords := returnMatchingString(remainder, quotient, initial, true)\n\t\tgroups[initial] = inWords\n\t\tnum /= 1000\n\t\tinitial = initial + 1\n\t}\n\n\treturn groups\n}", "title": "" }, { "docid": "9a82c7a225eb1bf94b2e823373b34d3a", "score": "0.5290533", "text": "func groupPatrons(patronMap map[int]*Patron) (map[int][]int, map[int]*Patron) {\n\tgroups := make(map[int][]int)\n\tremains := make(map[int]*Patron)\n\tpaired := make(map[*Patron]bool)\n\n\tcount := 0\n\tfor _, iPatron := range patronMap {\n\t\t// First, we should pair up anyone who has donated half of the value of a cell.\n\t\tif !paired[iPatron] {\n\t\t\tvar group []int\n\t\t\tif iPatron.cellAmt == 0.5 {\n\t\t\t\tgroup = append(group, iPatron.id)\n\t\t\t\t//Check the remainder of the patronMap\n\t\t\t\tfor _, jPatron := range patronMap {\n\t\t\t\t\tif !paired[jPatron] && jPatron != iPatron {\n\t\t\t\t\t\tif jPatron.cellAmt == 0.5 {\n\t\t\t\t\t\t\tgroup = append(group, jPatron.id)\n\t\t\t\t\t\t\tpaired[iPatron] = true\n\t\t\t\t\t\t\tpaired[jPatron] = true\n\t\t\t\t\t\t\tcount++\n\t\t\t\t\t\t\tbreak\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t\tgroups[count] = group\n\t\t}\n\t}\n\n\t// Put the ID of every patron that wasn't paired into the \"remains\" array.\n\tfor id, patron := range patronMap {\n\t\tif !paired[patron] {\n\t\t\tremains[id] = patron\n\t\t}\n\t}\n\n\treturn groups, remains\n}", "title": "" }, { "docid": "2ab79714c51a2d799e69079d10b00f27", "score": "0.5238101", "text": "func groupThePeople(groupSizes []int) [][]int {\n\t// Each key in groupHash is a group size, and each associated value is a group\n\t// of all groups of that group size.\n\tgroupHash := map[int][][]int{}\n\tfor personID, groupSize := range groupSizes {\n\t\t// Fetch the list of groups for the given size\n\t\tgroups, ok := groupHash[groupSize]\n\t\tif !ok {\n\t\t\tgroups = [][]int{[]int{}}\n\t\t\tgroupHash[groupSize] = groups\n\t\t}\n\n\t\t// See if the last group has room for this person. If not, make a new one.\n\t\tnumGroups := len(groups)\n\t\tlastGroup := &groups[numGroups-1]\n\t\tif len(*lastGroup) == groupSize {\n\t\t\tgroupHash[groupSize] = append(groups, []int{})\n\t\t\tlastGroup = &groupHash[groupSize][numGroups]\n\t\t}\n\t\t*lastGroup = append(*lastGroup, personID)\n\t}\n\n\t// Collect all the completed groups into a single slice and return\n\tresultGroups := [][]int{}\n\tfor _, groups := range groupHash {\n\t\tfor _, group := range groups {\n\t\t\tresultGroups = append(resultGroups, group)\n\t\t}\n\t}\n\treturn resultGroups\n}", "title": "" }, { "docid": "c1971196db4d9cc8fcbbe6cea18a96bd", "score": "0.5237553", "text": "func SliceToKeys_MapIntToBool(values []int) map[int]bool {\n\tm := make(map[int]bool, len(values))\n\tfor _, v := range values {\n\t\tm[v] = true\n\t}\n\treturn m\n}", "title": "" }, { "docid": "31db120555ad14cb5427a78a832fdc9e", "score": "0.5237428", "text": "func (rcv NewTypeSlice) GroupByMyType(fn func(NewType) MyType) map[MyType]NewTypeSlice {\n\tresult := make(map[MyType]NewTypeSlice)\n\tfor _, v := range rcv {\n\t\tkey := fn(v)\n\t\tresult[key] = append(result[key], v)\n\t}\n\treturn result\n}", "title": "" }, { "docid": "a1b1674afc6d4df815df75e31274ec28", "score": "0.5229333", "text": "func (kcgb *K8sConnectorGroupBy) Int(ctx context.Context) (_ int, err error) {\n\tvar v []int\n\tif v, err = kcgb.Ints(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{k8sconnector.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: K8sConnectorGroupBy.Ints returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "36da2700750a4c3e3a078f558b8a4fc1", "score": "0.5209958", "text": "func (kngb *K8sNodeGroupBy) Ints(ctx context.Context) ([]int, error) {\n\tif len(kngb.fields) > 1 {\n\t\treturn nil, errors.New(\"ent: K8sNodeGroupBy.Ints is not achievable when grouping more than 1 field\")\n\t}\n\tvar v []int\n\tif err := kngb.Scan(ctx, &v); err != nil {\n\t\treturn nil, err\n\t}\n\treturn v, nil\n}", "title": "" }, { "docid": "d43ed2c3d91bad584d7958b01aed8fc9", "score": "0.52095085", "text": "func (kngb *K8sNamespaceGroupBy) Ints(ctx context.Context) ([]int, error) {\n\tif len(kngb.fields) > 1 {\n\t\treturn nil, errors.New(\"ent: K8sNamespaceGroupBy.Ints is not achievable when grouping more than 1 field\")\n\t}\n\tvar v []int\n\tif err := kngb.Scan(ctx, &v); err != nil {\n\t\treturn nil, err\n\t}\n\treturn v, nil\n}", "title": "" }, { "docid": "6aa0213aa67714baa55892d030280796", "score": "0.51993763", "text": "func MapFromInts(nums []int) map[int]struct{} {\n\tresult := make(map[int]struct{}, len(nums))\n\tfor _, x := range nums {\n\t\tresult[x] = struct{}{}\n\t}\n\treturn result\n}", "title": "" }, { "docid": "c350b7a668544116b457541eba30d46c", "score": "0.519791", "text": "func (kcgb *K8sConnectorGroupBy) Ints(ctx context.Context) ([]int, error) {\n\tif len(kcgb.fields) > 1 {\n\t\treturn nil, errors.New(\"ent: K8sConnectorGroupBy.Ints is not achievable when grouping more than 1 field\")\n\t}\n\tvar v []int\n\tif err := kcgb.Scan(ctx, &v); err != nil {\n\t\treturn nil, err\n\t}\n\treturn v, nil\n}", "title": "" }, { "docid": "d1337371658cc80f6fc514f99bd837ff", "score": "0.5190979", "text": "func FlipIntInt(m map[int]int) map[int]int {\n\tflippedMap := make(map[int]int)\n\tfor key, v := range m {\n\t\tif _, found := flippedMap[v]; found {\n\t\t\tpanic(\"Values of input map are not unique\")\n\t\t}\n\n\t\tflippedMap[v] = key\n\t}\n\n\treturn flippedMap\n}", "title": "" }, { "docid": "60272dfa436cf0a7cbd98680e30f2c0b", "score": "0.5178076", "text": "func (cgb *CarregisterGroupBy) Int(ctx context.Context) (_ int, err error) {\n\tvar v []int\n\tif v, err = cgb.Ints(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{carregister.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: CarregisterGroupBy.Ints returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "5a253e590d870f9b6e6c3556de0922fc", "score": "0.5149808", "text": "func (cgb *ClasstimeGroupBy) Int(ctx context.Context) (_ int, err error) {\n\tvar v []int\n\tif v, err = cgb.Ints(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{classtime.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: ClasstimeGroupBy.Ints returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "5e0b9d47dc0e06fe8649efa99ecd9954", "score": "0.5141715", "text": "func (sgb *SpecialdoctorGroupBy) Int(ctx context.Context) (_ int, err error) {\n\tvar v []int\n\tif v, err = sgb.Ints(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{specialdoctor.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: SpecialdoctorGroupBy.Ints returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "52d02aa819992b88a8dd1b8c750496eb", "score": "0.5136808", "text": "func (rpgb *ResourcePoolGroupBy) Int(ctx context.Context) (_ int, err error) {\n\tvar v []int\n\tif v, err = rpgb.Ints(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{resourcepool.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: ResourcePoolGroupBy.Ints returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "7b79efbb9544637f0b5c5119eca969c4", "score": "0.51226217", "text": "func (agb *AntenatalinformationGroupBy) Int(ctx context.Context) (_ int, err error) {\n\tvar v []int\n\tif v, err = agb.Ints(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{antenatalinformation.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: AntenatalinformationGroupBy.Ints returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "a472dffe7fb79f7a1b210779637cfbda", "score": "0.5120975", "text": "func (kgb *KpiGroupBy) Ints(ctx context.Context) ([]int, error) {\n\tif len(kgb.fields) > 1 {\n\t\treturn nil, errors.New(\"ent: KpiGroupBy.Ints is not achievable when grouping more than 1 field\")\n\t}\n\tvar v []int\n\tif err := kgb.Scan(ctx, &v); err != nil {\n\t\treturn nil, err\n\t}\n\treturn v, nil\n}", "title": "" }, { "docid": "ad3bdd79b816e10ce8e5abad6734164f", "score": "0.5118857", "text": "func (igb *InodeGroupBy) Int(ctx context.Context) (_ int, err error) {\n\tvar v []int\n\tif v, err = igb.Ints(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{inode.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: InodeGroupBy.Ints returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "473e1a96b765972a98fc0b3e2507dbc9", "score": "0.5116047", "text": "func Group(arr interface{}, m interface{}, field string) {\n\tGroupInto(arr, m, field, \"\")\n\t// mt := reflect.TypeOf(m)\n\t// arrV := reflect.ValueOf(arr)\n\t// arrT := reflect.TypeOf(arr)\n\t// r := reflect.MakeMap(mt.Elem())\n\t// mLen := make(map[interface{}]int)\n\t// iLen := make(map[interface{}]int)\n\t// for i := 0; i < arrV.Len(); i++ {\n\t// \tele := arrV.Index(i)\n\t// \tkey := ele.FieldByName(field).Interface()\n\t// \tif l, ok := mLen[key]; ok {\n\t// \t\tmLen[key] = l + 1\n\t// \t} else {\n\t// \t\tmLen[key] = 1\n\t// \t\tiLen[key] = 0\n\t// \t}\n\t// }\n\t// for i := 0; i < arrV.Len(); i++ {\n\t// \tele := arrV.Index(i)\n\t// \tkey := ele.FieldByName(field)\n\t// \tkv := key.Interface()\n\t// \tvs := r.MapIndex(key)\n\t// \tif !vs.IsValid() {\n\t// \t\tvs = reflect.MakeSlice(arrT, mLen[kv], mLen[kv])\n\t// \t\tvs.Index(0).Set(ele)\n\t// \t\tr.SetMapIndex(key, vs)\n\t// \t\tiLen[kv] = 1\n\t// \t} else {\n\t// \t\tvs.Index(iLen[kv]).Set(ele)\n\t// \t\tiLen[kv]++\n\t// \t}\n\t// }\n\t// reflect.ValueOf(m).Elem().Set(r)\n}", "title": "" }, { "docid": "556b596d68f144ba5a7d88b26dba2257", "score": "0.5113796", "text": "func (pgb *PharmacistGroupBy) Ints(ctx context.Context) ([]int, error) {\n\tif len(pgb.fields) > 1 {\n\t\treturn nil, errors.New(\"ent: PharmacistGroupBy.Ints is not achievable when grouping more than 1 field\")\n\t}\n\tvar v []int\n\tif err := pgb.Scan(ctx, &v); err != nil {\n\t\treturn nil, err\n\t}\n\treturn v, nil\n}", "title": "" }, { "docid": "4faa18ada65e022552f000e95ee5b902", "score": "0.5110319", "text": "func (s SliceOfFoo) GroupByStringField() map[string][]*Foo {\n\tresult := make(map[string][]*Foo)\n\tfor _, value := range s {\n\t\tresult[value.StringField] = append(result[value.StringField], value)\n\t}\n\treturn result\n}", "title": "" }, { "docid": "45cd01edee7d254768f08ad5a91b993b", "score": "0.5095812", "text": "func removeDupInt(intSlice []int) []int {\r\n keys := make(map[int]bool)\r\n list := []int{}\r\n\r\n // If the key(values of the slice) is not equal\r\n // to the already present value in new slice (list)\r\n // then we append it. else we jump on another element.\r\n for _, entry := range intSlice {\r\n if _, value := keys[entry]; !value {\r\n keys[entry] = true\r\n list = append(list, entry)\r\n }\r\n }\r\n return list\r\n}", "title": "" }, { "docid": "0e7cec66a922472820014546e5521cc4", "score": "0.50853443", "text": "func (wgb *WechatGroupBy) Ints(ctx context.Context) ([]int, error) {\n\tif len(wgb.fields) > 1 {\n\t\treturn nil, errors.New(\"ent: WechatGroupBy.Ints is not achievable when grouping more than 1 field\")\n\t}\n\tvar v []int\n\tif err := wgb.Scan(ctx, &v); err != nil {\n\t\treturn nil, err\n\t}\n\treturn v, nil\n}", "title": "" }, { "docid": "33018a1d888224c29f278a0922fccf8d", "score": "0.5080383", "text": "func (m MapOfFoo) GroupByStringField() map[string][]*Foo {\n\tresult := make(map[string][]*Foo)\n\tfor _, value := range m {\n\t\tresult[value.StringField] = append(result[value.StringField], value)\n\t}\n\treturn result\n}", "title": "" }, { "docid": "764135e03e1e5189d94eca4e9ef6d4b8", "score": "0.5071507", "text": "func (t *SearchTreeData) MapInt(f func(int) int) []int {\n\tout := []int{}\n\tstack := []*SearchTreeData{t}\n\tstate := map[*SearchTreeData]int{}\n\tfor len(stack) > 0 {\n\t\tswitch state[stack[0]] {\n\t\tcase 0:\n\t\t\tstate[stack[0]]++\n\t\t\tif stack[0].left != nil {\n\t\t\t\tstack = append([]*SearchTreeData{stack[0].left}, stack...)\n\t\t\t}\n\t\tcase 1:\n\t\t\tstate[stack[0]]++\n\t\t\tout = append(out, f(stack[0].data))\n\t\tcase 2:\n\t\t\tstate[stack[0]]++\n\t\t\tif stack[0].right != nil {\n\t\t\t\tstack = append([]*SearchTreeData{stack[0].right}, stack...)\n\t\t\t}\n\t\tdefault:\n\t\t\tstack = stack[1:]\n\t\t}\n\t}\n\treturn out\n}", "title": "" }, { "docid": "e31c2235a9e2f15bee229c62a8e534d9", "score": "0.50538605", "text": "func (ogb *OfficerGroupBy) Int(ctx context.Context) (_ int, err error) {\n\tvar v []int\n\tif v, err = ogb.Ints(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{officer.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: OfficerGroupBy.Ints returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "c0d612a9bf5cc6628b1b92116c7fa477", "score": "0.5050135", "text": "func getGroupBy(groupFunc OneArgsFunc, hashAsKey bool) stepAction {\n\treturn stepAction(func(src DataSource, option *ParallelOption, first bool) (DataSource, *promise.Future, bool, error) {\n\n\t\tvar useDefHash uint32 = 0\n\t\tmapChunk := getMapChunkToKVChunkFunc(&useDefHash, groupFunc)\n\n\t\t//map the element to a keyValue that key is group key and value is element\n\t\tf, reduceSrc := parallelMapToChan(src, nil, mapChunk, option)\n\n\t\tgroupKVs := make(map[interface{}]interface{})\n\t\tgroupKV := func(v interface{}) {\n\t\t\tkv := v.(*hKeyValue)\n\t\t\tk := kv.keyHash\n\n\t\t\tif v, ok := groupKVs[k]; !ok {\n\t\t\t\tgroupKVs[k] = []interface{}{kv.value}\n\t\t\t} else {\n\t\t\t\tlist := v.([]interface{})\n\t\t\t\tgroupKVs[k] = appendToSlice(list, kv.value)\n\t\t\t}\n\t\t\t//fmt.Println(\"groupKVs, \", k, v, groupKVs[k])\n\t\t}\n\n\t\t//reduce the keyValue map to get grouped slice\n\t\t//get key with group values values\n\t\terrs := reduceChan(f, reduceSrc, getChunkOprFunc(forEachSlicer, func(i int, v interface{}) {\n\t\t\tgroupKV(v)\n\t\t}))\n\n\t\t//fmt.Println(\"groupKVs, return ===\", groupKVs)\n\t\tif errs == nil {\n\t\t\treturn newDataSource(groupKVs), nil, option.KeepOrder, nil\n\t\t} else {\n\t\t\treturn nil, nil, option.KeepOrder, NewAggregateError(\"Group error\", errs)\n\t\t}\n\n\t})\n}", "title": "" }, { "docid": "b710c58300e80813d8f4ad4a4fe47178", "score": "0.5037758", "text": "func (r1 *mapLiteral) GroupBy(t2, gfcn interface{}) Relation {\n\treturn NewGroupBy(r1, t2, gfcn)\n}", "title": "" }, { "docid": "c80de6a4209b3f8bb6b36efc981c1bfa", "score": "0.5017222", "text": "func (isrtgb *IPStaticRoutingTableGroupBy) Int(ctx context.Context) (_ int, err error) {\n\tvar v []int\n\tif v, err = isrtgb.Ints(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{ipstaticroutingtable.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: IPStaticRoutingTableGroupBy.Ints returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "3719ebf09535ab1b7e5911eb148a4b2f", "score": "0.5013493", "text": "func (c Interfaces) GroupByBaseName() (map[string]InterfacesGroup, error) {\n\tresult := make(map[string]InterfacesGroup)\n\n\tfor _, si := range c {\n\t\tkey, err := si.Key()\n\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tif result[key.Name] == nil {\n\t\t\tresult[key.Name] = make(InterfacesGroup)\n\t\t}\n\n\t\tresult[key.Name][key] = si\n\t}\n\n\treturn result, nil\n}", "title": "" }, { "docid": "c54bc98f8af96029cb844a7756e03804", "score": "0.50095826", "text": "func (lodgb *LevelOfDangerousGroupBy) Int(ctx context.Context) (_ int, err error) {\n\tvar v []int\n\tif v, err = lodgb.Ints(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{levelofdangerous.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: LevelOfDangerousGroupBy.Ints returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "05960802ca2a3c4ed143880ce76d8f2a", "score": "0.5007152", "text": "func (ggb *GreeterGroupBy) Int(ctx context.Context) (_ int, err error) {\n\tvar v []int\n\tif v, err = ggb.Ints(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{greeter.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: GreeterGroupBy.Ints returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "2ab5671bab4ad23a196fba25646b4ff5", "score": "0.49988043", "text": "func IntKeys(m interface{}) (keys []int) {\n\tswitch v := m.(type) {\n\tcase map[int]string:\n\t\tkeys = make([]int, len(v))\n\t\ti := 0\n\t\tfor k := range v {\n\t\t\tkeys[i] = k\n\t\t\ti++\n\t\t}\n\tcase map[int][]byte:\n\t\tkeys = make([]int, len(v))\n\t\ti := 0\n\t\tfor k := range v {\n\t\t\tkeys[i] = k\n\t\t\ti++\n\t\t}\n\tcase map[int]int:\n\t\tkeys = make([]int, len(v))\n\t\ti := 0\n\t\tfor k := range v {\n\t\t\tkeys[i] = k\n\t\t\ti++\n\t\t}\n\tcase map[int]int64:\n\t\tkeys = make([]int, len(v))\n\t\ti := 0\n\t\tfor k := range v {\n\t\t\tkeys[i] = k\n\t\t\ti++\n\t\t}\n\tcase map[int]uint64:\n\t\tkeys = make([]int, len(v))\n\t\ti := 0\n\t\tfor k := range v {\n\t\t\tkeys[i] = k\n\t\t\ti++\n\t\t}\n\tcase map[int]bool:\n\t\tkeys = make([]int, len(v))\n\t\ti := 0\n\t\tfor k := range v {\n\t\t\tkeys[i] = k\n\t\t\ti++\n\t\t}\n\tcase map[int]struct{}:\n\t\tkeys = make([]int, len(v))\n\t\ti := 0\n\t\tfor k := range v {\n\t\t\tkeys[i] = k\n\t\t\ti++\n\t\t}\n\tcase map[int]interface{}:\n\t\tkeys = make([]int, len(v))\n\t\ti := 0\n\t\tfor k := range v {\n\t\t\tkeys[i] = k\n\t\t\ti++\n\t\t}\n\tdefault:\n\t\tmTyp := reflect.TypeOf(m)\n\t\tif mTyp.Kind() != reflect.Map || !isIntType(mTyp.Key()) {\n\t\t\tpanic(fmt.Errorf(\"unsupported type or IntKeys: %T\", v))\n\t\t}\n\n\t\tmVal := reflect.ValueOf(m)\n\t\tkeys = make([]int, mVal.Len())\n\t\tfor i, k := range mVal.MapKeys() {\n\t\t\tkeys[i] = int(reflectInt(k))\n\t\t}\n\t}\n\treturn keys\n}", "title": "" }, { "docid": "22d0d4f9c553ebd37f22d8bb12ab1d87", "score": "0.49956933", "text": "func (rpgb *ResourcePoolGroupBy) Ints(ctx context.Context) ([]int, error) {\n\tif len(rpgb.fields) > 1 {\n\t\treturn nil, errors.New(\"ent: ResourcePoolGroupBy.Ints is not achievable when grouping more than 1 field\")\n\t}\n\tvar v []int\n\tif err := rpgb.Scan(ctx, &v); err != nil {\n\t\treturn nil, err\n\t}\n\treturn v, nil\n}", "title": "" }, { "docid": "20db1201bdefc2cb0d9c1d0dee59a379", "score": "0.4991739", "text": "func (dt *DataTable) GroupBy(by ...GroupBy) (*Groups, error) {\n\tif len(by) == 0 {\n\t\treturn nil, ErrNoGroupBy\n\t}\n\n\tvar groups []*group\n\tgindex := make(map[uint64]int)\n\n\tfor pos := 0; pos < dt.nrows; pos++ {\n\t\trow := dt.Row(pos)\n\t\tbuf := bytes.NewBuffer(nil)\n\t\tenc := gob.NewEncoder(buf)\n\n\t\tbuckets := make([]interface{}, len(by))\n\n\t\tfor i, k := range by {\n\t\t\tk := &k\n\t\t\tif v, ok := k.Keyer(row); ok {\n\t\t\t\tbuckets[i] = v\n\t\t\t\tenc.Encode(v)\n\t\t\t}\n\t\t}\n\n\t\thash := xxhash.Sum64(buf.Bytes())\n\n\t\tif at, ok := gindex[hash]; ok {\n\t\t\tgroups[at].Rows = append(groups[at].Rows, pos)\n\t\t} else {\n\t\t\tgindex[hash] = len(groups)\n\t\t\tgroups = append(groups, &group{\n\t\t\t\tKey: hash,\n\t\t\t\tBuckets: buckets,\n\t\t\t\tRows: []int{pos},\n\t\t\t})\n\t\t}\n\t}\n\treturn &Groups{dt: dt, groups: groups, by: by}, nil\n}", "title": "" }, { "docid": "77fa1ddbaba458881a71ffc554e6e023", "score": "0.49905795", "text": "func __NewMapIntInt(cap int) map[int]int {\n\treturn make(map[int]int, cap)\n}", "title": "" }, { "docid": "5b4997c3429ffd20f64941a7780cad82", "score": "0.49703127", "text": "func InitFoodGroupInfoMap(il interface{}) map[uint]fdc.FoodGroup {\n\tm := make(map[uint]fdc.FoodGroup)\n\tswitch il := il.(type) {\n\tcase []fdc.FoodGroup:\n\t\tfor _, value := range il {\n\t\t\tm[uint(value.ID)] = value\n\t\t}\n\t}\n\treturn m\n}", "title": "" }, { "docid": "60afd290b64d92886f285948d282b340", "score": "0.49659252", "text": "func buildGroupId(groupBy GroupBy) bson.M {\n\tid := bson.M{TaskStatsDateKey: \"$\" + TaskStatsDateKey}\n\tswitch groupBy {\n\tcase GroupByDistro:\n\t\tid[TaskStatsDistroKey] = \"$\" + DBTaskStatsIDDistroKeyFull\n\t\tfallthrough\n\tcase GroupByVariant:\n\t\tid[TaskStatsBuildVariantKey] = \"$\" + DBTaskStatsIDBuildVariantKeyFull\n\t\tfallthrough\n\tcase GroupByTask:\n\t\tid[TaskStatsTaskNameKey] = \"$\" + DBTaskStatsIDTaskNameKeyFull\n\t}\n\n\treturn id\n}", "title": "" }, { "docid": "21ed507dfc1673ca6a98dbca5e2a35d7", "score": "0.49639598", "text": "func uniqueCount(arr []int) map[int]int {\n\ttemp := make(map[int]int)\n\tres := make(map[int]int)\n\tfor _, v := range arr {\n\t\ttemp[v]++\n\t\tif temp[v] == 2 {\n\t\t\tres[v] = 2\n\t\t}\n\t}\n\treturn res\n}", "title": "" }, { "docid": "7729c8ab211fae4c21ef67da4f78e637", "score": "0.49150595", "text": "func enemiesMap(groups []group) map[int]map[int]int {\n\tm := make(map[int]map[int]int)\n\tfor _, g := range groups {\n\t\tif g.units == 0 {\n\t\t\tcontinue\n\t\t}\n\t\topposing := 1\n\t\tif g.team == 1 {\n\t\t\topposing = 2\n\t\t}\n\n\t\tif _, ok := m[opposing]; !ok {\n\t\t\tm[opposing] = make(map[int]int)\n\t\t}\n\n\t\tm[opposing][g.id] = -1\n\t}\n\treturn m\n}", "title": "" }, { "docid": "fbf2f79a741b958d0558de2c139e549a", "score": "0.49075702", "text": "func (pgb *PersonnelGroupBy) Ints(ctx context.Context) ([]int, error) {\n\tif len(pgb.fields) > 1 {\n\t\treturn nil, errors.New(\"ent: PersonnelGroupBy.Ints is not achievable when grouping more than 1 field\")\n\t}\n\tvar v []int\n\tif err := pgb.Scan(ctx, &v); err != nil {\n\t\treturn nil, err\n\t}\n\treturn v, nil\n}", "title": "" }, { "docid": "9514e5ef647ba7473720efa50abef9b9", "score": "0.49024576", "text": "func (sgb *SpecialdoctorGroupBy) Ints(ctx context.Context) ([]int, error) {\n\tif len(sgb.fields) > 1 {\n\t\treturn nil, errors.New(\"ent: SpecialdoctorGroupBy.Ints is not achievable when grouping more than 1 field\")\n\t}\n\tvar v []int\n\tif err := sgb.Scan(ctx, &v); err != nil {\n\t\treturn nil, err\n\t}\n\treturn v, nil\n}", "title": "" }, { "docid": "aa389fa490d7b2a38ebe7faa1b4e3bb0", "score": "0.48979273", "text": "func (gsgb *GameServerGroupBy) Int(ctx context.Context) (_ int, err error) {\n\tvar v []int\n\tif v, err = gsgb.Ints(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{gameserver.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: GameServerGroupBy.Ints returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "e75c954e05ef5d79c865f6a5fb6ff656", "score": "0.4894341", "text": "func toDiffMap(i string) map[string]int {\n\tres := make(map[string]int)\n\n\tfor _, c := range input {\n\t\tres[c] = getDiffCount(i, c)\n\t}\n\n\treturn res\n}", "title": "" }, { "docid": "37f7c2547383901e06b944d06a308686", "score": "0.48913696", "text": "func (s *Service) TasksByGroupIDsMap(gids []int64) (res map[int64][]*task.Task, err error) {\n\ttks := []*task.Task{}\n\tif err = s.DB.Model(&task.Task{}).Where(\"state>=0 AND type>0 AND group_id IN (?)\", gids).Find(&tks).Error; err != nil {\n\t\tlog.Error(\"s.TasksByGroupIDsMap id (%+v) error(%v)\", gids, err)\n\t\treturn\n\t}\n\tif len(tks) == 0 {\n\t\treturn\n\t}\n\n\ttkMap := make(map[int64]*task.Task)\n\ttgMap := make(map[int64][]*task.Task)\n\tids := make([]int64, 0, len(tks))\n\tfor _, v := range tks {\n\t\tif v == nil {\n\t\t\tcontinue\n\t\t}\n\t\tif v.Rank == 0 {\n\t\t\tv.Rank = v.ID\n\t\t}\n\t\tids = append(ids, v.ID)\n\t\ttkMap[v.ID] = v\n\t\ttgMap[v.GroupID] = append(tgMap[v.GroupID], v)\n\t}\n\n\ttrsMap, _ := s.TaskRewards(ids)\n\tfor _, id := range ids {\n\t\trs, ok := trsMap[id]\n\t\tif !ok || len(rs) == 0 {\n\t\t\tcontinue\n\t\t}\n\t\trids := make([]int64, 0, len(rs))\n\t\tfor _, r := range rs {\n\t\t\tif r != nil {\n\t\t\t\trids = append(rids, r.RewardID)\n\t\t\t}\n\t\t}\n\t\ttkMap[id].Reward = s.getRewards(rids)\n\t}\n\n\tres = make(map[int64][]*task.Task)\n\tfor _, gid := range gids {\n\t\ttks, ok := tgMap[gid]\n\t\tif !ok || len(tks) == 0 {\n\t\t\tcontinue\n\t\t}\n\t\tfor _, tk := range tks {\n\t\t\tif v, ok := tkMap[tk.ID]; ok {\n\t\t\t\tres[gid] = append(res[gid], v)\n\t\t\t}\n\t\t}\n\t}\n\tfor _, v := range res {\n\t\tsort.Slice(v, func(i, j int) bool {\n\t\t\treturn v[i].Rank < v[j].Rank\n\t\t})\n\t}\n\treturn\n}", "title": "" }, { "docid": "d31b0c817494affec157330a0e5c53b3", "score": "0.4888246", "text": "func (lodgb *LevelOfDangerousGroupBy) Ints(ctx context.Context) ([]int, error) {\n\tif len(lodgb.fields) > 1 {\n\t\treturn nil, errors.New(\"ent: LevelOfDangerousGroupBy.Ints is not achievable when grouping more than 1 field\")\n\t}\n\tvar v []int\n\tif err := lodgb.Scan(ctx, &v); err != nil {\n\t\treturn nil, err\n\t}\n\treturn v, nil\n}", "title": "" }, { "docid": "30a599de30abb6f886327a80caedd221", "score": "0.48859516", "text": "func (asgb *AllocationStrategyGroupBy) Int(ctx context.Context) (_ int, err error) {\n\tvar v []int\n\tif v, err = asgb.Ints(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{allocationstrategy.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: AllocationStrategyGroupBy.Ints returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "ab6c2cda4125e13cd8abe6a86c2d9da5", "score": "0.48790133", "text": "func (aagb *APIAuditGroupBy) Int(ctx context.Context) (_ int, err error) {\n\tvar v []int\n\tif v, err = aagb.Ints(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{apiaudit.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: APIAuditGroupBy.Ints returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "d5bde8b124f06004ffa19dba5f3ff9ec", "score": "0.4875618", "text": "func GroupBy(g Grouping, cols ...string) Grouping {\n\t// TODO: This would generate much less garbage if we grouped\n\t// all of cols in one pass.\n\t//\n\t// TODO: This constructs one slice per column per input group,\n\t// but it would be even better if it constructed just one\n\t// slice per column.\n\n\tif len(cols) == 0 {\n\t\treturn g\n\t}\n\n\tvar out GroupingBuilder\n\tfor _, gid := range g.Tables() {\n\t\tt := g.Table(gid)\n\n\t\tif cv, ok := t.Const(cols[0]); ok {\n\t\t\t// Grouping by a constant is trivial.\n\t\t\tsubgid := gid.Extend(cv)\n\t\t\tout.Add(subgid, t)\n\t\t\tcontinue\n\t\t}\n\n\t\tc := t.MustColumn(cols[0])\n\n\t\t// Create an index on c.\n\t\ttype subgroupInfo struct {\n\t\t\tkey interface{}\n\t\t\trows []int\n\t\t}\n\t\tsubgroups := []subgroupInfo{}\n\t\tkeys := make(map[interface{}]int)\n\t\tseq := reflect.ValueOf(c)\n\t\tfor i := 0; i < seq.Len(); i++ {\n\t\t\tx := seq.Index(i).Interface()\n\t\t\tsg, ok := keys[x]\n\t\t\tif !ok {\n\t\t\t\tsg = len(subgroups)\n\t\t\t\tsubgroups = append(subgroups, subgroupInfo{x, []int{}})\n\t\t\t\tkeys[x] = sg\n\t\t\t}\n\t\t\tsubgroup := &subgroups[sg]\n\t\t\tsubgroup.rows = append(subgroup.rows, i)\n\t\t}\n\n\t\t// Count rows in each subgroup.\n\t\toffsets := make([]int, 1+len(subgroups))\n\t\tfor i := range subgroups {\n\t\t\toffsets[i+1] = offsets[i] + len(subgroups[i].rows)\n\t\t}\n\n\t\t// Split each column.\n\t\tbuilders := make([]Builder, len(subgroups))\n\t\tfor _, name := range t.Columns() {\n\t\t\tif name == cols[0] {\n\t\t\t\t// Promote the group-by column to a\n\t\t\t\t// constant.\n\t\t\t\tfor i := range subgroups {\n\t\t\t\t\tbuilders[i].AddConst(name, subgroups[i].key)\n\t\t\t\t}\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tif cv, ok := t.Const(name); ok {\n\t\t\t\t// Keep constants constant.\n\t\t\t\tfor i := range builders {\n\t\t\t\t\tbuilders[i].AddConst(name, cv)\n\t\t\t\t}\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\t// Create a slice for all of the values.\n\t\t\tcol := t.Column(name)\n\t\t\tncol := reflect.MakeSlice(reflect.TypeOf(col), t.Len(), t.Len())\n\n\t\t\t// Shuffle each subgroup into ncol.\n\t\t\tfor i := range subgroups {\n\t\t\t\tsubcol := ncol.Slice(offsets[i], offsets[i+1]).Interface()\n\t\t\t\tslice.SelectInto(subcol, col, subgroups[i].rows)\n\t\t\t\tbuilders[i].Add(name, subcol)\n\t\t\t}\n\t\t}\n\n\t\t// Add tables to output Grouping.\n\t\tfor i := range builders {\n\t\t\tsubgid := gid.Extend(subgroups[i].key)\n\t\t\tout.Add(subgid, builders[i].Done())\n\t\t}\n\t}\n\n\treturn GroupBy(out.Done(), cols[1:]...)\n}", "title": "" }, { "docid": "7a9fcdd17808de0ee979ffa42261d284", "score": "0.4872599", "text": "func (q Query) GroupBy(keySelector func(interface{}) interface{},\n\telementSelector func(interface{}) interface{}) Query {\n\treturn Query{\n\t\tfunc() Iterator {\n\t\t\tnext := q.Iterate()\n\t\t\tset := make(map[interface{}][]interface{})\n\n\t\t\tfor item, ok := next(); ok; item, ok = next() {\n\t\t\t\tkey := keySelector(item)\n\t\t\t\tset[key] = append(set[key], elementSelector(item))\n\t\t\t}\n\n\t\t\tlen := len(set)\n\t\t\tidx := 0\n\t\t\tgroups := make([]Group, len)\n\t\t\tfor k, v := range set {\n\t\t\t\tgroups[idx] = Group{k, v}\n\t\t\t\tidx++\n\t\t\t}\n\n\t\t\tindex := 0\n\n\t\t\treturn func() (item interface{}, ok bool) {\n\t\t\t\tok = index < len\n\t\t\t\tif ok {\n\t\t\t\t\titem = groups[index]\n\t\t\t\t\tindex++\n\t\t\t\t}\n\n\t\t\t\treturn\n\t\t\t}\n\t\t},\n\t}\n}", "title": "" }, { "docid": "72a345dcee1c19ac5f6fc2b82891c955", "score": "0.4868312", "text": "func (pgb *PharmacistGroupBy) IntX(ctx context.Context) int {\n\tv, err := pgb.Int(ctx)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn v\n}", "title": "" }, { "docid": "1192da4ea64d5d72edf253afc66ef4d2", "score": "0.48683056", "text": "func (rows *Rows) GroupByValue(GroupIdx int) (mapRows MapRows) {\n\tfor {\n\t\trow := rows.PopFront()\n\t\tif nil == row {\n\t\t\tbreak\n\t\t}\n\n\t\tkey := fmt.Sprint(row[GroupIdx])\n\n\t\tmapRows.AddRow(key, row)\n\t}\n\treturn\n}", "title": "" }, { "docid": "e2e4f92d84e6b27f0780646c8058d905", "score": "0.48676282", "text": "func (ogb *OfficerGroupBy) Ints(ctx context.Context) ([]int, error) {\n\tif len(ogb.fields) > 1 {\n\t\treturn nil, errors.New(\"ent: OfficerGroupBy.Ints is not achievable when grouping more than 1 field\")\n\t}\n\tvar v []int\n\tif err := ogb.Scan(ctx, &v); err != nil {\n\t\treturn nil, err\n\t}\n\treturn v, nil\n}", "title": "" }, { "docid": "7b4eaac98f7488b3267bc7f08e8ed96c", "score": "0.4863118", "text": "func (wgb *WarningGroupBy) Int(ctx context.Context) (_ int, err error) {\n\tvar v []int\n\tif v, err = wgb.Ints(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{warning.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: WarningGroupBy.Ints returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "37400d8c4438298598ccdf204641a60c", "score": "0.48566252", "text": "func (cgb *CarregisterGroupBy) Ints(ctx context.Context) ([]int, error) {\n\tif len(cgb.fields) > 1 {\n\t\treturn nil, errors.New(\"ent: CarregisterGroupBy.Ints is not achievable when grouping more than 1 field\")\n\t}\n\tvar v []int\n\tif err := cgb.Scan(ctx, &v); err != nil {\n\t\treturn nil, err\n\t}\n\treturn v, nil\n}", "title": "" }, { "docid": "b734526595d848d60b369830c0ebf11c", "score": "0.48539817", "text": "func (bgb *BookcourseGroupBy) Int(ctx context.Context) (_ int, err error) {\n\tvar v []int\n\tif v, err = bgb.Ints(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{bookcourse.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: BookcourseGroupBy.Ints returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "6a7e4a6ce0e4465eb549336a080571f6", "score": "0.48504493", "text": "func (s Stream) Group(fn KeyFunc) Stream {\n\tgroups := make(map[interface{}][]interface{})\n\tfor item := range s.source {\n\t\tkey := fn(item)\n\t\tgroups[key] = append(groups[key], item)\n\t}\n\n\tsource := make(chan interface{})\n\tgo func() {\n\t\tfor _, group := range groups {\n\t\t\tsource <- group\n\t\t}\n\t\tclose(source)\n\t}()\n\n\treturn Range(source)\n}", "title": "" }, { "docid": "05168c379a8e378c773bf169196c6ba5", "score": "0.4832432", "text": "func (rcv DifferentTypes) GroupByString(fn func(DifferentType) string) map[string]DifferentTypes {\n\tresult := make(map[string]DifferentTypes)\n\tfor _, v := range rcv {\n\t\tkey := fn(v)\n\t\tresult[key] = append(result[key], v)\n\t}\n\treturn result\n}", "title": "" }, { "docid": "e6218a3ae21fd2718ed25a45bdf97f59", "score": "0.48263976", "text": "func (qedgb *QccEnterpriseDataGroupBy) Int(ctx context.Context) (_ int, err error) {\n\tvar v []int\n\tif v, err = qedgb.Ints(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{qccenterprisedata.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: QccEnterpriseDataGroupBy.Ints returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "7a44df76bb599ca635753af4be5dd3f4", "score": "0.48117566", "text": "func (fdgb *FlowDraftGroupBy) Int(ctx context.Context) (_ int, err error) {\n\tvar v []int\n\tif v, err = fdgb.Ints(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{flowdraft.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: FlowDraftGroupBy.Ints returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "9f4a72f3e45e610fc394c90da5a92295", "score": "0.48105708", "text": "func (cgb *ClubapplicationGroupBy) Ints(ctx context.Context) ([]int, error) {\n\tif len(cgb.fields) > 1 {\n\t\treturn nil, errors.New(\"ent: ClubapplicationGroupBy.Ints is not achievable when grouping more than 1 field\")\n\t}\n\tvar v []int\n\tif err := cgb.Scan(ctx, &v); err != nil {\n\t\treturn nil, err\n\t}\n\treturn v, nil\n}", "title": "" }, { "docid": "13227ad2fd628083d4826be02b60ef55", "score": "0.48101163", "text": "func (qgb *QuestionGroupBy) Int(ctx context.Context) (_ int, err error) {\n\tvar v []int\n\tif v, err = qgb.Ints(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{question.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: QuestionGroupBy.Ints returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "8b4f3e8fb5258e0dd72ecb170b4f7111", "score": "0.48042503", "text": "func (cgb *ClubapplicationGroupBy) Int(ctx context.Context) (_ int, err error) {\n\tvar v []int\n\tif v, err = cgb.Ints(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{clubapplication.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: ClubapplicationGroupBy.Ints returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "a25cc83b43081f753e0da365f23fce95", "score": "0.48016337", "text": "func (b *SearchTreeData) MapInt(f func(int) int) []int {\n\trepr := []int{}\n\tif b == nil {\n\t\treturn repr\n\t}\n\trepr = append(repr, b.left.MapInt(f)...)\n\trepr = append(repr, f(b.data))\n\trepr = append(repr, b.right.MapInt(f)...)\n\treturn repr\n}", "title": "" }, { "docid": "d927700f3c156acf9a5b772f35504439", "score": "0.4799471", "text": "func (agb *AntenatalinformationGroupBy) Ints(ctx context.Context) ([]int, error) {\n\tif len(agb.fields) > 1 {\n\t\treturn nil, errors.New(\"ent: AntenatalinformationGroupBy.Ints is not achievable when grouping more than 1 field\")\n\t}\n\tvar v []int\n\tif err := agb.Scan(ctx, &v); err != nil {\n\t\treturn nil, err\n\t}\n\treturn v, nil\n}", "title": "" }, { "docid": "72c6c082102ecd143d2437fba7055b32", "score": "0.47994134", "text": "func (rgb *RecommendationsGroupBy) Int(ctx context.Context) (_ int, err error) {\n\tvar v []int\n\tif v, err = rgb.Ints(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{recommendations.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: RecommendationsGroupBy.Ints returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "a4524fdf21018529f1b42a1f40214a23", "score": "0.47940853", "text": "func SplitToBulksInt(items []int, chunkSize uint) [][]int {\n\tif chunkSize <= 0 {\n\t\treturn make([][]int, 0)\n\t}\n\n\titemsLen := uint(len(items))\n\tchunksNum := int(math.Ceil(float64(len(items)) / float64(chunkSize)))\n\n\tret := make([][]int, 0, chunksNum)\n\n\tfor chunkStart := uint(0); chunkStart < itemsLen; chunkStart = chunkStart + chunkSize {\n\t\tchunkEnd := chunkStart + chunkSize\n\t\tif chunkEnd > itemsLen {\n\t\t\tchunkEnd = itemsLen\n\t\t}\n\n\t\tret = append(ret, items[chunkStart:chunkEnd])\n\t}\n\treturn ret\n}", "title": "" }, { "docid": "a5a1a116b530ab700e768b93abe271fb", "score": "0.4793431", "text": "func NewIntMap() *SkipList {\n\treturn NewCustomMap(func(l, r interface{}) bool {\n\t\treturn l.(int) < r.(int)\n\t})\n}", "title": "" }, { "docid": "7c59cea28bd7a7e05e850ed9c3ad4d81", "score": "0.47928864", "text": "func (r *IntegerDistinctReducer) AggregateInteger(p *IntegerPoint) {\n\tif _, ok := r.m[p.Value]; !ok {\n\t\tr.m[p.Value] = *p\n\t}\n}", "title": "" }, { "docid": "f05924f73c6f777397a14d1392d29632", "score": "0.4791194", "text": "func (s LINQ) GroupBy(keySelector Selector) LINQ {\n\treturn s.GroupByKV(keySelector, nil)\n}", "title": "" }, { "docid": "8216749389ebbee5c362554ec1cc6213", "score": "0.4790034", "text": "func (t *SearchTreeData) MapInt(f func(int) int) []int {\n\tres := make([]int, 0)\n\tif t.left != nil {\n\t\tres = append(res, t.left.MapInt(f)...)\n\t}\n\tres = append(res, f(t.data))\n\tif t.right != nil {\n\t\tres = append(res, t.right.MapInt(f)...)\n\t}\n\treturn res\n}", "title": "" }, { "docid": "ab265aabcac32e5c8dbbb2dabb7946c5", "score": "0.47893134", "text": "func (mwegb *MessageWithEnumGroupBy) Int(ctx context.Context) (_ int, err error) {\n\tvar v []int\n\tif v, err = mwegb.Ints(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{messagewithenum.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: MessageWithEnumGroupBy.Ints returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "title": "" }, { "docid": "af40aaeb978551d6dc6de71f75532ad4", "score": "0.4787198", "text": "func (bgb *BookcourseGroupBy) Ints(ctx context.Context) ([]int, error) {\n\tif len(bgb.fields) > 1 {\n\t\treturn nil, errors.New(\"ent: BookcourseGroupBy.Ints is not achievable when grouping more than 1 field\")\n\t}\n\tvar v []int\n\tif err := bgb.Scan(ctx, &v); err != nil {\n\t\treturn nil, err\n\t}\n\treturn v, nil\n}", "title": "" }, { "docid": "584a4f90c7f30fa45a5ece4d4660790e", "score": "0.47841308", "text": "func (bst *SearchTreeData) MapInt(f func(int) int) []int {\n\tif bst == nil {\n\t\treturn []int{}\n\t}\n\tright := append([]int{f(bst.data)}, bst.right.MapInt(f)...)\n\treturn append(bst.left.MapInt(f), right...)\n}", "title": "" }, { "docid": "f013e9ef79605b2c25aac8823cb0dbce", "score": "0.47791964", "text": "func (gsgb *GameServerGroupBy) Ints(ctx context.Context) ([]int, error) {\n\tif len(gsgb.fields) > 1 {\n\t\treturn nil, errors.New(\"ent: GameServerGroupBy.Ints is not achievable when grouping more than 1 field\")\n\t}\n\tvar v []int\n\tif err := gsgb.Scan(ctx, &v); err != nil {\n\t\treturn nil, err\n\t}\n\treturn v, nil\n}", "title": "" }, { "docid": "ffc34d088285711b775901aa53452eda", "score": "0.47702378", "text": "func (kngb *K8sNamespaceGroupBy) IntX(ctx context.Context) int {\n\tv, err := kngb.Int(ctx)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn v\n}", "title": "" }, { "docid": "1d6e754e2a4bd976af2bee6c082c68b1", "score": "0.47680005", "text": "func (asgb *AllocationStrategyGroupBy) Ints(ctx context.Context) ([]int, error) {\n\tif len(asgb.fields) > 1 {\n\t\treturn nil, errors.New(\"ent: AllocationStrategyGroupBy.Ints is not achievable when grouping more than 1 field\")\n\t}\n\tvar v []int\n\tif err := asgb.Scan(ctx, &v); err != nil {\n\t\treturn nil, err\n\t}\n\treturn v, nil\n}", "title": "" }, { "docid": "af3b51b9fd7498b10f17eeacb944f209", "score": "0.47624958", "text": "func (mwegb *MessageWithEnumGroupBy) Ints(ctx context.Context) ([]int, error) {\n\tif len(mwegb.fields) > 1 {\n\t\treturn nil, errors.New(\"ent: MessageWithEnumGroupBy.Ints is not achievable when grouping more than 1 field\")\n\t}\n\tvar v []int\n\tif err := mwegb.Scan(ctx, &v); err != nil {\n\t\treturn nil, err\n\t}\n\treturn v, nil\n}", "title": "" } ]
600a6694133924a0ca22aeec3b62b5cc
GetTCPCheck returns configuration version and the requested tcp check in the specified parent. Returns error on fail or if tcp check does not exist
[ { "docid": "c33855f379a4cb0db12290d6b3f65db8", "score": "0.81128734", "text": "func (c *client) GetTCPCheck(id int64, parentType string, parentName string, transactionID string) (int64, *models.TCPCheck, error) {\n\tp, err := c.GetParser(transactionID)\n\tif err != nil {\n\t\treturn 0, nil, err\n\t}\n\tv, err := c.GetVersion(transactionID)\n\tif err != nil {\n\t\treturn 0, nil, err\n\t}\n\n\tvar section parser.Section\n\tif parentType == \"backend\" {\n\t\tsection = parser.Backends\n\t} else if parentType == \"defaults\" {\n\t\tsection = parser.Defaults\n\t\tif parentName == \"\" {\n\t\t\tparentName = parser.DefaultSectionName\n\t\t}\n\t}\n\n\tdata, err := p.GetOne(section, parentName, \"tcp-check\", int(id))\n\tif err != nil {\n\t\treturn v, nil, c.HandleError(strconv.FormatInt(id, 10), parentType, parentName, \"\", false, err)\n\t}\n\n\ttcpCheck, err := ParseTCPCheck(data.(types.Action))\n\tif err != nil {\n\t\treturn v, nil, err\n\t}\n\ttcpCheck.Index = &id\n\treturn v, tcpCheck, nil\n}", "title": "" } ]
[ { "docid": "7b57433a86b037518ae35887cccffd51", "score": "0.7207517", "text": "func (c *client) GetTCPChecks(parentType, parentName string, transactionID string) (int64, models.TCPChecks, error) {\n\tp, err := c.GetParser(transactionID)\n\tif err != nil {\n\t\treturn 0, nil, err\n\t}\n\n\tv, err := c.GetVersion(transactionID)\n\tif err != nil {\n\t\treturn 0, nil, err\n\t}\n\n\ttcpRules, err := ParseTCPChecks(parentType, parentName, p)\n\tif err != nil {\n\t\treturn v, nil, c.HandleError(\"\", parentType, parentName, \"\", false, err)\n\t}\n\n\treturn v, tcpRules, nil\n}", "title": "" }, { "docid": "cbed9b2a69f84520039b086af7d4a01d", "score": "0.63482976", "text": "func (c *client) CreateTCPCheck(parentType string, parentName string, data *models.TCPCheck, transactionID string, version int64) error {\n\tif c.UseModelsValidation {\n\t\tvalidationErr := data.Validate(strfmt.Default)\n\t\tif validationErr != nil {\n\t\t\treturn NewConfError(ErrValidationError, validationErr.Error())\n\t\t}\n\t}\n\n\tp, t, err := c.loadDataForChange(transactionID, version)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tvar section parser.Section\n\tif parentType == \"backend\" {\n\t\tsection = parser.Backends\n\t} else if parentType == \"defaults\" {\n\t\tsection = parser.Defaults\n\t\tif parentName == \"\" {\n\t\t\tparentName = parser.DefaultSectionName\n\t\t}\n\t}\n\n\ts, err := SerializeTCPCheck(*data)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif err := p.Insert(section, parentName, \"tcp-check\", s, int(*data.Index)); err != nil {\n\t\treturn c.HandleError(strconv.FormatInt(*data.Index, 10), parentType, parentName, t, transactionID == \"\", err)\n\t}\n\treturn c.SaveData(p, t, transactionID == \"\")\n}", "title": "" }, { "docid": "d78ba3cfd650f959711c020703d54a07", "score": "0.6223758", "text": "func (c *client) DeleteTCPCheck(id int64, parentType string, parentName string, transactionID string, version int64) error {\n\tp, t, err := c.loadDataForChange(transactionID, version)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tvar section parser.Section\n\tif parentType == \"backend\" {\n\t\tsection = parser.Backends\n\t} else if parentType == \"defaults\" {\n\t\tsection = parser.Defaults\n\t\tif parentName == \"\" {\n\t\t\tparentName = parser.DefaultSectionName\n\t\t}\n\t}\n\n\tif err := p.Delete(section, parentName, \"tcp-check\", int(id)); err != nil {\n\t\treturn c.HandleError(strconv.FormatInt(id, 10), parentType, parentName, t, transactionID == \"\", err)\n\t}\n\n\treturn c.SaveData(p, t, transactionID == \"\")\n}", "title": "" }, { "docid": "1cd383eb27af6e6e86b99e1a4309a086", "score": "0.60175896", "text": "func (c *client) EditTCPCheck(id int64, parentType string, parentName string, data *models.TCPCheck, transactionID string, version int64) error { //nolint:dupl\n\tif c.UseModelsValidation {\n\t\tvalidationErr := data.Validate(strfmt.Default)\n\t\tif validationErr != nil {\n\t\t\treturn NewConfError(ErrValidationError, validationErr.Error())\n\t\t}\n\t}\n\tp, t, err := c.loadDataForChange(transactionID, version)\n\tif err != nil {\n\t\treturn err\n\t}\n\tvar section parser.Section\n\tif parentType == \"backend\" {\n\t\tsection = parser.Backends\n\t} else if parentType == \"defaults\" {\n\t\tsection = parser.Defaults\n\t\tif parentName == \"\" {\n\t\t\tparentName = parser.DefaultSectionName\n\t\t}\n\t}\n\n\tif _, err = p.GetOne(section, parentName, \"tcp-check\", int(id)); err != nil {\n\t\treturn c.HandleError(strconv.FormatInt(id, 10), parentType, parentName, t, transactionID == \"\", err)\n\t}\n\n\ts, err := SerializeTCPCheck(*data)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif err := p.Set(section, parentName, \"tcp-check\", s, int(id)); err != nil {\n\t\treturn c.HandleError(strconv.FormatInt(id, 10), parentType, parentName, t, transactionID == \"\", err)\n\t}\n\treturn c.SaveData(p, t, transactionID == \"\")\n}", "title": "" }, { "docid": "30d9e205e5706acd603432f1de1f37a7", "score": "0.59575915", "text": "func TCPChecker(addr string, timeout time.Duration) Checker {\n\treturn CheckFunc(func() error {\n\t\tconn, err := net.DialTimeout(\"tcp\", addr, timeout)\n\t\tif err != nil {\n\t\t\treturn errors.New(\"connection to \" + addr + \" failed\")\n\t\t}\n\t\tconn.Close()\n\t\treturn nil\n\t})\n}", "title": "" }, { "docid": "44edb89751801f1d2afaa7a67a558d4c", "score": "0.56396824", "text": "func NewTCPChecker(host string, port int, includes []string, timeout int) *TCPChecker {\n\tchecker := &TCPChecker{host: host,\n\t\tport: port,\n\t\tbaseChecker: NewBaseChecker(includes, timeout)}\n\tchecker.start()\n\treturn checker\n}", "title": "" }, { "docid": "6b32c1e848cc46503120dd78a3986e03", "score": "0.5296363", "text": "func NewHTTPCheck(base *Base) (Check, error) {\n\tcheck := &HTTPCheck{Base: *base}\n\terr := json.Unmarshal(*base.RawDetails, &check.Details)\n\tif err != nil {\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"prefix\": \"check_http\",\n\t\t\t\"err\": err,\n\t\t\t\"details\": string(*base.RawDetails),\n\t\t}).Error(\"Unable to unmarshal check details\")\n\t\treturn nil, err\n\t}\n\treturn check, nil\n}", "title": "" }, { "docid": "ffb976f2c41d6b0905d40b8fd7712d27", "score": "0.49829343", "text": "func GetHttpCheck(w http.ResponseWriter, r *http.Request, ps httprouter.Params) {\n\t// No auth for the user / server, this is accessible externally\n\tjr := jresp.NewJsonResp()\n\tid := ps.ByName(\"id\")\n\n\t// Get check and make sure it is active\n\tc := server.httpCheckStore.Get(id)\n\tif c == nil || c.Enabled == false {\n\t\tjr.Error(\"Check not found\")\n\t\tfmt.Fprint(w, jr.ToString(conf.Debug))\n\t\treturn\n\t}\n\n\t// Validate token\n\ttoken := r.URL.Query().Get(\"token\")\n\tif len(token) < 1 || token != c.SecureToken {\n\t\tjr.Error(\"Secure token invalid\")\n\t\tfmt.Fprint(w, jr.ToString(conf.Debug))\n\t\treturn\n\t}\n\n\t// Execute the config\n\tcr := server.consensus.AddRequest(c.TemplateId, c.ClientIds, server.httpCheckStore.SystemUser, \"\")\n\tif cr == nil {\n\t\tjr.Error(\"Unable to start check\")\n\t\tfmt.Fprint(w, jr.ToString(conf.Debug))\n\t\treturn\n\t}\n\n\t// Register callback\n\tdone := make(chan bool, 1)\n\tcb := func(cr *ConsensusRequest) {\n\t\tdone <- true\n\t}\n\tcr.AddCallback(cb)\n\n\t// Trigger execution\n\tcr.check()\n\n\t// Wait for success (or failure..)\n\tselect {\n\tcase <-time.After(time.Duration(c.Timeout) * time.Second):\n\t\tjr.Error(\"Timeout\")\n\t\tfmt.Fprint(w, jr.ToString(conf.Debug))\n\t\treturn\n\tcase <-done:\n\t}\n\n\t// Cleanup\n\tcr.Delete()\n\n\t// Print results\n\tjr.OK()\n\tfmt.Fprint(w, jr.ToString(conf.Debug))\n}", "title": "" }, { "docid": "effcee8dfeaa3b5bbf785a4b6792d888", "score": "0.4857061", "text": "func (in *TCPCheck) DeepCopy() *TCPCheck {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(TCPCheck)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "title": "" }, { "docid": "e66d4886407f86949e21075aa6a75c5c", "score": "0.47495186", "text": "func NewCheck(svcID string, cfg *Config) (*Check, error) {\n\t{ // verify service id\n\t\tfound, err := regexp.MatchString(`^(aws|azure|gcp)$`, svcID)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"checking service id\")\n\t\t}\n\t\tif !found {\n\t\t\treturn nil, errors.Errorf(\"invalid service id (%s)\", svcID)\n\t\t}\n\t}\n\n\tif cfg == nil {\n\t\treturn nil, errors.New(\"invalid config (nil)\")\n\t}\n\n\tc := &Check{\n\t\tconfig: cfg,\n\t\terrorMetricName: strings.ReplaceAll(release.NAME, \"-\", \"_\") + \"_errors\", // TBD: may become a config option\n\t\tlogger: cfg.Logger.With().Str(\"pkg\", \"check\").Logger(),\n\t\tmetricTypeRx: regexp.MustCompile(\"^[\" + strings.Join([]string{\n\t\t\tMetricTypeInt32,\n\t\t\tMetricTypeUint32,\n\t\t\tMetricTypeInt64,\n\t\t\tMetricTypeUint64,\n\t\t\tMetricTypeFloat64,\n\t\t\tMetricTypeString,\n\t\t}, \"\") + \"]$\"),\n\t\tcheckType: \"httptrap:cloud_agent_\" + svcID,\n\t}\n\n\tif err := c.initAPI(); err != nil {\n\t\treturn nil, errors.Wrap(err, \"initializing Circonus API\")\n\t}\n\n\tif err := c.initializeCheckBundle(); err != nil {\n\t\treturn nil, errors.Wrap(err, \"initializing check\")\n\t}\n\tif _, ok := c.bundle.Config[apiclicfg.SubmissionURL]; !ok {\n\t\treturn nil, errors.Errorf(\"check bundle invalid, missing submission url\")\n\t}\n\n\tif err := c.initializeBroker(); err != nil {\n\t\treturn nil, errors.Wrap(err, \"initializing broker\")\n\t}\n\n\treturn c, nil\n}", "title": "" }, { "docid": "119abdf943b0285a4385baac5f5c42d3", "score": "0.4698974", "text": "func (tc *TCPChecker) Check() bool {\n\tret := tc.baseChecker.Check()\n\tif tc.conn != nil {\n\t\ttc.conn.Close()\n\t}\n\treturn ret\n}", "title": "" }, { "docid": "e5c2176d029998463585f576f0581773", "score": "0.46133327", "text": "func (s *Store) txnCheck(tx *memdb.Txn, idx uint64, op *structs.TxnCheckOp) (structs.TxnResults, error) {\n\tvar entry *structs.HealthCheck\n\tvar err error\n\n\tswitch op.Verb {\n\tcase api.CheckGet:\n\t\t_, entry, err = s.getNodeCheckTxn(tx, op.Check.Node, op.Check.CheckID)\n\t\tif entry == nil && err == nil {\n\t\t\terr = fmt.Errorf(\"check %q on node %q doesn't exist\", op.Check.CheckID, op.Check.Node)\n\t\t}\n\n\tcase api.CheckSet:\n\t\terr = s.ensureCheckTxn(tx, idx, &op.Check)\n\t\tif err == nil {\n\t\t\t_, entry, err = s.getNodeCheckTxn(tx, op.Check.Node, op.Check.CheckID)\n\t\t}\n\n\tcase api.CheckCAS:\n\t\tvar ok bool\n\t\tentry = &op.Check\n\t\tok, err = s.ensureCheckCASTxn(tx, idx, entry)\n\t\tif !ok && err == nil {\n\t\t\terr = fmt.Errorf(\"failed to set check %q on node %q, index is stale\", entry.CheckID, entry.Node)\n\t\t\tbreak\n\t\t}\n\t\t_, entry, err = s.getNodeCheckTxn(tx, op.Check.Node, op.Check.CheckID)\n\n\tcase api.CheckDelete:\n\t\terr = s.deleteCheckTxn(tx, idx, op.Check.Node, op.Check.CheckID)\n\n\tcase api.CheckDeleteCAS:\n\t\tvar ok bool\n\t\tok, err = s.deleteCheckCASTxn(tx, idx, op.Check.ModifyIndex, op.Check.Node, op.Check.CheckID)\n\t\tif !ok && err == nil {\n\t\t\terr = fmt.Errorf(\"failed to delete check %q on node %q, index is stale\", op.Check.CheckID, op.Check.Node)\n\t\t}\n\n\tdefault:\n\t\terr = fmt.Errorf(\"unknown Check verb %q\", op.Verb)\n\t}\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// For a GET we keep the value, otherwise we clone and blank out the\n\t// value (we have to clone so we don't modify the entry being used by\n\t// the state store).\n\tif entry != nil {\n\t\tif op.Verb == api.CheckGet {\n\t\t\tresult := structs.TxnResult{Check: entry}\n\t\t\treturn structs.TxnResults{&result}, nil\n\t\t}\n\n\t\tclone := entry.Clone()\n\t\tresult := structs.TxnResult{Check: clone}\n\t\treturn structs.TxnResults{&result}, nil\n\t}\n\n\treturn nil, nil\n}", "title": "" }, { "docid": "b765173ac0522ae1651fed2ad2a725f9", "score": "0.46017745", "text": "func NewMsgGetCFCheckpt(filterType FilterType, stopHash *chainhash.Hash) *MsgGetCFCheckpt {\n\treturn &MsgGetCFCheckpt{\n\t\tFilterType: filterType,\n\t\tStopHash: *stopHash,\n\t}\n}", "title": "" }, { "docid": "73077104b1eb34cb6130af608dc66283", "score": "0.45698893", "text": "func CfgChangeDetectionTiming(TaskHandle unsafe.Pointer, RisingEdgeChan string, FallingEdgeChan string, SampleMode int32, SampsPerChan uint64) int32 {\n\tcTaskHandle, _ := (C.TaskHandle)(TaskHandle), cgoAllocsUnknown\n\tcRisingEdgeChan, _ := unpackPCharString(RisingEdgeChan)\n\tcFallingEdgeChan, _ := unpackPCharString(FallingEdgeChan)\n\tcSampleMode, _ := (C.int32)(SampleMode), cgoAllocsUnknown\n\tcSampsPerChan, _ := (C.uInt64)(SampsPerChan), cgoAllocsUnknown\n\t__ret := C.DAQmxCfgChangeDetectionTiming(cTaskHandle, cRisingEdgeChan, cFallingEdgeChan, cSampleMode, cSampsPerChan)\n\t__v := (int32)(__ret)\n\treturn __v\n}", "title": "" }, { "docid": "c0d914eebdd663e6fa3c0a216d8549fc", "score": "0.45680973", "text": "func (checker *HTTPChecker) Check() Status {\n\thost, port, err := net.SplitHostPort(checker.Address)\n\tif err != nil {\n\t\treturn Status{false, err.Error()}\n\t} else if host == \"\" {\n\t\thost = requestHost\n\t}\n\n\tclient := checker.Client\n\tif client == nil {\n\t\tclient = &http.Client{\n\t\t\tTransport: &http.Transport{\n\t\t\t\tTLSClientConfig: &tls.Config{\n\t\t\t\t\tInsecureSkipVerify: true,\n\t\t\t\t},\n\t\t\t},\n\t\t}\n\t}\n\n\tvar url url.URL\n\turl.Scheme = \"https\"\n\turl.Host = net.JoinHostPort(host, port)\n\turl.Path = requestPath\n\n\tresponse, err := client.Get(url.String())\n\tif err != nil {\n\t\treturn Status{false, err.Error()}\n\t}\n\n\tdefer response.Body.Close()\n\n\tcontent, err := ioutil.ReadAll(response.Body)\n\tif err != nil {\n\t\treturn Status{false, err.Error()}\n\t}\n\n\treturn Status{\n\t\t200 <= response.StatusCode && response.StatusCode <= 299,\n\t\tstring(content),\n\t}\n}", "title": "" }, { "docid": "0605b0322c2f7aa523c27631ffe14cc8", "score": "0.45521247", "text": "func (*ASPNetCoreVersion) Check(c *StepConfig) error {\n\treturn checkCloudBuildVersionMap(aspNetCorePath, aspNetCoreBucket(c.Value), c)\n}", "title": "" }, { "docid": "52c42662e31b66a0dc8ceeb370856102", "score": "0.45300022", "text": "func NewCheck(name string, checker Checker) Check {\n\tmustParseFlags()\n\tconf, err := config.BuildConfig()\n\tif err != nil {\n\t\t// In case config can not be built the the only thing we can do is to raise a panic!!\n\t\tpanic(err)\n\t}\n\n\tvar c Check\n\tlogger := logging.BuildRootLogWithNameAndConfig(\"check\", conf, name)\n\tlogger.WithFields(log.Fields{\"config\": conf}).Debug(\"Building check with configuration\")\n\n\tb := true\n\tif testMode {\n\t\tlogger.WithField(\"testMode\", testMode).Debug(\"Test mode\")\n\n\t\t// In test mode allow scanning private IPs by default.\n\t\tif conf.AllowPrivateIPs == nil {\n\t\t\tconf.AllowPrivateIPs = &b\n\t\t}\n\t\tc = newCheckWithTestAgent(name, checker, logger, conf)\n\t} else if runTarget != \"\" {\n\t\t// In run mode allow scanning private IPs by default.\n\t\tif conf.AllowPrivateIPs == nil {\n\t\t\tconf.AllowPrivateIPs = &b\n\t\t}\n\n\t\tconf.Check.Target = runTarget\n\t\tconf.Check.Opts = options\n\t\tc = newLocalCheck(name, checker, logger, conf, json)\n\t} else {\n\t\tlogger.Debug(\"Push mode\")\n\t\tc = push.NewCheckWithConfig(name, checker, logger, conf)\n\t}\n\tcachedConfig = conf\n\treturn c\n}", "title": "" }, { "docid": "70773ee269c95936f7d2785a23eae8fb", "score": "0.4496638", "text": "func TotpCheck(id string) (*TotpResponse, error) {\n\trequest := NewTotpRequest(id)\n\treturn request.Check()\n}", "title": "" }, { "docid": "15c13c94baad11b1fe7882d158edc157", "score": "0.4452585", "text": "func (c *Client) GetCheck(ctx context.Context, id string) (*GetCheckResponse, error) {\n\turl := api + \"/check/\" + id\n\tresp := &GetCheckResponse{}\n\terr := c.get(ctx, url, nil, resp)\n\treturn resp, err\n}", "title": "" }, { "docid": "54ab1bc9fe56e440ee9a6de618ff79c1", "score": "0.44207737", "text": "func (ch *HTTPCheck) Run() (*ResultSet, error) {\n\t// TODO: refactor. High cyclomatic complexity (21)\n\tlog.WithFields(log.Fields{\n\t\t\"prefix\": ch.GetLogPrefix(),\n\t\t\"type\": ch.CheckType,\n\t\t\"id\": ch.Id,\n\t}).Debug(\"Running HTTP Check\")\n\n\tctx, cancel := context.WithTimeout(context.Background(), ch.GetTimeoutDuration())\n\tdefer cancel()\n\n\tsl := utils.NewStatusLine()\n\tcr := NewResult()\n\tcrs := NewResultSet(ch, cr)\n\tstarttime := utils.NowTimestampMillis()\n\n\t// Parse URL and Replace Host with IP\n\tparsed, err := url.Parse(ch.Details.Url)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\thost, port, err := net.SplitHostPort(parsed.Host)\n\tif err != nil {\n\t\tif strings.Contains(err.Error(), \"missing port in address\") {\n\t\t\tif len(port) == 0 {\n\t\t\t\tif parsed.Scheme == \"http\" {\n\t\t\t\t\tport = DefaultPort\n\t\t\t\t} else {\n\t\t\t\t\tport = DefaultSecurePort\n\t\t\t\t}\n\t\t\t\thost = parsed.Host\n\t\t\t}\n\t\t} else {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\tip, err := ch.GetTargetIP()\n\tif err != nil && err != ErrInvalidTargetIP {\n\t\treturn crs, err\n\t}\n\tif ip == \"\" {\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"prefix\": ch.GetLogPrefix(),\n\t\t}).Debug(\"Setting host to IP. IP was an empty string\")\n\t\tip = host\n\t}\n\tparsed.Host = net.JoinHostPort(ip, port)\n\turl := parsed.String()\n\n\tvar netClient *http.Client\n\ttlsConfig := &tls.Config{InsecureSkipVerify: true, ServerName: host}\n\ttransport := &http.Transport{\n\t\tDisableKeepAlives: true,\n\t\tTLSClientConfig: tlsConfig,\n\t\tDialContext: NewCustomDialContext(ch.TargetResolver),\n\t}\n\tnetClient = &http.Client{Transport: transport}\n\n\t// Setup Redirects\n\tif !ch.Details.FollowRedirects {\n\t\tnetClient.CheckRedirect = disableRedirects\n\t}\n\n\t// Setup Method\n\tmethod := strings.ToUpper(ch.Details.Method)\n\n\tlog.WithFields(log.Fields{\n\t\t\"prefix\": ch.GetLogPrefix(),\n\t\t\"method\": method,\n\t\t\"url\": url,\n\t}).Info(\"Running check\")\n\n\t// Setup Request\n\treq, err := http.NewRequest(method, url, nil)\n\tif err != nil {\n\t\tcrs.SetStatusFromError(err)\n\t\tcrs.SetStateUnavailable()\n\t\treturn crs, nil\n\t}\n\n\t// Setup Auth\n\tif len(ch.Details.AuthUser) > 0 && len(ch.Details.AuthPassword) > 0 {\n\t\treq.SetBasicAuth(ch.Details.AuthUser, ch.Details.AuthPassword)\n\t}\n\t// Setup Tracing\n\ttrace := &httptrace.ClientTrace{\n\t\tGotFirstResponseByte: func() {\n\t\t\tfirstbytetime := utils.NowTimestampMillis()\n\t\t\tcr.AddMetric(metric.NewMetric(\"tt_firstbyte\", \"\", metric.MetricNumber, firstbytetime-starttime, \"milliseconds\"))\n\t\t},\n\t\tConnectDone: func(network, addr string, err error) {\n\t\t\tconnectdonetime := utils.NowTimestampMillis()\n\t\t\tcr.AddMetric(metric.NewMetric(\"tt_connect\", \"\", metric.MetricNumber, connectdonetime-starttime, \"milliseconds\"))\n\n\t\t},\n\t}\n\treq = req.WithContext(httptrace.WithClientTrace(ctx, trace))\n\n\t// Add Headers\n\treq.Header.Add(\"User-Agent\", UserAgent)\n\treq.Host = host\n\tfor key, value := range ch.Details.Headers {\n\t\treq.Header.Add(key, value)\n\t}\n\n\t// Perform Request\n\tresp, err := netClient.Do(req)\n\tif err != nil {\n\t\tcrs.SetStatus(\"connection refused\")\n\t\tcrs.SetStateUnavailable()\n\t\treturn crs, nil\n\t}\n\tdefer resp.Body.Close()\n\n\t// Read Body\n\tbody, err := ch.readLimit(resp.Body, MaxHTTPResponseBodyLength)\n\tif err != nil {\n\t\tcrs.SetStatusFromError(err)\n\t\tcrs.SetStateUnavailable()\n\t\treturn crs, nil\n\t}\n\tendtime := utils.NowTimestampMillis()\n\n\t// Parse Body\n\tif len(ch.Details.Body) > 0 {\n\t\tre, err := regexp.Compile(ch.Details.Body)\n\t\tif err != nil {\n\t\t\tcrs.SetStatusFromError(err)\n\t\t\tcrs.SetStateUnavailable()\n\t\t\treturn crs, nil\n\t\t}\n\t\tif m := re.FindSubmatch(body); m != nil {\n\t\t\tcr.AddMetric(metric.NewMetric(\"body_match\", \"\", metric.MetricString, string(m[0]), \"string\"))\n\t\t} else {\n\t\t\tcr.AddMetric(metric.NewMetric(\"body_match\", \"\", metric.MetricString, \"\", \"string\"))\n\t\t}\n\t}\n\n\t// Body Matches\n\tfor key, regex := range ch.Details.BodyMatches {\n\t\tre, err := regexp.Compile(regex)\n\t\tif err != nil {\n\t\t\tcrs.SetStatusFromError(err)\n\t\t\tcrs.SetStateUnavailable()\n\t\t\treturn crs, nil\n\t\t}\n\t\tif m := re.FindSubmatch(body); m != nil {\n\t\t\tcr.AddMetric(metric.NewMetric(fmt.Sprintf(\"body_match_%s\", key), \"\", metric.MetricString, string(m[1]), \"\"))\n\t\t} else {\n\t\t\tcr.AddMetric(metric.NewMetric(fmt.Sprintf(\"body_match_%s\", key), \"\", metric.MetricString, \"\", \"\"))\n\t\t}\n\t}\n\n\ttruncated := int64(0)\n\tif int64(len(body)) > MaxHTTPResponseBodyLength {\n\t\ttruncated = int64(1)\n\t}\n\n\t// Status Code Numeral\n\tvar code100 int\n\tvar code200 int\n\tvar code300 int\n\tvar code400 int\n\tvar code500 int\n\tcodeStr := strconv.Itoa(resp.StatusCode)\n\tcodeFamily := int(math.Floor(float64(resp.StatusCode) / 100.0))\n\tswitch codeFamily {\n\tcase 1:\n\t\tcode100 = 1\n\tcase 2:\n\t\tcode200 = 1\n\tcase 3:\n\t\tcode300 = 1\n\tcase 4:\n\t\tcode400 = 1\n\tcase 5:\n\t\tcode500 = 1\n\t}\n\tcr.AddMetric(metric.NewMetric(\"code_100\", \"\", metric.MetricNumber, code100, \"\"))\n\tcr.AddMetric(metric.NewMetric(\"code_200\", \"\", metric.MetricNumber, code200, \"\"))\n\tcr.AddMetric(metric.NewMetric(\"code_300\", \"\", metric.MetricNumber, code300, \"\"))\n\tcr.AddMetric(metric.NewMetric(\"code_400\", \"\", metric.MetricNumber, code400, \"\"))\n\tcr.AddMetric(metric.NewMetric(\"code_500\", \"\", metric.MetricNumber, code500, \"\"))\n\n\tcr.AddMetric(metric.NewMetric(\"code\", \"\", metric.MetricString, codeStr, \"\"))\n\tcr.AddMetric(metric.NewMetric(\"duration\", \"\", metric.MetricNumber, endtime-starttime, \"milliseconds\"))\n\tcr.AddMetric(metric.NewMetric(\"bytes\", \"\", metric.MetricNumber, len(body), \"bytes\"))\n\tcr.AddMetric(metric.NewMetric(\"truncated\", \"\", metric.MetricNumber, truncated, \"bool\"))\n\n\tif ch.Details.IncludeBody {\n\t\tcr.AddMetric(metric.NewMetric(\"body\", \"\", metric.MetricString, string(body), \"\"))\n\t}\n\n\t// TLS\n\tif resp.TLS != nil {\n\t\tmetrics := ch.AddTLSMetrics(cr, *resp.TLS)\n\t\tif !metrics.Verified {\n\t\t\tsl.AddOption(\"sslerror\")\n\t\t}\n\t}\n\n\t// Status Line\n\tsl.Add(\"code\", resp.StatusCode)\n\tsl.Add(\"duration\", endtime-starttime)\n\tsl.Add(\"bytes\", len(body))\n\tsl.Add(\"truncated\", truncated)\n\n\tcrs.SetStateAvailable()\n\tcrs.SetStatus(sl.String())\n\treturn crs, nil\n}", "title": "" }, { "docid": "9a0aef0e6e55215dedfa8f5e41c09d87", "score": "0.44128692", "text": "func (o *IdentityVerificationStepSummary) GetKycCheck() IdentityVerificationStepStatus {\n\tif o == nil {\n\t\tvar ret IdentityVerificationStepStatus\n\t\treturn ret\n\t}\n\n\treturn o.KycCheck\n}", "title": "" }, { "docid": "3e27c5ae41fd9000d4f870c03d1618e8", "score": "0.4403966", "text": "func (f Freeform) getCheckStatus(ctx context.Context, serviceName string, checkAction Checker) (res freeformCheckResult) {\n\tres.ServiceName = serviceName\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\tres.Err = ex.Append(res.Err, ex.New(r))\n\t\t}\n\t\tif res.Err != nil {\n\t\t\tlogger.MaybeErrorContext(ctx, f.Log, res.Err)\n\t\t} else {\n\t\t\tres.Ok = true\n\t\t}\n\t\treturn\n\t}()\n\ttimeoutCtx, cancel := context.WithTimeout(ctx, f.timeoutOrDefault())\n\tdefer cancel()\n\tres.Err = checkAction.Check(timeoutCtx)\n\treturn\n}", "title": "" }, { "docid": "b970c9ad763f64d01fdf12df33a9d3c0", "score": "0.43957654", "text": "func GetCheckStatus(ThWarning int, ThCritical int, HASessionsMax int, HASessionsCurrent int, HAStatusState string) int {\n\tCheckStatus := 2\n\tif HAStatusState == \"OPEN\" || HAStatusState == \"UP\" {\n\t\tif HASessionsCurrent < ThWarning && HASessionsCurrent < ThCritical {\n\t\t\tCheckStatus = 0\n\t\t}\n\t\tif HASessionsCurrent >= ThWarning {\n\t\t\tCheckStatus = 1\n\t\t}\n\t\tif HASessionsCurrent >= ThCritical {\n\t\t\tCheckStatus = 2\n\t\t}\n\t\tif HASessionsMax == 0 || HASessionsCurrent == 0 {\n\t\t\tCheckStatus = 0\n\t\t}\n\t}\n\treturn CheckStatus\n}", "title": "" }, { "docid": "80cae2d7998c62147ec2a623ebb3033a", "score": "0.43946248", "text": "func versionCheckTask(ctx context.Context, clientProvider httpclient.Provider) *task.Config {\n\ttaskConfig := task.Config{\n\t\tContext: ctx,\n\t\tID: \"version_check\",\n\t\tFunc: func(ctx context.Context) error {\n\t\t\tcheckCtx, cancel := context.WithTimeout(ctx, versionCheckTimeout)\n\t\t\tdefer cancel()\n\n\t\t\tclient, err := clientProvider.HTTPClient(checkCtx)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tupdate, err := version.CheckUpdate(checkCtx, version.WithClient(client))\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tversion.LogUpdate(checkCtx, update)\n\n\t\t\tselect {\n\t\t\tcase <-ctx.Done():\n\t\t\t\treturn ctx.Err()\n\t\t\tcase <-time.After(versionCheckPeriod):\n\t\t\t\treturn nil\n\t\t\t}\n\t\t},\n\t\tRestart: task.RestartAlways,\n\t\tBackoff: task.DialBackoffConfig,\n\t}\n\treturn &taskConfig\n}", "title": "" }, { "docid": "1a7cb624a3e5d8698aefac84128cf1c6", "score": "0.43867305", "text": "func (c *client) GetTCPResponseRule(id int64, backend string, transactionID string) (int64, *models.TCPResponseRule, error) {\n\tp, err := c.GetParser(transactionID)\n\tif err != nil {\n\t\treturn 0, nil, err\n\t}\n\n\tv, err := c.GetVersion(transactionID)\n\tif err != nil {\n\t\treturn 0, nil, err\n\t}\n\n\tdata, err := p.GetOne(parser.Backends, backend, \"tcp-response\", int(id))\n\tif err != nil {\n\t\treturn v, nil, c.HandleError(strconv.FormatInt(id, 10), \"backend\", backend, \"\", false, err)\n\t}\n\n\ttcpRule, parseErr := ParseTCPResponseRule(data.(types.TCPType))\n\tif parseErr != nil {\n\t\treturn 0, nil, parseErr\n\t}\n\ttcpRule.Index = &id\n\n\treturn v, tcpRule, nil\n}", "title": "" }, { "docid": "c066fd03d09e78cf323ac99906f87283", "score": "0.4386548", "text": "func (t *transportTCP) getTLSConfig(servername string) (tlsConfig *tls.Config) {\n\ttlsConfig = new(tls.Config)\n\n\ttlsConfig.MinVersion = t.config.MinTLSVersion\n\ttlsConfig.MaxVersion = t.config.MaxTLSVersion\n\n\t// Set the certificate if we set one\n\tif t.config.Certificate != nil {\n\t\ttlsConfig.Certificates = []tls.Certificate{*t.config.Certificate}\n\t}\n\n\t// Set CA for server verification\n\ttlsConfig.RootCAs = x509.NewCertPool()\n\tfor _, cert := range t.config.CaList {\n\t\ttlsConfig.RootCAs.AddCert(cert)\n\t}\n\n\t// Set the tlsConfig server name for server validation (required since Go 1.3)\n\ttlsConfig.ServerName = servername\n\n\treturn\n}", "title": "" }, { "docid": "eb4cf8d0adb97d4f543592c2c8553eba", "score": "0.43790284", "text": "func (s *Store) GetCheckConfigWatcher(ctx context.Context) <-chan store.WatchEventCheckConfig {\n\tkey := checkKeyBuilder.WithContext(ctx).Build()\n\tw := Watch(ctx, s.client, key, true)\n\tch := make(chan store.WatchEventCheckConfig, 1)\n\n\tgo func() {\n\t\tdefer close(ch)\n\t\tfor response := range w.Result() {\n\t\t\tif response.Type == store.WatchUnknown {\n\t\t\t\tlogger.Error(\"unknown etcd watch type: \", response.Type)\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tvar checkConfig corev2.CheckConfig\n\n\t\t\tif response.Type == store.WatchDelete {\n\t\t\t\tmeta := store.ParseResourceKey(response.Key)\n\t\t\t\tcheckConfig.Namespace = meta.Namespace\n\t\t\t\tcheckConfig.Name = meta.ResourceName\n\t\t\t} else {\n\t\t\t\tif err := unmarshal(response.Object, &checkConfig); err != nil {\n\t\t\t\t\tlogger.WithField(\"key\", response.Key).WithError(err).Error(\"unable to unmarshal check config from key\")\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tch <- store.WatchEventCheckConfig{\n\t\t\t\tAction: response.Type,\n\t\t\t\tCheckConfig: &checkConfig,\n\t\t\t}\n\t\t}\n\t}()\n\n\treturn ch\n}", "title": "" }, { "docid": "eb3dfd400a8bdcd29a324f325fc4fa06", "score": "0.4374449", "text": "func (c *client) GetTCPResponseRules(backend string, transactionID string) (int64, models.TCPResponseRules, error) {\n\tp, err := c.GetParser(transactionID)\n\tif err != nil {\n\t\treturn 0, nil, err\n\t}\n\n\tv, err := c.GetVersion(transactionID)\n\tif err != nil {\n\t\treturn 0, nil, err\n\t}\n\n\ttcpRules, err := ParseTCPResponseRules(backend, p)\n\tif err != nil {\n\t\treturn v, nil, c.HandleError(\"\", \"backend\", backend, \"\", false, err)\n\t}\n\n\treturn v, tcpRules, nil\n}", "title": "" }, { "docid": "156c896b8c56c505aa069547d6c8eef3", "score": "0.43602842", "text": "func (t *Temporal) Check(ctx context.Context) (err error) {\n\tconn, err := t.getGRPCConn(ctx)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer func(conn *grpc.ClientConn) {\n\t\tif connErr := conn.Close(); connErr != nil {\n\t\t\terr = connErr\n\t\t}\n\t}(conn)\n\tswitch t.checkMode {\n\tcase CheckModeWorker:\n\t\tif t.namespace == \"\" {\n\t\t\treturn ErrNoNamespace\n\t\t}\n\n\t\tif t.taskQueue == \"\" {\n\t\t\treturn ErrNoTaskQueue\n\t\t}\n\n\t\treturn t.checkWorker(ctx, conn)\n\n\tcase CheckModeServer:\n\t\treturn t.checkServer(ctx, conn)\n\n\tdefault:\n\t\treturn ErrInvalidMode\n\t}\n}", "title": "" }, { "docid": "ecd1db2e60e14a4e3362d37324f6743e", "score": "0.43583265", "text": "func getTLSPeerCert(cs *tls.ConnectionState) *x509.Certificate {\n\tif len(cs.PeerCertificates) == 0 {\n\t\treturn nil\n\t}\n\treturn cs.PeerCertificates[0]\n}", "title": "" }, { "docid": "eb0b04661f369e87c57b9df6154e097f", "score": "0.43435144", "text": "func HTTPChecker(r string, statusCode int, timeout time.Duration, headers http.Header) Checker {\n\treturn CheckFunc(func() error {\n\t\tclient := http.Client{\n\t\t\tTimeout: timeout,\n\t\t}\n\t\treq, err := http.NewRequest(\"GET\", r, nil)\n\t\tif err != nil {\n\t\t\treturn errors.New(\"error creating request: \" + r)\n\t\t}\n\t\tfor headerName, headerValues := range headers {\n\t\t\tfor _, headerValue := range headerValues {\n\t\t\t\treq.Header.Add(headerName, headerValue)\n\t\t\t}\n\t\t}\n\t\tresponse, err := client.Do(req)\n\t\tif err != nil {\n\t\t\treturn errors.New(\"error while checking: \" + r)\n\t\t}\n\t\tdefer response.Body.Close()\n\t\tif response.StatusCode != statusCode {\n\t\t\treturn errors.New(\"downstream service returned unexpected status: \" + strconv.Itoa(response.StatusCode))\n\t\t}\n\t\treturn nil\n\t})\n}", "title": "" }, { "docid": "f152305874a9f90d5d5affb2db505501", "score": "0.43419078", "text": "func TestCheck_1(t *testing.T) {\n\t// mock backend\n\tts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tfmt.Fprintln(w, \"Hello, client\")\n\t}))\n\tdefer ts.Close()\n\n\t// prepare input\n\tbackend := BfeBackend{\n\t\tAddrInfo: strings.TrimPrefix(ts.URL, \"http://\"),\n\t}\n\tschem := \"http\"\n\tstatusCode := cluster_conf.AnyStatusCode\n\turi := \"\"\n\tsuccNum := 2\n\tcheckInterval := 1\n\n\tcheckConf := cluster_conf.BackendCheck{\n\t\tSchem: &schem,\n\t\tStatusCode: &statusCode,\n\t\tUri: &uri,\n\t\tSuccNum: &succNum,\n\t\tCheckInterval: &checkInterval,\n\t}\n\n\tmockCheckConfFetcher := func(cluster string) *cluster_conf.BackendCheck {\n\t\treturn &checkConf\n\t}\n\tcheckConfFetcher = mockCheckConfFetcher\n\n\t// check func\n\tcheck(&backend, \"\")\n\n\tif backend.SuccNum() != 0 {\n\t\tt.Errorf(\"recover num should be 0\")\n\t}\n}", "title": "" }, { "docid": "45e3817aca2bda1a4a307408cda65205", "score": "0.4338306", "text": "func (s *CNIServer) CNIcheck(ctx context.Context, in *CNIcheckMsg) (*CHECKresult, error) {\n\n\tlog.Printf(\"Receive message Conf file: %s\", in.Conf)\n\tlog.Printf(\"Receive message ContainerID: %s\", in.ContainerID)\n\tlog.Printf(\"Receive message NetNS: %s\", in.NetNS)\n\tlog.Printf(\"Receive message IfName: %s\", in.IfName)\n\tlog.Printf(\"Receive message CniArgs: %s\", in.CniArgs)\n\tlog.Printf(\"Receive message CniCapArgs: %s\", in.CapArgs)\n\n\tnetconf, rt, cninet, err := cniCommon(in.Conf, in.NetNS, in.IfName, in.CniArgs, in.CapArgs)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\terr = cninet.CheckNetworkList(context.TODO(), netconf, rt)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tcniResult := CHECKresult{\n\t\tError: \"\",\n\t}\n\n\tlog.Printf(\"Response from server: %s\", cniResult.Error)\n\treturn &cniResult, nil\n}", "title": "" }, { "docid": "1ccfa2145a9103c9688680b237e271f6", "score": "0.4329176", "text": "func getTLSConfig() *tls.Config {\n\ttestConfig := &tls.Config{\n\t\tTime: func() time.Time { return time.Unix(0, 0) },\n\t\tCertificates: make([]tls.Certificate, 2),\n\t\tInsecureSkipVerify: true,\n\t\tMinVersion: tls.VersionSSL30,\n\t\tMaxVersion: tls.VersionTLS12,\n\t}\n\ttestConfig.Certificates[0].Certificate = [][]byte{testRSACertificate}\n\ttestConfig.Certificates[0].PrivateKey = testRSAPrivateKey\n\ttestConfig.Certificates[1].Certificate = [][]byte{testSNICertificate}\n\ttestConfig.Certificates[1].PrivateKey = testRSAPrivateKey\n\ttestConfig.BuildNameToCertificate()\n\treturn testConfig\n}", "title": "" }, { "docid": "e2215ea133a6523887a9dc10511b3015", "score": "0.43254676", "text": "func (_LuxUni_PKI_valid *LuxUni_PKI_validCallerSession) CheckCert(_newHash [32]byte, _addrCA common.Address, _addrRoot common.Address) (*big.Int, error) {\n\treturn _LuxUni_PKI_valid.Contract.CheckCert(&_LuxUni_PKI_valid.CallOpts, _newHash, _addrCA, _addrRoot)\n}", "title": "" }, { "docid": "cfaefe7d4f9f1f68afb5fcb42eda4ac2", "score": "0.4320973", "text": "func (c *MockLogClient) GetConsistencyProof(ctx context.Context, in *trillian.GetConsistencyProofRequest, opts ...grpc.CallOption) (*trillian.GetConsistencyProofResponse, error) {\n\tresp, err := c.c.GetConsistencyProof(ctx, in)\n\tif c.mGetConsistencyProof {\n\t\ti := rand.Intn(len(resp.Proof.ProofNode))\n\t\tj := rand.Intn(len(resp.Proof.ProofNode[i].NodeHash))\n\t\tresp.Proof.ProofNode[i].NodeHash[j] ^= 4\n\t}\n\treturn resp, err\n}", "title": "" }, { "docid": "9a23d521f5eca22ffe648092ce471abb", "score": "0.43024936", "text": "func (fn WorkloadHealthCheckFn) Check(ctx context.Context, c client.Client, tr runtimev1alpha1.TypedReference, ns string) *WorkloadHealthCondition {\n\tr := fn(ctx, c, tr, ns)\n\tif r == nil {\n\t\treturn r\n\t}\n\t// check all workloads of a version-enabled component\n\tpeerRefs, err := getVersioningPeerWorkloadRefs(ctx, c, tr, ns)\n\tif err != nil {\n\t\tr.HealthStatus = StatusUnhealthy\n\t\tr.Diagnosis = fmt.Sprintf(\"%s %s:%s\",\n\t\t\tr.Diagnosis,\n\t\t\terrGetVersioningWorkloads,\n\t\t\terr.Error())\n\t\treturn r\n\t}\n\n\tif len(peerRefs) > 0 {\n\t\tvar peerHCs PeerHealthConditions\n\t\tfor _, peerRef := range peerRefs {\n\t\t\tif peerHC := fn(ctx, c, peerRef, ns); peerHC != nil {\n\t\t\t\tpeerHCs = append(peerHCs, *peerHC.DeepCopy())\n\t\t\t}\n\t\t}\n\t\tpeerHCs.MergePeerWorkloadsConditions(r)\n\t}\n\treturn r\n}", "title": "" }, { "docid": "b397eae302f94022979c435646d8dacf", "score": "0.42893133", "text": "func (request TotpRequest) Check() (*TotpResponse, error) {\n\tresponse := &TotpResponse{}\n\tapiURL, err := GetURLFor(fmt.Sprintf(\"totp/%s\", url.PathEscape(request.GetIdentifier())))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\terr = GetClient(RegionCurrent, APIKey).Call(\n\t\thttp.MethodGet,\n\t\tapiURL,\n\t\tnil,\n\t\thttp.StatusOK,\n\t\tresponse,\n\t)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn response, nil\n}", "title": "" }, { "docid": "6785edebaf8cae2c8b9ce71658a39c22", "score": "0.42784342", "text": "func (o NodeBalancerConfigOutput) CheckTimeout() pulumi.IntOutput {\n\treturn o.ApplyT(func(v *NodeBalancerConfig) pulumi.IntOutput { return v.CheckTimeout }).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "d52dab2c7423a95b1770ca2a70a38e81", "score": "0.42767555", "text": "func (s *Server) CheckTask(ctx context.Context, req *pb.CheckTaskRequest) (*pb.CheckTaskResponse, error) {\n\tlog.L().Info(\"\", zap.Stringer(\"payload\", req), zap.String(\"request\", \"CheckTask\"))\n\n\t_, _, err := s.generateSubTask(ctx, req.Task)\n\tif err != nil {\n\t\treturn &pb.CheckTaskResponse{\n\t\t\tResult: false,\n\t\t\tMsg: errors.ErrorStack(err),\n\t\t}, nil\n\t}\n\n\treturn &pb.CheckTaskResponse{\n\t\tResult: true,\n\t\tMsg: \"check pass!!!\",\n\t}, nil\n}", "title": "" }, { "docid": "0c3d49c529d3016ac02dc1d706b497ae", "score": "0.42720777", "text": "func (tc *TestCluster) GetClockConfig(ctx context.Context, nodeIdx int) *kronospb.DriftTimeConfig {\n\treturn tc.Nodes[nodeIdx].driftConfig\n}", "title": "" }, { "docid": "99e1acba0382145150b04a9a369bbbc2", "score": "0.4264269", "text": "func (_LuxUni_PKI_valid *LuxUni_PKI_validSession) CheckCert(_newHash [32]byte, _addrCA common.Address, _addrRoot common.Address) (*big.Int, error) {\n\treturn _LuxUni_PKI_valid.Contract.CheckCert(&_LuxUni_PKI_valid.CallOpts, _newHash, _addrCA, _addrRoot)\n}", "title": "" }, { "docid": "ede773a6aeb925f10e1274af0e78ff52", "score": "0.42427936", "text": "func (_ValidatorUtils *ValidatorUtilsCaller) GetConfig(opts *bind.CallOpts, rollup common.Address) (struct {\n\tConfirmPeriodBlocks *big.Int\n\tExtraChallengeTimeBlocks *big.Int\n\tArbGasSpeedLimitPerBlock *big.Int\n\tBaseStake *big.Int\n}, error) {\n\tvar out []interface{}\n\terr := _ValidatorUtils.contract.Call(opts, &out, \"getConfig\", rollup)\n\n\toutstruct := new(struct {\n\t\tConfirmPeriodBlocks *big.Int\n\t\tExtraChallengeTimeBlocks *big.Int\n\t\tArbGasSpeedLimitPerBlock *big.Int\n\t\tBaseStake *big.Int\n\t})\n\tif err != nil {\n\t\treturn *outstruct, err\n\t}\n\n\toutstruct.ConfirmPeriodBlocks = *abi.ConvertType(out[0], new(*big.Int)).(**big.Int)\n\toutstruct.ExtraChallengeTimeBlocks = *abi.ConvertType(out[1], new(*big.Int)).(**big.Int)\n\toutstruct.ArbGasSpeedLimitPerBlock = *abi.ConvertType(out[2], new(*big.Int)).(**big.Int)\n\toutstruct.BaseStake = *abi.ConvertType(out[3], new(*big.Int)).(**big.Int)\n\n\treturn *outstruct, err\n\n}", "title": "" }, { "docid": "5a061f0adf2dd7c2fffed27719e144ac", "score": "0.42377493", "text": "func (_ValidatorUtils *ValidatorUtilsCallerSession) GetConfig(rollup common.Address) (struct {\n\tConfirmPeriodBlocks *big.Int\n\tExtraChallengeTimeBlocks *big.Int\n\tArbGasSpeedLimitPerBlock *big.Int\n\tBaseStake *big.Int\n}, error) {\n\treturn _ValidatorUtils.Contract.GetConfig(&_ValidatorUtils.CallOpts, rollup)\n}", "title": "" }, { "docid": "87a0a391ee9f225f168408f194c9fcf0", "score": "0.4232886", "text": "func (r *Application) CheckTCP(port, interval int) (*Application, error) {\n\tif r.Container == nil || r.Container.Docker == nil {\n\t\treturn nil, ErrNoApplicationContainer\n\t}\n\t// step: get the port index\n\tportIndex, err := r.Container.Docker.ServicePortIndex(port)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\thealth := NewDefaultHealthCheck()\n\thealth.Protocol = \"TCP\"\n\thealth.IntervalSeconds = interval\n\t*health.PortIndex = portIndex\n\t// step: add to the checks\n\tr.AddHealthCheck(*health)\n\n\treturn r, nil\n}", "title": "" }, { "docid": "937649bfcc5156c803b26c28a41a3036", "score": "0.42328027", "text": "func (c *TCPPortClientCheck) Check() (bool, error) {\n\ttimeout := c.Timeout\n\tif timeout == 0 {\n\t\ttimeout = 5 * time.Second\n\t}\n\tconn, err := net.DialTimeout(\"tcp\", fmt.Sprintf(\"%s:%d\", c.IPAddress, c.PortNumber), timeout)\n\tif err != nil {\n\t\treturn false, fmt.Errorf(\"Port %d on host %q is unreachable. Error was: %v\", c.PortNumber, c.IPAddress, err)\n\t}\n\n\ttestMsg := \"ECHO\\n\"\n\tfmt.Fprint(conn, testMsg)\n\tresp, err := bufio.NewReader(conn).ReadString('\\n')\n\tif err == io.EOF {\n\t\treturn false, nil // The server sent an empty response\n\t}\n\tif err != nil {\n\t\treturn false, fmt.Errorf(\"error reading from TCP socket: %v\", err)\n\t}\n\tif resp != testMsg {\n\t\treturn false, nil\n\t}\n\treturn true, nil\n}", "title": "" }, { "docid": "3a3cdc227229ce740005809567cbf764", "score": "0.42250326", "text": "func VersionCheck() models.VersionCheck {\n\treturn configContents.VersionCheck\n}", "title": "" }, { "docid": "3facf2c011203261b7e43e7ed9eb8e32", "score": "0.42239487", "text": "func (task Task) GetCheckCancellable() bool {\n\tret0 := C.g_task_get_check_cancellable(task.native())\n\treturn util.Int2Bool(int(ret0)) /*go:.util*/\n}", "title": "" }, { "docid": "cd9719612a61f27c445e43312b512c4f", "score": "0.4212098", "text": "func (c *Context) CRCCheck(start, length uint32, crc uint16) (uint16, error) {\n\tif c.closed {\n\t\treturn 0, closedErr\n\t}\n\n\t// Dummy ping packet and drain status. Ping is just to prevent timeout\n\t_, err := c.sendPacket([]byte{0xff, 0x00})\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\n\t_, err = c.GetStatus()\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\n\tpacket := []byte{\n\t\t0x02, 0x00,\n\t\t0x00, 0x00, // Packet CRC\n\t\t0x00, 0x00, 0x00, 0x00, // Start\n\t\t0x00, 0x00, 0x00, 0x00, // Length\n\t\t0x00, 0x00, // Check CRC\n\t}\n\n\tbinary.LittleEndian.PutUint32(packet[4:], start)\n\tbinary.LittleEndian.PutUint32(packet[8:], length)\n\tbinary.LittleEndian.PutUint16(packet[12:], crc)\n\n\t_, err = c.sendPacket(packet)\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\n\tstatus, err := c.RawControl()\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\n\tif status[2] != 'O' {\n\t\treturn 0, errors.New(\"expected OK response\")\n\t} else if status[3] != 0 {\n\t\treturn 0, errors.New(\"expected 3-byte response\")\n\t}\n\n\tcrc = binary.LittleEndian.Uint16(status[:2])\n\n\treturn crc, nil\n}", "title": "" }, { "docid": "da1747ca81c05db339f5273296c4a178", "score": "0.42050514", "text": "func HealthCheck_Tcp(options *TcpHealthCheckOptions) HealthCheck {\n\t_init_.Initialize()\n\n\tvar returns HealthCheck\n\n\t_jsii_.StaticInvoke(\n\t\t\"monocdk.aws_appmesh.HealthCheck\",\n\t\t\"tcp\",\n\t\t[]interface{}{options},\n\t\t&returns,\n\t)\n\n\treturn returns\n}", "title": "" }, { "docid": "9624fa77b8702fa5499daec91525c2a1", "score": "0.42001003", "text": "func (_ValidatorUtils *ValidatorUtilsSession) GetConfig(rollup common.Address) (struct {\n\tConfirmPeriodBlocks *big.Int\n\tExtraChallengeTimeBlocks *big.Int\n\tArbGasSpeedLimitPerBlock *big.Int\n\tBaseStake *big.Int\n}, error) {\n\treturn _ValidatorUtils.Contract.GetConfig(&_ValidatorUtils.CallOpts, rollup)\n}", "title": "" }, { "docid": "d02f0f17e74577fb7d7e195bc53e0051", "score": "0.41994384", "text": "func (c *Client) GetMerkleProofTSC(ctx context.Context, hash string) (merkleResults MerkleTSCResults, err error) {\n\n\tvar resp string\n\t// https://api.whatsonchain.com/v1/bsv/<network>/tx/<hash>/proof/tsc\n\tif resp, err = c.request(\n\t\tctx,\n\t\tfmt.Sprintf(\"%s%s/tx/%s/proof/tsc\", apiEndpoint, c.Network(), hash),\n\t\thttp.MethodGet, nil,\n\t); err != nil {\n\t\treturn\n\t}\n\tif len(resp) == 0 {\n\t\treturn nil, ErrTransactionNotFound\n\t}\n\terr = json.Unmarshal([]byte(resp), &merkleResults)\n\treturn\n}", "title": "" }, { "docid": "40b9c047ac73d682277d9e9ffc55a26a", "score": "0.41978475", "text": "func cmdCheck(args *skel.CmdArgs) error {\n\tc, err := ovncni.GetContext(args)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"Failed to parse CNI context\")\n\t}\n\treturn c.Check()\n}", "title": "" }, { "docid": "e14d3a2943cc9697744ea1c4cdcd492e", "score": "0.4187619", "text": "func (e *Init) DoGetHealthCheck(cfg *config.Config, buildTime, gitCommit, version string) (HealthChecker, error) {\n\tversionInfo, err := healthcheck.NewVersionInfo(buildTime, gitCommit, version)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\thc := healthcheck.New(versionInfo, cfg.HealthCheckCriticalTimeout, cfg.HealthCheckInterval)\n\treturn &hc, nil\n}", "title": "" }, { "docid": "951725a77b931f473ed416ef1a5a94fd", "score": "0.4187496", "text": "func (c *Config) Check() (string, error) {\n return c.check.LoadAndCheck(c.filename)\n}", "title": "" }, { "docid": "9e4ac5e1698bf01150d9b1ca904a2dae", "score": "0.41777188", "text": "func (c *MockClient) FetchCheck(name string) (*corev2.CheckConfig, error) {\n\targs := c.Called(name)\n\treturn args.Get(0).(*corev2.CheckConfig), args.Error(1)\n}", "title": "" }, { "docid": "3f5dfc6bf476b32ecd510f37cd5f2ccc", "score": "0.41695485", "text": "func (c Checker) Check() (types.Result, error) {\n\tif c.Attempts < 1 {\n\t\tc.Attempts = 1\n\t}\n\n\tresult := types.NewResult()\n\tresult.Title = c.Name\n\tresult.Endpoint = c.URL\n\tresult.Times = c.doChecks()\n\n\treturn c.conclude(result), nil\n}", "title": "" }, { "docid": "3642bd0f95eb4962db9e397a4f022e89", "score": "0.41663802", "text": "func ProbeTCP(ctx context.Context, logger log.Logger, target string, module config.Module, registry *prometheus.Registry) error {\n\ttlsConfig, err := newTLSConfig(target, registry, &module.TLSConfig)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdialer := &net.Dialer{}\n\tconn, err := dialer.DialContext(ctx, \"tcp\", target)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer conn.Close()\n\n\tdeadline, _ := ctx.Deadline()\n\tif err := conn.SetDeadline(deadline); err != nil {\n\t\treturn fmt.Errorf(\"Error setting deadline\")\n\t}\n\n\tif module.TCP.StartTLS != \"\" {\n\t\terr = startTLS(logger, conn, module.TCP.StartTLS)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\ttlsConn := tls.Client(conn, tlsConfig)\n\tdefer tlsConn.Close()\n\n\treturn tlsConn.Handshake()\n}", "title": "" }, { "docid": "99b6f02fa1c97a3a923035c5732795d1", "score": "0.4163141", "text": "func (ts *MixerServer) GetCheck() *attribute.MutableBag {\n\treturn <-ts.check.ch\n}", "title": "" }, { "docid": "4f4ba2f7c8d3ec3306a29ede25e68339", "score": "0.41585293", "text": "func (c *Ctx) GetVerifyDepth() int {\n\treturn int(C.SSL_CTX_get_verify_depth(c.ctx))\n}", "title": "" }, { "docid": "61a26fe2edb40a57d2668bf474cbd3da", "score": "0.41552904", "text": "func GetMerkleProof(cmd map[string]interface{}) map[string]interface{} {\n\tresp := ResponsePack(berr.SUCCESS)\n\tstr, ok := cmd[\"Hash\"].(string)\n\tif !ok {\n\t\treturn ResponsePack(berr.INVALID_PARAMS)\n\t}\n\thash, err := common.Uint256FromHexString(str)\n\tif err != nil {\n\t\treturn ResponsePack(berr.INVALID_PARAMS)\n\t}\n\theight, tx, err := bactor.GetTxnWithHeightByTxHash(hash)\n\tif err != nil {\n\t\treturn ResponsePack(berr.INVALID_PARAMS)\n\t}\n\tif tx == nil {\n\t\treturn ResponsePack(berr.INVALID_PARAMS)\n\t}\n\theader, err := bactor.GetHeaderByHeight(height)\n\tif err != nil {\n\t\treturn ResponsePack(berr.INVALID_PARAMS)\n\t}\n\n\tcurHeight := bactor.GetCurrentBlockHeight()\n\tcurHeader, err := bactor.GetHeaderByHeight(curHeight)\n\tif err != nil {\n\t\treturn ResponsePack(berr.INVALID_PARAMS)\n\t}\n\tproof, err := bactor.GetMerkleProof(uint32(height), uint32(curHeight))\n\tif err != nil {\n\t\treturn ResponsePack(berr.INTERNAL_ERROR)\n\t}\n\tvar hashes []string\n\tfor _, v := range proof {\n\t\thashes = append(hashes, v.ToHexString())\n\t}\n\tresp[\"Result\"] = bcomn.MerkleProof{\"MerkleProof\", header.TransactionsRoot.ToHexString(), height,\n\t\tcurHeader.BlockRoot.ToHexString(), curHeight, hashes}\n\treturn resp\n}", "title": "" }, { "docid": "374e97058df73759326b38f720f4c2ec", "score": "0.41515636", "text": "func (s *Server) checkTest(ch chan bool, test *tasks.Test, sub *tasks.Submission) {\n\tinDir := fs.Init(fs.CreatePath(s.fs.Path, \"tasks\", sub.Task, \"in\"), \"\")\n\tcmd := exec.Command(fs.Join(s.fs.Path, \"sio2jail\"),\n\t\t\"-b\", \"/tmp/box:/:ro\",\n\t\t\"--memory-limit\", strconv.FormatUint(uint64(test.MemoryLimit), 10),\n\t\t\"--instruction-count-limit\", strconv.FormatUint(uint64(test.TimeLimit*2*1000000), 10), //TODO - clean this magic number, this is time*2*10^9/1000\n\t\t\"--rtimelimit\", strconv.FormatUint(uint64(test.TimeLimit*5), 10)+\"ms\",\n\t\t\"--output-limit\", \"64K\",\n\t\t\"-o\", \"oiaug\",\n\t\t\"/tmp/exe\",\n\t\t\"<\"+fs.Join(inDir.Path, sub.Task+test.Name+\".in\"),\n\t)\n\tvar stderr bytes.Buffer\n\tcmd.Stderr = &stderr\n\toutput, err := cmd.Output()\n\tif err != nil {\n\t\tlog.Warn(\"Runtime error during cheking submission %s\", sub.Id)\n\t\tsub.Results[test.Name] = \"runtime error\"\n\t\treturn\n\t}\n\n\tresults := bytes.Fields(stderr.Bytes())\n\tif string(results[0]) != \"OK\" {\n\t\tsub.Results[test.Name] = string(results[len(results)-1])\n\t\treturn\n\t}\n\toutDir := fs.Init(fs.CreatePath(s.fs.Path, \"tasks\", sub.Task, \"out\"), \"\")\n\tif ok, diff := checkOutput(output, outDir.ReadFile(sub.Task+test.Name+\".out\")); !ok {\n\t\tsub.Results[test.Name] = diff\n\t\treturn\n\t}\n\n\tsub.Results[test.Name] = \"OK\"\n\ttemp, _ := strconv.ParseUint(string(results[2]), 10, 64)\n\tsub.Time[test.Name] = uint(temp)\n}", "title": "" }, { "docid": "c63d68b88d600634d72988402f9197fc", "score": "0.4148381", "text": "func (f *APIClientMeta) GetTLSConfig() *api.TLSConfig {\n\t// If we need custom TLS configuration, then set it\n\tif f.flagCACert != \"\" || f.flagCAPath != \"\" || f.flagClientCert != \"\" || f.flagClientKey != \"\" || f.flagInsecure {\n\t\tt := &api.TLSConfig{\n\t\t\tCACert: f.flagCACert,\n\t\t\tCAPath: f.flagCAPath,\n\t\t\tClientCert: f.flagClientCert,\n\t\t\tClientKey: f.flagClientKey,\n\t\t\tTLSServerName: \"\",\n\t\t\tInsecure: f.flagInsecure,\n\t\t}\n\n\t\treturn t\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "f2971e76c4982a97fdb6a7219a271f94", "score": "0.4142958", "text": "func (a SysApi) GetCryptoCheckCertList() (*SysCryptoCheckCertList, error) {\n\n\tvar httpMethod = \"Get\"\n\t// create path and map variables\n\tpath := a.configuration.BasePath + \"/tm/sys/crypto/checkCert\"\n\n\theaderParams := make(map[string]string)\n\tqueryParams := url.Values{}\n\tformParams := make(map[string]string)\n\tvar postBody interface{}\n\tvar fileName string\n\tvar fileBytes []byte\n\t// authentication '(token)' required\n\t// set key with prefix in header\n\theaderParams[\"X-F5-Auth-Token\"] = a.configuration.getAPIKeyWithPrefix(\"X-F5-Auth-Token\")\n\t// add default headers if any\n\tfor key := range a.configuration.DefaultHeader {\n\t\theaderParams[key] = a.configuration.DefaultHeader[key]\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{\n\t\t\"application/json\",\n\t}\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := a.configuration.restClient.selectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\theaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\n\t\t\"aplication/json\",\n\t}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := a.configuration.restClient.SelectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\theaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\thttpResponse, err := a.configuration.restClient.callAPI(path, httpMethod, postBody, headerParams, queryParams, formParams, fileName, fileBytes)\n\tvar successPayload = new(SysCryptoCheckCertList)\n\tif err == nil && httpResponse.StatusCode() == 200 {\n\t\terr = json.Unmarshal(httpResponse.Body(), &successPayload)\n\t}\n\terr = NewAPIResponse(httpResponse, err)\n\tif err != nil {\n\t\treturn nil, err\n\t} else {\n\t\treturn successPayload, err\n\t}\n\n}", "title": "" }, { "docid": "a324c983a6598f0a91f5d5980d9f10fa", "score": "0.41397005", "text": "func (s *Service) getCtstInfo(vjudge_id string) (*CtstResponse, error) {\n\tvar u url.URL\n\tu.Scheme = scheme\n\tu.Host = viper.GetString(\"judge.host\")\n\tu.Path = \"/user/login\"\n\n\tform := url.Values{}\n\tform.Add(\"username\", viper.GetString(\"judge.username\"))\n\tform.Add(\"password\", viper.GetString(\"judge.password\"))\n\n\tcookieJar, _ := cookiejar.New(nil)\n\tclient := &http.Client{Jar: cookieJar}\n\n\treq, err := http.NewRequest(\"POST\", u.String(), strings.NewReader(form.Encode()))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.Header.Add(\"Content-Type\", \"application/x-www-form-urlencoded\")\n\tresp, err := client.Do(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer resp.Body.Close()\n\n\tu.Path = \"/contest/rank/single/\" + vjudge_id\n\n\treq, err = http.NewRequest(\"GET\", u.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresp, err = client.Do(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar ctstResponse CtstResponse\n\terr = json.Unmarshal(body, &ctstResponse)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &ctstResponse, nil\n}", "title": "" }, { "docid": "c10163016d59171b318178a7f436714f", "score": "0.412824", "text": "func Check(t ErrorReporter) func() {\n\thttpTransport, _ := http.DefaultTransport.(*http.Transport)\n\treturn CheckWithTransport(t, httpTransport)\n}", "title": "" }, { "docid": "e0f2d7d3097c7e668308eb4b48fb4a8a", "score": "0.41217625", "text": "func (c *NodeHostConfig) GetClientTLSConfig(target string) (*tls.Config, error) {\n\tif c.MutualTLS {\n\t\ttlsConfig, err := netutil.GetClientTLSConfig(\"\",\n\t\t\tc.CAFile, c.CertFile, c.KeyFile)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\thost, err := netutil.GetHost(target)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn &tls.Config{\n\t\t\tServerName: host,\n\t\t\tCertificates: tlsConfig.Certificates,\n\t\t\tRootCAs: tlsConfig.RootCAs,\n\t\t}, nil\n\t}\n\treturn nil, nil\n}", "title": "" }, { "docid": "94c59afe17610dee44d3edaeb780403f", "score": "0.41195655", "text": "func (_class PoolClass) GetHealthCheckConfig(sessionID SessionRef, self PoolRef) (_retval map[string]string, _err error) {\n\t_method := \"pool.get_health_check_config\"\n\t_sessionIDArg, _err := convertSessionRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"session_id\"), sessionID)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_selfArg, _err := convertPoolRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"self\"), self)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_result, _err := _class.client.APICall(_method, _sessionIDArg, _selfArg)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_retval, _err = convertStringToStringMapToGo(_method + \" -> \", _result.Value)\n\treturn\n}", "title": "" }, { "docid": "cb48dd58363ffbdbedcdf5fac2d494f3", "score": "0.4113132", "text": "func (driver *MainDriver) GetTLSConfig() (*tls.Config, error) {\n\tif driver.tlsConfig == nil {\n\t\tcert, err := tls.LoadX509KeyPair(\"mycert.crt\", \"mycert.key\")\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tdriver.tlsConfig = &tls.Config{\n\t\t\tNextProtos: []string{\"ftp\"},\n\t\t\tCertificates: []tls.Certificate{cert},\n\t\t}\n\t}\n\treturn driver.tlsConfig, nil\n}", "title": "" }, { "docid": "f947477417f991c460d92ab9b7598f2c", "score": "0.4105565", "text": "func (o RegionHealthCheckOutput) TcpHealthCheck() RegionHealthCheckTcpHealthCheckPtrOutput {\n\treturn o.ApplyT(func(v *RegionHealthCheck) RegionHealthCheckTcpHealthCheckPtrOutput { return v.TcpHealthCheck }).(RegionHealthCheckTcpHealthCheckPtrOutput)\n}", "title": "" }, { "docid": "3c1ef8bdb19452c711d92bf199da6c42", "score": "0.4101937", "text": "func tlsCacheGet(config *restConfig) (http.RoundTripper, error) {\n\t// REMOVED: any actual caching\n\n\t// Get the TLS options for this client config\n\ttlsConfig, err := tlsConfigFor(config)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t// The options didn't require a custom TLS config\n\tif tlsConfig == nil {\n\t\treturn http.DefaultTransport, nil\n\t}\n\n\t// REMOVED: Call to k8s.io/apimachinery/pkg/util/net.SetTransportDefaults; instead of the generic machinery and conditionals, hard-coded the result here.\n\tt := &http.Transport{\n\t\t// http.ProxyFromEnvironment doesn't respect CIDRs and that makes it impossible to exclude things like pod and service IPs from proxy settings\n\t\t// ProxierWithNoProxyCIDR allows CIDR rules in NO_PROXY\n\t\tProxy: newProxierWithNoProxyCIDR(http.ProxyFromEnvironment),\n\t\tTLSHandshakeTimeout: 10 * time.Second,\n\t\tTLSClientConfig: tlsConfig,\n\t\tDialContext: (&net.Dialer{\n\t\t\tTimeout: 30 * time.Second,\n\t\t\tKeepAlive: 30 * time.Second,\n\t\t}).DialContext,\n\t}\n\t// Allow clients to disable http2 if needed.\n\tif s := os.Getenv(\"DISABLE_HTTP2\"); len(s) == 0 {\n\t\tt.ForceAttemptHTTP2 = true\n\t}\n\treturn t, nil\n}", "title": "" }, { "docid": "150470acac4a1ab8011a640588615a09", "score": "0.41010147", "text": "func (client *gRPCVtctldClient) RunHealthCheck(ctx context.Context, in *vtctldatapb.RunHealthCheckRequest, opts ...grpc.CallOption) (*vtctldatapb.RunHealthCheckResponse, error) {\n\tif client.c == nil {\n\t\treturn nil, status.Error(codes.Unavailable, connClosedMsg)\n\t}\n\n\treturn client.c.RunHealthCheck(ctx, in, opts...)\n}", "title": "" }, { "docid": "251d3ea1eb3ed4a69242744864ce19a0", "score": "0.41000226", "text": "func getRelevantCheckSuite(checks []*github.CheckSuite) (finalCheck *github.CheckSuite) {\n\tfor _, check := range checks {\n\t\tstatus := check.GetStatus()\n\t\tswitch status {\n\t\tcase \"queued\", \"in_progress\":\n\t\t\treturn check\n\t\tcase \"completed\":\n\t\t\t// continue\n\t\tdefault:\n\t\t\treturn check\n\t\t}\n\n\t\tconclusion := check.GetConclusion()\n\t\tswitch conclusion {\n\t\tcase \"success\":\n\t\t\tfinalCheck = check\n\t\tcase \"neutral\":\n\t\t\tif finalCheck == nil || finalCheck.GetConclusion() != \"success\" {\n\t\t\t\tfinalCheck = check\n\t\t\t}\n\t\tcase \"failure\", \"cancelled\", \"timed_out\", \"action_required\":\n\t\t\treturn check\n\t\tdefault:\n\t\t\treturn check\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "b1c05e9c3d479a6d9d734ed3747294f9", "score": "0.40998483", "text": "func TLCheckerCore(ctx context.Context) error {\n\tfuncname := \"TLCheckerCore\"\n\tvar err error\n\tvar rows *sql.Rows\n\tnow := time.Now()\n\n\t//---------------------------------------------------\n\t// Set up email dialer to use for any overdue tasks\n\t//---------------------------------------------------\n\td := gomail.NewDialer(rlib.AppConfig.SMTPHost, rlib.AppConfig.SMTPPort, rlib.AppConfig.SMTPLogin, rlib.AppConfig.SMTPPass)\n\n\t//---------------------------------------------------\n\t// Set up email dialer to use for any overdue tasks\n\t//---------------------------------------------------\n\tvar ri = rrpt.ReporterInfo{\n\t\tOutputFormat: gotable.TABLEOUTPDF,\n\t\tBid: 0, // don't know this yet\n\t\tD1: now, // don't really need this\n\t\tD2: now, // don't really need this\n\t\tBlankLineAfterRptName: false,\n\t}\n\n\tif tx, ok := rlib.DBTxFromContext(ctx); ok { // if transaction is supplied\n\t\tstmt := tx.Stmt(rlib.RRdb.Prepstmt.GetDueTaskLists)\n\t\tdefer stmt.Close()\n\t\trows, err = stmt.Query(now, now)\n\t} else {\n\t\trows, err = rlib.RRdb.Prepstmt.GetDueTaskLists.Query(now, now, now, now, now)\n\t}\n\n\tif err != nil {\n\t\t// // rlib.Console(\"Error with GetDueTaskLists: %v\\n\", err)\n\t\trlib.Ulog(\"Error setting query GetDuTaskLists: %v\\n\", err)\n\t\treturn err\n\t}\n\tdefer rows.Close()\n\n\t// rlib.Console(\"Loop on TaskLists\\n\")\n\tfor rows.Next() {\n\t\tvar a rlib.TaskList\n\t\tif err = rlib.ReadTaskLists(rows, &a); err != nil {\n\t\t\trlib.LogAndPrintError(funcname, err)\n\t\t\treturn err\n\t\t}\n\n\t\t// rlib.Console(\"Found: %s, TLID = %d\\n\", a.Name, a.TLID)\n\n\t\ts := strings.TrimSpace(a.EmailList)\n\t\tif len(s) == 0 {\n\t\t\t// rlib.Console(\"EmailList is blank. Skipping.\\n\")\n\t\t\tcontinue\n\t\t}\n\n\t\t//----------------------------------------------------\n\t\t// TODO: really need to cache xbiz or see if we can\n\t\t// simply not set it at all. It should not be\n\t\t// necessary for this report.\n\t\t//----------------------------------------------------\n\t\tri.Bid = a.BID\n\t\tri.ID = a.TLID\n\n\t\t// rlib.Console(\"ri.BID = %d, ri.ID = %d\\n\", ri.Bid, ri.ID)\n\n\t\tvar xbiz rlib.XBusiness\n\t\tif err = rlib.GetXBiz(ri.Bid, &xbiz); err != nil {\n\t\t\trlib.LogAndPrintError(funcname, err)\n\t\t\treturn err\n\t\t}\n\t\tri.Xbiz = &xbiz\n\n\t\tsa := strings.Split(s, \",\")\n\t\t// rlib.Console(\"email string slice list len = %d\\n\", len(sa))\n\t\tfor i := 0; i < len(sa); i++ {\n\t\t\t// rlib.Console(\"Processing sa[%d] = %s\\n\", i, sa[i])\n\t\t\tto := strings.TrimSpace(sa[i])\n\t\t\t// rlib.Console(\"to = %s\\n\", to)\n\t\t\tif rlib.ValidEmailAddress(to) {\n\t\t\t\t// rlib.Console(\"%s is a valid email address. Sending...\\n\", to)\n\t\t\t\terr = TLReporterSendEmail(ctx, to, &a, d, &ri)\n\t\t\t\tif err != nil {\n\t\t\t\t\t// rlib.Console(\"Error trying to send email regarding TLID %d, err: %s\\n\", a.TLID, err.Error())\n\t\t\t\t\trlib.LogAndPrintError(funcname, err)\n\t\t\t\t}\n\t\t\t\trlib.Ulog(\"Sent email to %s regarding TaskList %d\\n\", to, a.TLID)\n\t\t\t}\n\t\t}\n\t}\n\t// rlib.Console(\"Loop on TaskLists done\\n\")\n\n\treturn rows.Err()\n}", "title": "" }, { "docid": "3868f0963533b04146a452fb1a6a4306", "score": "0.4086752", "text": "func CtxRoundTripper(r *http.Request) http.RoundTripper {\n\tproxyCtx := GetAnyProxyCtx(r)\n\tif proxyCtx.RoundTripper == nil {\n\t\treturn proxyCtx.proxy.Tr\n\t}\n\treturn proxyCtx.RoundTripper\n}", "title": "" }, { "docid": "c31a1711993bb88f28e354a3d84afd40", "score": "0.40829763", "text": "func doTCPProbe(ctx context.Context, addr string) (Result, string, error) {\n\tvar d net.Dialer\n\tconn, err := d.DialContext(ctx, \"tcp\", addr)\n\tif err != nil {\n\t\t// Convert errors to failures to handle timeouts.\n\t\treturn Failure, err.Error(), nil\n\t}\n\terr = conn.Close()\n\tif err != nil {\n\t\tklog.Errorf(\"Unexpected error closing TCP probe socket: %v (%#v)\", err, err)\n\t}\n\treturn Success, \"\", nil\n}", "title": "" }, { "docid": "5afd2e599c83dfa0120484dc08c4587e", "score": "0.40757054", "text": "func getPeerCertificate(in *envoy_service_auth_v2.CheckRequest) string {\n\t// ignore the error as we will just return the empty string in that case\n\tcert, _ := url.QueryUnescape(in.GetAttributes().GetSource().GetCertificate())\n\treturn cert\n}", "title": "" }, { "docid": "c4e51ac77ffe801dac22f479aed6a8e6", "score": "0.4068055", "text": "func GetConfig() *cfg.Config {\n\tif conf == nil {\n\t\tpathname := makePathname()\n\t\tconf = cfg.ResetTestRoot(pathname)\n\t\t// and we use random ports to run in parallel\n\t\ttm, rpc, grpc := makeAddrs()\n\t\tprintln(conf.Consensus.TimeoutCommit)\n\t\tconf.P2P.ListenAddress = tm\n\t\tconf.RPCListenAddress = rpc\n\t\tconf.GRPCListenAddress = grpc\n\t}\n\treturn conf\n}", "title": "" }, { "docid": "00b7189637be212812a8f224bcee35b3", "score": "0.4061507", "text": "func (ch *Chain) GetMerkleProof(scHname isc.Hname, key []byte) *trie.MerkleProof {\n\treturn ch.GetMerkleProofRaw(append(scHname.Bytes(), key...))\n}", "title": "" }, { "docid": "d5d75be306dd6ad7ea000b5a1eb0851d", "score": "0.40608984", "text": "func CheckpointCheck(id BlockID, height int64) error {\n\tif !CheckpointsEnabled {\n\t\treturn nil\n\t}\n\tcheckpointID, ok := Checkpoints[height]\n\tif !ok {\n\t\treturn nil\n\t}\n\tif id.String() != checkpointID {\n\t\treturn fmt.Errorf(\"Block %s at height %d does not match checkpoint ID %s\",\n\t\t\tid, height, checkpointID)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "be219a705f8d08f8eaea6c41c0677e53", "score": "0.40550557", "text": "func getCheckpoint(ctx context.Context, host, dir string) (cp *checkpoint, path string, err error) {\n\tvar (\n\t\tskip bool\n\t)\n\n\tfile := fmt.Sprintf(format, host)\n\tpath = fullPath(file, dir)\n\n\tf, err := os.Open(path)\n\tdefer func() {\n\t\tif f != nil {\n\t\t\tcloseWithErrCapture(&err, f, \"could not close file\")\n\t\t}\n\t}()\n\n\tif err != nil {\n\t\tif errors.Is(err, os.ErrNotExist) {\n\t\t\tskip = true\n\t\t\tcp, err = initCheckpoint(ctx, path)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, \"\", errors.Wrap(err, \"could not initialize checkpoint\")\n\t\t\t}\n\t\t} else {\n\t\t\treturn nil, \"\", errors.Wrap(err, \"could not configure checkpointing\")\n\t\t}\n\t}\n\n\tif !skip {\n\t\tcp, err = lastCheckpoint(ctx, f)\n\t\tif err != nil {\n\t\t\treturn nil, \"\", errors.Wrap(err, \"could not retrieve last checkpoint\")\n\t\t}\n\t}\n\n\treturn cp, path, nil\n}", "title": "" }, { "docid": "325750da498c703020dbd3b9acbca836", "score": "0.405336", "text": "func (c *Checker) Check(addr string, timeout time.Duration) error {\n\tdeadline := time.Now().Add(timeout)\n\tconn, err := net.DialTimeout(\"tcp\", addr, timeout)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer conn.Close()\n\tconn.SetDeadline(deadline)\n\t// Send Handshake.\n\tif err := c.sendHandshake(conn); err != nil {\n\t\treturn err\n\t}\n\treader := bufio.NewReader(conn)\n\t// Expect Greeting.\n\tif err = c.expectGreeting(reader); err != nil {\n\t\treturn err\n\t}\n\t// Expect OK.\n\tif err = c.expectOK(reader); err != nil {\n\t\treturn err\n\t}\n\tif time.Now().After(deadline) {\n\t\treturn errs.ErrTimeout\n\t}\n\treturn err\n}", "title": "" }, { "docid": "cba4cb812914c43d9089b85ad56c8f22", "score": "0.40449208", "text": "func WithCheckTimeout(timeout time.Duration) ConsulConfigFunc {\n\treturn func(c *consulConfig) { c.checkTimeout = timeout }\n}", "title": "" }, { "docid": "e3fb18889cdc07954cf04dee3e56591d", "score": "0.40442786", "text": "func GetRPCTestClient(portOrNil ...int) (remote.MQTTClient, error) {\n\tport := 8891\n\tif len(portOrNil) == 1 {\n\t\tport = portOrNil[0]\n\t}\n\topts := []grpc.DialOption{\n\t\tgrpc.WithInsecure(),\n\t}\n\n\tconn, err := grpc.Dial(fmt.Sprintf(\"0.0.0.0:%d\", port), opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn remote.NewMQTTClient(conn), err\n}", "title": "" }, { "docid": "95d7bb34140a0acc1600cae92586c5da", "score": "0.40426728", "text": "func (_LuxUni_PKI_valid *LuxUni_PKI_validCaller) CheckCert(opts *bind.CallOpts, _newHash [32]byte, _addrCA common.Address, _addrRoot common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _LuxUni_PKI_valid.contract.Call(opts, out, \"CheckCert\", _newHash, _addrCA, _addrRoot)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "a1f1d3eb17a1a4726aeb4beb9ebf044a", "score": "0.40371066", "text": "func GenCheckPointCfg(cfg *Config, id uint64) (*checkpoint.Config, error) {\n\tcheckpointCfg := &checkpoint.Config{\n\t\tClusterID: id,\n\t\tInitialCommitTS: cfg.InitialCommitTS,\n\t\tCheckPointFile: path.Join(cfg.DataDir, \"savepoint\"),\n\t}\n\n\ttoCheckpoint := cfg.SyncerCfg.To.Checkpoint\n\n\tif toCheckpoint.Schema != \"\" {\n\t\tcheckpointCfg.Schema = toCheckpoint.Schema\n\t}\n\n\tswitch toCheckpoint.Type {\n\tcase \"mysql\", \"tidb\":\n\t\tbuildCheckPointCfg(checkpointCfg, toCheckpoint.Type, toCheckpoint.Host, toCheckpoint.User, toCheckpoint.Password, toCheckpoint.Port, toCheckpoint.TLS, toCheckpoint.Table)\n\tcase \"oracle\":\n\t\tbuildOracleCheckpointCfg(checkpointCfg, toCheckpoint.Type, toCheckpoint.Host, toCheckpoint.User, toCheckpoint.Password, toCheckpoint.Port, toCheckpoint.TLS,\n\t\t\ttoCheckpoint.OracleServiceName, toCheckpoint.OracleConnectString, toCheckpoint.Table)\n\t\tif len(checkpointCfg.Schema) != 0 && checkpointCfg.Db.User != checkpointCfg.Schema {\n\t\t\treturn nil, errors.New(\"in oracle, user is like as a schema.so you must keep it same as schema.you can not set schema item in checkpoint configuration\")\n\t\t}\n\tcase \"\":\n\t\tswitch cfg.SyncerCfg.DestDBType {\n\t\tcase \"mysql\", \"tidb\":\n\t\t\tbuildCheckPointCfg(checkpointCfg, cfg.SyncerCfg.DestDBType, cfg.SyncerCfg.To.Host, cfg.SyncerCfg.To.User, cfg.SyncerCfg.To.Password, cfg.SyncerCfg.To.Port, cfg.SyncerCfg.To.TLS, \"\")\n\t\tcase \"oracle\":\n\t\t\tbuildOracleCheckpointCfg(checkpointCfg, cfg.SyncerCfg.DestDBType, cfg.SyncerCfg.To.Host, cfg.SyncerCfg.To.User,\n\t\t\t\tcfg.SyncerCfg.To.Password, cfg.SyncerCfg.To.Port, cfg.SyncerCfg.To.TLS, cfg.SyncerCfg.To.OracleServiceName, cfg.SyncerCfg.To.OracleConnectString, \"\")\n\t\t\tif len(checkpointCfg.Schema) != 0 && checkpointCfg.Db.User != checkpointCfg.Schema {\n\t\t\t\treturn nil, errors.New(\"in oracle, user is like as a schema.so you must keep it same as schema.you can not set schema item in checkpoint configuration\")\n\t\t\t}\n\t\tcase \"pb\", \"file\":\n\t\t\tcheckpointCfg.CheckpointType = \"file\"\n\t\tcase \"kafka\":\n\t\t\tcheckpointCfg.CheckpointType = \"file\"\n\t\tcase \"flash\":\n\t\t\treturn nil, errors.New(\"the flash DestDBType is no longer supported\")\n\t\tdefault:\n\t\t\treturn nil, errors.Errorf(\"unknown DestDBType: %s\", cfg.SyncerCfg.DestDBType)\n\t\t}\n\tdefault:\n\t\treturn nil, errors.Errorf(\"unknown checkpoint type: %s\", toCheckpoint.Type)\n\t}\n\n\treturn checkpointCfg, nil\n}", "title": "" }, { "docid": "47b62942a2c7669ad8899ae386be43d2", "score": "0.40317276", "text": "func getConfig(t *testing.T) *cfg.Config {\n\tc := cfg.ResetTestRoot(t.Name())\n\n\t// and we use random ports to run in parallel\n\ttm, rpc, grpc := makeAddrs()\n\tc.P2P.ListenAddress = tm\n\tc.RPC.ListenAddress = rpc\n\tc.RPC.GRPCListenAddress = grpc\n\treturn c\n}", "title": "" }, { "docid": "f0beaf9fc69aec83bb4286fc96d920ce", "score": "0.40307632", "text": "func (o NodeBalancerConfigOutput) Check() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *NodeBalancerConfig) pulumi.StringOutput { return v.Check }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "ee705d86b791d63c044d0cc5a1dfa294", "score": "0.40300366", "text": "func (t *T) Cmp(got, expected interface{}, args ...interface{}) bool {\n\tt.Helper()\n\treturn cmpDeeply(newContextWithConfig(t.Config),\n\t\tt.TestingFT, got, expected, args...)\n}", "title": "" }, { "docid": "42ffa78d0bbf86b8159139482efcfeb1", "score": "0.40284094", "text": "func (t *thread) getTLS(tls *uint64) error {\n\treturn nil\n}", "title": "" }, { "docid": "46784116f0ca4fc39085698d36ec4dda", "score": "0.40225157", "text": "func buildTLSHTTPClient(config config.TLS) (*http.Client, error) {\n\t// Setup base TLS config\n\t// EnableHostVerification is a secure flag vs insecureSkipVerify is insecure so inverse the valu\n\ttlsConfig := &tls.Config{\n\t\tInsecureSkipVerify: !config.EnableHostVerification,\n\t}\n\n\t// Setup server name\n\tif config.ServerName != \"\" {\n\t\ttlsConfig.ServerName = config.ServerName\n\t}\n\n\t// Load client cert\n\tif config.CertFile != \"\" && config.KeyFile != \"\" {\n\t\tcert, err := tls.LoadX509KeyPair(config.CertFile, config.KeyFile)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ttlsConfig.Certificates = []tls.Certificate{cert}\n\t}\n\n\t// Load CA cert\n\tif config.CaFile != \"\" {\n\t\tcaCert, err := ioutil.ReadFile(config.CaFile)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tcaCertPool := x509.NewCertPool()\n\t\tcaCertPool.AppendCertsFromPEM(caCert)\n\t\ttlsConfig.RootCAs = caCertPool\n\t}\n\n\t// Setup HTTPS client\n\ttransport := &http.Transport{TLSClientConfig: tlsConfig}\n\ttlsClient := &http.Client{Transport: transport}\n\n\treturn tlsClient, nil\n}", "title": "" }, { "docid": "0e7cba73fdad73aa8984c7c167b61f00", "score": "0.40204957", "text": "func (a *Client) GetFlowConfig(params *GetFlowConfigParams, authInfo runtime.ClientAuthInfoWriter, opts ...ClientOption) (*GetFlowConfigOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewGetFlowConfigParams()\n\t}\n\top := &runtime.ClientOperation{\n\t\tID: \"getFlowConfig\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/flow/config\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"*/*\"},\n\t\tSchemes: []string{\"http\", \"https\"},\n\t\tParams: params,\n\t\tReader: &GetFlowConfigReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t}\n\tfor _, opt := range opts {\n\t\topt(op)\n\t}\n\n\tresult, err := a.transport.Submit(op)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsuccess, ok := result.(*GetFlowConfigOK)\n\tif ok {\n\t\treturn success, nil\n\t}\n\t// unexpected success response\n\t// safeguard: normally, absent a default response, unknown success responses return an error above: so this is a codegen issue\n\tmsg := fmt.Sprintf(\"unexpected success response for getFlowConfig: API contract not enforced by server. Client expected to get an error, but got: %T\", result)\n\tpanic(msg)\n}", "title": "" }, { "docid": "e05cb8386861d3cd9761526f9b440906", "score": "0.4017167", "text": "func (c *Client) getTLSConfig() *tls.Config {\n\tif c.transport.TLSClientConfig == nil {\n\t\tc.transport.TLSClientConfig = &tls.Config{}\n\t}\n\n\treturn c.transport.TLSClientConfig\n}", "title": "" }, { "docid": "15b7471914dad0b3bd7edf931f2de3be", "score": "0.40161604", "text": "func GetClusterTask(input string, workerID string, lockTimeout time.Duration) (s string, c string, d string, err error) {\n\tfor i := 0; i < trxRetryCount; i++ {\n\t\ts, c, d, err = getClusterTask(input, workerID, lockTimeout)\n\t\tif err == nil || !isRetriableErr(err) {\n\t\t\treturn\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "8258b26f2706aeeededb38017b3e4344", "score": "0.4014709", "text": "func CfgTest(cfg Config) (*Config, error) {\n\treturn &cfg, nil\n}", "title": "" }, { "docid": "8c42eb3021e8fb5cbb16a89b0d4fa0f6", "score": "0.4010803", "text": "func _cgoexp_ebd397278953_proxyholochain_Config_PeerModeDHTNode_Get(a unsafe.Pointer, n int32, ctxt uintptr) {\n\tfn := _cgoexpwrap_ebd397278953_proxyholochain_Config_PeerModeDHTNode_Get\n\t_cgo_runtime_cgocallback(**(**unsafe.Pointer)(unsafe.Pointer(&fn)), a, uintptr(n), ctxt);\n}", "title": "" }, { "docid": "d139bc370919bff39272271cbc977a1a", "score": "0.4008539", "text": "func CoinCheck() (chResult CoinCheckResult) {\n\n\tchTicker := make(chan adaptor.Cticker)\n\tchTrades := make(chan []adaptor.Ctrade)\n\n\tgo func() { chTicker <- adaptor.CoinCheckTicker() }()\n\tgo func() { chTrades <- adaptor.CoinCheckTrades() }()\n\n\tfor i := 0; i < 2; i++ {\n\t\tselect {\n\t\tcase result := <-chTicker:\n\t\t\tchResult.Cticker = result\n\t\tcase result := <-chTrades:\n\t\t\tchResult.Ctrades = result\n\t\tcase <-time.After(500 * time.Millisecond):\n\t\t\tlog.Printf(\"%s\", \"timed out\")\n\t\t\treturn\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "b7535e5f28dfd9b9b32ca57c0f2bfcc5", "score": "0.4008042", "text": "func TestCheckConnect_8(t *testing.T) {\n\t// mock backend\n\tts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tfmt.Fprintln(w, \"Hello, client\")\n\t}))\n\tdefer ts.Close()\n\n\t// prepare input\n\tbackend := BfeBackend{\n\t\tAddrInfo: strings.TrimPrefix(ts.URL, \"http://\"),\n\t}\n\tschem := \"tcp\"\n\tsuccNum := 1\n\ttimeout := 100\n\n\tcheckConf := cluster_conf.BackendCheck{\n\t\tSchem: &schem,\n\t\tSuccNum: &succNum,\n\t\tCheckTimeout: &timeout,\n\t}\n\n\t// CheckConnect\n\t_, err := CheckConnect(&backend, &checkConf)\n\tif err != nil {\n\t\tt.Errorf(\"should have no err: %v\", err)\n\t}\n}", "title": "" }, { "docid": "c7973fc831423b0c5fd4f3ad78f5079d", "score": "0.40056422", "text": "func GetCnf(c *gin.Context) {\n\tif result, err := getCnfPara(\"static/mycnf.template\"); err != nil {\n\t\tc.HTML(http.StatusOK, \"error.tmpl\",\n\t\t\tgin.H{\"error\": err})\n\t} else {\n\t\tc.HTML(http.StatusOK, \"index.tmpl\",\n\t\t\tgin.H{\"html\": template.HTML(result)})\n\t}\n}", "title": "" }, { "docid": "bc11649841c47dbd6c401e020ed4e5cc", "score": "0.400289", "text": "func (c *Client) Healthcheck(ctx context.Context, network string) (*HealthcheckRes, int, error) {\n\tendpoint := \"/healthcheck\"\n\tvar dataRes HealthcheckRes\n\tstatusCode, err := c.doRequest(ctx, network, endpoint, \"GET\", &dataRes, nil)\n\tif err != nil {\n\t\treturn nil, statusCode, err\n\t}\n\treturn &dataRes, statusCode, nil\n}", "title": "" } ]
1dab691f1311c4e656e1ecbf69c84ed8
String returns the string representation
[ { "docid": "3f60070c1894341a6333b12cda909cb6", "score": "0.0", "text": "func (s AdminRemoveUserFromGroupOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" } ]
[ { "docid": "ec007bbe3327b5255b8b1c9f1bd93d5e", "score": "0.7395052", "text": "func (r QueryResCheckProof) String() string {\n\tjson, _ := json.Marshal(r)\n\treturn string(json)\n}", "title": "" }, { "docid": "da4d8b897637d127f500cb4192484dc7", "score": "0.7215058", "text": "func (s CreateAlgorithmOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "cdd3975194547c61a108d58ed15e80f9", "score": "0.72000957", "text": "func (s CreateCanaryOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "c83a5bd12162ec99d9b1a53614b442ab", "score": "0.71656793", "text": "func (s CreateSipRuleOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "db8842fe62264dda9500171233b2527b", "score": "0.7136329", "text": "func (e *Output) String() string {\n\ts, _ := json.Marshal(e)\n\treturn string(s)\n}", "title": "" }, { "docid": "520165f795f98fe572fcdc518731680a", "score": "0.71093225", "text": "func (format Format) String() string {\n\tif b, err := format.MarshalText(); err == nil {\n\t\treturn string(b)\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "2d6c072e1bff1f4a686a5542f18a5fe9", "score": "0.7057528", "text": "func (c Clips) String() string {\n\tjc, _ := json.Marshal(c)\n\treturn string(jc)\n}", "title": "" }, { "docid": "1472055af0168dc370ab058189f85504", "score": "0.7056295", "text": "func (o *Analyticsproposedagent) String() string {\n \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "title": "" }, { "docid": "bf22b02f24978fee496d5e512b792759", "score": "0.70489895", "text": "func (s *storeImpl) String() string {\n\treturn s.root.print(0)\n}", "title": "" }, { "docid": "0137340e8f3253deab5174b9d62ec007", "score": "0.7044831", "text": "func (o *Trustrequestcreate) String() string {\n o.UserIds = []string{\"\"} \n o.GroupIds = []string{\"\"} \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "title": "" }, { "docid": "b9d2c9ac285fd4432653ddb865e3c664", "score": "0.7029217", "text": "func (r Recipes) String() string {\n\tjr, _ := json.Marshal(r)\n\treturn string(jr)\n}", "title": "" }, { "docid": "8832ec20e073665e1076cc5c9bd161ee", "score": "0.7028946", "text": "func (o *Digitalcondition) String() string {\n \n \n \n \n \n \n \n \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "title": "" }, { "docid": "08080e32f3d4e3b2796729e5983bc821", "score": "0.7022526", "text": "func (s Extra) String() string {\n\tres := make([]string, 6)\n\tres[0] = \"ID: \" + reform.Inspect(s.ID, true)\n\tres[1] = \"Name: \" + reform.Inspect(s.Name, true)\n\tres[2] = \"Bytes: \" + reform.Inspect(s.Bytes, true)\n\tres[3] = \"Bytes2: \" + reform.Inspect(s.Bytes2, true)\n\tres[4] = \"Byte: \" + reform.Inspect(s.Byte, true)\n\tres[5] = \"Array: \" + reform.Inspect(s.Array, true)\n\treturn strings.Join(res, \", \")\n}", "title": "" }, { "docid": "4227d23b7db534200fb84a55e9ba6e09", "score": "0.7020032", "text": "func (g GroupTour) String() string {\n\tjg, _ := json.Marshal(g)\n\treturn string(jg)\n}", "title": "" }, { "docid": "86db9e500a890f3e8a5a4e83baf135a0", "score": "0.70127267", "text": "func (s RestoreObjectOutput) String() string {\n\treturn helper.Prettify(s)\n}", "title": "" }, { "docid": "37b155138c139822d50b994c5a3331e5", "score": "0.7010184", "text": "func (s CreateHITTypeOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "fc77724b5b5fb6ad25a57c6f9f290bd7", "score": "0.7002574", "text": "func (s CreateHITOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "37ae39d3ccfcc677077bc3f72107897b", "score": "0.6996832", "text": "func (s CreateProjectVersionOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "f567f4d9cc26fe5a2b4c893f59399681", "score": "0.69932973", "text": "func (s OutputSerialization) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "f567f4d9cc26fe5a2b4c893f59399681", "score": "0.69932973", "text": "func (s OutputSerialization) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "427583d39f7eb5e3589cf3a93cec6205", "score": "0.6991622", "text": "func (s CreateEntityRecognizerOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "329138c2f7911a48ea9c7a5663fdc43c", "score": "0.69891053", "text": "func (r Record) String() string {\n\ts, _ := r.Marshal()\n\treturn string(s)\n}", "title": "" }, { "docid": "d8185db0b98df24641e3555ce5618619", "score": "0.6986732", "text": "func (s CodegenGenericDataNonModel) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "7a41282ddfe1fb25d6379908b4ee8cca", "score": "0.69831926", "text": "func (o *Schedulegenerationresult) String() string {\n \n \n \n o.Messages = []Schedulegenerationmessage{{}} \n o.MessageSeverities = []Schedulermessagetypeseverity{{}} \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "title": "" }, { "docid": "a494ef93c257a9c37a4cfcebd4b6998e", "score": "0.6980524", "text": "func (m Lyric) String() string {\n\treturn fmt.Sprintf(\"%T: %#v\", m, m.Text())\n}", "title": "" }, { "docid": "be7daba54fa9cf50b37c2372f8b9d03f", "score": "0.69791585", "text": "func (s CreateKxDatabaseOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "7e1dc3b76e617a56b057009fc425a44c", "score": "0.6978618", "text": "func (s CreateSolutionOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "63062bc65338c89109fabccd65405752", "score": "0.6975082", "text": "func (s Replay) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "edea32e6794e33a9ff01a58b4f666123", "score": "0.69603413", "text": "func (s CreateSolutionVersionOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "0db46e4d413d7ef3e68390fe7046ed48", "score": "0.6958592", "text": "func (s RedactChannelMessageOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "0e453919c23e79a82f7fa0e1ebf43961", "score": "0.6956877", "text": "func (stats *Stats) String() string {\n\tvar b bytes.Buffer\n\tstats.Print(&b)\n\treturn b.String()\n}", "title": "" }, { "docid": "6a8ddfaa6e1969adedabc1176b65432b", "score": "0.6956473", "text": "func (s CreateQualificationTypeOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "f83e33b3cb9505975437ce9769ed0e90", "score": "0.69549096", "text": "func String() string {\n\treturn Get()\n}", "title": "" }, { "docid": "0853bf682facb857bf899ef1cba0a457", "score": "0.6952188", "text": "func (t tInfo) String() string {\n\tf, w, i := t.getAll()\n\treturn fmt.Sprintf(\"%02x:%02x:%d\", f, w, i)\n}", "title": "" }, { "docid": "4f146ee06ae1d70287b1769c210796d7", "score": "0.69520515", "text": "func (o *Queueutilizationdiagnostic) String() string {\n\tj, _ := json.Marshal(o)\n\tstr, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n\treturn str\n}", "title": "" }, { "docid": "15554db724f9a32bda5b2d389ae7af67", "score": "0.695193", "text": "func (s *store) String() string {\n\treturn s.root.print(0)\n}", "title": "" }, { "docid": "4dec7e7982a96fd50bc9d28f68259673", "score": "0.69501793", "text": "func (s StartReplayOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "4053670e5622ba1dfd39768b0bc15524", "score": "0.69486177", "text": "func (b *Binary) String() string {\n\tif b == nil {\n\t\treturn \"<nil>\"\n\t}\n\treturn fmt.Sprintf(\"&Binary{Subtype:%d, Data:%#v}\", b.Subtype, b.Data)\n}", "title": "" }, { "docid": "5414906c190f5389f44e1f64fc727b0b", "score": "0.69464415", "text": "func (o *Worktypecreate) String() string {\n\tj, _ := json.Marshal(o)\n\tstr, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n\treturn str\n}", "title": "" }, { "docid": "62139d383a9352c35a1017272ea215eb", "score": "0.69460964", "text": "func (s CreateRuleOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "db558f20eaf3407b71a07c20cf1c7e8d", "score": "0.69424075", "text": "func String(encodable Encodable) (string, error) {\n\tencd := bytes.Buffer{}\n\tif err := encodable.Encode(&encd); err != nil {\n\t\treturn \"\", err\n\t}\n\treturn encd.String(), nil\n}", "title": "" }, { "docid": "53da424ddfd66edc586c234353fdb946", "score": "0.6939724", "text": "func (s CreateStackOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "53da424ddfd66edc586c234353fdb946", "score": "0.6939724", "text": "func (s CreateStackOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "2407e9d59a60df678cefb91d039039af", "score": "0.693922", "text": "func (s GetSipRuleOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "8d551f9c9c6e8fdd42a4525062a430ec", "score": "0.69369525", "text": "func (s TranslationIsoFormats) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "a258768e1ec89dce6e5ff4b9c4665e8e", "score": "0.6935911", "text": "func (s DescribeFeatureTransformationOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "0a71ab8f05506651cfd85d531ae631bb", "score": "0.69312066", "text": "func (s CreateThesaurusOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "6cb9e63dcbb92f288fc3d2fbf5b2d1b7", "score": "0.69294906", "text": "func (o *Reportingturnaction) String() string {\n \n \n \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "title": "" }, { "docid": "42012657dfcf41498b818ec3722ef7b7", "score": "0.69287163", "text": "func (s CreateRateBasedRuleOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "adef145cc716637838723b8ad7331b27", "score": "0.6928428", "text": "func (s StartCanaryOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "adef145cc716637838723b8ad7331b27", "score": "0.6928428", "text": "func (s StartCanaryOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "3b3ea8085c21d11a318ee263475a0261", "score": "0.69257265", "text": "func (s CreateFlywheelOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "7cecd17575cadd63d9bd0cca9fd43a3f", "score": "0.69235957", "text": "func (p Problem) String() string {\n\tb, _ := json.Marshal(p)\n\treturn string(b)\n}", "title": "" }, { "docid": "c888b42fa516bb64f8356548203c1e07", "score": "0.69232535", "text": "func (s DefineExpressionOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "77be63b622be0c28ffdf52d02bb3eeb2", "score": "0.6921127", "text": "func (a ACOS) String() string {\n\tja, _ := json.Marshal(a)\n\treturn string(ja)\n}", "title": "" }, { "docid": "af16d1bd8d4fe3262c53ef582e925394", "score": "0.69204015", "text": "func (o *Testmoderesults) String() string {\n\tj, _ := json.Marshal(o)\n\tstr, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n\treturn str\n}", "title": "" }, { "docid": "0a4951aca5536cdd7f3b0e6fd63268bf", "score": "0.69188565", "text": "func (n *node) String() string {\n\treturn fmt.Sprintf(\"{meta:%v, fixed:%t, minSatisfyingVersion:%v}\", n.meta, n.fixed, n.minSatisfyingVersion)\n}", "title": "" }, { "docid": "eb0758a670111889abf2b40069751575", "score": "0.6915167", "text": "func (r Recipe) String() string {\n\tjr, _ := json.Marshal(r)\n\treturn string(jr)\n}", "title": "" }, { "docid": "8185a525fe70c2d10b5e52328cae688b", "score": "0.69141936", "text": "func (r Registration) String() string {\n\tjr, _ := json.Marshal(r)\n\treturn string(jr)\n}", "title": "" }, { "docid": "ca0c58daaf0d87b2eedeef4d2b21efff", "score": "0.6913508", "text": "func (o *Learningassessment) String() string {\n\tj, _ := json.Marshal(o)\n\tstr, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n\treturn str\n}", "title": "" }, { "docid": "cc078a3efd8f4ab892ce29e735af0651", "score": "0.69133043", "text": "func (m *T3) String() string {\n x := &m.matrix\n return fmt.Sprintf(\"%f %f %f\\n\"+\n \"%f %f %f\\n\"+\n \"%f %f %f\\n\"+\n \"%f %f %f\\n\",\n x[0], x[1], x[2],\n x[3], x[4], x[5],\n x[6], x[7], x[8],\n x[9], x[10], x[11])\n}", "title": "" }, { "docid": "d4d664d42c1264e369743ce67c40523c", "score": "0.69123167", "text": "func (r QueryResCheckRequests) String() string {\n\tjson, _ := json.Marshal(r)\n\treturn string(json)\n}", "title": "" }, { "docid": "491ec12d0e658fbc1c5d00228f7966d3", "score": "0.69123024", "text": "func (s RebuildEnvironmentOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "ee1c82439f428593804e7d41e67a88bb", "score": "0.6911058", "text": "func (s DeleteAlgorithmOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "f3d17e2063beb77383a36ea3b5385691", "score": "0.69106245", "text": "func (s CanaryCodeOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "f3d17e2063beb77383a36ea3b5385691", "score": "0.69106245", "text": "func (s CanaryCodeOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "2a7047abe98f55cdae1f8f9737cdce8d", "score": "0.6910465", "text": "func (s GetRawMessageContentOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "ad47f192d74a333770b858cab44b6f33", "score": "0.6909528", "text": "func (i *Info) String() string {\n\tb, _ := json.Marshal(i)\n\treturn string(b)\n}", "title": "" }, { "docid": "a5f154353fbe365afb8ad8ced471efce", "score": "0.690952", "text": "func (a Answers) String() string {\n\tja, _ := json.Marshal(a)\n\treturn string(ja)\n}", "title": "" }, { "docid": "7d8fb6be9b020d11465e9adcc8ce4d23", "score": "0.69052833", "text": "func (r *Resource) String() string {\n\tbs, err := r.MarshalJSON()\n\tif err != nil {\n\t\treturn \"<\" + err.Error() + \">\"\n\t}\n\treturn strings.TrimSpace(string(bs)) + r.options.String()\n}", "title": "" }, { "docid": "79249e6cc9b94d1e1cdf4599277a1612", "score": "0.6903937", "text": "func (o *Provisioninfo) String() string {\n \n \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "title": "" }, { "docid": "42cb2a1938d71b576d0f59f207efe6c5", "score": "0.6903488", "text": "func (id Identification) String() string {\n\tstr, err := json.MarshalIndent(id, \"\", \" \")\n\tif err != nil {\n\t\treturn \"\"\n\t}\n\treturn fmt.Sprintf(\"%s\", str)\n}", "title": "" }, { "docid": "78ba1519c3923aa3f09f81c2569e4238", "score": "0.6900515", "text": "func (s CancelReplayOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "796dddc637d58c65df620d369b284781", "score": "0.69000846", "text": "func (c Clip) String() string {\n\tjc, _ := json.Marshal(c)\n\treturn string(jc)\n}", "title": "" }, { "docid": "5d0ef855212dd74d9c8f6bdec1114922", "score": "0.6895479", "text": "func (o *Limitchangerequestdetails) String() string {\n\tj, _ := json.Marshal(o)\n\tstr, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n\treturn str\n}", "title": "" }, { "docid": "e1ccf1817f41db110a0412aa9173cc4b", "score": "0.68944854", "text": "func (s CreateDetectorOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "e1ccf1817f41db110a0412aa9173cc4b", "score": "0.68944854", "text": "func (s CreateDetectorOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "c1e61dcc3f2c005835b59fad0a71e8da", "score": "0.6894107", "text": "func (s CreateResolverRuleOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "c7b28830138ec71f64ffc63011643b2e", "score": "0.6892943", "text": "func (s ReloadTablesOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "3cc64037e831dc747b21f738c72394ea", "score": "0.6892793", "text": "func (a Articles) String() string {\n\tja, _ := json.Marshal(a)\n\treturn string(ja)\n}", "title": "" }, { "docid": "ccb9cfe7096e9780aacc00ad49b755db", "score": "0.68885386", "text": "func (self *cat) String() string {\n\ts, _ := json.Marshal(self)\n\tvar pretty bytes.Buffer\n\tjson.Indent(&pretty, s, \"\", \" \")\n\treturn string(pretty.Bytes())\n}", "title": "" }, { "docid": "f93d8a32a6f01770a9e1a9237eee3537", "score": "0.6888019", "text": "func (s StartCelebrityRecognitionOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "3aad9005760fdaf03c048b7b9e45b6f4", "score": "0.68866765", "text": "func (s CreateFlowOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "50c9158ef84c35ab98485c1222f83efc", "score": "0.6886227", "text": "func (o *Workplanconstraintmessage) String() string {\n \n o.Arguments = []Workplanvalidationmessageargument{{}} \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "title": "" }, { "docid": "99464edfeb75b0e760e5aad8006d8d25", "score": "0.6885683", "text": "func (o *Outcomepercentilecondition) String() string {\n \n \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "title": "" }, { "docid": "c50750ae8ca4ac8cad54efbe03fcd467", "score": "0.68851185", "text": "func (s PathToObjectIdentifiers) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "f4d5ca267242dbb34de825e8f61f6af3", "score": "0.6883426", "text": "func (s CreateBGPPeerOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "7fe286cc2dc72e22ac80cd923dc22541", "score": "0.6881843", "text": "func (s IDOnly) String() string {\n\tres := make([]string, 1)\n\tres[0] = \"ID: \" + reform.Inspect(s.ID, true)\n\treturn strings.Join(res, \", \")\n}", "title": "" }, { "docid": "7fe286cc2dc72e22ac80cd923dc22541", "score": "0.6881843", "text": "func (s IDOnly) String() string {\n\tres := make([]string, 1)\n\tres[0] = \"ID: \" + reform.Inspect(s.ID, true)\n\treturn strings.Join(res, \", \")\n}", "title": "" }, { "docid": "da52b4d08629a4054eacbc7dec399415", "score": "0.68807954", "text": "func (o *Createsecuresession) String() string {\n \n \n \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "title": "" }, { "docid": "99e04df764f43b854ca8bc8c19b313df", "score": "0.6880362", "text": "func (s *Session) String() string {\n\treturn fmt.Sprintf(s.GetStringRepresentation())\n}", "title": "" }, { "docid": "0ff975a5d54856496d1fea213a63ed2a", "score": "0.6879339", "text": "func (s DescribeCanariesOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "0ff975a5d54856496d1fea213a63ed2a", "score": "0.6879339", "text": "func (s DescribeCanariesOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "18969c4dd06de4391c90b6cef495cc71", "score": "0.6877248", "text": "func (o *Evaluationquestiongroupscore) String() string {\n\tj, _ := json.Marshal(o)\n\tstr, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n\treturn str\n}", "title": "" }, { "docid": "328d864c8b9c74ecafe47e27d4ad016f", "score": "0.68766147", "text": "func (s CreateModelOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "04b2192c69c22d2929f11f3d49c7c8c5", "score": "0.6875457", "text": "func (s StartFlywheelIterationOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "cd1dd0bbea4ed6554dfbf9632ce99a1c", "score": "0.6874318", "text": "func (r Result) String() string {\n\tjr, _ := json.Marshal(r)\n\treturn string(jr)\n}", "title": "" }, { "docid": "cd1dd0bbea4ed6554dfbf9632ce99a1c", "score": "0.6874318", "text": "func (r Result) String() string {\n\tjr, _ := json.Marshal(r)\n\treturn string(jr)\n}", "title": "" }, { "docid": "38167540dad3daaaa2851aa7c2116d55", "score": "0.6871602", "text": "func (s CreateCodeRepositoryOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "daf9c1a4f5be9be430167b4424f99958", "score": "0.6871366", "text": "func (s CreateModelVersionOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "0ee975d7279a386d0e5229d511086f00", "score": "0.6870403", "text": "func (s GetDatabaseOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" } ]
5daa9290cdb893a0c787aed4a760debf
/ Description: This function takes a Height as the argument, returns the list of blocks stored in that Height or None if the Height doesn't exist. Argument: int32 Return type: []Block
[ { "docid": "b2fe183989aa8afd36a65c9546caea00", "score": "0.7262827", "text": "func (blockChain *BlockChain) Get(height int32) (blocks []Block) {\n\tif blockChain.Length < height {\n\t\treturn nil\n\t} else {\n\t\treturn blockChain.Chain[height]\n\t}\n\n}", "title": "" } ]
[ { "docid": "fee81a9615baa8d31aac9d5726a880cb", "score": "0.7512186", "text": "func (bc *BlockChain) Get(height int32) []Block {\n\t//find the corresponding list\n\tblockList := bc.Chain[height]\n\tif len(blockList) == 0 {\n\t\treturn nil\n\t}\n\treturn blockList\n}", "title": "" }, { "docid": "f06e8ada5eb841cd44b091bc11514720", "score": "0.7310455", "text": "func (bc *BlockChain) Get(height int32) []Block {\n\tif height > bc.Length {\n\t\treturn nil\n\t}\n\tblocks := bc.Chain[height]\n\tif blocks == nil || len(blocks) == 0 {\n\t\treturn nil\n\t}\n\tfmt.Println(\"Getting!!\" + string(bc.Length))\n\treturn blocks\n}", "title": "" }, { "docid": "4dc11333a649d4102e5a341102b2a129", "score": "0.6992165", "text": "func (s *MemoryStore) GetBlockByHeight(i uint32) (*Block, error) {\n\treturn nil, nil\n}", "title": "" }, { "docid": "8cb6e7586f2ce27613b5b047d8747b2d", "score": "0.6751188", "text": "func (sbc *SyncBlockChain) Get(height int32) ([]p2.Block, bool) {\n\tsbc.mux.Lock()\n\n\tblockList, b := sbc.bc.Get(height)\n\tif !b {\n\t\treturn nil, false\n\t}\n\n\tdefer sbc.mux.Unlock()\n\treturn blockList, true\n}", "title": "" }, { "docid": "b9150f0bb08ba7f1b4793e6ab3649009", "score": "0.6560331", "text": "func GetBlockByHeight(heightdb *leveldb.DB, blocksdb *leveldb.DB, heightHex []byte) ([]byte, error) {\n\t// Get the hash by height\n\thash, err := heightdb.Get(heightHex, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t// Using the hash as key, we can get the block\n\tblockSerializedBytes, err := blocksdb.Get(hash, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn blockSerializedBytes, nil\n}", "title": "" }, { "docid": "651035695f2981e833fdef8640d3b7fd", "score": "0.65484554", "text": "func oprBlockByHeight(dbht int64) *opr.OprBlock {\n\tfor _, block := range opr.OPRBlocks {\n\t\tif block.Dbht == dbht {\n\t\t\treturn block\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "b26f0f4cf2cd2b1b6baa118db50c8da7", "score": "0.6506066", "text": "func (sbc *SyncBlockChain) Get(height int32) ([]Block, bool) {\n\tsbc.mux.Lock()\n\tdefer sbc.mux.Unlock()\n\treturn sbc.bc.Get(height)\n}", "title": "" }, { "docid": "aa1e4180e28ec55f501161eb82a3a470", "score": "0.6488432", "text": "func (b *Block) Height() int64 { return b.bk.Height }", "title": "" }, { "docid": "fdfc2eaf01238c3c118c477cef78f82e", "score": "0.6339254", "text": "func (apic *APICache) GetCachedBlockByHeight(height int64) *CachedBlock {\n\tapic.RLock()\n\tif int(height) >= len(apic.MainchainBlocks) || height < 0 {\n\t\tfmt.Printf(\"block not in MainchainBlocks slice!\")\n\t\treturn nil\n\t}\n\thash := apic.MainchainBlocks[height]\n\tapic.RUnlock()\n\treturn apic.GetCachedBlockByHash(hash)\n}", "title": "" }, { "docid": "7c38e8832bf591708d640d9ac57f2399", "score": "0.6178477", "text": "func GetBlockByHeight(cmd map[string]interface{}) map[string]interface{} {\n\tresp := ResponsePack(berr.SUCCESS)\n\n\tparam, ok := cmd[\"Height\"].(string)\n\tif !ok {\n\t\treturn ResponsePack(berr.INVALID_PARAMS)\n\t}\n\tif len(param) == 0 {\n\t\treturn ResponsePack(berr.INVALID_PARAMS)\n\t}\n\tvar getTxBytes = false\n\tif raw, ok := cmd[\"Raw\"].(string); ok && raw == \"1\" {\n\t\tgetTxBytes = true\n\t}\n\theight, err := strconv.ParseInt(param, 10, 64)\n\tif err != nil {\n\t\treturn ResponsePack(berr.INVALID_PARAMS)\n\t}\n\tindex := uint32(height)\n\tblock, err := bactor.GetBlockByHeight(index)\n\tif err != nil || block == nil {\n\t\treturn ResponsePack(berr.UNKNOWN_BLOCK)\n\t}\n\tif getTxBytes {\n\t\tresp[\"Result\"] = common.ToHexString(block.ToArray())\n\t} else {\n\t\tresp[\"Result\"] = bcomn.GetBlockInfo(block)\n\t}\n\treturn resp\n}", "title": "" }, { "docid": "33eed4696c067834d7cd0e03a1083c66", "score": "0.61383224", "text": "func (g *QuickGrader) OprBlockByHeight(dbht int64) *OprBlock {\n\tg.oprBlkLock.Lock()\n\tdefer g.oprBlkLock.Unlock()\n\n\tfor _, block := range g.oprBlks {\n\t\tif block.Dbht == dbht {\n\t\t\treturn block\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4ff8b6de7f70eb29d19086cef0fd4589", "score": "0.6102702", "text": "func (bc *Blockchain) GetBlockFromHeight(height int) (Block, error) {\n\tvar block Block\n\n\thashes := bc.GetBlockHashes()\n\tif height > len(hashes) - 1 {\n\t\treturn block, errors.New(\"Block is not found.\")\n\t}\n\tblockHash := hashes[len(hashes) - 1 - height]\n\terr := bc.db.View(func(tx *bolt.Tx) error {\n\t\tb := tx.Bucket([]byte(blocksBucket))\n\n\t\tblockData := b.Get(blockHash)\n\n\t\tif blockData == nil {\n\t\t\treturn errors.New(\"Block is not found.\")\n\t\t}\n\n\t\tblock = *DeserializeBlock(blockData)\n\n\t\treturn nil\n\t})\n\tif err != nil {\n\t\treturn block, err\n\t}\n\n\treturn block, nil\n}", "title": "" }, { "docid": "fccaaa5278ea3aafd4bbea9984f94035", "score": "0.6045344", "text": "func (block *BestBlock) Height() int64 {\n\tblock.mtx.RLock()\n\tdefer block.mtx.RUnlock()\n\treturn block.height\n}", "title": "" }, { "docid": "48fa043c23795e5896a6d457e4d7640f", "score": "0.5995852", "text": "func (b *Block) GetBlockWithHeight(height int) IBlock {\n\t//获取指定高度的Block\n\t//这里采用的是递归的方法查询的\n\tif b.height == height {\n\t\treturn b\n\t} else {\n\t\treturn b.parent.GetBlockWithHeight(height)\n\t}\n}", "title": "" }, { "docid": "b873244928c36b76911d5ac7b014989a", "score": "0.59524524", "text": "func Blocks() []*Block {\n\tresult := make([]*Block, 0)\n\td := dbconf.New()\n\n\tdb, err := sql.Open(\"postgres\", d.ConnectionString())\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tsql := `\nSELECT blocked_locks.pid AS blockedPid,\n blocked_activity.query AS blockedSql,\n blocking_locks.pid AS blockingPid,\n blocking_activity.query AS blockingSql\nFROM pg_catalog.pg_locks blocked_locks\n JOIN pg_catalog.pg_stat_activity blocked_activity ON blocked_activity.pid = blocked_locks.pid\n JOIN pg_catalog.pg_locks blocking_locks ON blocking_locks.locktype = blocked_locks.locktype\n AND blocking_locks.DATABASE IS NOT DISTINCT FROM blocked_locks.DATABASE\n AND blocking_locks.relation IS NOT DISTINCT FROM blocked_locks.relation\n AND blocking_locks.page IS NOT DISTINCT FROM blocked_locks.page\n AND blocking_locks.tuple IS NOT DISTINCT FROM blocked_locks.tuple\n AND blocking_locks.virtualxid IS NOT DISTINCT FROM blocked_locks.virtualxid\n AND blocking_locks.transactionid IS NOT DISTINCT FROM blocked_locks.transactionid\n AND blocking_locks.classid IS NOT DISTINCT FROM blocked_locks.classid\n AND blocking_locks.objid IS NOT DISTINCT FROM blocked_locks.objid\n AND blocking_locks.objsubid IS NOT DISTINCT FROM blocked_locks.objsubid\n AND blocking_locks.pid != blocked_locks.pid\n JOIN pg_catalog.pg_stat_activity blocking_activity ON blocking_activity.pid = blocking_locks.pid\nWHERE NOT blocked_locks.GRANTED;`\n\n\trows, err := db.Query(sql)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tfor rows.Next() {\n\t\tvar blockedPid int32\n\t\tvar blockedSql string\n\t\tvar blockingPid int32\n\t\tvar blockingSql string\n\t\terr := rows.Scan(&blockedPid, &blockedSql, &blockingPid, &blockingSql)\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\t\tresult = append(result, &Block{&Transaction{blockedPid, blockedSql}, &Transaction{blockingPid, blockingSql}})\n\t}\n\n\treturn result\n}", "title": "" }, { "docid": "78ef0b8ea74e3541ca1d39cdc36fee39", "score": "0.5942468", "text": "func (db *LevelDb) FetchFBlockByHeight(height uint32) (block.IFBlock, error) {\n\tvar key = []byte{byte(TBL_SC_NUM)}\n\tvar buf bytes.Buffer\n\tbinary.Write(&buf, binary.BigEndian, height)\n\tkey = append(key, common.FACTOID_CHAINID...)\n\tkey = append(key, buf.Bytes()...)\n\n\tvar data []byte\n\tvar err error\n\tdb.dbLock.RLock()\n\tdata, err = db.lDb.Get(key, db.ro)\n\tdb.dbLock.RUnlock()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tecBlockHash := common.NewHash()\n\t_, err = ecBlockHash.UnmarshalBinaryData(data)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn db.FetchFBlockByHash(ecBlockHash)\n}", "title": "" }, { "docid": "292e49d82288d11eb2bc9fa02a065945", "score": "0.5935594", "text": "func (a *TendermintRPCApiService) BlocksHeightGet(ctx _context.Context, height float32) (BlockQuery, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue BlockQuery\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/blocks/{height}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"height\"+\"}\", _neturl.QueryEscape(parameterToString(height, \"\")) , -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "35813fd633508e914afeec338653f282", "score": "0.5917258", "text": "func (n *node) BlockByHeight(ctx context.Context, height uint64) (*Block, error) {\n\treturn n.getBlock(ctx, \"kai_getBlockByNumber\", height)\n}", "title": "" }, { "docid": "98834f1638495a778641e372bcd0b525", "score": "0.59154874", "text": "func (store *blockchainDatabase) GetBlockByHeight(height uint64) (*types.Block, error) {\n\thash, err := store.GetBlockHash(height)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tblock, err := store.GetBlock(hash)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn block, nil\n}", "title": "" }, { "docid": "1882f1a822618d28d7784487b695120f", "score": "0.58688146", "text": "func GetBlockTxsByHeight(cmd map[string]interface{}) map[string]interface{} {\n\tresp := ResponsePack(berr.SUCCESS)\n\n\tparam, ok := cmd[\"Height\"].(string)\n\tif !ok || len(param) == 0 {\n\t\treturn ResponsePack(berr.INVALID_PARAMS)\n\t}\n\theight, err := strconv.ParseInt(param, 10, 64)\n\tif err != nil {\n\t\treturn ResponsePack(berr.INVALID_PARAMS)\n\t}\n\tindex := uint32(height)\n\thash := bactor.GetBlockHashFromStore(index)\n\tif hash == common.UINT256_EMPTY {\n\t\treturn ResponsePack(berr.INVALID_PARAMS)\n\t}\n\tblock, err := bactor.GetBlockFromStore(hash)\n\tif err != nil {\n\t\treturn ResponsePack(berr.UNKNOWN_BLOCK)\n\t}\n\tresp[\"Result\"] = bcomn.GetBlockTransactions(block)\n\treturn resp\n}", "title": "" }, { "docid": "b0d92ef6e41d3abd3ae909bf8a1a4816", "score": "0.5857795", "text": "func (c *ChainSyncer) getBlockHeight(ctx context.Context) (uint64, []byte, error) {\n\tcurrent, err := c.backend.BlockNumber(ctx)\n\tif err != nil {\n\t\treturn 0, nil, err\n\t}\n\tif current < 60 {\n\t\t// needed for testing environments where a fresh\n\t\t// blockchain is used.\n\t\tcurrent = 1\n\t} else {\n\t\t// shave ~one minute off\n\t\tcurrent -= 10\n\n\t\t// now quanitize so that we limit the number of distinct blocks\n\t\t// we ask the peers, thereby minimizing the amount of backend\n\t\t// calls they need to do (this should be about 64 blocks quantas)\n\t\tcurrent = (current >> 6) << 6\n\t}\n\n\tvar blockHash []byte\n\tif val, ok := c.lru.Get(current); ok {\n\t\tblockHash = val.([]byte)\n\t} else {\n\t\theight := big.NewInt(0).SetUint64(current)\n\t\thdr, err := c.backend.HeaderByNumber(ctx, height)\n\t\tif err != nil {\n\t\t\treturn 0, nil, err\n\t\t}\n\t\t_ = c.lru.Add(current, hdr.Hash().Bytes())\n\t\tblockHash = hdr.Hash().Bytes()\n\t}\n\treturn current, blockHash, nil\n}", "title": "" }, { "docid": "3683912a2a2006f445fc00fcc27ee393", "score": "0.5850285", "text": "func getblockStub(method string, params []json.RawMessage) (json.RawMessage, error) {\n\tvar height string\n\terr := json.Unmarshal(params[0], &height)\n\tif err != nil {\n\t\ttestT.Fatal(\"could not unmarshal height\")\n\t}\n\n\tstep++\n\tswitch step {\n\tcase 1:\n\t\tif height != \"380640\" {\n\t\t\ttestT.Error(\"unexpected height\")\n\t\t}\n\t\t// Sunny-day\n\t\treturn blocks[0], nil\n\tcase 2:\n\t\tif height != \"380641\" {\n\t\t\ttestT.Error(\"unexpected height\")\n\t\t}\n\t\t// Sunny-day\n\t\treturn blocks[1], nil\n\tcase 3:\n\t\tif height != \"380642\" {\n\t\t\ttestT.Error(\"unexpected height\", height)\n\t\t}\n\t\t// Simulate that we're synced (caught up);\n\t\t// this should cause one 10s sleep (then retry).\n\t\treturn nil, errors.New(\"-8: Block height out of range\")\n\tcase 4:\n\t\tif sleepCount != 1 || sleepDuration != 2*time.Second {\n\t\t\ttestT.Error(\"unexpected sleeps\", sleepCount, sleepDuration)\n\t\t}\n\t\tif height != \"380642\" {\n\t\t\ttestT.Error(\"unexpected height\", height)\n\t\t}\n\t\t// Simulate that we're still caught up; this should cause a 1s\n\t\t// wait then a check for reorg to shorter chain (back up one).\n\t\treturn nil, errors.New(\"-8: Block height out of range\")\n\tcase 5:\n\t\tif sleepCount != 1 || sleepDuration != 2*time.Second {\n\t\t\ttestT.Error(\"unexpected sleeps\", sleepCount, sleepDuration)\n\t\t}\n\t\t// Back up to 41.\n\t\tif height != \"380641\" {\n\t\t\ttestT.Error(\"unexpected height\", height)\n\t\t}\n\t\t// Return the expected block (as normally happens, no actual reorg),\n\t\t// ingestor will immediately re-request the next block (42).\n\t\treturn blocks[1], nil\n\tcase 6:\n\t\tif sleepCount != 1 || sleepDuration != 2*time.Second {\n\t\t\ttestT.Error(\"unexpected sleeps\", sleepCount, sleepDuration)\n\t\t}\n\t\tif height != \"380642\" {\n\t\t\ttestT.Error(\"unexpected height\", height)\n\t\t}\n\t\t// Block 42 has now finally appeared, it will immediately ask for 43.\n\t\treturn blocks[2], nil\n\tcase 7:\n\t\tif sleepCount != 1 || sleepDuration != 2*time.Second {\n\t\t\ttestT.Error(\"unexpected sleeps\", sleepCount, sleepDuration)\n\t\t}\n\t\tif height != \"380643\" {\n\t\t\ttestT.Error(\"unexpected height\", height)\n\t\t}\n\t\t// Simulate a reorg by modifying the block's hash temporarily,\n\t\t// this causes a 1s sleep and then back up one block (to 42).\n\t\tblocks[3][9]++ // first byte of the prevhash\n\t\treturn blocks[3], nil\n\tcase 8:\n\t\tblocks[3][9]-- // repair first byte of the prevhash\n\t\tif sleepCount != 1 || sleepDuration != 2*time.Second {\n\t\t\ttestT.Error(\"unexpected sleeps\", sleepCount, sleepDuration)\n\t\t}\n\t\tif height != \"380642\" {\n\t\t\ttestT.Error(\"unexpected height \", height)\n\t\t}\n\t\treturn blocks[2], nil\n\tcase 9:\n\t\tif sleepCount != 1 || sleepDuration != 2*time.Second {\n\t\t\ttestT.Error(\"unexpected sleeps\", sleepCount, sleepDuration)\n\t\t}\n\t\tif height != \"380643\" {\n\t\t\ttestT.Error(\"unexpected height \", height)\n\t\t}\n\t\t// Instead of returning expected (43), simulate block unmarshal\n\t\t// failure, should cause 10s sleep, retry\n\t\treturn nil, nil\n\tcase 10:\n\t\tif sleepCount != 2 || sleepDuration != 12*time.Second {\n\t\t\ttestT.Error(\"unexpected sleeps\", sleepCount, sleepDuration)\n\t\t}\n\t\tif height != \"380643\" {\n\t\t\ttestT.Error(\"unexpected height \", height)\n\t\t}\n\t\t// Back to sunny-day\n\t\treturn blocks[3], nil\n\tcase 11:\n\t\tif sleepCount != 2 || sleepDuration != 12*time.Second {\n\t\t\ttestT.Error(\"unexpected sleeps\", sleepCount, sleepDuration)\n\t\t}\n\t\tif height != \"380644\" {\n\t\t\ttestT.Error(\"unexpected height \", height)\n\t\t}\n\t\t// next block not ready\n\t\treturn nil, nil\n\t}\n\ttestT.Error(\"getblockStub called too many times\")\n\treturn nil, nil\n}", "title": "" }, { "docid": "ec9fa2300117ea02ebcc443c005e211c", "score": "0.58230114", "text": "func (sbc *SyncBlockChain) GetBlock(height int32, hash string) (p2.Block, bool) {\n\t// Do not put lock and unlock in this function!\n\n\tblockList, ok := sbc.Get(height)\n\tif !ok {\n\t\treturn p2.Block{}, false\n\t}\n\n\tfor _, block := range blockList {\n\t\tif block.Header.Hash == hash {\n\t\t\treturn block, true\n\t\t}\n\t}\n\n\treturn p2.Block{}, false\n}", "title": "" }, { "docid": "56ee95dd95561bf0b09aeba3d7658542", "score": "0.5820911", "text": "func (d *Data) GetBlocks(v dvid.VersionID, start dvid.ChunkPoint3d, span int32) ([]byte, error) {\n\ttimedLog := dvid.NewTimeLog()\n\tdefer timedLog.Infof(\"GetBlocks start at %s, span %d\", start, span)\n\n\t// get store for data\n\tvar gridStore storage.GridStoreGetter\n\tvar okvDB storage.OrderedKeyValueDB\n\tvar err error\n\tgridStore, okvDB, _, err = d.gridStoreGetter()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"data type imageblk had error initializing store: %v\", err)\n\t}\n\n\t// Allocate one uncompressed-sized slice with background values.\n\tblockBytes := int32(d.BlockSize().Prod()) * d.Values.BytesPerElement()\n\tnumBytes := blockBytes * span\n\n\tbuf := make([]byte, numBytes, numBytes)\n\tif d.Background != 0 {\n\t\tfor i := range buf {\n\t\t\tbuf[i] = byte(d.Background)\n\t\t}\n\t}\n\n\tif gridStore != nil {\n\t\tblockCoord := start\n\t\tfor i := int32(0); i < span; i++ {\n\t\t\tvalue, err := gridStore.GridGet(d.ScaleLevel, blockCoord)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, datastore.ErrBranchUnlockedNode\n\t\t\t}\n\t\t\t// TODO -- This append of serialization data wouldn't be necessary if\n\t\t\t// compression was broken out.\n\t\t\tdata, err := dvid.SerializePrecompressedData(value, d.Compression(), dvid.NoChecksum)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, fmt.Errorf(\"can't serialize precompressed data: %v\", err)\n\t\t\t}\n\t\t\tuncompress := true\n\t\t\tblock, _, err := dvid.DeserializeData(data, uncompress)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, fmt.Errorf(\"Unable to deserialize block %s: %v\", blockCoord, err)\n\t\t\t}\n\t\t\tif int32(len(block)) != blockBytes {\n\t\t\t\treturn nil, fmt.Errorf(\"Deserialized block size (%d) != expected (%d)\", len(block), blockBytes)\n\t\t\t}\n\t\t\tpos := i * blockBytes\n\t\t\tcopy(buf[pos:pos+blockBytes], block)\n\t\t\tblockCoord[0]++\n\t\t}\n\t\treturn buf, nil\n\t}\n\n\tindexBeg := dvid.IndexZYX(start)\n\tsx, sy, sz := indexBeg.Unpack()\n\n\tend := start\n\tend[0] += int32(span - 1)\n\tindexEnd := dvid.IndexZYX(end)\n\tkeyBeg := NewTKey(&indexBeg)\n\tkeyEnd := NewTKey(&indexEnd)\n\n\t// Write the blocks that we can get concurrently on this byte slice.\n\tctx := datastore.NewVersionedCtx(d, v)\n\n\tvar numBlocks int\n\tvar wg sync.WaitGroup\n\terr = okvDB.ProcessRange(ctx, keyBeg, keyEnd, &storage.ChunkOp{}, func(c *storage.Chunk) error {\n\t\tif c == nil || c.TKeyValue == nil {\n\t\t\treturn nil\n\t\t}\n\t\tkv := c.TKeyValue\n\t\tif kv.V == nil {\n\t\t\treturn nil\n\t\t}\n\n\t\t// Determine which block this is.\n\t\tindexZYX, err := DecodeTKey(kv.K)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tx, y, z := indexZYX.Unpack()\n\t\tif z != sz || y != sy || x < sx || x >= sx+int32(span) {\n\t\t\treturn fmt.Errorf(\"Received key-value for %s, not supposed to be within span range %s, length %d\", indexZYX, start, span)\n\t\t}\n\t\tn := x - sx\n\t\ti := n * blockBytes\n\t\tj := i + blockBytes\n\n\t\t// Spawn goroutine to transfer data\n\t\tnumBlocks++\n\t\twg.Add(1)\n\t\tgo xferBlock(buf[i:j], c, &wg)\n\t\treturn nil\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\twg.Wait()\n\treturn buf, nil\n}", "title": "" }, { "docid": "bb51bc01977a9a8ac626bfdee5b14216", "score": "0.5811017", "text": "func (a *Ant) BlockHeight() types.BlockHeight {\n\theight := types.BlockHeight(0)\n\tfor h := range a.SeenBlocks {\n\t\tif h > height {\n\t\t\theight = h\n\t\t}\n\t}\n\treturn height\n}", "title": "" }, { "docid": "73649419e905800d79e364e829d116d9", "score": "0.5802807", "text": "func (pgb *ChainDB) BlockTimeByHeight(height int64) (int64, error) {\n\tctx, cancel := context.WithTimeout(pgb.ctx, pgb.queryTimeout)\n\tdefer cancel()\n\ttime, err := RetrieveBlockTimeByHeight(ctx, pgb.db, height)\n\treturn time.UNIX(), pgb.replaceCancelError(err)\n}", "title": "" }, { "docid": "75102412665af45d70386ab18fceb03f", "score": "0.5790894", "text": "func getblockStub(method string, params []json.RawMessage) (json.RawMessage, error) {\n\tif method != \"getblock\" {\n\t\ttestT.Error(\"unexpected method\")\n\t}\n\tvar arg string\n\terr := json.Unmarshal(params[0], &arg)\n\tif err != nil {\n\t\ttestT.Fatal(\"could not unmarshal height\")\n\t}\n\n\tstep++\n\tswitch step {\n\tcase 1:\n\t\treturn []byte(\"{\\\"Tx\\\": [\\\"00\\\"], \\\"Hash\\\": \\\"0000380640\\\"}\"), nil\n\tcase 2:\n\t\tif arg != \"0000380640\" {\n\t\t\ttestT.Error(\"unexpected hash\")\n\t\t}\n\t\t// Sunny-day\n\t\treturn blocks[0], nil\n\tcase 3:\n\t\treturn []byte(\"{\\\"Tx\\\": [\\\"00\\\"], \\\"Hash\\\": \\\"0000380641\\\"}\"), nil\n\tcase 4:\n\t\tif arg != \"0000380641\" {\n\t\t\ttestT.Error(\"unexpected hash\")\n\t\t}\n\t\t// Sunny-day\n\t\treturn blocks[1], nil\n\tcase 5:\n\t\tif arg != \"380642\" {\n\t\t\ttestT.Error(\"unexpected height\")\n\t\t}\n\t\t// Simulate that we're synced (caught up, latest block 380641).\n\t\treturn nil, errors.New(\"-8: Block height out of range\")\n\t}\n\ttestT.Error(\"getblockStub called too many times\")\n\treturn nil, nil\n}", "title": "" }, { "docid": "e8caaee90aebe308605e947e97b4750d", "score": "0.573752", "text": "func Get(db sql.Executor, id types.BlockID) (rst *types.Block, err error) {\n\tif rows, err := db.Exec(\"select block from blocks where id = ?1;\", func(stmt *sql.Statement) {\n\t\tstmt.BindBytes(1, id.Bytes())\n\t}, func(stmt *sql.Statement) bool {\n\t\trst, err = decodeBlock(stmt.ColumnReader(0), id)\n\t\treturn true\n\t}); err != nil {\n\t\treturn nil, fmt.Errorf(\"get block %s: %w\", id, err)\n\t} else if rows == 0 {\n\t\treturn nil, fmt.Errorf(\"get block %s: %w\", id, sql.ErrNotFound)\n\t}\n\treturn rst, err\n}", "title": "" }, { "docid": "a05b9bffb3b636c65c3f74afd9515ffb", "score": "0.57156795", "text": "func (b *Block) GetHeight() int64 {\n\treturn b.Height\n}", "title": "" }, { "docid": "03a210425ad4fb35bf00a185737a4d3a", "score": "0.5711052", "text": "func (s *SQLiteStorage) GetLastBlock() (height int64, hash chainhash.Hash, err error) {\n\tvar bHash []byte\n\tif s.dirty {\n\t\treturn -1, primitives.ZeroHash, ErrDirtyStorage\n\t}\n\n\terr = s.getLastBlockStmt.QueryRowx().Scan(&height, &bHash)\t\n\tswitch { \n\tcase err == sql.ErrNoRows:\n\t\treturn -1, primitives.ZeroHash, nil\n\n\tcase err != nil:\n\t\treturn -1, primitives.ZeroHash, err\n\n\tdefault:\n\t\tcopy(hash[:], bHash)\n\t\treturn height, hash, nil\n\t}\n}", "title": "" }, { "docid": "64e2872b9d934e507692235c94c0eb9f", "score": "0.5697231", "text": "func (m *memStoreProvider) GetByHeight(h int64) (FullCommit, error) {\n\tm.mtx.RLock()\n\tdefer m.mtx.RUnlock()\n\n\t// search from highest to lowest\n\tfor i := len(m.byHeight) - 1; i >= 0; i-- {\n\t\tfc := m.byHeight[i]\n\t\tif fc.Height() <= h {\n\t\t\treturn fc, nil\n\t\t}\n\t}\n\treturn FullCommit{}, liteErr.ErrCommitNotFound()\n}", "title": "" }, { "docid": "5b7ae342b20bd0df906f2fe83637902b", "score": "0.5669748", "text": "func (t *JsonTemplate) Blocks() []Block {\n\treturn t.blocks\n}", "title": "" }, { "docid": "5de27c91089adf91f4e2e3e856671311", "score": "0.5655053", "text": "func getBlockHeight() (getBlockHeight int64) {\n\t//var height Blocks\n\t//if conf.mongoDB[0] == conf.mongoDB[1] {\n\t// defer func() { //Catch errors, and resume\n\t// r := recover()\n\t// if r != nil {\n\t// log.Error(\"Database Access problem:\", r)\n\t// } } ()\n\t// session, err := mgo.Dial(conf.Database)\n\t// if err != nil {\n\t// conf.mongoDB[1] = 0\n\t// panic(err)\n\t// }\n\t// defer session.Close()\n\t// err = session.DB(conf.DBName).C(\"chainInfo\").Find(nil).One(&height)\n\t// if err != nil {\n\t// conf.mongoDB[1] = 0\n\t// log.Warning(\"No DB Space when trying to get height\")\n\t// panic(err)\n\t// }\n\t//} else {\n\t// log.Warning(\"Skipping Database connection, will retry in [\",conf.mongoDB,\"] cycles!\")\n\t// conf.mongoDB[1]++\n\t//}\n\tgetBlockHeight = 0\n\treturn\n}", "title": "" }, { "docid": "909601b0139043a2b89685b294dbba6e", "score": "0.5651074", "text": "func (bc *BlockChain) NonSyncGet(Height int32) []Block {\n\t// takes an instance of a block chain and a Height in int32\n\t// returns a slice containing the blocks at that that Height or nil\n\tif val, ok := bc.Chain[Height]; ok {\n\t\treturn val\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f7398de55e71bdcdd35102417bba75d8", "score": "0.5651003", "text": "func PoolGetBlocks(page int) (PoolBlockData, error) {\n\tvar (\n\t\tresponse Response\n\t\tdata PoolBlockData\n\t\terr error\n\t)\n\n\tpageStr := strconv.Itoa(page)\n\n\tif response, err = sendAPIRequest(Pool, \"\", \"blocks\", []string{\"page=\" + pageStr}); err != nil {\n\t\treturn data, err\n\t}\n\n\tresponseData := response.Result.(map[string]interface{})\n\tblocksData := responseData[\"data\"].([]interface{})\n\n\tfor _, blockDataPoint := range blocksData {\n\t\tblockData := blockDataPoint.(map[string]interface{})\n\n\t\tdata.Data = append(data.Data, Block{\n\t\t\tHash: blockData[\"hash\"].(string),\n\t\t\tNumber: uint(blockData[\"number\"].(float64)),\n\t\t\tType: blockData[\"type\"].(string),\n\t\t\tMiner: blockData[\"miner\"].(string),\n\t\t\tDifficulty: uint(blockData[\"difficulty\"].(float64)),\n\t\t\tTimestamp: uint(blockData[\"timestamp\"].(float64)),\n\t\t\tConfirmed: blockData[\"confirmed\"].(bool),\n\t\t\tRoundTime: uint(blockData[\"round_time\"].(float64)),\n\t\t\tLuck: blockData[\"luck\"].(float64),\n\t\t\tServerName: blockData[\"server_name\"].(string),\n\t\t\tBlockReward: uint(blockData[\"block_reward\"].(float64) * WeiRatio),\n\t\t\tBlockFees: uint(blockData[\"block_fees\"].(float64) * WeiRatio),\n\t\t\tUncleInclusionRewards: uint(blockData[\"uncle_inclusion_rewards\"].(float64) * WeiRatio),\n\t\t\tTotalRewards: uint(blockData[\"total_rewards\"].(float64) * WeiRatio),\n\t\t})\n\t}\n\n\tdata.ItemsPerPage = int(responseData[\"items_per_page\"].(float64))\n\tdata.TotalItems = int(responseData[\"total_items\"].(float64))\n\tdata.TotalPages = int(responseData[\"total_pages\"].(float64))\n\n\treturn data, nil\n}", "title": "" }, { "docid": "cafd2c2221eec87e746a86b67f6bebfd", "score": "0.5644942", "text": "func findBlock(hash string) []byte {\n\tvar data []byte\n\t// read only func View() to find blocks\n\tdb.View(func(t *bolt.Tx) error {\n\t\tbucket := t.Bucket([]byte(blocksBucket))\n\t\tdata = bucket.Get([]byte(hash))\n\t\treturn nil\n\t})\n\n\treturn data\n}", "title": "" }, { "docid": "620b309b56241b83e7954c0df8454819", "score": "0.5643482", "text": "func (xc *AChainCore) GetBlockByHeight(in *pb.BlockHeight) *pb.Block {\n\tout := &pb.Block{Header: in.Header}\n\tout.Header.Error = pb.AChainErrorEnum_SUCCESS\n\tout.Bcname = in.Bcname\n\tif xc.Status() != global.Normal {\n\t\tout.Header.Error = pb.AChainErrorEnum_CONNECT_REFUSE\n\t\txc.log.Debug(\"refused a connection a function call GetBlock\", \"logid\", in.Header.Logid)\n\t\treturn out\n\t}\n\tib, err := xc.Ledger.QueryBlockByHeight(in.Height)\n\tif err != nil {\n\t\tswitch err {\n\t\tcase ledger.ErrBlockNotExist:\n\t\t\tout.Header.Error = pb.AChainErrorEnum_SUCCESS\n\t\t\tout.Status = pb.Block_NOEXIST\n\t\t\treturn out\n\t\tdefault:\n\t\t\txc.log.Warn(\"getblock by height\", \"logid\", in.Header.Logid, \"error\", err)\n\t\t\tout.Header.Error = pb.AChainErrorEnum_UNKNOW_ERROR\n\t\t\treturn out\n\t\t}\n\t} else {\n\t\tout.Block = ib\n\t\tif ib.InTrunk {\n\t\t\tout.Status = pb.Block_TRUNK\n\t\t} else {\n\t\t\tout.Status = pb.Block_BRANCH\n\t\t}\n\t}\n\treturn out\n}", "title": "" }, { "docid": "8b84ca63b90a2157aa9f98e323f7b898", "score": "0.5641124", "text": "func (b *Block) GetHeight() uint {\n\treturn b.height\n}", "title": "" }, { "docid": "0546229b6140e0023a26b5cebb05f56b", "score": "0.560398", "text": "func (l *Link) Blocks() []BlockInfo {\n\treturn nil\n}", "title": "" }, { "docid": "3848643ff7b661b05363cbe18f23e3fc", "score": "0.56027615", "text": "func (c *Client) GetBlockHashByHeight(height int64) (blockHash *BlockHashByHeightResponse, err error) {\n\n\t// Create the request\n\tvar resp string\n\t// /api/v3/network/block-index/height\n\tresp, err = c.Request(fmt.Sprintf(\"block-index/%d\", height), http.MethodGet, nil)\n\tif err != nil {\n\t\treturn\n\t}\n\n\t// Process the response\n\tblockHash = new(BlockHashByHeightResponse)\n\tif err = json.Unmarshal([]byte(resp), blockHash); err != nil {\n\t\treturn\n\t}\n\n\t// Error from request?\n\tif c.LastRequest.StatusCode != http.StatusOK {\n\t\terr = fmt.Errorf(\"error: %s\", blockHash.ErrorMessage)\n\t\treturn\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "dba592ed591d767f2f5c4a173db6c45a", "score": "0.55878776", "text": "func (l *Layer) Blocks() []*Block {\n\treturn l.blocks\n}", "title": "" }, { "docid": "86494ea3db72feba6978710a08deca1b", "score": "0.5577797", "text": "func (pgb *ChainDB) BlockHeight(hash string) (int64, error) {\n\tctx, cancel := context.WithTimeout(pgb.ctx, pgb.queryTimeout)\n\tdefer cancel()\n\theight, err := RetrieveBlockHeight(ctx, pgb.db, hash)\n\treturn height, pgb.replaceCancelError(err)\n}", "title": "" }, { "docid": "abeae0eec7c1b3966f1d6b793a020974", "score": "0.5569579", "text": "func (db *LevelDb) FetchHeightRange(startHeight, endHeight int64) (rshalist []wire.ShaHash, err error) {\n\n\tvar endidx int64\n\tif endHeight == database.AllShas {\n\t\tendidx = startHeight + wire.MaxBlocksPerMsg\n\t} else {\n\t\tendidx = endHeight\n\t}\n\n\tshalist := make([]wire.ShaHash, 0, endidx-startHeight)\n\tfor height := startHeight; height < endidx; height++ {\n\t\t// TODO(drahn) fix blkFile from height\n\n\t\tdbhash, lerr := db.FetchDBHashByHeight(uint32(height))\n\t\tif lerr != nil || dbhash == nil {\n\t\t\tbreak\n\t\t}\n\n\t\tsha := wire.FactomHashToShaHash(dbhash)\n\t\tshalist = append(shalist, *sha)\n\t}\n\n\tif err != nil {\n\t\treturn\n\t}\n\t//log.Tracef(\"FetchIdxRange idx %v %v returned %v shas err %v\", startHeight, endHeight, len(shalist), err)\n\n\treturn shalist, nil\n}", "title": "" }, { "docid": "758d85837afc8ae69e5eef25c02c1963", "score": "0.55523986", "text": "func AskForBlock(height int32, hash string) {\n\tPeers.Rebalance()\n\theightStr := strconv.Itoa(int(height))\n\tpeerMap := Peers.Copy()\n\tfor addr := range peerMap {\n\t\taddr = addr + \"/block/{\" + heightStr + \"}/{\" + hash + \"}\"\n\t\tresp, err := http.Get(addr)\n\t\tif err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t\tdefer resp.Body.Close()\n\t\tif resp.StatusCode == 200 {\n\t\t\tbody, err := ioutil.ReadAll(resp.Body)\n\t\t\tif err != nil {\n\t\t\t\tpanic(err)\n\t\t\t}\n\t\t\tbodyStr := string(body)\n\t\t\tblock := p2.BlockDecodeFromJSON(bodyStr)\n\n\t\t\tif !SBC.CheckParentHash(block) {\n\t\t\t\tAskForBlock(block.HeaderValue.Height-1, block.HeaderValue.ParentHash)\n\t\t\t}\n\t\t\tSBC.Insert(block)\n\t\t\tbreak\n\t\t}\n\t}\n}", "title": "" }, { "docid": "1409cced6e40b30a93b53f45aa022e9f", "score": "0.55497926", "text": "func TestClient_GetBlockHashByHeight(t *testing.T) {\n\t// Skip this test in short mode (not needed)\n\tif testing.Short() {\n\t\tt.Skip(\"skipping testing in short mode\")\n\t}\n\n\t// Create a new client object to handle your queries (supply an API Key)\n\tclient, err := NewClient(testAPIKey, NetworkMain, nil)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\tvar resp *BlockHashByHeightResponse\n\theight := 15000\n\tresp, err = client.GetBlockHashByHeight(int64(height))\n\tif err != nil {\n\t\tt.Fatal(\"error occurred: \" + err.Error())\n\t}\n\n\tif len(resp.BlockHash) == 0 {\n\t\tt.Fatal(\"we should have the hash\", resp.BlockHash)\n\t}\n}", "title": "" }, { "docid": "df3bb34ea9463b25a776fd4ca196f5a2", "score": "0.55367434", "text": "func (db *LevelDb) FetchHeightRange(startHeight, endHeight int32) (rshalist []wire.Hash, err error) {\n\tshalist := make([]wire.Hash, 0, endHeight-startHeight)\n\tfor height := startHeight; height < endHeight; height++ {\n\t\tkey := int64ToKey(int64(height))\n\t\tblkVal, lerr := db.lDb.Get(key, db.ro)\n\t\tif lerr != nil {\n\t\t\tbreak\n\t\t}\n\n\t\tvar sha wire.Hash\n\t\tsha.SetBytes(blkVal[0:32])\n\t\tshalist = append(shalist, sha)\n\t}\n\n\tif err != nil {\n\t\treturn\n\t}\n\n\treturn shalist, nil\n}", "title": "" }, { "docid": "783214cbc5a29af998ae566c598df102", "score": "0.5535933", "text": "func Block(height *int64, bTime string, num *int64, chainID string) (blk *BlockResult, err error) {\n\n\t_, _, chainID = prepare(\"\", \"\", chainID)\n\n\tif height == nil && bTime == \"\" {\n\t\tblkResult, err := BlockHeight(chainID)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\theight = &blkResult.LastBlock\n\t}\n\n\tif height != nil {\n\t\treturn block(*height, chainID)\n\t} else {\n\t\treturn blockEx(bTime, num, chainID)\n\t}\n}", "title": "" }, { "docid": "f8fcc0d160e1ba03e617dde54a728a78", "score": "0.55070025", "text": "func (pgb *ChainDB) Height() int64 {\n\treturn pgb.bestBlock.Height()\n}", "title": "" }, { "docid": "57dd69cf7acbd7d17f9fe2c67aed5a7d", "score": "0.55002856", "text": "func (*BlockWithHeight) Descriptor() ([]byte, []int) {\n\treturn file_waves_node_grpc_blocks_api_proto_rawDescGZIP(), []int{2}\n}", "title": "" }, { "docid": "2d0f019fddfbb5c41fa018a23385aed1", "score": "0.5487219", "text": "func (db *LevelDb) FetchDBlockByHeight(dBlockHeight uint32) (dBlock *common.DirectoryBlock, err error) {\n\tdBlockHash, err := db.FetchDBHashByHeight(dBlockHeight)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif dBlockHash != nil {\n\t\tdBlock, err = db.FetchDBlockByHash(dBlockHash)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn dBlock, nil\n}", "title": "" }, { "docid": "b75a21fbfc9bc180dda3f07d9ddc6812", "score": "0.54848695", "text": "func (b Blocks) Get(name string) *Block {\n\tfor i := range b {\n\t\tblk := &b[i]\n\t\tif blk.Name == name {\n\t\t\treturn blk\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c515a57609a7a2bf84cfe5ed9bbdeafb", "score": "0.54806477", "text": "func GetECBlockByHeight(height int64) (ecblock *ECBlock, err error) {\n\tparams := heightRequest{Height: height, NoRaw: true}\n\treq := NewJSON2Request(\"ecblock-by-height\", APICounter(), params)\n\tresp, err := factomdRequest(req)\n\tif err != nil {\n\t\treturn\n\t}\n\tif resp.Error != nil {\n\t\treturn nil, resp.Error\n\t}\n\n\twrap := new(struct {\n\t\tECBlock *ECBlock `json:\"ecblock\"`\n\t})\n\tif err = json.Unmarshal(resp.JSONResult(), wrap); err != nil {\n\t\treturn\n\t}\n\n\treturn wrap.ECBlock, nil\n}", "title": "" }, { "docid": "f9aa532d3765c2d0e52c8b8c9dcf67d8", "score": "0.5448277", "text": "func Blocks(dimensions Dimensions, offset Location) []Location {\n\n\tconst HEIGHT = 5\n\treturn getRepeatingPattern(dimensions, Dimensions{Height: HEIGHT, Width: HEIGHT},\n\t\toffset,\n\t\tfunc(seed *[]Location, currentX, currentY int) {\n\t\t\t// ROW 1\n\t\t\t*seed = append(*seed, Location{X: currentX, Y: currentY})\n\t\t\t*seed = append(*seed, Location{X: currentX + 1, Y: currentY})\n\t\t\t// ROW 2\n\t\t\t*seed = append(*seed, Location{X: currentX, Y: currentY + 1})\n\t\t\t*seed = append(*seed, Location{X: currentX + 1, Y: currentY + 1})\n\t\t})\n}", "title": "" }, { "docid": "35f314c2ebaf606b3eda0048f2aa22e6", "score": "0.54427624", "text": "func (piece *Piece) Blocks() []*block.Block {\r\n\treturn piece.blocks\r\n}", "title": "" }, { "docid": "4623e7bbb791015d8664761b87b2f24c", "score": "0.5439143", "text": "func block(height int64, chainID string) (blk *BlockResult, err error) {\n\n\tdefer FuncRecover(&err)\n\n\taddrS := nodeAddrSlice(chainID)\n\n\tresult := new(core_types.ResultBlock)\n\tparams := map[string]interface{}{\"height\": height}\n\terr = common.DoHttpRequestAndParseExBlock(addrS, \"block\", params, result)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tblk = new(BlockResult)\n\tblk.BlockHeight = result.BlockMeta.Header.Height\n\tblk.BlockHash = \"0x\" + hex.EncodeToString(result.BlockMeta.BlockID.Hash)\n\tblk.ParentHash = \"0x\" + hex.EncodeToString(result.BlockMeta.Header.LastBlockID.Hash)\n\tblk.ChainID = result.BlockMeta.Header.ChainID\n\tblk.ValidatorHash = \"0x\" + hex.EncodeToString(result.BlockMeta.Header.ValidatorsHash)\n\tblk.ConsensusHash = \"0x\" + hex.EncodeToString(result.BlockMeta.Header.ConsensusHash)\n\tblk.BlockTime = result.BlockMeta.Header.Time.String()\n\tblk.BlockSize = result.BlockSize\n\tblk.ProposerAddress = result.BlockMeta.Header.ProposerAddress\n\n\tblk.Txs = make([]TxResult, 0)\n\tvar blkResults *core_types.ResultBlockResults\n\tif blkResults, err = blockResults(chainID, height); err != nil {\n\t\treturn blk, nil\n\t}\n\n\tblk.Txs = make([]TxResult, 0)\n\tfor k, ResDeliver := range blkResults.Results.DeliverTx {\n\t\tvar tx *TxResult\n\t\tif tx, err = transactionBlock(k, ResDeliver, result); err != nil {\n\t\t\treturn\n\t\t}\n\t\tblk.Txs = append(blk.Txs, *tx)\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "f1e98eb860b43b1a9d8b7346061766e7", "score": "0.54375654", "text": "func (search *Client) BlockTime(height uint64) (math.Timestamp, error) {\n\tts, err := search.Client.Get(\n\t\tfmtHeightToTimestamp(height),\n\t)\n\tvar t math.Timestamp\n\tif err != nil {\n\t\treturn t, fmt.Errorf(\"getting timestamp for block %d: %s\", height, err)\n\t}\n\tif ts == \"\" {\n\t\treturn t, nil\n\t}\n\tt, err = math.ParseTimestamp(ts)\n\tif err != nil {\n\t\treturn t, fmt.Errorf(\"parsing timestamp for block %d (%s): %s\", height, ts, err)\n\t}\n\treturn t, nil\n}", "title": "" }, { "docid": "cbe4110c814358c210152d2709645cc1", "score": "0.5433231", "text": "func (db *LevelDb) fetchBlockShaByHeight(height int32) (rsha *wire.Hash, err error) {\n\tkey := int64ToKey(int64(height))\n\n\tblkVal, err := db.lDb.Get(key, db.ro)\n\tif err != nil {\n\t\tlogging.CPrint(logging.TRACE, \"failed to find block on height\", logging.LogFormat{\"height\": height})\n\t\treturn\n\t}\n\n\tvar sha wire.Hash\n\tsha.SetBytes(blkVal[0:32])\n\n\treturn &sha, nil\n}", "title": "" }, { "docid": "c69cf5689529e9584a5980ceea99aa74", "score": "0.5416974", "text": "func get_blocks(data []int64, blocksize int) (blocks [][]int64){\n for i := 0; i < len(data) / blocksize; i++ {\n blocks = append(blocks, data[blocksize * i : blocksize * (i + 1)])\n }\n return blocks\n}", "title": "" }, { "docid": "d7a6bfeab77813cf70d9b06c5c75b07d", "score": "0.54124665", "text": "func (app *block) List() ([]hash.Hash, error) {\n\treturn app.blockRepository.List()\n}", "title": "" }, { "docid": "966f0d376b69d483bc52e2be70b6ed6c", "score": "0.5408966", "text": "func (blocks Blocks) Latest() Block {\n\treturn blocks.Blocks[len(blocks.Blocks)-1]\n}", "title": "" }, { "docid": "94c0d7cf1575475b2f5e0364e63b399c", "score": "0.5388539", "text": "func (n *Node) GetBlock(conn *net.TCPConn, db *leveldb.DB) {\n\n\theigh, err := db.Get([]byte(\"heigh\"), nil)\n\tif err != nil {\n\t\tfmt.Println(\"can't read database : \", err)\n\t\treturn\n\t}\n\th := int64(binary.BigEndian.Uint64(heigh))\n\n\tmess := Message{\n\t\tGetBlock,\n\t\th,\n\t\tnil,\n\t\tnil,\n\t\tnil,\n\t}\n\tms, err := json.Marshal(mess)\n\tif err != nil {\n\t\tfmt.Println(\"can't Marshal Message : \", err)\n\t\treturn\n\t}\n\tconn.Write(ms)\n}", "title": "" }, { "docid": "4bd3beb71a5c727054c039b1823dfdb5", "score": "0.5379882", "text": "func (self *Friendscript) Blocks() []*Block {\n\tblocks := make([]*Block, 0)\n\troot := self.AST()\n\n\troot.traverse(func(node *node32, depth int) {\n\t\t// fmt.Printf(\"[% 2d] %v%v %q\\n\", depth, strings.Repeat(` `, depth), node, self.s(node))\n\n\t\tswitch node.rule() {\n\t\tcase ruleStatementBlock:\n\t\t\tblocks = append(blocks, &Block{\n\t\t\t\tfriendscript: self,\n\t\t\t\tnode: node,\n\t\t\t})\n\t\t}\n\t}, 1)\n\n\treturn blocks\n}", "title": "" }, { "docid": "087471f5bfbc5255b5f6e1452e2eae86", "score": "0.5373523", "text": "func GetBlockByHeightRaw(blockType string, height int64) (*BlockByHeightRawResponse, error) {\n\tparams := heightRequest{Height: height, NoRaw: false} // include raw\n\treq := NewJSON2Request(fmt.Sprintf(\"%vblock-by-height\", blockType), APICounter(), params)\n\tresp, err := factomdRequest(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif resp.Error != nil {\n\t\treturn nil, resp.Error\n\t}\n\n\tblock := new(BlockByHeightRawResponse)\n\tif err := json.Unmarshal(resp.JSONResult(), block); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn block, nil\n}", "title": "" }, { "docid": "032c8671a71f511cdfb127227a1436c3", "score": "0.5355222", "text": "func (bs *BlockStore) GetBlock(blockHash string, blockData *Block) error {\n *blockData = bs.BlockMap[blockHash]\n return nil\n}", "title": "" }, { "docid": "140216812839ff919f6c46239a28c863", "score": "0.53548527", "text": "func block(h *[4]uint32, m []byte)", "title": "" }, { "docid": "2c19c8dcf00eedef06358bcb266fd29d", "score": "0.5347076", "text": "func (b block_) blockhash(blockNumber *big.Int) [32]byte { // todo block.blockhash [32] byte or *big.Int?\n\tvar a [32]byte\n\treturn a\n}", "title": "" }, { "docid": "95f23a910350d093b289f843008d5346", "score": "0.5342511", "text": "func FetchBlock(height uint64) (ret *convert.EventBlockTable, err error) {\n\tret = &convert.EventBlockTable{}\n\tdb := convert.EventBlockTableWhereEqual(globalDBOpt, \"Height\", height)\n\terr = db.First(ret).Error\n\treturn\n}", "title": "" }, { "docid": "919931ce75f7c5069503f1662b5fbc99", "score": "0.5333114", "text": "func (h *blockHeaderStore) FetchHeaderByHeight(height uint32) (*wire.BlockHeader, error) {\n\t// Lock store for read.\n\th.mtx.RLock()\n\tdefer h.mtx.RUnlock()\n\n\t// For this query, we don't need to consult the index, and can instead\n\t// just seek into the flat file based on the target height and return\n\t// the full header.\n\theader, err := h.readHeader(height)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &header, nil\n}", "title": "" }, { "docid": "d36e45c20d411696ae89a14d7b052832", "score": "0.53212756", "text": "func (c *Chain) Get(hash [32]byte) *Block {\n\treturn c.blocks.Get(hash)\n}", "title": "" }, { "docid": "843b1238a236e057e2fc1e825d2301b2", "score": "0.53209275", "text": "func (b *Blocks) Block(i int) *Blocks {\n if i >= b.NumBlocks() {\n panic(fmt.Sprintf(\n \"Cannot get block %d >= block count %d (for %d bytes).\",\n i, b.NumBlocks(), b.buf.Len()))\n }\n start := b.block_size * i\n end := b.block_size * (i + 1)\n if end >= b.buf.Len() { // go has no integer min\n end = b.buf.Len()\n }\n extracted := FromBytes(b.buf.Bytes()[start:end])\n extracted.block_size = b.block_size\n return extracted\n}", "title": "" }, { "docid": "5bb704619c9c3dec38078966fc4707ca", "score": "0.53142685", "text": "func getBlock(contents []byte, i int) []byte {\n\tsliceStart := MAX_BLOCK_SIZE * (i - 1)\n\tsliceEnd := sliceStart + MAX_BLOCK_SIZE\n\tif sliceStart > len(contents) {\n\t\t// Termination\n\t\treturn nil\n\t} else if sliceEnd > len(contents) {\n\t\tsliceEnd = len(contents)\n\t}\n\n\treturn contents[sliceStart:sliceEnd]\n}", "title": "" }, { "docid": "e180a6897e881e34a1607ef8039a2110", "score": "0.5303621", "text": "func GetBlockHash(cmd map[string]interface{}) map[string]interface{} {\n\tresp := ResponsePack(berr.SUCCESS)\n\tparam, ok := cmd[\"Height\"].(string)\n\tif !ok || len(param) == 0 {\n\t\treturn ResponsePack(berr.INVALID_PARAMS)\n\t}\n\theight, err := strconv.ParseInt(param, 10, 64)\n\tif err != nil {\n\t\treturn ResponsePack(berr.INVALID_PARAMS)\n\t}\n\thash := bactor.GetBlockHashFromStore(uint32(height))\n\tif hash == common.UINT256_EMPTY {\n\t\treturn ResponsePack(berr.UNKNOWN_BLOCK)\n\t}\n\tresp[\"Result\"] = hash.ToHexString()\n\treturn resp\n}", "title": "" }, { "docid": "26e164dd4b34c73bebabf63081eee70b", "score": "0.5294471", "text": "func (pool *SnailPool) Content() []*types.SnailBlock {\n\tpool.muFruit.Lock()\n\tdefer pool.muFruit.Unlock()\n\n\tvar fruits types.SnailBlocks\n\tvar rtfruits types.SnailBlocks\n\n\tfor _, fruit := range pool.fruitPending {\n\t\tfruits = append(fruits, types.CopyFruit(fruit))\n\t}\n\n\tvar blockby types.SnailBlockBy = types.FruitNumber\n\tblockby.Sort(fruits)\n\n\tfor _, v := range fruits {\n\t\trtfruits = append(rtfruits, v)\n\t}\n\treturn fruits\n}", "title": "" }, { "docid": "eca859be59f5cee80f6c0e2eee014ad5", "score": "0.5293098", "text": "func GetAllBlocks(w http.ResponseWriter, r *http.Request) {\n\tdbase := db.ConnectShyftDatabase()\n\n\tvars := mux.Vars(r)\n\tcurrentPage := vars[\"currentPage\"]\n\tpageLimit := vars[\"pageLimit\"]\n\tpage := common.StringToInteger(currentPage)\n\tlimit := common.StringToInteger(pageLimit)\n\n\tblocks, err := b.BlockArrayQueries(dbase, db.GetAllBlocks, page, limit, \"\")\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), 500)\n\t\treturn\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json; charset=UTF-8\")\n\tw.WriteHeader(http.StatusOK)\n\tlogger.WriteLogger(w.Write(blocks))\n}", "title": "" }, { "docid": "dc450ec03d674661b5bc04585710af9b", "score": "0.5292083", "text": "func (bc *Blockchain) GetBestHeight() int {\n\tvar lastBlock Block\n\n\terr := bc.db.View(func(tx *bolt.Tx) error {\n\t\tb := tx.Bucket([]byte(blocksBucket))\n\t\tlastHash := b.Get([]byte(\"l\"))\n\t\tblockData := b.Get(lastHash)\n\t\tlastBlock = *DeserializeBlock(blockData)\n\n\t\treturn nil\n\t})\n\tif err != nil {\n\t\tlog.Panic(err)\n\t}\n\n\treturn lastBlock.Height\n}", "title": "" }, { "docid": "121aef2d23a621db79499fe580c79fe2", "score": "0.52868074", "text": "func ReadAllClosedBlocks() (allClosedBlocks []*protocol.Block) {\n\n\t//This does return all blocks which are either in closedblocks or closedblockswithouttx bucket of the Database.\n\t//They are not ordered at teh request, but this does actually not matter. Because it will be ordered below\n\tblock := ReadLastClosedBlock()\n\tif block != nil {\n\t\tdb.View(func(tx *bolt.Tx) error {\n\t\t\tb := tx.Bucket([]byte(\"closedblocks\"))\n\t\t\tb.ForEach(func(k, v []byte) error {\n\t\t\t\tif v != nil {\n\t\t\t\t\tencodedBlock := v\n\t\t\t\t\tblock = block.Decode(encodedBlock)\n\t\t\t\t\tallClosedBlocks = append(allClosedBlocks, block)\n\t\t\t\t}\n\t\t\t\treturn nil\n\t\t\t})\n\n\t\t\tb = tx.Bucket([]byte(\"closedblockswithouttx\"))\n\t\t\tb.ForEach(func(k, v []byte) error {\n\t\t\t\tif v != nil {\n\t\t\t\t\tencodedBlock := v\n\t\t\t\t\tblock = block.Decode(encodedBlock)\n\t\t\t\t\tallClosedBlocks = append(allClosedBlocks, block)\n\t\t\t\t}\n\t\t\t\treturn nil\n\t\t\t})\n\n\t\t\treturn nil\n\t\t})\n\t}\n\n\t//blocks are sorted here.\n\tsort.Sort(ByHeight(allClosedBlocks))\n\n\treturn allClosedBlocks\n}", "title": "" }, { "docid": "b1b14e33019bdbab5285ad963f14aec2", "score": "0.52822864", "text": "func (r *Reactor) fetchLightBlock(height uint64) (*types.LightBlock, error) {\n\th := int64(height)\n\n\tblockMeta := r.blockStore.LoadBlockMeta(h)\n\tif blockMeta == nil {\n\t\treturn nil, nil\n\t}\n\n\tcommit := r.blockStore.LoadBlockCommit(h)\n\tif commit == nil {\n\t\treturn nil, nil\n\t}\n\n\tvals, err := r.stateStore.LoadValidators(h)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif vals == nil {\n\t\treturn nil, nil\n\t}\n\n\treturn &types.LightBlock{\n\t\tSignedHeader: &types.SignedHeader{\n\t\t\tHeader: &blockMeta.Header,\n\t\t\tCommit: commit,\n\t\t},\n\t\tValidatorSet: vals,\n\t}, nil\n}", "title": "" }, { "docid": "cd2b9502158ab20da1e51982ecde5ea4", "score": "0.5274649", "text": "func GetBlockHeight() (uint64, error) {\n\tvar blockNumber uint64\n\trow := globalData.database.QueryRow(getBlockHeightSQL)\n\terr := row.Scan(&blockNumber)\n\tif nil != err {\n\t\treturn 0, err\n\t}\n\tif blockNumber <= genesis.BlockNumber {\n\t\tif mode.IsTesting() {\n\t\t\treturn genesis.BlockNumber, nil\n\t\t} else {\n\t\t\treturn genesis.BlockNumber, nil\n\t\t}\n\t}\n\n\treturn blockNumber, nil\n}", "title": "" }, { "docid": "8d12a680f76a3338099bfa8cb0fe0c5a", "score": "0.52651507", "text": "func (w Wrapper) Block(height *int64) (*ctypes.ResultBlock, error) {\n\tresBlock, err := w.Client.Block(height)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t// get a checkpoint to verify from\n\tresCommit, err := w.Commit(height)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsh := resCommit.SignedHeader\n\n\t// now verify\n\terr = ValidateBlockMeta(resBlock.BlockMeta, sh)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\terr = ValidateBlock(resBlock.Block, sh)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn resBlock, nil\n}", "title": "" }, { "docid": "3b935058ca92c675e564f9f4f62fa106", "score": "0.52646226", "text": "func GetBlockByNumber(be blockExecutorHeight, k string, c *websocket.Conn) {\n\tbe.getBlockByNumber(k, c)\n}", "title": "" }, { "docid": "0842e638c969b9a2377faf5fe6fac5d4", "score": "0.5258576", "text": "func encodeBlockHeight(height uint64) []byte {\n\tencoded := make([]byte, 8)\n\tbinary.BigEndian.PutUint64(encoded, height)\n\treturn encoded\n}", "title": "" }, { "docid": "238852cc95133a0b03e45cee35a90c1e", "score": "0.5252063", "text": "func (m *MockLoader) Height() (uint64, error) {\n\treturn uint64(len(m.blockchain)), nil\n}", "title": "" }, { "docid": "cd1d95a2354db0ce18805158a658d09a", "score": "0.5227419", "text": "func GetBlocks(host string) ([]*block.Block, error) {\n\tblocks := make([]*block.Block, 0)\n\n\turl := fmt.Sprintf(\"%s/chain\", host)\n\tresp, err := http.Get(url)\n\tif err != nil {\n\t\treturn blocks, err\n\t}\n\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn blocks, err\n\t}\n\tdefer resp.Body.Close()\n\n\terr = json.Unmarshal(body, &blocks)\n\treturn blocks, err\n}", "title": "" }, { "docid": "eef7008e9edcf5bf6385d6df196e14bf", "score": "0.52262414", "text": "func KeyBlockHeightHash(height uint64) []byte {\n\theightBytes := sdk.Uint64ToBigEndian(height)\n\treturn append(KeyPrefixBlockHeightHash, heightBytes...)\n}", "title": "" }, { "docid": "018cd0254cb600628b3ca8a2a65de6c7", "score": "0.52251995", "text": "func (pgb *ChainDB) GetBlockHeight(hash string) (int64, error) {\n\t// _, err := chainhash.NewHashFromStr(hash)\n\t// if err != nil {\n\t// \treturn -1, err\n\t// }\n\tctx, cancel := context.WithTimeout(pgb.ctx, pgb.queryTimeout)\n\tdefer cancel()\n\theight, err := RetrieveBlockHeight(ctx, pgb.db, hash)\n\tif err != nil {\n\t\tif !errors.Is(err, sql.ErrNoRows) {\n\t\t\tlog.Errorf(\"Unexpected error retrieving block height for hash %s: %v\", hash, err)\n\t\t}\n\t\treturn -1, pgb.replaceCancelError(err)\n\t}\n\treturn height, nil\n}", "title": "" }, { "docid": "f8b8d3111cf0d2843bbb07a9a8694e76", "score": "0.5222857", "text": "func (msh *Mesh) GetLayerHashBlocks(h types.Hash32) []types.BlockID {\n\tlayerIDBytes, err := msh.general.Get(h.Bytes())\n\tif err != nil {\n\t\tmsh.Warning(\"requested unknown layer hash %v\", h.Hex())\n\t\treturn []types.BlockID{}\n\t}\n\tl := types.BytesToLayerID(layerIDBytes)\n\tmBlocks, err := msh.LayerBlockIds(l)\n\tif err != nil {\n\t\treturn []types.BlockID{}\n\t}\n\treturn mBlocks\n}", "title": "" }, { "docid": "128fc6bc0d1f597dfc1a0d04f75fc0df", "score": "0.52128273", "text": "func (c Client) GetBlock(height int64) (*tmctypes.ResultBlock, error) {\n\treturn c.rpcClient.Block(context.Background(), &height)\n}", "title": "" }, { "docid": "659543e9aa629bbe2dff772d2c4f4f48", "score": "0.521165", "text": "func (d *Data) GetBlock(v dvid.VersionID, k storage.TKey) ([]byte, error) {\n\tstore, err := datastore.GetOrderedKeyValueDB(d)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Data type imageblk had error initializing store: %v\\n\", err)\n\t}\n\n\tctx := datastore.NewVersionedCtx(d, v)\n\tserialization, err := store.Get(ctx, k)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdata, _, err := dvid.DeserializeData(serialization, true)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Unable to deserialize block, %s: %v\", ctx, err)\n\t}\n\treturn data, err\n}", "title": "" }, { "docid": "fd1b0da54ab4688c05088e49b28bb26b", "score": "0.520829", "text": "func SyncHeight(apiURL string, height int64) ([]*TxOut, error) {\n\thash, err := fetchBlockHash(apiURL, height)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\ttxs, err := fetchTxList(apiURL, hash)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\txs := make([]*TxOut, 0)\n\n\tfor _, tx := range txs {\n\t\tt, err := fetchTx(apiURL, tx)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\txs = append(xs, t...)\n\t}\n\n\treturn xs, nil\n}", "title": "" }, { "docid": "039b802fa6139ff785349eb3c77aa5dd", "score": "0.5206641", "text": "func GetBlock(blockHeight int64, url string) (*types.Block, *BNBRelayingError) {\n\tclient := client.NewHTTP(url, \"/websocket\")\n\terr := client.Start()\n\tif err != nil {\n\t\t// handle error\n\t}\n\tdefer client.Stop()\n\tblock, err := client.Block(&blockHeight)\n\n\treturn block.Block, nil\n}", "title": "" }, { "docid": "c50b5b107e4b9c17bd362825b2e2ed24", "score": "0.52062935", "text": "func (log *FBFTLog) GetBlockByHash(hash common.Hash) *types.Block {\n\tvar found *types.Block\n\tit := log.Blocks().Iterator()\n\tfor block := range it.C {\n\t\tif block.(*types.Block).Header().Hash() == hash {\n\t\t\tfound = block.(*types.Block)\n\t\t\tit.Stop()\n\t\t}\n\t}\n\treturn found\n}", "title": "" }, { "docid": "3bc64c1e96570a8de0dae98213edfe9f", "score": "0.5203025", "text": "func (bc *BlockChain) GetLatestBlocks() []Block {\n\treturn bc.Chain[bc.Length]\n}", "title": "" }, { "docid": "325600ee059282a8f700dbae70adcab0", "score": "0.5201715", "text": "func NewZarbServer_getBlockHeight_Params_List(s *capnp.Segment, sz int32) (ZarbServer_getBlockHeight_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn ZarbServer_getBlockHeight_Params_List{l}, err\n}", "title": "" }, { "docid": "dcaa62e9252df879d7a2d1facaec1e6b", "score": "0.5196049", "text": "func Hours2Block(time int) (int) {\n\tseconds := time * 60 * 60\n\tblocks := seconds / 14\n\treturn blocks\n}", "title": "" }, { "docid": "b2363ac38392484e90e65c224aef2c69", "score": "0.51960427", "text": "func (log *FBFTLog) Blocks() mapset.Set {\n\treturn log.blocks\n}", "title": "" }, { "docid": "e93fe378f8aec5600a2e7a8c8ded194e", "score": "0.5194297", "text": "func HasBlocks() predicate.Account {\n\treturn predicate.Account(func(s *sql.Selector) {\n\t\tstep := sqlgraph.NewStep(\n\t\t\tsqlgraph.From(Table, FieldID),\n\t\t\tsqlgraph.To(BlocksTable, FieldID),\n\t\t\tsqlgraph.Edge(sqlgraph.O2M, false, BlocksTable, BlocksColumn),\n\t\t)\n\t\tsqlgraph.HasNeighbors(s, step)\n\t})\n}", "title": "" }, { "docid": "694988e59dde3eaf6f1a207860b8fbce", "score": "0.5192405", "text": "func decodeBlockheight(key []byte) rivinetypes.BlockHeight {\n\treturn rivinetypes.BlockHeight(binary.BigEndian.Uint64(key))\n}", "title": "" }, { "docid": "451affe498e1a76fe76f6ace061cb539", "score": "0.51912546", "text": "func (rs *rootResolver) Block(args *struct {\n\tNumber *hexutil.Uint64\n\tHash *common.Hash\n}) (*Block, error) {\n\t// do we have the number, or hash is not given?\n\tif args.Number != nil || args.Hash == nil {\n\t\tb, err := repository.R().BlockByNumber(args.Number)\n\t\treturn NewBlock(b), err\n\t}\n\n\t// simply pull the block by hash\n\tb, err := repository.R().BlockByHash(args.Hash)\n\treturn NewBlock(b), err\n}", "title": "" }, { "docid": "2551243bc2de5fbca3c34ce0a868b1e0", "score": "0.5190409", "text": "func (db *Overlay) FetchDBlockByHeight(dBlockHeight uint32) (interfaces.IDirectoryBlock, error) {\n\tblock, err := db.FetchBlockByHeight(DIRECTORYBLOCK_NUMBER, DIRECTORYBLOCK, dBlockHeight, new(directoryBlock.DirectoryBlock))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif block == nil {\n\t\treturn nil, nil\n\t}\n\treturn block.(interfaces.IDirectoryBlock), nil\n}", "title": "" }, { "docid": "c525a214bd187c797b20136d5d6ffd31", "score": "0.51878214", "text": "func (b *Block) Children() Blocks {\n\tif b == nil || b.hclBlock == nil {\n\t\treturn nil\n\t}\n\n\treturn b.childBlocks\n}", "title": "" } ]
b5d466730ac7663ac5716bcecf652092
This provides BasicAuthentication which has username=abc and pass=123
[ { "docid": "b093850f7431a8562e3fbe8dc017b204", "score": "0.6942495", "text": "func basicAuthentication(endpoint func(http.ResponseWriter, *http.Request)) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tu, p, ok := r.BasicAuth()\n\t\tif !ok {\n\t\t\tfmt.Println(\"Error parsing basic auth\")\n\t\t\tw.WriteHeader(401)\n\t\t\tfmt.Fprintf(w, \"Error parsing basic auth\")\n\t\t\treturn\n\t\t}\n\t\tif u != username {\n\t\t\tfmt.Printf(\"Username provided is incorrect: %s\\n\", u)\n\t\t\tw.WriteHeader(401)\n\t\t\tfmt.Fprintf(w, \"Username provided is incorrect\")\n\t\t\treturn\n\t\t}\n\t\tif p != password {\n\t\t\tfmt.Printf(\"Password provided is incorrect: %s\\n\", p)\n\t\t\tw.WriteHeader(401)\n\t\t\tfmt.Fprintf(w, \"Password provided is incorrect\")\n\t\t\treturn\n\t\t}\n\t\tfmt.Printf(\"Username: %s\\n\", u)\n\t\tfmt.Printf(\"Password: %s\\n\", p)\n\t\tw.WriteHeader(200)\n\t\tendpoint(w, r)\n\t\treturn\n\t})\n}", "title": "" } ]
[ { "docid": "008fc9de9ed35541b4a778079256d0a7", "score": "0.79781276", "text": "func (r *Request) BasicAuth(username string, password string) Interface {\n\tr.username, r.password = username, password\n\treturn r\n}", "title": "" }, { "docid": "3fb9778ea607de2c49509561d4e19415", "score": "0.7898394", "text": "func BasicAuth(username, password string) Credentials {\n\treturn basicAuth{Username: username, Password: password}\n}", "title": "" }, { "docid": "864402fe6627a420aac0557cd346acb7", "score": "0.7833963", "text": "func BasicAuth(credentials common.Credentials) string {\n\tauth := credentials.UserName + \":\" + credentials.Password\n\treturn \"Basic \" + base64.StdEncoding.EncodeToString([]byte(auth))\n}", "title": "" }, { "docid": "ac0ae4d94c4e00aa0d8d59b0e0b95c74", "score": "0.7807997", "text": "func BasicAuth(authenticate UserPassAuthentication) httpkit.Authenticator {\n\treturn httpAuthenticator(func(r *http.Request) (bool, interface{}, error) {\n\t\tif usr, pass, ok := r.BasicAuth(); ok {\n\t\t\tp, err := authenticate(usr, pass)\n\t\t\treturn true, p, err\n\t\t}\n\n\t\treturn false, nil, nil\n\t})\n}", "title": "" }, { "docid": "7ef91e8beba11dd8cbd4c53d8b3db190", "score": "0.77632135", "text": "func BasicAuth(username, password string) string {\n\t// borrowed from net/http\n\tauth := username + \":\" + password\n\treturn base64.StdEncoding.EncodeToString([]byte(auth))\n}", "title": "" }, { "docid": "125eb9d85fc6de055c176c4345017ade", "score": "0.77570206", "text": "func Basic(username, password string) AuthFunc {\n\tvar siteAuth = base64.StdEncoding.EncodeToString([]byte(username + \":\" + password))\n\n\treturn func(req *http.Request) error {\n\t\tauth := req.Header.Get(\"Authorization\")\n\t\tif auth != \"Basic \"+siteAuth {\n\t\t\treturn fmt.Errorf(`Basic realm=\"Not Authorized\"`)\n\t\t}\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "d66ed0180e68750cd7ce25c46e650e46", "score": "0.7670274", "text": "func BasicAuth(username string, password string, realm string) AuthToken {\n\ttokens := map[string]interface{}{\n\t\tkeyScheme: schemeBasic,\n\t\tkeyPrincipal: username,\n\t\tkeyCredentials: password,\n\t}\n\n\tif realm != \"\" {\n\t\ttokens[keyRealm] = realm\n\t}\n\n\treturn AuthToken{tokens: tokens}\n}", "title": "" }, { "docid": "afd4bf60dc82a6d7b01cd8c599cea6fe", "score": "0.7652258", "text": "func BasicAuth(username, password string, c echo.Context) (bool, error) {\n\tfmt.Println(username, password)\n\tif username == \"admin\" && password == \"admin\" {\n\t\treturn true, nil\n\t}\n\treturn false, nil\n}", "title": "" }, { "docid": "594bd11c0ea9724e02590e809a4ce706", "score": "0.7636788", "text": "func BasicAuth(user string, pass string) (*models.Auth, error) {\n\tif user == \"123\" && pass == \"456\" {\n\t\treturn &models.Auth{Username: user, Password: pass}, nil\n\t}\n\treturn nil, errors.Unauthenticated(\"bad username or password\")\n}", "title": "" }, { "docid": "93b1e8a8157e23b661f7727547da274a", "score": "0.76041317", "text": "func (cfg *Config) BasicAuth() (string, error) {\n\ti := cfg.Server\n\tif i >= len(cfg.Servers) {\n\t\treturn \"\", fmt.Errorf(\"Can't get current server info\")\n\t}\n\tserver := cfg.Servers[i]\n\tauth := server.Username + \":\" + server.Password\n\treturn base64.StdEncoding.EncodeToString([]byte(auth)), nil\n}", "title": "" }, { "docid": "4c72d7b9bb327a1cb40d363ed8b79c6c", "score": "0.76026833", "text": "func basicAuth(h httprouter.Handle, config HTTPConfig) httprouter.Handle {\n\treturn func(w http.ResponseWriter, r *http.Request, ps httprouter.Params) {\n\t\tuser, password, hasAuth := r.BasicAuth()\n\n\t\tif hasAuth && user == config.Username && password == config.Password {\n\t\t\th(w, r, ps)\n\t\t} else {\n\t\t\tw.Header().Set(\"WWW-Authenticate\", \"Basic realm=Restricted\")\n\t\t\thttp.Error(w, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "fdc561a6a6c12c860fde20b62308bf01", "score": "0.7590083", "text": "func basicAuth(username, password string) string {\n\tauth := username + \":\" + password\n\treturn base64.StdEncoding.EncodeToString([]byte(auth))\n}", "title": "" }, { "docid": "fdc561a6a6c12c860fde20b62308bf01", "score": "0.7590083", "text": "func basicAuth(username, password string) string {\n\tauth := username + \":\" + password\n\treturn base64.StdEncoding.EncodeToString([]byte(auth))\n}", "title": "" }, { "docid": "6f68470d5a7171405db0158262dd87cb", "score": "0.75794315", "text": "func basicAuth(username, password string) string {\r\n\tauth := username + \":\" + password\r\n\treturn base64.StdEncoding.EncodeToString([]byte(auth))\r\n}", "title": "" }, { "docid": "dea76f758a8200e6f4ae91ee7828e67d", "score": "0.75665635", "text": "func (p *ProxyConfig) BasicAuth() (user, pass string, ok bool) {\n\tuser = p.BasicAuthUser\n\tpass = p.BasicAuthPass\n\tok = user != \"\" && pass != \"\"\n\treturn user, pass, ok\n}", "title": "" }, { "docid": "4b9f743b2369901f2e9b1596fdbd32f5", "score": "0.7514598", "text": "func (eslc *ESLoggerConfig) BasicAuth(user, pass string) *ESLoggerConfig {\n\tval := fmt.Sprintf(\"%s:%s\", user, pass)\n\teslc.credentials = base64.StdEncoding.EncodeToString([]byte(val))\n\treturn eslc\n}", "title": "" }, { "docid": "4320f96f1b50e8756d5da7fb1e76e1d2", "score": "0.7501757", "text": "func httpBasicAuth(username, password string) []byte {\n\tconst header = \"Basic \"\n\tbase64 := base64.StdEncoding\n\n\tb64InputLen := len(username) + len(\":\") + len(password)\n\tb64Input := make([]byte, 0, b64InputLen)\n\tb64Input = append(b64Input, username...)\n\tb64Input = append(b64Input, ':')\n\tb64Input = append(b64Input, password...)\n\n\toutput := make([]byte, len(header)+base64.EncodedLen(b64InputLen))\n\tcopy(output, header)\n\tbase64.Encode(output[len(header):], b64Input)\n\treturn output\n}", "title": "" }, { "docid": "539960262a231f5e888fe72755c3ca10", "score": "0.74891627", "text": "func basicAuth(user, pass string) string {\n\tauth := user + \":\" + pass\n\treturn base64.StdEncoding.EncodeToString([]byte(auth))\n}", "title": "" }, { "docid": "51d3ae84f66f71e901beb05f96a3ac9d", "score": "0.74749565", "text": "func BasicAuth(username, password string) Option {\n\treturn func(opts *options) {\n\t\topts.username = username\n\t\topts.password = password\n\t}\n}", "title": "" }, { "docid": "80d1afbb660eeb39b1eaab100dc7a054", "score": "0.74620944", "text": "func BasicAuthentication(name, password string) Parameter {\n\treturn func(req *Request) {\n\t\tnp := []byte(name + \":\" + password)\n\t\tauth := \"Basic \" + base64.StdEncoding.EncodeToString(np)\n\n\t\treq.SetHeader(\"Authorization\", auth)\n\t}\n}", "title": "" }, { "docid": "48a723f160708622328a9218faa1d24f", "score": "0.7441376", "text": "func Basic(username string, password string) web.FilterFunc {\n\tsecrets := func(user, pass string) bool {\n\t\treturn user == username && pass == password\n\t}\n\treturn NewBasicAuthenticator(secrets, defaultRealm)\n}", "title": "" }, { "docid": "7cb4b1308a4ee1f805982cdd4fbbfb5d", "score": "0.7434999", "text": "func BasicAuth(req events.APIGatewayProxyRequest) (user, pass string) {\n\tauth := req.Headers[\"Authorization\"]\n\tif auth == \"\" {\n\t\treturn user, pass\n\t}\n\n\tconst prefix = \"Basic \"\n\tif len(auth) < len(prefix) || !strings.EqualFold(auth[:len(prefix)], prefix) {\n\t\treturn user, pass\n\t}\n\n\tc, err := base64.StdEncoding.DecodeString(auth[len(prefix):])\n\tif err != nil {\n\t\treturn user, pass\n\t}\n\n\tcs := string(c)\n\ts := strings.IndexByte(cs, ':')\n\tif s < 0 {\n\t\treturn user, pass\n\t}\n\n\treturn cs[:s], cs[s+1:]\n}", "title": "" }, { "docid": "e495847f2fc54dc043995c6701a899ed", "score": "0.7427323", "text": "func (am *auth_middleware) basicAuth(c *gin.Context) {\n\tif isAuthContext(c) {\n\t\tam.logger.Debug(\"Skip basic authentication, there is already auth context\")\n\t\treturn\n\t}\n\n\tbasic := c.Request.Header.Get(\"Authorization\")\n\tif !strings.HasPrefix(strings.ToLower(basic), \"basic \") {\n\t\tam.logger.Debug(\"Skip basic authentication, no header\")\n\t\treturn\n\t}\n\n\tbts, err := base64.StdEncoding.DecodeString(basic[6:])\n\tif err != nil {\n\t\tam.logger.Warn(\"Could not decode base64 for value=\", basic[6:], \" header=\", basic, \" skip authentication\")\n\t\treturn\n\t}\n\n\tusrPasswd := string(bts)\n\tidx := strings.Index(usrPasswd, \":\")\n\tif idx > 0 {\n\t\tuser := usrPasswd[:idx]\n\t\tpasswd := usrPasswd[idx+1:]\n\t\tok, err := am.authServ.AuthN(user, passwd)\n\t\tif err != nil {\n\t\t\tam.logger.Error(\"Could not authenticate user=\", user, \", got the err=\", err)\n\t\t\treturn\n\t\t}\n\n\t\tif !ok {\n\t\t\tam.logger.Warn(\"Wrong credentials for user=\", user)\n\t\t\treturn\n\t\t}\n\n\t\tam.newAuthContext(c, user)\n\t\treturn\n\t}\n\tam.logger.Warn(\"Got basic auth header=\", basic, \", but it has \", usrPasswd, \" after encoding(no colon in between)\")\n\treturn\n}", "title": "" }, { "docid": "baf710778f55644f6afe20264db34ad8", "score": "0.7398731", "text": "func Basicauth(cfg *config.Config) func(next http.Handler) http.Handler {\n\treturn func(next http.Handler) http.Handler {\n\t\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t\tif cfg.Access.Username != \"\" && cfg.Access.Password != \"\" {\n\t\t\t\tw.Header().Set(\"WWW-Authenticate\", `Basic realm=\"Terrastate\"`)\n\n\t\t\t\ts := strings.SplitN(r.Header.Get(\"Authorization\"), \" \", 2)\n\n\t\t\t\tif len(s) != 2 {\n\t\t\t\t\thttp.Error(w, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)\n\t\t\t\t\treturn\n\t\t\t\t}\n\n\t\t\t\tb, err := base64.StdEncoding.DecodeString(s[1])\n\n\t\t\t\tif err != nil {\n\t\t\t\t\thttp.Error(w, err.Error(), http.StatusUnauthorized)\n\t\t\t\t\treturn\n\t\t\t\t}\n\n\t\t\t\tpair := strings.SplitN(string(b), \":\", 2)\n\n\t\t\t\tif len(pair) != 2 {\n\t\t\t\t\thttp.Error(w, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)\n\t\t\t\t\treturn\n\t\t\t\t}\n\n\t\t\t\tif pair[0] != cfg.Access.Username {\n\t\t\t\t\thttp.Error(w, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)\n\t\t\t\t\treturn\n\t\t\t\t}\n\n\t\t\t\tif pair[1] != cfg.Access.Password {\n\t\t\t\t\thttp.Error(w, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tnext.ServeHTTP(w, r)\n\t\t})\n\t}\n}", "title": "" }, { "docid": "844976551d93088d86a4bc0d3cd3790a", "score": "0.73749065", "text": "func BasicAuth(inner http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tusername := config.GddManageUser.Load()\n\t\tpassword := config.GddManagePass.Load()\n\t\tif stringutils.IsNotEmpty(username) || stringutils.IsNotEmpty(password) {\n\t\t\tuser, pass, ok := r.BasicAuth()\n\n\t\t\tif !ok || subtle.ConstantTimeCompare([]byte(user), []byte(username)) != 1 || subtle.ConstantTimeCompare([]byte(pass), []byte(password)) != 1 {\n\t\t\t\tw.Header().Set(\"WWW-Authenticate\", `Basic realm=\"Provide user name and password\"`)\n\t\t\t\tw.WriteHeader(401)\n\t\t\t\tw.Write([]byte(\"Unauthorised.\\n\"))\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tinner.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "cf0e52cbf02239bb477efb3961fd1e5c", "score": "0.73662144", "text": "func GetBasicAuthentication(ctx *gin.Context) (username, password string, err error) {\n\tif header := ctx.Request.Header.Get(\"Authorization\"); header != \"\" {\n\t\tif strings.ToLower(header[:6]) == \"basic \" {\n\t\t\t// decode header value\n\t\t\tvalue, err := base64.StdEncoding.DecodeString(header[6:])\n\t\t\tif err != nil {\n\t\t\t\treturn \"\", \"\", err\n\t\t\t}\n\t\t\tstrValue := string(value)\n\t\t\tif ind := strings.Index(strValue, \":\"); ind > 0 {\n\t\t\t\treturn strValue[:ind], strValue[ind+1:], nil\n\t\t\t}\n\t\t}\n\t}\n\treturn \"\", \"\", nil\n}", "title": "" }, { "docid": "cf7c457fce0c076ae888ff9c64d340c9", "score": "0.7352499", "text": "func HTTPBasicAuth(username, password string) []byte {\n\tconst header = \"Basic \"\n\tb64 := base64.StdEncoding\n\tb64InputLen := len(username) + len(\":\") + len(password)\n\tb64Input := make([]byte, 0, b64InputLen)\n\tb64Input = append(b64Input, username...)\n\tb64Input = append(b64Input, ':')\n\tb64Input = append(b64Input, password...)\n\toutput := make([]byte, len(header)+b64.EncodedLen(b64InputLen))\n\tcopy(output, header)\n\tb64.Encode(output[len(header):], b64Input)\n\treturn output\n}", "title": "" }, { "docid": "8501f049d5ca615e84794e9e884d3722", "score": "0.7347473", "text": "func newHTTPBasicAuth(user string, password string, handler http.Handler) *httpBasicAuth {\n\tif user != \"\" && password != \"\" {\n\t\tlog.Debug(\"require authentication\")\n\t}\n\treturn &httpBasicAuth{user: user, password: password, handler: handler}\n}", "title": "" }, { "docid": "3b7cbd5c6d0853ea8010552603c29a18", "score": "0.733609", "text": "func (swaggos *Swaggos) BasicAuth() *Swaggos {\n\tdef := spec.SecurityScheme{\n\t\tSecuritySchemeProps: spec.SecuritySchemeProps{\n\t\t\tDescription: \"basic auth\",\n\t\t\tType: \"basic\",\n\t\t},\n\t}\n\tswaggos.addAuth(`basicAuth`, &def, map[string][]string{\n\t\t`basicAuth`: []string{},\n\t})\n\treturn swaggos\n}", "title": "" }, { "docid": "59ef0a50a56470569c991237288c1602", "score": "0.7323078", "text": "func basicAuth(ctx *fasthttp.RequestCtx) (username, password string, ok bool) {\n\tauth := ctx.Request.Header.Peek(\"Authorization\")\n\tif auth == nil {\n\t\treturn\n\t}\n\treturn parseBasicAuth(string(auth))\n}", "title": "" }, { "docid": "3c1e7ace78d344af89437a5451cb2ec8", "score": "0.7317028", "text": "func basicAuth(r *http.Request) (username, password string, ok bool) {\n\tauth := r.Header.Get(\"Authorization\")\n\tif auth == \"\" {\n\t\treturn\n\t}\n\treturn parseBasicAuth(auth)\n}", "title": "" }, { "docid": "751f6ea04a3656b27aa8f5a917e0432b", "score": "0.72841036", "text": "func (rc *rtspConn) authBasic(user, pass string) []byte {\n\tin := make([]byte, len(user)+len(pass)+1)\n\ti := copy(in, user)\n\tin[i] = ':'\n\tcopy(in[i+1:], pass)\n\n\tenc := base64.StdEncoding\n\tout := make([]byte, enc.EncodedLen(len(in))+6)\n\tcopy(out, \"Basic \")\n\tbase64.StdEncoding.Encode(out[6:], in)\n\n\treturn out\n}", "title": "" }, { "docid": "b23a717582799120bbb1a27ae3b256c3", "score": "0.72656906", "text": "func BasicAuth(ctx *cli.Context) runtime.ClientAuthInfoWriter {\n\tif ctx.IsSet(\"password\") || ctx.IsSet(\"config\") {\n\t\tu, p := checkForAuth(ctx)\n\t\tpassword = p\n\t\treturn openapiclient.BasicAuth(u, p)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4ab603de9ca02f2bc4b04f061814aba5", "score": "0.7257822", "text": "func BasicAuth(username, password string) Option {\n\treturn func(os *Options) {\n\t\tos.Authentication = &basicAuth{\n\t\t\tusername: username,\n\t\t\tpassword: password,\n\t\t}\n\t}\n}", "title": "" }, { "docid": "63d341f704c483881f9573505837a2a7", "score": "0.7239597", "text": "func (a *api) basicAuth(res http.ResponseWriter, req *http.Request) bool {\n\tauth := req.Header.Get(\"Authorization\")\n\tif !a.secureCompare(auth, \"Basic \"+base64.StdEncoding.EncodeToString([]byte(a.Username+\":\"+a.Password))) {\n\t\tres.Header().Set(\"WWW-Authenticate\", \"Basic realm=\\\"Authorization Required\\\"\")\n\t\thttp.Error(res, \"Not Authorized\", http.StatusUnauthorized)\n\t\treturn false\n\t}\n\treturn true\n}", "title": "" }, { "docid": "8d7fd9b3c1c4bebb54c7ebfcc2fc8243", "score": "0.7227269", "text": "func (a ServerInstance) SetBasicAuth(req *http.Request) {\n\treq.SetBasicAuth(a.Username, a.Password)\n}", "title": "" }, { "docid": "f6fbe3baa2e3ee5f5ad80137ee65d3b5", "score": "0.72269607", "text": "func BasicAuth() (user, pass string, ok bool) {\n\tuser = os.Getenv(\"BASIC_AUTH_USER\")\n\tpass = os.Getenv(\"BASIC_AUTH_PASS\")\n\tok = user != \"\" && pass != \"\"\n\treturn user, pass, ok\n}", "title": "" }, { "docid": "084c1f159ba2c92f371620e9ade04a35", "score": "0.72003216", "text": "func BasicAuth(username string, password string) Option {\n\treturn func(datasource *Tempo) {\n\t\tyep := true\n\t\tdatasource.builder.BasicAuth = &yep\n\t\tdatasource.builder.BasicAuthUser = &username\n\t\tdatasource.builder.BasicAuthPassword = &password\n\t}\n}", "title": "" }, { "docid": "afec2cfd8d6e72573204d862c7ba8b18", "score": "0.71815497", "text": "func BasicAuth(_ context.Context, _ string, _ string, _ string) (interface{}, error) {\n\treturn &BasicAuthComponent{}, nil\n}", "title": "" }, { "docid": "60d4e544b5579334591ed379842e3874", "score": "0.7173309", "text": "func BasicAuthInfo(username string, password string) *AuthInfo {\n\treturn &AuthInfo{Username: username, Password: password}\n}", "title": "" }, { "docid": "d1039c81a54d1ac66bd86df17aa1ef59", "score": "0.7169634", "text": "func BasicAuth() echo.MiddlewareFunc {\n\treturn middleware.BasicAuth(func(username, password string, c echo.Context) (bool, error) {\n\t\tif username == \"blasphemy\" && password == \"thisissparta\" {\n\t\t\treturn true, nil\n\t\t}\n\t\treturn false, nil\n\t})\n}", "title": "" }, { "docid": "561ebbfab2e11df4f518c17681b2e633", "score": "0.7164478", "text": "func BasicAuth(username, password string) Option {\n\treturn func(c *CloudConfigClient) {\n\t\tc.username = strings.TrimSpace(username)\n\t\tc.password = strings.TrimSpace(password)\n\t}\n}", "title": "" }, { "docid": "f6d9112aea5f4e823b3c9d809069129d", "score": "0.7160331", "text": "func basicAuth(h httprouter.Handle) httprouter.Handle {\n\treturn func(w http.ResponseWriter, r *http.Request, ps httprouter.Params) {\n\t\tuser, pass, ok := r.BasicAuth()\n\n\t\tif ok && checkUsernameAndPassword(user, pass) {\n\t\t\t// Delegate request to the given handle\n\t\t\th(w, r, ps)\n\t\t} else {\n\t\t\t// Deny access for the the handle\n\t\t\thttp.Error(w, \"Not Authorized\", 401)\n\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "5458cc15f372c8174d105a1d1dd8ccbe", "score": "0.71505743", "text": "func NewBasicAuth(repo Repository) func(http.Handler) http.Handler {\n\treturn func(handler http.Handler) http.Handler {\n\t\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t\tlog.Debug(\"Starting basic auth middleware\")\n\t\t\tlogger := log.WithFields(log.Fields{\n\t\t\t\t\"path\": r.RequestURI,\n\t\t\t\t\"origin\": r.RemoteAddr,\n\t\t\t})\n\n\t\t\tusername, password, authOK := r.BasicAuth()\n\t\t\tif !authOK {\n\t\t\t\terrors.Handler(w, r, ErrNotAuthorized)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tvar found bool\n\t\t\tusers, err := repo.FindAll()\n\t\t\tif err != nil {\n\t\t\t\tlog.WithError(err).Error(\"Error when getting all users\")\n\t\t\t\terrors.Handler(w, r, errors.New(http.StatusInternalServerError, \"there was an error when looking for users\"))\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\thash := encrypt.Hash{}\n\n\t\t\tfor _, u := range users {\n\t\t\t\t//if username == u.Username && (subtle.ConstantTimeCompare([]byte(password), []byte(u.Password)) == 1) {\n\t\t\t\tif username == u.Username && (hash.Compare(u.Password, password) == nil) {\n\t\t\t\t\tfound = true\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif !found {\n\t\t\t\tlogger.Debug(\"Invalid user/password provided.\")\n\t\t\t\terrors.Handler(w, r, ErrNotAuthorized)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\thandler.ServeHTTP(w, r)\n\t\t})\n\t}\n}", "title": "" }, { "docid": "c55addf7f687828c810542f9deb8dbb0", "score": "0.714643", "text": "func BasicAuth(req *http.Request) (username, password string, err error) {\n\tauth := req.Header.Get(\"Authorization\")\n\tif auth == \"\" {\n\t\terr = fmt.Errorf(\"Missing \\\"Authorization\\\" in header\")\n\t\treturn\n\t}\n\tmatches := kBasicAuthPattern.FindStringSubmatch(auth)\n\tif len(matches) != 2 {\n\t\terr = fmt.Errorf(\"Bogus Authorization header\")\n\t\treturn\n\t}\n\tencoded := matches[1]\n\tenc := base64.StdEncoding\n\tdecBuf := make([]byte, enc.DecodedLen(len(encoded)))\n\tn, err := enc.Decode(decBuf, []byte(encoded))\n\tif err != nil {\n\t\treturn\n\t}\n\tpieces := strings.SplitN(string(decBuf[0:n]), \":\", 2)\n\tif len(pieces) != 2 {\n\t\terr = fmt.Errorf(\"didn't get two pieces\")\n\t\treturn\n\t}\n\treturn pieces[0], pieces[1], nil\n}", "title": "" }, { "docid": "8ab3b78727d4c3c0e98474540684ae40", "score": "0.71433544", "text": "func BasicAuth(handler http.HandlerFunc, username, password, realm string) http.HandlerFunc {\n\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\n\t\tuser, pass, ok := r.BasicAuth()\n\n\t\tif !ok || subtle.ConstantTimeCompare([]byte(user), []byte(username)) != 1 || subtle.ConstantTimeCompare([]byte(pass), []byte(password)) != 1 {\n\t\t\tw.Header().Set(\"WWW-Authenticate\", `Basic realm=\"`+realm+`\"`)\n\t\t\tw.WriteHeader(401)\n\t\t\tw.Write([]byte(\"Unauthorised.\\n\"))\n\t\t\treturn\n\t\t}\n\n\t\thandler(w, r)\n\t}\n}", "title": "" }, { "docid": "dae74060177996f89042b11521c3944c", "score": "0.71375364", "text": "func BasicAuth(optionSetters ...Option) func(next http.Handler) http.Handler {\n\toptions := newOptions(optionSetters...)\n\tlogger := options.Logger\n\n\tif options.EnableBasicAuth {\n\t\toptions.Logger.Warn().Msg(\"basic auth enabled, use only for testing or development\")\n\t}\n\n\th := basicAuth{\n\t\tlogger: logger,\n\t\tenabled: options.EnableBasicAuth,\n\t\tuserProvider: options.UserProvider,\n\t}\n\n\treturn func(next http.Handler) http.Handler {\n\t\treturn http.HandlerFunc(\n\t\t\tfunc(w http.ResponseWriter, req *http.Request) {\n\t\t\t\tif h.isPublicLink(req) || !h.isBasicAuth(req) || h.isOIDCTokenAuth(req) {\n\t\t\t\t\tif !h.isPublicLink(req) {\n\t\t\t\t\t\tuserAgentAuthenticateLockIn(w, req, options.CredentialsByUserAgent, \"basic\")\n\t\t\t\t\t}\n\t\t\t\t\tnext.ServeHTTP(w, req)\n\t\t\t\t\treturn\n\t\t\t\t}\n\n\t\t\t\tremoveSuperfluousAuthenticate(w)\n\t\t\t\tlogin, password, _ := req.BasicAuth()\n\t\t\t\tuser, err := h.userProvider.Authenticate(req.Context(), login, password)\n\n\t\t\t\t// touch is a user agent locking guard, when touched changes to true it indicates the User-Agent on the\n\t\t\t\t// request is configured to support only one challenge, it it remains untouched, there are no considera-\n\t\t\t\t// tions and we should write all available authentication challenges to the response.\n\t\t\t\ttouch := false\n\n\t\t\t\tif err != nil {\n\t\t\t\t\tfor k, v := range options.CredentialsByUserAgent {\n\t\t\t\t\t\tif strings.Contains(k, req.UserAgent()) {\n\t\t\t\t\t\t\tremoveSuperfluousAuthenticate(w)\n\t\t\t\t\t\t\tw.Header().Add(\"Www-Authenticate\", fmt.Sprintf(\"%v realm=\\\"%s\\\", charset=\\\"UTF-8\\\"\", strings.Title(v), req.Host))\n\t\t\t\t\t\t\ttouch = true\n\t\t\t\t\t\t\tbreak\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\n\t\t\t\t\t// if the request is not bound to any user agent, write all available challenges\n\t\t\t\t\tif !touch {\n\t\t\t\t\t\twriteSupportedAuthenticateHeader(w, req)\n\t\t\t\t\t}\n\n\t\t\t\t\t// if the request is a PROPFIND return a WebDAV error code.\n\t\t\t\t\t// TODO: The proxy has to be smart enough to detect when a request is directed towards a webdav server\n\t\t\t\t\t// and react accordingly.\n\n\t\t\t\t\tw.WriteHeader(http.StatusUnauthorized)\n\n\t\t\t\t\tif webdav.IsWebdavRequest(req) {\n\t\t\t\t\t\tb, err := webdav.Marshal(webdav.Exception{\n\t\t\t\t\t\t\tCode: webdav.SabredavPermissionDenied,\n\t\t\t\t\t\t\tMessage: \"Authentication error\",\n\t\t\t\t\t\t})\n\n\t\t\t\t\t\twebdav.HandleWebdavError(w, b, err)\n\t\t\t\t\t\treturn\n\t\t\t\t\t}\n\n\t\t\t\t\treturn\n\t\t\t\t}\n\n\t\t\t\t// fake oidc claims\n\t\t\t\tclaims := map[string]interface{}{\n\t\t\t\t\toidc.OwncloudUUID: user.Id.OpaqueId,\n\t\t\t\t\toidc.Iss: user.Id.Idp,\n\t\t\t\t\toidc.PreferredUsername: user.Username,\n\t\t\t\t\toidc.Email: user.Mail,\n\t\t\t\t}\n\n\t\t\t\tnext.ServeHTTP(w, req.WithContext(oidc.NewContext(req.Context(), claims)))\n\t\t\t},\n\t\t)\n\t}\n}", "title": "" }, { "docid": "0a5e71caadf1175cc9e22cfa179c1999", "score": "0.711194", "text": "func BasicAuth(h fasthttp.RequestHandler, requiredUser string, requiredPasswordHash []byte) fasthttp.RequestHandler {\n\treturn func(ctx *fasthttp.RequestCtx) {\n\t\t// Get the Basic Authentication credentials\n\t\tuser, password, hasAuth := basicAuth(ctx)\n\n\t\t// WARNING:\n\t\t// DO NOT use plain-text passwords for real apps.\n\t\t// A simple string comparison using == is vulnerable to a timing attack.\n\t\t// Instead, use the hash comparison function found in your hash library.\n\t\t// This example uses scrypt, which is a solid choice for secure hashing:\n\t\t// go get -u github.com/elithrar/simple-scrypt\n\n\t\tif hasAuth && user == requiredUser {\n\n\t\t\t// Uses the parameters from the existing derived key. Return an error if they don't match.\n\t\t\terr := scrypt.CompareHashAndPassword(requiredPasswordHash, []byte(password))\n\n\t\t\tif err != nil {\n\n\t\t\t\t// log error and request Basic Authentication again below.\n\t\t\t\tlog.Fatal(err)\n\n\t\t\t} else {\n\n\t\t\t\t// Delegate request to the given handle\n\t\t\t\th(ctx)\n\t\t\t\treturn\n\n\t\t\t}\n\n\t\t}\n\n\t\t// Request Basic Authentication otherwise\n\t\tctx.Error(fasthttp.StatusMessage(fasthttp.StatusUnauthorized), fasthttp.StatusUnauthorized)\n\t\tctx.Response.Header.Set(\"WWW-Authenticate\", \"Basic realm=Restricted\")\n\t}\n}", "title": "" }, { "docid": "79532ded1628bea82bcd6d577c8d2d24", "score": "0.71118695", "text": "func NewBasicAuth(username, password string) *BasicAuth {\n\treturn &BasicAuth{username, password}\n}", "title": "" }, { "docid": "58e8c039f36494c8ec9b71cfd997e333", "score": "0.70923024", "text": "func (r *Router) BasicAuth(h httprouter.Handle, requiredUser, requiredPassword string, errorResponse interface{}) httprouter.Handle {\n\n\t// Return the function up the chain\n\treturn func(w http.ResponseWriter, req *http.Request, ps httprouter.Params) {\n\t\t// Get the Basic Authentication credentials\n\t\tuser, password, hasAuth := req.BasicAuth()\n\n\t\tif hasAuth && user == requiredUser && password == requiredPassword {\n\t\t\t// Delegate request to the given handle\n\t\t\th(w, req, ps)\n\t\t} else {\n\t\t\t// Request Basic Authentication otherwise\n\t\t\tw.Header().Set(authenticateHeader, \"Basic realm=Restricted\")\n\t\t\tReturnResponse(w, req, http.StatusUnauthorized, errorResponse)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "2e18a25242ce6eda539f43cd0ecdc6b7", "score": "0.70589334", "text": "func BasicAuth(handler http.HandlerFunc, realm string, check func(string, string) bool) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tuser, pass, ok := r.BasicAuth()\n\t\tif !ok || !check(user, pass) {\n\t\t\tw.Header().Set(\"WWW-Authenticate\", `Basic realm=\"`+realm+`\"`)\n\t\t\tw.WriteHeader(401)\n\t\t\tw.Write([]byte(\"Unauthorised.\\n\"))\n\t\t\treturn\n\t\t}\n\t\thandler(w, r)\n\t}\n}", "title": "" }, { "docid": "2a6ead54e70c8d8dfb75b521f8c108a0", "score": "0.70483136", "text": "func BasicAuth(user, pass string) RequestOption {\n\treturn func(req *http.Request) error {\n\t\treq.SetBasicAuth(user, pass)\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "a4cb3f3f258035b9300ed0efe4d6760d", "score": "0.7042241", "text": "func BasicAuth() gin.HandlerFunc {\n\treturn gin.BasicAuth(gin.Accounts{\n\t\t\"vuser\": \"newpassword\",\n\t})\n}", "title": "" }, { "docid": "a9e3fd8a1ebe12aa61ca7e25a06729b5", "score": "0.70302343", "text": "func BasicAuth(username, passwd string) ConfigOpt {\n\t// TODO(jdef) this could be more efficient. according to the stdlib we're not supposed to\n\t// mutate the original Request, so we copy here (including headers). another approach would\n\t// be to generate a functional RequestOpt that adds the right header.\n\treturn WrapRoundTripper(func(rt http.RoundTripper) http.RoundTripper {\n\t\treturn roundTripperFunc(func(req *http.Request) (*http.Response, error) {\n\t\t\tvar h http.Header\n\t\t\tif req.Header != nil {\n\t\t\t\th = make(http.Header, len(req.Header))\n\t\t\t\tfor k, v := range req.Header {\n\t\t\t\t\th[k] = append(make([]string, 0, len(v)), v...)\n\t\t\t\t}\n\t\t\t}\n\t\t\tclonedReq := *req\n\t\t\tclonedReq.Header = h\n\t\t\tclonedReq.SetBasicAuth(username, passwd)\n\t\t\treturn rt.RoundTrip(&clonedReq)\n\t\t})\n\t})\n}", "title": "" }, { "docid": "4ec981e18616045714e2f1eb54fcdf14", "score": "0.70269626", "text": "func BasicAuthentication() Adapter {\n\tunauthorised := func(rw http.ResponseWriter) {\n\t\trw.Header().Set(\"WWW-Authenticate\", \"Basic realm=Restricted\")\n\t\trw.WriteHeader(http.StatusUnauthorized)\n\t}\n\n\t// Return middleware\n\treturn func(h http.Handler) http.Handler {\n\t\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t\tctx := r.Context()\n\n\t\t\tu, p, ok := r.BasicAuth()\n\t\t\tif !ok || len(strings.TrimSpace(u)) < 1 || len(strings.TrimSpace(p)) < 1 {\n\t\t\t\tunauthorised(w)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\t// This is a dummy check for credentials.\n\t\t\tif u != \"hello\" || p != \"world\" {\n\t\t\t\tunauthorised(w)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\t// Inject subject in context\n\t\t\tctx = context.WithValue(ctx, contextKeySubject, u)\n\n\t\t\t// Delegate to next handler\n\t\t\th.ServeHTTP(w, r.WithContext(ctx))\n\t\t})\n\t}\n}", "title": "" }, { "docid": "b21f1ff827144f2f4d67922961282d05", "score": "0.70235425", "text": "func HTTPBasicAuth(handler http.HandlerFunc, username, password string) http.HandlerFunc {\n\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\n\t\tuser, pass, ok := r.BasicAuth()\n\t\tif !ok || subtle.ConstantTimeCompare([]byte(user), []byte(username)) != 1 || subtle.ConstantTimeCompare([]byte(pass), []byte(password)) != 1 {\n\t\t\thttp.Error(w, \"Unauthorized.\\n\", http.StatusUnauthorized)\n\t\t\treturn\n\t\t}\n\n\t\thandler(w, r)\n\t}\n}", "title": "" }, { "docid": "7a606c7aa46ea78a3ed06308b151e813", "score": "0.7013908", "text": "func (r *Requist) SetBasicAuth(username, password string) *Requist {\n\n\tif username != \"\" && password != \"\" {\n\t\tr.auth = username + \":\" + password\n\t\tr.SetHeader(\"Authorization\", \"Basic \"+base64.StdEncoding.EncodeToString([]byte(r.auth)))\n\t}\n\n\treturn r\n}", "title": "" }, { "docid": "6615121a4d470bfeb0eb333c01448ae6", "score": "0.701343", "text": "func BasicAuth(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {\n\t\tuser, pass, ok := req.BasicAuth()\n\t\tif ok && authdb.VerifyUserPass(user, pass) {\n\t\t\tnewctx := context.WithValue(req.Context(), UserContextKey, user)\n\t\t\tnext.ServeHTTP(w, req.WithContext(newctx))\n\t\t} else {\n\t\t\tw.Header().Set(\"WWW-Authenticate\", `Basic realm=\"api\"`)\n\t\t\thttp.Error(w, \"Unauthorized\", http.StatusUnauthorized)\n\t\t}\n\t})\n}", "title": "" }, { "docid": "b3c425c10a1dc982b6b6ab6f6836c590", "score": "0.70087457", "text": "func BasicAuth(realm string, creds map[string]string) func(next http.Handler) http.Handler {\n\treturn func(next http.Handler) http.Handler {\n\t\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t\tuser, pass, ok := r.BasicAuth()\n\t\t\tif !ok {\n\t\t\t\tlog.Error(\"Not ok\")\n\t\t\t\tbasicAuthFailed(w, realm)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tu := &structUser{\n\t\t\t\tUsername: user,\n\t\t\t}\n\t\t\tlog.Debug(\"Getting user\")\n\t\t\tgetUser(context.Background(), u)\n\t\t\tif err := hasher.ComparePasswords(u.Password, pass); err != nil {\n\t\t\t\tlog.Error(err)\n\t\t\t\tbasicAuthFailed(w, realm)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tnext.ServeHTTP(w, r)\n\t\t})\n\t}\n}", "title": "" }, { "docid": "3e9a4254446e71a80e65759beca9761c", "score": "0.69796026", "text": "func (m *Middleware) Basic(ctx context.Context, key string) error {\n\n\tisValid := func() bool {\n\t\tdata, err := base64.StdEncoding.DecodeString(key)\n\t\tif err != nil {\n\t\t\treturn false\n\t\t}\n\n\t\tdecoded := strings.Split(string(data), \":\")\n\t\tif len(decoded) < 2 {\n\t\t\treturn false\n\t\t}\n\t\tusername, password := decoded[0], decoded[1]\n\n\t\tif username != m.username || password != m.password {\n\t\t\treturn false\n\t\t}\n\n\t\treturn true\n\t}\n\n\tif !isValid() {\n\t\treturn errors.New(\"Unauthorized\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "78ec4dbc3f199eb74827c0b6d07bd2e5", "score": "0.6973077", "text": "func BasicAuth(users map[string]string) Middleware {\n\treturn func(h http.Handler) http.Handler {\n\t\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t\tusername, password, ok := r.BasicAuth()\n\n\t\t\tif !ok || !checkUser(users, username, password) {\n\t\t\t\tresponse.Error(w, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\th.ServeHTTP(w, r)\n\t\t})\n\t}\n}", "title": "" }, { "docid": "464d4ca5503209149a074a1c797a5751", "score": "0.6964272", "text": "func BasicAuth(client *statsd.Client) gin.HandlerFunc {\n\tlog.Info(\"auth...\")\n\treturn func(c *gin.Context) {\n\t\tauth := strings.SplitN(c.Request.Header.Get(\"Authorization\"), \" \", 2)\n\n\t\tif len(auth) != 2 || auth[0] != \"Basic\" {\n\t\t\trespondWithError(401, \"Unauthorized\", c)\n\t\t\tlog.Error(\"unauthorized request type\")\n\t\t\treturn\n\t\t}\n\t\tpayload, _ := base64.StdEncoding.DecodeString(auth[1])\n\t\tpair := strings.SplitN(string(payload), \":\", 2)\n\n\t\tif len(pair) != 2 || !authenticateUser(pair[0], pair[1], client) {\n\t\t\trespondWithError(401, \"Unauthorized\", c)\n\t\t\tlog.Error(\"unauthorized user\")\n\t\t\treturn\n\t\t}\n\n\t\tc.Next()\n\t}\n}", "title": "" }, { "docid": "fb935f35050aec42e55651b90a497c48", "score": "0.6934665", "text": "func (a *BasicAuthorizer) GetBasicAuth(r *http.Request) (username, password string, err error) {\n\n\theader := r.Header.Get(\"Authorization\")\n\tsplitted := strings.SplitN(header, \" \", 2)\n\tif len(splitted) != 2 {\n\t\terr = ErrInvalidAuthorizationHeader\n\t\treturn\n\t}\n\n\tif splitted[0] != \"Basic\" {\n\t\terr = ErrInvalidAuthorizationHeader\n\t\treturn\n\t}\n\tvar data []byte\n\tif data, err = base64.StdEncoding.DecodeString(splitted[1]); err != nil {\n\t\terr = ErrInvalidAuthorizationHeader\n\t\treturn\n\t}\n\n\tup := strings.SplitN(string(data), \":\", 2)\n\tif len(up) != 2 {\n\t\terr = ErrInvalidAuthorizationHeader\n\t\treturn\n\t}\n\n\tusername, password = up[0], up[1]\n\n\treturn\n}", "title": "" }, { "docid": "cc66f5b090fefcfd98249f218f38ae08", "score": "0.6885662", "text": "func BasicAuth(fn BasicValidateFunc) echo.HandlerFunc {\n\treturn func(c *echo.Context) error {\n\t\t// Skip WebSocket\n\t\tif (c.Request().Header.Get(echo.Upgrade)) == echo.WebSocket {\n\t\t\treturn nil\n\t\t}\n\n\t\tauth := c.Request().Header.Get(echo.Authorization)\n\t\tl := len(Basic)\n\t\the := echo.NewHTTPError(http.StatusBadRequest)\n\n\t\tif len(auth) > l+1 && auth[:l] == Basic {\n\t\t\tb, err := base64.StdEncoding.DecodeString(auth[l+1:])\n\t\t\tif err == nil {\n\t\t\t\tcred := string(b)\n\t\t\t\tfor i := 0; i < len(cred); i++ {\n\t\t\t\t\tif cred[i] == ':' {\n\t\t\t\t\t\t// Verify credentials\n\t\t\t\t\t\tif fn(cred[:i], cred[i+1:]) {\n\t\t\t\t\t\t\treturn nil\n\t\t\t\t\t\t}\n\t\t\t\t\t\the.SetCode(http.StatusUnauthorized)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\treturn he\n\t}\n}", "title": "" }, { "docid": "25c82b50e90238bbb728fb0136faf6c7", "score": "0.6866273", "text": "func (c *InventoryClient) GET_with_basic_authentication(url, username, password string) (*http.Response, error) {\n\treq, err := http.NewRequest(\"GET\", url, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.SetBasicAuth(username, password)\n\treq.Header.Add(\"Content-Type\", \"application/json\")\n\treq.Header.Add(\"X-Escape-Token\", c.EscapeToken)\n\treturn c.GetHTTPClient().Do(req)\n}", "title": "" }, { "docid": "da5d15665f3633a93ff1cdbf573f7099", "score": "0.68556666", "text": "func handleLoginBasic(aResponse http.ResponseWriter, aRequest *http.Request) {\n\n\taResponse.Header().Set(\"WWW-Authenticate\", `Basic realm=\"Restricted\"`)\n\n\t_auth := aRequest.Header.Get(\"Authorization\")\n\t_username, _password, _authOK := aRequest.BasicAuth()\n\n\tlog.Log.Debugf(\"Auth Type=%s, User=%s, Pwd=%s, OK=%s\\n\", _auth, _username, _password, strconv.FormatBool(_authOK))\n\n\tif _authOK == false {\n\t\tutils.NewResponseError(http.StatusUnauthorized, \"Not authorized\").ToJSON(aResponse)\n\t\treturn\n\t}\n\n\tif _username != \"api\" || _password != _username {\n\t\tutils.NewResponseError(http.StatusUnauthorized, \"Not authorized\").ToJSON(aResponse)\n\t\treturn\n\t}\n\n\tclaims := TInfoClaims{\n\t\tUser: \"api\",\n\t\tSystem: \"system\",\n\t}\n\n\t_token, _error := GenerateJWT(claims)\n\tif _error != nil {\n\t\tutils.NewResponseError(http.StatusUnauthorized, \"Not authorized\").ToJSON(aResponse)\n\t\treturn\n\t}\n\n\tvar ResponseLoginBasicData struct {\n\t\tToken string `json:\"token\"`\n\t}\n\tResponseLoginBasicData.Token = _token\n\n\tutils.NewResponse(http.StatusOK, \"Login\", ResponseLoginBasicData).ToJSON(aResponse)\n}", "title": "" }, { "docid": "5c5f335a808243064e49456c67c927cc", "score": "0.68518734", "text": "func (req *Request) SetBasicAuth(user, password string) {\n\treq.User = user\n\treq.Password = password\n}", "title": "" }, { "docid": "d3c7c8765c1c96a0799e9430213e439e", "score": "0.684352", "text": "func Basic(realm string, onSuccess http.Handler, authFunc func(string, string) bool) http.Handler {\n\treturn &handler{\n\t\tmethod: \"Basic\",\n\t\trealm: realm,\n\t\tsuccess: onSuccess,\n\t\tauth: authFunc,\n\t}\n}", "title": "" }, { "docid": "413896041a17e041d4e93a0e01ccb825", "score": "0.68289787", "text": "func NewBasicAuthenticator(secrets SecretProvider, Realm string) web.FilterFunc {\n\treturn func(ctx *context.Context) {\n\t\ta := &BasicAuth{Secrets: secrets, Realm: Realm}\n\t\tif username := a.CheckAuth(ctx.Request); username == \"\" {\n\t\t\ta.RequireAuth(ctx.ResponseWriter, ctx.Request)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "10a942d5416d1ba9a7fd777096ecde78", "score": "0.68213725", "text": "func (c *Controller) basicAuth(pass func(http.ResponseWriter, *http.Request, *fabric.User)) func(http.ResponseWriter, *http.Request) {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\n\t\tw.Header().Set(\"WWW-Authenticate\", `Basic realm=\"Restricted\"`)\n\n\t\tauth := strings.SplitN(r.Header.Get(\"Authorization\"), \" \", 2)\n\n\t\tif len(auth) != 2 || auth[0] != \"Basic\" {\n\t\t\thttp.Error(w, \"authorization failed\", http.StatusUnauthorized)\n\t\t\treturn\n\t\t}\n\n\t\tpayload, err := base64.StdEncoding.DecodeString(auth[1])\n\t\tif err != nil {\n\t\t\thttp.Error(w, \"authorization failed\", http.StatusUnauthorized)\n\t\t\treturn\n\t\t}\n\t\tpair := strings.SplitN(string(payload), \":\", 2)\n\n\t\tif len(pair) != 2 {\n\t\t\thttp.Error(w, \"authorization failed\", http.StatusUnauthorized)\n\t\t\treturn\n\t\t}\n\n\t\tu, err := c.Fabric.LogUser(pair[0], pair[1])\n\t\tif err != nil {\n\t\t\thttp.Error(w, fmt.Sprintf(\"authorization failed with error: %v\", err), http.StatusUnauthorized)\n\t\t\treturn\n\t\t}\n\n\t\tpass(w, r, u)\n\t}\n}", "title": "" }, { "docid": "3ee3233f7f7e43dcd306ebddb26808ad", "score": "0.6819643", "text": "func (t *T) SetBasicAuth(username, password string) *T {\n\tt.ba = true\n\tt.baNamename = username\n\tt.baPassword = password\n\treturn t\n}", "title": "" }, { "docid": "0c6d627c8abf30cbfe3bb3cbdfd63f6f", "score": "0.6808973", "text": "func (v Vue) SetBasicAuth(realm, schema, userField, passField string) {\n\tv.Auth = func(w http.ResponseWriter, r *http.Request) bool {\n\t\tuser, pass, ok := r.BasicAuth()\n\t\tlog.Printf(\"Checking login for: %q / %q.\\n\", user, pass)\n\t\tany := false\n\t\tq := new(query.Query)\n\t\tus, err := v.Schemas[schema].Storer.Find(context.TODO(), q)\n\t\tif err != nil {\n\t\t\twerr(err, w)\n\t\t\treturn false\n\t\t}\n\t\tfor _, iu := range us.Items {\n\t\t\tu, ok := iu.GetField(userField).(string)\n\t\t\tp, pok := iu.GetField(passField).(string)\n\t\t\tuid, nok := iu.GetField(\"id\").(string)\n\t\t\tif ok && pok &&\n\t\t\t\tsubtle.ConstantTimeCompare([]byte(u), []byte(user)) == 1 &&\n\t\t\t\tsubtle.ConstantTimeCompare([]byte(p), []byte(pass)) == 1 {\n\t\t\t\tlog.Printf(\"Login as user: %q (%q).\\n\", user, uid)\n\t\t\t\tany = true\n\t\t\t\tif nok {\n\t\t\t\t\tv.User = uid\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tif !ok || !any {\n\t\t\tif ok {\n\t\t\t\tlog.Printf(\"Invalid login: %q.\\n\", user)\n\t\t\t}\n\t\t\tw.Header().Set(\"WWW-Authenticate\", fmt.Sprintf(\"Basic realm=%q\", realm))\n\t\t\tw.WriteHeader(401)\n\t\t\tw.Write([]byte(\"Unauthorised.\\n\"))\n\t\t\treturn false\n\t\t}\n\t\treturn true\n\t}\n}", "title": "" }, { "docid": "7fc9954d45a93e7a0d270f8ae71c12e4", "score": "0.6806903", "text": "func BasicAuth(checker func(user, passwd string) bool) func(http.Handler) http.Handler {\n\n\treturn func(h http.Handler) http.Handler {\n\t\tfn := func(w http.ResponseWriter, r *http.Request) {\n\n\t\t\tu, p, ok := r.BasicAuth()\n\t\t\tif !ok {\n\t\t\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tif !checker(u, p) {\n\t\t\t\tw.WriteHeader(http.StatusForbidden)\n\t\t\t\treturn\n\t\t\t}\n\t\t\th.ServeHTTP(w, r)\n\t\t}\n\t\treturn http.HandlerFunc(fn)\n\t}\n}", "title": "" }, { "docid": "ba941aa306bde94474d8949577234f5d", "score": "0.67782176", "text": "func (c *Config) SetBasicAuth(username, password string) {\n\tc.headers[\"Authorization\"] = \"Basic \" + base64.StdEncoding.EncodeToString(\n\t\t[]byte(username+\":\"+password),\n\t)\n}", "title": "" }, { "docid": "788f1c3a33e6350da6572ba5518d1d64", "score": "0.6777681", "text": "func (s *AuthenticationService) SetBasicAuth(username, password string) {\n\ts.name = username\n\ts.secret = password\n\ts.authType = authTypeBasic\n}", "title": "" }, { "docid": "030d8b2a48bdc27f58d8472d8ffb3903", "score": "0.677576", "text": "func buildBasicAuth(routeEntry types.Route, headersToAdd map[string]string) {\n\n\tusernamePassword, err := routeEntry.Attributes.Get(types.AttributeBasicAuth)\n\tif err == nil && usernamePassword != \"\" {\n\t\tauthenticationDigest := base64.StdEncoding.EncodeToString([]byte(usernamePassword))\n\n\t\theadersToAdd[\"Authorization\"] = authenticationDigest\n\t}\n}", "title": "" }, { "docid": "13887bedcee98ea17ada570cd70dad3a", "score": "0.67714244", "text": "func BuildBasicAuth(\n\texpectedUsername string,\n\texpectedPassword string,\n\tlogger *logrus.Logger,\n) func(username, password string) (interface{}, error) {\n\treturn func(userename, password string) (interface{}, error) {\n\t\tif expectedUsername != userename || expectedPassword != password {\n\t\t\tlogger.WithError(ErrInvalidBasicCredentials).\n\t\t\t\tWarnf(`Invalid credential for username \"%s\"`, userename)\n\t\t\treturn false, ErrInvalidBasicCredentials\n\t\t}\n\n\t\treturn true, nil\n\t}\n}", "title": "" }, { "docid": "dd3f18b6669fe694e87699b9d4e57a8a", "score": "0.67684424", "text": "func (s *AuthenticationService) SetBasicAuth(username, password string) {\n\ts.username = String(username)\n\ts.secret = String(password)\n\ts.authType = authTypeBasic\n}", "title": "" }, { "docid": "f50b44b43b1dc1a357b9c1b2784da34e", "score": "0.6767911", "text": "func ParseBasicAuth(r *http.Request) (username string, password string, err error) {\n\theader := r.Header.Get(\"Authorization\")\n\n\tsplitted := strings.Split(header, \" \")\n\tif len(splitted) < 2 {\n\t\treturn \"\", \"\", errors.New(API.InvalidHeaderBasic)\n\t}\n\n\tb64value := splitted[1]\n\n\tdecodedBytes, err := base64.StdEncoding.DecodeString(b64value)\n\tlogger.CheckErr(err)\n\n\tdecoded := string(decodedBytes)\n\tuserAndPass := strings.Split(decoded, \":\")\n\n\treturn userAndPass[0], userAndPass[1], nil\n}", "title": "" }, { "docid": "2de2606ae43ac053be5f672b90ec3943", "score": "0.6759174", "text": "func basicAuth(pass handler) handler {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tkey, value, _ := r.BasicAuth()\n\t\tif key != \"v1GameClientKey\" || value != \"EAEC945C371B2EC361DE399C2F11E\" {\n\t\t\thttp.Error(w, \"authorization failed\", http.StatusUnauthorized)\n\t\t\treturn\n\t\t}\n\t\tpass(w, r)\n\t}\n}", "title": "" }, { "docid": "43c6749add75d443649d89704129f14e", "score": "0.67428446", "text": "func (s *userquerysrvc) BasicAuth(ctx context.Context, user, pass string, scheme *security.BasicScheme) (context.Context, error) {\n\tspan, _ := opentracing.StartSpanFromContext(ctx, \"userquery.BasicAuth\")\n\tdefer span.Finish()\n\n\t// We check the credentials\n\tif len(user) == 0 || len(strings.TrimSpace(user)) == 0 {\n\t\ts.metrics.EndpointFailure(\"BasicAuth\", \"400\")\n\t\treturn ctx, userquerysvc.BadArgument(\"username cannot be empty\")\n\t}\n\n\tif len(pass) == 0 || len(strings.TrimSpace(pass)) == 0 {\n\t\ts.metrics.EndpointFailure(\"BasicAuth\", \"400\")\n\t\treturn ctx, userquerysvc.BadArgument(\"password cannot be empty\")\n\t}\n\n\t// We ensure that the OrgID was provided\n\tif ctx.Value(constants.ContextKeyOrgID) == nil {\n\t\treturn ctx, userquerysvc.BadArgument(\"OrgID was not provided\")\n\t}\n\n\t// We retrieve the orgID and the areaID from the request headers\n\torgID, _ := ctx.Value(constants.ContextKeyOrgID).(string)\n\tareaID, _ := ctx.Value(constants.ContextKeyAreaID).(string)\n\n\ts.logger.Infof(\"Looking for user: '%s' in org: '%s'\", user, orgID)\n\n\t// We retrieve the database for the passed organization id\n\tdb, err := s.store.GetDatabase(orgID)\n\n\tif err != nil {\n\t\ts.logger.Error(err)\n\t\ts.metrics.EndpointFailure(\"BasicAuth\", \"500\")\n\t\treturn ctx, userquerysvc.MakeUnexpectedError(err)\n\t}\n\n\t// We look for the user in the database\n\tu, err := s.getUser(ctx, db, user, pass, orgID, areaID)\n\n\tif err != nil {\n\t\ts.metrics.EndpointFailure(\"BasicAuth\", \"401\")\n\t\treturn ctx, userquerysvc.MakeNotAuthorized(err)\n\t}\n\n\t// Login was successful, we reset the failed attempts\n\tif u.FailedAttempts != nil {\n\t\tu.FailedAttempts = nil\n\t\ts.PublishUserUpdated(ctx, u, true)\n\t}\n\n\t// We test if the user password has expired or not\n\tif u.PasswordExpiresAt != nil {\n\n\t\tnowUTC := time.Now().UTC()\n\t\tnowStr := nowUTC.Format(time.RFC3339)\n\t\texpirationDate, err := time.Parse(time.RFC3339, *u.PasswordExpiresAt)\n\n\t\tif err == nil && nowUTC.After(expirationDate) {\n\n\t\t\ts.logger.Info(\"Password has expired.\")\n\n\t\t\tid, _ := uuid.NewV4()\n\n\t\t\tpinfo := &userquerysvc.Password{\n\t\t\t\tID: id.String(),\n\t\t\t\tUserID: u.ID,\n\t\t\t\tEncryptedPassword: u.EncryptedPassword,\n\t\t\t\tCreatedAt: &nowStr,\n\t\t\t}\n\n\t\t\ts.PublishPasswordExpired(ctx, pinfo, true)\n\n\t\t\treturn ctx, userquerysvc.MakePasswordExpired(errors.New(\"password has expired\"))\n\t\t}\n\t}\n\n\tctx = context.WithValue(ctx, constants.ContextKeyUser, u)\n\n\treturn ctx, nil\n}", "title": "" }, { "docid": "cd86db446614ec954d4c5752ffa2af14", "score": "0.672008", "text": "func NewBasicAuth(backendName string, options map[string]string) (authentication.Authenticator, error) {\n\tbackend, err := NewBasicAuthBackend(backendName, options)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &BasicAuth{\n\t\tbackend: backend,\n\t}, nil\n}", "title": "" }, { "docid": "1e7e65f17b36a2959e84466dbe815383", "score": "0.67101765", "text": "func parseBasicAuth(auth string) (username, password string, ok bool) {\n\tconst prefix = \"Basic \"\n\tif !strings.HasPrefix(auth, prefix) {\n\t\treturn\n\t}\n\tc, err := base64.StdEncoding.DecodeString(auth[len(prefix):])\n\tif err != nil {\n\t\treturn\n\t}\n\tcs := string(c)\n\ts := strings.IndexByte(cs, ':')\n\tif s < 0 {\n\t\treturn\n\t}\n\treturn cs[:s], cs[s+1:], true\n}", "title": "" }, { "docid": "1e7e65f17b36a2959e84466dbe815383", "score": "0.67101765", "text": "func parseBasicAuth(auth string) (username, password string, ok bool) {\n\tconst prefix = \"Basic \"\n\tif !strings.HasPrefix(auth, prefix) {\n\t\treturn\n\t}\n\tc, err := base64.StdEncoding.DecodeString(auth[len(prefix):])\n\tif err != nil {\n\t\treturn\n\t}\n\tcs := string(c)\n\ts := strings.IndexByte(cs, ':')\n\tif s < 0 {\n\t\treturn\n\t}\n\treturn cs[:s], cs[s+1:], true\n}", "title": "" }, { "docid": "1e7e65f17b36a2959e84466dbe815383", "score": "0.67101765", "text": "func parseBasicAuth(auth string) (username, password string, ok bool) {\n\tconst prefix = \"Basic \"\n\tif !strings.HasPrefix(auth, prefix) {\n\t\treturn\n\t}\n\tc, err := base64.StdEncoding.DecodeString(auth[len(prefix):])\n\tif err != nil {\n\t\treturn\n\t}\n\tcs := string(c)\n\ts := strings.IndexByte(cs, ':')\n\tif s < 0 {\n\t\treturn\n\t}\n\treturn cs[:s], cs[s+1:], true\n}", "title": "" }, { "docid": "5d68967c008d789bc667e2e8dcfad8d9", "score": "0.6707778", "text": "func WithBasicAuth(cli *http.Client, username, password string) *http.Client {\n\trt := &basicAuthTransport{cli.Transport, username, password}\n\tcli.Transport = rt\n\treturn cli\n}", "title": "" }, { "docid": "13928a6c38c547bfe8935a4d9aaed0c3", "score": "0.670744", "text": "func (api *RestAPI) basicAuthLogin() error {\n\tif api.id == \"\" || api.secret == \"\" {\n\t\treturn fmt.Errorf(\"Missing username or password for Basic Auth request\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "96a05ab54b003977e6a6712308625849", "score": "0.6707117", "text": "func loginBasicAuth(page *agouti.Page, urlText string, username string, password string) {\n\tu, err := url.Parse(urlText)\n\tif err != nil {\n\t\tlogger.WithFields(\n\t\t\tlog.Fields{\n\t\t\t\t\"subsystem\": \"login_basic_auth\",\n\t\t\t\t\"part\": \"url_parser\",\n\t\t\t}).Warningln(err.Error())\n\t} else {\n\t\turlText = u.Scheme + \"://\" + username + \":\" + password + \"@\" + u.Hostname() + u.Path + \"?\" + u.RawQuery\n\t}\n\terr = page.Navigate(urlText)\n\tif err != nil {\n\t\tlogger.WithFields(\n\t\t\tlog.Fields{\n\t\t\t\t\"subsystem\": \"driver\",\n\t\t\t\t\"part\": \"navigation_error\",\n\t\t\t}).Warningln(err.Error())\n\t}\n}", "title": "" }, { "docid": "afda9dae38d9b46ade9a4ada3d7e550b", "score": "0.66971284", "text": "func BasicAuth() (*SensuToken, error) {\n\tif currentToken.AccessToken != \"\" &&\n\t\tcurrentToken.ExpiresAt > string(time.Now().Unix()) {\n\t\treturn &currentToken, nil\n\t}\n\n\tclient := &http.Client{\n\t\tTimeout: time.Second * 10,\n\t}\n\tsensuURL := fmt.Sprintf(\"%s/auth\", config.SensuGoURL)\n\treq, err := http.NewRequest(\"GET\", sensuURL, nil)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\treq.SetBasicAuth(config.SensuGoUser, config.SensuGoSecret)\n\tresp, err := client.Do(req)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tbodyText, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\tlog.Printf(\"[ERROR]: %s\", err)\n\t}\n\tcurrentToken := new(SensuToken)\n\tjson.Unmarshal(bodyText, &currentToken)\n\tdefer resp.Body.Close()\n\treturn currentToken, nil\n}", "title": "" }, { "docid": "516a4a6944dc0e86b7c7e1640294cc2d", "score": "0.66621006", "text": "func GetBasicAuthHeader(username, password string) string {\n\tauth := username + \":\" + password\n\treturn \"Basic \" + base64.StdEncoding.EncodeToString([]byte(auth))\n}", "title": "" }, { "docid": "54f053c0d14c4fde21d59ce334cf4129", "score": "0.6657269", "text": "func AuthorizeBasic(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tauthData := r.Header.Get(\"Authorization\")\n\t\tif authData == \"\" {\n\t\t\tdenyAccess(w)\n\t\t}\n\t\ts := strings.Split(authData, \" \")\n\t\tif s == nil || len(s) <= 1 {\n\t\t\tdenyAccess(w)\n\t\t}\n\t\tauth := s[1]\n\t\tif authenticate(auth) {\n\t\t\tnext.ServeHTTP(w, r)\n\t\t} else {\n\t\t\tdenyAccess(w)\n\t\t}\n\t})\n}", "title": "" }, { "docid": "b92535fc233294550ee3b0493f139bfc", "score": "0.6631694", "text": "func (Middleware) BasicAuth(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tif err := gwf.Container.Invoke(func(s *sessions.CookieStore) {\n\n\t\t\tsession, err := s.Get(r, \"basic-auth\")\n\t\t\tif err != nil {\n\t\t\t\tgwf.ProcessError(err)\n\t\t\t}\n\n\t\t\tif session.Values[\"user\"] == nil {\n\t\t\t\thttp.Error(w, \"Forbidden\", http.StatusForbidden)\n\t\t\t} else {\n\t\t\t\tnext.ServeHTTP(w, r)\n\t\t\t}\n\n\t\t}); err != nil {\n\t\t\tgwf.ProcessError(err)\n\t\t}\n\n\t\tnext.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "acc5cd8cf0603c5d53bd97402b24e058", "score": "0.6627144", "text": "func CheckBasicAuth(r *fasthttp.RequestCtx) (*BasicAuth, error) {\n\tif getFormValue(r, \"Authorization\") == \"\" {\n\t\treturn nil, nil\n\t}\n\n\ts := strings.SplitN(getFormValue(r, \"Authorization\"), \" \", 2)\n\tif len(s) != 2 || s[0] != \"Basic\" {\n\t\treturn nil, errors.New(\"Invalid authorization header\")\n\t}\n\n\tb, err := base64.StdEncoding.DecodeString(s[1])\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tpair := strings.SplitN(string(b), \":\", 2)\n\tif len(pair) != 2 {\n\t\treturn nil, errors.New(\"Invalid authorization message\")\n\t}\n\n\treturn &BasicAuth{Username: pair[0], Password: pair[1]}, nil\n}", "title": "" }, { "docid": "ab19c6a85f2082460ccb979728db7c9f", "score": "0.6621769", "text": "func (d *DynamicAuth) GetBasicAuth() (bool, string, string) {\n\treturn d.fn().GetBasicAuth()\n}", "title": "" }, { "docid": "0c582c80bc07c4724f40687161289968", "score": "0.6613803", "text": "func (c *Client) SetBasicAuth(username, password string) {\n\tc.username = username\n\tc.password = password\n}", "title": "" }, { "docid": "0f0f1ede0d842064981cd4fc1a90ca0a", "score": "0.66035557", "text": "func addAuth(req *http.Request, username, password string) {\n\tif password != \"\" {\n\t\tif username == \"\" {\n\t\t\tusername = \"snap\"\n\t\t}\n\t\treq.SetBasicAuth(username, password)\n\t}\n}", "title": "" }, { "docid": "f56c533743554346978e46babe6e1c16", "score": "0.6589935", "text": "func (s *Session) SetBasicAuth(user, pass string) {\n\ts.username = user\n\ts.password = pass\n\treturn\n}", "title": "" }, { "docid": "88927e1e6bbaaaec683045586035e95d", "score": "0.6575631", "text": "func Authenticate(r *http.Request, users datastore.UserService) (u *user.User, err error) {\n\tusername, password, ok := r.BasicAuth()\n\tif !ok {\n\t\terr = errors.New(\"basic auth not OK\")\n\t\treturn\n\t}\n\tu, err = users.GetUser(username)\n\tif err != nil {\n\t\treturn\n\t}\n\tif err = abdi.Check(password, u.PasswordHash); err != nil {\n\t\treturn\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "8cbf3efdf39b435ce010e013edbe8ee2", "score": "0.657419", "text": "func (authInfo *AuthInfo) GetBasicAuth() (bool, string, string) {\n\tif authInfo == nil || (authInfo.Username == \"\" && authInfo.Password == \"\") {\n\t\treturn false, \"\", \"\"\n\t}\n\treturn true, authInfo.Username, authInfo.Password\n}", "title": "" }, { "docid": "3e235cafa25479f60d6825835633a030", "score": "0.6565045", "text": "func CheckBasicAuthentication(username, password string, ctx *gin.Context) error {\n\tu, p, err := GetBasicAuthentication(ctx)\n\tif err != nil {\n\t\treturn err\n\t} else {\n\t\tif u != \"\" && p != \"\" {\n\t\t\tif u != username && p != password {\n\t\t\t\treturn errors.New(\"Invalid credentials\")\n\t\t\t}\n\t\t}\n\t\treturn nil\n\t}\n}", "title": "" } ]
d6ce4495daed1d89fe31ca38f399ebed
Round returns round of value.
[ { "docid": "9feefa7793512aefae292a7cc097f7db", "score": "0.68518764", "text": "func Round(val float64, roundOn float64, places int) (newVal float64) {\n\tvar round float64\n\tpow := math.Pow(10, float64(places))\n\tdigit := pow * val\n\t_, div := math.Modf(digit)\n\tif div >= roundOn {\n\t\tround = math.Ceil(digit)\n\t} else {\n\t\tround = math.Floor(digit)\n\t}\n\tnewVal = round / pow\n\treturn\n}", "title": "" } ]
[ { "docid": "06651c429311a4152fd54b8dabef8c95", "score": "0.75964326", "text": "func Round(val float64) int64 {\r\n\tif val < 0 {\r\n\t\treturn int64(val - 0.5)\r\n\t}\r\n\treturn int64(val + 0.5)\r\n}", "title": "" }, { "docid": "d22a62c388567ee4cb7f6a78b7d61cfe", "score": "0.7306053", "text": "func Round(f float64) int {\n\treturn int(f + 0.5)\n}", "title": "" }, { "docid": "a63493a478f49c2dd4427f427fd89b26", "score": "0.7266392", "text": "func round(val float64) (int) {\n return int(math.Floor(val + 0.5))\n}", "title": "" }, { "docid": "7289fb690f2da08907cb18510d67d508", "score": "0.7206298", "text": "func Round(val float64, sf int) (newVal float64) {\n\tvar round float64\n\tpow := math.Pow(10, float64(sf))\n\tdigit := pow * val\n\t_, div := math.Modf(digit)\n\t_div := math.Copysign(div, val)\n\t_roundOn := math.Copysign(.5, val)\n\tif _div >= _roundOn {\n\t\tround = math.Ceil(digit)\n\t} else {\n\t\tround = math.Floor(digit)\n\t}\n\tnewVal = round / pow\n\treturn\n}", "title": "" }, { "docid": "c6719dde528ae5392bd481e9eacf247d", "score": "0.72020406", "text": "func Round(f float64) float64 {\n\treturn math.Floor(f + .5)\n}", "title": "" }, { "docid": "c6719dde528ae5392bd481e9eacf247d", "score": "0.72020406", "text": "func Round(f float64) float64 {\n\treturn math.Floor(f + .5)\n}", "title": "" }, { "docid": "32c9c7ca630d4c73bcac6280fc0a93d4", "score": "0.7184747", "text": "func Round(f float64) float64 {\n\treturn math.Floor(f + 0.5)\n}", "title": "" }, { "docid": "6fabf3dee157ac24d054d5b88bfeffe3", "score": "0.7156544", "text": "func round(x float64) float64 {\n\treturn math.Round(x)\n}", "title": "" }, { "docid": "7d77f87c701018a3ac780fe80280da29", "score": "0.7137868", "text": "func round(x, unit float64) float64 {\n\treturn float64(int64(x/unit+0.5)) * unit\n}", "title": "" }, { "docid": "6595117f25d36557b64a102881465c6a", "score": "0.7117031", "text": "func round(num float64) int {\n\treturn int(num + math.Copysign(0.5, num))\n}", "title": "" }, { "docid": "3ee14b70d79d097820c1cde85af7a525", "score": "0.70825845", "text": "func (e *Event) Round() int64 {\n\tif e.round == nil || *e.round < 0 {\n\t\treturn -1\n\t}\n\treturn *e.round\n}", "title": "" }, { "docid": "87c298536af42cc1088f06eaf957d817", "score": "0.7076643", "text": "func round(f float64) float64 {\n\treturn math.Floor(f + .5)\n}", "title": "" }, { "docid": "87c298536af42cc1088f06eaf957d817", "score": "0.7076643", "text": "func round(f float64) float64 {\n\treturn math.Floor(f + .5)\n}", "title": "" }, { "docid": "3a42c66a43fde8177bd8ae8ecd86212f", "score": "0.70554465", "text": "func Round(f float64) int {\n\treturn int(f + math.Copysign(0.5, f))\n}", "title": "" }, { "docid": "eb5e6aecd43fdfc27881b692663065b5", "score": "0.7025773", "text": "func Round(f float64) float64 {\n\tif f < 0 {\n\t\treturn math.Ceil(f - 0.5)\n\t} else {\n\t\treturn math.Floor(f + 0.5)\n\t}\n}", "title": "" }, { "docid": "d3cf7950e498cf90155e86fcfa70c556", "score": "0.70255387", "text": "func round(f float64, round int) (n float64) {\n\tshift := math.Pow(10, float64(round))\n\treturn math.Floor((f*shift)+.5) / shift\n}", "title": "" }, { "docid": "8104a8f09680d1a53849422aac915a1f", "score": "0.70082194", "text": "func Round(x float64) float64 {\n\treturn math.Round(x/0.0000005) * 0.0000005\n}", "title": "" }, { "docid": "41cfe2ef88650549bc6eec9e8245aedd", "score": "0.6988522", "text": "func Round(x, unit float64) float64 {\n\treturn math.Round(x/unit) * unit\n}", "title": "" }, { "docid": "6822ff4a06dfb2567c5362c1bb63aa9e", "score": "0.6977618", "text": "func round(f float64) int64 {\n\tif f < 0 {\n\t\treturn int64(f - 0.5)\n\t}\n\treturn int64(f + 0.5)\n}", "title": "" }, { "docid": "b219d352795db497b4ec6130cae87460", "score": "0.6967183", "text": "func Round(args ...interface{}) Term {\n\treturn constructRootTerm(\"Round\", p.Term_ROUND, args, map[string]interface{}{})\n}", "title": "" }, { "docid": "90b371b0718e24579c45b61c5679ec9d", "score": "0.6949651", "text": "func Round(value time.Duration, resolution time.Duration) time.Duration {\n\tif value < 0 {\n\t\tvalue -= resolution / 2\n\t} else {\n\t\tvalue += resolution / 2\n\t}\n\treturn value / resolution * resolution\n}", "title": "" }, { "docid": "e22805fb553fa1cca6e2f24cb942a8ef", "score": "0.69433874", "text": "func Round(f float64) int {\n\tif f < -0.5 {\n\t\treturn int(f - 0.5)\n\t}\n\tif f > 0.5 {\n\t\treturn int(f + 0.5)\n\t}\n\treturn 0\n}", "title": "" }, { "docid": "213fc435b62cf51cef2008005a23cdd7", "score": "0.6912873", "text": "func (d TGDecimal) Round(noOfPlaces int32) TGDecimal {\n\t// truncate to places + 1\n\tret := d.rescale(-noOfPlaces - 1)\n\n\t// add sign(digits) * 0.5\n\tif ret.value.Sign() < 0 {\n\t\tret.value.Sub(ret.value, fiveInt)\n\t} else {\n\t\tret.value.Add(ret.value, fiveInt)\n\t}\n\n\t// floor for positive numbers, ceil for negative numbers\n\t_, m := ret.value.DivMod(ret.value, tenInt, new(big.Int))\n\tret.exp++\n\tif ret.value.Sign() < 0 && m.Cmp(zeroInt) != 0 {\n\t\tret.value.Add(ret.value, oneInt)\n\t}\n\n\treturn ret\n}", "title": "" }, { "docid": "cf2a6f24c48fa3553ec051e5c4d3c25c", "score": "0.6898329", "text": "func round(in float64) int {\n\tif in < 0 {\n\t\treturn int(math.Ceil(in - 0.5))\n\t} else {\n\t\treturn int(math.Floor(in + 0.5))\n\t}\n}", "title": "" }, { "docid": "ea1580b68867663cc59d6f7a771c654d", "score": "0.68650943", "text": "func round(x float64, prec int) float64 {\n\n\tvar rounder float64\n\tpow := math.Pow(10, float64(prec))\n\tintermed := x * pow\n\t_, frac := math.Modf(intermed)\n\tx = .5\n\tif frac < 0.0 {\n\t\tx = -.5\n\t}\n\tif frac >= x {\n\t\trounder = math.Ceil(intermed)\n\t} else {\n\t\trounder = math.Floor(intermed)\n\t}\n\n\treturn rounder / pow\n}", "title": "" }, { "docid": "9fb1a8e591ede704af148be80a244952", "score": "0.685022", "text": "func (t Term) Round(args ...interface{}) Term {\n\treturn constructMethodTerm(t, \"Round\", p.Term_ROUND, args, map[string]interface{}{})\n}", "title": "" }, { "docid": "3bb79297dcb93288a5f9669ac6386405", "score": "0.68437594", "text": "func Round(val float64, roundOn float64, places int) (newVal float64) {\n\tvar round float64\n\n\tpow := math.Pow(10, float64(places))\n\n\tdigit := pow * val\n\n\t_, div := math.Modf(digit)\n\n\tif div >= roundOn {\n\t\tround = math.Ceil(digit)\n\t} else {\n\t\tround = math.Floor(digit)\n\t}\n\n\tnewVal = round / pow\n\n\treturn\n}", "title": "" }, { "docid": "a79d4624485be19d03fbd310575d8fd7", "score": "0.6833599", "text": "func (o Operation) Round(x Decimal) Decimal {\n\tpanic(\"TODO\")\n}", "title": "" }, { "docid": "ca17a291752742877015b7a8862bd7af", "score": "0.6828003", "text": "func (r *RandomData) Round() uint64 {\n\treturn r.Rnd\n}", "title": "" }, { "docid": "9c2157de4b99ffa43f5e8ade0864adf2", "score": "0.68086785", "text": "func Round(number float64, numDigits int) float64 {\n\tvar rounder float64\n\tpow := math.Pow(10, float64(numDigits))\n\tintermed := number * pow\n\t_, frac := math.Modf(intermed)\n\tif frac >= 0.5 {\n\t\trounder = math.Ceil(intermed)\n\t} else {\n\t\trounder = math.Floor(intermed)\n\t}\n\n\treturn rounder / pow\n}", "title": "" }, { "docid": "8e4285630112ba0eb109c3f8219be445", "score": "0.6786827", "text": "func round(num float64) int {\n return int(num + math.Copysign(0.5, num))\n}", "title": "" }, { "docid": "9522c8111222163f0286884e4935e333", "score": "0.6772937", "text": "func Round(f float64, places int) float64 {\n\tshift := math.Pow(10, float64(places))\n\treturn math.Floor(f*shift+.5) / shift\n}", "title": "" }, { "docid": "9522c8111222163f0286884e4935e333", "score": "0.6772937", "text": "func Round(f float64, places int) float64 {\n\tshift := math.Pow(10, float64(places))\n\treturn math.Floor(f*shift+.5) / shift\n}", "title": "" }, { "docid": "72af4eac3fe5dcdca26c2dcaba122cde", "score": "0.6743641", "text": "func round(val float64, roundOn float64, places int) (newVal float64) {\n\tvar round float64\n\tpow := math.Pow(10, float64(places))\n\tdigit := pow * val\n\t_, div := math.Modf(digit)\n\tif div >= roundOn {\n\t\tround = math.Ceil(digit)\n\t} else {\n\t\tround = math.Floor(digit)\n\t}\n\tnewVal = round / pow\n\treturn\n}", "title": "" }, { "docid": "7e82f6186ee6c717a11f050cafe7cd5c", "score": "0.67342687", "text": "func round(val float64, roundOn float64, places int) (newVal float64) {\n\tvar round float64\n\n\tpow := math.Pow(10, float64(places))\n\tdigit := pow * val\n\n\t_, div := math.Modf(digit)\n\tif div >= roundOn {\n\t\tround = math.Ceil(digit)\n\t} else {\n\t\tround = math.Floor(digit)\n\t}\n\n\tnewVal = round / pow\n\treturn\n}", "title": "" }, { "docid": "4082d399d8093187d1ec2ddf8910f257", "score": "0.6716219", "text": "func (_FoMo3Dlong *FoMo3DlongCallerSession) Round(arg0 *big.Int) (struct {\n\tPlyr *big.Int\n\tTeam *big.Int\n\tEnd *big.Int\n\tEnded bool\n\tStrt *big.Int\n\tKeys *big.Int\n\tEth *big.Int\n\tPot *big.Int\n\tMask *big.Int\n\tIco *big.Int\n\tIcoGen *big.Int\n\tIcoAvg *big.Int\n}, error) {\n\treturn _FoMo3Dlong.Contract.Round(&_FoMo3Dlong.CallOpts, arg0)\n}", "title": "" }, { "docid": "97c8bb7aab172aa3825492a000f6aea9", "score": "0.6690005", "text": "func round(num float64, precision int) float64 {\n\toutput := math.Pow(10, float64(precision))\n\treturn float64(ret(num*output)) / output\n\n}", "title": "" }, { "docid": "b41b44276a9255b600072c33a7719338", "score": "0.66888404", "text": "func (_FoMo3Dlong *FoMo3DlongSession) Round(arg0 *big.Int) (struct {\n\tPlyr *big.Int\n\tTeam *big.Int\n\tEnd *big.Int\n\tEnded bool\n\tStrt *big.Int\n\tKeys *big.Int\n\tEth *big.Int\n\tPot *big.Int\n\tMask *big.Int\n\tIco *big.Int\n\tIcoGen *big.Int\n\tIcoAvg *big.Int\n}, error) {\n\treturn _FoMo3Dlong.Contract.Round(&_FoMo3Dlong.CallOpts, arg0)\n}", "title": "" }, { "docid": "3ad9f2d4514151fe694bb79e127e037a", "score": "0.6683372", "text": "func TestRound(t *testing.T) {\n\tfmt.Println(\"round(3.14): \", Round(3.14))\n\tfmt.Println(\"round(-3.14): \", Round(-3.14))\n\tfmt.Println(\"round(3.54): \", Round(3.54))\n}", "title": "" }, { "docid": "8eb313f51cd587e330e5e4857c06a90d", "score": "0.66524136", "text": "func round(x float64) float64 {\n\tt := math.Trunc(x)\n\tif math.Abs(x-t) >= 0.5 {\n\t\treturn t + math.Copysign(1, x)\n\t}\n\treturn t\n}", "title": "" }, { "docid": "269075658d47c43a270870e1b09972d6", "score": "0.6627948", "text": "func Round(num float64, precision int) float64 {\n\tfactor := math.Pow10(precision)\n\treturn math.Round(num*factor) / factor\n}", "title": "" }, { "docid": "3b2db9c3f5384bcba52195236ca73795", "score": "0.65971", "text": "func (alg *Algorand) round() uint64 {\n\treturn alg.lastBlock().Round()\n}", "title": "" }, { "docid": "2079afade7dcb8a14b733532a9b472e5", "score": "0.6594184", "text": "func (d Decimal) Round(places int32) Decimal {\n\n\treturn Decimal{\n\t\tdec: d.dec.Round(places),\n\t}\n}", "title": "" }, { "docid": "17ba794c915bbc38a1a51f79b70d2bd0", "score": "0.6496742", "text": "func Round(v float64) (fint float64) {\n\tvar frac float64\n\tif fint, frac = math.Modf(v); frac > 0.5 || (frac == 0.5 && math.Mod(fint, 2) != 0) {\n\t\tfint++\n\t}\n\treturn\n}", "title": "" }, { "docid": "39c65942264c232e8e18d838efb5effc", "score": "0.6493801", "text": "func (e *ErrDecimal) Round(d, x *Decimal) *Decimal {\n\treturn e.op2(d, x, e.Ctx.Round)\n}", "title": "" }, { "docid": "0d1e59b2eb30dd730602acb4399182b2", "score": "0.6452247", "text": "func Round(f float64, n int) float64 {\n\tpow10N := math.Pow10(n)\n\treturn math.Trunc((f+0.5/pow10N)*pow10N) / pow10N\n}", "title": "" }, { "docid": "5791b4545b505b91f841215e4d54659f", "score": "0.6448574", "text": "func round(d time.Duration, step time.Duration, roundCloser bool) time.Duration {\n\tif roundCloser {\n\t\treturn time.Duration(float64(d)/float64(step) + 0.5)\n\t}\n\treturn time.Duration(float64(d) / float64(step))\n}", "title": "" }, { "docid": "52d25aaf5eb3faee39f407cf9d0d04a3", "score": "0.6435975", "text": "func Round(nr float64) int {\n\tflooredValue := float64(int(nr))\n\n\tx := nr - flooredValue\n\n\tif math.Abs(x) > 0.5 && nr > 0 {\n\t\treturn int(nr) + 1\n\t} else if math.Abs(x) > 0.5 {\n\n\t\treturn int(nr) - 1\n\t}\n\n\treturn int(nr)\n\n}", "title": "" }, { "docid": "3200842c6c027d4030a38b099dd238a8", "score": "0.64190435", "text": "func Round(val float64, places int, roundOn float64) float64 {\n\n\tpow := math.Pow(10, float64(places))\n\tsigned := math.Signbit(val)\n\tscaled := pow * math.Abs(val)\n\t_, div := math.Modf(scaled)\n\n\tvar result float64\n\n\tif div >= roundOn {\n\t\tresult = math.Ceil(scaled) / pow\n\t} else {\n\t\tresult = math.Floor(scaled) / pow\n\t}\n\n\tif signed {\n\t\treturn result * -1\n\t}\n\n\treturn result\n}", "title": "" }, { "docid": "bb335fef0d495d618942218b7bf14285", "score": "0.6371052", "text": "func Round(x float64) int64 {\n\treturn i64(math.Round(x))\n}", "title": "" }, { "docid": "5349e23255b65ec1210cbcae8fd12b39", "score": "0.63440114", "text": "func roundFloat64(value float64) float64 {\n\tif value < 0.0 {\n\t\treturn value - 0.5\n\t}\n\treturn value + 0.5\n}", "title": "" }, { "docid": "f5427524c5757d8df90e3da079f69484", "score": "0.6300947", "text": "func (m *Money) Round() *Money {\n\treturn &Money{amount: mutate.calc.round(m.amount, m.currency.Fraction), currency: m.currency}\n}", "title": "" }, { "docid": "8030a21034db44670feb9ac5b91ff6ad", "score": "0.6286023", "text": "func (c *Context) Round(d, x *Decimal) (Condition, error) {\n\treturn c.goError(c.round(d, x))\n}", "title": "" }, { "docid": "47afe9bf14dfe930ea23d95f904b2d69", "score": "0.6272019", "text": "func round(f float64, magnitude float64) int {\n\tif math.Abs(f) < 0.5 {\n\t\treturn 0\n\t}\n\n\treturn int(f + math.Copysign(magnitude, f))\n}", "title": "" }, { "docid": "17fe26a1aec428ce09e6a3a49e9bcf17", "score": "0.6237908", "text": "func round(in float64) float64 {\n\ti, f := math.Modf(in)\n\tif f < 0.5 {\n\t\treturn i\n\t}\n\treturn i + 1.0\n}", "title": "" }, { "docid": "7789bda077df0b3cb82d5731ffb5b2be", "score": "0.6213733", "text": "func Dround(ctx context.Context, db DB, p0 float64) (float64, error) {\n\t// call pg_catalog.dround\n\tconst sqlstr = `SELECT * FROM pg_catalog.dround($1)`\n\t// run\n\tvar r0 float64\n\tlogf(sqlstr, p0)\n\tif err := db.QueryRowContext(ctx, sqlstr, p0).Scan(&r0); err != nil {\n\t\treturn 0.0, logerror(err)\n\t}\n\treturn r0, nil\n}", "title": "" }, { "docid": "414a0f30950d101f9f0dc84c8b379ef0", "score": "0.61709887", "text": "func round(num1 float32, round int) float32 {\n\tscale := 10\n\tfor i := 0; i < round; i++ {\n\t\tscale = scale * 10\n\t}\n\treturn float32(math.Round(float64(num1)*float64(scale)) / float64(scale))\n}", "title": "" }, { "docid": "2ecbe5e274d0f76a7836bbf70bd94205", "score": "0.617073", "text": "func (p *Point) Round(sf int) {\n\tp.Lat = extmath.Round(p.Lat, sf)\n\tp.Long = extmath.Round(p.Long, sf)\n}", "title": "" }, { "docid": "47aead8c63785f98fcde9cdc811b97ae", "score": "0.6149693", "text": "func (f Func) Round(precision float64) Func {\n\tround := func(v float64) float64 {\n\t\tr := math.Round(v*math.Pow(10, precision)) / math.Pow(10, precision)\n\t\tif r == -0 {\n\t\t\treturn 0\n\t\t}\n\t\treturn r\n\t}\n\treturn func(a, b, c float64) (a2, b2, c2 float64) {\n\t\ta, b, c = f(a, b, c)\n\t\treturn round(a), round(b), round(c)\n\t}\n}", "title": "" }, { "docid": "666c1176c641220f219eb8fcca5d82b8", "score": "0.6133741", "text": "func Round(t time.Time) time.Time {\n\treturn timeutils.Round(t, config.Viper.GetDuration(PathStepSize))\n}", "title": "" }, { "docid": "868714929125d731ad2f1d2ce7740a9c", "score": "0.6091656", "text": "func (d *internalDecimal) Round(noOfDigits int) {\n\tif noOfDigits < 0 || noOfDigits >= d.usedDigits {\n\t\treturn\n\t}\n\tif shouldRoundUp(d, noOfDigits) {\n\t\td.RoundUp(noOfDigits)\n\t} else {\n\t\td.RoundDown(noOfDigits)\n\t}\n}", "title": "" }, { "docid": "d03be60944fa9c016a7793bb2bfbe19d", "score": "0.6059369", "text": "func roundToPrecision(value float64, precision int) float64 {\n\tratio := math.Pow(10, float64(precision))\n\treturn math.Round(value*ratio) / ratio\n}", "title": "" }, { "docid": "fd3ded3890ef4effdbe3a5e556411981", "score": "0.60568714", "text": "func (f *SystemInfoFactory) roundInterest64(value float64) float64 {\n\treturn float64(math.Floor(value*100)) / 100\n}", "title": "" }, { "docid": "c169cc50de0515ad38fbcab6ca98d6f5", "score": "0.5976405", "text": "func (k Keeper) Round(c context.Context, req *types.QueryRoundRequest) (*types.QueryRoundResponse, error) {\n\tsdkCtx := sdk.UnwrapSDKContext(c)\n\n\tif req == nil {\n\t\treturn nil, status.Error(codes.InvalidArgument, \"invalid request\")\n\t}\n\n\tif req.ClaimType == \"\" {\n\t\treturn nil, status.Error(codes.InvalidArgument, \"missing claimType\")\n\t}\n\n\tif req.RoundId == 0 {\n\t\treturn nil, status.Error(codes.InvalidArgument, \"missing RoundId\")\n\t}\n\n\tround := k.GetRound(sdkCtx, req.ClaimType, req.RoundId)\n\tif round == nil {\n\t\treturn nil, status.Errorf(codes.NotFound, \"round %d not found\", req.RoundId)\n\t}\n\treturn &types.QueryRoundResponse{Round: *round}, nil\n}", "title": "" }, { "docid": "6815e283a9c0cf542bb9ca4d009b0aa3", "score": "0.59358686", "text": "func roundInteger(num float64) int {\n\treturn int(num + math.Copysign(0.5, num))\n}", "title": "" }, { "docid": "8e79af4312303a005281a34371e5a1f3", "score": "0.58611596", "text": "func RoundByNumeric(ctx context.Context, db DB, p0 float64) (float64, error) {\n\t// call pg_catalog.round\n\tconst sqlstr = `SELECT * FROM pg_catalog.round($1)`\n\t// run\n\tvar r0 float64\n\tlogf(sqlstr, p0)\n\tif err := db.QueryRowContext(ctx, sqlstr, p0).Scan(&r0); err != nil {\n\t\treturn 0.0, logerror(err)\n\t}\n\treturn r0, nil\n}", "title": "" }, { "docid": "5408076f1a922862acf8f01f71ea7d4b", "score": "0.5858256", "text": "func (i InternationalColorTime) Round(d time.Duration) InternationalColorTime {\n\tif d <= 0 {\n\t\treturn i\n\t}\n\tdur := time.Duration(i.nanos)\n\ti.nanos = int64(dur.Round(d))\n\treturn i\n}", "title": "" }, { "docid": "99363a3d6bdefc76d69722de13ad075e", "score": "0.5852941", "text": "func (m *LeaderVoteMessage) GetRound() int {\n\treturn int(m.SignedCredential.Message.Credential.Round)\n}", "title": "" }, { "docid": "6634403c8200c73d7a3d3ad94fe84e16", "score": "0.5818905", "text": "func RoundByDoublePrecision(ctx context.Context, db DB, p0 float64) (float64, error) {\n\t// call pg_catalog.round\n\tconst sqlstr = `SELECT * FROM pg_catalog.round($1)`\n\t// run\n\tvar r0 float64\n\tlogf(sqlstr, p0)\n\tif err := db.QueryRowContext(ctx, sqlstr, p0).Scan(&r0); err != nil {\n\t\treturn 0.0, logerror(err)\n\t}\n\treturn r0, nil\n}", "title": "" }, { "docid": "1c6d82d2744acd306b4ca842265dfb34", "score": "0.5780304", "text": "func (_Game *GameCallerSession) GetRound() (*big.Int, error) {\n\treturn _Game.Contract.GetRound(&_Game.CallOpts)\n}", "title": "" }, { "docid": "b00df46bef5c5e074a8dd2ef92a5002e", "score": "0.5777613", "text": "func (o *observer) Rounds() int {\n\treturn o.round\n}", "title": "" }, { "docid": "ab31c68664a51750a9eebecf5c767da4", "score": "0.57726383", "text": "func (_Game *GameSession) GetRound() (*big.Int, error) {\n\treturn _Game.Contract.GetRound(&_Game.CallOpts)\n}", "title": "" }, { "docid": "dd777b8f60ade977e5afba60a91072d0", "score": "0.5753059", "text": "func (d Duration) Round(m int64) Duration {\n\tif m >= 2 && d.Value != 0 {\n\t\tr := d.Value % m\n\t\tif d.Value > 0 {\n\t\t\tif lessThanHalf(r, m) {\n\t\t\t\td.Value -= r\n\t\t\t} else if d1 := d.Value + (m - r); d1 > d.Value {\n\t\t\t\td.Value = d1\n\t\t\t} else { // overflow\n\t\t\t\td.Value = maxDuration\n\t\t\t}\n\t\t} else {\n\t\t\tr = -r\n\t\t\tif lessThanHalf(r, m) {\n\t\t\t\td.Value += r\n\t\t\t} else if d1 := d.Value - (m - r); d1 < d.Value {\n\t\t\t\td.Value = d1\n\t\t\t} else { // overflow\n\t\t\t\td.Value = minDuration\n\t\t\t}\n\t\t}\n\t}\n\treturn d\n}", "title": "" }, { "docid": "5c8a0c4886f2ce0578b36f602672348c", "score": "0.5751548", "text": "func roundToInt(val float64) int {\n\tvar round float64\n\t_, div := math.Modf(val)\n\tif div >= .5 {\n\t\tround = math.Ceil(val)\n\t} else {\n\t\tround = math.Floor(val)\n\t}\n\treturn int(round)\n}", "title": "" }, { "docid": "cd5ed08a46ae28498ee7b4ad32f5c498", "score": "0.571086", "text": "func (m *GCMessage) GetRound() int {\n\treturn int(m.SignedCredential.Message.Credential.Round)\n}", "title": "" }, { "docid": "e1afe9ae11cb8c7ff76f5a515940221e", "score": "0.56922317", "text": "func fastRound(n float64) int {\n\treturn int(n+0.5) << 0\n}", "title": "" }, { "docid": "c73eeb2fe9456fbdbda1cbf54c669201", "score": "0.5672313", "text": "func (_FoMo3Dlong *FoMo3DlongCaller) Round(opts *bind.CallOpts, arg0 *big.Int) (struct {\n\tPlyr *big.Int\n\tTeam *big.Int\n\tEnd *big.Int\n\tEnded bool\n\tStrt *big.Int\n\tKeys *big.Int\n\tEth *big.Int\n\tPot *big.Int\n\tMask *big.Int\n\tIco *big.Int\n\tIcoGen *big.Int\n\tIcoAvg *big.Int\n}, error) {\n\tret := new(struct {\n\t\tPlyr *big.Int\n\t\tTeam *big.Int\n\t\tEnd *big.Int\n\t\tEnded bool\n\t\tStrt *big.Int\n\t\tKeys *big.Int\n\t\tEth *big.Int\n\t\tPot *big.Int\n\t\tMask *big.Int\n\t\tIco *big.Int\n\t\tIcoGen *big.Int\n\t\tIcoAvg *big.Int\n\t})\n\tout := ret\n\terr := _FoMo3Dlong.contract.Call(opts, out, \"round_\", arg0)\n\treturn *ret, err\n}", "title": "" }, { "docid": "c71ad35e073a2c2572f8172b769ba621", "score": "0.5669231", "text": "func Roundf(f float32) float32 {\n\treturn float32(math.Floor(float64(f) + .5))\n}", "title": "" }, { "docid": "ac20d76663bc5fda91dbe41571273e7c", "score": "0.5655348", "text": "func Round(number float64, decimalPlaces int) (float64, error) {\n\tif decimalPlaces < 0 {\n\t\treturn 0.0, &RoundError{Err: \"utilities.Round: decimalPlace parameter must be a positive number\"}\n\t}\n\n\terrorString := \"parameters too big\"\n\tnormalize := math.Pow10(decimalPlaces)\n\n\tif math.IsInf(normalize, 0) {\n\t\treturn normalize, &RoundError{Err: errorString}\n\t}\n\tnumberToRound := number * normalize\n\n\tif math.IsInf(numberToRound, 0) {\n\t\treturn numberToRound, &RoundError{Err: errorString}\n\t}\n\n\treturn math.Round(numberToRound) / normalize, nil\n}", "title": "" }, { "docid": "7c9489efae97b6ca1cc0ed750d2a5fa9", "score": "0.56468284", "text": "func RoundN(x float64, y int) float64 {\n\treturn math.Round(x*math.Pow10(y)) / math.Pow10(y)\n}", "title": "" }, { "docid": "10c8661f2a2c711572d500d1658c73ff", "score": "0.5643689", "text": "func round(d time.Duration) time.Duration {\n\tfor i, unit := range durations {\n\t\tif d >= unit && i < len(durations)-1 {\n\t\t\treturn d.Round(durations[i+1])\n\t\t}\n\t}\n\treturn d\n}", "title": "" }, { "docid": "28144269f20b5b2a1c033cbcfacda87e", "score": "0.5595241", "text": "func (v Vector[T]) Round() Vector[T] {\n\treturn New(\n\t\tT(math.Round(float64(v.x))),\n\t\tT(math.Round(float64(v.y))),\n\t\tT(math.Round(float64(v.z))),\n\t\tT(math.Round(float64(v.w))),\n\t)\n}", "title": "" }, { "docid": "e6d62b8614aff9521acdd39f8db6901f", "score": "0.55530006", "text": "func TimeOfRound(period time.Duration, genesis int64, round uint64) int64 {\n\tif round == 0 {\n\t\treturn genesis\n\t}\n\t// - 1 because genesis time is for 1st round already\n\treturn genesis + int64((round-1)*uint64(period.Seconds()))\n}", "title": "" }, { "docid": "1724751b092d240e1a9d304b9e59c59c", "score": "0.5538468", "text": "func lround(a float64) int64 {\n\tif a < 0 {\n\t\treturn int64(math.Ceil(a - 0.5))\n\t}\n\n\treturn int64(math.Floor(a + 0.5))\n}", "title": "" }, { "docid": "ed4f29adaf081abaacd212fad77afd36", "score": "0.5510157", "text": "func (v *Vec4) SetRound() {\n\tv.X = Round(v.X)\n\tv.Y = Round(v.Y)\n\tv.Z = Round(v.Z)\n\tv.W = Round(v.W)\n}", "title": "" }, { "docid": "898a04af4e472faf30e8880addafac55", "score": "0.5438869", "text": "func RoundNearest(x, unit float64) float64 {\n\treturn math.Round(x/unit) * unit\n}", "title": "" }, { "docid": "6b4b2f664d3e7a810f0cc7f5116d897a", "score": "0.54314244", "text": "func roundTime(d, r time.Duration) time.Duration {\n\tif r <= 0 {\n\t\treturn d\n\t}\n\tneg := d < 0\n\tif neg {\n\t\td = -d\n\t}\n\tif m := d % r; m+m < r {\n\t\td = d - m\n\t} else {\n\t\td = d + r - m\n\t}\n\tif neg {\n\t\treturn -d\n\t}\n\treturn d\n}", "title": "" }, { "docid": "4ae0ca6d5de9793921d9c555dec4d065", "score": "0.5404627", "text": "func withRound(vote *types.Vote, round int) *types.Vote {\n\tvote = vote.Copy()\n\tvote.Round = round\n\treturn vote\n}", "title": "" }, { "docid": "a67db14e6d675710f8c43de732cab535", "score": "0.54042125", "text": "func (r Rounder) Round(c *Context, d, x *Decimal, disableIfPrecisionZero bool) Condition {\n\td.Set(x)\n\tnd := x.NumDigits()\n\txs := x.Sign()\n\tvar res Condition\n\n\tif disableIfPrecisionZero && c.Precision == 0 {\n\t\t// Rounding has been disabled.\n\t\treturn d.setExponent(c, nd, res, int64(d.Exponent))\n\t}\n\n\t// adj is the adjusted exponent: exponent + clength - 1\n\tif adj := int64(x.Exponent) + nd - 1; xs != 0 && adj < int64(c.MinExponent) {\n\t\t// Subnormal is defined before rounding.\n\t\tres |= Subnormal\n\t\t// setExponent here to prevent double-rounded subnormals.\n\t\tres |= d.setExponent(c, nd, res, int64(d.Exponent))\n\t\treturn res\n\t}\n\n\tdiff := nd - int64(c.Precision)\n\tif diff > 0 {\n\t\tif diff > MaxExponent {\n\t\t\treturn SystemOverflow | Overflow\n\t\t}\n\t\tif diff < MinExponent {\n\t\t\treturn SystemUnderflow | Underflow\n\t\t}\n\t\tres |= Rounded\n\t\tvar y, m BigInt\n\t\te := tableExp10(diff, &y)\n\t\ty.QuoRem(&d.Coeff, e, &m)\n\t\tif m.Sign() != 0 {\n\t\t\tres |= Inexact\n\t\t\tvar discard Decimal\n\t\t\tdiscard.Coeff.Set(&m)\n\t\t\tdiscard.Exponent = int32(-diff)\n\t\t\tif r.ShouldAddOne(&y, x.Negative, discard.Cmp(decimalHalf)) {\n\t\t\t\troundAddOne(&y, &diff)\n\t\t\t}\n\t\t}\n\t\td.Coeff.Set(&y)\n\t\t// The coefficient changed, so recompute num digits in setExponent.\n\t\tnd = unknownNumDigits\n\t} else {\n\t\tdiff = 0\n\t}\n\tres |= d.setExponent(c, nd, res, int64(d.Exponent), diff)\n\treturn res\n}", "title": "" }, { "docid": "2f3e2bfd37868daac3c8c5d14bb9b2af", "score": "0.54002964", "text": "func RoundInt(f float64) int {\n\treturn int(Round(f))\n}", "title": "" }, { "docid": "a4183c35fab94a011e9410c85062463f", "score": "0.53966516", "text": "func roundFloat(x float64, decimals int) float64 {\n\t// return roundFloat(x, numDig(x)+decimals)\n\tfrep := strconv.FormatFloat(x, 'f', decimals, 64)\n\tf, _ := strconv.ParseFloat(frep, 64)\n\treturn f\n}", "title": "" }, { "docid": "45d9865182aee7411dc893cbc78a1655", "score": "0.5391978", "text": "func UpdateRound(bus wire.EventPublisher, round uint64) {\n\tb := make([]byte, 8)\n\tbinary.LittleEndian.PutUint64(b, round)\n\tbus.Publish(msg.RoundUpdateTopic, bytes.NewBuffer(b))\n}", "title": "" }, { "docid": "49d65b7bfe10543066fa7f5849db6783", "score": "0.5381024", "text": "func roundTime(t time.Duration) time.Duration {\n\tif t < time.Millisecond {\n\t\t// Precise at 1ns.\n\t\treturn t\n\t}\n\tif t < time.Second {\n\t\t// Precise at 1µs.\n\t\treturn (t + time.Microsecond/2) / time.Microsecond * time.Microsecond\n\t}\n\t// Round at 1ms\n\treturn (t + time.Millisecond/2) / time.Millisecond * time.Millisecond\n}", "title": "" }, { "docid": "f1ace19bc23b878b7080fec2560692ee", "score": "0.53457767", "text": "func (o *observer) RoundTick() {\n\to.round++\n}", "title": "" }, { "docid": "ea55dcef4ae24254fc2ae050ebb9dfe4", "score": "0.5334038", "text": "func RoundPrecision(f float64, precision int) float64 {\n\tshift := math.Pow10(precision)\n\treturn Round(f*shift) / shift\n}", "title": "" }, { "docid": "0a7a03c8b5a75c4a1820b82f2de9ddf8", "score": "0.5325208", "text": "func (o TableFieldSchemaOutput) RoundingMode() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v TableFieldSchema) *string { return v.RoundingMode }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "11bab168db89a2d055fe9b6f58f88861", "score": "0.5299545", "text": "func RoundNea(val, nea float64) float64 {\n\ta := val / nea\n\tb := float64(Round(a))\n\treturn nea * b\n}", "title": "" }, { "docid": "445ab48e82e27efb6725faa84c34f3e6", "score": "0.52834237", "text": "func (o TableFieldSchemaResponseOutput) RoundingMode() pulumi.StringOutput {\n\treturn o.ApplyT(func(v TableFieldSchemaResponse) string { return v.RoundingMode }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "5c6a59473f0a6d3be54c22a048f8d712", "score": "0.5282605", "text": "func (v Vec4) Round() Vec4 {\n\treturn Vec4{Round(v.X), Round(v.Y), Round(v.Z), Round(v.W)}\n}", "title": "" } ]
e26f416e66dc3a72560f27b51b5bbb4c
SetContext adds the context to the get Id4n params
[ { "docid": "3e865c96a32fffa67656cd2ccef186ae", "score": "0.7553849", "text": "func (o *GETID4NParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" } ]
[ { "docid": "3bb9a192f28c07c90796a98a2feb0e4c", "score": "0.7256765", "text": "func (o *GETID4NParams) WithContext(ctx context.Context) *GETID4NParams {\n\to.SetContext(ctx)\n\treturn o\n}", "title": "" }, { "docid": "bf73743018642b252e5d92ecc98e792e", "score": "0.6430246", "text": "func (o *GetPoliciesUsingGET4Params) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "f2dccb9a7d4d8b224391b36558afb678", "score": "0.63899755", "text": "func (o *SalesRuleRuleRepositoryV1GetByIDGetParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "b843ef2a231b7a62a83505cbf04743b0", "score": "0.62056524", "text": "func (o *ValidateIntegrationIDUsingGETParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "dbe63307daf02d5512e918fb69f293b8", "score": "0.61482954", "text": "func (o *GetSoftwareProfileByIDParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "4b183c539412c3b094497afac2095bff", "score": "0.61451346", "text": "func (o *GetProductsByIDVariationAttributesByIDValuesByIDParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "b5bdf5f1ba538e02bd97260b7feadc61", "score": "0.61399186", "text": "func (o *GetImageFromDefaultByIDParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "7336ed32874f60ae23d9f79fafadc604", "score": "0.60852706", "text": "func (o *GetProductsByIDProductOptionsByIDValuesByIDParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "1926338601faa3872abca5def449fdb5", "score": "0.60389614", "text": "func (o *GetProductsByIDAvailabilityParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "20fee718857f87b99afd80503f1d94d9", "score": "0.6031891", "text": "func (o *GetCwfNetworkIDHaPairsHaPairIDParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "4d1f2970d892fe56e5ce2955c6ec674d", "score": "0.6026262", "text": "func (o *NewIvrRecordingParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "7b5a492ebe07590b3996e88153c5539a", "score": "0.60083", "text": "func (o *GetWifiNetworkIDGatewaysGatewayIDNameParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "bdb46fd0ebc409e4b27f56575e80d8e2", "score": "0.5989447", "text": "func (o *GetCompatablityMatrixUsingGETParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "0521fd7a00eb19b114689931544f08f5", "score": "0.59848017", "text": "func (o *GetDatabaseCredentialsDatabaseCredentialIDOperationsParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "557095dbaf52656d007feac5dc0d7d93", "score": "0.59567", "text": "func (o *FetchAndParseSamlIdpMetadataParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "fb1281313f50a1cf6d22c4af9d8379b3", "score": "0.5916352", "text": "func (o *MeasurementsUsingGETParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "df02c42dc33a2e48a40925528f0e8fd6", "score": "0.5895565", "text": "func (o *GetDocumentDocumentIDDownloadParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "1f40551ce6b68995bb7c68a8440dcd0f", "score": "0.5891563", "text": "func (o *PutRecorderIDParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "06f1bb1e7764749c2b8c527b3ba7913d", "score": "0.5884885", "text": "func (o *GetKeysKeyIDParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "c4fef7e6a73ea7db56a66dfc7ad00d7c", "score": "0.587", "text": "func (o *GetRDADataParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "92e160d3b2f40553ec19c9830f8c2af3", "score": "0.5855609", "text": "func (o *PutMicroservicesIDParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "3b679b8bba64fd92879c1a808fd15c4d", "score": "0.5840013", "text": "func (o *PutIPLoadbalancingServiceNameHTTPRouteRouteIDRuleRuleIDParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "ea1b4b74538aae465894c47ace22fca5", "score": "0.5836856", "text": "func (o *GetClustersUUIDParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "de95ff555e79a22194356d1422ff5df7", "score": "0.5818967", "text": "func (o *RechargeTransactionsByTransactionIDGetParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "a51c34b501487c547218e07f2423b747", "score": "0.5808492", "text": "func (o *GetOrderMetafieldsByOrderIDParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "f71a166916146a7919b925c3bce453aa", "score": "0.5808382", "text": "func (o *GetAutoscalingAPIGroupParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "82a000aeea014c6a3eb1e35bf84ae689", "score": "0.5802599", "text": "func (o *GetPortingParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "ccfb7605fd6a2c5a376c289fb0a21138", "score": "0.5797215", "text": "func (o *GetIPAMDNSRecordsParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "6bc5ea5558c5a21a9c3230a555e3463a", "score": "0.5788809", "text": "func (o *SMSReceiptsByMessageIDGetParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "0afeeddc717c883f6191afd56f2c5cc6", "score": "0.5781362", "text": "func (o *GetClustersUUIDCloudCredentialsCloudTypeCloudCredentialsUUIDParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "4e625a49d9fc3f13447fd8b3ce50a7eb", "score": "0.5775171", "text": "func (o *StopPointGetCarParksByIDParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "e38f5f84c8103556b6718ade21f20684", "score": "0.5766031", "text": "func (o *GetCustomersByIDPaymentInstrumentsParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "4b0e887f124fabc58e363fe02ac6582b", "score": "0.57655704", "text": "func (o *GetIPPoolsCredentialIDParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "28089915f903d632a2c176619496481d", "score": "0.57627094", "text": "func (o *GetServerParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "7d4d6f640541ce90b5dc7fe4fd4b86e6", "score": "0.5760207", "text": "func (o *UpdateSDTByIDParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "5da8e0cf8be7d4f868fcd74559c5445a", "score": "0.5734802", "text": "func (o *GetCustomersCustomerFidInvoicesInvoiceFidParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "ffc232439c87376ca8c0a7298dbde3ae", "score": "0.57309306", "text": "func (o *GetUsersUserIDAcesParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "44248058fa509da14269f7e8aae1e1f6", "score": "0.5724301", "text": "func (o *GetNetworkSmUserSoftwaresParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "a14bf5146579717beea3f133c49bf80c", "score": "0.5722292", "text": "func (o *AntiRansomwareSuspectCollectionGetParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "7f66fb72f194eff70e0db5774f0c35bb", "score": "0.5714653", "text": "func (o *GetAnomalyDetectionDatabaseServicesParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "06fcf37d88b8ab281fe70939b8318168", "score": "0.57077855", "text": "func (o *GetParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "7bff1716b49af791da7c7ed62f57bd19", "score": "0.57069045", "text": "func (o *PutRecordsIDParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "1b03ef878cffb2e2c3ca7eecaba18e26", "score": "0.56967056", "text": "func (o *GetRestapiV10AccountAccountIDExtensionExtensionIDGreetingGreetingIDParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "556ff10251998b7bd248cad7173184bd", "score": "0.5693879", "text": "func (o *ReadDynamicScanRequestOfProjectVersionParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "0f06a87615a8f3949764e98e13a8a188", "score": "0.56782424", "text": "func (o *GetRestapiV10SubscriptionSubscriptionIDParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "fbd1668c3419d162d5f76e2843eab179", "score": "0.5673982", "text": "func (o *GetVCenterUsingGET1Params) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "698d4fe03216c398e15e787b8f8cc458", "score": "0.56666076", "text": "func orderIDCtx(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\toid := chi.URLParam(r, \"oid\")\n\t\tctx := context.WithValue(r.Context(), ctxOID, oid)\n\t\tnext.ServeHTTP(w, r.WithContext(ctx))\n\t})\n}", "title": "" }, { "docid": "bf9e6ba283e3aca69029fcdee86ad6d3", "score": "0.5659378", "text": "func (o *GetNmsAccountLoginUbiquitiParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "6dccbae6b11b0c5c940a7a399e911c0e", "score": "0.5659285", "text": "func (o *NetworkIPRoutesGetParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "01b6ca6c1da08384b3c29c5db5e11a92", "score": "0.56503665", "text": "func (o *PutLTENetworkIDGatewaysGatewayIDVpnParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "9a04c800693530501a9a880028348e47", "score": "0.5648519", "text": "func (o *NegotiableQuoteAttachmentContentManagementV1GetGetParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "0dde84b0668408a11cf01a4bc38b7907", "score": "0.5647349", "text": "func (o *GetPoliciesUsingGETParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "609de05bd24578d9cd33fcabbed42973", "score": "0.5642452", "text": "func (o *GetServerToSegmentsMapDeprecated1Params) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "94bb96e2014b2b74f87d9933d2965953", "score": "0.5638716", "text": "func (o *SpecificAllowedEmailAddressGetParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "cf3edf98184823d1d9d0afc1a1f332ea", "score": "0.5629053", "text": "func (o *GetExecutionByNameAndIndexUsingGETParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "b6eb24d9f0e9766c09cc183324693ba1", "score": "0.5627864", "text": "func (o *GetTerraformConfigurationSourcesUsingGETParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "f07d65729c41b7587c7545c309a0f147", "score": "0.5627567", "text": "func (o *PutCredentialRotationsRotationIDParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "8cadcae642afdfd1de5c87bf7b97dd19", "score": "0.5620996", "text": "func (o *DeleteCwfNetworkIDHaPairsHaPairIDParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "231ac385fb678147dfabd70c45487b4a", "score": "0.5619032", "text": "func (o *GetCartsUsingGETParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "43196f9841dbcb8de0b628c9c8a63f6f", "score": "0.56187856", "text": "func (o *DeleteIpmioverlanPoliciesMoidParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "9c62a6ebeed5c707969b8a1e19870d54", "score": "0.5605479", "text": "func (o *AdminRetrievePlayerRecordsParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "f5c3bea7a7307709cacd24b1eb6703d7", "score": "0.5604672", "text": "func (o *SensorsCollectionGetParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "d7a7809041d47e7c982dca6e554fc191", "score": "0.5603394", "text": "func (o *ContractrulesByRuleIDIntervalsGetParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "cfc0d6f7aa83bd85c6e39c258b67ec48", "score": "0.560125", "text": "func (o *GetCameraIndexSnapshotParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "d92b3fdb120a4273611976a6310b247e", "score": "0.5600546", "text": "func (o *RetrieveSinglePolicyVersionParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "5aaa29b48935717bcba0c49534af0866", "score": "0.5599368", "text": "func (o *GetTopologyParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "2a208d24f48c3596678c8126115d6e22", "score": "0.5598599", "text": "func (o *GetUsageParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "a8e71ac6edcfb3e14a07959e1c6bf000", "score": "0.5598553", "text": "func (o *GetWopiDocumentParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "d19a46e0745880aff390e47535b0758e", "score": "0.5598261", "text": "func (o *GetPoliciesUsingGET4Params) WithContext(ctx context.Context) *GetPoliciesUsingGET4Params {\n\to.SetContext(ctx)\n\treturn o\n}", "title": "" }, { "docid": "9d119c193e6641a9d49d79293e8ac79a", "score": "0.5597558", "text": "func (o *GetGrantsParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "54cf2f8037a0a1164b9f7ac76a2dc5f1", "score": "0.5596564", "text": "func (o *ModeArrivalsParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "e1bbc8b79bdf53b457d36e7d55fb1721", "score": "0.5589686", "text": "func (o *PutCwfNetworkIDNameParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "9cf2ab107d01fdaef84a6b4ef5aefe23", "score": "0.5587225", "text": "func (o *GetTimeTrackingEntityParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "265bd387db0591d29459eb2b0d4e8788", "score": "0.5584262", "text": "func (o *GetTenantsUsingGETParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "8e752b0bc1aef711ced7d06b87ec5e91", "score": "0.5583224", "text": "func (o *GetConnectionsParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "5a371f42fa800840a2da27e989afbbd3", "score": "0.558045", "text": "func (o *GetReferenceEntitiesParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "4a2aa96ed5a1965d3da98ec6341de1d8", "score": "0.5579758", "text": "func (o *GetDCForProviderParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "4aeeb59f9e0ac2cc9127e16f966cb6ac", "score": "0.5577878", "text": "func (o *GetNetworkVlansParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "857ad3da954c3544dc09c97756661748", "score": "0.5571742", "text": "func (o *GetOnboardingSpacesParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "afe66f67b4792a5ed6ee296e1102abd1", "score": "0.55699354", "text": "func (o *GetRegionsByCredentialAndWorkspaceParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "00bad52fd71acf263135c2a33b70cc22", "score": "0.5566295", "text": "func (o *ListProtectedEntitiesParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "186fbbdc72ba11623e4a98a3e6aa3866", "score": "0.5563502", "text": "func (o *GetDeviceInstanceGraphDataOnlyByInstanceIDParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "55c5f7bbb069446a33402c985063bfd9", "score": "0.55607855", "text": "func (o *GetUserGetSpacesParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "c6be3af6d7b04b8a896f3e0edbd2efbc", "score": "0.5560002", "text": "func (o *GetPublicAccountInfoParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "36202dc87ce35fdbc713c8afa0db6f20", "score": "0.5557754", "text": "func (o *ListPacketGeneratorsParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "3bf848e6a3e40c1cf64d7fa79ac4da71", "score": "0.5557157", "text": "func (o *ConfigurableProductOptionRepositoryV1GetListGetParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "e8f00f0984a39b3251478e78a1a9d094", "score": "0.55538815", "text": "func (o *GetVlansParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "193ef4f49905371fb927d190e318144e", "score": "0.5552667", "text": "func (o *UpdateCollectorGroupByIDParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "e1975dce2f34f30b2f3842c1b294c829", "score": "0.5551387", "text": "func (o *GetAuthenticationParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "6d58779c8a2199928827e8b484d7208a", "score": "0.555028", "text": "func (o *UpdateGroupByIDUsingPATCHParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "3c45216fe63099c83f5a7281edcb14bf", "score": "0.55459136", "text": "func (o *GetRuntimeServerParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "9bd8a9e73c0b52ae85b9424e2dae12ef", "score": "0.5544672", "text": "func NewGETID4NParamsWithContext(ctx context.Context) *GETID4NParams {\n\tvar ()\n\treturn &GETID4NParams{\n\n\t\tContext: ctx,\n\t}\n}", "title": "" }, { "docid": "97015e9e0fc28e3935bf3b822f271d53", "score": "0.5544252", "text": "func (o *VscanOnAccessPolicyCollectionGetParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "d50f4c5eb6c03b276e9b0c0842471fc1", "score": "0.554323", "text": "func (o *GetOrgRobotsParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "a4f72f5087814bcbe6d7fb2e06e2ec90", "score": "0.5539082", "text": "func (o *GetOracleParametersParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "a4fac5db4cc71ee7389365f743fbe3bf", "score": "0.55372274", "text": "func (o *APIKeyNewParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "cda46439300c0d45fb72d7a83a82e3c0", "score": "0.5536916", "text": "func (o *GetHeaderByHashParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "cad9c955e1ae9be848f185648bddac8a", "score": "0.553199", "text": "func (o *GetSharedDomainsParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "70e30c35acd36c439c7ee6b42a8a19de", "score": "0.5529945", "text": "func (o *DeleteProvidersLocalByIDParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" }, { "docid": "832620fa4e724b5c128652e2d6a60c83", "score": "0.5528623", "text": "func (o *ExtendOutputPortTransactionTTLParams) SetContext(ctx context.Context) {\n\to.Context = ctx\n}", "title": "" } ]
5059be7befdb868e22a11ce2523ba302
IsShareHolders returns true if there is shareHolders, false otherwise
[ { "docid": "3325dc8d75d5bfded0b7b376ff4ec8f7", "score": "0.8559687", "text": "func (obj *section) IsShareHolders() bool {\n\treturn obj.holders != nil\n}", "title": "" } ]
[ { "docid": "42bb045eabb29fac3bcbaf251cb35ee2", "score": "0.6718412", "text": "func (o *RemoteItem) HasShared() bool {\n\tif o != nil && o.Shared != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "b109568a026677729eb6aadcfab7fb89", "score": "0.6634848", "text": "func (o *DashboardMetadata) HasShared() bool {\n\tif o != nil && o.Shared != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "87661bfa1fd250f8b084ffd0b1d6ffd8", "score": "0.64545375", "text": "func (d *CatalogServicesQuery) CanShare() bool {\n\treturn true\n}", "title": "" }, { "docid": "e430062e03ad38418c2cc68dc7d52edb", "score": "0.63706946", "text": "func (n IpcMode) IsShareable() bool {\n\treturn n == shareableType\n}", "title": "" }, { "docid": "dd39fd46a3b2121f84d58ebe417102af", "score": "0.63559186", "text": "func (obj *section) ShareHolders() shareholders.ShareHolders {\n\treturn obj.holders\n}", "title": "" }, { "docid": "f87a03dac3d592f8c420b01ad1a2790d", "score": "0.6341778", "text": "func (o *StoragePureArrayUtilizationAllOf) HasShared() bool {\n\tif o != nil && o.Shared != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "e057f5c846f3aa6965491e2c3a7612e5", "score": "0.63364136", "text": "func (o *DashboardMetadata) HasSharingDetails() bool {\n\tif o != nil && o.SharingDetails != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "1ce0539b77f1e065767edaa729a5de44", "score": "0.6321844", "text": "func (m Allocation) HasShares() bool {\n\treturn m.Has(tag.Shares)\n}", "title": "" }, { "docid": "504a7d527566086d97fbb1b11414847d", "score": "0.62589633", "text": "func (o *DriveItem) HasShared() bool {\n\tif o != nil && o.Shared != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "556eb68e0192fd7639dfd1f0590d2027", "score": "0.6245611", "text": "func (ho HarborObject) IsSharedAndInSharedTime() bool {\n\n\t// 对象是否是分享的\n\tif !ho.IsShared {\n\t\treturn false\n\t}\n\n\t// 是否有分享时间限制\n\tif !ho.IsSharedLimit {\n\t\treturn true\n\t}\n\n\t// 检查是否已过共享终止时间\n\tif ho.IsNowAfterSharedEndTime() {\n\t\treturn false\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "0f92e06a75cf7e98d18754166f8aef7e", "score": "0.624205", "text": "func (m NoAllocs) HasAllocShares() bool {\n\treturn m.Has(tag.AllocShares)\n}", "title": "" }, { "docid": "3b6a5be08cba8fb1558b09046495a2b2", "score": "0.6083222", "text": "func (o *DriveItem) HasSharepointIds() bool {\n\tif o != nil && o.SharepointIds != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "d9b17100c04edd1d8a0eb453db556c31", "score": "0.60799634", "text": "func (c *Context) IsExternalShare() (r bool) {\n\treturn len(c.RootHash) > 0\n}", "title": "" }, { "docid": "03fd5761fea7584bb69a6d340d0afd8f", "score": "0.5958678", "text": "func (o *MicrosoftGraphCalendar) HasCanShare() bool {\n\tif o != nil && o.CanShare != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "f0043de6e22729067b62c1c5a9db3e59", "score": "0.59262526", "text": "func (o *OrganizationAttributes) HasSharing() bool {\n\tif o != nil && o.Sharing != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "d5bbbec852fe93c0dfaceae735b9486d", "score": "0.58927494", "text": "func (catalog Catalog) IsShared(useTenantContext bool) (bool, error) {\n\tsettings, err := catalog.GetAccessControl(useTenantContext)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\tif settings.IsSharedToEveryone {\n\t\treturn true, nil\n\t}\n\treturn settings.AccessSettings != nil, nil\n}", "title": "" }, { "docid": "1d5cc88664816a0c2695c32e734254a3", "score": "0.58883446", "text": "func (adminCatalog AdminCatalog) IsShared(useTenantContext bool) (bool, error) {\n\tsettings, err := adminCatalog.GetAccessControl(useTenantContext)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\tif settings.IsSharedToEveryone {\n\t\treturn true, nil\n\t}\n\treturn settings.AccessSettings != nil, nil\n}", "title": "" }, { "docid": "5c4fc82ef35cd45893d7b03ac6053c4a", "score": "0.58693814", "text": "func (vapp VApp) IsShared(useTenantContext bool) (bool, error) {\n\tsettings, err := vapp.GetAccessControl(useTenantContext)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\tif settings.IsSharedToEveryone {\n\t\treturn true, nil\n\t}\n\treturn settings.AccessSettings != nil, nil\n}", "title": "" }, { "docid": "7dab7b298cff02b2cfd516166c693edb", "score": "0.56470805", "text": "func (_Rgy *RgySession) Shareholders(arg0 *big.Int) (common.Address, error) {\n\treturn _Rgy.Contract.Shareholders(&_Rgy.CallOpts, arg0)\n}", "title": "" }, { "docid": "f135113ee604a5407c8f1805686bbc19", "score": "0.55899864", "text": "func (_Rgy *RgyCallerSession) Shareholders(arg0 *big.Int) (common.Address, error) {\n\treturn _Rgy.Contract.Shareholders(&_Rgy.CallOpts, arg0)\n}", "title": "" }, { "docid": "9ffcec722bbfd1cc4fa866017234a4fe", "score": "0.55075014", "text": "func (o *DashboardMetadata) GetShared() bool {\n\tif o == nil || o.Shared == nil {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\treturn *o.Shared\n}", "title": "" }, { "docid": "d01a29af4c4a00517517521c926ddc2d", "score": "0.54894316", "text": "func (r *Request) CheckIfShared(shared []string) bool {\n for _, v := range shared {\n if v == r.UserId {\n return true\n }\n }\n return false\n}", "title": "" }, { "docid": "a124dae3d8f659398c7626630c9f92ae", "score": "0.5486932", "text": "func IsDelegationKey(usages []string) bool {\n\treturn isUsageKey(usages, delegation)\n}", "title": "" }, { "docid": "3516fdda8906d0d8bc0566e1557dba45", "score": "0.5439472", "text": "func (_Augur *AugurCaller) IsKnownShareToken(opts *bind.CallOpts, _token common.Address) (bool, error) {\n\tvar (\n\t\tret0 = new(bool)\n\t)\n\tout := ret0\n\terr := _Augur.contract.Call(opts, out, \"isKnownShareToken\", _token)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "b1837450c26c397abb2366295c3f0be7", "score": "0.5433639", "text": "func isPublicShareArchive(r *http.Request) bool {\n\tif strings.HasPrefix(r.URL.Path, \"/archiver\") {\n\t\tif r.URL.Query().Get(headerShareToken) != \"\" || r.Header.Get(headerShareToken) != \"\" {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "2894790b6a98bfee317a27c1d67a285f", "score": "0.542724", "text": "func IsValidShare(candidate string) bool {\n\t// Set constant prime across the package\n\tprime, _ = big.NewInt(0).SetString(DefaultPrimeStr, 10)\n\n\tif len(candidate)%88 != 0 {\n\t\treturn false\n\t}\n\n\tcount := len(candidate) / 44\n\tfor j := 0; j < count; j++ {\n\t\tpart := candidate[j*44 : (j+1)*44]\n\t\tdecode := fromBase64(part)\n\t\tif decode.Cmp(big.NewInt(0)) == -1 || decode.Cmp(prime) == 1 {\n\t\t\treturn false\n\t\t}\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "606b82a28bb57474f9a64f9a3696748b", "score": "0.54035515", "text": "func isRootfsShareableMount() bool {\n\texistFunc := func(mi mount.Info) bool {\n\t\tfor _, opt := range strings.Split(mi.Optional, \" \") {\n\t\t\tif strings.HasPrefix(opt, \"shared:\") {\n\t\t\t\treturn true\n\t\t\t}\n\t\t}\n\t\treturn false\n\t}\n\n\tmi, err := mount.Lookup(\"/tmp\")\n\tif err == nil {\n\t\treturn existFunc(mi)\n\t}\n\n\tmi, err = mount.Lookup(\"/\")\n\tif err == nil {\n\t\treturn existFunc(mi)\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "edff0110933d38f34f4f53a625acf949", "score": "0.5401981", "text": "func (o *ViewLinkItem) HasProvider() bool {\n\tif o != nil && o.Provider != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "a686f00ea55aea84c9e96240797c51ff", "score": "0.5378876", "text": "func HasSweeper(name string) bool {\n\td, ok := knownLoggers[name]\n\n\treturn ok && d.Sweeper != nil\n}", "title": "" }, { "docid": "700dcd632cfdf5f0bccf41a4b5ad2f0b", "score": "0.53511316", "text": "func (s ShareItemsBtnProps) IsProps() {}", "title": "" }, { "docid": "0eee48b5881d935a2eb680c28c215291", "score": "0.5340306", "text": "func (o *ShareableReport) HasShareableReport() bool {\n\tif o != nil && o.ShareableReport != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "9cc739b313467c24bd9db7127b98539b", "score": "0.5317783", "text": "func (o *IdentityVerificationCreateRequest) GetIsShareable() bool {\n\tif o == nil {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\n\treturn o.IsShareable\n}", "title": "" }, { "docid": "ac0d1aab37beb8ba16e263f25582eae6", "score": "0.5302425", "text": "func (o *MicrosoftGraphSharedDriveItem) HasOwner() bool {\n\tif o != nil && o.Owner != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "260e1abb633ea1ff7acdaeebbb8d3a7b", "score": "0.52960473", "text": "func (sub *Subscription) HasImages() bool {\n\timages := sub.images.Get()\n\treturn len(images) > 0\n}", "title": "" }, { "docid": "f4169702903294c13281f27148f69e5f", "score": "0.5292936", "text": "func StorageFileShareExists(t *testing.T, fileSahreName string, storageAccountName string, resourceGroupName string, subscriptionID string) bool {\n\tresult, err := StorageFileShareExistsE(t, fileSahreName, storageAccountName, resourceGroupName, subscriptionID)\n\trequire.NoError(t, err)\n\n\treturn result\n}", "title": "" }, { "docid": "993635171ad8a7a0b5e440285ace8000", "score": "0.5232748", "text": "func (t PDEShareObject) IsEmpty() bool {\n\ttemp := NewPDEShareState()\n\treturn reflect.DeepEqual(temp, t.pdeShareState) || t.pdeShareState == nil\n}", "title": "" }, { "docid": "18863ce45f495022bb72cf36d88458ee", "score": "0.5231982", "text": "func (_Rgy *RgyCaller) Shareholders(opts *bind.CallOpts, arg0 *big.Int) (common.Address, error) {\n\tvar (\n\t\tret0 = new(common.Address)\n\t)\n\tout := ret0\n\terr := _Rgy.contract.Call(opts, out, \"shareholders\", arg0)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "7c1059cc8e20a858653332225bf2e2ae", "score": "0.5231079", "text": "func (f *OpenOltFlowMgr) contains(members []*openoltpb2.GroupMember, member *openoltpb2.GroupMember) bool {\n\tfor _, groupMember := range members {\n\t\tif groupMember.InterfaceId == member.InterfaceId {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "e93d57a847deb40d799273898c059a34", "score": "0.52273476", "text": "func (o *MicrosoftGraphSharedDriveItem) HasList() bool {\n\tif o != nil && o.List != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "e1f73b86bf267eed9c86950fbace4cef", "score": "0.52176934", "text": "func (_Augur *AugurCallerSession) IsKnownShareToken(_token common.Address) (bool, error) {\n\treturn _Augur.Contract.IsKnownShareToken(&_Augur.CallOpts, _token)\n}", "title": "" }, { "docid": "35019eccf158c5cce238d970e37c64cc", "score": "0.5207579", "text": "func (o *VirtualizationVmwareDatastoreAllOf) HasMultipleHostAccess() bool {\n\tif o != nil && o.MultipleHostAccess != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "cd8797af6d8e580ac2a1d33b21c83731", "score": "0.51999426", "text": "func IsStaring(ctx context.Context, userID, repoID int64) bool {\n\thas, _ := db.GetEngine(ctx).Get(&Star{UID: userID, RepoID: repoID})\n\treturn has\n}", "title": "" }, { "docid": "af4e92329fee413b666b1368948aeaf2", "score": "0.5190297", "text": "func (o *MicrosoftGraphSharedDriveItem) HasItems() bool {\n\tif o != nil && o.Items != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "a6be88fbbe3d51a5a4d9d795f599b73b", "score": "0.5187081", "text": "func HasOwner(refList []metav1.OwnerReference, apiVersion string, kinds []string) bool {\n\tkMap := make(map[string]bool)\n\tfor _, kind := range kinds {\n\t\tkMap[kind] = true\n\t}\n\n\tfor _, mr := range refList {\n\t\tif mr.APIVersion == apiVersion && kMap[mr.Kind] {\n\t\t\treturn true\n\t\t}\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "753f9159626fdfd1733594b2ecf3ca61", "score": "0.5158889", "text": "func (set RoleSet) DesktopDirectorySharing() bool {\n\tfor _, role := range set {\n\t\tif !types.BoolDefaultTrue(role.GetOptions().DesktopDirectorySharing) {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "6fcc0daf68bfd1cee218f3931b3df38a", "score": "0.5152228", "text": "func (pack *Pack) HasScripts() bool {\n\tfor _, module := range pack.manifest.Modules {\n\t\tif module.Type == \"client_data\" {\n\t\t\t// The module has the client_data type, meaning it holds client scripts.\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "61cdb0a26c80e97696bd65232d2f95cb", "score": "0.5150929", "text": "func (_Augur *AugurSession) IsKnownShareToken(_token common.Address) (bool, error) {\n\treturn _Augur.Contract.IsKnownShareToken(&_Augur.CallOpts, _token)\n}", "title": "" }, { "docid": "7c738630d075d6717c5a8eec2aa52a98", "score": "0.51505315", "text": "func (configManager *interpreterConfigManager) HasSynced() bool {\n\tif configManager.initialSynced.Load() {\n\t\treturn true\n\t}\n\n\tif configuration, err := configManager.lister.List(labels.Everything()); err == nil && len(configuration) == 0 {\n\t\t// the empty list we initially stored is valid to use.\n\t\t// Setting initialSynced to true, so subsequent checks\n\t\t// would be able to take the fast path on the atomic boolean in a\n\t\t// cluster without any customization configured.\n\t\tconfigManager.initialSynced.Store(true)\n\t\t// the informer has synced, and we don't have any items\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "7f0b1f05ff76b2af14b89eb5fa898e00", "score": "0.51476824", "text": "func (pt ProvidedType) IsProvider() bool {\n\treturn pt.p != nil\n}", "title": "" }, { "docid": "f5f859f67f350266df0c73018d7385d5", "score": "0.5136503", "text": "func (o *Dataset) HasManagedby() bool {\n\tif o != nil && o.Managedby != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "285fae66bb5bc82c8c0fcbf67f2735f2", "score": "0.512833", "text": "func (o *PrivateFeedFiltered) HasSubmissions() bool {\n\tif o != nil && o.Submissions != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "4077d31a9d9fc6c7824d784178c7af52", "score": "0.511347", "text": "func (p Provider) Provides(scheme string) bool {\n\tfor _, i := range p.Schemes {\n\t\tif i == scheme {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "1e69f8b95ecbb0ae2c1cd2ba158bf8ec", "score": "0.5111544", "text": "func (f *SettingsFrame) HasDuplicates() bool {\n\tnum := f.NumSettings()\n\tif num == 0 {\n\t\treturn false\n\t}\n\t// If it's small enough (the common case), just do the n^2\n\t// thing and avoid a map allocation.\n\tif num < 10 {\n\t\tfor i := 0; i < num; i++ {\n\t\t\tidi := f.Setting(i).ID\n\t\t\tfor j := i + 1; j < num; j++ {\n\t\t\t\tidj := f.Setting(j).ID\n\t\t\t\tif idi == idj {\n\t\t\t\t\treturn true\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\treturn false\n\t}\n\tseen := map[SettingID]bool{}\n\tfor i := 0; i < num; i++ {\n\t\tid := f.Setting(i).ID\n\t\tif seen[id] {\n\t\t\treturn true\n\t\t}\n\t\tseen[id] = true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "2a2ad3efd12bb3580a5bf6a580808d0c", "score": "0.51014656", "text": "func (o *ViewLinkItem) HasIsPrivate() bool {\n\tif o != nil && o.IsPrivate != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "fef3aee12797ab7343da6a2e864f2c53", "score": "0.50959903", "text": "func IsContain(id string, addrs []string) (bool, error) {\n\treturn gWallets.isContain(id, addrs)\n}", "title": "" }, { "docid": "9d3cefe7528b125e2c8606e5c8fa1e21", "score": "0.5091908", "text": "func (o InstanceOutput) MultiShareEnabled() pulumi.BoolOutput {\n\treturn o.ApplyT(func(v *Instance) pulumi.BoolOutput { return v.MultiShareEnabled }).(pulumi.BoolOutput)\n}", "title": "" }, { "docid": "667fa965f6bee21b4430f6c28f27efbc", "score": "0.5071486", "text": "func (s *Settings) Has(name string) bool {\n\ts.lock.Lock()\n\tdefer s.lock.Unlock()\n\t_, ok := s.data[name]\n\treturn ok\n}", "title": "" }, { "docid": "7d98fbfcc7f349c7707956451c91c751", "score": "0.50710505", "text": "func ExistsForzaShare(c *gin.Context) {\n\n\tvar apiError ErrorResponse\n\n\t/*\n\t\t// falls später die userID/Rolle geprüft werden soll\n\t\tuserID, err := authentication.Authenticate(c.Request)\n\t\tif err != nil {\n\t\t\tc.JSON(http.StatusUnauthorized, authentication.ErrUnauthorized.Error())\n\t\t\treturn\n\t\t}\n\t*/\n\n\t// anonymous struct used to receive input (POST BODY)\n\tdata := struct {\n\t\tForzaSharing int32 `json:\"ForzaSharing\" binding:\"required\"`\n\t}{}\n\n\t// use 'shouldBind' so we can send customized messages\n\tif err := c.ShouldBindJSON(&data); err != nil {\n\t\tapiError.Code = InvalidJSON\n\t\tapiError.Message = apiError.String(apiError.Code)\n\t\tc.JSON(http.StatusUnprocessableEntity, apiError)\n\t\treturn\n\t}\n\n\texists, err := environment.Env.CourseModel.ForzaSharingExists(data.ForzaSharing)\n\tif err != nil {\n\t\tstatus, apiError := HandleError(err)\n\t\tc.JSON(status, apiError)\n\t\treturn\n\t}\n\n\t// wrap response into an object\n\tres := struct {\n\t\tExists bool `json:\"exists\"`\n\t}{exists}\n\n\tc.JSON(http.StatusOK, res)\n}", "title": "" }, { "docid": "b0a38c464db2759c2e61868ed014e04b", "score": "0.5065861", "text": "func (o *SmscAccount) HasMaxBinds() bool {\n\tif o != nil && o.MaxBinds != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "358095e0ded3bd8934a935c28c8c9cb2", "score": "0.50621367", "text": "func (o *DriveItem) HasThumbnails() bool {\n\tif o != nil && o.Thumbnails != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "e1e4e499c9e0ce9ca0f01c75bb8ff039", "score": "0.50615555", "text": "func (o *Pool) HasGuid() bool {\n\tif o != nil && o.Guid != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "694866208d2590ef877685474fa3ac17", "score": "0.50586474", "text": "func (m *MountHint) shouldShareMount() bool {\n\t// TODO(b/142076984): Only support tmpfs for now. Bind mounts require a\n\t// common gofer to mount all shared volumes.\n\treturn m.Mount.Type == tmpfs.Name && m.Share == pod\n}", "title": "" }, { "docid": "d19d2e3cae602713a65137876bcf65a7", "score": "0.50580394", "text": "func (o *RegionSettings) HasLinks() bool {\n\tif o != nil && o.Links != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "539ad26f83b9792a9f6c8d11d7fb01de", "score": "0.50524974", "text": "func (sb *ScBanner) Exists() bool {\n\treturn sb._exists\n}", "title": "" }, { "docid": "3922762815ab0ebe4a78e02bf39b23c6", "score": "0.5051029", "text": "func (smv *StakersMembershipValidator) IsInGroup(\n\tpublicKey *ecdsa.PublicKey,\n) bool {\n\taddress := hex.EncodeToString(\n\t\tsmv.signing.PublicKeyToAddress(*publicKey),\n\t)\n\t_, isInGroup := smv.members[address]\n\treturn isInGroup\n}", "title": "" }, { "docid": "46d020b38917f011e28cf50234b04733", "score": "0.5047986", "text": "func (o *RemoteConnections) HasRemotes() bool {\n\tif o != nil && o.Remotes != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "8d6906491819062312aad7025ffd609b", "score": "0.5043762", "text": "func (actor Actor) getAndSetSharedInformation(summary *ServiceInstanceSummary, spaceGUID string) (Warnings, error) {\n\tvar (\n\t\twarnings Warnings\n\t\terr error\n\t)\n\n\t// Part of determining if a service instance is shareable, we need to find\n\t// out if the service_instance_sharing feature flag is enabled\n\tfeatureFlags, featureFlagsWarnings, featureFlagsErr := actor.CloudControllerClient.GetConfigFeatureFlags()\n\tallWarnings := Warnings(featureFlagsWarnings)\n\tif featureFlagsErr != nil {\n\t\treturn allWarnings, featureFlagsErr\n\t}\n\n\tfor _, flag := range featureFlags {\n\t\tif flag.Name == string(constant.FeatureFlagServiceInstanceSharing) {\n\t\t\tsummary.ServiceInstanceSharingFeatureFlag = flag.Enabled\n\t\t}\n\t}\n\n\t// Service instance is shared from if:\n\t// 1. the source space of the service instance is empty (API returns json null)\n\t// 2. the targeted space is not the same as the source space of the service instance AND\n\t// we call the shared_from url and it returns a non-empty resource\n\tif summary.ServiceInstance.SpaceGUID == \"\" || summary.ServiceInstance.SpaceGUID != spaceGUID {\n\t\tsummary.ServiceInstanceSharedFrom, warnings, err = actor.GetServiceInstanceSharedFromByServiceInstance(summary.ServiceInstance.GUID)\n\t\tallWarnings = append(allWarnings, warnings...)\n\t\tif err != nil {\n\t\t\t// if the API version does not support service instance sharing, ignore the 404\n\t\t\tif _, ok := err.(ccerror.ResourceNotFoundError); !ok {\n\t\t\t\treturn allWarnings, err\n\t\t\t}\n\t\t}\n\n\t\tif summary.ServiceInstanceSharedFrom.SpaceGUID != \"\" {\n\t\t\tsummary.ServiceInstanceShareType = ServiceInstanceIsSharedFrom\n\t\t} else {\n\t\t\tsummary.ServiceInstanceShareType = ServiceInstanceIsNotShared\n\t\t}\n\n\t\treturn allWarnings, nil\n\t}\n\n\t// Service instance is shared to if:\n\t// the targeted space is the same as the source space of the service instance AND\n\t// we call the shared_to url and get a non-empty list\n\tsummary.ServiceInstanceSharedTos, warnings, err = actor.GetServiceInstanceSharedTosByServiceInstance(summary.ServiceInstance.GUID)\n\tallWarnings = append(allWarnings, warnings...)\n\tif err != nil {\n\t\t// if the API version does not support service instance sharing, ignore the 404\n\t\tif _, ok := err.(ccerror.ResourceNotFoundError); !ok {\n\t\t\treturn allWarnings, err\n\t\t}\n\t}\n\n\tif len(summary.ServiceInstanceSharedTos) > 0 {\n\t\tsummary.ServiceInstanceShareType = ServiceInstanceIsSharedTo\n\t} else {\n\t\tsummary.ServiceInstanceShareType = ServiceInstanceIsNotShared\n\t}\n\n\treturn allWarnings, nil\n}", "title": "" }, { "docid": "1e4f003f87c4559f33922a4dfe640371", "score": "0.50403595", "text": "func (o *MicrosoftGraphCalendar) GetCanShare() bool {\n\tif o == nil || o.CanShare == nil {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\treturn *o.CanShare\n}", "title": "" }, { "docid": "1493d11d188c84028a32c82d969df38a", "score": "0.5033311", "text": "func (o *Dataset) HasCopies() bool {\n\tif o != nil && o.Copies != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "4ecc4b42b9a430dd316169183c783757", "score": "0.5030672", "text": "func (db *DB) SAreMembers(bucket string, key string, items ...[]byte) (areMembers bool, err error) {\n\terr = db.Managed(bucket, false, func(shardDB *ShardDB) error {\n\t\tif _, ok := shardDB.SetIdx[bucket]; !ok {\n\t\t\treturn nutsdb.ErrBucket\n\t\t}\n\t\tareMembers, err = shardDB.SetIdx[bucket].SAreMembers(key, items...)\n\t\treturn err\n\t})\n\treturn\n}", "title": "" }, { "docid": "7af8d9a7595d29f95f6ac6d491877444", "score": "0.50296724", "text": "func (o *AppApplicationDataData) HasGslbserverList() bool {\n\tif o != nil && o.GslbserverList != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "913ec59b11ddc4665209df236b1809d4", "score": "0.50165653", "text": "func (o *ActivityActivity) HasIsPrivate() bool {\n\tif o != nil && o.IsPrivate != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "0262598ac6265496d56702067ec44d81", "score": "0.5014125", "text": "func (o SubscriptionClientScopedSubscriptionOutput) IsClientScopedSubscriptionShareable() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v SubscriptionClientScopedSubscription) *bool { return v.IsClientScopedSubscriptionShareable }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "b5bc0e14900fcd11036560adf3c456b0", "score": "0.5010406", "text": "func (info *orderInfo) sharingEqual(a, b uintptr) (bool, bool) { // (equal, seen)\n\tindexA, seenA := lookupPtr(info.orderA, a)\n\tindexB, seenB := lookupPtr(info.orderB, b)\n\tif seenA || seenB {\n\t\treturn seenA == seenB && indexA == indexB, seenA || seenB\n\t}\n\t// Neither type has been seen - add to our order slices and return.\n\tinfo.orderA = append(info.orderA, a)\n\tinfo.orderB = append(info.orderB, b)\n\treturn true, false\n}", "title": "" }, { "docid": "15a41c0b020dbbee33f592228ac377f7", "score": "0.500556", "text": "func (p *MemoryProvider) Exist(sid string) bool {\n\tp.lock.RLock()\n\tdefer p.lock.RUnlock()\n\t_, ok := p.data[sid]\n\treturn ok\n}", "title": "" }, { "docid": "3c7e21e8aa362c37338666fe08ca4efb", "score": "0.5004821", "text": "func (v *MembershipInfo) IsSetRings() bool {\n\treturn v != nil && v.Rings != nil\n}", "title": "" }, { "docid": "5bf918684589c843a45bdbef8af37a35", "score": "0.50038296", "text": "func (mds *dataStorage) IsSetup(gtx context.Context) (bool, error) {\n\treturn true, nil\n}", "title": "" }, { "docid": "0d2d6fac9b8a440d1ff57a9ba7463409", "score": "0.49975356", "text": "func (k Keeper) HasOwner(ctx sdk.Context, name string) bool {\n store := ctx.KVStore(k.ownersStoreKey)\n bz := store.Get([]byte(name))\n return bz != nil\n }", "title": "" }, { "docid": "6016390b4fd28cc6f0aa80f0a3da3170", "score": "0.49936694", "text": "func (p *Pledge_mirror) Has_host( hname *string ) ( bool ) {\n\treturn *p.qid == *hname\n}", "title": "" }, { "docid": "5bbf725d3a932fefffcd08fb9a6933c1", "score": "0.4992588", "text": "func (o *RemoteItem) HasImage() bool {\n\tif o != nil && o.Image != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "b210d44c683d7477ff39f360163161b4", "score": "0.49915943", "text": "func (s *syncDigestSet) contains(d digest.Digest) bool {\n\ts.Lock()\n\tdefer s.Unlock()\n\n\t_, ok := s.members[d]\n\n\treturn ok\n}", "title": "" }, { "docid": "9f937915cf0c2a6bd8ce3ca18aa03666", "score": "0.4990515", "text": "func IsConnectedTo(sub *Subscription, pub *Publication) bool {\n\timg := sub.images.Get()\n\tif sub.channel == pub.channel && sub.streamID == pub.streamID {\n\t\tfor _, image := range img {\n\t\t\tif image.SessionID() == pub.sessionID {\n\t\t\t\treturn true\n\t\t\t}\n\t\t}\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "d7d63f55e8b03e3d702a5c3b8bbc0638", "score": "0.4987447", "text": "func (secretcontroller *SecretController) isSynced() bool {\n\tif !secretcontroller.secretFederatedInformer.ClustersSynced() {\n\t\tglog.V(2).Infof(\"Cluster list not synced\")\n\t\treturn false\n\t}\n\tclusters, err := secretcontroller.secretFederatedInformer.GetReadyClusters()\n\tif err != nil {\n\t\tglog.Errorf(\"Failed to get ready clusters: %v\", err)\n\t\treturn false\n\t}\n\tif !secretcontroller.secretFederatedInformer.GetTargetStore().ClustersSynced(clusters) {\n\t\treturn false\n\t}\n\treturn true\n}", "title": "" }, { "docid": "90fda8066e973ba44e98550e253393fb", "score": "0.49860618", "text": "func (o *DashboardMetadata) HasOwner() bool {\n\tif o != nil && o.Owner != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "ae10b4098b088f7ad1a0f9e64d83a73d", "score": "0.498148", "text": "func SecretBindingIsSame(this []SecretBinding, other []SecretBinding) bool {\n\tif len(this) != len(other) {\n\t\treturn false\n\t}\n\n\tif len(this) > 0 {\n\t\tfor _, thisSB := range this {\n\t\t\tfound := false\n\t\t\tfor _, otherSB := range other {\n\t\t\t\tif thisSB.IsSame(otherSB) {\n\t\t\t\t\tfound = true\n\t\t\t\t}\n\t\t\t}\n\t\t\tif !found {\n\t\t\t\treturn false\n\t\t\t}\n\t\t}\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "5b165accc8216f8b58ce510b7eef4f3b", "score": "0.49752453", "text": "func IsStaring(userID, repoID int64) bool {\n\treturn isStaring(x, userID, repoID)\n}", "title": "" }, { "docid": "f85de1bc0f219133b5050219abcfd44c", "score": "0.4973382", "text": "func (m *MapChunkStore) Has(ctx context.Context, ref Address) bool {\n\tm.mu.RLock()\n\tdefer m.mu.RUnlock()\n\n\t_, has := m.chunks[ref.Hex()]\n\treturn has\n}", "title": "" }, { "docid": "2facf8a7f9e9d62a00e17f8ec8a85ad1", "score": "0.49733034", "text": "func (ipsMgr *IpsetManager) exists(listName string, setName string, kind string) bool {\n\tm := ipsMgr.setMap\n\tif kind == util.IpsetSetListFlag {\n\t\tm = ipsMgr.listMap\n\t}\n\n\tif _, exists := m[listName]; !exists {\n\t\treturn false\n\t}\n\n\tif _, exists := m[listName].elements[setName]; !exists {\n\t\treturn false\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "2b87057518b6c4bb38ba5d11761209b6", "score": "0.4972569", "text": "func (smap *syncedMap) Has(key interface{}) bool {\n\t_, ok := smap.Get(key)\n\treturn ok\n}", "title": "" }, { "docid": "7e69a7b3a1a207a33bbd6db3e3ce0a44", "score": "0.49713665", "text": "func (box *BigIp) existsPool(item string) bool {\n for _, b := range box.Pools {\n if b.Name == item {\n return true\n }\n }\n return false\n}", "title": "" }, { "docid": "2e7c6f44e03377a275b69ce58692594e", "score": "0.49710965", "text": "func (gb *GraphBuilder) IsSynced(logger klog.Logger) bool {\n\tgb.monitorLock.Lock()\n\tdefer gb.monitorLock.Unlock()\n\n\tif len(gb.monitors) == 0 {\n\t\tlogger.V(4).Info(\"garbage controller monitor not synced: no monitors\")\n\t\treturn false\n\t}\n\n\tfor resource, monitor := range gb.monitors {\n\t\tif !monitor.controller.HasSynced() {\n\t\t\tlogger.V(4).Info(\"garbage controller monitor not yet synced\", \"resource\", resource)\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "5b9e74c57ba10bbeabab3574acfe2036", "score": "0.49629596", "text": "func (o SubscriptionClientScopedSubscriptionPtrOutput) IsClientScopedSubscriptionShareable() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *SubscriptionClientScopedSubscription) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.IsClientScopedSubscriptionShareable\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "39b5226614d441658b35b17b87ddd910", "score": "0.49559724", "text": "func (t *managedMap) Has(key interface{}) bool {\n t.lock.RLock()\n defer t.lock.RUnlock()\n // Panic if managedMap is closed\n t.closed()\n value, has := t.m[key]\n if !has {\n return false\n }\n // The techinally has the item but item may be in the process of being\n // delete so we have to check if it is waiting to be deleted\n accesses := atomic.LoadUint64(&value.accessRemaining)\n return access != 0\n}", "title": "" }, { "docid": "1524e7207fe2ae5e61218770bf34e20c", "score": "0.49557132", "text": "func botContainsDims(b *swarming.SwarmingRpcsBotInfo, dims strpair.Map) bool {\n\tbdm := strpair.Map{}\n\tfor _, bds := range b.Dimensions {\n\t\tbdm[bds.Key] = bds.Value\n\t}\n\tfor key, values := range dims {\n\t\tfor _, value := range values {\n\t\t\tif !bdm.Contains(key, value) {\n\t\t\t\treturn false\n\t\t\t}\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "3a2f77db7d5f386ad10bfdbe2eef1a09", "score": "0.495387", "text": "func (wm *WsubModule) Exists() bool {\n\treturn wm._exists\n}", "title": "" }, { "docid": "f73274a2fad5e4c8fda5e30dc7cb8974", "score": "0.49531078", "text": "func isOwnedByTestingdock(labels map[string]string) bool {\n\tfor key, value := range labels {\n\t\tif fmt.Sprintf(\"%s=%s\", key, value) == \"owner=testingdock\" {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "ea65a050c5d39af81cf8b353e8a585d2", "score": "0.49513113", "text": "func (d *Dao) IsFavedsCache(c context.Context, tp int8, mid int64, oids []int64) (favoreds map[int64]bool, err error) {\n\tvar (\n\t\tkey = relationOidsKey(tp, mid)\n\t\tconn = d.redis.Get(c)\n\t)\n\tdefer conn.Close()\n\tfor _, oid := range oids {\n\t\tif err = conn.Send(\"SISMEMBER\", key, oid); err != nil {\n\t\t\tlog.Error(\"conn.Send(SISMEMBER %s,%d) error(%v)\", key, oid, err)\n\t\t\treturn\n\t\t}\n\t}\n\tif err = conn.Flush(); err != nil {\n\t\tlog.Error(\"conn.Flush() error(%v)\", err)\n\t\treturn\n\t}\n\tfavoreds = make(map[int64]bool, len(oids))\n\tfor _, oid := range oids {\n\t\tfaved, err := redis.Bool(conn.Receive())\n\t\tif err != nil {\n\t\t\tlog.Error(\"conn.Receive() error(%v)\", err)\n\t\t\tcontinue\n\t\t}\n\t\tfavoreds[oid] = faved\n\t}\n\treturn\n}", "title": "" }, { "docid": "dc5045e41e88c15ac745e48b56969331", "score": "0.49483335", "text": "func (w *ObjectStatusReporter) HasSynced() bool {\n\tw.lock.Lock()\n\tdefer w.lock.Unlock()\n\n\tif w.stopped || !w.started {\n\t\treturn false\n\t}\n\n\tpending := make([]GroupKindNamespace, 0, len(w.informerRefs))\n\tfor gke, informer := range w.informerRefs {\n\t\tif informer.HasStarted() && !informer.HasSynced() {\n\t\t\tpending = append(pending, gke)\n\t\t}\n\t}\n\tif len(pending) > 0 {\n\t\tklog.V(5).Infof(\"Informers pending synchronization: %v\", pending)\n\t\treturn false\n\t}\n\treturn true\n}", "title": "" }, { "docid": "3d2198193c5f974c426143c7ea6dc99a", "score": "0.49419737", "text": "func (m IOI) HasSpread() bool {\n\treturn m.Has(tag.Spread)\n}", "title": "" }, { "docid": "f49b9bb02c733ef4a0233e2adcd16c3b", "score": "0.49380255", "text": "func HasMultiplePackages(pks []*BasicQualifier) bool {\n\tpaths := make([]string, 0)\n\n\tfor _, pk := range pks {\n\t\tif !SliceContains(paths, pk.Path) {\n\t\t\tpaths = append(paths, pk.Path)\n\t\t}\n\t}\n\n\treturn len(paths) > 1\n}", "title": "" } ]
6c0c49a240051ee1e741efe825322f68
SetShort sets the "short" field.
[ { "docid": "bc44435345ab4a142659ff20bdcbdbd2", "score": "0.8634658", "text": "func (sc *StockCreate) SetShort(s string) *StockCreate {\n\tsc.mutation.SetShort(s)\n\treturn sc\n}", "title": "" } ]
[ { "docid": "3e12d75f88a70d6e482f1ea8d53c5869", "score": "0.88374615", "text": "func (u *StateUpsert) SetShort(v string) *StateUpsert {\n\tu.Set(state.FieldShort, v)\n\treturn u\n}", "title": "" }, { "docid": "3abee5b46520644d940ef3aefd93cb83", "score": "0.88289875", "text": "func (u *StateUpsertOne) SetShort(v string) *StateUpsertOne {\n\treturn u.Update(func(s *StateUpsert) {\n\t\ts.SetShort(v)\n\t})\n}", "title": "" }, { "docid": "4acfc083c20351d1d386a02463ea0d76", "score": "0.8791036", "text": "func (u *VehicleClassUpsertOne) SetShort(v string) *VehicleClassUpsertOne {\n\treturn u.Update(func(s *VehicleClassUpsert) {\n\t\ts.SetShort(v)\n\t})\n}", "title": "" }, { "docid": "cc436a18523fdd89a689f5cbc0ee50c0", "score": "0.87311393", "text": "func (hc *HotCreate) SetShort(s string) *HotCreate {\n\thc.mutation.SetShort(s)\n\treturn hc\n}", "title": "" }, { "docid": "709ba8e49f2d8ec44715be259472efa0", "score": "0.8634182", "text": "func (u *VehicleClassUpsert) SetShort(v string) *VehicleClassUpsert {\n\tu.Set(vehicleclass.FieldShort, v)\n\treturn u\n}", "title": "" }, { "docid": "787eba117af62bf6aeebbfd926aef374", "score": "0.86144286", "text": "func (u *StateUpsertBulk) SetShort(v string) *StateUpsertBulk {\n\treturn u.Update(func(s *StateUpsert) {\n\t\ts.SetShort(v)\n\t})\n}", "title": "" }, { "docid": "f7ef259a04312d1d1b2a40ceeea546fa", "score": "0.8600867", "text": "func (u *VehicleClassUpsertBulk) SetShort(v string) *VehicleClassUpsertBulk {\n\treturn u.Update(func(s *VehicleClassUpsert) {\n\t\ts.SetShort(v)\n\t})\n}", "title": "" }, { "docid": "9fdfbe619ee6a477b2056342f8b57ba0", "score": "0.8593207", "text": "func (sc *StateCreate) SetShort(s string) *StateCreate {\n\tsc.mutation.SetShort(s)\n\treturn sc\n}", "title": "" }, { "docid": "8656c584ee978d3bc1ba2042aa299f48", "score": "0.855389", "text": "func (vcc *VehicleClassCreate) SetShort(s string) *VehicleClassCreate {\n\tvcc.mutation.SetShort(s)\n\treturn vcc\n}", "title": "" }, { "docid": "50ff456ad95a8ab46e3bf0e56c0eadc6", "score": "0.850606", "text": "func (o *MultiBurnrateAlert) SetShort(v Burnrate) {\n\to.Short = v\n}", "title": "" }, { "docid": "dca38cd45ef1eea6b8b2fd0b523c3e1c", "score": "0.8421838", "text": "func (c *Command) SetShort(s string) {\n\tc.cobra.Short = s\n}", "title": "" }, { "docid": "6062d6fd40ecb55d723f82fb63bd432e", "score": "0.82296354", "text": "func (f *ForumTopic) SetShort(value bool) {\n\tif value {\n\t\tf.Flags.Set(5)\n\t\tf.Short = true\n\t} else {\n\t\tf.Flags.Unset(5)\n\t\tf.Short = false\n\t}\n}", "title": "" }, { "docid": "9ec4ec8dfd4ef9b4696a4988532e0c25", "score": "0.7588848", "text": "func SetShort(bArray []byte, bOff int16, sValue int16) int16 {\n\tbArray[bOff] = byte(sValue >> 8)\n\tbArray[bOff+1] = byte(sValue)\n\treturn int16(bOff + 2)\n}", "title": "" }, { "docid": "b1cc1c71296819e8e62605af5e9871bd", "score": "0.6973821", "text": "func (p *Packer) PackShort(val uint16) {\n\tp.expand(ShortLen)\n\tif p.Errored() {\n\t\treturn\n\t}\n\n\tbinary.BigEndian.PutUint16(p.Bytes[p.Offset:], val)\n\tp.Offset += ShortLen\n}", "title": "" }, { "docid": "08b87eba5f6d4bff85b363194de4f8c4", "score": "0.6971818", "text": "func (f Field) PutShort(val uint16, i uint32, order binary.ByteOrder) {\n\torder.PutUint16(f.Data[i*2:], val)\n}", "title": "" }, { "docid": "4dec34d30c335550e8e68d2a789bf0d5", "score": "0.69689137", "text": "func (recv *Action) SetShortLabel(shortLabel string) {\n\tc_short_label := C.CString(shortLabel)\n\tdefer C.free(unsafe.Pointer(c_short_label))\n\n\tC.gtk_action_set_short_label((*C.GtkAction)(recv.native), c_short_label)\n\n\treturn\n}", "title": "" }, { "docid": "60cfb254dc4c70649abcaa7c7b77f871", "score": "0.6953728", "text": "func (u *VehicleClassUpsertOne) UpdateShort() *VehicleClassUpsertOne {\n\treturn u.Update(func(s *VehicleClassUpsert) {\n\t\ts.UpdateShort()\n\t})\n}", "title": "" }, { "docid": "f3e77e4bbb506e14800abd4a2c6eceef", "score": "0.6932817", "text": "func (hc *HotCreate) SetNillableShort(s *string) *HotCreate {\n\tif s != nil {\n\t\thc.SetShort(*s)\n\t}\n\treturn hc\n}", "title": "" }, { "docid": "e61475fab3124e62ba00a50774c7891b", "score": "0.6877646", "text": "func (f *FlagClause) Short(name byte) *FlagClause {\n\tf.Shorthand = name\n\treturn f\n}", "title": "" }, { "docid": "d12f1c5a68fe80280dd7d7d3fcf61d74", "score": "0.68735605", "text": "func (t *Teacher) UpdateShort(short string) {\n\tstmt := `UPDATE teachers SET short = ?, name = ?, sex = ? WHERE short = ?`\n\tdb.Exec(stmt, t.Short, t.Name, t.Sex, short)\n}", "title": "" }, { "docid": "517e4624830c8659d0600f666c099041", "score": "0.682518", "text": "func (u *StateUpsert) UpdateShort() *StateUpsert {\n\tu.SetExcluded(state.FieldShort)\n\treturn u\n}", "title": "" }, { "docid": "4d46c242d5fae4cc09b6fd95ce51b3e7", "score": "0.6799774", "text": "func (u *VehicleClassUpsert) UpdateShort() *VehicleClassUpsert {\n\tu.SetExcluded(vehicleclass.FieldShort)\n\treturn u\n}", "title": "" }, { "docid": "7a625fcb2c4dba3a67c0b453c9dab9d0", "score": "0.674457", "text": "func JNIEnvSetShortField(env *JNIEnv, obj Jobject, id JfieldID, val int16) {\n\tcenv, _ := (*C.JNIEnv)(unsafe.Pointer(env)), cgoAllocsUnknown\n\tcobj, _ := (C.jobject)(obj), cgoAllocsUnknown\n\tcid, _ := *(*C.jfieldID)(unsafe.Pointer(&id)), cgoAllocsUnknown\n\tcval, _ := (C.jshort)(val), cgoAllocsUnknown\n\tC.JNIEnv_SetShortField(cenv, cobj, cid, cval)\n}", "title": "" }, { "docid": "da86d668aae9fe9942f6990af8a4f861", "score": "0.6742689", "text": "func (m *RecommendationsMutation) SetShortDescription(s string) {\n\tm.shortDescription = &s\n}", "title": "" }, { "docid": "9393de3680689cea86e63ea1589cd2fd", "score": "0.6739858", "text": "func (sc *StockCreate) SetNillableShort(s *string) *StockCreate {\n\tif s != nil {\n\t\tsc.SetShort(*s)\n\t}\n\treturn sc\n}", "title": "" }, { "docid": "5494080c11e684d3b839865ece416b4e", "score": "0.67194057", "text": "func (m *TeamTemplateDefinition) SetShortDescription(value *string)() {\n err := m.GetBackingStore().Set(\"shortDescription\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "282079ac522f5ff810338eb77538284e", "score": "0.6685423", "text": "func (chip *CHIP8) WriteShort(addr uint16, value uint16) {\n\tif addr < chip.Cfg.SizeMemory-2 {\n\t\tchip.Memory[addr] = uint8(value >> 8 & 0xff)\n\t\tchip.Memory[addr+1] = uint8(value & 0xff)\n\t}\n}", "title": "" }, { "docid": "b3fc1c03f8657e8306e22999b50fc7c0", "score": "0.66660666", "text": "func (f *FlagClause) Short(name rune) *FlagClause {\n\tf.shorthand = name\n\treturn f\n}", "title": "" }, { "docid": "081e6623428ea3e4840e4a62c27d45b9", "score": "0.66602254", "text": "func (m *TeamsAppDefinition) SetShortDescription(value *string)() {\n m.shortDescription = value\n}", "title": "" }, { "docid": "3287b606ce7cefb0dfb9f66e7ae2a4d4", "score": "0.665435", "text": "func (u *StateUpsertOne) UpdateShort() *StateUpsertOne {\n\treturn u.Update(func(s *StateUpsert) {\n\t\ts.UpdateShort()\n\t})\n}", "title": "" }, { "docid": "773d8d9cbab3daa2621f9f4c1ccc7d55", "score": "0.6596882", "text": "func memPutShort(frame *rtda.Frame) {\n\tmem, slot := _memPut(frame)\n\tbinary.BigEndian.PutUint16(mem, uint16(slot.IntValue()))\n}", "title": "" }, { "docid": "3ae318b22419856538d0ce2127a7e695", "score": "0.6546666", "text": "func (o *ModelsDataService) SetShortName(v string) {\n\to.ShortName = &v\n}", "title": "" }, { "docid": "549755d6a3297349e6b0863710b25bd5", "score": "0.6543254", "text": "func (f *Field) ShortFlag(flag rune) *Field {\n\tf.shortFlag = flag\n\treturn f\n}", "title": "" }, { "docid": "bb6cd84eeaed89e6f6e15a4889d8a39d", "score": "0.652697", "text": "func (s *Stream) WriteShort(status int64, data1 int64, data2 int64) error {\n\tevt := Event{\n\t\t//Timestamp: Timestamp(C.Pt_Time()),\n\t\tTimestamp: Time(),\n\t\tStatus: status,\n\t\tData1: data1,\n\t\tData2: data2,\n\t}\n\treturn s.Write([]Event{evt})\n}", "title": "" }, { "docid": "e287a42eb7e6e452dfa3becb202e88f1", "score": "0.652207", "text": "func (f Field) Short(i uint32, order binary.ByteOrder) uint16 {\n\treturn order.Uint16(f.Data[i*2:])\n}", "title": "" }, { "docid": "4c3f916c61c4ed2109a55b2a198133ff", "score": "0.6504739", "text": "func (o *NoteTextDtoAllOf) SetShortText(v string) {\n\to.ShortText = &v\n}", "title": "" }, { "docid": "9c7b8f6a5cc8442de4d8a9ca03164641", "score": "0.64803743", "text": "func (u *VehicleClassUpsertBulk) UpdateShort() *VehicleClassUpsertBulk {\n\treturn u.Update(func(s *VehicleClassUpsert) {\n\t\ts.UpdateShort()\n\t})\n}", "title": "" }, { "docid": "ddf26c2b065186288c4fcafe3056461a", "score": "0.64563125", "text": "func (f *CIDRSliceFlag) WithShort(short string) *CIDRSliceFlag {\n\tf.short = internal.SanitiseShortName(short)\n\treturn f\n}", "title": "" }, { "docid": "20036d1a7d037afd647e56e5477ffeaf", "score": "0.6415248", "text": "func (m *MetricMetadata) SetShortName(v string) {\n\tm.ShortName = &v\n}", "title": "" }, { "docid": "f753eb157b0e18c6abeaba2f038d55d1", "score": "0.6391393", "text": "func (c *Clause) Short(name rune) *Clause {\n\tc.shorthand = name\n\treturn c\n}", "title": "" }, { "docid": "e78dc7dadf94bd0a78d304d5f84ac056", "score": "0.63834804", "text": "func (p Part) FlagShort() string {\n\treturn p.short\n}", "title": "" }, { "docid": "344da5be5c17f1a8e561d0239a54d677", "score": "0.6371365", "text": "func (s Segment) ShortText(shortText string) Segment {\n\ts[\"short_text\"] = shortText\n\treturn s\n}", "title": "" }, { "docid": "2eb11e9a37f4a84ea8c75baf2ef3969f", "score": "0.6346216", "text": "func (b Bulan) Short() Bulan {\n\treturn b.Long()[:3]\n}", "title": "" }, { "docid": "018c92e39d31d4eff7caf88dfa866446", "score": "0.6268614", "text": "func (s *SuperAgent) WithShortType(shortType string) *SuperAgent {\n\tif contentType, ok := Types[shortType]; ok {\n\t\ts.WithContentType(contentType)\n\t} else {\n\t\ts.Errors = append(s.Errors, errors.New(\"WithType func: incorrect type \\\"\"+shortType+\"\\\"\"))\n\t}\n\treturn s\n}", "title": "" }, { "docid": "49c63a7d041fbdd6275255a4e246e80f", "score": "0.6248827", "text": "func (f Field) SShort(i uint32, order binary.ByteOrder) int16 {\n\treturn int16(order.Uint16(f.Data[i*2:]))\n}", "title": "" }, { "docid": "833bcf9f02b1923edc53bd7e2b37caf5", "score": "0.62084824", "text": "func (u *StateUpsertBulk) UpdateShort() *StateUpsertBulk {\n\treturn u.Update(func(s *StateUpsert) {\n\t\ts.UpdateShort()\n\t})\n}", "title": "" }, { "docid": "b27f9ffbed0ef11346b987fc1d5f631c", "score": "0.62069166", "text": "func WriteShort(stream *PortMidiStream, when Timestamp, msg int32) Error {\n\tcstream, _ := (unsafe.Pointer)(unsafe.Pointer(stream)), cgoAllocsUnknown\n\tcwhen, _ := (C.PmTimestamp)(when), cgoAllocsUnknown\n\tcmsg, _ := (C.int32_t)(msg), cgoAllocsUnknown\n\t__ret := C.Pm_WriteShort(cstream, cwhen, cmsg)\n\t__v := (Error)(__ret)\n\treturn __v\n}", "title": "" }, { "docid": "f72f7931a9265da75e48b5fed8484510", "score": "0.62019163", "text": "func (m *Link) SetShortUrl(hash string) {\n\tm.ShortUrl = m.Host + \"/\" + hash\n}", "title": "" }, { "docid": "92064b5b901e9d08ac3b130038ab5347", "score": "0.6185408", "text": "func (pckr *packer) PackShortRaw(val int16) {\n\tpos := pckr.grow(_b2)\n\tBuffer.Int16ToBytes(val, pckr.buffer.Bytes(), pos)\n}", "title": "" }, { "docid": "3eddf43c0b224608b4bfc7b457657ecf", "score": "0.6183691", "text": "func JNIEnvSetStaticShortField(env *JNIEnv, clazz *Jclass, id JfieldID, val int16) {\n\tcenv, _ := (*C.JNIEnv)(unsafe.Pointer(env)), cgoAllocsUnknown\n\tcclazz, _ := (C.jclass)(unsafe.Pointer(clazz)), cgoAllocsUnknown\n\tcid, _ := *(*C.jfieldID)(unsafe.Pointer(&id)), cgoAllocsUnknown\n\tcval, _ := (C.jshort)(val), cgoAllocsUnknown\n\tC.JNIEnv_SetStaticShortField(cenv, cclazz, cid, cval)\n}", "title": "" }, { "docid": "281aee7a888be9eead92c34a22401914", "score": "0.6179396", "text": "func (s *ThreatDetectedByName) SetShortened(v bool) *ThreatDetectedByName {\n\ts.Shortened = &v\n\treturn s\n}", "title": "" }, { "docid": "6b23b9eac7bed4df0d90c8bc78f8086c", "score": "0.61639935", "text": "func (o *MetricsQueryUnit) SetShortName(v string) {\n\to.ShortName = &v\n}", "title": "" }, { "docid": "4e326931b7e24f44c5729c4058816d60", "score": "0.6109021", "text": "func (chip *CHIP8) WriteDisplayShort(addr uint16, value uint16) {\n\tif addr < chip.Cfg.SizeDisplay-2 {\n\t\tchip.Display[addr] = uint8(value >> 8)\n\t\tchip.Display[addr+1] = uint8(value)\n\t}\n}", "title": "" }, { "docid": "d889f3174e8e3c031ce7aaf03db3df28", "score": "0.60916567", "text": "func NewShort(\n\tlogger fw.Logger,\n\ttracer fw.Tracer,\n\turlRetriever url.Retriever,\n\turlCreator url.Creator,\n\tchangeLog changelog.ChangeLog,\n\trequesterVerifier requester.Verifier,\n\tauthenticator authenticator.Authenticator,\n) Short {\n\tr := resolver.NewResolver(\n\t\tlogger,\n\t\ttracer,\n\t\tchangeLog,\n\t\turlRetriever,\n\t\turlCreator,\n\t\trequesterVerifier,\n\t\tauthenticator,\n\t)\n\treturn Short{\n\t\tresolver: &r,\n\t}\n}", "title": "" }, { "docid": "f1a0122b18954d926a947be7ae415f2b", "score": "0.609062", "text": "func (o *FiltersQuota) SetShortDescriptions(v []string) {\n\to.ShortDescriptions = &v\n}", "title": "" }, { "docid": "6a851eb1550ba1ee2ba3fe5b7f63f95c", "score": "0.60780704", "text": "func (v *Short) Write(out *bufio.Writer) error {\n\treturn binary.Write(out, binary.LittleEndian, *v)\n}", "title": "" }, { "docid": "5426ad5ae0777a6693457a54a47482aa", "score": "0.60432696", "text": "func (l ListShort) Set(i int, d Data) error {\n\tif m, ok := d.(Short); ok {\n\t\tif i <= 0 || i >= len(l) {\n\t\t\treturn ErrBadRange\n\t\t}\n\t\tl[i] = m\n\t} else {\n\t\treturn &WrongTag{TagShort, d.Type()}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ca12a9232ef17876f5fd82fedd5e400d", "score": "0.59439707", "text": "func (s *RuleMetadata) SetShortDescription(v string) *RuleMetadata {\n\ts.ShortDescription = &v\n\treturn s\n}", "title": "" }, { "docid": "6f75febab4c3766477406f7ea26a05cf", "score": "0.591158", "text": "func WithShortFile() Option {\n\treturn func(o *Options) { o.shortfile = true }\n}", "title": "" }, { "docid": "aa88f564c3cf59467ea09d9f92487c85", "score": "0.59029216", "text": "func (b *Block) ForceShort() bool {\n\treturn false\n}", "title": "" }, { "docid": "aa88f564c3cf59467ea09d9f92487c85", "score": "0.59029216", "text": "func (b *Block) ForceShort() bool {\n\treturn false\n}", "title": "" }, { "docid": "aa88f564c3cf59467ea09d9f92487c85", "score": "0.59029216", "text": "func (b *Block) ForceShort() bool {\n\treturn false\n}", "title": "" }, { "docid": "3eb980e7b75335dd1c67facb1a498afa", "score": "0.58918786", "text": "func pushShort(_ *regbank, st *stack, args []byte) ([]byte, bool) {\n\tr := int16(uint16(args[0])<<8 | uint16(args[1]))\n\tst.push(int32(r))\n\treturn args[2:], st.top < stackMax\n}", "title": "" }, { "docid": "bb8a7bd6ccdfffa5b7d6c8c81354d12a", "score": "0.58755136", "text": "func (bot *Bot) SetMyShortDescription(opts *SetMyShortDescriptionOpts) (bool, error) {\n\tv := map[string]string{}\n\tif opts != nil {\n\t\tv[\"short_description\"] = opts.ShortDescription\n\t\tv[\"language_code\"] = opts.LanguageCode\n\t}\n\n\tvar reqOpts *RequestOpts\n\tif opts != nil {\n\t\treqOpts = opts.RequestOpts\n\t}\n\n\tr, err := bot.Request(\"setMyShortDescription\", v, nil, reqOpts)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\n\tvar b bool\n\treturn b, json.Unmarshal(r, &b)\n}", "title": "" }, { "docid": "2876f7ef325ba603f227f7c1cda3ae41", "score": "0.58673257", "text": "func (ssn SwedishSsn) StringShort() string {\n\treturn ssn.String()[2:]\n}", "title": "" }, { "docid": "d6b482e04f566b80f6fe13eb94fe9f0e", "score": "0.5859534", "text": "func Short() string {\n\treturn Version\n}", "title": "" }, { "docid": "d6b482e04f566b80f6fe13eb94fe9f0e", "score": "0.5859534", "text": "func Short() string {\n\treturn Version\n}", "title": "" }, { "docid": "0fd3d3ce9b6eabfb58856109ac32c776", "score": "0.5809724", "text": "func (b *MessageBuilder) ShortField(title string, text string, args ...interface{}) *MessageBuilder {\n\tb.addField(true, title, text, args...)\n\treturn b\n}", "title": "" }, { "docid": "e1885773cc8f1bc05241732fa961fcb1", "score": "0.57935834", "text": "func (b Info) Short() string {\n\tplat := b.Platform\n\tif b.CgoTargetTriple != \"\" {\n\t\tplat = b.CgoTargetTriple\n\t}\n\treturn fmt.Sprintf(\"CockroachDB %s %s (%s, built %s, %s)\",\n\t\tb.Distribution, b.Tag, plat, b.Time, b.GoVersion)\n}", "title": "" }, { "docid": "1ead3e3cf144c46b9dace9d37aab9bc0", "score": "0.57825667", "text": "func Short() string {\n\treturn shortid.MustGenerate()\n}", "title": "" }, { "docid": "1e5bff970f77a7cd66ec4cf2a69bcfd8", "score": "0.5759263", "text": "func (t *Type) ShortString() string {\n\treturn Tconv(t, FmtLeft, FErr, 0)\n}", "title": "" }, { "docid": "c9f504fbb76c314174ca9d3a4d4e366d", "score": "0.5746996", "text": "func (f *ForumTopic) GetShort() (value bool) {\n\tif f == nil {\n\t\treturn\n\t}\n\treturn f.Flags.Has(5)\n}", "title": "" }, { "docid": "0393d2b1111076793c80d1e0b0361911", "score": "0.5741834", "text": "func postShort(t *testing.T) {\n\tpostURL := fmt.Sprintf(\"%s/shorty/%s\", testURL(), shortURL)\n\n\tpostShortEmptyBody(t, postURL)\n\tpostShortIncompleteBody(t, postURL)\n\tpostShortCompleteBody(t, postURL)\n}", "title": "" }, { "docid": "d7a2f34c9d74d0c10a078f46268dd838", "score": "0.57259625", "text": "func (opts *Options) NewShortFlag(shortName rune) (f *Flag, err error) {\n\treturn opts.NewFlag(\"\", shortName)\n}", "title": "" }, { "docid": "016ecbe10185f91e80c72b7f0008ab37", "score": "0.572392", "text": "func (m *DistrictMutation) SetShorterName(s string) {\n\tm.shorter_name = &s\n}", "title": "" }, { "docid": "5b39b8707e29cc2a06b8d0a6cd766cc6", "score": "0.5717226", "text": "func Short(f func(el *js.Object, binding *DirectiveBinding, vnode, oldVnode *js.Object)) DirectiveOption {\n\treturn func(c *DirectiveConfig) {\n\t\tc.Short = js.MakeFunc(\n\t\t\tfunc(thisNotSet *js.Object, jsArgs []*js.Object) interface{} {\n\t\t\t\tvar lastArg *js.Object\n\t\t\t\tswitch len(jsArgs) {\n\t\t\t\tcase 3:\n\t\t\t\t\t// Do nothing\n\t\t\t\tcase 4:\n\t\t\t\t\tlastArg = jsArgs[3]\n\t\t\t\t}\n\n\t\t\t\tf(jsArgs[0],\n\t\t\t\t\t&DirectiveBinding{Object: jsArgs[1]},\n\t\t\t\t\tjsArgs[2],\n\t\t\t\t\tlastArg)\n\t\t\t\treturn nil\n\t\t\t})\n\t}\n}", "title": "" }, { "docid": "d6252093c2eb5e76f9fd5d701aed5e4a", "score": "0.5711658", "text": "func (o *MultiBurnrateAlert) GetShort() Burnrate {\n\tif o == nil {\n\t\tvar ret Burnrate\n\t\treturn ret\n\t}\n\n\treturn o.Short\n}", "title": "" }, { "docid": "d2291f5ffc1e494b735aac0d1487ed84", "score": "0.57008886", "text": "func (t Type) ShortString() string {\n\tname, ok := shortTypes[t]\n\tif ok {\n\t\treturn name\n\t}\n\treturn t.String()\n}", "title": "" }, { "docid": "d717af72603826abb61b71527b6a7505", "score": "0.5694382", "text": "func (b *Block) StringShort() string {\n\tif b == nil {\n\t\treturn \"nil-Block\"\n\t}\n\treturn fmt.Sprintf(\"Block#%v\", b.Hash().String())\n}", "title": "" }, { "docid": "e34ab8f7ea91eec5388aeb09dd624f64", "score": "0.56560534", "text": "func (e *ReferencePointer) Short() string {\n\treturn fmt.Sprintf(\n\t\t\"%s@%s\",\n\t\te.ReferenceName.Short(),\n\t\te.Hash[0:6],\n\t)\n}", "title": "" }, { "docid": "5823a90e7416ab2eae5b11e604dae49f", "score": "0.56517935", "text": "func (i Info) ShortString() string {\n\tif i.Bits == 0 {\n\t\treturn i.Type.ShortString()\n\t}\n\tif i.Type == TPtr {\n\t\treturn fmt.Sprintf(\"*%s\", i.ElementType.ShortString())\n\t}\n\treturn fmt.Sprintf(\"%s%d\", i.Type.ShortString(), i.Bits)\n}", "title": "" }, { "docid": "d3d3d053b1c66e9b11420eb469f41ce6", "score": "0.5596673", "text": "func (l *Loca) IsShort() bool {\n\treturn 0 == l.indexToLocFormat\n}", "title": "" }, { "docid": "73ce4879b3032403937e686617a71f68", "score": "0.55952644", "text": "func MakeShort(b1 byte, b2 byte) int16 {\n\treturn int16(b1)<<8 + int16(b2)&0xFF\n}", "title": "" }, { "docid": "e0c9f5be7309f985f5ad7f536a5f7f71", "score": "0.5581393", "text": "func (enc *MMSEncoder) writeShortInteger(i uint64) error {\n\treturn enc.writeByte(byte(i | 0x80))\n}", "title": "" }, { "docid": "6bc9b82d3d7cb7c20b2e27f094ce01cc", "score": "0.5547382", "text": "func (s *Straddle) Short() float64 {\n\treturn -s.Call() - s.Put()\n}", "title": "" }, { "docid": "312f99b7baa60e20cbcf45dda7d1d8bb", "score": "0.5522404", "text": "func (r ApiApiDataServicesGetRequest) ShortName(shortName string) ApiApiDataServicesGetRequest {\n\tr.shortName = &shortName\n\treturn r\n}", "title": "" }, { "docid": "ade7935d36faeca0aa44f5299e85eeff", "score": "0.55150044", "text": "func (u UrlShortener) SetShortenedUrl(ctx context.Context, i *proto.SetShortenedUrlInput) (*proto.Url, error) {\n\t// Create new random sequence of n length\n\trnd := randSeq(14)\n\n\t// attempt to associate random sequence to received URL in cache\n\t_, err := db.Set(ctx, rnd, i.GetUrl())\n\tif err != nil {\n\t\treturn nil, errors.New(fmt.Sprintf(\"Error creating shortened URL entry: %s\", err.Error()))\n\t}\n\n\t// attempt to set expiry to new entry IF expiry time is defined in input\n\tif i.GetExpiryMinutes() != 0 {\n\t\t_, err = db.Expire(ctx, rnd, time.Duration(i.GetExpiryMinutes())*time.Minute)\n\t\tif err != nil {\n\t\t\t// If EXPIRY call fails, delete entry before returning\n\t\t\t// This is done to avoid persisting entries which the user does not want to keep indefinitely\n\t\t\t_, deleteErr := u.DeleteShortenedUrl(ctx, &proto.Key{Key: rnd})\n\t\t\tif deleteErr != nil {\n\t\t\t\tfmt.Println(\"[CRITICAL] Failed to delete entry after EXPIRE operation failed.\")\n\t\t\t\treturn nil, errors.Wrap(errors.New(\"Failed to set expiry of entry\"), deleteErr.Error())\n\t\t\t}\n\n\t\t\treturn nil, errors.Wrap(err, \"Failed to set expiry on entry: Entry has been deleted\")\n\t\t}\n\t}\n\n\t// return new shortened URL\n\treturn &proto.Url{Url: fmt.Sprintf(\"%s/%s\", proxyUrl, rnd)}, nil\n}", "title": "" }, { "docid": "e29c76111f88f74bc665dbbe8a2ead5c", "score": "0.5504489", "text": "func (l ListData) ListShort() ListShort {\n\tif l.tagType != TagShort {\n\t\treturn nil\n\t}\n\ts := make(ListShort, len(l.data))\n\tfor n, v := range l.data {\n\t\ts[n] = v.(Short)\n\t}\n\treturn s\n}", "title": "" }, { "docid": "3aa64939659f1a92bb3c4f74db4faf3f", "score": "0.54665774", "text": "func (p *Packer) UnpackShort() uint16 {\n\tp.checkSpace(ShortLen)\n\tif p.Errored() {\n\t\treturn 0\n\t}\n\n\tval := binary.BigEndian.Uint16(p.Bytes[p.Offset:])\n\tp.Offset += ShortLen\n\treturn val\n}", "title": "" }, { "docid": "f2bc9a1fcb91c9d7389febf38c9579a4", "score": "0.5462024", "text": "func (o *Option) ShortName() rune {\n\treturn o.shortName\n}", "title": "" }, { "docid": "ae6acdb0b0856d5ab483a5e4bd815760", "score": "0.5436867", "text": "func (r *Regs) StoreSHORTS(s uint32) {\n\tr.shorts.Store(s)\n}", "title": "" }, { "docid": "3e18cf8c86e6b3b2e4cbc0f20a336532", "score": "0.5435276", "text": "func Short() string {\n\treturn floodgateVersion.Short()\n}", "title": "" }, { "docid": "3019c6493507c6d6e41dd7f02c5e3649", "score": "0.542008", "text": "func (u UUID) Short() string {\n\treturn hex.EncodeToString(u[:])[:24]\n}", "title": "" }, { "docid": "567f368f168b91cceda3590eed22631f", "score": "0.54154634", "text": "func ProcessShort(ticks int32, inbuffer []int16, outbuffer []int16) int32 {\n\tcticks, _ := (C.int)(ticks), cgoAllocsUnknown\n\tcinbuffer, _ := (*C.short)(unsafe.Pointer((*sliceHeader)(unsafe.Pointer(&inbuffer)).Data)), cgoAllocsUnknown\n\tcoutbuffer, _ := (*C.short)(unsafe.Pointer((*sliceHeader)(unsafe.Pointer(&outbuffer)).Data)), cgoAllocsUnknown\n\t__ret := C.libpd_process_short(cticks, cinbuffer, coutbuffer)\n\t__v := (int32)(__ret)\n\treturn __v\n}", "title": "" }, { "docid": "885ad6d99a98e76400f75649ed3f8646", "score": "0.5388222", "text": "func (x LiteralStringOrigin) MarshalYAMLShort() (interface{}, error) {\n\treturn x.LiteralValue, nil\n}", "title": "" }, { "docid": "f1ee8ecf6d47538f2ec02fa9209919e3", "score": "0.53596616", "text": "func (x LiteralBytesOrigin) MarshalYAMLShort() (interface{}, error) {\n\treturn x.LiteralValue, nil\n}", "title": "" }, { "docid": "00cc4f43e756c7581644c762cab0f419", "score": "0.53538895", "text": "func NewMockShortHeaderSealer(ctrl *gomock.Controller) *MockShortHeaderSealer {\n\tmock := &MockShortHeaderSealer{ctrl: ctrl}\n\tmock.recorder = &MockShortHeaderSealerMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "a42499045fc9189529c97973faa0093f", "score": "0.5351222", "text": "func OptShortcode(value string) RequestOpt {\n\treturn func(r *http.Request) error {\n\t\tparams := r.URL.Query()\n\t\tparams.Set(\"shortcode\", value)\n\t\tr.URL.RawQuery = params.Encode()\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "941187dbb8b42d9b27346e5d578f853d", "score": "0.533023", "text": "func (r *Renderer) ShortSynopsis(n ast.Node) (string, error) {\n\treturn shortOneLineNodeDepth(r.fset, n, 0)\n}", "title": "" }, { "docid": "771abfcfd5355f6821845107e615db1b", "score": "0.5324922", "text": "func (e Int) ShortString() string {\n\treturn fmt.Sprintf(\"%s\", e)\n}", "title": "" } ]
48f0b557da11fb9508430ce71346762d
Run checks the name of the called binary and executes the corresponding handler
[ { "docid": "5ec12189380e02db1bc23f856b32e960", "score": "0.72350854", "text": "func (h *Handler) Run() error {\n\tswitch path.Base(os.Args[0]) {\n\tcase \"check\":\n\t\th.setMode(CHECK)\n\t\treturn h.Check()\n\tcase \"in\":\n\t\th.setMode(IN)\n\t\treturn h.In()\n\tcase \"out\":\n\t\th.setMode(OUT)\n\t\treturn h.Out()\n\tdefault:\n\t\terr := fmt.Errorf(\"unknown action %v\", os.Args[0])\n\t\tlog.Error(err.Error())\n\t\treturn err\n\t}\n}", "title": "" } ]
[ { "docid": "abdcb4ab84a49b5e1b617e176b0a3999", "score": "0.67739165", "text": "func HandleRun(w http.ResponseWriter, r *http.Request) {\r\n\r\n\tvar err error\r\n\r\n\t//get the name and the hash from the path\r\n\turlPart := strings.Split(r.URL.Path, \"/\")\r\n\r\n\tname := urlPart[2]\r\n\thash := urlPart[3]\r\n\r\n\tif name != \"\" && hash != \"\" {\r\n\r\n\t\tif script, err := storage.Get(name, hash); err == nil {\r\n\r\n\t\t\t//get the configured VM\r\n\t\t\tvm := getVM(r)\r\n\r\n\t\t\t//run the script\r\n\t\t\tif value, err := runUnsafe(vm, script); err == nil {\r\n\r\n\t\t\t\tif responseBody, err := value.ToString(); err == nil {\r\n\r\n\t\t\t\t\tw.Write([]byte(responseBody))\r\n\r\n\t\t\t\t\treturn\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t}\r\n\r\n\t\tw.Write([]byte(err.Error()))\r\n\r\n\t\thttp.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)\r\n\t}\r\n\r\n\thttp.Error(w, http.StatusText(http.StatusBadRequest), http.StatusBadRequest)\r\n}", "title": "" }, { "docid": "0fdacdffcf86acf077175115840c2261", "score": "0.6183962", "text": "func (p *Plugin) Run(hook function.Hook, fn *function.Function) error {\n\tif hook != function.OpenHook || fn.Runtime != \"nodejs\" {\n\t\treturn nil\n\t}\n\n\tif fn.Handler == \"\" {\n\t\tfn.Handler = \"index.handle\"\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "441676b93f7795bf1d93747e7bd5d87d", "score": "0.6116434", "text": "func (s *Server) RunHandler(w http.ResponseWriter, r *http.Request) {\n\tctx, cancel := context.WithTimeout(context.Background(), s.options.MaxTimeout)\n\tdefer cancel()\n\n\tctx, reqID := util.AddRequestID(ctx, func() string {\n\t\treturn getRequestID(r)\n\t})\n\tlogger := logrus.WithFields(logrus.Fields{\"peer\": r.RemoteAddr, \"reqID\": reqID})\n\n\tif r.Header.Get(\"HTTP_ORIGIN\") != \"\" {\n\t\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\t}\n\n\t// Process request.\n\tpayload, err := s.loadPayload(r)\n\tif err != nil {\n\t\tlogger.WithError(err).Error(\"Loading payload failed\")\n\t\thttpError(w, http.StatusInternalServerError, \"Loading payload failure.\")\n\n\t\treturn\n\t}\n\n\t// Process cached response (if it exists).\n\tcacheKey := createCacheKey(r.Header.Get(headerInstancePKKey), payload.EndpointName, payload.SourceHash)\n\n\tif payload.Cache > 0 && r.URL.Query().Get(getSkipCache) != \"1\" {\n\t\tif cacheData, err := s.redisCli.Get(cacheKey).Bytes(); err == nil {\n\t\t\tvar trace ScriptTrace\n\t\t\terr := msgpack.Unmarshal(cacheData, &trace)\n\n\t\t\tif err == nil {\n\t\t\t\twriteTraceResponse(w, &trace)\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\n\tmeta, lbMeta, scriptMeta, err := s.prepareRequest(r, payload)\n\tif err != nil {\n\t\tlogger.WithError(err).Error(\"Parsing request failed\")\n\t\thttpError(w, http.StatusInternalServerError, \"Parsing request failure.\")\n\n\t\treturn\n\t}\n\n\t// Check if request META needs to be parsed.\n\trequestParsed := r.Header.Get(headerPayloadParsed) == \"1\"\n\n\t// Process script chunks.\n\tvar chunks []*scriptpb.RunChunk\n\n\tif !requestParsed {\n\t\tr.Body = http.MaxBytesReader(w, r.Body, s.options.MaxPayloadSize)\n\n\t\tchunks, err = s.processRequestData(r)\n\t\tif err != nil {\n\t\t\thttpError(w, http.StatusBadRequest, fmt.Sprintf(\"Parsing payload failure: %s.\", err.Error()))\n\t\t\treturn\n\t\t}\n\t}\n\n\tstart := time.Now()\n\tchunkReader := common.NewArrayChunkReader(chunks)\n\n\tstream, err := s.sendRunToLoadbalancer(ctx, logger, meta, lbMeta, scriptMeta, chunkReader)\n\tif err != nil {\n\t\thttpError(w, http.StatusBadGateway, \"Processing script failure.\")\n\t\treturn\n\t}\n\n\ttrace, _ := s.processResponse(ctx, logger, start, meta, stream, nil)\n\ttook := time.Duration(trace.Duration) * time.Millisecond\n\n\tlogger.WithFields(logrus.Fields{\n\t\t\"lbMeta\": lbMeta,\n\t\t\"runtime\": scriptMeta.Runtime,\n\t\t\"sourceHash\": scriptMeta.SourceHash,\n\t\t\"userID\": scriptMeta.UserId,\n\t\t\"payloadParsed\": requestParsed,\n\t\t\"took\": took,\n\t\t\"overhead\": time.Since(start) - took,\n\t}).Info(\"uwsgi:broker:Run\")\n\n\t// Process result.\n\tif payload.Cache > 0 {\n\t\tb, err := msgpack.Marshal(trace)\n\t\tif err == nil {\n\t\t\t// Save cached trace to redis.\n\t\t\ts.redisCli.Set(cacheKey, b, time.Duration(payload.Cache*1000)*time.Millisecond)\n\t\t}\n\t}\n\n\twriteTraceResponse(w, trace)\n}", "title": "" }, { "docid": "815dcfdef90ee8b989260b7efa14a28f", "score": "0.6083408", "text": "func (a *App) Run(addr string) {}", "title": "" }, { "docid": "815dcfdef90ee8b989260b7efa14a28f", "score": "0.6083408", "text": "func (a *App) Run(addr string) {}", "title": "" }, { "docid": "9d65105eb9ea45907a4a8c8a0b5c91cb", "score": "0.6071316", "text": "func (h *Handler) Run() {\n\tvar err error\n\n\tif err = h.Startup(); err != nil {\n\t\th.abort(err)\n\t\treturn\n\t}\n\n\tif err := h.ConfigureBackend(); err != nil {\n\t\th.abort(err)\n\t\treturn\n\t}\n\n\tif err = h.ConnectToBackend(); err != nil {\n\t\th.abort(err)\n\t\treturn\n\t}\n\n\th.Pipe()\n}", "title": "" }, { "docid": "2249f790983ac6986ca11ad7159aafb8", "score": "0.60578007", "text": "func (c *Context) RunHandler(w web.ResponseWriter, r *web.Request) {\n\tLogInf(logContextDaemon, \"Receive RUN[%v] request from: %v\", \"Daemon\", r.RemoteAddr)\n\tr.ParseForm()\n\n\tname := r.PathParams[\"script\"]\n\tuuid := uuid.NewV4().String()\n\ttimeout := 10\n\tparams := r.Form\n\tip := strings.Split(r.RemoteAddr, \":\")[0]\n\n\tstatus, _ := daemonLocalStatus.GetState()\n\tif status == DaemonWorking {\n\t\tw.WriteHeader(http.StatusServiceUnavailable)\n\t\treturn\n\t}\n\n\tw.WriteHeader(http.StatusOK)\n\tSubmit(name, uuid, ip, params, time.Duration(timeout))\n}", "title": "" }, { "docid": "cdd6989430ea876a74d47c37937508c1", "score": "0.6056738", "text": "func (t *SimpleChaincode) Run(stub *shim.ChaincodeStub, function string, args []string) ([]byte, error) {\n\tfmt.Println(\"run is running \" + function)\n\treturn t.Invoke(stub, function, args)\n}", "title": "" }, { "docid": "cdd6989430ea876a74d47c37937508c1", "score": "0.6056738", "text": "func (t *SimpleChaincode) Run(stub *shim.ChaincodeStub, function string, args []string) ([]byte, error) {\n\tfmt.Println(\"run is running \" + function)\n\treturn t.Invoke(stub, function, args)\n}", "title": "" }, { "docid": "f2a2f5082ab85d4dc7d79c5dd57d80a8", "score": "0.6013384", "text": "func (h *Handler) Run(c *cli.Context) error {\n\terr := h.parseColors(c.String(\"colors\"))\n\tutils.FatalOnErr(err)\n\n\terr = h.parseFormation(c.String(\"formation\"))\n\tutils.FatalOnErr(err)\n\n\terr = h.parseStopSignals(c.String(\"stop-signals\"))\n\tutils.FatalOnErr(err)\n\n\tcmd, err := newCommand(h)\n\tutils.FatalOnErr(err)\n\n\texitCode, err := cmd.Run()\n\tutils.FatalOnErr(err)\n\n\tos.Exit(exitCode)\n\n\treturn nil\n}", "title": "" }, { "docid": "4b1f6fdbad0fa9557b54699c28db1737", "score": "0.5999427", "text": "func (t *SimpleChaincode) Run(stub shim.ChaincodeStubInterface, function string, args []string) ([]byte, error) {\n\tfmt.Println(\"run is running \" + function)\n\treturn t.Invoke(stub, function, args)\n}", "title": "" }, { "docid": "05c5805b3ca93cd7a69d4733b82a8fb4", "score": "0.59195447", "text": "func (a *Application) Run() error {\n\tif err := a.Validate(); err != nil {\n\t\treturn err\n\t}\n\n\tif FlagSetList.Parsed() {\n\t\treturn a.CommandList()\n\t}\n\n\tif FlagSetDelete.Parsed() {\n\t\treturn a.CommandDelete()\n\t}\n\n\tif FlagSetUpload.Parsed() {\n\t\treturn a.CommandUpload()\n\t}\n\n\tif FlagSetMove.Parsed() {\n\t\treturn a.CommandMove()\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "da20e1875e65b17d9aabbda217326adc", "score": "0.59058964", "text": "func (mru *MetaFileRegUploader) Run() (string, error) {\n\t// check existence\n\texists, err := mru.isUploaded()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tif exists {\n\t\treturn \"\", errors.ErrMetaExisted\n\t}\n\n\t// upload\n\tswitch mru.Method {\n\tcase service.DirectUploadMethod:\n\t\treturn mru.directUpload()\n\tcase service.S3UploadMethod:\n\t\treturn mru.s3Upload()\n\tcase service.MinioUploadMethod:\n\t\treturn mru.minioUpload()\n\t}\n\treturn \"\", errors.ErrUploadMethodInvalid\n}", "title": "" }, { "docid": "73d105f9841fd80a864fa57204e92f1b", "score": "0.5894017", "text": "func Run(addr string) {\n\tmainServer.Run(addr)\n}", "title": "" }, { "docid": "73d105f9841fd80a864fa57204e92f1b", "score": "0.5894017", "text": "func Run(addr string) {\n\tmainServer.Run(addr)\n}", "title": "" }, { "docid": "b4d29a7cf5b5382ed5abda23dd251d3b", "score": "0.58938885", "text": "func (p *plugin) run(w http.ResponseWriter, r *http.Request) {\n\tp.handler.Handle(w, r, p.next.run)\n}", "title": "" }, { "docid": "58d2b052869623c75915309df0c731b9", "score": "0.58938867", "text": "func (t *SimpleChaincode) Run(stub *shim.ChaincodeStub, function string, args []string) ([]byte, error) {\n\n\t// Handle different functions\n\tif function == \"init\" {\n\t\t// Initialize the entities and their asset holdings\n\t\treturn t.init(stub, args)\n\t} else if function == \"invoke\" {\n\t\t// Transaction makes payment of X units from A to B\n\t\treturn t.invoke(stub, args)\n\t} else if function == \"delete\" {\n\t\t// Deletes an entity from its state\n\t\treturn t.delete(stub, args)\n\t}\n \n\treturn nil, errors.New(\"Received unknown function invocation\")\n}", "title": "" }, { "docid": "a3013d703b0d882c381201fe376b0d03", "score": "0.58841187", "text": "func (a *App) Run(address string) {}", "title": "" }, { "docid": "59aa1d9ddc3062700fcb972e18748694", "score": "0.58676165", "text": "func (t *SimpleChaincode) Run(stub *shim.ChaincodeStub, function string, args []string) ([]byte, error) {\n\n\t// Handle different functions\n\tif function == \"init\" {\n\t\t// Initialize the entities and their asset holdings\n\t\treturn t.init(stub)\n\t} else if function == \"invoke\" {\n\t\t// Transaction makes payment of X units from A to B\n\t\treturn t.invoke(stub, args)\n\t} else if function == \"delete\" {\n\t\t// Deletes an entity from its state\n\t\treturn t.delete(stub, args)\n\t}\n\treturn nil, errors.New(\"Received unknown function invocation\")\n}", "title": "" }, { "docid": "fb4d29c027605a12bdcfebc9e8dc67d9", "score": "0.58569956", "text": "func main() {\n\thandler.RequestHandler()\n}", "title": "" }, { "docid": "ec740c8410d7e1315abb12f5d02b7248", "score": "0.5840595", "text": "func (c *RootCommand) Run(args []string) error {\n\tlog.Debugf(\"root: %v\", args)\n\tlog.Infof(\"handle first command: profile=%v, timeout=%v, magic.number=%v\", c.profile, c.timeout, c.MagicNumber)\n\treturn nil\n}", "title": "" }, { "docid": "a11f63ad4edd32bfb7c01154957e56ee", "score": "0.5834404", "text": "func (f *Framework) Run(run func() int) {\n\tos.Exit(run())\n}", "title": "" }, { "docid": "2f029096ad1eebf992d7ca3a781b2e48", "score": "0.58270836", "text": "func Run() {\n\tswitch kingpin.MustParse(app.Parse(os.Args[1:])) {\n\tcase serve.FullCommand():\n\t\tfmt.Printf(\"Starting server on %v:%v\\n\", *host, *port)\n\t\tServe(*dbPath, host.String(), *port, false)\n\tcase usersList.FullCommand():\n\t\tListUsers(*dbPath)\n\tcase usersAdd.FullCommand():\n\t\tAddUser(*dbPath, *usersAddEmail, *usersAddName, *usersAddPassword)\n\tcase usersDel.FullCommand():\n\t\tDeleteUser(*dbPath, *usersDelEmail)\n\t}\n}", "title": "" }, { "docid": "b60c6a94c85e4fb666c9c51e9cab0226", "score": "0.5823443", "text": "func (s *Servant) Run() {\n\ts.AddFlags()\n\tflag.Parse()\n\n\thttp.HandleFunc(\"/protocol\", s.ReportRoles)\n\thttp.HandleFunc(\"/\", s.CallHandler)\n\n\tfmt.Printf(\"Servant is listening on port %d\\n\", *s.portFlag)\n\thttp.ListenAndServe(\":\"+strconv.Itoa(*s.portFlag), nil)\n}", "title": "" }, { "docid": "14c5e706f40fca2e906f08587352bdfc", "score": "0.5814208", "text": "func (m *Module) Run(cmd string, args []string) (result string, err error) {\n\n\treturn\n}", "title": "" }, { "docid": "17beec34189dd8be0ade3ef2eecf49e3", "score": "0.5813478", "text": "func Run(hook Webhook, addr string, path string) error {\n\tsrv := &server{\n\t\thook: hook,\n\t\tpath: path,\n\t\tincludePathCheck: true,\n\t}\n\ts := &http.Server{Addr: addr, Handler: srv}\n\n\tDefaultLog.Info(fmt.Sprintf(\"Listening on addr: %s path: %s\", addr, path))\n\treturn s.ListenAndServe()\n}", "title": "" }, { "docid": "b65b17e9602d41071bf1e9de9c5fd3a6", "score": "0.58059555", "text": "func Run(m *testing.M) int {\n\t// It's safe for code to call NewCommand now.\n\trunCalled = true\n\n\tname := os.Args[0]\n\tif !strings.HasPrefix(name, magicString) {\n\t\t// Allow the test suite to continue.\n\t\treturn m.Run()\n\t}\n\n\t// The format is <magic>=<index>=<original executable>, e.g.\n\t// EXECTEST_MAIN_INDEX=3=/usr/local/bin/myexec\n\tcomponents := strings.SplitN(name, \"=\", 3)\n\tindex := components[1]\n\tos.Args[0] = components[2]\n\n\t// Look up the desired Main function.\n\ti, err := strconv.Atoi(index)\n\tif err != nil || i < 0 {\n\t\tpanic(fmt.Sprintf(\"received invalid index %#v from %s\", index, name))\n\t} else if i >= len(mains) {\n\t\tpanic(\"Main functions must be registered using RegisterMains() in init()\")\n\t}\n\n\t// Invoke. This may or may not return.\n\tmains[i]()\n\n\t// The invoked Main might exit itself, but if not we should exit here\n\t// instead of returning control to the test suite.\n\tos.Exit(0)\n\tpanic(\"unreachable\")\n}", "title": "" }, { "docid": "6de96d2db1ee226e91bd287d9b6111c9", "score": "0.57808584", "text": "func (c *Command) Run(args []string) int {\n\tname, config, err := c.readConfig()\n\tif err != nil {\n\t\treturn 1\n\t}\n\tc.instance, err = huton.NewInstance(name, config)\n\tif err != nil {\n\t\tc.UI.Error(err.Error())\n\t\treturn 1\n\t}\n\treturn c.handleSignals()\n}", "title": "" }, { "docid": "ad44404c06cf1f9355b9e283b018b870", "score": "0.57805353", "text": "func (httpd *Httpd) Run() {\n\tfor i := 0; i < len(Signals); i++ {\n\t\tsignal := Signals[i]\n\t\tsignalStr := SignalStrs[i]\n\t\thttp.HandleFunc(httpd.Prefix+\"/\"+signalStr, func(w http.ResponseWriter, r *http.Request) {\n\t\t\terr := httpd.Callback(signal)\n\t\t\tif err != nil {\n\t\t\t\t// If failed to process Callback, http server returns 500\n\t\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\t\tfmt.Fprintf(w, \"Failed to poroxy %s to destination command\", signalStr)\n\t\t\t} else {\n\t\t\t\tfmt.Fprintf(w, \"Successed to proxy %s to destination command\", signalStr)\n\t\t\t}\n\t\t})\n\t}\n\n\thttp.ListenAndServe(fmt.Sprintf(\":%d\", httpd.Port), nil)\n}", "title": "" }, { "docid": "ba2aa2370bc2d8b41d9711046806b2e3", "score": "0.5773457", "text": "func (m *Main) Run(args ...string) error {\r\n\tname, args := cmd.ParseCommandName(args)\r\n\r\n\t// Extract name from args.\r\n\tswitch name {\r\n\tcase \"\", \"help\":\r\n\t\tif err := help.NewCommand().Run(args...); err != nil {\r\n\t\t\treturn fmt.Errorf(\"help: %s\", err)\r\n\t\t}\r\n\tcase \"dumptsmdev\":\r\n\t\tfmt.Fprintf(m.Stderr, \"warning: dumptsmdev is deprecated, use dumptsm instead.\\n\")\r\n\t\tfallthrough\r\n\tcase \"dumptsm\":\r\n\t\tname := dumptsm.NewCommand()\r\n\t\tif err := name.Run(args...); err != nil {\r\n\t\t\treturn fmt.Errorf(\"dumptsm: %s\", err)\r\n\t\t}\r\n\tcase \"export\":\r\n\t\tname := export.NewCommand()\r\n\t\tif err := name.Run(args...); err != nil {\r\n\t\t\treturn fmt.Errorf(\"export: %s\", err)\r\n\t\t}\r\n\tcase \"report\":\r\n\t\tname := report.NewCommand()\r\n\t\tif err := name.Run(args...); err != nil {\r\n\t\t\treturn fmt.Errorf(\"report: %s\", err)\r\n\t\t}\r\n\tcase \"verify\":\r\n\t\tname := verify.NewCommand()\r\n\t\tif err := name.Run(args...); err != nil {\r\n\t\t\treturn fmt.Errorf(\"verify: %s\", err)\r\n\t\t}\r\n\tdefault:\r\n\t\treturn fmt.Errorf(`unknown command \"%s\"`+\"\\n\"+`Run 'influx_inspect help' for usage`+\"\\n\\n\", name)\r\n\t}\r\n\r\n\treturn nil\r\n}", "title": "" }, { "docid": "297c272da8d80a8fd90e54b0f4da1232", "score": "0.57727325", "text": "func (this *Exploit) Run() (err error) {\n\n\texploitFn := this.getExploitFunction()\n\treturn exploitFn()\n}", "title": "" }, { "docid": "bbe43246c0f4e12621f0a985a9fbf7c9", "score": "0.57560956", "text": "func (engine *Engine) Run(addr string, message ...string) error {\n\tec := make(chan error)\n\tgo func() {\n\t\tengine.Server.Handler = engine.HandleRequest\n\t\tec <- listenAndServe(engine, addr)\n\t}()\n\treturn runmsg(addr, ec, append(message, \"HTTP server started at %s\")[0])\n}", "title": "" }, { "docid": "3b336ff0b51b9530be907c1664a53609", "score": "0.5742841", "text": "func (g *Gorgonzola) Run() {\n\tg.setHandlers()\n}", "title": "" }, { "docid": "445a97d3164529a17da2458dade7c146", "score": "0.5732095", "text": "func (s *Server) Run() error {\n\tgo s.updateIPTableRules()\n\n\trtr := mux.NewRouter()\n\t// Flow for the request is as follows:\n\t// 1. If the request is for token, then it will be handled by tokenHandler post validation.\n\t// 2. If the request is for token but the path is invalid, then it will be handled by invalidTokenPathHandler.\n\t// 3. If the request is for host token, then it will be handled by hostTokenHandler.\n\t// 4. If the request is for instance metadata\n\t// 4.1 If blockInstanceMetadata is set to true, then it will be handled by blockInstanceMetadataHandler (deny access to instance metadata).\n\t// 5. If the request is for any other path, it will be proxied to IMDS and the response will be returned to the caller.\n\trtr.PathPrefix(tokenPathPrefix).Handler(appHandler(s.msiHandler))\n\trtr.MatcherFunc(invalidTokenPathMatcher).HandlerFunc(invalidTokenPathHandler)\n\trtr.PathPrefix(hostTokenPathPrefix).Handler(appHandler(s.hostHandler))\n\tif s.BlockInstanceMetadata {\n\t\trtr.PathPrefix(instancePathPrefix).HandlerFunc(forbiddenHandler)\n\t}\n\trtr.PathPrefix(\"/\").HandlerFunc(s.defaultPathHandler)\n\n\tklog.Infof(\"listening on %s:%s\", s.NMIHost, s.NMIPort)\n\tif err := http.ListenAndServe(fmt.Sprintf(\"%s:%s\", s.NMIHost, s.NMIPort), rtr); err != nil {\n\t\tklog.Fatalf(\"error creating http server: %+v\", err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "6a17bcfb8ee593d189e9795923534ccb", "score": "0.57196414", "text": "func (e *SaltpackVerify) Run(m libkb.MetaContext) error {\n\tif len(e.arg.Opts.Signature) > 0 {\n\t\treturn e.detached(m)\n\t}\n\treturn e.attached(m)\n}", "title": "" }, { "docid": "36ad0dd6d590d8df3127d2ad71765012", "score": "0.57039356", "text": "func (s *Server) Run(action string) error {\n\tswitch action {\n\tcase \"start\":\n\t\treturn s.start()\n\tdefault:\n\t\treturn fmt.Errorf(\"unknown action %s\", action)\n\t}\n}", "title": "" }, { "docid": "365788e64a8a561fe4c5f8a4b9e72dc7", "score": "0.5690414", "text": "func (self *Server) Handle(req *Request) *Response {\n var script *Script\n resp := &Response{}\n\n // Handle built-in commands\n if req.ScriptName == \"help\" {\n resp.StatusCode = 200\n resp.Body = self.getScriptHelp()\n return resp\n } else if req.ScriptName == \"status\" {\n if statii, statusErr := self.getRunStatii(req.Params[\"id\"]); statusErr != nil {\n resp.StatusCode = 400\n resp.Error = statusErr\n resp.ErrorStr = statusErr.Error()\n } else {\n resp.StatusCode = 200\n resp.RunStatii = statii\n }\n return resp\n } else if req.ScriptName == \"view\" {\n if bashScript, viewErr := self.getBashScript(req.Params[\"id\"]); viewErr != nil {\n resp.StatusCode = 400\n resp.Error = viewErr\n resp.ErrorStr = viewErr.Error()\n } else {\n resp.StatusCode = 200\n resp.Body = bashScript\n }\n return resp\n } else if req.ScriptName == \"kill\" {\n if killErr := self.killRun(req.Params[\"id\"]); killErr != nil {\n resp.StatusCode = 400\n resp.Error = killErr\n resp.ErrorStr = killErr.Error()\n } else {\n resp.StatusCode = 200\n resp.Body = fmt.Sprintf(\"Sent kill to ScriptRun %s\", req.Params[\"id\"])\n }\n return resp\n } else if req.ScriptName == \"version\" {\n resp.StatusCode = 200\n resp.Body = VERSION\n return resp\n } else if req.ScriptName == \"purge\" {\n resp.StatusCode = 200\n resp.Body = fmt.Sprintf(\"Purged %d ScriptRuns from status history\", self.purgeScriptRuns(0))\n return resp\n }\n\n // Handle script commands\n func() {\n self.ScriptsLock.Lock()\n defer self.ScriptsLock.Unlock()\n script = self.Scripts[req.ScriptName]\n }()\n if script == nil {\n resp.StatusCode = 404\n resp.Error = errors.New(\"Script or command does not exist\")\n resp.ErrorStr = \"Script or command does not exist\"\n return resp\n }\n scriptRun, err := self.makeScriptRun(script, req)\n if err != nil {\n resp.StatusCode = 400\n resp.Error = err\n resp.ErrorStr = err.Error()\n return resp\n }\n if scriptRun.IsSync {\n scriptRun.run()\n } else {\n go scriptRun.run()\n }\n resp.StatusCode = 200\n resp.RunStatii = []*ScriptRunStatus{scriptRun.Status()}\n return resp\n}", "title": "" }, { "docid": "dbde5a37bd1b517e90be44a51c385fce", "score": "0.56903523", "text": "func Run() int {\n\tapp := makeApp()\n\n\tapp.Before = func(c *cli.Context) error {\n\t\tif c.Args().Len() > 0 && c.Args().Slice()[0] == \"client\" {\n\t\t\terr := runClient(c, app)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t} else if c.Args().Len() > 0 && c.Args().Slice()[0] == \"dump\" {\n\t\t\terr := runDump(c, app)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t} else if c.Args().Len() > 0 && c.Args().Slice()[0] == \"server\" {\n\t\t\terr := runServer(c, app)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t\treturn nil\n\t}\n\n\tapp.Run(os.Args)\n\treturn 0\n}", "title": "" }, { "docid": "e220b607779cbfebe49fc3a42889a611", "score": "0.56848747", "text": "func (s *Server) Run() error {\n\treturn s.Serve(s.Handler)\n}", "title": "" }, { "docid": "24d2674ec59b4dcbb67ae968a3b357df", "score": "0.5681677", "text": "func Run() {\n\thandleRoutes()\n\trouter.Run()\n}", "title": "" }, { "docid": "ea96300f30a3f5451106e9bfbd775e0a", "score": "0.5669967", "text": "func RunHandlers() {\n\tExecuteHandlers()\n\tClearHandlers()\n}", "title": "" }, { "docid": "038c90a99b14bfb5c7bfacb04f481e37", "score": "0.5659065", "text": "func (h *Handler) Run() {\n\tlog.Printf(\"Listening on %s\", h.Cfg.Server.Port)\n\th.listenErrCh <- grace.Serve(h.Cfg.Server.Port, myrouter.WrapperHandler(h.Metric.DDogSvcMetric))\n}", "title": "" }, { "docid": "67d240d187e42e0c5deaaf4873f22d7d", "score": "0.5650157", "text": "func (r *stubCmdRunner) Run(ctx context.Context, cmd string, args ...string) error {\n\treturn nil\n}", "title": "" }, { "docid": "d756c637b5a6e88945c4746863be95ca", "score": "0.56204003", "text": "func (t *GuavaChaincode) Run(stub shim.ChaincodeStubInterface, function string, args []string) ([]byte, error) {\n\tfmt.Println(\"run is running \" + function)\n\treturn t.Invoke(stub, function, args)\n}", "title": "" }, { "docid": "7317281249fe513dd1dcaa6d1b63c76b", "score": "0.55995136", "text": "func (f *FakeServer) Run(config apisrv.Config) {}", "title": "" }, { "docid": "5e5fc29079d317f7f1b475ac58e73fc3", "score": "0.55962914", "text": "func (h *Handler) RunHandlers() error {\n\n\tfmt.Println(\"Started\")\n\n\thttp.HandleFunc(\"/\", h.DecodeBody)\n\n\thttp.HandleFunc(\"/go\", h.parseTemplateGo)\n\n\thttp.HandleFunc(fmt.Sprintf(\"/go-%s\", \"app\"), adminCabinetTemplateParse)\n\n\thttp.Handle(\"/assets/\", http.StripPrefix(\"/assets/\",\n\t\thttp.FileServer(http.Dir(\"assets\"))))\n\n\t//http.HandleFunc(\"/roshan\", getRoshanTime)\n\tif err := http.ListenAndServe(\"localhost:3000\", nil); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0d65117c0cddc1faef051f6db41fba50", "score": "0.55926955", "text": "func (p *Plugin) Run() {\n\tp.Log(\"notice\", fmt.Sprintf(\"Start log handler v%s\", p.Version))\n\tbg := p.QChan.Data.Join()\n\tfor {\n\t\tselect {\n\t\tcase val := <-bg.Read:\n\t\t\tswitch val.(type) {\n\t\t\tcase qtypes_messages.Message:\n\t\t\t\tqm := val.(qtypes_messages.Message)\n\t\t\t\tif qm.StopProcessing(p.Plugin, false) {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tp.Log(\"info\" , fmt.Sprintf(\"%-15s : %s\", strings.Join(qm.SourcePath, \"->\"), qm.Message))\n\t\t\tcase qcache_inventory.ContainerRequest:\n\t\t\t\tcontinue\n\t\t\tdefault:\n\t\t\t\tp.Log(\"info\", fmt.Sprintf(\"Dunno type '%s': %v\", reflect.TypeOf(val), val))\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "77077d37851a88aa1cbcd8b47700e3f0", "score": "0.5577135", "text": "func (app *Application) Run() {\n\tapp.ListenAndServe()\n\n\tfor _, callback := range app.onStart {\n\t\tcallback()\n\t}\n\n\tapp.TestManifest()\n\tapp.TestRoutes()\n\tapp.Wait()\n\tapp.Shutdown()\n}", "title": "" }, { "docid": "4214713c56d6a97c5d38b05892ca3982", "score": "0.557611", "text": "func (s *Server) Run() {\n\n\ts.instance.HandleFunc(\"/\", func(w http.ResponseWriter, r *http.Request) {\n\n\t})\n\n\ttestRoute := routes.RouteConfig{\n\t\tPath: \"/go/\",\n\t\tServer: \"https://localhost\",\n\t\tLimit: 200,\n\t\tTime: time.Second,\n\t\tLimitType: routes.OriginIPUserAgent,\n\t}\n\n\ts.instance.HandleFunc(\"/go\", middleware.TrackUser(testRoute, s.Metrics, middleware.IsAllowed(testRoute, s.Metrics,\n\t\t(func(w http.ResponseWriter, r *http.Request) {\n\t\t\tw.Write([]byte(\"Go!\"))\n\t\t}))))\n\n\tfor _, route := range s.routes {\n\t\tlog.Println(\"Adding route: \", route)\n\t\ts.instance.HandleFunc(route.Path, middleware.TrackUser(route, s.Metrics, middleware.IsAllowed(route, s.Metrics, s.processRequest(route.Server))))\n\t}\n\n\tlistenPort := \":\" + strconv.Itoa(s.port)\n\n\tlog.Fatal(http.ListenAndServe(listenPort, middleware.WrapHandlerWithMetric(s.Metrics, s.instance)))\n\n}", "title": "" }, { "docid": "d1dbc6c66125c3f12a1ea0bdfa7a46ae", "score": "0.5564091", "text": "func main() { // ignore the error\n\tfmt.Printf(\"Running %v as pid %d\\n\", os.Args[1:], os.Getpid())\n\n\tswitch os.Args[1]{\n\tcase \"run\":\n\t\tmyrun()\n\tcase \"exec\":\n\t\tmyexec()\n\tcase \"mychild\":\n\t\tmychild()\n\tdefault:\n\t\tpanic(\"help\")\n\t}\n}", "title": "" }, { "docid": "fa297b9b5e75bf32488ff58ca7cccd55", "score": "0.5562542", "text": "func Run(ev events.EventHandler) error {\n\tEvents = ev\n\n\thttp.HandleFunc(\"/alexa\", Handler)\n\n\treturn http.ListenAndServe(Host, handlers.LoggingHandler(os.Stdout,\n\t\thandlers.ProxyHeaders(http.DefaultServeMux)))\n}", "title": "" }, { "docid": "1c69511f0570cb0e3ff32360ba035b00", "score": "0.5562223", "text": "func (c *HTTPHandler) Run() {\n\tc.listenErrCh <- grace.ServeHTTP(c.cfg.Server.HTTPPort, router.GetHandler())\n}", "title": "" }, { "docid": "15c8f11c16b0335be004f5748b70f482", "score": "0.5559252", "text": "func (c *DispatchCommand) Run(args []string) int {\n\n\tvar meta []string\n\tvar addr, logLevel string\n\n\tflags := c.Meta.FlagSet(\"dispatch\", FlagSetVars)\n\tflags.Usage = func() { c.UI.Output(c.Help()) }\n\tflags.Var((*flaghelper.StringFlag)(&meta), \"meta\", \"\")\n\tflags.StringVar(&addr, \"address\", \"\", \"\")\n\tflags.StringVar(&logLevel, \"log-level\", \"INFO\", \"\")\n\n\tif err := flags.Parse(args); err != nil {\n\t\treturn 1\n\t}\n\n\targs = flags.Args()\n\tif l := len(args); l < 1 || l > 2 {\n\t\tc.UI.Error(c.Help())\n\t\treturn 1\n\t}\n\n\tlogging.SetLevel(logLevel)\n\n\tjob := args[0]\n\tvar payload []byte\n\tvar readErr error\n\n\tif len(args) == 2 {\n\t\tswitch args[1] {\n\t\tcase \"-\":\n\t\t\tpayload, readErr = ioutil.ReadAll(os.Stdin)\n\t\tdefault:\n\t\t\tpayload, readErr = ioutil.ReadFile(args[1])\n\t\t}\n\t\tif readErr != nil {\n\t\t\tc.UI.Error(fmt.Sprintf(\"Error reading input data: %v\", readErr))\n\t\t\treturn 1\n\t\t}\n\t}\n\n\tmetaMap := make(map[string]string, len(meta))\n\tfor _, m := range meta {\n\t\tsplit := strings.SplitN(m, \"=\", 2)\n\t\tif len(split) != 2 {\n\t\t\tc.UI.Error(fmt.Sprintf(\"Error parsing meta value: %v\", m))\n\t\t\treturn 1\n\t\t}\n\t\tmetaMap[split[0]] = split[1]\n\t}\n\n\tsuccess := levant.TriggerDispatch(job, metaMap, payload, addr)\n\tif !success {\n\t\treturn 1\n\t}\n\n\treturn 0\n}", "title": "" }, { "docid": "e90a51d54e6597504ee6183e22743493", "score": "0.5558731", "text": "func main() {\n\tswitch os.Args[1] {\n\tcase \"run\":\n\t\trun()\n\tcase \"child\":\n\t\tchild()\n\tdefault:\n\t\tpanic(\"what??\")\n\t}\n}", "title": "" }, { "docid": "ace44b2039bc76bb7ffb5e5b5fe3170d", "score": "0.5555953", "text": "func Run() {\n\t// server init\n\tif err := cmd.Init(); err != nil {\n\t\tpanic(err)\n\t}\n\tif err := cmd.Configs.GeneratePortsMap(); err != nil {\n\t\tpanic(err)\n\t}\n\tbootstrap.RegisterFramework()\n\tbootstrap.SetHandlers()\n\tif err := chassis.Init(); err != nil {\n\t\tlager.Logger.Error(\"Go chassis init failed, Mesher is not available: \" + err.Error())\n\t\tpanic(err)\n\t}\n\tif err := bootstrap.Start(); err != nil {\n\t\tlager.Logger.Error(\"Bootstrap failed: \" + err.Error())\n\t\tpanic(err)\n\t}\n\tlager.Logger.Infof(\"Version is %s\", version.Ver().Version)\n\tif err := health.Run(); err != nil {\n\t\tlager.Logger.Error(\"Health manager start failed: \" + err.Error())\n\t\tpanic(err)\n\t}\n\tprofile()\n\tchassis.Run()\n}", "title": "" }, { "docid": "b118c629c94b0d6d67a8481e431d6677", "score": "0.5552379", "text": "func (b *BIOS) dispatch(hookName string, args []string, f func() error) error {\n\tfmt.Printf(\"---- BEGIN HOOK %q ----\\n\", hookName)\n\n\t// check if `hook_[hookName]` exists or `hook_[hookName].sh` exists, and use that as a command,\n\t// otherwise, print that the hook is not present.\n\tfilePaths := []string{\n\t\tfmt.Sprintf(\"./hook_%s\", hookName),\n\t\tfmt.Sprintf(\"./hook_%s.sh\", hookName),\n\t}\n\tvar executable string\n\tfor _, fl := range filePaths {\n\t\tif _, err := os.Stat(fl); err == nil {\n\t\t\texecutable = fl\n\t\t}\n\t}\n\n\tif executable == \"\" {\n\t\tfmt.Printf(\" - Hook not found (searched %q)\\n\", filePaths)\n\t\treturn nil\n\t}\n\n\tcmd := exec.Command(executable, args...)\n\tcmd.Stdout = os.Stdout\n\tcmd.Stderr = os.Stderr\n\tcmd.Stdin = os.Stdin\n\tcmd.Env = os.Environ()\n\n\t//fmt.Printf(\" Executing hook: %q\\n\", cmd.Args)\n\n\terr := cmd.Run()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfmt.Printf(\"---- END HOOK %q ----\\n\", hookName)\n\n\treturn nil\n}", "title": "" }, { "docid": "b099f3924efa7645d2192608050b5105", "score": "0.55494845", "text": "func Run() {\n\thelper.LogF(\"Service bootstrap error\", RootCmd.Execute())\n}", "title": "" }, { "docid": "0d6a5b4cc407e8aeae2010201e6485fe", "score": "0.5547293", "text": "func (n *node) Run() {\n\tlog.Infof(\"node %v start running with %d handles\", n.id, len(n.handles))\n\tif len(n.handles) > 0 {\n\t\tgo n.handle()\n\t\tn.recv()\n\t}\n\t//n.http()\n}", "title": "" }, { "docid": "4c8f608087e678478f5fa48a2d4f932b", "score": "0.55464727", "text": "func (s *Serve) Run() {\n\tif root == \"\" {\n\t\tif wd, err := os.Getwd(); err != nil {\n\t\t\tpanic(err)\n\t\t} else {\n\t\t\troot = wd\n\t\t}\n\t} else if !filepath.IsAbs(root) {\n\t\tpanic(\"fileroot must be an absolute path\")\n\t}\n\tvar writer io.Writer\n\tif logFilePath != \"\" {\n\t\tif !filepath.IsAbs(logFilePath) {\n\t\t\tlogFilePath = RelPath(logFilePath)\n\t\t}\n\t\tif f, err := os.OpenFile(logFilePath, os.O_RDWR|os.O_CREATE, 0666); err != nil {\n\t\t\tpanic(err)\n\t\t} else {\n\t\t\twriter = f\n\t\t}\n\t} else {\n\t\twriter = os.Stdout\n\t}\n\tlogger = log.New(writer, \"\", 0)\n\tgo func() {\n\t\tfor msg := range messages {\n\t\t\tlogger.Println(msg...)\n\t\t}\n\t}()\n\tclose(Booting)\n\tserveStatic()\n\thttp.HandleFunc(\"/\", Handler)\n\tLog(\"Running Gadget at 0.0.0.0:\" + port + \"...\")\n\terr := http.ListenAndServe(\":\"+port, nil)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "a8ee8663728b06e6ccc804530d31fcc8", "score": "0.55400336", "text": "func main() {\n switch os.Args[1] {\n case \"run\":\n run()\n case \"child\":\n child()\n default:\n panic(\"incorrect argument\")\n }\n}", "title": "" }, { "docid": "8c89c9f03fd662bfa08fd152d2387f44", "score": "0.5534984", "text": "func (inter *Interface) Run() {\n\tinter.ValidateArguments()\n\t// argument parsing using flags\n\tcreateWalletCommand := flag.NewFlagSet(\"createwallet\", flag.ExitOnError)\n\tlistAddressesCommand := flag.NewFlagSet(\"listaddresses\", flag.ExitOnError)\n\tcreateBlockChainCommand := flag.NewFlagSet(\"createblockchain\", flag.ExitOnError)\n\tsendCommand := flag.NewFlagSet(\"send\", flag.ExitOnError)\n\tgetBalanceCommand := flag.NewFlagSet(\"getbalance\", flag.ExitOnError)\n\tprintChainCommand := flag.NewFlagSet(\"printchain\", flag.ExitOnError)\n\t// parameters for the commands\n\tcreateBlockChainAddress := createBlockChainCommand.String(\"address\", \"\", \"The Address to send Reward to.\")\n\tsendFrom := sendCommand.String(\"from\", \"\", \"Source Wallet Address\")\n\tsendTo := sendCommand.String(\"to\", \"\", \"Destination Wallet Address\")\n\tsendAmount := sendCommand.Int(\"amount\", 0, \"Amount To Send\")\n\tgetBalanceAddress := getBalanceCommand.String(\"address\", \"\", \"The Address to find Balance.\")\n\t// switching based on the command parsed\n\tswitch os.Args[1] {\n\tcase \"help\":\n\t\tinter.Help()\n\tcase \"createwallet\":\n\t\terr := createWalletCommand.Parse(os.Args[2:])\n\t\tblockchain.PanicHandle(err)\n\tcase \"listaddresses\":\n\t\terr := listAddressesCommand.Parse(os.Args[2:])\n\t\tblockchain.PanicHandle(err)\n\tcase \"createblockchain\":\n\t\terr := createBlockChainCommand.Parse(os.Args[2:])\n\t\tblockchain.PanicHandle(err)\n\tcase \"send\":\n\t\terr := sendCommand.Parse(os.Args[2:])\n\t\tblockchain.PanicHandle(err)\n\tcase \"getbalance\":\n\t\terr := getBalanceCommand.Parse(os.Args[2:])\n\t\tblockchain.PanicHandle(err)\n\tcase \"printchain\":\n\t\terr := printChainCommand.Parse(os.Args[2:])\n\t\tblockchain.PanicHandle(err)\n\tdefault:\n\t\tinter.PrintVersionInfo()\n\t\truntime.Goexit()\n\t}\n\tif createWalletCommand.Parsed() {\n\t\tinter.CreateWallet()\n\t}\n\tif listAddressesCommand.Parsed() {\n\t\tinter.ListAddresses()\n\t}\n\tif createBlockChainCommand.Parsed() {\n\t\tif *createBlockChainAddress == \"\" {\n\t\t\tcreateBlockChainCommand.Usage()\n\t\t\truntime.Goexit()\n\t\t}\n\t\tinter.CreateBlockChain(*createBlockChainAddress)\n\t}\n\tif sendCommand.Parsed() {\n\t\tif *sendFrom == \"\" || *sendTo == \"\" || *sendAmount <= 0 {\n\t\t\tsendCommand.Usage()\n\t\t\truntime.Goexit()\n\t\t}\n\t\tinter.Send(*sendFrom, *sendTo, *sendAmount)\n\t}\n\tif getBalanceCommand.Parsed() {\n\t\tif *getBalanceAddress == \"\" {\n\t\t\tgetBalanceCommand.Usage()\n\t\t\truntime.Goexit()\n\t\t}\n\t\tinter.GetBalance(*getBalanceAddress)\n\t}\n\tif printChainCommand.Parsed() {\n\t\tinter.PrintChain()\n\t}\n}", "title": "" }, { "docid": "dffe9f3855a46d1c03e8f86a3ba68b23", "score": "0.5533959", "text": "func (a *App) Run(addr string) (err error) {\n\ta.addHandles()\n\tlog.Printf(\"Listening on %v\", addr)\n\treturn http.ListenAndServe(addr, a.Router)\n}", "title": "" }, { "docid": "8622f8958a136a416965f507a79a84a1", "score": "0.5533774", "text": "func (c *VersionCommand) Run(_ []string) int {\n\tc.Ui.Output(\"Helix v\" + c.Version)\n\n\treturn 0\n}", "title": "" }, { "docid": "a7f51e3507387c1ee84bc75884fe754a", "score": "0.5530991", "text": "func Run() {\n\tconf := backendConfig.LoadConfig(configFile)\n\tmenu.Init(conf)\n\tcharge.Init(conf)\n\tbalance.Init(conf)\n\n\tr := newRouter()\n\thttp.Handle(\"/\", r)\n}", "title": "" }, { "docid": "72035d708cead7ecdbb859b5da87af3d", "score": "0.5518702", "text": "func (l *Router) Run(killChan chan struct{}) {\n\tvar rb remoteButton\n\tmatch := 0\n\tfor {\n\t\tselect {\n\t\tcase <-killChan:\n\t\t\treturn\n\t\tcase event := <-l.receive:\n\t\t\tif l.defaultHandler != nil {\n\t\t\t\tl.defaultHandler(event)\n\t\t\t} else {\n\t\t\t\tmatch = 0\n\t\t\t\t// Check for exact match\n\t\t\t\trb.remote = event.Remote\n\t\t\t\trb.button = event.Button\n\t\t\t\tif h, ok := l.handlers[rb]; ok {\n\t\t\t\t\th(event)\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\t// Check for pattern matches\n\t\t\t\tfor k, h := range l.handlers {\n\t\t\t\t\tremoteMatched, _ := filepath.Match(k.remote, event.Remote)\n\t\t\t\t\tbuttonMatched, _ := filepath.Match(k.button, event.Button)\n\n\t\t\t\t\tif remoteMatched && buttonMatched {\n\t\t\t\t\t\th(event)\n\t\t\t\t\t\tmatch = 1\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\tif match == 0 {\n\t\t\t\t\tlog.Println(\"No match for \", event)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "a1a772eff02e805e91421ac498a4d894", "score": "0.5516716", "text": "func (b PingBot) Run(c *SlashCommand) string {\n\tgo b.DeferredAction(c)\n\treturn \"\"\n}", "title": "" }, { "docid": "89f8737e30df9837140c98857efc1c80", "score": "0.5515635", "text": "func runCommand(command string) int {\n Trace.Printf(\"runCommand(%s)\\n\", command)\n\n switch {\n case command == \"list\" || command == \"dispatch\":\n return chloeDispatch(command)\n }\n panic(command + \" is not a valid command, this code should not be hit!\")\n return 1\n}", "title": "" }, { "docid": "85ced0dd72585a42e10cf8c75de27f66", "score": "0.5506693", "text": "func (router *Handler) Run(port string) {\n\trouter.Engine.Run(port)\n}", "title": "" }, { "docid": "fe580c558b0c5c272bb179cba6423a10", "score": "0.5505997", "text": "func actionRun(_ *core.Command, args []string) int {\n\tgps := getGoPath()\n\tif len(gps) == 0 {\n\t\tcore.LogError(\"$GOPATH not found, Please set $GOPATH in your environment variables.\")\n\t\tos.Exit(2)\n\t}\n\n\texit := make(chan bool)\n\tcwd, _ := os.Getwd()\n\tappName := path.Base(cwd)\n\n\tcore.Log.Print(\"\")\n\tif len(args) > 0 {\n\t\tcalled := args[0]\n\n\t\tif called != \"\" {\n\t\t\tappName = called\n\t\t}\n\t}\n\n\tvar paths []string\n\tvar files []string\n\n\treadDirectory(cwd, &paths)\n\tcore.Watch(appName, paths, files)\n\tcore.Build()\n\n\tfor {\n\t\tselect {\n\t\tcase <-exit:\n\t\t\truntime.Goexit()\n\t\t}\n\t}\n}", "title": "" }, { "docid": "86f6b9ed6aff4a245251dd5e5fdc66d2", "score": "0.5495513", "text": "func (service *HTTPServer) Run() error {\n\treturn service.engine.Run(service.laddr)\n}", "title": "" }, { "docid": "40731e259d0c73f377255bad78fde527", "score": "0.54946315", "text": "func Run(p specs.LimePlugin, executableName string) {\n\tctx := kong.Parse(&cli,\n\t\tkong.Name(executableName),\n\t\tkong.Description(p.Description()),\n\t\tkong.UsageOnError())\n\n\tif cli.Silent && !cli.Verbose {\n\t\tzerolog.SetGlobalLevel(zerolog.PanicLevel)\n\t} else {\n\t\tif !cli.Verbose {\n\t\t\tlogLevel, err := zerolog.ParseLevel(cli.LogLevel)\n\t\t\tif err == nil {\n\t\t\t\tzerolog.SetGlobalLevel(logLevel)\n\t\t\t}\n\t\t} else {\n\t\t\tzerolog.SetGlobalLevel(zerolog.DebugLevel)\n\t\t}\n\t}\n\n\terr := ctx.Run(&Context{plugin: p})\n\tctx.FatalIfErrorf(err)\n}", "title": "" }, { "docid": "2c4e0235d9a39fc11baa9476b8fe29d8", "score": "0.54934984", "text": "func Run(configPath string) {\n\tcfg, err := config.Init(configPath)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to init config: %v\", err)\n\t}\n\n\tlg, err := logger.New(cfg.Logger.Level, cfg.Logger.Format)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to init logger: %v\", err)\n\t}\n\n\t// Dependencies\n\tdb, err := postgres.ConnectToDB(cfg.PostgresDB)\n\tif err != nil {\n\t\tlg.Fatalf(\"failed to connect to db: %v\", err)\n\t}\n\tdefer func() {\n\t\tif err = db.Close(); err != nil {\n\t\t\tlg.Errorf(\"failed to close db: %v\", err)\n\t\t}\n\t}()\n\n\tif cfg.PostgresDB.MigrationMode {\n\t\tif err = postgres.MigrateSchema(db.DB, cfg.PostgresDB); err != nil {\n\t\t\tlog.Fatalf(\"failed to do migration: %v\", err)\n\t\t}\n\t}\n\n\t// Repo, Service & API Handlers\n\trepo := repository.NewRepository(cfg, db)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to create repository: %v\", err)\n\t}\n\n\tsvc := service.NewService(repo)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to create service: %v\", err)\n\t}\n\n\th := handler.New(cfg, lg, svc)\n\n\t// HTTP Server\n\tsrv := server.New(cfg.Port, h.InitRoutes())\n\tgo func() {\n\t\tif err = srv.Run(); err != nil && !errors.Is(err, http.ErrServerClosed) {\n\t\t\tlg.Fatalf(\"error occurred while running http server: %v\", err)\n\t\t}\n\t}()\n\n\tlg.Infof(\"service started on port %s\", cfg.Port)\n\n\t// Graceful Shutdown\n\tquit := make(chan os.Signal, 1)\n\tsignal.Notify(quit, os.Interrupt, syscall.SIGTERM, syscall.SIGQUIT)\n\t<-quit\n\n\tlg.Info(\"service shutting down\")\n\n\tif err = srv.Shutdown(context.Background()); err != nil {\n\t\tlg.Errorf(\"failed to shut down: %v\", err)\n\t}\n}", "title": "" }, { "docid": "c7df49aaab3be841b52edc5e8f04243c", "score": "0.5493002", "text": "func (b *Blaster) Run() {\n\n\tgo b.h.run()\n\n\thttp.HandleFunc(\"/\", serveHome)\n\thttp.HandleFunc(\"/ws\", b.GetWSHandler())\n\n\tfmt.Printf(\"Listening on: %s\\n\", *b.addr)\n\tlog.Fatal(http.ListenAndServe(*b.addr, nil))\n}", "title": "" }, { "docid": "0507c4b1b49c6457760a790f7e582485", "score": "0.5492589", "text": "func Run() (err error) {\n\n\t// Register Message Queue handler\n\thandler := mq.MsgHandler{Handler: msgHandler, UserData: nil}\n\ttce.handlerId, err = tce.mqLocal.RegisterHandler(handler)\n\tif err != nil {\n\t\tlog.Error(\"Failed to listen for sandbox updates: \", err.Error())\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "b772d97df39f0844ea1527fcdb576a8f", "score": "0.5491851", "text": "func (s *Server) Run(port int) error {\n\tif s.AuthUser == \"\" || s.AuthPasswd == \"\" {\n\t\tlog.Print(\"[WARN] extension server runs without auth\")\n\t}\n\tif s.funcs.m == nil && len(s.funcs.m) == 0 {\n\t\treturn errors.Errorf(\"nothing mapped for dispatch, Add has to be called prior to Run\")\n\t}\n\n\trouter := chi.NewRouter()\n\trouter.Use(middleware.Throttle(1000), middleware.RealIP, R.Recoverer(log.Default()))\n\trouter.Use(R.AppInfo(s.AppName, \"umputun\", s.Version), R.Ping)\n\tlogInfoWithBody := logger.New(logger.Log(log.Default()), logger.WithBody, logger.Prefix(\"[INFO]\")).Handler\n\trouter.Use(middleware.Timeout(5 * time.Second))\n\trouter.Use(logInfoWithBody, tollbooth_chi.LimitHandler(tollbooth.NewLimiter(1000, nil)), middleware.NoCache)\n\trouter.Use(s.basicAuth)\n\n\trouter.Post(s.API, s.handler)\n\n\ts.httpServer.Lock()\n\ts.httpServer.Server = &http.Server{\n\t\tAddr: fmt.Sprintf(\":%d\", port),\n\t\tHandler: router,\n\t\tReadHeaderTimeout: 5 * time.Second,\n\t\tWriteTimeout: 10 * time.Second,\n\t\tIdleTimeout: 30 * time.Second,\n\t}\n\ts.httpServer.Unlock()\n\n\tlog.Printf(\"[INFO] listen on %d\", port)\n\treturn s.httpServer.ListenAndServe()\n}", "title": "" }, { "docid": "a176b354746c55f3fb2b7c00f6b81500", "score": "0.549062", "text": "func runHandler(\n\tw http.ResponseWriter,\n\tpathMatches, dataMatches []string,\n\thandler *matchHandler) {\n\tinputValues := make(\n\t\t[]reflect.Value,\n\t\t0,\n\t\tlen(pathMatches)+len(dataMatches))\n\tfor _, value := range pathMatches {\n\t\tinputValues = append(inputValues, reflect.ValueOf(value))\n\t}\n\tfor _, value := range dataMatches {\n\t\tinputValues = append(inputValues, reflect.ValueOf(value))\n\t}\n\tresult := handler.handler.Call(inputValues)\n\tswitch len(result) {\n\tcase 0:\n\t\tio.WriteString(w, \"\")\n\tcase 1:\n\t\tio.WriteString(w, result[0].String())\n\tdefault:\n\t\tif result[1].IsNil() {\n\t\t\tio.WriteString(w, result[0].String())\n\t\t} else {\n\t\t\t// convert result[1] to error type and call String method\n\n\t\t\terrorMethod := result[1].MethodByName(\"Error\")\n\t\t\terrorString := errorMethod.Call(nil)[0].String()\n\t\t\thttp.Error(w, errorString, 500)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "53d011ebed1ee32c4d60cab4e081f9f5", "score": "0.5486746", "text": "func (h *HealthCheck) Run() {\n\tres := h.fn()\n\tfor _, s := range h.sinks {\n\t\tlog.Debugf(\"Emitting %s result (%s) to %v\", h.Name, res.Result, s.Name())\n\t\ts.Emit(h.Name, h.Type, res)\n\t}\n}", "title": "" }, { "docid": "f27e8946cfb5dbfd8be413a0fb5ddbce", "score": "0.54835093", "text": "func (p *Proxy) Run() error {\n\n\thttp.HandleFunc(\"/\", func(w http.ResponseWriter, r *http.Request) {\n\t\t// strip prefix\n\t\tr.URL.Path = strings.TrimPrefix(r.URL.Path, p.config.Proxy.BasePath)\n\t\tr.RequestURI = strings.TrimPrefix(r.RequestURI, p.config.Proxy.BasePath)\n\n\t\t// default router\n\t\tp.router.ServeHTTP(w, r)\n\t})\n\n\treturn http.ListenAndServe(p.config.Proxy.Address, nil)\n}", "title": "" }, { "docid": "5b2b27ae075911ac1059b078f252a521", "score": "0.54807645", "text": "func (c *case_) runHandler(h http.Handler) error {\n\tw := httptest.NewRecorder()\n\tr, err := c.newRequest(c.url)\n\tif err != nil {\n\t\treturn err\n\t}\n\th.ServeHTTP(w, r)\n\treturn c.check(w.Result(), w.Body.String())\n}", "title": "" }, { "docid": "f66c89f04dfea05c0083480f4f5bc85a", "score": "0.54768425", "text": "func (a *API) Run() {\n\tgin.SetMode(gin.ReleaseMode)\n\n\tapi := gin.New()\n\tapi.Use(a.logger())\n\tapi.Use(gin.Recovery())\n\tapi.Use(a.auth())\n\n\twg := new(sync.WaitGroup)\n\n\tapi.POST(\"/run\", func(c *gin.Context) {\n\t\ttext := c.PostForm(\"text\")\n\t\ta.Log.Printf(\"run handler recieve: %s command\", text)\n\t\twg.Add(1)\n\t\tgo a.Service.Run(text, wg)\n\t\twg.Wait()\n\t\tres := a.Service.GetResult()\n\t\ta.Log.Println(res)\n\t\tvar result string\n\n\t\tif res.IsOk {\n\t\t\tresult = \"DONE!\"\n\t\t} else {\n\t\t\tresult = fmt.Sprintf(\"Cannot execute your comand, error: %s\", res.Stdout)\n\t\t}\n\n\t\tc.JSON(200, gin.H{\n\t\t\t\"text\": result,\n\t\t})\n\t})\n\tapi.Run(strings.Join([]string{\":\", strconv.Itoa(a.Port)}, \"\"))\n}", "title": "" }, { "docid": "b432033ed2130ef5acb1ec087fb2a31e", "score": "0.54714185", "text": "func (cli *CLI)Run() {\n\t//Get all args\n\targs := os.Args\n\tif len(args) < 2{\n\t\tfmt.Println(Usage)\n\t\treturn\n\t}\n\t//Execute commands\n\tcmd := args[1]\n\tswitch cmd {\n\tcase \"printRChain\":\n\t\tcli.PrintBlockChain()\n\tcase \"printChain\":\n\t\tcli.PrintRBlockChain()\n\tcase \"getBalance\":\n\t\tif len(args) == 4 && args[2] == \"--address\" {\n\t\t\taddress := args[3]\n\t\t\tcli.getBalance(address)\n\t\t}else {\n\t\t\tfmt.Println(Usage)\n\t\t}\n\tcase \"send\":\n\t\tif len(args) != 7{\n\t\t\tfmt.Println(Usage)\n\t\t\treturn\n\t\t}\n\t\tfrom, to, miner, data := args[2], args[3], args[5], args[6]\n\t\tamount, _ := strconv.ParseFloat(args[4], 64)\n\t\tfmt.Println(\"转账开始...\")\n\t\tcli.send(from, to, amount, miner, data)\n\tcase \"newWallet\":\n\t\tcli.NewWallet()\n\tcase \"listAddresses\":\n\t\tcli.ListAddresses()\n\tdefault:\n\t\tfmt.Println(Usage)\n\t}\n}", "title": "" }, { "docid": "8732090a326904f24b0bfa083ae42dd6", "score": "0.54703534", "text": "func (s *Server) Run(h http.Handler) {\n\tfmt.Println(s.Message())\n\n\tlog.Printf(\"Listening at %s\", s.Address())\n\tlog.Fatal(http.ListenAndServe(s.Address(), h))\n}", "title": "" }, { "docid": "53f69b69114dd462bc269eb5739610eb", "score": "0.5469118", "text": "func (s *ProxyServer) Run() error {\n\tif s.Config.Port > 0 {\n\t\tgo func() {\n\t\t\tmux := http.NewServeMux()\n\t\t\thealthz.InstallHandler(mux)\n\t\t\tif s.Config.EnableProfiling {\n\t\t\t\tmux.HandleFunc(\"/debug/pprof/\", pprof.Index)\n\t\t\t\tmux.HandleFunc(\"/debug/pprof/profile\", pprof.Profile)\n\t\t\t\tmux.HandleFunc(\"/debug/pprof/symbol\", pprof.Symbol)\n\t\t\t}\n\t\t\tmux.Handle(\"/metrics\", prometheus.Handler())\n\n\t\t\tserver := &http.Server{\n\t\t\t\tAddr: net.JoinHostPort(s.Config.Address, strconv.Itoa(s.Config.Port)),\n\t\t\t\tHandler: mux,\n\t\t\t}\n\t\t\tglog.Fatal(server.ListenAndServe())\n\t\t}()\n\t}\n\n\ts.Controller.Run(wait.NeverStop, registerOSSignals())\n\treturn nil\n}", "title": "" }, { "docid": "65467ec64942f37e5d094b50ebc8e1df", "score": "0.54657847", "text": "func (e *Eval) Run(globals map[string]objects.BlObject) {\n e.evalCode(e.root, globals, nil, e.pathname,\n \"<main>\")\n}", "title": "" }, { "docid": "025fa5d14e8642be0a1d06744324da19", "score": "0.5460631", "text": "func (qw *QuayWebhook) Run() {\n\n\thttp.HandleFunc(\"/webhook\", func(w http.ResponseWriter, r *http.Request) {\n\t\tif r.Method == http.MethodPost {\n\t\t\tlog.Info(\"Quay webhook incoming!\")\n\t\t\tqr := &QuayRepo{}\n\t\t\tjson.NewDecoder(r.Body).Decode(qr)\n\t\t\tfor _, registry := range qw.registryAuths {\n\t\t\t\tif strings.Contains(qr.DockerURL, registry.URL) {\n\t\t\t\t\tqw.webhook(registry.Token, qr)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t})\n\tlog.Infof(\"Webhook: starting quay webhook on :3008 at /webhook\")\n\terr := http.ListenAndServe(\":3008\", nil)\n\tif err != nil {\n\t\tlog.Errorf(\"Webhook: Webhook listener on port 3008 failed: %e\", err)\n\t}\n}", "title": "" }, { "docid": "c26c37c31380c43d17b703dc56e75607", "score": "0.5457225", "text": "func Run(c RuntimeConfig) error {\n\tlock.Lock()\n\tdefer lock.Unlock()\n\n\t// Make sure it exists.\n\tif _, ok := toys[c.Name]; !ok {\n\t\treturn fmt.Errorf(\"%s: toy not found\", c.Name)\n\t}\n\n\tlog.Printf(\"Starting toy: %s\\n\", c.Name)\n\treturn toys[c.Name].handler(c)\n}", "title": "" }, { "docid": "01c232c387f5f2942058f2931b24dc74", "score": "0.54565614", "text": "func (w *webBasedWatcher) Run() error {\n\tlog.Info(\"[Web Based Watcher] Running\")\n\tif len(w.registeredActioners) == 0 {\n\t\treturn ErrNoRegisteredActioner\n\t}\n\n\tr := http.NewServeMux()\n\tr.HandleFunc(\"/new_metadata\", func(rw http.ResponseWriter, r *http.Request) {\n\t\tif !w.limiter.Allow() {\n\t\t\trw.WriteHeader(http.StatusTooManyRequests)\n\t\t\treturn\n\t\t}\n\t\tlog.Debug(\"Metadata changes notified\")\n\t\trw.WriteHeader(http.StatusAccepted)\n\t\tm, e := w.fetchMetadata()\n\t\tif e != nil {\n\t\t\tlog.Error(\"failed to fetch rmetadata: %v\", e)\n\t\t\treturn\n\t\t}\n\t\tfor _, actioner := range w.registeredActioners {\n\t\t\tgo actioner.Do(m)\n\t\t}\n\t})\n\n\tw.server = &http.Server{\n\t\tAddr: webAddr,\n\t\tHandler: r,\n\t}\n\tif err := w.server.ListenAndServe(); err != nil {\n\t\tif errors.Is(err, http.ErrServerClosed) {\n\t\t\tlog.Info(\"http server closed\")\n\t\t\treturn nil\n\t\t}\n\t\tlog.Error(\"failed to run web based watcher:%v\", err)\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4592146a76bc94ba2c3c1fe6f676d8ed", "score": "0.5454039", "text": "func main() {\n\tswitch os.Args[1] {\n\tcase \"run\":\n\t\trun()\n\tcase \"child\":\n\t\tchild()\n\tdefault:\n\t\tpanic(\"Exit.\")\n\t}\n}", "title": "" }, { "docid": "56b1badb729902ae208a376fdbaf3ab4", "score": "0.54518604", "text": "func (h *Handler) Run(fn func() error) error {\n\tch := make(chan os.Signal, 1)\n\tsignal.Notify(ch, terminationSignals...)\n\tdefer func() {\n\t\tsignal.Stop(ch)\n\t\tclose(ch)\n\t}()\n\tgo func() {\n\t\tsig, ok := <-ch\n\t\tif !ok {\n\t\t\treturn\n\t\t}\n\t\th.Signal(sig)\n\t}()\n\tdefer h.Close()\n\treturn fn()\n}", "title": "" }, { "docid": "8fe34e10e2839d99d83ccb11d3d9cec2", "score": "0.5448011", "text": "func main() {\n\n\tswitch os.Args[1] {\n\tcase \"run\":\n\t\t// debug message\n\t\tdefer exiting()\n\t\trun()\n\tcase \"child\":\n\t\tchild()\n\tdefault:\n\t\tpanic(\"Shit just happened...\")\n\t}\n}", "title": "" }, { "docid": "65b273a8973cf82ad52f372c05e3c17d", "score": "0.54477423", "text": "func (c *InitCommand) Run(_ []string) int {\n\tInit()\n\treturn 0\n}", "title": "" }, { "docid": "cf97d71f2bd068d535bad10eb5920906", "score": "0.5446904", "text": "func (fw *FileWatcher) Run() {\n\tif fw.emitExistentAsCreated {\n\t\tfw.emitExistingFiles()\n\t}\n\n\tgo fw.eventLoop()\n}", "title": "" }, { "docid": "330048eb58a6054654e0d8f9751ea81f", "score": "0.54430234", "text": "func Run(target string) {\n\tdoUpgrade(target)\n}", "title": "" }, { "docid": "27b505e8970a6f757f6f974757c30c22", "score": "0.54426545", "text": "func main() {\n\tswitch os.Args[1] {\n\tcase \"run\":\n\t\trun()\n\tcase \"child\":\n\t\tchild()\n\tdefault:\n\t\tpanic(\"help\")\n\t}\n}", "title": "" }, { "docid": "27b505e8970a6f757f6f974757c30c22", "score": "0.54426545", "text": "func main() {\n\tswitch os.Args[1] {\n\tcase \"run\":\n\t\trun()\n\tcase \"child\":\n\t\tchild()\n\tdefault:\n\t\tpanic(\"help\")\n\t}\n}", "title": "" }, { "docid": "27b505e8970a6f757f6f974757c30c22", "score": "0.54426545", "text": "func main() {\n\tswitch os.Args[1] {\n\tcase \"run\":\n\t\trun()\n\tcase \"child\":\n\t\tchild()\n\tdefault:\n\t\tpanic(\"help\")\n\t}\n}", "title": "" }, { "docid": "27b505e8970a6f757f6f974757c30c22", "score": "0.54426545", "text": "func main() {\n\tswitch os.Args[1] {\n\tcase \"run\":\n\t\trun()\n\tcase \"child\":\n\t\tchild()\n\tdefault:\n\t\tpanic(\"help\")\n\t}\n}", "title": "" }, { "docid": "1ccecfa34492ebae8728a6454bab718b", "score": "0.5438464", "text": "func (app *App) Run(calls ...interface{}) int {\n\tif app.OnRun != nil {\n\t\tcalls = append([]interface{}{app.OnRun}, calls...)\n\t}\n\tvar e error\n\tapp.Init(func(_ *gtk.Application) { e = Exec(calls...)(app) })\n\texitGtk := app.App.Run(app.Args)\n\tif e != nil {\n\t\tfmt.Printf(FmtErrRun+\"\\n\", e)\n\t\treturn 1\n\t}\n\tif app.ExitCode() != 0 {\n\t\treturn app.ExitCode()\n\t}\n\treturn exitGtk\n}", "title": "" }, { "docid": "1e05b42774bbfaf4bdd25395cf62a9e3", "score": "0.5436055", "text": "func (h *Harness) Run() {\n\tvar paths []string\n\tif h.paths.Config.BoolDefault(\"watch.gopath\", false) {\n\t\tgopaths := filepath.SplitList(build.Default.GOPATH)\n\t\tpaths = append(paths, gopaths...)\n\t}\n\tpaths = append(paths, h.paths.CodePaths...)\n\th.watcher = watcher.NewWatcher(h.paths, false)\n\th.watcher.Listen(h, paths...)\n\n\tgo func() {\n\t\tif err := h.Refresh(); err != nil {\n\t\t\tutils.Logger.Error(\"Failed to refresh\", \"error\", err)\n\t\t}\n\t}()\n\n\tif h.useProxy {\n\t\tgo func() {\n\t\t\t// Check the port to start on a random port\n\t\t\tif h.paths.HTTPPort == 0 {\n\t\t\t\th.paths.HTTPPort = getFreePort()\n\t\t\t}\n\t\t\taddr := fmt.Sprintf(\"%s:%d\", h.paths.HTTPAddr, h.paths.HTTPPort)\n\t\t\tutils.Logger.Infof(\"Proxy server is listening on %s\", addr)\n\t\t\tvar err error\n\t\t\tif h.paths.HTTPSsl {\n\t\t\t\terr = http.ListenAndServeTLS(\n\t\t\t\t\taddr,\n\t\t\t\t\th.paths.HTTPSslCert,\n\t\t\t\t\th.paths.HTTPSslKey,\n\t\t\t\t\th)\n\t\t\t} else {\n\t\t\t\terr = http.ListenAndServe(addr, h)\n\t\t\t}\n\t\t\tif err != nil {\n\t\t\t\tutils.Logger.Error(\"Failed to start reverse proxy:\", \"error\", err)\n\t\t\t}\n\t\t}()\n\t}\n\n\t// Make a new channel to listen for the interrupt event\n\tch := make(chan os.Signal)\n\t//nolint:staticcheck // os.Kill ineffective on Unix, useful on Windows?\n\tsignal.Notify(ch, os.Interrupt, os.Kill)\n\t<-ch\n\t// Kill the app and exit\n\tif h.app != nil {\n\t\th.app.Kill()\n\t}\n\tos.Exit(1)\n}", "title": "" }, { "docid": "c48f79d8ebae0532352952a21ad43d32", "score": "0.54354465", "text": "func (a *App) Run(ctx context.Context) error {\n\ta.proxy = newProxy(a.target)\n\n\tvar h http.Handler = a.proxy\n\tif !a.local {\n\t\th = httputils.HealthzAndHTTPS(h)\n\t}\n\tserver := &http.Server{\n\t\tAddr: a.port,\n\t\tHandler: h,\n\t\tReadTimeout: serverReadTimeout,\n\t\tWriteTimeout: serverWriteTimeout,\n\t\tMaxHeaderBytes: 1 << 20,\n\t}\n\ta.server = server\n\n\terr := server.ListenAndServe()\n\tif err == http.ErrServerClosed {\n\t\t// This is an orderly shutdown.\n\t\treturn nil\n\t}\n\treturn skerr.Wrap(err)\n}", "title": "" } ]
0f8f042d1556a7addf94a0d3a1de311d
GetAdverts returns list of the advert in reply
[ { "docid": "889647e8c89492589aa3655a42eab646", "score": "0.7190109", "text": "func (b *Body) GetAdverts() *[]Advert {\n\treturn b.Embedded.Estates\n}", "title": "" } ]
[ { "docid": "a25a9dbd4f98974199aa4763c4c7d15b", "score": "0.6352129", "text": "func (s *AdminAdvertiserService) List(ctx context.Context, opts *AdminAdvertiserListOpts) ([]*Advertiser, *Response, error) {\n\tpath := \"/3.0/admin/advertisers\"\n\n\treq, err := s.client.NewRequestOpts(ctx, http.MethodGet, path, opts, nil, true)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tbody := new(adminAdvertiserListResponse)\n\tresp, err := s.client.Do(req, body)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\treturn body.Advertisers, resp, nil\n}", "title": "" }, { "docid": "4933f2e07a7c1f3748e67025c5581860", "score": "0.5332111", "text": "func GetLeads(params map[string]string) ([]Lead, error) {\n\tleads := []Lead{}\n\tleadResponse := LeadsResponse{}\n\tclient := &http.Client{}\n\tlog.Info(\"get leads!\")\n\n\tif !hasSecurityToken() {\n\t\terr := getSecurityToken()\n\t\tif err != nil {\n\t\t\treturn leads, err\n\t\t}\n\t}\n\n\tmergedParams, _ := getBaseParams(\"retrieve\")\n\tmergedParams[\"dateMode\"] = \"1\"\n\n\tfor i, item := range params {\n\t\tmergedParams[i] = item\n\t}\n\n\tbuf := new(bytes.Buffer)\n\tjson.NewEncoder(buf).Encode(mergedParams)\n\n\treqURL, err := buildURL(baseURL, \"api/v1/data/Leads\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"POST\", reqURL, buf)\n\treq.Header.Add(\"Content-Type\", \"application/json\")\n\tresp, err := client.Do(req)\n\n\tbody, _ := ioutil.ReadAll(resp.Body)\n\n\terr = json.Unmarshal(body, &leadResponse)\n\tif err != nil {\n\t\tlog.Error(err.Error())\n\t\treturn nil, err\n\t}\n\treturn leadResponse.Leads, nil\n}", "title": "" }, { "docid": "4e3f79a05a41af49ffffa89dcd220ad8", "score": "0.5315703", "text": "func (a *AD) Convert(clientIP string) (res *ADResp) {\n\tres = new(ADResp)\n\tfor rscID, adInfoMap := range a.ADsInfo {\n\t\tfor srcID, adInfo := range adInfoMap {\n\t\t\tv := new(ADInfo)\n\t\t\tv.RequestID = a.RequestID\n\t\t\tv.ResourceID = rscID\n\t\t\tv.SourceID = srcID\n\t\t\tv.ClientIP = clientIP\n\t\t\tv.IsADLoc = true // 该字段服务端代码写死为true\n\t\t\tif adInfo != nil {\n\t\t\t\tv.Index = adInfo.Index\n\t\t\t\tv.IsAd = adInfo.IsAd\n\t\t\t\tv.CmMark = adInfo.CmMark\n\t\t\t\tv.CardIndex = adInfo.CardIndex\n\t\t\t}\n\t\t\tif len(adInfo.ADInfo) > 0 {\n\t\t\t\tv.ADInfo = adInfo.ADInfo\n\t\t\t}\n\t\t\tif v.ResourceID == adRscIDIphoneIcon || v.ResourceID == adRscIDAndroidIcon { // icon resouce id\n\t\t\t\tres.Icon = v\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tres.ADs = append(res.ADs, v)\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "747e54bbdc012cece56924d9586d8b01", "score": "0.5223032", "text": "func (b *Body) GetAdvert(index int) *Advert {\n\tif b.Count() <= index || index < 0 {\n\t\treturn nil\n\t}\n\n\treturn &(*b.GetAdverts())[index]\n}", "title": "" }, { "docid": "9e08c84b6b7c93a978e48fbf2163d567", "score": "0.5202196", "text": "func (up *URLParamsList) GetList(ctx context.Context) (*Body, error) {\n\trs := up.GetRequest()\n\tctx = context.WithValue(ctx, requestKey, rs)\n\n\trequest, err := http.NewRequest(http.MethodGet, rs, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// You can context separately for each request\n\trequest = request.WithContext(ctx)\n\n\tclient := &http.Client{}\n\tresp, err := client.Do(request)\n\t// You will get an error \"net/http: request canceled\" when request timeout exceeds limits\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdefer resp.Body.Close()\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tctx = context.WithValue(ctx, responseKey, body)\n\n\tvar adverts = new(Body)\n\terr = json.Unmarshal(body, adverts)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn adverts, nil\n}", "title": "" }, { "docid": "0fee41cc924fd8794f9b458c580517bb", "score": "0.5043014", "text": "func (m *Manager) GetAdvert(providers []string, brand string, model string, postcode string, radius string, sortBy string, page *uint) (structs.AdvertProviders, error) {\n\tfor _, provider := range providers {\n\t\tif _, ok := m.providers[provider]; !ok {\n\t\t\treturn structs.AdvertProviders{}, fmt.Errorf(\"Provider %s is not supported\", provider)\n\t\t}\n\t}\n\n\tproviderLock := sync.Mutex{}\n\tproviderResponses := make(chan map[string]structs.Adverts, len(providers))\n\tproviderErrors := make(chan error, len(providers))\n\n\tvar advert structs.AdvertProviders\n\n\tfor _, provider := range providers {\n\t\tgo func(provider string) {\n\t\t\tres, err := m.providers[provider].GetAdvert(postcode, radius, brand, model, sortBy, page)\n\t\t\tif err != nil {\n\t\t\t\tproviderErrors <- err\n\t\t\t} else {\n\t\t\t\tresponses := make(map[string]structs.Adverts)\n\t\t\t\tresponses[provider] = structs.Adverts{\n\t\t\t\t\tAdverts: res,\n\t\t\t\t}\n\n\t\t\t\tproviderResponses <- responses\n\t\t\t}\n\t\t}(provider)\n\t}\n\n\tadvertProviders := structs.Adverts{}\n\tfor _, provider := range providers {\n\t\tselect {\n\t\tcase err := <-providerErrors:\n\t\t\treturn structs.AdvertProviders{}, err\n\t\tcase res := <-providerResponses:\n\t\t\tproviderLock.Lock()\n\t\t\tfor _, r := range res {\n\t\t\t\tif len(r.Adverts) > 1 {\n\t\t\t\t\tif sortBy == \"price_asc\" {\n\t\t\t\t\t\thighestPrice := r.Adverts[len(r.Adverts)-1].Price\n\t\t\t\t\t\tif advertProviders.LowestProviderHighestPrice == nil {\n\t\t\t\t\t\t\tadvertProviders.LowestProviderHighestPrice = &highestPrice\n\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\tif highestPrice < *advertProviders.LowestProviderHighestPrice {\n\t\t\t\t\t\t\t\t*advertProviders.LowestProviderHighestPrice = highestPrice\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t\tadvertProviders.Adverts = append(advertProviders.Adverts, r.Adverts...)\n\t\t\t\t}\n\t\t\t}\n\t\t\tm.logger.Debugf(provider + \" success\")\n\t\t\tproviderLock.Unlock()\n\t\t}\n\t}\n\n\tswitch sortBy {\n\tcase \"best_match\":\n\t\tsortBy = \"BestMatch\"\n\tcase \"date_desc\":\n\t\tsortBy = \"StartTimeNewest\"\n\tcase \"date_asc\":\n\t\tsortBy = \"\"\n\tcase \"dist_asc\":\n\t\tsort.Slice(advertProviders.Adverts, func(i, j int) bool {\n\t\t\treturn advertProviders.Adverts[i].Distance < advertProviders.Adverts[j].Distance\n\t\t})\n\tcase \"year_desc\":\n\t\tsortBy = \"year-desc\"\n\tcase \"price_asc\":\n\t\tsort.Slice(advertProviders.Adverts, func(i, j int) bool {\n\t\t\treturn advertProviders.Adverts[i].Price < advertProviders.Adverts[j].Price\n\t\t})\n\tcase \"price_desc\":\n\t\tsort.Slice(advertProviders.Adverts, func(i, j int) bool {\n\t\t\treturn advertProviders.Adverts[i].Price > advertProviders.Adverts[j].Price\n\t\t})\n\tcase \"miles_asc\":\n\t\tsortBy = \"\"\n\tdefault:\n\t\tsortBy = \"\"\n\t}\n\n\tadvert.Adverts = advertProviders.Adverts\n\tadvert.HighestProviderLowestPrice = advertProviders.HighestProviderLowestPrice\n\tadvert.LowestProviderHighestPrice = advertProviders.LowestProviderHighestPrice\n\tadvert.Providers = providers\n\n\treturn advert, nil\n}", "title": "" }, { "docid": "fc42169e8dd5cde032821e5bf8a3db0f", "score": "0.50097144", "text": "func (dbAdData *DbAdData) GetAllAds(search Search) ([]AdData, error) {\n\tvar ads = make([]AdData, 0)\n\terr := dbAdData.boltDB.View(func(tx *bolt.Tx) error {\n\t\tb := tx.Bucket(dbAdData.bucketID(search.Name))\n\t\tif b == nil {\n\t\t\treturn nil\n\t\t}\n\t\tc := b.Cursor()\n\t\tfor id, adDataRaw := c.First(); id != nil; id, adDataRaw = c.Next() {\n\t\t\tvar adData *AdData\n\t\t\tvar err2 error\n\t\t\tif adData, err2 = dbAdData.adUnmarshal(adDataRaw); err2 != nil {\n\t\t\t\treturn err2\n\t\t\t}\n\t\t\tads = append(ads, *adData)\n\t\t}\n\t\treturn nil\n\t})\n\treturn ads, err\n}", "title": "" }, { "docid": "a14bdc0f52286fa5166043e47541f826", "score": "0.49162498", "text": "func (*ListDisplayVideo360AdvertiserLinksResponse) Descriptor() ([]byte, []int) {\n\treturn file_google_analytics_admin_v1alpha_analytics_admin_proto_rawDescGZIP(), []int{62}\n}", "title": "" }, { "docid": "b57267605154401fab78264d59195754", "score": "0.48833868", "text": "func (a DefaultApi) GetAllEdges(uuid string) (*InlineResponse2003, *APIResponse, error) {\n\n\tvar localVarHttpMethod = strings.ToUpper(\"Get\")\n\t// create path and map variables\n\tlocalVarPath := a.Configuration.BasePath + \"/{uuid}/edges/all\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"uuid\"+\"}\", fmt.Sprintf(\"%v\", uuid), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := make(map[string]string)\n\tvar localVarPostBody interface{}\n\tvar localVarFileName string\n\tvar localVarFileBytes []byte\n\t// add default headers if any\n\tfor key := range a.Configuration.DefaultHeader {\n\t\tlocalVarHeaderParams[key] = a.Configuration.DefaultHeader[key]\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{ }\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := a.Configuration.APIClient.SelectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\n\t\t\"application/json\",\n\t\t}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := a.Configuration.APIClient.SelectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\tvar successPayload = new(InlineResponse2003)\n\tlocalVarHttpResponse, err := a.Configuration.APIClient.CallAPI(localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes)\n\n\tvar localVarURL, _ = url.Parse(localVarPath)\n\tlocalVarURL.RawQuery = localVarQueryParams.Encode()\n\tvar localVarAPIResponse = &APIResponse{Operation: \"GetAllEdges\", Method: localVarHttpMethod, RequestURL: localVarURL.String()}\n\tif localVarHttpResponse != nil {\n\t\tlocalVarAPIResponse.Response = localVarHttpResponse.RawResponse\n\t\tlocalVarAPIResponse.Payload = localVarHttpResponse.Body()\n\t}\n\n\tif err != nil {\n\t\treturn successPayload, localVarAPIResponse, err\n\t}\n\terr = json.Unmarshal(localVarHttpResponse.Body(), &successPayload)\n\treturn successPayload, localVarAPIResponse, err\n}", "title": "" }, { "docid": "7a1c99d6c48948fe5c6741a523179ca3", "score": "0.4876102", "text": "func (s *AdoptionsService) ListAll(ctx context.Context) ([]*Adoption, *Response, error) {\n\tu := \"adoptions\"\n\treq, err := s.client.NewRequest(\"GET\", u, nil)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tvar adoptions []*Adoption\n\tresp, err := s.client.Do(ctx, req, &adoptions)\n\tif err != nil {\n\t\treturn nil, resp, err\n\t}\n\n\treturn adoptions, resp, nil\n}", "title": "" }, { "docid": "5758a8ca74924cccfd2578cb1a20b67d", "score": "0.48497438", "text": "func (mongoDb *MongoDb) GetAd(ctx context.Context, id string) (Advertisement, error) {\n\tcollection := mongoDb.Db.Collection(AdCollection)\n\tvar ad Advertisement\n\tif err := collection.FindOne(ctx, bson.M{\"_id\" : id}).Decode(&ad); err != nil {\n\t\tlog.Println(err)\n\t\treturn ad, err\n\t}\n\treturn ad, nil\n}", "title": "" }, { "docid": "83ec47d2af615ba20e5f907725a0ac8e", "score": "0.48256785", "text": "func (a *adserviceServer) getRandomAds() []Ad {\n\trand.Seed(time.Now().Unix())\n\tn := rand.Int() % len(a.ads)\n\n\treturn a.ads[n : n+1]\n}", "title": "" }, { "docid": "871710e5a6a30fb0390583088c25ad5a", "score": "0.47646955", "text": "func (c *OffersClient) List(ctx context.Context, opts *OfferListOpts) ([]*Offer, *Response, error) {\n\treq, err := c.client.NewRequestQueryParams(ctx, \"GET\", \"/offers\", opts, nil)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tvar body OfferListResponse\n\tresp, err := c.client.Do(req, &body)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\treturn body.Offers, resp, nil\n}", "title": "" }, { "docid": "4b23fe763924372c1be28dac1e5525a2", "score": "0.47608307", "text": "func (a *Client) ListAnexiaVlans(params *ListAnexiaVlansParams, authInfo runtime.ClientAuthInfoWriter, opts ...ClientOption) (*ListAnexiaVlansOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewListAnexiaVlansParams()\n\t}\n\top := &runtime.ClientOperation{\n\t\tID: \"listAnexiaVlans\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/api/v1/providers/anexia/vlans\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &ListAnexiaVlansReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t}\n\tfor _, opt := range opts {\n\t\topt(op)\n\t}\n\n\tresult, err := a.transport.Submit(op)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsuccess, ok := result.(*ListAnexiaVlansOK)\n\tif ok {\n\t\treturn success, nil\n\t}\n\t// unexpected success response\n\tunexpectedSuccess := result.(*ListAnexiaVlansDefault)\n\treturn nil, runtime.NewAPIError(\"unexpected success response: content available as default response in error\", unexpectedSuccess, unexpectedSuccess.Code())\n}", "title": "" }, { "docid": "bfa7b82ca335f61702517cfaeb33df67", "score": "0.47044834", "text": "func (m *ServiceUpdateMessage) GetAttachments()([]ServiceAnnouncementAttachmentable) {\n val, err := m.GetBackingStore().Get(\"attachments\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.([]ServiceAnnouncementAttachmentable)\n }\n return nil\n}", "title": "" }, { "docid": "c94381005d4d1665e2b1f121ab3bccb7", "score": "0.46721336", "text": "func List(client *golangsdk.ServiceClient, includeDeadLetter bool) pagination.Pager {\n\turl := listURL(client, includeDeadLetter)\n\n\treturn pagination.NewPager(client, url, func(r pagination.PageResult) pagination.Page {\n\t\treturn QueuePage{pagination.SinglePageBase(r)}\n\t})\n}", "title": "" }, { "docid": "fe8d825c0efa66f63a0492dd50fa2833", "score": "0.46626943", "text": "func getAdults(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tjson.NewEncoder(w).Encode(adults)\n}", "title": "" }, { "docid": "fe8d825c0efa66f63a0492dd50fa2833", "score": "0.46626943", "text": "func getAdults(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tjson.NewEncoder(w).Encode(adults)\n}", "title": "" }, { "docid": "7cc93d13a19cd8647795f34868cb9c50", "score": "0.4658343", "text": "func (*ListDisplayVideo360AdvertiserLinksRequest) Descriptor() ([]byte, []int) {\n\treturn file_google_analytics_admin_v1alpha_analytics_admin_proto_rawDescGZIP(), []int{61}\n}", "title": "" }, { "docid": "e5d55068b989d7d8bf338382d0826b6f", "score": "0.46401724", "text": "func (s *DelegatesService) Voters(ctx context.Context, id string) (*Accounts, *http.Response, error) {\n\tquery := &PublicKeyQuery{PublicKey: id}\n\n\tvar responseStruct *Accounts\n\tresp, err := s.client.SendRequest(ctx, \"GET\", \"delegates/voters\", query, &responseStruct)\n\n\tif err != nil {\n\t\treturn nil, resp, err\n\t}\n\n\treturn responseStruct, resp, err\n}", "title": "" }, { "docid": "e6ce6c3339b1ef30852ce82e725e8b61", "score": "0.4638047", "text": "func (a *DefaultApiService) GetAgent(ctx _context.Context, name string) ([]Addr, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue []Addr\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/getAgent/{Name}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"Name\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", name)), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"*/*\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 200 {\n\t\t\tvar v []Addr\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "806df16fb172417303ac27a733debd31", "score": "0.46258292", "text": "func (*ListGoogleAdsLinksResponse) Descriptor() ([]byte, []int) {\n\treturn file_google_analytics_admin_v1alpha_analytics_admin_proto_rawDescGZIP(), []int{39}\n}", "title": "" }, { "docid": "038a02eaa56b9ff960ef2a61672eb2be", "score": "0.46129337", "text": "func (o *ComputeBlade) GetAdapters() []AdapterUnitRelationship {\n\tif o == nil {\n\t\tvar ret []AdapterUnitRelationship\n\t\treturn ret\n\t}\n\treturn o.Adapters\n}", "title": "" }, { "docid": "f0114fef6c2379efb1dc82e641d0e367", "score": "0.45963383", "text": "func (as *AchievementService) List(ids []int, opts ...Option) ([]*Achievement, error) {\n\tfor len(ids) < 1 {\n\t\treturn nil, ErrEmptyIDs\n\t}\n\n\tfor _, id := range ids {\n\t\tif id < 0 {\n\t\t\treturn nil, ErrNegativeID\n\t\t}\n\t}\n\n\tvar ach []*Achievement\n\n\topts = append(opts, SetFilter(\"id\", OpContainsAtLeast, sliceconv.Itoa(ids)...))\n\terr := as.client.get(as.end, &ach, opts...)\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"cannot get Achievements with IDs %v\", ids)\n\t}\n\n\treturn ach, nil\n}", "title": "" }, { "docid": "11288492fbc40c5b4668b74529c4d89c", "score": "0.45945045", "text": "func (m *Event) GetAttendees()([]Attendeeable) {\n return m.attendees\n}", "title": "" }, { "docid": "fb8845b644a1a85e45c7590a79246e90", "score": "0.45823923", "text": "func GetAdvertisedPrefixes(cap *pb.BGPCapture) ([]*net.IPNet, error) {\n\tif cap == nil {\n\t\treturn nil, ErrNilCap\n\t}\n\n\troutes := cap.GetUpdate().GetAdvertisedRoutes()\n\tif routes == nil {\n\t\treturn nil, ErrNoAdvertisedPrefixes\n\t}\n\n\treturn GetPrefixListAsIPNet(routes.Prefixes)\n}", "title": "" }, { "docid": "2b4ec0567c977e1e8c0741e182f18885", "score": "0.45643368", "text": "func (a LiveApi) GetAlliances(datasource string) ([]int32, *APIResponse, error) {\n\n\tvar localVarHttpMethod = strings.ToUpper(\"Get\")\n\t// create path and map variables\n\tlocalVarPath := a.Configuration.BasePath + \"/alliances/\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := make(map[string]string)\n\tvar localVarPostBody interface{}\n\tvar localVarFileName string\n\tvar localVarFileBytes []byte\n\t// add default headers if any\n\tfor key := range a.Configuration.DefaultHeader {\n\t\tlocalVarHeaderParams[key] = a.Configuration.DefaultHeader[key]\n\t}\n\t\tlocalVarQueryParams.Add(\"datasource\", a.Configuration.APIClient.ParameterToString(datasource, \"\"))\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{ }\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := a.Configuration.APIClient.SelectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\n\t\t\"application/json\",\n\t\t}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := a.Configuration.APIClient.SelectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\tvar successPayload = new([]int32)\n\tlocalVarHttpResponse, err := a.Configuration.APIClient.CallAPI(localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes)\n\n\tvar localVarURL, _ = url.Parse(localVarPath)\n\tlocalVarURL.RawQuery = localVarQueryParams.Encode()\n\tvar localVarAPIResponse = &APIResponse{Operation: \"GetAlliances\", Method: localVarHttpMethod, RequestURL: localVarURL.String()}\n\tif localVarHttpResponse != nil {\n\t\tlocalVarAPIResponse.Response = localVarHttpResponse.RawResponse\n\t\tlocalVarAPIResponse.Payload = localVarHttpResponse.Body()\n\t}\n\n\tif err != nil {\n\t\treturn *successPayload, localVarAPIResponse, err\n\t}\n\terr = json.Unmarshal(localVarHttpResponse.Body(), &successPayload)\n\treturn *successPayload, localVarAPIResponse, err\n}", "title": "" }, { "docid": "f5641b4024d1eeb5a8b7c692db9be8ed", "score": "0.455412", "text": "func GetAgentList(pid string, t util.Token, cred util.Credentials) {\n\tvar agents AgentData\n\tclient := resty.New()\n\tbodyData := `{\"query\":\"query{\\n getCluster(project_id: \\\"` + fmt.Sprintf(\"%s\", pid) + `\\\"){\\n cluster_name\\n }\\n}\"}`\n\tresp, err := client.R().\n\t\tSetHeader(\"Content-Type\", \"application/json\").\n\t\tSetHeader(\"Authorization\", fmt.Sprintf(\"%s\", t.AccessToken)).\n\t\tSetHeader(\"Accept-Encoding\", \"gzip, deflate, br\").\n\t\tSetBody(bodyData).\n\t\t// SetResult automatic unmarshalling for the request,\n\t\t// if response status code is between 200 and 299\n\t\tSetResult(&agents).\n\t\tPost(\n\t\t\tfmt.Sprintf(\n\t\t\t\t\"%s/api/query\",\n\t\t\t\tcred.Host,\n\t\t\t),\n\t\t)\n\tif err != nil || !resp.IsSuccess() {\n\t\tfmt.Println(\"Error in geting agent list: \", err)\n\t}\n\tfmt.Print(\"\\n📘 Connected agents list -----------\\n\\n\")\n\n\tfor i := range agents.Data.GetAgent {\n\t\tfmt.Println(\"-\", agents.Data.GetAgent[i].AgentName)\n\t}\n\tfmt.Println(\"\\n-------------------------------------\")\n}", "title": "" }, { "docid": "5f704b3bf5bdf122394822ff1fa897b5", "score": "0.45474067", "text": "func (d *Demuxer) GetAttachments() []*Attachment {\n\tvar count C.unsigned\n\tvar attachments *C.Attachment\n\n\tC.mkv_GetAttachments(d.m, &attachments, &count)\n\n\tif count == 0 {\n\t\treturn []*Attachment{}\n\t}\n\n\tvar attachmentsSlice []C.Attachment\n\n\t// This pattern is used enough that I should factor it out into its\n\t// own function... but I am lazy.\n\tsliceConv := (*reflect.SliceHeader)(unsafe.Pointer(&attachmentsSlice))\n\tsliceConv.Data = uintptr(unsafe.Pointer(attachments))\n\tsliceConv.Len = int(count)\n\tsliceConv.Cap = int(count)\n\n\tret := make([]*Attachment, int(count))\n\tfor i := 0; i < int(count); i++ {\n\t\tret[i] = convertAttachment(&attachmentsSlice[i])\n\t}\n\n\treturn ret\n}", "title": "" }, { "docid": "8026caaf3ed98e69df68bedc106431d3", "score": "0.454255", "text": "func (_HoQuStorage *HoQuStorageCaller) AdCampaigns(opts *bind.CallOpts, arg0 [16]byte) (struct {\n\tOwnerId [16]byte\n\tOfferId [16]byte\n\tContractAddress common.Address\n\tCreatedAt *big.Int\n\tStatus uint8\n}, error) {\n\tret := new(struct {\n\t\tOwnerId [16]byte\n\t\tOfferId [16]byte\n\t\tContractAddress common.Address\n\t\tCreatedAt *big.Int\n\t\tStatus uint8\n\t})\n\tout := ret\n\terr := _HoQuStorage.contract.Call(opts, out, \"adCampaigns\", arg0)\n\treturn *ret, err\n}", "title": "" }, { "docid": "4871a4fa7b70e626151063c8fa7915fb", "score": "0.45383766", "text": "func (*GetGuildInvitesResponse) Descriptor() ([]byte, []int) {\n\treturn file_core_v1_core_proto_rawDescGZIP(), []int{19}\n}", "title": "" }, { "docid": "517a4cc58766055d24bc6042daeeb142", "score": "0.4537936", "text": "func (a *Client) Advertisedruntimes(params *AdvertisedruntimesParams) (*AdvertisedruntimesOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewAdvertisedruntimesParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"advertisedruntimes\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/sdx/advertisedruntimes\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"http\", \"https\"},\n\t\tParams: params,\n\t\tReader: &AdvertisedruntimesReader{formats: a.formats},\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result.(*AdvertisedruntimesOK), nil\n\n}", "title": "" }, { "docid": "bc54c5805880afd22296d97240211267", "score": "0.45378664", "text": "func (a *SynthesizeApiService) Voices(ctx context.Context, xSessionID string, language string) ([]SynthesizeVoiceType, *http.Response, error) {\n\tvar (\n\t\tlocalVarHttpMethod = strings.ToUpper(\"Get\")\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t \tsuccessPayload []SynthesizeVoiceType\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/vktts/rest/v1/languages/{language}/voices\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"language\"+\"}\", fmt.Sprintf(\"%v\", language), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{ \"application/json;charset=UTF-8\", }\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := selectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\n\t\t\"application/json;charset=UTF-8\",\n\t\t}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := selectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\tlocalVarHeaderParams[\"X-Session-ID\"] = parameterToString(xSessionID, \"\")\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn successPayload, nil, err\n\t}\n\n\tlocalVarHttpResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHttpResponse == nil {\n\t\treturn successPayload, localVarHttpResponse, err\n\t}\n\tdefer localVarHttpResponse.Body.Close()\n\tif localVarHttpResponse.StatusCode >= 300 {\n\t\tbodyBytes, _ := ioutil.ReadAll(localVarHttpResponse.Body)\n\t\treturn successPayload, localVarHttpResponse, reportError(\"Status: %v, Body: %s\", localVarHttpResponse.Status, bodyBytes)\n\t}\n\n\tif err = json.NewDecoder(localVarHttpResponse.Body).Decode(&successPayload); err != nil {\n\t\treturn successPayload, localVarHttpResponse, err\n\t}\n\n\n\treturn successPayload, localVarHttpResponse, err\n}", "title": "" }, { "docid": "61b062dd8f621d54d3f63824ff6c68b1", "score": "0.45239857", "text": "func (*GetGuildInvitesResponse) Descriptor() ([]byte, []int) {\n\treturn file_chat_v1_guilds_proto_rawDescGZIP(), []int{13}\n}", "title": "" }, { "docid": "d16ec6254e3a3e41bf8c862acbcac1f5", "score": "0.45182735", "text": "func (*GetGuildInvitesResponse) Descriptor() ([]byte, []int) {\n\treturn file_chat_v1_guilds_proto_rawDescGZIP(), []int{9}\n}", "title": "" }, { "docid": "4d561ee1c26820544128f15841c64a65", "score": "0.451169", "text": "func (*ListDisplayVideo360AdvertiserLinkProposalsResponse) Descriptor() ([]byte, []int) {\n\treturn file_google_analytics_admin_v1alpha_analytics_admin_proto_rawDescGZIP(), []int{68}\n}", "title": "" }, { "docid": "415cdf6f55b1d5532cf1db6c10421d8b", "score": "0.44982845", "text": "func (r *accountResolver) Leads() []*leadResolver {\n\n\tvar l []*leadResolver\n\tif r.account != nil {\n\t\t//if account not null get device of account from db and map\n\t\tlead := model.GetLeadsofType(convertId(r.account.id),\"account\")\n\t\tfor _, v := range lead {\n\t\t\tl = append(l, &leadResolver{MapLead(v)})\n\t\t}\n\t\treturn l\n\t}\n\n\tfor _, v := range r.account.leads {\n\t\tl = append(l, &leadResolver{v})\n\t}\n\treturn l\n}", "title": "" }, { "docid": "1f5acd481e20b50832baac6560b8e7d9", "score": "0.44873157", "text": "func (client ComputeClient) ListVolumeAttachments(ctx context.Context, request ListVolumeAttachmentsRequest) (response ListVolumeAttachmentsResponse, err error) {\n\tvar ociResponse common.OCIResponse\n\tpolicy := common.NoRetryPolicy()\n\tif client.RetryPolicy() != nil {\n\t\tpolicy = *client.RetryPolicy()\n\t}\n\tif request.RetryPolicy() != nil {\n\t\tpolicy = *request.RetryPolicy()\n\t}\n\tociResponse, err = common.Retry(ctx, request, client.listVolumeAttachments, policy)\n\tif err != nil {\n\t\tif ociResponse != nil {\n\t\t\tif httpResponse := ociResponse.HTTPResponse(); httpResponse != nil {\n\t\t\t\topcRequestId := httpResponse.Header.Get(\"opc-request-id\")\n\t\t\t\tresponse = ListVolumeAttachmentsResponse{RawResponse: httpResponse, OpcRequestId: &opcRequestId}\n\t\t\t} else {\n\t\t\t\tresponse = ListVolumeAttachmentsResponse{}\n\t\t\t}\n\t\t}\n\t\treturn\n\t}\n\tif convertedResponse, ok := ociResponse.(ListVolumeAttachmentsResponse); ok {\n\t\tresponse = convertedResponse\n\t} else {\n\t\terr = fmt.Errorf(\"failed to convert OCIResponse into ListVolumeAttachmentsResponse\")\n\t}\n\treturn\n}", "title": "" }, { "docid": "e6c7d89fef167de16301670235ebac4a", "score": "0.447509", "text": "func (d *Database) ListClientBookings(ctx context.Context, user *User) []*ApptResponse {\n\tvar appts []*ApptResponse\n\n\tdefer delete(d.valid, user.Token)\n\n\tt, ok := d.valid[user.Token]\n\tif !ok || t.Before(time.Now()) {\n\t\treturn nil\n\t}\n\n\trows, err := d.db.QueryContext(ctx, findClientBookings, user.Username)\n\tif err != nil {\n\t\tlog.Print(err)\n\t\treturn nil\n\t}\n\n\tfor rows.Next() {\n\t\tvar date, tie time.Time\n\n\t\tappt := ApptResponse{}\n\t\tif e := rows.Scan(&date, &tie, &appt.ID); e != nil {\n\t\t\tlog.Print(e)\n\t\t\tbreak\n\t\t}\n\n\t\tdate.Add(time.Duration(tie.Nanosecond()))\n\t\tappt.Block = date\n\n\t\tappts = append(appts, &appt)\n\t}\n\n\treturn appts\n}", "title": "" }, { "docid": "8af876cc19a206943b39700f30244ad5", "score": "0.44735828", "text": "func (r repo) QueryNideShopAd() ([]models.NideshopAd, error) {\n\tconst sql1 = `\n\t\tSELECT * FROM nideshop_ad WHERE ( ad_position_id = 1 )\n\t\t`\n\n\tvar data []models.NideshopAd\n\trows, err := r.db.Query(sql1)\n\tif err != nil {\n\t}\n\tfor rows.Next() {\n\t\trow := models.NideshopAd{}\n\t\terr := rows.Scan(&row.Id, &row.AdPositionId, &row.MediaType, &row.Name, &row.Link, &row.ImageUrl, &row.Content, &row.EndTime, &row.Enabled)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tdata = append(data, row)\n\t}\n\treturn data, nil\n}", "title": "" }, { "docid": "0ee1e0f8d0d03c744300f5b78dcfd3fd", "score": "0.44734308", "text": "func (a *ClientAdapter) List(names []string, opts *client.ListOptions) ([]*client.Snap, error) {\n\treturn a.snapdClient.List(names, opts)\n}", "title": "" }, { "docid": "2ba81dda6c2f914ae8d595394edb4603", "score": "0.44707346", "text": "func (es ES) GetAnswers() ([]globals.Answer, error) {\n\tquery := elastic.NewMatchAllQuery()\n\tsearchResult, err := es.Client.Search().\n\t\tIndex(\"answers\").\n\t\tQuery(query).\n\t\tFrom(0).Size(1000).\n\t\tPretty(true).\n\t\tDo(es.Context)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar answers []globals.Answer\n\tif searchResult.Hits.TotalHits > 0 {\n\t\tfmt.Printf(\"Found a total of %d answers\\n\", searchResult.Hits.TotalHits)\n\n\t\tfor _, hit := range searchResult.Hits.Hits {\n\t\t\tvar a globals.Answer\n\t\t\terr := json.Unmarshal(*hit.Source, &a)\n\t\t\ta.ID = hit.Id\n\t\t\tif err != nil {\n\t\t\t\tlog.Errorf(\"Unable to deserialize source into answer : %s\", err)\n\t\t\t}\n\t\t\tanswers = append(answers, a)\n\t\t}\n\t}\n\n\treturn answers, nil\n}", "title": "" }, { "docid": "55dbd904d3854881f39afd117faffd4e", "score": "0.44567418", "text": "func Get(client *golangsdk.ServiceClient, id string, includeDeadLetter bool) (r GetResult) {\n\t_, r.Err = client.Get(getURL(client, id, includeDeadLetter), &r.Body, nil)\n\treturn\n}", "title": "" }, { "docid": "f728f92541c0fa62bedb0cd8cfc58862", "score": "0.4452668", "text": "func (s *Server) getVoteChoices(ctx context.Context, icmd interface{}) (interface{}, error) {\n\tcmd := icmd.(*types.GetVoteChoicesCmd)\n\tw, ok := s.walletLoader.LoadedWallet()\n\tif !ok {\n\t\treturn nil, errUnloadedWallet\n\t}\n\n\tvar ticketHash *chainhash.Hash\n\tif cmd.TicketHash != nil {\n\t\thash, err := chainhash.NewHashFromStr(*cmd.TicketHash)\n\t\tif err != nil {\n\t\t\treturn nil, rpcError(dcrjson.ErrRPCInvalidParameter, err)\n\t\t}\n\t\tticketHash = hash\n\t}\n\n\tversion, agendas := wallet.CurrentAgendas(w.ChainParams())\n\tresp := &types.GetVoteChoicesResult{\n\t\tVersion: version,\n\t\tChoices: make([]types.VoteChoice, 0, len(agendas)),\n\t}\n\n\tchoices, _, err := w.AgendaChoices(ctx, ticketHash)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfor _, agenda := range agendas {\n\t\tagendaID := agenda.Vote.Id\n\t\tvoteChoice := types.VoteChoice{\n\t\t\tAgendaID: agendaID,\n\t\t\tAgendaDescription: agenda.Vote.Description,\n\t\t\tChoiceID: choices[agendaID],\n\t\t\tChoiceDescription: \"\", // Set below\n\t\t}\n\n\t\tfor _, choice := range agenda.Vote.Choices {\n\t\t\tif choices[agendaID] == choice.Id {\n\t\t\t\tvoteChoice.ChoiceDescription = choice.Description\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\n\t\tresp.Choices = append(resp.Choices, voteChoice)\n\t}\n\n\treturn resp, nil\n}", "title": "" }, { "docid": "b5e1d00176244bec60f2972ead4123f1", "score": "0.44517946", "text": "func (*ListAudiencesResponse) Descriptor() ([]byte, []int) {\n\treturn file_google_analytics_admin_v1alpha_analytics_admin_proto_rawDescGZIP(), []int{96}\n}", "title": "" }, { "docid": "5ceefad4fb7de68b584e907aac466d15", "score": "0.4449402", "text": "func getOfficers(s listing.Service) func(*gin.Context) {\n\treturn func(c *gin.Context) {\n\n\t\t// messages, getErr := s.GetAllMessages() // original get all messages in messages collection\n\t\tofficers, getErr := s.GetAllOfficers()\n\t\tif getErr != nil {\n\t\t\thttp_utils.RespondError(c.Writer, getErr)\n\t\t\treturn\n\t\t}\n\t\t// c.JSON(http.StatusOK, messages)\n\t\thttp_utils.RespondJson(c.Writer, \"GET\", http.StatusOK, officers)\n\t}\n}", "title": "" }, { "docid": "09be333552b585cc68ff281c4bc92d3b", "score": "0.44477978", "text": "func (m *Event) GetAttachments()([]Attachmentable) {\n return m.attachments\n}", "title": "" }, { "docid": "66eaf9373ea7e28fc737067ff78bddc9", "score": "0.44415042", "text": "func ScrapeAds() []Ad {\n\tdoc, err := goquery.NewDocument(\"https://muusikoiden.net/tori/?category=0\")\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\telements := doc.Find(\"td.tori_title\")\n\n\tads := make([]Ad, elements.Length())\n\n\telements.Each(func(i int, titleContainer *goquery.Selection) {\n\t\tcategory := strings.Replace(titleContainer.Find(\"b\").Text(), \":\", \"\", -1)\n\t\tlink := titleContainer.Find(\"a\")\n\t\ttitle := link.Text()\n\t\tpath, _ := link.Attr(\"href\")\n\t\turl := \"https://muusikoiden.net\" + path\n\t\tid := idFromURL.FindStringSubmatch(path)[1]\n\n\t\tdescriptionContainer := titleContainer.Parent().Siblings().Find(\"font.msg\")\n\t\tdescription := descriptionContainer.Text()\n\t\tprice := descriptionContainer.SiblingsFiltered(\"p\").Text()\n\n\t\tad := Ad{id, category, title, url, description, price}\n\t\tads[i] = ad\n\t})\n\n\treturn ads\n}", "title": "" }, { "docid": "2aff070b8db83130cad3dcb2683acfee", "score": "0.44323146", "text": "func getDeparturesResp(req DepartureReq) (resp string, err error) {\n\tvar advStr, dep1 string\n\tdirection := \"1\"\n\n\tif req.IsRealtime {\n\t\tadvStr = \"1\" // XXX - Is this necessary?\n\t\tdep1 = \"1\"\n\t} else if req.IsArrivalTime {\n\t\tdirection = \"2\"\n\t}\n\n\tro := &grequests.RequestOptions{\n\t\tUserAgent: \"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.103 Safari/537.36\",\n\t\tParams: map[string]string{\n\t\t\t\"direction\": direction,\n\t\t\t\"from\": req.From,\n\t\t\t\"to\": req.To,\n\t\t\t\"time\": req.Time,\n\t\t\t\"date\": req.Date,\n\t\t\t\"search\": \"Show travel suggestions\",\n\t\t\t\"lang\": \"en\",\n\t\t\t\"adv\": advStr,\n\t\t\t\"dep1\": dep1,\n\t\t\t//\"through\": \"\",\n\t\t\t//\"throughpause\": \"\",\n\t\t\t//\"changepenalty\": \"1\",\n\t\t\t//\"changepause\": \"0\",\n\t\t\t//\"linjer\": \"\",\n\t\t\t//\"destinations\": \"\",\n\t\t},\n\t}\n\n\tgresp, err := grequests.Get(DeparturesURL, ro)\n\tif err != nil {\n\t\treturn\n\t}\n\tresp = gresp.String()\n\treturn\n}", "title": "" }, { "docid": "8a49ba473f9a51436f590fbf9b9a1db9", "score": "0.44194037", "text": "func (*ListPublisherAccountsResponse) Descriptor() ([]byte, []int) {\n\treturn file_google_ads_admob_v1_admob_api_proto_rawDescGZIP(), []int{2}\n}", "title": "" }, { "docid": "b18bce54d9e1a25399fee54a2fad3c8f", "score": "0.4418593", "text": "func TestDelegatesService_Voters(t *testing.T) {\n\tclient, mux, _, teardown := setupTest()\n\tdefer teardown()\n\n\tmux.HandleFunc(\"/delegates/voters\", func(writer http.ResponseWriter, request *http.Request) {\n\t\ttestMethod(t, request, \"GET\")\n\t\tfmt.Fprint(writer,\n\t\t\t`{\n\t\t\t \"success\": true,\n\t\t\t \"accounts\": [\n\t\t\t {\n\t\t\t \"username\": \"dummy\",\n\t\t\t \"address\": \"dummy\",\n\t\t\t \"publicKey\": \"dummy\",\n\t\t\t \"balance\": \"dummy\"\n\t\t\t }\n\t\t\t ]\n\t\t\t}`)\n\t})\n\n\tresponseStruct, response, err := client.Delegates.Voters(context.Background(), \"dummy\")\n\ttestGeneralError(t, \"Delegates.Voters\", err)\n\ttestResponseUrl(t, \"Delegates.Voters\", response, \"/api/delegates/voters\")\n\ttestResponseStruct(t, \"Delegates.Voters\", responseStruct, &Accounts{\n\t\tSuccess: true,\n\t\tAccounts: []Account{{\n\t\t\tUsername: \"dummy\",\n\t\t\tAddress: \"dummy\",\n\t\t\tPublicKey: \"dummy\",\n\t\t\tBalance: \"dummy\",\n\t\t}},\n\t})\n}", "title": "" }, { "docid": "4ce2d3d6e8769fe92b5d8a52c0fc884b", "score": "0.44173387", "text": "func (scrapper *Scrapper) getProxyList(collector *colly.Collector) ([]string, error) {\n\tconst api = \"https://www.proxy-list.download/api/v1/get?type=http\"\n\tvar proxyList []string\n\tcollector.OnResponse(func(response *colly.Response) {\n\t\tif response.StatusCode == 200 {\n\t\t\tfor _, pr := range strings.Split(string(response.Body), \"\\r\\n\") {\n\t\t\t\tproxyList = append(proxyList, fmt.Sprintf(`http://%s`, pr))\n\t\t\t}\n\t\t}\n\t})\n\tscrapper.visitWithRetry(collector, api, 30)\n\treturn proxyList, nil\n}", "title": "" }, { "docid": "f5f518ae05e9e27588e5b0ca2566dfa3", "score": "0.4401857", "text": "func (_HoQuStorage *HoQuStorageSession) AdCampaigns(arg0 [16]byte) (struct {\n\tOwnerId [16]byte\n\tOfferId [16]byte\n\tContractAddress common.Address\n\tCreatedAt *big.Int\n\tStatus uint8\n}, error) {\n\treturn _HoQuStorage.Contract.AdCampaigns(&_HoQuStorage.CallOpts, arg0)\n}", "title": "" }, { "docid": "6110c0ebf825424ed34ef12a23ebc561", "score": "0.44013503", "text": "func (s *DeviceOnboardingPnPService) GetVirtualAccountList(domain string) (*GetVirtualAccountListResponse, *resty.Response, error) {\n\n\tpath := \"/dna/intent/api/v1/onboarding/pnp-settings/sacct/{domain}/vacct\"\n\tpath = strings.Replace(path, \"{\"+\"domain\"+\"}\", fmt.Sprintf(\"%v\", domain), -1)\n\n\tresponse, err := RestyClient.R().\n\t\tSetResult(&GetVirtualAccountListResponse{}).\n\t\tSetError(&Error{}).\n\t\tGet(path)\n\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tif response.IsError() {\n\t\treturn nil, response, fmt.Errorf(\"Error with operation getVirtualAccountList\")\n\t}\n\n\tresult := response.Result().(*GetVirtualAccountListResponse)\n\treturn result, response, err\n}", "title": "" }, { "docid": "a5bc54d0862251cc56d39c999a407de8", "score": "0.43924904", "text": "func NewResponse(_ context.Context, catalog catalog.MeshCataloger, proxy *envoy.Proxy, request *xds_discovery.DiscoveryRequest, cfg configurator.Configurator) (*xds_discovery.DiscoveryResponse, error) {\n\tsvc, err := catalog.GetServiceFromEnvoyCertificate(proxy.GetCommonName())\n\tif err != nil {\n\t\tlog.Error().Err(err).Msgf(\"Error looking up MeshService for Envoy with CN=%q\", proxy.GetCommonName())\n\t\treturn nil, err\n\t}\n\tproxyServiceName := *svc\n\n\tallTrafficPolicies, err := catalog.ListTrafficPolicies(proxyServiceName)\n\tlog.Debug().Msgf(\"EDS svc %s allTrafficPolicies %+v\", proxyServiceName, allTrafficPolicies)\n\n\tif err != nil {\n\t\tlog.Error().Err(err).Msgf(\"Failed to list traffic policies for proxy service %q\", proxyServiceName)\n\t\treturn nil, err\n\t}\n\n\tallServicesEndpoints := make(map[service.MeshServicePort][]endpoint.Endpoint)\n\tfor _, trafficPolicy := range allTrafficPolicies {\n\t\tisSourceService := trafficPolicy.Source.Equals(proxyServiceName)\n\t\tif isSourceService {\n\t\t\tdestService := trafficPolicy.Destination.GetMeshService()\n\t\t\tserviceEndpoints, err := catalog.ListEndpointsForService(destService)\n\t\t\tif err != nil {\n\t\t\t\tlog.Error().Err(err).Msgf(\"Failed listing endpoints for proxy %s\", proxyServiceName)\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tdestServicePort := trafficPolicy.Destination\n\t\t\tif destServicePort.Port == 0 {\n\t\t\t\tallServicesEndpoints[destServicePort] = serviceEndpoints\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\t// if port specified, filter based on port\n\t\t\tfilteredEndpoints := make([]endpoint.Endpoint, 0)\n\t\t\tfor _, endpoint := range serviceEndpoints {\n\t\t\t\tif int(endpoint.Port) != destServicePort.Port {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tfilteredEndpoints = append(filteredEndpoints, endpoint)\n\t\t\t}\n\t\t\tallServicesEndpoints[destServicePort] = filteredEndpoints\n\t\t}\n\t}\n\n\tlog.Debug().Msgf(\"Computed endpoints for proxy %s: %+v\", proxyServiceName, allServicesEndpoints)\n\tvar protos []*any.Any\n\tfor serviceName, serviceEndpoints := range allServicesEndpoints {\n\t\tloadAssignment := cla.NewClusterLoadAssignment(serviceName, serviceEndpoints)\n\n\t\tproto, err := ptypes.MarshalAny(loadAssignment)\n\t\tif err != nil {\n\t\t\tlog.Error().Err(err).Msgf(\"Error marshalling EDS payload for proxy %s: %+v\", proxyServiceName, loadAssignment)\n\t\t\tcontinue\n\t\t}\n\t\tprotos = append(protos, proto)\n\t}\n\n\tlog.Debug().Msgf(\"EDS url:%s protos: %+v\", string(envoy.TypeEDS), protos)\n\tresp := &xds_discovery.DiscoveryResponse{\n\t\tResources: protos,\n\t\tTypeUrl: string(envoy.TypeEDS),\n\t}\n\treturn resp, nil\n}", "title": "" }, { "docid": "9d273fb6c9d2fe4d3bbb9cdf4f37f6d2", "score": "0.43904102", "text": "func GetVoices() map[string]string {\n\treturn voices\n}", "title": "" }, { "docid": "ae03a5592d3b3132175c7dc39e691e00", "score": "0.4376679", "text": "func (endpoint *Endpoint) ListIntelligence(ctx context.Context, query string, perPage, offset int) (*IntelligenceResponse, error) {\n\t// Prepare the URL\n\treqURL, err := url.Parse(endpoint.client.BaseURL)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Error while parsing the URL : %s\", err)\n\t}\n\treqURL.Path += \"/api/v2/intelligence\"\n\tparameters := url.Values{}\n\tparameters.Add(\"username\", endpoint.client.Username)\n\tparameters.Add(\"api_key\", endpoint.client.APIKey)\n\tparameters.Add(\"limit\", strconv.Itoa(perPage))\n\tparameters.Add(\"offset\", strconv.Itoa(offset))\n\tparameters.Add(\"q\", query)\n\treqURL.RawQuery = parameters.Encode()\n\n\t// Create the request\n\treq, err := http.NewRequest(\"GET\", reqURL.String(), nil)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Error while creating the request : %s\", err)\n\t}\n\treq = req.WithContext(ctx)\n\n\t// Set HTTP headers\n\treq.Header.Set(\"Accept\", \"application/json\")\n\treq.Header.Set(\"Content-Type\", \"application/json\")\n\n\t// Do the request\n\tresp, err := endpoint.client.client.Do(req)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error while doing the request: %s\", err)\n\t}\n\tdefer resp.Body.Close()\n\n\tif resp.StatusCode != 200 {\n\t\treturn nil, fmt.Errorf(\"wrong status code: %d\", resp.StatusCode)\n\t}\n\n\t// Read the response\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error while reading the request: %s\", err)\n\t}\n\n\t// Unmarshal the response\n\tvar response *IntelligenceResponse\n\terr = json.Unmarshal([]byte(body), &response)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error while unmarshalling the response : %s\", err)\n\t}\n\n\treturn response, nil\n}", "title": "" }, { "docid": "4245f87d79626e4ee5fccaca810facb8", "score": "0.43696278", "text": "func (m *BookingBusiness) GetAppointments()([]BookingAppointmentable) {\n return m.appointments\n}", "title": "" }, { "docid": "988e4af2f10c383d6130170f8cde28e9", "score": "0.43665737", "text": "func (a *adserviceServer) getAdsByCategory(tag string) []Ad {\n\tads := []Ad{}\n\n\tfor _, ad := range a.adsIndex[tag] {\n\t\tads = append(ads, a.ads[ad])\n\t}\n\treturn ads\n}", "title": "" }, { "docid": "595bab42cc3ae8564b1fff810b950ae9", "score": "0.4364489", "text": "func (d *VolumeDriver) GetClientList(name string) []string {\n\tclientListMap, err := d.kvStore.KvMapFromPrefix(kvstore.VolPrefixClient + name)\n\tvar clientList []string\n\tif err != nil {\n\t\tlog.Warnf(\"Failed to get client list for %s\", name)\n\t\treturn clientList\n\t}\n\tfor key, vmIP := range clientListMap {\n\t\tclientList = append(clientList, vmIP)\n\t\tlog.Infof(\"GetClientList key=%s IP=%s\", key, vmIP)\n\t}\n\treturn clientList\n}", "title": "" }, { "docid": "702bef41b21826c93848b3936e42a92b", "score": "0.43580368", "text": "func (client ComputeClient) listVolumeAttachments(ctx context.Context, request common.OCIRequest, binaryReqBody *common.OCIReadSeekCloser, extraHeaders map[string]string) (common.OCIResponse, error) {\n\n\thttpRequest, err := request.HTTPRequest(http.MethodGet, \"/volumeAttachments\", binaryReqBody, extraHeaders)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar response ListVolumeAttachmentsResponse\n\tvar httpResponse *http.Response\n\thttpResponse, err = client.Call(ctx, &httpRequest)\n\tdefer common.CloseBodyIfValid(httpResponse)\n\tresponse.RawResponse = httpResponse\n\tif err != nil {\n\t\tapiReferenceLink := \"https://docs.oracle.com/iaas/api/#/en/iaas/20160918/VolumeAttachment/ListVolumeAttachments\"\n\t\terr = common.PostProcessServiceError(err, \"Compute\", \"ListVolumeAttachments\", apiReferenceLink)\n\t\treturn response, err\n\t}\n\n\terr = common.UnmarshalResponseWithPolymorphicBody(httpResponse, &response, &listvolumeattachment{})\n\treturn response, err\n}", "title": "" }, { "docid": "f994054cb3a08c609bfd127183253dd1", "score": "0.43504396", "text": "func getEndpointsForProxy(meshCatalog catalog.MeshCataloger, proxyIdentity identity.ServiceIdentity) (map[service.MeshService][]endpoint.Endpoint, error) {\n\tallowedServicesEndpoints := make(map[service.MeshService][]endpoint.Endpoint)\n\n\tfor _, dstSvc := range meshCatalog.ListAllowedOutboundServicesForIdentity(proxyIdentity) {\n\t\tendpoints, err := meshCatalog.ListAllowedEndpointsForService(proxyIdentity, dstSvc)\n\t\tif err != nil {\n\t\t\tlog.Error().Err(err).Msgf(\"Failed listing allowed endpoints for service %s for proxy identity %s\", dstSvc, proxyIdentity)\n\t\t\tcontinue\n\t\t}\n\t\tallowedServicesEndpoints[dstSvc] = endpoints\n\t}\n\tlog.Trace().Msgf(\"Allowed outbound service endpoints for proxy with identity %s: %v\", proxyIdentity, allowedServicesEndpoints)\n\treturn allowedServicesEndpoints, nil\n}", "title": "" }, { "docid": "c1e77c27a533425450c8af200d872912", "score": "0.43491006", "text": "func (a *AttachmentsApiService) ListAttachment(ctx _context.Context) ApiListAttachmentRequest {\n\treturn ApiListAttachmentRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t}\n}", "title": "" }, { "docid": "2c167e6ab9b2dde3f032e2aa74f7face", "score": "0.4349092", "text": "func (i *SharedIngressTranslator) getListener(m *model.Model) []ciliumv2.XDSResource {\n\tvar tls []*model.TLSSecret\n\tfor _, h := range m.HTTP {\n\t\tif h.TLS != nil {\n\t\t\ttls = append(tls, h.TLS)\n\t\t}\n\t}\n\n\tl, _ := translation.NewListenerWithDefaults(\"listener\", i.secretsNamespace, tls)\n\treturn []ciliumv2.XDSResource{l}\n}", "title": "" }, { "docid": "2c7e8051d75182da9eb9411592ecf537", "score": "0.4348668", "text": "func DecodeGrpcRespAlertDestinationList(ctx context.Context, response interface{}) (interface{}, error) {\n\treturn response, nil\n}", "title": "" }, { "docid": "2e1e0850384964b60bf9cba5c59e1ae6", "score": "0.43413568", "text": "func (_Lendingpool *LendingpoolCaller) GetReservesList(opts *bind.CallOpts) ([]common.Address, error) {\n\tvar out []interface{}\n\terr := _Lendingpool.contract.Call(opts, &out, \"getReservesList\")\n\n\tif err != nil {\n\t\treturn *new([]common.Address), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new([]common.Address)).(*[]common.Address)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "72cf1eb16dfe739f594e306b42915d26", "score": "0.4338284", "text": "func (m *InviteParticipantsOperation) GetParticipants()([]InvitationParticipantInfoable) {\n return m.participants\n}", "title": "" }, { "docid": "28c9a9f3bfed40daa44d4fdde8f8a003", "score": "0.43290615", "text": "func (s *AdopteesService) ListAll(ctx context.Context) ([]*Adoptee, *Response, error) {\n\tu := \"adoptees\"\n\treq, err := s.client.NewRequest(\"GET\", u, nil)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tvar adoptees []*Adoptee\n\tresp, err := s.client.Do(ctx, req, &adoptees)\n\tif err != nil {\n\t\treturn nil, resp, err\n\t}\n\n\treturn adoptees, resp, nil\n}", "title": "" }, { "docid": "9292245a38f3a71d3593b109a25b65e8", "score": "0.43264663", "text": "func (a DefaultApi) GetOutgoingEdges(uuid string) ([]NodeEdge, *APIResponse, error) {\n\n\tvar localVarHttpMethod = strings.ToUpper(\"Get\")\n\t// create path and map variables\n\tlocalVarPath := a.Configuration.BasePath + \"/{uuid}/edges/out\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"uuid\"+\"}\", fmt.Sprintf(\"%v\", uuid), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := make(map[string]string)\n\tvar localVarPostBody interface{}\n\tvar localVarFileName string\n\tvar localVarFileBytes []byte\n\t// add default headers if any\n\tfor key := range a.Configuration.DefaultHeader {\n\t\tlocalVarHeaderParams[key] = a.Configuration.DefaultHeader[key]\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{ }\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := a.Configuration.APIClient.SelectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\n\t\t\"application/json\",\n\t\t}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := a.Configuration.APIClient.SelectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\tvar successPayload = new([]NodeEdge)\n\tlocalVarHttpResponse, err := a.Configuration.APIClient.CallAPI(localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes)\n\n\tvar localVarURL, _ = url.Parse(localVarPath)\n\tlocalVarURL.RawQuery = localVarQueryParams.Encode()\n\tvar localVarAPIResponse = &APIResponse{Operation: \"GetOutgoingEdges\", Method: localVarHttpMethod, RequestURL: localVarURL.String()}\n\tif localVarHttpResponse != nil {\n\t\tlocalVarAPIResponse.Response = localVarHttpResponse.RawResponse\n\t\tlocalVarAPIResponse.Payload = localVarHttpResponse.Body()\n\t}\n\n\tif err != nil {\n\t\treturn *successPayload, localVarAPIResponse, err\n\t}\n\terr = json.Unmarshal(localVarHttpResponse.Body(), &successPayload)\n\treturn *successPayload, localVarAPIResponse, err\n}", "title": "" }, { "docid": "16df4a73603b83844af779b276c94e16", "score": "0.43255478", "text": "func (a *PromotionCampaignsAPIService) List(ctx context.Context) (PromotionCampaignList, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = strings.ToUpper(\"Get\")\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue PromotionCampaignList\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/campaigns/list\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\", \"application/xml\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := ctx.Value(ContextAPIKey).(APIKey); ok {\n\t\t\tvar key string\n\t\t\tif auth.Prefix != \"\" {\n\t\t\t\tkey = auth.Prefix + \" \" + auth.Key\n\t\t\t} else {\n\t\t\t\tkey = auth.Key\n\t\t\t}\n\n\t\t\tlocalVarQueryParams.Add(\"apikey\", key)\n\t\t}\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode < 300 {\n\t\t// If we succeed, return the data, otherwise pass on to decode error.\n\t\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\tif err == nil {\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t\t}\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericSwaggerError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\n\t\tif localVarHTTPResponse.StatusCode == 200 {\n\t\t\tvar v PromotionCampaignList\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "17b042d06a5520a4c5dc17b168dad31c", "score": "0.43251806", "text": "func (c *Client) GetBlocksAdv(crypto string, blockIDs []string, options map[string]string) (resp *DataBlock, e error) {\n\tif e = c.ValidateCrypto(crypto); e != nil {\n\t\treturn\n\t}\n\n\tresp = &DataBlock{}\n\tvar path = crypto + \"/dashboards/blocks/\" + strings.Join(blockIDs, \",\")\n\treturn resp, c.LoadResponse(path, resp, options)\n}", "title": "" }, { "docid": "a0f66f8cb3084d37a518e5e021378fb4", "score": "0.43188456", "text": "func (m *AdCampaignStorage) GetAll() ([]model.AdCampaign, error) {\n\tvar adCampaigns []model.AdCampaign\n\terr := DB.C(COLLECTION).Find(bson.M{}).All(&adCampaigns)\n\treturn adCampaigns, err\n}", "title": "" }, { "docid": "035a4040fac68dc4574c8baf9dd6c09f", "score": "0.43185112", "text": "func ldsDiscoveryResponse(ls []*xdsapi.Listener, node model.Proxy) (*xdsapi.DiscoveryResponse, error) {\n\tresp := &xdsapi.DiscoveryResponse{\n\t\tTypeUrl: listenerType,\n\t\tVersionInfo: versionInfo(),\n\t\tNonce: nonce(),\n\t}\n\tfor _, ll := range ls {\n\t\tlr, _ := types.MarshalAny(ll)\n\t\tresp.Resources = append(resp.Resources, *lr)\n\t}\n\n\treturn resp, nil\n}", "title": "" }, { "docid": "f098ef8eda15b4d1885cbf40b53150f0", "score": "0.43176597", "text": "func (r *AccountsAvailsService) List(accountId string) *AccountsAvailsListCall {\n\tc := &AccountsAvailsListCall{s: r.s, urlParams_: make(gensupport.URLParams)}\n\tc.accountId = accountId\n\treturn c\n}", "title": "" }, { "docid": "778bec6d29f619ad601697e00235356f", "score": "0.43117842", "text": "func Get(c *http.Client) ([]*VPN, error) {\n\tresp, err := c.Get(CSV_URL)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer resp.Body.Close()\n\treturn parseList(resp.Body)\n}", "title": "" }, { "docid": "d6814dfff40a0b3cce6abc1091859bc6", "score": "0.43082345", "text": "func (a *adserviceServer) indexAds() {\n\tfor i, ad := range a.ads {\n\t\tfor _, tag := range ad.Tags {\n\t\t\ta.adsIndex[tag] = append(a.adsIndex[tag], i)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "fa11ef3348e68c1bf8ec0356ca403dd9", "score": "0.43062308", "text": "func GetVoteAccounts(cfg *config.Config, node string) (types.GetVoteAccountsResponse, error) {\n\tlog.Println(\"Getting Vote Account Information...\")\n\tops := types.HTTPOptions{\n\t\tEndpoint: cfg.Endpoints.RPCEndpoint,\n\t\tMethod: http.MethodPost,\n\t\tBody: types.Payload{Jsonrpc: \"2.0\", Method: \"getVoteAccounts\", ID: 1, Params: []interface{}{\n\t\t\ttypes.Commitment{\n\t\t\t\tCommitemnt: \"recent\",\n\t\t\t},\n\t\t}},\n\t}\n\tif node == utils.Network {\n\t\tops.Endpoint = cfg.Endpoints.NetworkRPC\n\t} else if node == utils.Validator {\n\t\tops.Endpoint = cfg.Endpoints.RPCEndpoint\n\t} else {\n\t\tops.Endpoint = cfg.Endpoints.RPCEndpoint\n\t}\n\n\tvar result types.GetVoteAccountsResponse\n\n\tresp, err := HitHTTPTarget(ops)\n\tif err != nil {\n\t\tlog.Printf(\"Error while getting leader shedules: %v\", err)\n\t\treturn result, err\n\t}\n\n\terr = json.Unmarshal(resp.Body, &result)\n\tif err != nil {\n\t\tlog.Printf(\"Error while unmarshelling leader shedules: %v\", err)\n\t\treturn result, err\n\t}\n\n\tif result.Error.Code != 0 {\n\t\treturn result, fmt.Errorf(\"RPC error: %d %v\", result.Error.Code, result.Error.Message)\n\t}\n\n\treturn result, nil\n}", "title": "" }, { "docid": "03649d9c249c608f2549d234ce249dfd", "score": "0.43014276", "text": "func Advertise(ctx context.Context, a discovery.Advertiser, ns string, opts ...discovery.Option) {\n\tdutil.Advertise(ctx, a, ns, opts...)\n}", "title": "" }, { "docid": "68ebb8f0c9fbb31d165b51f401120bad", "score": "0.42980817", "text": "func (b NDPRouterAdvert) Options() NDPOptions {\n\treturn NDPOptions(b[ndpRAOptionsOffset:])\n}", "title": "" }, { "docid": "6db33d32ec73b9f3382be86f57b1aeb3", "score": "0.4297196", "text": "func (_HoQuStorage *HoQuStorageCallerSession) AdCampaigns(arg0 [16]byte) (struct {\n\tOwnerId [16]byte\n\tOfferId [16]byte\n\tContractAddress common.Address\n\tCreatedAt *big.Int\n\tStatus uint8\n}, error) {\n\treturn _HoQuStorage.Contract.AdCampaigns(&_HoQuStorage.CallOpts, arg0)\n}", "title": "" }, { "docid": "10123b16430f540600689ac6095e11e9", "score": "0.42936912", "text": "func (m *BookingBusiness) GetServices()([]BookingServiceable) {\n return m.services\n}", "title": "" }, { "docid": "749d8f54e86b08e2f7c9f5dd8db928e9", "score": "0.42934936", "text": "func extractLeads(database *sql.DB) []Mlead {\n\tvar mleads []Mlead\n\tvar id int\n\tvar firstname string\n\tvar lastname string\n\tvar email string\n\tvar company string\n\tvar postcode string\n\tvar acceptterms bool\n\tvar created string\n\n\trows, _ := database.Query(\"SELECT id, firstname, lastname, email, company, postcode, acceptterms, created FROM marketingLeads\")\n\tfor rows.Next() {\n\t\trows.Scan(&id, &firstname, &lastname, &email, &company, &postcode, &acceptterms, &created)\n\t\tmleads = append(mleads, Mlead{id, firstname, lastname, email, company, postcode, acceptterms, created})\n\t}\n\trows.Close()\n\treturn mleads\n}", "title": "" }, { "docid": "c1bb29ba4ccc49647e2b93c795d9f56a", "score": "0.4292426", "text": "func List(c *golangsdk.ServiceClient, opts ListOpts) ([]Peering, error) {\n\tfilter := FilterVpcIdParam(opts)\n\tq, err := golangsdk.BuildQueryString(&filter)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tu := rootURL(c) + q.String()\n\tpages, err := pagination.NewPager(c, u, func(r pagination.PageResult) pagination.Page {\n\t\treturn PeeringConnectionPage{pagination.LinkedPageBase{PageResult: r}}\n\t}).AllPages()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tallPeeringConns, err := ExtractPeerings(pages)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn FilterVpcPeeringConns(allPeeringConns, opts)\n}", "title": "" }, { "docid": "7564908ac89ed8c7914db517712f4107", "score": "0.42860612", "text": "func (page VirtualNetworkPeeringListResultPage) Response() VirtualNetworkPeeringListResult {\n return page.vnplr\n }", "title": "" }, { "docid": "2653ef2f20cd157026f7ee1fdaf16079", "score": "0.4284375", "text": "func (a *Client) GetVlans(params *GetVlansParams, opts ...ClientOption) (*GetVlansOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewGetVlansParams()\n\t}\n\top := &runtime.ClientOperation{\n\t\tID: \"GetVlans\",\n\t\tMethod: \"POST\",\n\t\tPathPattern: \"/get-vlans\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"http\"},\n\t\tParams: params,\n\t\tReader: &GetVlansReader{formats: a.formats},\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t}\n\tfor _, opt := range opts {\n\t\topt(op)\n\t}\n\n\tresult, err := a.transport.Submit(op)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsuccess, ok := result.(*GetVlansOK)\n\tif ok {\n\t\treturn success, nil\n\t}\n\t// unexpected success response\n\t// safeguard: normally, absent a default response, unknown success responses return an error above: so this is a codegen issue\n\tmsg := fmt.Sprintf(\"unexpected success response for GetVlans: API contract not enforced by server. Client expected to get an error, but got: %T\", result)\n\tpanic(msg)\n}", "title": "" }, { "docid": "ec7a70697ef730ed1cda54ba5894829c", "score": "0.42820787", "text": "func (client ReportsClient) ListByBillingAccountResponder(resp *http.Response) (result ReportListResult, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tclient.ByInspecting(),\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK),\n\t\tautorest.ByUnmarshallingJSON(&result),\n\t\tautorest.ByClosing())\n\tresult.Response = autorest.Response{Response: resp}\n\treturn\n}", "title": "" }, { "docid": "e2cebc0120f4012d4f3f77a78e6cf6cb", "score": "0.4274622", "text": "func (a *OptionsApiService) ListOptionsTrades(ctx context.Context, localVarOptionals *ListOptionsTradesOpts) ([]FuturesTrade, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue []FuturesTrade\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/options/trades\"\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\tif localVarOptionals != nil && localVarOptionals.Contract.IsSet() {\n\t\tlocalVarQueryParams.Add(\"contract\", parameterToString(localVarOptionals.Contract.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Type_.IsSet() {\n\t\tlocalVarQueryParams.Add(\"type\", parameterToString(localVarOptionals.Type_.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Limit.IsSet() {\n\t\tlocalVarQueryParams.Add(\"limit\", parameterToString(localVarOptionals.Limit.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Offset.IsSet() {\n\t\tlocalVarQueryParams.Add(\"offset\", parameterToString(localVarOptionals.Offset.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.From.IsSet() {\n\t\tlocalVarQueryParams.Add(\"from\", parameterToString(localVarOptionals.From.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.To.IsSet() {\n\t\tlocalVarQueryParams.Add(\"to\", parameterToString(localVarOptionals.To.Value(), \"\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif ctx == nil {\n\t\tctx = context.Background()\n\t}\n\tctx = context.WithValue(ctx, ContextPublic, true)\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status + \", \" + string(localVarBody),\n\t\t}\n\t\tvar gateErr GateAPIError\n\t\tif e := a.client.decode(&gateErr, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\")); e == nil && gateErr.Label != \"\" {\n\t\t\tgateErr.APIError = newErr\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, gateErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "92fb97e8a83ab7607d1a9c652dc43c20", "score": "0.42721942", "text": "func GetALlVendors(datab *sql.DB) {\n\trows, _ := datab.Query(\"SELECT vendorid, vendorname FROM vendors\")\n\tvar id string\n\tvar vendorname string\n\tfor rows.Next() {\n\t\trows.Scan(&id, &vendorname)\n\t\tfmt.Println(\"VendorID: \" + id + \" VendorName: \" + vendorname)\n\t}\n}", "title": "" }, { "docid": "924e14ad2dfa68d202d77ba0952a7508", "score": "0.4271951", "text": "func adapterAddresses() ([]*windows.IpAdapterAddresses, error) {\n\tvar b []byte\n\tl := uint32(15000) // recommended initial size\n\tfor {\n\t\tb = make([]byte, l)\n\t\terr := windows.GetAdaptersAddresses(syscall.AF_UNSPEC, windows.GAA_FLAG_INCLUDE_PREFIX, 0, (*windows.IpAdapterAddresses)(unsafe.Pointer(&b[0])), &l)\n\t\tif err == nil {\n\t\t\tif l == 0 {\n\t\t\t\treturn nil, nil\n\t\t\t}\n\t\t\tbreak\n\t\t}\n\t\tif err.(syscall.Errno) != syscall.ERROR_BUFFER_OVERFLOW {\n\t\t\treturn nil, os.NewSyscallError(\"getadaptersaddresses\", err)\n\t\t}\n\t\tif l <= uint32(len(b)) {\n\t\t\treturn nil, os.NewSyscallError(\"getadaptersaddresses\", err)\n\t\t}\n\t}\n\tvar aas []*windows.IpAdapterAddresses\n\tfor aa := (*windows.IpAdapterAddresses)(unsafe.Pointer(&b[0])); aa != nil; aa = aa.Next {\n\t\taas = append(aas, aa)\n\t}\n\treturn aas, nil\n}", "title": "" }, { "docid": "12e9f09830010e005b84292d003712df", "score": "0.42716938", "text": "func (a *AccountingApiService) GetAccountAttachments(ctx _context.Context, xeroTenantId string, accountID string) (Attachments, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue Attachments\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/Accounts/{AccountID}/Attachments\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"AccountID\"+\"}\", _neturl.PathEscape(parameterToString(accountID, \"\")) , -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tlocalVarHeaderParams[\"xero-tenant-id\"] = parameterToString(xeroTenantId, \"\")\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "0a8360752da3befbfde4c6f028dead2a", "score": "0.42687428", "text": "func (a *OptionsApiService) ListMyOptionsTrades(ctx context.Context, underlying string, localVarOptionals *ListMyOptionsTradesOpts) ([]OptionsMyTrade, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue []OptionsMyTrade\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/options/my_trades\"\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\tlocalVarQueryParams.Add(\"underlying\", parameterToString(underlying, \"\"))\n\tif localVarOptionals != nil && localVarOptionals.Contract.IsSet() {\n\t\tlocalVarQueryParams.Add(\"contract\", parameterToString(localVarOptionals.Contract.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Limit.IsSet() {\n\t\tlocalVarQueryParams.Add(\"limit\", parameterToString(localVarOptionals.Limit.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Offset.IsSet() {\n\t\tlocalVarQueryParams.Add(\"offset\", parameterToString(localVarOptionals.Offset.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.From.IsSet() {\n\t\tlocalVarQueryParams.Add(\"from\", parameterToString(localVarOptionals.From.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.To.IsSet() {\n\t\tlocalVarQueryParams.Add(\"to\", parameterToString(localVarOptionals.To.Value(), \"\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif ctx == nil {\n\t\tctx = context.Background()\n\t}\n\tif ctx.Value(ContextGateAPIV4) == nil {\n\t\t// for compatibility, set configuration key and secret to context if ContextGateAPIV4 value is not present\n\t\tctx = context.WithValue(ctx, ContextGateAPIV4, GateAPIV4{\n\t\t\tKey: a.client.cfg.Key,\n\t\t\tSecret: a.client.cfg.Secret,\n\t\t})\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status + \", \" + string(localVarBody),\n\t\t}\n\t\tvar gateErr GateAPIError\n\t\tif e := a.client.decode(&gateErr, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\")); e == nil && gateErr.Label != \"\" {\n\t\t\tgateErr.APIError = newErr\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, gateErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "566fad0013a94d284d44c23aabf21889", "score": "0.4265511", "text": "func getLDS(svcRouteConfigName, svcListenerName string) (types.Resource, error) {\n\thttpConnRds := &hcm.HttpConnectionManager_Rds{\n\t\tRds: &hcm.Rds{\n\t\t\tRouteConfigName: svcRouteConfigName,\n\t\t\tConfigSource: &envoy_core.ConfigSource{\n\t\t\t\tConfigSourceSpecifier: &envoy_core.ConfigSource_Ads{\n\t\t\t\t\tAds: &envoy_core.AggregatedConfigSource{},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n\n\thttpConnManager := &hcm.HttpConnectionManager{\n\t\tCodecType: hcm.HttpConnectionManager_AUTO,\n\t\tRouteSpecifier: httpConnRds,\n\t}\n\n\tanyListener, err := ptypes.MarshalAny(httpConnManager)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed marshal any proto: %w\", err)\n\t}\n\n\treturn types.Resource(\n\t\t&api.Listener{\n\t\t\tName: svcListenerName,\n\t\t\tApiListener: &listener.ApiListener{\n\t\t\t\tApiListener: anyListener,\n\t\t\t},\n\t\t}), nil\n}", "title": "" }, { "docid": "fdf0c8686405f4010d46b5bd27a778f0", "score": "0.42641765", "text": "func GetAllAgency() ([]*Struct_Agency, error) {\n\treturn getAgency(0, 0, 0, \" AND a.deleted_at = '1970-01-01 07:00:00+07' \")\n}", "title": "" }, { "docid": "e43e7b29486b2d957e650fd548757969", "score": "0.4261241", "text": "func EncodeGrpcRespAlertDestinationList(ctx context.Context, response interface{}) (interface{}, error) {\n\treturn response, nil\n}", "title": "" }, { "docid": "df3514167f944284b33cc4ebe8391c70", "score": "0.42589778", "text": "func (v AttachmentsResource) List(c buffalo.Context) error {\n // Get the DB connection from the context\n tx, ok := c.Value(\"tx\").(*pop.Connection)\n if !ok {\n return fmt.Errorf(\"no transaction found\")\n }\n\n attachments := &models.Attachments{}\n\n // Paginate results. Params \"page\" and \"per_page\" control pagination.\n // Default values are \"page=1\" and \"per_page=20\".\n q := tx.PaginateFromParams(c.Params())\n\n // Retrieve all Attachments from the DB\n if err := q.All(attachments); err != nil {\n return err\n }\n\n // Add the paginator to the context so it can be used in the template.\n c.Set(\"pagination\", q.Paginator)\n\n return c.Render(200, r.Auto(c, attachments))\n}", "title": "" }, { "docid": "754182e6d536aa463b288f839b472c14", "score": "0.4257006", "text": "func (client ReceivedRoutesClient) ListByPeeringResponder(resp *http.Response) (result ReceivedRouteListResult, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK),\n\t\tautorest.ByUnmarshallingJSON(&result),\n\t\tautorest.ByClosing())\n\tresult.Response = autorest.Response{Response: resp}\n\treturn\n}", "title": "" }, { "docid": "20ea10ad1e55d1fb10df426cd06a7ce2", "score": "0.42567152", "text": "func (s *APIServer) getProxies(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {\n\tservers, err := auth.GetProxies()\n\tif err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\treturn marshalServers(servers, version)\n}", "title": "" }, { "docid": "bb8b865f7b04e960ac6ab4d33f6ce40b", "score": "0.4251371", "text": "func (c *Client) AdhocChallengeInvites() ([]AdhocChallengeInvitation, error) {\n\tURL := \"https://connect.garmin.com/modern/proxy/adhocchallenge-service/adHocChallenge/invite\"\n\n\tif !c.authenticated() {\n\t\treturn nil, ErrNotAuthenticated\n\t}\n\n\tchallenges := make([]AdhocChallengeInvitation, 0, 10)\n\n\terr := c.getJSON(URL, &challenges)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Make sure the embedded UUID matches in case the user uses the embedded\n\t// AdhocChallenge for something.\n\tfor i := range challenges {\n\t\tchallenges[i].AdhocChallenge.UUID = challenges[i].UUID\n\t}\n\n\treturn challenges, nil\n}", "title": "" }, { "docid": "1dd7b2f0fc27f359960013606b9682cd", "score": "0.4249583", "text": "func (*ListGuildChannelVoiceStatesResponse) Descriptor() ([]byte, []int) {\n\treturn file_discord_v1_cache_cache_proto_rawDescGZIP(), []int{25}\n}", "title": "" }, { "docid": "a78bc4452de88ed4869fc057da18924f", "score": "0.42493063", "text": "func (client ReportsClient) ListResponder(resp *http.Response) (result ReportListResult, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tclient.ByInspecting(),\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK),\n\t\tautorest.ByUnmarshallingJSON(&result),\n\t\tautorest.ByClosing())\n\tresult.Response = autorest.Response{Response: resp}\n\treturn\n}", "title": "" } ]